EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

08.19.13

Microsoft + Oracle = NSA Surveillance (e.g. Espionage) on Servers

Posted in Database, Microsoft, Oracle at 8:03 am by Dr. Roy Schestowitz

Proprietary software giants love to spy

Lab

Summary: Proprietary software from the dominant database players (which recently got together) is expected to further violate privacy

After a recent interview with Larry Ellison it is no longer secret or just mere speculation that he is an NSA proponent (Oracle’s founders and the business have a renowned CIA-assisted/subsidised past), but what’s noteworthy is Microsoft’s view, which based on the company’s relationship with the NSA is more than happy and even eager to strengthen the NSA. How would China feel if it knew all those facts*? It is already investigating some US companies like IBM over privacy intrusions and it should know that HP has back doors in its storage servers (caught red handed).

Oracle recently got closer to Microsoft, which helped devour Java and add NSA surveillance to it (on the ‘cloud’). It is being noted by IDG that:

The new Microsoft-Oracle partnership benefits both companies, as Oracle gets access to Azure and Microsoft can finally license Java. Will the deal have any effect on either company’s enterprise customers?

Anyone who runs a program or a GNU/Linux distribution on Microsoft’s ‘cloud’ should expect NSA surveillance. But it’s not like this would bother Larry Ellison. More and more people will, over time, realise that the PATRIOT Act made it risky to host with US companies (or US-made software) anywhere, respective of the datacentre’s location (the Internet is global).
___
* Having just spent 2 hours at a Chinese superstore, it seems evident that we in the West increasingly come to depend on China for everything, rather than the other way around. The US and UK governments are openly worried right now about dependence on Chinese hardware which could facilitate back doors.

Richard Stallman on Corporate Press

Posted in TechBytes Video at 3:24 am by Dr. Roy Schestowitz

TechBytes with Stallman

Direct download as Ogg (00:00:50, 2.8 MB)

Summary: Dr. Richard Stallman, the Free Software Foundation’s founder, explains how the press in the US is controlled


Made entirely using Free/libre software, heavily compressed for performance on the Web at quality’s expense

08.18.13

Links 18/8/2013: Amarok 2.8, Linux Fund-raising Record

Posted in News Roundup at 3:02 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Free software for free markets

    Co-inciding with the first DebConf in Switzerland, one of the world’s leading financial centers, the first official packaging of open messaging and market data distribution framework OpenMAMA for a Linux distribution has just been uploaded. The packages, along with the Avis low-latency event-router middleware/transport were uploaded to the Debian unstable catalog this week and will soon be available conveniently to install with apt-get.

  • PLVision’s Open Source Solution for Enabling OpenWRT-Routers with SDN Functionality

    For the past years, PLVision has been working on technologies in the Networking domain, namely Software Defined Networks. Apart from assimilating already existing solutions, the company has developed its own Open vSwitch package for OpenWrt which considerably extends router functionality and adaptability, and is completely free.

  • The big challenge with open source: Workflow, not code quality
  • 10 Most Popular Open Source Software Ever!

    Open Source software are never the less one of the biggest innovations in the history of technology. Simply buy an all new computer device and install any software you want without spending a single penny (except the internet datacharges). It offers you everything from a free word processor, free image editor, media player, sound editor, file archiver, PDF creator and what not.

    Although a few of these software might not stand parallel to its commercial rivals in terms of functionality, there are many that stand far beyond of everything else on the market in terms of features and capabilities.

  • VMware’s Love-Hate Relationship With OpenStack

    VMware, perhaps more-so than any other vendor on the planet, is responsible for helping enterprises move to more agile and efficient virtualized server infrastructure. Simply put, VMware is the vendor to beat in the enterprise virtualized server space.

    When it comes to the cloud though, VMware’s dominance is not a foregone conclusion, with Amazon and perhaps more importantly OpenStack, leading the charge. OpenStack is an open-source multi-stakeholder effort that is building an open-cloud platform solution.

  • Questions to ask before choosing an open source hypervisor
  • Open-source project Pixy aims to give vision to hobbyists’ robots

    An open-source project aims to give a rudimentary eye to robots with the help of a camera that can detect, identify and track the movement of specific objects.

