TechrightsSearch results for 'shakeup' (page 1 of 3) http://techrights.org Free Software Sentry – watching and reporting maneuvers of those threatened by software freedom Wed, 04 Jan 2017 12:07:22 +0000 en-US hourly 1 http://wordpress.org/?v=3.9.14 The UPC Scam Part IV: Bumps Along the Road for UPC, With or Without the UK and Brexit http://techrights.org/2016/11/29/upc-reality-check/ http://techrights.org/2016/11/29/upc-reality-check/#comments Wed, 30 Nov 2016 00:49:42 +0000 http://techrights.org/?p=97132 This great search was powered by Search Unleashed.
Help to remove this message by getting the site owner to support this software.

… bribery and so much more. It’s far, FAR worse than FIFA ever was. But somehow there is no shakeup, at least not in the media. In fact, the media (as we noted in parts one and two of this series) was filled with EPO-leaning propaganda this week. It’s utterly appalling, though not entirely unexpected or unusual. Battistelli wastes a lot of money manipulating the media.

“Finally,” one person joked, “the #UPC is coming into farce!”

Not into force but a farce, as many …

]]>
http://techrights.org/2016/11/29/upc-reality-check/feed/ 0
Links 10/11/2016: Latest Microsoft Attacks on GNU/Linux (by Proxy), F2FS Growing Up http://techrights.org/2016/11/10/f2fs-growing-up/ http://techrights.org/2016/11/10/f2fs-growing-up/#comments Thu, 10 Nov 2016 15:26:33 +0000 http://techrights.org/?p=96672

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • 5 open source dashboard tools for visualizing data

    I’ve always been fascinated by finding new and interesting ways to bring meaning to data with interactive visualization tools. While I’m definitely a geek for numbers, the human mind is simply much better at interpreting trends visually than it is just picking them out a spreadsheet. And even when your main interest in a dataset is the raw numbers themselves, a dashboard can help to bring meaning by highlighting which values matter most, and what the context of those numbers is.

    Figuring out how to best visualize your data can be challenging. Maybe you started out by creating a few graphs in a spreadsheet and are trying to find a way to tie them all together. Or maybe you’re working with an existing analytics tool and want to find a way to make your data more accessible to a wider audience. Or perhaps you’ve go several real-time sources and are trying to find a way to tie them all together.

    Fortunately, there are a number of great open source dashboard tools out there that make the job much easier. On one end of the spectrum are open source business intelligence tools, like BIRT or Pentaho. But for a smaller project, tools like these could be overkill, and in some cases, you might be able to find a dashboard tool that is already designed to work with the kind of data you are dealing with.

  • Events

    • NetBSD machines at Open Source Conference 2016 Tokyo/Fall
    • My First International FOSS Event: FUDCon Cambodia

      It was a privilege to be a speaker at FUDCon, Cambodia 2016. This being my first international FOSS event was ever more exciting. Right from the day I received the invitation from Sirko, I felt extremely privileged. On reaching the place I found that the event was much bigger than what I had expected it to be. There was a bar camp being organised by the university with over 5000 participants. Simply speaking it was a grand and huge occasion.

    • Endace Sponsors Open Source Suricata Conference

      Endace, a world leader in high-speed network monitoring and recording technology, is a sponsor of Suricon, which kicks off on Wednesday November 9th at the Hamilton Crowne Plaza in Washington D.C. Suricon, which draws attendees from around the world (including Suricata project contributors, developers and users), is the annual conference for the community behind the popular open-source intrusion detection (IDS) application, Suricata.

    • Message parsing and community building: All Things Open 2016

      Last week I visited All Things Open, one of the largest open source conferences of the US East Coast. The venue was the monumental building of the Raleigh Convention Center, just two blocks from Red Hat’s headquarters. I was presenting syslog-ng in the Operations track of the conference, but luckily I had a chance to stay for the full two days of the event.

      There were over 2400 visitors at the conference, so registration and check-in already started the day before. Those who leveraged this opportunity could not just avoid the crowd next morning, but also receive a nice t-shirt together with the conference badge:

  • SaaS/Back End

  • Oracle/Java/LibreOffice

    • LibreOffice 5 – Free Office Suite Keeps Getting Better

      LibreOffice is the best office software available, or at least on Linux. LibreOffice is a powerful office suite that comes with a clean interface and feature-rich tools that seeks to make your productive and creative. LibreOffice includes several applications including Writer for word processing, Calc for spreadsheets, Impress for presentations, Draw for vector graphics and flowcharts, Base for databases, and Math for formula editing.

  • Pseudo-Open Source (Openwashing)

  • BSD

    • TrueOS Succeeds PC-BSD Desktop-Friendly Unix OS

      The FreeBSD Unix operating system is one of the earliest open-source operating system projects, and it continues to be actively developed. The most recent update is the FreeBSD 11 release, which debuted Oct. 10. While FreeBSD is a robust operating system, it is not a desktop focused platform, which is where the PC-BSD operating system, based on FreeBSD used to fit in. On Sept. 1, PC-BSD was re-branded as TrueOS, providing FreeBSD users with an easy-to-use desktop as well as a new release cadence. In the past, PC-BSD releases followed FreeBSD milestones, providing users with code that had already been included in a generally available release. With TrueOS, the release model is now moving to what is known as a rolling release, with packages constantly being updated as they become available. As such, TrueOS is not based on the recently released FreeBSD 11; instead, it is based on the FreeBSD “current” branch that is the leading edge of the operating system development. In this slide show, eWEEK takes a look at the new TrueOS operating system and what it offers desktop users.

  • Openness/Sharing/Collaboration

    • Can America’s two-party system evolve to crowdocracy?

      Since I’ve studied civics and governments, I’ve never thought a two-party system of elected officials in our executive and legislative branches was the best form of democracy. It worked for a time, but now it’s time for change. In the United States, our representative democracy has become polarized and plagued with raising money for re-elections instead of focusing on the issues—issues that are largely influenced by lobbyist and corporate interests.

    • Open Data

      • Who is leading Open Data in Europe? Walking the Open Data talk

        Capgemini Consulting’s Wendy Carrara, project manager for the European Data Portal, discusses the UK’s open data readiness, including ways it could learn from its neighbours and even improve on its open data policy

        Open data – that is, publicly available data that’s free for all to use – is set to have a monumental impact on societies in the next five years. Whether it’s information regarding public transportation, citypolicy or city infrastructures, open data enables public sector bodies, business and citizens alike to make more informed decisions about the things that really matter. While it may sound like a popular buzzword from years gone by, governments across the globe are now developing policies that encourage the release of open government data. However, having policy in place is a far cry from actually getting it done.

Leftovers

  • Health/Nutrition

    • Nestlé Just Granted Permit to Double Water Extraction 120 Miles from Flint, MI

      Nestlé is at it again. Recently publicly condemned for pumping 36 million gallons of water from Strawberry Creek in the San Bernardino National Forest, paying a meager $524 annually for a permit that expired long ago, the multi-national company is now planning to milk the citizens of Flint, Michigan, to keep their water privatization plan afloat.

      Nestlé was just given a permit to almost double the groundwater they extract from the Michigan area amidst the recent Flint water crisis. This means the company will be taking more than 210 million gallons annually while many Flint residents are still suffering from the long-term effects of lead exposure.

      Nestlé is not even based in the U.S., but the Swiss transnational is taking water from hundreds of local water supplies. The U.S. represents its largest bottled water market. Nestlé also controls more than 70 of the world’s bottled water brands, among them Perrier, San Pellegrino, Ice Mountain, Pure Life, and Vittel.

  • Security

  • Defence/Aggression

    • Pentagon Again Dramatically Under-Reports Civilians Killed in Airstrikes

      Previous reports from Centcom were a dramatic under-count, and that trend continued with this new report, which carefully omitted some of the biggest and most well-documented incidents, which apparently fell into the category of strikes that the Pentagon decided not to investigate at all.

      The most conspicuously absent figures are from mid-July, when a flurry of US airstrikes against the city of Manbij and the surrounding area killed an estimated 200 civilians. At least 56 civilians were killed in one single incident, which at the time the US claimed they “mistook for ISIS.”

      Despite the Pentagon feeling the need to come up with excuses for the Manbij strikes at the time, they not only didn’t include them in the final death toll, but didn’t even hazard an attempt to mention the well-documented incidents in the document.

  • Environment/Energy/Wildlife/Nature

    • Now that Trump has won, TransCanada wants to give Keystone XL pipeline another try

      TransCanada said it hopes to persuade a new Trump administration to revive the controversial Keystone XL crude oil pipeline that President Obama rejected on Nov. 6, 2015.

      Taking advantage of President-elect Trump’s vow to launch a series of major infrastructure programs, Calgary-based TransCanada said it was “evaluating ways to convince the new administration on the benefits, the jobs and the tax revenues this project brings to the table.”

      “TransCanada remains fully committed to building Keystone XL,” the company said.

    • Construction of Dakota Access Pipeline set to begin its final, most contested stretch

      The company behind the Dakota Access Pipeline is preparing to tunnel under Lake Oahe, the body of water at the heart of the protests against the crude oil pipeline. This last phase of construction would join the two already-completed sections of the pipeline, Reuters reports.

      The company, Energy Transfer Partners, announced today that drilling underneath the lake will start in two weeks despite government agencies’ requests to wait, according to The Guardian. The pipeline is expected to be completed by the end of 2016, the company says.

      Protesters, including the local Standing Rock Sioux tribe, have been fighting the the $3.7 billion pipeline since April. They argue that the pipeline, which is intended to carry crude oil from North Dakota to a refinery in Illinois, could pollute water supplies and destroy culturally important land. In September, the US Justice and Interior Departments and the Army Corps of Engineer requested that Energy Transfer Partners voluntarily stop construction underneath the lake.

    • America’s Brief Role as a Climate Leader Is Probably Over

      While America was watching Donald Trump sweep the polls, climate representatives from over 200 countries saw America’s commitments to international climate goals blow away. This week, climate negotiators—along with NGOs, journalists, and other observers—are gathered in Marrakesh, Morroco to flesh out the details of the Paris agreement, newly ratified and enacted by the United Nations to address climate change. And though Trump hasn’t described his climate and energy policies in detail, he has made it clear that he will not honor promises the Obama administration made to combat the intensifying global warming catastrophe.

      The Clean Power Plan. Tax breaks for renewable energy. Cabinet appointees and a Supreme Court seat. Trump has the power to drastically change US environmental policy—and as the soon-to-be-leader of the world’s largest economy and second-largest greenhouse gas emitter, his decisions will change the math for other nations previously committed to climate regulations. Some will follow the US, and dial back (or abandon) their goals. Others will stay the course. And still others might double down on climate goals, potentially gaining global clout as a result. However the 45th president of the US proceeds, his decisions on climate will affect everyone on Earth.

  • Finance

    • Shock as India scraps 500 and 1,000 rupee bank notes

      Indian Finance Minister Arun Jaitley says “honest people” have no need to worry about a decision to scrap 1,000 and 500 rupee notes.

      Mr Jaitley said the move would flush out tax evaders, adding that all old notes deposited in banks would be subjected to tax laws.

      The surprise move, announced on Tuesday evening, is part of a crackdown on corruption and illegal cash holdings.

    • Robots Will Take Two-Thirds of All Jobs In the Developing World, UN Says

      It’s a common belief that low-wage workers will be hit the hardest by advanced robots in the workplace. When we take a global perspective on this, the people that will be most affected by widespread automation won’t be workers in North America, according to a new United Nations report—it’ll be people in developing countries.

      Automation stands to reduce opportunities for low-wage workers in North America, the report from the UN Conference on Trade and Development states. But the types of jobs most likely to be eliminated entirely are more prevalent in developing nations. That’s because those same jobs, in sectors like farming and manufacturing, have already mostly dried up in wealthier nations as corporations have moved their operations abroad, in search of higher profits through lower wage costs.

    • Feeling the oil crunch: Saudi Arabia cancels $266bn in projects

      Saudi Arabia’s governing economic body called the Council of Economic and Development Affairs (CEDA) has cancelled $266.7 billion in projects, the Saudi Press Agency said, and announced it would be settling much-delayed private-sector payments by year end.

      The projects that have been canceled are the ones that are not expected to accelerate the kingdom’s growth or improve the living standards for its people.

      The cancellations were first considered in September, but at the time, it was noted that only $20 billion in projects would be considered to put on the chopping block.

      The size of the delayed payments—mainly due to severe hits to the kingdom’s oil revenue—remains undisclosed, but it includes delayed payments to construction firms, medical establishments, and foreign consultants. One analyst, according to Reuters, estimated that the amount still owing just to construction firms was US$21 billion.

    • Engineer sold as slave in Saudi Arabia, family wants him back

      An automobile engineer, who went to Saudi Arabia for better job opportunities, has allegedly been “sold” to a Saudi national as a slave to work in his camel farm. The family members of Jayanta Biswas have approached the Ministry of External Affairs for help in bringing him back from Saudi Arabia.

      However, they are yet to receive a word from the ministry. “We appeal to the Indian government to initiate action in order to bring my brother back. We are at our wit’s end,” Gouri Biswas, elder sister of Jayanta, said.

  • AstroTurf/Lobbying/Politics

    • The Huffington Post ending editor’s note that called Donald Trump ‘racist’

      The Huffington Post’s editor’s note calling Donald Trump as a “racist” and “xenophobe” is no more, a source in the newsroom tells POLITICO.

      For months, every story on the Huffington Post about Trump came with the following note at the bottom of the article.

    • Vigils and protests swell across U.S. in wake of Trump victory

      Vigils and protests continued into the early hours Thursday as opponents of President-elect Donald Trump expressed dismay with the election results, underscoring the difficult task he faces in uniting a fractured country.

      Despite Hillary Clinton and President Obama urging their backers to accept Trump’s victory and support his transition into power, thousands of demonstrators marched through the streets decrying his crude comments about women and attacks on immigrants.

      Protests were reported in cities across the nation, from major metropolitan centers like New York, Chicago and Los Angeles, to smaller cities, such as Richmond and Portland, Ore. Dozens of demonstrators were arrested.

      Even cities in red states, such as Atlanta, Dallas and Kansas City, Mo., saw demonstrations.

      At least two police officers in Oakland, Calif., were injured as protesters took to the streets and chanted slogans against Trump, a police spokeswoman said. A few protesters threw objects at police dressed in riot gear, set off fireworks and started small trash fires.

    • Donald Trump and the Art of the Political Deal

      If you have a quick look at President-Elect Donald Trump’s approach – as a businessperson – to legal obligations, you may see something interesting about his approach to politics.

      Trump sees himself as a master of the “art of the deal”.

      And he certainly has an interesting and artful approach to contract law.

      By way of background, classical contract law is about the sanctity of the agreement: the bargain.

      All parties to a contract agree in advance what to do throughout the period of the contract regarding foreseeable risks. This means that there is a lot of “front-end” thought put into a contract: more time working things out in advance, the fewer problems later.

    • The US Election

      But my main point is the European establishment’s response to the Trump presidential victory. And let us not deceive ourselves here – this was an emphatic victory. The American people wanted a candidate for change, for a push-back against the perceived Washington political elite.

      Perhaps the election could have swung in another direction towards another candidate for change – if Bernie Sanders had been the Democrat nominee. Alas, as we know from the DNC files leaked to and published by Wikileaks, his campaign was undermined by his own party in favour of Hillary Clinton, while promoting Trump as the Republican candidate that Clinton could beat.

    • Canadian immigration site crashes after Trump leads in election

      As the US presidential elections move along, Canada’s informational website for immigration has unexpectedly crashed as Donald Trump currently leads in votes.

    • RNC model showed Trump losing

      The RNC’s sophisticated predictive modeling had Trump losing in the campaign’s last stretch, all the way until the Friday afternoon before the election, according to an embargoed briefing the RNC delivered to reporters at the party’s Capitol Hill headquarters on Friday afternoon.

      At the time of the briefing, the RNC’s model showed Trump finishing 30 electoral votes short of the tally needed to clinch the White House, while losing by various margins to Hillary Clinton in the battleground states of Florida, Iowa, Pennsylvania and Wisconsin.

      Trump won all those states, and the Associated Press declared him the winner at 2:31 a.m. on Wednesday — a shocking upset victory that most pollsters struggled to explain.

      [...]

      The briefing was called ostensibly to highlight the RNC’s advances in voter modeling and its heavy investment in the party’s ground game. But it also seemed at least partly intended to prove that the Republican Party gave Trump — and all of its 2016 candidates — the tools to succeed in 2016.

      The suggestion was unmistakable: if Trump loses, the blame should fall on the rookie candidate and his overmatched campaign — and not the party or its chairman Reince Priebus.

      The briefing was conducted by the RNC’s top staff, who asked reporters to agree not to divulge details — or even the existence of the briefing — before the election was called.

      The RNC’s model included 9.8 billion rows of data collected from 26 million phone calls that allowed the RNC to assign scores between 0 and 100 on all manner of issues.

    • [Old] How Half Of America Lost Its F**king Mind

      I was born and raised in Trump country. My family are Trump people. If I hadn’t moved away and gotten this ridiculous job, I’d be voting for him. I know I would.

    • How Does the Electoral College Work?

      The Electoral College is a group of people that elects the president and the vice president of the United States. (The word “college” in this case simply refers to an organized body of people engaged in a common task.)

      As voters head to the polls on Tuesday, they will not vote for the presidential candidates directly, in a popular vote. Instead, they will vote to elect specific people, known as “electors” to the college. Each state gets a certain number of electoral votes based on its population.

    • Trump won – now what?

      In some sort of a reaction against the political elite, a corrupt system, and political correctness – the US has elected Donald Trump as president.

      On the one hand, it is more or less impossible to foresee the president elects politics on IT, mass surveillance, and civil rights. (OK, he has opened up for torture of suspected terrorists – but I’m not sure that he himself will remember or stand by that.)

    • Why TV News Couldn’t Quit Donald Trump

      Donald Trump’s relationship with the news media during his successful run for the presidency was, put politely, complex. A better word might be codependent. Trump lashed out regularly at those whose coverage of his campaign he found unfavorable — tweeting insults, banning and unbanning news organizations, promising to strengthen libel and defamation laws. But free media coverage, particularly from TV news outlets, was also the fuel that powered the Trump machine.

      What television news outlets received in return were outsize ratings. For the four weeks of Oct. 10-Nov. 6, CNN, Fox News and MSNBC averaged 84% more primetime viewers than they did over the same period a year ago. The increased numbers — and accompanying ad dollars — rolled in as the networks handed large swathes of airtime over to live feeds of Trump campaign events. Those same networks were caught by surprise Tuesday night by Trump’s victory. Now they must decide whether the trade-off was worth it.

      “I think they have to examine the amount of unfiltered airtime they gave to the President-elect,” said Katz Television Group’s Bill Carroll. “If you were going to look at any of the cable networks for the last year, often the key phrase would be, ‘And now we go to a rally for Donald Trump.’”

    • The Day After

      So: we wake up the morning after the US election to discover … what?

      Here’s my short term prediction, followed by my long term prediction. (And if you are American, I’m very, very, sorry.)

      Next couple of months: Obama exits. People will feel a strange sad fondness for the utopian era of good governance. (In time, the past 8 years will seem surrounded by a rosy glow, as of Camelot during the days of King Arthur and the Knights of the Round Table; they will even come to think kindly of George W. Bush.)

    • Industry, party figures mix with Trump loyalists for cabinet picks

      The US government’s science efforts are split across a variety of agencies. Some are obvious, like the EPA, the Department of Energy, and the Department of the Interior, which oversees the national parks and Endangered Species Act. But others are less so. For example, the Commerce Department includes the NOAA, or the National Oceanic and Atmospheric Administration, while the National Institutes of Health falls within the Department of Health and Human Services.

      The people who run these agencies will have major say over the US’ research priorities for the next four years, and they’ll determine what role science plays in making policy decisions. So, as the Trump transition team begins the work of vetting potential candidates, the rumored names may say a lot about what we can expect.

      A lot of these rumors are preliminary enough that they essentially tell us nothing. For example, possible candidates floated for Commerce Secretary include everyone from the Republican National Committee finance chair (Lew Eisenberg), to two different business executives, to several of Trump’s former primary opponents like Chris Christie, Mike Huckabee, and Rick Perry. The NOAA keeps one of the US’ two temperature records used for climate monitoring (NASA keeps the other), and it tracks the ocean’s health. (It may also get all of NASA’s earth sciences research.) But it’s hard to guess whether any of these figures would pay much attention to these activities, much less make major revisions in them.

    • WikiLeaks not letting up on Clinton, Podesta

      WikiLeaks on Wednesday published a 36th batch of emails from Hillary Clinton campaign chairman John Podesta, just hours after the presidential election concluded with Donald Trump’s victory over Clinton.

      The release, which includes 225 emails obtained from Podesta’s personal Gmail account, brings the total released by WikiLeaks to 58,660. The organization began releasing the messages in early October, and claimed at the time to have around 50,000 on hand. It isn’t clear how many more the website holds, or how long the releases will continue, but they seemed timed to hurt Clinton’s chances of becoming the next president.

  • Censorship/Free Speech

    • China’s vast Internet prison

      CHINA’S INTERNET is a universe of contradictions. It has brought hundreds of millions of people online and has become a vast marketplace for digital commerce, yet it is also heavily policed by censors to snuff out any challenge to the ruling Communist Party. Under President Xi Jinping, the censors are working overtime to keep 721 million Internet users under control.

    • China’s new cybersecurity laws could have chilling effect on Tibet

      The Chinese government is to further restrict Internet use by adopting a new law that may have serious consequences for Tibetans who try to communicate with the outside world.

      The regressive measure named the Cybersecurity Law was passed by China’s Parliament on 7 November in order to combat what Beijing said is a growing threat of hacking and terrorism, but it has drawn criticism from the international community, business groups and human rights groups.

      The law aims to strengthen the country’s already restrictive internet controls by forcing companies to censor information the government declares “prohibited” and to support state surveillance requests. This includes requiring them to monitor network activity and provide investigative assistance to security agencies.

    • Far-right Polish groups protest Facebook profile blockages

      Several far-right Polish groups have protested outside Facebook’s office in Warsaw after the social networking site temporarily blocked their profiles.

      About 120 people demonstrated in the Polish capital Saturday afternoon, denouncing what they said was “censorship.”

      Facebook recently blocked the profiles of far-right nationalist groups ahead of nationalist demonstrations on Independence Day next Friday, Nov. 11. In recent years, extremist groups have clashed violently with police on the annual holiday. Facebook has since unblocked the profiles.

    • When the screen goes blank

      The Information and Broadcasting Ministry’s 24-hour ban on the television channel NDTV India over its Pathankot coverage is being seen as an attempt to muzzle inconvenient live reportage. And worse, a case of selective vendetta. The Ministry has invoked the Cable Television Networks (Amendment) Rules, 2015, on the ground that the channel broadcast “crucial information” which compromised national security. These rules prohibit “live coverage of any anti-terrorist operation by security forces” and restrict media coverage to “periodic briefing” by a designated officer “till such operation concludes”. It is not clear if the channel’s impugned broadcast was ‘live coverage’ or just ‘reportage’.

    • Censorship and ‘censorship’

      AT&T, the communications conglomerate which owns Direct TV, was hauled into the court of public opinion Friday, charged with censorship for pulling the plug on Fox News.

      Irate customers of the satellite television subscriber service took to the internet to voice their suspicions, tar and feathers at the ready.

  • Privacy/Surveillance

    • A madman has been given the keys to the surveillance state

      When the USA PATRIOT Act was signed into law on October 26, 2001, it erased many of the vital checks and balances that stood between the American people and their government. As Bush supporters cheered the unprecedented power that their people in Washington now held, the civil liberties world warned them: “Your president has just fashioned a weapon that will be wielded by all who come after him.”

    • Facebook built another Snapchat clone specifically for emerging markets [Ed: Facebook comes up with new ways to spy on people people, hoarding more secrets that can be sold]

      We’ve seen this play out before. Twice, in fact. In both instances — first with Poke, then with Slingshot — Facebook’s attempt to create a legitimate Snapchat competitor flopped.

    • Google’s Android Phones Threaten Democracy, ACLU Technologist Warns

      The editors at Businessweek like that approach. In a Halloween post on Bloomberg View, the editors argued privacy would be better served if internet service providers gave consumers the option to pay for it rather than for the FCC to require—as it recently has—that consumers must opt in to corporate surveillance. The editors wrote, “So-called pay-for-privacy policies, in which companies charge users more in exchange for not tracking them, is one promising approach.”

      It turns out that privacy already has a price, and one can roughly find it in a straightforward way, according to Christopher Soghoian, a technologist at the American Civil Liberties Union. It runs about $400. That’s the price of the cheapest new iPhone available on the market today.

      In a recently released TED talk, Soghoian said there’s a “digital security divide” between wealthier iPhone users and generally low-income buyers of devices running on Google’s Android operating system. This threatens democracy, he argues, because today’s new civil rights movements run on mobile technology, but most of these new leaders’ followers will receive marching orders on phones that don’t protect them.

    • A Trumped America makes for bad UK surveillance, warns Open Rights Group

      THE OPEN RIGHTS GROUP (ORG) has been quick to express concerns that the new American president, a known reactionary blowhard, now runs the US National Security Agency (NSA) and will therefore work closely with GCHQ.

    • Trump’s torture support could mean the end of GCHQ-NSA relationship
    • Obama has handed a surveillance state and war machine to a maniac

      In a little over two months, Donald Trump – after his shocking victory last night – will control a vast, unaccountable national security and military apparatus unparalleled in world history. The nightmare that civil libertarians have warned of for years has now tragically come true: instead of dismantling the surveillance state and war machine, the Obama administration and Democrats institutionalised it – and it will soon be in the hands of a maniac.

      It will go down in history as perhaps President Obama’s most catastrophic mistake.

      The Obama administration could have prosecuted torturers and war criminals in the Bush administration and sent an unmistakable message to the world: torture is illegal and unconscionable. Instead the president said they would “look forward, not backward”, basically turning a clear felony into a policy dispute. Trump has bragged that he will bring back torture – waterboarding and “much worse”. He has talked about killing the innocent family members of terrorists, openly telling the world he will commit war crimes.

    • President Obama Should Shut Down the NSA’s Mass Spying Before It’s Too Late

      Modern surveillance programs would be a disaster under President Trump

      President Obama has just 71 days until Donald Trump is inaugurated as our next commander-in-chief. That means he has a matter of weeks to do one thing that could help prevent the United States from veering into fascism: declassifying and dismantling as much of the federal government’s unaccountable, secretive, mass surveillance state as he can — before Trump is the one running it.

    • Scared About Trump Wielding FBI And NSA Cyber Power? You Should Be
    • People in tech are freaking out about Donald Trump being given control of the NSA

      Last month, Wired published a story with the headline “Imagine if Donald Trump controlled the NSA.” Now there’s no need to imagine.

      Trump overcame all odds on Wednesday when he became the 45th president-elect of the United States. As a result, he’s about to gain control of the US intelligence agencies, including the NSA (National Security Agency).

    • Could President Trump Really Turn the NSA Into a Personal Spy Machine?

      It’s the nightmare scenario that many worried about: the US elects a president who uses the country’s nearly omnipotent surveillance powers for his or her own gain. Edward Snowden has described the NSA’s spying capabilities as the “architecture of oppression,” with the fear being that it could be deployed by a malicious commander in chief.

      But what could President Trump, a man who has incited hate speech against minorities and threatened to jail his political rivals, actually do with the NSA? Could he turn the NSA into his own personal spying army?

  • Civil Rights/Policing

    • Girls as young as 12 married off overseas, dropped off at school by 30-year-old husbands

      A Sydney woman, who attended Islamic colleges in Sydney’s west, says girls as young as 12 would be married off overseas and some were dropped off at school by husbands aged in their 30s.

      Iraqi-born Bee al-Darraj, now 24, said she tried to report multiple counts of child marriage among her friends and relatives to the Australian Federal Police (AFP) without success.

    • Erdogan: Don’t heed what Europe says, listen to what Allah says

      Turkey’s President Recep Tayyip Erdogan on Tuesday called on his supporters not to heed what “Europe says and care about what Allah says,” on the latest developments in his country which the European Union described as “extremely worrying.”

      Addressing a public gathering in the capital Ankara, Erdogan slammed the pro-Kurdish Peoples’ Democratic Party (HDP) leaders and lawmakers, 10 of whom Turkish authorities imprisoned since Friday.

      “Those who lean on terrorists will continue paying the price,” said Erdogan referring to a speech by the now jailed HDP co-chair Figen Yuksekdag.

      The HDP co-chair had earlier praised the Kurdish People’s Protection Units (YPG) and Women’s Protection Units (YPJ) fight against the Islamic State (IS) in Syria.

      “We lean on the YPG, YPJ, and Rojava,” Yuksekdag had declared in a July 2015 speech to a crowd in the Suruc district of Urfa Province right across the border with the town of Kobani in Syrian Kurdistan.

      Kobani was notably saved from a complete IS takeover earlier in the year by the US-backed Kurdish forces.

  • Internet Policy/Net Neutrality

    • Net neutrality is suddenly on the chopping block

      The release of the FCC’s net neutrality rules in 2015 heralded one of the most important progressive changes to the internet in memory. The rules, which barred data throttling and paid fast lanes, were celebrated as a central tenet of Obama-era government regulation. At the time, Obama said the “decision will protect innovation and create a level playing field for the next generation of entrepreneurs.”

      Now it seems possible that next generation won’t see net neutrality in action. Although telecom policy was hardly a central pillar of Trump’s candidacy, he has gone on record against it. “Obama’s attack on the internet is another top down power grab,” Trump tweeted in 2014. “Net neutrality is the Fairness Doctrine. Will target conservative media.” (It’s unclear what Trump means with comparisons to the FCC’s long-eliminated Fairness Doctrine, which required broadcasters to provide airtime for opposing views. Conservative media was also not “targeted” by net neutrality in any tangible way.)

  • Intellectual Monopolies

    • Copyrights

      • Copyright Troll Backs Down When Faced With Exposure

        Companies that make money from threatening alleged file-sharers are known for their bullying tactics but those who are prepared to fight back can enjoy success. A letter sent by a defense lawyer to the copyright trolls behind the movie London Has Fallen provides an excellent and highly entertaining example.

]]>
http://techrights.org/2016/11/10/f2fs-growing-up/feed/ 0
Links 1/11/2016: Linux Hallowee, Debian Drops PowerPC http://techrights.org/2016/11/01/debian-drops-powerpc/ http://techrights.org/2016/11/01/debian-drops-powerpc/#comments Tue, 01 Nov 2016 16:51:56 +0000 http://techrights.org/?p=96530

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • 6 ways to use open tools to better support Indian languages

    India is a large and a populated country that makes up a large base of Google consumers. So in recent years, Google’s widened support of world languages for its various products has been a blessing. It has specifically helped Indian people grow their use of and participation on the Internet.

    For one, Google Summer of Code helps students experiment with and build prototypes that enhance language-based software. Another way is through Google Translate, a web and app-based platform that provides machine translation from one language to another. It is predominantly maintained and serviced by volunteer contributions. Yet, there are more ways Google can support great inclusivity through the support of world languages; particularly people speaking South Asian-languages.

  • FreeDOS 1.2 RC1 Released
  • FreeDOS 1.2 RC1

    You may know that I am involved in many open source software projects. Aside from my usability work with GNOME, I am probably best known as the founder and project coordinator of the FreeDOS Project.

  • Minoca OS: A new open source operating system

    Today we’re thrilled to announce that Minoca OS has gone open source. We are releasing the entirety of the Minoca OS source code under the GNU GPLv3. We’re excited to build a community of users and developers around this new operating system, and we need help. You can check out the source at https://github.com/minoca/os. You can also check out our repository of third party source packages here. If you’re just looking to download the latest stable binaries of Minoca OS, head to the download page.

  • Minoca OS goes open source
  • What software documentation can learn from tabletop gaming

    That was it. Those were the (altered for the sake of this example) instructions. Three steps and one big shout that hey, don’t look now but you’re playing the game already, and you’re up and running.

    To be fair, there were a lot of nuances that those three steps did not in any way cover. Luckily, there were three more paragraphs that the author snuck in after the “You’re playing!” pronouncement, providing more details on the types of cards, what they mean, and so on.

    And there were lots of times during those first few games where we had to stop game play and scratch our heads, asking “Wait, we can’t play this card after that card can we? What happens now?” For an answer, we went back to the rules and looked in the little reference section on the back of the rule sheet, learning about the technicalities of the game as we went along.

    But you see, it tricked us; we didn’t feel like we were reading the instructions because we were actively playing the game. We weren’t reading instructions, as such; we were using the rules as reference. It was practically part of the game.

  • How Do We Encourage Technologists in the Public Interest?

    As I mentioned when the Recompiler interviewed me, my inspirations and role models in technology are technologists who serve the public interest. The person who introduced me to free and open source software, Seth Schoen, is a kind teacher and a rigorous thinker who deploys his software engineering expertise at the intersection of technology and activism. I was lucky enough to meet the right people early in my career so I see public interest technology as a desirable and viable career path AND something you can integrate into a career that doesn’t focus on nonprofit/government work — but not enough people know about it, and not enough institutions encourage it.

    How do we help encourage and employ more Seths, more Bruce Schneiers, more Eleanor Saittas, more Kelsey Gilmore-Innises? If you were to say “Sumana, that’s a pretty infosecurity-centric list there, what about people who are more about analytics to enable policy work, or the web developers at 18F, or –” then I would agree with you! This is a broad and deep field, and thus a broad and deep question.

  • Using Open Source to Roll Back Prices at Walmart

    What do you do when your e-commerce site adds at least a million new products every month, and sometimes more than a million in a single week? According to Jeremy King, who is senior vice president and CTO for Walmart Global eCommerce, one of the things you do is invest in open source, both as a user and as a developer. But how do you convince the suits in the front office to release code developed in house as open source?

    “The good part about WalmartLabs is that we sort of didn’t ask for permission,” he admitted last week before a crowd of over 2,000 at the All Things Open conference in Raleigh, North Carolina. He was being interviewed on stage by ATO’s master of ceremonies, community manager Jono Bacon, in a “fireside chat” during the opening day keynote sessions. “We sort of started off with that approach. As we got bigger, obviously you don’t open source a product that you’ve spent resources on for a couple of years without really talking to the enterprise, so it really was a baby step as you go in.”

  • LendingCalc.com’s PUFIN Open Source Blockchain Tech May Be Marketplace Lending Answer

    In the wake of recent company shakeups and growing pains in the marketplace lending industry, the need for better transparency and industry tools for all participants has become a critical concern. PUFIN, an online and open source project to create free and global loan identifiers using blockchain technology, aims to deliver order and uniformity in a secure environment to the marketplace.

    Recent entrants into the market are proposing systems that reserve the right to charge fees at any time. The idea of a free enticement that allows for charging fees later may be the basis for a slow or incomplete industry adoption of online loans.

    LendingCalc.com‘s Ben McMillan and Mike Mazier may have the open source answer: They have filed to patent a fee-free system to use blockchain technology to generate unique identifiers for loans in line with the US Treasury’s whitepaper “Opportunities and Challenges in Online Marketplace Lending.” The company is in the works to set up their system as an open source resource for the industry.

  • Web Browsers

    • Mozilla

      • 130 serious Firefox holes plugged this year

        Mozilla has shuttered more than 130 serious vulnerabilities reported by community hackers this year.

        The browser-backing outfit announced the statistics in a post covering its bug bounty program and broader information security efforts.

        More than 500 million users ran Firefox at the close of 2015. It’s since become the world’s second-most-used browser.

  • Oracle/Java/LibreOffice

    • Road to LibreOffice 5.3

      With the availability of the LibreOffice 5.3 Alpha, we have entered the road to LibreOffice 5.3, the next significant major release of the best free office suite ever developed. The software is in the early stage of the final development cycle, and as such should be installed only by expert community members skilled in quality assurance tasks, or involved in launch activities. Although in Alpha stage, LibreOffice 5.3 has an outstanding Coverity Scan score, as confirmed on October 20, with 0.01 defects per 1,000 lines of code (the image on the left is a screenshot of the Coverity Scan dashboard). LibreOffice 5.3 will be officially announced at the end of January 2017.

  • CMS

    • The Wix Mobile App, a WordPress Joint

      Anyone who knows me knows that I like to try new things — phones, gadgets, apps. Last week I downloaded the new Wix (closed, proprietary, non-open-sourced, non-GPL) mobile app. I’m always interested to see how others tackle the challenge of building and editing websites from a mobile device.

      I started playing around with the editor, and felt… déjà vu. It was familiar. Like I had used it before.

      Turns out I had. Because it’s WordPress.

    • WordPress and Wix Are Fighting About Open Source Software

      So WordPress and Wix are fighting one another – and I’m not talking about them competing for customers. Instead, the two website building heavyweights are having a brawl via the blogosphere.

    • Attackers use patched exploits to hit Joomla! sites
    • Joomla websites attacked en masse using recently patched exploits

      Attackers are aggressively attacking Joomla-based websites by exploiting two critical vulnerabilities patched last week.

      The flaws allow the creation of accounts with elevated privileges on websites built with the popular Joomla content management system, even if account registration is disabled. They were patched in Joomla 3.6.4, released Tuesday.

    • Georgia state government earns national recognition for web accessibility

      Georgia’s enterprise web platform runs on Drupal 7, which includes many accessibility features in its baseline code and structure. That makes it easier for any new site to build in accessibility from day one. This comes with the caveat that not all modules are accessible, and plenty can be coded and designed without accessibility in mind, meaning that just using Drupal does not make a site accessible to users with disabilities. That said, even in its original implementation with Drupal 7 in 2012, Georgia’s web publishing platform was built to meet federal accessibility standards (Section 508, for those of you interested in the details).

      From there, when the product team wanted to improve the platform’s underlying code to meet the more modern WCAG 2.0 AA accessibility guidelines, they were working from a flexible and scalable base.

  • Healthcare

    • How open source can change the face of healthcare

      The significant advances being made in technology over the past decade have introduced world changing solutions that are revolutionising how businesses operate.

      However, it is not only business which is reaping the benefits of technologies in the fields of cloud, big data, the IoT, artificial intelligence and others, areas such as

      healthcare are also being boosted.

      Numerous companies such as IBM, Google, Microsoft and more have all invested significantly in the area and have made great strides in placing their technologies in this field.

  • Pseudo-Open Source (Openwashing)

  • Funding

  • BSD

  • FSF/FSFE/GNU/SFLC

    • AMD’s HSAIL Front-End For GCC Might Finally Be Close For Merging

      There is finally an update on the proposed HSAIL front-end for GCC for supporting the BRIG binary form of the Heterogeneous System Architecture Intermediate Language.

      See that earlier article for more background information on the ongoing GCC HSA efforts that have been happening for a few years now. That HSAIL GCC front-end has been quiet since it was proposed back in May but now it looks like it may be close to going mainline.

  • Public Services/Government

    • France opens source code of three new simulators

      France is continuing to improve its fiscal transparency by opening the source code of three new algorithms, and has promoted use of this code through a hackaton called #CodeGouv.

      The three algorithms are used by the French administration to calculate:

      The cost of a car registration document which can change according to the geographical location or the type of vehicle;
      The legal bonus of an apprentice, which can vary according to the number of working hours;
      The penalty rate. The simulator assesses the interest the French administration should pay if payments are delayed.

      Read more

    • Slovakia: 40% ICT systems to use open source by 2020

      By 2020, 40% of public administration ICT systems in Slovakia should use open source software. The target for open source is part of the country’s ICT architecture, which was updated in September.

    • Nantes: ‘Surveys support switch to open source’

      When implementing free and open source desktop software, public administrations should gather feedback through user surveys, says Eric Ficheux, change management specialist at Nantes Métropole, France’s 6th largest city. “Good news comes only if you organise feedback”, he says, adding: “Survey data cannot be challenged by project opponents, and helps to defend against foul play.”

    • Ho Hum. Another City Switches To LibreOffice

      I knew that 15 years ago when OpenOffice.org came out with version 1.0. It’s still true today. Further, LibreOffice also works on GNU/Linux so another barrier to FLOSS (Free/Libre Open Source Software) has been broken.

  • Licensing/Legal

    • React’s license: necessary and open?

      React’s patent license (1) isn’t a bad idea, because the BSD license is not explicit about granting patent rights; and (2) probably meets the requirements of the Open Source Definition.

  • Openness/Sharing/Collaboration

    • What are the impacts of participatory budgeting in Europe?
    • Open Data

      • Slovakia to fully automate the publication of open data

        Slovakia will automate the publication of public sector information as open data as much as possible, and integrate this process in all government information processing systems. This is one of the main priorities in the National Concept of Public Information Services (Národná Koncepcia Informatizácie Verejnej Správy; NKIVS) that was adopted last month.

      • ODIC 2016: some case studies emerge in Open Contracting

        Start small, clearly demonstrate the impact, and adopt a standardised approach with civil society – these are among the lessons learnt arising from a session on Open Contracting, held as part of the Open Data International Conference (ODIC 2016). This event took place in Madrid at the beginning of October.

        Open Contracting is a way to make public procurement more transparent to citizens and a way to avoid corruption. But only 10% of countries are aligned on an Open Contracting basic standard, it was noted during the session. Data are published in open format. The Open Contracting Partnership has developed a data standard for Open Contracting, the goal of which is to “reflect the complete contracting cycle”, according to the website.

    • Open Hardware/Modding

      • Outdoor Gear Companies: It’s Time to Open-Source Your Technology

        Patagonia finally released the Yulex wetsuits this fall. Even more important, it also released the technology behind the rubber and the names of the factories that produced the suits. The company’s hope: to motivate other manufacturers to use fewer resource-intensive materials. “We knew from the beginning that we’re a very small player in the surf industry—there’s no way we’re going to disrupt that industry—but it was always our intention to invite other companies to use [the technology],” Hubbard says.

  • Programming/Development

    • Perl might be old school, but it continues to attract new users

      Earlier this year, ActiveState conducted a survey of users who had downloaded our distribution of Perl over the prior year and a half. We received 356 responses–99 commercial users and 257 individual users. I’ve been using Perl for a long time, and I expected that lengthy experience would be typical of the Perl community. Our survey results, however, tell a different story.

      Almost one-third of the respondents have three or fewer years of experience. Nearly half of all respondents reported using Perl for fewer than five years, a statistic that could be attributed to Perl’s outstanding, inclusive community. The powerful and pragmatic nature of Perl and its supportive community make it a great choice for a wide array of uses across a variety of industries.

      For a deeper dive, check out this video of my talk at YAPC North America this year.

Leftovers

  • The Great “Cultural Appropriation” Pumpkin: Psst, Halloween Belongs To The Irish

    Yale lecturer Erika Christakis and her husband, professor Nicholas Christakis, were uglied out of the university after she dared to offend the crypussies that pass for college students these days by sending out the mildest call to let people express themselves as they wish on Halloween.

    The thing about all these tiny little authoritarian screechers on campus — they should spend more time going to class and learning the stuff of Western culture that promotes logical thought. Because they don’t bother to do the slightest bit of, “Hmm, where does this argument I’m supporting lead?”

  • How the White House will hand over social media accounts to Clinton or Trump

    The White House just published an overview explaining its plans for a “digital transition” between the departing Obama administration and the incoming 45th president of the United States. It details how each White House social media account (and position-specific handles like @POTUS, @FLOTUS, and @VP) will be transferred to the victor of November 8th’s presidential election. Since Obama is the first commander in chief to have a presence on most of these apps, there’s not much in the way of precedent for figuring out how it’s all supposed to work. So the White House developed some of its own.

    For the big ones, the switchover will happen on inauguration day: January 20th. That’s when either Hillary Clinton or Donald Trump will assume the @POTUS Twitter account, for instance. The White House says that the account’s followers (currently over 11 million) will carry over to the next Oval Office occupant, but tweets will be zeroed out so that the 45th president can start fresh. President Obama’s @POTUS tweet history will be moved over to a new account, @POTUS44. That page is already live, though it’s currently protected.

  • Science

    • Finland to allow voters to cast votes online in all general elections

      “The Government intends to carefully look into the possibility of introducing electronic voting in general elections. The matter is associated with both advantages and disadvantages. It is good to examine online voting as a means to promote democracy ahead of the one-hundredth anniversary of Finland,” says Jari Lindström (PS), the Minister of Justice and Employment.

      The task force is expected to conclude its preparatory work by the end of next year.

      General elections include the municipal, parliamentary and presidential elections, the elections to the European Parliament, and the planned provincial elections. Voters in indicative referendums will also be allowed to cast their votes online, according to the Ministry of Justice.

  • Hardware

    • Steve Jobs would probably be rather upset with what Apple has become today

      This past week, Apple spent 82 minutes unveiling a new app, a computer screen made by another company, and three laptops with the same name. They weren’t exactly the major overhauls that many were hoping for, and the event comes not too long after the company released a new iPhone that looked much like the last two it put out, and its other notable innovations of late have been making its products in different sizes and unleashing a sea of dongles on the world.

      In an old interview that’s making the rounds online today, former CEO Steve Jobs explained, in his mind why companies like Xerox, a company that once had one of the most innovative research labs in the world, failed. He compared the product cycles and the corporate structures of strong, stable consumer brands, such as PepsiCo, which John Sculley, the CEO that once replaced him at Apple, previously ran.

  • Health/Nutrition

    • Water, jobs, justice: an urgent demand to rebuild America’s water infrastructure

      During this year’s election, both major party candidates have discussed the need for massive infrastructure investments to upgrade everything from our highways and bridges to our airports. Unfortunately, there has been little conversation highlighting our nation’s urgent need to upgrade our aging drinking water and wastewater systems.

      While our interstate highway system officially turned 60 this year, some of the infrastructure delivering water to our communities is over a century old, and that includes the pipes—many made of lead. So it’s no surprise that there’s an urgent national health crisis unfolding before our eyes. Far beyond Flint, Mich., every week more information is revealed showing that millions of homes, schools, restaurants and small and large businesses in almost every state throughout the country are serviced by lead pipes or old crumbling water lines. According to a recent study by the Government Accountability Office, economically distressed cities with declining populations continue to have urgent water infrastructure needs: there are more Flints waiting in the wings if we don’t act.

    • America’s Legal Pot Economy Is Forced Underground

      Punctuated by sharp intakes of breath, Max Simon repeated himself softly, trying to mask a deep frustration. “We … are … a … media … company. We produce media.”

      Like many startup founders, the 34-year-old has a spiel right down to the enunciation and cadence. He gave his speech nine times, to nine different bankers. Eight rejected him. But it wasn’t venture capital he was seeking. It was a checking account.

      Simon is the founder of Green Flower Media LLC, a production company in Ojai, Calif., that sells educational videos about marijuana, with topics ranging from medicinal use to cannabis industry investing. He likens the platform to a cannabis-centric Lynda.com, the online-course company owned by LinkedIn. Shortly after Green Flower sold its first batch of videos, Simon received an e-mail from Chase Bank. The company’s corporate account was being shut down.

    • Flint, and Michigan, Brace for More Charges in Water Inquiry

      As Flint continues to suffer from a water crisis, one question percolates here in Michigan’s capital: Who will be charged next?

      So far, nine low-level or midlevel government officials have been criminally charged as part of the state investigation into the water’s contamination, which has been tied to lead poisoning in children and the deaths of 12 people from Legionnaires’ disease.

      In recent weeks, however, there have been growing indications that investigators are focusing on bigger targets, and they seem to be looking more intently at the state’s failure to respond to the Legionnaires’ cases.

      “Twelve people died,” said Bill Schuette, Michigan’s attorney general, who is leading the investigation. “That is certainly a high priority for us.”

    • Judge: Flint water allegations ‘shock the conscience’

      The State of Michigan can be sued over allegations that the contamination of Flint’s drinking water damaged the health of residents and hurt the value of their properties, a Michigan Court of Claims judge has ruled.

      Judge Mark Boonstra, in an opinion issued Wednesday, said that if proven true, allegations brought against Gov. Rick Snyder and other defendants by Melissa Mays and other Flint residents, “shock the conscience.”

      Boonstra dismissed two counts against the state, but said two other counts may proceed to trial.

      The lawsuit can proceed on allegations the state violated the due process clause of the state constitution by failing to protect Flint residents’ “bodily integrity,” Boonstra ruled. The suit can also proceed on allegations that state actions were a substantial cause of decline in Flint property values and the state “abused its powers” by “continuing to supply each water user with corrosive and contaminated water,” he said in a 50-page opinion released Thursday.

    • ‘Fix rooms’ plan for Glasgow drug addicts set for green light

      A controversial plan to set up so-called “fix rooms” to allow drug addicts to inject safely under supervision in Glasgow is likely to get the go-ahead.

      Members of the health board, the city council and police are expected to agree the idea in principle.

      The move aims to address the problems caused by an estimated 500 or so users who inject on Glasgow’s streets.

    • Doubts About the Promised Bounty of Genetically Modified Crops

      The controversy over genetically modified crops has long focused on largely unsubstantiated fears that they are unsafe to eat.

      But an extensive examination by The New York Times indicates that the debate has missed a more basic problem — genetic modification in the United States and Canada has not accelerated increases in crop yields or led to an overall reduction in the use of chemical pesticides.

      The promise of genetic modification was twofold: By making crops immune to the effects of weedkillers and inherently resistant to many pests, they would grow so robustly that they would become indispensable to feeding the world’s growing population, while also requiring fewer applications of sprayed pesticides.

      Twenty years ago, Europe largely rejected genetic modification at the same time the United States and Canada were embracing it. Comparing results on the two continents, using independent data as well as academic and industry research, shows how the technology has fallen short of the promise.

    • The Candy Hierarchy for 2016: Halloween’s best and worst treats

      The results of our survey are in. This year’s list of the most loved and hated Halloween treats has a surprise in store!

    • Chan Issues Clarion Call For Increased WHO Funding

      World Health Organization Director General Margaret Chan today warned of serious funding shortfalls for the current biennium endangering the implementation of certain programmes. Areas most in need of financing include non-communicable diseases (such as cancer, diabetes and cardiovascular diseases), food security, and antimicrobial resistance. The high-profile Health Emergencies Programme is also underfunded and Chan proposed to ask countries to raise their assessed contributions at the next World Health Assembly.

    • Brazil, China, India, South Africa Put UN High-Level Panel On Medicines Access On TRIPS Council Agenda

      For next week’s World Trade Organization intellectual property committee meeting, the major developing economies have submitted a request to discuss the recently released report of the United Nations Secretary General’s High-Level Panel on Access to Medicines, according to Knowledge Ecology International (KEI). A key element of the UN report was to make it harder for countries deter or discourage other countries from trying to use patent flexibilities built into the WTO Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) – something the major developing economies have been discouraged from doing in the past.

    • Michigan Mother: Hillary Clinton Receiving Advance Debate Question ‘Should Be an Automatic Disqualification’

      A Michigan mother is furious that now-DNC Chairwoman Donna Brazile sent Hillary Clinton advance notice of her question at a Democratic presidential debate in Flint, Michigan this March.

      According to the latest Wikileaks release of John Podesta’s emails, Brazile tipped off Clinton to an incoming question from an audience member at the debate hosted by CNN — where Brazile was then a paid contributor.

      “One of the questions directed to HRC tomorrow is from a woman with a rash,” Brazile wrote in the email’s subject line. “Her family has lead poison and she will ask what, if anything, will Hillary do as president to help the ppl of Flint.”

      LeeAnne Walters, the woman who asked that question, said on her Facebook page Monday that she found the revelation “appalling.”

  • Security

    • DDoS of SN Underway [Updated]

      Right, so there’s currently a DDoS of our site specifically happening. Part of me is mildly annoyed, part of me is proud that we’re worth DDoS-ing now. Since it’s only slowing us down a bit and not actually shutting us down, I’m half tempted to just let them run their botnet time out. I suppose we should tweak the firewall a bit though. Sigh, I hate working on weekends.

    • AtomBomb: The New Zero-Day Windows Exploit Microsoft Can’t Fix?

      There’s a new zero-day Microsoft Windows exploit in the wild by the name of AtomBomb, and Microsoft may not be able to fix it.

    • New code injection method affects all Windows versions [iophk: “watch the ‘news’ play this one down or ignore it; full product recall is needed at this point”]

      Researchers at cyber-security firm enSilo have discovered a method of code injection in all versions of Windows that cannot be eliminated as it is part of the operating system design.

      The design flaw allows for code injection and is dubbed AtomBomb as it makes use of the system’s atom tables.

      As Microsoft defines it, “An atom table is a system-defined table that stores strings and corresponding identifiers. An application places a string in an atom table and receives a 16-bit integer, called an atom, that can be used to access the string. A string that has been placed in an atom table is called an atom name.”

      In a blog post describing the method of attack, enSilo’s Tal Liberman wrote: “Our research team has uncovered a new way to leverage mechanisms of the underlying Windows operating system in order to inject malicious code. Threat actors can use this technique, which exists by design of the operating system, to bypass current security solutions that attempt to prevent infection.”

    • British parliament members urge Obama to halt hacking suspect’s US extradition

      This week, culture minister Matt Hancock and more than 100 fellow MPs (Members of Parliament) have signed a letter calling on president Barack Obama to block Lauri Love’s extradition to the US to face trial over the alleged hacking of the US missile defence agency, the FBI, and America’s central bank.

      Love—an Asperger’s syndrome sufferer from Stradishall, Suffolk—was told in September at a Westminster Magistrates’ Court hearing that he was fit to be extradited to the US to face trial in that country. The 31-year-old faces up to 99 years in prison in the US if convicted. According to his lawyers, Love has said he fears for his life.

    • Security advisories for Monday
    • Tug of war between SELinux and Chrome Sandbox, who’s right?

      Over the years, people have wanted to use SELinux to confine the web browser. The most common vulnerabilty for a desktop user is attacks caused by bugs in the browser. A user goes to a questionable web site, and the web site has code that triggers a bug in the browser that takes over your machine. Even if the browser has no blogs, you have to worry about helper plugins like flash-plugin, having vulnerabilities.

    • Trick or Treat! Google issues warning of critical Windows vulnerability in wild

      Recently, Google’s Threat Analysis Group discovered a set of zero-day vulnerabilities in Adobe Flash and the Microsoft Windows kernel that were already being actively used by malware attacks against the Chrome browser. Google alerted both Adobe and Microsoft of the discovery on October 21, and Adobe issued a critical fix to patch its vulnerability last Friday. But Microsoft has yet to patch a critical bug in the Windows kernel that allows these attacks to work—which prompted Google to publicly announce the vulnerabilities today.

      “After 7 days, per our published policy for actively exploited critical vulnerabilities, we are today disclosing the existence of a remaining critical vulnerability in Windows for which no advisory or fix has yet been released,” wrote Neel Mehta and Billy Leonard of Google’s Threat Analysis Group.”This vulnerability is particularly serious because we know it is being actively exploited.”

      The bug being exploited could allow an attacker to escape from Windows’ security sandbox. The sandbox, which normally allows only user-level applications to execute, lets programs execute without needing administrator access while isolating what it can access on the local system through a set of policies.

      But by using a specific type of call to a legacy support Windows system library generally used for the graphics subsystem—win32k.sys—malicious code can escalate its privileges and execute outside of the sandbox, allowing it to execute code with full access to the Windows environment. Win32k.sys has been a problem before: Microsoft issued a warning back in June about a similar privilege escalation problem that had not yet been exploited, and another arrived in August.

    • DDoS defenses emerging from Homeland Security

      Government, academic, and private-sector officials are collaborating on new ways to prevent and mitigate distributed denial-of-service (DDoS) attacks, based on research years in the making but kicked into high gear by the massive takedown this month of domain name system provider Dyn.

    • US DMCA rules updated to give security experts legal backing to research

      The US government has updated and published a new list of exemptions to the Digital Millennium Copyright Act, a move perhaps long-overdue which will protect cybersecurity professionals from prosecution when reverse-engineering products for research purposes.

      On October 28, the US Copyright Office and the Librarian of Congress published the updated rules on the federal register.

      The DMCA regulations now include exceptions relating to security research and vehicle repair relevant to today’s cybersecurity field. For the next two years, researchers can circumvent digital access controls, reverse engineer, access, copy, and manipulate digital content which is protected by copyright without fear of prosecution — within reason.

    • Stop being the monkey’s paw

      This story got me thinking about security, how we ask questions and how we answer questions. What if we think about this in the context of application security specifically for this example. If someone was to ask the security the question “does this code have a buffer overflow in it?” The person I asked for help is going to look for buffer overflows and they may or may not notice that it has a SQL injection problem. Or maybe it has an integer overflow or some other problem. The point is that’s not what they were looking for so we didn’t ask the right question. You can even bring this little farther and occasionally someone might ask the question “is my system secure” the answer is definitively no. You don’t even have to look at it to answer that question and so they don’t even know what to ask in reality. They are asking the monkey paw to bring them their money, it’s going to do it, but they’re not going to like the consequences.

    • Tyfone looks to open-source to solve IoT security issues

      It came as no surprise to Tyfone CEO Siva Narendra when tens of millions of Internet connected devices were able to bring down the Web during a coordinated distributed denial of service attack on Oct. 21.

      Narendra’s Portland-based company Tyfone has been working on digital security platforms to safeguard identity and transactions of people and things for years.

      Narendra says mobile devices in conjunction with the cloud have brought new levels of productivity to our lives. Internet of Things devices (the common name given to these connected items) are poised to bring even greater levels of productivity and cost-savings to businesses, and safety and convenience to our everyday lives.

    • Google just disclosed a major Windows bug — and Microsoft isn’t happy

      Today, Google’s Threat Analysis group disclosed a critical vulnerability in Windows in a public post on the company’s security blog. The bug itself is very specific — allowing attackers to escape from security sandboxes through a flaw in the win32k system — but it’s serious enough to be categorized as critical, and according to Google, it’s being actively exploited. As a result, Google went public just 10 days after reporting the bug to Microsoft, before a patch could be coded and deployed. The result is that, while Google has already deployed a fix to protect Chrome users, Windows itself is still vulnerable — and now, everybody knows it.

      Google’s disclosure provides only a general description of the bug, giving users enough information to recognize a possible attack without making it too easy for criminals to replicate. Exploiting the bug also depends on a separate exploit in Adobe Flash, for which the company has also released a patch. Still, simply knowing that the bug exists will likely spur a lot of criminals to look for viable ways to exploit it against computers that have yet to update Flash.

    • AtomBombing: A Code Injection that Bypasses Current Security Solutions

      Our research team has uncovered new way to leverage mechanisms of the underlying Windows operating system in order to inject malicious code. Threat actors can use this technique, which exists by design of the operating system, to bypass current security solutions that attempt to prevent infection. We named this technique AtomBombing based on the name of the underlying mechanism that this technique exploits.

      AtomBombing affects all Windows version. In particular, we tested this against Windows 10.

    • Disclosing vulnerabilities to protect users

      On Friday, October 21st, we reported 0-day vulnerabilities — previously publicly-unknown vulnerabilities — to Adobe and Microsoft. Adobe updated Flash on October 26th to address CVE-2016-7855; this update is available via Adobe’s updater and Chrome auto-update.

      After 7 days, per our published policy for actively exploited critical vulnerabilities, we are today disclosing the existence of a remaining critical vulnerability in Windows for which no advisory or fix has yet been released. This vulnerability is particularly serious because we know it is being actively exploited.

      The Windows vulnerability is a local privilege escalation in the Windows kernel that can be used as a security sandbox escape. It can be triggered via the win32k.sys system call

    • The next president will face a cybercrisis within 100 days, predicts report

      The next president will face a cybercrisis in the first 100 days of their presidency, research firm Forrester predicts in a new report.

      The crisis could come as a result of hostile actions from another country or internal conflict over privacy and security legislation, said Forrester analyst Amy DeMartine, lead author of the firm’s top cybersecurity risks for 2017 report, due to be made public Tuesday.

      History grades a president’s first 100 days as the mark of how their four-year term will unfold, so those early days are particularly precarious, said DeMartine. The new commander in chief will face pressure from foreign entities looking to embarrass them early on, just as U.S. government agencies jockey for position within the new administration, she said.

    • Hackforums Shutters Booter Service Bazaar

      Perhaps the most bustling marketplace on the Internet where people can compare and purchase so-called “booter” and “stresser” subscriptions — attack-for-hire services designed to knock Web sites offline — announced last week that it has permanently banned the sale and advertising of these services.

      On Friday, Oct. 28, Jesse LaBrocca — the administrator of the popular English-language hacking forum Hackforums[dot]net — said he was shutting down the “server stress testing” (SST) section of the forum. The move comes amid heightened public scrutiny of the SST industry, which has been linked to several unusually powerful recent attacks and is responsible for the vast majority of denial-of-service (DOS) attacks on the Internet today.

  • Defence/Aggression

    • WikiLeaks Reveals Team Hillary’s Libya Spin: It Would Be Syria Without Clinton’s War

      In the lead-up to Hillary Clinton’s marathon testimony before Congress on Benghazi in October 2015, her presidential campaign prepared to make some eye-popping claims—including that Libya would have turned into Syria without U.S. intervention.

      That’s according to an internal talking-point memo released in Tuesday’s dump of WikiLeaks emails. WikiLeaks says those emails were hacked from the inbox of Clinton campaign Chairman John Podesta. The Clinton campaign is not commenting on whether or not the emails are doctored, and blames the Russian government for the hack.

    • Media Roll Out Welcome Mat for ‘Humanitarian’ War in Syria

      As she marches toward the US presidency, Hillary Clinton has stepped up her promotion of the idea that a no-fly zone in Syria could “save lives” and “hasten the end of the conflict” that has devastated that country since 2011.

      It has now been revealed, of course, that Clinton hasn’t always expressed the same optimism about the no-fly zone in private. The Intercept (10/10/16) reported on Clinton’s recently leaked remarks in a closed-door speech to Goldman Sachs in 2013…

    • Shahid Buttar and Selling Empire, War and Capitalism with Peter and Mickey

      In the first half of the program, Shahid Buttar discusses the chapter he wrote for Censored 2017, “Ike’s Distopian Dream,” where he examines the many ways that President Eisenhower’s warning about the military-industrial complex has proven correct.For the second half of the program, Mickey and Peter survey some of the other chapters of Censored 2017, particularly Peter’s chapter, “Selling Empire, War and Capitalism,” a look at the advertising / public relations industry, and how its influence extends far beyond peddling consumer products.

    • Whistleblower exposes how NATO’s leading ally is arming and funding ISIS

      A former senior counter-terrorism official in Turkey has blown the whistle on President Recep Tayyip Erdogan’s deliberate sponsorship of the Islamic State (ISIS) as a geopolitical tool to expand Turkey’s regional influence and sideline his political opponents at home.

      Ahmet Sait Yayla was Chief of the Counter-Terrorism and Operations Division of Turkish National Police between 2010 and 2012, before becoming Chief of the Public Order and Crime Prevention Division until 2014. Previously, he had worked in the Counter-Terrorism and Operations Division as a mid-level manager for his entire 20-year police tenure, before becoming Chief of Police in Ankara and Sanliurfa.

      In interviews with INSURGE intelligence, Yayla exclusively revealed that he had personally witnessed evidence of high-level Turkish state sponsorship of ISIS during his police career, which eventually led him to resign. He decided to become a whistleblower after Erdogan’s authoritarian crackdown following the failed military coup in July. This is the first time that the former counter-terrorism chief has spoken on the record to reveal what he knows about Turkish government aid to Islamist terror groups.

    • Inside Palantir’s War With the U.S. Army

      Palantir is the Palo Alto, California, data analytics company co-founded and backed by billionaire Peter Thiel. It had won seed funding and praise from the Central Intelligence Agency a few years earlier and had become a darling among the Federal Bureau of Investigation and a few other government customers. Its employees were at the Pentagon to show off the company’s ability to compile disparate data streams and display the information graphically for non-technical consumers; Palantir hoped to win a big contract.

      But the conversation went poorly. The slacks and dress shirts with a few buttons undone that Palantir executives wore may have been a step up for sunny California where hoodies are the norm but were a sign of disrespect at the Pentagon, according to a person familiar with the meeting. Senior officials, including U.S. Assistant Secretary of the Army for Acquisition, Logistics and Technology Dean Popps, were not impressed, this person said.

      They told Palantir: “Don’t come to the E-ring without a tie unless your name is Gates or Buffet,” said the person, referring to the portion of the Pentagon occupied by senior officials. “They couldn’t get over the tie thing. They didn’t care about the technology.”

    • German Magazine Uses Daesh Propaganda Video to Show All is Well in Mosul

      In an almost four-minute video, political editor of Spiegel Online Christoph Sydow tried to defend the editorial policy of his magazine regarding the developments in Aleppo and Mosul. However, the shots demonstrated in his video turned out to be the propaganda materials of Daesh terrorists.

      The video was supposed to be a response to critical letters of Spiegel Online readers and their comments on social networks. Many of them accused the magazine of spreading propaganda and presenting the situation in the Middle East in a biased manner.

    • CIA Releases Controversial Bay of Pigs History

      The CIA today released the long-contested Volume V of its official history of the Bay of Pigs invasion, which it had successfully concealed until now by claiming that it was a “draft” and could be withheld from the public under the FOIA’s “deliberative process” privilege. The National Security Archive fought the agency for years in court to release the historically significant volume, only to have the U.S. Court of Appeals in 2014 uphold the CIA’s overly-broad interpretation of the “deliberative process” privilege. Special credit for today’s release goes to the champions of the 2016 FOIA amendments, which set a 25-year sunset for the exemption: Senators John Cornyn, Patrick Leahy, and Chuck Grassley, and Representatives Jason Chaffetz, Elijah Cummings, and Darrell Issa.

      Chief CIA Historian David Robarge states in the cover letter announcing the document’s release that the agency is “releasing this draft volume today because recent 2016 changes in the Freedom of Information Act (FOIA) requires us to release some drafts that are responsive to FOIA requests if they are more than 25 years old.” This improvement – codified by the FOIA Improvement Act of 2016 – came directly from the National Security Archive’s years of litigation.

    • Still fighting the last war: Syria and the Western peace movement

      The anti-war movement is struggling to find its place in a multipolar world in which stopping the war requires new thinking

      When I was five years old, a very small Vietnamese man came to my bedside to say goodnight. He was the Vietnamese ambassador, and he had a very kindly, wrinkled smile, and, as I later discovered, both he and his wife were veterans of the very long war in Vietnam against foreign occupiers. He himself had crawled under barbed wire fences to set explosives under French war planes during the early 1950s. His wife, also diminutive, had been the 16-year-old leader of an anti-aircraft unit that helped bring down enemy planes during the conflict, which back in 1973 was still ongoing.

    • Sweden declares WWII hero Raoul Wallenberg dead, 71 years after he disappeared in Hungary

      Sweden declares WWII hero Raoul Wallenberg dead, 71 years after he disappeared in Hungary.

  • Transparency/Investigative Reporting

  • Environment/Energy/Wildlife/Nature

    • Utilities In Florida Are Using A Fake Consumer Group To Hamstring Solar Competition

      Earlier this year, we noted how traditional utilities were playing extremely dirty in Florida to try and derail efforts to ramp up solar competition and adoption in the state most likely to benefit from it. After all, the vision of a future where competition is rampant, customers pay less money, and solar users actually get paid for driving power back to the grid gives most of these executives heartburn. As a result, utilities have gotten creative in the state, launching fake solar advocacy groups that actually function to pollute public discourse and derail any amendments intended to help solar grab a larger foothold in the state.

    • Fracking Linked to Cancer-Causing Chemicals, New YSPH Study Finds

      An expansive new analysis by Yale School of Public Health researchers confirms that numerous carcinogens involved in the controversial practice of hydraulic fracturing have the potential to contaminate air and water in nearby communities.

      Fracking is now common in the United States, currently occurring in 30 states, and with millions of people living within one mile of a fracking site. The study suggests that the presence of carcinogens involved in or released by hydraulic fracturing operations has the potential to increase the risk of childhood leukemia. The presence of chemicals alone does not confirm exposure or risk of exposure to carcinogens and future studies are needed to evaluate cancer risk.

    • Stein Campaign Condemns ‘Violent Repression of Peaceful Protests Against DAPL’

      The conflict surrounding the construction of the Dakota Access Pipeline escalated dramatically Thursday, October 27. Water protectors at Treaty Camp, a new frontline in the path of the pipeline along Highway 1806, were forced off the land in a dramatic and often violent manner by police. The large police action included armored, military vehicles, pepper spray, high-velocity bean bags and tear gas. Shortly after the disturbing confrontation Jill Stein, Green Party nominee for the Presidential Election, and running mate Ajamu Baraka released a statement condemning the actions being used in North Dakota:

      “The Stein/Baraka campaign is horrified and outraged at the militarized repression of water protectors at the Standing Rock reservation in North Dakota. Police and private security forces have engaged in violent actions against peaceful earth defenders who have come to protect the land and water from the construction of the Dakota Access Pipeline.

    • Two more Honduran land rights activists killed in ongoing violence
    • NASA Scientists Suggest We’ve Been Underestimating Sea Level Rise

      About 71 percent of the Earth is covered by water, so measuring sea level changes around the world is no small feat. Up until now, scientists believed they knew how much global sea level had risen during the 20th century. This number has hovered around 0.6 inches per decade since 1900, according to the National Oceanic and Atmospheric Administration, and has been partly driven by warming ocean temperatures.

      But a new study, published this month to Geophysical Research Letters, found evidence to suggest that historical sea level records have been off—way off in some areas—by an underestimation of 5 to 28 percent. Global sea level, the paper concluded, rose no less than 5.5 inches over the last century, and likely saw an increase of 6.7 inches.

      The reason for this discrepancy was uncovered by earth scientists at NASA’s Jet Propulsion Laboratory and the University of Hawai’i at Mānoa. By comparing newer climate models with older sea level measurements, the team discovered that readings from coastal tide gauges may not have been as indicative as we thought. These gauges, located at more than a dozen sites across the Northern Hemisphere, have been a primary data source for estimating sea level changes during the last several decades.

  • Finance

    • How the British Brexit Economy Works

      1) A containerful of shoddy training shoes are produced in China, shipped to UK, sorted by lowly paid British zero hours workers and put on shelves of High Street sports shop.
      2) While this is happening, sterling plunges 25%.
      3) Coachload of Chinese tourists visit sports shop attracted by collapsed pound sterling. They exclaim “Wow Western trainers! And so cheap”. They buy them to take back to China as gifts for family members they don’t like that much.
      4) Declare a Brexit sales boom!

    • Theresa May’s ‘just managing’ families set to be worse off

      Low-earning families that Theresa May has promised to help will be thousands of pounds a year worse off by 2020 because of rising inflation, lower wage growth and Tory social security cuts, according to new analysis of their post-Brexit economic prospects.

      Those who the prime minister describes as “just managing” – and who are her key priority, she says – are in line for substantial falls in real incomes unless the chancellor, Philip Hammond, steps in to help them in his autumn statement on 23 November.

      Pressure is growing on Hammond from senior Tories to reverse the decisions to slash benefits, which were announced last year by his predecessor George Osborne, in order to assist those who May said on entering Downing Street were “working around the clock” but still struggling to get by.

    • How Minnesota’s governor performed an economic miracle by raising tax on the rich and increasing minimum wage

      By every measure, Minnesota governor Mark Dayton’s five year run as governor has been a stellar success: while Tim Pawlenty, his tax-slashing, “fiscally-conservative” Republican predecessor presided over a $6.2B deficit and a 7% unemployment rate (the mere 6,200 jobs added under Pawlenty’s 7-year run barely registered), Dayton added 172,000 new jobs to the Minnesota economy, brought Minnesota down to the fifth-lowest unemployment rate in the country, and brought the average Minnesotan income up to $8,000 more than the median US worker, while posting a $1B budget surplus.

      How did Dayton do it? He raised the state income tax on individuals earning more than $150K, from 7.85% to 9.85%; he raised Minnesota’s minimum wage and guaranteed equal pay for women.

    • CETA Signed Off As Wallonia Folds Under Pressure

      Democracy and civil rights took a crushing blow today. Shortly after news surfaced that Wallonia folded under the pressure, the Comprehensive Economic and Trade Agreement (CETA) has been signed.

      One of the many secret trade deals floating around is known as CETA. While proponents say these trade agreements are simply about trade, the details suggest that such agreements are much more about pushing laws than actual trade.

      Last year, we dug into some of these details and found a number of provisions that adversely affects digital rights. This includes censorship through site blocking, account termination through a three strikes law, unlimited damages for copyright infringement, and provisions that allow border patrols to seize your cell phone at the border.

      Other concerns raised revolve around ISDS (Inter-State Dispute Settlement) that sets up an international tribunal for major multi-national corporations. The purpose is to allow corporations to sue governments if laws are passed that get in the way of profits and future potential profits. Examples raised in the past revolve around warning labels on cigarette packages, regulations on price for pharmaceuticals, and rulings against oil extraction and pipelines.

    • Swiss rail stations will sell bitcoins at ticket machines

      Switzerland is stepping up its bitcoin fascination in a big way. Railway operator SBB (with the help of SweePay) is launching a 2-year trial for a service that lets you exchange Swiss francs for bitcoin at any of the company’s ticket machines in the country. Scan a QR code with your phone and you can get between 20 to 500 francs ($20 to $505) of digital currency at any time. If you want to go shopping without using cards or physical cash, you can do it right after you leave the train station.

      There are some big catches involved. You need to have a Swiss phone number to get bitcoin, so you’re not completely anonymous… and of course, you’re out of luck if you’re not a resident. You also can’t buy tickets with bitcoin at the machines, so don’t think your bitcoin mining operation will pay for your next trip to Zurich.

    • No, CETA is NOT approved yet
    • Canada and E.U. Sign Trade Deal, Bucking Resistance to Globalization

      The European Union and Canada signed a far-reaching trade agreement on Sunday that commits them to opening their markets to greater competition, after overcoming a last-minute political obstacle that reflected the growing skepticism toward globalization in much of the developed world.

    • Icelandic women walk off the job 14% early to protest 14% pay-gap

      On October 25, thousands of Icelandic women went home at 2:38PM, after 86% of their work-days had passed, to protest the fact that they only earn 86% of their male counterparts’ wages.

      They turned out for a mass demonstration that echoed the 1975 protests over pay equity, which saw over 90% of the country’s women take to the street.

    • EU-Canada trade deal signed, but our fates (and ISDS) not yet sealed

      On Sunday, the president of the European Commission Jean-Claude Juncker, president of the European Council Donald Tusk, prime minister of Slovakia Robert Fico, and Canadian prime minister Justin Trudeau signed the Comprehensive Economic and Trade Agreement (CETA) between the EU and Canada. It followed more than a week of frenzied negotiations after Belgian regions refused to give permission to the central government of Belgium to proceed with the deal.

    • Don’t celebrate Justin Trudeau signing the Ceta deal with the EU – like TTIP, it is a ticking time bomb

      Don’t be fooled by the triumphant rhetoric emanating from Brussels today – the controversial EU-Canada trade deal known as CETA might have returned from the dead in time for Halloween, but it’s very much a zombie agreement. While CETA will now be approved by the European Council and head towards the Parliament, its future looks bleak.

      And it gets worse for Brussels. Because Belgium’s regional parliaments have, in the process of hobbling CETA, driven a stake into the heart of European trade policy. No wonder Financial Times columnist Wolfgang Munchau hailed the so-called ‘breakthrough’ as “a huge victory for Belgium’s Ceta opponents”.

      CETA (the Comprehensive Economic & Trade Agreement) is the sister deal of the better known TTIP trade deal between the US and EU. Just like its sibling, it is essentially not about reducing tariffs, but deregulation, liberalisation, and the handing of further powers over law-making to big business. Despite some fancy footwork by the EU to reform the hated “corporate court” system, which gives foreign investors their own special legal process to sue governments, that system is very much still in place in CETA.

  • AstroTurf/Lobbying/Politics

    • Podesta paid $7,000 a month by top donor

      Hillary Clinton’s campaign chairman, John Podesta, last year signed a $7,000-a-month contract with the foundation of a major Clinton donor who made a fortune selling a type of mortgage that some critics say contributed to the housing collapse, hacked emails show.

      In February of last year, as Podesta was working to lay the groundwork for Clinton’s soon-to-launch campaign for the Democratic presidential nomination, he signed the contract with the Sandler Foundation, which was started by Herb Sandler and his late wife Marion Sandler.

    • Trump Supporter Voted Twice in Iowa Because “Polls Are Rigged”

      Donald Trump has been warning supporters left and right about the potential devastating consequences of voter fraud. But the first arrest for voter fraud in this election season is actually a staunch Trump supporter. Terri Rote, 55, was arrested on first-degree l misconduct charges after she cast two ballots in the election. She was released on a $5,000 bond.

      So why did Rote, a registered Republican, decide to cast two ballots? She was apparently afraid that her first ballot would be counted as a vote for Hillary Clinton. “I wasn’t planning on doing it twice, it was spur of the moment,” Rote told Iowa Public Radio. “The polls are rigged.”

    • Donald Trump rolls out endorsements from people he pays

      At a campaign event in Miami on Tuesday that was more in keeping with the norms of politics in North Korea, Donald Trump brought reporters to one of his golf courses and invited 10 of his employees on stage to praise him.

      [...]

      Siegel also boasted about helping to secure Florida for George W. Bush in 2000, by pressing thousands of employees to vote for the Republican candidate. In an interview with the same publication, the developer explained that he gave employees not-so-subtle hints about what he wanted them to do by putting negative articles about Al Gore in envelopes along with their paychecks.

      As The Atlantic explained in 2012, after Siegel’s anti-Obama memo was leaked to Gawker, employers cannot explicitly pay workers to vote a certain way, but, in most states, they are permitted to make their preferences known before election day.

      Unlike Florida, California does have a law stating that “no employer shall coerce or influence or attempt to coerce or influence his employees through or by means of threat of discharge or loss of employment to adopt or follow or refrain from adopting or following any particular course or line of political action or political activity.”

    • Five takeaways from the latest WikiLeaks releases

      Government ethics watchdogs have long warned that the Clintons’ nonprofit would present serious conflict-of-interest concerns should the former secretary of State obtain the oval office.

      Republicans — led by Donald Trump — have accused the Clintons of using the foundation to peddle influence and line their own pockets.

      The details in Band’s memo gave new ammunition to critics who have pressed for the foundation to be shuttered.

      In it, Band describes how Bill Clinton’s personal wealth skyrocketed with the help of the same consultants raising money for the foundation, and the same donors who poured millions into the charity.

      “I think it’s going to be a continuing problem unless they close the thing down after she’s elected,” said Democratic strategist Brad Bannon.

      Those calls were echoed by the press.

      “Let me go to bottom line: There is no way under any circumstance the Clinton Foundation should be operating if she becomes president,” Chuck Todd, moderator of NBC’s “Meet the Press,” told WGN Radio in Chicago on Thursday. “I just don’t see how they can keep that going.”

    • Leaked Email Reveals Google Chairman Wanted To Be Clinton Campaign’s ‘Head Outside Advisor’

      WikiLeaks has continued to reveal Schmidt’s cozy relationship with the Clinton campaign.

    • WikiLeaks: Podesta Continued Ties to Russian Firm After He Said He Divested

      More hacked emails released Sunday by WikiLeaks appear to show Hillary Clinton campaign chairman John Podesta’s apparent continued connection to Joule Unlimited Technologies, despite his claims that he divested from the Kremlin-financed energy company, The Daily Caller reported.

      Podesta has said he transferred his 75,000 shares from Joule to a holding company named Leonidio Holdings. But included in the released emails is information that Podesta received a K1 income tax form indicating that he was a partner sharing income with Leonidio Holdings, while another form was made out to Podesta’s daughter Megan Rouse, who is a financial planner.

      A June 5, 2015 email from Rouse to John, Mae and Gabe Podesta shows the extent to which other family members were involved: “Mae and Gabe, Please see attached K1 for Leonidio. You can use this to complete your 2014 tax return. We will each report 1/3 share of what’s on the form. Mom and Pa, Please see attached K1 showing the distribution to Leonidio.”

    • Tax form Indicates Podesta Put Kremlin-Tainted Shares In Daughter’s Company

      Clinton campaign chairman John Podesta received a K1 income tax form indicating that he was a partner sharing income with Leonidio Holdings, according to emails released Sunday by WikiLeaks. Another form was made out to Podesta’s daughter, Megan Rouse, his partner in Leonidio Holdings.

      Podesta has always maintained that he transferred his 75,000 shares from Joule Unlimited Technologies, a Kremlin-financed energy company, to an “anonymous” holding company named Leonidio Holdings. Not only does Leonidio share an address with Podesta’s daughter, Rouse, but they share a tax return.

      The other beneficiaries are all in the family too.

    • Obama told us he’s honorable — but he’s just another liar

      Now we know Obama was lying. His own aides said so, in e-mails uncovered by WikiLeaks and made public this week.

    • WikiLeaks: Trump Rally Agitator and Clinton Campaign Manager Are ‘Close’

      Robert Creamer, the operative behind sending provocateurs to Donald Trump rallies, was close to Robby Mook, Hillary Clinton’s campaign manager, according to new emails released by WikiLeaks.

      Creamer, who allegedly spearheaded the dirty tricks for the Democrats, wasn’t just consulting for the Democratic National Committee, according to videos made by Project Veritas. He was sending people to provoke Trump at events.

    • Fmr U.S. Atty: Comey’s Hand Forced by FBI ‘Seething’ Anger at Botched Hillary Email Investigation

      In an exclusive interview with Breitbart News, the former U.S. Attorney for the District of Columbia Joseph DiGenova gave a stark assessment of what led to FBI Director James Comey’s recent decision to reopen the investigation into Hillary Clinton’s use of a private email server, after an investigation into Anthony Weiner’s sexting scandal led to the discovery of thousands of emails on the computer of Weiner’s estranged wife, top Hillary Clinton aide, Huma Abedin.

    • Boring or Annoying Things We Have to Know

      I have always glazed over at any mention of Hillary Clinton’s emails. The USA is not my country, and it seemed like a rather boring argument about classifications and document security. I also had a natural resistance to anything that appeared to promote the interests of Donald Trump. I now realise that is how a complicit media was deliberately presenting it, and my lack of interest was the desired effect. They are still presenting the issues in a manner which I hope I will be able to prove to you is entirely tendentious. So this weekend I request you to grit your teeth, set aside your disinterest and read through this article. Please.

      Those Hillary server emails are largely a separate thing to those which WikiLeaks has been releasing. What the WikiLeaks release of the Democratic National Committee and Hillary campaign chair Podesta emails has proved beyond any reasonable doubt, is the extent of Hillary’s corruption. Both in terms of the fixing of the primary election against Bernie Sanders by the people who were supposed to be organising it, and the vast sums of money the Clinton family were receiving personally through Clinton Foundation and consultancy activity linked to State Department access, decisions and activity.

      Before Clinton handed over her private email server to the FBI investigation into her handling of classified material, she scrubbed over 30,000 emails and had drives physically treated to ensure permanent destruction. It is obviously very likely that many of those emails referred to the kind of nefarious activity we are now seeing from the DNC and Podesta leaks.

      It is also of course a fact that those 30,000 emails all had recipients, as well as Hillary as a sender. We can be sure that a major effort will have been undertaken to make sure recipients deleted them too. But from time to time some are sure to turn up. That is what has just happened and prompted yesterday’s announcement of a renewed investigation. In the course of an unrelated investigation into alleged paedophile grooming, the FBI has come across some of Hillary’s deleted emails on the device of a close political aide.

    • The Podesta Emails Revelations: A Collection

      —In an email containing information from intelligence sources, Clinton detailed a strategy for defeating the Islamic State and noted Qatar and Saudi Arabia are funding ISIS operations. (Dan Wright, Shadowproof)

      —Hillary Clinton’s letter to mega-donor Haim Saban against the boycott, divestment, and sanctions (BDS) movement against Israel was leaked to press to attract pro-Israel donors. (Rania Khalek, Electronic Intifada)

      —During one of her paid speeches for Goldman Sachs, Clinton admitted a no fly zone in Syria would mean the United States and NATO would “kill a lot of Syrians.” (Zaid Jilani, The Intercept)

      —Representatives of Qatar wanted to meet for “five minutes” with Bill Clinton to present a $1 million check to him for his birthday (New York Times)

    • Sometimes You Need to Dig a Little to Unearth the Point of an NYT Story

      As it turns out, most other news outlets did not share the Times‘ sense of newsworthiness.

    • ‘Will Every Eligible Voter Be Able to Cast a Ballot?’

      It’s hard to pick the most ominous or disturbing thing Donald Trump has said, but his call for supporters to “go and watch” polling places in “certain areas” because “you know what I’m talking about” is up there. But Trump’s claim that the election is rigged—unless he wins, in which case it isn’t—didn’t spring full-blown from his head. Republicans have claimed voter fraud benefiting their opponents for a long time. And for a long time, corporate media have set those claims alongside concerns about voter suppression, of African-Americans and immigrants in particular, as though they were equally grounded, or just analogous partisan gripes.

    • FBI discovered Clinton-related emails weeks ago

      The FBI stumbled upon a trove of emails from one of Hillary Clinton’s top aides weeks ago, law enforcement officials told CNN Sunday.
      But FBI Director James Comey didn’t disclose the discovery until Friday, raising questions about why the information was kept under wraps and then released only days before the election.
      Meanwhile, the Justice Department has obtained a warrant that will allow it to begin searching the computer that is believed to contain thousands of newly found emails of top Clinton aide Huma Abedin, two law enforcement sources confirmed to CNN.

      The timeline behind the discovery of the emails came into greater clarity Sunday.
      Investigators took possession of multiple computers related to the inquiry of Anthony Weiner in early October, U.S. law enforcement officials said. Weiner is Abedin’s estranged husband and is being probed about alleged sexting with a purportedly underage girl.

    • Clinton emails: FBI chief may have broken law, says top Democrat

      The Democratic leader in the US Senate says the head of the FBI may have broken the law by revealing the bureau was investigating emails possibly linked to Hillary Clinton.

      Harry Reid accused FBI director James Comey of violating an act which bars officials from influencing an election.

      News of the FBI inquiry comes less than two weeks before the US election.

      The bureau has meanwhile obtained a warrant to search a cache of emails belonging to a top Clinton aide.

      Emails from Huma Abedin are believed to have been found on the laptop of her estranged husband, former congressman Anthony Weiner.

    • The FBI is sitting on ‘explosive’ information regarding Donald Trump and Russia, top Democrat asserts

      A top Democrat in Washington says the FBI has shone a spotlight on a new trove of emails potentially associated with Hillary Clinton’s use of a private email server while sitting on “explosive information” allegedly tying Donald Trump to the Russian government.

      Senator Harry Reid, the Democrat leader of the US Senate, accused the FBI of double standards in a letter sent late on Sunday to James Comey, the agency’s director, who jolted the presidential race on Friday by revealing the existence of a new cache of emails.

    • Facebook wants to be your guide on Election Day

      Now that the presidential debates are over, Facebook wants to help you prepare for the last political battleground: the voting booth.

      The social-media company unveiled a feature this week designed to help users create a voting plan, showing not just presidential candidates but also information on statewide elections. Should you want to dive down to the local level, you can give Facebook your address and the company will tell you what’s on the ballot in your neck of the woods.

    • Google’s Schmidt drew up draft plan for Clinton in 2014

      Eric Schmidt, the chairman of Google’s parent company Alphabet, submitted a detailed draft to a key Clinton aide on 15 April 2014, outlining his ideas for a possible run for the presidency and stressing that “key is the development of a single record for a voter that aggregates all that is known about them”.

      Though Schmidt did not mention it, this kind of information is the lifeblood of Google’s business.

      The ideas, in an email released by the whistleblower website WikiLeaks, were sent to Cheryl Mills, former deputy White House counsel to Bill Clinton. Mills forwarded it to Clinton campaign chairman John Podesta, campaign manager Robby Mook and Barack Obama’s 2012 campaign manager David Plouffe.

    • Schmidt sought top outside post in Clinton campaign

      Eric Schmidt, the chairman of Google’s parent company Alphabet, expressed a desire more than two years ago to be the “head outside adviser” to Hillary Clinton’s presidential campaign, according to an email released by WikiLeaks.

      The email, dating back to 2014, was part of a bigger trove released by the whistle-blower website, all of which were from the Gmail account of Clinton campaign chairman John Podesta.

      There have been unproven claims by the Democratic Party that the leaked material has been provided by Russian sources.

      In the email, sent to campaign manager Robby Mook, Podesta wrote that he had met Schmidt on 2 April 2014 and that he (Schmidt) was “ready to fund, advise recruit talent, etc”.

      Podesta apparently expected Schmidt to be a pushy sort, as he wrote, “He (Schmidt) was more deferential on structure than I expected. Wasn’t pushing to run through one of his existing firms. Clearly wants to be head outside advisor, but didn’t seem like he wanted to push others out. Clearly wants to get going.

      “He’s still in DC tomorrow and would like to meet with you if you are in DC in the afternoon. I think it’s worth doing. You around? If you are, and want to meet with him, maybe the four of us can get on the phone in the am.”

      Mook was in Australia at the time, but wrote back to Podesta that he would “to do a call w him before I get back or meet with him after the 23rd”.

    • Democrats should ask Clinton to step aside

      Has America become so numb by the decades of lies and cynicism oozing from Clinton Inc. that it could elect Hillary Clinton as president, even after Friday’s FBI announcement that it had reopened an investigation of her emails while secretary of state?

      We’ll find out soon enough.

      It’s obvious the American political system is breaking down. It’s been crumbling for some time now, and the establishment elite know it and they’re properly frightened. Donald Trump, the vulgarian at their gates, is a symptom, not a cause. Hillary Clinton and husband Bill are both cause and effect.

      FBI director James Comey’s announcement about the renewed Clinton email investigation is the bombshell in the presidential campaign. That he announced this so close to Election Day should tell every thinking person that what the FBI is looking at is extremely serious.

      This can’t be about pervert Anthony Weiner and his reported desire for a teenage girl. But it can be about the laptop of Weiner’s wife, Clinton aide Huma Abedin, and emails between her and Hillary. It comes after the FBI investigation in which Comey concluded Clinton had lied and been “reckless” with national secrets, but said he could not recommend prosecution.

    • Clinton Foundation: Only 10% and 6% towards charity grants in 2013-14

      The Clinton Foundation spent less than 6 percent of its budget on charitable grants in 2014 and less than 10% the year prior, according to documents the organization filed with the Internal Revenue Service (IRS).

    • U.S. Officials Doubt Donald Trump Has Direct Link to Russia

      For much of the summer, the F.B.I. pursued a widening investigation into a Russian role in the American presidential campaign. Agents scrutinized advisers close to Donald J. Trump, looked for financial connections with Russian financial figures, searched for those involved in hacking the computers of Democrats, and even chased a lead — which they ultimately came to doubt — about a possible secret channel of email communication from the Trump Organization to a Russian bank.

      Law enforcement officials say that none of the investigations so far have found any link between Mr. Trump and the Russian government. And even the hacking into Democratic emails, F.B.I. and intelligence officials now believe, was aimed at disrupting the presidential election rather than electing Mr. Trump.

      Hillary Clinton’s supporters, angry over what they regard as a lack of scrutiny of Mr. Trump by law enforcement officials, pushed for these investigations. In recent days they have also demanded that James B. Comey, the director of the F.B.I., discuss them publicly, as he did last week when he announced that a new batch of emails possibly connected to Mrs. Clinton had been discovered.

    • Don’t settle for the lesser of two evils in this election. Vote for the Green party

      Donald Trump’s self-inflicted wounds and propensity for public meltdowns had pushed the public-opinion needle toward Hillary Clinton, according to recent polls. That may have changed a little in the aftermath of the FBI’s renewing of its email probe last week. But even so, the fears of many voters that a Donald Trump presidency might become a reality have abated.

      Those fears are not unfounded. Trump’s failings as a candidate and a person are manifest, and he would be in a position to wreak considerable havoc if elected. That’s especially true at the agency level, with the judiciary and in other arenas where the president can wield executive power. The wildcard aspect of his personality poses risks that can’t be predicted, nor can anyone know the degree to which congress would be inclined to obstruct or approve his most damaging initiatives.

      What has been lost in the salacious and obsessive media coverage of the Republican nominee’s outrageous behavior, bigoted remarks and appeal to the worst instincts of the electorate, however, is a critical examination of what a Clinton administration will mean for the nation. The FBI probe, information on tangled interests within the Clinton Foundation, evidence of influence peddling and Wikileaks revelations detailing manipulation of media and the democratic process, signal a plutocratic style of governance that is all too familiar and increasingly dominant at the federal level.

      The content of what has been revealed in these leaks, as well as her lengthy track record in government and policy statements as a candidate yield an inescapable conclusion: Hillary Clinton represents the entrenched interests of the status quo. Her election will expand the excesses of global interventionism and corporate welfare that have characterized US policies for several decades – at tremendous, almost incalculable cost both domestically and internationally.

    • Jill Stein’s AMA (Ask Me Anything) On Reddit: All You Need To Know About The Green Party Candidate’s Q & A Session

      “We could for example cancel the obsolete F-35 fighter jet program, create a Wall Street transaction tax (where a 0.2% tax would produce over $350 billion per year), or canceling the planned trillion dollar investment in a new generation of nuclear weapons. Unlike weapons programs and tax cuts for the super rich, investing in higher education and freeing millions of Americans from debt will have tremendous benefits for the real economy.”

    • WIKILEAKS: Here’s How The Clinton’s Free Private Jet Scam Works

      Ira Magaziner, the CEO of the Clinton Health Access Initiative, asked former President Bill Clinton to thank Morocco’s King Mohammed VI for “offering his plane to the conference in Ethiopia.”

      “CHAI would like to request that President Clinton call Sheik Mohammed to thank him for offering his plane to the conference in Ethiopia,” Magaziner gushed in a November 22, 2011 email released by WikiLeaks.

      Clinton frequently has expected free, luxurious private jet travel during his post-presidential life. Clinton, his wife and daughter have artfully secured free air travel and luxurious accommodations since they left the White House. It’s an effective way to accept gifts of great value without declaring them for the Clinton Foundation.

    • Clinton Foundation memo reveals Bill and Hillary as partners in crime

      Last week, WikiLeaks dropped a 2011 memo by top Bill Clinton aide Doug Band that lays bare Team Clinton’s sordid financial dealings when Hillary Clinton was secretary of State.

      Band describes how the Clinton Foundation served as a conduit for what he called “Bill Clinton Inc.” — the former president’s for-profit arm. Other documents show State Department involvement.

      The result is an unsavory mix of charity work, profiteering, and pay-to-play politics that potentially reaches the highest levels of US foreign policy and screams for IRS and Department of Justice reviews.

      At center is Band and his consulting firm Teneo. Band served as gatekeeper to all things Bill Clinton. Those wanting a former president as golf partner ponied up. Requests for Foundation dough followed. Next came Clinton Inc. — the steady stream of speeches, books, and honorary titles that enriched Bill Clinton. Teneo managed it all.

      Huge corporations and others seeking Clinton’s orbit lined up. Teneo’s clients included major U.S. corporations Coca-Cola and Dow Chemical, which donated huge sums.

      Foreign firms like UBS donated and greased Clinton Inc.

      For-profit Laureate International Universities went further, buying Clinton “advice” and rights to his prestige for $3.5 million annually. In all, Band states Teneo’s management yielded the former president $50 million — including a $2 million upfront slice of Band’s firm — with another $66 million queued. Band also facilitated political activity including securing campaign donors and managing Clinton’s political schedule.

    • The Clinton Foundation: Hopelessly Corrupt Or Just A Lousy Charity?

      Public Corruption: As the unseemly ties between the Clinton Foundation and Hillary Clinton’s State Department become more glaring and disturbing, the rhetoric from the Democratic side is getting more desperate. Now Clinton hatchet man James Carville says critics of the foundation are going to hell.

    • Poll: Comey’s bombshell changes few votes

      The race for the White House is tight, but it has not been radically changed by the FBI director’s bombshell announcement last week.

      Hillary Clinton has a slim three-point lead over Donald Trump one week before Election Day, according to a new POLITICO/Morning Consult poll conducted entirely after FBI Director James Comey announced the discovery of new emails that might pertain to the former secretary of state’s private server.

      Clinton leads Trump 46 percent to 43 percent in a two-way race, and 42 percent to 39 percent in a four-way race, with Libertarian nominee Gary Johnson at 7 percent and the Green Party’s Jill Stein at 5 percent.

      The poll was conducted using an online panel of 1,772 likely voters on Saturday and Sunday, beginning one day after Comey’s announcement. The poll carries a margin or error of 2 percentage points.

    • National poll: Trump now leads Clinton by 1 point

      Republican presidential nominee Donald Trump has overtaken Democratic rival Hillary Clinton for the first time since May in a national tracking poll.

      Trump has a 1-point lead over the former secretary of State, 46 to 45 percent, in the ABC News/Washington Post poll released Tuesday morning.

    • Trump Leads Clinton by 1 Point in New Poll as Enthusiasm Declines

      While vote preferences have held essentially steady, she’s now a slim point behind Donald Trump — a first since May — in the latest ABC News/Washington Post tracking poll, produced for ABC by Langer Research Associates.

      Forty-six percent of likely voters support Trump in the latest results, with 45 percent for Clinton. Taking it to the decimal for illustrative purposes, a mere .7 of a percentage point divides them. Third-party candidate Gary Johnson has 3 percent, a new low; Jill Stein, 2 percent.

    • Report & Wikileaks Reveal How Facebook, Clinton Loyalists Control Your Newsfeed

      Censorship by Facebook has become a thorn in the side of nearly anyone with an opinion differing from the narrative touted by the corporate press — for instance, sentiments not praising Hillary Clinton — and now, through both a new report from Reuters and emails published by Wikileaks, we have insight into why certain posts are targeted.

    • John Podesta’s Best Friend At The DOJ Will Be In Charge Of The DOJ’s Probe Into Huma Abedin Emails

      Now that the FBI has obtained the needed warrant to start poring over the 650,000 or so emails uncovered in Anthony Weiner’s notebook, among which thousands of emails sent from Huma Abedin using Hillary Clinton’s personal server, moments ago the US Justice Department announced it is also joining the probe, and as AP reported moments ago, vowed to dedicate all needed resources to quickly review the over half a million emails in the Clinton case.

    • ‘Google has power to control elections, can shift millions of votes to Clinton’ – Robert Epstein

      People trust the “unbiased” internet search giant Google so much it can actually influence up to 10 million undecided voters to choose Hillary Clinton for president, prominent US psychologist and author Robert Epstein told RT following years of research.

      Despite being a supporter of the Democratic presidential nominee, Dr. Epstein believes Google’s unchecked algorithm of placing one candidate over the other in search results constitutes a “threat to democracy.”

  • Censorship/Free Speech

  • Privacy/Surveillance

    • Interrogated by Finnish police for alleged idendity crimes, fraud and attempts of fraud

      Putting the word out: I was interrogated by the Finnish police today for
      multiple alleged counts (15+) of identity crimes, fraud and attempts of
      fraud. The invitation letter to be interrogated was sent out on
      2016-10-21 and received by me on 2016-10-25. Today is 2016-10-31.

      The police suspects me because of an “IP-address assigned to my name”,
      which I can’t confirm or deny to have a relation to me. As a suspect, I
      was not told what this aclaimed IP-address was on a specific date to my
      knowledge. It is only speculation if these allegations wrongly against
      me have something to do with my relation with the Tor community or
      activism about digital rights online.

      Pending ongoing investigation, I am not allowed by law to share more
      specific details about to the investigation. I’d be glad to reveal more
      details about the case once the investigation is over and share/hear how
      I became a suspect, once I know about it. (Note that my story is at
      least slightly opinionated.)

      I had a witness with me and I feel like my rights were being violated
      during the interrogation. The officer (not to be named publicly in
      respect for privacy) didn’t want to allow me to write down their badge
      number by taking the badge away from me while trying to write down the
      numbers. The officer looked slightly anxious.

    • Google Glass can teach you Morse code in four hours without trying

      If all that is meaningless to you, don’t worry. Researchers at the Georgia Institute of Technology have found a way for humans to learn Morse code in four hours just by playing games.

      The subjects were given Google Glass headsets (ask your parents) and continued to play games while vibrations near the ear slowly embedded subconscious Morsey goodness into their brains, reported Phys.org.

    • South African Spy Company Used by Gadaffi Touts its NSA-Like Capabilities

      The South African company best known for selling Muammar Gaddafi’s regime spy equipment used to monitor millions of Libyans’ international phone calls is now claiming it can intercept communications on a scale that rivals a government spy agency, according to a company brochure obtained by The Intercept.