  • Open source code management: How to safely use open source libraries
  • No-Cost Transfer of Files is Possible With the Boffin Open Source iPod Software List
  • Open Source Data Recovery Software List Released By Boffin Reviewers
  • Boffin Now Provides An Open Source Email Marketing Software List
  • Web Browsers

  • SaaS/Big Data

    • Do cloud right: Four critical steps to selecting the provider for you

      When Edward Snowden leaked intelligence files, a storm was triggered in the cloud, leaving a path of destruction. Snowden’s email provider Lavabit shut down. So has the email offering of Silent Circle. The Guardian ran a story declaring: Lavabit’s closure marks the death of secure cloud computing in the U.S. And the EU is not entirely unaffected either. Be it by the Tempora program in the UK or the U.S. National Security Agency facilities that reportedly reside in Germany.

    • ownCloud Client 1.4.0 beta 2
  • Databases

    • Where Are NoSQL Database Partner Programs?

      As NoSQL databases catch on for Big Data applications, where are the NoSQL partner programs for resellers, integrators and VARs? So far, 10gen seems to be the only company shouting an answer.

  • Oracle/Java/LibreOffice

    • Battle of the Office Suites
    • Battle of the Office Suites: Microsoft Office and LibreOffice Compared

      For a long time, Microsoft Office has been the reigning champ of office suites, but that doesn’t mean the free alternative, LibreOffice, isn’t worth considering. Let’s take a look at how the two compare, and if it’s finally possible to ditch the paid option for the free one.

    • Microsoft Uses DMCA To Block Many Links To Competing Open Office

      Another day, another example of excessive DMCA takedown actions. The latest is that Microsoft has been issuing DMCA takedowns to Google directing the search engine to remove links to Open Office.

    • Microsoft Continues Its Anti-competitive Behaviour

      It’s to be expected. M$ is still run by the same people who thought up every dirty trick they could over the decades to prevent having to compete on price/performance. The latest deed covers demanding removal of links to downloads of OpenOffice.org under the DMCA nonsense. “Office” is in the name, right? Grounds for banning it… What’s next? Banning downloads of */Linux because there’s an “X” in the name? Nope. This is grounds for further anti-trust action. US Department of inJustice, Are you paying attention?

  • Funding

  • BSD

  • Project Releases

    • QEMU 1.6 Brings A Whole Lot Of Changes

      QEMU 1.6.0 has been released and with this open-source processor emulator commonly used with Linux KVM are a whole lot of new features and capabilities.

  • Openness/Sharing

    • Open Source Collaboration in Museum Exhibit Design

      In the last few years, audience participation and collaboration has been an increasingly discussed topic among museum professionals worldwide. Emerging technologies and the open source movement provide an opportunity for new forms of collaboration, namely collaboration among individuals with different areas of expertise using an online platform. In this blog post, I briefly describe two open source initiatives that focus on collaboration in Museum Exhibit Design, and share my conversation with Bob Ketner, an independent curator and an expert on open source collaboration methods, who was actively involved in both initiatives.

    • Open Access/Content

      • IIMs should start open-source class-ware …

        India graduates nearly 400,000 to 500,000 MBAs annually from some 3300-odd business schools. Based on an extensive study, The Wall Street Journal (December 2012) estimated that only 10% of Indian management graduates are employable! Given that a larger proportion of the ‘employable’ graduates must understandably be from the IIMs and other handful of high-rated business schools, the large majority of lower ranked business schools must be adding little value to the MBA graduates.

  • Programming

    • Free and Inexpensive Ways to Pick Up Open Source Tech Skills

      This week Twitter was in the news for buying San Francisco-based company Marakana, which has focused on tech training, including training many people to use open source technology platforms and tools. As ZDNet reported, “Twitter is in the process of building its own engineering education program, dubbed Twitter University.” Marakana’s team will help build out this effort and the company will no longer train any individuals or organizations who want training.

    • Even more curry for C++11
    • SDL2 Plans With Wayland, SDL3 Already On The Mind

      While SDL 2.0 was finally released this week after being in development for years, future SDL 2.x features and changes are already being plotted and even some early thoughts concerning SDL 3.x for game developers and other cross-platform developers relying upon this important Simple DirectMedia Layer library.

Leftovers

  • Crowd asked to fund a colossal statue of Steve Jobs

    APPLE GADGET FANS can kick in to pay for the construction of a gigantic statue of Steve Jobs through the Indiegogo crowdfunding website.