      In a 2016 pamphlet produced by VASTech SA Pty Ltd., the company outlines its current capabilities for governments, militaries, and law enforcement agencies around the world, claiming it can conduct “passive detection” of communications transmitted from satellites, fix-and-mobile phones, and fiber optic cable.

      The company is offering multiple tools to vacuum up communications from around the globe undetected, or what the company calls “communication intelligence extraction solutions” — a capability not unlike the U.S. National Security Agency’s PRISM program.

    • Who are the Shadow Brokers?
    • New Leak Leads To Another NSA Spying Scandal
    • Hackers say they’re revealing more from trove of NSA data
    • NSA-Hacking ‘Shadow Brokers’ Reveal Spy-Penetrated Networks
    • Shadow Brokers leak second batch of data allegedly from NSA-linked ‘Equation Group’ hacking unit
    • Shadow Brokers releases list of servers hacked by the NSA
    • Shadow Brokers post list of compromised IP addresses
    • New leak may show if you were hacked by the NSA
    • Hacking group says list features servers infiltrated by National Security Agency
    • The Shadow Brokers dump more intel from the NSA’s elite Equation Group
    • Shadow Brokers leak list of supposed NSA controlled computers in China, Russia
    • Shadow Brokers claim to leak NSA cyberespionage targets
    • ‘Shadow Brokers’ dumps list of NSA-hacked attack servers
    • Shadow Brokers Tell U.S. to Pay to Get Files Back
    • Second Shadow Brokers dump released
    • Shadow Brokers Give NSA Halloween Surprise With Leak Of Hacked Servers
    • Hackers expose apparent NSA cyber espionage operations
    • NSA has been hacking Sonatrach from 2010 to 2002
    • Shadow Brokers leak systems hacked by NSA – mostly mail and uni servers in India, China
    • New leak reveals over 100 web addresses compromised by the NSA
    • Shadowbrokers’ NSA dirty tricks spill points to compromised servers in China and Russia
    • Shadow Brokers leaks list of NSA targets and compromised servers
    • NSA Hackers The Shadow Brokers Dump More Files
    • Hacker group releases list of NSA-compromised servers
    • Past behaviour did not stop leaker from accessing sensitive NSA Data

      The US National Security Agency’s (NSA) latest alleged leaker apparently raised no red flags despite a history of abnormal behaviour. The New York Times reported on 29 October that Harold T. Martin III, who is accused of stealing 50 terabytes of data from the NSA, apparently dealt with divorces, unpaid taxes, legal charges and drinking problems and was still allowed access to top secret information.

      In a detention hearing on 28 October, Judge Richard D. Bennett noted that Martin had a history of drinking problems. In 2006, he faced a drunk driving charge. Martin is known to have been called up for unpaid taxes in 2000, which he did not pay off for over a decade. Martin’s other run ins with the law include a computer harassment charge and an incident where he pretended to be a police officer during a traffic dispute.

      Martin’s house would eventually be raided by the Federal Bureau of Investigation in August 2016. He was arrested when investigators found thousands of pages of classified material on several storage devices, apparently taken from a variety of jobs he held as an NSA contractor, most recently for Booz Allen. It is not clear whether Martin was merely hoarding this information, or intended to leak it. His lawyers have stated that “there is no evidence that he intended to betray his country”.

    • Rights Groups, Activists Ask President To Respond To Unanswered Encryption Petition

      A bunch of organizations concerned with privacy, free press, and human rights are gently reminding the outgoing president that he still hasn’t fully responded to a We the People petition about encryption.

    • Montreal police monitored iPhone of La Presse journalist Patrick Lagacé

      Montreal police strongly defended a highly controversial decision to spy on a La Presse columnist by tracking his cellphone calls and texts and monitoring his whereabouts as part of a necessary internal police investigation — while the journalist involved called what they did “indefensible.”

      “Lives were not at stake, this was not a question of national security,” La Presse columnist Patrick Lagacé said in an interview Monday. “The leaks made them look bad, that’s why they decided to go after me in the way they did.”

      Opposition politicians are also condemning Montreal police for spying on Lagacé, though Montreal Mayor Denis Coderre stood by police chief Philippe Pichet on Monday, noting that a mayor should not intervene in police operations, but did say he was troubled by the news.

      For several months this year, police were monitoring Lagacé’s iPhone to determine the identity of his sources, La Presse reported. This was confirmed to Lagacé last Thursday by Montreal police.

      At least 24 surveillance warrants were granted by courts in 2016, at the request of the Montreal police department’s special investigations section, which probes crime within the police force. The warrants allowed police to track the telephone numbers of incoming and outgoing calls on Lagacé’s phone, and to monitor the phone’s location, although Pichet denied at a hastily convened press conference Monday that the GPS on his phone was monitored.

      Lagacé said he is sure many judges around the world have been asked by police departments to grant similar warrants, but refused because it was too “vulgar” to spy on a reporter. “It was incredibly aggressive,” he said, questioning the judgment of the judge involved.

    • Lords examines Investigatory Powers Bill

      The Investigatory Powers Bill will have its third reading, a final chance to tidy up the bill and make changes, in the House of Lords on Monday 31 October.

    • Belgian Court Fines Microsoft For Failing To Comply With Its Impossible Order

      The court, failing to understand anything but its power to order people around, demanded Skype turn over communications. Skype turned over the only thing it could actually obtain, explaining that its architecture didn’t support the interception of calls. No dice. That only made the court angry.

      The court was no more happy to have pointed out to it that Microsoft didn’t actually fall under its jurisdiction. It maintains no data centers in Belgium, nor does it have anyone employed there. Microsoft suggested the court work with governments of countries where it actually maintains a presence and utilize their mutual assistance treaties.

    • Brandi Collins on Black Lives Surveillance

      Corporate journalists rely on the First Amendment, but it’s increasingly unclear if the First Amendment can rely on them. The relative lack of interest in the impact of spying on activists—a practice with a long and disturbing history given new power by technology—is the latest example.

    • As Expected, FCC Passes Modest Privacy Rules For Broadband Providers, ISPs Act Like World Has Ended

      Over the past week, we’ve been talking a lot about the need for more transparency and user control for privacy on the internet, so it’s only fitting that the FCC has officially adopted its new privacy rules for ISPs that will require broadband providers to be much more explicit concerning what information it collects and shares with others, and provide (mostly) clear “opt-in” requirements on some of that data collection. This isn’t a surprise. It was pretty clear that the FCC was going to approve these rules that it announced earlier this year. And, of course, the big broadband providers threw a giant hissy fit over these rules that just ask them to be more transparent and give users at least a little bit of control over what data is collected.

      Comcast has caused these proposals “irrational” and various think tankers paid for by the broadband providers tried to tell the world that poor people benefit from a lack of privacy. And magically new studies came out claiming that broadband providers are cuddly and lovable, rather than snarfing up everyone’s data.

      And, of course, the various broadband providers want to blame Google for the rules, because everyone wants to blame Google for everything. The issue here is that the broadband access providers have these rules, while online service providers, like Google and Facebook do not. There are, of course, a few responses to this. The first, is that the FCC doesn’t have authority over those sites, like it does have over the access providers under the Telecom Act. The second is that users are much more locked in to their broadband access provider, and there is much less competition. Switching is much more difficult. The third argument is, basically, that Google and Facebook don’t have nearly the same history as the broadband access providers of really nasty privacy violations. Hell, just as these new rules were coming, Verizon was being fined for stealth zombie cookies. Finally, the simple fact is that broadband access providers have the power to spy on a lot more internet activity than Google or Facebook. Yes, those other services are in more and more places, but it’s not difficult to block them. With your ISP everything goes through their pipes, and unless you carefully encrypt your traffic via a VPN, they get to see everything.

    • Why do we still accept that governments collect and snoop on our data?

      In recent weeks, the Hollywood film about Edward Snowden and the movement to pardon the NSA whistleblower have renewed worldwide attention on the scope and substance of government surveillance programs. In the United States, however, the debate has often been a narrow one, focused on the rights of Americans under domestic law but mostly blind to the privacy rights of millions of others affected by this surveillance.

  • Civil Rights/Policing

    • At DAPL, Confiscating Cameras as Evidence of Journalism

      While elite media wait for the resistance to the Dakota Access Pipeline to go away so they can return to presenting their own chin-stroking as what it means to take climate change seriously, independent media continue to fill the void with actual coverage.

      One place you can go to find reporting is The Intercept (10/25/16), where journalist Jihan Hafiz filed a video report from North Dakota, where the Standing Rock Sioux and their allies continue their stand against the sacred site–trampling, water supply–threatening project.

    • ‘Dumbfounded’: Documentarian facing 45 years for filming pipeline protest

      Schlosberg was arrested in Walhalla, North Dakota, on October 11 for filming activist Michael Foster — a member of the group known as Climate Direct Action — as he shut off a valve of a Canadian tar sands pipeline. In solidarity with protesters opposing the Dakota Access Pipeline in North Dakota, activists shut down similar valves in Washington, Montana, and Minnesota on the same day.

      However, authorities in North Dakota have charged the filmmaker with two Class A felonies and one Class C felony, including conspiracy to theft of property, conspiracy to theft of services, and conspiracy to tampering with or damaging a public service.

    • Descendants of Jewish refugees seek German citizenship after Brexit vote

      Descendants of the tens of thousands of German Jews who fled the Nazis and found refuge in Britain are making use of their legal right to become German citizens following the Brexit vote.

      German authorities have reported a twentyfold increase in the number of restored citizenship applications – a right reserved for anybody who was persecuted on political, racial or religious grounds during the Nazi dictatorship, as well as their descendants.

    • Inside Nigeria’s Baby Factories

      Baby factories in Nigeria are pumping out babies for sale on the illegal adoption market. Swedish journalist Therese Cristiansson infiltrated these baby-trafficking networks with a hidden camera.

    • Nigeria lost $9bn to Boko Haram attacks – Presidential panel

      The Presidential Committee on North-East Initiative has revealed that the nation lost about $9bn to the violent activities of the Boko Haram insurgents in Borno, Yobe and Adamawa states.

      According to the committee, a strategic framework would soon be set up by President Muhammadu Buhari in line with his determination to rebuild the North-East.

      The Vice-Chairman of the PCNI, Alhaji Tijani Tumsah, said this on Thursday in Abuja, while briefing newsmen on the outcome of its inaugural meeting.

      According to him, the focus of the meeting was to discuss the mandate given to the PCNI to fashion out a way that would be most direct, in terms of the delivery of that mandate, analyse the enormity of the task and fulfil the presidential mandate to give succour to the people of the North-East.

      Tumsah said, “We are not investigating anybody; there are people who are investigating such diversions. I’m glad you mentioned the Senate, the House of Representatives, police and the EFCC. Our mandate, going forward, is to provide a strategic framework for the implementation of all interventions going into the North-East in terms of humanitarian works, resettlement and eventual rebuilding of the North-East.

    • Iran: Writer Jailed For Writing Unpublished Story

      On Monday, Iranian intelligence authorities broke the apartment door of writer and human rights activist Golrokh Ebrahimi Iraee, raided her apartment and took her by force to serve a 6 year prison sentence for writing a story on stoning women in Islam, that was never published.

      Golrokh Ebrahimi Iraee 35 years old, is the wife of political prisoner Arash Sadeghi, 36 who is now serving a 19 year prison sentence in Iranian prisons. The family has suffered much mistreatment since the 2009 disputed presidential election in Iran and have been in and out of prison. They have also lost their mother who had a stroke the minute the authorities raided their home in 2009.

    • Iran: Writer facing imminent imprisonment for story about stoning

      Iranian authorities must immediately repeal the conviction and sentence of Golrokh Ebrahimi Iraee, a writer and human rights activist who is due to begin serving six years in prison on charges including “insulting Islamic sanctities” through the writing of an unpublished story about the horrific practice of stoning, Amnesty International said today.

      “The charges against Golrokh Ebrahimi Iraee are ludicrous. She is facing years behind bars simply for writing a story, and one which was not even published – she is effectively being punished for using her imagination,” said Philip Luther, Research and Advocacy Director for the Middle East and North Africa at Amnesty International.

    • Woman recalls moment she was strip-searched by police aged 12

      A woman has described being strip-searched by police when she was 12 years old.

      Georgia Wood, now 20, said the officers were “horrible and demeaning” and the incident had “really affected” her life, leaving her lacking confidence and suffering panic attacks.

      Ms Wood was taken into police custody in south Wales eight years ago with her mother, who was suspected of possessing drugs.

      No illegal substances were found on Ms Wood or her mother, Karen Archer, who wasn’t charged with an offence.

      According to figures acquired by the BBC from 13 police forces in England and Wales, more than 5,000 children aged 17 and under were strip-searched between 2013 and 2015.

    • Saudi Arabia is preparing to behead and crucify a 21-year-old activist

      A young Saudi Arabian Shi’a activist, who was sentenced to death last year, has lost his final appeal for justice and is due to be executed by beheading, followed by the mounting of his headless body onto a crucifix for public viewing.

      Human rights groups and Saudi critics are appalled by both the nature of the execution and the flimsy case against Ali Mohammed al-Nimr, though neither of these factors are unusual in today’s Saudi Arabia.

    • Muslim women complain about Sharia inquiries

      More than 100 Muslim women have complained about their treatment under two government probes into Sharia law.

      The inquiries – one ordered by Theresa May when she was home secretary, and another by the home affairs select committee – are ongoing.

      But some women have signed an open letter and said the aim is to ban Sharia councils, not reform them.

      The Muslim Women’s Network UK said the inquiries risk treating women like “political footballs”.

      The councils are tribunals often used to settle disputes within the Muslim community.

      The first evidence session on Sharia councils is due to be held by the home affairs committee on Tuesday.

    • Sharia Courts interfered to protect domestic abusers, MPs told

      Leading figures from the UK’s Sharia councils will give evidence in parliament tomorrow, in the wake of accusations that a leading Sharia court has been protecting domestic abusers from criminal proceedings.

      The Home Affairs Select Committee has published written evidence submitted to it that is heavily critical of the Muslim Arbitration Tribunal (Mat) in Nuneaton, Warwickshire, in advance of its session on Tuesday. The Mat states on its website that it urges the Crown Prosecution Service to “reconsider” criminal charges brought against Muslim men accused of domestic violence.

      The Southall Black Sisters, a group that helps vulnerable women, have told the committee that the strategy of asking the CPS to “reconsider” cases is an “attempt to sabotage criminal proceedings”.

    • UK.gov’s pricey Five Year Plan to see off cyber thugs still in place

      UK Chancellor Philip Hammond is due to reaffirm a pledge to spend £1.9bn up until the end of 2020 to bolster the UK’s cyber security strategy in a speech early this afternoon.

      The updated strategy – which doesn’t include any new spending pledges1 – is expected to include an increase in focus on investment in automated defences to combat malware and spam emails, establish a fund earmarked to recruit 50 specialists to work on cybercrime at the National Crime Agency, the creation of a Cyber Security Research Institute and an “innovation fund” for cyber security startups. All this investment is needed because of increased threats from nation state attackers, terrorists and organised crime gangs, the Chancellor is expected to say.

    • Legislators Demand Answers From DOJ On Expanded Hacking Powers It’s Seeking

      There’s only a couple of months left until the DOJ’s proposed Rule 41 changes become law. All Congress has to do is nothing. This is a level of effort Congress is mostly amenable to. If this becomes law, worldwide deployments of malware/spyware during investigations will be unable to be challenged in court. In addition, the DOJ wants to be part of the cyberwar. It’s seeking permission to remotely access zombie computers/devices used in cyberattacks to “clean” them.

    • There’s no way your Facebook “check-in” is confusing North Dakota cops

      On Monday, supporters of the Standing Rock Sioux Tribe’s protest against the Dakota Access Pipeline began a viral campaign enticing people to “check in” to the reservation on Facebook as a way to “overwhelm and confuse” local law enforcement.

      However, there is no evidence that this tactic is effective, particularly as the Morton County Sheriff’s Department expressly said on its own Facebook page that it “is not and does not follow Facebook check-ins for the protest camp or any location. This claim/rumor is absolutely false.”

      In recent months, activists have been protesting at the site on the border of North and South Dakota in an attempt to halt a planned oil pipeline that many believe would damage the local water supply and desecrate tribal lands.

      This Facebook plea is similar to calls in 2009, during the controversial presidential election in Iran, where supporters of the Green Movement urged people to change their Twitter location to Tehran. Similarly, there was no indication that this action mitigated local Iranian authorities’ ability to arrest protesters.

    • Turkey detains 13 journalists after mass firings of public servants

      Turkey has detained 13 journalists in an ongoing wave of government crackdowns following a coup attempt in July.
      Early Monday morning, Turkish police detained Murat Sabuncu, editor-in-chief of the newspaper Cumhuriyet, along with a dozen other reporters in a raid, according to official news agency Anadolu.

    • Branding Moderates as ‘Anti-Muslim’

      As if facing down violent Islamist fanatics isn’t enough, Muslim reformers now have to dodge attacks from the American left. Consider the Southern Poverty Law Center’s decision last week to brand two such reformers, Ayaan Hirsi Ali and Britain’s Maajid Nawaz, as “anti-Muslim extremists.”

    • Indonesian woman becomes latest person to be caned ‘for standing near boyfriend’

      A 20-year-old woman in Indonesia has been publicly caned for standing too close to her boyfriend, becoming the 14th person to be flogged this month in the same province.

      The unnamed woman was accused of breaking Islamic Sharia law, which strictly forbids unmarried couples to become intimate, and was flogged in front of a crowd in Banda Aceh province.

      She was escorted onto a stage outside a mosque wearing a headdress and was lashed with a cane.

      Incidents of the punishment have reportedly increased recently in Indonesia.

  • Internet Policy/Net Neutrality

    • AT&T’s Already Making Things Up To Get Its Massive New Merger Approved

      Over the years, we’ve noted how AT&T has a nasty habit of lying to sell the public, press and regulators on the company’s neverending attempts to grow larger. Whether it’s promising broadband expansions that never arrive, or using astroturf to try and argue anti-consumer mergers are good for toddlers, AT&T’s lobbyists, lawyers, and policy tendrils work tirelessly to argue that up is down, black is white, and any skepticism of its claims are unfounded hysteria. As we saw with the blocked T-Mobile merger, this sort of behavior doesn’t work quite as well as it used to.

      Enter AT&T’s latest $85 billion planned acquisition of Time Warner. Consumer advocates worry AT&T could use its size and leverage to make content more expensive, while the usage caps and zero rating give AT&T’s own upcoming streaming video service an unfair market advantage. Wall Street hasn’t exactly been bullish on the idea either, noting how AT&T’s $69 billion acquisition of DirecTV, followed by its $85 billion acquisition of Time Warner is not only a giant risk on the eve of the cord cutting revolution, but it saddles AT&T with an absolute mountain of debt that will potentially damage the company’s credit rating.

    • Most of Canada’s Biggest Telecoms Want to End Net Neutrality

      On Monday, Canada’s federal telecommunications regulator debates the principle of net neutrality—the idea that every online service should be equally accessible in terms of connection speed and data costs.

      It’s fitting that this hearing takes place on Halloween, because the idea that one of Canada’s telecoms could favour a certain music streaming service, for example, over another—by making Spotify free to use, while Apple Music eats away at your data plan, for example—is pretty spooky.

  • Intellectual Monopolies

    • Copyrights

      • Sega/Steam Took Down A Bunch Of Legitimate Steam Workshop Mods Over Copyright Concerns

        We’ve talked often about how common it is for legitimate customers to get caught up in attempts to thwart piracy and copyright infringement. From DRM keeping legit purchasers from using what they paid for to Fair Use uses of content getting taken down by automatic systems on sites like YouTube, it’s worth noting whenever this happens. After all, there is an expression in the legal system that goes something like: I’d rather set 100 guilty people free than imprison a single innocent. The stakes when it comes to copyright aren’t as high as jail time, typically, but it’s interesting how little this mantra penetrates with those who would enforce copyright via carpet-bomb rather than a scalpel.

        Take the recent incident with Sega’s Steam Workshop mod-space, for instance, where dozens and dozens of mods within the platform suddenly disappeared.

      • My Talk At Wikimedia: Copyright Impacts Everything

        Last week, I mentioned that I was giving a talk at the Wikimedia Foundation about copyright. It was a fun time, and the video from the talk is now online. Unfortunately, the audio and the video are… not entirely great. I’d complain about the terrible microphone, but that sounds like a certain presidential candidate. The video is okay, but the colors are off, so my presentation looks a little weird. Either way, you should still be able to get the basics. There’s an introduction from Jan Gerlach at the Wikimedia Foundation, talking about all the important policy work they do, then my talk that runs about half an hour, followed by a Q&A with the audience that runs another half hour or so. It was a fun time, with a really great group of folks, and the conversation continued on after the official session ended for quite a while.

      • Supreme Court Asks White House To Weigh In On Dancing Baby Fair Use Case

        The copyright case involving Stephanie Lenz and her dancing baby is one that may finally be nearing a conclusion after many, many years — but it’s not over yet. As you may recall, Lenz posted a very brief clip of her then toddler, dancing along to a few seconds of a barely audible Prince song. This was almost a decade ago.

      • Copyright and cheerleaders at the Supreme Court

        Star Athletica v Varsity Brands involves copyright protection for cheerleader uniforms. The question asked is: What is the appropriate test to determine when a feature of a useful article is protectable under Section 101 of the Copyright Act?

        “It is important because the court may well strike out on a new course or at least throw its determinative hat in the ring on how to approach useful articles more generally,” says Robert Brauneis of The George Washington University Law School, who will be presenting the session.

      • Copyright on a Useful Item

        Today the Supreme Court heard oral arguments in the pending copyright case of Star Athletica v. Varsity Brands. Although not a patent case, the issue involves the boundary line (if any) between patent and copyright and the “useful article” exception. Question Presented: What is the appropriate test to determine when a feature of a useful article is protectable under section 101 of the Copyright Act. The statutory test under Section 101 states that “the design of a useful article . . . shall be considered a pictorial, graphic, or sculptural work only if, and only to the extent that, such design incorporates pictorial, graphic, or sculptural features that can be identified separately from, and are capable of existing independently of, the utilitarian aspects of the article.”

      • Power Struggle In Russia As Internet Pirates Vie For Upper Hand

        The Russian intellectual property industry is on the verge of a new scandal. Following the recent arrest of Sergey Fedotov, head of the Russian Authors’ Society (RAS), Russia’s leading public association for the protection of intellectual property rights, on the charge of multi-million ruble thefts, the Russian police has announced the initiation of criminal proceedings against Maxim Ryabyko, head of the Russian Association for the Protection of Copyright on the Internet (RAPCI).

      • 86-Year Old Grandma Accused of Pirating a Zombie Game

        Since it’s become mandatory for ISPs to forward piracy notifications in Canada, hundreds of thousands of people have received letters over alleged copyright infringements. One of these accused pirates is an elderly woman, who’s threatened with $5,000 in potential damages for downloading a zombie game she’s never heard of.

      • ‘Shocked’ grandmother on hook for illegal mutant game download

        Post-nuclear war, mutant-killing video games are not Christine McMillan’s thing.

        But the 86-year-old from Ontario has been warned she could have to pay up to $5,000 for illegally downloading a game she’d never heard of.

        She is one of likely tens of thousands of Canadians who have received notices to pay up, whether they are guilty or not.

        “I found it quite shocking … I’m 86 years old, no one has access to my computer but me, why would I download a war game?” McMillan told Go Public.

        In May, she received two emails forwarded by her internet provider.

        They were from a private company called Canadian Intellectual Property Rights Enforcement (CANIPRE) claiming she had illegally downloaded Metro 2033, a first-person shooter game where nuclear war survivors have to kill mutants.​

      • Canada Copyright Troll Threatens Octogenarian Over Download Of A Zombie War Game

        Copyright trolling is somehow still a thing and it never seems to fail to provide ridiculous examples of miscarriages of justice. It has been long pointed out how rife with inaccuracy the process of threatening individuals with lawsuits and fines based on infringement as evidenced only by IP address is. Even courts have time and time again pointed out that an IP address is not sufficient to identify a person responsible for a given action. Yet the trolls still send out their threat letters, because bullying in this manner generally works.

        The latest example of this kind of trolling misfire comes from Canada, where 86-year-old Christine McMillan received a threat letter from CANIPRE over an alleged infringing download of Metro 2033, a game in which the player slaughters zombies in a post-nuclear world.

      • Pirate Party Books Election Victory in Iceland

        The Pirate Party in Iceland booked an important victory in the local parliamentary election today, scoring 14.5% of the total vote. While lower than most polls predicted, it marks the first time that a Pirate Party, anywhere in the world, has a serious shot at taking part in a government coalition.

      • Iceland’s Pirate Party Gains Ground in Election

        After near-constant exposure to the nausea-inducing dumpster fire that is the 2016 U.S. presidential race, it might be hard to grok that a movement of anti-establishment internet pirates has become one of the leading political parties of a small island nation.

        And yet that’s what’s happening in right now in Iceland, where the hacktivist-inspired Pirate Party achieved significant victories in the country’s parliamentary elections yesterday. Yesterday they won 14.5 percent of the popular vote, putting them in third place behind the center-right Independence Party and the Left-Green Movement, who won 29 percent and 15.9 percent of the vote respectively. (Earlier results showed them beating the Left-Green Movement for second place, but that changed as more votes were counted.)

        It wasn’t enough to seize majority control of the country as some polls for the extremely tight race were suggesting, but it was enough to win them 10 seats in the 63-seat parliament, up from the mere three they held after the 2013 elections. The formerly leading center-right Progressive Party, meanwhile, saw its seats drop by over half from 19 to eight, its dominance soundly trounced by the Pirates and the country’s smaller left-leaning parties: Left-Green, Bright Future, and Social Democrats. In the wake of the news, Icelandic prime minister and progressive Party member Sigurður Ingi Jóhannsson resigned Sunday.

      • EU Advocate General Declares That Hotels Don’t Need To Pay Copyright License To Have In-Room Television

        We’ve seen all manner of silly claims by copyright licensing groups as to what requires what kind of license in every kind of circumstance. These licensing groups have gone after children’s charities. A UK collection society had the strategy of calling up local businesses and demanding payments should they hear music playing in the background. The Author’s Guild once claimed that reading a book out loud constituted the need for a separate license, while ASCAP asserted with a straight face that the ring of a mobile phone was a public performance. This panoply of idiocy might be funny, except for the very real harm done through this kind of harassment.

        Even the good stories in this vein weigh heavily in that they are necessary at all. For instance, the advocate general for the EU’s Court of Justice recently wrote an opinion advising that hotels didn’t need a copyright license just to have televisions within guest rooms. It’s a good ruling, but conjures the frustrating question as to why it was needed in the first place. The answer, of course, is because a collection group was attempting to collect from hotels for just that reason.

]]>
http://techrights.org/2016/11/01/debian-drops-powerpc/feed/ 0
Links 24/10/2016: Linux 4.9 RC2 http://techrights.org/2016/10/24/linux-4-9-rc2/ http://techrights.org/2016/10/24/linux-4-9-rc2/#comments Tue, 25 Oct 2016 01:11:11 +0000 http://techrights.org/?p=96365

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Distributing encryption software may break the law

    Developers, distributors, and users of Free and Open Source Software (FOSS) often face a host of legal issues which they need to keep in mind. Although areas of law such as copyright, trademark, and patents are frequently discussed, these are not the only legal concerns for FOSS. One area that often escapes notice is export controls. It may come as a surprise that sharing software that performs or uses cryptographic functions on a public website could be a violation of U.S. export control law.

    Export controls is a term for the various legal rules which together have the effect of placing restrictions, conditions, or even wholesale prohibitions on certain types of export as a means to promote national security interests and foreign policy objectives. Export control has a long history in the United States that goes back to the Revolutionary War with an embargo of trade with Great Britain by the First Continental Congress. The modern United States export control regime includes the Department of State’s regulations covering export of munitions, the Treasury Department’s enforcement of United States’ foreign embargoes and sanctions regimes, and the Department of Commerce’s regulations applying to exports of “dual-use” items, i.e. items which have civil applications as well as terrorism, military, or weapons of mass destruction-related applications.

  • GitHub open-sources tool to track and preview Puppet changes

    If tweaks to your Puppet setups are causing breakage across your deployments, GitHub’s Octocatalog-diff ensures that new Puppet settings don’t wreck old ones

  • Puppet Unveils New Docker Build and Phased Deployments

    Puppet released a number of announcements today including the availability of Puppet Docker Image Build and a new version of Puppet Enterprise, which features phased deployments and situational awareness.

    In April, Puppet began helping people deploy and manage things like Docker, Kubernetes, Mesosphere, and CoreOS. Now the shift is helping people manage the services that are running on top of those environments.

  • 9 reasons not to install Nagios in your company
  • Top 5 Reasons to Love Kubernetes

    At LinuxCon Europe in Berlin I gave a talk about Kubernetes titled “Why I love Kubernetes? Top 10 reasons.” The response was great, and several folks asked me to write a blog about it. So here it is, with the first five reasons in this article and the others to follow. As a quick introduction, Kubernetes is “an open-source system for automating deployment, scaling and management of containerized applications” often referred to as a container orchestrator.

  • Website-blocking attack used open-source software

    Mirai gained notoriety after the Krebs attack because of the bandwidth it was able to generate — a record at well over 600 gigabits a second, enough to send the English text of Wikipedia three times in two seconds. Two weeks later, the source code for Mirai was posted online for free.

  • Alibaba’s Blockchain Email Repository Gains Technology from Chinese Open Source Startup

    Onchain, an open-source blockchain based in Shanghai, will provide technology for Alibaba’s first blockchain supported email evidence repository.

    Onchain allows fast re-constructions for public, permissioned (consortium) or private blockchains and will eventually enable interoperability among these modes. Its consortium chain product, the Law Chain, will provide technology for Ali Cloud, Alibaba’s computing branch.

    Ali Cloud has integrated Onchain’s Antshares blockchain technology to provide an enterprise-grade email repository. Onchain provides the bottom-layer framework for Ali Cloud, including its open-source blockchain capabilities, to enable any company to customize its own enterprise-level blockchain.

  • Events

    • CloudNativeCon Unites Leaders in Open Source, Container and Cloud Native Tech

      Today’s cloud native ecosystem is growing at an incredibly rapid pace – as new technologies are continuously introduced and current applications are ever-evolving.

      Taking the lead in bringing together the industry’s top developers, end users, and vendors, the Cloud Native Computing Foundation (CNCF) hosts critical components of the cloud native software stacks including Kubernetes, Prometheus, and OpenTracing and serves as a neutral home for collaboration.

      To help spread cloud native practices and technology across the world, CNCF is hosting CloudNativeCon to bring together leading contributors in cloud native applications and computing, containers, microservices, central orchestration processing, and more November 8-9 in Seattle.

    • Spark on Kubernetes at Spark Summit EU

      I’ll be speaking about Spark on Kubernetes at Spark Summit EU this week. The main thesis of my talk is that the old way of running Spark in a dedicated cluster that is shared between applications makes sense when analytics is a separate workload. However, analytics is no longer a separate workload — instead, analytics is now an essential part of long-running data-driven applications. This realization motivated my team to switch from a shared Spark cluster to multiple logical clusters that are co-scheduled with the applications that depend on them.

    • Meet Opensource.com writers, moderators, and interviewees at All Things Open
  • Web Browsers

    • Mozilla

      • Netflix on Firefox for Linux

        If you’re a Firefox user and you’re a little fed up with going to Google Chrome every time in order to watch Netflix on your Linux machine, the good news is since Firefox 49 landed, HTML5 DRM (through the Google Widevine CDM (Content Decryption Manager) plugin) is now supported. Services that use DRM for HTML5 media should now just work, such as Amazon Prime Video. Unfortunately, the Netflix crew haven’t ‘flicked a switch’ yet behind the scenes for Firefox on Linux, meaning if you run Netflix in the Mozilla browser at the moment, you’ll likely just come across the old Silverlight error page. But there is a workaround.

        For some reason, Netflix still expects Silverlight when it detects the user is running Firefox, despite the fact that the latest Firefox builds for Linux now support the HTML5 DRM plugin.

  • SaaS/Back End

    • AtScale Delivers Findings on BI-Plus-Hadoop

      Business intelligence is the dominant use-case for IT organizations implementing Hadoop, according to a report from the folks at AtScale. The benchmark study also shows which tools in the Haddop ecosystem are best for particular types of BI queries.

      As we’ve reported before, tools that demystify and function as useful front-ends and connectors for the open source Hadoop project are much in demand. AtScale, billed as “the first company to allow business users to do business intelligence on Hadoop,” focused its study on the strengths and weaknesses of the industry’s most popular analytical engines for Hadoop – Impala, SparkSQL, Hive and Presto.

    • Study Says OpenStack at Scale Can Produce Surprising Savings

      Revenues from OpenStack-based businesses are poised to grow by 35 percent a year to more than $5 billion by 2020, according to analysts at 451 Research. In its latest Cloud Price Index, 451 Research analyzes the costs associated with using various cloud options to determine when it becomes better value to use a self-managed private cloud instead of public or managed cloud services.

      The idea is to createa complex pricing model that takes into consideration the major factors impacting total cost of ownership (TCO), including salaries and workload requirements.The 451 study found that because of the prevalence of suitably qualified administrators, commercial private cloud offerings such as VMware and Microsoft currently offer a lower TCO when labor efficiency is below 400 virtual machines managed per engineer. But where labor efficiency is greater than this, OpenStack becomes more financially attractive. In fact, past this tipping point, all private cloud options are cheaper than both public cloud and managed private cloud options.

    • How OpenStack mentoring breaks down cultural barriers

      Victoria Martinez de la Cruz is no stranger to OpenStack’s mentorship opportunities. It’s how she got her own start in OpenStack, and now a few years later is helping to coordinate many of these opportunities herself. She is speaking on a panel on mentoring and internships later this week at OpenStack Summit in Barcelona, Spain. In this interview, we catch up with Victoria to learn more about the details of what it’s like to be a part of an open source internship, as well as some helpful advice for people on both sides of the mentoring process.

  • Databases

    • IBM Power Systems solution for EnterpriseDB Postgres Advanced Server

      The primary focus of this article is on the use, configuration, and optimization of PostgreSQL and EnterpriseDB Postgres Advanced Server running on the IBM® Power Systems™ servers featuring the new IBM POWER8® processor technology.

      Note: The Red Hat Enterprise Linux (RHEL) 7.2 operating system was used. The scope of this article is to provide information on how to build and set up of PostgreSQL database from open source and also install and configure EnterpriseDB Postgres Advanced Server on an IBM Power® server for better use. EnterpriseDB Postgres Advanced Server on IBM Power Systems running Linux® is based on the open source database, PostgreSQL, and is capable of handling a wide variety of high-transaction and heavy-reporting workloads.

  • Valgrind

  • Pseudo-Open Source (Openwashing)

  • BSD

  • FSF/FSFE/GNU/SFLC

    • What is the GRUB2 boot loader?

      There are various things that make up an operating system. In any operating system, one of the most critical parts is powering on the machine. During this process, the computer will execute a small program in read-only memory (ROM) to begin initiating the startup process. This small program is known by many names, but most often called a boot loader. In almost every Linux distribution, including Fedora, GRUB2 (or GRand Unified Bootloader 2) is the default boot loader. Even though it is a critical piece of the operating system, many people aren’t aware of the boot loader, all that goes into it, or how it can be customized.

  • Public Services/Government

    • Study: Administrations unaware of IT vendor lock-in

      Public policy makers in Sweden have limited insight on how IT project can lead to IT vendor lock-in, a study conducted for the Swedish Competition Authority shows. “An overwhelming majority of the IT projects conducted by schools and public sector organisations refer to specific software without considering lock-in and different possible negative consequences”, the authors conclude.

  • Openness/Sharing/Collaboration

    • Open Access/Content

      • How open access content helps fuel growth in Indian-language Wikipedias

        Mobile Internet connectivity is growing rapidly in rural India, and because most Internet users are more comfortable in their native languages, websites producing content in Indian languages are going to drive this growth. In a country like India in which only a handful of journals are available in Indian languages, open access to research and educational resources is hugely important for populating content for the various Indian language Wikipedias.

  • Programming/Development

    • Where to find the world’s best programmers

      One source of data about programmers’ skills is HackerRank, a company that poses programming challenges to a community of more than a million coders and also offers recruitment services to businesses. Using information about how successful coders from different countries are at solving problems across a wide range of domains (such as “algorithms” or “data structures” or specific languages such as C++ or Java), HackerRank’s data suggests that, overall, the best developers come from China, followed closely by Russia. Alarmingly, and perhaps unexpectedly, the United States comes in at 28th place.

Leftovers

  • Health/Nutrition

    • Iraq parliament bans alcohol in surprise vote

      Iraq’s parliament has voted to ban the sale, import and production of alcohol in a surprise move. Proponents of the ban argue the ban is justified by the constitution, which prohibits any law contradicting Islam.

      Opponents say it violates the same constitution which guarantees the traditions of religious minorities such as Christians and have vowed to appeal against the decision.

      Those violating the law will be fined between 10 million and 25 million dinars (roughly £7,000 to £17,500).

    • Court of Appeal on Pregabalin – Pfizer still in pain, but Swiss claims re-interpreted again [Ed: Poor Pfizer "still in pain" because it cannot globally defend a monopoly that harms the poor and ill using patents]

      While this moggy was struggling to get back from Indonesia, the Court of Appeal handed down its decision in the pregabalin appeal Warner-Lambert Company LLC v Generics (UK) Ltd (t/a Mylan) & Ors [2016] EWCA Civ 1006 (13 October 2016), and finally the IPKat has managed to blog about it (the lateness by no means reflecting on the importance of the judgment).

      It is very much a judgment of three halves.

      In the first part of the judgment (up to [135]), which substantively disposes of the case, Lord Justice Floyd (with whom Lord Justic Kitchin and Lord Justice Patten agreed) upheld the decision of Mr Justice Arnold on the validity of the patent. Arnold J had considered that the claims of the patent that were alleged to be infringed were insufficient, and in particular claim 3 directed towards use of pregabalin for neuropathic pain, because the patent did not render it plausible that pregabalin would be effective at treating central neuropathic pain, only peripheral neuropathic pain. Floyd LJ agreed with Arnold J’s construction of the claims, and rejected the challenge to the finding that claim 3 was not plausible across its breadth.

  • Security

    • How your DVR was hijacked to help epic cyberattack

      Technology experts warned for years that the millions of Internet-connected “smart” devices we use every day are weak, easily hijacked and could be turned against us.

      The massive siege on Dyn, a New Hampshire-based company that monitors and routes Internet traffic, shows those ominous predictions are now a reality.

      An unknown attacker intermittently knocked many popular websites offline for hours Friday, from Amazon to Twitter and Netflix to Etsy. How the breach occurred is a cautionary tale of the how the rush to make humdrum devices “smart” while sometimes leaving out crucial security can have major consequences.

    • Find Out If One of Your Devices Helped Break the Internet

      Security experts have been warning for years that the growing number of unsecured Internet of Things devices would bring a wave of unprecedented and catastrophic cyber attacks. Just last month, a hacker publicly released malware code used in a record-breaking attack that hijacked 1.5 million internet-connected security cameras, refrigerators, and other so-called “smart” devices that were using default usernames and passwords.

      On Friday, the shit finally hit the fan.

    • Once more, with passion: Fingerprints suck as passwords

      Fingerprints aren’t authentication.

      Fingerprints are identity. They are usernames.

      Fingerprints are something public, which is why it should really bother nobody with a sense of security that the FBI used them to unlock seized phones. You’re literally leaving your fingerprints on every object you touch. That makes for an abysmally awful authentication token.

    • Strengthen cyber-security with Linux

      Using open source software is a viable and proven method of combatting cyber-crime

      It’s encouraging to read that the government understands the seriousness of the loss of $81 million dollars via the hacking of Bangladesh Bank, and that a cyber-security agency is going to be formed to prevent further disasters. Currently, information security in each government department is up to the internal IT staff of that department.

    • Canonical announces live kernel patching for Ubuntu

      Canonical, the company behind the Ubuntu GNU/Linux distribution, has announced that it will provide a live kernel patching services for version 16.04 which was released in April.

    • Everything you know about security is wrong

      If I asked everyone to tell me what security is, what do you do about it, and why you do it. I wouldn’t get two answers that were the same. I probably wouldn’t even get two that are similar. Why is this? After recording Episode 9 of the Open Source Security Podcast I co-host, I started thinking about measuring a lot. It came up in the podcast in the context of bug bounties, which get exactly what they measure. But do they measure the right things? I don’t know the answer, nor does it really matter. It’s just important to keep this in mind as in any system, you will get exactly what you measure.

      [...]

      If you have 2000 employees, 200 systems, 4 million lines of code, and 2 security people, that’s clearly a disaster waiting to happen. If you have 20, there may be hope. I have no idea what the proper ratios should be, if you’re willing to share ratios with me I’d love to start collecting data. As I said, I don’t have scientific proof behind this, it’s just something I suspect is true.

    • Home Automation: Coping with Insecurity in the IoT

      Reading Matthew Garret’s exposés of home automation IoT devices makes most engineers think “hell no!” or “over my dead body!”. However, there’s also the siren lure that the ability to program your home, or update its settings from anywhere in the world is phenomenally useful: for instance, the outside lights in my house used to depend on two timers (located about 50m from each other). They were old, loud (to the point the neighbours used to wonder what the buzzing was when they visited) and almost always wrongly set for turning the lights on at sunset. The final precipitating factor for me was the need to replace our thermostat, whose thermistor got so eccentric it started cooling in winter; so away went all the timers and their loud noises and in came a z-wave based home automation system, and the guilty pleasure of having an IoT based home automation system. Now the lights precisely and quietly turn on at sunset and off at 23:00 (adjusting themselves for daylight savings); the thermostat is accessible from my phone, meaning I can adjust it from wherever I happen to be (including Hong Kong airport when I realised I’d forgotten to set it to energy saving mode before we went on holiday). Finally, there’s waking up at 3am to realise your wife has fallen asleep over her book again and being able to turn off her reading light from your alarm clock without having to get out of bed … Automation bliss!

    • Security advisories for Monday
    • Reproducible Builds: week 78 in Stretch cycle
    • Murphy’s Law: The security version

      Since the first of the month, I’ve heard colleagues and others report each of the 10 security variants to Murphy’s Law listed below. Murphy is not only alive but has been reincarnated.

    • Easy-to-exploit rooting flaw puts Linux computers at risk [Ed: The latest CVE is very scary. It’s scary because it has a scary name, a logo, and even a dedicated Web site. Barely anything happened. Should we start assessing the severity of bugs by the investment that goes into their marketing, e.g. site, logo, and scary branding?]
    • Linux has had a huge bug for nine years
    • Linux Bug Could Cause Linux Users to be Hacked in Seconds
    • ‘Dirty Cow’ Linux Vulnerability
    • Linux & Open Source News Of The Week — “Dirty COW” In Linux, JS Foundation, Fedora on RPi And More
    • ‘Dirty COW’ flaw lets hackers gain control of Linux systems every single time
    • Linux Exploit in the Wild; Gives Any User Root Access in Less Than Five Seconds
    • An 11-year old bug is threatening the whole Linux ecosystem. Update now!
    • Linux exploit gives any user full access in five seconds [Ed: Another case of attractive headlines that mislead (need local access, locally exploitable only)]
    • Red Hat Virtualization and Security

      The usage of open source technologies has grown significantly in the public sector. In fact, according to a published memo, open source technologies allow the Department of Defense to “develop and update its software-based capabilities faster than ever, to anticipate new threats and respond to continuously changing requirements”. Cybersecurity threats are on the rise and organizations need to ensure that the software they use in their environments is safe. IT teams need the ability to quickly identify and mitigate breaches. They also need to deploy preventative measures and ensure that all stakeholders are protected.

  • Defence/Aggression

    • Report: Middle East now Finland’s biggest arms export market

      The Middle East has become Finland’s most important market for arms exports. According to a new report by the think tank SaferGlobe Finland, local arms manufacturers sold some 99 million euros of mainly armoured vehicles and mortars in 2015, the bulk of it to countries outside the European Union.

    • ‘Civilization VI’ Found Religion, So I Responded With Genocide

      My glorious Roman Empire ignored religion for too long and it almost destroyed me. While I built roads, raised armies and sought trade deals with nearby city-states and rivals, my neighbor Spain kept to itself, built churches and spread the good word of Protestantism. Which was fine. As the Roman Emperor Trajan, I’d established a religion based on the worship of the mighty turtle and then forgotten about my people’s spiritual needs as I concentrated on getting tanks before my rivals.

      “Foolish Spain,” I thought. “This is a Civilization game. Glory and riches goes to the ruler who builds a spaceport or conquers their rivals. There’s no easy path to victory through the gods.” Then, almost too late, I checked the scorecard and realized Spain was about to declare victory … a religious victory.

      Civilization 6 is very different and much better than its predecessors.

    • Victory over Isis will stream live on Facebook. But defeat won’t

      Some 34 years ago, almost by accident, Britain’s ministry of defence solved the pesky problem that had laid the Pentagon low in Vietnam. What do you do about journalists running wild in your warzone? You put them on a long, slow boat to the other side of the world. You – ahem! – take control.

      And so, from Grenada to Panama to Iraq War One, journalists were locked in little boxes as far from the action as possible before (Iraq Two) being cautiously “embedded” with units they depended on to keep them safe. No freelance trips here. No unwanted questions asked. Control was still the theme of each and every fighting day.

      So what are we to make of Mosul, as Kurds and Iraqis advance on the city via 24/7 streaming on Facebook Live from Al-Jazeera, Channel 4 News and a Kurdish agency? Do we want an emoji on every blast of destruction? “Like”, “like”, “like” the carnage … Is this some sort of macabre computer game?

      You’d expect tabloid foes of Channel 4 News to have a predictable view on that – and they do. The Sun is apocalyptic as usual. But there’s a deeper, continuing theme here. As David Patrikarakos, a specialist on the use of social media in war, blogs for CNN, this battle is about more than just a military defeat of Isis: it’s also about “winning the hearts and minds of the local population” – “it becomes not just a military war, but also a narrative war, in which the latter is arguably more important”.

    • Malta plane crash: All five people on board killed as light aircraft goes down at airport in ‘take-off accident’

      A plane has crashed in Malta, killing all five people on board in the country’s worst peacetime air disaster.

      The light aircraft went down during take-off from Malta International Airport at around 7.20am local time (6.20am BST) on Monday morning.

      A witness told the Times of Malta newspaper the propeller plane suddenly tipped to its right side and “went straight down to the ground”.

    • Appeals Court Says Government Doesn’t Have To Disclose Contents Of Its Secret Terrorist Organization List

      An attempt to force the government to reveal its secret list of terrorist groups has been shot down by the Seventh Circuit Court of Appeals [PDF]. The Heartland Alliance Immigrant Justice Center’s FOIA request for “Tier III” terrorist groups can remain unfulfilled. [h/t Brad Heath]

      Without giving too much away (and neither the court nor the government does), “Tier III” is apparently more nebulous and fluid than tiers I and II.

    • Philippines’ Duterte ends US ties, embraces China

      During his recent visit to China, Philippines President Rodrigo Duterte declared “it’s time to say goodbye” to the United States. The Philippine leader and Chinese President Xi Jinping are getting closer, while Washington now is ignored.

      Duterte spoke to the press in Beijing on Wednesday and his conference coincided with talks of unprecedented agreements, mainly granting the Philippines the use of Scarborough Shoal territories.

      Duterte declared in allusion to Washington, “Your stay in my country was for your own benefit. So time to say goodbye, my friend.”

      “No more American interference. No more American exercises. What for,” Duterte told the Filipino expat community in Beijing.

  • Transparency/Investigative Reporting

    • WikiLeaks, political hacks and the US election

      Is Julian Assange playing a political role, meddling with US electoral affairs, or is WikiLeaks a neutral mouthpiece?

      [...]

      Some say the revelations are valuable information for voters. Others have accused Russia of being behind the hack and argue WikiLeaks is aiding foreign interference in the elections. Julian Assange’s haven, Ecuador, has recently pulled the plug on his internet usage, claiming that interference with other countries’ electoral processes is against their policies.

      Putting aside the agendas of all the players involved, one institution comes out undeniably sullied by the publication of the emails: the US news media. While some of the emails released presented typical behaviours, with the Clinton campaign reaching out to particular publications with stories, others are more problematic.

    • Greenpeace, others sought US intervention after action by India: Wikileaks

      Environmental groups such as Greenpeace and other international NGOs working in India had sought US government intervention after their funding came under increased scrutiny of the Modi government, according to emails released by the Wikileaks.

      The emails, hacked from the email account of John Podesta, who is the chairman of the Clinton Campaign, also indicates the global funding links of these NGOs, including those environmental groups opposing a massive mining project in Australia being undertaken by the Adani Group.

    • How To Help Defend WikiLeaks

      As I said at the start, this is just one example of media spreading lies about Julian Assange and WikiLeaks. It happens every day, all round the world. WikiLeaks represents a serious threat to the status quo, exposing the corruption of politicians and corporations. They are constantly targeted by journalists who choose to act as stenographers and gate-keepers of power. While these so-called journalists survive in their jobs at the mercy of the boardroom, WikiLeaks is 100% funded by people like you and me. Please help keep them strong.

  • Environment/Energy/Wildlife/Nature

    • A Hotter World Is Poorer and More Violent

      What will a planet plagued by escalating climate change look like? No one really knows. But speaking at EmTech MIT 2016, Solomon Hsiang, a professor of public policy at the University of California, Berkeley, presented results based on his recent analysis of economic and climate data that begin to more clearly define what the world might look like as it gets hotter.

    • Feeling Paleolithic? We’re On The Way Back In Time.

      Further south, about 40% of USAians apparently support Trump and his denial of global warming so I expect it will take another generation suffering even larger effects before real action is taken.

  • Finance

    • Tens of Thousands Protest TTIP, CETA Across Europe

      An estimated 8,000 people hit the streets in Paris, chanting against police brutality, labor reform, deportations and airport construction in Nantes that will displace dozens of farmers. The converged on the site of Nuit Debout protests, an occupation that lasted months against pro-business labor reforms and drew direct parallels with Occupy Wall Street and the Indignados.

      Tens of thousands also rallied across Spain, Belgium, Germany and other countries that will be affected by the deals.

    • Canada’s two Trump towers facing troubles

      In Vancouver, the developer of a new Trump Tower has been under pressure for months to drop the Republican presidential candidate’s name from the project. Meanwhile, the Trump Tower in Toronto is the subject of a lawsuit after facing years of controversy.

      Donald Trump’s controversial run for US president is having an impact on his businesses in Canada and knock-on effects for those who have partnered with his brand.

      The opening date for the Vancouver hotel has been delayed until 2017, well after November’s US election. A contest offering a chance to meet with the Trump family for the grand opening caused a stir.

      Across the country, the Toronto building, which opened in 2012, has been the target of a lawsuit by small investors who claim they were misled into buying into the project. Its developer, Talon Development Inc, has tried to remove the Trump name from the troubled hotel and condominium complex.

      The story is similar in other countries.

    • Bulgarian expert: CETA to lead to loss of jobs, domination of big business, and countries like Bulgaria to be most affected

      “The EU-Canada Comprehensive Economic and Trade Agreement (CETA) is in fact a political agreement that will decrease the value of European democracy.”

      This is what economist Professor Boyan Durankev said speaking for Radio FOCUS.

      In his words, there are too serious concerns that the agreement will lead to loss of jobs, lower standards in the ecology, domination of the big business, while the countries like Bulgaria will be most affected.

    • Wallonia’s red card for CETA is a chance for the EU to be a beacon to the world

      We are at a crossroads for international trade policy. The failure of TTIP and CETA would pave the way for a fairer and more democratic world, argues Paul de Clerck.

      Paul de Clerck is the economic justice programme coordinator for Friends of the Earth Europe.

      The European Union, the world’s biggest trading bloc, is, for the second time in a matter of months, on the verge of seeing one of its mega trade deals fall into disarray.

      If the objections of several regions in Belgium are upheld, the signing of the Comprehensive Economic and Trade Agreement (CETA) with Canada planned for next week will most likely be cancelled. This follows the near collapse of TTIP, the EU’s proposed agreement with the US. Rather than despairing at the state of the EU, we should see how these developments provide a unique opportunity for the EU to take the lead in shaping new trade regimes for the future that are beneficial for people and the environment.

      The opposition to CETA and TTIP has been unprecedented in the history of the EU. Concerns have been expressed by millions of people across the continent, including lawyers, academics, political parties, local authorities and virtually all sectors of civil society. Many governments have also expressed reservations on CETA. Only the Walloons, however, had the guts to show it the red card.

    • Trade Deals and the Paris Climate Agreement

      The Paris Climate Agreement is now a reality. More than 55 countries representing over 55 percent of global greenhouse gas emissions have ratified the pact, which means the historic agreement is set to enter into force faster than was ever anticipated. As we celebrate this landmark and get ready to grapple with the next steps of how to implement it—a key topic of discussion at COP 22, the upcoming international climate conference in Marrakesh, Morocco—the U.S. Congress may soon vote on the massive Trans-Pacific Partnership (TPP) with 11 other countries, and the administration continues to negotiate the Transatlantic Trade and Investment Partnership (TTIP) with the European Union.

  • AstroTurf/Lobbying/Politics

    • Clinton’s WikiLeaks strategy: Doubt, delay, distract

      The emails are full of potential damage for Hillary Clinton. She weighed the political implications of policies. She is close to Wall Street. Her aides gathered information to discredit a woman who’d accused her husband of rape.

      So how has she so far remained largely unscathed by the unprecedented release of hacked emails? It’s one part a deliberate strategy of casting doubt on the authenticity and distracting from the content of the emails, one part fatigue by Americans who already have seen tens of thousands of Clinton’s emails and one part a whole lot of luck.

      With Clinton leading in both national polls and battleground-state surveys, the Democrat is in some ways trying to run out the clock on the election.

      The WikiLeaks emails do threaten to reinforce voter doubts about Clinton’s honesty. But her strategy – refuse to confirm the authenticity of the emails, blame Russia for the hack and say little else – has so far successfully defused the impact by avoiding any talk that would keep voters looking at the content of the messages. Her undisciplined opponent has taken care of the rest.

      “When you start explaining, you’re in trouble,” said G. Terry Madonna, the director of the Franklin & Marshall College poll in Pennsylvania. “They are handling it the best way they can. It’s about as an effective argument you can make.”

    • Donna Brazile Complains She’s Being ‘Persecuted’ Over Leak To Clinton Campaign [VIDEO]

      Democratic National Committee chairwoman Donna Brazile complained during an interview on Wednesday that she is being “persecuted” by being asked questions about leaking a town hall question to the Clinton campaign.

      And during the interview, conducted on Fox News after the presidential debate, Brazile said that her interviewer, Megyn Kelly, was “like a thief” because her questions cited emails that were stolen from Clinton campaign chairman John Podesta and released by Wikileaks.

      Kelly grilled Brazile, who was a CNN and ABC News contributor prior to taking over the DNC in July, about an email revealed by Wikileaks showing her providing a tip about a March 13 town hall question to the Clinton campaign.

    • Green Party’s Baraka: Obama has been ‘moral disaster’

      Voters who want to fight against racial profiling, human rights violations, war and the two-party system should cast their ballots for the Green Party, vice presidential nominee Ajamu Baraka said Tuesday.

      Baraka, Green Party presidential candidate Jill Stein’s running mate and a self-described socialist from Atlanta, spoke to about 55 people at Wayne State University in a campaign stop. A Glengariff Group poll released last week to The Detroit News and WDIV showed the Green Party ticket receiving 4.6 percent of support from 600 likely Michigan voters, trailing Democrat Hillary Clinton, Republican Donald Trump and Libertarian Gary Johnson.

      A Stein-Baraka presidency, he said, would be focused on using executive powers to create an “emergency jobs bill” to address inner cities and rural areas, notify the “right-wing” government in Israel “that we’re no longer going to allow for them to have unfettered freedom to expand settlements and undermine the rights to Palestinians” and reverse the attempt at regime change in Syria.

    • Your Vote For Jill Stein Is Not A Wasted Vote

      When Jill Stein ran as the Green Party’s presidential nominee in 2012, media attention to her candidacy was rare. Now, with two of the most unpopular presidential candidates in history, she has received widespread attention. There seems to be record interest in third party campaigns, including Libertarian Party candidate Gary Johnson.

      The Nation published a debate between Socialist Seattle City Council member Kshama Sawant and Nation contributor Joshua Holland.

      The editors gave Sawant’s column the negative headline—”Don’t Waste Your Vote On the Corporate Agenda—Vote for Jill Stein and the Greens”—but column does not hinge on loathing Donald Trump or Hillary Clinton. Rather, it makes a positive case for supporting Stein by primarily arguing the need for progressives to build an alternative to the two pro-capitalist political parties in America. It has a long-term focus on bringing about radical change.

    • Clinton Ally Aided Campaign of FBI Official’s Wife

      The political organization of Virginia Gov. Terry McAuliffe, an influential Democrat with longstanding ties to Bill and Hillary Clinton, gave nearly $500,000 to the election campaign of the wife of an official at the Federal Bureau of Investigation who later helped oversee the investigation into Mrs. Clinton’s email use.

    • And the winner is … crony capitalism: Choosing between Hillary Clinton and Donald Trump is no choice at all

      It is as Bernie Sanders has foreseen it, you might say.

      With its publication of thousands of less-than-flattering emails from Clinton campaign chairman John Podesta over the past two weeks, Wikileaks has done much to undermine Hillary Clinton in her ongoing effort to appeal to millennials who see Washington as a corrupt town where big business and big government are deeply intertwined.

      Excerpts from various six-figure speeches that Clinton made in 2013 and 2014 reveal a politician who is not only quite friendly with Wall Street in private, but somewhat resentful of the American public for constantly attacking and scapegoating big banks for the financial crisis.

      “The people who know the industry better than anybody are the people who work in the industry,” said Clinton in one speech. Reform, she continued, “really has to come from the industry itself.” In another speech, Clinton stated that you have to have “both a public and a private position,” which has cast further doubt on her trustworthiness among young voters.

    • WikiLeaks reveals Clinton considered a Texas Republican for the Supreme Court

      Hours after conservative Supreme Court justice Antonin Scalia passed away, the Clinton campaign floated a Texan as a possible replacement.

      Wallace Jefferson, a former chief justice on the Texas Supreme Court, was the subject of an email titled “Scalia replacement” written by the president of a George Soros-backed grant-making organization.

      “Remember our discussion of Wallace Jefferson, Chief Justice in Texas?” said Open Society Foundations president Chris Stone in the email.

      “Yup,” replied Clinton campaign chief John Podesta.

      The hacked email was one of thousands released by WikiLeaks in recent weeks and the authenticity of the email could not be independently confirmed. The Clinton campaign declined to confirm the authenticity of the email mentioning Jefferson.

    • TYT’s Jimmy Dore: Democrats Are Restarting The Cold War To Hide From WikiLeaks

      Jimmy Dore, host of ‘Aggressive Progressives’ on ‘The Young Turks’ network, says he is disappointed to see the Democratic Party using Russia as a scapegoat for the information revealed by WikiLeaks.

      “This is a complete distraction,” he said about the DNC’s pivot to blaming Russia for WikiLeaks. “I hate that it is the Democrats now. We now have two parties of war. And now the Democrats are saber-rattling and building up a boogie-man in Putin, instead of what they should be doing, saying we both have a common enemy: ISIS. Let’s join hands and work to defeat them. That’s not what they’re doing because it makes more political sense for the Democrats to ratchet it up, to ratchet up the Cold War, which is what they’re doing now.”

      “By the way, when the [Berlin] Wall went down, Reagan assured them that we would not expand NATO, and we’re expanding NATO,” he said. “So we are the ones right now, we are the expanders… This McCarthyism that they’re trying to smear Trump with. There’s so much, you don’t have to smear that guy. But Trump has said he wanted to work with Putin to fight ISIS, while Hillary Clinton has called for a no-fly zone in Syria, which means dead people on the ground, and boots on the ground. And who are we going to shoot down? ISIS doesn’t have any planes. That means a war with Russia. This is beating the drums for war, in fact.”

      “I’m bothered by this more than anything: A lot of people are saying that we’re closer to nuclear war now than we ever were during the Cold War,” Dore said.

    • The media — and many Democrats — need to stop attacking Jill Stein unfairly

      There is both a principled and strategic component to voting choices in presidential elections. In principle, citizens should cast their votes for whichever candidate’s views align most with their own. Strategic voting, on the other hand, includes a voter’s assessment of the probability that various voting choices will lead to desired outcomes.

      These components are related to some degree; voters are more likely to agree about which candidate to vote for if they agree in principle on which candidate is best. Yet principled and strategic voting are not the same. One might believe a third-party candidate to be optimal, for example, but still vote for a major party candidate because of the higher probability that the major party candidate will win the election.

      This decision can be a self-fulfilling prophecy —third-party candidates would be more electable if their supporters decided to vote for them — but it can also be rational, depending on how one evaluates the differences between major party candidates and the downside risk to voting for a bad nominee.

    • Wasserman Schultz Tells Sanders Protesters Dems Are ‘Completely United’

      Disgraced former Democratic National Committee (DNC) Chair Debbie Wasserman Schultz has mostly attempted to avoid the spotlight after her resignation in the wake of emails released by WikiLeaks.

      Throughout the primaries, Wasserman Schultz was viewed unfavorably by Bernie Sanders supporters for overtly favoring Hillary Clinton, despite the DNC charter stipulating her and fellow DNC staff remain neutral to ensure a fair and balanced primary election. When indefensible evidence exposed the pro-Clinton environment at the DNC that Wasserman Schultz created, she and several other top DNC leaders were forced to resign—but there were almost no repercussions or changes made as a result of these resignations.

      Instead, Clinton immediately hired Wasserman Schultz as honorary chair of the Clinton campaign’s 50-state program, while President Obama, VP Joe Biden, and other establishment Democrats made unprecedented appearances to help Wasserman Schultz survive her re-election bid to Congress. Another Clinton surrogate, Donna Brazile, was appointed interim DNC chair to take Wasserman Schultz’s place.

      [...]

      However, Sanders supporters refuse to forget Wasserman Schultz’s role in rigging the primaries, and made sure to demonstrate that they wouldn’t let her off the hook as easily as the Democratic Party had.

      Around 20 Sanders protesters showed up with signs outside the event in contrast to the 50 or 60 Clinton supporters attending the inside. A few minutes into Wasserman Schultz’s speech, the protesters interrupted her, at which point the regional organizing director for the Florida Democratic Party and former field organizer for Clinton campaign, Omar Rashid, ran up to one of the two protesters and began yelling “Hillary” while fist pumping in their face face. Other Clinton supporters joined in the “Hillary” chant. While there are several constructive ways to de-escalate an interruption by protesters, this certainly wasn’t one of them.

  • Censorship/Free Speech

  • Privacy/Surveillance

    • NSA Says Federal Cyber Strategy Needs More NSA More Often, And On The Information Sharing Ground Floor

      The NSA doesn’t like the fact that it didn’t get a big enough slice of the tax-dollar-grabbing cyber pie. After much discussion about which agencies would oversee what aspects of the US government’s cyberwar defense systems, the NSA — despite all of its computing power and hoarded exploits — ended up with the unenviable task of protecting the home turf rather than engaging in more offensive maneuvers.

    • Taxpayer-funded grants to NZ tech firm used to build surveillance equipment for UK government

      Taxpayer-funded grants to a private New Zealand tech firm were used to build mass surveillance equipment for Britain’s largest intelligence agency, the Government Communications Headquarters (GCHQ).

    • ‘Germany kowtowing to NSA & US to amplify spying capabilities across Europe’

      Annie Machon is a former intelligence officer for MI5, the UK Security Service, who resigned in the late 1990s to blow the whistle on the spies’ incompetence and crimes with her ex-partner, David Shayler.

    • German spy law infringing privacy rights: Expert

      The German parliament has approved a controversial legislation to tighten the oversight of the BND spy agency amid criticism that the law violates the privacy rights of people.

    • UK spy agency GCHQ paid NZ firm Endace to power Internet fiber-optic taps

      The 2013 Snowden documents revealed UK intelligence agency GCHQ to be tapping into the undersea cables that carry Internet traffic, covertly gathering vast amounts of digital comms data under a surveillance program code-named Tempora — apparently with the help of commercial partners.

      Now leaked documents obtained by The Intercept confirm GCHQ paid New Zealand-based Endace to create data capture systems to enable it to tap high speed Internet traffic.

    • The Little-Known Company That Enables Worldwide Mass Surveillance

      It was a powerful piece of technology created for an important customer. The Medusa system, named after the mythical Greek monster with snakes instead of hair, had one main purpose: to vacuum up vast quantities of internet data at an astonishing speed.

      The technology was designed by Endace, a little-known New Zealand company. And the important customer was the British electronic eavesdropping agency, Government Communications Headquarters, or GCHQ.

      Dozens of internal documents and emails from Endace, obtained by The Intercept and reported in cooperation with Television New Zealand, reveal the firm’s key role helping governments across the world harvest vast amounts of information on people’s private emails, online chats, social media conversations, and internet browsing histories.

      The leaked files, which were provided by a source through SecureDrop, show that Endace listed a Moroccan security agency implicated in torture as one of its customers. They also indicate that the company sold its surveillance gear to more than half a dozen other government agencies, including in the United States, Israel, Denmark, Australia, Canada, Spain, and India.

    • China’s plan to organize its society relies on ‘big data’ to rate everyone

      How China tamed the Internet |This is part of a series examining the impact of China’s Great Firewall, a mechanism of Internet censorship and surveillance that affects nearly 700 million users.

  • Civil Rights/Policing

    • Pardon the American Taliban

      In the mid-1960s a young American teacher in a small central African country became involved with a group of political rebels — former government ministers mostly — who had been active in the struggle for independence. They had fallen out with the authoritarian prime minister, objecting to his dictatorial style. The country was newly independent, hardly a year old. The men advocated democratic elections and feared that the prime minister would declare himself leader for life in a one-party state.

      Fluent in the local language, obscure because he was a teacher in a bush school, and easily able to travel in and out of the country on his United States passport, the American performed various favors for the rebels, small rescues for their families, money transfers, and in one effort drove a car over 2,000 miles on back roads to Uganda to deliver the vehicle to one of the dissidents in exile. On that visit he was asked to bring a message back to the country. He did so, without understanding its implications. It was a cryptic order to activate a plot to assassinate the intransigent prime minister.

    • Shailene Woodley: The Truth About My Arrest

      I was arrested on Oct. 10, on Indigenous Peoples’ Day, a holiday where America is meant to celebrate the indigenous people of North America.

      I was in North Dakota, standing in solidarity, side-by-side with a group of over 200 water protectors, people who are fighting the Dakota Access Pipeline.

      People who carry a rainbow of colors on their skin. People who gathered together because they realize that if we don’t begin taking genuine steps to protect our precious resources—our soil, our water, our essential elements—we will not have a healthy or thriving planet to pass on to future generations.

    • Actor Shailene Woodley on Her Arrest, Strip Search and Dakota Access Pipeline Resistance

      At least 27 people, including Hollywood actress Shailene Woodley, were arrested during the Standoff at Standing Rock on October 10, Indigenous Peoples’ Day, while attempting to blockade the Dakota Access pipeline construction at two separate worksites. Footage of Woodley’s arrest was streamed live to roughly 40,000 viewers on her Facebook page. She was later strip-searched in jail. She says her dedication to protest with indigenous people who are at the forefront of the fight remains strong: “Every time we allow another pipeline … we are endorsing the fossil fuel industry and only prolonging the time it is going to take to switch to renewable energy.” Woodley recently starred in the new Edward Snowden film, “Snowden.” She has appeared in the TV series “The Secret Life of the American Teenager” and has also starred in films including “The Divergent Series” and “The Fault in Our Stars.” She received a Golden Globe nomination for her role as Alex King in “The Descendants.”

    • RIP Gavin MacFadyen, 1940-2016

      Courage founding Trustee and Centre for Investigative Journalism founder and director Gavin MacFadyen has passed away at the age of 76, after a few months of illness.

      Gavin devoted his life to independent, investigative journalism, exposing truths, challenging power and championing truthtellers at every turn. Gavin championed the rights and principles of the persecuted, even when it was controversial to do so. He supported WikiLeaks when it was targeted by US prosecutors and he cofounded Courage, to assist those most in danger for shining a light on the powerful.

    • 105 British MPs call on Obama to stop Lauri Love’s extradition

      A cross-party coalition of 105 backbench Members of Parliament have signed a letter asking US President Barack Obama to withdraw the extradition requests for British activist Lauri Love before he leaves office.

      The letter, whose initial signatories were David Burrowes MP, Barry Sheerman MP and Alistair Carmichael MP, has been signed by more than a fifth of the Parliamentarians able to do so. By convention, government ministers and their opposition shadows do not sign letters of this type, although Culture Minister Matt Hancock MP – the Love family’s local constituency MP – has also added his name to the appeal.

      The 105 signatories demonstrate strong opposition to Lauri Love’s extradition across the political spectrum. The letter has been signed by 39 Conservative MPs, 39 MPs from Labour, 22 MPs from the Scottish National Party, three Liberal Democrat MPs, Mark Durkin MP from the SDLP and Green MP Caroline Lucas.

    • UN Meeting Looks At Legally Binding Instrument On Corporations And Human Rights

      A gathering at the United Nations in Geneva this week is hearing a litany of views on a prospective legally binding international instrument to regulate within human rights law the activities of transnational corporations and other businesses. The meeting is being webcast live.

    • Judge Orders FBI To Turn Over Information On How Many People Around The World It Snagged With Its Playpen NIT

      This might be big, depending on how much of this information is passed on to the general public, rather than delivered ex parte or under seal. Joseph Cox of Vice/Motherboard was the first to snag this ruling [PDF] by a Washington district court judge ordering the FBI to turn over tons of info about the NIT it deployed in the Playpen child porn investigation.

      As we’re already aware, the NIT was deployed by the FBI in Virginia but obtained identifying information about Tor-cloaked site visitors not just all over this country, but all over the world. The motion to compel discovery asked for several details about the NIT and its deployment and most of them have been granted.

  • Internet Policy/Net Neutrality

    • AT&T Doubles Down on the Ampersand [Ed: zero-rating. Shame on AT&T.]

      But even beyond this ad campaign, AT&T is talking up the value of getting this and that, and on the consumer side this has its most concrete instantiation in what AT&T has done with DirecTV since the merger. This isn’t just about traditional bundling and the discounts that come with it, but about additional benefits you get when you bundle. The two main examples are the availability of unlimited data to those who bundle AT&T and DirecTV, and the zero-rating of data for DirecTV content on AT&T wireless networks. Yes, AT&T argues, you can watch DirecTV content on any device on any network, but when you watch it on the AT&T network it’s free. The specific slogan here was “All your channels on all your devices, data free when you have AT&T”.

    • AT&T’s $85 Billion Time Warner Buy Could Be An Anti-Consumer Shit Show Of Monumental Proportions

      As fixed and wireless broadband growth crawls to a halt and cord cutting begins to hammer TV numbers, incumbent telecom giants have been trying to pivot into the media and advertising game with mixed results. Verizon so far has shelled out billions to acquire aging 90s internet brands Yahoo and AOL, believing this can somehow transform the stodgy duopolist into a sexy, sleeker Facebook and Google competitor. So far these efforts to woo Millennials have been arguably underwhelming and occassionally comical, highlighting how innovation and disruption is somewhat foreign to these companies’ DNA.

      AT&T has decided to follow a similar tack, over the weekend announcing a mammoth $85 billion deal to acquire Time Warner (not to be confused with Time Warner Cable) and its media properties (CNN, HBO). AT&T was quick to proclaim that the deal would be a “perfect match of two companies with complementary strengths,” who can bring a “fresh approach to how the media and communications industry works for customers, content creators, distributors and advertisers.” The deal comes not too long after AT&T decided to spend $79 billion to acquire DirecTV, adding notable debt for the already giant company.

    • VIDEOS: AT&T to acquire Time Warner for US$85 billion in major media/comms shakeup

      Remember when AT&T was broken up in the US? Whether you do, or don’t, AT&T is on the verge of becoming the most powerful telco and media organisation in the world.

      It’s the stuff of Telstra’s dreams: a telco servicing a population of more than 300 million, with enough clout and earnings to support a US$85 billion buyout of Time Warner – and that’s after spending US$49 billion to buy DirecTV.

      Talk about relegating dumb pipes to the dustbin of history, AT&T wants to own the content, create it, serve it, charge for it and everything in between and beyond.

      Telstra’s half share of Foxtel looks like a tiny molehill against AT&T’s Everest-size mountain in comparison.

    • Dumb & Dumber Claims About Last Week’s Internet Attack (SOPA?!? Really?)

      As you know, last week, large chunks of the internet spent hours writhing on the ground and totally inaccessible thanks to a giant DDoS attack that appears to have been launched via a botnet involving insecure DVR hardware (which can’t be patched — but that’s another post for later). Of course, whenever this kind of thing happens, you know that some people on the politics side of things are going to come up with dumb responses, but there were some real whoppers on Friday. I’m going to focus on just two, because I honestly can’t decide which one of these is dumber. I’ll discuss each of them, and then you guys can vote and let us know: which of these is dumber.

      First up, we’ve got Marsha Blackburn, who is not just a member of Congress, but (incredibly) on the House Subcommittee on Communications and Technology, which is often considered to the subcommittee that handles internet related issues. We’ve written about her quite a few times before, highlighting her efforts to block broadband competition and gut net neutrality. She’s also argued that fair use is just a buzzword and we need stronger copyright laws. Not surprisingly, she was one of the most vocal supporters of SOPA who only finally agreed to dump the bill days after the giant online protest.

      And apparently she’s still upset about all that.

      On Friday she went on CNN to discuss a variety of things, and the first question from Wolf Blitzer was about the DDoS attacks, and her answer is the sort of nonsense word salad that is becoming all too common in politics these days, but where she appears to suggest that if we’d passed SOPA this kind of attack wouldn’t have happened. She’s not just wrong, she’s incredibly clueless.

    • Chinese Company Recalls Cameras, DVRs Used In Last Week’s Massive DDoS Attack

      For some time now, security researchers have been warning that our lackadaisical approach to Internet of Things security would soon be coming home to roost. Initially it was kind of funny to read how “smart” fridges, tea kettles and Barbie dolls did an arguably worse job than their dumb counterparts with a greater risk to privacy and security. But as we collectively realized that these devices not only created millions of new home and business attack vectors, but could also be used to wage historically-unprecedented DDoS attacks, things quickly became less amusing.

      Last week, the theoretical became very real with the massive attack on DNS provider DYN, which knocked a swath of companies and services off the internet for a large portion of Friday. In a piece discussing the attack over at Flashpoint, the security firm (which worked with Akamai to help DYN) notes that the DDoS was indeed thanks to compromised IoT devices, and the Mirai botnet malware recently released to make compromising and harnessing such devices easier than ever. But the group also notes that targeted devices included everything from cameras to…

  • Intellectual Monopolies

    • IP Rights, Corporate Interests Threaten Small Farmers’ Right To Seeds, Biodiversity

      A new report by civil society groups defending the right to food and nutrition lays bare threats to seeds and biodiversity created by intellectual property rights, and calls for states to respect their human right obligations to protect small farmers’ right to seeds and food security.

    • Freedom To Utilize Genetic Resources? The Nagoya Protocol Two Years Later

      Two years ago this month, the Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits from their Utilization to the Convention on Biological Diversity (“Protocol”) entered into international force. To date, 87 countries have ratified or acceded to the agreement, and that number is expected to reach 100 by the end of this year. With its entry into force, the Protocol is ushering in a new international system to govern research, development and intellectual property rights surrounding a potentially vast array of products derived from non-human genetic resources. Those products include, among others, pharmaceuticals, products of synthetic biology and biotechnology, seeds, biocides, horticultural and microbiome products, nutritionals, supplements, cosmetics, perfumes, fragrances and industrial enzymes.

    • Copyrights

      • US Copyright Office: Pallante Moved To Digital Strategy Advisor; Search On For New Register

        The United States Copyright Office Register of Copyrights Maria Pallante has changed roles to become senior advisor for digital strategy. In her place, Karyn Temple Claggett will move up to serve as acting register of copyrights while a search is conducted for the next permanent register.

        The announcement, available here, was made on 21 October by the US Librarian of Congress Carla Hayden.

        A news report suggested Pallante was asked to step down and was locked out of the Library of Congress computer system on 21 October. At press time, details on that assertion were unconfirmed, but the official press release gives little indication of a problem.

      • iKeepSafe Inadvertently Gives Students a Valuable Lesson in Creators’ Rights

        In partnership with pro-copyright group Creative Future, iKeepSafe has launched a competition asking students to submit projects that promote the creation and ethical sharing of content. Whether kids will take the time to read the small print is debatable, but doing so will provide a valuable lesson in getting a fair price for creative works.

        Children and students of all kinds are some of the most valuable assets to society. After all, they’re literally the future of the planet. As a result, hundreds of groups around the world dedicate themselves to protecting their interests, from general welfare and healthcare to Internet safety.

      • US acting register of copyrights announced as Pallante takes new role

        Maria Pallante has been appointed senior adviser for digital strategy by the Librarian of Congress after serving as register of copyright since 2011, with Karyn Temple Claggett appointed acting register of copyrights

      • The new French law targeting “automated image referencing services”: does EU law allow it?

        As explained by Brad Spitz in a post published on the Kluwer Copyright Blog, “the new provisions will apply to ‘automated image search services’, which Article L.136-1 IPC defines as any online public communication service that reproduces and makes available to the public for purposes of indexing and SEO, plastic, graphic or photographic works, collected in an automated way from online public communication services (i.e. internet websites). In other words, these provisions target search engine services like Google Images.”

]]>
http://techrights.org/2016/10/24/linux-4-9-rc2/feed/ 0
Links 12/10/2016: Ansible Galaxy is Free Software, FreeBSD 11 Released http://techrights.org/2016/10/12/freebsd-11-released/ http://techrights.org/2016/10/12/freebsd-11-released/#comments Wed, 12 Oct 2016 18:45:15 +0000 http://techrights.org/?p=96059

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • The 5 most common support issues for open source developers

    What is the number one factor that software developers consider when choosing which open source software packages to use? A recent survey conducted by Rogue Wave Software says support. What is the second most important factor? Who will carry the burden of providing that support.

    Between developers, a dedicated internal open source software (OSS) support team, an internal IT department, and contractors (or an OSS support vendor) an unsurprising 67% of developers in the survey said they are expected to be responsible for support. We also analyzed 34,000 internal support requests to glean additional insights.

  • MOD Duo: Building an open source guitar stomp box

    Some time ago the MOD Duo jumped onto my radar. In a nutshell, it is a guitar stomp box that comes loaded with different effects and sounds. Instead of buying the multitude of guitar pedals that many musicians string together in complex, if somewhat beautiful ways, the MOD Duo negates all that. It is a single box and what’s more, it is powered by open source.

  • 27 Open Source DevOps Tools In 7 Easy Bites

    I recently wrote an article featuring 25 DevOps vendors worth watching. However, in the world of DevOps, there are an awful lot of good tools that don’t really have a vendor attached, and I thought it was time to give the open source tools their due.

    While I wrote that there are tools that don’t have vendors, there are vendors that are attached to some of these open source tools. Those vendors provide development support, along with, in some cases, customer support and even proprietary versions of some of the tools that exist alongside their open source cousins. As long as there was an open source version that wasn’t “crippleware,” it was eligible for the cut.

  • Apache Milagro: A New Security System for the Future of the Web

    With 25 billion new devices set to hit the Internet by 2025, the need for a better worldwide cryptosystem for securing information is paramount. That’s why the Apache Milagro project is currently incubating at the Apache Software Foundation. It’s a collaboration between MIRACL and Nippon Telegram and Telegraph (NTT), and Brian Spector, MIRACL CEO and Co-Founder, discussed the project in his keynote at ApacheCon in May.

    Spector said the project was born in a bar on the back of a napkin after a brainstorm about how one would rebuild Internet security from the ground up. That sounds like a lot of work, but Spector believes it’s absolutely necessary: the future of the Web is going to be very different from the past.

  • Flanders to publish soil erosion monitoring tool

    The new method, now used by 5 soil erosion specialists, is based on well-known open source Geographic Information Systems (GIS) tools, including the data viewing tool QGis and the Geospatial Data Abstraction Library. “QGis is the perfect platform for building GIS applications”, Huybrechts said at the FOSS4G 2016 conference in Bonn last August. “It’s open source, it is supported by a great community and it comes with a collection of tools and toolkits.”

  • DE radiation protection agency overcomes lock-in

    Germany’s Federal Office for Radiation Protection (Bundesamt für Strahlenschutz, BfS) is taking steps to rid itself of IT vendor lock-in. Within the next few years, it plans to have replaced its legacy proprietary analysis and reporting tools by modern, open source-based tools. Moreover, the new system, which is being tested, will improve the geographic information capabilities, and will lower costs significantly.

    The radiation protection agency was in set up in 1989, three years after the catastrophic nuclear accident in Chernobyl. Its main task is to protect population and environment from damages due to radiation.

    To help with decision-making and with generating of reports, the BfS’ crisis unit has for years been using a customised, proprietary software solution. This ‘Integrated Measuring and Information System’ (IMIS) lets BfS make sense of the data generated by some 1800 radiation measuring stations across the country. IMIS continuously monitors the environment and is able to detect small changes in radioactivity. Its results are merged, evaluated, refined and presented in well-arranged documents.

  • Pieter Alexander Hintjens: 3 December 1962 – 4 October 2016

    After a long and painful illness, a battle with cancer over the last six years, my brother has died in Brussels, aged only 53.

    My love for him has always been the adoring, muted kind that looked up to the light he shone, that basked in his enthusiasm and tried, and failed, to keep up with the thousand-and-one ideas he gave voice and form to. Many of his passions were beyond my comprehension but very real, nevertheless. As a computer programmer, writer of internet protocols and founder of on-line communities, his interests went way over my head. As an author, latterly, we connected and I was able to collaborate with him on one of his books – The Psychopath Code – an involvement for which I am profoundly grateful: Not only has this particular book helped me to navigate a few tricky moments in my own life, but the understanding we shared was like coming home.

    I can’t begin to do justice to my brother’s legacy as a professional innovator, thinker, and networker. Pieter was one of these rare people totally unafraid to take chances, to think not just outside the box but into the next universe. How he maintained his enthusiasm and energy, where his inspiration came from, I shall not know in this lifetime.

    His death last Tuesday has opened up a hole in my life, a tear in the fabric of my normal. Poignantly – and painfully – it is only as his legacy becomes clearer that I notice the loss of his quiet, determined contribution in my life. Always, in the background, he encouraged me, supporting my modest hopes for an ordinary life: my ambitions to study, to write, to marry and have a child. In all these attempts he was unwaveringly supportive, while seeking so little from me in return. Of course, elder brothers are looked up to, and often expected to take the lead. But lately, in these last few years, while he faced pain and uncertainty – about which he has written so candidly on his blog – while he battled fear and the shadows of disappointment with his trademark wry humour, he faced these challenges fearlessly and with a fiery determination that is frankly awe-inspiring.

  • Software AG Launches Open Source Internet of Things Analytics Kit

    Software AG (Frankfurt TecDAX: SOW) has significantly expanded the capabilities of its Apama Community Edition with a new Internet of Things (IoT) Analytics Kit, provided free of charge as Open Source Software under the Apache License, v2.0, along with the ability to run on Raspberry Pi. A different version of Apama Community Edition is also now available as a re-distributable runtime.

  • PhatWare Releases WritePad Handwriting Recognition Engine as Open Source

    PhatWare Corporation, a leading professional software and application developer, is pleased to announce that the entire source code of its award-winning, multilingual WritePad handwriting recognition engine is now available under GPL v.3 license.

  • Events

    • Announcing Google Code-in 2016 and Google Summer of Code 2017

      The Google Open Source Programs Office has announced Google Code-in 2016 and Google Summer of Code 2017. Google Code-in is for students from 13-17 years of age who would like to explore open source. “Students will find opportunities to learn and get hands on experience with tasks from a range of categories. This structure allows students to stretch themselves as they take on increasingly more challenging tasks.” Students will begin on November 28.

  • Web Browsers

    • Mozilla

      • Maker Party 2016: Stand Up for a Better Internet

        Each year, Mozilla hosts a global celebration to inspire learning and making online. Individuals from around the world are invited. It’s an opportunity for artists to connect with educators; for activists to trade ideas with coders; and for entrepreneurs to chat with makers.

        This year, we’re coming together with that same spirit, and also with a mission: To challenge outdated copyright laws in the European Union. EU copyright laws are at odds with learning and making online. Their restrictive nature undermines creativity, imagination, and free expression across the continent. Mozilla’s Denelle Dixon-Thayer wrote about the details in her recent blog post.

  • SaaS/Back End

    • Cloudera Accelerates Portfolio of Self-Paced Big Data Training Courses
    • Survey Finds OpenStack Deeply Entrenched in the Telecom Space

      What percentage of players in the telecom industry now consider the OpenStack cloud platform to be essential or important to their success? According to a survey commissioned by the OpenStack Foundation, a whopping 85.8 percent of them do. That is more hard evidence that we are seeing actual deployments take the place of evaluation when it comes to OpenStack in the enterprise.

      The survey was executed by Heavy Reading and received 113 responses from representatives of telecom companies around the world: 54 percent from the US, 14.2 percent from Europe, 11.5 percent from the Asia Pacific region, 8.9 percent each from Central/South America and Canada; and 2.7 percent from the Middle East. Here are more of the key findings.

    • Recognizing active user contributors to OpenStack

      Within the OpenStack community, there are countless people conducting tests, maintaining infrastructure, writing documentation, organizing community events, providing feedback, helping with project promotion, and countless other roles that may or may not show up under the traditional list of contributors. Since a fundamental tenant of OpenStack is that much of the project’s governance comes from its active contributors, finding a way to expand the types of contributions that are “officially” recognized is an important step in bringing everyone’s voice to the table.

    • How to succeed as a remote documentation contributor in OpenStack

      Alexandra Settle, an information developer at Rackspace, will be speaking at OpenStack Summit in Barcelona. Alexandra is a core reviewer for OpenStack manuals, also working on the OpenStack Ansible and Swift project documentation, and serves as a mentor in documentation for the Outreachy project. She’s been interested in information technology since high school and is a fan of Fedora Linux. She began her career as an intern at Red Hat and after spending years using Windows machines, and love the ease of use and functionality that came with using Linux.

  • Databases

    • Couchbase and the future of NoSQL databases

      Well, I’ve built and led developer communities for 10+ years at Sun, Oracle, and Red Hat, so I have experience in leading crossfunctional teams to develop and execute strategy, planning, and execution of content, and marketing campaigns and programs. I’ve also led engineering teams at Sun, and I’m a founding member of the Java EE team.

      At Couchbase, a developer advocate helps developers become effective users of a technology, product, API, or platform. This can be done by sharing knowledge about the product using the medium where developers typically hangout. Some of the more common channels include blogs, articles, webinars, and presentations at conferences and meetups. Answering questions on forums and Stack Overflow, conversations on social media, and seeking contributors for open source projects are some other typical activities that a developer advocate performs on a regular basis.

  • Pseudo-Open Source (Openwashing)

    • Facebook Yarn’s for your JavaScript package

      Facebook, working with Exponent, Google, and Tilde, has released software to improve the JavaScript development experience, which can use all the help it can get.

      Yarn, introduced on Tuesday under a BSD license and without the patent clause that terminates Facebook’s React license for those involved in patent litigation against the company, is an alternative npm client. It’s not to be confused with Apache Hadoop YARN (Yet Another Resource Negotiator), which is cluster management software.

  • BSD

  • Public Services/Government

    • Russia’s Preference for Open-Source to Hurt U.S. Tech Stocks

      Amid rising political tensions with the U.S., Russia is planning to further lower its usage of licensed software from IT giants like International Business Machines Corp IBM , Microsoft Corporation MSFT , SAP AG SAP and Oracle Corporation ORCL .

      Per Bloomberg, “The State Duma, Russia’s lower house of parliament, is drafting a bill to restrict government agencies from buying licensed software, giving preference to open-source software.”

      The proposed law is an addition to an already existing federal law that came into effect on Jan 1, 2016, which restricts the use of foreign software in the public sector, if there is a domestic version available.

  • Openness/Sharing/Collaboration

    • Paediatric Cancer Drug Being Developed Entirely In The Open

      The Medicines for Malaria Venture (MMV) has posted a Malaria Box, containing over 400 compounds that might be effective against malaria to almost 200 research groups in two years. It’s an open science project, because the only stipulation is that information is deposited in the public domain (and therefore cannot be patented).

      GlaxoSmithKline (GSK)’s Open Lab project, the Tres Cantos Medicines Development Campus near Madrid, Spain, enables visiting scientists to use GSK’s high-tech facilities to research neglected diseases such as malaria and TB.

      Even Bill Gates has tweeted that open-source collaboration between scientists could become a drug discovery catalyst.

      Now, one scientist is embarking upon a virtual pharmaceutical company that will develop a paediatric cancer drug in the open.

    • Open Hardware/Modding

      • Shendy: A Low Cost Arsenic Detector for Drinking Water

        If you are designing life-saving tech to help refugees living in refugee camps, you’re probably not going to design a proprietary product, because doing so would be tantamount to signing the death warrant of a percentage of the refugee camp residents. Open source is how the most number of refugees can be helped. In that vein, learn about an initiative to design a low-cost. open source arsenic detector for use in ensuring safe drinking water in refugee camps.

  • Programming/Development

    • The State Of JavaScript

      Depending on who you ask, right now JavaScript is either turning into a modern, reliable language, or a bloated, overly complex dependency hell. Or maybe both?

      What’s more, there’s just so many options: Do you use React or Angular 2? Do you really need Webpack? And what’s this month’s recommended way of dealing with CSS?

    • A Javascript journey with only six characters

      Javascript is a weird and wonderful language that lets us write some crazy code that’s still valid. It tries to help us out by converting things to particular types based on how we treat them.

      If we add a string to something, it’ll assume we want it in text form, so it’ll convert it to a string for us.

      If we add a plus or minus prefix to something, it’ll assume we want its numerical representation, and will convert the string to a number for us, if possible.

    • rra-c-util 6.1
    • remctl 3.13

      remctl is a client and server that forms a very simple remote RPC system, normally authenticated with Kerberos, although including a remctl-shell variant that works over ssh.

    • Vala and Reproducibility

      This will help build process to avoid call valac in order to generate C source code, VAPI and GIR files from your Vala sources.

      Because C source is distributed with a release’s tarball, any Vala project could be binary reproducible from sources.

      In order to produce development packages, you should distribute VAPI and GIR files, along with .h ones. They should be included in your tarball, to avoid valac produce them.

    • Fuck You Startup World

      Fuck your crazy work hours. Nobody gives a fuck that Elon musk is working 100 hours a week, and Marissa Mayer pulling it to 130 hour work week while still breastfeeding her newborns. You’re not Elon Musk , you ain’t Marissa Mayer, you’re not going to get to space, and you won’t build the next Space X. Do me a favor, put your fucking Mac away and go play with your kids.

      [...]

      Fuck you startups with your extravagant parties and crazy off-site events that cost way too much money, you’re supposed to buy some fucking servers instead! Fuck spending money on ping pong tables that no one ever uses, fucking music rooms, nap rooms, meditation rooms, stress-free rooms, and pilates rooms. Fuck your ridiculous incentives that you give, too. Fuck your unlimited vacation policy, it’s fucking bullshit. We all know that your employees will take less time off.

    • Nailing Down Architectural Principles

      Software architecture needs to be documented. There are plenty of fancy templates, notations, and tools for this. But I’ve come to prefer PowerPoint with no backing template. I’m talking good old white-background slides. These are way easier to create than actual text documents. There are no messy worries over complete sentences. Freedom from grammatical tyranny! For a technical audience, concision and lack of boilerplate is a good thing. A nice mix of text, tables and diagrams gets the point across just fine. As a plus, this is naturally presentable — you don’t need a separate deck to describe your architecture when the deck is the reference document to begin with. As the architecture evolves, the slides evolve.

Leftovers

  • Amazon Wants to Get College Students Addicted to Prime

    Vincent Wang needed new jeans and a coat just before classes began this semester at the University of California, Davis, where he studies nutrition. Rather than trek several miles off campus to the nearest Target or Walmart, he ordered the clothes from Amazon.com Inc. and retrieved them from new Amazon pickup lockers right next to the university store that sells Aggies T-shirts and hoodies.

    Wang, 21, is one of millions of students who have taken advantage of Amazon Prime Student, which offers all the benefits of a regular Prime membership — quick delivery, music and video streaming and free online photo storage — for $50 a year, half the regular price. Amazon’s strategy echoes the one used for decades on college campuses by the credit card companies: snag young consumers early and, with artful promotions, try to make them loyal for life.

  • Science

    • Barack Obama: America will take the giant leap to Mars

      One of my earliest memories is sitting on my grandfather’s shoulders, waving a flag as our astronauts returned to Hawaii. This was years before we’d set foot on the moon. Decades before we’d land a rover on Mars. A generation before photos from the International Space Station would show up in our social media feeds.
      I still have the same sense of wonder about our space program that I did as a child. It represents an essential part of our character — curiosity and exploration, innovation and ingenuity, pushing the boundaries of what’s possible and doing it before anybody else. The space race we won not only contributed immeasurably important technological and medical advances, but it also inspired a new generation of scientists and engineers with the right stuff to keep America on the cutting edge.

    • Technology Brings Peace, Not Peril

      Peres’ vision stands in stark contrast to Lord Jonathan Sacks’ dystopian commentary calling computers and radical Islamists the “two dangers” of this century, defeated only by “an insistence on the dignity of the human person and the sanctity of human life.”

      On the contrary, I believe innovation and technology will help defeat terrorists and sustain and enhance human life.

      Innovation and technology have extended our lives – most children born in the early 1900s didn’t live past the age of 50, but the average U.S. lifespan is now almost 79 years. Artificial intelligence is helping doctors make complex diagnoses. 3D printing is producing low-cost prosthetics for children and those who otherwise couldn’t afford care. Drones are delivering blood and emergency medicine in developing countries. The rabbi should explain his point that “Every new technology…benefits the few at the cost of the many” to the paraplegic patients learning how to walk thanks to virtual reality.

      While Sacks decries the idea of self-driving cars, this innovation can save tens of thousands of lives a year in the U.S. alone. More than 35,000 people died on our roads last year, and the federal government estimates over 90 percent of crashes are caused by human error. Eliminating the great majority of automobile deaths and serious injuries would certainly meet Sacks’ goal of preserving “the sanctity of human life.”

  • Health/Nutrition

    • The Long-lasting Wages of Neglect: Flint Residents Plagued Again by Water Crisis

      One year since a public health emergency was declared in Flint due to lead-contaminated water, the struggle continues for residents of the hard-hit city. The most recent issue they’re facing is an outbreak of shigellosis, a highly contagious bacterial infection that is transmitted through the accidental ingestion of infected fecal material and causes diarrhea, fever, and abdominal pain.

      Matt Karwowski, a medical epidemiologist with the CDC, says, “There is definitely some question about whether changes in hand-washing and hygiene practices may be playing a role. People in Flint have been concerned about the safety of their water supply, and that may be playing a role in their hygiene practices.”

    • Antitrust Suit Alleges Pharma Company Rubbished Its Own Product In Order To Stave Off Competition From Generics

      Techdirt has written a number of stories about how Big Pharma is never content with the patent bargain — that, in return for a time-limited, government-enforced intellectual monopoly, products will afterwards enter the public domain. Instead, companies have come up with various schemes to extend the life of that monopoly — and thus to cheat the public of the low-cost generic versions of the drug in question that should have appeared. The Daily Beast points to an antitrust lawsuit brought by 35 states and the District of Columbia against the makers of Suboxone, a prescription drug used to treat opioid addiction, over the alleged use of one such scheme, known as “product hopping”.

  • Security

    • Security advisories for Monday
    • Crash: how computers are setting us up for disaster

      When a sleepy Marc Dubois walked into the cockpit of his own aeroplane, he was confronted with a scene of confusion. The plane was shaking so violently that it was hard to read the instruments. An alarm was alternating between a chirruping trill and an automated voice: “STALL STALL STALL.” His junior co-pilots were at the controls. In a calm tone, Captain Dubois asked: “What’s happening?”

      Co-pilot David Robert’s answer was less calm. “We completely lost control of the aeroplane, and we don’t understand anything! We tried everything!”

      The crew were, in fact, in control of the aeroplane. One simple course of action could have ended the crisis they were facing, and they had not tried it. But David Robert was right on one count: he didn’t understand what was happening.

      As William Langewiesche, a writer and professional pilot, described in an article for Vanity Fair in October 2014, Air France Flight 447 had begun straightforwardly enough – an on-time take-off from Rio de Janeiro at 7.29pm on 31 May 2009, bound for Paris. With hindsight, the three pilots had their vulnerabilities. Pierre-Cédric Bonin, 32, was young and inexperienced. David Robert, 37, had more experience but he had recently become an Air France manager and no longer flew full-time. Captain Marc Dubois, 58, had experience aplenty but he had been touring Rio with an off-duty flight attendant. It was later reported that he had only had an hour’s sleep.

      Fortunately, given these potential fragilities, the crew were in charge of one of the most advanced planes in the world, an Airbus 330, legendarily smooth and easy to fly. Like any other modern aircraft, the A330 has an autopilot to keep the plane flying on a programmed route, but it also has a much more sophisticated automation system called fly-by-wire. A traditional aeroplane gives the pilot direct control of the flaps on the plane – its rudder, elevators and ailerons. This means the pilot has plenty of latitude to make mistakes. Fly-by-wire is smoother and safer. It inserts itself between the pilot, with all his or her faults, and the plane’s mechanics. A tactful translator between human and machine, it observes the pilot tugging on the controls, figures out how the pilot wanted the plane to move and executes that manoeuvre perfectly. It will turn a clumsy movement into a graceful one.

    • Canonical Patches New Linux Kernel Vulnerabilities in All Supported Ubuntu OSes

      Today, October 11, 2016, Canonical published several security advisories to inform Ubuntu users about new Linux kernel updates for their supported operating systems.

      Four new kernel vulnerabilities are affecting Ubuntu 16.04 LTS (Xenial Xerus) and Ubuntu 14.04 LTS (Trusty Tahr) or later versions, and three the Ubuntu 12.04 LTS (Precise Pangolin) series of operating systems. They are also affecting the Ubuntu 16.04 LTS for Raspberry Pi 2 kernel.

      The first security flaw is an unbounded recursion in Linux kernel’s VLAN and TEB Generic Receive Offload (GRO) processing implementations, which could have allowed a remote attacker to crash the system through a denial of service or cause a stack corruption. It was discovered by Vladimír Beneš and affects Ubuntu 16.04 and 14.04.

    • Security updates for Tuesday
    • Systemd and Ubuntu users urged to update to patch Linux flaws

      Linux users should beware of a recently discovered systemd vulnerability that could shut down a system using a command short enough to send in a tweet and Ubuntu users should update to new Linux kernel patches affecting supported operating systems.

      SSLMate founder and Linux administrator Andrew Ayer spotted the bug which has the potential to kill a number of critical commands while making others unstable, according to Betanews.

    • Microsoft: No More Pick-and-Choose Patching

      Adobe and Microsoft today each issued updates to fix critical security flaws in their products. Adobe’s got fixes for Acrobat and Flash Player ready. Microsoft’s patch bundle for October includes fixes for at least five separate “zero-day” vulnerabilities — dangerous flaws that attackers were already exploiting prior to today’s patch release. Also notable this month is that Microsoft is changing how it deploys security updates, removing the ability for Windows users to pick and choose which individual patches to install.

    • Ministry of Defence CIO – defending the data assets of the nation

      An interesting example of knowing what is actually important, such as being ‘secure’ does not mean pulling up drawbridges and never talking. It does seem possible that the MoD has lesson it can teach industry in building security defences in depth, using a wide range of tools, that then map onto the future world of mobile and cloud infrastructures.

  • Defence/Aggression

    • New Clinton email reveals direct support for ISIS from two powerful Western allies

      A new Hillary Clinton email published by WikiLeaks as part of the ongoing release of hacked campaign files confirms that Daesh (Isis/Isil) has state backing. And from powerful Western allies, no less.

      Anti-terrorism analysts have long seen Daesh as a non-state-affiliated actor which grew out of an al-Qaeda insurgency in Iraq (and later Syria). But the email sent by Clinton herself (dated 27 September 2014) shows there’s much more to the story.

    • Russkies at the Doorstep

      In a year noted for crude political discourse, eagerly serialized in the mainstream media, the MSM are themselves bellowing anti-Russian rhetoric, conspiracy theory, and fear-mongering. Of the two “evil of two lessers” contenders, Trump is the one who regularly gets hammered, justifiably in the case of his anti-Muslim and other racist and sexist slurs, while Clinton gets a pass, even an A+, for her repeated verbal assaults on Russia and its president, even as she reeks of class hostility toward Trump supporters.

      During the McCarthy era, the most perverse propaganda was about Russians hiding under beds; during the new cold war, it’s about Russians inside every telephone, computer, email, and website, while linking Putin to everything, says Guardian contributor Trevor Timm, “from Brexit, Jeremy Corbyn, Greece, and Spain.” It’s hard to reconcile mainstream bogeymania with the missing media attention to the massive Big Brother spying on US citizens, the moral transgressions of which are lately presented in Oliver Stone’s humanizing portrait, “Snowden.”

      The quite literal femme fatale (without the alluring charm) has quite a deadly track record in the Middle East, but the MSM, which tout Clinton’s compassion for children and concern for human rights don’t bother to note her criminal record in the destruction of Libya and support for repressive Arab dictators, her backing of the coup in Honduras, or her threats to make war on Russia and destabilize and destroy yet another Arab country, Syria. Netanyahu is her favorite foreign statesman, while Trump is attacked for not being sufficiently obsequious toward the butcher of Gaza. MSM “debate” hosts never think to ask the right questions, such as why has she supported assaults on the main enemies of Saudi Arabia, Qatar, and Bahrain: Iraq, Libya, Yemen, Iran, and Syria? Like her underworld counterpart, Willie Sutton, she’d have to say it’s because that’s where the money is. Despite his many crackpot ideas, Trump is more pragmatic, less neocon, about US intentions in the Middle East. Just take the oil, he says, and forget about regime change.

      Clinton’s eponymous Foundation is built on millions of dollars of generous payola from “too big to jail” financiers along with feudalistic Qatar, the UAE, Oman, and the head chopping capital, Saudi Arabia. Bahrain gave a mere $100 thousand to the Foundation but $32 million to another money laundering operation, the Clinton Global Initiative. Syria, Iran, and Russia didn’t pay the bribes and are paying the price. The MSM choose not press her on the issue. Wikileaks has become the newspaper of record.

    • US government warned last year that selling arms to Saudi Arabia could ‘implicate it in war crimes’

      Officials within the Obama administration raised concerns over a 2015 $1.3billion arms sale to Saudi Arabia, citing worries that the Saudi military did not have the ability to intervene in Yemen without harming civilians, an investigation from Reuters has found.

      Full scale civil war between the Western and Saudi-backed government and Houthi rebels broke out early last year. More than 10,000 people have been killed in the fighting, the UN estimates, and three million displaced from their homes. Saudi-led air strikes on the rebel-held city of Sanaa since March 2015 have killed thousands of civilians.

      According to emails, documents and interviews with several current and former officials familiar with the discussions, the US government’s lawyers ultimately did not reach a conclusion on whether supplying arms for the Saudi campaign could make the US a ‘co-belligerent’ in the conflict under international law.

    • Pentagon Confronts a New Threat From ISIS: Exploding Drones

      Kurdish forces fighting the Islamic State in northern Iraq last week shot down a small drone the size of a model airplane. They believed it was like the dozens of drones the terrorist organization had been flying for reconnaissance in the area, and they transported it back to their outpost to examine it.

      But as they were taking it apart, it blew up, killing two Kurdish fighters in what is believed to be one of the first times the Islamic State has successfully used a drone with explosives to kill troops on the battlefield.

      In the last month, the Islamic State has tried to use small drones to launch attacks at least two other times, prompting American commanders in Iraq to issue a warning to forces fighting the group to treat any type of small flying aircraft as a potential explosive device.

    • Photos Show Fragments of U.S. Bombs at Site of Yemen Funeral Massacre

      Fragments of what appear to be U.S.-made bombs have been found at the scene of one of the most horrific civilian massacres of Saudi Arabia’s 18-month air campaign in Yemen.

      Aircraft from the Saudi-led coalition on Saturday bombed a community hall in Sana’a, Yemen’s capital city, where thousands of people had gathered for a funeral for Sheikh Ali al-Rawishan, the father of the rebel-appointed interior minister. The aircraft struck the hall four times, killing more than 140 people and wounding 525. One local health official described the aftermath as “a lake of blood.”

  • Environment/Energy/Wildlife/Nature

    • EU draws fire for allowing ‘overfishing’ of Baltic cod

      European Union ministers have agreed to cuts in Baltic cod catch quotas for next year that fall well short of calls by scientists worried about the stock’s eventual collapse.

      The fisheries ministers agreed overnight Monday to reduce catches of western Baltic cod by 56 percent in 2017, despite calls by scientists for a 90-percent cut they say is needed to sustain stocks in Danish and German waters.

      EU fisheries commissioner Karmenu Vellu said the commission, the bloc’s executive, had proposed a reduction of 88 percent “to bring back the stock to sustainability as soon as possible,” but had to accept a compromise to reach a deal among all member states.

      Listening to the potential impacts on the different fishing fleets, Vellu said: “I have accepted a lower reduction that is still well above the lower limit of the scientific advice.”

    • Danish cod quotas slashed … but not enough, says environmental group

      Denmark’s environmental and food minister Esben Lunde Larsen has just completed tough negotiations in Luxembourg on next year’s fishing quotas in the Baltic Sea.

      Danish cod fisheries were hit hard, but not as hard as the EU Commission had originally planned.

      The EU Commission had originally envisaged a reduction of cod quotas in the western Baltic Sea of 88 percent. Larsen managed to negotiate that down to a reduction of 56 percent. In the eastern Baltic, the EU originally called for a reduction of 39 percent. The parties agreed on a 25 percent decrease.

    • Huge area of US West burned due to warming climate

      Wildfires in the American West can make for apocalyptic images, but they’re also routine, as the heat of the dry season can turn large areas of forest into fires-in-waiting. One lightning strike—or one careless human—can set off a blaze that consumes tens of thousands of acres.

      Several factors contribute to the extent of these wildfires. We’ve made efforts to put them out as soon as possible—it’s well intentioned and sometimes necessary to protect ever-expanding human communities. But in many places, putting out the fires has disrupted a natural process of forest housekeeping. With small bits of fuel allowed to accumulate on the forest floor for longer, fires become less frequent but much more intense.

      Climate also plays a role. Year-to-year variability leaves some summers noticeably drier and hotter than others. And then there’s climate change. What can we say about its influence on fires in the West?

  • AstroTurf/Lobbying/Politics

    • New WikiLeaks emails show influence of Univision chairman in Clinton campaign

      The clashes between presidential candidate Donald Trump and the Spanish-language Univision television network began within days of Trump’s announcement last year that he was seeking the Republican nomination.

      Now, a series of emails pirated from the Democratic National Committee and published in the past week by the anti-secrecy website WikiLeaks show that within days of Trump’s June 16, 2015, announcement of his candidacy, Univision’s chairman, Haim Saban, was urging the Clinton campaign to take a tougher stance on Trump’s anti-immigrant agenda.

    • Media, Politics & The Death Of Intellectual Honesty

      Yeah, so I get that it’s political silly season, and people like to throw around all kinds of arguments of “bias” — especially towards the media. I’ve been on the receiving end of those accusations, but for the most part, I think claims of media bias are silly and over-hyped. What’s true, though, is that it’s all too easy to be sloppy in reporting and to try to hype up a nothing story into a something story. Here’s a story where no one comes out of it looking very good and the end result is a complete mess. It starts with Newsweek reporter Kurt Eichenwald. Last night I saw a marginally interesting story by Eichenwald about how a Russian government connected news website, Sputnik, misread an email leaked via Wikileaks from Hillary Clinton pal Sidney Blumenthal to campaign chief John Podesta. The email contained a link and full text to a much earlier Eichnwald story about Benghazi and Clinton. The Sputnik story incorrectly stated that the text in the email was by Blumenthal, and not by Eichenwald. It took one sentence out of this longer article, and falsely claimed that Blumenthal was admitting that the mess in Benghazi was “preventable.”

    • Gary Johnson: The more you know him, the less you like him

      Personally, I like Gary Johnson. I got to know him in the 1990s when he was governor of New Mexico. I was working to end the drug war, legalize marijuana and treat hard drugs as a public health, not criminal issue. Johnson came out for marijuana legalization, so I spent some time in New Mexico helping that agenda.

      But, the more I got to know him the less I liked his political views. He took money from the private prison industry and proudly supported private prisons. Making prisons into profit centers creates ongoing human rights violations. Prisons should be a function of government not a corporate profit center. Johnson opposed needle exchange to prevent HIV/AIDS, drug treatment and programs to help people with drug problems get their lives going in a positive direction.

    • 8 Most Damning Takeaways from ‘October Surprise’ Email Hack from WikiLeaks–This Looks REALLY Bad
    • In the Democratic Echo Chamber, Inconvenient Truths Are Recast as Putin Plots

      Donald Trump, for reasons I’ve repeatedly pointed out, is an extremist, despicable, and dangerous candidate, and his almost-certain humiliating defeat is less than a month away. So I realize there is little appetite in certain circles for critiques of any of the tawdry and sometimes fraudulent journalistic claims and tactics being deployed to further that goal. In the face of an abusive, misogynistic, bigoted, scary, lawless authoritarian, what’s a little journalistic fraud or constant fearmongering about subversive Kremlin agents between friends if it helps to stop him?

      But come January, Democrats will continue to be the dominant political faction in the U.S. — more so than ever — and the tactics they are now embracing will endure past the election, making them worthy of scrutiny. Those tactics now most prominently include dismissing away any facts or documents that reflect negatively on their leaders as fake, and strongly insinuating that anyone who questions or opposes those leaders is a stooge or agent of the Kremlin, tasked with a subversive and dangerously un-American mission on behalf of hostile actors in Moscow.

    • WikiLeaks posts more John Podesta emails

      WikiLeaks Monday morning posted an additional 2,000 emails that appear to be from the account of Hillary Clinton’s campaign chairman, John Podesta.
      This is the second hack in four days from WikiLeaks, which claims it has a trove of more than 50,000 emails from Podesta.

      The emails appear to be mostly from 2015, covering a litany of policy and strategy discussions between Clinton staffers on how to handle issues of the day and the press, including the release of the book “Clinton Cash” alleging nefarious activity by the Clinton Foundation. Another email has long-time Clinton aide Doug Band referring to Chelsea Clinton as a “spoiled brat.”

      Clinton campaign responded to the release by slamming the Trump campaign for “cheering on a release today engineered by Vladimir Putin,” after Trump adviser Jason Miller tweeted a link to the document page with the phrase “And here…we…go.”

    • Hillary Clinton’s Campaign Strained to Hone Her Message, Hacked Emails Show

      On the eve of the New Hampshire primary in February, a longtime aide to Bill Clinton was worried. Hillary Clinton was about to go down to defeat in the state, and the former president was despondent.

      “He’s losing it bad today,” Mr. Clinton’s chief of staff, Tina Flournoy, wrote to John D. Podesta, Mrs. Clinton’s campaign chairman, in an email. She added, “If you’re in NH please see if you can talk to him.”

      The email was one of thousands released by WikiLeaks on Monday that provided a revealing glimpse into the inner workings of Mrs. Clinton’s campaign. They show a candidacy that began expecting a coronation and was thrown badly off course by a misreading of the electorate and a struggle to define what she stood for.

      Stretching over nine years, but drawn mainly from the past two years, the correspondence captures in detail the campaign’s extreme caution and difficulty in identifying a core rationale for her candidacy, and the noisy world of advisers, friends and family members trying to exert influence.

    • Bernie Sanders endorses his brother in race to replace David Cameron

      US presidential hopefuls do not often intervene in British parliamentary byelections. But then, not many presidential candidates are Bernie Sanders. And more than that, he is intervening on behalf of his older brother.

      Sanders, who missed out on taking the Democratic nomination from Hillary Clinton, has recorded a brief but heartfelt campaign video aimed at voters in Witney, Oxfordshire, that talks up the attributes of his brother, Larry.

      Larry Sanders, who has lived in the UK since 1969, is standing for the Green party in the constituency, which will elect a new MP on 20 October to replace David Cameron, who quit the Commons last month.

    • Jill Stein Would Be a Blessing for the Supreme Court; Gary Johnson Would Be a Disaster
    • Hillary Clinton Campaign Avoided Helping Single-Payer Ballot Measure, Emails Show

      Hillary Clinton’s campaign was no fan of a major ballot measure to create a universal health care system — at least according to newly released documents from her campaign chairman’s email account.

      The emails from John Podesta’s account last November coincided with Clinton’s trip to the swing state of Colorado, where health insurers are funding the opposition to a ballot measure that would create a single-payer health care system in the state. Podesta and the Clinton campaign have not confirmed the authenticity of the emails but have not disputed them, and Wikileaks noted that Clinton appeared to confirm their authenticity during her Sunday night debate with Donald Trump.

    • Trump tells supporters to go vote on ‘November 28th’

      Donald Trump is asking his supporters to go out and vote him — 20 days after the presidential election is scheduled to take place.

      “Make sure you get out and vote,” Trump told supporters on Tuesday at rally in Florida. “November 28th.”

      Election Day is Nov. 8, 2016.

      To make matters worse, voters in the Sunshine State don’t have much time to register for the election.

    • In private correspondences, Ford Foundation president Darren Walker rubbished Sunday Guardian’s stories, calling it a “mouthpiece for the BJP”

      John Podesta, Hillary Clinton’s campaign chairman for the 2016 US presidential elections, closely monitored and may have intervened in the controversy surrounding the Ford Foundation and other foreign charitable foundations last year, according to to a set of leaked emails released by Wikileaks on Tuesday.

      In the first half of 2015, Ford Foundation president Darren Walker sent a number of emails to Podesta, most of which were updates on events taking place in India after the Modi government tightened the rules governing foreign charitable foundations and NGOs. During this time, the Ford Foundation was put on a government watch list over funding it gave to activist Teesta Setalvad in 2009.

      One e-mail, for instance, appears to be a deep-dive monitoring of how the Indian media reported the government’s probes into foreign funding, and specifically how various newspapers and editorials viewed the Ford Foundation’s troubles.

      [...]

      One e-mail from Walker to Podesta, sent on June 8th 2015, strikes a note of frustration and notes that the Ford Foundation “ had sent urgent notes to the Reserve Bank of India asking for assistance” in transferring funds in order to ensure that the foundation could sustain its basic operations in India.

      “I promised I’d give you an update on any developments in India,” Walker writes. “At this point this point, we’ve heard nothing further from the GOI. I sent urgent notes to the Ministry of Home Affairs and Reserve Bank of India last week asking for assistance in immediately releasing our bank accounts from their current status so we can transfer funds from NY for basic operations (mostly salary support, not grants),” the email reads.

      The Ford Foundation president also angrily references the article carried by the Sunday Guardian in early June, which profiled the Ford Foundation’s activities in India while describing it as an “entity outside the law”.

      “I’m attaching an article from the Guardian, which purports to be an independent newspaper, but is really the mouthpiece for the government and BJP. It’s rife with misrepresentations and erroneous information…not a very encouraging article. I appreciate your help,” Walker wrote.

    • Is there actually evidence that Trump allies had a heads-up on what WikiLeaks was doing?

      On a plane somewhere over the United States on Tuesday, Hillary Clinton campaign chairman John Podesta spoke to reporters about his email being hacked and the contents ending up at WikiLeaks.

      Podesta suggested that Roger Stone, a longtime ally of Donald Trump’s who is working with a pro-Trump super PAC, may have known about the email hacking before the release.

      “I think it’s a reasonable assumption to — or at least a reasonable conclusion — that Mr. Stone had advance warning and the Trump campaign had advance warning about what Assange was going to do,” Podesta said.

      Is that a reasonable assumption, much less a reasonable conclusion?

  • Censorship/Free Speech

    • Why the ‘Safe-Space’ Debate Is a Problem for Adjuncts

      The University of Chicago lit up social-media feeds last month after its dean of students published a letter informing incoming freshmen that “safe spaces” and “trigger warnings” had no place on a campus dedicated to “freedom of inquiry and expression.”

      Although some journalists noted that the letter may have been aimed at pleasing high-profile right-wing donors, opposition to such measures doesn’t track neatly along party lines. Neither the Marxist philosopher Slavoj Žižek nor the paleoconservative pundit Ann Coulter has much use for so-called “political correctness” measures.

    • Zambia: Internet censorship during the 2016 general elections?

      A research study by the Open Observatory of Network Interference (OONI) and Strathmore University’s Centre for Intellectual Property and Information Technology Law (CIPIT).

    • Peter Thiel’s Lawyer Says He’s Stopped ‘Monitoring’ Gawker, But Still Sending It Bogus Takedown Demands

      Remember how the billionaire funder of Facebook and Palantir, Peter Thiel, insisted that he was bankrupting Gawker to protect your privacy? Well, the lawyer, Charles Harder, that Thiel set up with a monthly retainer, specifically to focus on lawsuits that could kill Gawker dead, has become something of a “celebrity” in the “let’s stomp out free speech” circle of celebrities. Last month, the Hollywood Reporter did a big profile on Harder and his newfound fame (and rapidly growing client list of famous people upset about press coverage). In some “bonus cuts,” reporter Eriq Gardner noted on Twitter that Harder told him he no longer “monitors” what’s left of Gawker (now called Gizmodo Media, and owned by Univision).

      [...]

      This is, to put it mildly, a load of complete bullshit. Harder, who in that profile claims “I believe very strongly in a free press” doesn’t seem to understand how the First Amendment works. Cook’s statement is clearly one of opinion, and it’s clearly protected speech. And despite Harder also saying in that profile that he’d like to change the standard for defamation of public figures, the law as it stands requires not just that the statements be false statements of fact, but also that they be said maliciously. And, yes, Harder is a public figure (remember, there was just a whole Hollywood Reporter feature about him).

      What Harder appears to be doing here is little more than threatening a SLAPP suit to try to shut up the press from saying negative things about him. Even the references to Cook being sued in the past are ridiculous, since most of those lawsuits are from Harder himself, and most of them are completely bogus.

      So far, it does not appear that Univision is complying with any of these demands (which is good to see). So, let’s see what Harder does next. Is he now going to go after Univision too? Will Thiel continue to fund that as well? Because most of the threats seem entirely bogus, and would be laughed out of court.

      And, of course, this is yet another reminder of why we really need a federal anti-SLAPP law to stop such bogus threats in their tracks.

    • Banned by the bureau: Censorship in Lebanon

      When Darine Hotait, the Lebanese-American filmmaker, learned that her film I say dust had been banned from screening at the Lebanese Film Festival (LFF), she was confused. She couldn’t think of a reason why the film got censored although some people had told Darine in advance that it was obvious that they would ban the film.

      They. The Bureau of Censorship, a division of General Security, one of Lebanon’s many military bodies. The bureau is not known for transparency and rarely discloses what exactly they have censored and why. They don’t want to be held accountable. They don’t want to leave any trace.

    • More Details Uncovered On Bogus Defamation Lawsuits Being Used To Delist Negative Reviews

      More details have also surfaced in a case Levy is still dealing with — the filing of a bogus defamation lawsuit on behalf of dentist Mitul R. Patel against an unhappy patient. In this peculiar case, both the supposed plaintiff and defendant claim to have had their signatures forged on the court documents used to secure an order to delist content.

      Patel’s motion to vacate the bogus lawsuit points a finger at a reputation management firm SEO Profile Defense LLC — led by Richart Ruddie — which Patel alleges filed the suit (and forged his signature) without his knowledge after he signed a contract with it for reputation management services.

      Additional details uncovered by Levy and Volokh suggest this isn’t the reputation management firm’s first bogus lawsuit rodeo.

    • NBC Delayed Story About Trump’s Access Hollywood Recording Over Fear That He Might Sue

      So just this past Thursday, we wrote about Trump’s habit of threatening to sue the press over any coverage he considers negative. In the past, we’ve also covered his stated plans to open up libel laws. The comments on that post got pretty ridiculous after people who can’t possibly be regular Techdirt readers complained that I was clearly just stirring up shit because I’m a Hillary Clinton supporter. This despite the fact that pretty much everything we’ve ever written about her has been critical too — including her own ridiculous comments mocking free speech and praising censorship. It also ignores that just a few days earlier I had also sided with the Trump campaign when it received a bogus, censorious, cease & desist letter from the city of Phoenix. We’re staying pretty consistent here: we don’t support censorship, no matter whose team you’re on. But, sure, I know. It’s crunch time and people are really concerned about supporting their team, rather than actually discussing issues.

      But this is an important issue. Threatening a free press with bogus defamation lawsuits and SLAPP (strategic lawsuits against public participation) claims are a really big problem. Case in point: on Friday, as I’m sure you’re already aware, the Washington Post published a video of Donald Trump happily discussing sexually assaulting women, and how it’s okay because he’s a celebrity. As you also know, this became the story of Friday and the weekend, as it appeared to push a bunch of people who had previously supported Trump over the edge to pull their support (why this story rather than earlier ones, I don’t fully understand, but…).

      Either way, the story led to a few different varieties of followup stories about how the Washington Post got the story. And all of them note that Access Hollywood found the tape itself last Monday, and realized it was newsworthy. They then took it to their corporate parent, NBC, and some work was done on getting the story out — but it kept getting pushed back. This led many to ask why it could possibly take so long for NBC to report on this. They knew the tape was authentic, so they didn’t need to confirm that.

    • Users enraged, confused over YouTube censorship
    • YouTube announces initiative for digital clean-up

      YouTube has launched a program called YouTube Heroes that will allow users to report inappropriate content in the form of a game.

      Members will earn points, advance in levels and gain access to exclusive rewards and features on the site dependent on the quality of their contributions.

      How do these “Heroes” earn points? By flagging inappropriate videos, adding captions to content and sharing their knowledge with other Heroes in message boards and Google Hangout sessions.

    • Censorship Kills Potential Twitter Acquisition

      Last year, I wrote about how Twitter (NYSE:TWTR) may be acquired by either Microsoft (NASDAQ:MSFT) or Alphabet (GOOG, GOOGL). Early this year, I soured on Twitter stock because economic weakness would hurt ad spending. I further soured on it after incidents of it censoring users for their political statements and its mismanagement of Periscope.

      In the past few weeks, the rumors of Twitter being bought crept up again. This list consisted of Saleforce.com (NYSE:CRM), Alphabet, Apple (NASDAQ:AAPL), Verizon (NYSE:VZ), Microsoft, and Disney (NYSE:DIS). I think traders were bidding Twitter stock up because if Alphabet (the most likely buyer) had to compete with another firm, it would drive the price up.

      [...]

      Twitter isn’t like any other acquisition for the companies looking at it. Even for Microsoft, buying Twitter would be nothing like buying LinkedIn. The reason it is different is its public nature. While most companies are trying to avoid political controversy, Twitter would put them front and center of the action. This situation isn’t inherently bad, but with the way Twitter is treating free speech with disdain, it has become a potential problem for buyers.

      There have been many examples of Twitter suspending accounts which are politically incorrect. One example of this was journalist Glenn Reynolds getting his account suspended for tweeting “run them down” in reference to drivers being in a situation where protesters were blocking the streets and attacking cars which stopped. It’s not my place to discuss the veracity of this statement, but it isn’t Twitter’s place either! Twitter has become known for wielding a heavy hand when dealing with political statements. Deleting accounts is the last thing a firm with user growth problems needs. 17 million tweets were sent out pertaining to the recent presidential debate. This shows that political expression is paramount to the website’s existence. It needs to foster debate instead of stifling it.

    • Suit alleges censorship on Elkhart city Facebook page

      The accusation is one of censorship.

      “I think basically I was posting about issues around the Lerner Theater and the A.D.A. violations and discrimination the city was engaged in and they didn’t care for that too much and they deleted all those posts and eventually banned me from commenting,” said Richard Wolf.

    • Seh Calaz defies Censorship Board

      MABHANDITI frontman, Seh Calaz, on Saturday performed the controversial track, Hohwa — No Under 18, at a concert in Gweru at the weekend in defiance of the Censorship Board’s ban imposed of sexually-explicit song.

    • ‘End this censorship… and bring back library artwork’
    • NMC is not to bring a media censorship
    • National Media Center is not to censor media, aims to build reconciliation – Chairman
  • Privacy/Surveillance

    • Comcast in middle of Oregon fight over taxes and censorship

      Experienced television buyers say some television stations occasionally flag advertisements that use footage from rival stations, though most ultimately relent.

      The video-on-demand service — used by customers who want to watch a show after it has aired — reach a relatively small number of viewers. The pro-97 ads that mention Comcast have run on other Oregon cable and network providers.

    • Does NSA support of CYBERCOM blur lines?

      The Title 10 versus Title 50 debate has long surrounded the way intelligence and covert activity is conducted in accordance with the law. A key issue surrounding intelligence and war fighting efforts is the blurring of lines clearly identified in statutes. For example, intelligence organizations are barred from spying domestically on American citizens.

      As the discussions of a potential split between the National Security Agency and US Cyber Command continue to swirl, what would an empty-nested NSA, freed from its child organization, CYBERCOM, look like?

    • A Good American: Surveillance, 9/11 and the NSA

      The idea of small digital events linked together in a dance of relationships is illustrated elegantly on screen. There are shots of clouds of gnats buzzing in sunbeams, perhaps in reference to Binney’s rural Appalachian birthplace.

      The NSA’s response to the 9/11 revelations was to shelve ThinThread in favour of a much more expensive program, TrailBlazer. After NSA director Michael Hayden was appointed in 1999, Binney had been asked how he could use $1.2bn to revamp his operation. He calculated that he could organise surveillance on the entire planet in near real time, for just $300,000.

      Money may lie at the heart of the NSA’s questionable decision making. After 9/11, Binney recalls the order that came through from Maureen Baginski, the NSA’s head of Signals Intelligence (Sigint), to not rock the boat or embarrass large technology companies. “We can milk this cow for 15 years. 9/11 is a gift to the NSA. We’re going to get all the money we need and then some,” she is alleged to have said.

    • Encrypted communications could have an undetectable backdoor

      Researchers warn that many 1024-bit keys used to secure communications on the internet today might be based on prime numbers that have been intentionally backdoored in an undetectable way.

      Many public-key cryptography algorithms that are used to secure web, email, VPN, SSH and other types of connections on the internet derive their strength from the mathematical complexity of discrete logarithms — computing discrete logarithms for groups of large prime numbers cannot be efficiently done using classical methods. This is what makes cracking strong encryption computationally impractical.

      Most key-generation algorithms rely on prime parameters whose generation is supposed to be verifiably random. However, many parameters have been standardized and are being used in popular crypto algorithms like Diffie-Hellman and DSA without the seeds that were used to generate them ever being published. That makes it impossible to tell whether, for example, the primes were intentionally “backdoored” — selected to simplify the computation that would normally be required to crack the encryption.

    • NSA-style agency could install ‘trapdoors’ in many cryptographic keys – study

      It took the research team “a little over two months” to break a weakened 1,024-bit key using “an academic cluster” of 2,000 to 3,000 CPUs.

      Two years after Snowden revelations exposed “Bullrun,” Heninger and others published research posting that the NSA could break powerful encryption. Getting past 1024-bit primes would require a machine that costs a few hundred million dollars, they wrote, yet that supercomputer would still only be able to crack about one 1024-bit prime a year. A well-funded and determined institution like the NSA could fit the bill.

      Since 2010, the National Institute for Standards and Technology has recommended using keys of at least 2,048 bits, though 1,024-bit keys are still common, Ars Technica wrote.

    • NSA could put undetectable “trapdoors” in millions of crypto keys

      Researchers have devised a way to place undetectable backdoors in the cryptographic keys that protect websites, virtual private networks, and Internet servers. The feat allows hackers to passively decrypt hundreds of millions of encrypted communications as well as cryptographically impersonate key owners.

      The technique is notable because it puts a backdoor—or in the parlance of cryptographers, a “trapdoor”—in 1,024-bit keys used in the Diffie-Hellman key exchange. Diffie-Hellman significantly raises the burden on eavesdroppers because it regularly changes the encryption key protecting an ongoing communication. Attackers who are aware of the trapdoor have everything they need to decrypt Diffie-Hellman-protected communications over extended periods of time, often measured in years. Knowledgeable attackers can also forge cryptographic signatures that are based on the widely used digital signature algorithm.

      As with all public key encryption, the security of the Diffie-Hellman protocol is based on number-theoretic computations involving prime numbers so large that the problems are prohibitively hard for attackers to solve. The parties are able to conceal secrets within the results of these computations. A special prime devised by the researchers, however, contains certain invisible properties that make the secret parameters unusually susceptible to discovery. The researchers were able to break one of these weakened 1,024-bit primes in slightly more than two months using an academic computing cluster of 2,000 to 3,000 CPUs.

    • Massive report details the surveillance powers of 12 Central and South American nations

      Unblinking Eye, EFF’s giant, deep research report (available in Spanish, English and Portuguese) on the state of surveillance law in latinamerica, reveals an alarming patchwork of overbroad powers given to police forces and government agencies.

      In the 1980s and 1970s, the military dictatorships of Argentina, Chile, Paraguay, Bolivia, Uruguay and Brazil pooled their resources in something called “Operation Condor,” which was used to effect mass kidnappings, torture, murders and disappearances. Today, less than a generation later, these countries and their neighbors are effecting surveillance dragnets that are one click away from totalitarianism. Following a military coup in one of these countries, the new generalissimos would be able to quickly crush their opposition and undertake mass arrests of all potential dissidents.

      The surveillance laws in these countries have severely lagged behind the powers that the countries’ spies have bought for themselves through purchasing new high-tech toys from companies in the USA and EU. These old laws assume that wiretapping happens to one phone line at a time, not across a whole country’s communications — communications that yield far more intimate and compromising information than could be gleaned by spying on the old wireline telephone system.

    • Facebook, Twitter and Instagram sent feeds that helped police track minorities in Ferguson and Baltimore, report says

      A powerful surveillance program that police used for tracking racially charged protests in Baltimore and Ferguson, Mo., relied on special feeds of user data provided by Twitter, Facebook and Instagram, according to an ACLU report Tuesday.

      The companies provided the data — often including the locations, photos and other information posted publicly by users — to Geofeedia, a Chicago-based company that says it analyzes social media posts to deliver real-time surveillance information to help 500 law enforcement agencies track and respond to crime. The social media companies cut off Geofeedia’s access to the streams of user data in recent weeks after the ACLU discovered them and alerted the companies about looming public exposure.

      The popularity of Geofeedia and similar programs highlights how the rise of social media has given governments worldwide powerful new ways to monitor crime and civil unrest. Authorities often target such surveillance at minority groups or others seeking to publicly air political grievances, potentially chilling free speech, said the ACLU’s California affiliate, which unearthed Geofeedia’s relationship with social media companies through a public records request of dozens of law enforcement agencies.

    • Twitter’s Woes Signal the End of the Social Wars

      Two buzzwords define the past decade of computing: mobile and social. Those days are coming to an end. Although smartphones and social media remain as important as ever, the war to control those platforms are over. Winners are being coronated as the losers are, at last, conceding.

      Microsoft plans to unload what’s left of its Nokia purchase, and BlackBerry—remember them?—is abandoning the hardware business. That essentially ends the smartphone wars, leaving iOS and Android as the dominant operating systems. Now, Twitter’s ongoing woes suggest the end of the social platform wars are nigh.

    • Facebook, Twitter cut access to monitoring tool used by police

      Facebook, Instagram, and Twitter were handing over data to a monitoring tool that law enforcement agencies were using to track protesters, according to the American Civil Liberties Union.

      The social media analysis tool, called Geofeedia, had been harvesting posts from the social media networks for surveillance purposes, and more than 500 law enforcement and public safety agencies have been using it, the ACLU said in a Tuesday report.

      Through a public records request, the ACLU found that Geofeedia had entered into agreements with Facebook, Twitter, and Instagram for their users’ data.

      In uncovered emails, Geofeedia said the tool was useful for monitoring protests in Ferguson, Missouri, involving the 2014 police shooting death of Mike Brown.

      The ACLU is concerned that the tool can “disproportionately impact communities of color,” through its monitoring of activists and their neighborhoods. Among Geofeedia’s features is an interactive map of real-time Instagram posts showing user locations.

    • Why PIA doesn’t fly a warrant canary: it’s solving the wrong problem

      Private Internet Access doesn’t have a warrant canary. That’s because warrant canaries alert somebody to damage that has already happened. The right way to go about the problem is to prevent the damage from happening in the first place.

      At PIA, privacy is at the soul of what we do. Our business partners have occasionally been surprised when we say upfront that we’re in privacy first, business second – but that’s the passion we have. Making money is a matter of being able to continue pursuing the primary goal, privacy, on a sustainable basis.

    • Twitter yanks data feeding tube out of police surveillance biz

      Twitter has suspended its commercial relationship with a company called Geofeedia – which provides social media data to law enforcement agencies so that they can identify potential miscreants.

      The social media company announced the change through its Policy account on Tuesday morning following the publication of a report by the American Civil Liberties Union (ACLU) of California.

      The civil liberties advocacy organization obtained records indicating that Facebook, Instagram, and Twitter provided bulk user post data to Geofeedia, which markets its social media monitoring software to law enforcement agencies as a way to track activists, among other uses.

      Following reports alleging increased use of social media surveillance last month, both Facebook and its Instagram division ceased providing data to Geofeedia on commercial terms. Facebook did not respond to a request to provide further details.

    • Ron Wyden Discusses Encryption, Data Privacy and Security

      After Apple and the F.B.I. made their battle over encryption public in February, members of Congress quickly jumped into the debate. Some lawmakers promised new rules that would give authorities more access to smartphones, while others promised to fight off those laws.

      Yet after several hearings and bills, and the formation of congressional working groups, little has been done to resolve the central tug of war between the tech industry and federal authorities over civil rights versus national security.

      Law enforcement officials have argued that hundreds of criminal investigations have been held up by their inability to get access to locked smartphones and encrypted apps. Privacy advocates and tech companies say such access would cost people their personal information and lead to a slippery slope of surveillance.

    • “A First Amendment in the Digital Age”—Peter Zenger Lecture

      I had the honor of delivering the inaugural Peter Zenger lecture at Columbia Journalism School last week. The lecture is named for a newspaper publisher who was tried for libel in the 1730s for printing articles mocking and criticizing William Cosby, New York’s royal governor. Many historians consider Zenger’s acquittal to have been a milestone in the development of American press freedom. In my lecture last week, I offered some thoughts about digital-age threats to the freedoms of speech and the press, focusing mainly on government surveillance and secrecy. The text of my remarks is below. If readers have reactions, I’d love to hear them—I’m at Jameel.Jaffer [at] Columbia.edu.

    • Facebook’s Version of Slack Is Coming for Your Workplace. What Now?

      Sitting at work all day scrolling through Facebook is almost definitely frowned upon by your bosses, but Facebook wants to change that with the launch of a new version of Facebook—specifically designed for work—called Workplace.

      Facebook is ubiquitous. If it’s not Mark Zuckerberg handing out “Free Basics” to developing countries, it’s internet connectivity beamed down from giant, solar-powered drones. As of July 2016, the social network had 1.71 billion monthly users. Facebook is without doubt one of the most pervasive technological phenomenons of the 21st Century. Thing is, Facebook’s hit a brick wall when it comes to growth. Everybody who would want to use Facebook, generally speaking, is already, or at least will be using Facebook very soon. So, to eke out the last embers of growth in a saturated market, Facebook has now, officially, entered your workplace.

    • Toyota, BMW, Allianz ink data-sharing deal with autonomous start-up Nauto

      Global automakers Toyota, BMW and insurer Allianz will license technology from Silicon Valley start-up Nauto, which uses cameras and artificial intelligence systems in cars to understand driver behavior, Nauto said on Friday.

      Nauto Chief Executive Stefan Heck told Reuters the carmakers and insurer will integrate the technology into their test vehicles and use the aggregate and anonymized data – whether on driving habits, difficult intersections, or traffic congestion – to help develop their autonomous vehicle strategies.

      The investment by BMWi Ventures, Allianz Ventures and the Toyota Research Institute underscores the auto industry’s demand for smart systems to improve vehicle and driver safety, reduce liability and make fleet operations more efficient, while preparing for self-driving cars of the future.

    • Want to Remove a Google Result? File a Trumped-Up Lawsuit

      Across the US, dozens of lawsuits have been filed in order to remove defamatory material from review sites such as Yelp, or Google’s search results. That’s not unusual, but, the thing is, many of the defendants’ addresses are seemingly made-up, some of those named in the cases have never been informed of the suits, and some of the court documents contain forged signatures, according to The Washington Post.

      Linked to at least some of the cases is a selection of companies run by a Richart Ruddie, including SEO Profile Defense Network LLC, and Profile Defenders. Profile Defenders specialises in “online reputation management,” according to its website. In short, these companies and others are allegedly carrying out a pretty novel tactic to clean up content that would reflect negatively on its clients: filing fake lawsuits to encourage websites or online services to remove content.

    • Yahoo disables automatic email forwarding feature: AP

      Yahoo Inc disabled automatic email forwarding at the beginning of the month, the Associated Press reported, citing several users.

      While those who have set up forwarding in the past are unaffected, users who would want to leave following recent hacking and surveillance revelations are struggling to shift to rival services, the AP reported on Monday. (apne.ws/2dKpUW3)

      The company has been under scrutiny from investors after disclosing last month that at least 500 million user accounts were stolen from its network in 2014.

      Reuters reported last week, citing sources, that Yahoo last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by U.S. intelligence officials, a move that raised a lot of human rights concerns.

    • Power, secrecy and cypherpunks: how Jacob Appelbaum ripped Tor apart

      Edward Snowden’s face seems ever present in Berlin, where stickers on doors and lamp-posts promise there’s always “A bed for Snowden” and posters plug Oliver Stone’s eponymous film.

      The whistleblower’s explosive 2013 revelations about international government surveillance generated some good advertising for Berlin, cementing its reputation as hipster technology activist capital of the world. The city’s cheap lifestyle and post-second world war aversion to surveillance, as well as sympathetic Germany residency rules, have created a powerful network of support and infrastructure for its dedicated cyberactivism community. We are “poor, but sexy”, its residents like to say.

      Many of Berlin’s technologists work freelance, employed by anti-surveillance projects or secure messaging tools. And some are employed by Tor, a long running web anonymity project with something of a cult following.

      That community recently met in Seattle to tackle a new challenge: a long-running saga of allegations of sexual assault, bullying and harassment that has ripped Tor’s community apart.

  • Civil Rights/Policing

    • Delta State Police Expose Another Illegal ‘Baby Factory’ In Asaba

      On Friday, Delta State Police Command discovered another ‘baby factory’ in Asaba, the Delta State capital, following a tip-off. The police, who stormed the factory located at Oduke area within Asaba metropolis, arrested the proprietor’s husband and a female syndicate who is alleged to be the operator – as a Nurse. Sunday Vanguard gathered that the husband’s duty was to impregnate the women, whose age-range is between 18 and 20; the wife then allegedly sells the children upon delivery. The Command rescued seven pregnant girls.

    • Wheelchair-bound woman gang raped in refugee centre after asking to use the toilet

      The victim had shared a taxi home with a man after going for dinner in a restaurant in Visby, Sweden, when she said she needed to use the toilet.

      Believed to be in her thirties, the woman was then offered to use the one at her fellow passenger’s home.

      Her lawyer Staffan Fredriksson said: “She followed him in and had no fears that something would happen. Then the man took advantage of the situation. The abuse started in the toilet.”

    • Law and Order – Trump Unit
    • Judge Posner Smacks Around Cabbies For Thinking That Cities Allowing Uber Violates Their ‘Property Rights’

      It’s no secret that cab companies and many cab drivers don’t much like Uber and Lyft. Competition is tough. And cabs in most cities have survived thanks to artificial limits on competition through medallions and the like. This has always been a stupid, and frequently corrupt, system. For years, before Uber and Lyft came along, people talked about the ridiculousness of artificially limiting competition in this manner, but it was only once those companies came along that the true ridiculousness was made clear. While some forward looking cabbies have embraced these and similar systems, others have been fighting the new reality, often in fairly ridiculous ways. In Milwaukee and Chicago, cab companies sued those cities, arguing that allowing this type of competition amounted to a Fifth Amendment violation, in the form of “taking private property for public use without just compensation.” What private property, you might ask? Well, according to the cab companies, the artificially restricted competition is their property. No, really.

    • 27 Arrested Resisting Dakota Access Pipeline on Indigenous Peoples’ Day

      On Monday, protests and actions were held across the country to mark Indigenous Peoples’ Day and to oppose further construction of fossil fuel infrastructure. In North Dakota, hundreds of Native Americans and their allies gathered to resist the construction of the $3.8 billion Dakota Access pipeline, which has faced months of resistance from the Standing Rock Sioux Tribe and members of hundreds of other tribes from across the U.S., Canada and Latin America. At least 27 people were arrested blockading construction at two separate worksites, including Hollywood actress Shailene Woodley.

    • DHS Inspector General Says Office Has No Idea How New Cybersecurity Act Is Supposed To Be Implemented

      The reanimated CISA, redubbed The Cybersecurity Act (a.k.a., OmniCISA) and hurried through the legislative process by stapling its 2000 pages to the back of a “must-pass” budget bill, is still in the processes of implementation. Not much is known about what the law is intended to do on the granular level, other than open up private companies to government surveillance so the USA can beat back “the cyber.”

      Surveillance aficionados were quick to lean on private companies to start sharing information, but the government needs to be taught new tricks as well. There’s plenty of info siloing at the federal level, which keeps the DHS, FBI, and others involved in the cyberwar from effectively communicating, much less sharing anything interesting they might have had forwarded to them by the private sector.

      The federal government has been less than successful in securing its own information — something CISA was also supposed to fix. The DHS’s Inspector General has performed a follow-up investigation on the department’s implementation of CISA’s requirements. For the most part, things seem to be moving forward, albeit in a vague, undefined direction.

      The OIG notes that the DHS has put together policies and procedures and, amazingly, actually implemented some of them. Better still, it has moved many critical account holders to multi-factor authorization. Unfortunately, the DHS still has a number of standalone systems that can’t handle multi-factor authorization, which will make them more vulnerable to being breached.

    • How U.S. Torture Left a Legacy of Damaged Minds

      Before the United States permitted a terrifying way of interrogating prisoners, government lawyers and intelligence officials assured themselves of one crucial outcome. They knew that the methods inflicted on terrorism suspects would be painful, shocking and far beyond what the country had ever accepted. But none of it, they concluded, would cause long lasting psychological harm.

      Fifteen years later, it is clear they were wrong.

      Today in Slovakia, Hussein al-Marfadi describes permanent headaches and disturbed sleep, plagued by memories of dogs inside a blackened jail. In Kazakhstan, Lutfi bin Ali is haunted by nightmares of suffocating at the bottom of a well. In Libya, the radio from a passing car spurs rage in Majid Mokhtar Sasy al-Maghrebi, reminding him of the C.I.A. prison where earsplitting music was just one assault to his senses.

      And then there is the despair of men who say they are no longer themselves. “I am living this kind of depression,” said Younous Chekkouri, a Moroccan, who fears going outside because he sees faces in crowds as Guantánamo Bay guards. “I’m not normal anymore.”

  • Internet Policy/Net Neutrality

    • FCC: Comcast Routinely Charges Customers For Hardware, Services Never Ordered

      When you’re among the worst ranked companies for customer service in America, you consistently need to find new ways to ramp up your game if you want to take malicious incompetence to the next level. Enter Comcast, which despite constant promises that it’s getting better, routinely keeps finding itself in the headlines for immeasurably shady business practices. Earlier this year, for example, the company was sued by Washington’s Attorney General for charging users a $5 per month “Service Protection Plan,” then routinely and intentionally charging users for repairs that should have been covered under it.

      This week, America’s least-liked companies is finding itself in the headlines for another misleading practice: errantly and routinely billing customers for hardware or services they never ordered. According to a new FCC announcement, Comcast will be paying the agency $2.3 million to settle an investigation into the behavior.

    • To Combat Dropping Ratings, The NFL Thinks Fining Its Teams For Sharing Video On Social Media Is The Answer

      It’s been a time of remarkable progress of late when it comes to professional sports organizations being smart about how to pursue viewers in this here digital era. Major athletic institutions are finally opening up the door to wider streaming options, putting aside the doomsayers. Add to that that other leagues are starting to realize what a boon Major League Baseball’s Advanced Media product has been to viewership and attendance and it seemed like we were on the precipice of a golden age in digital sports media.

      Leave it to the NFL to ensure that we take at least one step backwards. What once seemed like a never ending funnel of money and upward trending viewership, the NFL has undergone something of a ratings correction as of late. It seems that amidst the controversy over head injury, bad officiating, the contraction of one-day fantasy football, and what some think is a generally declining quality of the on-field product, less people are watching games, both in person and on television. This had to happen at some point, if for no other reason than because NFL ratings over the past 2 decades were completely boffo. But the NFL’s choice to combat this inevitable decline takes a page from the days we finally just got over.

  • Intellectual Monopolies

    • WIPO Assembly Adopts Revisions For Stronger Oversight, Protection Of Whistleblowers [Ed: it’s hogwash, it won’t change anything unless Gurry et al resign]

      After much negotiation, amendments to a World Intellectual Property Organization internal oversight mechanism were adopted today by the annual WIPO General Assembly. Under the amendments, investigating allegations of wrongdoing of high-ranking WIPO officials will be made more transparent and facilitate access to documents by WIPO member states in case of an investigation.

    • WIPO General Assembly Agrees On Two New WIPO Offices; No Deal On Design Treaty[Ed: paywall]
    • BGH rules for patentees on appeal – again

      In two decisions published yesterday on its website, the German Federal Court of Justice (Bundesgerichtshof, BGH) overturned two decisions by the Federal Patent Court (Bundespatentgericht) invalidating the patents in suit for lack of novelty. Both decisions are remarkable not because they break new ground in (patent) law (they don’t), but rather because the BGH corrects the fact finding of the lower court and finds in favour of the patentees. They fuel the impression that the Federal Court of Justice is more patent-friendly than the Bundespatentgericht, or, to put it another way, that the Federal Patent Court has become overly strict.

    • Trademarks

      • TTAB issues final rules to increase efficiency

        The Trademark Trial and Appeal Board has issued final rules that will take effect in January. The biggest focus is on making filing completely electronic

      • Sanity: MasterCard Loses Absolutely Idiotic Trademark Challenge Against An Athletic Competition

        One wonders if there is a gas leak in the legal department at MasterCard HQ. Because there is nothing in those logos that would mislead a drunken chimp, never mind a human being. Yet MasterCard moved forward with challenging the trademark application for World Masters Games, because trademark bullying knows no limits. The Intellectual Property Office of New Zealand, fortunately, essentially laughed this out of the trademark office.

      • General Court confirms that body-builder silhouette cannot be registered as a trade mark for nutritional supplements

        In 2014 the applicant, Universal Protein Supplements Corp, filed an application with the EUIPO to have the EU territory designed in respect of the international registration of a figurative sign representing a body-builder. The application was for goods and services in the classes indicated above.

        The EUIPO examiner rejected the application, on grounds that the mark lacked any distinctive character and was descriptive for the purpose of Article 7(1)(c) of Regulation No 207/2009 on the (now) European Union Trade Mark (EUTMR).

        In late 2014 Universal Protein appealed the examiner’s decision.

    • Copyrights

      • Which “Brazil” Will Chair The Marrakesh Treaty Assembly?

        The supposedly impossible happened: The Marrakesh Treaty entered into force on 30 September, three months after reaching the necessary minimum of 20 ratifications. By then, 22 countries had done so – two more did so during the Marrakesh Assembly.

      • Court Rejects Massive Torrent Damages Claim, Admin Avoids Jail

        A former torrent site operator has largely avoided the goals of an aggressive movie industry prosecution in Sweden. Against a backdrop of demands for years in prison and millions in damages, the 25-year-old owner of private tracker SwePiracy was handed 100 hours community service and told to pay $194,000.

      • BREIN Tracks Down YouTube Pirate, Warns Others

        Dutch anti-piracy group BREIN continues to put pressure on pirates all over the Internet, including those on YouTube. This week they forced a pirating film uploader to cease his activities, warning that repeat infringers may have to pay penalties that could run into the thousands of euros.

      • MPAA Reports Pirate Sites and Hosting Providers to U.S. Government

        The MPAA has reported several piracy-promoting websites and services to the U.S. Government. The list features major torrent sites The Pirate Bay and Extratorrent, file-hosting services such as Openload and Rapidgator, and for the first time it also includes several of their hosting companies.

      • The Copyright Office wants your comments on whether it should be illegal to fix your own stuff

        Under Section 1201 of the DMCA, a law passed in 1998, people who fix things can be sued (and even jailed!) for violating copyright law, if fixing stuff involves bypassing some kind of copyright lock; this has incentivized manufacturers so that fixing your stuff means breaking this law, allowing them to decide who gets to fix your stuff and how much you have to pay to have it fixed.

        What’s more, DMCA 1201 has been used to punish and threaten security researchers who revealed defects in products with these locks, on the grounds that knowing about defects in these products make it easier to jailbreak them. That’s turning an ever-larger slice of the products we entrust with our private data, finances, health and even our lives into no-go zones for security r

]]>
http://techrights.org/2016/10/12/freebsd-11-released/feed/ 0
Links 26/8/2016: Maru OS Resurfaces, Android More Reliable Than ‘i’ Things, PC-BSD Becomes TrueOS http://techrights.org/2016/08/26/pc-bsd-becomes-trueos/ http://techrights.org/2016/08/26/pc-bsd-becomes-trueos/#comments Sat, 27 Aug 2016 00:36:20 +0000 http://techrights.org/?p=95118

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • Windows, Mac or Linux… Which operating system best suits your business?

      Linux is a free alternative. Apart from the zero-cost factor, it’s still less prone to viruses than Windows. Most Linux machines start out as Windows computers that are reformatted. Linux is also adaptable — Linux is an OS kernel, not a full system, but is the heart of software distributions such as Ubuntu or Fedora.

      As for cons, Linux is more complex to learn and use. There are also far fewer programs written for Linux systems. Of course, someone with an advanced online computer science master’s degree will help you make the most of a Linux system by supplying the skills needed to innovate and implement custom solutions for your business environment.

    • Eight free open source alternatives to Windows 10: Chrome, Ubuntu, Solus and more Linux-based alternatives – what’s the best alternative to Windows OS?

      Initially released in 2004, Ubuntu is Debian-based and part of the open source Linux family. Ubuntu uses Unity as its default user interface and can be run on smartphones, tablets and PCs.

      Key features: Libre Office, Firefox, Thunderbird, built-in Ubuntu Software Center, F-spot, an image editor, an instant messaging client called Empathy, and Ubuntu Make (developer tools centre).

      Pros: Comes with popular open source software pre-installed, like Firefox and Libre Office.

      Cons: Unfamiliar interface, perhaps aimed at more technical audience.

    • Windows 10 computers crash when Amazon Kindles are plugged in

      Dozens of Microsoft Windows 10 users are reporting that their computers crash when plugging in Amazon Kindles.

      The issue appears to be caused by the recent Windows 10 Anniversary update. Users of Amazon’s Paperwhite and Voyage attempting to either transfer books or charge their devices via USB are seeing their various Windows 10 laptops and desktops locking up and requiring rebooting.

      Pooka, a user of troubleshooting forum Ten Forums said: “I’ve had a Kindle paperwhite for a few years no and never had an issue with connecting it via USB. However, after the recent Windows 10 updates, my computer BSOD’s [blue screen of death] and force restarts almost as soon as I plug my Kindle in.”

      On Microsoft’s forums, Rick Hale said: “On Tuesday, I upgraded to the Anniversary Edition of Windows 10. Last night, for the first time since the upgrade, I mounted my Kindle by plugging it into a USB 2 port. I immediately got the blue screen with the QR code. I rebooted and tried several different times, even using a different USB cable, but that made no difference.”

      Another forum user, Tuscat, who found the issue affected both an HP laptop and a Dell desktop said: “It’s pretty frustrating because I need to transfer some PDFs to the Kindle for my son’s school classes.”

      The issue appears to be affecting regular Windows 10 Anniversary update users and those on Microsoft’s Insider programme for pre-release software testing.

    • Linux survival guide: These 21 applications let you move easily between Linux and Windows

      If you need to navigate regularly between Linux and the Windows world, there are many applications that can make your job easier. We spotlight 21 quality applications that will pave the way.

    • City of Bern starts open desktop proof of concept

      The council of the Swiss capital of Bern wants to increase the city’s use of open source software solutions. Last week, the city approved a CHF 843,00 (about EUR 750,000) proof of concept study for a switch to open source desktop solutions. The proposal was supported by a clear majority in the council, with 49 votes in favour and 18 against.

  • Server

    • Open Source, Containers and the Cloud: News from ContainerCon and LinuxCon

      LinuxCon and ContainerCon, events focused on Linux, containers and open source software, wrapped up this week in Toronto. Here’s a round-up of the announcements and insights related to cloud computing that emerged from the meeting.

      LinuxCon and ContainerCon are co-located events. That made for an interesting combination this year because Linux is an established technology, which is celebrating its twenty-fifth anniversary. In contrast, containers remain a new and emerging enterprise technology. (Yes, containers themselves are much older, but it has only been in the past three years, with the launch of Docker, that containers are becoming a big deal commercially.)

      The two events thus paired discussion of a very entrenched platform, Linux, with one that is still very much in development. But open source, the coding and licensing model behind both Linux and container platforms like Docker, tied everything together.

    • Citrix Enables NetScaler for Containers and Micro-Services

      At the LinuxCon ContainerCon event here, a core topic of discussion is about how to enable enterprises to be able to embrace containers. Citrix has a few ideas on how to help and is announcing enhancements to its NetScaler networking gear to enable load balancing for containers and micro-services.

    • Want to Work for a Cloud Company? Here’s the Cream of the Crop

      What do Asana, Greenhouse Software, WalkMe, Chef Software, and Sprout Social have in common? They’ve been deemed the very best privately held “cloud” companies to work for, according to new rankings compiled by Glassdoor and venture capital firm Battery Ventures.

      For “The 50 Highest Rated Private Cloud Computing Companies,” Glassdoor and Battery worked with Mattermark to come up with a list of non-public companies that offer cloud-based services, and then culled them, making sure that each entry had at least 30 Glassdoor reviews, Neeraj Agrawal, Battery Ventures general partner told Fortune.

  • Audiocasts/Shows

    • ‘Show-and-Tell’ Cool Maker Projects on Hangouts

      Wow! This live Hangout show looks a lot like a DIY version of one of the morning shows on over-the-air TV — and if there’s any doubt that the maker movement thrives on open source, the first guest’s project is all about Python and Arduino. Be sure to check out the cool Star Trek combadge. Beam us up, Mr. Shapiro!

  • Kernel Space

    • 25 things to love about Linux

      Today marks 25 years of Linux, the most successful software ever.

      At LinuxCon this week, Jim Zemlin of the Linux Foundation spoke words of admiration, praise, and excitement from the keynote stage, saying “Linux at 25 is a big thing” and “You can better yourself while bettering others at the same time.”

      To celebrate, we asked our readers what they love about Linux and rounded up 25 of their responses. Dive into the Linux love!

    • The 25 biggest events in Linux’s 25-year history

      You can argue about Linux’s official birthday. Heck, even Linus Torvalds thinks there are four different dates in 1991 that might deserve the honor. Regardless, Linux is twenty-five years old this year. Here are some of its highlights and lowlights.

    • 25 Years of Linux: What a Long, Strange Trip It’s Been

      Happy Birthday Linux! You’re 25!

      When Linux was born on Aug. 25, 1991, it was little more than a hobby for then 21-year old Linus Torvald. Today the Linux community is estimated to be upwards of 86 million users strong. It has become the backbone of large enterprises, and it is installed in government systems and embedded in devices worldwide.

      The Linux operating system started out as an alternative to other platform architectures in use on mainframes and enterprise back-ends. It has grown into a major mainstream computing platform for small through large companies’ server operations, and has made inroads into consumer computing.

      Linux has been ported to more hardware platforms than any other operating system, thanks to the popularity of the Linux-based Android operating system, noted Meike Chabowski, documentation strategist at Suse.

      “Today, Linux has the largest installed base of all general-purpose operating systems worldwide. Linux is also the leading operating system on servers of any sort, and of 99.4 percent of the top 500 supercomputers,” he told LinuxInsider. “Also, you find embedded Linux in a huge quantity of devices and machines — built into cars, network routers, facility automation controls, entertainment equipment, and medical equipment such as X-rays.”

      Some people do not even know they are using it. Linux is everywhere, Chabowski said.

    • Google’s Continuing & Numerous Contributions To Open-Source

      Marc Merlin of Google presented at this week’s LinuxCon 2016 event in Toronto how the company has — and continues to — contribute to open-source software.

    • Why Linux is poised to lead the tech boom in Africa

      Certain emerging markets are advancing so quickly that they aren’t just speeding through the technology phases of developed countries. They’re skipping stages entirely — a phenomenon economists call “leapfrogging.”

      The most visible signs of leapfrogging are in consumer technologies, including the rapid adoption of the internet, mobile phones and social media. By 2020, Sub-Saharan Africa is expected to be the world’s second-largest mobile Internet market, surpassing Europe and ranking only behind Asia-Pacific, according to Frost & Sullivan.

      These advances in consumer technologies are creating a corresponding need for advances in IT infrastructure. This week to help meet that need, IBM announced a new LinuxONE Community Cloud for Africa. Developers will have access at no charge for 120 days utilizing the cloud to create and test their applications on IBM LinuxONE, the industry’s most powerful Linux system.

    • 25 Awesome (And Some Unexpected) Things Powered By Linux

      From your kitchen to the reaches of outer space, Linux is truly everywhere. Here are 25 different places where you can hear the beating of an open-source heart.

    • Special Anniversary Edition: This Week in Open Source News
    • Linux turns 25 years old! Happy birthday Linux!

      Valve aren’t the only ones celebrating a birthday this week (see here). Linux also just got a bit older and wiser. Linux is officially 25 years old today!

    • ​Linus on Linux’s 25th birthday

      It’s been twenty-five years since Linux began. Today, we’re living in a world where Microsoft has embraced Linux and everything — and I mean everything — depends on Linux. It didn’t start that way. It began as a small project without any great ambitions.

    • Open source software changing the connected world
    • Linux celebrates the first of its two 25th birthdays
    • Linux turns 25: Containers, cloud and IoT present new opportunities and challenges
    • Linux turns 25, kind of runs (part of) the world
    • 25 Years of Linux and the GPL, and How Android Benefits
    • Happy 25th birthday, Linux!
    • Twenty-five years of Linux overcoming hurdles and overshooting goals
    • Linux Took Over the Web. Now, It’s Taking Over the World
    • Twenty-five years of Linux: A quiet revolution
    • Linux turns 25 years young: an open, free and exciting future lies ahead
    • Linux celebrates its 25th birthday today! But can it survive another 25 years?
    • Happy Twenty-Fifth Birthday, Linux!
    • Linux: 25 years on and still going strong
    • Tech Quiz Of The Week: Linux At 25
    • 25 Years of Linux — so far

      On August 25, 1991, an obscure student in Finland named Linus Benedict Torvalds posted a message to the comp.os.minix Usenet newsgroup saying that he was working on a free operating system as a project to learn about the x86 architecture. He cannot possibly have known that he was launching a project that would change the computing industry in fundamental ways. Twenty-five years later, it is fair to say that none of us foresaw where Linux would go — a lesson that should be taken to heart when trying to imagine where it might go from here.

    • Happy 25th Birthday, Linux!
    • Happy Birthday, Linux
    • Slides for my LinuxCon talk on Mainline Explicit Fencing

      For those of you that are interested here are the slides of the my presentation at LinuxCon North America this week. The conference was great with very good talks and very interesting meetings on the hallway track.

    • Linux 4.8 May Fix An Issue Of Some Laptops Burning Through Power While Suspended

      It looks like some newer Intel laptops will be much happier when S3 suspended with the upcoming Linux 4.8 kernel.

      For at least some newer Intel laptops with distributions like Ubuntu 16.04 LTS and Fedora was a case where suspending the system would still still be consuming much power: a hot laptop and losing around 12% of the battery life per hour while “suspended.”

    • Linux 4.8 Intel P-State vs. CPUFreq Scaling Driver/Governor Benchmarks

      Given the underlying work that’s been happening in the CPUFreq/scheduler area and the introduce of the new Schedutil CPUFreq governor, I decided to run some fresh performance benchmarks of P-State and CPUFreq with the different governor options when testing from a Linux 4.8 Git kernel atop the current Fedora 25 development packages and using a Core i5 Skylake processor.

    • Upcoming Linux Tests With A $300 Broadwell-EP Xeon CPU
    • Linus Torvalds says first Linux release wasn’t public

      Keeping up with tradition, Linus Torvalds, the creator of Linux, and Dirk Hohndel, vice president and chief of open source at VMware, sat down to talk about Linux at LinuxCon NA. Here is an edited version of the conversation, in which they talked about the email Torvalds sent out 25 years ago to announce Linux.

    • LinuxCon: Tracing Linux’s Roots, Mapping Its Future

      On Aug. 25, 1991, a student at the University of Helsinki sent out a mailing announcing a new hobby operating system project. That student was Linus Torvalds, and his hobby operating system, now known as Linux, became the most widely used OS, powering stock exchanges, supercomputers, mobile phones and much more. From Aug. 22 to 25, the Linux community gathered at the annual LinuxCon North America event here to celebrate and discuss all things Linux. A highlight of the event was the appearance of Linus Torvalds, who reminisced about the past 25 years on what has gone wrong and what has gone right with Linux. A decade ago, LinuxCon was only about Linux, but this year, the event was co-located with ContainerCon, Xen Summit and Cloud Native Day. Linux in 2016 is about more than just an operating system. It is about a wider market of open-source technologies that Linux helps enable. (Highly telling is the fact that, starting next year, the conference will be renamed the Open Source Summit.) In this slide show, eWEEK takes a look at highlights of this year’s LinuxCon event.

    • Happy birthday Linux: 25 years later, the ‘Year of Linux’ may finally be here

      25 years ago, one Linus Benedict Torvalds started working on a part-time project. This was not any project like travel, working time, hacking, learning music or anything typical. Instead, this part-time hobby project was to work on an ‘Operating System’. Yes, that’s right, an operating system.

      While mere mortals like us would waste our time gaming or sleeping, Linus Torvalds decided to build an OS. Well, technically not an entire operating system, but an OS Kernel. It’s the most crucial part of the operating system anyway.

    • Linux Celebrates Its 25th Birthday This Week
    • As Linux turns 25, its lies beyond desktops and mobile devices

      Today marks the 25th anniversary of the open-source operating system used to do everything from powering supercomputers to surfing the web: Linux.

      Linux began its journey 25 years ago, and now it’s a top product platform for apps for smartphones, Internet of Things devices, and computers—all of which primarily run on Linux.

      Jane Silber, CEO of Canonical (the company behind Ubuntu), said that the organization is continuing to “support Linux’s journey as the production platform for the enterprise and telecoms infrastructure we see today.” She added that while cloud technology runs almost entirely on Linux, Canonical still thinks the desktop is important to Linux’s growth. Ubuntu also started as a desktop OS, and it’s still used for both mobile and desktop programs, she said.

    • Linux turns 25, with corporate contributors now key to its future

      That developer was of course Linus Torvalds and his free operating system came to be known as Linux. It’s since more or less conquered the world, first becoming the de facto heir to proprietary Unix and latterly serving as the operating system for enormous numbers of devices large and small.

      El Reg runs on Linux and these even Microsoft is embracing the OS, offering it in its cloud, porting products to it and even putting Linux to work running is data centre switches.

    • 2016 LiFT Scholarship Winner Alexander Popov: Linux Kernel Contributor

      Since 2012, Alex has had 14 patches accepted into the mainline Linux kernel. With his employer, Positive Technologies, he has helped develop a bare metal hypervisor that they hope to open source soon. And this year he spoke at LinuxCon Japan about his work porting Kernel Address Sanitizer (KASan) to his company’s bare-metal hypervisor.

      He is using the free training and certification provided by the LiFT scholarship to take the Linux Kernel Internals and Development (LFD420) course from The Linux Foundation.

    • Graphics Stack

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • KaOS Brings Serious Relevance Back to KDE

        If you’ve been looking for a distribution to sway you back to the KDE desktop, look no further than KaOS. It’s beautiful, runs with the snap of a much lighter desktop, and feels as reliable as any other option available for Linux. I haven’t been this impressed with KDE for a very, very long time. And, I am certain users would find themselves equally happy to return to a desktop that has long needed a champion like KaOS.

      • Qt 5 based Colorpick

        Colorpick is one of my little side-projects. It is a tool to select colors. It comes with a screen color picker and the ability to check two colors contrast well enough to be used as foreground and background colors of a text.

      • KDE Connect 1.0 is here!

        Today we are officially publishing the first stable release of KDE Connect. Hooray! This version is the most solid yet feature-packed version we ever released. It’s been in development for a year now and it took a lot of hard work, we hope you like it!

      • KDE Connect 1.0 Released For Device/Phone Communication

        KDE Connect is the interesting project for integrating notifications and more from your phone or other mobile device onto the KDE desktop.

      • Qt Creator 4.1 Adds New Themes, Experimental Nim Support

        The Qt Company announced the release today of Qt Creator 4.1 as the newest version of its popular, cross-platform IDE.

      • Qt Creator 4.1.0 released

        We are happy to announce the release of Qt Creator 4.1.0.

    • GNOME Desktop/GTK

      • Fresh From the Oven: GNOME Pie 0.6.9 Released

        For a slice of something this weekend you might want to check out the latest update to GNOME Pie, the circular app launcher for Linux desktops.

      • GUADEC 2016 and the Butterfly Effect
      • GUADEC 2016 Notes

        I’m back from GUADEC and wanted to share a few thoughts on the conference itself and the post-conference hackfest days.

        All the talks including the opening and closing sessions and the GNOME Foundation AGM are available online. Big thanks goes to the organization team for making this possible.

  • Distributions

    • The Battle of The Budgie Desktops – Budgie-Remix vs SolusOS!

      Ladies and gentleman, it’s the moment you have all been waiting for… the main even of the evening! In this corner, wearing Budgie trunks, fighting out of Ireland, created by Ikey Doherty, the man behind Linux Mint Debian Edition — SolusOS! And in this corner, built on the defending champion, also wearing Budgie trunks, aiming to be the next flavor of Ubuntu, Budgie-Remix!

    • Reviews

      • An Everyday Linux User Review Of Antergos LinuxAn Everyday Linux User Review Of Antergos Linux

        So Antergos was recommended to me by a number of people and I have to say that the experience was decent.

        It isn’t difficult to install Antergos but if you have a slow internet connection then you have to be a bit patient.

        Most things worked ok and hardware support was fine across the board.

        The Steam thing I put down to something that the Steam developers need to resolve. Come up with a better installer.

        Would Antergos make my top five now that I have tried it? I would say no to that. It isn’t as good as Manjaro and that is the best distribution to pitch it against because they are both based on Arch. Manjaro has a more polished look and feel.

        Nevertheless Antergos is a good distribution and well worth a try.

    • New Releases

    • Red Hat Family

      • Red Hat Updates its Kernel-based Virtual Machine

        Red Hat updated its Kernel-based Virtual Machine (KVM)-powered virtualization platform for both Linux- and Windows-based workloads.

      • Red Hat Virtualization 4 Takes on Proprietary Competition

        Red Hat continues to move well beyond its core enteprise Linux-based roots with a string of new releases. The company has announced the general availability of Red Hat Virtualization 4, the latest release of its Kernel-based Virtual Machine (KVM) -powered virtualization platform. It fully supports OpenStack’s Neutron – the networking project leveraged in SDNs.

        The company emphasizes that Red Hat Virtualization 4 challenges the economics and complexities of proprietary virtualization solutions by providing a fully-open, high-performing, more secure, and centrally managed platform for both Linux- and Windows-based workloads. It combines an updated hypervisor, advanced system dashboard, and centralized networking for users’ evolving workloads.

      • Red Hat Enterprise Linux 7.3 Beta Adds NVDIMM Support, Improves Security

        Today, August 25, 2016, Red Hat announced that version 7.3 of its powerful Red Hat Enterprise Linux operating system is now in development, and a Beta build is available for download and testing.

        Red Hat Enterprise Linux 7.3 Beta brings lots of improvements and innovations, support for new hardware devices, and improves the overall security of the Linux kernel-based operating system used by some of the biggest enterprises and organizations around the globe. Among some of the major new features implemented in the Red Hat Enterprise Linux 7.3 release, we can mention important networking improvements, and support for Non-Volatile Dual In-line Memory Modules (NVDIMMs).

      • CentOS 6 Linux OS Receives Important Kernel Security Update from Red Hat

        CentOS developer and maintainer Johnny Hughes informed the community about the availability of an important Linux kernel update for the CentOS 6 Linux operating system.

        The new kernel update is here to patch various important security issues in the Linux 2.6.32 kernel packages used by CentOS 6, which is built on the freely distributed sources of the Red Hat Enterprise Linux 6 operating system. This means that the new kernel has also been pushed upstream, in Red Hat’s repositories.

      • Release of Red Hat Virtualization 4 Offers New Functionality for Workloads

        Release of Red Hat Virtualization 4 Offers New Functionality for Workloads
        Red Hat has released Red Hat Virtualization 4 (formerly Red Hat Enterprise Virtualization), the latest release of its Kernel-based Virtual Machine (KVM) virtualization platform that provides a centrally managed platform for Linux and Windows based workloads.

      • Red Hat CEO: Open-source innovation is always user-led

        According to Red Hat CEO Jim Whitehurst, the prevailing narrative about the growth and spread of Linux is only half-true.

        The idea that a doughty community of coding geniuses, led by an irascible commissar in Linus Torvalds, quietly created a technological asset that eventually spread to the biggest users in the land is actually a little misleading, he told Network World at LinuxCon North America 2016 in Toronto.

      • Finance

      • Fedora

        • Julita Inca Chiroque: How Do You Fedora?

          In 2012 Julita traveled to the Czech Republic for a hackfest. She participated with the GNOME Documentation team. She became aware of the relationship between Red Hat, CentOS and Fedora because the event was held in the Red Hat building. Chiroque was inspired to organize Fedora events after meeting Jiří Eischmann. Julita said, “I knew Jiří Eischmann from Fedora Czech Republic and I saw his work as organizer and I wanted to do the same in Peru.” She began working with Fedora LATAM to organize events, with Luis Bazan as her Fedora LATAM Mentor. Chiroque’s current focus is on young students interested in open source and Fedora.

          Julita organized the Fedora 17 release party, a five hour event, as her first in Peru. Activities included installation of Fedora and configuration of applications. The event also included a discussion on how to contribute to Fedora.

        • F25 Wallpaper

          Here are my rough designs so far for the Fedora 25 release wallpaper! Design inspiration? Archimedes; mathematician and inventor of the Achimedean screw. Note: none of these are the final design; they are just to give a sneak peak at the progress begin made by myself and the rest of the Design Team on this project

        • Another Set of Updated Fedora 24 Linux Live ISO Images Are Now Ready to Download

          Fedora Unity Project leader and Fedora AmbassadorBen Williams proudly announce the release of yet another set of updated Live ISO images for the Fedora 24 Linux operating system.

        • Wayland by default in Fedora 25?

          I’ve noticed various reports that Fedora has decided to switch to Wayland by default in Fedora 25. It’s true that the alpha release will default to Wayland, but these reports have misunderstood an authorization from FESCo to proceed with the change as a final decision. This authorization corrects a bureaucratic mistake: FESCo previously authorized the change for Fedora 24, but the Workstation working group decided to defer the change to Fedora 25, then forgot to request authorization again for Fedora 25 as required. An objection was raised on the grounds that the proper change procedure was not followed, so to sidestep this objection we decided to request permission again from FESCo, which granted the request. Authorization to proceed with the change does not mean the decision to proceed has been made; the change could still be deferred, just as it was for Fedora 24.

    • Debian Family

  • Devices/Embedded

    • 4Duino combines Arduino, WiFi, and a 2.4-inch touchscreen

      4D Systems launched a $79 “4Duino-24” Arduino compatible board, with a 2.4-inch resistive touchscreen and an ESP8266 WiFi module.

      One reason you might choose a Linux SBC like a Raspberry Pi over an Arduino is that it’s easier to control an LCD display for simple IoT GUIs and other HMI applications. Now the 4Duino-24 board aims to smooth the path to Arduino-based IoT displays with an Arduino Leonardo clone board that not only adds an ESP8266 WiFi module, but also includes a 2.4-inch TFT LCD display with resistive touch.

    • Tegra TK1 COM Express module runs Ubuntu at 15W

      Connect Tech has launched an Ubuntu-driven COM Express Compact Type 6 module with an Nvidia Tegra K1 and optional extended temperature support.

      Nvidia’s Tegra SoCs have faded fast in the smartphone world, but appear to be doing just fine in embedded, especially in automotive. (Nvidia just announced a Tegra-like, ARM Cortex-A57 based Parker SoC for its Drive PX 2 autonomous car platform.) Now Connect Tech has added to the growing market for Linux-driven, Tegra K1-based computer-on-modules aimed at the general embedded market with its “COM Express TK1 CMG601” COM Express Compact Type 6 module.

    • Raspberry Pi Foundation’s Code Club teaches kids skills to compete in our digital world

      For some time, the UK’s technology sector has been concerned about finding the right skilled workers to fill jobs in the future. This predicted “digital skills gap” warns that unless we help people to become confident with technology now, we will be facing a huge shortage in skilled workers in the future.

      One way to overcome the digital skills gap is to invest in training and education for the next generation.

      Code Club is a network of free coding clubs for primary school students, and all of the projects we work on are open source. There are over 4,500 Code Clubs currently in the UK, reaching an estimated 75,000 children.

    • Rugged 3.5-inch SBC runs Linux or Android on i.MX6

      Logic Supply has introduced a “ICM-3011” 3.5-inch board with a dual-core i.MX6, wide-range power input, and extended temperature support.

      Like the recent Pico-ITX form factor ICM-2010 SBC that’s also available in an ICS-2010 mini-PC, the ICM-3011 was built by Taipei-based Embux, and is being distributed and supported by Logic Supply. Like the ICM-2010, the $253 ICM-3011 runs on the 1GHz, dual-core DualLite version of NXP’s Cortex-A9-based i.MX6 SoC. It similarly is supported by images for Android 5.0.2 “Lollipop,” Yocto “Daisy” Linux 1.6.2, or Ubuntu Linux 12.04.

    • Phones

      • Tizen

        • Comparison of the Samsung Z1 vs Z2 vs Z3 Tizen smartphones

          Compare Samsung Z1, Z2, and Z3 Tizen Smartphones

          Lets do a quick history lesson: The first Tizen Smartphone was the Samsung Z1, then came the Z3, and yesterday was the turn of the 4G touting Z2 to take centre stage. On the whole the Z2 is very similar to the Z1 and can be thought of a Z1 2016 edition with the inclusion of 4G cellular connectivity and updated software with user requested features.

      • Android

        • iPhones are much more likely to ‘fail’ than Androids

          Apple’s once glittering reputation for quality took quite a few hits during the last few years, especially when it comes to iOS, the software that runs on iPhones. In some cases, recurrent software bugs have plagued users with issues such as the inability to use Wi-Fi, frequent crashes, and ridiculously short battery life. This week reports surfaced about a hardware flaw that makes some iPhone 6 screens inoperable. (Apple hasn’t confirmed any related problems.)

          It’s hard to tell how widespread some of these issues are, but a new report from a company that monitors smartphone quality suggests iPhones are far more likely to “fail” or suffer serious glitches than Android phones. The Blancco Technology Group says it collected performance data from millions of mobile phones during the second quarter of 2016, and it found that iPhones had an overall failure rate of 58 percent, compared to just 35 percent failure for Android devices. The term “failure” doesn’t necessarily mean that the phone has become a brick, according to Blancco. Instead, it means the device or software running on the device suffered some serious problem.

        • Maru OS is now open source (Turns Android phones into Linux desktops)

          Maru OS is a software project that lets you plug an Android phone into an external display to run desktop Linux software. First unveiled earlier this year, the software is very much a work-in-progress. Initially it only supported one phone: the Google Nexus 5.

          But things could get a lot more interesting soon, because the developer behind Maru OS has finished open sourcing the project and a group of developers are planning to start porting the software to run on additional devices.

        • Maru OS wants to turn your phone into a desktop with its latest open source build

          Not to be confused with Maru the adorable YouTube cat, Maru OS, the bite-sized Android add-on that turns your phone into a desktop, just went open source.

          Maru OS doesn’t change much about the way your phone operates on its own, but once you connect a desktop monitor via a slimport cable, Maru really comes to life. When connected to a display, Maru OS allows you to run a desktop Linux environment straight from your phone.

          Your phone is still a phone, it’ll take calls, send texts and do everything else it normally does, even while it’s connected to a desktop monitor running Linux on the side. It’s an interesting concept, but it’s still very much a work in progress. Today’s announcement could help move things along for Maru.

        • The long-awaited Maru OS source release

          Hey guys,

          I’m happy to announce that Maru has been fully open-sourced under The Maru OS Project!

          There are many reasons that led me to open-source Maru (https://blog.maruos.com/2016/02/11/maru-is-open-source/),
          but a particularly important one is expanding Maru’s device support with
          the help of the community.

          If you’d like to help out with a device port (even just offering to test a
          new build helps a lot), let the community know on the device port planning
          list (https://groups.google.com/forum/#!topic/maru-os-dev/YufKu…)
          . We currently have a few Nexus, LG, and Motorola builds being planned. If
          you don’t see your device on there and would like to help with development
          or testing, please do chip in and we’ll get it added to the list.

        • Living with Android 7.0 Nougat: The most important changes

          Android 7.0 Nougat has finally reached Google’s Nexus devices after more than five months of developer preview testing. The final version is more stable and has a ton of new features. Most phones won’t get a Nougat update for a few months at least, and that’ll only happen if the carrier and OEM consider it a high priority. What can you expect when that glorious day finally arrives? I’ve been using Nougat on both a Nexus 6P and a Pixel C for the last few days. I won’t bother reciting all the features, which you can find a simple list of them on Google’s site. Let’s talk about what it’s actually like to use Android 7.0 Nougat as a daily driver.

        • Apple’s iOS ‘Failure Rate’ Is Higher Than Android’s For First Time

          Apple’s iOS devices like iPhones and iPads crashed twice as often in the second quarter compared to the previous one, new data shows.

          Fifty-eight percent of iOS-based devices suffered from “performance failures” like apps crashing or components shutting down during the second quarter, up from 25% in the first quarter, according to a study by mobile technology service provider Blancco Technology Group (BTG).

        • Is Android malware more popular than Google’s own app?
        • Android 7.0 Nougat Tip: Manage Battery Life
        • Android 7.0 Nougat has already been ported to a phone that doesn’t support it
        • Night Mode Enabler Brings Back Android Nougat’s Night Mode
        • Is your Android phone being controlled by a rogue Twitter account? Botnet is first to receive commands via tweets
        • Nougat’s Nav bar customizer still an option for Nexus 6P owners
        • Geekbench listing shows two Nokia-branded Android phones in the works
        • How to Use Multi-Window View in Android 7 Nougat
        • 1.5m US iPhone users are about to switch to Android

          If we take ComScore figures for January 2016 we see that around 198.5 million people in the US own smartphones. 52.8 percent of these use Android and 43.6 percent use iPhones, ComScore claims.

          If we use ComScore’s figures as base we can make some estimates based on Fluent’s research. Fluent believes 29 percent of all iPhone users will definitely buy a new phone this year, and while 87 percent of them will stick with Apple (21.8 million), 6 percent will switch to Android. This suggests that around 1.5 million US iPhone users will make this switch.

Free Software/Open Source

  • 5 Ways to Solve the Open Source Industry’s Biggest Problems

    Over the last decade, open source software and its audience of end users have greatly matured. Once only used by a small subset of tech-savvy early adopters, the convenience, effectiveness and cost savings of open source solutions are now driving enterprise IT to explore more ways to take advantage of the power of open source in their daily business operations.

    In today’s economy, enterprise IT has less to gain from developing and licensing software and more to gain from actively working with existing open source technology. However, the march toward open source still faces major obstacles before it becomes mainstream. In this slideshow, Travis Oliphant, CEO and founder of Continuum Analytics, outlines five challenges preventing enterprise IT from shifting to open source and tips for tackling them to keep the future of open source heading in the right direction. The road may be winding, but it will eventually lead companies to open source to help them innovate and as the way of the future.

  • Latest attacks on privacy…

    With the EU (in this case France and Germany) gearing up for another attack on privacy I’m quite happy and proud to have been part of the release of Nextcloud 10!

  • Events

    • Conferences and Kids

      I’ve taken my daughter, now 13, to FOSDEM in Brussels every year that I had slots there. She isn’t a geek, yet enjoys the crowds and the freebies. When I could, I also took my kids to other events, where I was speaking. In this post I’d like to capture my feelings about why children should be part of conferences, and what conferences can do to make this easier.

      First off, the “why?” Traditional conferences (in all domains, not just software) are boring, ritualized events where the participants compete to see who can send the most people to sleep at once. The real event starts later, over alcohol. It is a strictly adult affair, and what happens at the conf stays at the conf.

      Now our business is a little different. It is far more participative. Despite our history of finicky magic technologies that seem to attract mainly male brains, we strive for diversity, openness, broad tolerance. Most of what we learn and teach comes through informal channels. Finished is formal education, elitism, and formal credentials. We are smashing the barriers of distance, wealth, background, gender, and age.

  • SaaS/Back End

    • Rackspace to be Acquired for $4.3B

      Rackspace announced that it is being acquired in an all-cash deal valued at $4.3B. Pending regulatory anti-trust approval, the firm will be taken private by a group of investors led by Apollo Global Management in Q4 of 2016.

      This valuation equates to a price of $32/share. The 38% premium cited in the announcement is calculated against a base share price from August 3, as the news about the pending acquisition began increasing the company stock price as early as August 4.

      For historical context, this valuation falls considerably below the company’s peak market capitalization in January 2013 when Rackspace was worth $10.9B. This means that the company’s current valuation – including the premium – is less than 40% of what it was at its highest point.

    • More on Open Source Tools for Data Science

      Open source tools are having a transformative impact on the world of data science. In a recent guest post here on OStatic, Databricks’ Kavitha Mariappan (shown here), who is Vice President of Marketing, discussed some of the most powerful open source solutions for use in the data science arena. Databricks was founded by the creators of the popular open source Big Data processing engine Apache Spark, which is itself transforming data science.

      Here are some other open source tools in this arena to know about.

      As Mariappan wrote: “Apache Spark, a project of the Apache Software Foundation, is an open source platform for distributed in-memory data processing. Spark supports complete data science pipelines with libraries that run on the Spark engine, including Spark SQL, Spark Streaming, Spark MLlib and GraphX. Spark SQL supports operations with structured data, such as queries, filters, joins, and selects. In Spark 2.0, released in July 2016, Spark SQL comprehensively supports the SQL 2003 standard, so users with experience working with SQL on relational databases can learn how to work with Spark quickly.”

    • SDN, open source nexus to accelerate service creation

      What’s new in the SDN blog world? One expert says SDN advancements will be accelerated, thanks to SDN and open source convergence, while another points out the influence SDN has in the cloud industry.

    • Platform9 & ZeroStack Make OpenStack a Little More VMware-Friendly

      Platform9 and ZeroStack are adding VMware high availability to their prefab cloud offerings, part of the ongoing effort to make OpenStack better accepted by enterprises.

      OpenStack is a platform, an archipelago of open source projects that help you run a cloud. But some assembly is required. Both Platform9 and ZeroStack are operating on the theory that OpenStack will better succeed if it’s turned into more of a shrink-wrapped product.

    • Putting Ops Back in DevOps

      What Agile means to your typical operations staff member is, “More junk coming faster that I will get blamed for when it breaks.” There always is tension between development and operations when something goes south. Developers are sure the code worked on their machine; therefore, if it does not work in some other environment, operations must have changed something that made it break. Operations sees the same code perform differently on the same machine with the same config, which means if something broke, the most recent change must have caused it … i.e. the code did it. The finger-pointing squabbles are epic (no pun intended). So how do we get Ops folks interested in DevOps without promising them only a quantum order of magnitude more problems—and delivered faster?

    • Cloud chronicles

      How open-source software and cloud computing have set up the IT industry for a once-in-a-generation battle

  • Oracle/Java/LibreOffice

    • Oracle reveals Java Applet API deprecation plan

      Oracle has revealed its interim plan to help Java devs deal with browser-makers’ imminent banishment of plug-ins.

      Years of bugs in Java, Flash and other plugins have led browser-makers to give up on plugins. Apple recently decided that its Safari browser will just pretend Java, Flash and Silverlight aren’t installed. Google has announced it will soon just not run any Flash content in its Chrome browser.

      Oracle saw this movement coming and in January 2016 announced it would “deprecate the Java browser plugin in JDK 9”

  • Education

    • Marist College, Rockefeller Archive Center Partner on Open Source Digital Archival Tech

      Marist College and the Rockefeller Archive Center (RAC) in New York have partnered to develop and implement an open source digital records management system to support researchers, archival staff and the broader archival community.

      [...]

      At the same time, one of the goals of Marist College “is to offer open source technologies, such as Liferay and Blockchain, to like-minded organizations that create a lasting impact on our community,” said Bill Thirsk, vice president of information technology and CIO at the college, in a news release.

  • Pseudo-Open Source (Openwashing)

  • BSD

    • More Details On PC-BSD’s Rebranding As TrueOS

      Most Phoronix readers know PC-BSD as the BSD operating system derived from FreeBSD that aims to be user-friendly on the desktop side and they’ve done a fairly good job at that over the years. However, the OS has been in the process of re-branding itself as TrueOS.

      PC-BSD has been offering “TrueOS Server” for a while now as their FreeBSD-based server offering. But around the upcoming FreeBSD 11.0 release they are looking to re-brand their primary desktop download too now as TrueOS.

    • PC-BSD > TrueOS, BSD’s Legacy, f25 Wayland Maybe

      A few days ago we reported that Wayland is set to be the default graphical server in upcoming Fedora 25 but today Michael Catanzaro said only if it’s ready. PC-BSD is renaming their desktop operating system to TrueOS and Christopher Tozzi looked at why BSD didn’t become the dominate Unix-clone. Elsewhere, Michael Mason examined Budgie Desktop distros and, of course, there’s more on Linux’ 25th.

    • FreeBSD 11.0-RC2 Arrives With Fixes

      The second release candidate to the upcoming FreeBSD 11 is now available for testing.

      FreeBSD 11.0-RC2 ships with various bug fixes, several networking related changes, Clang compiler fixes, and other updates.

      FreeBSD 11.0 is bringing updated KMS drivers, Linux binary compatibility layer improvements, UEFI improvements, Bhyve virtualization improvements, and a plethora of other work. Those not yet familiar with FreeBSD 11 can see the what’s new guide.

    • Open Source History: Why Didn’t BSD Beat Out GNU and Linux?

      If you use a free and open source operating system, it’s almost certainly based on the Linux kernel and GNU software. But these were not the first freely redistributable platforms, nor were they the most professional or widely commercialized. The Berkeley Software Distribution, or BSD, beat GNU/Linux on all of these counts. So why has BSD been consigned to the margins of the open source ecosystem, while GNU/Linux distributions rose to fantastic prominence? Read on for some historical perspective.

      Understanding BSD requires delving far back into the history of Unix, the operating system first released by AT&T Bell Labs in 1969. BSD began life as a variant of Unix that programmers at the University of California at Berkeley, initially led by Bill Joy, began developing in the late 1970s.

  • FSF/FSFE/GNU/SFLC

  • Public Services/Government

    • Uganda to cut costs with open source software

      Some of the FOSS customizable applications on the market include Word Press, Mozilla Firefox, and open office among others. The applications can be used to create websites, marketing business ideas, and conduct online business. Most startups find it difficult to break through but creation of an online presence has made some business gain faster traction. James Saaka, the NITA-U executive director, said government struggles to pay licenses to use programmes from Microsoft, Oracle which is so expensive to maintain.

  • Licensing/Legal

  • Openness/Sharing/Collaboration

Leftovers

  • Science

  • Health/Nutrition

    • Is Big Pharma Out to Stop—Or Take Over—Marijuana Legalization?

      Geoffrey Guy stood out when he began attending conferences of the National Organization for the Reform of Marijuana Laws in Washington, DC, in the mid to late 1990s. The stout British gentleman, dressed in a Brooks Brothers suit, was hard to miss among the other attendees dressed in tie-dye shirts and psychedelic parkas, recalled Allen St. Pierre, then NORML’s deputy national director.

      But while he might not have fit in, Guy, a doctor in his early 40s who’d already made millions by founding a UK-based pharmaceutical company, was eager to learn all he could at the events about medical marijuana.

      “He was like a dry sponge who desperately wanted to be thrown in a bucket of water,” said St. Pierre, who recently resigned from his 11-year stint as NORML’s executive director to pursue private-sector opportunities.

    • NHS cuts ‘planned across England’

      Plans are being drawn up that could see cuts to NHS services across England.

      The BBC has seen draft sustainability and transformation plans (STPs) which propose ward closures, cuts in bed numbers and changes to A&E and GP care in 44 areas.

      There have been have been no consultations on the plans so far.

      NHS England, which needs to find £22bn in efficiency savings by 2020-21, said reorganising local services is essential to improve patient care.

      But the Nuffield Trust think tank said while STPs could lead to “fundamental changes”, many of the plans do not meet the financial targets set by the government and will face a “dauntingly large implementation task”.

      Laura Townshend, director of the campaign group 38 Degrees, said the plans had received very little public or political scrutiny.

      She told BBC Radio 4′s Today programme: “A key concern is why it hasn’t been this transparent up until now.

    • NHS plans closures and radical cuts to combat growing deficit in health budget

      NHS bosses throughout England are quietly drawing up plans for hospital closures, cutbacks and radical changes to the way healthcare is delivered in an attempt to meet spiralling demand and plug the hole in their finances, an investigation by the Guardian and campaign group 38 Degrees has revealed.

      Without the changes, the NHS at local level could be facing a financial shortfall of about £20bn by 2020-21 if no action is taken, the research suggests.

      The cost-cutting shakeup is being overseen by NHS England, but is already sparking a series of local political battles over the future of services, and exposes the health secretary, Jeremy Hunt, to fresh criticism after his controversial role in the junior doctors dispute.

      Last year’s Conservative manifesto pledged an extra £8bn a year for the NHS by the end of this parliament, as demanded by the NHS chief executive, Simon Stevens, in his 2014 “five-year forward view”. But Stevens made clear that was the minimum money needed, and radical reforms to the way healthcare is delivered would also be necessary to make the NHS hit its budgets.

    • Virus Sharing Key Against Next Flu Pandemic: Global Database Hosts Genetic Data Of Flu Viruses

      When a deadly influenza virus appears and threatens to become a pandemic, time is of the essence. The 1918 flu epidemic infected a large portion of the global population and killed millions of people. The next pandemic is inevitable, and surveillance of flu viruses is essential through the timely sharing of flu virus genetic data with the scientific and research communities. A collaborative database has become prominent in recent years.

    • The feminisation of males

      An increasing number of baby boys in the UK are being born with genital disorders. One in 350 male babies have a condition known as hypospadias. Instead of the opening of the penis being at the tip, it may be lower down the penis or even around the scrotum. In a few rare cases, there may not be an opening at all.

      Other disorders of the male reproductive system are also on the increase. Cryptorchidism is the most common genital malformation of all, when one of both testes fail to descend into the scrotum, affecting between two and four per cent of baby boys. Chordee – a downward curve of the penis, especially when erect – is usually, but not always, associated with
      hypospadias. Boys with chordee often have to sit down when they relieve themselves. In later life, the severe curvature from chordee can make intercourse impossible.

      Many experts believe that the defects seen in male babies are related to a broader problem- the feminisation of men. Male sperm counts have halved since 1941. Infertility and cancer of the testes are also on the rise. Testicular cancer is now the most common cancer of young men. Hypospadias is a congenital (present at birth) anomaly (abnormality), which means that the malformation occurs during foetal development. As the fetus develops, the urethra does not grow to its complete length. Also during fetal development, the foreskin does not develop completely, which typically leaves extra foreskin on the top side of the penis and no foreskin on the underside of the penis.

  • Security

  • Defence/Aggression

    • The Death Toll in Yemen Is So High the Red Cross Has Started Donating Morgues to Hospitals

      Almost a year and a half into Saudi Arabia’s U.S.-backed bombing campaign in Yemen, the humanitarian toll has become so extensive that the International Committee of the Red Cross has taken the unusual step of donating entire morgue units to Yemeni hospitals.

      “The hospitals were not able to cope,” said Rima Kamal, a Yemen-based spokesperson for the Red Cross. “You could have more than 20 dead people brought into one hospital on one single day. The morgue capacity at a regular hospital is not equipped to handle this influx of dead bodies.”

      “At times several dead bodies had to be stored on one shelf to avoid further decomposition,” Kamal continued. “The situation was not sustainable.”

      Saudi Arabia began bombing Yemen in March 2015, after Houthi rebels took control of the capital and forced Yemen’s Saudi-backed leader, Abdu Rabbu Mansour Hadi, into exile. The United Nations has since attributed the majority of the war’s 6,500 deaths to the Saudi coalition, which the U.S. and U.K. have resupplied with tens of billions of dollars of weapons.

    • Genocide in Plain Sight: Shooting Bushmen From Helicopters in Botswana

      In a healthy democracy, people are not shot at from helicopters for collecting food. They are certainly not then arrested, stripped bare and beaten while in custody without facing trial.

      Nor are people banned from their legitimate livelihoods, or persecuted on false pretenses.

      Sadly in Botswana, southern Africa’s much-vaunted ‘beacon of democracy’, all of this took place late last month in an incident which has been criminally under-reported. Nine Bushmen were later arrested and subsequently stripped naked and beaten while in custody.

      The Bushmen of the Kalahari have lived by hunting and gathering on the southern African plains for millennia. They are a peaceful people, who do almost no harm to their environment and have a deep respect for their lands and the game that lives on it. They hunt antelope with spears and bows, mostly gemsbok, which are endemic to the area.

      According to conservation expert Phil Marshall, there are no rhinos or elephants where the Bushmen live. Even if there were the Bushmen would have no reason to hunt them. They hunt various species of antelope, using the fat in their medicine and reserving a special place for the largest of them, the eland, in their mythology. None of these animals are endangered.

    • U.S. Military Now Says ISIS Leader Was Held in Notorious Abu Ghraib Prison

      In February 2004, U.S. troops brought a man named Ibrahim Awad Ibrahim al-Badry to Abu Ghraib in Iraq and assigned him serial number US9IZ-157911CI. The prison was about to become international news, but the prisoner would remain largely unknown for the next decade.

      At the time the man was brought in, Maj. Gen. Antonio Taguba was finalizing his report on allegations of abuse at Abu Ghraib’s Hard Site — a prison building used to house detainees singled out for their alleged violence or their perceived intelligence value. Just weeks later, the first pictures of detainee abuse were published on CBS News and in the New Yorker.

      Today, detainee US9IZ-157911CI is better known as Abu Bakr al-Baghdadi, the leader of the Islamic State. His presence at Abu Ghraib, a fact not previously made public, provides yet another possible key to the enigmatic leader’s biography and may shed new light on the role U.S. detention facilities played in the rise of the Islamic State.

      Experts have long known that Baghdadi spent time in U.S. custody during the occupation of Iraq. Previous reports suggested he was at Camp Bucca, a sprawling detention facility in southern Iraq. But the U.S. Army confirmed to The Intercept that Baghdadi spent most of his time in U.S. custody at the notorious Abu Ghraib.

    • Support for Saudi Arabia Gives U.S. Direct Role in Yemen Conflict

      It was a frenetic Monday afternoon at Abs Hospital in northern Yemen, with doctors and nurses busily shuttling among the patients and a maternity ward filled with 25 women expecting to give birth.

      The bomb from the Saudi jet dropped into the middle of the hospital compound, a facility run by Doctors Without Borders, landing between the emergency room and a triage area for new patients. Nineteen people were killed, dozens were injured, and a humanitarian group that for decades has braved war zones across the globe decided it had had enough.

      Doctors Without Borders announced in the days after the Aug. 15 strike that it was pulling out of six medical facilities in northern Yemen, the latest turn in a war that has further devastated one of the Arab world’s poorest countries and has bogged down a Saudi military ill-prepared for the conflict.

    • Dad accused of imprisoning his daughter in Saudi Arabia has ‘two weeks’ to allow her home

      A Saudi academic accused of imprisoning his 21-year-old daughter at his home in Jeddah has about two weeks to comply with a British judge’s order which says the woman must be allowed to return to the UK.

      Mr Justice Holman ordered Mohammed Al-Jeffery to return Amina Al-Jeffery to Britain on August 3 after analysing the case at a public hearing in the Family Division of the High Court in London.

      The judge said Mr Al-Jeffery had to “permit and facilitate” Miss Al-Jeffery’s return to England or Wales by 4pm on September 11.

      Solicitor Anne-Marie Hutchinson, who represents Miss Al-Jeffery and is a partner at London law firm Dawson Cornwell, says her client has yet to return.

  • Environment/Energy/Wildlife/Nature

    • Indonesia fires: Environmentalists urge authorities to act

      Smoke is rising once again from the islands of Sumatra and Borneo, one year after haze from Indonesian land-clearing fires caused major health problems across South-East Asia.

      Environmentalists have urged Indonesian authorities to make good on their promises to get serious about the burning-off.

      So far, much of the haze seems to be coming from the Indonesian province of West Kalimantan, on the island of Borneo.

    • Billionaire’s 28-Year-Old Son Picks Digital Music Empire Over Palm-Oil Riches

      Kuok Meng Ru didn’t spend much time with his billionaire father when he was growing up.

      As the third child of an agribusiness tycoon, he was sent off to a British boarding school at 10, graduating later from Cambridge University with a mathematics degree.

      His father Kuok Khoon Hong was busy building Wilmar International Ltd. into the world’s largest palm-oil business, starting from scratch in 1991. His mother constantly reminded him: “Much has been given, much will be expected.”

      Yet it was the father who introduced his son to Eric Clapton’s music. That led to an obsession with B.B. King and a love affair with the blues guitar.

      “I always felt like I had a personal relationship with him,” Kuok said of the late guitarist.

    • Smoke from Indonesian fires hits ‘unhealthy’ level in Singapore

      Air pollution in Singapore rose to the “unhealthy” level on Friday as acrid smoke drifted over the island from fires on Indonesia’s Sumatra island, the National Environment Agency (NEA) said.

      Every dry season, smoke from fires set to clear land for palm oil and pulp and paper plantations in Indonesia clouds the skies over much of the region, raising concern about public health and worrying tourist operators and airlines.

      The 24-hour Pollution Standards Index (PSI), which Singapore’s NEA uses as a benchmark, rose as high as 105 in the afternoon. A level above 100 is considered “unhealthy”.

      The NEA said it planned a “daily haze advisory” as “a burning smell and slight haze were experienced over many areas” in Singapore.

      Indonesia has been criticized by its northern neighbors and green groups for failing to end the annual fires, which were estimated to cost Southeast Asia’s largest economy $16 billion in 2015, and left more than half a million Indonesians suffering from respiratory ailments.

    • Smoke from Indonesian fires hits ‘unhealthy’ levels in Singapore as authorities push to hunt offenders

      Air pollution in Singapore has risen to the “unhealthy” level as acrid smoke drifted over the island from fires on Indonesia’s Sumatra island, the city-state’s National Environment Agency (NEA) said, in a repeat of an annual crisis.

      Every dry season, smoke from fires set to clear land for palm oil and pulp and paper plantations in Indonesia clouds the skies over much of the region, raising concern about public health and worrying tourist operators and airlines.

      The 24-hour Pollution Standards Index (PSI), which the NEA uses as a benchmark, rose as high as 105 in the afternoon — a level above 100 is considered “unhealthy”.

      The NEA said it planned a “daily haze advisory” as “a burning smell and slight haze were experienced over many areas” in Singapore.

    • Indonesia Steps up Fire Response as Haze Blankets Singapore

      Six Indonesian provinces have declared states of emergency as forest fires blanketed a swath of Southeast Asia in a smoky haze.