    Jobs passed away from cancer in 2011, but since then his influence has still been seen in Apple’s designs, so much so that the iPhone 5 and iPhone 5S have been credited to him. Some people want to make sure that he will always be remembered and would like to erect a huge – think Statue of Liberty proportions – statue of the late Apple co-founder.

  • Google engineers insist 20% time is not dead—it’s just turned into 120% time

    A lively debate among current and former Google engineers is raging on Hacker News about Quartz’s piece on the death of 20% time at Google—that formerly hallowed portion of an engineer’s week set aside for his or her own projects, which brought us innovations such as Gmail and Adsense.

  • Security

  • Defence/Police/Secrecy/Aggression

  • Transparency Reporting

  • Environment/Energy/Wildlife

    • Beekeeping dog in ‘astronaut’ suit detects infected hives by smell

      Bees are extremely important. We’ve been writing about for years about the various threats that they face (Margaret has a great timeline of bee articles between 2005 and 2013), and about various ways to protect them. But this story from Australia might be the most original yet, or at the very least the cutest.

  • Finance

    • Every Important Person In Bitcoin Just Got Subpoenaed By New York’s Financial Regulator

      Things are getting serious for Bitcoin this month: a federal judge declared it real money, Bloomberg gave it an experimental ticker (XBT), and New York’s financial regulator announced an interest in regulating it. Declaring Bitcoin “a virtual Wild West for narcotraffickers and other criminals,” the New York State Department of Financial Services is stepping into the sheriff’s boots.

    • NYT Sees Shift in Global Economy–by Using a Lot of Imagination

      We learn that “the gross domestic product of the 17-nation euro zone grew at an annualized rate of about 1.2 percent in the second quarter,” and that Brazil has gone from a 7.6 percent growth rate two years ago to a projected 2.3 percent rate this year–though the alert reader will notice that 2.3 percent for a year is better than 1.2 percent for a quarter.

    • Was ‘The New York Times’ Hacked?

      There are many different kinds of Web attacks today. The one that The New York Times admitted to in January was an infiltration by attackers going after usernames and passwords for email accounts. That type of attack is about information gathering and isn’t about taking a site offline.

      There are also distributed denial-of-service (DDoS) attacks, where hundreds of millions of data packets slam into a service in order to render it inaccessible. In my experience in a DDoS attack, Web browsers simply time out and no response comes back from the given site.

    • Judge Rules Against Icahn’s Efforts to Reschedule Dell Meeting

      A Delaware judge on Friday denied a request by Carl Icahn to reschedule Dell Inc.’s annual meeting, dealing a blow to the activist investor’s fight against a buyout offer led by the company’s founder, Michael S. Dell.

    • Rajiv Sethi: The Spider and the Fly

      Aleynikov was hired by Goldman to help improve its relatively weak position in what is rather euphemistically called the market-making business. In principle, this is the business of offering quotes on both sides of an asset market in order that investors wishing to buy or sell will find willing counterparties. It was once a protected oligopoly in which specialists and dealers made money on substantial spreads between bid and ask prices, in return for which they provided some measure of price continuity.

    • Taken

      Under civil forfeiture, Americans who haven’t been charged with wrongdoing can be stripped of their cash, cars, and even homes. Is that all we’re losing?

  • PR/AstroTurf/Lobbying

    • CMD Fights Back Against ALEC’s Effort to Evade Open Records Law in Texas

      The Center for Media and Democracy filed a letter with the Texas Attorney General on Thursday refuting efforts by the American Legislative Exchange Council (ALEC) to declare itself immune from the state’s open records law. Texas is the first known state where ALEC has formally asked an Attorney General for an exemption from sunshine-in-government laws, and it marks a new low in the organization’s attempts to advance its legislative agenda in secret and avoid public accountability for facilitating special interest influence.

    • What Do You Call Edward Snowden?

      By highlighting this comment, CBS is suggesting that Snowden made some kind of important admission with his use of the word “spies.” Couple that with Pelley referencing the “collaboration” with an unnamed journalist–presumably Glenn Greenwald of the Guardian–and you can put the pieces together: Snowden, now “being harbored by Russia,” was acting as a spy when he “spilled” those secrets, with Greenwald his collaborator.

      Sure, it’s not as alarming as, say, NBC’s David Gregory musing about whether or not Greenwald should be arrested, but it’s striking language nonetheless.