      Singapore’s air quality deteriorated to unhealthy levels on Friday as winds blew smoke from fires on Sumatra, where millions of people are already affected by haze, across the city-state and into southern Malaysia.

      The number of hotspots detected in Sumatra and Borneo by weather satellites has increased in the past month though they are below levels last year when massive fires in Indonesia caused a regional crisis.

      Singapore’s three-hour air pollution index was at 157 by late afternoon, after peaking at 215. Its environment agency doesn’t give a health warning with the limited duration index, but on a 24-hour basis it says levels above 100 are unhealthy and above 200 very unhealthy.

    • Singapore air quality worsens overnight as Indonesia fire arrests jump

      Southeast Asia is bracing itself for its annual, uncomfortable tryst with haze as raging fires at Indonesian plantations worsen pollution in the region.

      On Friday, Singapore woke up to a deterioration in air quality overnight, as a thin cloak of haze hung over the city-state. The country’s environment agency said that its 3-hour Pollution Standards Index hit the unhealthy level at 10am SIN.

      Neighboring Malaysia had already been feeling the effects of the drifting smog since mid-August, local media reported.

      The latest bout of pollution comes even as Indonesia steps up efforts against the ‘slash-and-burn’ technique of cutting down vegetation on a patch of land, then burning off the undergrowth to make space for new plantations.

      The country has arrested 454 individuals in connection with forest fires so far this year, more than double the 196 arrests made in 2015, Reuters reported, citing police data released on Thursday.

      The ‘slash-and-burn’ method is prevalent in Indonesia as it the easiest, fastest and most cost-effective way to clear land. According to the World Bank, about 35 percent of the Indonesian workforce is employed in agriculture, with palm oil and pulp-and-paper industries key contributors.

    • Should We Be Having Kids In The Age Of Climate Change?

      Standing before several dozen students in a college classroom, Travis Rieder tries to convince them not to have children. Or at least not too many.

      He’s at James Madison University in southwest Virginia to talk about a “small-family ethic” — to question the assumptions of a society that sees having children as good, throws parties for expecting parents, and in which parents then pressure their kids to “give them grandchildren.”

      Why question such assumptions? The prospect of climate catastrophe.

      For years, people have lamented how bad things might get “for our grandchildren,” but Rieder tells the students that future isn’t so far off anymore.

      He asks how old they will be in 2036, and, if they are thinking of having kids, how old their kids will be.

  • Finance

    • Apple could be on the hook for $19 billion in taxes, and the Obama administration is livid

      The European Commission is expected to levy a judgment against Apple in the next few months that could total in the billions of euros.

      JPMorgan has estimated that Apple could be on the hook for as much as $19 billion — or about 17 billion euros — the Financial Times reports.

      The commission is accusing Apple of striking a sweetheart tax deal with Ireland, in which the iPhone maker would move its profits to wholly owned Irish subsidiaries to reduce its corporate taxes.

      Apple has one major defender in its corner, though: the US Treasury Department and, by extension, the Obama administration.

    • Uber & Lyft As An Extension Of… Or Replacement For… Public Transit
    • Bay Area transit system to subsidize Uber, Lyft rides

      In a first for California, a public transit agency next month plans to begin subsidizing fares of people who take private Uber and Lyft cars to local destinations rather than riding the bus.

    • Uber Loses at Least $1.2 Billion in First Half of 2016

      The ride-hailing giant Uber Technologies Inc. is not a public company, but every three months, dozens of shareholders get on a conference call to hear the latest details on its business performance from its head of finance, Gautam Gupta.

      On Friday, Gupta told investors that Uber’s losses mounted in the second quarter. Even in the U.S., where Uber had turned a profit during its first quarter, the company was once again losing money.

    • Uber Is Playing a $16 Billion Game of Chicken

      A Bloomberg report Thursday revealed that Uber continues to lose an astounding amount of money as it tries to figure out a business model that works internationally. Uber lost $1.27 billion globally in the first half of 2016, according to the report. But more concerning for domestic riders is the fact that, after a profitable quarter in the United States, Uber is now once again losing money in the US market as it tries to use the enormous amount of financing it’s raised ($16 billion) to destroy competitors such as Lyft.

      In its quest to corner the ridesharing market, that has meant steep price discounts and promotional fares for consumers that are subsidized by Uber’s investors. Uber lost $100 million domestically in the second quarter. Lyft isn’t faring any better—its goal is to lose less than $50 million per month, according to the Bloomberg report.

      “Uber has been engaged in a fierce price war with Lyft Inc. this year, and that has also contributed to the enormous losses,” Bloomberg reporter Eric Newcomer wrote. “Uber told investors on Friday’s call that it’s willing to spend to maintain its market share in the US. The company told investors that it believes Uber has between 84 percent and 87 percent of the market in the US, according to a person familiar with the matter. One investor said that he was expecting Uber to continue losing money in the US for the next quarter or two.”

    • Uber lost at least $1.27bn in first half of 2016 – report

      Ride-hailing giant Uber Technologies lost at least $1.27bn before interest, taxes, depreciation and amortization in the first six months of 2016, Bloomberg reported on Thursday, citing people familiar with the matter.

      The subsidies Uber grants its drivers was the main reason for the loss, finance head Gautam Gupta told investors in a quarterly conference call, Bloomberg said, citing sources.

      Uber, whose investors include Goldman Sachs Group and Amazon’s CEO, Jeff Bezos, could not immediately be reached for comment.

      The company lost about $520m in the first quarter of the year and another $750m in the second quarter, Bloomberg said.

    • Brexit pushes up price of bacon butty as China takes advantage of weak sterling to buy British pork

      The price of a bacon butty has dramatically increased after Brexit as China snaps up Britain’s pork supply and takes advantage of the UK’s weak sterling.

      Pork suppliers have revealed they had bumped up the price of a pack of British smoked bacon by as much as 38 per cent since the beginning of August, causing price increases for Britons of up to 19 per cent.

      The rise is attributed to higher demand from China who are desperately trying to import British pork to make up for their own domestic shortage after floods wiped out huge swathes of Chinese pigs.

    • Government brings forward measures to boost tourism after Brexit puts UK into bargain basement bin

      The Government is bringing forward a raft of measures to boost tourism, as a weak pound makes trips to Britain cheaper for foreigners.

      Brits’ summer holidays became more expensive across the board following the Brexit vote, as the pound fell from $1.49 on referendum day to lows of $1.28 in July and August.

      As a result the cost of a beer in New York City bar went from £3.98 to £4.65 overnight for British visitors – with similar rises for all other expenses like hotels, museums, and some flights.

    • Brexit shock fades as consumer confidence jumps at highest rate in three years

      UK consumer confidence rose the most in more than three years this month as the initial shock from the Brexit vote faded.

      An index of sentiment by YouGov and the Centre for Economics and Business Research jumped to 109.8 from 106.6 in July, which was a three-year low. The gauge is still below the level it was a year ago.

      While the Brexit vote initially knocked sentiment, it’s not yet clear how this might ripple into economic activity. The Bank of England took pre-emptive action in early August, cutting interest rates and restarting quantitative easing to counter any slowdown.

    • The top 10 reasons Brexit isn’t working, according to Brexiteers

      Over the next few years, it is likely that the economy will shrink, that the entire government will be consumed by trade negotiations at the expense of every other priority, and that EU leaders will use their considerable negotiation advantages to theatrically screw us. As this unpretty story unfolds, those who argued confidently for Brexit, in parliament and in the press, will feel compelled to maintain that they were right, and that if it hadn’t been for some other impossible-to-foresee factor everything would be going splendidly. What follows is an attempt to anticipate the most predictable post-rationalisations; I’m sure there will be more creative efforts.

    • Why the Norway model is a flawed blueprint for Brexit

      The Norway option contradicts most claims of “taking back control” made during the referendum campaign. This is because, in order to benefit from membership of the single market, Norway has to accept the free movement of persons, along with goods, services and capital. Free movement within the EEA is a package deal.

      Even if the UK was able to secure an agreement to join the EEA and introduce limits on free movement of persons (which seems unlikely), the Norway option would still betray the “control over our laws” promise, as the UK would, in practice, continue to be bound by a large proportion of EU law.

    • Brazil’s Congress — a den of corruption

      Brazil’s Senate is big on decorum, not even letting men in without a coat and tie. But when it comes to corruption allegations, the politicians judging suspended president Dilma Rousseff seem less worried.

      Analysis by corruption watchdog Transparencia Brasil reveals that 59 percent of the 81 Senate members who will vote on Rousseff’s impeachment have been convicted or been investigated for crimes at some point.

      It is the same proportion in the lower house, whose 513 deputies first ignited the impeachment process now in its final stage in the Senate.

      Rousseff is accused of illegally manipulating government accounts to mask the depth of the economic crisis. However, her alleged crime, which she argues is an accounting maneuver used by several previous governments, does not suggest personal corruption or common crime.

      The same cannot be said of many of those sitting in Congress in recent years with rap sheets ranging from embezzlement and vote buying to murder.

    • Finland plans to give out cash to create jobs

      The experiment aims to show if the measure can simplify the welfare benefits system and lower unemployment in the country.

      “The primary goal of the basic income experiment is related to promoting employment,” the ministry said.

      As part of the testing, which will begin next year, 2,000 randomly selected working-age recipients of unemployment benefit will receive a monthly tax free income of €560 instead of their current payment.

    • Finland gearing up to launch basic income experiment

      Finland is set to launch an experiment in which a group of randomly-selected recipients of unemployment benefits will receive a monthly basic income of 560 euros instead of their current benefits.

    • Finland tests giving every citizen a universal basic income

      Finland is pushing ahead with a plan to test the effects of paying a basic income as it seeks to protect state finances and move more people into the labour market.

      The Social Insurance Institution of Finland, known as Kela, will be responsible for carrying out the experiment that would start in 2017 and include 2,000 randomly selected welfare recipients, according to a statement released on Thursday.

      The level of basic income would be €560 euros per month (£480) tax free, and mandatory for those picked.

  • AstroTurf/Lobbying/Politics

    • “The Spoiler” Speaks

      Green Party presidential candidate Jill Stein on her campaign and building an alternative to the two corporate parties.

    • Did an ISIS Fighter Try to Sell Sex Slaves on Facebook?

      Well, maybe. It is amazing how these horrific stories about ISIS just happen to appear on global social media, and then are instantly picked up by the mainstream media as fact.

      Why, it is almost as if someone is creating them, and then calling the mass media’s attention to them on obscure sources, for anti-ISIS propaganda purposes. Hmm.

    • Clinton Wins in A Cakewalk? Don’t Bet the Ranch on It

      If you listen to the media and the pundits, most are predicting a surefire Clinton victory – if not a landslide. One of the reasons for this misplaced optimism is that they seem to believe Sanders’ revolutionaries are all prepared to join hands with the PACster politicians and DLC types dominating the Democratic Party and sing Kumbaya.

      [...]

      The 2014 mid-terms are a good guide in terms of what to expect. The President’s party usually loses in a mid-term, but the Democratic defeat in 2014 was off the charts. Republicans ended up with 247 House seats – their best showing since Hoover was President, and they took the Senate, ending up with 54 seats.

      Most of the pundits and even many of the Democrats themselves ascribed the 2014 shellacking to their favorite fantasy – that the majority of Americans are right-of-center and liberal issues like Obamacare sunk the Party. The fact is, the majority of Americans are left of center, and except for a brief blip in the 70’s and 80’s, they have been since World War II.

      In reality, “none of the above” won in 2014, and the Democrats lost because instead of running on progressive values they ran from them, and progressives – disgusted and with no one to vote for — stayed home in droves.

      As a result, 2014 ended up with the lowest voter turnout in over 70 years. If you were to ask what Democrats stood for in 2014, about the only conclusion you could come up with would be something like, “We’re not with the black guy, and well … er… um we really don’t like Obamacare much either …”

      Conservatives, in contrast, ran fanatically on their usual platform of jingoism, anti-government, free-marketeer nonsense, and while their base is much smaller, they got fired up and they showed up. Throw in the gerrymandered districts they got from strategically targeted down-ballot interventions in 2010, and the defeat was crippling.

    • Should Gary Johnson, Jill Stein be included in debates? Reader respond to our question: Letters

      Given the unpalatable candidates chosen by the two major parties for the upcoming presidential election, I feel it is essential that all credible third-party candidates be included in the debates, regardless whether they have polled at 15 percent or better.

      Should either the Democratic or the Republican candidate be elected president, I shudder at the tragic consequences that are sure to result. I certainly don’t plan on voting for the lesser of the two evils and hope that having third-party candidates in the debates may convince others to seriously consider voting for a third party.

    • From Dana Milbank, Trite Objections To Jill Stein

      One week after a CNN town hall event which created a momentary spike of interest in her presidential campaign, Green Party presidential candidate Jill Stein held a press conference at the National Press Club in Washington, D.C. She hoped to convince reporters from establishment media outlets to give her campaign more coverage because voters are “hungry for more” information about her candidacy.

      Washington Post columnist and contrarian Dana Milbank was present. He published a piece on Stein based on what he heard (and decided not to hear) at the Press Club. This was not the kind of media coverage Stein wanted, but it is about what her campaign could expect from a seasoned Beltway hack, who thinks everything he does is hot fire.

      Columns from the Washington Post are syndicated widely. Just as the Washington Post introduced Americans to Jill Stein through an article that underhandedly suggested she was anti-vaccine, this column will make an impression on voters. That is why it deserves to be rebutted in its entirety.

      In the piece, Milbank attacks Stein for a tactical disagreement with left-wing scholar Noam Chomsky and does so with a joke because Milbank thinks he is hilarious. He once made a joke about what kind of a beer Hillary Clinton would be, “Mad Bitch Beer,” and had to apologize for it. (Yes, sometimes his edginess gets the best of him.)

    • If You’re Worried About Trump’s ‘Alt-Right’ Then Vote Jill Stein, Not Hillary Clinton

      Donald Trump has pandered to the extreme right this election, but Republicans have always engaged in this form of politics. My first Salon article (long before Joan Walsh lobbied the publication to stop publishing me) was in 2014, regarding Paul Ryan’s “tailspin of culture” comments. From Romney’s “47% Percent” remark to Reagan’s use of the “welfare queen” stereotype, Republicans have used race as a political weapon. Trump didn’t start the GOP’s use of racism to gain votes, but he’s been more vocal than previous Republican nominees. There’s a reason he won the Republican Primary and Tea Party politics has gained greater influence within the GOP.

      However, to assume that Hillary Clinton’s speech on Trump’s “alt-right” political alliance makes the case for voting Democrat ignores recent history. Clinton and Trump are two sides of the same coin, especially considering Trump donated $100,000 to the Clinton Foundation and is friends with Bill and Hillary Clinton. Voting for the lesser evil in 2016 (assuming you view Clinton to be less evil) only bolsters the ability of establishment Democrats to take money from prison lobbyists, without the condemnation of progressive media. Therefore, the only logical choice to truly undermine “alt-right” political ideology is voting for the Green Party’s Jill Stein. I explain in this YouTube segment why progressives shouldn’t worry about Trump and must vote Jill Stein to transform America’s lesser-evil political system.

    • Democratic Pundits Downplay Serious Ethical Issues Raised by the Clinton Foundation

      The Associated Press story this week revealing that as secretary of state, Hillary Clinton frequently met with donors to the Clinton Foundation, set off a firestorm in the media. Many Democrats and sympathetic pundits are criticizing the article — and have made the sweeping claim that, contrary to many deeply reported investigations, there is no evidence that well-heeled backers of the foundation received favorable treatment from the State Department.

      While there are some legitimate criticisms of the AP story — its focus, for instance, on a Nobel Peace Prize winner meeting with Clinton distracts from the thesis of the piece — it is nonetheless a substantive investigation based on calendars that the State Department has fought to withhold from the public. The AP took the agency to court to obtain a partial release of the meeting logs. Other commentators took issue with a tweet promoting the AP piece, which they said might confuse readers because the AP story reflected private sector meetings, not overall meetings.

      But in challenging the overall credibility of the AP story, Clinton surrogates and allies are going well beyond a reasoned critique in an effort to downplay the serious ethical issues raised by Clinton Foundation activities.

  • Censorship/Free Speech

    • China announces strict rules for P2P lenders, Yirendai’s stock price plummets

      After months of very high profile problems, China’s regulators have finally announced how they’re going to fix the online P2P lending industry. Among the new rules for P2P lenders:

      No accepting public deposits
      No pooling investor money to support the lender’s own projects
      No selling financial/wealth management products
      No issuing asset-backed securities
      All lenders must use third-party banks to watch over investors’ money

    • Lawyer Sues Basically All Mainstream Media For RICO Violations For How They Report On Donald Trump

      If you do a Google search on Roy Den Hollander, as I just did, you may discover that basically every result is a story about some absolutely ridiculous lawsuit he has filed. There was the time he sued a nightclub claiming that requiring him to buy a $350 bottle of vodka was a human rights violation. Or the time he sued a bunch of night clubs for violating the 14th Amendment by having “Ladies’ Nights.” Or the time he sued Columbia University for offering women’s studies courses. Or the time he wanted to file a lawsuit to force women to register for the draft. And these are all stories from just the first page of Google results (or following links from those stories). But, you get the idea.

      And now he’s back with a new lawsuit. He’s basically suing the entire mainstream media claiming that how they report on Donald Trump is a RICO violation. No, really.

    • Ai Weiwei Says He Was Removed from Inaugural Yinchuan Biennale for Political Reasons

      Ai Weiwei at his exhibition in 2015 at London’s Royal Academy of Art. Photo Alex B. Huckle/Getty Images. Chinese artist Ai Weiwei says that his work was removed from the inaugural Yinchuan Biennale for political reasons.

    • Dissident artist Ai Weiwei says work was pulled from Yinchuan Biennale due to ‘political sensitivity’

      Chinese dissident artist Ai Weiwei says his work has been pulled from the upcoming biennale in Yinchuan, China, due to his “political sensitivity.”

      Ai said on Instagram that he received a “vague” letter from Hsieh Suchen, art director of the Museum of Contemporary Art in Yinchuan, China. The letter stated that his participation in the upcoming Yinchuan Biennale is now cancelled. The decision was made by higher officials due to his “political sensitivity,” Ai said.

      Scheduled to run from September 9 to December 18, the Yinchuan Biennale is the first biennale in the north west of China and the second in China. As the museum’s first Biennale, the exhibition represents Yinchuan’s entrance into the international art scene.

    • Groups charge censorship over relocation of paintings

      Anti-censorship groups recently appealed to the University of Wisconsin-Stout not to remove or relocate two 80-year-old paintings that depict First Nations people and French fur traders.

      UW-Stout Chancellor Bob Meyer said the paintings were being relocated for display under “controlled circumstances” because of student complaints.

      Meyer said Native American students feel the paintings symbolize a time when their land and possessions were taken from them, according to the AP. The school is moving the paintings because of their potential for harmful effect and because they could reinforce racial stereotypes.

    • Twitter, Google, Facebook “consciously failing” to police extremism, MPs claim

      Twitter, Facebook, and Google are “consciously failing” to tackle the promotion of terrorism and killings on their services in the UK, a cross-party panel of MPs has claimed.

      The home affairs committee released a report on radicalisation on Thursday morning, following a 12-month-long inquiry. And the conclusion is damning for popular online sites such as YouTube.

      “The use of the Internet to promote radicalisation and terrorism is one of the greatest threats that countries including the UK face,” it said, before adding: “Networks like Facebook, Twitter, and YouTube are the vehicle of choice in spreading propaganda and they have become the recruiting platforms for terrorism. They must accept that hundreds of millions in revenues generated from billions of people using their products needs to be accompanied by a greater sense of responsibility and ownership for the impact that extremist material on their sites is having.”

    • Newspaper Archive Disappears From Google, Because Company Wants To Cash In

      Another day, another case of copyright being used to lock up information, rather than make it more accessible. In this case, it’s the news archives of the Milwaukee Journal-Sentinel, according to an interesting piece by Henry Grabar over at Slate. A decade or so ago, the newspaper partnered with Google to digitize all of its archives and make them publicly accessible.

    • After Outpouring Of Islamophobia, Oxford Dictionaries Suspends Most-Hated Word Survey

      Oxford Dictionaries suspended its #OneWordMap most-hated words project today. An update to the blog post describing the feature stated: “We regret to inform users that due to severe misuse we have had to remove this feature from our website.”

      It’s possible that the suspension stemmed from the apparent outpouring of anti-Islam sentiment in the submissions to the project. Some Twitter accounts posted screenshots purporting to show that Oxford Dictionaries had barred certain sensitive words, like “Islam,” from submission prior to the decision to take down the project.

      However, the nature of the misuse was not specified in the site’s statement, and as of this update, Oxford Dictionaries had not responded to a request for more details about why the program was halted.

    • UK lawmakers say Facebook, Google, and Twitter are ‘consciously failing’ to fight ISIS online

      A committee of UK lawmakers this week said that Facebook, Google, and Twitter are “consciously failing” to combat terrorist propaganda and recruitment on their platforms, escalating an ongoing debate over the role of social media companies in curtailing online extremism. In a wide-ranging report on radicalization published Thursday, the UK Parliament’s Home Affairs Committee said that social media platforms have become “the vehicle of choice in spreading propaganda and the recruiting platforms for terrorism.” The Wall Street Journal first reported on the committee’s findings on Wednesday.

      Lawmakers in the US and Europe have called on social media companies to crack down on propaganda spread by ISIS and other extremist groups, following a spate of recent attacks. The Obama administration has been working with tech companies to create counter-messaging campaigns, and some social networks have publicly touted an increase in suspended accounts linked to extremist groups. But some rights groups have said that the crackdown could curtail free speech, expressing concerns over governments delegating too much power to private tech firms.

    • Twitter developing keyword filtering tool to fight abuse, says report

      Twitter is reportedly working on a feature that will let users block certain keywords in order to fight abuse, reports Bloomberg. According to anonymous sources, Twitter has been discussing the tool internally for about a year, although it’s unclear when or if it might be put into place. Bloomberg compares the keyword filtering to a feature recently added by Instagram, which lets users block comments containing certain words from appearing on their posts. But where that would outright remove messages, this system sounds more like an expansion of Twitter’s existing “mute” feature, which simply lets people avoid seeing tweets from specific accounts.

      The report suggests that users could set these filters and avoid being shown tweets with racial or gendered slurs, or they could use it for inoffensive tweets about events or conversation topics they’re not interested in. That’s different from the filters Twitter has been suspected of using in the past, which would actively prevent people from tweeting specific keywords at another user. In fact, the description makes it sound a lot like the filtering systems that already exist in third-party clients like Tweetdeck or Tweetbot, although these aren’t mentioned.

    • Political Correctness: What Words Are Okay to Say?
    • Some Words One College Won’t Encourage
    • UWM ‘Just Words’ campaign sparks criticism of censorship
    • Korryn Gaines Shooting Prompts ‘Censorship’ Change

      A collective of activists sent an open letter to Facebook Founder Mark Zuckerberg asking him to implement an “anti-censorship policy” at the company for its dealings with law enforcement officials in the wake of the death of Korryn Gaines.

      Gaines, 23, died shortly after a standoff with Baltimore police. Her confrontation with police officers, which was streamed via the social media site’s Facebook Live feature, was turned off shortly after her death.

      Archived video footage from the stream was briefly unavailable as well. According to the letter, Facebook said the inconvenience was due to a “technical glitch.”

      But the consortium of activist groups say they don’t buy the “glitch” explanation.

    • Why Did Facebook Censor the Fatal Police Shooting of Korryn Gaines?
    • Black Lives Matter Demands Facebook Revive Account Of Woman Killed For SHOOTING AT COPS With Large Gun
    • Activists Request Anti-Censorship Policy from Facebook Following Death of Korryn Gaines
    • As Summer Ends, Tensions Remain High Between Black Community and Police
    • UPDATE: Amos Yee Pleads Guilty to Three Charges of ‘Wounding Religious Feelings’
    • Singaporean dissident blogger Amos Yee pleads guilty to three more charges
    • Amos Yee enters guilty plea on three more charges
    • Don’t censor terrorists’ names
    • Terrorists’ names, faces should be published
  • Privacy/Surveillance

    • British Companies Are Selling Advanced Spy Tech to Authoritarian Regimes

      Since early 2015, over a dozen UK companies have been granted licenses to export powerful telecommunications interception technology to countries around the world, Motherboard has learned. Many of these exports include IMSI-catchers, devices which can monitor large numbers of mobile phones over broad areas.

      Some of the UK companies were given permission to export their products to authoritarian states such as Saudi Arabia, the United Arab Emirates, Turkey, and Egypt; countries with poor human rights records that have been well-documented to abuse surveillance technology.

      “At a time when the use of these surveillance tools is still highly controversial in the UK, it is completely unacceptable that companies are allowed to export the same equipment to countries with atrocious human rights records or which lack rule of law altogether. There is absolutely a clear risk that these products can be used for repression and abuses,” Edin Omanovic, research officer at Privacy International, told Motherboard in an email.

    • BAE Systems Sells Internet Surveillance Gear to United Arab Emirates

      A Danish subsidiary of British defense contractor BAE Systems is selling an internet surveillance package to the government of the United Arab Emirates, a country known for spying on, imprisoning, and torturing dissidents and activists, according to documents obtained by Lasse Skou Andersen of the Danish newspaper Dagbladet Information.

      The documents from the Danish Business Authority reveal an ongoing contract between the defense conglomerate, BAE Systems Applied Intelligence A/S, and the Middle Eastern oil federation dating back to at least December 2014.

      The contract describes an internet surveillance product capable of deep packet inspection — “IP monitoring and data analysis” for “serious crime” and “national security” investigations. That could include capabilities like mapping a target’s social networks and extracting personal information and communications from devices including voice recordings, video, messages, and attachments.

    • Why can’t Apple spend its way out of security vulnerabilities?

      On most days, it’s the largest company in the world by market cap, and a surprising amount of that money is already in the bank. At the close of Q1 this year, the company had $55 billion in easily accessible cash along with another $178 billion in long-term securities that could be cashed in if the need arose. With the core business already at its peak, there’s no obvious place to put that money, which is why it’s so easy for Tim Cook to pour cash into areas like health-tracking or Frank Ocean albums.

    • IPhone Users Urged to Update Software After Security Flaws Are Found

      One of the world’s most evasive digital arms dealers is believed to have been taking advantage of three security vulnerabilities in popular Apple products in its efforts to spy on dissidents and journalists.

      Investigators discovered that a company called the NSO Group, an Israeli outfit that sells software that invisibly tracks a target’s mobile phone, was responsible for the intrusions. The NSO Group’s software can read text messages and emails and track calls and contacts. It can even record sounds, collect passwords and trace the whereabouts of the phone user.

      In response, Apple on Thursday released a patched version of its mobile software, iOS 9.3.5. Users can get the patch through a normal software update.

    • WhatsApp privacy backlash: Facebook angers users by harvesting their data

      Stop us if you’ve heard this one: Facebook rolls out a new feature and/or acquires a new company, vowing to protect the privacy of its users’ personal information with its last dying breath. A year or two later, it backtracks and decides it wants spin your data into gold after all – and if users don’t like it, they can delete their accounts.

      And so it is with today’s news about WhatsApp, the messaging service acquired by the world’s most unavoidable social network in February 2014. In a blogpost, WhatsApp announced it would begin sharing names and phone numbers with its parent company, to allow its more than 1 billion users “to communicate with businesses that matter to you too” – like notifications from airlines, delivery services or your bank, for example.

      Facebook will also use that data to make friend suggestions and combine that data with the reams of information it has already collected so that it can tailor ads even more specifically to your interests.

      Facebook did not want to comment on the change.

      The reaction was nothing if not predictable. Tech news site Gizmodo sums up the feeling of many tech observers: “The sentiment that WhatsApp is an app that protects and cares for your privacy is no longer a reality. It was nice while it lasted.”

      Some used Reddit to voice their disappointment, like Redditor Rakajj: “WhatsApp just lost a user. Was just a matter of time once the FB acquisition went through. Guess it’s time to finally give Telegram a whirl.”

    • You can stop WhatsApp from sharing your phone number with Facebook

      Hyper-popular messaging app WhatsApp announced yesterday that it would start sharing some user data — including your phone number — with parent company Facebook. The two companies say the new policy will help you find friends and “improve your Facebook ads and products experiences,” but it will also give businesses a new avenue to reach potential customers, with WhatsApp describing situations where banks and airlines will use your phone number to get in touch about fraudulent payments or delayed flights.

      WhatsApp has promised that it won’t sell or share that number with advertisers, but if you still balk at the idea of putting your phone number where a legion of hungry brands could potentially see it, you’re in luck — you’ve still got a chance to stop WhatsApp from handing Facebook this new data if you act fast. There are two methods, as Motherboard notes, but the first has to be done before you accept the messaging app’s new terms of service. Rather than clicking “agree” blindly, press the smaller “read more” option below, and uncheck the box that reads “Share my WhatsApp account information with Facebook…”

    • Facebook Takes First Step Toward Making Money From WhatsApp Deal

      Facebook Inc. is laying the groundwork for its free messaging service WhatsApp to begin making money, easing its privacy rules so data can be used for Facebook advertising and allowing businesses to message its more than one billion users. It’s the first step toward monetizing the platform since the social network’s Chief Executive Officer Mark Zuckerberg paid $22 billion for the app in 2014.

      WhatsApp announced the change to its terms of service policy today. It allows businesses to communicate with users, including appointment reminders, delivery and shipping notifications and marketing pitches. In a corresponding blog post, WhatsApp said it will be testing the features over the coming months.

    • Here’s How to Prevent WhatsApp from Giving Facebook Your Phone Number

      A little more than two years ago, after Facebook bought his messaging startup for a cool $19 billion, WhatsApp CEO Jan Koum stressed that “nothing would change” regarding his company’s well-regarded privacy policy and its handling of user data. “There would have been no partnership between our two companies if we had to compromise on the core principles that will always define our company, our vision and our product,” Koum said.

      Times change.

      WhatsApp said on Thursday morning that it will now share with Facebook the phone numbers of its users in an effort “to improve your Facebook ads and products experiences.” So far, this “improved experience” primarily appears to mean giving businesses the ability to contact you via WhatsApp: banks will be able to message you when they detect fraudulent activity on your account, and airlines will be able to alert you when your flight is delayed. WhatsApp noted that it expects to begin testing these features within the next few months.

    • Inside Facebook’s (Totally Insane, Unintentionally Gigantic, Hyperpartisan) Political-Media Machine

      Open your Facebook feed. What do you see? A photo of a close friend’s child. An automatically generated slide show commemorating six years of friendship between two acquaintances. An eerily on-target ad for something you’ve been meaning to buy. A funny video. A sad video. A recently live video. Lots of video; more video than you remember from before. A somewhat less-on-target ad. Someone you saw yesterday feeling blessed. Someone you haven’t seen in 10 years feeling worried.

    • NSA’s SNMP exploit cyberweapon affects all Cisco ASA software

      The danger of the NSA-linked EXTRABACON exploit grew after researchers found an easy way to modify the SNMP exploit to be effective against newer versions of Cisco’s ASA software.

      EXTRABACON, released earlier this month as part of the Shadow Brokers dump of NSA cyberweapons, was described by Cisco as an exploit targeting a buffer overflow vulnerability in the Simple Network Messaging Protocol (SNMP) code used in Cisco’s Adaptive Security Appliance (ASA) software.

      Cisco admitted the underlying vulnerability could be found in all supported versions of SNMP and therefore all Cisco ASA software releases were also affected. But, preliminary research indicated EXTRABACON was designed to be effective against Cisco ASA versions 8.4(4) and earlier.

      Silent Signal, a cybersecurity company based in Budapest, Hungary, proved the EXTRABACON code was modular and could easily be modified to make the SNMP exploit work on all Cisco ASA software.

    • The National Security Agency has no idea how a rogue hacking group leaked its exploits

      The US intelligence community is still attempting to figure out how a hacking group called the Shadow Brokers was able to obtain and leak a slew of NSA computer exploits used to circumvent security of routers and firewalls, top officials have admitted.

      “We are still sorting this out,” said James Clapper, director of national intelligence, at an event at the Nixon Presidential Library on 24 August. As reported by AP, he added: “It’s still under investigation. We don’t know exactly the full extent – or the understanding – of exactly what happened.”

      In what amounted to the first official comment on the hack, it’s clear the US government is still attempting to find out the true scope of the embarrassing blunder.

      The leaked toolkits, reportedly from 2013, contained NSA surveillance and infiltration exploits that relied upon previously unknown zero-day vulnerabilities.

    • Cisco starts patching firewall devices against NSA-linked exploit

      Cisco Systems has started releasing security patches for a critical flaw in Adaptive Security Appliance (ASA) firewalls targeted by an exploit linked to the U.S. National Security Agency.

      The exploit, dubbed ExtraBacon, is one of the tools used by a group that the security industry calls the Equation, believed to be a cyberespionage team tied to the NSA.

      ExtraBacon was released earlier this month together with other exploits by one or more individuals who use the name Shadow Brokers. The files were provided as a sample of a larger Equation group toolset the Shadow Brokers outfit has put up for auction.

      ExtraBacon exploits a buffer overflow vulnerability in the Simple Network Management Protocol (SNMP) implementation from Cisco’s ASA software. It allows attackers to remotely execute rogue code on the affected devices, as long as they can send traffic to their SNMP interface. This typically requires being on the same internal network as the targeted devices.

      Even though the ExtraBacon exploit was designed to work for versions 8.4(4) and earlier of the ASA software, other researchers demonstrated that it can be modified to also work on newer versions. Cisco confirmed in an advisory that all versions of SNMP in Cisco ASA software contain the flaw.

    • The Secret Behind the NSA Breach: Network Infrastructure Is the Next Target

      Advanced attackers are targeting organizations’ first line of defense–their firewalls—and turning them into a gateway into the network for mounting a data breach. On Aug. 13, the shady “ShadowBrokers” group published several firewall exploits as proof that they had a full trove of cyber weapons. Whether intended to drive up bids for their “Equation Group Cyber Weapons Auction” (since removed), or to threaten other nation-states, the recent disclosure raises the question: if organizations can’t trust their own firewalls, then what can they trust? Does the cache of cyber weapons exposed by ShadowBrokers signal a shift in attack methods and targets?

    • NSA Leaks are Scaring Big Tech. Heres Why

      After an unknown group came public with a cache of hacking tools from the National Security Agency earlier this week, some of the biggest tech companies in the world are in a hurry to fix their systems and software to protect themselves and customers from attacks.

      The leak came from an anonymous group and is calling itself The Shadow Brokers. While the group’s beginnings and reasons for the leak are unknown, cybersecurity experts and former agency employees have authenticated the NSA hacking tools.

      By exposing the custom-made malware online, the Shadow Brokers have made many of the systems American corporations rely on for security online more vulnerable to cyberattacks from criminals and spies.
      Many cybersecurity pros are asking why the NSA would stockpile so many of these kinds of security vulnerabilities without telling the affected companies such as networking giants Cisco and the digital security firm Fortinet.

    • Cisco Patches ASA Devices Against EXTRABACON

      Cisco has begun releasing software updates for its Adaptive Security Appliance devices to patch a zero-day flaw that was revealed via leaked Equation Group attack tools. Cisco ASA devices provide anti-virus, firewall, intrusion prevention and virtual private network capabilities (see Equation Group Hacking Tool Dump: 5 Lessons).

    • The Shadow Brokers Release More Potent Exploits To The Public

      The Shadow Brokers continue to make a name for themselves. Although their Bitcoin auction is not seeing much success, the group recently leaked some Cisco firewall exploits.

    • The NSA hacked equipment from Cisco, Huawei, and Juniper

      With sensitive NSA documents falling into the hands of hacking group Shadow Brokers, it was only a matter of time before the world gained some further insights on the security agency’s latest work.

    • Apple Updates iOS To Close Three Separate 0days That Were Being Exploited

      As you may have heard, if you have an iOS device (iPhone, iPad, even iPod Touch) you should be updating your devices, like a few hours ago. Seriously, if you haven’t done it yet, stop reading and go update. The story behind this update is quite incredible, and is detailed in a great article over at Motherboard by Lorenzo Franceschi-Bicchierai. Basically after someone (most likely a gov’t) targeted Ahmed Mansoor, a human rights activist in the United Arab Emirates with a slightly questionable text (urging him to click on a link to get info about prison torture), a team of folks from Citizen Lab (who have exposed lots of questionable malware) and Lookout (anti-malware company) got to work on the text and figured out what it did. And, basically the short version is that the single click exploits three separate 0days vulnerabilities to effectively take over your phone in secret. All of it. It secretly jailbreaks the phone without you knowing it and then accesses basically everything.

    • To The NSA, The Word ‘Security’ Is Synonymous With ‘Gaping, Unpatched Holes In US Developers’ Software’

      Suck it up, Cisco. That gaping hole uncovered by the Shadow Brokers was discovered at least three years ago by the NSA and if it chose not to tell you about it, it had its reasons. Namely: national security.

      The Obama administration made sympathetic noises in the wake of the Snowden leaks, suggesting the NSA err on the side of disclosure. It simultaneously gave the agency no reason to ever do that by appending “unless national security, etc.” to the statement.

      But part of the phrase “national security” is the word “security.” (And the other part — “national” — suggests this directive also covers protecting US companies from attacks, not just the more amorphous “American public.”) Allowing tech companies who provide network security software and hardware to other prime hacking targets to remain unaware of security holes doesn’t exactly serve the nation or its security. So, while Tanji may claim the NSA isn’t in the QA business, it sort of is. The thing is the NSA prefers to exploit QA issues, rather than give affected developers a chance to patch them.

    • Germany Interior Minister Pushing For Deployment Of Facial Recognition Software In Public Areas

      Facial recognition software is the wave of the future present. The FBI — acting without a required Privacy Impact Assessment — rolled out its system in 2014, finding that a 20% false hit rate was good enough for government (surveillance) work.

      Following in the footsteps of Facebook, governments slanting towards the authoritarian side (that’s you, Russia!) have deployed facial recognition software to help ensure its citizens are stripped of their anonymity.

      Other governments not so seemingly bent on obedience to the state have done the same. UK law enforcement has quietly built a huge facial recognition database and Brazil experimented with police equipment that would turn officers into Robocops — providing real-time facial recognition to cops via some sort of Google Glass-ish headgear. If what we know about facial recognition software’s accuracy rates holds true, the goggles will, indeed, do nothing.

      Germany has maintained an arm’s-length relationship with its troublesome past. The Stasi and Gestapo’s lingering specters still haunt current legislators, occasionally prompting them to curb domestic surveillance efforts. Concerns for the privacy of its citizens has also sometimes resulted in the government making angry noises at tech companies it feels are overstepping their boundaries.

    • EU backs Franco-German bid for access to encrypted messages

      France and Germany want to compel operators of mobile messaging services to provide access to encrypted content to terrorism investigations, after a series of deadly attacks in both countries.

      French intelligence services, on high alert since attackers killed hundreds of civilians in Paris in November and in Nice in July, are struggling to intercept messages from Islamist militants.

      Many of the groups now use encrypted messaging services rather than mainstream social media, with Islamic State a big user of such apps, investigators in several countries have said.

      French Interior Minister Bernard Cazeneuve said the European Commission should draft a law obliging operators to cooperate in investigations of militants.

      “If such legislation was adopted, this would allow us to impose obligations at the European level on non-cooperative operators,” he told a joint conference with his German counterpart in Paris.

  • Civil Rights/Policing

    • Why Obama Should Pardon Edward Snowden

      The power of independent journalism was demonstrated last week when the Justice Department announced the end of privately run prisons in the federal prison system. Seth Freed Wessler explains what it took to uncover dozens of questionable deaths in these corporate, for-profit facilities in his yearlong investigation for The Nation.

      [...]

      Plus: Amnesty for Edward Snowden. ACLU attorney Ben Wizner argues that President Obama should do the right thing in view of the NSA whistle-blower’s contributions to freedom and democracy.

    • Canadian Law Enforcement Want Government To Force People To Turn Over Their Passwords

      Mandating the divulging of passwords relies on some very dubious assumptions. One, it assumes that any information still unseen by prosecutors or investigators is of evidentiary value — hence the perceived need to force suspects to unlock devices. As was seen in the San Bernardino case, a lengthy court battle and a million-dollar payout to Israeli hackers recovered nothing of interest from the shooter’s iPhone.

      Second, it assumes law enforcement will use this power wisely and with restraint — something that has historically been a problem for it. When an agency uses repurposed military technology (Stingrays) to (almost) hunt down fast food thieves, it’s safe to assume forcing someone to expose their “whole personal life” by turning over a password is likely to result in the same sort of misuse… and abuse. It won’t be reserved for the “worst of the worst” criminal suspects and will likely be legislated into existence without enough statutory restrictions to prevent device seizures incident to even the most innocuous of arrests to be viewed as evidentiary fishing expeditions.

      The only standing between this law (if it becomes law) will be Canada’s judges. While some judges may be unwilling to expose a person’s entire life just because law enforcement swears it’s necessary, others will be more amenable. Bring on the forum shopping!

    • Jeff Wood’s Stay of Execution Casts More Doubt on the Texas Death Machine

      Terri Been was being interviewed by a reporter inside a Whataburger restaurant in East Texas on the afternoon of August 19 when the text came in: Her brother, Jeff Wood, on death row for his alleged involvement as an accomplice in the 1996 murder of his friend, and facing imminent execution, had been granted a stay. She read the text sent by Wood’s attorney twice before dialing him up. “Are you serious?” she asked.

      It had been a long and emotionally taxing day: Been and her husband, her parents, Wood’s daughter, and another friend had traveled to Huntsville, Texas, the location of the state’s execution chamber, for the first of several eight-hour visits with Wood in anticipation that he would be executed sometime after 6 p.m. on Wednesday, August 24. The news from the lawyer, Jared Tyler, was a serious relief. “I consider it a miracle,” she told The Intercept. “He’s stopped Texas from killing my brother.”

      That afternoon the state’s highest criminal court, the Court of Criminal Appeals, agreed with Tyler that a state district court should determine whether the punishment hearing portion of Wood’s 1998 trial was infected by junk science and misleading testimony offered by the notorious Dr. James Grigson. If the district court agrees that it was tainted, Wood could get a new hearing, and a chance to get off of death row.

      Grigson, who died in 2004, was known even among peers in the psychiatric community as “Dr. Death” for routinely offering scientifically unsupportable testimony that helped to send defendants to death row in a number of capital cases. He was expelled from the American Psychiatric Association and its Texas counterpart prior to testifying in Wood’s case, where he opined that unless sentenced to die Wood would continue to be violent, a determination he made without ever examining Wood.

    • When Boats Brought Hope to Gaza

      Israel continues to cut off the 1.8 million people of Gaza from receiving relief supplies from sea, an illegal blockade that will be challenged again this year by the Women’s Boat to Gaza, writes retired Col. Ann Wright.

    • What Israel’s Actions Have Wrought

      Israel’s repression of the Palestinians is often rationalized by the historical abuse of the Jews, but Israel’s misconduct is having the disturbing effect of stirring up new anti-Semitism, observes Lawrence Davidson.

    • Another Brick in the Wall: Children of the American Police State

      The nation’s young people have been given front-row seats for an unfolding police drama that is rated R for profanity, violence and adult content.

      In Arizona, a 7-year-old girl watched panic-stricken as a state trooper pointed his gun at her and her father during a traffic stop and reportedly threatened to shoot her father in the back (twice) based on the mistaken belief that they were driving a stolen rental car.

      In Oklahoma, a 5-year-old boy watched as a police officer used a high-powered rifle to shoot his dog Opie multiple times in his family’s backyard while other children were also present. The police officer was mistakenly attempting to deliver a warrant on a 10-year-old case for someone who hadn’t lived at that address in a decade.

      In Maryland, a 5-year-old boy was shot when police exchanged gunfire with the child’s mother—eventually killing her—over a dispute that began when Korryn Gaines refused to accept a traffic ticket for driving without a license plate on her car.

    • Baltimore Police Can’t Explain Why Their All-Seeing Spy Planes Were Kept Secret

      Police officials in Baltimore are trying to deflect controversy over an aerial mass-surveillance program exposed earlier this week, in which a private company quietly keeps watch over a 32-mile radius of the city by flying planes overhead for as many as 10 hours a day.

      The pilot program, which according to Bloomberg Businessweek has been run by the Ohio-based company Persistent Surveillance Systems since January, allows Baltimore police to do retroactive and real-time aerial tracking of people and vehicles using technology adapted from the Iraq war, which its creator describes as “Google Earth with TiVo capability.”

      During a press conference on Wednesday, Baltimore Police Department spokesperson TJ Smith attempted to dismiss privacy concerns about the BPD’s eye in the sky, going as far as refusing to call the program “secret.”

      “Secrecy is not the right word because it’s not a secret spy program … this is something that we’re looking into,” Smith said during the press conference, which was streamed on Periscope and Facebook Live.

    • ‘You are now in Canada’: Anger management ordered for Iranian-born man who attacked wife’s boss

      An Iran-born Edmonton man has been ordered to take anger management courses following a “nasty” attack on his wife’s boss stemming from a male co-worker saying hello to her in a mall.

      Aadel Moradi, 39, was given a suspended sentence and placed on probation for 18 months on Tuesday in provincial court after pleading guilty to assault charges over what was an apparent clash of cultures.

      “This was very nasty,” said Judge Kirk MacDonald, who described the Nov. 6, 2015, incident as a minor assault with “disturbing” undertones.

      “You are now in Canada. We do not place restrictions on the way that women live here, unlike in some other countries,” said MacDonald, adding it is “very sad” that Moradi doesn’t see it.

      The judge told Moradi — a Kurd who emigrated here from a city near Tehran about 15 years ago — that he had considered sending him to jail, but accepted the joint submission by Crown and defence.

      “Just because you think someone has displayed bad manners, getting into a fight is no remedy for that,” said MacDonald.

      Crown prosecutor Bethan Franklyn told court that Moradi and his wife had been at a city mall in late October 2015 when one of her co-workers came up to say hello.

    • Hindus flee Muslim extremists after Koran burned in Pakistan

      In the provincial town of Ghotki near Pakistan’s border with India, Ashok Kumar is packing his bags.

      He’s reached breaking point. Like many of his neighbours, and other Hindus in Sindh province, the small trader is fleeing to India.

      “I have four daughters and I fear that one day they will be kidnapped and will be converted to Islam forcibly and will be forced to marry Muslims,” he says.

    • Saudis and Extremism: ‘Both the Arsonists and the Firefighters’

      Hillary Clinton and Donald Trump do not agree on much, but Saudi Arabia may be an exception. She has deplored Saudi Arabia’s support for “radical schools and mosques around the world that have set too many young people on a path towards extremism.” He has called the Saudis “the world’s biggest funders of terrorism.”

      The first American diplomat to serve as envoy to Muslim communities around the world visited 80 countries and concluded that the Saudi influence was destroying tolerant Islamic traditions. “If the Saudis do not cease what they are doing,” the official, Farah Pandith, wrote last year, “there must be diplomatic, cultural and economic consequences.”

      And hardly a week passes without a television pundit or a newspaper columnist blaming Saudi Arabia for jihadist violence. On HBO, Bill Maher calls Saudi teachings “medieval,” adding an epithet. In The Washington Post, Fareed Zakaria writes that the Saudis have “created a monster in the world of Islam.”

      The idea has become a commonplace: that Saudi Arabia’s export of the rigid, bigoted, patriarchal, fundamentalist strain of Islam known as Wahhabism has fueled global extremism and contributed to terrorism. As the Islamic State projects its menacing calls for violence into the West, directing or inspiring terrorist attacks in country after country, an old debate over Saudi influence on Islam has taken on new relevance.

    • Literal Fashion Police Arrest Hundreds Of WhatsApp And Instagram Users In Iran

      I’ll admit I’ve had some fun in these pages with my friends over in the Iran over the years. In my defense, they have at times made the job quite easy for me, between trying to bolster their military reputation through video game footage, trying to suggest that the West carve out a non-free speech zone when it comes to criticizing Islam or members of its faith, and the country’s policy of futility in trying to block its citizens from using the wider internet. These are actions worth criticism and scorn.

      But things got a just a bit more dangerous for some in Iran this past week, as the country has announced it is cracking down on its citizens for actions against Islam and for infractions of fashion on display on several social media services. It seems some portion of the Revolutionary Guard has quite literally become the Fashion Police.

    • France’s Highest Court Suspends Burkini Ban In One Town, Other Challenges May Follow

      France’s highest administrative court, the Conseil d’État, reversed the burkini ban imposed in the town of Villeneuve-Loubet near Nice on Friday.

      At a hearing Thursday, the court heard a challenge — brought by the Human Rights League of France (LdH) — to the town’s decision to ban the full-body swimsuits with hoods that are popular with Muslim women. The attire has been at the center of a fierce religious and political debate in the country.

      The court invalidated the decree banning the burkinis for the city of Villeneuve-Loubet. In its ruling, also issued in English, the court said, “The mayor’s order had seriously infringed, in a manner that was clearly illegal, fundamental liberties such as the freedom to come and go, religious freedom and individual freedom.”

    • Lack of Accountability Has Made Baltimore an Overpoliced Panopticon
    • Private Prison Involved in Immigrant Detention Funds Donald Trump and His Super PAC

      Geo Group, the second largest private prison company in the U.S., and a major player in for-profit immigrant detention, filed a disclosure this month revealing that it provided $50,000 through its political action committee to Rebuilding America Now, the Super PAC backing the presidential campaign of Donald Trump.

      While Trump has not used his campaign to purchase campaign advertisements, an unusual dynamic noted by many in the campaign press, Rebuilding America Now has become his de facto paid media voice, with $2 million in recent anti-Hillary Clinton ad buys.

      Trump has promised sweeping policies to detain and deport millions of undocumented immigrants, a policy platform that he routinely references at rallies across the country.

      “You’re going to have a deportation force, and you’re going to do it humanely,” Trump explained on MSNBC last year. He also called for tripling the number of Immigration and Customs Enforcement agents and ending birthright citizenship, a right enshrined in the 14th Amendment to the Constitution.

    • French muslim gang probed after British women GROPED and ASSAULTED on Spanish holiday

      One woman, a 19-year-old from Farnborough in Hampshire, suffered a broken nose after being punched in the face.

      A second woman, a 20-year-old from Essex, was taken to hospital semi-conscious with arm and head injuries.

      Witnesses claimed the men, French-born but of Arabic origin, began to attack the young women in the upmarket resort of Puerto Banus near Marbella after one tried to touch up the teenager who suffered the broken nose.

      One man was arrested for assault and three friends taken with him to a nearby police station so they could be identified as part of an ongoing investigation.

  • Intellectual Monopolies

    • WIPO External Offices In High Demand As 18 Countries Offer Hosting [Ed: So they want violations?]

      Hosting a regional or national office of the UN World Intellectual Property Organization seems to be a high prize for WIPO members, 18 of which have submitted hosting proposals to be considered at the WIPO Program and Budget Committee next week. Most of those 18 countries are developing nations and all sought to demonstrate their commitment to intellectual property rights and IPR protection, with some underlining the importance of considering level of development. According to regional press reports, Algeria and Nigeria have been selected by the African region to host the two African external offices.

    • Copyrights

      • Is hosting providers’ safe harbour the real problem of copyright owners? A new article [Ed: No, the problem is that we’re led to assume ISPs are in the business of copyright judgment and policing]

        In the context of its Digital Single Market Strategy [Katposts here] the EU Commission is currently engaged in a discussion of whether the liability principles and rules contained in that EU directive for the benefit of ISPs should be amended [the next EU copyright package is awaited for release in the second half of September - see here for a leaked version].

        With specific regard to copyright, one of the principal concerns relates to a particular type of ISP, ie hosting providers.

        Unlicensed hosting providers have been increasingly said to invoke the relevant safe harbour immunity in the EU Ecommerce Directive [Article 14] lacking the conditions for its application. This alleged abuse has led to a distortion of the online marketplace and the resulting ‘value gap’ indicated by some rightholders.

      • The FBI’s Megaupload Domains Are Now Hosting Porn Ads

        Well, we know the FBI is particularly adept at hosting porn on the internet. After all, just a few days ago it was revealed that in the short time it was running a child porn site as a honeypot, it actually made the site run much faster. But now Torrentfreak points us to the news that some other FBI sites are serving up porn as well, though mostly out of FBI incompetence, rather than competence. Apparently the domain the FBI was using for its nameservers for the domains it seized from Megaupload expired, and someone else snapped it up and redirected all the sites using those nameservers to advertisements basically for porn. So, the FBI is now essentially pointing people to porn via Megaupload.

      • Dotcom Wants Extradition Hearing Live-Streamed, U.S. Does Not

        Kim Dotcom is hoping to have his fight with the U.S. government pushed further into the public consciousness by having his extradition appeal streamed live on the Internet. U.S. authorities are already objecting to Dotcom’s application but they could be up against stiff opposition since New Zealand is proud of its courtroom transparency.

      • Team Prenda Done Fighting Judge Otis Wright

        Well, one of the big Prenda cases may finally be over. As you may recall, the first truly scathing legal ruling against Team Prenda came a little over three years ago when Judge Otis Wright basically lit Team Prenda on fire.

      • Comcast/NBC Tone Deafness, Not ‘Millennials’ To Blame For Olympics Ratings Drop

        Olympics watchers repeatedly begged Comcast for live opening ceremonies, more live events, less host prattle, and fewer ads ahead of the recent games in Rio. What did Comcast deliver instead? A smorgasbord of abysmal bloviation, tape delays, and so many advertisements that many people stopped watching in disgust. As a result, the Rio Olympics were the lowest rated Summer Olympics since 2000, with average viewership down 17% and an overall audience that was 25% smaller than 2012 in the 18-to-49 demo.

      • If You’re Angry About Twitter Banning Someone ‘Permanently’ For Sharing Olympics GIFs, Blame Copyright Law

        The story has gone pretty viral (on Twitter, naturally), with lots of people expressing anger at Twitter. It also appears that soon after the story started spreading, Twitter actually changed its mind and put back his account.

        Here’s the thing, though: if you want to get upset about this, don’t get upset at Twitter. Get furious at parts of the DMCA and how some courts have interpreted it lately (and the International Olympic Committee — it almost always deserves the anger that is pointed in its direction for its extreme protectionist/copyright policies). But remember, not too long ago, the ISP Cox lost big time in an important DMCA case, at the key issue that swayed the judge was the lack of a competent “repeat infringer policy.” And what was one of the key things in that case? The fact that Cox didn’t permanently ban people.

        So if you’re the legal team at Twitter, and you’re keeping up on the caselaw, you better believe that you’re going to make sure that you have a serious “repeat infringer policy” that kicks people off permanently for sharing a few pieces of copyright-covered material. Because even as basically everyone is saying “what? you shouldn’t lose your account permanently for sharing a few happy gifs from the Olympics,” in court it would be spun as “Twitter has a history of failing to reasonably implement a repeat infringer policy, as required by the DMCA in Section 512(i)(1)(A).” And if the Olympics or whoever gets a judge like the one in the Cox case, who doesn’t seem to care much about whether people use the internet or not, Twitter might just lose.

]]>
http://techrights.org/2016/08/26/pc-bsd-becomes-trueos/feed/ 0
Links 21/8/2016: Apple and Microsoft Down, Systemd Spreading to Mount http://techrights.org/2016/08/21/systemd-spreading/ http://techrights.org/2016/08/21/systemd-spreading/#comments Sun, 21 Aug 2016 14:40:20 +0000 http://techrights.org/?p=95014

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Open365 – Clouding with style

    Office, suite, cloud. Sounds familiar. Google Docs. Yup. Microsoft Office 365. Yup. LibreOffice. No. Wait, what? Buzzwords around modern technology concepts are all too easy to ignore, but this one actually caught my attention beyond the almost-too-cliche dotIO domain, the blue design very reminiscent of Docker (hint), and optimistic text that promises wonders.

    Anyhow, Open365 is an all-in-one productivity suite, based on KDE, Seafile, LibreOffice, Docker, and Jitsi. That’s enough buzz to keep you warm till 2020, but is it any good? Or rather, can it compete with the proven giants out there? I decided to explore and see what gives.

  • ReactOS 0.4.2 Officially Released
  • Web Browsers

    • Mozilla

      • 3 Firefox Add-ons Every Ubuntu User Needs

        Firefox is the default browser in Ubuntu — but it doesn’t integrate with the Unity desktop as well as it could.

        That’s where the following Ubuntu Firefox add-ons come in. These little extras, trivial though they seem, help to bridge the (admittedly few) gaps and missing functionality between browser and OS.

      • Mozilla is changing its look—and asking the Internet for feedback

        Mozilla is trying a rebranding. Back in June, the browser developer announced that it would freshen up its logo and enlist the Internet’s help in reaching a final decision. The company hired British design company Johnson Banks to come up with seven new “concepts” to illustrate the company’s work, as shown in the gallery above.

        The logos rely on vibrant colors, and several of them recall ’80s and ’90s style. In pure, nearly-unintelligible marketing speak, Mozilla writes that each new design reflects a story about the company. “From paying homage to our paleotechnic origins to rendering us as part of an ever-expanding digital ecosystem, from highlighting our global community ethos to giving us a lift from the quotidian elevator open button, the concepts express ideas about Mozilla in clever and unexpected ways” Mozilla’s Creative Director Tim Murray writes in a blog post.

        Mozilla is soliciting comment and criticism on the seven new designs for the next two weeks, but this is no Boaty McBoatface situation. Mozilla is clear that it’s not crowdsourcing a design, asking anyone to work on spec, or holding a vote over which logo the Internet prefers. It’s just asking for comments.

  • Oracle/Java/LibreOffice

  • Pseudo-Open Source (Openwashing)

  • BSD

    • DragonFlyBSD Decides To Drop PulseAudio

      DragonFlyBSD developers have decided to remove PulseAudio from their dports packaging system and patch their desktop software to not depend upon this open-source sound server.

      Running PulseAudio on DragonFlyBSD appears to cause problems for users, similar to PulseAudio in its early days on Linux, “the pulseaudio server didn’t seem to work and even caused one CPU to spin at 100% usage. Moreover, it seems that firefox, even if built without pulseaudio, would detect if PA was installed and use it over ALSA resulting in no sound and a spinning CPU,” according to John Marino who removed PA from DragonFlyBSD.

    • LLVM Clang 3.9 Still On Track For Release Next Week

      LLVM release manager Hans Wennborg tagged LLVM 3.9.0-rc2 on Thursday and it’s still looking like LLVM/Clang 3.9 could ship on schedule next week.

      Hans noted in the RC2 announcement, “This is a release candidate in the very real sense that if nothing new comes up, this is be what the final release looks like. There are currently no open release blockers, and no patches in my merge-queue.”

Leftovers

  • Know English? For New York Cabdrivers, That’s No Longer Required [iophk: "This change is so wrong on many levels. There are many, many reasons to require a basic ability to communicate."]

    Hail a yellow taxi in New York City, and there is a good chance the driver is from another country. Passengers are regularly exposed to a range of languages that span the globe, from Spanish to Bengali to Urdu.

    It can be charming, but also maddening for riders who feel that drivers do not understand where they want to go. Don’t you have to speak English, some wonder, to drive a taxi here?

    As of Friday, the answer is no.

    That is when new rules went into effect eliminating the requirement that taxi drivers take an English proficiency exam. Now, the test for a taxi license is available in several languages, to accommodate non-English speakers.

  • Health/Nutrition

    • Building alternatives for food systems and trade

      And it’s not over yet. As public pressure continues this year, whether through vibrant events like Rock Against the TPP ! or organized pressure on specific members of Congress, there is a concerted demand by progressive civil society organizations and leaders to halt current trade agreements and to insist on a different process, different rules, and a different vision of what comes next. We need trade policy that serves to reduce inequality, build local economies and enhance environmental sustainability.

    • CDC Expands Zika Travel Advisory in Miami

      The Centers for Disease Control and Prevention (CDC) on Friday expanded its unprecedented travel advisory warning pregnant women to avoid several neighborhoods in Miami, Florida.

      The initial advisory, issued on August 2, was the first of its kind for a continental U.S. city.

      The expanded advisory names “a second zone of local Zika transmission, a swath of Miami Beach that includes the popular tourist magnet of South Beach,” the New York Times reports.

      The initial area touched on “the Wynwood, Midtown, and Design District neighborhoods in Miami, popular with tourists,” the Miami Herald notes.

    • Revealed: Banned drugs used by cheating athletes for sale just TWO MILES from Olympic venues in Rio

      Banned performance enhancing drugs used by athletes to cheat their way to medals and glory can be bought in Rio de Janeiro less than two miles from where Olympic events take place.

      The Rio Olympics is under the shadow of drugs because of the presence of Russia after allegations of a state sponsored cover-up of cheating athletes and the comparative ease with which performance improving substances can be obtained in the host city will cause serious concern.

      Two athletes Chinese swimmer Chen Xinyi, 18, who finished fourth in the 100m butterfly in Rio, and Bulgarian steeplechaser Silvia Danekova – have been exposed in the first week of the Games.

    • ‘BernieCare’ can save ObamaCare

      The decision by Aetna to withdraw from many ObamaCare exchanges was a predictable outrage that opens to the door not to the demise of ObamaCare, but the dramatic improvement of ObamaCare led by a grand battle by Sen. Bernie Sanders (Vt.) and progressives to enact the public option and move toward a Medicare-for-all healthcare system.

      Let’s coin the phrase “BernieCare” to describe the kind of healthcare system that progressives believe, with some reason, would be the kind of program that voters prefer. Sanders has long been a champion of single-payer healthcare — which I personally support — but for obvious political reasons in a lobbyist-dominated Washington, single payer is highly unlikely to happen soon.

    • This Town Is Sick of Drinking Polluted Water

      In Alabama’s Black Belt, a region where the vestiges of slavery still manifest in chronic poverty and crumbling infrastructure, a more recent legacy of mining and industry is haunting the land through poisoned waterways and toxic soil.

      Yet the region has long been the rural core of civil-rights struggles, and along the Black Belt, local citizens are trying to revive a legacy of activism as they struggle to restore their environment.

      In Uniontown—in Perry County, one of the state’s poorest—residents say they have been systematically denied the basic dignity of decent sanitation—what activists see as the residue of institutionalized racism.

    • Poor Sanitation Persisted at U.N. Missions Long After Haiti Cholera Crisis

      Years after medical studies linked the 2010 cholera outbreak in Haiti to infected United Nations peacekeepers, the organization’s auditors found that poor sanitation practices remained unaddressed not only in its Haitian mission but also in at least six others in Africa and the Middle East, a review of their findings shows.

      The findings, in audits conducted by the United Nations Office of Internal Oversight Services in 2014 and 2015, appear to reflect the organization’s intent to avoid another public health crisis like cholera.

      But the findings also provide some insight into how peacekeepers and their supervisors may have been either unaware of or lax about the need to enforce rigorous protocols for wastewater, sewage and hazardous waste disposal at United Nations missions — despite the known risks and the lessons learned from Haiti, where at least 10,000 people have died from cholera and hundreds of thousands have been sickened.

    • As UN Admits Role in Haiti Cholera Crisis, Audits Show No Lessons Learned

      A day after the United Nations admitted that it helped spread cholera in Haiti, the organization also found that poor sanitation persisted in its missions around the world—from the Caribbean nation to Africa and the Middle East.

  • Security

    • New BlackArch Linux ISO Released with Over 1,500 Penetration Testing, Hacking Tools
    • Address Bar Spoofing Vulnerability Found in Several Browsers

      Chrome, Firefox and other web browsers are plagued by vulnerabilities that can be exploited to spoof their address bar. Some of the affected vendors are still working on addressing the issues.

      Pakistan-based researcher Rafay Baloch discovered that the address bar in Google Chrome, also known as the omnibox, can be tricked into flipping URLs.

      The problem, which affects Chrome for Android, is related to how Arabic and Hebrew text is written from right to left (RTL). If an attacker’s URL starts with an IP address and it contains an Arabic character, the URL’s host and path are reversed.

  • Defence/Aggression

    • Breaking from Saudi Arabia!!! Two Month Old Misleading News

      In spite of the fact that this “exclusive” — which has since been reported by other outlets with similarly misleading headlines — describes two month old news, it nevertheless obscures that fact with its editorial choices, as here where it suggests the move “reduces,” in present tense, staff numbers, or the headline which hides that, in fact, the US already withdrew these staffers.

      [...]
      s
      I’d also suggest that reports about what non-uniformed US personnel are doing in Yemen’s immediate neighborhood would be a better gauge of the support we’re giving Saudi Arabia beyond refueling their aistrikes, the latter of which has not stopped at all.

    • Dragon Rising? China seeks Closer military Cooperation with Syria

      The Arabic press is reporting that a high Chinese official on a visit to Damascus has announced that Beijing intends to strengthen its military relationship with the current Syrian government. At the same time he affirmed that China would avoid involvement in the civil war. Reuters broke the story in the West.

      China has a long history of involvement in Syrian security affairs and is already doing some training of the Syrian military. But Beijing now seems intent on taking the relationship to the next level.

      The news comes in the wake of reports that Russia is strengthening its own military ties with Iran and may be flying missions against fundamentalist rebels in Syria from that country.

      China and Russia both belong to the Shanghai Cooperation Organization, which appears to see Iran and Syria as potential strategic assets in its rivalry with the US and NATO. They feel as though NATO stole Libya from them, and are determined to make a stand in Syria. The newspaper of the Chinese military said that Russia’s moves in Crimea and Syria should be studied by Chinese officers. Iran has observer status in the SCO.

    • Bolivia Builds Anti-Imperialist School to Counter US Hegemony

      ‘If the empire teaches domination of the world from its military schools, we will learn from this school to free ourselves from imperial oppression,’ says Bolivian President Evo Morales

    • Bolivia opens ‘anti-imperialist’ military school to counter US foreign policies

      Bolivia’s president Evo Morales has opened a new “anti-imperialist” military academy to counter US policies and military influence in Latin America.

      “If the empire teaches domination of the world from its military schools, we will learn from this school to free ourselves from imperial oppression,” the country’s first indigenous president said at an inauguration ceremony on Wednesday.

    • U.S. Defense Contractors Tell Investors Russian Threat Is Great for Business

      The escalating anti-Russian rhetoric in the U.S. presidential campaign comes in the midst of a major push by military contractors to position Moscow as a potent enemy that must be countered with a drastic increase in military spending by NATO countries.

      Weapon makers have told investors that they are relying on tensions with Russia to fuel new business in the wake of Russian’s annexation of Crimea and modest increases in its military budget.

    • A Lawless Plan to Target Syria’s Allies

      Official Washington’s disdain for international law – when its doing the lawbreaking – was underscored by ex-CIA acting director Morell voicing plans for murdering Iranians and maybe Russians in Syria, ex-CIA analyst Ray McGovern says.

    • Marcos Redux

      We interrupt election news just long enough to bring you breaking news of Ferdinand Marcos, deceased. As corpses’ sojourns go, his has been one of the most enduring, due in large part to the devoted attention of his wife, Imelda. To long time readers of this column, apologies are in order since some of what is described today was reported ten years ago in this very space.

      Ferdinand moved to Hawaii in 1986, having been overthrown as president of the Philippines in a People Power Revolution. His move was assisted by President Ronald Reagan who arranged for the United States Air Force to provide two U.S. Air Force C-141s to carry the Marcos family, its retainers and belongings to Hawaii. Sadly, Mr. Marcos’s sojourn there was cut short by his death on September 28, 1989. His death marked the end of one adventure but the beginning of another, an adventure that will end on September 18, 2016, when he will come to rest in the Heroes Cemetery in Manila.

    • We Can’t Say We Didn’t Know

      A word about five-year-old Omran Daqneesh. The image of him sitting still, stunned, bloodied in an ambulance after being scooped out of rubble from an air strike on Aleppo has quickly spread, reads one account, “shocking and disturbing social media users.” Well yes. Shocking and disturbing. Harrowing and heartbreaking. But, to be clear, not exceptional. Up to a half million Syrians have been killed in Russian and Assad air strikes, many aimed at Aleppo. “These are children bombed every day,” notes Mustafa al-Sarout, an Aleppo-based journalist who filmed the rescue, and was surprised at the reaction. “This child is a representative of millions of children in Syria and its cities.”

      Those there or witness to it say the same things. “Everyone is bombing Syrians, and no one cares,” says Dr. Zaher Sahloul, founder of the American Relief Coalition for Syria and former president of the Syrian American Medical Society. The story not being told in the media: “Civilians are suffering every day. Children are being mutilated and killed… Hospitals are targeted. Schools are targeted. Fruit markets are targeted. This is the tragedy that we are living in.” A tragedy, he adds, that most of the world turns away from, because we can. Because we can be shocked, even surprised despite the years-long carnage, and then go on with our lives, as silent as Omran in his ash and blood and shock.

    • China and the U.S. are Approaching Dangerous Seas

      A combination of recent events, underpinned by long-running historical strains reaching back more than 60 years, has turned the western Pacific into one of the most hazardous spots on the globe. The tension between China and the United States “is one of the most striking and dangerous themes in international politics,” says The Financial Times’ longtime commentator and China hand, Gideon Rachman.

      In just the past five months, warships from both countries—including Washington’s closest ally in the region, Japan—have done everything but ram one another. And, as Beijing continues to build bases on scattered islands in the South China Sea, the United States is deploying long-range nuclear capable strategic bombers in Australia and Guam.

      At times the rhetoric from both sides is chilling. When Washington sent two aircraft carrier battle groups into the area, Chinese defense ministry spokesman Yang Yujun cautioned the Americans to “be careful.” While one U.S. admiral suggested drawing “the line” at the Spratly Islands close to the Philippines, an editorial in the Chinese Communist Party’s Global Times warned that U.S. actions “raised the risk of physical confrontation with China.” The newspaper went on to warn that “if the United States’ bottom line is that China has to halt its activities, then a U.S.-China war is inevitable in the South China Sea.”

    • US Support for Saudi Coalition Remains Steadfast, Despite Growing Outcry

      The U.S. remains defiant in its support for the Saudi campaign in Yemen, even as its backing for the ongoing and indiscriminate assault comes under increasing scrutiny.

      Following a week that saw the Saudi-led coalition kill significant numbers of Yemeni civilians, including in an attack on a school and the bombing of a Doctors Without Borders facility—which led the charity to announce it was pulling its staff from the northern part of the country—Reuters reported exclusively on Friday that the Pentagon in June withdrew military personnel who were involved in planning the campaign from Saudi Arabia.

      “Fewer than five U.S. service people are now assigned full-time to the ‘Joint Combined Planning Cell,’ which was established last year to coordinate U.S. support, including air-to-air refueling of coalition jets and limited intelligence-sharing,” according to the news service, which cited Lieutenant Ian McConnaughey, a U.S. Navy spokesman in Bahrain. That’s down from a peak of 45, he said.

    • Richard Holbrooke and the Obama Doctrine

      In 1975, during Gerald Ford’s administration, Indonesia invaded East Timor and slaughtered 200,000 indigenous Timorese. The Indonesian invasion of East Timor set the stage for a long and bloody occupation that recently ended after an international peacekeeping force was introduced in 1999.

      Transcripts of meetings among Indonesian dictator Mohamed Suharto, Ford, and Secretary of State Henry Kissinger have shown conclusively that Kissinger and Ford authorized and encouraged Suharto’s murderous actions. “We will understand and will not press you on the issue [of East Timor],” said President Ford in a meeting with Suharto and Kissinger in early December 1975, days before Suharto’s bloodbath. “We understand the problem and the intentions you have,” he added.

    • Neofascism of the Law and Order Candidate

      Henry Giroux tells Paul Jay that fear is an organizing principle of U.S. society

    • Turkey and Iran Reach Agreement on Conditions for Syria Peace

      In a stunning diplomatic surprise, Turkey and Iran have announced a preliminary agreement on fundamental principles for a settlement of the Syrian conflict.

    • Hillary Clinton’s War Policy

      As a result of Trump’s stumbles, Hillary Clinton seems to be on course to become next president of the United States and it is depressing to reflect on what some of her policies might be if she achieves that office. Unfortunately, the future looks bleak for peace and stability around the world.

      She is one of the Washington-Brussels war-drum beaters who planned the 2011 aerial blitz on Libya to destroy the government of President Gaddafi, about whose murder she giggled that “We came; We saw; He died.” The US-NATO attacks on Libya caused massive suffering and destruction, opened the way for feuding bands of militants to fight each other for control of parts of the country, and created a haven for the lunatic extremists of Islamic State.

    • A Battle to the Death in Syria

      All sides are terrified of each other and with good reason: Amnesty International last week published a report describing how 17,723 people, or 300 a month, have been tortured or otherwise done to death in Syrian government prisons since 2011. Most of the 4.8 million Syrian refugees come from opposition areas, many of which have been flattened by bombs, shells and bulldozers so they look like pictures of Warsaw in 1945.

    • Photo of the Week: Omran Daqneesh, Pulled From the Rubble in Aleppo

      Who’s to blame? Forces loyal to President Bashar al-Assad or his Russian allies launched the bomb into rebel-held Aleppo more than five years into a war that has spanned the whole of Omran’s life. According to the Syrian Network for Human Rights, Russian bombings recently overtook Islamic State as a cause of civilian deaths in the country.

    • Is UK foreign policy helping to fuel the conflict in Syria?

      With the Syrian war escalating, I sat down with Andy Baker, the Regional Program Manager for Oxfam’s Syria crisis response. I asked about the humanitarian situation, the UK’s role in the conflict and what policy Oxfam believes the UK should be following in Syria.

  • Environment/Energy/Wildlife/Nature

    • Internet energy impacts on climate

      Switch off your computer, dust off your old typewriter, sharpen all the pencils you can find, lay in stocks of postage stamps − and that’s just the start.

    • The Climate Catastrophe Cannot Be Reversed Within the Capitalist Culture

      His face was hacked off. Left prostrate in the red dust, to be preyed on by vultures, his body remained intact except for the obscene hole where his magnificent six foot long tusks used to be. Satao was a so-called tusker, an African elephant with a rare genetic strain that produced tusks so long that they dangled to the ground, making him a prime attraction in Kenya’s Tsavo East National Park.

      These beautiful tusks also made him particularly valuable to ivory poachers, who felled him with poison arrows, carved off his face to get at his tusks, and left his carcass for the flies. The grisly death of Satao, one of Africa’s largest elephants, is part of a violent wave of poaching that is sweeping the continent today. In 2011, twenty-five thousand African elephants were slaughtered for their ivory. An additional forty-five thousand have been killed since that time. If the present rate of slaughter continues, one of the two species of African elephants, the forest elephant, whose numbers have declined by 60 percent since 2002, is likely to be gone from Africa within a decade.

    • Social Media Exposes Devastating Effects of Louisiana Flood (Multimedia)

      It’s been labeled “the worst U.S. disaster since Hurricane Sandy,” yet many are accusing the mainstream media of providing too little coverage of the catastrophic flooding across Louisiana.

      The flooding, which began earlier this week, has left at least 13 people dead and tens of thousands homeless. On Friday, Republican presidential nominee Donald Trump paid a highly publicized visit to the state, despite a plea from Louisiana’s governor for political figures to avoid photo ops in the flooded areas. “Trump told reporters he came to help out,” reports Bryn Stole of Reuters. “Louisiana Gov. John Bel Edwards’ office, however, had said Trump did not call to discuss plans.”

    • Rock-solid carbon storage hopes rise

      Study of natural carbon dioxide reservoirs shows that the greenhouse gas could be safely stored deep underground for tens of thousands of years.

    • The New Normal: Organizing to Break the Cycle of Climate Disaster

      The record-breaking floods in Louisiana are the latest example of what many working people already know all too well: climate change has already begun, and it is wrecking our communities.

      So far, over 30,000 people have been evacuated from their homes, 10,000 people are in shelters, and those numbers are rising. The shelters themselves are experiencing flooding, and some families have already been relocated multiple times. At this point, almost 30 parishes have been declared major disaster areas.

    • Amid Flooding, Groups Call for End to ‘Unconscionable’ Fossil Fuel Auctions

      A coalition of climate and advocacy groups on Friday called on the Obama administration to cancel an upcoming fossil fuel auction as Louisiana reels from the unprecedented floods that have ravaged the state—and which rescue groups have described as the worst U.S. disaster since Superstorm Sandy.

      The organizations, including 350.org, CREDO, and Greenpeace, circulated a petition imploring President Barack Obama to call off the planned August 24 offshore drilling lease auction for a portion of the Gulf of Mexico “the size of Virginia.” The auction is set to take place in the New Orleans Superdome, which became an infamous symbol of climate injustice and bureaucratic callousness when Hurricane Katrina victims were forced to take shelter there in 2005.

    • Scientists link conflict and climate change

      Ethnic conflict linked to tragic episodes of civil war, waves of refugees and even the collapse of nation states could be made more likely by climate-related disasters.

      A team of European scientists say they can demonstrate, “in a scientifically sound way”, a link between civil violence based on ethnic divisions, and episodes of drought, intense heat or other climate-linked weather extremes.

      That climate change seems to be a factor in social collapse is now fairly firmly established. Researchers have identified evidence of prolonged drought that preceded the collapse of Assyrian and Bronze Age civilisations in prehistory.

    • For Future Summer Olympics, Climate Change Is No Game

      The Lancet researchers made use of the global attention being paid to the Olympics to make a bigger point: “The world beyond 2050 poses increasingly difficult challenges … because the extent and speed of change might exceed society’s ability to adapt.” Half the world’s workers work outdoors, they note, and, increasingly, the outdoors, and indoor spaces without cooling, are becoming unsafe. They warn that “exertional heat stroke and its negative outcomes, including mortality, will become a large part of outdoor work around the world.” Drawing from another sports example, thousands of workers are toiling in extreme heat in Qatar, building the stadiums for the 2022 World Cup soccer championships. The International Trade Union Confederation estimates that “more than 7,000 workers will die before a ball is kicked in the 2022 World Cup.”

    • From Epic Fires to a 1,000-Year Flood: The Climate Change of Here and Now

      From deadly floods in Louisiana to an “explosive” wildfire in California, the impacts of the climate change are being felt across the United States this week.

      Neither extreme weather event can be exclusively blamed on global warming. But record-breaking heat, warmer oceans, and drier brush—all linked to man-made climate change—are certainly contributing factors.

      “Climate change is never going to announce itself by name. But this is what we should expect it to look like,” declared Jonah Engel Bromwich at the New York Times, referring to the flooding in southern Louisiana, which has been called the worst natural disaster to strike the U.S. since Superstorm Sandy.

      In fact, current analyses suggest that—as was the case in 2012—greenhouse gas emissions and resultant climate change at the very least increased the severity of the storm that brought on the flooding.

    • As Louisiana floods rage, Republicans are blocking modest climate action

      If we needed a reminder of the importance of taking climate change seriously, the floods in Louisiana are providing a big one on a daily basis. When it comes to the big environmental issues, our country’s polarization is historically unusual, and it’s already gone way too far. That’s why the latest fight to break out in Washington over climate issues needs more attention.

      On 1 August, the White House Council on Environmental Quality issued a non-binding suggestion, formally known as “guidance”, to federal agencies to think about climate change when making decisions under a law called the National Environmental Policy Act (Nepa). What should have produced a shrug (or, hopefully, a cheer) caused a panic on the right that’s only getting louder.

      Under Nepa, federal agencies have to account for the environmental impacts of taking major actions such as approving a mine permit, constructing or removing a dam or allowing a road near a protected habitat. These decisions are made by trained scientists and public servants with years of expertise and involve an unparalleled level of public input. By and large, they are among the most rigorously footnoted and well-supported decisions the federal government makes, and Nepa is one of the best vehicles the public has to express concerns about federal impacts on homes and communities.

    • Clinton Foundation Should Also Divest Its Fossil Fuel Holdings

      350 Action, the political arm of climate organization 350.org that has supported the fossil fuel divestment movement, is celebrating today’s announcement that the Clinton Foundation will stop receiving corporate donations if Hillary Clinton is elected President, and urging the Foundation to go a step further by divesting all of its holdings in fossil fuel companies.

    • Dakota Pipeline Construction Halted Amid Ongoing ‘Defiance of Black Snake’

      Hillary Clinton called to ‘take a stand against this ominous pipeline as well as the brazen violation of our treaty rights’

    • North Dakota pipeline construction halted until court date
    • Hillary Clinton must stand with Native Americans

      Democratic presidential nominee Hillary Clinton says she is committed to supporting Indian country. Well, now her commitment is being put to the test.

      Thousands of Native Americans and allies, including actress Shailene Woodley, have been at the Standing Rock Sioux reservation in North Dakota to protest the construction of the Dakota Access Pipeline there. The almost $4 billion, 1,172-mile-long pipeline, which received its permits from the Army Corps of Engineers in July, will snake through ancient Standing Rock Sioux burial grounds and may also threaten the peoples’ drinking water.

  • Finance

    • Reality is broken

      Then the Brexit vote happened and over the next two weeks of utterly surreal political chaos it became apparent that I had a Problem.

    • Zuckerberg Sells $95 Million in Facebook Shares for Philanthropy [iophk: “for some special definitions of ‘donate’”; Zuckerberg appears to be embracing Bill Gates’ method of tax evasion, to shelter is his growing wealth.]

      Facebook Inc. Chief Executive Officer Mark Zuckerberg has made his first big share sale to fund his family’s philanthropic initiative.

      The sale of more than 760,000 shares of Facebook stock, valued at about $95 million, was made by Chan Zuckerberg Initiative Holdings and the Chan Zuckerberg Foundation, according to a regulatory filing Friday. The price of the shares ranged from $122.85 to $124.31.

    • How Trump and Christie Colluded to Steal $25 Million From NJ Taxpayers

      The very thought of New Jersey Governor Chris Christie, a man with all the charm and temperament of Bluto, being commander-in-chief was luckily destroyed. His pathetic and nonexistent presidential run proved that America preferred an even bigger, louder and more unstable narcissistic a-hole in Donald Trump. But since he can’t keep being governor of New Jersey forever, the blob of buffoonery has to kiss up to Trump in the hopes that it gets him an unelectable cabinet-level position. Well, that cynical effort appears to be playing out quite beautifully.

      The sketchy relationship between Christie and Trump took on a new chapter after a New York Times report showed that Trump’s $30 million casino tax debt, something New Jersey officials fought endlessly to collect, was suddenly reduced by a massive amount after Christie took office in 2010.

    • Detroit Ready to Sue Banks, Private Companies for Unpaid Property Taxes

      Detroit has finally set its sights on some of the real culprits of the city’s financial crisis—the banks and for-profit companies that refuse to pay their share.

      The city on Wednesday said it issued demand letters to 1,543 private entities, both residential and commercial, to recoup more than $12 million in unpaid property taxes, which piled up between 2010 and 2012 alone.

      If they don’t pony up, the city will file lawsuits against them by the end of the month, officials said.

      “For too long, there are those who chose not to pay what they owed in taxes, leaving everyone else to pay the price,” Detroit’s treasurer and deputy chief financial officer David Szymanski said Wednesday. “We are working to improve city services for our residents, and to do that—whether it’s better police and fire protection, streetlights or better schools for our children—we need everyone who does business in this city to pay their fair share.”

    • CBO Report: Rich Get Richer, Poor Get Poorer

      Total wealth in the United States doubled between 1989 and 2013, but the wealth of the American family right in the middle of the economy barely budged in that time, according to a new report prepared by the Congressional Budget Office for U.S. Sen. Bernie Sanders (I-Vt.).

      “Over the period from 1989 through 2013, family wealth grew at significantly different rates for different segments of the U.S. population,” CBO wrote. “The distribution of wealth among the nation’s families was more unequal in 2013 than it had been in 1989.”

    • Sanders Condemns Obscene Levels of Inequality Documented in New CBO Report

      Yet another report, this one from the U.S. Congressional Budget Office (CBO), highlights what many American families already know: The rich keep getting richer, while everyone else keeps struggling to get by.

      The CBO report, released Thursday and prepared at the request of Sen. Bernie Sanders (I-Vt.), examines trends in family wealth from 1989 to 2013.

      It found, unsurprisingly, that the distribution of wealth—assets including home equity, other real estate holdings, financial securities, and defined contribution pension accounts—among the nation’s families “was more unequal in 2013 than it had been in 1989.”

    • ‘Good to Be King’: The Very Good Loans Key Lawmakers Get from Wall Street Banks

      A new study identifies “a direct channel through which financial institutions contribute to the net worth of members of the U.S. Congress”—especially those ostensibly tasked with overseeing those very Wall Street entities.

      The paper from London Business School professors Ahmed Tahoun and Florin Vasvari, which is based on a “unique dataset” provided by the Center for Responsive Politics (CRP), finds that members of Congress sitting on the finance committees in the Senate and the House of Representatives “report greater levels of leverage and new liabilities as a proportion of their total net worth, relative to when they are not part of the finance committee or relative to other congressional members.”

      The authors write that their analysis was “motivated in part by anecdotal evidence suggesting that some U.S. politicians, who are in a position to potentially affect the future performance of financial institutions that lend to them, have allegedly received preferential treatments from lenders.”

    • Whistleblower Rejects Award to Protest SEC and Wall Street’s “Looting”

      A Deutsche Bank whistleblower rejected his portion of a $16.5 million award for exposing corporate crime because the Securities and Exchange Commission (SEC) let bank officials off the hook, he said Thursday.

      Former risk manager Eric Ben-Artzi, who went to federal authorities in 2010 after he was fired from Deutsche Bank for alerting its officials of improper accounting, said the bank and the SEC were so deeply entwined in a revolving-door culture that commissioners refused to properly investigate the firm’s top executives.

      “This goes beyond the typical revolving door story. In this case, top SEC lawyers had held senior posts at the bank, moving in and out of top positions at the regulator even as the investigations into malfeasance at Deutsche were ongoing,” Ben-Artzi wrote in an op-ed for the Financial Times.

    • Progressives Gear Up To Kill TPP In Lame-Duck Congress

      As Hillary Clinton’s election victory appears increasingly likely, liberal groups already have their sights on the next battle: defeating the Trans-Pacific Partnership trade deal.

      President Barack Obama issued an official notification last Friday that he plans to submit the Trans-Pacific Partnership for a vote in Congress.

      While congressional Republican leaders must still green-light the votes, the move has confirmed for many progressive activists that the White House plans to go all-in for the accord during the lame-duck session of Congress after the November election.

    • Trump and Clinton’s free trade retreat: a pivotal moment for the world’s economic future

      Enemies in politics and opposed on nearly all fronts, Donald Trump and Hillary Clinton have found themselves united together against Barack Obama and a tradition that has kept America in charge of the world economy’s rules for more than 70 years. The next president of the United States is rethinking free trade.

      In Washington, that tradition was taken for granted for so long that it rarely attracted much attention even in the business press, let alone dominated the politics pages of an entire election season. But in 2016, America’s faltering faith in free trade has become the most sensitive controversy in DC – never before have both main presidential candidates broken with the orthodoxy that globalisation is always good for Americans.

    • As Resistance Mounts, TPP Becoming 2016 Election’s Third Rail

      As the White House prepares for its final “all-out push” to pass the Trans Pacific Partnership (TPP) during the upcoming lame-duck session of Congress, lawmakers on both sides of the political aisle are being made vulnerable due to growing opposition to the controversial, corporate-friendly trade deal.

      “[I]n 2016,” the Guardian reported on Saturday, “America’s faltering faith in free trade has become the most sensitive controversy in D.C.”

      Yet President Barack Obama “has refused to give up,” wrote Guardian journalists Dan Roberts and Ryan Felton, despite the fact that the 12-nation TPP “suddenly faces a wall of political opposition among lawmakers who had, not long ago, nearly set the giant deal in stone.”

    • How Parasitic Finance Capital Has Turned Iran’s Economy Into a Case of Casino Capitalism

      Critics have often blamed President Rouhani of Iran for blindly following the neoclassical-neoliberal model of capitalism. The critical problem with Mr. Rouhani’s economic policies, however, is more than just following the dominant economic model of neoliberalism; more gravely, it is following the worst aspects of that model.

      One such disturbing aspect is the unregulated and out-of-control financialization of Iran’s economy: the banking/financial sector is given a free rein to engage in all kinds of parasitic, speculative activities. As this practice has robbed the manufacturing sector of the economy of the productively-investible finance capital, it has thereby led to a severe economic stagnation and high rates of unemployment.

    • McDonalds Could Be Held Liable For Franchise Wage Theft, Federal Judge Rules

      A federal judge in California allowed class action wage theft litigation to proceed against McDonald’s, on the grounds that a jury could find it guilty of negligence.

      Judge Richard Seeborg said Tuesday that the lawsuit against the corporation may continue under the “ostensible agency theory.”

      The doctrine holds an actor responsible for the fault of another, if victims reasonably believe that the perpetrator committed wrongdoing in the employ of said actor.

      The case involves McDonald’s franchise co-owners, Bobby and Carol Haynes, who operate eight restaurants in Northern California. Leading the class are three women who work in one of their Oakland restaurants: Guadalupe Salazar, Judith Zarate, and Genoveva Lopez.

      “Looking at the record, there is considerable evidence, albeit subject to dispute, that McDonalds caused plaintiffs reasonably to believe Haynes was acting as its agent,” Seeborg ruled.

    • Economic Update: The System Exposed

      This episode of Professor Wolff’s radio show discusses the economics of the Olympics, mass transit, productivity truths and the crimes of the Pacific Gas and Electric Company. The show also examines political conflict between unions and the rich.

    • The Fight for a Six Hour Workday

      How long should we work? Jeremy Corbyn’s proposal of a 6-hour working day policy shows the answer to this question is not a god-given fact. In reality each society makes a deliberate decision, and the answers are subject to massive historical fluctuation and social struggle, which we continue to see today. When Francois Hollande announced this year that the 35-hour week would be increased, he was met with the #LoiTravail strikes, which were fierce enough to see the exhausted French police begging the trade unions for a ceasefire. With the biggest social-democratic party in Europe putting 6 hours forward, this is now a move which could feasibly take place. But what are the arguments for and against it? What did the working day look like in the past? And how could it look in the future?

  • AstroTurf/Lobbying/Politics

    • Debbie Wasserman Schultz’s Primary Challenger Claims She Illegally Used DNC Resources Against Him

      In an interview with Mimi Rosenberg and Ken Nash of WBAI’s “Building Bridges” radio program, Tim Canova, a law professor, a former Truthdigger of the Week and the Bernie Sanders-endorsed primary challenger of Florida Democrat Debbie Wasserman Schultz, explains why he filed a formal complaint with the Federal Election Commission against Wasserman Schultz over information found in DNC emails made public by WikiLeaks and says Depression-era types of public investment would bring general prosperity to Americans.

      “We’ve had this complaint going on for many months,” Canova said. “The campaign had been growing pretty rapidly. In the first four months we raised about a million dollars. Very unprecedented here. And the way we’re raising money is very much the way that the Bernie Sanders campaign did, in small contributions from many thousands of ordinary folks.

      “As the campaign started growing we clearly got the attention of Wasserman Schultz and the Democratic Party establishment. We knew that from a number of things that she was doing on the ground that she was trying to impede us. Whenever I would go to a local union hall, for instance, or a local Democratic Party club to speak, quite often they would receive a call from the Wasserman Schultz camp trying to pressure them to not let me even speak. … [T]he state party had cut off our access to the [inaudible] voter database much like the DNC had done to Bernie Sanders.

    • Will Donald Trump’s Shake-Up Destroy the GOP?

      Shaken by the fact that he’s losing, Donald Trump has fled into the parallel universe of the extreme right—and apparently plans to stay there for the remainder of the campaign. Let’s see if the rest of the Republican Party is dumb enough to follow him.

      Trump has reportedly been feeling “boxed in” and “controlled” by the few people around him who actually know something about politics. Advice from these professionals to tone it down must be responsible for his slide in the polls, he seems to believe. So he has hired as chief executive of his campaign a man named Stephen Bannon, who will not only let Trump be Trump, but encourage him to be even Trumpier.

      Bannon runs Breitbart News, a website that creates its own ultranationalist far-right reality—one that often bears little resemblance to the world as it really is. As I write, the site is claiming that Hillary Clinton has some serious undisclosed health problem (her doctor says she is just fine), that one of Clinton’s aides has “very clear ties” to radical Islam (which is totally untrue) and that Clinton herself has “clear ties” to Russian President Vladimir Putin (when in fact it is Trump who often reveals his man-crush on the Russian leader).

    • Is the GOP Ready to Cut Trump off Financially?

      It’s make or break time for the Republican Party. Its ticket leader, GOP presidential nominee Donald Trump, is now so far behind Democratic nominee Hillary Clinton in the polls that no candidate in the last 16 elections has lagged at this point in the race and still won the White House in November. Does the party keep pushing for a win at the top, or does it regroup and focus down ballot in the hopes of keeping the Senate and House?

    • Clinton’s list of bundlers shorter than Obama’s, and she’s disclosing less

      Clinton has so far received at least $49.6 million from nearly 500 bundlers, or individual fundraisers who collect money from friends and acquaintances in order to deliver a candidate a “bundle” of checks. As for her opponent Donald Trump? There’s no way to tell, as he has not made any moves to release information on his campaign bundlers.

      Though federal campaign law requires the disclosure only of bundlers who are registered lobbyists, most White House candidates in recent elections have opted to share a fuller list of names. But in the last presidential election, Mitt Romney became the first major-party nominee since 2000 to keep his bundlers private, and so far, Trump has done the same.

      While Clinton has released a list, her campaign is disclosing less than previous Democratic candidates. In 2008 and 2012, bundlers were grouped in tiers — those who gathered between $50,000 and $100,000, between $100,000 and $200,000, between $200,000 and $500,000, and more than $500,000. Clinton has instead simply released the names of everyone who has bundled more than $100,000, with no specifics about amounts raised beyond that.

    • Voting Rights Victories Piling Up

      On November 4, 2014, seven Native Americans living on the Turtle Mountain reservation in North Dakota went to cast their ballots for the general election. All were turned away.

      They were U.S. citizens, longtime county residents, and had voted in North Dakota before. So what was the holdup?

      For Dorothy Herman, 75, it was an expired state ID.

      Herman, a 43-year resident of North Dakota who lives on retirement from her years as a teacher and her husband’s Social Security, had twice tried to renew her ID before Election Day. One day, she traveled 10 miles to the nearest licensing office only to find it closed during posted hours. On her second attempt, she was informed that her expired license was not proof enough of her identity—she also needed a birth certificate, a document that nearly a third of North Dakota Native Americans who need state ID cards to vote don’t have, according to one study. By the time she found it, returned to the office a third time, and paid $8 for her renewed ID card, she had missed the election.

    • Liberal Hate for the Green Party

      Liberals have joined Hillary Clinton’s “big nasty tent” in a very big way. They have moved far beyond the usual rationales for sticking with the Democrats and are now carrying on a full-fledged hate fest. Their targets are Green Party presidential candidate Jill Stein and her running mate Ajamu Baraka, who is also a Black Agenda Report editor and columnist.

      The screeds have become more and more extreme and defy the run of the mill rationales that progressives use to justify remaining within Democratic Party lines. Holding one’s nose and voting for the “lesser evil” democrat is passé. So is fear of Republican judicial appointments. Concern for abortion rights doesn’t cut it anymore.

      Liberals are no longer going through the motions of criticizing the Democrat. Instead they openly show love for Hillary Clinton and disdainfully pile on Stein and Baraka with fury. The blog Wonkette called Jill Stein “cunty” and “a mendacious nihilist piece of shit.” The site Very Smart Brothas declared that a vote for Stein was akin to putting it in the trash. They also threw in a dig at Cornel West because he dared to criticize Barack Obama. The Huffington Post chose to deride Green Party convention delegates because they ate at McDonald’s. Gawker tried to link Ajamu Baraka to holocaust denial. His unassailable human rights credentials didn’t mean much when the media decided to go into attack mode.

      The list is long and will get longer between now and Election Day. The degree of antipathy is actually quite useful. It tells us why the Green Party is so important and why liberals are such a dangerous enemy.

    • Steve Bannon Is Trump’s New Anti-Establishment Attack Dog

      Bannon is close to Nigel Farage, the former head of the right-wing UK Independence Party, who offered “massive thanks” to Breitbart News for supporting the party’s successful campaign on behalf of Britain’s departure from the European Union. “Your UKIP team is just incredible,” Bannon told Farage during an interview after the June Brexit vote.

    • Are Donald Trump, Stephen Bannon, and Roger Ailes Cooking Up a Post-Election Media Empire? The Frightening Possibility of a Trump TV Network Combining the Extremism of Breitbart News and Fox News

      Before he became the chairman of Breitbart News, Stephen Bannon worked in the Mergers & Acquisitions Department at Goldman Sachs. For the past year, Bannon has merged Breitbart News with Donald Trump’s presidential campaign, hoping to acquire more and more influence as a frequent Trump advisor and, as of this week, as the campaign’s CEO.

      After Trump loses, don’t be surprised to see Bannon join forces with Trump and Roger Ailes (the former Fox News guru deposed for engaging in sexual harassment of employees who recently jumped aboard Trump’s sinking ship) to create a new right-wing media conglomerate — Trump TV or Trump Media — linking Breitbart News to a new cable network that will almost make Fox News look tame and responsible. Together, Trump, Ailes and Bannon would run their media empire to advance their common goals: gaining political influence, massaging their massive egos, moving the Republican Party further to the right, attacking Democrats and liberal ideas, and promoting a neo-fascist agenda combining xenophobia, racism, sexism, government-bashing, and anti-immigrant nativism.

    • Hillary’s Hubris: Only Tell the Rich for $5000 a Minute!

      There is a growing asymmetry between the media’s mounting demands for Donald Trump to release his tax returns (Hillary has done so) and their diminishing demands that Hillary Clinton release the secret transcripts of her $5000 per minute speeches before closed-door banking conferences and other business conventions.

      The Washington Post, an endorser of Clinton, in its August 18 issue devoted another round of surmising as to why Trump doesn’t want to release his tax returns—speculating that he isn’t as rich as he brags he is, that he pays little or no taxes, and that he gives little to charity. Other media outlets endorsing Hillary have been less than vociferous in demanding that she release what she told business leaders in these pay-to-play venues.

      When asked last year about her transcripts on Meet the Press, she said she would look into it. When the questions persisted in subsequent months, she said she would release the transcripts only if everybody else did. Bernie Sanders replied that he had no transcripts because he doesn’t give paid speeches to business audiences. Nonetheless she continues to be evasive.

    • Dem candidate’s dad chips in $1 million to Senate super-PAC

      Democratic Senate candidate Rep. Patrick Murphy (Fla.) is getting a major financial boost as his campaign heads into the final stretch, courtesy of a $1 million check from his father.
      Thomas Murphy, a Florida home builder, gave the seven-figure sum to the Harry Reid-linked Senate Majority PAC — the group’s largest donation in July, according to the Federal Election Commission.

      The congressman has long benefited from his father’s financial largesse; Thomas Murphy shelled out six-figure super-PAC contributions to help him win his Florida congressional seat in 2012.

      On July 15, two days after the $1 million check landed in the Senate Majority PAC account, the super-PAC announced to the Washington Post its plans to launch a $1 million ad buy in Florida.

      The reported aim was to help Murphy win his primary on Aug. 30 against liberal challenger Rep. Alan Grayson, who is openly opposed by Democratic leadership.

    • The Half-Life of Deindustrialization: Why Donald Trump Is Just A Symptom

      Every four years, the white working class gets a fresh round of attention from candidates and the media. At campaign stops in Rust Belt cities, candidates promise to fix the economy, while pundits yet again claim that white working-class voters are the key to election victory. The pattern is being repeated this year, but this time, both the news media and social media seem especially baffled by the attitudes and behavior of working-class voters.

      As a number of commentators have noted, the roots of this year’s populism lie in deindustrialization, though some seem baffled that white working-class people are still troubled by either NAFTA, which went into effect in 1994, or the loss of industrial jobs, which peaked in the early 1980s. In a recent New York Times column, David Brooks suggested that working-class people should not be so strongly affected by the economic hardship of deindustrialization. After all, he suggested, it’s not as if life in a coal town was ever easy. What he and others don’t realize is that deindustrialization was never only about economics. Its economic, social and psychological effects continue for decades after plants closed and across generations, affecting the worldviews of younger people who never worked in steel mills or auto plants. Like radioactive waste, deindustrialization has a half-life.

    • Independent Women’s Forum and Independent Women’s Voice Use “Independent” Brand to Push Right-Wing Agenda to Women Voters

      The Independent Women’s Forum and its 501(c)(4) affiliate, the Independent Women’s Voice, market themselves to the media and voters as “non-partisan,” “independent,” and “neutral.”

      However, a new investigation of the groups by the Center for Media and Democracy (CMD) reveals them to be anything but that. Joan Walsh in the Nation broke this story today along with other new details about these not-so independent women’s groups.

      CMD’s Reporters’ Guide exposes the groups’ leaders admitting to—and boasting about—their true role for what it is: finding ways to sell right-wing policies and candidates favored by their funders to reach independent women voters under the guise of neutrality.

    • Hillary Goes With the Flow

      One of Team Hillary’s lines is that a vote for her is a vote for President Obama’s “legacy.” It is; for his legacy as a protector and enabler of an overripe capitalist system and the economic predators and earth despoilers it raises to the top.

      There aren’t very many at the top of the heap; enthusiastic sloganeers sometimes peg the number as low as a fraction of one percent. But, under Obama, as under all his predecessors since the economy took a neoliberal turn, they have been making out like the bandits they are, while everyone else has had to struggle, often in vain, not to fall behind. Count on Hillary to keep that going.

    • Hillary and the War Party

      You haven’t heard much from the Democrats lately about foreign policy or global agendas – indeed virtually nothing at the Philadelphia convention and little worthy of mention along the campaign trail. Hillary Clinton’s many liberal (and sadly, progressive) supporters routinely steer away from anything related to foreign policy, talk, talk, talking instead about the candidate’s “experience”, with obligatory nods toward her enlightened social programs. There is only the ritual demonization of that fearsome dictator, Vladimir Putin, reputedly on the verge of invading some hapless European country. Even Bernie Sanders’ sorry endorsement of his erstwhile enemy, not long ago denounced as a tool of Wall Street, had nothing to say about global issues. But no one should be fooled: a Clinton presidency, which seems more likely by the day, can be expected to stoke a resurgent U.S. imperialism, bringing new cycles of militarism and war. The silence is illusory: Clintonites, now as before, are truly obsessed with international politics.

    • Jill Stein on BDS and Israel
    • A Cheap Shot at Bernie Sanders’ Summer Home

      Charles Lane and other Washington Post editorialists defend neocon and neoliberal orthodoxies by demonizing foreign leaders who step out of line and now by making fun of Bernie Sanders for buying a summer home, writes Robert Parry.

    • Donald Trump Casts Himself as Mr. Brexit, Mistaking Depth of Anti-Immigrant Sentiment in U.S.

      As John Lanchester noted in the London Review of Books, the campaign appealed primarily to white working class voters who, with good reason, felt left behind by the increasingly globalized economy, and vented their anger at migrant workers. Trump’s anti-immigrant campaign has been structured like this from the beginning, and he clearly hopes for a similar result.

      What that argument overlooks, however, are quite different demographics — and the crucial difference between attitudes about immigration in the two countries.

      As a Pew Research Center survey published in July showed, residents of the U.K. were closely divided on the question of whether “having an increasing number of people of many different races, ethnic groups and nationalities in our country” made Britain a better or worse place to live — with 33 percent saying “better” and 31 percent saying “worse”. By contrast, a majority of Americans, 58 percent, said “better,” and just 7 percent said “worse.”

    • Column: It’s time for black people to break the two-party system

      White supporters of Hillary Clinton are concerned with the rise of neo-­fascism, of what a Trump presidency would mean for the fragile economic sector, foreign policy, immigration and social progress. For Trump supporters, a world of black and brown people pouring through American borders is a dastardly reality that must ultimately be confronted and curbed through racist, ideological litmus tests for incoming immigrants, draconian and impractical measures against the undocumented and isolationist economic policies that are sure to disrupt our precarious economy.

    • Green Party candidate Jill Stein calls for climate state of emergency

      Presidential hopeful points to California wildfires and Louisiana flooding in push for Green New Deal to address both environment and economy

    • More than half of Clinton Foundation’s major donors would be barred under new rule

      More than half of the Clinton Foundation’s major donors would be prevented from contributing to the charity under the self-imposed ban on corporate and foreign donors the foundation said this week it would adopt if Hillary Clinton won the White House, according to a new Washington Post analysis of foundation donations.

      The findings underscore the extent to which the Clintons’ sprawling global charity has come to rely on financial support from industries and overseas interests, a point that has drawn criticism from Republicans and some liberals who have said the donations represent conflicts of interest for a potential president.

    • Who Is Your Choice for President? [Ed: with over 1000 votes, Jill Stein at 80%]

      Donald Trump’s campaign went through some big changes during the week, and Hillary Clinton faced criticism for some of her own staffing choices. Third-party candidates Jill Stein and Gary Johnson ramped up their media presence. And some of the biggest challenges to politicians stemmed from environmental disasters, as flooding in Louisiana and wildfires in Southern California led to renewed attention on the impact of climate change.

    • Let Gary Johnson, Jill Stein enter presidential debates

      On its website, the Commission on Presidential Debates states that it was established “to ensure that debates “provide the best possible information to viewers and listeners.”

    • Hey Bernie Sanders, You Should Vote For Jill Stein

      I heard about you and Jane buying a new home on the beach and I couldn’t stop smiling, thinking about you out there chillin, grandkids running around, toes in the sand, drinking a Heady Topper or two, or three, or four, reflecting over the past year and a half.

      Even though I dedicated my entire life to getting you elected, there was always this small part of me that wanted you to just go home and relax.

    • Maryland Green Party Forum 2016

      Candidates discuss clean energy policy, challenging corporate power, and improving investment in Baltimore City

    • Jill Stein Makes History as First Green Party Candidate to Hold Town Hall on Prime-Time TV (Video)

      Green Party presidential nominee Jill Stein and her running mate, Ajamu Baraka, addressed voters on CNN on Wednesday night in an hour-long town hall meeting in which they outlined their “Green New Deal.” Stein also told the public she would “have trouble sleeping at night if either Trump or Clinton is elected” and reiterated her goal to build on Bernie Sanders’ “political revolution.”

    • Hillary Clinton’s Choice of Ken Salazar Comes Under Fire (Video)

      Amy Goodman and Juan Gonzalez of “Democracy Now!” dive deeper into Salazar’s politics in an interview with David Sirota, senior editor for investigations at International Business Times. Sirota explains that the beliefs of those working on Clinton’s transition team are “very important to understanding what may be coming in a Clinton administration policywise and whether those policies in a Clinton administration will reflect the policy promises from Hillary Clinton on the campaign trail.”

  • Censorship/Free Speech

    • How to turn on Twitter’s quality filters and silence trolls

      Twitter has finally come up with a solution to muzzle trolls.

      The company published a blog post on Thursday announcing two new controls for filtering your notifications. Twitter notifications are the primary method through which trolls can contact and harass users.

      The first new setting reduces the noise in your notifications stream. By default, anyone who mentions your Twitter username with the “@” symbol shows up in your Twitter notifications. It doesn’t matter if they’re asking a simple question, offering constructive criticism, or threatening to cut your head off. Everyone shows up.

    • Hey Sexters, Here’s a Very Good Reason to Care About Porn Laws

      Most of us tend to think of pornographers, and porn law, as being about one very specific set of people: namely, those who make a living recording people fucking and selling or freely distributing the resulting photos and video. But in the eyes of the law, it’s not quite that simple.

      As technology has made it easier for anyone to create and distribute dirty pictures and videos, it’s become harder to see where the pornographers end and the rest of us pervs begin—and that could mean that the aggressive laws designed to crack down on “evil” pornographers could potentially spill over into the lives of ordinary citizens.

      Take, for instance, 18 U.S.C. § 2257 and § 2257A, the federal statutes that govern adult industry record keeping and reporting. Ostensibly designed to prevent the distribution of child porn, these regulations—which are much more about maintaining proper paperwork than they are about not exploiting minors—aren’t just for people who actually create porn. They also outline strict regulations for anyone who distributes sexual media to the masses, no matter how far that person is from the actual creation of the original media.

    • British man imprisoned in Dubai over Facebook post raising money for refugees in Afghanistan

      A British man has been imprisoned for almost a month in Dubai over a Facebook post raising money for refugees in Afghanistan.

      Scott Richards unwittingly fell foul of the United Arab Emirates’ “bizarre” laws banning the operation of any charity not registered in the country.

      Police said the 42-year-old, who holds dual British and Australian citizenship, was arrested after using social media to promote a US-based crowd funding campaign.

      The offending link was to a Go Fund Me page raising money to buy blankets for families at the Chahari Qambar refugee camp near Kabul, where children froze to death in 2012.

    • Gawker’s Flagship Site Will Shut Down After Univision Deal

      Gawker.com is shutting down, marking the final chapter for a pioneer in online media and one of the most controversial publishers on the web.

      Nick Denton, the founder of Gawker Media, told the site’s staff that it will end operations next week, according to a post on its website. Gawker.com’s archives will still be available, Denton said in a memo to employees.

      Earlier this week Univision Holdings Inc. made the winning $135 million bid to acquire Gawker Media, which also published the sports website Deadspin, the women’s site Jezebel, the tech site Gizmodo and others. The company was driven into bankruptcy in June after losing an invasion-of-privacy lawsuit to Hulk Hogan. Univision is expected to use Gawker’s other websites to bolster its growing digital footprint, which includes the websites the Root, the Onion and A.V. Club.

      In his memo Thursday, Denton confirmed that he won’t be working for Univision and instead will “move on to other projects, working to make the web a forum for the open exchange of ideas and information, but out of the news and gossip business.”

    • China Censorship Orders Media Not to Report on “Miseries” of Olympic Athletes

      Chinese censor organs have ordered its media to stop reporting news related to problems and failures of Chinese athletes during their participation in the ongoing Rio Olympic Games, and focus more on their patriotism.

      “Do not report on the miseries of Olympic athletes; report more on (their) patriotic spirit,” said a directive sent to the country’s media and published online by the “Ministry of Truth” dedicated to leaking these almost secret orders of Chinese censorship.

      The order was leaked recently as China delivers its worst Olympic performance and coupled with the emergence of local athletes with strong personalities such as the swimmer Fu Yuanhui, which has changed the direction of the Chinese press, focusing more on the human side of athletes than their glory.

    • Why Palestine Matters, Even on the Pitch

      It is not Israel’s Jewish character that is the issue, as those who attempt to delegitimise the Palestinian struggle and those who support it continually maintain. It is Israel’s apartheid character that is the issue, and where better to demonstrate resistance to apartheid than in a packed football stadium alongside thousands of others.

  • Privacy/Surveillance

    • Care.data is dead – long live care.data?
    • Security companies scramble following leak of NSA toolkit
    • NSA leaked files, confirm new documents
    • The NSA was hacked, confirmed by the Snowden Documents
    • Edward Snowden archive prove malware & exploits dumped on public internet on Monday originated from NSA
    • Russian hacks against the Democrats and the NSA expose the weaknesses of our democracy [Ed: The ToryGraph blames Russia for TWO things WITHOUT evidence: DNC leaks and NSA crack]
    • Yup! The NSA Got Hacked
    • The NSA was hacked- so is unfettered government surveillance a good thing?

      Many of those skeptical of Snowden-esque critiques of the surveillance state rely on an argument: “If you don’t have anything to hide, there is no reason to be concerned.” But now that the NSA itself has been hacked, it means the tools to breach your own identity— your bank accounts, credit cards, medical records— are out there. Snowden’s warnings have been found to be the height of prudence.

    • The cyber war that’s breaking out between the US and Russia
    • The NSA Hack Shows Why the U.S. Government Shouldn’t Stockpile Software Vulnerabilities

      Earlier this week, top secret code written by one of the NSA’s most clandestine branches was released on the internet. Among other things, it contains a cache of technologically sophisticated hacking tools.

    • Snowden Docs Support Claim NSA Cyberweapons Stolen, Report Says
    • Cisco Firewall Products Targeted by NSA Hacking Tools

      Cisco this week acknowledged that some of its firewall appliance products are being targeted by purportedly leaked U.S. National Security Agency (NSA) hacking tools.

    • Should feds worry about the NSA leak?
    • After the NSA Hack: Cybersecurity in an Even More Vulnerable World
    • Quartz
    • Snowden Documents Confirm The NSA Hack Is Real
    • Australia in top three vulnerable to Cisco firewall attack
    • Snowden documents confirm that leaked hacking tools belong to NSA
    • NSA Vulnerabilities Trove Reveals ‘Mini-Heartbleed’ For Cisco PIX Firewalls
    • New Snowden docs support claim of NSA cyberweapon hack
    • New Snowden documents prove the hacked NSA files are real

      Edward Snowden Former US National Security Agency contractor Edward Snowden appears live by video during a student-organized world-affairs conference at the Upper Canada College private high school in Toronto on February 2, 2015.

    • Hack of NSA ‘cyber weapons’ verified by Snowden docs – report
    • Snowden documents show NSA leak is real
    • New Snowden docs suggest Shadow Broker leak was real
    • The latest NSA leak shows why it’s so hard to trust even tech designed to keep computers safe

      Leaked National Security Agency hacking tools are exposing how even the technology designed to safeguard our computer networks can put users at risk — and how poor security practices like clinging to old equipment can make things worse.

    • ‘Auction’ of NSA Tools Sends Security Companies Scrambling

      The leak of what purports to be a National Security Agency hacking tool kit has set the information security world atwitter — and sent major companies rushing to update their defenses.

      Experts across the world are still examining what amount to electronic lock picks. Here’s what they’ve found so far.

    • Snowden documents show NSA leak is real: report

      Such access would enable the NSA to plant malware in rivals’ systems and monitor – or even attack – their networks.

    • NSA cybersecurity hack – this is what happened

      Shadow Brokers posted online some examples of the data it said it had stolen, including scripts and instructions for breaking through firewall protection.

    • Cyber espionage: A new cold war?

      This is a tale of spies, a $500m cyber arms heist, accusations of an attempt to manipulate a US presidential election and an increasingly menacing digital war being waged between Russia and the west.

    • NSA Hacked, Cyber Weapon Toolkit Theft Confirmed By Snowden Docs
    • US hacked NTC to spy on Pakistan military, political leadership: Snowden documents
    • NSA spied on Pakistani civil-military leadership
    • US spied on Pakistan through hacking tools
    • US hacked NTC to spy on Pakistan military, political leadership: Snowden documents

      The United States hacked into targets in the Pakistan’s National Telecommunications Corporation (NTC) to spy on the country’s political and military leadership, documents released by former National Security Agency contractor Edward Snowden confirm.

      According to a report by online news site The Intercept, the previously unpublished documents released by Snowden confirm that some of the NSA’s top-secret code has been leaked or hacked.

      The Intercept’s editors include journalists that worked with Snowden to publicise his notorious 2013 NSA leak revealing the extent of government snooping on private data.

    • US spied on Pakistan’s leaderships: Snowden

      United States spied on the political and military leaderships of Pakistan and also hacked their data, according to the documents released by dissent whistleblower Edward Snowden. This was reported by Aaj News in its headline stories here on Saturday.

      The files Snowden took from the agency in 2013 say a top-secret NSA manual contains the same 16-character alphanumeric tracking code that appears throughout a portion of code released online earlier this week by a group called The ShadowBrokers. The group was auctioning off the code, which it said was stolen from the NSA. The relevant code was reportedly part of a program dubbed SECONDDATE that was used to spy on Pakistan and Lebanon.

    • Industry pros react to Cisco, Fortinet advisories after possible Snowden NSA leak

      Ridley agreed, noting that he expects the actionable takeaway of the leaked exploits will be technical. He told SCMagazine.com that security pros “need to start architecting networks to assume both devices and endpoints are compromised, and minimize the lateral movement to minimize damage.”

    • Evidence Links Leaked Hacking Tools to the NSA

      “NSA malware staging servers getting hacked by a rival is not new,” he wrote in a tweet, referring to private servers that are occasionally controlled by NSA agents, but not owned by the agency itself.

    • Equation Group’s BENIGNCERTAIN tool – a remote exploit to extract Cisco VPN private keys

      In the Equation Group dump that contained NSA hacking tools, there was an overlooked tool called BENIGNCERTAIN.

      Analysis of the tool shows that it appears to be a remote exploit for Cisco PIX devices that sends an Internet Key Exchange (IKE) packet to the victim machine, causing it to dump some of its memory. The memory dump can then be parsed to extract an RSA private key and other sensitive configuration information.

      The tool references Cisco PIX versions 5.2(9) to 6.3(4), which was released in 2004. It is also worth noting that the Cisco PIX line of products are at their end-of-life.

      The exploit consists of three binaries, each consisting of an individual step in the exploitation process.

      The first step is executing bc-genpkt, which generates an IKE packet of arbitrary size and fills some of it with arbitrary data.

    • NSA Hackers, Hacked

      Whatever the true identity and motives of the Shadow Brokers, there are some clear policy lessons to take away from this. The first concerns the “Vulnerability Equities Process“—which is how the American intelligence community decides whether and how long to hang on to software vulnerabilities they discover before notifying developers so that these cybersecurity holes can be patched. Back in 2014, federal cybersecurity coordinator Michael Daniel insisted in a post on the White House blog that the process is strongly weighted in favor of disclosure. The government, he assured the public, understands that “[b]uilding up a huge stockpile of undisclosed vulnerabilities while leaving the Internet vulnerable and the American people unprotected would not be in our national security interest.”

    • NSA leak rattles cybersecurity industry

      By exposing the custom-made malware online, the Shadow Brokers have suddenly made many of the systems American corporations rely on for cybersecurity more vulnerable to digital attacks from criminals and spies.

    • After Shadow Brokers, should the NSA still be hoarding vulnerabilities?

      This weekend’s Shadow Brokers leak dropped 300MB of stolen data onto the open web, including live exploits for some of the web’s most crucial network infrastructure, apparently stolen from the NSA in 2013. But while experts are still sorting out who stole the data and how, the new exploits have also left companies like Cisco, Fortinet, and Juniper scrambling to fix the newly published attacks against their systems. Suddenly, there was a new way into products that had been considered secure for years — and anyone who downloaded the data knew exactly how to get in.

    • In wake of NSA leaks, a call for transparency in cyber arms

      A leak of sensitive computer code is spurring calls for the government to be more transparent about its handling of a secret stockpile of network intrusion tactics.

      The leaked code, believed to be written by an NSA operation, contained new techniques to hack widely used hardware from Cisco, Fortinet and Juniper Networks.

      The leaks left countless computer networks vulnerable to hackers — something security professionals and government officials alike acknowledge is a risk of stockpiling these kinds of techniques.

      The government has a program in place to minimize that risk, called the Vulnerability Equities Process (VEP), which requires agencies to justify keeping a security vulnerability and report all other vulnerabilities to manufacturers so they can be repaired. While the VEP receives praise from civil libertarians as a considerable step up from countries making no similar effort, many are seizing on the NSA leaks to push for changes to the program.

      “One of the better things the Obama administration did was to create a presumption of disclosure,” said Gabe Rottman, deputy director of the Freedom, Security and Technology Project at the Center for Democracy and technology. “But being more open on the policy would be a good start.”

      The administration has revealed very little about the inner workings of the VEP. A White House board makes the ultimate decision of which vulnerabilities are kept by weighing investigative necessity against the harm that would be caused by the vulnerability going unfixed.

    • Snowden documents ‘show NSA leak is real’
    • Cisco wants to be a software company? Why customers should look beyond the hype [iophk: “it doesn’t matter, Cisco will be gone because of SDN, they are unlikely to recover from the NSA backdoor incidents”]

      Five years ago Forbes published an article called Now Every Company is a Software Company. The magazine wasn’t the first to notice this phenomenon and it certainly wasn’t the last but it did neatly articulate a view that has grown louder with each passing year since the era of the dot.com boom when the notion first gained currency.

    • 98 personal data points that Facebook uses to target ads to you

      Say you’re scrolling through your Facebook Newsfeed and you encounter an ad so eerily well-suited, it seems someone has possibly read your brain.

      Maybe your mother’s birthday is coming up, and Facebook’s showing ads for her local florist. Or maybe you just made a joke aloud about wanting a Jeep, and Instagram’s promoting Chrysler dealerships.

      Whatever the subject, you’ve seen ads like this. You’ve wondered — maybe worried — how they found their way to you.

      Facebook, in its omniscience, knows that you’re wondering — and it would like to reassure you. The social network just revamped its ad preference settings to make them significantly easier for users to understand. They’ve also launched a new ad education portal, which explains, in general terms, how Facebook targets ads.

    • Australia v New Zealand: All Blacks hotel room in Sydney ‘bugged’

      New Zealand Rugby says a Sydney hotel room where the All Blacks held meetings was bugged before their first Bledisloe Cup match against Australia.

      The New Zealand Herald reported that a “sophisticated” listening device found on Monday had been hidden in a chair.

      The All Blacks beat Australia’s Wallabies 42-8 on Saturday.

      The CEO of New Zealand Rugby, Steve Tew, said in a statement that Australian police and the Australian Rugby Union (ARU) had been informed.

      Saturday’s game is the first of three in the annual Bledisloe Cup between Australia and New Zealand – which the All Blacks have not lost in 13 years.

      Tew said: “We are taking this issue very seriously, and given it will be a police matter, it would not be prudent to go into further details.”

      The New South Wales Police Force said in a statement that they had become aware of the allegation on Saturday, and had attended a hotel in Double Bay, an area of Sydney.

    • NSA Hacked – Keys to the Kingdom Stolen

      The biggest story in the news right now isn’t Donald Trump. The biggest story is the NSA was hacked and the “Keys to the Kingdom” were stolen. Someone managed to get hold of the NSA’s hacking tools used by their Tailored Access Operation unit. (TAO) What this means is that leterally everything that civilization depends on is now exposed.

      These tools exploit flaws in the operating systems of the computers and routers that make the internet work. The NSA keeps these flaws secret rather that informing companies like CISCO and Juniper of the flaw and give them the opportunity to fix them. The NSA has put their need to spy above the security of the world. And now the unthinkable has happened. Hackers have the power of the NSA and they could bring down civilization. Think of it as Y2K on steroids.

    • How the NSA snooped on encrypted Internet traffic for a decade

      In a revelation that shows how the National Security Agency was able to systematically spy on many Cisco Systems customers for the better part of a decade, researchers have uncovered an attack that remotely extracts decryption keys from the company’s now-decommissioned line of PIX firewalls.

      The discovery is significant because the attack code, dubbed BenignCertain, worked on PIX versions Cisco released in 2002 and supported through 2009. Even after Cisco stopped providing PIX bug fixes in July 2009, the company continued offering limited service and support for the product for an additional four years. Unless PIX customers took special precautions, virtually all of them were vulnerable to attacks that surreptitiously eavesdropped on their VPN traffic. Beyond allowing attackers to snoop on encrypted VPN traffic, the key extraction also makes it possible to gain full access to a vulnerable network by posing as a remote user.

      BenignCertain’s capabilities were tentatively revealed in this blog post from Thursday, and they were later confirmed to work on real-world PIX installations by three separate researchers. Before the confirmation came, Ars asked Cisco to investigate the exploit. The company declined, citing this policy for so-called end-of-life products. The exploit helps explain documents leaked by NSA contractor Edward Snowden and cited in a 2014 article that appeared in Der Spiegel. The article reported that the NSA had the ability to decrypt more than 1,000 VPN connections per hour.

    • FCC won’t back down on broadband users’ privacy

      There will be no lame-duck period for Tom Wheeler. The FCC chairman vowed this week to push ahead in the last months of 2016 to complete an ambitious agenda to reshape the rules governing broadband and “put a referee on the field to throw the flag on any future unjust or unreasonable activity.”

    • Google Glass strikes back

      The single most innovative wearable of all time has to be Google Glass.

      Yeah, I said it. And it’s true.

      If you read the tech blogs, you’d be forgiven for believing that Google Glass is a failed product, dead and gone. But in fact, the opposite is true.

      The Google Glass Explorer program succeeded wildly. Google is feverishly working on new kinds of Google Glass products, and the innovation around Google Glass never stopped.

  • Civil Rights/Policing

    • Turkish airport advert warns travellers about Sweden rape danger

      A billboard displayed this week in Istanbul’s main airport warned travellers against visiting Sweden, describing it as having the highest rate of rape in the world, the latest salvo between EU-candidate Turkey and its European allies.

      Ties between Ankara and Europe have worsened since last month’s failed coup, with Turkey accusing its Western allies of insensitivity, saying they were more concerned about a subsequent crackdown than the coup itself.

    • Meet the robots that will help us win the wars of the future

      If former Marine and entrepreneur Sean Bielat has his way, the law enforcement officer tentatively approaching a vehicle in the future after making a traffic stop won’t be an officer at all. Rather, those are the kind of interactions — fraught with uncertainty, potentially dangerous — that seem to him to make perfect sense for one of his robots to deal with instead.

      [...]

      Among other things, Endeavor says that new system will increase the operational range of its robots in urban areas and other “radio-challenged” environments. Longer term company targets include things like getting the price of robot units down so clients like cash-strapped police departments can more easily afford them.

    • How Do Today’s Struggles for Justice Differ From Those of the 1930s?

      In the 1930s capitalism faced a very deep crisis, and the strategy for dealing with it was more or less one of two ways: either fascism, or the kind of social democracy of the New Deal, compromise with the domestic working class. The United States chose, on the whole, the new deal. Roosevelt, to a large extent, excluding Britain, which came very close to choosing fascism, didn’t. But certainly Europe did choose fascism. But many economists think not that far from another bout of quite deep crises. ‘07-‘08 was, many people say, a tip of the iceberg. And I think many people are getting ready for the next round that might be far more deep and more profound.

      You have the rise of a kind of neofascism in the United States that we once saw in many places in the world in the 1930s, and see again now in Europe in various forms. But on the other side, Hillary Clinton ain’t no Roosevelt. She’s not a proponent of the New Deal. The closest one could get to that was Bernie Sanders, and that clearly was crushed, that campaign, by the people that control the machinery of the Democratic Party. So what does that mean for people of the United States, and the choices they will make, and what might face them in the coming days?

    • Justice Dept. Announces Initiative to End Use of For-Profit Prisons
    • What You Need to Know About the DOJ’s Claim It Is Ending Private Prisons

      The U.S. Justice Department issued a memo, first reported Thursday by Matt Zapotosky and Chico Harlan of the Washington Post, in which the federal agency claims that it will end the use of private prisons.

      “I am eager to enlist your help in beginning the process of reducing—and ultimately ending—our use of privately operated prisons,” wrote Deputy Attorney General Sally Yates. “As you know, all of the Bureau’s existing contracts with private prison companies are term-limited and subject to renewal or termination. I am directing that, as each contract reaches the end of its term, the Bureau should either decline to renew that contract or substantially reduce its scope in a manner consistent with law and the overall decline of the Bureau’s inmate population.”s

    • Feds End Use of Private Prisons, but Questions Remain
    • DOJ Ending Use of Private Prisons: Will Decarceration Follow?

      Truthout’s Maya Schenwar says the announcement won’t affect federal immigration detention centers or state prisons

    • Private Prisons Are Far From Ended: 62 Percent of Immigrant Detainees Are in Privatized Jails

      The US Department of Justice’s decision to no longer use private prisons for its federal prisoners is a groundbreaking first step, but the August 18 announcement doesn’t spell the end to private prisons: Private prison corporations will continue to control 46 immigration detention centers that detain nearly 25,000 people (or 62 percent of the country’s 33,676 immigrant detainees) on any given day.

      It is perhaps telling that in the hours after the announcement made headlines yesterday, stock prices for both Corrections Corporation of America (CCA) and GEO Group, two of the country’s largest private prison corporations, dropped 40 percent, but by today they had started to climb again.

    • The DoJ is right to ditch private prisons. But it won’t do much in practice

      Just a week after a scathing report decrying the condition of private prisons in the US, the Department of Justice announced on Thursday that it would phase out their federal use by not renewing contracts for companies like GEO Group, Management of Training Corporation, and Correctional Corporations of America (CCA).

    • Sanders and Activists Say DOJ Ban on Private Prisons Doesn’t Go Far Enough
    • Sanders Applauds Decision to End Federal Use of Private Prisons
    • DOJ to End Use of Private Prisons: CCR Says DHS and ICE Must Do the Same
    • Admitting Failed Experiment, DOJ to Phase Out Private Prisons
    • Justice Department says it will end use of private prisons

      The Justice Department plans to end its use of private prisons after officials concluded the facilities are both less safe and less effective at providing correctional services than those run by the government.

      Deputy Attorney General Sally Yates announced the decision on Thursday in a memo that instructs officials to either decline to renew the contracts for private prison operators when they expire or “substantially reduce” the contracts’ scope. The goal, Yates wrote, is “reducing — and ultimately ending — our use of privately operated prisons.”

      “They simply do not provide the same level of correctional services, programs, and resources; they do not save substantially on costs; and as noted in a recent report by the Department’s Office of Inspector General, they do not maintain the same level of safety and security,” Yates wrote.

    • Why Is the Obama Administration Keeping Toddlers Behind Bars?

      Twenty-two mothers who have been interned with their children for up to a year in a for-profit immigration detention facility entered the ninth day of a hunger strike on Wednesday. Neither the mothers nor their children have committed any crimes, nor have they been charged with any. They have no idea when they will be released. Advocates and attorneys representing the women tell The Nation that their children are suffering, they feel that they’ve been lost in the system and their desire for freedom has become desperate.

    • Photos and Hunger Strikes Expose More Abuses in Migrant Detention

      Central American women holding a hunger strike at the Berks County Family Detention Center in rural Pennsylvania implored President Barack Obama to “set aside [his] vacation for 10 minutes and look at how we’re suffering locked up in here” on Wednesday, as they continued their second week of striking.

      The women, who are also mothers, said they will continue striking until they receive some word on their asylum petitions. Activists with the grassroots group Make the Road Pennsylvania, who spent several months protesting outside the facility in solidarity, have taken their action to Martha’s Vineyard in Massachusetts, where Obama is on break with his family.

    • Detained Undocumented Mothers Launch Hunger Strike, Vow to Leave ‘Alive or Dead’

      Dozens of undocumented women being held with their children at the Berks County Residential Center in Pennsylvania are on a hunger strike that they say will culminate in their leaving the facility “alive or dead.” The mothers are essentially being held prisoner under an Obama administration plan to detain undocumented families while their papers for asylum are being processed. Their children range in age from 2 to 16.

      A Philadelphia-based grass-roots organization called Juntos has been working to shut down Berks for nearly two years. It should not be such a difficult task, given that the facility is violating policy on many fronts. In an interview, Juntos Executive Director Erika Almiron told me that Berks was licensed as a “child residential facility” rather than a “detention center,” and that there is “no license that they can get in the state of Pennsylvania to fit what they want to do.” The detention center’s license expired in February, and Juntos and its allies pressured the Department of Human Services (akin to a child welfare department) to refuse renewal. But Berks County commissioners inexplicably appealed the decision. While the appeal is in process, the facility continues to operate and keep the women and children as prisoners.

      Meanwhile, the entire program of imprisoning immigrant families is under question. A year ago, a federal judge in California, Dolly Gee, found the practice in violation of the settlement of a class action lawsuit 18 years ago, known as the Flores agreement, and ordered the release of families. Yet the thousands of women and children being held at three facilities, including Berks (the other two are in Texas), continues. But at a press event earlier this month, U.S. Homeland Security Secretary Jeh Johnson defended the ongoing detention in spite of Gee’s ruling, saying, “I think that we need to continue the practice so that we’re not just engaging in catch and release.”

    • The Justice Department Is Done With Private Prisons. Will ICE Drop Them Too?

      The Justice Department’s announcement on Thursday that it would seek to end the use of private contractors to run its federal prisons was a monumental one that quickly sent private prison stocks plunging and drew praise from dozens of human and civil rights groups that for years had been denouncing abuse and neglect in private facilities.

      In a memo explaining the decision, Deputy Attorney General Sally Yates wrote that private prisons “simply do not provide the same level of correctional services, programs, and resources,” “do not save substantially on costs,” and “do not maintain the same level of safety and security” as facilities operated by the Bureau of Prisons.

      But as the criminal justice community began to take stock of the news, many also expressed hopes that the DOJ would not be the only government agency to cut ties with the private companies, which also operate state prisons and immigration detention centers.

    • ‘They Are Incentivized to Arrest People Because It Raises Money’

      When Newt Gingrich comes out for criminal justice reform, you are right to look under the hood, to question just how deep this popular reform is intended to go. Any improvements that help real people are to be wished for, but policing and prisons are systems with deep and far-reaching roots in US life. We ought to have questions about reform that comes without an honest reckoning with the fact that some of what we call problems in the criminal justice system are not so much bugs as features.

    • The Justice Department’s Call to Axe Private-Prison Contracts Is A Victory. ICE Must Now Do the Same to End Federal Prison Profiteering.

      In a bluntly-worded memo issued yesterday, the U.S. Department of Justice directed the Federal Bureau of Prisons to begin phasing out all of its contracts with private prisons.

      Private prisons, the memo stated, “compare poorly” to federally run prisons. They “simply do not provide the same level of correctional services, programs, and resources; they do not save substantially on costs; and . . . they do not maintain the same level of safety and security.” The memo then describes how the Bureau of Prisons will reduce and ultimately end its reliance on private prisons.

    • Two visions of politics in Turkey: authoritarian and revolutionary

      Late last December, upon returning from a trip to Saudi Arabia, Turkish President Erdogan was asked by Turkish reporters whether an executive presidential system was possible while maintaining “the unitary structure of the state”. He responded, “There are already examples in the world. You can see it when you look at Hitler’s Germany.” Following a failed coup d’etat attempt this July, as Erdogan started excluding and imprisoning political rivals, laying the groundwork for authoritarian control, some critics have begun taking the comparison more seriously.

    • Solitary for Suicide Attempts: The Brutal Punishment of Chelsea Manning

      On August 10, Army Secretary Eric Fanning received a petition with 115,000 signatures, part of an ongoing effort by activists to ensure Chelsea Manning’s additional suicide-related charges are dropped. Although public pressure has mounted, there has been no sign that the charges will be dropped any time soon.

      Manning’s case has been fraught with government abuses of power, ranging from 1,000 days of detention without trial to denial of medical resources when dealing with gender dysphoria. Now, after a suicide attempt, Manning is facing potential conviction that would force her back into solitary confinement. This horribly inhumane treatment is used for many prisoners, particularly those seen as threatening to the state. But Manning hasn’t just been punished because of her charges; she has been denied basic resources necessary for dealing with the complexity of both gender dysphoria and the mental ramifications of solitary confinement.

    • Owning Milwaukee’s Tragedy

      Race and ethnicity 2010: Milwaukee by Eric Fischer. Map based on Census 2010 data. Red is White, Blue is Black, Green is Asian, Orange is Hispanic, Yellow is Other, and each dot is 25 residents.

      In a nation that clings to the notion that we live in a shining city upon a hill, the shooting death of Sylville Smith on a Milwaukee street, the fiery response by the black community, the scorching rhetoric from the press and the sheriff, the heated replies by everybody with a computer are all unsettling our basic sense of ourselves.

      Milwaukee is Baltimore is Ferguson is Los Angeles is Detroit.

    • “I Was Like, Whatever…”: On Lochte Abroad and Idiocy at Home

      This is the current American quote that sums up where it’s all come to. The degradation of culture, the hip anti-intellectual posture, the hollow reality shows, the prevailing mean smugness and the flat screen mesmerizing of the American tribe has brought us to, “I was like, whatever.”

      This is the quote of a famous American with oddly colored hair. He claims this was his response to a man pointing a gun at his head and telling him to get on the ground.

      The first part – “I was like…” The linguistic Zika virus – “like.” Not “I was” or “I am” or “I shall be.” No. “I was like,” meaning an approximation of reality. This is the current subconscious cover for the dread of a real feeling—or real moment—or the real story.

      I suppose this hapless, entitled fellow with the bright dimpled smile thought he’d get some mileage out of a war story. And when you live in a pool of approximation anchored to the word “Like” maybe it doesn’t seem so wrong. He may have played a flat screen version of this story in his head and then he downloaded it into the ear of a reporter named Bush, which adds another wrinkle to the event of an international, malicious, scandalous fib.

      [...]

      Both rising out of the same cauldron of deception, anti-intellectualism, entitlement and fantasy. Both ducking genuine narratives – both weaving phantasms in which each is victim and hero. Both, when on the verge of being busted cuts to: “No – no – this is what happened – I’ll tell you what happened.” Lie – word salad – Lie – then the quote that says it all, because it says nothing. “I was like, whatever.”

    • The Illusion of Freedom

      The seizure of political and economic power by corporations is unassailable. Who funds and manages our elections? Who writes our legislation and laws? Who determines our defense policies and vast military expenditures? Who is in charge of the Department of the Interior? The Department of Homeland Security? Our intelligence agencies? The Department of Agriculture? The Food and Drug Administration? The Department of Labor? The Federal Reserve? The mass media? Our systems of entertainment? Our prisons and schools? Who determines our trade and environmental policies? Who imposes austerity on the public while enabling the looting of the U.S. Treasury and the tax boycott by Wall Street? Who criminalizes dissent?

      A disenfranchised white working class vents its lust for fascism at Trump campaign rallies. Naive liberals, who think they can mount effective resistance within the embrace of the Democratic Party, rally around the presidential candidacy of Bernie Sanders, who knows that the military-industrial complex is sacrosanct. Both the working class and the liberals will be sold out. Our rights and opinions do not matter. We have surrendered to our own form of wehrwirtschaft. We do not count within the political process.

      This truth, emotionally difficult to accept, violates our conception of ourselves as a free, democratic people. It shatters our vision of ourselves as a nation embodying superior virtues and endowed with the responsibility to serve as a beacon of light to the world. It takes from us the “right” to impose our fictitious virtues on others by violence. It forces us into a new political radicalism. This truth reveals, incontrovertibly, that if real change is to be achieved, if our voices are to be heard, corporate systems of power have to be destroyed. This realization engenders an existential and political crisis. The inability to confront this crisis, to accept this truth, leaves us appealing to centers of power that will never respond and ensures we are crippled by self-delusion.

      The longer fantasy is substituted for reality, the faster we sleepwalk toward oblivion. There is no guarantee we will wake up. Magical thinking has gripped societies in the past. Those civilizations believed that fate, history, superior virtues or a divine force guaranteed their eternal triumph. As they collapsed, they constructed repressive dystopias. They imposed censorship and forced the unreal to be accepted as real. Those who did not conform were disappeared linguistically and then literally.

    • Chris Hedges and Robert Scheer Assess the Merits of a Life of Virtue in a Careerist’s World

      In this week’s episode of “Scheer Intelligence” on KCRW, Truthdig Editor in Chief Robert Scheer speaks with Truthdig columnist Chris Hedges about the rewards of Hedges’ unorthodox career as a minister and journalist covering the disintegration of societies on multiple continents, his working habits, and the consequences of elite neglect of the forces that turn civilized populations barbarian.

      The two spoke in Philadelphia in late July as Democrats pilloried Republicans and their presidential candidate, Donald Trump.

      “The Nazis before 1933 were buffoonish figures, as were Radovan Karadžic and Slobodan Miloševic in Yugoslavia,” Hedges remarked. “And as Trump is. But when these buffoonish figures take power, they become extremely frightening.”

      “They are frightening,” Scheer replied. But “what you’re saying is they didn’t come from nowhere.”

    • Images from US Border Patrol facility reveal harsh conditions for immigrants

      The photograph, a still image drawn from video footage captured by a security camera, shows a mass of cylindrical shapes squashed together in a box and wrapped in what appears to be silver foil, their surfaces glistening like sardines in a tin.

      The shapes are not sardines, however, but human beings. And they are wrapped not in foil but in emergency blankets, handed out to them as they were put into a cramped detention center at the US border, courtesy of the federal agency, Customs and Border Protection (CBP).

      The image, and several others like it released on Thursday at the order of a federal judge, gives the most damning evidence yet seen of the exceptionally harsh and some say abusive conditions to which immigrants are subjected when detained at the southern US border with Mexico.

    • We need to re-examine Corbyn’s so-called ‘dangerous friendships’

      An LSE survey found that 74% of newspaper articles ‘offered either no or a highly distorted account of Corbyn’s views and ideas’ and that only 9% were ‘positive’ in tone. Research carried out at Birkbeck similarly found a strong bias in ‘mainstream media coverage’. So how trustworthy are the above claims?

    • ‘We Tortured Some Kids’: Parody Advert Unveils Horrors at Australia’s Child Detention Facilities (Video) [Ed: When Obama said "We Tortured Some Folks" he thought he had done enough regarding torture but never pressed charges against the criminals]

      Allegations that Nauru’s conditions are as horrendous as those at Guantanamo Bay were confirmed earlier this month, when the Guardian published more than 8,000 pages of leaked incident reports from Australia’s detention camp for asylum seekers on the remote Pacific island. The documents detail “assaults, sexual abuse, self-harm attempts, child abuse and living conditions endured by asylum seekers held by the Australian government, painting a picture of routine dysfunction and cruelty,” reports the Guardian.

      “But, alas, our human rights record is constantly under threat of improving,” the video’s narrator says. “To continue our abuse and torture programs, the government requires your complicity,” she adds, offering five simple steps you can take to help.

    • Lost Peoples of the Lake

      Our visit was punctuated by the sighting of a lone coyote padding along the salt crust: the traditional Native American trickster is perhaps conjuring further redemption for the Lake. There is no commemoration of the killing fields of Inyo County: surely they bring even greater shame upon this country than, for instance, the nearby WWII era Japanese internment camp of Manzanar and are of at least equal educational potential. The new monument might be more relevant if it referenced the lost peoples of the Lake rather than simulating, in earth and granite cobbles, the waves that animated the vast body of water that once filled the graben. In the Owen’s Valley, there is yet a greater, unacknowledged debt to be paid.

    • The Olympics: Nationalism at its Worst

      Once again the world is being subjected to the periodic nationalist orgy known as the Olympics. Here, we are told, participating nations around the globe are all equal, and send their best athletes for a friendly competition, where nothing but sportsmanship counts, and any and all other differences are not even considered. After trying their very best in each of many different sports, the top three are honored with a gold, silver or bronze medal, something he or she can look proudly on for generations to come.

      This writer hates to burst such a pretty balloon (actually, he doesn’t hate doing so at all), but once one has passed the age where Santa Claus, the Easter Bunny and the tooth fairy have all been relegated to the status of pleasant childhood memories, the same should be done with the farce of the Olympics.

      Let’s look for a minute at a few examples.

      [...]

      Now let us look at another Olympic swimmer, Yursa Mardini, age 18. Ms. Mardina is a Syrian refugee, who, perhaps, didn’t have the same advantages as Mr. Phelps. She refers to being in the Olympics as a ‘once in a lifetime’ opportunity; please note that the current games are Mr. Phelp’s fifth foray into an Olympic pool. And training was sometimes difficult for Ms. Mardini, not because she didn’t have sufficient energy or motivation, but because of other factors. Said she: “…sometimes we couldn’t train because of the war. Or sometimes you had training but there was a bomb in the swimming pool.” Mr. Phelps, once caught with a bong in his mouth, never had a bomb in his pool.

      [...]

      The Olympics, for some bizarre reason, attract the attention of people for whom watching an athletic event, let alone ever participating in one, does not occur outside of this periodic spectacle. But these are people who never let an opportunity pass for a flag to be waved, and to rejoice in anything that, in their narrow little minds, sets their nation above all the rest. There is no thought of the deadly, murderous horrors their country may inflict on innocent people (see: USA, Israel), no thought to the exploitation and abuse of the poor (see: USA, Brazil), no thought of blatant racism (see: USA, Israel). No, if a swimmer from one’s own country swims faster than the swimmers representing other countries, one’s country is the greatest! For such people, seeing an athlete representing their country stand atop the highest pedestal, accepting a gold medal, brings a tear to the eye as the chest swells with pride!

  • Internet Policy/Net Neutrality

    • EFF accuses T-Mobile of violating net neutrality with throttled video

      The Electronic Frontier Foundation (EFF) has accused T-Mobile USA of violating net neutrality principles with a new “unlimited” data plan that throttles video. The group is weighing whether to file a complaint with the Federal Communications Commission, and the EFF is evaluating a similar offering from Sprint.

      T-Mobile’s $70-per-month unlimited data plan limits video to about 480p resolution and requires customers to pay an extra $25 per month for high-definition video. The plan also throttles mobile hotspot connections unless customers pay an extra $15 for each 5GB allotment. Going forward, this will be the only plan offered to new T-Mobile customers, though existing subscribers can keep their current prices and data allotments.

  • DRM

    • This lawsuit could be the beginning of the end for DRM

      Our friends at the Electronic Frontier Foundation (EFF) recently filed a lawsuit challenging Section 1201 of the US’s Digital Millenium Copyright Act, which provides legal reinforcement to the technical shackles of Digital Restrictions Management (DRM). Defective by Design applauds this lawsuit and agrees with the EFF that Section 1201 violates the right to freedom of speech. We hope that excising Section 1201 from US law can be the beginning of the end for DRM.

]]>
http://techrights.org/2016/08/21/systemd-spreading/feed/ 0
Links 20/8/2016: Android Domination, FSFE summit 2016 http://techrights.org/2016/08/20/fsfe-summit-2016/ http://techrights.org/2016/08/20/fsfe-summit-2016/#comments Sat, 20 Aug 2016 16:25:15 +0000 http://techrights.org/?p=95011

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Need a tamper-proof, encrypted PC? The portable, open-source ORWL could be what you’re looking for

    There are a number of choices available if you need a small, powerful but affordable mini desktop PC, from the $500 Mac Mini, to the cheaper Google Chromebox, or HP Pavillion Mini Desktop.

    But can more be done to keep these devices secure, not just from software exploits, but scenarios in which the attacker has gained physical access to the device?

    The makers of ORWL, a flying saucer-shaped mini desktop for the security-minded, think it can, providing you’re willing to fork out a relatively hefty $699.

  • Nextgov Ebook: Tech Revolutions: Open Source and the Internet of Things

    Nextgov’s meetup series Tech + Tequila has been an opportunity for government and private sector technologists to explore hot topics in federal IT together in a casual setting—with cocktails. Aug. 25 marks our sixth event, and we’ll be discussing artificial intelligence. Is there anything more top of mind than a robot uprising?

    In all seriousness, Tech + Tequila has tackled some awesome topics: data, cybersecurity and emerging tech. This ebook features two more recent Tech + Tequila themes: open source and the internet of things.

    On Aug. 8, the White House unveiled the final policy that requires agencies to share 20 percent of their custom-created source code. When the draft framework was announced back in March, some critics said it didn’t go far enough and argued for a more sweeping “open source by default” framework. Another dissenting voice said the policy would add “more layers of confusion.”

  • Cloud innovator of the Year announced

    AMADEUS, the leading provider of technology solutions for the global travel industry, has won the 2016 Red Hat Innovator of the Year award.

    This is in recognition of its innovative use of Red Hat OpenShift Container Platform as part of a new cloud services platform to help companies meet the increasingly complex demands of travelers.

  • Tips on adding Linux to Your Developer Skill Set

    The time when developers and administrators can get by with only Microsoft in their bag of tricks is over. With Linux’s continuing dominance and growth in server space and with Redmond now embracing open source with actions as well as words, even those who develop exclusively for the Windows platform are almost certain to find times when they need to wrap their heads around an aspect of the Linux kernel or some open source application.

    If you’ve been following tech news, you know that across the board there is an increasing need for people with Linux skills, which has pushed the salaries available for those with certifiable Linux talents to record highs. This opens an opportunity in traditional Windows shops where fully certified Linux people might not be necessary, but where certified Windows people with good Linux skills have extra value.

    In other words, you can increase your value as an employee simply by honing your Linux and open source skills, without the need to necessarily shell out big bucks to Red Hat or the Linux Foundation for certification. There are plenty of educational opportunities available online, some free and others offered with a very low price tag.

  • Talent remains the biggest issue for deploying open source in the enterprise

    Representatives from open source companies Red Hat, Capgemini, MongoDB, Rackspace and Weaveworks weighed in on how open source infiltrated the enterprise, and why skills remains the biggest barrier to a successful open source strategy

    At a Rackspace hosted event in London this week titled Open Source is Eating the World (a play on venture capitalist Marc Andreessen’s seminal Software is Eating the World essay from 2011) panelists generally agreed that open source has managed to infiltrate the enterprise, but talent remains the biggest barrier to a successful open source strategy.

  • Trump’s campaign donation website used open-source code sloppily, risking ridicule and worse

    Like tens of millions of other websites, the campaign donation website for US presidential candidate Donald Trump relies on open-source software called jQuery. But it seems that the software is being used in a sloppy way, which could put Trump supporters at risk of identity theft or worse.

    Trump’s website uses a jQuery plug-in, or a bit of ready-made code, called jQuery Mask Plug-in to handle how donors fill in their name, address, and other information. The mask plug-in restricts the types of information users can enter in forms. This is useful because it increases the chances of accurate data being submitted for payment processing, and for the campaign’s records. It’s also free and available for download from GitHub, the popular platform for open-source software.

  • [New page] Open source alternatives
  • AT&T: What Is ‘Open Source,’ Anyway?

    Companies evaluating open source technology need to be careful that they get all the open source benefits. That’s sometimes tricky, which is why AT&T has defined “three key characteristics of open source software that we consider paramount,” says Greg Stiegler, AT&T assistant vice president of cloud.

    AT&T Inc. (NYSE: T) is a leader among big network operators making a big open source commitment, with involvement in multiple projects and aggressive code-sharing. Last month, it released its Enhanced Control, Orchestration, Management and Policy (ECOMP) for network management and orchestration (MANO) as open source. (See AT&T Offers ‘Mature’ ECOMP as Open Source MANO, AT&T Makes Case for Open Source Sharing and AT&T’s Chiosi: Unite on Open Source or Suffer.)

  • Events

    • SFD Countdown Ready!

      The Software Freedom Day countdown is ready for usage in English. We are therefore informing translators and also people willing to add a new language that translation can start right now. All the instructions are available on the wiki at this page.

  • Web Browsers

    • Mozilla

      • Mozilla Spurring Tech Project Development with Sprints and Grants

        At Mozilla, there is momentum gathering around new open source projects and the Internet of Things (IoT). The company is hosting an IoT sprint development weekend this September. Mozilla’s Hive Chattanooga, in collaboration with The Company Lab, is hosting 48Hour Launch: Internet of Things (IoT) Edition, on September 9-11. 48Hour Launch is a weekend-long competition that challenges teams of entrepreneurs and specialists to spend 48 hours transforming a startup concept into a viable business model, prototype, policy proposal, or piece of curriculum.

        The experience culminates with a Demo Night, where participants debut their work for a chance to win cash prizes, free business services, and a free trip to MozFest in London.

  • Databases

    • Open source uproar as MariaDB goes commercial

      MariaDB Corp. has announced that release 2.0 of its MaxScale database proxy software is henceforth no longer open source. The organization has made it source-available under a proprietary license that promises each release will eventually become open source once it’s out of date.

      MaxScale is at the pinnacle of MariaDB Corp.’s monetization strategy — it’s the key to deploying MariaDB databases at scale. The thinking seems to be that making it mandatory to pay for a license will extract top dollar from deep-pocketed corporations that might otherwise try to use it free of charge. This seems odd for a company built on MariaDB, which was originally created to liberate MySQL from the clutches of Oracle.

  • CMS

    • Writing an academic paper? Try Fidus Writer

      The Fidus Writer online editor is especially for academics who need to write papers in collaboration with other authors, and it includes special tools for managing citations, formulas, and bibliographies. If you’re writing an academic paper by yourself, you have a lot of choices for tools to edit your document. Some of them even take care of making your footnotes and bibliographies come out in the right format. But writing collaboratively is harder, for lots of reasons. You could use Google Docs, ownCloud, or even Dropbox to share the document, but then you lose useful citation-management tools.

      Enter Fidus Writer: Fidus Writer is a web-based collaborative writing tool made specifically for the needs of academic writers who need to use citations or formulas. The rules for citations are complicated, so Fidus Writer takes care of the format for you; you can choose from several citation formats, including APA, Chicago, or MLA. Version 3 of Fidus Writer was just released in June, and it is a clean, well-polished application.

      At my first look, Fidus Writer is impressive. The application is written mostly in Python and Node.js, and is licensed under the AGPL V3. I installed it on a Debian virtual machine running on my Windows PC. The installation instructions are geared toward Debian and its derivative distros, and uses apt to install software. I suspect someone clever who has a real desire to run it on RPM-based distros could make it work, as the list of packages needed is not overlarge.

  • Pseudo-Open Source (Openwashing)

  • Funding

    • Omega2, $5 Linux platform computer for IoT projects, exceeds $450k in Kickstarter funding

      The Omega2 set out to produce an extremely cheap, extensible Linux computer designed for Internet of Things (IoT) projects with a Kickstarter campaign asking for only $15,000. Now, with only for days remaining in the campaign, the Omega2 team is set to receive over $450,000 in funding from over 11,000 backers. Developed by the Onion Corporation, the Omega2 promises to be an interesting entry for DIY (do it yourself) and commercial projects.

    • Crowdfunding closing on $5 Linux + Wifi tiny IoT compute module

      Omega 2 is a Linux compute module designed specifically for building connected hardware applications. It combines, say its designers Onion, “the tiny form factor and power-efficiency of the Arduino, with the power and flexibilities of the Raspberry Pi.”

  • FSF/FSFE/GNU/SFLC

    • GNU Libreboot, version 20160818 released
    • GNU Libreboot Release Adds New Chromebook & ASUS/Gigabyte/Intel Board Support

      The Libreboot project has done their first official release of this Coreboot binary-free downstream now being under the GNU project label.

      GNU Libreboot 20160818 is the new release. New board support for this de-blobbed version of Coreboot includes supporting the ASUS Chromebook C201, Gigabyte GA-G41M-ES2L, Intel D510MO, ASUS KCMA-D8, ASUS KFSN4-DRE, and ASUS KGPE-D16. Yep, all rather old motherboards (aside from the Chromebook C201) with sadly not much love these days from AMD and Intel around fully supporting modern chipsets by free software.

    • FSFE summit 2016

      Imagine a European Union that builds its IT infrastructure on Free Software. Imagine European Member States that exchange information in Open Standards and share their software. Imagine municipalities and city councils that benefit from decentralized and collaborative software under free licenses. Imagine no European is any longer forced to use non-Free Software.

  • Public Services/Government

  • Openness/Sharing/Collaboration

  • Programming/Development

  • Standards/Consortia

    • Dutch consider mandatory eGovernment standards

      The Dutch government wants to make the use of open standards mandatory for public administrations, to provide business and citizens with easier access to eGovernment services. The government is developing a generic digital infrastructure, and its services and standards are to be used by all public administrations, writes Henk Kamp, the country’s Minister of Economic Affairs in a letter to Parliament.

Leftovers

  • Uber Wasting No Time: Launching Test Of Self-Driving Cars

    Separately, the company announced that it has bought a self-driving startup, Otto, and put its co-founder, Antohony Levandowski, in charge of Uber’s self-driving efforts.

    We’ve already noted that Tesla has Uber-like plans as well, but this could certainly get interesting. Lots of people (including us!) have speculated on what the world will look like as autonomous vehicles become more prominent, but it’s somewhat amazing how quickly this is happening.

    While it’s not a huge surprise that Uber may be leading the way, it does still raise some interesting questions. Obviously, lots of people say that Uber wants to do this so that it won’t have to pay drivers any more (though in these tests a human is still in the driver’s seat and, one assumes, getting paid). But part of the genius (or problem, depending on your point of view…) of Uber was that it was just a platform for drivers who brought their own cars. That is, Uber didn’t have to invest the capital in buying up cars. It just provided the platform, drivers brought their own cars, and Uber got a cut. If it’s moving to a world of driverless cars, then Uber is no longer the platform for drivers, it’s everything. It needs to make the investment and own the cars. That’s actually a pretty big shift.

    That’s not to say that it won’t work — and there’s an argument that Uber’s real power these days is in its operations software figuring out which cars should go where — but it is an interesting shift in the business. And given that, it’s also interesting to see how Tesla is entering the market from the other direction — a direction that is more like Uber’s original concept, where individuals own their own cars, but then lease them back to Tesla to act as for-hire cars for others. I guess it’s possible that Uber could do the same thing too, where any car owner could provide their vehicle back to Uber to earn money, but without having to drive it — just making it a productive resource.

    Who knows how this will turn out — and I’m sure some people will inevitably freak out when there’s a self-driving car accident — but the future is getting really interesting really fast.

  • The Human Cost of Tech Debt

    If you’re not already familiar with the concept of technical debt, it’s worth becoming familiar with it. I say this not only because it is a common industry term, but because it is an important concept.

  • Science

    • Scientists to launch global hunt for ‘line in the rock’ marking the ‘scary’ new man-made epoch

      A worldwide hunt for a “line in the rock” that shows the beginning of a new geological epoch defined by humanity’s extraordinary impact on planet Earth is expected to get underway in the next few weeks.

      The idea that we are now living in the Anthropocene epoch has been gaining ground in recent years.

      The surge in global temperatures by an average of one degree Celsius in little over a century, the burning of vast amounts of fossil fuels, the extinction of many animal species, the widespread use of nitrogen fertilisers, the deluge of plastic rubbish and a number of other factors have all caused changes that will remain visible in rocks for millions of years.

      Later this month, an expert working group – set up to investigate whether these changes are so significant that the 11,500-year-old Holocene epoch is now at an end – will present its latest findings to the 35th International Geological Congress (IGC) in South Africa.

      They then plan to search for what is known as a “golden spike” – a physical point in the geological record that shows where one epoch changed to another – which could win over any remaining doubters among the geology community.

    • NASA dangles ONE MILLION DOLLARS for virtual Mars robots

      NASA has announced a million-dollar prize it will award to whomsoever can program a virtual robot to get stuff done ahead of a crewed mission to Mars.

  • Health/Nutrition

  • Security

    • Friday’s security updates
    • Thursday’s security advisories
    • Microsoft Windows UAC can be bypassed for untraceable hacks

      USER ACCOUNT Control (UAC), the thing in Microsoft Windows that creates extra menus you wish would just sod off, can be bypassed, allowing hackers to gain registry access.

      Security researcher Matt Nelson has discovered that the flaw allows someone to start PowerShell, access the registry and then leave no trace.

      The workaround/feature/bug/massive security hole works on any version of Windows with UAC, which was introduced in Windows Vista and later softened in Windows 7 as it proved such a spectacular pain in the Vista.

      The technique uses no files, no injections and leaves no trace. It’s just pure direct access via a vulnerability. You could go off and do it to someone now.

      Don’t do that, though.

    • all that’s not golden

      Several stories and events recently that in some way relate to backdoors and golden keys and security. Or do they? In a couple cases, I think some of the facts were slightly colored to make for a more exciting narrative. Having decided that golden keys are shitty, that doesn’t imply that all that’s shit is golden. A few different perspectives here, because I think some of the initial hoopla obscured some lessons that even people who don’t like backdoors can learn from.

      Secure Boot

      Microsoft added a feature to Secure Boot, accidentally creating a bypass for older versions. A sweet demo scene release (plain text) compares this incident to the FBI’s requested golden keys. Fortunately, our good friends over at the Register dug into this claim and explained some of the nuance in their article, Bungling Microsoft singlehandedly proves that golden backdoor keys are a terrible idea. Ha, ha, I kid.

      Matthew Garrett also has some notes on Microsoft’s compromised Secure Boot implementation. He’s purportedly a Linux developer, but he doesn’t once in this post call Windows a steaming pile, so he’s probably a Microsoft shill in disguise.

      Returning to the big question, What does the MS Secure Boot Issue teach us about key escrow? Maybe not a whole lot. Some questions to consider are how thoroughly MS tried to guard the key and whether they actually lost the key or just signed the wrong thing.

      Relevant to the crypto backdoor discussion, are the actions taken here the same? In a key escrow scheme, are iPhones sending encrypted data to the FBI or is the FBI sending encrypted messages to iPhones? The direction of information flow probably has a profound effect on the chances of the wrong thing leaking out. Not to say I want anything flowing in either direction, but it does affect how analogous the situations are.

      A perhaps more important lesson, for all security or crypto practitioners, is just barely hinted at in mjg59’s post. Microsoft created a new message format, but signed it with a key trusted by systems that did not understand this format. Misinterpretation of data formats results in many vulnerabilities. Whenever it’s possible that a message may be incorrectly handled by existing systems, it’s vital to roll keys to prevent misinterpretation.

    • Security against Election Hacking – Part 1: Software Independence

      So the good news is: our election system has many checks and balances so we don’t have to trust the hackable computers to tell us who won. The biggest weaknesses are DRE paperless touchscreen voting machines used in a few states, which are completely unacceptable; and possible problems with electronic pollbooks.

      In this article I’ve discussed paper trails: pollbooks, paper ballots, and per-precinct result printouts. Election officials must work hard to assure the security of the paper trail: chain of custody of ballot boxes once the polls close, for example. And they must use the paper trails to audit the election, to protect against hacked computers (and other kinds of fraud, bugs, and accidental mistakes). Many states have laws requiring (for example) random audits of paper ballots; more states need such laws, and in all states the spirit of the laws must be followed as well as the letter.

    • Security against Election Hacking (Freedom to Tinker)

      Over at the Freedom to Tinker blog, Andrew Appel has a two-part series on security attacks and defenses for the upcoming elections in the US (though some of it will obviously be applicable elsewhere too). Part 1 looks at the voting and counting process with an eye toward ways to verify what the computers involved are reporting, but doing so without using the computers themselves (having and verifying the audit trail, essentially). Part 2 looks at the so-called cyberdefense teams and how their efforts are actually harming all of our security (voting and otherwise) by hoarding bugs rather than reporting them to get them fixed.

    • Shift: public cloud considered more secure than corporate data centers

      Security has always weighed heavily on executives’ minds as the risk of using public cloud services. In surveys I am involved in designing, we find to this day that security is the number-one challenge or showstopper when it comes to moving things to the cloud.

    • Agencies Face Cyber Concerns as Apps Rely on Aging Systems — Report

      More than 70 percent of the 100 federal IT business decision-makers polled in Dell’s State of IT Trends 2016 Study said their agency is using old operating systems to run important mission applications. And a little more than half of respondents said their agency is using software or systems that are no longer vendor-supported, according to the report.

    • Vulnerable smart home IoT sockets let hackers access your email account

      The smart plug can act as a conduit not just for electricity — but for cyberattacks.

    • Isis members share ‘how to hack’ tutorials encouraging supporters to target western intelligence

      “Kali Linux is known as the ‘go-to’ for black [hat] and white [hat] hackers alike,” Omri Moyal, VP Research at Israel-based cybersecurity firm Minerva Labs, was quoted as saying by Vocativ. “It is widely promoted and educated in underground forums and anonymous chat rooms, and the combination of its pre-installed, ready-to-use, powerful tools make it extremely dangerous in the wrong hands,” he adds. “As we have heard that ISIS are declaring that they will move to operate in the cyber domain, it is very natural that they will go to this tool.”

    • Main ISIS forum promote ‘How To Hack’ Tutorials Online
    • ISIS Noobs Share ‘How To Hack’ Tutorials Online
    • Rex Linux Trojan Can Launch DDoS Attacks, Lock Websites, Mine for Cryptocurrency

      What initially looked like a string of Drupal sites infected with ransomware (that didn’t work properly) now looks like a professional cybercrime operation that relies on a self-propagating Linux trojan to create a botnet with various capabilities.

  • Defence/Aggression

    • U.S. Held Cash Until Iran Freed Prisoners

      New details of the $400 million U.S. payment to Iran earlier this year depict a tightly scripted exchange specifically timed to the release of several American prisoners held in Iran.

    • The Aleppo Poster Child — Paul Craig Roberts

      As for the little boy in the propaganda picture, he does not seem to be badly injured. Let us not forget the tens of thousands of children that Washington’s wars and bombings of 7 Muslim countries have killed without any tears shed by CNN anchors, and let us not forget the 500,000 Iraqi children that the United Nations concluded died as a result of US sanctions against Iraq, children’s deaths that Clinton’s Secretary of State Madeleine Albright said were worth it.

    • Why Are We Still Wasting Billions on Homeland Security Projects That Don’t Make Us Safer?

      The turbulent months after the 9/11 attacks were notable for something that did not happen. Even though al-Qaeda had killed thousands of people and scored a direct hit on the Pentagon, hardly anyone in either political party blamed the Bush Administration for failing to defend the homeland. In the burst of patriotism that followed the assaults, President Bush and his aides essentially got a free pass from the voting public. This consensus held even after it emerged that government officials had fumbled numerous clues that might have prevented the attacks. (The Central Intelligence Agency knew two al-Qaeda operatives had entered the U.S. in 2000, but never told the Federal Bureau of Investigation. No one tracked their movements and phone calls, a notable lapse since both men ended up among the 19 hijackers.) Voters had no problem re-electing a president who did nothing after receiving an intelligence briefing weeks before 9/11 headlined “Bin Laden Determined to Strike in the U.S.”

    • What Became of the Left?

      For fifteen years, and more if we go back to the Clinton regime’s destruction of Yugoslavia, the US has been engaged in wars on populations in seven—eight counting Yugoslavia/Serbia—countries, causing millions of deaths, disabled, and dislocated peoples. A police state has been created, the US Constitution stripped of its protective features, and massive crimes committed under both US and international law by three administrations. These crimes include torture, transparant false flag events, naked aggression (a war crime), spying without warrants, and murder of US citizens. Yet, the leftwing’s voice is barely heard.

      Clearly, my acquaintances are beginning to miss the challenge to explanations and the country’s direction that the left formerly provided. I know how they feel. We used to be pushed along by biases and stereotypical thinking, and the left was there to rattle our cage. Now we are pushed along by propaganda and there is no countervailing force except a few Internet voices.

    • Washington Hawks Prey on Syrian Killing Fields

      Official Washington loves to show heartbreaking images of wounded Syrian children with the implicit message that it’s time to invade Syria and impose “regime change” (rather than commit to peace talks), a dilemma addressed by Michael Brenner.

    • More False Outrage on the Syrian War
  • Environment/Energy/Wildlife/Nature

    • Smoke from Indonesia’s fires begins to drift into Malaysia

      Air quality in Indonesia and peninsular Malaysia declined this week as prevailing southwesterly winds continued to blow smog over the water that separates the two countries.

      “Smoke from forest fires and peat in Riau has already crossed the Malacca Strait,” Indonesia’s disaster management agency chief Sutopo Purwo Nugroho said on Wednesday. “It’s still only a little but it should be addressed immediately.”

      Data from Malaysia’s Department of Environment showed air quality in Shah Alam, a city near Kuala Lumpur in Selangor state, declined to 85 on Wednesday. A level above 100 is classified as unhealthy. Only one of five areas in Singapore monitored by the city state’s National Environment Agency showed air quality in the “Moderate” range. The 24-hour Pollutant Standards Index was in the “Good” range on August 7.

      The number of fires and hotspots in the 2016 dry season has been lower than last year, when the extended drought wrought by an El Niño weather event deprived the region of the rain needed to suppress Indonesia’s annual fires. Prolonged periods with no rain have led to spikes in hotspots in recent months, including the last week.

    • Time to listen to the ice scientists about the Arctic death spiral

      Not Peter Wadhams. The former director of the Scott Polar Research Institute and professor of ocean physics at Cambridge has spent his scientific life researching the ice world, or the cryosphere, and in just 30 years has seen unimaginable change.

      When in 1970 he joined the first of what would be more than 50 polar expeditions, the Arctic sea ice covered around 8m sq km at its September minimum. Today, it hovers at around 3.4m, and is declining by 13% a decade. In 30 years Wadhams has seen the Arctic ice thin by 40%, the world change colour at its top and bottom and the ice disappear in front of his eyes.

      In a new book, published just as July 2016 is confirmed by Nasa as the hottest month ever recorded, this most experienced and rational scientist states what so many other researchers privately fear but cannot publicly say – that the Arctic is approaching a death spiral which may see the entire remaining summer ice cover collapse in the near future.

  • Finance

    • Steemit Is Like Reddit, But Where Upvotes Equal a Cryptocurrency Payout

      A homeless man can afford to buy an RV thanks to a popular blog post. A woman earns a year’s salary from a YouTube makeup tutorial. An African writer starts with three hours of electricity per day and ends with over $40,000 dollars.

      These are some of the striking and somewhat implausible-sounding stories to have emerged during the first fully operational month of Steemit, a forum-style platform that rewards community content and curation with cryptocurrency payouts, and where—for the moment at least—users who hit the goldmine of a viral post can see up to five-figure payouts. (Here I should include a journalistic disclosure: a post on the site in which I appealed for sources for this story earned a total value of over $800, of which I have currently withdrawn $100.)

      But as with any new cryptocurrency, there are key questions over stability, sustainability, and underlying motivation. As it stands, the bulk of the site is made up of quickly-written, poorly-researched content, some of which is remunerated into the thousands of dollars. At the same time, critics have raised concerns over both the distribution of the currency and the business model of the platform, questioning the huge sums accrued by early adopters and in some cases alleging a scam dependent on new investment to remain afloat.

    • Bitcoin.org suspects state-sponsored attacks on the horizon

      Bitcoin.org has warned users to be aware that the upcoming release of Bitcoin Core is likely to be targeted by state-sponsored cyberattackers.

      The group which manages Bitcoin Core, the client used to keep the virtual currency decentralized while at the same time aims to accept only valid transactions, warned this week that the organization has “reason to suspect” that the binaries used in the next release will become targets.

      The upcoming 0.13.0 release, dubbed Segwit, has undergone extensive testing and has been designed to improve transaction efficiency. The update also changes the rules of the Bitcoin system marginally by introducing new features which reduce problems associated with unwanted third-party transaction malleability and designing smart contracts which use the cryptocurrency.

      However, state-sponsored groups — which are often sophisticated and have high levels of government funding — may impede the release or threaten investors dabbling in the virtual currency, and Bitcoin.org says that any state-sponsored threats levied against the new release cannot be defended against without help.

    • California Lawmaker Pulls Digital Currency Bill After EFF Opposition

      For the second year in a row, EFF and a coalition of virtual currency and consumer protection organizations have beaten back a California bill that would have created untenable burdens for the emerging cryptocurrency community.

    • Research Funding in a Post-Brexit World

      A considerable amount of research funding comes to the UK from the EU through the Horizon 2020 (H2020) scheme [1]. This programme is providing over 80 billion Euros in grants over the period 2014 to 2020 and is envisioned as a means to drive economic growth and create jobs within the EU’s member nations. The stated aim is to ensure Europe produces world-class science, removes barriers to innovation and makes it easier for the public and private sectors to work together in delivering innovation.

      The chief beneficiaries of H2020 grants are research institutions (universities and independent research organisations) and the R&D arms of large companies [2], however there is a goal that 20% of the monies will go to small or medium-sized enterprises (SMEs).

      Funding under H2020 is granted to projects each operated by a consortium of companies and organisations. A consortium puts together a detailed proposal describing what work they will do, what the outcomes will be, and how grant money would be spent. The proposals are assessed for the European Commission (EC) by panels of experts who determine the technical merit and value for money as well as considering the social and economic impact of the research. Other considerations also play a small part, such as the participation by SMEs, equality issues, and distribution of work across all EU countries. Competition is stiff, and many proposals are turned down.

    • Dozens of New York Officials Support Tenants’ Lawsuit Over Rent Stabilization

      Tenants have sued a Lower Manhattan developer, saying their leases should have been rent-stabilized in exchange for the tax breaks their landlord received. State and local officials have now filed a brief supporting the tenants, whose case could affect thousands of rental units.

    • Felicia Kornbluh on the Politics of Welfare

      Now we’re told we’re in a moment of reconsideration—of tough-on-crime policies, of the deregulation of banks and, perhaps, of the notion that depriving needy people of assistance would lead to their gainful employment and well-being. Our guest says a true reconsideration of the 1990s welfare overhaul would require a so-far invisible recentering of the people in its crosshairs: low-income women, particularly mothers raising children on their own.

  • AstroTurf/Lobbying/Politics

    • Federal Election Commission To Crack Down On ‘Deez Nuts’ As Presidential Candidate

      The more web savvy among you may know that “Deez Nuts” was a popular web meme earlier in 2015, but it didn’t quite explain how it got into the poll. It turned out that a 15 year old kid named Brady Olson had filled out the necessary paperwork under the name Deez Nuts, and PPP had decided to toss it into their poll as a bit of fun. The attention paid to Deez Nuts as a political candidate resulted in a bunch of other silly names filling out the paperwork as well — including Butt Stuff, Mr. Not Sure and Sir TrippyCup aka Young Trippz aka The GOAT aka The Prophet aka Earl.

      Of course, after that initial flurry of attention, most people mostly forgot about Deez Nuts, the fake Presidential candidate…. until this week.

      You see, earlier this week PPP released a new poll showing that Green Party candidate Jill Stein was trailing Deez Nuts in Texas (also trailing, Harambe, the dead gorilla who is also now something of an internet meme).

    • Wealthy Elites and Blowjobs

      Ostenisbly, the rant serves to warn that if such tools get out, people might target banks and financial systems, specifically mentioning the hacks on SWIFT (not to mention suggesting that if the other claimed files get out someone might target finance).

      Along the way it includes a reference to elites having their top friends announcing “no law broken, no crime commit.” And right before it, this: “make promise future handjobs, (but no blowjobs).”

      Maybe I’m acutely sensitive to mentions of blowjobs, especially those received by Bill Clinton, for reasons that are obvious to most of you. But the reference to handjobs but no blowjobs in the immediate proximity of getting off of a crime followed closely by a reference to running for President seems like an oblique reference to the Clintons.

      If so, it would place this leak more closely in line with the structure of the other leaks targeting Hillary.

      That’s in no way dispositive, but the blowjobs references does merit mentioning.

    • Trump and the Long History of Media Bias

      The mainstream U.S. news media insists that its bias against Donald Trump is an aberration justified by his extraordinary recklessness, but the truth is U.S. media bias has a long history, says longtime journalist Robert Parry.

    • Revealed: The Secret Donor Behind “Children of Israel,” the Ghost Corporation Funding GOP Super PACs

      If limited liability companies like Children of Israel make political donations, and the LLC is treated as a partnership for tax purposes, federal regulations require the LLC to inform the recipients who the actual humans behind the company are. Then the recipients of the donations must disclose this in their filings with the Federal Election Commission. By May of this year, Fox and the RNC were doing that.

      But Children of Israel either failed to do so with its contributions to Pursuing American’s Greatness and Stand for Truth, or the two Super PACs simply chose to ignore it. According to Brendan Fisher, associate counsel of the political money watchdog group Campaign Legal Center, Fox and/or Children of Israel therefore violated prohibitions on “straw donor” contributions made in someone else’s name. (The CLC filed a complaint with the FEC against Children of Israel in March before Fox’s identity became known.)

    • FEC Commissioner Wants Help Getting Foreign Money Out of U.S. Elections

      Ann Ravel, one of six members of the Federal Election Commission, called last week for the FEC to take a stand against foreign money in U.S. elections — and on Thursday, she appealed for public reaction.

      At issue are advisory opinions that gave a green light to domestic subsidiaries of foreign corporations who wanted to make donations to U.S. political campaigns. In her proposal to rescind those opinions, Ravel cited The Intercept‘s recent reporting about American Pacific International Capital, a California corporation owned by Chinese citizens which — thanks to Citizens United and that FEC opinion — was able to give $1.3 million to the Jeb Bush Super PAC Right to Rise USA.

    • Searches for Green Party surpass Dems during CNN town hall

      CNN on Wednesday night held a town hall with presidential nominee Jill Stein and running mate Ajamu Baraka.

      During the event, the team made its pitch to voters, casting the Green Party ticket as an alternative option for those who don’t want to back either major party’s nominee. Stein said the Green Party is standing up for “everyday people and an America and a future that works for all of us.”

      Stein hit Democratic nominee Hillary Clinton during the event and said she would have trouble sleeping at night if either Clinton or Republican nominee Donald Trump were elected president.

    • Did Green Party Pitch for ‘Greater Good’ Resonate with National Audience?

      Green Party presidential candidate Jill Stein and vice presidential candidate Ajamu Baraka took part in CNN’s first Green Party town hall Wednesday night, laying out their proposals to abolish all student debt, establish a single-payer healthcare system, create a foreign policy based on humanitarian values, and to establish a “Green New Deal” that would both create millions of jobs nationwide and help transition the country to 100 percent renewable energy by 2030.

    • Open Up the Debates: Green Party’s Jill Stein Accuses Democrats & GOP of Rigging Debate Rules

      While polls show Donald Trump and Hillary Clinton are among the least popular major-party candidates to ever run for the White House, it appears no third-party candidates will be invited to take part in the first presidential debate next month. The debates are organized by the Commission on Presidential Debates, which is controlled by the Democratic and Republican parties. Under the commission’s rules, candidates will only be invited if they are polling at 15 percent in five national surveys. Libertarian presidential candidate Gary Johnson and the Green Party’s Jill Stein have both witnessed recent surges in support, but neither have crossed the 15 percent threshold. More than 12,000 people have signed a petition organized by RootsAction calling for a four-way presidential debate. We speak to Green Party presidential nominee Dr. Jill Stein. Four years ago she was arrested outside a presidential debate protesting her exclusion from the event.

    • Jill Stein: How far will she go to make a splash at the debates?

      The Green Party presidential nominee tells USA TODAY’s Capital Download that she will be at the first presidential debate at Hofstra University in less than six weeks. And she says she is “absolutely” ready to be arrested, as she was four years ago. Video by Jasper Colt, USA TODAY

    • Trump May Be Saving His Biggest (Worst) Surprise For Last

      If the 2016 election is a grease-soaked dumpster fire, Donald Trump might be about to spray it with a hose full of cooking oil. Last month his campaign raised an astonishing $82 million, leaving him with $74 million on hand at the start of this month. We can safely assume a lot of that’s going toward red hats and Trump Steaks … but so far, none of it’s being spent on television ads. Gary Johnson and Jill Stein, aka “Who?” have both spent, uh, infinity times more money on TV ads than Donald Trump has.

      Trump’s spent $0 on TV since the start of the general election campaign, compared to $52 million spent by the Clinton campaign. While Hillary’s people have already booked a full range of ads in battleground states through November, Trump still seems to be relying on all the “free” publicity he’s getting from media (like us!) since the start of the campaign. The only problem is, since the end of the primary, that coverage has taken a distinct turn from “Donald Trump might be a genius” …

    • The Dixie Chicks: The long road back from exile

      Thirteen years after country music blacklisted the top-selling female band in American history, the Dixie Chicks are returning to the town that made them famous.

      And when the trio performs Wednesday night at Nashville’s sold-out Bridgestone Arena, they’ll do so unapologetically — with a show featuring the same brand of biting political commentary that most country artists avoid at all costs, and that forced the Chicks into exile more than a decade ago.

      “They have a bitter feeling about Nashville,” said Paul Worley, record executive and the Dixie Chicks’ former producer. “People in the industry may have turned their back on them, but Nashville did not. And they are going to find out when they play here that Nashville has always been here for them and will always be here for them.”

      [...]

      Yet on Wednesday, if previous shows on the Dixie Chicks’ largely sold-out 55-city tour are any indication, they will perform in front of a giant image of Republican presidential nominee Donald Trump — embellished with horns sprouting from his head and a devilish goatee scribbled on his chin.

    • Jill Stein Should Be Part of a 4-Way Presidential Debate

      After the Republicans and Democrats finished their conventions in late July, the Green Party gathered this month to nominate Dr. Jill Stein for the presidency. Stein’s campaign — with her party on ballot lines in the majority of states, and her poll numbers surging ahead of Green numbers from recent presidential elections — has the potential to be a breakthrough bid for the Greens, and for a more robust democracy.

      Stein recognized the prospect in an optimistic yet urgent acceptance speech in which she spoke of “unstoppable momentum for transformational change.” The candidate who talks of ushering in a “Green New Deal” told the Green Party Convention that “we have an historic opportunity, an historic responsibility to be the agents of that change. As Martin Luther King said, ‘the arc of the moral universe is long, but it bends towards justice.’ I know that arc is bending in us, and through us. And we are actors in something much bigger than us as we struggle for justice, for peace, for community, for healing.”

    • Roaming Charges: Prime Time Green

      Give CNN just a little credit. On Wednesday night, the cable network hosted a Town Hall featuring Green Party candidates Jill Stein and Ajamu Baraka. In those 90 Prime Time minutes, Stein and Baraka presented a clearer picture of the realities and consequences of US foreign policy and militarism than we heard from Bernie Sanders in a year’s worth of speeches.

      Americans who tuned in heard some things that are rarely mentioned in the mainstream media: a sober critique of the US’s malign relationship to the government of Israel, forthright calls for the elimination of nuclear weapons, the end of killer drone strikes, the closure of all 800-plus overseas military bases and an end to interventionist wars. The entire Town Hall session was the political equivalent of George Carlin’s the seven things you can’t say on TV.

    • Top DNC fundraiser to depart following shakeup

      Kaplan’s were among the emails released, but he didn’t lose his job in the immediate wave of housecleaning. And unlike the others who left, he’s not going far: Kaplan will be the DNC’s outside point person for events that involve President Barack Obama and first lady Michelle Obama as they raise money for the campaigns of Hillary Clinton and other candidates going into the final phase of the election.

      A DNC official confirmed the news, which was announced to senior staff Friday morning.

      “Jordan Kaplan has decided to return to his consulting business full time. He will continue to manage DNC finance events featuring the president and first lady,” the official said

    • Green Party Ticket Lays Out Its Programs, Denounces ‘Murder From the Sky’ (Audio)

      On Thursday, Green Party presidential nominee Jill Stein and running mate Ajamu Baraka joined Alan Colmes for a radio interview on Fox News’ “The Alan Colmes Show.” The Green Party ticket only recently began receiving mainstream media coverage, and Stein and Baraka explain many aspects of the Green Party ticket to potentially unfamiliar listeners.

      First, Colmes asks about the impact of the “Nader effect,” or the fear that voting for third-party candidates will split up the liberal vote and cause the Democratic Party to lose. “These are the most unpopular and disliked candidates in our history,” Stein responds. “People are saying ‘we’ve had enough of those guys.’ ”

    • Green Party’s Jill Stein to join presidential campaign trail in Colorado

      Stein is expected to draw a crowd as she appeals to one-time Bernie Sanders supporters in a state that overwhelmingly voted for the Vermont senator at the 2016 caucus. The latest poll shows Stein with 7 percent support in Colorado, far better than her showing in the 2012 election when she won just 0.3 percent, or 7,508 votes.

  • Censorship/Free Speech

    • Atheism – a reason to be banned by Facebook?

      In February 2016, ten of the largest Arabic-speaking atheist groups, with a total of about 100,000 members, have been deactivated for the same reason: heavy reporting campaigns that are organized by “cyber jihadist” fundamentalist Islamic groups, especially for the removal of any anti-Islamic group or page. In such coordinated campaigns, very large numbers of people, and possibly automated scripts, simultaneously file reports falsely claiming that a page, group, or personal account has violated Community Standards.

    • Gawker.com to shut down next week

      Gawker.com, the flagship blog of Gawker Media, will shut down Monday after 14 years of operation, a dramatic coda for a feisty newsroom unable to survive a $140 million judgment from an invasion-of-privacy lawsuit.

      The decision comes two days after Univision Communications agreed to buy Gawker Media’s assets — for its six other blogs — for $135 million in a bankruptcy auction held Tuesday. Univision won after outbidding a $131 million bid from digital publisher Ziff Davis.

      Gawker Media and its founder and CEO, Nick Denton, filed for bankruptcy protection after a Florida jury decided in March that Gawker.com violated Hulk Hogan’s privacy when it published a sex tape of the former pro wrestler having sex with the wife of a friend.

      A bankruptcy court in New York, which had to review any deals for Gawker’s assets, considered Univision’s bid at a hearing Thursday afternoon and gave its approval to proceed with the deal.

      “Sadly, neither I nor Gawker.com, the buccaneering flagship of the group I built with my colleagues, are coming along for this next stage,” Denton wrote in a note to staffers.

      The closure of Gawker.com, known for its snarky and pugnacious coverage of politicians, celebrities and media personalities, will be cheered by some of its critics as a satisfying comeuppance for a blog that not only didn’t pull punches but sometimes aimed below the belt. Others, including media advocates, interpret it as a chilling sign of the threat to the First Amendment posed by third-party-funded lawsuits.

    • Body slammed by Hulk Hogan, Gawker.com will cease operations

      Gawker.com, facing a $140 million jury verdict for publishing a sex tape of Terry Bollea (better known as pro wrestling icon Hulk Hogan), is shuttering operations next week, according to a post on the site.

      “Nick Denton, the company’s outgoing CEO, informed current staffers of the site’s fate on Thursday afternoon, just hours before a bankruptcy court in Manhattan will decide whether to approve Univision’s bid for Gawker Media’s other assets,” the website said. “Staffers will soon be assigned to other editorial roles, either at one of the other six sites or elsewhere within Univision. Near-term plans for Gawker.com’s coverage, as well as the site’s archives, have not yet been finalized.”

      Univision acquired Gawker Media for $135 million on Tuesday. Gawker Media’s other holdings include Gizmodo, Deadspin, Jezebel, Lifehacker, Kotaku, and Jalopnik. The company filed for Chapter 11 bankruptcy two months ago and went up for sale following the jury’s verdict.

    • Twitter says it shuttered 235k accounts linked to terrorism in 6 months

      Twitter said Thursday it has shut down 235,000 accounts linked to violent extremism in the last six months alone. That brings the total number of terminated Twitter accounts associated with terrorism to 360,000 since mid-2015.

    • “Dangerous precedent for free speech”: NJ Gov. Chris Christie signs law punishing boycotts of Israel

      New Jersey Gov. Chris Christie has signed bipartisan-backed legislation that will punish groups that endorse a boycott of Israel in protest of its violations of Palestinian human rights.

      Christie, who is one of the most outspoken supporters of far-right Republican presidential candidate Donald Trump, signed the bill on Tuesday.

      It requires the New Jersey government to identify companies that support a boycott of Israel, raising fears that it would create a “blacklist” of institutions that back the growing Boycott, Divestment and Sanctions, or BDS, movement.

      Under the new law, the State Investment Council, which manages more than $80 billion in pension assets, is legally obligated to divest from these blacklisted companies.

    • Former Gawker Editor Lashes Out At Peter Thiel, Calls Freeze On His Checking Account ‘Ludicrous’

      A.J. Daulerio, the ex-Gawker editor who wrote the 2012 story that originally included an excerpt of the Hulk Hogan sex tape he and his employer were successfully sued over, lashed out at Peter Thiel on Thursday. Daulerio questioned the motives of going after his personal assets to satisfy a portion of the $140.1 million judgement in the case.

      “It’s ludicrous that a billionaire like Peter Thiel is spending his wealth on lawyers to freeze my $1,500 bank account and figure out the value of my rice cooker and old furniture,” Daulerio told FORBES in a statement. “If Mr. Thiel really believed in the First Amendment, he would not be funding lawyers to chase my meager assets and instead would try to justify the $115.1 million verdict in front of an appeals court. Instead, he’s using his fortune to hold me hostage to settle a decade-long grudge that has nothing to do with me or Hulk Hogan.”

      As FORBES first revealed in May, Thiel financed Hogan’s lawsuit as part of an effort to bring down the media company. Daulerio’s comments are his first public statements about case since the jury awarded its verdict in March.

    • Did I Kill Gawker?

      It feels a bit strange to say this now, but in the spring of 2014 there was no better place to work than Gawker. For a certain kind of person, at any rate — ambitious, rebellious, and eager for attention, all of which I was. Just over a decade old, Gawker still thought of itself as a pirate ship, but a very big pirate ship, ballasted by semi-respectable journalism, and much less prone to setting itself on fire than in its early days, when its writers had a tendency to make loud and famous enemies and when its staff was subjected to near-annual purges — unless they were able to dramatically quit first. It managed to be, in a way it never had been, the kind of place about which you could say, “I could see myself being here in ten years.” Which I did often enough for it to seem funny now, since I myself would end up dramatically quitting in the summer of 2015, a little more than a year after being promoted to editor-in-chief and a little less than a year before the company would declare bankruptcy and auction itself off to the highest bidder.

    • Under Xi Jinping’s presidentship, it is apparent that free and fair media reportage is difficult

      For most of its 25 years, the Chinese history magazine Yanhuang Chunqiu has been loved by moderate liberals and detested with equal passion by devotees of Mao Zedong, who reviled it as a refuge for heretical criticisms of the Chinese leader and the Communist Party. But in a sign of how sharply ideological winds have turned under President Xi Jinping, officials who recently took control of the magazine have wooed Maoist and nationalist writers who long scorned the magazine. Several well-known hard-line polemicists attended a meeting with the new managers on Monday.

    • ‘It feels like censorship’: Guardian readers on NPR’s decision to close comments

      One thing I think would benefit all publishers is to more closely moderate comments before they’re published. That’ll lead to better discussions and avoid the “garbage fire” of flame wars. Would a news organisation allow journalists to publish prior to proof reading and approval? Of course not. Why then would they allow comment to be approved based purely on a login?

      NPR has said it will use social media to engage with users instead of comments, but responding to a story on social media certainly isn’t the right place for anything other than a brief statement. It’s an instant reaction, rather than any analytical in-depth response.

      My perspective is: either do it properly (moderate), or close the comments. But remember, closing comments effectively diminishes the collaborative communication that the internet gifts us all.

    • Despite Violent Scenes, Directors Mo Brothers Say Censorship is Not the Limit

      As seen during the media preview that in Jakarta on Thursday (18/08), “Headshot” features quick fighting and gun violence scenes which undoubtedly will raise the question about censorship. Directors Kimo Stamboel and Timo Tjahjanto said censorship should not limit their creativity.

    • Mapping Media Freedom: In review 30 July-18 August
    • Will Certificates Help Indian Films Against Censorship?
    • Media’s Self-Inflicted Punishment is the New Censorship

      Public and foreign diplomats are routinely told by the military regime that Thai media enjoys freedom to criticize. That’s only half true at best. The reality is that, two years after the 2014 coup, the selective pressures being applied on some media critical of the junta have just become more subtle and sophisticated, thus rather invisible.

      [...]

      Pravit RojanaphrukLast month, junta leader Gen. Prayuth Chan-ocha used his absolute power under Article 44 of the provisional charter to empower the commission to censor any media deemed a threat to national security and shield it from legal consequences for doing so. According to an outstanding junta order from 2014, security threats include anything construed as defaming the monarchy, “insincere” criticism of the junta, or anything that might sway public opinion against it.

  • Privacy/Surveillance

    • Researcher Grabs VPN Password With Tool From NSA Dump

      Cisco has already warned customers about two exploits found in the NSA-linked data recently dumped by hackers calling themselves The Shadow Brokers. Now, researchers have uncovered another attack included in the cache, which they claim allows the extraction of VPN passwords from certain Cisco products—meaning hackers could snoop on encrypted traffic.

      Security researcher Mustafa Al-Bassam first documented the hacking tool, which uses the codename BENIGNCERTAIN, in a blog post published Thursday. He coined the attack “PixPocket” after the hardware the tool targets: Cisco PIX, a popular, albeit now outdated, firewall and VPN appliance. Corporations or government departments might use these devices to allow only authorised users onto their network.

    • Why the NSA should be considered a hostile agency

      I think the current mindset of these government agencies is foolish and puts not only our firms and customers at risk, but the nation itself. Let me explain.

    • Shadow Brokers Leak Just Revealed How The NSA Broke American-Made Encryption

      If the Shadow Brokers’ leak of NSA files is legit, as is now all but confirmed, they have offered a glimpse into how the intelligence agency exploited security systems created by American tech vendors.

    • Snowden Documents Confirm the NSA Hack Is Real

      Last Friday, a mysterious group by the name of “The Shadow Brokers” dumped what appeared to be some of the National Security Agency’s hacking tools online. There was some speculation as to whether the tools were legitimate. According to The Intercept, these tools are mentioned in documents leaked by NSA whistleblower Edward Snowden.

    • The NSA Leak Is Real, Snowden Documents Confirm

      On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect computers worldwide.

      The provenance of the code has been a matter of heated debate this week among cybersecurity experts, and while it remains unclear how the software leaked, one thing is now beyond speculation: The malware is covered with the NSA’s virtual fingerprints and clearly originates from the agency.

      The evidence that ties the ShadowBrokers dump to the NSA comes in an agency manual for implanting malware, classified top secret, provided by Snowden, and not previously available to the public. The draft manual instructs NSA operators to track their use of one malware program using a specific 16-character string, “ace02468bdf13579.” That exact same string appears throughout the ShadowBrokers leak in code associated with the same program, SECONDDATE.

    • New Snowden documents confirm leaked cyberweapons do belong to the NSA
    • Snowden documents show NSA leak is real: report
    • Snowden documents show NSA leak is real: report
    • New Snowden documents prove the hacked NSA files are real
    • Snowden docs link NSA to Equation Group hackers
    • New Snowden docs support claim of NSA cyberweapon hack
    • Snowden files confirm Shadow Brokers spilled NSA’s Equation Group spy tools over the web

      Documents from the Edward Snowden archive prove that the malware and exploits dumped on the public internet on Monday originated from the NSA.

      Among the files leaked by whistleblower Snowden in 2013 is a draft NSA manual on how to redirect people’s web browsers using a man-in-the-middle tool called SECONDDATE. This piece of software meddles with connections in real-time so targets quietly download malware from NSA-controlled servers.

      The guide instructs snoops to track SECONDDATE deployments using a 16-character identification string: ace02468bdf13579.

      Earlier this week, hackers calling themselves the Shadow Brokers briefly leaked on GitHub an archive of code, claiming the tools were stolen from the Equation Group – which is understood to be a computer surveillance wing of the NSA. It was hard to tell at the time if the software collection was a carefully constructed spoof, or if it truly belonged to the US spying agency.

    • Hackers say leaked NSA tools came from contractor at RedSeal

      On Friday, messages posted to Pastebin and Tumblr allege the recently leaked NSA files came from a contractor working a red team engagement for RedSeal, a company that offers a security analytics platform that can assess a given network’s resiliency to attack. In addition, the hackers claim the intention was to disclose the tools this year during DEF CON.

      Salted Hash reached out to the press team at DEF CON, as well as RedSeal.

      In a statement, RedSeal would only confirm they are an In-Q-Tel portfolio company. The company also denied any knowledge of red team assessments against their products by In-Q-Tel or contractors working with In-Q-Tel. The press department at DEF CON hadn’t responded to questions by the time this article went to print.

    • Why The NSA’s Vulnerability Equities Process Is A Joke (And Why It’s Unlikely To Ever Get Better)

      Two contributors to Lawfare — offensive security expert Dave Aitel and former GCHQ information security expert Matt Tait — take on the government’s Vulnerability Equities Process (VEP), which is back in the news thanks to a group of hackers absconding with some NSA zero-days.

      The question is whether or not the VEP is being used properly. If the NSA discovered its exploits had been accessed by someone other than its own TAO (Tailored Access Operations) team, why did it choose to keep its exploits secret, rather than inform the developers affected? The vulnerabilities exposed so far seem to date as far back as 2013, but only now, after details have been exposed by the Shadow Brokers are companies like Cisco actually aware of these issues.

      According to Lawfare’s contributors, there are several reasons why the NSA would have kept quiet, even when confronted with evidence that these tools might be in the hands of criminals or antagonistic foreign powers. They claim the entire process — which is supposed to push the NSA, FBI, et al towards disclosure — is broken. But not for the reasons you might think.

      The Office of the Director of National Intelligence claimed last year that the NSA divulges 90% of the exploits it discovers. Nowhere in this statement were any details as to what the NSA considered to be an acceptable timeframe for disclosure. It’s always been assumed the NSA turns these exploits over to developers after they’re no longer useful. The Obama administration may have reiterated the presumption of openness when reacting to yet another Snowden leak, but also made it clear that national security concerns will always trump personal security concerns — even if the latter has the potential to affect more people.

    • Australian Law Enforcement Hacked US Users’ Computers During Child Porn Investigation

      Thanks to the internet, more law enforcement agencies are exceeding jurisdictional limitations than ever before. The FBI’s Network Investigative Technique (NIT) — deployed during a child porn investigation to strip Tor users of their anonymity — travelled all over the United States and the world beyond. IP addresses and computer information harvested by the FBI were turned over to Europol and details obtained by Motherboard suggested at least 50 computers in Austria alone had been compromised by the FBI’s hacking.

      Rule 41 imposes jurisdictional limitations on the FBI’s hacking attempts — something the DOJ is trying (and succeeding, so far) to have changed. But the hacking goes both ways. Not only does the FBI go cruising past US borders while tracking down Tor users accessing seized child porn servers, but law enforcement agencies in other countries are doing the same thing — and raising the same questions.

    • Bulk data collection by MI5, MI6 and GCHQ is warranted, says terrorism watchdog

      Bulk collection and analysis of data by MI5, MI6 and GCHQ is relevant and worthwhile for national security, according to an in-depth report by the Independent Reviewer of Terrorism Legislation, David Anderson QC.

      Prime minister Theresa May has already used the report as proof that the Draft Investigatory Powers Bill, despite widespread criticism, is necessary to boost the UK’s ability to fight crime and terrorism.

      The 192-page report was headed by Anderson and a team he chose free from government involvement. It did not look at the legal and privacy aspects of bulk data collection and analysis, only whether it served a purpose for the operations of the security agencies.

    • Terror plot foiled “in its final few hours” after spooks hack attackers’ phones and emails

      A terrorist cell poised to attack Britain last year was foiled at the 11th hour after online spooks hacked their phones and emails, a dramatic new report has revealed.

    • GCHQ spies given enhanced hacking powers — what are they and should we be worried?

      British spies at GCHQ, MI5 and MI6 have effectively been given the green light to continue their mass spying operations around the world after a fresh independent review into bulk surveillance powers found ‘no viable alternative’ to the current regime.

      Compiled by David Anderson QC, the hefty 200-plus page report was commissioned by Prime Minister Theresa May while in her previous role of home secretary.

    • GCHQ Details Cases of When It Would Use Bulk Hacking
    • UK terror-law watchdog has given a green light to powers for spy agencies to collect bulk data
    • Internet spying powers backed by review
    • Spy agencies’ love of bulk data set has merit, so Snoopers’ Charter is fair
    • Court Says Man Can Sue Maker Of Web-Monitoring Software For Wiretap Act Violations

      The Sixth Circuit Court of Appeals has decided a man whose communications were snagged by commercial spyware can sue the software’s maker for violating federal wiretap law.

      The plaintiff, Javier Luis, became involved in an online relationship with an unhappily married woman. Her husband, Joseph Zang, installed Awareness Technologies’ “WebWatcher” on his wife’s computer in order to keep tabs on her online communications. After discovering his communications had been intercepted, Luis sued the software’s maker (along with the husband, who has already settled with Luis and is no longer listed as a defendant).

      The Appeals Court doesn’t form an opinion on the strength of Luis’s claims — only noting that they’re strong enough to survive dismissal. Awareness Software will be able to more fully address the allegations in the lower court on remand, but for now, the Appeals Court finds [PDF] the software’s “contemporaneous interception” of electronic communications to be a potential violation of the Wiretap Act.

    • The NSA Data Leakers Might Be Faking Their Awful English To Deceive Us

      Nobody knows who’s hiding behind the moniker of The Shadow Brokers, the mysterious group who earlier this week dumped a slew of hacking tools belonging to the NSA. Is it the Russian government? Is it actually a disgruntled rogue NSA insider?

      For now, there’s no hard evidence pointing in either direction. But The Shadow Brokers’ language in their rambling manifesto might give us some clues. In fact, the apparent broken English might just be a ruse, a trick to make us believe the author doesn’t speak the language, according to a linguistic analysis of it.

      “The author is a native English speaker trying to pass himself off as a foreigner,” Jeffrey Carr, CEO of cybersecurity company Taia Global, told Motherboard.

    • Researchers Find “Strong Connection” Between NSA Hackers and Leaked Files

      First detected by Kaspersky Lab back in 2015, Equation Group is a threat actor believed to be working for the NSA. It has leveraged malware campaigns, watering holes, and compromised removable media to conduct cyber espionage against foreign targets presumably on behalf of the United States and Israel.

    • Did The NSA Continue To Stay Silent On Zero-Day Vulnerabilities Even After Discovering It Had Been Hacked?

      The NSA’s exploit stash is allegedly for sale. As mentioned earlier this week, an individual or a group calling themselves Shadow Brokers claims to be auctioning off parts of the NSA’s Tailored Access Operations (TAO) toolkit, containing several zero days — including one in Cisco’s (a favorite NSA TAO target) Adaptive Security Appliance which allows for remote code execution.

      The thing about these vulnerabilities is that they aren’t new. The exploits being hawked by Shadow Brokers date back to 2013, suggesting the agency has been sitting on these exploits for awhile. The fact that companies affected by them don’t know about these flaws means the NSA hasn’t been passing on this information.