    • Twitter joins Washington’s influence economy, forms PAC

      Twitter on Friday became an official member of Washington’s influence economy, with the formation of a political action committee and the appointment of its first registered lobbyist.

  • Censorship

    • Download the Pirate Bay’s free Pirate Browser to circumvent censorship

      Here’s the official description of the Pirate browser:

      “PirateBrowser is a bundle package of the Tor client (Vidalia), FireFox Portable browser (with foxyproxy addon) and some custom configs that allows you to circumvent censorship that certain countries such as Iran, North Korea, United Kingdom, The Netherlands, Belgium, Finland, Denmark, Italy and Ireland impose onto their citizens.”

    • Wikipedia Co-Founder Refuses to Comply With China’s Censorship

      Wikipedia Co-Founder Jimmy Wales said he would rather have no Wikipedia in China than comply with any form of censorship.

      In an interview with The Wall Street Journal in Hong Kong, Mr. Wales said the company will always refuse to comply with government requests to restrict information, calling access to knowledge and education a human right.

    • The Pirate Bay Releases Censorship-Busting ‘PirateBrowser’

      If you’re looking for a quick and easy way to circumvent any filters or blocks that your ISP (or country) has put into place on your Web browsing, The Pirate Bay might have a solution for you. As part of the commemoration around the site’s ten-year anniversary, which it officially celebrated yesterday, The Pirate Bay has officially released its own web browser. Sort-of.

  • Privacy

    • The NSA’s technical fouls

      If the leak of the Foreign Intelligence Surveillance Court order requiring Verizon to provide the FBI and NSA with millions of call records was the most important in advancing the debate about privacy and surveillance, Barton Gellman’s report in the Washington Post about NSA’s internal compliance audits should count as a close second.

    • Lawmakers Demand More NSA Oversight Amid Privacy Concerns

      National Security Agency spy programs need better oversight to prevent excesses in collecting Americans’ voice and data communications, lawmakers said after the disclosure of an audit showing privacy rules were broken thousands of times.

    • NSA Leaker Charged Under 96-Year-Old Law

      Former U.S. intelligence contractor Edward Snowden is now living in exile in Russia, fearful that if he returns to the United States he’ll be arrested on espionage charges.

      The irony is that the charges against Snowden, who was a computer expert at the high-tech National Security Agency, come from a law that dates back to before most Americans could listen to the radio, much less watch TV or surf the web.

    • Court: Ability to police U.S. spying program limited

      The leader of the secret court that is supposed to provide critical oversight of the government’s vast spying programs said that its ability do so is limited and that it must trust the government to report when it improperly spies on Americans.

    • China to investigate IBM, EMC and Oracle over NSA security fears

      Tables are turned as China raises security concerns about US IT firms following reports of mass surveillance by the NSA

    • China mulls probe into IBM, Oracle, EMC after NSA hack claims – report
    • Snowden downloaded NSA secrets while working for Dell, sources say

      Former intelligence contractor Edward Snowden began downloading documents describing the U.S. government’s electronic spying programs while he was working for Dell Inc in April 2012, almost a year earlier than previously reported, according to U.S. officials and other sources familiar with the matter.

    • NSA Spying: The Three Pillars of Government Trust Have Fallen

      With each recent revelation about the NSA’s spying programs government officials have tried to reassure the American people that all three branches of government—the Executive branch, the Judiciary branch, and the Congress—knowingly approved these programs and exercised rigorous oversight over them. President Obama recited this talking point just last week, saying: “as President, I’ve taken steps to make sure they have strong oversight by all three branches of government and clear safeguards to prevent abuse and protect the rights of the American people.” With these three pillars of oversight in place, the argument goes, how could the activities possibly be illegal or invasive of our privacy?

    • NSA Lies

      In the modern art wing, we have Obama’s brilliantly nonsensical, Dadaist argument that Snowden isn’t a patriot because, among other equally schizophrenic reasons, “he is convicted of three felonies.” This is a leitmotif pervading Obama’s work: equating illegal with immoral. He notably employed this technique when asked about Bradley Manning, saying that “He broke the law.” (Scholars are trying to reconcile this technique with Obama’s professed admiration of MLK, Jr., who famously remarked that “I disobeyed an unjust law.”)