      Back in 2015, the NSA declared that it passed on information about vulnerabilities to affected companies “90% of the time.” Of course, this statement contained very few details about how long the NSA exploited vulnerabilities before allowing them to be patched.

      The White House told the NSA to make disclosure the preferred method of handling discovered vulnerabilities, but also gave it a sizable loophole to work with — “a clear national security or law enforcement need.”

    • Eight LinkedIn alternatives for IT professionals: Top professional networks 2016: Professional social networks [iophk: "how about none?"]
    • Cisco Systems to cut 5,500 jobs after reporting 2% drop in revenue

      Cisco Systems is to cut about 5,500 jobs, representing nearly 7% of the US technology company’s global workforce.

      The world’s largest networking gear maker, based in San Jose, California, announced the cuts on Wednesday night as part of a transition from its hardware roots into a software-centric business.

    • I’m 36 and not on Facebook. You probably shouldn’t be either.

      I am 36 years old and am not on Facebook. It’s not that I ever explicitly decided not to sign up, but at first it was easy to avoid. It seemed like another fad that would peak and then fade, like Myspace (remember that?). But Facebook didn’t fade — in fact, it’s become expected — and by not making a decision to join, I made my decision.

      The Facebook Era emerged slowly, at least for me. I grew up when the main function of home computers was for games and word processing, and I remember a line of kids my age snaking out of one neighbor’s dining room to take a turn on the family’s new machine. It was unbelievably exciting — for about a week, until we all became bored and went back outside to play Manhunt or Ghosts in the Graveyard.

      Twenty-five years later, I’m still outside looking for playmates, but the block is empty. Everyone is on Facebook.

      I don’t claim to be above technology: I have a smartphone and two Instagram accounts — one devoted to my collection of vinyl records. I truly do understand the appeal of social networking. It connects people who may otherwise not be connected, and there is a lot to appreciate about that. But I also have a deep affection for the face-to-face interaction.

    • Former NSA Staffers: Rogue Insider Could Be Behind NSA Data Dump

      There are a lot of unanswered questions surrounding the shocking dump of a slew of hacking tools used by an NSA-linked group earlier this week. But perhaps the biggest one is: who’s behind the leak? Who is behind the mysterious moniker “The Shadow Brokers”?

      So far, there’s no clear evidence pointing in any direction, but given the timing of the leak, and the simple fact that very few would have the capabilities and the motives to hack and shame the NSA publicly, some posited The Shadow Brokers could be Russian.

      But there’s another possibility. An insider could have stolen them directly from the NSA, in a similar fashion to how former NSA contractor Edward Snowden stole an untold number of the spy agency’s top secret documents. And this theory is being pushed by someone who claims to be, himself, a former NSA insider.

      “My colleagues and I are fairly certain that this was no hack, or group for that matter,” the former NSA employee told Motherboard. “This ‘Shadow Brokers’ character is one guy, an insider employee.”

    • EU to crack down on online services such as WhatsApp over privacy

      WhatsApp, Skype and other online messaging services face an EU crackdown aimed at safeguarding users’ privacy, in a move that highlights the gulf between Europe and the US in regulating the internet.

      The European commission will publish a draft law on data privacy that aims to ensure instant message and internet-voice-call services face similar security and privacy rules to those governing SMS text messages, mobile calls and landline calls.

      Jan Philipp Albrecht, a German Green MEP and prominent campaigner on data privacy, said: “It was obvious that there needs to be an adjustment to the reality of today. We see telecoms providers being replaced and those companies who seek to replace them need to be treated in the same way,” he said.

      According to a draft policy paper seen by the Financial Times, the likes of WhatsApp, owned by Facebook, and Skype, owned by Microsoft, would have to abide by “security and confidentiality provisions”.

    • Where Are NSA’s Overseers on the Shadow Brokers Release?

      Whatever else the release of the tools did (and I expect we’ll learn more as time goes on), it revealed that NSA has been exploiting vulnerabilities in America’s top firewall companies for years — and that whoever released these tools likely knew that, and could exploit that, for the last three years.

      That comes against the background of a debate over whether our Vulnerabilities Equities Process works as billed, with EFF saying we need a public discussion today, and former NSA and GCHQ hackers claim we ignorant laypeople can’t adequately assess strategy, even while appearing to presume US strategy should not account for the role of tech exports.

      We’re now at a point where the fears raised by a few Snowden documents — that the NSA is making tech companies unwitting (the presumed story, but one that should get more scrutiny) or witting partners in NSA’s spying — have born out. And NSA should be asked — and its oversight committees should be asking — what the decision-making process behind turning a key segment of our economy into the trojan horse of our spooks looks like.

      Mind you, I suspect the oversight committees already know a bit about this (and the Gang of Four might even know the extent to which this involves witting partnership, at least from some companies). Which is why we should have public hearings to learn what they know.

      Did California’s congressional representatives Dianne Feinstein, Adam Schiff, and Devin Nunes sign off on the exploitation of a bunch of CA tech companies? If they did, did they really think through the potential (and now somewhat realized) impact it would have on those companies and, with it, our economy, and with it the potential follow-on damage to clients of those firewall companies?

    • UK terror-law watchdog has given a green light to powers for spy agencies to collect bulk data

      POWERS that allow spy agencies to harvest bulk data were today given the go-ahead by the UK’s terror-law watchdog.

      In David Anderson QC’s report, published this morning, he said there was a “proven operational case” for most of the controversial methods of data collection.

      Prime Minister Theresa May welcomed the findings claiming it showed how the powers, which she is currently trying to cement in legislation, are of “crucial importance” to MI5, MI6 and GCHQ.

      But critics raised concerns over whether the Government would follow all of the report’s recommendations, and raised the prospect of blocking them in the House of Lords if they are not happy.

      Mr Anderson was asked earlier this year to evaluate the case for the tactics, which are included in the landmark Investigatory Powers Bill.

    • Bulk data collection vital to prevent terrorism in UK, report finds

      The bulk collection of personal data by British spy agencies is vital in preventing terrorist attacks, an independent review of draft security legislation has found.

      David Anderson QC, the independent reviewer of terrorism legislation, concluded that laws giving MI5, MI6 and GCHQ the right to gather large volumes of data from members of the public had a “clear operational purpose”.

  • Civil Rights/Policing

    • Theresa May urged to vote against Saudi Arabia remaining on Human Rights Council over abuses

      Politicians and campaigners will demand Theresa May vote against Saudi Arabia remaining on the UN Human Rights Council after a year which saw the country’s government savagely bomb Yemen, commit vast numbers of beheadings, a mass execution and detain activists.

      Their call, on World Humanitarian Day, comes ahead of a critical UN vote on whether Saudi Arabia retains its seat. Controversy over the matter has increased since the Saudi Ambassador was also given a key role on a panel related to the council.

      But despite the repeated and well publicised atrocities of the Middle Eastern state, UK ministers still refuse to say whether they will back the kingdom or not.

    • An Iranian woman won an Olympic medal for the first time in history

      Kimia Alizadeh Zenoorin made history yesterday, Aug. 18, as the first Iranian woman to ever win an Olympic medal. She took the bronze for Iran in taekwondo, beating Sweden’s Nikita Glasnovic.

    • When I Was a Kid in Sherman Park, There Were Problems With Police. Now It Feels Like a Police State.

      The neighborhood was one of the most diverse places in the city. My brother and I played with the lawyer’s kids across the street, and we swung on the swing of the photographer next door while he cleaned his classic Excalibur. The East Indian kids living opposite us were some of my best friends growing up. Their dad was a bank examiner and their mother was my brother’s English teacher. We hung out with the Latino family two doors down after their daughter Elizabeth’s Quinceanera. There were a few police officers’ families per block in the old neighborhood and a few judges and an alderman too. Most of them were Black.

    • Walmart’s Out-of-Control Crime Problem Is Driving Police Crazy

      Officer Walmart to his colleagues in the Tulsa Police Department—operates for up to 10 hours a day out of the security office of a Walmart Supercenter in the city’s northeast corner. It’s a small, windowless space with six flatscreen monitors mounted on a pale blue cinder-block wall, and on this hot summer day, the room is packed. Four Walmart employees watch the monitors, which toggle among the dozens of cameras covering the store and parking lot, while doing paperwork and snacking on Cheez Whiz and Club Crackers. In a corner of the room, an off-duty sheriff’s officer, hired by Walmart, makes small talk with the employees.

    • Scottish Soccer Fans Fly the Flag For Celtic, For Justice, For Palestine

      Defying a ban on political or “provocative” demonstrations by the European governing soccer body UEFA, hometown Scottish fans waved a sea of Palestinian flags at a playoff game between their Glasgow Celtics and Israel’s Hapoel Be’er-Sheva to express solidarity with Palestinians and opposition to the Israeli Occupation. The action by fans of the Celtic club, which grew from Irish Catholic working class communities and their fight against British colonialism in Northern Ireland, is the latest in a decades-long history of supporting Palestinian rights through groups like the Scottish Palestine Solidarity Committee, Celtic Fans for Palestine, No2BrandIsrael, and Palestine Alliance. The Alliance organized this week’s demonstration, distributing the flags and leaflets on the Nakba, urging Celtic fans to support the BDS movement, and arguing that “football, UEFA and Celtic are being used to whitewash Israel’s true nature and give this rogue state an air (of) acceptance it should not enjoy.”

    • The Global Ambitions of Pakistan’s New Cyber-Crime Act

      Despite near universal condemnation from Pakistan’s tech experts; despite the efforts of a determined coalition of activists, and despite numerous attempts by alarmed politicians to patch its many flaws, Pakistan’s Prevention of Electronic Crimes Bill (PECB) last week passed into law. Its passage ends an eighteen month long battle between Pakistan’s government, who saw the bill as a flagship element of their anti-terrorism agenda, and the technologists and civil liberties groups who slammed the bill as an incoherent mix of anti-speech, anti-privacy and anti-Internet provisions.

    • Actress Amber Heard Donates Millions to Support ACLU Work Fighting Violence Against Women

      Actress Amber Heard announced yesterday she will give the American Civil Liberties Union half of her $7 million divorce settlement to support our work fighting violence against women. The other half of the settlement will be donated to the Children’s Hospital of Los Angeles.

    • Woman Sues After Police Destroy Her Home During 10-Hour Standoff With The Family Dog

      When the only thing standing between law enforcement and a suspect they’re seeking is a person’s home, well… the home’s got to go.

      As seen previously here at Techdirt, police officers pretty much razed a residence to the ground searching for a shoplifting suspect. In another case, law enforcement spent nineteen hours engaged in a tense standoff with an empty residence before deciding to send in a battering ram.

      Another standoff — currently the center of a federal lawsuit — stands somewhere in between these two cases. The house wasn’t completely empty or completely destroyed. But that still doesn’t make the Caldwell (ID) police look any more heroic… or any less destructive.

    • Declassified justice: Gitmo lawyer explains CIA censorship of clients

      President Barack Obama’s recent release of 15 prisoners from Guantanamo Bay marked the largest single transfer yet. However, as the US loosens its clutches on some detainees, the CIA’s grip on keeping them silent remains tight as ever.

    • Unmasking Misinformation, Disinformation and Propaganda: NSA Interrogation Officer – A Postcard From Guantanamo Bay

      From the Snowden Archives published by The Intercept come the internal newsletters of the NSA’s most important division, the Signals Intelligence Directorate (SID). These particular documents called ‘SIDtoday’ are internal newsletters given to the vast number of NSA employees as a way of communicating the perceived importance of their work and, no doubt, like many internal company newsletters to keep up employee morale. They provide an intriguing insight into their work from the perspective of those on the inside.

  • Internet Policy/Net Neutrality

    • U.S. says transfer of internet governance will go ahead on Oct. 1

      The U.S. will go ahead with its plan to hand over oversight of the internet’s domain name system functions to a multistakeholder body on Oct. 1, despite fierce opposition from some lawmakers and advocacy groups.

      The Internet Corporation for Assigned Names and Numbers (ICANN), under contract with the U.S. Department of Commerce, operates the Internet Assigned Numbers Authority (IANA) which enables the operation of the internet domain name system (DNS). These include responsibility for the coordination of the DNS root, IP addressing and other internet protocol resources.

      The National Telecommunications and Information Administration (NTIA), an agency within the Commerce Department, said in March 2014 that it planned to let its contract with ICANN expire on Sept. 30, 2015, passing the oversight of the functions to a global governance model. NTIA made it clear that it would not accept a plan from internet stakeholders that would replace its role by that of a government-led or intergovernmental organization or would in any way compromise the openness of the internet.

      The transfer was delayed to September as the internet community needed more time to finalize the plan for the transition. The new stewardship plan submitted by ICANN was approved by the NTIA in June.

    • US: We’re now ready to give up our role governing the internet

      The US says it is ready to transfer its role in administering the internet’s naming system to a multiple stakeholder group on October 1.

    • BT signs 5G research deal with Nokia

      BT HAS STRUCK a deal with Nokia over the research and development of 5G technologies, with the two companies already collaborating to test Nokia’s latest 5G kit at BT Labs at Adastral Park in Martlesham, near Ipswich.

      The agreement between the two companies will also include the development of proof-of-concept trials around 5G technologies, and the development of standards and equipment that could be used for 5G networks.

  • Intellectual Monopolies

    • Trademarks

      • After the split: so is it HP, Hewlett Packard, Hewlett Packard Enterprise or what?

        In that connection, this Kat recently met an acquaintance, who has a long-time connection with the company. Over a cup of coffee, this Kat innocently asked: “So which HP company do you now work for. And who is running the company”? My acquaintance fumbled his response to both questions, before ultimately coming up with the correct answers. As Kat readers may be aware, the former Hewlett-Packard Company has split into two separate companies. The then existing company changed its name to HP Inc. and retained the company’s personal computer and legacy business (with its ticker remaining HPQ), while a new company was created, called Hewlett Packard Enterprise Co. (with its ticker symbol “HPE”) and consisting of four divisions—Enterprise Group, Services, and Software and Financial Services. In May 2016, it was announced that Hewlett Packard Enterprise would sell its Enterprise Services division to Computer Sciences Corporation. This transaction is to be completed by March 2017; in the meantime, it does not appear that a name has been chosen for this new company.

      • Seven scenarios for EU trade marks post-Brexit

        The Institute of Trade Mark Attorneys has mapped out seven possible options to prevent the loss of registered rights in the UK when the country leaves the EU

    • Copyrights

      • Recording Industry Whines That It’s Too Costly To Keep Copyright Terms At Life Plus 50, Instead Of Life Plus 70

        Okay. I’ve heard lots of crazy arguments from the record labels, but I may have found the craziest. We’ve discussed how ridiculous it is that the TPP includes a provision saying that every country that signs on must make sure the minimum copyright term is life plus 70 years. This will impact many of the countries that negotiated the agreement, which currently have terms set at life plus 50. This was a key point that the recording industry and Hollywood fought hard for. When even the Copyright Office recognizes that life plus 70 is too long in many cases, the legacy industries recognized that getting copyright term extension through Congress in the US might be difficult — so why not lock stuff in via international agreements?

      • Judge grants Happy Birthday lawyers $4.6M, citing “unusually positive results”

        The attorneys who moved the song Happy Birthday into the public domain will receive $4.62 million in fees, according to a judge’s fee order (PDF) published Tuesday. The amount, which equals one-third of a $14 million settlement fund, was granted over objections by the defendant, Warner/Chappell.

        After various billing deductions, US District Judge George King found that a “lodestar” payment of about $3.85 million was appropriate. King then added a multiplier.

        “Given the unusually positive results achieved by the settlement, the highly complex nature of the action, the risk class counsel faced by taking this case on a contingency-fee basis, and the impressive skill and effort of counsel, we conclude that a 1.2 multiplier is warranted,” wrote King.

        Five lawyers billed the “vast majority” of the hours, charging rates that varied between $395 per hour and $820 per hour. The most work was done by Randall Newman, who billed 2,193 hours at $640 per hour. King found the rates were all reasonable given “the cases cited, the National Law Journal survey, and our own experience.”

      • Arrrgh! I Speak With the Pirate Party of Iceland

        The audience was remarkably well-informed on whistleblower issues, with questions not only about high-profile folks like Ed Snowden and Chelsea Manning, but also important whistleblowers like Tom Drake, Bill Binney, John Kiriakou, and Jeff Sterling, who may not be as well known to many Americans.

        There was also among the people present an overt fear of the direction the United States continues to head, beyond the symptoms of Hillary and Trump. The endless wars of the Middle East progulated and/or encouraged and supported by the U.S., the global pestilence of the NSA, and the lashing out of America against Muslims and human rights were all of deep concern.

      • BREIN Tracks Down Facebook Music Pirate, Settles for €7,000

        Anti-piracy group BREIN has tracked down a prolific cyberlocker uploader who shared pirated music in a dedicated Facebook group. The man agreed to sign a €7,000 settlement and left the group, which shut down soon after. In addition, Facebook closed several other groups that were focused on sharing copyright infringing links.

      • Kim Dotcom & John McAfee “At War” Over Megaupload 2.0 Revelations

        Kim Dotcom has made a surprise announcement relating to his under-development Megaupload 2.0 project. The entrepreneur informs TorrentFreak that John McAfee’s MGT Capital Investments offered to invest $30m plus stock into the business but it soon became clear that the aim was to drive up the stock price at MGT. Now, it appears, McAfee and Dotcom are at war.

      • Court To Prenda’s John Steele: Okay, Now We’ll Sum Up How Much You Cost Taxpayers And Need To Pay

        When last we left John Steele, one of the dynamic duo behind the massive copyright trolling scam once known as Prenda Law, he was being scolded by the 7th circuit appeals court (not the first appeals court to do so), for failing to abide by the court’s own advice to “stop digging.” But digging a deeper and deeper hole has always been in John Steele’s nature, it seems. As we’ve mentioned in the past, Steele reminded me of a guy I once knew, who incorrectly believed that he was clearly smarter than everyone else, and thus believed (incorrectly) that he could talk and lie his way out of any situation if he just kept smiling and talking. That generally doesn’t work too well in court — especially when you’re not actually that smart.

        In that July ruling, the court upheld most of the money Steele and Paul Hansmeier were told to pay, and scolded them for directly lying about their ability to pay. It referred to Steele’s “entire pattern of vexatious and obstructive conduct.” However, as we noted, Steele kinda sorta “won” on one point, though even that win was a loss. One of the arguments that Steele’s lawyer had made was that on the fine that the lower court gave him for contempt, the basis for that fine appeared to be under the standards for criminal contempt rather than civil contempt. Way back during oral arguments, the judges on the panel had asked Steele’s lawyer, somewhat incredulously, if he was actually asking the court to push this over to be a criminal case rather than a civil one, and Steele’s lawyer answered affirmatively.

        And so, the court notes that the contempt fine “falls on the criminal side of the line,” because “it was an unconditional fine that did not reflect actual costs caused by the attorneys’ conduct.” So it tossed out the $65,263 fine, but noted that criminal contempt charges might still be filed (out of the frying pan, into the fire). Oh, and of course, it left open the idea that the lower court might go back and actually justify civil contempt fines. And it appears that’s exactly what Judge David Herndon in the Southern District of Illinois has done. He’s ordered Steele to show cause for why he should not be fined, and then details the basis for such a fine.

      • Anti-Piracy Firm Rightcorp Continues to Lose Big Money

        Piracy monetization firm Rightscorp continues to lose money. Revenue over the most recent quarter has dropped significantly compared to last year and the company is still miles away from turning a profit. Instead of generating more money from alleged pirates, Rightscorp must set aside $200,000 to settle accused file-sharers it allegedly harassed.

      • Hold On… We May Actually Be In For A THIRD Oracle/Google API Copyright Trial

        This does not mean that there absolutely will be a third trial, but it’s at least more of a possibility than most observers thought possible. I honestly don’t see how Android on Chromebook really matters for the fair use analysis. Oracle argues that since most of the talk on the market impact was limited to phones and tablets, that may have impacted the jury, but that’s kind of laughable. The reality is that Oracle just wants another crack at a decision it disagrees with.

      • Mexican Government Officials Have Press Creds Withdrawn From Olympics Over Uploaded Cell Phone Footage

        We’ve been detailing the ridiculous lengths the IOC and other Olympics organizations go in bullying others with their super special intellectual property protections. It’s always quite stunning to watch an event supposedly about fostering international cooperation and sporting devolve into a mess of commercial protectionism, speech-stifling threats, and the kind of strong-arm tactics usually reserved for members of organized crime groups.

        But I will give these Olympic goons credit: they appear to consider their bullying a matter of principle, deciding not to go any easier on an entire group of Mexican government officials because one of them uploaded one video of one Mexican athlete to a social media account.

]]>
http://techrights.org/2016/08/20/fsfe-summit-2016/feed/ 0
Links 19/8/2016: Linux Mint With KDE, Linux Foundation’s PNDA http://techrights.org/2016/08/19/linux-mint-with-kde/ http://techrights.org/2016/08/19/linux-mint-with-kde/#comments Fri, 19 Aug 2016 10:24:47 +0000 http://techrights.org/?p=94995

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • Windows 10′s upgrade model temporarily wipes $1.6B from Microsoft’s books

      the distribution and maintenance of Windows 10 put a $1.6 billion temporary dent in its revenue, the company said Thursday.

      In a filing covering the March quarter, Microsoft pointed to the revenue deferral of Windows 10 — a relatively new way of accounting for the Redmond, Wash. company — as a reason for the 6% year-over-year decline in revenue.

      “Revenue decreased $1.2 billion or 6%, primarily due to the impact of a net revenue deferral related to Windows 10 of $1.6 billion and an unfavorable foreign currency impact of approximately $838 million or 4%,” Microsoft’s 10-Q filing with the U.S. Securities & Exchange Commission (SEC) stated.

      The $1.6 billion in Windows 10 revenue during the March quarter didn’t actually vanish: It was instead deferred and will hit the bottom line over the next two to four years.

  • Kernel Space

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • KDE Applications 16.08 Officially Released for the KDE Plasma 5.7 Desktop

        Today, August 18, 2016, KDE has had the great pleasure of announcing the availability of the final release of KDE Applications 16.08, the latest stable and most advanced software suite for the KDE Plasma 5.7 desktop environment.

      • KDE Applications 16.08 Released, Canonical Becomes A Patron
      • Canonical Becomes a Patron of KDE e.V.

        KDE and Canonical’s Ubuntu have collaborated for years. Today we celebrate the extension of this collaboration with the addition of Canonical to the KDE Patrons family, as part of the corporate membership program.

      • Canonical Is Now a Patron of KDE, as Part of the Corporate Membership Program

        Immediately after releasing KDE Applications 16.08, KDE was proud to announce that Canonical, the company behind Ubuntu, one of the world’s most popular GNU/Linux distributions, has become a patron of KDE e.V..

        KDE e.V. is the non-profit organization that represents the KDE Community and produces the modern and widely-used KDE Plasma desktop environment, along with the KDE Applications and KDE Frameworks suits of KDE software and libraries. KDE is known to have worked with Canonical’s Ubuntu for many years, and they’re happy that Canonical decided to extend this collaboration and join the KDE Patrons family, as part of the corporate membership program.

      • Plasma 5 is coming

        The KDE edition of Linux Mint 18 just passed QA and should be available as BETA this weekend.

      • Plasma Release Schedule Updated
    • GNOME Desktop/GTK

      • Confessions of a command line geek: why I don’t use GNOME but everyone else should

        Despite what tablet- and phone-loving pundits say, the laptop is here to stay. When a user wants to watch a movie on a train, they reach for the tablet first. But if they want to do actual, real work, they still prefer the laptop.

        Meanwhile, software freedom should always be for everyone, not just technical users and software developers. The GNOME project was one of the first in this history of Free Software to realize this, and seek to create a free software desktop that truly allowed everyone to enjoy the software freedom that those of us had already happily found with Bash and Emacs (or vi :) years before.

        This keynote will discuss why GNOME remains best poised to deliver software freedom to everyone, how GNOME continues to be the best welcome-mat for those who want software freedom, and why GNOME remains absolutely essential to the advancement of software freedom for decades to come.

      • GUADEC/2

        Once again, GUADEC has come and gone.

        Once again, it was impeccably organized by so many wonderful volunteers.

        Once again, I feel my batteries recharged.

        Once again, I’ve had so many productive conversations.

        Once again, I’ve had many chances to laugh.

  • Distributions

  • Devices/Embedded

    • Forget desktop Linux, build your own $40 Android PC

      I had originally planned to slap some desktop Linux on the Pine 64, but instead I’m sticking with Android. Here’s why:

      The choice of operating system, outside of political ideology, very much depends on what you are going to do on a system. I am going to use this machine as an entertainment hub, to watch movies, listen to music and do some casual gaming. I’m also going to use it for writing work, and maybe for some light image editing. That’s pretty much it. I may install this PC in my kids’ room so they can use it.

    • Open Source RTOS for IoT Gains Support from Lenovo

      To provide an open source solution that complements real-time Linux but keeps critical concerns like security and modularity top-of-mind, we created the Zephyr Project. Zephyr Project is a small, scalable, RTOS designed specifically for small-footprint IoT devices. It is also embedded with development tools and has a modular design so that developers can customize its capabilities and create IoT solutions that meet the needs of any device, regardless of architecture. This enables easier connectivity to the cloud as well as other IoT devices.

    • What I Wish I’d Known When I Was an Embedded Linux Newbie

      Here are some tips compiled from our seasoned engineers on what they wish they’d known about embedded Linux back when they were “newbs”. Newcomers and seasoned veterans alike should get some good nuggets of information and possibly a fun perspective looking back at our own humble beginnings. We’ll try not to overwhelm you as we make our way through the list. We’re not here to rewrite the books, but we do want to provide a personal perspective. If you’re in the camp of people who’ve been using desktop Linux, just be aware that embedded Linux is a different animal, especially when it comes to space constraints, different CPU architecture (ARM), resilience to sudden power outages and inability to install any mainline Linux kernel or distribution you please. Or, maybe you’re in the microprocessor camp moving toward a more generalized and capable embedded Linux system. Either way, we’ll assume you have at least some knowledge of Linux as we walk through this guide.

    • Open source, DAQ-enabled hacking platform feels its inner Arduino

      Agilo’s open source, Arduino Mega compatible “Evive” IoT prototyping and DAQ platform offers a 1.8-inch display, breadboard, analog controls, and more.

      Agilo Technologies, a startup formed by students at the Indian Institute of Technology Kanpur (IIT Kanpur), is pitching its flagship Evive prototyping product on Indiegogo. The company has achieved only 39 percent of its $30,000 flexible funding goal, with less than a week remaining, but it is committed to manufacturing the product and fulfilling orders. The company has already lined up other funding, as well as manufacturing and component suppliers, according to an email from CEO and co-founder Dhrupal R Shah.

    • Open source COM and carriers become 3D-printable computers

      Rhombus Tech’s Allwinner A20 based, “fully libre” EOMA68 COM and carrier boards can be installed in 3D printed mini-PC or laptop cases.

      For the past five years, UK-based Rhombus Tech, led by developer Luke Kenneth Casson Leighton, has been developing a fully open source, removable computer-on-module (COM) in a standardized format known as “EOMA68.” Rhombus has now gone to CrowdSupply to help fund an “EOMA68-A20” module based on Allwinner’s A20 SoC, as well as a mini-PC and a 15.6-inch laptop built around the COM.

    • The top 10 IoT application areas – based on real IoT projects

      As part of a larger effort to track the IoT ecosystem, we set out, mining hundreds of homepages, and managed to assemble and verify 640 actual enterprise IoT projects (Note: We did not include any consumer IoT projects such as wearable devices or hobby projects).

    • This tiny $5 computer is giving the Raspberry Pi a run for its money

      When it comes simple homebrew computers, the Raspberry Pi has been king of the mountain for a long time. The ruler might have some new competition, however, if the wild Kickstarter success of Onion’s Omega2 is any indication.

    • Phones

      • Android

        • Why Google is building a new operating system

          Google is building a new operating system because it wants to move away from Android, a system that, while enabling it to gain market leadership, has given it a fair share of legal and other headaches over the eight years since it first arrived in the market.

        • Oracle says trial wasn’t fair, it should have known about Google Play for Chrome

          Oracle lawyers argued in federal court today that their copyright trial loss against Google should be thrown out because they were denied key evidence in discovery.

          Oracle attorney Annette Hurst said that the launch of Google Play on Chrome OS, which happened in the middle of the trial, showed that Google was trying to break into the market for Java SE on desktops. In her view, that move dramatically changes the amount of market harm that Oracle experienced, and the evidence should have been shared with the jury.

          “This is a game-changer,” Hurst told US District Judge William Alsup, who oversaw the trial. “The whole foundation for their case is gone. [Android] isn’t ‘transformative’; it’s on desktops and laptops.”

          Google argued that its use of Java APIs was “fair use” for several reasons, including the fact that Android, which was built for smartphones, didn’t compete with Java SE, which is used on desktops and laptops. During the post-trial hearing today, Hurst argued that it’s clear that Google intends to use Android smartphones as a “leading wedge” and has plans to “suck in the entire Java SE market.”

        • Google’s Russian Android Antitrust Appeal Just Failed
        • Gartner: Android’s smartphone marketshare hit 86.2% in Q2

          What growth there is left in the smartphone market continues to center on emerging markets where consumers are upgrading from feature phones.

          And that ongoing transition is helping boost Android’s global marketshare, which Gartner pegs at 86.2 per cent in Q2 in its latest mobile market figures.

          But the analyst says Android is not just winning buyers at the mid- to lower-end smartphone segments in emerging markets — with sales of premium smartphones powered by Android up 6.5 per cent in Q2 too.

        • Honor 8 is a high-end Android phone at a mid-range price

          Chinese device maker Huawei unveiled the new Honor 8 smartphone Monday evening during a lavish press event at the California Academy of Sciences in San Francisco’s Golden Gate Park. The Honor 8 is a good-looking, 5.2-inch Android smartphone aimed at the photography-loving millennial modern marketers droll over. Both sides are made of glass, surrounded by a metal bezel. And the screen takes up almost the entire front of the device, so it offers a lot of real estate.

Free Software/Open Source

Leftovers

  • Health/Nutrition

    • The Navajo, the EPA, and the Accident That Turned a River Orange

      Leaders with the Navajo Nation said they will file a lawsuit against the Environmental Protection Agency for its role in a large mine spill in 2015, which contaminated a major river with 3 million gallons of toxic acid and metals.

      The Navajo Nation joins the state of New Mexico, which filed a suit against the EPA for allegedly causing the spill, known as the Gold King Mine Spill, and against the state of Colorado for not doing more to prevent it. The spill is still under criminal investigation, but a federal report released in April found the EPA at fault. The agency had drilled in the area to install drainage pipes below the Gold King Mine because small amounts of toxic water were flowing into the Animas River.

      In August 2015, while workers contracted by the EPA tried to drain some of the toxic water, a massive blowout sent a mix of arsenic, zinc, lead, and mercury into the river, which turned the waters orange and flowed downstream, depositing more than 888,000 pounds of toxic metals in the water.

    • The Queen and David Attenborough urged to cut ties with charity linked to Finland mining plans

      Environmentalists and indigenous reindeer herders are calling on the Queen, Sir David Attenborough and Stephen Fry to disassociate themselves from a charity contracted to help a mining operation in a national park in Finland.

      Fauna and Flora International (FFI), whose patron is the Queen, has been hired by the British-listed mining company Anglo American to assess the environmental value of Viiankiaapa, a stunning 65 sq km (25 sq mile) habitat for 21 endangered bird species in the Arctic circle.

      The research includes an assessment of whether equivalent land could be offered as “compensation” for wetlands damaged by the extraction of massive deposits of platinum, nickel, copper and gold.

      But Jukka Kaaretkoski, a reindeer herder of Sami ancestry from nearby Kersilö, told the Guardian that the drilling would take a heavy environmental toll and be a “terminal” blow for local herders whose animals graze there.

      “Mines cause traffic, noise, grit, pollution and contamination of water supplies,” he said. “Many young reindeer herders are in danger of losing their future livelihoods because of it. We cannot even plan for the future because of the fear and insecurity. ”

      Riikka Karppinen, a Green party councillor in the local Sodankylä municipality, added: “I think this is colonialism, because the big mining company has come here from another country and we are in too weak a position to protect our homeland.”

      About 90 bird species live in Viiankiaapa – including pygmy owls to broad-billed sandpipers – many nesting amid the bogs and moors that host a variety of endangered plant species.

    • As promised, Aetna is pulling out of Obamacare after DOJ blocked its merger

      Aetna announced Monday that due to grave financial losses, it will dramatically slash its participation in public insurance marketplaces set up by the Affordable Care Act. In 2017, Aetna will only offer insurance policies in 242 counties scattered across four states—that’s a nearly 70-percent decrease from its 2016 offerings in 778 counties across 15 states.

      The deep cuts have largely been seen as a blow to the sustainability of the healthcare law, which has seen other big insurers also pull out, namely UnitedHealth group and Humana. But the explanation that Aetna was forced to scale back due to heavy profit cuts doesn’t square with previous statements by the company.

      In April, Mark Bertolini, the chairman and chief executive of Aetna, told investors that the insurance giant anticipated losses and could weather them, even calling participation in the marketplaces during the rocky first years “a good investment.” And in a July 5 letter (PDF) to the Department of Justice, obtained by the Huffington Post by a Freedom of Information Act request, Bertolini explicitly threatened that Aetna would back out of the marketplace if the department tried to block its planned $37 billion merger with Humana.

      “Specifically, if the DOJ sues to enjoin the transaction, we will immediately take action to reduce our 2017 exchange footprint …. [I]nstead of expanding to 20 states next year, we would reduce our presence to no more than 10 states…” Bertolini wrote.

    • Congress must move beyond partisan politics and act on Zika

      For the past few months I’ve observed with great concern the slow progression of a devastating pandemic. I had hoped that the whole nation would focus its attention on the health crisis as well, but it’s been a distracting year so far. The Zika virus has slowly closed in on American shores. The Center for Disease Control announced that as of last week, 7,350 cases have been reported in the United States and on Puerto Rico.

      I first paid attention to this crisis because of a December 2015 New York Times article about how women were delivering babies in Brazil with microcephaly due to the virus. I approached it analytically – I presumed it was the result of the impact of climate change on the transmission of viruses. Then, when the Zika virus made landfall in Puerto Rico, where I grew up, I became more concerned because of the terrible financial crisis the island was suffering. As it reached stateside and blew through Miami, where I went to graduate school, my concerns have become ever more personal, especially because we are going through a particularly hot and humid summer.

  • Security

    • The pros and cons of open source cyber security

      Open source brings many advantages to enterprises, such as pricing. However, in increasingly security-conscious enterprises it can be unclear how open source software does on cyber security.

      CBR looks at some of the major security pros and cons.

    • CVE-2016-5696 and its effects on Tor

      This vulnerability is quite serious, but it doesn’t affect the Tor network any more than it affects the rest of the internet. In particular, the Tor-specific attacks mentioned in the paper will not work as described.

    • Secure Boot Failure, Response, and Mitigation

      Last week, it became public that there is an attack against Secure Boot, utilizing one of Microsoft’s utilities to install a set of security policies which effectively disables bootloader verification.

    • Static Code Analyzer Reportedly Finds 10,000 Open Source Bugs

      A Russian company behind the PVS-Studio static code analyzer claims to have used the tool to discover more than 10,000 bugs in various open source projects, including well-known offerings such as the Firefox Web browser and the Linux kernel.

    • Linux.Lady the Crypto-Currency Mining Trojan Discovered

      Organizations reliant on Redis NoSQL a most sought after database require re-checking their configurations, security researchers advise. That’s because the Linux.Lady crypto-currency Trojan, which mines digital money, has been discovered as it piggybacks on insufficient out-of-the-box security.

      It is possible that a maximum of 30K Redis servers are susceptible to attack mainly since inadvertent system admins gave them an Internet connection devoid of constructing a password for them in addition to not having Redis secured by default.

    • DDoS protection in the cloud

      OpenFlow and other software-defined networking controllers can discover and combat DDoS attacks, even from within your own network.

      Attacks based on the distributed denial of service (DDoS) model are, unfortunately, common practice, often used to extort protection money or sweep unwanted services off the web. Currently, such attacks can reach bandwidths of 300GBps or more. Admins usually defend themselves by securing the external borders of their own networks and listening for unusual traffic signatures on the gateways, but sometimes they fight attacks even farther outside the network – on the Internet provider’s site – by diverting or blocking the attack before it overloads the line and paralyzes the victim’s services.

      In the case of cloud solutions and traditional hosting providers, the attackers and their victims often reside on the same network. Thanks to virtualization, they could even share the same computer core. In this article, I show you how to identify such scenarios and fight them off with software-defined networking (SDN) technologies.

  • Defence/Aggression

    • Republicans, Democrats alike still level threats at Iran

      The 2015 Iran nuclear deal should have curbed the longstanding bellicose rhetoric coming from Republican and Democratic political leaders toward the Muslim country. Signed by Iran and six other nations (including the United States) and ratified by the United Nations Security Council, the comprehensive agreement contains strict provisions limiting Iran’s nuclear capabilities to well below the threshold necessary to develop atomic weapons and subjects Iran to the most rigorous inspection regime in history. The result has been dramatically reduced regional tensions and the elimination of any potential threat to U.S. national security.

      Despite this, the Republican and Democratic platforms adopted at their respective conventions last month are both more belligerent toward Iran than they were four years ago.

      The Republican platform claims that the U.N.-sponsored and -endorsed treaty was nothing more than “a personal agreement between the President and his negotiating partners and non-binding on the next president.” Despite making it technologically impossible to weaponize Iran’s fissionable material, the platform instead claims that the agreement has somehow enabled Iran to continue to “develop a nuclear weapon.”

  • Transparency/Investigative Reporting

    • Is Julian Assange Finally on the Path to Freedom?

      For the last four years Julian Assange has been trapped in an embassy surrounded by police. The New York Times Editorial Board yesterday called for focus on “the serious legal, ethical and security issues” at stake in the case against Assange. We agree.

      Like the underground author that gives Philip K. Dick’s The Man in the High Castle its name, Assange is a writer who disseminates work providing critical insight into readers’ political reality and their collective history. Powerful actors go to great efforts to silence him.

  • Environment/Energy/Wildlife/Nature

    • The Looming Extinction of Humankind, Explained

      For most people, driving with a seat belt tightly strapped around their bodies is a smart habit. Not only is racing down the highway without it illegal—“click it or ticket,” as the slogan goes—but seat belts also “reduce serious crash-related injuries and deaths by about half.” Yet as we’ve previously estimated, your chances of dying in a car crash are at least 9.5 times lower than dying in a human extinction event.

      If this sounds incredible—and admittedly, it does—it’s because the human mind is susceptible to cognitive biases that distort our understanding of reality. Consider the fact that you’re more likely to be killed by a meteorite than a lightning bolt, and your chances of being struck by lightning are about four times greater than dying in a terrorist attack. In other words, you should be more worried about meteorites than the Islamic State or al-Qaeda (at least for now).

      The calculation above is based on an assumption made by the influential “Stern Review on the Economics of Climate Change,” a report prepared for the UK government that describes climate change as “the greatest and widest-ranging market failure ever seen.” In making its case that climate change should be a top priority, the Stern Review stipulates a 0.1 percent annual probability of human extinction.

    • Why Voters Should Be Concerned About Clinton’s Environmental Promises

      Last week, Hillary Clinton issued her plan for economic reform in a speech aimed at swinging working class voters and discrediting Donald Trump’s bombastic promises to lead an “energy revolution.”

      Speaking at Warren, Michigan’s Futuramic Tool & Engineering factory, Clinton painted a different picture of America’s economic engine—instead of evoking a decaying coal industry, the Democratic presidential hopeful propped her platform on the enduring growth of engineering and technology.

      “Some country is going to be the clean energy superpower of the 21st century and create millions of jobs and businesses. It’s probably going to be either China, Germany, or America. I want it to be us! We invent the technology, we should make it and use it and export it, which will help to grow our economy.”

      Clinton’s vows to bolster clean energy can be taken as a panacea to Trump’s fossil fuel fanaticism, but how many of her environmental affirmations are verified by her own political record? When it comes to issues like climate change and renewable energy, Clinton has trumpeted her dedication to support and enact new legislation. But other parts of her legacy, such as her relationship to fracking and the oil lobby, are decidedly less partisan.

    • Zephyr Teachout Challenges Billionaire Right-Wing Donors to Debate

      New York congressional candidate Zephyr Teachout is throwing down the gauntlet to right-wing money men who want to buy elections in secret.

      Teachout, who won the Democratic primary for New York’s 19th district in June, this week challenged hedge fund billionaires Paul Singer and Robert Mercer to a debate in light of their contributions to a super PAC that supports her Republican opponent, John Faso.

      “The voters deserve to hear directly from the billionaires backing John Faso about what they expect to get from him in Congress,” Teachout said. “When someone writes a $500,000 check they don’t do it out of the goodness of their heart. These are people probably trying to buy power, and voters should know who they are and what they stand for.”

      “I’m challenging Paul Singer and Robert Mercer to put your mouth where your money is and debate me directly, not through your mouthpiece,” Teachout said.

    • Are We Feeling Collective Grief Over Climate Change?

      In 1977, I was in middle school in Michigan, and a science teacher shared a tidbit off-curriculum. Some scientists had postulated that as a result of “pollution,” heat-trapping gasses might one day lead to a warming planet. Dubbed “the greenhouse effect,” the image was clear in my 12-year old mind: people enclosed in a glass structure, heating up like tomatoes coaxed to ripen. It was an interesting concept, but something in the very, very distant future.

    • Clashes Halt Work on North Dakota Pipeline

      Work on a 1,154-mile pipeline that would carry oil from North Dakota to Illinois was halted this week near the Missouri River, amid growing confrontations between members of the Standing Rock Sioux tribe and police guarding a construction site.

    • BP oil spill in Great Australian Bight would be catastrophic, modelling shows

      An oil spill from BP’s planned drilling in the Great Australian Bight could affect most of Australia’s southern coastline, shutting down fisheries and threatening wildlife including whales, seabirds and sea lions, new modelling has shown.

  • Finance

    • Uber: “We’ll support drivers” [Ed: Uber is very harmful]

      The head of Uber Finland says the company will support its drivers who run afoul of the law. Uber drivers in Helsinki now potentially face criminal charges if police catch them working for the smartphone-based chauffeur service.

    • Brexit latest: Airports start exchanging less than one Euro for each Pound Sterling

      Certain London airport bureaux de change are now returning less than €1 for each pound offered, underlining how the slide in the value of the sterling since the 23 June Brexit referedum vote is already hitting holidaymakers in the pocket.

      MoneyCorp at Stansted this week offered a rate of €0.9915 and ICE at Luton offered €0.990, according to Caxton FX.

    • Victory For Domestic Workers in Illinois

      The law, which is the result of a five-year campaign by the Illinois Domestic Workers’ Coalition, guarantees nannies, housecleaners, homecare workers and other domestic workers a minimum wage, protection from discrimination and sexual harassment, and one day of rest for every seven days for workers employed by one employer for at least 20 hours a week.

      New York became the first state to pass such a bill in 2010. Since then Massachusetts, California, Oregon, Hawaii and Connecticut have followed suit. Illinois now becomes the seventh state to make basic workplace protections for domestic workers a matter of law. The new law amends four existing laws to include domestic workers.

      [...]

      Now, domestic workers in Illinois will no longer have to face the conditions Melendez faced. They will have a way to fight back, and the state will stand with them. It’s a level of basic protection that domestic workers nationwide should have.

    • New Jersey Legislators Move to Reform Aggressive Student Loan Program

      New Jersey lawmakers have announced a series of measures addressing student debt issues this week, including one bill aimed at reforming the state’s controversial student loan program.

      The measure would require the state agency that administers the loan program to offer income-driven repayment for its struggling borrowers, bringing the loans closer in line with the federal government’s loan program.

      Last month, ProPublica and the New York Times published an investigation into the program, which found that its loans come with onerous terms that can easily lead borrowers to financial ruin.

      Repayment of the state’s loans cannot be based on income and borrowers who face unemployment or economic hardships are given few reprieves. One mother, who co-signed her son’s loans, is still paying off his debt even though he was murdered in January 2015.

    • PayPal Stops A Payment Just Because The Payee’s Memo Included The Word ‘Cuba’

      Earlier this year, we discussed how a Treasury Department watchlist under the purview of the Office of Foreign Assets Control was mucking up all kinds of legitimate business because some partakers in said business had scary sounding (read: Islamic) names. Everyone began referring to this watchlist as a “terrorist watchlist”, as most of the stories concerned people, including American citizens, who either have names that are close to the names of terrorist suspects worldwide or because certain banks can’t tell when someone is writing the name of their dog in the memo section, mistaking that name for the name of an Islamic terror group, because why not?

      But as it turns out, this hilariously frustrating example of bureaucratic ineptitude isn’t limited to global terrorism. It also apparently applies to decades old embargo rivalries, too. Mark Frauenfelder details a wonderful story about how his wife, a book editor, used PayPal to pay for a book review about Cuba, only to have the payment suspended and the notices from PayPal begin to fly.

    • With Republicans Backing Away From TPP, Does It Still Have Any Chance?

      We’ve pointed out before how topsy turvy things have become with the Trans Pacific Partnership (TPP) agreement lately, and it seems to be getting even more weird, but not for any good reason. As we’ve pointed out dozens of times now, actual free trade is a good thing for the world — but the TPP agreement has very, very little to do with free trade. There are certainly some good things in the TPP when it comes to trade, including some stuff on helping protect the free flow of information on the internet, but it is significantly outweighed by numerous problems with the agreement that seem to have little to do with actual free trade and plenty to do with certain industries putting in place protectionist/mercantilist programs that are, in many ways, the opposite of free trade. The two areas that we’ve discussed at great length are the intellectual property section, which will force countries to ratchet up their laws (which runs against free trade) and the problematic corporate sovereignty provisions, that allow foreign companies to effectively block regulations that may make perfect sense for certain countries.

      Historically, the way political support for trade deals in the US works breaks down as follows: Republicans support the deals strongly, with a simplistic mantra of “free trade is good, any free trade agreement must be good.” They don’t care much about the details (other than if a big company in their region wants some protectionist nugget in the agreement). Meanwhile, the majority of Democrats oppose the agreements, but again, often for simplistic and protectionist reasons. But, there are always a few “moderate” Democrats (i.e., Democrats who recognize free trade is actually a good thing overall) who support free trade and that’s enough to get the deals passed. That’s mostly how the TPP situation played out for the past few years.

      Then the insanity of the 2016 Presidential election hit and everything went sideways.

      On the Republican side, you’ve got Donald Trump, who is opposed to the TPP, but mainly because he doesn’t understand international trade at all, and ridiculously seems to believe that everything is a zero sum game, and any trade agreement that helps other countries means we’re “losing.” The TPP is bad, but not for the reasons Trump thinks. And then you have Hillary Clinton, who had always been in the Democratic clump that supported free trade agreements, and who has always supported the TPP, despite now pretending not to. That’s because Bernie Sanders was very much against it (also for mostly the wrong reasons!) and feeling pressure from the success of his campaign, she felt the need to come out against the TPP to avoid losing to Bernie.

  • AstroTurf/Lobbying/Politics

    • Jill Stein: I will have trouble sleeping at night if either Trump or Clinton is elected

      Green Party presidential nominee Jill Stein said Wednesday she doesn’t believe either mainstream candidate is fit for the White House, brushing aside criticism that her bid could help elect Donald Trump.

      “I will have trouble sleeping at night if Donald Trump is elected. I will also have trouble sleeping at night if Hillary Clinton is elected. And as despicable as Donald Trump’s words are, I find Hillary Clinton’s actions and track record is very troubling,” said Stein, sitting alongside her running mate Ajamu Baraka at CNN’s Green Party town hall event.

      The third-party candidate blasted the logic that voters should discount her candidacy, and citing her opposition to money in politics, Stein said that her party stood alone on the national scene totally independent of corporate influence.

    • Trump Presents Menacing Prospect, But We Cannot Forget What’s Already Happening

      Stories like those Farea encountered in his attempts to provide a voice to the victims of America’s drone operations have continued to emerge. In February of 2015, Mohammed Tuaiman, a 13-year-old Yemeni, was killed in a drone strike — the same way his father and teenage brother were killed years earlier.

    • How a Question’s Phrasing Hobbles Third Parties

      By asking Americans who they expect to vote for rather than who they want to be President, pollsters skew the numbers in favor of major-party candidates and help exclude third-party challengers from crucial debates, notes Sam Husseini.

    • Make America Russian Again (Video)

      Animator Mark Fiore offers his take on Republican presidential candidate Donald Trump’s ties to Russia and Vladimir Putin in his latest clip. Watch the animation and read Fiore’s thoughts on the subject below.

    • Trump says he’ll be known as ‘Mr Brexit’ despite poor poll showing – politics live
    • As Clinton woos Republicans, Sanders’ faithfuls fear they will be forgotten

      On a quiet, tree-lined street in this town with a population of just over 1,000, a lone yard sign bearing the name of Bernie Sanders serves as a faint reminder of the Vermont senator’s grassroots movement.

      It is the home of Missey Bower, a special education professional, who cast her vote for Sanders in the Pennsylvania Democratic primary and helped the senator carry the working-class Wyoming County in which her modest, one-storey home sits across from a public library.

      But it was Hillary Clinton who claimed victory in the state and ultimately the contest for the Democratic party’s presidential nomination. And Bower is precisely the kind of voter Clinton must still persuade in her favor with 81 days remaining until election day.

    • Trump has made it clear exactly who should be barred from the US: himself

      In his major policy speech on foreign policy delivered yesterday in the battleground state of Ohio, Republican presidential candidate Donald Trump finally made it clear who exactly should be barred from the United States: himself.

      The candidate plainly stated that “those who do not believe in our constitution, or who support bigotry and hatred, will not be admitted for immigration into the country”. Since Trump, who is known to have expressed bigoted and hateful opinions about Mexicans and Muslims, and who has repeatedly demonstrated a tenuous grasp of the constitution, already resides in the United States, I assume he will opt for Mitt Romney-style self-deportation.

    • For real progressives, Jill Stein is now the only choice

      The stakes of Wednesday night’s CNN Green party town hall were high – third-party candidates are rarely allowed entry into the corporate media universe, which thrives on the false narrative that only two parties exist here in the United States.

      This was perhaps the only opportunity the presidential candidate I have endorsed – Jill Stein – and her running mate, Ajamu Baraka, to have the ear of a large portion of the mainstream American electorate. There was little room for error.

      They spent little time directly criticizing Donald Trump. This was a wise move, since virtually no one among Stein’s potential base of support is considering Trump as a viable option. Instead, she focused on Hillary Clinton.

      At a moment where the Clinton campaign is still attempting to secure the support of frustrated Bernie Sanders primary voters, Stein demonstrated that Clinton’s brand of liberalism does not represent the tone or spirit of the Sanders campaign. By highlighting Clinton’s pro-corporate politics and active role in hawkish foreign policy, Stein raised considerable doubt about Clinton’s leftist bona fides.

    • Class Action Lawsuit Against Debbie Wasserman Schultz Moves Forward

      In June, the hacker Guccifer 2.0 released internal Democratic National Committee (DNC) documents proving the DNC treated Hillary Clinton as their nominee before the primaries even began. Not long after these revelations came to light, the law firm Beck & Lee filed a class action lawsuit against now-former DNC chair Debbie Wasserman Schultz and the DNC on behalf of Bernie Sanders supporters.

      The suit includes six claims: fraud, negligent misrepresentation, deceptive conduct, monetary restitution for donors of Sanders, the DNC breaking its own fiduciary duties, and negligence for failing to protect sensitive donor information that was hacked. Beck & Lee noted the lawsuit was a way to give a voice to Sanders supporters who were silenced by the rigging of the primaries for Clinton. Attorneys Jared Beck, a Harvard Law graduate, and Elizabeth Beck, a Yale Law School graduate, have previously filed successful lawsuits against Yelp, Unilever, Korea Airlines, and fraudulent real estate investors.

      The July WikiLeaks release provided further evidence that the DNC actively worked against Sanders, yet the Vermont senator’s supporters have received no recompense. The damage control used to divert from the content of these emails portrayed criticism of Clinton as a Russian conspiracy. While the mainstream media has devolved into an apparatus to funnel messaging and talking points directly from the DNC and Clinton campaign, the litigation for this class action lawsuit has been moving forward.

    • Anarchist group installs nude Donald Trump statues in US cities

      A nude statue of Republican presidential nominee Donald Trump without testicles was taken down on Thursday after causing quite the stir in New York’s Union Square.

      The anarchist group INDECLINE erected the statue, titled The Emperor Has No Balls, overnight Thursday.

    • The Green Party Ticket: Obama Murdered Citizens And Terror Suspects ‘From The Sky’

      Thursday on “The Alan Colmes Show,” Alan sat down with both 2016 Green Party candidates for president and vice president, Dr. Jill Stein and Ajamu Baraka, about their chances to defeat the two major party candidates, as well as a challenge from Gov. Gary Johnson and Gov. Bill Weld on the Libertarian Party ticket. Dr. Stein and Ajamu also told Alan why voters shouldn’t trust Hillary Clinton, why they think the Green Party will be left out of the debates, and why they think President Obama has failed at foreign policy:

      COLMES: Where do you differ from the Democratic Party? DR. STEIN: We overlap a lot in terms of what Hillary says, but it’s what Hillary does is the question. Hillary’s track record is for favoring the banks and hurting everyday people like destroying the social safety net, the aid to families with dependent children, Hillary Clinton led the charge, they led the charge for NAFTA which sent our jobs overseas, the led the charge for Wall Street deregulation that led the way to the meltdown of nine million jobs and five million homes.

    • Meet Ajamu Baraka: Green VP Candidate Aims to Continue the Legacy of W.E.B. Du Bois & Malcolm X

      The Green Party’s vice-presidential nominee Ajamu Baraka is a longtime human rights activist. He is the founding executive director of the U.S. Human Rights Network and coordinator of the U.S.-based Black Left Unity Network’s Committee on International Affairs. For years, Baraka has led efforts by the U.S. Human Rights Network to challenge police brutality and racism in the United States by bringing these issues to the United Nations.

  • Censorship/Free Speech

    • When algorithms become politics

      Are Facebook, Google, and Twitter politically biased? The jury seems to be out on that one. But one thing is clear – Facebooks algorithms do have political consequences.

      It’s very simple: If enough people flag a Facebook post as offensive, it will automatically disappear. If this happens frequently, a user or a group can be banned from the platform – sometimes forever.

    • Peter Thiel’s Self-Serving New York Times Column

      Peter Thiel has no regrets about pouring millions of dollars of his own money into the legal fight that bankrupted Gawker Media. “I am proud to have contributed financial support,” Thiel wrote in The New York Times on Monday, “… and I would gladly support someone else in the same position.”

      Thiel says he spent about $10 million to help Terry Bollea—the wrestler better known as Hulk Hogan—sue Gawker for having published, without his consent, a video that showed him having sex with his then-friend’s wife. Hogan ultimately won his case. Gawker, facing a $140 million judgment, filed for bankruptcy.

      Many have noted that there are few characters to root for in this saga. Gawker’s decision to publish the Hogan tape is questionable at best, regardless of whether you consider Hogan to be a public figure. The media company is known for its brashness, and has made several widely-condemned editorial decisions in its 14-year history. Thiel references these in his column for the Times, and it’s hard to argue that some of what Gawker has done—like outing Thiel, who is gay—is anything but despicable. But Thiel’s involvement in the Gawker fight is about much, much more than a personal vendetta. (Perhaps I should note here that I wrote a regular column about internet hoaxes for Gawker in 2014, and that the editors I worked with were consistently sensitive, smart, and receptive to even minor concerns about tone and fairness.)

    • In Malaysia, Humor Is No Laughing Matter

      His office has been raided, his employees arrested and his books banned. His last publisher worked at night, unwilling to take a sample of his previous work, lest it be discovered. Yet political cartoonist Zulkiflee Anwar Ulhaque, known to most as Zunar, refuses to put down his pens, providing cartoon commentary on the Malaysian government.

      Zunar has been charged with nine counts of Malaysia’s Sedition Act for social media posts criticizing the Federal Court’s decision to uphold the sodomy conviction of Anwar Ibrahim, the ruling party’s main political rival. Yet, despite facing a possible 43 years of jail time, the award-winning cartoonist continues to encourage what he says is the safest and most-powerful form of protest: laughter. “There’s no law to stop you from laughing,” points out the cartoonist during an interview in his office in the Malaysian capital.

      The cover of his latest book portrays Prime Minister Najib Razak as a swashbuckling pirate. The prime minister is shown wielding a bag of 2.6 billion Malaysian ringgit, representing the $731 million the U.S. Justice Department alleges he received illicitly from the public investment fund he oversees.

    • Thought police

      Here is the full interview I did recently for RT about the announcement of a new section of the UK Metropolitan Police dedicated to hunting down “internet trolls”.

    • ‘Censorship’ and editing

      And so, just to get it on the record, let us state categorically that the Compass never will refuse to publish a reader’s submission simply because it does not accord with our own views. As we say in the newspaper business, “Period. Full stop.”

    • Steven Tyler Responds to Disney Ride Censorship

      Less than a day after word got out that a hand gesture made by Steven Tyler had been digitally removed from a ride at Walt Disney World, the Aerosmith singer has responded. Today, he posted two answers to the theme park on social media.

      “Well now I am in ‘shock,’ he wrote on Facebook, while wearing an NSFW hat. “You know I would own up to this doozie. Way to give me the finger now Walt Disney World…17 years later…See you next week…Here’s to the greatest ride at Disney.”

    • Remains of the Day: Twitter’s New Filter Aims to Remove Trolls From Your Notifications
    • Twitter Suspends Hundreds Of Thousands Of Terrorist Accounts, Gives Everyone Its ‘Quality Filter’

      As for the removal of terrorist accounts, this still feels kind of pointless. Twitter talks about how it’s getting faster at removing these accounts, and they’re not able to build up many followers before they’re shut down again, making Twitter a less useful platform for terrorist or terrorist supporters to use. But, again, if we think about Twitter as a protocol like email or a system like the telephone, this feels… weird. No one’s clamoring for “we must stop ISIS from making phone calls.” Besides, the intelligence community has said, repeatedly, that they get good intel from watching ISIS’ social media activity. Shutting down their accounts may seem like a good thing (no one wants ISIS using their technology…), but what if it’s actually making it more difficult for the intelligence community to track them?

    • Instagram Bans Gun Company after Owner Criticizes Facebook

      When Facebook came under fire last week for banning various pro-Second Amendment pages without explanation, it appears the social-media giant may have sought retribution.

      Last week, the owner of a firearms-parts company called “Tactical Sh*t” logged onto Facebook to discover his company’s page had been taken down without explanation. After he spoke with others in the gun industry, T. J. Kirgin discovered that multiple other pro-Second Amendment pages had also been mysteriously banned.

      Immediately, Kirgin spoke out against what he alleged to be Facebook’s censorship, and, within 36 hours, his company’s page was restored. Since that time, Kirgin has continued to make media appearances telling his side of the story. But now, he believes that decision has cost him. As soon as he came off the air yesterday, Instagram, which is owned by Facebook, banned Tactical Sh*t, taking away a stream that accounts for 20 percent of Kirgin’s total revenue.

    • St. Charles gear, gun parts store riled by Instagram takedown
    • Sensitivity is bordering on censorship

      On Monday, Ellen DeGeneres, a comedian and television show host, posted a doctored photo on social media of her riding on the back of the fastest man on earth, Usain Bolt.

      “This is how I’m running errands now”, the message, posted on Twitter by DeGeneres, stated.

      While many found this funny, some immediately called her racist and responded to her Tweet with vows that they would boycott her show. Really? Obviously I’m not a black man, and I’m quite aware of our nation’s terrible history in terms of slavery and the atrocities committed against black people, but at some point, we have to move beyond past mistakes and quit looking for excuses to stereotype each other.

    • U.S. slams crackdown, arrests of activists in Azerbaijan
    • Azerbaijan: Renewed human rights crackdown ahead of referendum
    • Indian Censorship Will Be Dead In 100 Days
    • Top 10 instances of video game censorship
    • Amos Yee’s case sent back for trial to continue
    • Teenage blogger Amos Yee back on trial on eight charges
    • Accused teen blogger Amos Yee wants more time to prepare questions for own defence
    • Youth who restrained teen blogger charged
    • Youth charged with using criminal force on Amos Yee at Jurong Point
    • Man charged with using criminal force on Amos Yee at Jurong Point
  • Privacy/Surveillance

    • Canadian Law Enforcement Admit — And Then Deny — They Own A Stingray Device

      Combined with the previous statement, it appears as though Edmonton PD superintendent Terry Rocchio is apologizing for his own words, which certainly gives the appearance of being misinformation. Further statements released by the Edmonton PD claim the department does not own a Stingray but, again, this is at odds with the unexpectedly straightforward statement given to Motherboard in response to its original query.

      Now, it could be that Edmonton law enforcement did the same thing Vancouver’s did and borrowed it from the nearest RCMP bug shop. Or it could be that this is just the Canadian version of playing along with non-disclosure agreements. Most agencies contacted by Motherboard refused to comment. Others refused to confirm or deny. And the one agency that DID say it had a Stingray now says it doesn’t.

      Given the opacity surrounding local law enforcement use/ownership of these devices, it’s probably safe to say they’ve been deployed without warrants and hidden from judges, defendants, and — quite possibly — local legislators. Months or years from now, Motherboard may have a more complete answer, but for now, this appears to be Canadian law enforcement scrambling to stave off some inevitable discoveries.

    • Think Tank Argues That Giving Up Privacy Is Good For The Poor

      With ISPs like AT&T now charging broadband customers a steep premium just to protect their own privacy, the FCC has begun looking at some relatively basic new privacy protections for broadband. This has, as you might expect, resulted in a notable bump in histrionics from the industry. Comcast, for example, quickly tried to inform the FCC that charging users a surcharge for privacy was ok because it would somehow magically lower broadband prices, and banning them from this kind of behavior would do a tremendous disservice to the internet at large.

      Anybody even marginally aware of the lack of competition in broadband understands this is just another attempt to take advantage of captive customers in a broken market. But the broadband industry quickly doubled down, using the usual assortment of payrolled think tanks to pollute the discourse pool. The Information Technology & Innovation Foundation (ITIF), for example, was quick to try and claim that charging all broadband users steep premiums for privacy would generate huge benefits for the entire “internet ecosystem,” and that anybody who couldn’t see the genius of such a practice was an “absolutist.”

    • After the NSA hack: Cybersecurity in an even more vulnerable world

      It is looking increasingly likely that computer hackers have in fact successfully attacked what had been the pinnacle of cybersecurity – the U.S. National Security Agency (NSA). A few days ago, reports began emerging of claims by a hacking group called the Shadow Brokers that it had breached the network of, and accessed critical digital content from, computers used by the Equation Group. This attracted more than the usual amount of attention because the Equation Group is widely believed to be a spying element of the NSA.

    • Here’s why the NSA won’t release a ‘smoking gun’ implicating Russia in these major hacks

      Was Russia behind the massive hack of the Democratic National Committee, or the latest breach of what appears to be the NSA’s elite hacking unit?

      That’s quite possible, but the US National Security Agency is probably not going confirm that — even as former employees proclaim that it can do so, and top US officials say that there is “little doubt” Moscow is involved.

      Former NSA contractor Edward Snowden said on Twitter that “evidence that could publicly attribute responsibility for the DNC hack certainly exists at NSA” with a tool known as XKeyscore, which he previously described as a “one stop shop” for information it collects.

    • Edward Snowden: Russia probably behind NSA leak

      The whistleblower Edward Snowden believes Russia is behind a leak of malware allegedly belonging to the US National Security Agency (NSA).

      Hackers calling themselves Shadow Brokers started an auction for the malware last week.

      The security firm Kaspersky said it believed the original files were from Equation Group, which is thought to be linked to the NSA.

      A former NSA worker Dave Aitel pointed the finger at Russian involvement.

      He said it was likely to be a diplomatic strategy, related to the blame being placed on Russia for a recently revealed hack of computers belonging to the Democratic party in the US.

    • Snowden the movie: a reporter watches the NSA super-leak come back to life

      Oliver Stone looks overwhelmed. It is May 2015, and we are in Munich on the penultimate day of shooting his drama about Edward Snowden. At lunch, the director seems anxious and weary, eyes heavy, shoulders stooped, energy sapped. When the idea of Snowden was proposed, he explains, he had strongly resisted. Then, slowly and reluctantly, he was drawn in. Today, he sounds as if he might regret that decision. There have been problems with finance, with finding distributors, in portraying something as dull as the cyberworld that Snowden inhabits.

      “A director has to say everything is great, things are wonderful,” he says, exasperated. “Every day on a set is a potential disaster. Every day on a film set is the hope that it is turning out well, but the truth is it is just a slog all the way through. It’s the bulldozer going through a treeline. It is not easy. It has never been easy.”

      This film, in particular, was not easy. “Every movie I have made is a challenge. But from day one, every day seems to have its obstacles, whether it is computers or the technology being arcane, difficult to understand, or the character of Snowden, who has a strong, robot, nerd quality. It is a drawback. He is not the active type.” As Stone headed back to the set, his final comment expressed his limited ambition for the movie at that time: “I don’t want to do anything that will hurt Edward Snowden.”

      Almost a year later, I meet Stone again, in London. The tiredness is gone. This is a man full of enthusiasm for life and his movie. The editing has gone well, he feels; the previous week a positive reaction had met an early preview in Idaho – despite his sense of dread.

    • Edward Snowden’s Lawyer Wonders Whether Mass Surveillance Could Harm Democracy

      If you know you’re being watched, you behave differently, right? You’re more performative or cautious, perhaps. What does that do, then, to the future of democracy if we know that mass surveillance is inevitable?

      Edward Snowden’s lawyer, Ben Wizner, is wondering the same thing. Wizner, who works for the ACLU, is the primary player in “A Very Different World,” the fourth installment in Joseph Gordon-Levitt’s five-part documentary series that explores whether today’s technology helps or hurts democracy. The Huffington Post has been premiering the series all week, including a short film about social media’s impact on election rigging in Pakistan and an in-depth look at surveillance’s (in)ability to prevent terrorism.

    • Cisco confirms two of the Shadow Brokers’ ‘NSA’ vulns are real
    • Tech News! US spy agency’s data hacked!
    • Edward Snowden Has Made A Bunch Of Money While Living In Exile
    • Researchers suspect Russian Federation in Shadow Brokers hack
    • NSA blames storm for website outage

      The National Security Agency (NSA) blamed a partial shutdown of NSA.gov on a storm.

      In a tweet Wednesday, the NSA said a storm on Monday near its headquarters in Ft. Mead, Md., knocked the site offline. The outage occurred around 11 a.m. Monday when links from the NSA homepage stopped working, although the homepage itself remained visible. The entire site was back online by late Tuesday afternoon.

    • Was This NSA ‘Hack’ a Russian Plot or an Inside Job?
    • Snowden says Russia ‘probably responsible’ for NSA hack
    • Cisco, Fortinet Warn of Shadow Brokers’ Zero-Day Flaw Risks
    • Is Russia hacking the US election?

      Huge leaks of data from US organisations have been attributed by some to Russia, so has the former Soviet state launched cyberwar on the US elections?

      Hacking tools allegedly developed by the US National Security Agency (NSA) were dumped online by a group calling itself Shadow Brokers.

      It follows a string of recent leaks of data from the Democratic National Committee (DNC).

      There are also now suspicions that the Clinton Foundation, a charitable body, may have been targeted.

    • Cisco remote flaws revealed in NSA group hack

      Networking giant Cisco has said it will release a security update to patch one of two remotely exploitable flaws in its products. Both flaws were leaked following a hack of a group strongly suspected to be an NSA front.

      The company rates this flaw, known as EPICBACON, of which it had no knowledge, as having a high security impact rating and has advised of workarounds until a fix is released.

      It has released a fix for the second flaw, known as EPICBANNA, also remotely exploitable, the risk of which it terms medium. Detailed explanations of the two flaws are on the Cisco blog.

    • Opinion: NSA hack reveals flaws in White House zero-day process

      A potentially damaging hacking tool revealed in the apparent National Security Agency breach includes a zero-day vulnerability – or previously unknown security hole – in Cisco software.

    • Experts have 2 theories for how top-secret NSA data was stolen, and they’re equally disturbing

      In the wake of an unprecedented breach of hacking tools and exploits apparently stolen from the US National Security Agency’s elite hacking unit, experts are offering two competing theories on how it happened — and they’re equally disturbing.

      Some former agency employees believe that the alleged group behind the leak, the “Shadow Brokers,” may have hacked an NSA server that had a top-secret hacker toolkit left there by mistake.

      Others believe that the Brokers may be just a smokescreen for another possibility: an agency mole.

    • How intelligence agencies undermine our computer security

      Computer security exploits are one of the more lucrative markets you’ve probably never heard of. Find a vulnerability in commonly used software, and sell it to the highest bidder. Ideally, the vulnerability is one the software designer doesn’t know about yet — called zero-day exploits — but even vulnerabilities that have been identified and patched can still be exploited — like a lot of us ordinary computer users, many governments agencies and companies don’t keep their software up-to-date or run old versions that are still vulnerable.

    • The NSA Has a New Disclosure Policy: Getting Hacked

      On Monday, when tech executives arrived in their offices, just days after a mysterious group of hackers released what they claimed were a set of NSA hacking tools, a familiar and frustrating pattern was taking shape. America’s premier signals intelligence agency had once again discovered unknown flaws in products used to secure computer networks around the globe, but instead of telling the manufacturers, the NSA pocketed those flaws, like skeleton keys that would let them open doors to others’ networks whenever and wherever they wanted.

    • Cisco patches against “NSA” bacon

      Cisco has patched its software against hacking tools called extra bacon which are believed to have been nicked from the NSA.

      Two of the cyberweapons were trained on Cisco flaws which would allow the spooks to take over crucial security software used to protect corporate and government networks.

      In a statement, Cisco said that it had immediately conducted a thorough investigation of the files released, and has identified two vulnerabilities affecting Cisco ASA devices that require customer attention.

      “On Aug. 17, 2016, we issued two Security Advisories, which deliver free software updates and workarounds where possible.”

    • Smart meters: A timeline of the UK rollout – Energy customers are cynical about the rollout – click through its history [“fails to mention they are insecure and are major privacy violations” -iophk]

      17 August 2016 The rollout of the national smart meter programme has faced yet another setback, with the launch of a new government body called the Data and Communications Company (DCC) delayed by one month.

      The DCC is supposed to be in charge of the overall infrastructure of the smart meter rollout, which intends to install smart meters in every home and business by 2020. Scroll on to slide nine for the latest.

    • Those Hacked NSA Malware Names Are Funny, But Don’t Laugh Too Hard

      What that means is that if you haven’t been hacked, you probably will be—maybe not by the NSA or its front men, but by someone. And not just you, but your company and your school and probably your church, and definitely your country.

    • Alleged NSA data dump contains powerful, rarely seen hacking tools

      A stolen cache of files that may belong to the National Security Agency contains genuine hacking tools that not only work, but show a level of sophistication rarely seen, according to security researchers.

      That includes malware that can infect a device’s firmware and persist, even if the operating system is reinstalled.

      “It’s terrifying because it demonstrates a serious level of expertise and technical ability,” said Brendan Dolan-Gavitt, an assistant professor at New York University’s school of engineering.

      He’s been among the researchers going over the sample files from the cache, after an anonymous group called the Shadow Brokers posted them online.

      Allegedly, the files were stolen from the Equation Group, a top cyberespionage team that may be connected with the NSA.

      The Equation Group likely helped develop the infamous Stuxnet computer worm, and is said to have created malware that can be impossible to remove once installed.

      Already, researchers have found that the hacking tools inside the sample files target firewall and router products and do so by exploiting software flaws – some of which could be zero-day vulnerabilities or defects that have never been reported before.

      On Wednesday, Cisco confirmed that the sample files did contain one unknown flaw that affects the company’s firewall software, and a patch has been rolled out.

    • Sources: Massive Layoffs Coming At Cisco

      Cisco Systems is laying off upward of 14,000 employees, representing nearly 20 percent of the networking giant’s global workforce, according to multiple sources close to the company.

      San Jose, Calif.-based Cisco is expected to announce the cuts within the next few weeks, as many early retirement package plans have already been offered to employees, said sources. Cisco is set to announce its fourth fiscal quarter results after the market closes tomorrow.

      The heavy cuts, which sources said will range between 9,000 and 14,000 employees worldwide, stem from Cisco’s transition from its hardware roots into a software-centric organization.

    • Cisco confirms NSA-linked zeroday targeted its firewalls for years

      Cisco Systems has confirmed that recently-leaked malware tied to the National Security Agency exploited a high-severity vulnerability that had gone undetected for years in every supported version of the company’s Adaptive Security Appliance firewall.

    • Security against Election Hacking – Part 2: Cyberoffense is not the best cyberdefense!

      State and county election officials across the country employ thousands of computers in election administration, most of them are connected (from time to time) to the internet (or exchange data cartridges with machines that are connected). In my previous post I explained how we must audit elections independently of the computers, so we can trust the results even if the computers are hacked.

      Still, if state and county election computers were hacked, it would be an enormous headache and it would certainly cast a shadow on the legitimacy of the election. So, should the DHS designate election computers as “critical cyber infrastructure?”

      This question betrays a fundamental misunderstanding of how computer security really works. You as an individual buy your computers and operating systems from reputable vendors (Apple, Microsoft, IBM, Google/Samsung, HP, Dell, etc.). Businesses and banks (and the Democratic National Committee, and the Republican National Committee) buy their computers and software from the same vendors. Your security, and the security of all the businesses you deal with, is improved when these hardware and software vendors build products without security bugs in them. Election administrators use computers that run Windows (or MacOS, or Linux) bought from the same vendors.

      Parts of the U.S. government, particularly inside the NSA, have “cyberdefense” teams that analyze widely used software for security vulnerabilities. The best thing they could do to enhance our security is notify the vendors immediately about vulnerabilities, so the vendors can fix the bugs (and learn their lessons). Unfortunately, the NSA also has “cyberoffense” teams that like to save up these vulnerabilities, keep them secret, and use them as weak points to break into their adversaries’ computers. They think they’re so smart that the Russkies, or the Chinese, will never be able to figure out the same vulnerabilities and use them to break into the computers of American businesses, individuals, the DNC or RNC, or American election administrators. There’s even an acronym for this fallacy: NOBUS. “NObody But US” will be able to figure out this attack.

    • NSA Use of Software Flaws for Hacking Posed Risk If Exposed
    • NSA’s use of software flaws to hack foreign targets posed risks to cybersecurity

      To penetrate the computers of foreign targets, the National Security Agency relies on software flaws that have gone undetected in the pipes of the Internet. For years, security experts have pressed the agency to disclose these bugs so they can be fixed, but the agency hackers have often been reluctant.

      Now with the mysterious release of a cache of NSA hacking tools over the weekend, the agency has lost an offensive advantage, experts say, and potentially placed at risk the security of countless large companies and government agencies worldwide.

      Several of the tools exploited flaws in commercial firewalls that remain unpatched, and they are out on the Internet for all to see. Anyone from a basement hacker to a sophisticated foreign spy agency has access to them now, and until the flaws are fixed, many computer systems may be in jeopardy.

    • Cisco admits long-standing vulnerability to NSA cyber weapons on some products

      Cisco has confirmed that malware recently uncovered in the Shadow Brokers leak has been available for years, and is able to exploit a serious vulnerability in the firm’s Adaptive Security Appliance firewall.

      Shadow Brokers is a previously unknown group of cyber criminals that recently made available a large cache of weaponised vulnerabilities in high-profile software.

      The vulnerabilities are thought to have been stolen from the US National Security Agency (NSA), which actively seeks security flaws in order to build cyber weapons used to hack corporate and government targets.

      Cisco released a warning to its customers recently, admitting that no patch is currently available to address the flaw.

    • The Shadow Brokers EPICBANANAS and EXTRABACON Exploits

      On August 15th, 2016, Cisco was alerted to information posted online by the “Shadow Brokers”, which claimed to possess disclosures from the Equation Group. The files included exploit code that can be used against multi-vendor devices, including the Cisco ASA and legacy Cisco PIX firewalls.

    • Leak in-house? NSA data dump could be work of insider

      The leak of tools used by the NSA’s elite hacking team has resulted in speculation and finger-pointing in a desperate attempt to identify who could have exposed the government agency’s secrets. But one source says it was an inside job.

      The chances of a hacker remotely breaking into the National Security Agency’s systems are very unlikely, according to an anonymous insider who spoke to Motherboard.

      Despite accusations that the leak is Russia’s meddling, the data dropped online under the name “the Shadow Brokers” would have required someone with the ability to access the NSA’s server, the former NSA employee told the news outlet.

    • Mystery plane heard over GCHQ and Cheltenham in the middle of the night
    • Canadian Court Says No Expectation Of Privacy In SMS Messages Residing On Someone Else’s Phone

      But that’s not what the ruling says. Text messages sent “into the ether” do not lose their expectation of privacy. That would make SMS message content open to interception or seizure without a wiretap order or warrant. The circumstances of the case undercut the claims made in these two soundbites.

      In no way does this create some sort of “Third Party Doctrine” governing the content of text messages. Instead, it simply confirms what should be obvious: that once messages are received, the recipient is free to discuss, expose, or otherwise provide the content to whoever asks for it. The sender is no longer in control of the sent message and cannot claim it is still a private communication.

      An investigation into the trafficking of illegal firearms resulted in the seizure of phones owned by the two suspects. Police performed forensic searches on both devices and found messages implicating both arrestees. One of the suspects challenged the search and seizure of the devices. For the most part, he won.

  • Civil Rights/Policing

    • Innovation policy trends in Latin America: Citizen’s Leadership

      The pressure from activists is widespread through various political practices in Latin America and across the world. Protests and social movements, in more or less traditional formats, are merging with new models, tools and innovative formats; and with networked performances, prioritizing the horizontality and the multiplicity of leaderships.

    • Sweden’s summer spate of car fires continues

      Cars were torched in Malmö for the ninth consecutive night. Emergency services were called out to put out two fires within nine minutes, with one alarm raised at 1.28am and the other at 1.37am.

      “There were two incidents close to each other in time in Malmö, but we had no problems handling both incidents,” emergency control room officer Gustaf Sandell told the TT newswire.

      A resident in the area was able to use fire extinguisher to stop the first fire in the Fosie district from spreading. Another three cars were gutted in Rosengård in the second incident.

      More than 70 cars have been torched in Malmö since early July. Police figures put out earlier this month show that the number of car burnings in the city halved between 2009 and 2015.

    • Canadian Cops Want a Law That Forces People to Hand Over Encryption Passwords

      Encryption tools that keep your digital communications hidden from prying eyes are becoming more widespread, and Canadian police say they need a law that compels people to hand over their passwords so cops can access those communications.

      The Canadian Association of Chiefs of Police (CACP), a lobbying organization with membership from across the country, passed a resolution at its annual conference on Tuesday mandating that the group advocate for a law that would force people to provide their computer passwords to police with a judge’s consent, CTV reported.

      “To say this is deeply problematic is to understate the matter,” said Micheal Vonn, policy director for the BC Civil Liberties Association. “We have all kinds of laws that do not compel people to incriminate themselves or even speak.”

      A law that compels people to give police access to their devices, which may contain messages, photos, and data that have nothing to do with any active criminal investigation, doesn’t fit within Canada’s current legal landscape and would be “tricky constitutionally,” Vonn added.

    • Companies Can’t Legally Void the Warranty for Jailbreaking or Rooting Your Phone

      After I published an article about how electronics manufacturers including Microsoft and Sony illegally void the warranties of consumers who open their devices, I got a flood of emails from people wondering whether federal law protects their right to jailbreak or root their phones.

      The short answer is yes, it does: Under the Magnuson-Moss Warranty Act of 1975, manufacturers cannot legally void your hardware warranty simply because you altered the software of an electronic device. In order to void the warranty without violating federal law, the manufacturer must prove that the modifications you made directly led to a hardware malfunction.

      “They have to show that the jailbreak caused the failure. If yes, they can void your claim (not your whole warranty—just the things which flowed from your mod),” Steve Lehto, a lemon law attorney in Michigan, told me in an email. “If not, then they can’t.”

    • Stealing bitcoins with badges: How Silk Road’s dirty cops got caught

      DEA Special Agent Carl Force wanted his money—real cash, not just numbers on a screen—and he wanted it fast.

      It was October 2013, and Force had spent the past couple of years working on a Baltimore-based task force investigating the darknet’s biggest drug site, Silk Road. During that time, he had also carefully cultivated several lucrative side projects all connected to Bitcoin, the digital currency Force was convinced would make him rich.

      One of those schemes had been ripping off the man who ran Silk Road, “Dread Pirate Roberts.” That plan was now falling apart. As it turns out, the largest online drug market in history had been run by a 29-year-old named Ross Ulbricht, who wasn’t as safe behind his screen as he imagined he was. Ulbricht had been arrested earlier that month in the San Francisco Public Library by federal agents with their guns drawn.

    • Russian MP seeks to decriminalise domestic violence

      Tatyana’s stepfather started small.

      At first, he’d get annoyed by things she did. He criticised and lectured her. Soon the lectures stopped and the outrage began. And when the outrage stopped, the hitting started.

      “He just went mad,” said Tatyana, whose name has been changed to protect her identity. “For five years, he beat me and my mother senseless.”

    • Flood destroys home of man who believes floods sent to punish gays

      Amid the horror of floods that have covered southern Louisiana in recent days, a grim note of irony: Tony Perkins, the head of the anti-queer Family Research Council, is among those whose homes are underwater. Perkins believes natural disasters are sent to punish gays.

    • Bad Laws Produce Bad Law Enforcement

      THE POLICE SHOOTING AND KILLING of an unarmed Black teenager named Michael Brown on August 9, 2014, sparked civil unrest in his hometown of Ferguson, Missouri. The weeks that followed brought to a national audience shocking stories of inequity suffered by Ferguson residents at the hands of local law enforcement. The fundamental brokenness of the system seemed to be confirmed when a grand jury refused to indict the police officer who shot Brown. Meanwhile, to suppress public demonstrations, police equipped themselves like an occupying force, treating protestors as an insurgency to be stomped out.

    • Beyond Winning and Losing

      It’s the smallest thing in the world. Does the tennis ball land inside the line or outside? But somehow, as I watched this 60-second YouTube clip of an Australian tennis match last January, and heard an explosion of joyous approval surge from the crowd, I could feel the planet shift.

      Or at least it seemed that way for an instant.

      In the clip, a tennis player named Jack Sock tells his opponent, Lleyton Hewitt, whose serve has just been declared out, that he should challenge the call. A little humorous disbelief bounces around the court, but eventually Hewitt says, “Sure, I’ll challenge it.” A judge reviews the tape and declares that the serve was in . . . and the crowd lets loose an enormous cheer.

      I felt like I could hear the stunned amazement in it. Hurray for integrity! Hurray for . . . what? It was different from the usual hoots and hollers of “our guy wins” or the polite acknowledgement of “nice play.”

    • Where the Green Party’s Jill Stein stands on jobs, taxes and more

      Green Party candidate Jill Stein doesn’t command the kind of crowds and headlines that rivals Hillary Clinton and Donald Trump do. So many voters may not know where she stands on the issues.

      Stein, who is a physician, is set to participate in a CNN Town Hall Wednesday night where she plans to discuss her policies.

      Here’s a look at some of her key economic proposals.

    • The Boy in the Ambulance Offers Glimpse of ‘Profound Horrors’ in Syria

      Laying bare the horrors of Syria’s ongoing civil war, heartbreaking footage of a young boy rescued from the rubble following an airstrike in Aleppo has gone viral.

      Much as last year’s photos of three-year-old Aylan Kurdi—”The Boy on the Beach”—offered a stark reminder of the human toll of the refugee crisis, the images of five-year-old Omran Daqneesh—”The Boy in the Ambulance”—are forcing many to consider the devastating realities of life in war-torn Syria, where more than 250,000 people, including many children, have died in almost five years of war.

      The photo and accompanying video, taken and distributed by the activist group Aleppo Media Centre, show Omran being pulled from a partially destroyed building and placed in a chair inside a brightly lit ambulance after an airstrike Wednesday evening. His face and body are covered in ash, dust, and blood. Seemingly dazed, he says nothing.

    • I Do Jury Duty

      I just wrapped up a couple of days of jury duty.

      Note “jury duty,” which is very different than serving on a jury. I didn’t do that. Being on an actual jury involves making a careful judgment on someone’s life. I did jury duty, which involves waiting and sitting and waiting, while watching your last hopeful images of democracy fade away.

    • Why We Are Publishing Videos the LAPD Wouldn’t Release

      Videos have become a critical aspect of the latest national reckoning with deadly interactions between the police and the public. In New York, an eyewitness recorded Eric Garner’s death at the hands of a police officer who placed him in a chokehold. In Chicago, a reporter successfully forced the police department to release the footage of an officer firing his gun 16 times in the course of killing Laquan McDonald.

    • Videos Surface of a Death in Custody the LAPD Didn’t Want Released

      Early on the afternoon of June 4, 2012, Vachel Howard was handcuffed to a bench inside the Los Angeles Police Department’s 77th Street Station Jail. He was 56 years old, and had been taken into custody for driving while intoxicated. The grandfather of seven had been strip-searched, and his shirt still hung open. Howard told the officers present that he suffered from schizophrenia. Police suspected he was high on cocaine.

      Less than an hour later, Howard was pronounced dead at Good Samaritan Hospital, just miles from the jail. He had been released from the handcuffs, but later subdued by half a dozen officers after he became, by their testimony, “violent and combative.” A coroner eventually listed three contributing causes of death: cocaine intoxication, heart disease, and a chokehold employed by one of the officers.

      Two years of litigation followed before, in October of 2015, the city of Los Angeles agreed to pay Howard’s family $2.85 million to settle a wrongful death claim.

    • The Greatest Threat to Our Freedoms

      There is nothing more dangerous than a government of the many. The U.S. government remains the greatest threat to our freedoms.

      The systemic violence being perpetrated by agents of the government has done more collective harm to the American people and our liberties than any single act of terror.

      More than terrorism, more than domestic extremism, more than gun violence and organized crime, the U.S. government has become a greater menace to the life, liberty and property of its citizens than any of the so-called dangers from which the government claims to protect us.

      This is how tyranny rises and freedom falls.

      As I explain in my book Battlefield America: The War on the American People, when the government views itself as superior to the citizenry, when it no longer operates for the benefit of the people, when the people are no longer able to peacefully reform their government, when government officials cease to act like public servants, when elected officials no longer represent the will of the people, when the government routinely violates the rights of the people and perpetrates more violence against the citizenry than the criminal class, when government spending is unaccountable and unaccounted for, when the judiciary act as courts of order rather than justice, and when the government is no longer bound by the laws of the Constitution, then you no longer have a government “of the people, by the people and for the people.”

      What we have is a government of wolves.

      Worse than that, we are now being ruled by a government of scoundrels, spies, thugs, thieves, gangsters, ruffians, rapists, extortionists, bounty hunters, battle-ready warriors and cold-blooded killers who communicate using a language of force and oppression.

      Does the government pose a danger to you and your loved ones?

      The facts speak for themselves.

    • Dozens of news orgs demand DOJ release its secret rules for targeting journalists with National Security Letters

      A coalition of thirty-seven of news organizations—including the New York Times, the Associated Press, NPR, USA Today, and Buzzfeed—filed a legal brief over the weekend in support of Freedom of the Press Foundation’s case demanding that the Justice Department release its secret rules for targeting journalists with National Security Letters (NSLs).

      NSLs are controversial (and unconstitutional) surveillance tools that allow the FBI to collect private information in national security cases without any involvement whatsoever from judges or courts. We filed a Freedom of Information Act lawsuit in 2015 demanding their secret rules for using NSLs on members of the media, and Reporter’s Committee for Freedom of the Press filed the amicus brief on behalf of the thirty seven news organization on Saturday. (We also filed a separate brief, which you can read below.)

    • Justice Department to Stop Using Private Prisons

      The Justice Department said Thursday that it will phase out its use of private contractors to run federal prisons.

      Deputy Attorney General Sally Yates said privately run prisons do not provide the same level of correctional services or save on costs. And in a memo to prison officials, she said, “They do not maintain the same level of safety and security.”

  • Internet Policy/Net Neutrality

    • DirecTV Faces RICO Class Action For Bungling Business Installs, Then Demanding $15,000 For Theft Of Service

      For several years now DirecTV (now owned by AT&T) has been the focus of a series of lawsuits focused on the NFL’s Sunday Ticket exclusive arrangement. More specifically, the lawsuits have claimed that the exclusive arrangement violates antitrust law, resulting in a monopoly that charges often absurd prices to small businesses. Sports bars in particular have to shell out payments of up to $122,895 per year for NFL Sunday Ticket, while those same bars pay significantly less for Major League Baseball’s comparable offering.

      But a new lawsuit filed against DirecTV this week accuses the company of something notably different. Doneyda Perez, owner of Oneida’s Beauty and Barber Salon in Garden Grove, has filed a RICO class action against DirecTV for intentionally selling businesses residential-class TV service, then hitting these customers with penalties of up to $15,000 several years later for failing to subscribe to business-class service. There’s a lot to go through in this case, but before we start, it’s at least worth pointing out that RICO class action cases are almost always ridiculous — even if there does appear to be questionable behavior here.

    • Allegations Of Dysfunction Continue To Plague FirstNet, Our $47 Billion (And Growing) National Emergency Network

      If you’ve been playing along at home, you’ll recall that both AT&T and Verizon have a long, proud history of taking billions in subsidies and tax breaks for next-generation networks repeatedly left half completed. AT&T, as we’ve well documented, has a prodigious history of fraud, whether it’s ripping off low-income families, the hearing impaired, various school districts or the company’s own customers. While the nation’s top two wireless carriers make sense as the best positioned to win the contract, they’re also the most likely to milk the program for every extra penny it’s worth while doing the bare minimum required.

      Not too surprisingly, the Atlantic article has reportedly upset those working on FirstNet, even though it’s far from the first report of this kind. The above-cited report by the Office of Inspector General of the Department of Commerce initially found numerous conflicts of interest on the FirstNet board, with many board members playing fast and loose with conflict reporting rules. It’s worth noting that many of these original board members (like FirstNet GM and former Verizon exec Bill D’Agostino) have already moved on, but these problems set the stage for the kind of dysfunction we’ve seen time and time again in telecom.

      Estimates suggest the contract will be worth around $100 billion to the company that wins it, with the winner grabbing not only the lion’s share of fees paid by state customers, but the right to sell off excess capacity to private companies and consumers. Winners are expected to be announced in November. And while the project may be well-intentioned and even necessary, it’s painfully unclear if the U.S. government is actually capable of completing it without giving a master class in telecom waste, fraud and abuse. History, quite simply, just isn’t on the project’s side.

    • Remember Claims That Cord Cutting Was On The Ropes? It’s Actually Worse Than Ever

      Despite the obvious realities that ratings are down and consumers are cutting the cord, there’s a vibrant and loyal segment of executives and analysts who still somehow believe cord cutting is a myth. Every few months, you’ll see a report about how cord cutting is either nonexistent or overstated. Earlier this year, these voices were quick to argue that the industry had cord cutting on the ropes because several of the biggest cable providers saw modest subscriber gains in the fourth quarter (ignoring several that saw net subscriber losses for the year).

      Those folks have been pretty damn quiet the last few weeks as second quarter earnings show cord cutting is worse than ever.

  • DRM

    • Intel praises killer USB-C audio features in war against traditional headphone jacks [Ed: removing headphone jacks good for DRM]

      You may like your earbuds and its 3.5mm jack, but you’ll downright love USB-C headphones, Intel says. At the company’s IDF developer conference in San Francisco, Intel’s once again pushing hard for mobile devices to ditch analog audio and embrace feature-filled digital headsets.

      Replacing the vaunted 3.5mm jack has evolved into a contentious issue ever since rumors surfaced that Apple would use a lightning connector for audio in the next iPhone. Similarly to the passion that surrounds Windows XP and Windows 7, people are so used to the longstanding headphone jack they just can’t let it go—even for the promise of something potentially better.

      And something better is exactly what Intel is promising, though the pitch may not sway audiophiles who swear that analog signals offer richer sound. During IDF on Tuesday, company architects Rahman Ismail and Brad Saunders talked up the coming USB Type C audio standard, which is due out in the coming months, as first reported by CNET.

  • Intellectual Monopolies

    • Copyrights

]]>
http://techrights.org/2016/08/19/linux-mint-with-kde/feed/ 0
Links 29/6/2016: SteamOS 2.83 Beta, Alpine Linux 3.4.1 http://techrights.org/2016/06/29/alpine-linux-3-4-1/ http://techrights.org/2016/06/29/alpine-linux-3-4-1/#comments Wed, 29 Jun 2016 16:20:45 +0000 http://techrights.org/?p=93963

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • Health/Nutrition

    • Glyphosate: one pesticide, many problems

      The latest episode in the glyphosate saga just took place, with the EU’s Health and Food Safety Commissioner, V. Andriukaitis, announcing that the European Commission would extend the current market authorisation of glyphosate by 18 months. [this article is an updated version of the same piece on June 24.]

    • Brexit: Vote Leave wipes NHS £350m claim and rest of its website after EU referendum

      The cached version includes a banner image touting the pledge to ‘give our NHS the £350 million the EU takes every week’ – which has already been walked back by Leave supporters

    • Private docs remain popular despite rising fees

      Costs of private doctors’ services have risen much faster than inflation, the newspaper Savon Sanomat reports on Tuesday. However reimbursements by the Social Insurance Institution (Kela) have not risen at the same pace. For instance prices at paediatric receptions rose by more than 23 percent within five years. Nearly one in three Finns visits a private doctor at least once a year.

      Whereas general inflation was around nine percent in the years 2010-15, some doctors’ fees rose by three times that much during the same period.

      The biggest spike, 28 percent, was in psychiatrists’ fees. Other significant price rises were in visits to paediatricians (23.5 percent) as well as to gynaecologists and general practitioners (both 22 percent).

    • Flint water crisis probe costs triple, may hit $5 million

      Michigan Attorney General Bill Schuette’s wide-ranging probe into the Flint water crisis could cost as much as $4.9 million, more than triple the amount allocated by the state in a contract in March, according to a posting on the state Administrative Board website.

      Earlier this year, Schuette received approval from the board to expand the contract to up to $1.5 million, from the original $249,000, with Flood Law, a Royal Oak legal firm. Todd Flood is the lawyer Schuette tapped to head his investigation into whether any state laws were violated in the lead contamination of Flint drinking water, which has led to state and federal emergency declarations and instructions to Flint residents not to drink tap water without using a lead filter.

  • Security

    • Security Analysis of TSA PreCheck

      The Transportation Security Administration’s PreCheck program is risk-based screening that allows passengers assessed as low risk to be directed to expedited, or PreCheck, screening. We begin by modelling the overall system of aviation security by considering all layers of security designed to deter or disrupt a terrorist plot to down an airliner with a passenger-borne bomb. Our analysis suggests that these measures reduce the risk of such an attack by at least 98%. Assuming that the accuracy of Secure Flight may be less than 100% when identifying low and high risk passengers, we then assess the effect of enhanced and expedited (or regular and PreCheck) screening on deterrence and disruption rates. We also evaluate programs that randomly redirect passengers from the PreCheck to the regular lines (random exclusion) and ones that redirect some passengers from regular to PreCheck lines (managed inclusion). We find that, if 50% of passengers are cleared for PreCheck, the additional risk reduction (benefit) due to PreCheck is 0.021% for attacks by lone wolves, and 0.056% for ones by terrorist organisations. If 75% of passengers rather than 50% go through PreCheck, these numbers are 0.017% and 0.044%, still providing a benefit in risk reduction. Under most realistic combinations of parameter values PreCheck actually increases risk reduction, perhaps up to 1%, while under the worst assumptions, it lowers risk reduction only by some 0.1%. Extensive sensitivity analyses suggests that, overall, PreCheck is most likely to have an increase in overall benefit.

    • Security updates for Monday
    • Tuesday’s security advisories
    • The future of security
    • Prepare to be hacked: Information security for small organizations

      Information security is challenging, and can be breathtakingly expensive in money and staff energy. Smaller organizations may not have the money or staffing expertise to do the job right, even when the need is the greatest. At OSCON 2016, Kelsey Gilmore-Innis of Sexual Health Innovations (SHI) gave a really interesting talk on how her small nonprofit has done some creative thinking about security, and how that influences the deployment and operation of their application.

    • DDoS Attack Powered by 25,000 CCTV Cameras

      Security researchers have revealed a unique new DDoS attack launched against a small business, which was powered entirely by thousands of compromised CCTV units.

      Sucuri founder Daniel Cid explained in a blog post that 25,513 IP addresses were spotted, with a plurality in Taiwan (24%), the US (12%) and Indonesia (9%) – although they spread out over 105 countries in total.

  • Defence/Aggression

    • Tony Blair responds to war criminal claims with astonishing attack on Jeremy Corbyn

      Jeremy Corbyn represents the “politics of protest” and is standing by while people are “bombed, beaten and starved into submission” in Syria, Tony Blair has said, in his most vehement attack on the Labour leader yet.

    • Moment Istanbul airport attacker is shot before detonating suicide bomb

      A triple suicide bombing and gun attack at Istanbul’s Ataturk airport has killed at least 36 people, including foreigners, with Turkey’s prime minister saying early signs pointed to an assault by the Islamic State group.

      The attackers began spraying bullets at the international terminal entrance before blowing themselves up at around 10.00 pm local time on Tuesday, Turkish authorities said.

      It is the deadliest of four attacks to rock Turkey’s biggest city this year, with two others blamed on Isil and another claimed by a militant Kurdish group.

      Though there was no immediate claim of responsibility for Tuesday’s carnage, “the evidence points to Daesh,” Prime Minister Binali Yildirim told journalists at the scene, using another name for the jihadists.

  • Environment/Energy/Wildlife/Nature

    • This Could Be the Biggest Threat To Our Climate If We Don’t Act Fast

      When you think “peatland,” you probably picture water, or mosquitoes, or creepily preserved human artifacts. What most of us don’t consider are catastrophic wildfires—but that’s precisely what scientists are now worried about when it comes to one of the most carbon-rich ecosystems on Earth.

      Mike Waddington is a forest ecologist at McMaster University in Ontario. He’s been studying the peatlands that pepper the Canadian boreal forest for going on thirty years, and he’s begun to notice an alarming trend. When peatlands that have been drained by humans for forestry or mining catch on fire, they burn like crazy, eating through meters of carbon-rich soil over the course of months.

      “I always tell people to think about the fire swamp from Princess Bride,” Waddington told Gizmodo. “Peat fires are very difficult to put out because they just keep smoldering down into the soil.”

  • Finance

    • Scottish MEP receives standing ovation in European Parliament after passionate speech saying Scotland ‘voted to remain’

      A Scottish MEP has received a lengthy standing ovation from hundreds of members of the European Parliament after asking members “not to let Scotland down”.

      Alyn Smith, from the Scottish National Party (SNP), addressed a special session on the Brexit in Brussels moments after Nigel Farage hailed Britain’s “independence day”.

    • The 2016 Abolition Act

      I think it is time for parliamentary democracy to re-establish itself, and this legislation will be just the thing to bring sense back to British politics.

    • Trump vows to reopen, or toss, NAFTA pact with Canada and Mexico

      Trump criticized the North American Free Trade Agreement as a U.S. job killer, saying he would be willing to scrap the pact if Canada and Mexico were unwilling to budge. He also tried to link Democratic rival Hillary Clinton to the deal on the eve of a meeting in Ottawa of the “three amigos,” the leaders of the three NAFTA signatories: the United States, Mexico and Canada.

    • Trump Plans To Ruin USA

      I imagine Canadian trade with Mexico will do really well if USA agrees to stop trading with both of us, although we may have to trade by sea.

    • Democratic Party Platform Committee Undermines Clinton On TPP

      The Democratic party’s elites must not think that trade and jobs will be big issues in the coming election. Apparently, they’ve never listened to a Donald Trump speech, and didn’t notice that working-class people in the United Kingdom just voted to “brexit” from the European Union (EU) over these issues.

      The Democratic platform writing committee has voted not to oppose the Trans-Pacific Partnership (TPP), with the pro-TPP majority saying that doing so would undercut President Obama’s efforts to pass the agreement.