    • The NSA Oversteps Its Legal Authority and the Court Can’t Stop It

      The Washington Post dropped two reports that exposes the recklessness of the NSA’s spying program. The first report is insane: the NSA has “broken privacy rules or overstepped its legal authority” thousands of times a year and the second report explains the insanity: the FISC court that’s supposed to be in charge of government spying programs has said that “its ability do so is limited and that it must trust the government” to report when the government has screwed up.

    • Things the Authorities Say to Mislead You About NSA Surveillance

      When government officials can’t directly answer a question with a secret definition, officials will often answer a different question than they were asked. For example, if asked, “can you readAmericans’ email without a warrant,” officials will answer: “we cannot target Americans’ email without a warrant.” As we explained last week, the NSA’s warped definition of word “target” is full of so many holes that it allows the NSA to reach into untold number of Americans’ emails, some which can be purely domestic.

    • Wyden considered disclosing National Security Agency secrets on Senate floor

      Sen. Ron Wyden (D-Ore.), a longtime critic of the National Security Agency’s (NSA) surveillance programs, told Rolling Stone that he considered disclosing classified information on the Senate floor prior to the leaks by former contractor Edward Snowden.

    • How Ron Wyden nearly became an NSA leaker

      One of the intelligence community’s most outspoken critics says he considered talking about the National Security Agency’s bulk surveillance program on the Senate floor.

    • Snowden’s dad reaches out to son despite danger

      Lon Snowden, the father of fugitive U.S. National Security Agency leaker Edward Snowden, has reached out to his son via the Internet, officials said.

      The older Snowden communicated with his son through a protected Internet channel using encrypted messages, RIA Novosti reported Thursday.

    • An Educated Guess About How the NSA Is Structured

      NUCLEON: Global telephone content database

    • NSA domestic spying “built on lies”

      Reuters broke another report about the way the government lies to us entitled, “U.S. directs agents to cover up program used to investigate Americans.” From the report: “‘I have never heard of anything like this at all,’ said Nancy Gertner, a Harvard Law School professor who served as a federal judge from 1994 to 2011. Gertner and other legal experts said the program sounds more troubling than recent disclosures that the National Security Agency has been collecting domestic phone records. The NSA effort is geared toward stopping terrorists; the DEA program targets common criminals, primarily drug dealers.

    • NSA hopes that people do not do the maths

      However it turns out that dime is still 29.21 petabytes of data a day. That means NSA is “touching” more data than Google processes every day. Google only has 20 petabytes. Also the packet analyzer gear at the front-end of XKeyscore (can pick out a very small fraction of the actual packets sent over the wire while still extracting a great deal of information (or metadata) about who is sending what to who.

    • Heidi Boghosian on ‘Spying on Democracy,’ Laura Gottesdiener on Foreclosures

      This week on CounterSpin: Edward Snowden’s NSA’s surveillance disclosures have sparked a debate over privacy, spying and civil liberties. A new book tells the history of those issues, and warns about the threat to democracy posed by snooping government agencies and corporations. We’ll talk to author Heidi Boghosian about her book ‘Spying on Democracy.’

    • NSA spied on thousands of Americans
    • China mulls probe into IBM, Oracle, EMC after NSA hack claims – report
    • Feds Threaten To Arrest Lavabit Founder For Shutting Down His Service

      The saga of Lavabit founder Ladar Levison is getting even more ridiculous, as he explains that the government has threatened him with criminal charges for his decision to shut down the business, rather than agree to some mysterious court order.

    • Lavabit.com owner: ‘I could be arrested’ for resisting surveillance order

      The owner of an encrypted email service used by ex-NSA contractor Edward Snowden said he has been threatened with criminal charges for refusing to comply with a secret surveillance order to turn over information about his customers.

    • Hacker posts Facebook bug report on Zuckerberg’s wall

      Just minutes after the post, Khalil says he received a response from a Facebook engineer requesting all the details about the vulnerability. His account was blocked while the security team rushed to close the loophole.

      After receiving the third bug report, a Facebook security engineer finally admitted the vulnerability but said that Khalil won’t be paid for reporting it because his actions violated the website’s security terms of service.

      Although Facebook’s White Hat security feedback program sets no reward cap for the most “severe” and “creative” bugs, it sets a number of rules that security analysts should follow in order to be eligible for a cash reward. Facebook did not specify which of the rules Khalil had broken.

    • Institutionalized US Spying: More Than NSA Involved

      Washington has 16 known US spy agencies. NSA and CIA are best known. Perhaps few Americans know much about the Defense Intelligence Agency (DIA).

      It calls itself “first in all-source defense intelligence to prevent strategic surprise and deliver a decision advantage to warfighters, defense planners, and policymakers.”

      “DIA deploys globally alongside warfighters and interagency partners to defend America’s national security interests.”

    • The NSA Thinks It’s Above the Law — and the Obama Administration Knew It

      Thursday night, The Washington Post published an internal audit of the NSA surveillance programs leaked by Edward Snowden, which show that the NSA has violated the privacy rules in place to protect Americans’ communications 2,776 times in one year. The infringements relate to the restrictions enacted by executive orders, which supposedly prevent the surveillance of American individuals without legal authorization. It has been determined that the majority of mistakes have been made by intelligence operators and computers.

    • NSA revelations galvanize Congress

      Allegations of chronic violations renew calls for serious change

    • NSA breached privacy rules, despite Obama’s promises

      President Barack Obama’s promises to protect Americans from domestic spying came under fresh scrutiny Friday after an internal audit showed the National Security Agency had repeatedly violated privacy rules in its electronic surveillance.

      The revelations appeared to challenge Obama’s reassurances that strict oversight of NSA snooping had prevented abuses.

      The Washington Post, citing NSA documents and the audit, reported that the eavesdropping service had breached privacy restrictions thousands of times and in some cases withheld details from other government departments.

    • Google introduces encryption to Google Cloud Storage – but NSA will still have easy access

      The server-side encryption means that the data will seamlessly be encrypted without the users having to do anything.

      However, while that encryption will make the data held in Google’s cloud more secure from attack, the keys will still be held by Google. That means that the US National Security Agency (NSA) will still be able to access customers’ data with a simple order approved by the secret Foreign Intelligence Surveillance Court.

      For that, Barth recommends that customers encrypt their data before uploading it to the Google Cloud.

    • WaPo: NSA Broke Privacy Rules Thousands Of Times, Harms Uncertain

      According to documents obtained by The Washington Post, the National Security Agency broke its own privacy rules thousands of times per year. Many of the violations seem like unintentional infractions, such as a typo while searching telephone area codes, which results in a swath of phone records that shouldn’t have otherwise been scanned. It is unclear whether any of the wrongly obtained information was used for illegal or illicit purposes.

    • US NSA defends surveillance programs as lawful

      Under increasing pressure to justify electronic surveillance programs that at times capture communications of American citizens, the U.S. National Security Agency went to unusual lengths on Friday to insist its activities are lawful and any mistakes largely unintentional.

    • NSA revelations of privacy breaches ‘the tip of the iceberg’ – Senate duo

      Leading critics of NSA Ron Wyden and Mark Udall say ‘public deserves to know more about violations of secret court orders’

    • Cloud market destined to change following NSA leaks

      “The reason I say this is unrealistic is because in order for this $180 billion to play out, then companies need to aggressively start pulling back from using outsourcers, using [hosting firms], using cloud providers,” Staten told CSOonlineA’A on Friday. “And frankly, we don’t see any evidence that suggests they’re going to start doing that.”

    • Chinese Spring Festival tourists targeted by NSA

      An internal audit carried out by the National Security Agency (NSA) and leaked to the Washington Post reveals that Chinese Spring Festival tourists were targeted while on holiday in the US.

    • NSA under renewed fire after report finds it violated its own privacy rules

      Revelations that NSA collected records it was not permitted to acquire pile further pressure on intelligence chief James Clapper

    • LA Church Joins Lawsuit Against NSA Over Surveillance Programs

      The church says this type of surveillance is reminiscent of that felt by the congregation during the McCarthy era

    • Inhofe wants to investigate NSA, following new report about surveillance

      Oklahoma Sen. Jim Inhofe, the top Republican on the Senate Armed Services Committee, says new revelations about the National Security Agency’s surveillance program suggest the Obama administration has “abused the authority granted to them by Congress” and that he will investigate the matter.

    • White House Denials of NSA Privacy Violations Prompt Legislative Furor

      Reports that the National Security Agency (NSA) routinely breaks the law and violates court orders and the Constitution in order to collect private data of hundreds of millions of Americans has prompted some federal lawmakers to finally exercise a little oversight.