    • Hillary Clinton Hints at Giant, Trump-Like Giveaway to Corporate America

      Hillary Clinton gave a big speech in Raleigh on her plans for the economy on June 22. It was full of Bernie Sanders-like rhetoric about “outrageous behavior” by business and Wall Street.

      But it also included a dog whistle that only huge multinational corporations would hear, telling them that she plans to deliver on one of their greatest dreams and slash their longterm taxes by hundreds of billions of dollars.

    • JP Morgan says Scottish independence, new currency now its ‘base case’

      U.S. bank JP Morgan said on Wednesday it now expects Scotland to vote for independence and introduce its own currency before Britain leaves the European Union in 2019.

      “Our base case is that Scotland will vote for independence and institute a new currency at that point (2019),” JP Morgan economist Malcolm Barr said in a note to clients on Wednesday.

  • AstroTurf/Lobbying/Politics

    • Angela Eagle’s Local Party Has Backed Jeremy Corbyn

      Angela Eagle’s local Labour party has come out in support of Jeremy Corbyn, HuffPost UK can reveal.

      The chair and secretary of Wallasey constituency Labour party have written to express their backing for the leader.

      Kathy Miller and Kathy Runswick said that their local party had decided at their annual meeting on Friday to urge their MP to oppose the ‘motion of no confidence’ in Corbyn.

      MPs voted by 81% today to back the motion and Eagle, the former Business Secretary, is expected to announce she will stand in a leadership contest.

    • Bernie Sanders influences the Democratic Party platform — with some limits

      Over the weekend, the Democratic National Committee began drafting the party’s official policy platform, which will be rolled out next month at the organization’s national convention in Philadelphia. Though it’s virtually impossible that Sen. Bernie Sanders would become the Democratic nominee, he’ll still have a big influence on the party’s agenda going forward.

    • Scalia’s Lurch to the Left–and Other New York Times Pipe Dreams

      That’s the message of a chart that takes up a good chunk of some of the most valuable journalistic real estate in the world, the top half of the front page of the New York Times (6/28/16). Looking at the chart, you can see that just about every justice has moved to the left over time: Of the Democratic appointees, Sonia Sotomayor, Ruth Bader Ginsburg and Stephen Bryer are all well to the left of where they were when they were appointed; only Elena Kagan is more or less where she started out.

    • Another Media Setup?

      This picture has been all over twitter, promoted by every high level Blairite you can think of, from JK Rowling down. Yet all may not be what it seems.

    • Brexit: Who governs Britain? This is the UK’s new 10-party system

      Who governs Britain? Farage? Boris? Gove? Cameron? May? Sturgeon? Corbyn? Corbyn’s critics? Never have so many actors mattered and so few had any actual power.

      In the wake of Brexit, the old party divisions no longer apply. Britain is now a ten-party system, with the major parties cleaved in two between leavers and remainers.

      Using data from YouGov, who have reweighted their final EU referendum poll to reflect Thursday’s 52:48 vote for Brexit, we can discover the proportion of each party’s supporters who voted for leave or remain.

      And if we take the vote shares for each party at last year’s general election (the latest polls suggest similar shares), we can see where power really lies.

    • Donor promised to make Clinton ‘look good’ if appointed to board

      A major Democratic donor personally lobbied then-Secretary of State Hillary Clinton’s office for a seat on a sensitive government intelligence board, telling one of her closest aides that if appointed he would make Clinton “look good.”

      Rajiv Fernando acknowledged that he may not have the experience to sit on a board that would allow him the highest levels of top-secret access, but he assured deputy chief of staff Huma Abedin in newly released 2009 emails that he was talking to two professors who were “getting me up to speed on the academics behind the field.”

      Fernando, who contributed to Clinton, her family’s foundation and Barack Obama, described himself as one of “Hillary’s people” and mentioned that he recently had sent an ailing Clinton flowers to wish her a speedy recovery.

  • Censorship/Free Speech

    • Twitter Deletes SCOTUSblog Twitter Account Briefly Thinking Its Running Of The Trolls Meant It Was Hacked

      We’ve mentioned and linked to the wonderful SCOTUSblog many times in the past, and have even mentioned its annual running of the trolls, in which the site’s Twitter account responds sarcastically to people who think that it is the Supreme Court’s twitter account, rather than a blog of some journalists and lawyers covering the court. Part of the confusion comes from the fact that the Supreme Court doesn’t have its own Twitter feed, combined with Twitter’s eagerness to suggest alternate accounts when people are assuming SCOTUS must have a Twitter feed. But, really, a big part of the problem is people tweeting inane things at SCOTUSblog without realizing it’s not SCOTUS.

    • Twitter debacle

      Today we had our annual running of the trolls — wherein we respond to people who direct mostly hateful and sometimes cute things to our @SCOTUSblog account, thinking it is the official Twitter account of the Supreme Court. We’ve done this for several Terms without incident. But this Term, Twitter — probably through some automated system — decided that our account had been hacked. So it kicked us out of our account — thinking we were the hackers — and then blocked all the tweets, so they have disappeared. We’re trying to get our account back — so far without success. But for posterity, and for those who thought we had deleted the tweets ourselves, here are some screen shots captured from our Twitter followers (many others are blocked by Twitter so even retweets don’t show them):

    • Will Murdoch’s new media outlet bow to UAE’s censorship rules?

      Have you heard of Vice Media? Rupert Murdoch has – in 2013 he called the internet and print publishing upstart a “wild interesting effort to interest millennials” and a “global success.” Not long after, he bought a five per cent stake in what is known as the “hipsters bible”, and his son, James, now sits on its board. The company, which runs dozens of websites and magazines, is said to be at least as valuable as the New York Times.

      Last week it was announced that Vice is moving into the Middle East with a major new partnership with Moby Group, an Afghan media company which has also been a long-term collaborator. Together, the companies hope to bring the Vice brand to much of the Arab world, including all the Gulf Cooperation Council states, Jordan, Iran, Lebanon, Egypt and Algeria as well as to Afghanistan.

    • Artist Updates Ancient Indian Erotica To Show Just How Messed Up Censorship Is

      The Khajuraho temples are a group of Hindu and Jain holy shrines built between 950 and 1050 in the central Indian state of Madhya Pradesh. Although 85 were originally built, only 22 remain today.

      The holy structures are known for housing an extensive array of erotic images — from Kamasutra-style entangled sex positions to sculptures of curvaceous, nude women celebrating their sensual forms. The temples even included some wonderfully nasty depictions of orgies and bestiality.

    • S. African broadcaster in censorship battle

      A simmering row at public broadcaster SABC could soon boil over into renewed protests. Just weeks before crucial polls, journalists, civil society, and trade unions accuse SABC of political meddling and censorship.

    • Allegations of censorship at SABC

      There are no issues within the SABC according to its Chief Operating Officer, Hlaudi Motsoeneng – despite the public broadcaster having decided to censor public protest visuals on television.

      For the past few weeks, the SABC’s decision not to show footage of violent service delivery protests has raised some concern. The media believe that the broadcaster is engaging in censorship, but Motsoeneng has denied it. According to him, censorship is English, and he added that he doesn’t know what it is.

    • Behave or go, says Hlaudi

      Controversial SABC boss Hlaudi Motsoeneng has effectively told frightened employees to make peace with being dutiful lapdogs or walk out.

      Motsoeneng, the chief operating officer, allegedly made these remarks during a staff meeting at the SABC headquarters in Auckland Park, Joburg, on Tuesday.

    • We welcome Matthews’s decision to resign – NUMSA

      The National Union of Metalworkers of South Africa (Numsa) strongly condemns the suspension of three South African Broadcasting Corporation (SABC) journalists – economics editor, Thandeka Gqubule, Radio Sonder Grense executive producer Foeta Krige and senior journalist Suna Venter – for the “offence” of questioning the ban on visual coverage of protests, in particular a protest against censorship at the public broadcaster itself.

    • These brave SABC employees have publicly spoken out against Hlaudi

      The recent editorial shakeup that has been taking place at the SABC is a very serious issue, with the media freedom of the public institution being threatened. Journalists have been censored by the banning of showing violent protest and the threat of suspension and dismissal hanging over their heads. However through all this, there have been a number of brave journalists from the SABC who have spoken out against Hlaudi Motsoeneng and the recent editorial decisions being made at the public broadcaster.

    • Journalists mutiny over SABC censorship

      South Africa’s public broadcaster is battling to quell a journalist revolt over censorship of programmes that portrayed the government in a negative light and its ban on screening footage of protesters destroying property because it didn’t want to encourage violence.

    • ACLJ Demands Answers, Files FOIA Request to Expose Obama Administration’s Censorship of Jihadist’s 911 Transcript
    • ACLJ Files FOIA Lawsuit Against Obama Administration, Seeks Records on Iran Negotiation Cover-up
  • Privacy/Surveillance

    • Facebook Privacy Status Hoax Is Back To Fool You. Don’t Fall For It.

      Facebook privacy hoax status update is back to fool you. Before going into the details, let me tell you one thing — DON’T fall for this hoax and copy-paste some privacy message on your wall. You are in full control of your Facebook content and you can take a privacy checkup anytime to confirm it.

    • Facebook backtracks, saying it isn’t stalking you to recommend friends

      SOCIAL ADVERTISING PORTAL Facebook has made a dramatic U-turn. Despite confirming to The INQUIRER on Tuesday that the site tracks your location to recommend new friends, the firm has since changed its mind and said that it’s not.

      News broke this week, courtesy of news site Fusion, that Facebook has been taking it on itself to recommend hooking up with people in the same area. People did this organically in the old days by meeting or speaking.

      The report said that the privacy-unaware company has already exposed a couple of concerned parents and identified them following a hook-up at an anonymous help session.

    • Facebook’s Flip-Flop: Is It a Law Enforcement Thing?

      One part of this comment is easy: Facebook is not using locations you mark for yourself (so if I said I was in Grand Rapids, they wouldn’t use that to find new Grand Rapids friends for me). But it’s not really clear what they mean by “device location.” Determined by what? GPS? Cell tower? IP location? Wifi hotspot colocation?

      Which got me thinking about the way that federal law enforcement (in both the criminal and FISA context, apparently) are obtaining location data from social media as a way to tie physical location to social media activity.

    • Snowden: Norway gives no guarantees

      Norway can issue no guarantee that Edward Snowden will not be extradited to the US, should he visit the country. This a Norwegian court decided Monday. The court argues that such guarantees can not be given when it comes to someone who is not presently inside the country.

    • India goes from village to village to compile world’s biggest ID database

      The digital revolution arrives in remote Indian villages such as Akbarpur by communication methods old and new: a WhatsApp message buzzes through to the village chief; he notifies his fellows via megaphone.

      The world’s biggest biometric ID programme is coming to town.

      The next day, two men arrive at the village in Palwal district, Haryana state, with devices the residents have never seen: an iris scanner, a fingerprint machine, a camera and laptop. They are here to register the people of Akbarpur.

    • People Can’t Tell What Apps Use Encryption, And Don’t Really Care, Study Finds

      Is your messaging app using encryption? And, actually, do you even care about that?

      Even though people have more choices than ever when using mobile messaging apps billed as secure and private, and surveillance and encryption have been steadily in the news for the last few years, some consumers don’t seem to really grasp what an encrypted app actually is, and they might not really care that much, according to a new study.

      [...]

      The researchers conducted the study trying to figure out how much users, both security experts and regular people, cared about security and privacy when choosing and using messaging apps.

      As it turns out, when choosing apps, the main motivation is whether other people, mainly “friends,” use it, not whether it’s secure or private, according to the study.

      [...]

      Another participant said he or she stopped using an (unnamed) app after news of a privacy incident, switching to a more secure alternative. But eventually, he or she had to go back to the original messenger because it’s “too dominant” among his friends.

  • Civil Rights/Policing

    • US Suddenly Discovers Why Supranational Tribunals Are A Problem, Just As It Starts Losing In Them

      As the article explains, that’s not going down too well with other WTO members, including Brazil, the European Union, Japan, and South Korea, who are traditionally allies of the US in trade matters. So what exactly has Chang done to incur the wrath of the US?

    • White Supremacists Are Met With Rocks in Sacramento and Scorn in Newcastle

      As my colleague Glenn Greenwald argues, it is too simple to suggest that last week’s rejection of the European Union by more than half of the British electorate, like Donald Trump’s victory in the Republic primary, can be explained by dismissing the voters as racists.

      In both countries, and across the Western world, xenophobic bigots who pin the blame on foreigners, and promise to restore prosperity by walling us off into ethnic-nationalist enclaves, have grown in prominence only after decades of failure by the traditional parties of left and right to find solutions for the suffering caused by the globalization.

      At the same time, however, it seems clear that the rhetoric of the referendum campaign in Britain, like Trump’s demonization of Mexican and Muslim immigrants, has emboldened the white supremacist fringe in ways too dangerous to ignore.

      As the British historian Victoria Stiles observed, the referendum result, which has been followed by a 57 percent spike in reported hate crimes, seems to have encouraged the kind of public displays of racism in Britain that make physical assaults more likely.

    • A Week in the Life of the American Police State

      Not content with merely spying on our emails and phone calls, the NSA wants to spy on thermostats, refrigerators, and pacemakers.

    • Canadian jailed in Iran over ‘feminism and security’ issues

      A Montreal-based university professor being held in an Iranian jail is being investigated for ‘dabbling in feminism and security matters,’ according to her family.

      Homa Hoodfar’s niece, Amanda Ghahremani, said the Tehran public prosecutor made a statement to Iranian media on the case on Friday.

      Ghahremani said the family doesn’t know whether Hoodfar has been charged with a crime.

      She said the prosecutor’s statement was the first indication of why the 65-year-old professor has been held in Iran’s notorious Evin prison since her arrest on June 6.

      “We’re very concerned that we have no news from her, that the family hasn’t been able to see her, that the lawyer hasn’t been able to see her, and we don’t know her mental state, her health, or the conditions of her detention,” Ghahremani told The Canadian Press.

  • Internet Policy/Net Neutrality

    • Europe’s ‘Net Neutrality’ Rules Fail to Ban BitTorrent Throttling

      After years of negotiating Europe has agreed on a set of Net Neutrality rules. While the legislation is a step forward for some countries, experts and activists warn that it may leave the door open for BitTorrent and VPN throttling. With the “EU Slowdown” campaign that launches today, they encourage the public to have their voice heard to improve the current rules.

    • Why ISPs’ fight against net neutrality probably won’t reach Supreme Court

      The US appeals court decision upholding the Federal Communications Commission’s net neutrality rules wasn’t quite the final word on the matter, as ISPs immediately vowed to appeal the ruling, with AT&T saying it “expect[s] this issue to be decided by the Supreme Court.”

      But while ISPs will give it their best shot, there are reasons to think that the Supreme Court won’t take up the case. The appeal probably won’t even make it to a rehearing by the full appeals court, a potential intermediate step before a Supreme Court case, legal expert Andrew Jay Schwartzman wrote last week in a Benton Foundation article titled, “Network Neutrality: Now What?” Schwartzman is a Georgetown Law lecturer, an attorney who specializes in media and telecommunications policy, and a longtime consumer advocate who previously led the Media Access Project.

  • DRM

    • Netflix hurt by Australian competitors and VPN blocking

      The news of explosive SVOD growth in Australia over the past year has not been good for the global market leader Netflix which finds that two well-resourced local competitors are nipping at its heels, while it appears to have cut off its nose to spite its face by blocking access to its big differentiator.

      As reported in iTWire this week, SVOD subscriptions would have grown by almost 900,000 during the 12 months to the end of June 2016.

      However, the main beneficiaries of that growth have been local players Stan (jointly owned by Nine Entertainment and Fairfax Media) and Presto (jointly owned by Foxtel and Seven West Media).

  • Intellectual Monopolies

    • A Comprehensive And Fair Solution To The Price Of Medicines

      Marie-Paule Kieny, World Health Organization Assistant Director-General, Health Systems and Innovation, writes: Amid public outcry, political battles and media articles, no one seems to understand how, exactly, medicines prices are set. For years, pharmaceutical research companies have cited the large investment of time and resources that go into bringing a drug to market. More recently, they argue that their medicines are actually saving money by preventing expensive medical interventions like surgery and hospitalization.

      But whatever the argument used, the price setting mechanisms for commodities that are inextricably linked to people’s health and survival must be made more transparent so that we can, as a global community, devise effective solutions.

    • Embassy In London Under Siege, IP A ‘Neo-Liberal Pillar’, Ecuador Minister Says

      Guillaume Long, Minister of Foreign Affairs and Human Mobility of Ecuador, who was fresh from a three-day visit to the UN in Geneva with several meetings, including with the UN High Commissioner for Refugees (UNHCR), and UN High Commissioner for Human Rights, said during a press briefing that he paid a visit to WikiLeaks founder Julian Assange on 19 June in the Ecuadoran embassy in London, on the 4th anniversary of his taking refuge in the embassy.

      Four years ago, Long said, Julian Assange walked into the embassy and asked for asylum. After two months of studying his request, Ecuador decided to grant Assange asylum on human rights grounds, Long said, in particular because there were fears of significant political persecution of Assange, he said.

      In particular, Ecuador was unable to obtain a guarantee that Assange would not be extradited to a third country, he said. Ecuador is not seeking to interfere with the Swedish judicial system but have been told by the United Kingdom government that it can neither confirm nor deny that Assange would be extradited.

      [...]

      On a separate issue, access to health and access to medicines are pillars of Ecuadoran policy, Long said today, answering a question from Intellectual Property Watch on the leading role that Ecuador has said it wanted to have in the management of intellectual property policy. In particular, Ecuador has issued a number of compulsory licences, allowing the production of generic versions of expensive brand name drugs.

      When criteria for compulsory licences are met, Ecuador will carry on issuing compulsory licences when the country has to do so. “We are in the confines of the WTO [World Trade Organization] and other bodies,” he said, as he underlined the country’s “progressive approach to IP.”

      “Intellectual property is the new free trade agenda, the new neo-liberal pillar,” he said. In most trade agreements, “intellectual property is massive.”

      “We are in a knowledge economy and a science and technology age, and a patenting age,” he added.

      Unfortunately, since the 1980s, he said, patenting has become much more recurrent and more lenient. There is a greater privatisation of knowledge which affects countries that are low producers of knowledge and do not have an innovation economy, he said.

      The more knowledge circulates, the more it becomes a public good, and the more innovation you can have, he explained. Although intellectual property is legitimate, the right balance should be struck, he said.

    • Copyrights

      • Two Judges Punch Holes In Copyright Trolls’ Claims That An IP Address Is The Same Thing As A Person

        Fight Copyright Trolls has tracked down two more court decisions that reach an obvious conclusion: an IP address is not a person. In both cases, the normal trolling tactics were used: legal threats against alleged infringers, based on nothing more than IP addresses. In the first case, New Jersey Judge Kevin McNulty disagreed with Malibu Media’s request for default judgment, pointing out that the limited info it was working with could not rule out a successful defense being raised by the accused infringer.

]]>
http://techrights.org/2016/06/29/alpine-linux-3-4-1/feed/ 0
Links 13/5/2016: ZFS in Debian, RBS Chooses Red Hat http://techrights.org/2016/05/13/rbs-chooses-red-hat/ http://techrights.org/2016/05/13/rbs-chooses-red-hat/#comments Fri, 13 May 2016 14:21:53 +0000 http://techrights.org/?p=92570

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • How Typography Can Save Your Life

    Since 1984 all cigarette packages have been required to include one of four specific health warnings, with the “SURGEON GENERAL’S WARNING” phrase set in capital letters. In 2009, President Obama signed a new law that would require larger labels with vivid graphics, but the tobacco industry put up a legal fight, and the new labels have been in limbo ever since.

    Companies can (and do) claim that they are trying to “emphasize” the important stuff by putting it in all caps. This is actually the reason so many legal documents and contracts have sections that seem to be shouting. You can blame U.S. law for this one (specifically, the Uniform Commercial Code) which requires that certain sections of a contract be “conspicuous.”

    Usually those guidelines apply to the parts of the contract that sound something like: “COMPANY X DOES NOT GUARANTEE THAT WE’LL KEEP ANY OF OUR PROMISES AND EVERYTHING IS AT YOUR OWN RISK.” Makes sense that those sections should be hard to miss.

    Except that in this case, making text “conspicuous,” also makes it harder to read. And that’s because of a historical quirk.

  • Science

    • After Nine Years Of Censorship, Canada Finally Unmuzzles Its Scientists

      It’s important to remember that Canada is not alone in having these muzzling problems. The article notes that during the administration of President George W. Bush, US government scientists complained that inconvenient data was being altered or simply suppressed. More recently, the UK government unveiled plans to forbid its scientists from lobbying for changes in their own field. Although it has now introduced some exemptions from the controversial “gagging clause”, these seem half-hearted and possibly temporary. It obviously needs to pay more attention to Justin.

  • Health/Nutrition

  • Security

  • Defence/Aggression

    • UK Russian Embassy tweets screenshot from Command & Conquer Generals

      The Russian Embassy in London has tweeted a screenshot from PC real-time strategy game Command & Conquer: Generals.

      The image, of three green army trucks, was posted with the accompanying text: “Extremists near Aleppo received several truckloads of chemical ammo.”

    • Remembering Michael Ratner, Pioneering Lawyer Who Fought for Justice from Attica to Guantánamo
    • Michael Ratner, Champion of Human Rights and the Oppressed, Dies at 72
    • Michael Ratner Is Gone; You’re Still Here
    • Michael Ratner, Pioneering Civil and Constitutional Rights Lawyer, Dies at Age 72
    • From the Archives: Michael Ratner on American Imperialism
    • Web Exclusive: Reed Brody & Michael Smith Remember Michael Ratner (Part 2)

      The trailblazing human rights attorney Michael Ratner has died at the age of 72. For over four decades, he defended, investigated and spoke up for victims of human rights abuses across the world. In this web-only interview, Reed Brody and Michael Smith pay tribute to their close friend.

    • Michael Ratner, Lawyer Who Won Rights for Guantánamo Prisoners, Dies at 72

      Michael Ratner, a fearless civil liberties lawyer who successfully challenged the United States government’s detention of terrorism suspects at Guantánamo Bay without judicial review, died on Wednesday in Manhattan. He was 72.

      The cause was complications of cancer, said his brother, Bruce, a developer and an owner of the Brooklyn Nets.

      As head of the Center for Constitutional Rights, Michael Ratner oversaw litigation that, in effect, voided New York City’s wholesale stop-and-frisk policing tactic. The center also accused the federal government of complicity in the kidnapping and torture of terrorism suspects and argued against the constitutionality of warrantless surveillance by the National Security Agency, the waging of war in Iraq without the consent of Congress, the encouragement of right-wing rebels in Nicaragua and the torture at the Abu Ghraib prison during the Iraq war.

      “Under his leadership, the center grew from a small but scrappy civil rights organization into one of the leading human rights organizations in the world,” David Cole, a former colleague at the center and a professor at Georgetown Law School, said in an interview this week. “He sued some of the most powerful people in the world on behalf of some of the least powerful.”

      Mr. Ratner, who majored in medieval English at Brandeis University in the 1960s, was radicalized by the teachings of the New Left philosopher Herbert Marcuse and the preachings of a classmate, Angela Davis, who went on to become a leading counterculture activist and American Communist and continues to teach and speak publicly.

    • U.S. Officials Ask How ISIS Got So Many Toyota Trucks

      Is Wallace saying to ISIS they better “buy American?” Is Wallace in the tank for ISIS? I don’t know.

    • Donald Trump Calls Hillary Clinton “Trigger Happy” as She Courts Neocons

      Donald Trump derided Hillary Clinton’s hawkish foreign policy record over the weekend, a glimpse into a potential general election strategy of casting Clinton as the more likely of the two to take the nation to war.

      Just moments after maligning Syrian refugees at a rally in Lynden, Washington, Trump pivoted into a tirade against Clinton as a warmonger.

    • State Department Fails to Vet or Monitor Military Aid to Egypt

      The U.S isn’t sufficiently vetting the sale of weapons to the repressive government of Egypt, and doesn’t know enough about how those weapons are being used – including night vision goggles and riot control weapons.

    • Obama Should Heed Hiroshima’s Survivors

      The Hiroshima Peace Memorial Park is a beautiful, haunting place. The most iconic landmark is the “A-bomb dome,” atop a large building that was not completely destroyed. As we left the memorial, Koji Hosokawa told us to stop. He looked us in the eye and told us not to forget the victims: “People lived here. They lived here.” President Obama should meet Koji Hosokawa and other hibakusha, and hear their stories.

    • Washington’s Military Addiction

      Put another way, in a Washington that seems incapable of doing anything but worshiping at the temple of the U.S. military, global policymaking has become a remarkably mindless military-first process of repetition. It’s as if, as problems built up in your life, you looked in the closet marked “solutions” and the only thing you could ever see was one hulking, over-armed soldier, whom you obsessively let loose, causing yet more damage.

    • Obama Broke Pledge To Demand Syrian Opposition’s Separation From Nusra Front

      The gradual erosion of the cease-fire in Syria over the past month is the result of multiple factors shaping the conflict, but one of the underlying reasons is the Obama administration’s failure to carry out its commitment to Russia to get US-supported opposition groups to separate themselves physically from the Nusra Front – the al-Qaeda organization in Syria.

    • A Need to Rethink Mideast Wars

      The request by a U.S. Army captain to a federal court for a declaratory judgment about his constitutional duties regarding going to war is the latest reminder of the unsatisfactory situation in which the United States is engaged in military operations in multiple overseas locales without any authorization other than a couple of outdated and obsolete Congressional resolutions whose relevance is questionable at best.

    • Army Chaplain Resigns over Drone Wars

      The U.S. government’s reliance on drones to sustain perpetual war in the Mideast is meeting resistance from some assigned to carry out and justify these tactics, including a U.S. Army chaplain who resigned in protest, writes Ann Wright.

    • George Zimmerman and the Long History of Selling “Souvenirs”

      Former neighborhood watch member George Zimmerman’s decision, one he has apparently reconsidered, to sell, as he describes, “the firearm that was used to defend my life and end the brutal attack from Trayvon Martin” is just an another link in the long chain of America’s historical obsession with selling and owning memorabilia connected with the murder of African Americans.

    • Baghdad gov’t paralysis made capital vulnerable to massive ISIL bombings

      Daesh (ISIL, ISIS) launched a series of suicide car and truck bombs in Baghdad on Wednesday, killing nearly 100 and wounding nearly 200 persons. Baghdad security had improved over the past couple of years, but the Coalition United for Reform blamed political wrangling on sectarian and party bases for the security lapses that allowed the attacks to take place. The president’s spokesman suggested that Prime Minister Haydar al-Abadi might need to fire some security officials responsible for the capital’s well-being for this major lapse.

    • Do British international relations scholars question British foreign policy enough?

      Recently I came across a 2006 article that Eric Herring published in the Journal of International Studies titled ‘Remaking the mainstream: the case for activist IR scholarship’. In the article Herring argues that “British IR [International Relations] academics… produce very little primarily empirical work which documents the record of the British state in creating human misery abroad”. In addition he goes onto note “British IR academics engage in very little research exposing the deceptions and self-deceptions deployed by the British state to deny its responsibility for that human misery”.

      A rare self-critical admission from an academic about his own work and that of his profession, Herring’s argument struck me as very important and deserving of a wider audience. Currently a Professor of World Politics and Research Director in the School of Sociology, Politics and International Studies at the University of Bristol, I asked Herring about his 2006 article and whether anything had changed ten years later.

    • Drone warfare: the cost of progress

      Hambling argues that although most people think of armed-drones as being large pilotless aircraft such as the Reaper and Predator, their development is being paralleled by much smaller devices such as the Lethal Miniature Aerial Munition System (LMAMS). The latter is suitable for use by individual soldiers, each of whom would carry small but lethal explosives with a range of several miles.

    • Former 9/11 Commissioner: ’28 Pages’ Clearly Expose Saudi Support

      Revealing serious fractures within the 9/11 Commission, a former member of that panel has called for the immediate declassification of the so-called “28 pages” that detail Saudi ties to the 2001 terrorist attack, saying they expose evidence that Saudi government officials were involved in the hijackers’ support network.

      “There was an awful lot of participation by Saudi individuals in supporting the hijackers, and some of those people worked in the Saudi government,” Republican John Lehman said in an interview with the Guardian published Thursday. Referring to the commission’s final report, issued in 2004, Lehman stated: “Our report should never have been read as an exoneration of Saudi Arabia.”

      He said recent claims made by the Commission’s former chairman and vice-chair—that only one Saudi government employee was “implicated” in supporting the hijackers, and that the Obama administration should be cautious about releasing the 28 pages because they contain “raw, unvetted material” but no “smoking gun”—was “a game of semantics.”

    • ‘Saudi Arabian government officials supported September 11 hijackers,’ former 9/11 Commission member claims

      A former member of the independent commission that investigated the September 11 terror attacks has claimed that Saudi government officials supported the hijackers.

      John F Lehman, who sat on the 9/11 Commission from 2003 to 2004, said there was an “awful lot of circumstantial evidence” implicating several employees in the Saudi Ministry of Islamic Affairs.

      “There was an awful lot of participation by Saudi individuals in supporting the hijackers, and some of those people worked in the Saudi government,” he told the Guardian.

  • Transparency/Investigative Reporting

  • Environment/Energy/Wildlife/Nature

    • Climate Disobedience and the New “Public Trust” Laws of Nature

      This ancient idea, applied since Roman days, is pretty straightforward: The government has an affirmative duty to protect natural resources that are shared by everybody. In the past, the doctrine has been used to prevent the selling off of lakefront shorelines or the bulldozing of rare fossil beds. With the clock ticking on the climate crisis, many legal scholars and activists have begun asking whether it’s time to put the public trust to work on climate change.

    • West Virginia Democrats Just Nominated A Climate Denying Coal Baron Billionaire For Governor

      In November, West Virginians will have two choices. A a party-switching, self-funding, brash billionaire who denies climate change and loves coal, and a lawmaker who talks about bringing jobs back to the state.

      And that’s just the gubernatorial race.

      On Tuesday night, Jim Justice easily won the West Virginia Democratic gubernatorial primary and will face off against Republican state Senate President Bill Cole in the general election.

    • Obama Just Cracked Down on Pollution From Fracking

      For the first time ever, the EPA will regulate methane emissions.

    • Coal made its best case against climate change, and lost

      Peabody Energy, the world’s largest private sector coal company (now bankrupt), recently faced off against environmental groups in a Minnesota court case. The case was to determine whether the State of Minnesota should continue using its exceptionally low established estimates of the ‘social cost of carbon’, or whether it should adopt higher federal estimates.

      The social cost of carbon is an estimate of how much the damages from carbon pollution cost society via climate change damages. In theory, it represents how much the price of fossil fuels should increase to reflect their true costs.

      The coal company called forth witnesses that represented the fringe 2–3% of experts who reject the consensus that humans are the primary cause of global warming, including Roy Spencer and Richard Lindzen, while their opposition invited witnesses like Andrew Dessler and John Abraham who represent the 97% expert consensus.

    • Brazil prepares to roll back green laws

      Taking advantage of Brazil’s present political turbulence, as the battle to impeach President Dilma Rousseff reaches its climax, reactionary politicians are quietly rolling back environmental and indigenous protection laws in defiance of the country’s commitments under the Paris Agreement.

      Environmentalists say that if the bill known as PEC 65/2012, now at the Senate committee stage, is approved, it means that major infrastructure projects will be able to go ahead regardless of their impacts on biodiversity, indigenous areas, traditional communities and conservation areas.

    • What Brazil’s New President Means For Its Environmental Laws

      As the suspension of Brazilian President Dilma Rousseff Thursday triggers a political reshuffling, environmentalists in Latin America’s largest ailing economy worry that powers in the new administration favor infrastructure development and financial recovery over environmental laws.

      As it is now customary in multiple countries, Brazil requires environmental assessments prior to construction projects. But the Senate is now considering a bill that would give fast-track status to projects like roads, dams or ports deemed in the national interest by the president. That would allow developers to move forward simply by saying an environmental impact study is in the works, but bar agencies from halting the project once construction begins. Moreover, there is a proposed constitutional amendment to eliminate environmental licensing altogether. These proposals aren’t new, but their political backing could get a push within Brazil’s new interim government.

    • Dilma Rousseff suspended as senate votes to impeach Brazilian president

      Speaking after the vote, Rousseff remained defiant, denying that she had committed any crime, and accusing her opponents of mounting a “coup”.

    • Brazil Senate Votes for Impeachment Trial as Rousseff Vows to Fight ‘Coup’
    • We Can Stop Searching For The Clean Energy Miracle. It’s Already Here.

      Key climate solutions have been advancing considerably faster than anyone expected just a few years ago thanks to aggressive market-based deployment efforts around the globe. These solutions include such core enabling technologies for a low-carbon world as solar, wind, efficiency, electric cars, and battery storage.

    • Beyond Climate Confusion: Why Both Energy Innovation and Deployment Matter
    • How Anti-Coal Bernie Sanders Won Coal Country

      If you know about West Virginia’s attitude toward coal, and you also know about Sen. Bernie Sanders’ (I-VT) attitude toward coal, then Tuesday night’s Democratic presidential primary results might have come as a bit of a surprise.

      Sanders — a staunch environmentalist pushing for more pollution regulations and a nationwide carbon tax — easily won West Virginia over his opponent Hillary Clinton on Tuesday. His win, some environmentalists said, was proof that you don’t have to be pro-coal to win in coal country.

    • BREAKING: EPA Finalizes Methane Rule For New Oil And Gas Operations
    • Six States Join TransCanada To Sue Obama Over Rejection Of The Keystone XL Pipeline

      Six states have joined with TransCanada to sue the Obama administration over its rejection of the Keystone XL pipeline permit application.

      TransCanada filed the suit in a federal court in Houston in January, alleging that the president had overstepped his constitutionally granted powers. The right to regulate trans-border commerce is reserved for Congress, the suit says.

      But the president denied the permit based on national security grounds, which is well within his rights, Center for Biological Diversity attorney Bill Snape told ThinkProgress.

      “They are basically asking the court to second-guess the president on a national interest decision,” Snape said.

    • ‘We’ll Do What It Takes To Stop It’: Kinder Morgan Pipeline in Crosshairs

      This weekend, hundreds of activists will encircle a Kinder Morgan facility in British Columbia on the ground and on the water, while demanding that Canada break free from fossil fuels, listen to science, and transition to a 100 percent renewable energy.

    • ‘Wholly Inadequate’: Environmentalists Decry EPA’s New Methane Rules

      Following President Obama’s promise to cut toxic methane leaks at oil and gas facilities, the Environmental Protection Agency (EPA) on Thursday announced the U.S. government’s “first-ever” set of standards to reduce such emissions—but the new regulations were decried by environmentalist critics as not far-reaching enough.

    • Old species have climate survival skills

      Study of more than 600 vertebrate species shows those that have faced extreme environmental pressures in the past are now best equipped to survive climate change.

    • Agriculture, A Huge Contributor To Climate Change, Is Starting To Clean Up Its Act
    • Bay Area Voters Will Decide Next Month If They Want To Pay To Adapt To Sea Level Rise

      California has long been a leader in tackling climate change. But in June, voters in the San Francisco Bay area will have the chance to take their state’s commitment to addressing the impacts of climate change and environmental degradation a step further.

    • Palm Oil Is Burning Indonesia to the Ground

      Fire is a tool in this part of the world, and every year Indonesian farmers burn down wild forest to make room for more pulpwood, rubber plantations and palm oil. But last year was different. The fires fed on peatland raged beyond control, consuming the timber that burns so easily in the country’s dry season. Indonesia became Hell on Earth, with satellites showing the length of the country swaddled in smoke. Borneo and western Sumatra, the worst-hit areas, glowed like embers. Acid haze poured over the borders and into Malaysia and Singapore and Thailand.

  • Finance

    • Illiberal Hollywood: Unchanged or Worse One Year Later

      Like Disney — two of its seven biggest films over the last decade were directed/written/led by women (Frozen, 2013), or led by a woman (Star Wars: The Force Awakens, 2015). Yet its stock is languishing, and its lineup thin of women-directed/-written/-led. Maybe its board needs a shakeup and its stock needs to tank a little further before they wake up and realize an audience composed of +51% of the population shouldn’t be slighted by its hiring practices. Same goes for the rest of the entertainment industry: we expect better, and soon.

    • TTIP leaks highlight the dangers of regulatory cooperation

      TTIP (Transatlantic Trade and Investment Partnership) has sparked a public outcry in Europe. The recent leak of many parts of TTIP by Greenpeace, allowing us for the first time to read the negotiating position of the US, confirms the most serious concerns.

    • Kill TTIP Now

      The evil of American “democratic capitalism” is total and irredeemable. TTIP gives corporations unaccountable power over governments and peoples. The corporations must be slapped down hard, fiercely regulated, and forced by threat of long prison sentences to serve the public interest, and not the incomes of the executives and shareholders who comprise the One Percent.

    • How A Giant Restaurant Conglomerate Teamed Up With Banks To Stiff Its Workers

      Workers at Darden Restaurants chains are routinely told they must accept prepaid debit cards instead of paychecks, according to a new report from the worker organization Restaurant Opportunities Center (ROC) United. A quarter of workers surveyed said they asked to be paid some other way and were told the cards are their only option.

    • As Wealthy Surge, U.S. Poor and Middle Class Incomes Have Gone Backward

      Middle- and low-income households in the U.S. made less money in 2014 than they did in 1999 as the middle class lost ground in almost 90 percent of the country’s metropolitan areas, a new analysis by the Pew Research Center released Wednesday has found.

      The report looked at 229 of the 381 federally designated “metropolitan statistical areas” in the U.S., from Seattle to Boston, which accounted for 76 percent of the nationwide population in 2014. It found that poorer households saw their income drop from a median of $26,373 in 1999 to $23,811 in 2014, while middle-class incomes fell from $77,898 to $72,919 in that same time period.

      The erosion of the middle class came as household incomes decreased, “a reminder that the economy has yet to fully recover from the effects of the Great Recession of 2007-09,” Pew said—but more than that, it is a reflection of rising income inequality.

    • Another Way the Rich Get Richer: Their Parents Give Them Obscene Amounts of Money Nearly Tax-Free

      It’d be great if we were all self-made men, like Citizen Trump.

      Of course, his self-making, like that of many wealthy people, is based in large part on a wealthy parent giving him a ton of money. Why work for a living when you can just hang around drinking single malt until daddy dies and leaves you his money?

      Trump’s papa left an estate valued at between $100 and $300 million in 1999. A nice start for a career in real estate for Don and his siblings.

    • The London Mayoral Election: a Victory for Whom?

      During his election campaign, Khan vowed to be “the most pro-business Mayor London has ever had”; stated his opposition to the “mansion tax”, the nationalisation of banks, and has pledged to work with the Tory government to defeat Corbyn’s push for a “Robin Hood Tax” – a fee on buying stocks, shares and derivatives publicly backed by the Labour leader last summer; and in recent weeks, Khan has described the fact that there are 140-plus billionaires and 400,000 millionaires in London as “a good thing” – echoing the haughty words of Labour’s true blue Tory Peter Mandelson,

    • London Summit: US Must End Tax ‘Hypocrisy’ or Corruption Will Prevail

      If the U.S. does not end its “hypocrisy” and hold itself to the same tax transparency standards as other nations, efforts to reform offshore secrecy will fail, leaders of the UK’s overseas territories warned at the global anti-corruption summit in London on Thursday.

      The comments—from leaders of the Cayman Islands, Bermuda, and the Isle of Man—came as U.S. Secretary of State John Kerry told those gathered at the summit, “Corruption, writ large, is as much of an enemy [as terrorism], because it destroys nation states, as some of the extremists we are fighting or the other challenges we face.”

      The summit follows a massive leak of documents known as the Panama Papers which exposed how the world’s elite use offshore tax havens to hide their wealth, including British Prime Minister David Cameron, who hosted the conference.

  • AstroTurf/Lobbying/Politics

    • Following Censorship Scandals, Obama Commits to ‘Fight Against Corruption’

      This just in from the Obama administration: corruption is bad, m’kay?

      No, seriously.

      Apparently, President Obama’s commitment to fighting corruption is so important that Secretary of State John Kerry actually felt the need to fly to London to reaffirm the United States government isn’t full of dirty rotten scoundrels who are just up to no good.

    • Parliament will fight to protect the BBC

      Today the government will publish a white paper setting out its plans for the future of the BBC. At the BAFTA awards on Sunday the director Peter Kosminsky rightly received a standing ovation. He used his acceptance speech to voice his fear that the White Paper will compromise our precious, independent, world-renowned organisation. He cautioned that the BBC was on a path to evisceration that would leave the broadcasting landscape bereft – and the output of television and radio determined solely by what lines the pockets of shareholders.

    • The BBC White Paper is a recipe for long-term decline

      The government’s proposals would be a blow to both the BBC’s freedom from government interference, and its place at the heart of British popular culture.

    • Decoding the BBC White Paper

      Apocalyptic rumours followed by a row-back and relief. It’s an age-old strategy, but what’s the reality behind the government’s BBC proposals?

    • Laura Kuenssberg Meet Barbra Streisand

      I have cropped this to protect the identity of the sender, but I assure you it is perfectly real and not at all unusual. (This is actually sexist on my part as if it were a man I would not have cropped it. I can only ask you to forgive me, I am old). I am sure Kuenssberg, being vastly more famous, gets more abuse than I do. But the fact either of us receives abuse does not mean we are above criticism. The young woman tweeting above being unpleasant is not evidence I am right about anything. Still less does it mean criticism of me should be suppressed.

      To say that abusers “hijacked” the petition criticising Kuenssberg for her terrible biased journalism, is like saying your car is hijacked by an insect landing on it.

      But the extremely cheerful news is that the furore caused by 38 Degrees removing the petition has meant that tens of millions more people have heard of the petition, than if it had gone ahead. David Cameron standing up in the House of Commons saying Kuenssberg is not biased in itself will have made a million people realise that she is. Laura Kuenssberg, meet Barbra Streisand. The “Streisand Effect”, named after the actress’ attempt to suppress photos of her mansion, is the internet phenomenon whereby attempts to suppress information lead to far more people knowing it.

    • Donald Trump’s Unsurprising Surprise

      Donald Trump’s ascension to the Republican presidential nomination was predictable, paved by years of right-wing fear-mongering and dissemination of anti-knowledge, says former GOP congressional staffer Mike Lofgren.

    • Will Trump’s ‘Man Card’ Play to Women?

      As the presidential election of 2016 unfolds, presumptive Republican nominee Donald J. Trump seems bent on proving a simple aphorism: No one ever went broke overestimating the misogyny of the American people.

      Trump continues to spew rhetoric seemingly designed to alienate women voters, prompting pundits and analysts to search for the strategic significance of such utterances. “Donald Trump has been playing the man card,” Kelly Dittmar of the the Rutgers Center for American Women and Politics told NPR’s Asma Khalid in an interview that aired on Tuesday.

      And lately, he seems to be micro-targeting the key domestic-violence constituency. At a campaign stop in Spokane over the weekend, Trump renewed his complaint against Democratic frontrunner Hillary Clinton for playing the so-called “woman’s card.”

  • Censorship/Free Speech

  • Privacy/Surveillance

    • Anti-virus pioneer John McAfee: Your phone may be snooping on you

      Computer security pioneer John McAfee pulls out his cell phone to stare at a notification on the screen.

      “It says something changed in my account, please press next,” McAfee says. “I have the best (security) habits in the world and I cannot keep my phone secure.”

      McAfee, whose name became synonymous with antivirus protection, says he’s no longer as worried about computer security. Now, he says, the danger comes from the camera and microphones we carry everywhere in our pockets, attached to our smartphones. It’s a “trivial” matter, he says, for a hacker to remotely and secretly turn on a phone’s sensors.

    • Surveillance: Who owns you and your life?

      There are many dimensions to the concept of privacy.

      A fundamental question is: Who owns you and your life?

      If you are not the owner of your person – that will open up for abominations like slavery, organ farming, and some absurd utilitarian concepts.

      But if you are the owner of your person – this must include your body as well as your mind and your faculties.

      So… if you are the owner of your person – does anybody else (a private person or a collective of persons) have the right to look into your mind, your thoughts and your beliefs? Does anybody else have the right to look into your relations to other people, your quest for knowledge or your personal habits and preferences?

    • 45,000 People Ask Netflix to Stop VPN Crackdown

      A letter signed by nearly 45,000 people calls upon Netflix CEO Reed Hastings to reverse the company’s broad VPN ban. To enforce geographical restrictions Netflix started blocking VPN users more aggressively this year, but according to OpenMedia there are better alternatives that respect the privacy of users.

    • FBI Has Sights on Larger Battle Over Encryption After Apple Feud

      After buying a software tool to access a dead terrorist’s encrypted iPhone, the FBI is exploring how to make broader use of the hack while bracing for a larger battle involving encrypted text messages, e-mails and other data, Director James Comey said.

    • While It Is Reauthorizing FISA Amendments Act, Congress Should Reform Section 704

      If it’s not that, then you would think it’d have to be the wacky interpretation, the middle option. After all, Americans are at least as likely to use Gmail as foreigners are, so to get the Gmail of Americans overseas, the NSA would presumably ask Google for assistance, and therefore trigger 703, unless there were a wacky legal interpretation to bypass that. There are things that make it clear NSA has a great deal of redundancy in its collection, even with PRISM collection, which makes it clear they do double dip, obtaining even Gmail overseas and domestically (which is why they’d have GCHQ hack Google’s overseas fiber). It’s possible, though, that the NSA conducts so much bulk collection overseas it is actually easier (or legally more permissive) to just collect US person content from bulk collections obtained overseas, thereby bypassing any domestic provider and onerous legal notice. I suppose it’s also possible that NSA now uses 703 (my proof they don’t dates to 2012 or earlier), having had to resort to playing by the rules as more providers lock up their data better in the wake of the Snowden revelations. (Note, Mieke Eoyang has an interesting FAA suggestion that would require exclusivity when NSA accesses content from US providers, thereby preventing them from stealing Google data overseas.)

    • Your Conversation On The Bus Or Train May Be Recorded

      When you ride on buses or trains in many parts of the United States, what you say could be recorded. Get on a New Jersey Transit light rail train in Hoboken or Jersey City, for example, and you might notice an inconspicuous sign that says “video and audio systems in use.”

      A lot of riders are not happy about it.

      “Yeah I don’t like that,” says Michael Dolan of Bayonne, N.J. “I don’t want conversations being picked up because it’s too Orwellian for me. It reeks of Big Brother.”

    • FBI Doesn’t Want Privacy Laws To Apply To Its Biometric Database

      The FBI has been building a massive biometric database for the last eight years. The Next Generation Identification System (NGIS) starts with millions of photos of criminals (and non-criminals) and builds from there. Palm prints, fingerprints, iris scans, tattoos and biographies are all part of the mix.

      Despite having promised to deliver a Privacy Impact Assessment of the database back in 2012, the FBI’s system went live towards the end of 2014 without one. That’s a big problem, considering the database’s blend of guilty/innocent Americans, along with its troublesome error rate. The FBI obviously hopes the false positive rate will continue to decline as tech capabilities improve, but any qualms about bogus hits have been placed on the back burner while the agency dumps every piece of data it can find into the database.

      The FBI has shown little motivation to address Americans’ privacy concerns by providing an updated Impact Assessment (the one it does have dates back to the program’s inception in 2008), but has wasted no time in alerting legislators about its own privacy concerns.

    • Was NSA surveillance used on refuge occupiers labeled as ‘domestic terrorists,’ lawyer asks

      Oregon standoff defendants want a federal judge to order prosecutors to disclose whether law enforcement intercepted their emails, phone calls or other electronic communications using national security surveillance methods.

      “Defendants are entitled to know how the government monitored their communications and activities and then to test … whether the government’s evidence is derived from that surveillance,” defense lawyer Amy Baggio wrote in a court filing Wednesday afternoon.

    • What former NSA chief Michael Hayden said after watching the new Snowden trailer

      “You’re gonna make me do this?” Michael Hayden, former NSA and CIA director, said to Business Insider before watching the “Snowden” trailer for the first time.

      After about 30 seconds, Hayden looked up from the iPad screen and said: “Could we be done?”

      Oliver Stone’s “Snowden” tells the story of NSA subcontractor Edward Snowden who infamously leaked classified information about the NSA’s surveillance activities to journalists in 2013. To Hayden, the portrayal is an “alternative universe.”

    • The NSA’s stunning 9/11 failure: How big-money contractors made us more vulnerable to attack

      On September 12, 2001, Bill Binney snuck back into work at the NSA dressed like cleaning staff so he could try to help understand who had attacked the United States. A top NSA mathematician, Binney had rolled out a sophisticated metadata analysis system called ThinThread, only to have it canceled less than a month before 9/11. Top executives at the agency had decided a clunky program called Trailblazer, contracted out to the intelligence contractor giant SAIC, would be NSA’s future, not the cheaper, more effective and privacy-protective ThinThread.

      While NSA Director General Michael Hayden had sent most NSA staffers home on 9/11 and the day after —hence Binney’s disguise — the contractors were hard at work. As Binney describes in “A Good American“ — a documentary about Binney due for wider release in September — some contractors working in his unit had gotten a warning. “While I was in there trying to look at the material on my computer, the president of the contracting group that I had working on ThinThread came over to me and said that he’d just been in a contractor meeting” with a former top SAIC official who moved back to NSA, supporting Trailblazer. The contractors, it turns out, were warned not to embarrass companies like SAIC, which (the implication is) had just failed to warn about the biggest attack on the United States since Pearl Harbor. “Do not embarrass large companies,” the former SAIC manager, according to Binney, said to the other contractor. “You do your part, you’ll get your share, there’s plenty for everybody.” Stay quiet about the failures that led to 9/11, and you’ll be financially rewarded.

    • FBI Won’t Say Whether It Bought These Gmail Password Stealing Boxes

      Ever heard of an “app interception system”?

      So-called app interception or cloud interception systems are small physical boxes that steal social media passwords, emails, Dropbox contents and more from smartphones of passers-by, all with no interaction from the target.

      Now, in response to Freedom of Information requests from Motherboard, the FBI has refused to neither confirm nor deny whether the agency has any contracts with two of the main companies selling such devices.

      “The mere acknowledgment of whether or not the FBI has any such records in and of itself would disclose techniques, procedures, and/or guidelines that could reasonably be expected to risk of circumvention of the law. Thus, the FBI neither confirms nor denies the existence of any records,” the responses to two requests read.

  • Civil Rights/Policing

    • Prison Telecom Monopolies ‘Evolve,’ Now Rip Off Inmate Families With Shoddy Video Services, Too

      We’ve noted a few times how interstate inmate calling service (ICS) companies have a disturbingly cozy relationship with government, striking (technically buying) monopoly deals that let them charge inmate families $14 per minute. Worse, some ICS companies like Securus Technologies have been under fire for helping the government spy on privileged inmate attorney communications, information that was only revealed after Securus was hacked late last year. Given the apathy for prison inmates and their families (“Iff’n ya don’t like high prices, don’t go to prison son!”) reform on this front has been glacial at best.

      As such, ripping off inmate families and delivering sub-par services continues unabated. As many prisons eliminate personal visits, these ICS firms have expanded revenues by pretending to offer next-generation teleconferencing services. But while slightly more economical ($10 for 20 minutes), apparently companies like Securus with no competitors, a captive audience, and no repercussions for sloppy technology haven’t quite figured out how to make this whole video chat thing work yet.

    • Amos Yee arrested again for charges of hurting religious feelings

      Amos Yee, the teenager who was found guilty for hurting the feelings of Christians and posting an obscene image online last year, was arrested by the police on Wednesday and since released on bail.

    • Amos Yee arrested for two offences

      Teenage blogger Amos Yee has been arrested again for offences under two sections of the Penal Code – a year after he was convicted of wounding the feelings of Christians and uploading an obscene image.

    • Singaporean blogger Amos Yee arrested

      Police told the newspaper that Yee had violated sections of Singapore’s Penal Code after he published a YouTube video in November last year.

    • Blogger Amos Yee arrested again

      Teen blogger Amos Yee has been arrested again, a year after he was convicted of wounding the feelings of Christians and uploading an obscene image.

    • Amos Yee arrested on Wednesday

      Teenage blogger Amos Yee, whose online comments on religion prompted police reports to be lodged against him, has been arrested, his former lawyer Alfred Dodwell confirmed. Yee was arrested on Wednesday (May 11), said Mr Dodwell, who was contacted by Yee’s mother seeking help.

    • Court Denies Immunity To Law Enforcement Officer Who Arrested Crew Sent To Clean Out His Foreclosed House

      Lieutenant Timothy Filbeck of the Butts County Sheriff’s Department found himself in a not-at-all unusual situation: his home was being foreclosed upon. Like many others who have undergone this process, Filbeck was served with a variety of notices explaining the steps of the process and warning him of the consequences of not complying.

      Filbeck moved out of the doomed home and into a family member’s. This would apparently be the last rational thing he would do in response to the foreclosure. The insurance company for the bank inspected the home four times before coming to the conclusion it had been abandoned by Filbeck. The utilties had been turned off and “cobwebs extended from wall to wall in every room.”

      When the company began preparing the house for auction, things started to get interesting. Employees spent a day cleaning the house out and removing any abandoned property inside it. At some point, Filbeck apparently decided to drop by his old house and noticed the things he had left behind were missing. He could have contacted any of the companies involved in the foreclosure proceedings. He could have done nothing after realizing that leaving a foreclosed house abandoned tends to result in the removal of property also considered abandoned. The Eleventh Circuit Court of Appeals notes that Lieutenant Filbeck chose “none of the above.”

    • BBC’s Rupert Wingfield-Hayes and team expelled from North Korea

      BBC correspondent Rupert Wingfield-Hayes and his team have been expelled from North Korea after being detained over their reporting.

      Our correspondent, producer Maria Byrne and cameraman Matthew Goddard were stopped by officials on Friday as they were about to leave North Korea.

    • Myth of the Ferguson Effect Is Hard to Kill

      The myth of the widely debunked “Ferguson effect” on policing is hard to kill. FBI Director James Comey once again raised the specter of the impact of protests against police brutality on police effectiveness yesterday, when he made comments suggesting that a spike in violent crime in some cities may be correlated to officers’ fear of doing their jobs because of community hostility and the growing popularity of cop watching.

    • What’s Missing From The Conversation About Education Reform? Student Voices.

      The education law that President Obama signed at the end of last year to replace No Child Left Behind, called the Every Student Succeeds Act, has garnered widespread bipartisan support. The legislation is particularly popular among states and teachers, who hope that ESSA will allow them to play a larger role in shaping the education system.

    • How Obama’s Efforts to Free Drug War Prisoners Are Being Stymied by His Own Bureaucrats

      With the sentence commutations announced last week, President Barack Obama has now cut more than 300 harsh drug war prison sentences, besting the previous six presidents combined. Thousands more could be eligible for commutations, but bureaucratic obstacles inside the Justice Department mean the clock is likely to run out before Obama gets a chance to free them.

    • Ferguson’s New Police Chief Slams Crooked Cops in First Speech

      The Ferguson police department has been in turmoil since the August 2014 killing of Michael Brown—but a newly appointed police chief hopes to correct the deep-seeded wrongs. It starts with clearing the department of crooked cops, which is the new police chief’s goal.

    • U.S. Government Agencies Probe Sexist Hiring Practices In Hollywood
  • Internet Policy/Net Neutrality

    • Comcast, Wireless Industry Using ‘Diversity’ Groups To Oppose Net Neutrality, Fight Cable Set Top Box Reform

      We’ve noted several times how one of the sleaziest lobbying tactics in telecom is the co-opting of minority or “diversity” groups to support policies that actually hurt these groups’ constituents. Such theater benefits large telecom companies by presenting the illusion of broad support for what usually are extremely anti-consumer (or anti-small business and startup) policies. And it’s not just minority groups being used in such fashion; telecom lobbyists have long used “retired seniors,” hearing impaired groups and cattle rancher associations to push bad policy.

      This kind of disinformation is pervasive, incredibly destructive, and common practice in everything from the construction industry to patent reform.

      But telecom lobbyists have long been masters at this particular game. It works something like this: an ISP like Comcast (or some other telecom-affiliated lobbying group) will help fund a group’s new event center. In exchange, these groups parrot any policy Comcast puts forth, be it opposition to net neutrality or support for the latest merger. Quid pro quo obligations are never put in writing, letting these groups claim their positions only coincidentally mirror that of their donors.

    • Germany to Rescind Piracy Liability for Open Wifi Operators

      People operating open WiFi networks in Germany have long risked being held liable for the actions of those using them. However, to the relief of thousands of citizens that position will change later this year after the country’s coalition government decided to abolish the legislation which holds operators responsible for the file-sharing activities of others.

  • DRM

    • An Open Letter to Members of the W3C Advisory Committee

      Dear member of the World Wide Web Consortium’s Advisory Committee,

      You may have heard that over the past year we’ve been trying to insert legal safeguards into the Encrypted Media Extensions project at the W3C, which standardizes streaming video DRM. We’ve previously been opposed to the W3C adopting EME, because of the legal issues around DRM, and because DRM requires user agents to obey third parties, rather than their owners.

      However, we think that there’s a compromise that both DRM advocates and opponents should be able to live with.

      I’m writing today to see if you will support us in an upcoming W3C vote on the charter of the Media Extensions Group, where we will be proposing this compromise.

      This letter briefly describes briefly the problem, our proposed solution, and what you can do to help.

  • Intellectual Monopolies

    • US President Signs New Trade Secrets Law

      US President Barack Obama yesterday signed into law a measure aimed at strengthening trade secret protection including by allowing federal courts to hear cases involving trade secret theft.

    • At The Behest Of Big Pharma, US Threatens Colombia Over Compulsory Licensing Of Swiss Drug

      As Techdirt readers well know, Big Pharma really hates compulsory licensing of its patented drugs, where a country steps in and allows an expensive drug to be made more cheaply in order to provide wider access for its people. Such massive pressure is applied to nations contemplating this move, that even global giants like India quail. A new story is unfolding that reveals just how far companies are prepared to go in order to prevent it from happening. It concerns Colombia’s possible use of a compulsory license for the drug imatinib, sold under the name Glivec, and used to treat leukemia. Despite the fact that the company holding patents on the drug, Novartis, is Swiss, the US has started to lean heavily on Colombia in order to persuade it not to go ahead with the move.

    • Trademarks

      • Remembering Andy Grove, and maybe just the most audacious trademark ever

        There are two slogans that will be ever-identified with Andy Grove. The first is “Intel Inside”, while the second is “Only the Paranoid Survive”, the title of his 1996 book in which he emphasizes the importance of a company to avoid complacency, if it hopes to stay ahead of its competitors. The Economist magazine, in its remembrance of Andy Grove, could have chosen either slogan as best capturing Grove’s legacy. It chose to entitle the piece– “The man who put Intel inside”.

    • Copyrights

      • New UK copyright enforcement strategy: “Track down” infringers, brainwash kids

        The Intellectual Property Office has outlined harsher approaches towards copyright, trademark, and patent enforcement in the UK over the next few years.

        Rather than the “notice and takedown” approach currently used for handling copyright infringement, the UK government is mulling the idea of advancing it to “notice and trackdown,” although the details are not yet clear.

        Beyond increased enforcement, it appears that the IPO also wants to educate consumers and users of “the benefits of respecting IP rights, and do so.” The IPO wants to get ‘em young, too, by encouraging “greater respect” for copyright among children and students.

        These new strategies are outlined in a new UK government paper called “Protecting creativity, supporting innovation: IP enforcement 2020.” The document sets out how it will make “effective, proportionate and accessible enforcement of IP rights a priority for the next four years.”

      • Gene Kelly’s Widow Claims Copyright In Interviews Done By Gene Kelly, Sues Over Academic Book

        Another day, another story of copyright being used for censorship, rather than as an incentive to create. Here’s the headline: Gene Kelly’s widow is suing to stop an academic book exploring various interviews that were done over the decades with the famed actor/dancer. And here’s the lawsuit, in which Kelly’s widow, Patricia Ward Kelly, who was married to Gene Kelly for the last seven years of his life, claims that she holds the copyright on every interview that Kelly ever did.

      • Techdirt Reading List: Copyfight: The Global Politics Of Digital Copyright Reform
      • Copyright and consequences: Google’s Andy Rubin defends Android to jury

        During hours of unrelenting cross-examination today, Andy Rubin, Google’s former Android chief, was on the stand in the Oracle v. Google trial defending how he built the mobile OS.

        Rubin’s testimony began yesterday. He’s another one of the star witnesses in this second courtroom showdown between the two software giants in which Oracle has said it will seek up to $9 billion in damages for Google’s use of certain Java APIs in the Android operating system. Since an appeals court decided that APIs can be copyrighted, Google’s only remaining defense in this case is that its use of those APIs constitutes “fair use.”

      • Stakes Are High In Oracle v. Google, But The Public Has Already Lost Big

        Attorneys for the Oracle and Google companies presented opening statements this week in a high-stakes copyright case about the use of application-programming interfaces, or APIs. As Oracle eagerly noted, there are potentially billions of dollars on the line; accordingly, each side has brought “world-class attorneys,” as Judge William Alsup noted to the jury. And while each company would prefer to spend their money elsewhere, these are businesses that can afford to spend years and untold resources in the courtroom.

        Unfortunately, the same can’t be said for the overwhelming majority of developers in the computer industry, whether they’re hobbyist free software creators or even large companies. Regardless of the outcome of this fair use case, the fact that it proceeded to this stage at all casts a long legal shadow over the entire world of software development.

      • The biggest problem for the Oracle v. Google retrial: Judge Alsup’s reality distortion field

        For purely emotional reasons, this retrial appears rigged to me. Various pretrial decisions didn’t seem evenhanded to me, with Google perhaps benefiting from Judge Alsup’s frustration with the fact that his highest-profile IP ruling was nullified by three higher judges than him. Judge Alsup would, of course, benefit from a final decision in Google’s favor in the sense that his 2012 non-copyrightability blunder would then be deemed inconsequential in retrospect.

      • Sun’s Jonathan Schwartz at trial: Java was free, Android had no licensing problem

        Former Sun Microsystems CEO Jonathan Schwartz took the stand today in the second Oracle v. Google trial, testifying about how the Java language and APIs were used while he was at Sun’s helm.

        After a brief overview of his career path, Schwartz launched into a discussion about Java, a software language that Sun created and popularized. It’s critical testimony in the Oracle v. Google lawsuit, in which Oracle claims that Google’s use of Java APIs, now owned by Oracle, violates copyright law. Oracle is seeking up to $9 billion in damages.

        Was the Java language, created by Sun Microsystems in the 1990s, “free and open to use,” Google lawyer Robert Van Nest asked?

]]>
http://techrights.org/2016/05/13/rbs-chooses-red-hat/feed/ 0
Australia Might be Next to Block Software Patents If Commission’s Advice is Followed http://techrights.org/2016/04/29/software-patents-in-australia-input/ http://techrights.org/2016/04/29/software-patents-in-australia-input/#comments Fri, 29 Apr 2016 12:21:27 +0000 http://techrights.org/?p=92188 Aussie money

Summary: Australian advice against software patents, which can hopefully influence Australian politicians and put an end, once and for all, to all software patents in Australia

Australia’s long fight over the issue of software patenting was covered here in the not-so-recent past. It was about half a decade ago. See the following articles for instance, as well as this Wiki section (Australia):

We also mentioned Australia’s stance more recently in articles such as:

In a nutshell, while Australia does not officially boast tolerating patents on software, it does in fact allow many of them, unlike New Zealand.

There was some good news in this morning’s press coverage as according to this article, titled “Dump software patents, allow geoblocking bypass: Productivity Commission,” things may be about to change:

Australia should remove the ability to patent software and allow consumers to circumvent geoblocking of services like Netflix, the Productivity Commission recommended today.

The commission today published a set of far-reaching draft recommendations to the government to redress the balance of intellectual rights away from rights holders and in favour of users.

Among its recommendations, the commission said Australians should be able to access online content in a timely and affordable manner.

Echoing the findings of both the Harper competition review and the parliamentary inquiry into IT pricing, the Productivity Commission said restrictions by rights holders were having the opposite effect and actually encouraging internet piracy.

[...]

Australia’s patent system similarly needs an overhaul, according to the commission.

It believes the system is poorly targeted, with some “inventions” bordering on trivial and being protected for too long.

This creates low quality patents, stymies competition, and frustrates efforts of follow-on innovators while raising costs for the entire nation, the commission argued.

Business methods and software should not be able to be patented, the commission said, as it discourages software innovation and provides strong incentives to block competitors and hinder software development.

Australia currently affords “excessive” patent protection to business methods and software, with terms longer than development cycles, it said.

The commission pointed to the open source movement as providing incentives to innovate and disseminate new software without the need for patent protections.

As copyright also covers software, the commission said this raises the question about whether multiple forms of intellectual property protection is needed for computer code.

It said excluding business methods and software from the patent system would bring Australia in line with other nations.

Here is what CBS (US) wrote about it:

Business methods and software (BM&S) should be completely excluded from being patentable, the commission recommended, because the patent term is “far longer than the development cycle of BM&S”. It pointed to open-source software as proof of a more beneficial alternative for the community.

“[BM&S] patents have rarely spurred software innovation, but provided strong incentives for strategic behaviour to block competitors and hinder software development,” the draft report argues.

“In some cases, the BM&S is obsolete by the time a patent for it is granted … The open-source movement demonstrates that incentives to innovate and disseminate new software can occur in the absence of patent protections.”

Australia is evidently close to officially banning such patents, but only if it follows the Commission’s findings. This would be well overdue. Here is another article which speaks about patent scope a little more broadly:

Other recommendations include not extending the period of protection for registered designs, fine-tuning the trade marks and plant breeders statutes, belatedly including an Objects clause in the Patents Act, rethinking the controversial ‘innovation’ patents arrangements and bringing intellectual property transactions under Australian competition law. Efforts to streamline the regime will involve substantial investment in the Patents Office and dysfunctional Therapeutic Goods Agency. We can expect patent practitioners to savage the Commission’s stance on what it regards as trivial patents, alongside its call to deny business patents and software patents. ‘Big Pharma’ will again damn calls to wind back practices such as evergreening, extended periods of protection for pharmaceuticals and undue protection for test data.

Many other articles alluded to this but focused on pharmaceutical patents and/or geo-blocking for more attention to be placed on these other contentious issues [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19].

Is Australia going to do the right thing, which software developers actually want, and ban software patents? Contacting one’s representatives might help bring rise to bills to that effect in the Australian authorities.

]]>
http://techrights.org/2016/04/29/software-patents-in-australia-input/feed/ 0
Links 21/4/2016: KDE Applications 16.04, New *buntu LTS Releases http://techrights.org/2016/04/21/new-ubuntu-lts-releases/ http://techrights.org/2016/04/21/new-ubuntu-lts-releases/#comments Thu, 21 Apr 2016 12:38:34 +0000 http://techrights.org/?p=91950

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • How British Gas Connected Home is moving beyond Hive and managing an “explosion” of IoT data using an open-source Apache stack

    Connected Home, the IoT offshoot of British Gas, knew it wanted an open source solution for its vastly growing pool of data and connected devices, now its looking at how to leverage this technology for its customers

    For anyone that watches television or listens to the radio in the UK, Hive is the connected thermostat device British Gas advertises with a catchy jingle which: “Controls your heating, from your phone.”

    What they won’t be aware of is the explosion of data a connected device like Hive drives back to its parent company, Connected Home, a business unit launched by British Gas in 2012 to operate along lean, start-up principles.

  • Small Business Project Management Software: A Look at ProjectLibre

    Change happens in every business. Whether it’s a move to a new office, a new product launch, or a total restructuring, careful planning is essential to execute changes smoothly. But why use project management software?

    While it’s possible to manage a small project with an Excel worksheet, small business project management software is a smarter choice. It helps you identify all the required tasks, allocate those tasks to the right people, and make sure your people complete those tasks on time.

  • Modeling Avengers: Open Source Technology Mix for Saving the World

    Cedric Brun is the CTO of Obeo, leads the EcoreTools and Amalgamation components, maintains the Modeling Package, and is a committer on Sirius, Acceleo, Mylyn. Benoit Combemale is an associate professor at the University of Rennes, and is a research computer scientist at IRISA and INRIA. He is co-author of two books, and a member of the ACM and the IEEE.

  • Open Source Blockchain Effort for the Enterprise

    The Hyperledger Project today is also announcing ten new companies are joining the effort and investing in the future of an open blockchain ledger: Blockstream, Bloq, eVue Digital Labs, Gem, itBit, Milligan Partners, Montran Labs, Ribbit.me, Tequa Creek Holdings and Thomson Reuters.

  • Events

    • First Brno Linux Desktop Meetup

      The desktop engineering team in the Red Hat office in Brno is quite large, we’ve got over 20 developers working on various desktop projects here, but there is no active community outside Red Hat. We’re also approached by students who are interested and would like to get started, but don’t know where and we’d like to have an event to which we can invite them, talk to them about it more in detail, and help them with things beginners struggle with.

    • ZeMarmot and GIMP at GNOME.Asia!

      While Libre Graphics Meeting 2016 barely ended, we had to say Goodbye to London. But this is not over for us since we are leaving directly to India for GNOME.Asia Summit 2016. We will be presenting both ZeMarmot, our animation film project made with Free Software, under Libre Art licenses, and the software GIMP (in particular the work in progress, not current releases), as part of the team. See the » schedule « for accurate dates and times.

    • Want more inclusivity at your conference? Add childcare.

      Providing conference childcare isn’t difficult or expensive, and it makes a huge difference for parents of young children who might want to come. If your community wants to (visibly!) support work-life balance and family obligations — which, by the way, still disproportionately impact women — I urge you to look into providing event childcare. I don’t have kids myself — but a lot of my friends do, and someday I might. I’ve seen too many talented colleagues silently drop out of the conference scene and fade out of the community because they needed to choose between logistics for the family they loved and logistics for the work they loved — and there are simple things we can do to make it easier for them to stay.

    • Roaming Teach-in for Digital Freedom (Washington, DC)
    • #LGM16

      Today I want to tell you about a conference that I really wanted to go to for 2 reasons: 1 – it was about open source graphics, 2 – it was in London =) You probably guessed it – it’s Libre Graphics Meeting.

  • SaaS/Back End

  • Healthcare

    • Slovenia modelling new eHealth services

      To build the data model, the researchers used OpenEHR – publicly developed specifications for health information systems and building clinical models. The tool is user-friendly for both medical experts and IT specialists, says Rant. “OpenEHR helps both groups to understand one another, improving collaboration.”

  • Pseudo-Open Source (Openwashing)

  • Funding

  • FSF/FSFE/GNU/SFLC

  • Public Services/Government

    • Finland organises hackathon on government budget

      “We want to inspire a broad range of experts, including economists, social scientists, behavioural scientists, designers, and of course software developers”, the ministry explains in its introduction. “We believe that the budget needs to be looked at in many different ways, and that combining different kinds of knowledge and experience, produce the best results.”

    • Study: Cross-border eGov services low on agenda

      Cross-border eGovernment services score low on national policy agendas, according to a study on cross-border cooperation between the Nordic countries. Well-organised, national eID infrastructures are not interconnected, the report says.

  • Openness/Sharing/Collaboration

    • Ukrainian Parliament to become more open

      Launched in 2012, the Declaration on Parliamentary Openness is a set of shared principles “on the openness, transparency and accessibility of parliaments supported by more than 140 organizations from over 75 countries”, said OpeningParliament.org, the project’s platform. OpeningParliament.org defines itself as “a call to national parliaments, and sub-national and transnational legislative bodies, by civil society parliamentary monitoring organizations (PMOs) for an increased commitment to openness and to citizen engagement in parliamentary work”.

    • Open Data

      • A Cycling Map

        For a couple of years now, I have been mapping the rural roads around here in OpenStreetMap. This has been an interesting process.

    • Open Hardware/Modding

  • Programming/Development

    • All Star Code Summer Intensive FAQ

      The All Star Code initiative prepares qualified young men of color for jobs in the tech industry by providing mentorship, industry exposure, and intensive training in computer science. This year’s All Star Code Summer Intensive program runs from July 11 to August 19. Here, All Star Code answers our questions about the program and tells us how to get involved.

    • Q&A: Gene Kim explains the joy of devops

      Devops is one of those volatile topics that mixes human behavior patterns with technology, often yielding dramatic increases in productive output — that is, more high-quality software at a much faster pace. It’s a fascinating area. But is devops fascinating enough for a novel?

    • Decoding DevOps, Docker, and Git

      Even as accepted standards on how to do it “right” remain elusive, DevOps is a crucial element of modern IT. Corey Quinn, director of DevOps at FutureAdvisor, has immense experience in operations and DevOps. I had an opportunity to talk to him ahead of his two talks at LinuxFest Northwest 2016: Terrible ideas in Git and Docker must die: Heresy in the church of Docker.

  • Standards/Consortia

Leftovers

  • The Strange Case of Tony Blair, Gordon Brown and the McCanns

    This again is absolutely not the norm. On a daily basis more British citizens have contact with foreign authorities than the total staff of the FCO. It would be simply impossible to give that level of support to everybody. Plus, against jingoistic presumption, a great many Brits who have contact with foreign police are actually criminals.

  • ‘Accuracy is for snake-oil pussies’: Vote Leave’s campaign director defies MPs

    “Can you go back to your seat please?” asked Andrew Tyrie, chair of the Treasury select committee as Dominic Cummings hovered menacingly over his shoulder.

    Cummings, Vote Leave’s campaign director, had no intention of going anywhere. Going back to his seat would be a victory for the cesspit of Brussels. Instead he stood over Tyrie, pointing at his phone.

    “I’ve got another meeting at four, so I’ll have to be out of here before that,” Cummings insisted, sticking it to the Man.

    “I don’t think you’ve got the hang of these proceedings,” Tyrie replied evenly. “We ask the questions and you stay and answer them.”

  • Science

    • Machine Learning and AI Coming Soon to Networking

      Machine learning and artificial intelligence have gained notoriety among the general public through applications such as Siri, Alexa or Google Now. But, beyond consumer applications, these new hot areas of innovation are bringing unbelievable benefits to the different components of IT infrastructure that enable it, said

      David Meyer, Chairman of the Board at OpenDaylight, a Collaborative Project at The Linux Foundation, in his presentation at the DevOps Networking Forum last month.

    • SpaceX Falcon booster comes full circle to Cape Canaveral after landing at sea

      Eleven days after a thrilling landing at sea, SpaceX’s Falcon 9 rocket booster is coming back to the company’s space-age garage in Florida, in preparation for engine tests and potentially the first-ever reuse of its rocket hardware.

  • Health/Nutrition

    • 12 reasons why tea is better than coffee
    • Criminal Charges Filed in the Poisoning of Flint’s Water Supply

      Three Michigan state and local officials have been criminally charged for their involvement in the Flint water contamination crisis. The water crisis began when Flint’s unelected emergency manager, appointed by Governor Rick Snyder, switched the source of the city’s drinking water from the Detroit system to the corrosive Flint River. The water corroded Flint’s aging pipes, causing poisonous levels of lead to leach into the drinking water.

    • Antibiotics Have Given Us Untreatable Gonorrhea

      Gonorrhea is like an extremely persistent garden weed. As far as sexually transmitted diseases go, it’s relatively easy to get and requires a multipronged offensive to annihilate. And even if you’ve thwarted it once already, you’re still left vulnerable to reinfection.

      So far, doctors have been pretty damn good at treating the disease, which is partially why England’s public health agency has just sounded the alarm over a rise in “super-gonorrhea” among Brits.

    • Prescription meds get trapped in disturbing pee-to-food-to-pee loop

      If you love something, set it free… so the old adage goes. Well, if the things you love are pharmaceuticals, then you’re in luck. Through vegetables and fruits, the drugs that we flush down the drain are returning to us—though we’ll ultimately pee them out again. (Love is complicated, after all)

  • Security

    • Tuesday’s security updates
    • Security advisories for Wednesday
    • Red Hat Product Security Risk Report: 2015

      This report takes a look at the state of security risk for Red Hat products for calendar year 2015. We look at key metrics, specific vulnerabilities, and the most common ways users of Red Hat products were affected by security issues.

      Our methodology is to look at how many vulnerabilities we addressed and their severity, then look at which issues were of meaningful risk, and which were exploited. All of the data used to create this report is available from public data maintained by Red Hat Product Security.

    • April security sensationalism and FUD

      If you happen to follow the security scene, you must have noticed a lot of buzz around various security issues discovered this month. Namely, a critical vulnerability in the Microsoft Graphics Component, as outlined in the MS16-039 bulletin, stories and rumors around something called Badlock bug, and risks associated using Firefox add-ons. All well and good, except it’s nothing more than clickbait hype nonsense.

      Reading the articles fueled my anger to such heights that I had to wait a day or two before writing this piece. Otherwise, it would have just been venom and expletives. But it is important to express myself and protect the Internet users from the torrent of pointless, amateurish, sensationalist wanna-be hackerish security diarrhea that has been produced this month. Follow me.

    • DRAM bitflipping exploits that hijack computers just got easier
    • PacketFence v6.0 released

      The Inverse team is pleased to announce the immediate availability of PacketFence 6.0. This is a major release with new features, enhancements and important bug fixes. This release is considered ready for production use and upgrading from previous versions is strongly advised.

    • [Old] The Athens Affair

      How some extremely smart hackers pulled off the most audacious cell-network break-in ever

    • Write opinionated workarounds

      A few years ago, I decided that I should aim for my code to be as portable as possible. This generally meant targeting POSIX; in some cases I required slightly more, e.g., “POSIX with OpenSSL installed and cryptographic entropy available from /dev/urandom”. This dedication made me rather unusual among software developers; grepping the source code for the software I have installed on my laptop, I cannot find any other examples of code with strictly POSIX compliant Makefiles, for example. (I did find one other Makefile which claimed to be POSIX-compatible; but in actual fact it used a GNU extension.) As far as I was concerned, strict POSIX compliance meant never having to say you’re sorry for portability problems; if someone ran into problems with my standard-compliant code, well, they could fix their broken operating system.

  • Defence/Aggression

    • Media Pretend Not To Know About British Boots on the Ground in Libya

      Yesterday Philip Hammond, UK foreign secretary, visited a naval base in Tripoli to be shown docking facilities for British military vessels. The authoritative Jane’s Defence Weekly published that the 150 strong amphibious Special Purpose Task Group of commandos and special forces is in the Mediterranean on the amphibious warfare vessel Mounts Bay. Obviously purely a coincidence with Hammond’s visit!

      Just as in Syria and in Yemen it will not be admitted that British forces are in combat. In classic Cold War fashion, they are “military advisers and trainers.” There is a specific development which disconcerts me in Yemen, where the SAS operatives supporting the devastating Saudi bombings of the Houthi population have been seconded to MI6. There is a convention that military operations are reported to Parliament and MI6 operations are not, so the sole purpose of screening the SAS as MI6 is to deceive the UK’s own parliament.

    • China tests ICBM capable of striking US within half an hour

      Beijing has successfully tested a new long-range ballistic missile capable of engaging any potential target worldwide. The rocket takes just 30 minutes to cover its maximum 12,000km range and can deliver multiple strikes on any nuclear-capable state.

    • Letter from the Netherlands

      (2) The Neths. has ordered 37 fighter jets F35s with hook ups for 20 odd upgraded nukes to be stored on Dutch soil. In case of war Dutch pilots are to drop these on targets to be determined by the US. Belgium, Germany and Italy have the same arrangement.

    • War, Football, and Realism: If Any

      From the footballer’s point of view, the United States won in Iraq. It killed huge numbers of people while losing few, destroyed whole cities, and never lost a battle. Yet it got none of the things it wanted: a puppet government, permanent large military bases, and the oil. A dead loss. If anybody won, they were Israel and Iran. In Afghanistan, America as usual devastated the country and killed hugely and with impunity, thus winning the football game – but accomplished nothing.

    • Obama knows 9/11 was linked to Saudi Arabia – its massive oil reserves are behind his official visit
    • Saudi diplomats linked to 9/11 plot
    • Why the U.S. and Saudi Arabia Are Suddenly Involved in a Tense Geopolitical Drama

      There’s a reason we’re suddenly talking about 9/11 all over again.

    • US Protects Saudis From Terror Suits, Backs Suits Against Iran

      Intense debate and international diplomatic blackmail has dominated the discussion of the Justice Against Sponsors of Terrorism Act, a bipartisan bill which would open up civil lawsuits against any foreign nations if they are found to be involved in the funding of a terrorist attack occurring on US soil.

    • President Obama Can Help Save Saudi Youth Facing Beheading

      These young men were sentenced to death for activities that, in the United States, are guaranteed by the First Amendment of our Constitution. The fact that they were sentenced to death for actions committed as juveniles is all the more shocking.

    • How The New Yorker Mis-Reports Syria

      Only 6 percent of Americans surveyed in a new national poll say they have a lot of confidence in the media — a result driven by a widespread perception that news stories are one-sided or downright inaccurate. That finding came to mind as I heard New Yorker editor David Remnick introduce an April 17 segment on Syria on the New Yorker Radio Hour.

    • I Fought The Taliban And They Came After Me And My Family

      So there’s this guy in Afghanistan who learned English from watching old Arnold Schwarzenegger movies. When the Americans invaded after 9/11, he offered to help them by acting as an interpreter … then wound up fighting alongside Army Rangers and saving at least five American lives in the process. The moment he felt like he was finally out of danger, the Taliban came after him and his family, forcing him to flee the country.

      [...]

      That means that many of the people shooting at American soldiers somewhere in Afghanistan, right now, don’t really know why Americans with guns are there in the first place. This is something you have to understand about the place if you’re wondering why we couldn’t find bin Laden the moment we landed: Afghanistan isn’t really a nation at all — it’s a sprawling hunk of land about the size of Texas, full of mountains, nomadic tribes, and villages. Most of the people there identify with their own little group and don’t give much of a shit about international politics.

  • Transparency/Investigative Reporting

    • RCEP: The Other Closed-Door Agreement to Compromise Users’ Rights

      A secretive trade agreement currently being negotiated behind closed doors could lay down new, inflexible copyright standards across the Asia-Pacific region. If you are thinking of the Trans-Pacific Partnership (TPP), think again—we’re talking about the lesser-known Regional Comprehensive Economic Partnership (RCEP). While RCEP doesn’t include the United States, it does include the two biggest Asian giants that the TPP omits—China and India. So while you won’t read about it in the mainstream U.S. press, it’s a very big deal indeed, and will assume even more importance should the TPP fail to pass Congress.

    • Noam Chomsky defends Julian Assange: “He should be given a medal”

      Assange and others established WikiLeaks in 2006. Since the release of the Chelsea Manning material, U.S. authorities began a long-term investigation of WikiLeaks and Assange, aiming to prosecute them under the Espionage Act of 1917.

  • Environment/Energy/Wildlife/Nature

    • NOAA: Monthly Temperature Reports Are ‘Sounding Like A Broken Record’

      Last month was the hottest March on record by far, NOAA confirmed Tuesday. March was 2.2°F above the 20th century average. This anomaly (departure from “normal”) was “the highest monthly temperature departure among all months” in the 1880-2016 record.

      It follows the hottest February on record in the NOAA dataset, which followed the hottest January on record, hottest December on record, hottest November, hottest October, hottest September, hottest August, hottest July, hottest June, and hottest May. This 11-month streak “is the longest such streak in NOAA’s 137-year climate record.”

    • Nuclear costs in uncharted territory

      If you want a job for life, go into the nuclear industry – not building power plants, but taking them down and making them safe, along with highly-radioactive spent fuel and other hazardous waste involved.

      The market for decommissioning nuclear sites is unbelievably large. Sixteen nations in Europe alone face a €253 billion waste bill, and the continent has only just begun to tackle the problem.

    • DCI Group Subpoenaed in Expanding Exxon Climate Denial Investigation

      DCI Group, a Washington DC public relations and lobbying firm, is the latest group subpoenaed in an expanding investigation by state attorneys general into the funding of climate change denial by ExxonMobil, according to court filings reviewed by the Center for Media and Democracy (CMD).

      ExxonMobil has now received separate subpoenas from both the New York and U.S. Virgin Islands U.S. Attorneys’ Offices. The Competitive Enterprise Institute (CEI) and DCI Group have also been subpoenaed by the U.S. Virgin Islands for records relating to their role in helping ExxonMobil with climate change denial.

      Seventeen state attorneys general—calling themselves “AGs United for Clean Power”—held a press conference on March 29, announcing increased collaboration between the states in investigating the opposition to tackling climate change.

    • Coral are bleaching along the entire Great Barrier Reef

      Coral reefs are about as colorful as the ocean gets—except when they bleach. Overly warm water can cause corals to spit out the colorful, photosynthetic, single-celled symbiotes that live inside them and produce most of their food. If the heat passes before the corals starve to death, their symbiotes can return, bringing color and health back to the coral.

      As the globe warms, widespread bleaching events are occurring with disturbing frequency. These tend to occur during times of El Niño conditions in the Pacific, which add a temporary boost to the warming water at some reefs. The current record-strength El Niño is sadly no exception.

    • Great Barrier Reef damage: ‘We’ve never seen anything like this before’

      Scientists in Australia have revealed the “tragic” extent of coral bleaching across the Great Barrier Reef, releasing maps which show damage to 93 per cent of the famous 1,500-mile stretch of reefs following a recent underwater heatwave.

      Warning that the reef is now in a “precarious position”, scientists released aerial survey maps which show that the mass bleaching event is the worst in history and far more severe than previous such events in 1998 and 2002.

    • New Indonesia mill raises doubts about APP’s forests pledge

      A landmark commitment by one of the world’s largest producers of tissue and paper to stop cutting down Indonesia’s prized tropical forests is under renewed scrutiny as the company prepares to open a giant pulp mill in South Sumatra.

      To fanfare more than three years ago, Asia Pulp and Paper promised to use only plantation woods after an investigation by one of its strongest critics, Greenpeace, showed its products were partly made from the pulp of endangered trees.

      Greenpeace welcomed the announcement as a breakthrough and the company, long reviled by activists as a villain, rebranded itself as a defender of the environment, helping it to win back customers that had severed ties. At the same time, it was pressing ahead behind the scenes with plans to build a third pulp mill in Indonesia.

    • Will Asia Pulp & Paper default on its “zero deforestation” commitment?

      This study by twelve international and Indonesian NGOs shows that in spite of its high-profile sustainability commitments, Asia Pulp & Paper (APP) is building one of the world’s largest pulp mills in the Indonesian province of South Sumatra without a sustainable wood supply. The US$2.6 billion OKI Pulp & Paper Mills project will expand APP’s wood demand by over 50%, with much of this coming from plantations on high-carbon peatlands.

  • Finance

    • Choice? What Choice?

      It is an old photo but worth recalling. Those expressions of delight of both couples in the company of their fellow members of the ruling elite are not feigned.

    • Bill That Obama Extolled Is Leading to Pension Cuts for Retirees

      One of the many obscure provisions jammed into a last-minute budget bill in 2014 endorsed and signed by President Obama is leading to what would be the first cuts in earned pension benefits to current retirees in over 40 years.

      The Washington Post reports that the Treasury Department is on the verge of approving an application from the Central States Pension Fund – a plan that covers Teamster truckers in several states – to cut worker pensions by an average of 23 percent, and even more for younger retirees. Over 250,000 truckers and their families would be affected. Workers over 75, or those who have acquired a disability, would be exempt from the changes.

    • PMQs: Cameron vows to ‘finish the job’ on academies

      David Cameron has defended controversial plans to force all state schools in England to become academies, saying it is time to “finish the job”.

      During Prime Minister’s Questions, Labour’s Jeremy Corbyn cited opposition to the “top down reorganisation” from teachers, parents and some Tory MPs.

      He said good schools should not be distracted by “arbitrary changes”.

      Sources said the government was likely to guarantee no small rural schools would close as a result of the shakeup.

  • AstroTurf/Lobbying/Politics

    • When ‘Both Sides’ Are Covered in Verizon Strike, Bosses’ Side Is Heard More

      In three New York Times stories, management was quoted eight times to workers’ four. In the Washington Post‘s two reports, the ratio was 6:2 in management’s favor. Buzzfeed‘s three articles favored the company 13 to 7, while Vox‘s lone post had four quotes from management and none from labor. In all four outlets together, there were 31 quotes from Verizon representatives, 13 quotes from workers and their representatives.

    • Donald Trump Is Right: The GOP Primary System Is Rigged

      I hate to agree with Donald Trump about anything, but he’s got a point: the Republican primary process is really unfair. Just look at New York: Kasich and Cruz won 40 percent of the vote but only 4 percent of the delegates. It’s an outrage.

    • Hillary and Trump’s Crushing New York Victories Proved One Thing: The System Is in Shreds

      New York’s primary process was exactly as high-profile, nasty and chaotic as you’d expect it to be, but in the end, it only highlighted that this election is just going to go on and on and on and on. Oh, and one more thing: that the way we elect presidential candidates is crazy.

      Seriously, why do we do things this way? In New York City, a slew of snafus and irregularities triggered a probe from the local Board of Elections, which is notorious for its incompetence. (You have to hand it to a city that can turn its police force into a monstrous high-tech army but can’t handle an election.) Millions of people across the state suddenly discovered that they were barred from voting because they weren’t registered Democrats. You can blame Sanders for not making more of a push to get his supporters to get their act in order, but New York has a ridiculously early deadline for changing your party registration. The burden should be on the state to make it easier to vote and not force people to have the equivalent of a key to a special club just to exercise a fundamental right. Of course, this is New York, the place that gave us Boss Tweed, so we shouldn’t be too shocked.

    • What Is Wrong With New York’s Voting System and How Can It Be Fixed? (Video)

      On “Democracy Now!” on Wednesday, voting rights advocates tallied the reforms New York state must implement to restore confidence in democracy after more than 125,000 Brooklyn residents were among many voters unable to cast ballots in the presidential primary on Tuesday because they’d been removed from voter rolls.

      New York Mayor Bill de Blasio said before the polls closed: “It has been reported to us from voters and voting rights monitors that the voting lists in Brooklyn contain numerous errors, including the purging of entire buildings and blocks of voters from the voting lists.”

      On Monday, Truthdig reported that hundreds of New Yorkers filed a class-action lawsuit alleging authorities had tampered with their registration.

    • Five States Have Primaries Next Week. Will They Face The Same Problems New York Did?

      Tuesday’s presidential primary in New York served as a stark reminder that voting irregularities and restrictions are not a thing of the past and not confined to the South.

      As residents purged from the rolls in Brooklyn keep struggling to have their votes counted, the nation’s attention is turning to the states scheduled to vote on Tuesday: Maryland, Connecticut, Pennsylvania, Rhode Island, and Delaware.

    • Dr. Jill Stein – Symptoms of a Sick Society
    • Bowing to America’s Oligarchs

      Apparently, other countries, but not the U.S., have oligarchs. Billionaire and Commerce Secretary Penny Pritzker came and went to the National Press Club with hardly a tough question on Monday.

    • The Democratic Stockholm Syndrome

      New Yorkers voted overwhelmingly for those holding their progress captive

    • The ICA and ODA: The IPA’s sham anti-truckie astroturfing operation

      IN my article last week on the Road Safety Remuneration Tribunal (RSRT), I wrote that I doubted that the people most actively opposed to these measures were owner drivers, but rather big business, which primarily benefits from lower freight costs.

    • The Primary Season That Won’t End

      An ongoing series that won’t be over any time soon.

  • Censorship/Free Speech

  • Privacy/Surveillance

    • Metadating helps you find love based on your everyday data

      This twist on speed-dating was part of an experiment run by a team at Newcastle University in the UK. They wanted to know what would happen in a world where instead of vetting potential dates by their artfully posed selfies or carefully crafted dating-site profiles, we looked at data gathered by their computers and phones. As use of data-gathering devices increases, it’s a world that’s just round the corner. The team calls it “metadating”.

    • Helen Nissenbaum on Regulating Data Collection and Use

      NYU Helen Nissenbaum gave an excellent lecture at Brown University last month, where she rebutted those who think that we should not regulate data collection, only data use: something she calls “big data exceptionalism.” Basically, this is the idea that collecting the “haystack” isn’t the problem; it what is done with it that is. (I discuss this same topic in Data and Goliath, on pages 197-9.)

    • Apple, Google, Microsoft, and others express ‘deep concerns’ over controversial encryption bill

      Coalitions representing major tech companies warn of ‘unintended consequences’ in letter to US senators

    • Keep the Pressure On: Brazilian Online Surveillance Bills Threaten Digital Rights and Innovation

      The Brazilian Chamber of Deputies is about to vote on seven bills that were introduced as part of a report by the Brazilian Parliamentary Commission of Inquiry on Cybercrimes (CPICIBER). Collectively, these bills would be disastrous for privacy and freedom of expression in Brazil. That’s why EFF is joining a coalition of Brazilian civil society groups in opposing the bills. As the vote takes place on April 27, it’s crucial that we voice our concerns to CPICIBER members now.

    • Last July, NSA and CIA Decided They Didn’t Have to Follow Minimization Procedures, and Judge Hogan Is Cool with That

      Yesterday, I Con the Record released three FISA Court opinions from last year. This November 6, 2015 opinion, authorizing last year’s Section 702 certifications, has attracted the most attention, both for its list of violations (including the NSA’s 3rd known instance of illegal surveillance) and for the court’s rejection of amicus Amy Jeffress’ argument that FBI’s back door searches are not constitutional. I’ll return to both issues.

    • Documents Reveal Secretive U.K. Surveillance Policies

      Newly disclosed documents offer a rare insight into the secretive legal regime underpinning the British government’s controversial mass surveillance programs.

      London-based group Privacy International obtained the previously confidential files as part of an ongoing legal case challenging the scope of British spies’ covert collection of huge troves of private data.

      Millie Graham Wood, Legal Officer at Privacy International, said in a statement Wednesday that the documents show “the staggering extent to which the intelligence agencies hoover up our data. This can be anything from your private medical records, your correspondence with your doctor or lawyer, even what petitions you have signed, your financial data, and commercial activities.”

    • Data privacy proponents are counting on the public’s right to know

      In the latest front in the great data privacy war, the Electronic Frontier Foundation sued the Justice Department on Tuesday, demanding that the government reveal whether it has obtained orders from the Foreign Intelligence Surveillance Court (FISC) compelling private companies to help investigators break into customers’ cellphones and devices.

    • ‘Terrorism investigation’ Court lets NSA collect telephone records data

      In its first ruling regarding phone records since the passage of the USA Freedom Act, the Foreign Intelligence Surveillance Court granted the National Security Agency the powers it requested. Much of the court order was redacted, however.

    • Apple: Governments Asked For User Data 30,000 Times In Second Half of 2015
    • Apple’s Spiking National Security Requests Could Reflect USA Freedom Compliance
    • Tech coalitions pen open letter to Burr and Feinstein over bill banning encryption
    • FBI’s Back Door Searches: Explicit Permission … and Before That

      As I have pointed out, Mukasey (writing with then Director of National Intelligence Mike McConnell, who would also have to approve any PRISM minimization procedures) made it clear in response to a Russ Feingold amendment of FISA Amendments Act in February of 2008 that they intended to spy in Americans under PRISM.

      So it sure seems likely the Administration at the very least had FBI back door searches planned, if not already in the works, well before FISC approved the minimization procedures in 2009. That’s probably what Hogan explained in that paragraph, but James Clapper apparently believes it would be legally inconvenient to mention that.

    • Why Did Congress Let Law Enforcement Officials Lie About Encryption?

      When you testify before Congress, it helps to actually have some knowledge of what you’re talking about. On Tuesday, the House Energy & Commerce Committee held the latest congressional hearing on the whole silly encryption fight, entitled Deciphering the Debate Over Encryption: Industry and Law Enforcement Perspectives. And, indeed, they did have witnesses presenting “industry” and “law enforcement” views, but for unclear reasons decided to separate them. First up were three “law enforcement” panelists, who were free to say whatever the hell they wanted with no one pointing out that they were spewing pure bullshit.

    • FISA Court Still Uncovering Surveillance Abuses By NSA, FBI

      With multiple redactions and having survived a declassification review, another FISA court opinion has been released to the public. The opinion dates back to November of last year, but was only recently dumped into the public domain by the Office of the Director of National Intelligence. While the five-month delay seems a bit long, the alternative is no public release at all. The small miracle that is the public release of FISA court opinions can be traced directly to Ed Snowden and a handful of FOIA lawsuits — not that you’ll see either credited by the ODNI when handing over documents.

      The bad news is that the FISA court has uncovered still more abuse by the NSA and FBI. While there appears to be no imminent danger of the court yanking the agencies’ surveillance privileges (as nearly happened in 2008), the presiding judge (Thomas Hogan) isn’t impressed with the agencies and their cavalier attitude towards mass surveillance. The stipulations put in place to offset the potential damages of untargeted mass surveillance — strict retention periods and minimization procedures — are the very things being ignored by the NSA and FBI.

    • FBI’s PRISM slurping is ‘unconstitutional’ – and America’s secret spy court is OK with that
    • Public advocate: FBI’s use of PRISM surveillance data is unconstitutional
    • Public advocate: FBI’s use of PRISM surveillance data is unconstitutional
    • DOJ Sued Over Access to Requests for Encrypted Data
    • US government sued by activists looking for backdoor smoking gun
    • US surveillance court approves NSA phone records application
    • Watchdog Demands Info From Secret Court
    • EFF Sues DOJ for Secret Court Orders
    • EFF sues Justice Department to discover if secret orders are used to decrypt user data
    • National Security Agency now authorized to gather telephone records under new electronic spying law
    • U.S. DOJ Faces Lawsuit Demanding Disclosure of The Use of Secret Court Orders Against Tech Companies
    • EFF Sues DOJ Over Its Refusal To Release FISA Court Documents Pertaining To Compelled Technical Assistance

      Given the heightened interest in the government’s efforts to compel companies like Apple to break into their own products for them, the EFF figured it would be a good time to ask the government whether it had used FISA court orders to achieve these ends.

      Naturally, the government would rather not discuss its efforts to force Apple, et al. to cough up user data and communications. Hence the secrecy surrounding its use of NSLs, subpoenas and gag orders. Hence, also, its desire to keep cases involving All Writs Acts orders under seal if possible. Hence also (also) its refusal to discuss the secret happenings in its most secret court.

    • Joint Statement on the final adoption of the new EU rules for personal data protection

      Today’s adoption means a robust level of EU data protection standards will become the reality in all EU Member States in 2018.Member States have two years to apply the Data Protection Regulation and to transpose and implement the “Police” Directive. This timeframe gives Member States and companies sufficient time to adapt to the new rules.

      The Commission will work closely with Member States to ensure the new rules are correctly implemented at national level. We will work with the national data protection authorities and the future European Data Protection Board to ensure coherent enforcement of the new rules, building upon the work of the Article 29 Working Party. The Commission will also engage in open dialogue with stakeholders, notably businesses, to ensure there is full understanding and timely compliance with the new rules.

    • SS7 and NSA’s Redundant Spying

      But the fact that Lieu — who really is one of the smartest Members of Congress on surveillance issues — is only now copping onto the vulnerabilities with SS7 suggests how stunted our debate over dragnet surveillance was and is. For two years, we debated how to shut down the Section 215 dragnet, which collected a set of phone records that was significantly redundant with what we collected “overseas” — though in fact the telecoms’ production of such records was mixed together until 2009, suggesting for years Section 215 probably served primarily as legal cover, not the actual authorization for the collection method used. We had very credulous journalists talking about what a big gap in cell phone records NSA faced, in part because FISC frowned on letting NSA collect location data domestically. Yet all the while (as some smarter commenters here have said), NSA was surely exploiting SS7 to collect all the cell phone records it needed, including the location data. Members of Congress like Lieu — on neither the House Intelligence (which presumably has been briefed) or the House Judiciary Committees — would probably not get briefed on the degree to which our intelligence community thrives on using SS7’s vulnerabilities.

    • Nick Asks the NSA: Signaling System 7 (SS7)

      SS7 is the protocol phone companies use to talk to each other. It is an “out of band” signaling protocol, a separate communication channel used to coordinate calls and other features. For example, SS7 is the protocol involved in cellular roaming, allowing a cellphone to work effectively anywhere on the planet.

      Unfortunately SS7 has a large amount of legacy, the biggest being a design concept dating back to the old Bell telephone days with a single flat trust model. This means that a cellular company in Kazakhstan is considered just as trustworthy as AT&T.

    • GCHQ should split to offer separate cyber defence unit, says security expert

      GOVERNMENT LISTENING AGENCY GCHQ should be split into separate attack and defence units, according to a leading security expert.

      Ross Anderson, professor of security engineering in the computer laboratory at the University of Cambridge, explained that this would allow GCHQ to operate more openly, and make other public and private organisations more likely to collaborate with it.

      “The problem is that the UK government has demonstrated repeatedly that it’s not trustworthy. The Snowden documents made it clear that the British state is more interested in exploiting stuff than protecting it,” said Anderson.

    • NSA, FBI outed for violating court order to delete data

      A judge with the Foreign Intelligence Surveillance Court, where America’s intelligence agents go to get approval for secret spy operations, expressed concern top feds weren’t deleting information they collected off the Internet on unsuspecting individuals – in potential violation of law, recently declassified documents showed.

      Judge Thomas Hogan named the National Security Agency as “potentially” in violation of law, and said the office broke “several provisions” of its own internal policies, the Hill reported, citing the November 2015 opinion that was just made public. He also said he was “extremely concerned” the data hadn’t been deleted and the agency maintained its possession of such, in seeming violation of policy and law, the Hill reported.

    • Netflix CEO Says Annoyed VPN Users Are ‘Inconsequential’

      When Netflix recently expanded into 190 different countries, we noted that the company ramped up its efforts to block customers that use VPNs to watch geo-restricted content. More accurately, Netflix stepped up its efforts to give the illusion it seriously cracks down on VPN users, since the company has basically admitted that trying to block such users is largely impossible since they can just rotate IP addresses and use other tricks to avoid blacklists. And indeed, that’s just what most VPN providers did, updating their services so they still work despite the Netflix crackdown.

  • Civil Rights/Policing

    • CMD Exclusive: Why I Chose to Get Arrested in Defense of Our Democracy

      On Monday, I joined hundreds of fellow citizens who were arrested as part of a non-violent act of civil disobedience on the steps of our U.S. Capitol.

      I stood with people of all ages and all walks of life as part of a growing movement to reclaim an America that guarantees the unimpeded right to vote for all and a government that works for the people instead of the powerful plutocrats.

      I was there as someone who has worked for Clean Elections and ethical government for 20 years, and on behalf of my colleagues at the Center for Media and Democracy. CMD serves as a watchdog against corporate influence on democracy and public policy, and it sounded the alarm on the dangerous Citizens United decision of the U.S. Supreme Court six years ago.

    • North Korea Election Monitors Leave New York in Disgust (Satire?)

      A team of North Korean election monitors left New York City in disgust, claiming that democracy was “dead to them.”

      Following a long series of primary election issues across the United States, where local scams, manipulated caucuses and voter disenfranchisement ran wild, the United Nations requested the North Koreans provide a team of election monitors (above) to oversee the highly-contested New York primary. In choosing North Korea for the job, UN officials cited the “great similarities between the North Korean and American systems.”

    • Forcing the Innocent to Plead Guilty, an American Disgrace

      A record 149 people had their criminal convictions overturned in 2015 after courts found they had been wrongly charged, according to a recent study. Nearly four in 10 of those exonerated had been convicted of murder, and the average newly-released prisoner had served more than 14 years in prison. Most of the exonerations came in only two states, Texas and New York. The National Registry of Exonerations, a project of the University of Michigan Law School, found that there have been 1,733 exonerations since 1989, with the total doubling since 2011. More than two-thirds of last year’s exonerees were minorities. Five had been sentenced to death.

      There is a reason why most of the exonerations have come from two locales. District attorneys in Brooklyn, New York, and Harris County, Texas, have begun long-term reviews of questionable convictions, actions that are being watched by prosecutors and defense attorneys across the country. With 156 death row exonerations since 1973, according to the Death Penalty Information Center, this is a problem that must be addressed.

      The National Registry of Exonerations report stated further that 42 of those exonerated in 2015 had pleaded guilty, a glaring indication that the current system of seeking plea bargains simply isn’t just. Indeed, Propublica found that 98.2 percent of all federal cases end in conviction, with nearly all of those a result of plea deals.

    • UK Drug Dogs Finding Way More Sausage And Cheese Than Actual Drugs

      Drug dogs here in the US are mainly one-trick ponies, to clumsily mix a metaphor. Domesticated canines aim to please. Training of drug dogs involves giving them treats or toys upon alerting. You don’t have to be Pavlov to see how this plays out in the real world. Dogs will alert in hopes of a reward or be nudged in that direction by conscious or unconscious “nudges” by their handlers. Hence, we have drug dogs in use with horrendous track records. (But, notably, not horrendous enough to result in judicial smackdowns, for the most part.)

    • Harriet Tubman and the Currency of Resistance

      U.S. Treasury Secretary Jack Lew announced Wednesday that the revised $20 bill will feature the portrait of the legendary abolitionist Harriet Tubman. Tubman was born a slave, escaped to freedom and became a conductor on the Underground Railroad, as well as a campaigner for women’s right to vote. She will be replacing President Andrew Jackson on the front of the $20 bill. He was a contemporary of hers, who owned slaves (one of 18 presidents who did so) and became wealthy from their forced labor. The decision was influenced by grass-roots action, Lew said, as hundreds of thousands weighed in with their suggestions for which women to honor. It also was not without controversy.

    • Harriet Tubman Will Replace Andrew Jackson on the $20 Bill

      Treasury Secretary Jack Lew has decided that a redesigned $20 bill will feature a portrait of Harriet Tubman, a Treasury official confirmed to The Intercept on Wednesday.

    • No Prison Time For NYPD Officer Who Killed Unarmed Man, Then Texted Union Rep Instead of Helping

      Criminally negligent homicide is a felony, which will prevent Liang from resuming his career in law enforcement, and carries a maximum sentence of four years in prison.

    • Egyptian Policeman Kills Over The Price Of A Cup Of Tea In Latest Incident Of Police Brutality

      An Egyptian police officer shot three people after arguing with them over the price of a cup of tea in a Cairo suburb on Tuesday, leaving one of them dead. The incident raised furor among onlookers, who overturned a police car and assaulted another policeman.

      According to one witness, two vehicles carrying riot police and an armored truck quickly arrived on the scene, only to be pelted by rocks by the victims’ family.

    • Law Enforcement Forced To Hand Over $41K It Seized From Businessman At Airport, Plus Another $10K In Legal Fees

      An unidentified Techdirt reader sends in the news that Arizona law enforcement is going to be handing over $10,000 to Madji Khaleq as a result of a failed asset forfeiture attempt. This would be in addition to the $41,870 the DEA already handed back to Khaleq — every cent of the cash federal agents seized from him at the Tucson airport.

    • Brazil: Coup d’état – live on TV!

      An elected president faces impeachment just because Congress dislikes her.

    • 4 Ways Border Patrol Union’s Trump Endorsement Is Filled With Lies and Misinformation

      Since 2005, the Border Patrol has been showered with resources — including $8.4 million to sponsor a NASCAR team — that allowed it to expand its ranks at a breakneck pace. This trend has continued under the Obama administration. Unfortunately, recruitment surges by law enforcement agencies have historically led to — at best — the hiring of unqualified officers and — at worst — widespread misconduct and corruption. The Border Patrol is no exception.

    • ‘We Are Tonu’: Why has the murder of a 19 year old student sparked mass protests in Bangladesh?

      The death of Sohagi Jahan Tonu, a university student at Comilla Victoria College, led to massive protests and a social media outcry. What prevented this from just being another rape and murder case in Bangladesh?

    • Children cuffed, arrested, charged; Murfreesboro outraged

      Police handcuffed multiple students, ages 6 to 11, at a public elementary school in Murfreesboro on Friday, inspiring public outcry and adding fuel to already heightened tensions between law enforcement and communities of color nationwide.

      The arrests at Hobgood Elementary School occurred after the students were accused of not stopping a fight that happened several days earlier off campus. A juvenile center later released the students, but local community members now call for action — police review of the incident and community conversation — and social justice experts across the country use words such as “startling” and “flabbergasted” in response to actions in the case.

    • False Plagiarism Accusation Against Shaun King Shows Dangers of Online Mob Journalism

      On Tuesday afternoon, The New York Daily News published a column by its criminal justice writer, Shaun King (above), that denounced the harrowing treatment of a 37-year-old mentally incapacitated veteran, Elliot Williams, who died from neglect in an Oklahoma jail. Earlier that day, The Daily Beast had published a long, detailed, richly reported article on Williams’ death by Kate Briquelet, and King’s column was obviously based on Briquelet’s reporting.

      But as it appeared in the Daily News, King’s column provided no citation or attribution to Briquelet’s Daily Beast article. Worse, King’s column included two paragraphs that were verbatim copies from Briquelet’s article, and presented those two paragraphs without citation or even quotation marks. At first glance, it looked like a classic case of plagiarism, with King simply lifting two paragraphs and passing them off as his own. And The Daily Beast was understandably furious that their reporter’s excellent work would be pilfered without credit.

  • Internet Policy/Net Neutrality

  • DRM

    • Netflix crackdown in New Zealand takes hold

      Netflix warned in January that people outside the United States trying to watch content on the American catalogue would find it difficult to reach the service through VPN, but it seems to have taken three months for the crackdown to really be felt in New Zealand.

  • Intellectual Monopolies

    • Leaked IP Chapter Of Asian FTA Reveals Tough Rules For Poorer Partners, Civil Society Says

      The alleged intellectual property chapter of a secretive regional trade agreement between an association of ten Asian countries plus six others was released yesterday by a civil society group, which says richer countries in the region are pushing for stringent IP rules.

    • Trade secrets bill clears US House Judiciary Committee

      In a busy few days for trade secrets news, the House Judiciary Committee has approved a Senate-passed trade secrets bills with no changes and Indian company Tata has been hit with a $940m damages verdict in Wisconsin

    • House Judiciary Committee Approves Senate-Passed Trade Secrets Bill

      The House Judiciary Committee on Wednesday approved a Senate-passed bill that would allow civil litigation for the theft of international trade secrets.

      Lawmakers advanced the measure, S. 1890, by voice vote.

      Committee Chairman Rep. Bob Goodlatte (R-Va.) said the legislation “puts forward modest enhancements to our federal trade secrets law, creating a federal civil remedy for trade secret misappropriation that will help American innovators protect their intellectual property from criminal theft by foreign agents and those engaging in economic espionage.”

    • DTSA Moving Forward

      The House Judiciary Committee has taken the next major step toward implementation of the Defend Trade Secrets Act of 2016 (DTSA).

]]>
http://techrights.org/2016/04/21/new-ubuntu-lts-releases/feed/ 0
Amid Microsoft Collapse Stephen Elop is Finally ‘Fired’, But Not Before He Cost Many Thousands of People (at Nokia) Their Job, Destroyed Linux-based Platforms, and Spread Patents to Patent Trolls http://techrights.org/2015/06/18/the-elop-distraction/ http://techrights.org/2015/06/18/the-elop-distraction/#comments Thu, 18 Jun 2015 15:02:52 +0000 http://techrights.org/?p=83515 Stephen Elop has a long track record of corporate destruction (his expertise)

Summary: Lesser-explored aspects of Microsoft’s corporate sinking, which the company disguises as ‘shakeup’ while releasing (yet again) its demolition man, Stephen Elop

THIS post tackles various issues that the corporate media overlooked. First, Elop’s exit merits more analysis and retrospection; second, Microsoft’s state is much more revealing right now, as well as Microsoft’s stance on Google and Android; finally, comments are needed about Elop’s legacy, which makes the world a much more dangerous place for Free/libre software.

The big news isn’t Elop being fired but Microsoft setting itself on fire after a misguided strategy which revolved around destruction rather than creation (giving Nokia’s patents to patent trolls, killing Nokia’s multiple Linux efforts, and so on). Many executives are leaving in droves right now and we are hardly surprised. There are certainly more layoffs on the way, but puff pieces like this new one from Microsoft sympathiser Mark Hachman (of the shameful IDG) serve to distract from that. More “restricted boot with uefi” is Microsoft’s last hope, assures us a reader, basically ensuring it is exceptionally hard to remove Vista/7/8/10 from PCs after OEMs were bribed to preinstall it.

Tackling the media’s narrative in this case, let’s look at the repetition of deceptive terminology. The media repeats Microsoft’s words, but here is the basic rule (based on history): when Microsoft says “reorg” it means layoffs and “shakeup” means key managers are fleeing/abandoning. We wrote about this for nearly a decade. Common euphemisms like “shake-ups” (with or without a dash) or “reorg” (for layoffs) are very frequent an utterance at Microsoft and it’s all damage control. Corporate journalists don’t do their job; they don’t look any further or any deeper.

What we really have here is a departure of Mark Penn, Microsoft’s anti-Google guy [1, 2, 3, 4] (and by extension anti-Android guy). He is out, so Microsoft’s strategy to incite against Google must have failed pretty badly. Quoting damage control from Microsoft’s booster, “Eric Rudder, whose Microsoft bio indecisively describes him as both Vice President of Advanced Technology and Education, and Vice President of Advanced Strategy, is also leaving.” Rudder, a longtime thug from Microsoft (see and recall his role in dirty tricks [1, 2, 3]), was probably essential to Microsoft’s abusive monopoly. They are attacking GNU/Linux behind the scenes. They are top-level executives — people who rally the troops and pressure (or bribe, or blackmail) other executives, even politicians. Their departure is probably a news bigger than Elop’s ‘departure’ (more on that later).

The Nokia angle was covered the most (as the leading story), but almost nobody mentioned that Elop got a massive bonus for destroying Nokia and passing it to Microsoft. He is a very rich man, having made a lot money from demolition.

Nokia expert Tomi Ahonen wrote:

So the Elop nonsense and destructive managment methods lasted only 15 months under Satya Nadella’s watchful eye at Microsoft. He is effectively fired from Microsoft. The company realigns handsets into one division under Windows headed by Exec VP Terry Myers. And Elop plus two other senior execs are kicked out with the press release out today.

Good riddance. Stephen Elop was the worst CEO in corporate history. He clearly was at fault on the top, when he went to Microsott, that same ex-Nokia handset unit with Lumia running on Windows Phone never did any better. Today we’ve seen new Microsoft CEO Satya Nadella examine Elop’s performance of the flagship future division – you remember Nadella’s introductory remarks to his employees were all about mobile and the cloud – now Elop is gone. And look at the text of the press release. Not one word about ‘mobile’ or ‘handsets’ or ‘Lumia’ in the actual announcements (only one mention on the bottom from the description of Microsoft the company being a ‘mobiile-first’ company). What a huge shift away from the failing Lumia unit to ‘Windows and Devices’ ie Surface will do fine, Xbox is doing fine. Lumia is dead.

Now someone will be running the Lumia unit under Exec VP Myers for a while, and then when they see it is irretrievably dead, they will quietly shut down that business. This is a VERY clear sign of the writing on the wall. And sadly for any ex-Nokia employees, expect more layoffs to come in the aftermath of this announcement and the ‘consolidation’ within that new business unit. I think the ex-Nokia handset unit has no more than 24 months ahead of this point, and may be shut down far faster than that. Clearly Nadella knows how to read mathematics and the math about Elop’s business was brutal. Elop is gone! A day of somber celebrtaions in Finland and all who were fired by that clown will think – at least he also got fired.

Finally good news from Microsoft because it shows that it’s dying, much like its efforts to derail Android. As iophk put it: “none, not even Ahonen, remind us that Elop was a mole and fulfilled the sale to Microsoft as a requirement for receiving his 25m bonus.”

Nadella’s hogwash of corporate collapse (in his E-mail) is hilarious if properly dissected. To quote the British media, “Nadella said in an email to employees: “We are aligning our engineering efforts and capabilities to deliver on our strategy and, in particular, our three core ambitions.

“This change will enable us to deliver better products and services that our customers love at a more rapid pace.””

Nadella is talking complete nonsense. It was probably written by someone else (PR) and just signed by Nadella. Nilay Patel asks (in his headline), “What company will Stephen Elop steal for Microsoft next?”

He dubs Elop “Trojan Horse, King of Thieves” and says: “So now that Elop is free to roam the badlands once again, it’s only fair to ask what new company he might infiltrate as part of an elaborate Microsoft M&A strategy. Here’s a quick list.”

Watch how Elop destroyed companies before he even joined Microsoft. He is a very evil Trojan horse and it’s important to check where he goes next. He is a demolition man, not a manager. Therein lies the real story.

]]>
http://techrights.org/2015/06/18/the-elop-distraction/feed/ 0
Links 29/1/2015: Android Shipments in 2014 Exceed 1,000,000,000, LibreOffice 4.4 is Out http://techrights.org/2015/01/29/libreoffice-4-4/ http://techrights.org/2015/01/29/libreoffice-4-4/#comments Fri, 30 Jan 2015 02:26:33 +0000 http://techrights.org/?p=81337

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • The 5 best open source email clients for Linux

      Windows users have Outlook; Mac users have Mail. What options are there for Linux users? As it turns out, Linux land is rich with email clients. I have chosen five of the best, fully open source email clients (with two exceptions) for Linux users.

  • Kernel Space

    • As simple As That

      The challenge of the Internet of Everything is that it needs to be just that – an Internet of everything, a global ecosystem of billions of interoperable products, applications and services all speaking the same language, all working together regardless of manufacturer, industry or platform. AllJoyn is the open source software project built by the AllSeen Alliance’s thriving technical community of over 110 companies that is delivering on this challenge, creating simple and open technology that connects everything and enables the Internet of Everything.

  • Applications

  • Distributions

    • Reviews

    • New Releases

      • GParted Live Now Supports Microsoft’s New Filesystem, ReFS

        GParted Live is a small bootable GNU/Linux distribution that has a lot of features and that can be used in operations like creating, reorganizing, and deleting disk partitions on a variety of filesystems. A new stable update has been made available and the operating system is now at version 0.21.0.

      • Papyros Is a Linux OS That Follows Google’s Material Design and It Looks Stunning

        Papyros is a new Linux distribution in the making that will use the Material Design style from Google. There is nothing to test so far, but the progress made by the developers is impressive and it’s very likely that this will become one of the most interesting distros available.

      • BackBox Linux 4.1 released!

        The BackBox Team is pleased to announce the updated release of BackBox Linux, the version 4.1!

        This release includes features such as Linux Kernel 3.13, EFI mode, Anonymous mode, LVM + Disk encryption installer, privacy additions and armhf Debian packages.

    • Red Hat Family

      • CoreOS Releases Building Block For Distributed Systems

        Hyperscale Linux operating system specialist CoreOS said it is releasing its latest open source component for sharing and managing configuration data and other functions used in distributed systems.

        San Francisco-based CoreOS announced its first stable release of etcd, or “etc distributed,” an open-source distributed key value store that provides the backbone of CoreOS clusters and the etcd clients that run on each machine in a cluster. “Our goal with etcd has been to make building and using distributed systems easier,” CoreOS CTO Brandon Philips said Wednesday (January 28) in announcing the release.

      • Fedora

        • DNF Plugins Extend The Functionality Of Fedora’s Yum Successor

          With the upcoming Fedora 22 release due out in May, DNF is positioned to replace Yum as the default package manager.

          While there’s been many DNF articles on Phoronix in past months, one of the aspects not covered much to this point is the dnf-plugins-extra package that’s in its very early stages. Version 0.0.3 of dnf-plugins-extras was released today as a collection of DNF plugins done by the community.

    • Debian Family

      • Derivatives

        • Canonical/Ubuntu

          • 7 reasons why I prefer elementary OS Freya over Ubuntu 14.10 “Utopic Unicorn”

            When we laid out our featured article on things you need to do after installing Ubuntu 14.10, we shared a few little issues we have had with the latest Ubuntu release. Well things got worse, and I decided to try something else for a change. I’ve been using elementary OS Freya as my daily driver since then. And I have to say, I’m mighty impressed so far. And the fact that Freya is still very much in beta makes the whole affair all the more interesting. A list of reasons why I prefer elementary OS Freya over Ubuntu 14.10 at the moment.

          • Don’t Use Ubuntu, Use Mint – or elementary

            Tech Drive-in today listed seven reasons he prefers elementary OS over Ubuntu. Despite all that, Michael Larabel today reported on the improved performance of Ubuntu 15.04 on newer machines.

          • OpenJDK 7 Vulnerabilities Closed in Ubuntu 14.04 and Ubuntu 14.10

            Canonical published details about a new OpenJDK 7 version has been pushed to the Ubuntu 14.04 LTS and Ubuntu 14.10 repositories. This update fixes a number of problems and various vulnerabilities.

          • Ubuntu Touch Apps Can Now Be Launched In A New Windowed Mode

            A new Ubuntu smartphone OS feature has been created by developer Michael Zanetti, who has created a way to run Ubuntu Touch apps in windows rather than full screen, allowing them to be dragged , shrunk, maximised, or minimised, just like they were desktop applications but on your smartphone.

          • Ubuntu Users See Private, Hybrid Cloud Expansion

            Canonical, the company behind the open source cross-platform operating system Ubuntu, released its annual cloud and server survey this week that seeks to cast more light on the makeup of cloud infrastructure, how it is managed, and what is driving cloud adoption.

          • Ubuntu 15.04 Now Based on Linux Kernel 3.18.4, Devs Are Tracking the 3.19 Branch
          • Flavours and Variants

            • Introducing BodhiBuilder

              If you follow me on GitHub then you likely noticed I have added a few projects in the last few days. One of these projects has been on my TODO list for awhile – cleaning up the old remastersys script I have always used to create the Bodhi Linux ISO images for the last few years. Today I am pleased to announce you can find my fork of remastersys dubbed “BodhiBuider” on GitHub here.

  • Devices/Embedded

    • Tough multi-display controller runs Linux on i.MX6

      MEN Micro unveiled the “CC10S,” a Linux-ready i.MX6 based multi-display controller board for touchscreens deployed in harsh, -40 to 85° C environments.

      Imagine a humongous earth-moving rig prepping an oil shale site in North Dakota in the middle of January. You’re going to want a touchscreen with that, and it better be tough. The MEN Micro CC10S single board computer is designed for controlling 7- to 15-inch LCD touchscreens that must deal with the rough, tough stuff on a daily basis.

    • Phones

      • Android

        • Airdroid – Transfer files between Android Phones/Tablets and Linux (Any Distribution)

          We often need to transfer large amount data in the form of mp3 Songs, Video Songs, Movies and most importantly, large Games between android phones/tablets and Linux machine. Transferring via USB cable takes time, so let’s do it with ‘Airdroid’ easily and quickly.

        • Android shipments in 2014 exceed 1 billion for first time

          For the first time ever, worldwide shipments of smartphones packing Android exceeded 1 billion units in 2014, a significant gain from the 780.8 million units that shipped around the world in 2013, researcher Strategy Analytics announced Thursday. Android dwarfed its second-place competitor, Apple’s iOS, which mustered 192.7 million worldwide shipments in 2014.

        • 1B Android phones shipped in 2014, but they don’t all help Google

          When Android first arrived in 2007, it was (and still is) a key part of the OHA, or Open-Handset Alliance. OHA partners — which include Samsung, LG, Dell, HTC, Huawei and ZTE, to name a few — all loosely work together to help improve Android, while competing against one another by using Android on their respective hardware products. Android is the commonality between all of the OHA partners. And then there’s Google.

        • Android beats iOS for app downloads, but revenues are still a different story

          There are plenty of caveats to this line of reasoning, though. First, Google Play is not the only Android app store – Amazon and Samsung run their own stores, while in countries like China there are dozens of stores offering Android apps.

        • HTC One M8 Android 5.0 Lollipop Update: What U.S. Owners Can Expect

          When Google announced Android 5.0 Lollipop back in October many smartphone owners like those with the HTC One or HTC One M8 instantly started waiting for details regarding the Android 5.0 Lollipop update. It has arrived for a few devices already, including the HTC One and HTC One M8 Google Play Edition handsets, but below we’ll go over what regular HTC One owners need to know about the Android 5.0 update.

        • Samsung Galaxy S4 Updated To The Android Lollipop 5.0 OS

          The Android Lollipop 5.0 update is finally available for the Samsung S4. The operating system is also available for the Samsung Galaxy S5, Note 4, Note 3, and Note Edge. Samsung Galaxy and Note users will be happy to hear that the long waited update is coming in the near future. But should Galaxy S4 users take advantage of the Android Lollipop update?

        • Don’t wait for Android 5.0, this app makes your phone look like Lollipop for free

          Android 5.0 Lollipop is a huge upgrade for Google’s mobile operating system. The only problem with it, of course, is that it’s only available for a handful of devices. Most Android smartphone users still have plenty more waiting to do before Lollipop is finally available for their handset, but now there’s a terrific app that will make your older version of Android look just like Lollipop — and it’s free!

        • Is this Apple’s secret weapon that could force Android users to buy an iPhone?

          There are many reasons why Android users switch to iPhone, and vice-versa, but Apple may have a secret (or not-so-secret) weapon that could pressure some Android fans to considering a move to the other side. No, it’s not Apple Pay, an exclusive iPhone 6 feature that’s heavily marketed by various banks in the U.S., further helping Apple market its 2014 iPhones. It’s actually a stock iOS app that has been hiding in plain sight for years.

        • Android 5.0.2 Lollipop Problems Frustrating Nexus Users

          Google rolled out its Android 5.0.2 Lollipop update to fix Nexus Lollipop problems. And while it did fix some of the bigger issues, Android 5.0.2 Lollipop problems continue to frustrate Nexus users.

Free Software/Open Source

  • Web Browsers

    • From Opera to… Vivaldi!

      Yes, the name is familiar. Vivaldi was that KDE tablet that never saw the light of day, but now Vivaldi is the name of a beautiful browser that runs on Linux.

  • SaaS/Big Data

    • Hortonworks Spreads its Open Source Wings to Bring Governance to Hadoop

      We all know Hortonworks is committed to open source, insisting that it’s the way to innovate on Hadoop and deliver the best enterprise-grade technology to the marketplace. And though its main competitor, Cloudera (or at least a member of its management team) may have taunted that Hortonworks’ business model is “undependable,” Wall Street certainly didn’t agree — its shares soared 65 percent above the opening price on Dec. 12, 2014, its first day of trading as a public company.

  • Oracle/Java/LibreOffice

    • LibreOffice 4.4 Released as the Most Beautiful LibreOffice Ever

      The Document Foundation has just announced that a new major update has been released for LibreOffice and it brings important UI improvements, enough for them to call this the most beautiful version ever.

    • The best open-source office suite, LibreOffice 4.4, gets new release

      Who says you can’t have fast, good and cheap? The Document Foundation’s latest release of the most popular open-source office suite, LibreOffice 4.4 is quite fast on Linux, Mac OS X, and Windows; it works well on all three desktop operating systems, and it won’t cost you a penny.

    • LibreOffice 4.4 Released With Major UI Revamp

      A new version of open-source office suite LibreOffice is now available for download and the hands behind it are calling it ‘the most beautiful’ release ever.

      Jan Holesovsky, leader of the LibreOffice design team, says “LibreOffice 4.4 has got a lot of UX and design love, and in my opinion is the most beautiful ever.”

      The productivity suite, which was spun out of the slow moving OpenOffice project back in 2010, has certainly upped its game in the design department over the past few years, with each release of the 4.x series adding finesse.

  • FSF/FSFE/GNU/SFLC

    • GNU Guix 0.8.1 released

      We are pleased to announce the next alpha release of GNU Guix, version 0.8.1.

      The release comes both with a source tarball, which allows you to install it on top of a running GNU/Linux system, and a USB installation image to install the standalone Guix System Distribution.

    • Libreboot X200 laptop now FSF-certified to respect your freedom

      This is the second Libreboot laptop from Gluglug (a project of Minifree, Ltd.) to achieve RYF certification, the first being the Libreboot X60 in December 2013. The Libreboot X200 offers many improvements over the Libreboot X60, including a faster CPU, faster graphics, 64-bit GNU/Linux support (on all models), support for more RAM, higher screen resolution, and more. The Libreboot X200 can be purchased from Gluglug at http://shop.gluglug.org.uk/product/libreboot-x200/.

  • Openness/Sharing

    • Open Hardware

      • Your Open Source 3D Printed Designs Could Save the 3D Printing Community Millions

        In an article published in Modern Economy by Dr. Joshua Pearce, of Michigan Technological University, titled “Quantifying the Value of Open Source Hardware Development” one of the challenges of Open Source Hardware has been addressed: Creating a real world value for community developed creations. Three methods for quantifying the value of free and open source hardware designs were used, including “1) downloaded substitution valuation; 2) avoided reproduction valuation and 3) market savings valuation along with additional benefits related to market expansion, scientific innovation acceleration, educational enhancement and medical care improvement.”

  • Programming

    • LLVM Adds Options To Do Fuzz Testing

      LLVM/Clang developers have begun work on adding fuzz testing capabilities, the providing semi-random test data in an automated manner to test functions for potentially unchecked scenarios using malformed data, etc. Fuzzing helps developers avoid potential crashes, security issues, and uncovering other possible pitfalls.

  • Standards/Consortia

    • YouTube flushes Flash for future flicks

      Adobe would need to have buried its head under many metres of sand, and strapped many layers of black tape about its head, not to see this coming. So there can’t be too much gnashing of teeth and wailing down San Jose way, not least because the masses who use YouTube probably don’t care how their video is delivered*.

    • YouTube ditches Adobe Flash for HTML5 on most browsers

      GOOGLE’S YOUTUBE video portal has made the switch to HTML5 as a default renderer, marking yet another milestone in the downfall of the Adobe Flash format.

      Historically, Adobe Flash has been the renderer of choice despite its buggy limitations because it offered a number of tangible benefits over early HTML5 implementations.

    • 10 capabilities we want to see in HTML6

      The buzzword “HTML5” came and went a few years ago, but the standard itself wasn’t made final until the end of 2014. In the five-plus years it took the “second coming of this Web stuff” to be fully realized and ratified, we got deep into the changes, examined how early adopters pushed HTML5 to its limits, and surfaced more than a few hard truths about the limitations of the spec.

Leftovers

  • Looks like those IBM layoffs have started

    Reports of big layoffs to come this week at IBM were correct, at least with regard to timing. Starting Wednesday, the message board at Alliance@IBM, a site manned by former IBM employees, was full of posts from people saying (anonymously) that they had been laid off. More accurately, most said they had been “RA’d,” which is IBM parlance for Resource Action, but which means — you got it — laid off.

  • Health/Nutrition

    • Have we reached ‘peak food’? Shortages loom as global production rates slow

      The world has entered an era of “peak food” production with an array of staples from corn and rice to wheat and chicken slowing in growth – with potentially disastrous consequences for feeding the planet.

    • NHS – Calling for a minor change in Policy..

      There are arguments made all the time as to why privatisation is beneficial. The more cynical, and those led entirely by a fundamental belief in free market solutions for everything, simply see the potential economic gains as being too great to pass up. After all, in the US, health care spending makes up a significant portion of GDP, one that has been rising providing profit and opportunity for companies and investors. The impact on patients? Well, that’s collateral damage – you should be working harder, or better insured.

  • Security

    • Security updates for Thursday
    • The FTC Calls for Lockdown Security on the Internet of Things

      The Internet of Things (IoT) was big news at January’s Consumer Electronics Show in Las Vegas, and many large tech companies had related announcements. Apple wan’t demonstrating, but partners had the first set of devices that are HomeKit certified, which is Apple’s protocol for allowing smart home devices to work with the iOS platform. And, Google announced 15 new partners in “Work With Nest,” its developer program for adding third-party devices to Nest devices and networks. Meanwhile, The Linux Foundation oversees one of the biggest Internet of Things initiatives: The AllSeen Aliance, which is rapidly gaining members.

  • Defence/Police/Secrecy/Aggression

    • US Drone Strike in Yemen Killed 12-Year-Old Student

      Officials Had Previously Identified Him as ‘Al-Qaeda Militant’

    • CIA operations to aid Syrian rebels go bad

      CIA operations to aid moderate fighters battling Syria’s Bashar Al Assad regime has gone badly as rebel forces keep shifting loyalties, says a Wall Street Journal reports.

    • Covert CIA Mission to Arm Syrian Rebels Goes Awry

      It didn’t take long for rebel commanders in Syria who lined up to join a Central Intelligence Agency weapons and training program to start scratching their heads.

    • Exclusive: Obama Cuts Off Syrian Rebels’ Cash

      In the past several months, many of the Syrian rebel groups previously favored by the CIA have had their money and supplies cut off or substantially reduced, even as President Obama touted the strategic importance of American support for the rebels in his State of the Union address.

      The once-favored fighters are operating under a pall of confusion. In some cases, they were not even informed that money would stop flowing. In others, aid was reduced due to poor battlefield performance, compounding already miserable morale on the ground.

    • Should The U.S. Military Be Educators?

      Military academies have always been funded by taxpayer dollars & revered for their traditional and all-American ways. But one Naval Academy professor says the money is wasted and the standards for entrance are low. Is the end of West Point in sight?

  • Transparency Reporting

    • Open Letter in Defence of WikiLeaks Journalists

      We, the undersigned journalists and human rights defenders cannot remain silent while our colleagues and profession are under attack.

      We deplore the actions taken the US Government against WikiLeaks journalists Sarah Harrison, Joseph Farrell and Kristin Hfaffnsson. We believe they represent political persecution of journalists and journalism.

      Free societies everywhere are best served by journalism and publishing that holds governments and corporations to account and guarantees citizens’ right to know. Such work is not espionage or terrorism; it is journalism.

  • Finance

    • Germans Are in Shock As New Greek Leader Starts With A Bang

      One senior German official described Tsipras as part of a brash new generation of European leaders, including Italy’s Renzi, who weren’t afraid to stand up to Merkel and challenge the assumptions that have shaped policy in the eurozone and Ukraine crises in recent years. – See more at: http://portside.org/2015-01-29/germans-are-shock-new-greek-leader-starts-bang#sthash.U8rGKwEr.dpuf

  • PR/AstroTurf/Lobbying

  • Privacy

  • Civil Rights

    • The Tsarnaev trial and the rest of us
    • Seth Rogen and Michael Moore banned from steakhouse over American Sniper
    • Here’s what moviegoers in Baghdad think of ‘American Sniper’

      The film, set during the US-led occupation of Iraq and released on Christmas Day, hit nerves in the United States immediately. Some critics and commentators lauded it as patriotic and unflinching; others dismissed it as reductionist and racist.

      Many people also objected to the film’s portrayal of Kyle — a man who described Iraqis as “savages” in his memoir — as a hero.

    • 7 heinous lies “American Sniper” is telling America

      One way to get audiences to unambiguously support Kyle’s actions in the film is to believe he’s there to avenge the 9/11 terrorist attacks. The movie cuts from Kyle watching footage of the attacks to him serving in Iraq, implying there is some link between the two.

    • Killing Ragheads for Jesus

      “American Sniper” lionizes the most despicable aspects of U.S. society—the gun culture, the blind adoration of the military, the belief that we have an innate right as a “Christian” nation to exterminate the “lesser breeds” of the earth, a grotesque hypermasculinity that banishes compassion and pity, a denial of inconvenient facts and historical truth, and a belittling of critical thinking and artistic expression. Many Americans, especially white Americans trapped in a stagnant economy and a dysfunctional political system, yearn for the supposed moral renewal and rigid, militarized control the movie venerates. These passions, if realized, will extinguish what is left of our now-anemic open society.

    • S.F. public defender detained outside court; office outraged

      A San Francisco deputy public defender was handcuffed and arrested at the Hall of Justice after she objected to city police officers questioning her client outside a courtroom, an incident that her office called outrageous and police officials defended as appropriate.

      The Tuesday afternoon arrest of attorney Jami Tillotson as she denied police officers’ attempts to take photos of her client without explanation raised questions about police intimidation and harassment, Public Defender Jeff Adachi said at a Wednesday news conference.

      But police said the five officers, led by a plainclothes sergeant, were investigating a burglary case in which Tillotson’s client and his co-defendant were considered persons of interest. Tillotson was cited for misdemeanor resisting or delaying arrest because she obstructed a police investigation, officials said.

    • Sterling Conviction a Victory for Government’s Right to Hide
    • This is how a police state protects “secrets”: Jeffrey Sterling, the CIA and up to 80 years on circumstantial evidence

      The participants in the economy of shared tips and intelligence in Washington D.C., breathed a collective sigh of relief when, on January 12, the government announced it would not force James Risen to testify in the trial of former CIA officer Jeffrey Sterling. “Press freedom was safe! Our trade in leaks is safe!” observers seemed to conclude, and they returned to their squalid celebration of an oppressive Saudi monarch.

      That celebration about information sharing is likely premature. Because, along the way to the conviction of Sterling this week on all nine counts – including seven counts under the Espionage Act — something far more banal yet every bit as dear to D.C.’s economy of secrets may have been criminalized: unclassified tips.

    • Eric Holder plugs his legacy on leak cases

      A federal jury’s decision Monday to convict a former CIA officer for leaking top-secret information to a New York Times reporter was a big win for prosecutors — and for Attorney General Eric Holder’s new approach to handling sensitive cases involving journalists.

      [...]

      The attorney general’s action was consistent with a series of moves over the past year and a half in which he sought to demonstrate greater sensitivity to the concerns of journalists. The recalibration was prodded not by Risen’s predicament or a sudden bout of introspection, but by a political firestorm that broke out in 2013 over prosecutors’ aggressive investigations of leaks to the Associated Press and Fox News.

      [...]

      Holder’s decision to drop demands for Risen’s testimony about his sources could help dampen concern about the treatment of journalists, but it won’t extinguish complaints that the unprecedented flurry of nine leak-related prosecutions during the Obama administration has chilled whistleblowers from taking their concerns to the media. In fact, Sterling’s conviction on every count sent to the jury — and the prospect of a lengthy prison term for the ex-CIA officer — might embolden prosecutors intent on stamping out leaks.

    • VIDEO: CIA Whistle Blower Found Guilty Proves That Using “Proper Channels” Doesn’t Work

      Monday’s guilty verdict for former CIA officer Jeffrey Sterling is another example of whistleblowers attempting to go through proper channels to expose wrongdoing, and then being “flagged as troublemakers” and facing severe retaliation from the government, according to transparency advocate Norman Solomon.

    • CIA Officer’s Conviction to Discourage More Intelligence Leaks

      The conviction of CIA officer Jeffrey Sterling for leaking classified information about a covert plan to derail Iran’s nuclear program to a journalist, sends a message that intelligence leaks will not go unpunished while reducing the risk of encouraging more leaks, former CIA official Paul Pillar told Sputnik on Tuesday.

    • CIA whistleblower Jeffrey Sterling found guilty on all counts

      Sterling was charged under the Espionage Act for disclosing classified information about a mission meant to slow Iran’s nuclear program to New York Times reporter James Risen, who then wrote about the CIA’s Iranian plot in his 2006 book, “State of War.” The plan’s goal was to learn more about the country’s controversial nuclear program and impair its progress, and the schematics were reportedly funneled to the Iranians via a Russian scientist with the codename “Merlin.”

    • The mass media have suddenly discovered Jeffrey Sterling

      The mass media have suddenly discovered Jeffrey Sterling — after his conviction Monday afternoon as a CIA whistleblower.

    • ACLU asks judge to block attempt to repossess copies of CIA torture report

      The American Civil Liberties Union is turning to federal court to stop the chairman of the Senate intelligence committee from repossessing the secret copies of a landmark inquiry into CIA torture.

    • ACLU: Don’t Let Senate Block Full CIA ‘Torture Report’ Release

      The American Civil Liberties Union (ACLU) filed a motion in federal court on Tuesday night in an effort to block the chairman of the Senate Intelligence Committee from retrieving all the copies of the committee’s full, unredacted report on the CIA’s “enhanced interrogation program.”

    • Meet the CIA’s secret protector: Why Sen. Richard Burr is its favorite “overseer”

      One of the newest pieces of conventional wisdom among the political commentariat is the idea that under the influence of the Tea Party and the libertarians, the Republicans are no longer the national security hawks they once were. They are going back to their old isolationist ways, the thinking goes, because Rand Paul is running for president and he doesn’t support military adventurism overseas (except when he does) and the right wing of the GOP is uninterested in national security.

    • Editor of major newspaper says he planted stories for CIA

      Becoming the first credentialed, well-known media insider to step forward and state publicly that he was secretly a “propagandist,” an editor of a major German daily has said that he personally planted stories for the CIA.

    • CIA: A spy agency gone rogue?

      American author and journalist Charles Glass joined Shainin with anecdotal references where he first talked about the origins of the CIA and the failures from its very conception. He said that from its very formation in 1947, the agency had agents in the field “torturing people or bribing foreign officials”. He talked about CIA’s role in overthrowing an elected parliamentary government in Syria in 1949, on behalf of an Arabian oil company “to have a dictator who would then allow an oil line to go through Syria.” The country never really had a democracy again, the effects of which can be seen today.

    • US Incarceration System Facilitates Breakdown of Society

      What we’re doing isn’t working, justice-wise, order-wise, sanity-wise. The state of Illinois is bankrupt and yet its jails are full to bursting, at a cost, per occupant, equal to or greater than the cost of luxury suites at its ritziest hotels. And 90 percent of the teenagers who enter the system come back within three years of their release. This is no surprise: The system is a spiral of entrapment, especially for young men of color.

    • US Spy Agency CIA Heading For A Shake Up: Top Spy To Step Down

      The Central Intelligence Agency–the spy agency of United States of America, is reportedly heading for a shake up. In the run up to that, the chief of secret intelligence operations will shortly step down. The office of the secret intelligence wing has announced that “the director soon plans to retire after a long and distinguished career at CIA.”

    • Spy panel shakeup will add focus on cyber, CIA

      The House Intelligence Committee is shaking up its structure to put a new focus on cybersecurity and the CIA, among other areas.

    • LoBiondo named chairman of House CIA subcommittee
    • LoBiondo named chairman of the House Subcommittee on Central Intelligence Agency

      LoBiondo takes the chairmanship at a time when the CIA has come under scrutiny. A report released in December by the Senate Intelligence Committee found the agency’s interrogation techniques to be more brutal and used more extensively than the agency had portrayed.

    • Former CIA spies come in from the cold as Hollywood players

      The place in Brooklyn looks like a CIA safehouse. Red brick office building with peeling metal awning. No sign. Inside, writers are plotting out popular cold war espionage show The Americans – one of an assortment of Hollywood spy or national security dramas being driven by ex-spies.

      The show’s creator and co-head writer Joe Weisberg is a former CIA officer who never fathomed he would one day sit in an office with Soviet propaganda posters and a cut-out figure of President Ronald Reagan, concocting television fiction.

    • Feinstein Slams CIA Report as Error-Riddled

      In the waning months of her tenure as head of the Senate Select Committee on Intelligence, California Democrat Dianne Feinstein transformed into a tireless critic of the CIA’s torture program and the measures the agency is accused of taking to avoid scrutiny.

    • Feinstein Disputes CIA Report on Spying on Senate

      Her office provided a list of 15 items where Feinstein takes issue with the Accountability Board review. Some of them relate to an apparent dispute over the scope of the investigation. Among them, Feinstein says the claim that the CIA and investigators did not have a “common understanding” about access is simply false.

      “This is a serious matter and has been acknowledged by the CIA inspector general and the CIA Accountability Board. Regardless of the extent of the violation or intent of those involved, someone should be held accountable,” Feinstein said.

    • Feinstein offers 15 point rebuttal to report on CIA
    • Egypt’s War on Atheism
  • Internet/Net Neutrality

  • DRM

    • Drone maker DJI will disable its units over Washington, DC, after White House crash

      Following the crash of one of its Phantom drones at the White House on Monday and a response from President Obama that more regulation of drones was needed, Chinese drone maker DJI will reportedly be disabling its units from flying over the DC area. According to the FAA, it was already against federal regulations to fly in that region, not to mention the fact that the pilot told the Secret Service he was drinking.

  • Intellectual Monopolies

    • Copyrights

      • Canadian Government Spies on Millions of File-Sharers

        New revelations from whistleblower Edward Snowden have revealed that Canada’s main electronic surveillance agency spied on millions of file-sharing downloads from some of the world’s most popular sites. More than 100 sites including Dotcom’s Megaupload were routinely monitored in a search for extremists.

]]>
http://techrights.org/2015/01/29/libreoffice-4-4/feed/ 0
Links 27/1/2015: Plasma 5.2, Dell Precision With GNU/Linux http://techrights.org/2015/01/27/dell-precision/ http://techrights.org/2015/01/27/dell-precision/#comments Wed, 28 Jan 2015 00:19:51 +0000 http://techrights.org/?p=81290

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • Finland’s million dollar list: an open source guide to the country’s startup investors

    As a result, Finland’s government has invested heavily in the country’s startup scene, resulting in some major post-Nokia success stories such as billion dollar startups Rovio and Supercell.

  • Security

    • Facebook denies outage due to Lizard Squad hack

      The Lizard Squad hackers’ group has claimed responsibility for Tuesday’s outage on Facebook and Instagram. Facebook officials, however, denied it was a hack attack, saying it occurred after they introduced a change affecting configuration systems.

    • Why screen lockers on X11 cannot be secure

      Today we released Plasma 5.2 and this new release comes with two fixes for security vulnerabilities in our screen locker implementation. As I found, exploited, reported and fixed these vulnerabilities I decided to put them a little bit into context.

      The first vulnerability concerns our QtQuick user interface for the lock screen. Through the Look and Feel package it was possible to send the login information to a remote location. That’s pretty bad but luckily also only a theoretical problem: we have not yet implemented a way to install new Look and Feel packages from the Internet. So we found the issue before any harm was done.

    • Now-Closed KDE Vulnerabilities Remind Us X11 Screen Locks / Screensavers Are Insecure
    • Tuesday’s security updates
  • Transparency Reporting

    • Google Secretly Gave WikiLeaks Data To US Government

      Incident happened almost three years ago but gag order on Google kept the search giant silent

      Google handed over data belonging to WikiLeaks to the US Government, but was not allowed to tell the group for almost three years.

  • Environment/Energy/Wildlife

  • Finance

    • ‘Profiteering’ care agency ‘took money’ from workers

      A “profiteering” care agency took hundreds of pounds from low-paid carers who were desperate for work, a BBC London investigation has found.

      HCA Professionals, based in Barking, east London, promised carers jobs if they paid for unnecessary and “highly unprofessional” training.

      Criminal record checks were charged for but not submitted and work did not materialise, but cash was not returned.

      The company, run by Chris Rigland, denies all wrongdoing.

    • Improbable as It May Seem to WaPo, Greek Voters Doubt Austerity Is Required

      Witte ends his article with Greek economist George Pagoulatos warning that Syriza’s voters “are not ready to accept the kind of compromise that the situation requires.” Witte describes Pagoulatos as “a former government adviser,” but doesn’t note that the governments he advised presided over some of the worst economic performance in Greece’s history, from November 2011 to June 2012. Perhaps voters might be forgiven for being skeptical of the benefits of the kind of compromises that Pagoulatos thinks are required (Beat the Press, 1/25/15).

  • PR/AstroTurf/Lobbying

    • The Race For Rupert Murdoch’s Endorsement

      The race for Rupert Murdoch’s endorsement is on as potential presidential candidates line up to seek political support from the owner of Fox News and The Wall Street Journal.

      Murdoch has long been a major political player whose media companies play a substantial role shaping the debate. Last year he declared that Fox News had “absolutely saved” the Republican Party by giving “voice and hope to people who didn’t like all that liberal championing thrown at them on CNN.” Prominent politicians on the national and international stage regularly seek out Murdoch’s opinion and approval.

    • The Kochs Will Spend $1 Billion on the 2016 Elections, but Deny It

      The political network organized by Charles and David Koch plans to spend an incredible $889 million to capture the White House in 2016 and deepen the Koch party’s bench in Congress. But that’s not what they’ll tell federal regulators.

  • Censorship

    • Facebook complies with Turkey page block order

      The BBC has learned that Facebook has complied with a Turkish court order demanding the blocking of a page it said offended the Prophet Muhammad.

      If the social media platform had refused, the court had threatened to block access to the entire site.

      The site is believed to have around 40 million members in Turkey.

    • TalkTalk forces porn filter choice

      TalkTalk says customers who have not yet chosen whether to activate net filters must opt out of its safety system if they wish to continue viewing adult material online.

  • Privacy

    • FOIA Documents Reveal Massive DEA Program to Record American’s Whereabouts With License Plate Readers

      The Drug Enforcement Administration has initiated a massive national license plate reader program with major civil liberties concerns but disclosed very few details, according to new DEA documents obtained by the ACLU through the Freedom of Information Act.

      The DEA is currently operating a National License Plate Recognition initiative that connects DEA license plate readers with those of other law enforcement agencies around the country. A Washington Post headline proclaimed in February 2014 that the Department of Homeland Security had cancelled its “national license-plate tracking plan,” but all that was ended was one Immigrations and Customs Enforcement solicitation for proposals. In fact, a government-run national license plate tracking program already exists, housed within the DEA. (That’s in addition to the corporate license plate tracking database run by Vigilant Solutions, holding billions of records about our movements.) Since its inception in 2008, the DEA has provided limited information to the public on the program’s goals, capabilities and policies. Information has trickled out over the years, in testimony here or there. But far too little is still known about this program.

    • WikiLeaks threatens legal action against Google and US after email revelations

      WikiLeaks is fighting back in an escalating war with both Google and the US government, threatening legal action the day after demanding answers for the tech giant’s wholesale handover of its staffers’ Gmail contents to US law enforcement.

      The targets of the investigation were not notified until two and a half years after secret search warrants were issued and served by the FBI, legal representatives for WikiLeaks said in a press conference on Monday.

    • Argentine president seeks to dissolve spy agency after murky death of state prosecutor

      President Cristina Fernandez plans to disband Argentina’s intelligence agency amid suspicions that rogue agents were behind the mysterious death of a state prosecutor investigating the 1994 bombing of a Jewish community center.

      In her first televised address since Alberto Nisman was found dead with a single bullet to the head, Fernandez said on Monday night she would send Congress a bill creating a new security body that would be more transparent.

    • The TSA Wants To Read Your Facebook Posts And Check Out Your Purchases Before It Will Approve You For PreCheck

      The TSA is disappointed that so few Americans have opted out of its bottle-tossing, package-groping screenings by signing up for its PreCheck program. For a few years now, the TSA has been selling travelers’ civil liberties back to them, most recently for $85 a head, but it’s now making a serious push to increase participation. The TSA can’t do it alone, so it’s accepting bids on its PreCheck expansion proposal.

    • [tor-talk] surveillance discussion in Finland

      Here is a very short summary of the surveillance discussion in Finland.

      Ministry of Defence of Finland published a report that proposes internet intelligence activities. The problem is that they also propose (Swedish FRA style) MITM to cross-border communication.

    • In Response to EFF Lawsuit, Government Ordered to Release Secret Surveillance Court Documents Today

      The government released two new FISC opinions this evening, both of which concern the transition of NSA surveillance to the oversight of the FISC in 2007. Neither of the two documents, available here and here, is the Raw Take order or the 2008 FAA order. The government has one additional production deadline in this case on March 2, 2015.

    • Lords should drop the Snooper’s Charter and let the parties set out their views at the election

      Yesterday’s Lords debate ended up with the future of the Snooper’s Charter amendments uncertain, after considerable criticism of both the process and the principle of reintroducing the Communications Data Bill into the Counter Terrorism and Security Bill. Further debate on the amendments may come back at the report stage of the Bill.

    • EFF’s Game Plan for Ending Global Mass Surveillance

      We have a problem when it comes to stopping mass surveillance.

      The entity that’s conducting the most extreme and far-reaching surveillance against most of the world’s communications—the National Security Agency—is bound by United States law.

    • Mass surveillance is fundamental threat to human rights, says European report

      Europe’s top rights body has said mass surveillance practices are a fundamental threat to human rights and violate the right to privacy enshrined in European law.

      The parliamentary assembly of the Council of Europe says in a report that it is “deeply concerned” by the “far-reaching, technologically advanced systems” used by the US and UK to collect, store and analyse the data of private citizens. It describes the scale of spying by the US National Security Agency, revealed by Edward Snowden, as “stunning”.

    • U.S. Spies on Millions of Cars

      The Justice Department has been building a national database to track in real time the movement of vehicles around the U.S., a secret domestic intelligence-gathering program that scans and stores hundreds of millions of records about motorists, according to current and former officials and government documents.

  • Civil Rights

    • Dwindling group of survivors to mark Auschwitz 70 years on

      A decade ago, 1,500 Holocaust survivors traveled to Auschwitz to mark the 60th anniversary of the death camp’s liberation. On Tuesday, for the 70th anniversary, organizers are expecting 300, the youngest in their 70s.

    • Auschwitz 70th anniversary: Survivors mark camp liberation

      About 300 Auschwitz survivors have gathered at the site of the former Nazi death camp to mark the 70th anniversary of its liberation.

      The commemoration will be held at the site in southern Poland where 1.1 million people, the vast majority Jews, were killed between 1940 and 1945.

      It is expected to be the last major anniversary event that survivors are able to attend in considerable numbers.

      [...]

      On the eve of the anniversary, German Chancellor Angela Merkel drew attention to discrimination against Jews in contemporary Europe, saying it was a “disgrace” that Jews faced insults, threats and violence in Germany.

      “We’ve got to fight anti-Semitism and all racism from the outset,” she said at a memorial event in Berlin.

      “We’ve got to constantly be on guard to protect our freedom, democracy and rule of law.”

    • Jury Convicts Former CIA Officer Jeffrey Sterling of Leaking to Journalist & Violating Espionage Act

      Jesselyn Radack, a Justice Department whistleblower, attorney and director of the Government Accountability Project’s National Security and Human Rights Division, reacted, “It is a new low in the war in whistleblowers and government hypocrisy that CIA whistleblower Jeffrey Sterling was convicted in a purely circumstantial case of ‘leaking.’ It shows how far an embarrassed government will go to punish those who dare to commit the truth.”

    • C.I.A. Officer Is Found Guilty in Leak Tied to Times Reporter

      The conviction is a significant victory for the Obama administration, which has conducted an unprecedented crackdown on officials who speak to journalists about security matters without the administration’s approval. Prosecutors prevailed after a yearslong fight in which the reporter, James Risen, refused to identify his sources.

    • Jeffrey Sterling, ex-CIA officer, convicted of leaking secrets to reporter

      A former CIA officer was convicted Monday of leaking classified details of an operation to thwart Iran’s nuclear ambitions to a New York Times reporter.

      Read more: http://www.washingtontimes.com/news/2015/jan/26/deliberation-to-reach-third-day-in-cia-leak-case/#ixzz3Q1X5Pwhm
      Follow us: @washtimes on Twitter

    • Jury convicts CIA whistleblower Jeffrey Sterling on all nine counts including espionage

      I’m not surprised the jury found Sterling guilty of some of the charges: of leaking Risen information on Merlin and the operation he was involved in, and of retaining and then leaking Risen a document involved in that. The government multiplied the charges for both the 2003 New York Times story (at which point, Sterling and Risen had only spoken for two minutes and 40 seconds) and the 2006 book (by which point they had had more lengthy discussions), such that each leak amounted to multiple charges. In addition, the jury convicted Sterling of passing government property worth over $1,000, and of obstruction of justice.

    • Bad week for press freedoms in North America

      Also this week, reports emerged showing that a Mexican mayor ordered a cop to kill a journalist he didn’t like; the “officer said they decapitated the journalist, mutilated his body and abandoned it in a ravine.” The journalist and social justice activist had been reporting about government corruption and killings. Now he’s dead and so cannot report on his own death at the hands of his government.

    • NUJ condemns US government’s communications data grab

      British citizen and investigations editor of Wikileaks, Sarah Harrison, has had all her emails and digital data handed over to the US government by Google. It took two and a half years to provide the details and the delay has potentially limited her ability to challenge the communications data grab.

    • ‘Attack on journalism’: WikiLeaks responds to Google’s cooperation with US govt

      Google’s willingness to surrender the private emails of WikiLeaks staffers to the United States government amounts to an “attack on journalism,” a representative for the whistleblower group says.

      Kristinn Hrafnsson, an Icelandic journalist who joined WikiLeaks as the group’s spokesman in 2010, said he’s “appalled” that Google gave up his personal correspondence and other sensitive details to the US government in compliance with a search warrant served to the tech giant, apparently in an effort to bring charges against the anti-secrecy organization and its editor, Julian Assange.

    • Single rose left at station in memory of teen shot by Longview police

      A single rose was left in front of the Longview police station on Cotton Street in memory of the teenager shot Thursday night.

      Investigators say the woman, identified as Kristiana Cognard, 17, of Longview, walked in the front doors of the empty lobby and made her way to the after-hours assistance phone.

      “We don’t know how she got here,” said Longview police officer Kristie Brian.

      After hours the police lobby is closed and all the windows are shut down. Police say Coignard came up to the courtesy phone and was connected to dispatch who then sent officers out to her.

  • Internet/Net Neutrality

    • More Than Three Billion People Worldwide Now Have Broadband

      We Are Social report shows 20 percent increase in broadband Internet users throughout 2014

    • Tomorrow Is Move Your Domain Day: Support The EFF And Get A Year For Free

      If you’ve been a Techdirt reader since the days of SOPA/PIPA, you probably know that Namecheap is a big supporter of a free and open internet, and was one of the first registrars to speak out against the bills. More recently, they’ve been big supporters of Techdirt directly, providing matching funds to our crowdfunding campaign for net neutrality reporting and sponsoring our sitewide switch to HTTPS. In October, they were one of only two companies that got a perfect score on the EFF’s ranking of service providers that stand up to copyright and trademark bullies, and many of us here at Techdirt use them for all our personal domain registration needs.

  • Intellectual Monopolies

    • Copyrights

      • Get Ready For Classic Songs Of The 50s & 60s To Disappear From Internet Streaming Thanks To Copyright Lawsuits

        Say goodbye to the musical hits of the 50s and 60s, if you like that sort of thing and listen via online services. Chances are they may start to disappear, as the places where you now get your streaming music realize they need to protect themselves against a possible massive liability. As we’ve covered for some time, there have been a few lawsuits filed recently over the licensing status of pre-1972 sound recordings. There’s a lot of history here, but a short explanation is that in 1909, when Congress redid copyright law, it didn’t think that sound recordings (then a relatively new concept) were copyrightable subject matter. Of course, in the years following that, as the “music business” turned into the “recording industry” pressure mounted by that industry led to a bunch of state regulations and common law creating copyright or copyright-like rights for sound recordings.

]]>
http://techrights.org/2015/01/27/dell-precision/feed/ 0
Links 10/11/2014: 2015 GNU/Linux Forecasts, Debian Shakeup http://techrights.org/2014/11/10/debian-shakeup/ http://techrights.org/2014/11/10/debian-shakeup/#comments Mon, 10 Nov 2014 20:41:25 +0000 http://techrights.org/?p=80150

GNOME bluefish

Contents

GNU/Linux

  • Acer Returns To Profitability

    Hmmm… Maybe they’ve taken my advice and gloried in the increased profits with GNU/Linux.

  • Desktop

    • Lenovo to launch low-cost Chromebook in early 2015

      Lenovo reportedly will launch Chromebook models targeting the sub-US$170 segment in early 2015, a move which will further drag down profits for notebook vendors, according to Taiwan-based supply chain makers.

    • Will 2015 finally be the year of the Linux desktop?

      I’m always a bit on the disinterested side when someone brings up the market share of desktop Linux. Yeah, it’s fun to kick around numbers and speculate about how doing this or that would increase the desktop market share of Linux. But in the end I don’t think it really matters much and it’s also a bit of a distraction from what really matters with Linux: making it better for the people who are already using it.

  • Audiocasts/Shows

    • Jessie Freeze, Reviews, and Linux Outlaws Quitting

      Today in Linux news, Debian 8 is frozen and Canonical confirms an Ubuntu tablet is in the works. Two reviews landed yesterday on the Kano Linux computer, one today on Ubuntu, and another on openSUSE 13.2. Linux Australia is now censoring its mailing list and Jack Wallen says Ubuntu 14.10 was a boring release because they are in a holding pattern.

    • The Last Stand

      After more than seven years of Linux Outlaws, my co-host Dan and myself have decided to end the show. This decision has been a while in the making and it is with a heavy heart that I am commiting to finally announce it.

  • Kernel Space

    • 10 Great Quotes from LinuxCon and CloudOpen Europe Keynote Videos 2014

      There were many inspiring talks alongside the great technical content at LinuxCon, CloudOpen and Embedded Linux Conference Euorpe in Dusseldorf last month. To give you a taste, I’ve chosen a quote from each keynote that I think will get your blood pumping or pique your interest. You can watch each keynote in full, below, or on the Linux Foundation’s YouTube channel.

    • Intro to Systemd Runlevels and Service Management Commands
    • Designing user space device drivers in Linux

      Is it possible to run Linux device drivers in the user space? In the past, user space drivers were mostly used to make graphics run faster while avoiding the kernel. They increasingly became more important and the kernel is now seen as an obstacle to high server connection capacity. This is why hardware companies started to provide solutions for user space drivers.

    • New Kernel Live Patching Combines kGraft & Kpatch

      Back in February SUSE unveiled a new means of live Linux kernel patching, kGraft, compared to the existing Ksplice. One month later, Red Hat unveiled their own solution that happened to be under development at the same time, Kpatch. Since both of them have been out, both have pursued mainline interests but neither one accepted upstream yet. Now a new live kernel patching solution is out that tries to take the best of both worlds.

    • Shellshocked Linux kernel – the kernel column

      Jon Masters informs us of the kernel’s role in the latest Shellshock security vulnerability, and summarises the work in the kernel community towards a final 3.17 release

    • A ‘proprietary’ Linux would have cost $1 trillion & 8,000 person-years

      As CTO at open source Business Intelligence (BI) products company Pentaho, James Dixon is responsible for the firm’s architecture and technology roadmap.

  • Applications

  • Desktop Environments/WMs

    • Microsoft finally got it correct

      Some months ago, I visited a Microsoft site to see if it could identify my OS correctly. I am a Linux user and the site identified my computer as a device running Windows 8.

      [...]

      Anyway, after all this time, I visited the MS site again and, to my surprise, it can now see me as a “non-windows user” :P Wow! I call that improvement!

    • K Desktop Environment/KDE SC/Qt

      • Franklin Weng: The strength behind open source is the strength of contributing

        Franklin is a 39 year old FOSS activist based in Taipei. He has coordinated KDE’s zh_TW translation team since 2006, and is the core developer of ezgo (Chinese), a compilation of educational software used by schools all over Taiwan. ezgo, which in its Linux installation uses KDE by default, blends more than 100 free software applications into one localized, easy to use package.

      • KDE Commit-Digest for 1st June 2014
      • Is KDE 5 Ready, Repo Dark Sides, and Black Lab Linux

        Today in Linux news Chris Hoffman looks at the “hidden dark side of Linux software repositories” using Ubuntu and ownCloud as examples. Jack M. Germain test drives Black Lab Linux, an Ubuntu compatible distribution aiming for ease of use. Jos Poortvliet answers “Where is KDE 5 and when can I use it?” Phoronix is reporting on the Fedora project’s ambition to include AppData in its software and Charlene Begley has been appointed to Red Hat’s Board of Directors.

      • Where is KDE 5 and when can I use it?

        The vast majority of users, when talking about “using KDE”, are talking about the desktop. Plasma, that is. So when you ask “when will KDE 5 be ready?”, your answer will be that our brand new desktop is already at version 5.1 and making swift progress! Stability is quite good, but there’s work to do in the feature area. Distributions don’t ship it as default yet.

      • Kalzium Is a Great KDE Chemistry/Periodic Table Application

        Kalzium is a periodic table application for KDE which not only displays detailed information about elements and allows you to view the periodic table using different schemes, but also allows you to perform various calculations, plot data depending on various factors, or balance chemical equations. It is a useful educational tool which can be of great aid learning about chemical elements.

      • Gwenview Image Viewer for KDE Overview

        Although there are many image viewers for Linux, most of them are GTK-based and KDE is left behind with not so many options. Of course, there are applications like Krita or Kolourpaint, but these are image editors, not just simple viewers. Gwenview is the default image viewer in KDE, and it does its job very well. Not only it has enough features to accommodate the more demanding users (like ratings, file browser or thumbnail view), but its functionality can be extended using the KIPI plugins, a KDE set of image plugins used by applications like DigiKam as well, besides Gwenview.

    • GNOME Desktop/GTK

      • Ubuntu GNOME 14.10 Screenshots Tour

        Ubuntu GNOME is an official flavour of Ubuntu, featuring the GNOME desktop environment. Ubuntu GNOME is a mostly pure GNOME desktop experience built from the Ubuntu repositories. Two years ago, Ubuntu GNOME has started as unofficial flavour to Ubuntu – see the release notes of 12.10 – and 6 months after that, Ubuntu GNOME has become an official flavour. So, 13.04, 13.10, 14.04 LTS and today, this is our 5th version and the 4th official one. Let’s find out more about Ubuntu GNOME 14.10

  • Distributions

    • Reviews

      • Black Lab Linux Is GNOME 3′s Best Friend

        Black Lab Linux is a general purpose free distribution for home users and small-to-mid-sized businesses. This particular segment of the Linux OS tries to bridge free OS and preconfigured commercial hardware/software with a flexible set of options.

      • Xubuntu 14.10 Utopic Unicorn : Fast and Responsive

        Xubuntu is an elegant Linux distribution based on Ubuntu, which uses the lightweight Xfce desktop environment to work, instead of the Unity desktop. Xubuntu is designed for computers with low computing resource, always guaranteeing the best performance.

    • New Releases

      • Welcome to Parsix GNU/Linux 7.0r0 Release Notes

        Parsix GNU/Linux is a live and installation DVD based on Debian. Our goal is to provide a ready to use and easy to install desktop and laptop optimized operating system based on Debian’s testing branch and the latest stable release of GNOME desktop environment. Users can easily install extra software packages from Parsix APT repositories. Our annual release cycle consists of two major and four minor versions. We have our own software repositories and build servers to build and provide all the necessary updates and missing features in Debian stable branch.

    • Screenshots

    • Ballnux/SUSE

    • Red Hat Family

    • Debian Family

      • Debian 8.0 “Jessie” Enters Feature Freeze

        Debian developers have announced that the Debian 8.0 “Jessie” development cycle has been frozen and all the updates that will land from on now will consist only of bug fixes.

      • Joey Hess, Developer Of 18 Years With Debian Departs

        Perhaps it’s time that Debian reform it’s social contract/internal procedures to deal with dissent by better means than personal attacks on the lists or departures of key people. Democracy/fairness works but sometimes gets off the rails when conflicting groups try to have their way at the expense of others. It’s not enough just to have a mechanism to break deadlocks. It’s important to respect minorities of users as it is to respect the majority of developers. One only needs to see the USAian government to see how extremism and disrespect can go way overboard. We don’t want Debian to go that way.

      • Systemd fallout: Joey Hess quits Debian project

        The ruckus over the adoption of systemd as the default init system for Debian appears to have claimed a victim, with veteran developer Joey Hess announcing that he is leaving the project.

      • Derivatives

        • Canonical/Ubuntu

          • Ubuntu, ownCloud, and a hidden dark side of Linux software repositories

            The version of ownCloud in Ubuntu’s Universe repositories is old and full of “multiple critical security vulnerabilities.” It’s no secret. The ownCloud project itself asked Ubuntu to remove it so users wouldn’t have vulnerable server software. Ubuntu suggested to ownCloud they should take over maintaining it instead. OwnCloud thought that was ridiculous—they just want to write software and not maintain it in every distribution’s repositories.

          • Ubuntu 14.10 Utopic Unicorn review – No rainbows

            I am willing to extend the slight benefit of doubt to the Ubuntu family and retest on different hardware sometime in the future, as well as give Kubuntu and Xubuntu their due spin and such. But if this turns out to be legacy hardware issues so to speak, then we will be having an essay in expletives. Anyhow, skip this. Stay with Trusty, it’s awesome and stable and fun. And let’s see what the rest of the pack can do. For now, Unicorn, 0/10.

          • Details Emerge on UT One Ubuntu Linux Tablet

            Details continue to emerge on the UT One, the tablet with an Intel processor that will run on Canonical’s Ubuntu operating system. Here are the latest revelations on what will very possibly be one of the first x86-based mobile devices powered by an open source Linux distribution (yeah, Android is not really a Linux distribution).

            Rumors regarding the UT One, whose developers say they will have the hardware ready to ship by the end of this calendar year, first appeared about a week ago. Since then Canonical’s role has become clearer, even if the details of the relationship between the company and the UT One developers remain to be determined.

          • Canonical launches LXD: Secure, open-source container hypervisors

            Docker is making waves again. Just this week, Google Inc. launched its cloud-based Docker-as-a-service called “Container Engine”, which is now available on its Google Compute Engine platform. And now, not to be outdone, Canonical Ltd. is trying to put an entirely new spin on the container concept with the release of its new Linux Container Demon (LXD) project.

          • Press Reaction to Ubuntu 14.10 ‘Utopic Unicorn’

            Ubuntu 14.10 ‘Utopic Unicorn’ went public two weeks ago, giving the mainstream tech press ample time to cast a critical once over.

            As one might expect for this release, the coverage receiving it has been overwhelmingly ambivalent.

          • 20 things I did after installing Ubuntu 14.10/Ubuntu 14.04
          • Pro tip: How to easily upgrade Ubuntu 14.04 to 14.10

            Jack Wallen walks you through the process of upgrading your Ubuntu 14.04 release to 14.10.

          • Flavours and Variants

            • Kubuntu 14.10 Utopic Unicorn : Released With KDE 4.14 and KDE Plasma 5

              Kubuntu 14.10 Utopic Unicorn was released and announced by Kubuntu team, as official ubuntu flavor based on Ubuntu 14.10 that uses the KDE desktop environment bring with new features and updates. it now ready to download and install on your computer.

              On this release Kubuntu team announce Kubuntu 14.10 with two varian, the stable KDE 4.14 (Plasma 4) running the desktop we know from ubuntu previous releases, and a tech preview of the next generation KDE Plasma 5 for early adopters.

            • Lubuntu 14.10 Utopic Unicorn : Simple, Lightweight and Support for Low-end Machines

              Lubuntu 14.10 Utopic Unicorn is an linux distribution derived from Ubuntu 14.10. As official ubuntu flavor that uses the lightweight LXDE (Lightweight X11 Desktop Environment) window manager has been released with new features and bug fixes.

  • Devices/Embedded

    • Rugged Linux box-PC excels at industrial fieldbuses

      Ixxat’s ruggedized “Econ 100″ DIN rail computer runs Linux on an ARM/FPGA Xilinx Zynq SoC, and supports multiple industrial Ethernet and fieldbus protocols.

    • Rugged industrial gateway runs Linux on TI Sitara

      Advantech’s rugged, industrial gateway computer runs Linux on a Sitara AM3352, and features dual gigabit Ethernet ports, WiFi, CAN, and five serial ports.

      Previous UBC-branded box computers have offered the Freescale i.MX6 system-on-chips, but for the Linux-ready “UBC-FA30,” Advantech has turned to the Texas Instruments Sitara AM3352. This low-end, Cortex-A8 Sitara AM355x SoC lacks the 3D graphics and PRU subsystems of some the other Sitara models, but can still crank it up to 1GHz, the maximum clock rate available on the UBC-FA30.

    • BeagleBoard-X15 sports dual-core Cortex-A15 Sitara

      BeagleBoard.org is prepping a “BeagleBoard-X15″ SBC that will ship in February with 2GB of RAM, dual GbE ports, eSATA, and TI’s dual-core Sitara AM5728 SoC.

    • BeagleBone cape eases access to the Sitara SoC’s PRU
    • Bullet Pi Interview

      So I’d seen The Matrix and also a BBC programme called Supernatural: The Unseen Powers Of Animals, where they shot dolphins jumping out of the water and they could just freeze time, and then spin round so you saw the water drops, and I thought that was a really amazing effect. And reading how it was done, it was with a whole array of cameras and it seemed quite simple. So I had the Raspberry Pi and a couple of cameras sat on my desk, and it was sort of like, ‘Well, if it seems that simple, then surely if we just got a whole load of Raspberry Pis and cameras – and they’re not that expensive – why shouldn’t we just be able to build it?’ It was one of those moments where you think it should work but you don’t actually know. So what I did was buy four cameras and I tried it, and that looked like it would work – it gave us a tantalising glimpse that we could do it.

    • Tiny Raspberry Pi A+ SBC goes for $20

      The Raspberry Pi Foundation launched a Model A+ with a $20 price, and a tiny 65 x 56mm footprint, 23g weight, and compact 40-pin expansion header.

    • Raspberry Pi supercapacitor micro-UPS seeks funding
    • New Raspberry Pi A+ computer gets smaller, cheaper, and therefore more awesome

      The Raspberry Pi Foundation unveiled its latest computer today, the A+, a smaller version of its previous release that costs only $20.

    • New Raspberry Pi Gets Even Smaller, Cheaper

      Home-baked computing just got a little cheaper: The next-generation Raspberry Pi A+ data processor is available now for $20.

      A step up from the original Model A, this low-cost variant comes after the summer release of the $35 Raspberry Pi B+.

    • Phones

      • Tizen

        • [Developer] Booting Tizen Common on Radxa Rock with Rockchip RK3188

          Our friend Leon Anavi is at it again !!!! What I mean by that vague statement is that he is porting Tizen onto another Development Board, in this case the Radxa Rock dev board that supports the Rockchip RK3188 SoC, which is a 28nm 1.8Ghz quad core ARM Cortex A9 and quad core Mali 400-mp4 GPU. It has 2GB DDR3 RAM and 8GB internal storage

      • Android

        • Smartphone Bloodbath Q3 full results Top 10 brands, OS platforms and installed base (corrected)

          So yeah no change here. Its a two-horse race that Android is totally dominating. Now for the next quarter expect the traditional ‘first full quarter of new iPhone model sales surge’ but then it again settles down. On an annual basis Android OS outsells iPhones by more than 5 to 1. Windows is dead. Blackberry is now a miniscule niche. None of the new OS platforms has yet caught on fire or behaved like a fox.

          [...]

          Yeah, nothing new here either. Android keeps growing, iOS has a higher market share in installed base than new sales primarily as iPhones have a far longer use often being passed down than most smartphones but still Android installed base is well more than 3 times larger than iOS

Free Software/Open Source

  • After years of touting its cloud computing tech, Joyent open sources it
  • Joyent Clarifies its Love for Docker, and its Intent to Work With It
  • Joyent Open Sources its Central Cloud and Container Tools
  • Joyent Makes Open Source Private Cloud Container Platform Available
  • Joyent and Canonical to open source container technologies

    Joyent and Canonical are the latest cloud firms to open source their container technologies.

    Joyent, which recently raised $15m in funding, announced a container-based cloud-hosting platform that could be used as the basis for running large-scale, big-data tasks.

  • Talk with CEO of Kaleidos, new project management tool Taiga

    When I introduced Taiga on Opensource.com, the article was well received. It seemed like people were looking for a new project management system and Taiga satisfied some of the requirements in mind. As evidenced, in the first month of its existence, Taiga gained approximately 12,000 registered members, 10,000 projects, and 1000 GitHub clones. They are also seeing considerable traffic from Fortune 500 companies starting projects!

  • Rackspace offers free open source private cloud templates

    Rackspace has produced a suite of free software templates for firms to use to deploy some of the most widely used open source applications available.

  • OpenStack ROI and the Myths of Open Source

    In a panel at the OpenStack Summit here, executives from HP, Piston Cloud Computing and SwiftStack answered questions about the ROI (Return on Investment) from OpenStack.

  • eNcade Is a Portable Raspberry Pi Gaming Console That Doubles Up as a Desktop PC

    eNcade is a portable Raspberry Pi-powered gaming tablet that is currently in the works. Its makers are looking for funding on Kickstarter and they are hoping to get enough money so that they can properly start this project.

  • Raspberry Pi Annual on sale today
  • Is the business of FOSS really community software?

    For the time being, we are using the term community software for the reasons Rob talked about in his original article on the subject. An important way to think about community software is that if free software represents the ethics and open source concerns represents the technology, then community software represents the business. This is important because we need to acknowledge that business provides the resources we need to develop our communities. This is not limited to financial resources but also knowledge sharing across a broad range of disciplines including marketing, legal matters, and technical expertise. Community software is a way for those of us engaged in these activities to have a voice alongside developers and engineers.

  • Companies Are Finally Learning To Share—The Open Source Way

    What may be new is a willingness to actually engage in open source, rather than simply use it. While there is value in simply using open-source software, there’s far more value in participating in it.

  • Twitter Emojis Are Now Open Source

    If a picture is worth a thousand words, what about an emoji? The official stance: Free. Twitter has announced that after a project to make their emojis more readable on the web, it’s now making them completely open source — which means you can expect to see them in all the varied nooks and crannies of this here internet.

  • Events

  • Web Browsers

    • Mozilla

      • Firefox Turns 10, Making Reglue Stick & Outlaws Ride
      • Mozilla Delivers Firefox Developer Edition

        Mozilla has officially launched Firefox Developer Edition, billing it as “the first browser created specifically for developers.” If developers sound like a very narrowcasted audience to aim a browser at, remember that many of them complain about having to work across numerous platforms and environments and aim for disparate app stores. There are also a lot of them who work in Firefox via tools such as Firebug.

  • Databases

    • MongoDB’s Dwight Merriman: From DoubleClick to Database

      About an hour or so after Jeffrey Hammond from Forrester Research gave his keynote address at All Things Open, in which he spoke of a survey which found that three out of four programmers use open source development tools, I had the opportunity to talk with an entrepreneur developer who’s definitely sold on FOSS. “The days of closed source software are kind of over,” he says, “except for special cases.”

  • Oracle/Java/LibreOffice

    • The Document Foundation sets precedents & paves new opportunities for Free Software

      The Document Foundation role is to support and grow the LibreOffice & Document Liberation project and promote Free Software and Open Standards. You will notice in this statement two key points; first, it is not directly the role of the Document Foundation to develop the LibreOffice code: the community of volunteers is in charge of that and second, the actual role of the foundation is actually to protect and cater to the community’s needs and logistics.

    • LibreOffice defends handling of spreadsheet bug

      A new version of LibreOffice’s Calc program has broken many spreadsheets, users say, and a perceived unwillingness by developers to address the problem has sparked an ill-tempered argument.

  • Education

    • Root access for students at Penn Manor

      So, what is Penn Manor doing differently? First, they’re doing everything with open source. They use Koha, Moodle, Linux, WordPress, Ubuntu, OwnCloud, SIPfoundry, and VirtualBox.

  • BSD

    • archive.org is good for old tech docs

      I saw on Undeadly a note that OpenBSD’s Ted was patching the ancient bcd program, which converts text into ASCII-art representations of punch cards. Punch cards were a technology from the 1960s and 1970s (?) that stored code or data on cardstock, with holes punched out of them. Each card held a line of text. If I recall correctly, each character was a column on the card, with as many as seven holes punched out of set of 12 possible locations. There were 40 to 80 columns on the card, according to the brand and the decade.

  • FSF/FSFE/GNU/SFLC

    • Software Freedom Conservancy and Free Software Foundation announce copyleft.org

      This new site will not only provide a venue for those who constantly update and improve the Comprehensive Tutorial, but is also now home to a collaborative community to share and improve information about copyleft licenses, especially the GNU General Public License (GPL), and best compliance practices.

    • GNU acct 6.6.2
    • We Fix the Net Assembly @ 31c3

      The “We Fix the Net” assembly” is to be the perfect place at 31c3 for all hackers to do something about replacing today’s broken Internet with secure alternatives. We hope to have some talks and panels like last year. Details will be posted here closer to the congress, for now, please contact us at wefixthenet@gnunet.org if you are interested to present your work or organize something practical.

  • Licensing

    • 3 great reasons to give away your precious tech under an open-source license

      Earlier this week, cloud provider Joyent did a surprising thing: It shared its finely tuned cloud software, SmartDataCenter, under an open-source license.

      But while it might seem like the company is giving away its high-value intellectual property at a time when Amazon, Google, and Microsoft have made the public cloud market ultra-competitive, Bryan Cantrill, the company’s chief technology officer, actually has some very smart justifications for the move, which he spelled out in a blog post.

    • Why all software needs a license

      All software developers should add a copyright license. Why? Because open source licensing is all about granting permission in advance

  • Openness/Sharing

    • New games on Linux, OpenGL graphics driver, Coco2d-x game engine, and more
    • First Open-Source Algorithm Cooperative Announced at MEMS Executive Congress US 2014
    • Open source bioinformatics data platform gets helps from student hackers

      At Era7 Bioinformatics, we are a bioinformatics company specializing in sequence analysis, knowledge management, and sequencing data interpretation. Our mission is to help our customers obtain the maximum value from their Next Generation Sequencing projects. And, Bio4j is our high-performance, cloud-enabled, graph-based, and open source bioinformatics data platform, integrating the data available in the most representative open data sources around protein information. It integrates the data available in UniProt KB (SwissProt + Trembl), Gene Ontology (GO), UniRef (50, 90, 100), RefSeq, NCBI taxonomy, and Expasy Enzyme DB. The current version has more than 2,000,000,000 relationships, 400,000,000 nodes and 1,000,000,000 properties. Bio4j provides a completely new and powerful framework for protein related information querying and management. Since it relies on a high-performance graph engine, data is stored in a way that semantically represents its own structure. On the contrary, traditional relational databases must flatten the data they represent into tables, creating artificial ids in order to connect the different tuples; which can in some cases eventually lead to domain models that have almost nothing to do with the actual structure of data.

    • Developer browser, Google open source releases, and more
    • Open Data

      • Cory Doctorow: Information Doesn’t Want To Be Free

        The technical implausibility and unintended consequences of digital locks are big problems for digital-lock makers. But we’re more interested in what digital locks do to creators and their investors, and there’s one important harm we need to discuss before we move on. Digital locks turn paying customers into pirates.

Leftovers

  • Security

  • Environment/Energy/Wildlife

  • PR/AstroTurf/Lobbying

    • Richmond Voters Beat Chevron Corporate Coup d’ Etat

      In Richmond, CA, three seats on the City Council were up for election; the city also stood to elect a new mayor. Nothing unusual in this, perhaps, was it not for Chevron’s $3.1 million dollar campaign to highjack the elections, which was first revealed by journalism student and former Center for Media and Democracy reporter, Harriet Rowan in the Berkeley publication Richmond Confidential.

    • Meet Wisconsin’s Wacky New Congressman

      America, meet Glenn Grothman, Wisconsin’s newly-elected, weekend-hating Congressman who has a beef with Kwanzaa and his own explanation for the gender pay gap.

      According to Grothman, “money is more important for men.”

      The Republican state senator was elected to the U.S. House of Representatives Tuesday, winning handily in Wisconsin’s gerrymandered 6th Congressional District.

      “Glenn Grothman doesn’t just drink the crazy right-wing Kool-Aid,” said Congressman Mark Pocan in 2011, when he was a state representative. “He is the one making it.”

  • Privacy

    • Silk Road, other Tor “darknet” sites may have been “decloaked” through DDoS [Updated]

      Last week’s takedown of Silk Road 2.0 wasn’t the only law enforcement strike on “darknet” illicit websites being concealed by the Tor Project’s network of anonymizing routers. A total of 410 .onion pages on at least 27 different sites, some of which sell everything from drugs to murder-for-hire assassins, were shut down as part of Operation Onymous—a joint operation between16 member nations of Europol, the FBI, and US Immigration and Customs Enforcement.

    • Raided for hosting a Tor node? New precedent set

      Over the last 48 hours the alleged owner of Silk Road 2.0 has been arrested in San Francisco and named as Blake Benthall, a former SpaceX employee who left the firm in February. I got alerted to this event via the Tor subreddit where an eastern European (he didn’t disclose what country) said his house had been raided, two computers seized and told he is an ‘international suspect of fraud and money laundering’ and could face a maximum sentence of fourteen years in prison although no charges have been pressed at this point.

    • Biggest ever Tor raid hits 410 underground sites; 17 arrested

      Coordinated raids by law enforcement agencies in the U.S. and 16 European countries have closed hundreds of underground websites, including dozens dealing in weapons and drugs, and led to the arrest of 17 people.

    • Symposium: Mass Surveillance — When Reality Exceeds The Fiction

      As part of an exceptional event, the Lisbon & Estoril Film Festival and La Quadrature du Net partner for a symposium on mass surveillance. The largest gathering of thinkers, activists and artists – since Edward Snowden’s revelations – will take place in Portugal on the 14th, 15th and 16th of November 2014, in the Cultural Center of Belem.

    • The courts should decide how much privacy we’re entitled to – not GCHQ
    • British Spies Are Free to Target Lawyers and Journalists

      British spies have been granted the authority to secretly eavesdrop on legally privileged attorney-client communications, according to newly released documents.

      On Thursday, a series of previously classified policies confirmed for the first time that the U.K.’s top surveillance agency Government Communications Headquarters (pictured above) has advised its employees: “You may in principle target the communications of lawyers.”

    • Did the government hack a CBS journalist? Maybe. [Updated]

      Sharyl Attkisson was hacked. The computers used by the former CBS News investigative reporter were found to have been remotely accessed and tampered with, according to both a CBS-hired forensics expert and a reputable information security firm that did an analysis commissioned by Attkisson herself. Those are the facts as we know them.

    • Remember, Remember: Reflections On This Fifth Of November

      As this Fifth of November gathered more people than ever, demanding an end to surveillance and censorship and calling for civil liberties such as freedom of speech to be restored, it is adequate to reflect a bit, just as V originally did.

    • Funniest/Most Insightful Comments Of The Week At Techdirt

      This week, and our first place comment for insightful scored pretty high on the funny side too (though not quite enough to break the top two). After it was discovered that Islamic extremists were using the YouTube copyright dispute process to get personal data on critics, Jon Renaut noted that technically this fulfills an old fearmonger prophecy:

      They keep telling us that copyright infringement helps terrorists and now look – sure enough, the laws we made them pass to stop infringement are finally doing it.

    • What Makes a Good Security Audit?

      EFF recently began a new Campaign for Secure & Usable Crypto, with the aim of encouraging the creation and use of tools and protocols that not only offer genuinely secure messaging, but are also usable in practice by the humans who are most vulnerable to dangerous surveillance, including those who are not necessarily sophisticated computer users. The first phase of this campaign is the Secure Messaging Scorecard, which aims to identify messaging systems that are on the right track from a security perspective. In subsequent phases of the campaign, we plan to delve deeper into the usability and security properties of the tools that are doing best in the Scorecard. One crucial aspect of the Scorecard and the campaign is and will be code auditing. We’ve gotten a lot of questions about the auditing column in the Scorecard, so we thought it would be good to expand on it here.

    • Berlin’s digital exiles: where tech activists go to escape the NSA

      With its strict privacy laws, Germany is the refuge of choice for those hounded by the security services. Carole Cadwalladr visits Berlin to meet Laura Poitras, the director of Edward Snowden film Citizenfour, and a growing community of surveillance refuseniks

  • Civil Rights

    • NYPD officers charged after video catches teen getting pistol whipped

      “The video speaks for itself, doesn’t it?” Brooklyn District Attorney Kenneth Thompson said Wednesday about a brief video recording that led to two New York Police Department cops being charged in connection to the pistol-whipping assault of a 16-year-old Brooklyn boy. The boy, who was arrested for marijuana possession, ended up with broken teeth and bruises.

      The officers charged in Brooklyn Supreme Court on Wednesday are David Afanador, 33, and Tyrane Isaac, 36, both nine-year veterans.

      The 82-second video of the teen’s August 29 beating—widely available on the Internet—was captured by a local Crown Heights business. The tape shows the boy running before eventually stopping and raising his hands, after which he is pummeled and taken to the ground.

    • Video: In expletive-laced encounter, officer allegedly slaps man

      A Saratoga County sheriff’s sergeant was suspended after a video posted on the Internet Friday captured him allegedly slapping a young man as the deputy insisted on searching his vehicle, which had a rifle on the back seat.

      Sheriff Michael Zurlo on Saturday said he was “very disturbed” by what he saw on the video.

  • Internet/Net Neutrality

  • Intellectual Monopolies

    • Leaked Documents Raise Concerns Over Chemical Dangers of TTIP

      Documents leaked in October 2014 reveal that the upcoming Transatlantic Trade and Investment Partnership (TTIP) deal potentially threatens public safety by reducing the ability of the European Union (EU) to enforce safety requirements on dangerous carcinogenic and endocrine disrupting chemicals. As Nadia Prupis reports for Common Dreams, this agreement would establish a cooperative front on the part of the two powers to create common regulations under the banner of decreasing trade barriers.

    • Copyrights

      • Islamic Extremists Use YouTube’s Automated Copyright Dispute Process To Access Critics’ Personal Data

        YouTube’s infringement reporting system is — like many others around the web — fundamentally broken. Making bogus copyright claims is still an easy way to get channels shut down or to siphon ad revenue from existing videos. It can also be used as a censor — a cheap and dirty way to shut up critics or remove compromising video.

      • AVG Monitors Torrenting Habits to Advise Heavy Downloaders

        Anti-virus software can be a great help to keep viruses and malware at bay, but AVG takes its responsibilities a bit further. Avid BitTorrent users who download files at near-maximum speeds get a friendly reminder from AVG explaining that they may want to pause their downloads to improve web browsing.

      • Pirate Bay Founder Peter Sunde Released From Prison

        Former Pirate Bay spokesperson Peter Sunde is a free man again. After more than five months he was released from prison this morning. Peter is expected to take some time off to spend with family and loved ones before he continues working on making the Internet a better place.

      • BitTorrent Wins $2.2 Million Damages From “Scammer”

        BitTorrent Inc, the parent company of the popular file-sharing applications uTorrent and BitTorrent, has won $2.3 million in damages from its German namesake Bittorrent Marketing GMBH. A federal court in California branded the German company a cybersquatter and ruled that it misled BitTorrent users for financial gain.

]]>
http://techrights.org/2014/11/10/debian-shakeup/feed/ 0
Links 24/10/2014: Microsoft Tax Axed in Italy, Google’s Linux (ChromeOS/Android) Leader Promoted http://techrights.org/2014/10/24/microsoft-tax-axed-in-italy/ http://techrights.org/2014/10/24/microsoft-tax-axed-in-italy/#comments Fri, 24 Oct 2014 23:27:28 +0000 http://techrights.org/?p=79930

GNOME bluefish

Contents

GNU/Linux

  • Server

    • oVirt Node: hosted-engine

      oVirt Node 3.5 contain ovirt-node-plugin-hosted-engine available which make possible setup oVirt Node run oVirt Engine as virtual machine with HA (more then one node required).

    • Cumulus Linux 2.5 adds mainstream L2 features to bare-metal switching

      As Cumulus Networks attempts to expand beyond the early adopters of its Cumulus Linux bare-metal switch operating system, it is adding Layer 2 networking features aimed at making it easier for enterprises to make the transition from legacy environments to the IP fabrics that most cloud computing customers operate.

  • Kernel Space

    • MSI X99S SLI PLUS On Linux

      For Intel Core i7 5960X Haswell-E Linux testing I originally bought an MSI X99S SLI PLUS motherboard as it was one of the most interesting, lowest-priced boards available at the time of the Intel X99 chipset debut. While I initially ran into some problems, those issues have now been confirmed to be isolated, and with a replacement X99S SLI PLUS motherboard I have been stressing it constantly for the past few weeks on Fedora and Ubuntu. The X99S SLI PLUS has now proven itself to be a reliable motherboard that’s still among the least expensive X99 ATX motherboards on the market.

  • Applications

  • Desktop Environments/WMs

    • The Linux desktop-a-week review: LXDE

      Over the last two weeks I’ve run nothing but LXDE as my primary Linux Desktop Environment (other than a few excursions into Android land). Been using LXDE. Been enjoying LXDE.

      But I have practically nothing to really say about LXDE. I feel like, after all this time, I should have something interesting to talk about. But I just plain don’t.

      It’s fast, blisteringly fast. And it’s damned lightweight too. After that, things get pretty boring.

    • K Desktop Environment/KDE SC/Qt

      • Kubuntu Shirts are Back

        Kubuntu T-shirts and Polo Shirts are available again. This time our supplier is HelloTux who are working with the Hungarian Ubuntu LoCo. $3 from each shirt goes to Kubuntu and $1.5 to the Hungarian LoCo team.

    • GNOME Desktop/GTK

      • Introducing Gthree

        I’ve recently been working on OpenGL support in Gtk+, and last week it landed in master. However, the demos we have are pretty lame and are not very good to show off or even test the OpenGL support. I’ve looked around for some open source demos that used modern GL that we could use, but I didn’t find anything that we could easily use.

  • Distributions

    • Reviews

      • Neptune OS 4.2 Features a Refreshing KDE Desktop

        ZevenOS-Neptune 4.x branch is called “It’s all about you” and it was initially made available back in June. This is the second update for the distribution and the devs have refined some of the features and have added some new packages into the mix.

        The system is based on KDE, but don’t expect to find a regular stock version implemented. It’s clear that the devs have put a lot of effort into making the DE experiences unique. Users can immediately recognize what distribution they are looking at just with a glance, and that’s always a good sign.

    • Arch Family

      • Diary of a new Arch user, week two

        So, I’ve finally decided to take the plunge and installed Arch Linux. It’s something I’ve been meaning to do for a while. For those of you who haven’t come across this distro before, it’s built on the idea that the user should have full control of their system. This means that the basic install is just the Linux kernel and a few essential utilities. In order to create a fully working system, you need to choose what bits you want to install on top of that yourself. There’s no installer to guide you (but there is a package manager and a wiki to help you).

    • Red Hat Family

      • Video: Getting Ready for systemd (in RHEL7)

        I found the link to this video (Getting Ready for systemd) on the systemd documentation page. It is a Red Hat “Customer Portal Exclusive” and “Not for Distribution” but it is ok for me to provide a picture that links to it… that looks like a video-ready-to-play.

      • Fedora

        • Fedora 22 Could Get the Desktop from elementary OS

          The Fedora Linux distro is an operating system with a very rich history and it comes with all sorts of desktop environments. A proposition has been made now to give users a new desktop environment to play with, Pantheon.

    • Debian Family

  • Devices/Embedded

    • Make Your Own Wireless Printer With A Raspberry Pi

      Wireless technology is perhaps the best improvement to home printing for years. Fewer cables, flexibility about where you can put your printer – it’s win-win. Unless you have an older printer.

    • Google’s Nest buys Linux automation firm, adds five partners

      Google’s Nest Labs acquired Revolv, a maker of Linux-based home automation devices, and announced five new Nest-compatible devices. including the Pebble.

      After Google acquired Nest Labs in January $3.2 billion, placing a stake in the fast-growing home automation business, Nest acquired home surveillance camera maker Dropcam in June for $555 million. Now Nest announced it has acquired another major home automation company in its purchase of Revolv. The acquisition, which was announced with no dollar amount, came shortly after the Boulder, Colo. based company announced compatibility with the Nest Learning Thermostat and Nest Protect CO/smoke detector.

    • Phones

      • Tizen

        • Tizen Developer Summit Shanghai 2014 #TDS14SH

          At the Tizen Developer Summit shanghai 2014, Brian Warner kicked off the Keynote sessions to a packed Chinese crowd, which was a great sight to see. He drew attention to the fact that there have been releases several Tizen products this year, which hasn’t been the case in recent times.

        • Is the Tizen Samsung Z Alive and running Tizen 2.3 SM-Z910F ? #TDS14SH

          At the Tizen Developer Summit 2014 Shanghai, Samsung were showing off the Gear S, and also the Samsung Z Smartphone. Taking a further glimpse at the settings we can see that it is listed as running Tizen 2.3, which recently saw the release of the Tizen 2.3 Beta SDK. As a recap, the Samsung Z was the Tizen flagship Smartphone that Samsung were due to release at the Tizen developer summit in Russia, but cancelled the launch with only 48 hours to spare.

      • Android

        • How to Get Open Source Android

          Android is an astonishing commercial success, and is often touted as a Linux success. In some ways it is; Google was able to leverage Linux and free/open source software to get Android to market in record time, and to offer a feature set that quickly outstripped the old champion iOS.

          But it’s not Linux as we know it. Most Android devices are locked-down, and we can’t freely download and install whatever operating systems we want like we can with our Linux PCs, or install whatever apps we want without jailbreaking our own devices that we own. We can’t set up a business to sell Google Android devices without jumping through a lot of expensive hoops (see The hidden costs of building an Android device and Secret Ties in Google’s “Open” Android.) We can’t even respin Google Android however we want to and redistribute it, because Google requires bundling a set of Google apps.

        • Another Tor router crowdfunding project nixed by Kickstarter

          Kickstarter is apparently not the place to go if you’re trying to crowdfund privacy hardware. Just days after the Anonabox project, a highly criticized effort to package the Tor privacy protection service into a portable miniature Wi-Fi router, was suspended by the crowdfunding site, another similar project has met its demise—and its founder’s account has been deleted.

        • LG’s first SoC debuts on 5.9-inch G3 Screen phone

          LG announced its first SoC, a Cortex-15 and –A7 octa-core “Nuclun” with LTE-A Cat.6 tech that debuts this week in a Korea-bound LG G3 Screen Android phone.

        • Google CEO Page appoints Sundar Pichai as product boss

          Google Inc. CEO is handing over responsibility for the company’s products to a key lieutenant, Sundar Pichai, putting him in charge of research, search, maps, Google+, commerce, ads and infrastructure, Re/code reported.

Free Software/Open Source

  • LinkedIn and Twitter Contribute Machine Learning Libraries to Open Source

    Twitter’s engineering group, known for various contributions to open source from streaming MapReduce to front-end framework Bootstrap recently announced open sourcing an algorithm that can efficiently recommend content. This is a really important problem for Twitter as it helps promoting the right ads to the right users and recommending which users to follow. The algorithm, named DIMSUM, can pre-process similarity data and feed the actual recommendation algorithm with a subset of users that are calculated to be above a similarity threshold.

  • Why Open Source Is Becoming A Big Developer-Recruiting Tool

    Most companies are just coming around to the idea that open source can help lower costs and boost innovation within their organizations. But Web companies like Netflix, Twitter and Facebook understand that open source can be more: a powerful weapon for recruiting and retaining top engineering talent.

  • SimplyTapp launches open source tokenization project

    “We don’t want to put any hindrance in the way of a bank launching cloud-based payments because they have to buy or rely on another ecosystem player for new technology and so we thought it was a perfect use case for an open source project. Open source allows a perfect line of audit where you can actually see the source code, modify the source code and make updates to the source code for your environment before you’re running it.

  • Web Browsers

    • Mozilla

      • MozFest 2014 begins today

        More than 1,600 participants from countries around the globe will gather at Ravensbourne in East London for a weekend of collaborating, building prototypes, designing innovative web literacy curricula and discussing how the ethos of the open web can contribute to the fields of science, journalism, advocacy and more.

  • SaaS/Big Data

    • Apache CloudStack Arrives in New Version, Stays Popular

      The Apache CloudStack project has released version 4.4.1, the new version of its private, public and hybrid cloud software. The latest revision of the open source CloudStack platform has “dozens of new features and improvements,” as noted in an Apache Software Foundation release.

    • HP Launches Helion OpenStack Build/Services, to Take on AWS

      HP has steadily been making a lot of noise about its commitment to cloud computing overall, and the OpenStack platform in particular. And, back in May, HP chief Meg Whitman announced the cloud-focused Helion brand, and pledged to commit $1 billion over the next two years on products and services surrounding OpenStack.

  • Databases

    • eBay open sources a big, fast SQL-on-Hadoop database

      eBay has open sourced a database technology, called Kylin, that takes advantage of distributed processing and the HBase data store in order to return faster results for SQL queries over Hadoop data.

    • What you missed in Big Data: Oracle, eBay join Hadoop open-source party

      The past week has seen not one but two technology giants take on a bigger role in the open-source community’s efforts to bring modern analytics within the grasp of the traditional enterprise. Online retail giant eBay Inc. led the charge with the contribution of a homegrown OLAP engine that it said makes querying Hadoop both easier and significantly faster.

  • Project Releases

  • Public Services/Government

    • Swiss crowdfund pays for signed PDFs LibreOffice

      In just three days, the Swiss open source community Wilhelm Tux reached its crowdfunding target of 10,000 CHF (about 8000 euro) to add support for digital signatures in PDF documents. The feature will be added to LibreOffice, a free and open source suite of office productivity tools. The project is awarded to Collabora, an open source IT service provider, which will deliver the new functionality in April.

  • Openness/Sharing

    • Open Data

      • Guardian launches open-source data journalism tool

        Collaborative data journalism platform Swarmize has launched today to offer editors and journalists better tools for the use of data, including real-time visualisation.

        Swarmize, now in alpha, won funding through the Knight News Challenge in June, and has been built at the Guardian over the last four months.

Leftovers