    • I asked the NSA for its file on me, and here’s what I got back

      Though it took two and a half pages to do so, the NSA denied my application. “[Y]our request is denied because the fact of the existence or non-existence of responsive records is a currently and properly classified matter,” it wrote.

      Oh. Thanks anyway, NSA.

    • Paul: NSA practices are unconstitutional, should be subject of hearing

      An internal audit from leaker Edward Snowden — now enjoying asylum in Russia — also revealed that the agency intercepted phone calls and emails from U.S. citizens during that time, and often did not report the intrusion.

    • Lawmakers: NSA reform needed

      Republican Rep. Justin Amash of Michigan said Sunday he’s hopeful the House will have another chance to vote on a measure that would curb the National Security Agency.

    • Obama’s post-vacation blues: Egypt and NSA spying on Americans
    • NSA blames 3,000 leaked privacy violations on ‘employee mistakes’

      Nearly 3,000 violations of Americans’ privacy, mentioned in the National Security Agency’s internal audit recently leaked by former contractor Edward Snowden, weren’t “willful” and are results of mistakes by employees, the agency claimed.

    • New NSA Leak Should Prompt Even More Distrust of Government

      Because the NSA’s activities are largely classified, we can never truly know what we’re paying.

    • James Fields: Protect online, mobile conversations

      Snowden. PRISM. XKey­score. It seems that you can’t turn around these days without reading another story about government surveillance.

      [...]

      If as a society we don’t start fighting government snooping laws, they are only going to become more restrictive. For example, recently, the Obama administration pushed to make it a felony to stream copyrighted material over the Internet, which was a key part of the tabled Stop Online Piracy Act (SOPA) of last year. SOPA targeted user-generated content sites like Tumblr and YouTube and Internet startups in the social and online search space.

    • Lavabit chief predicts ‘long fight’ with feds (Q&A)

      Ladar Levison, who shuttered the Web mail service he founded — and his only e-mail account — when the U.S. government demanded access to his company’s servers, tells CNET he created Lavabit because of the Patriot Act.

    • Will PayPal’s Face Verification System Kick Off the Future of Payment Technology?

      Ever been standing in a checkout line only to realize that you’re unable to pay because you’ve left your wallet, cash, or credit card elsewhere? Or perhaps you’re like the 83% of respondents to a recent PayPal survey who said you’d rather not carry a wallet at all. If PayPal’s latest technology using face recognition to facilitate payment transactions is successful, wallets may soon become a relic of the past.

    • Q. & A.: Edward Snowden Speaks to Peter Maass

      Edward Snowden: After 9/11, many of the most important news outlets in America abdicated their role as a check to power — the journalistic responsibility to challenge the excesses of government — for fear of being seen as unpatriotic and punished in the market during a period of heightened nationalism. From a business perspective, this was the obvious strategy, but what benefited the institutions ended up costing the public dearly. The major outlets are still only beginning to recover from this cold period.

      Laura and Glenn are among the few who reported fearlessly on controversial topics throughout this period, even in the face of withering personal criticism, and resulted in Laura specifically becoming targeted by the very programs involved in the recent disclosures. She had demonstrated the courage, personal experience and skill needed to handle what is probably the most dangerous assignment any journalist can be given — reporting on the secret misdeeds of the most powerful government in the world — making her an obvious choice.

  • Civil Rights

    • Detainee Challenges Constitutionality of NDAA Transfer Restrictions

      Ajam’s case takes a new approach to Guantanamo habeas litigation: Ajam challenges Section 1028 of the National Defense Authorization Act—the section which imposes detainee transfer restrictions on the President—as an unconstitutional Congressional intrusion into plenary Presidential foreign policy power.

    • Indefinite detention is definitely wrong

      When the government gives itself the power to deny a person his or her constitutional rights, it is alarming, to say the least. When the government prevents the people it governs from being able to do anything about it, it is truly frightening.

    • In the Matter of Hedges v. Obama

      What we have in the Hedges v. Obama case is yet another very bad precedent. As Judge Forrest had pointed out, “Courts must safeguard core constitutional rights.” The 2nd Circuit Appeals Court, clearly not applying the principle of caveat emptor (let the buyer beware) to this situation, has sold out that obligation for a handful of dubious promises. Recent history provides no confidence that such promises are given in good faith. No, it is bad faith we are witnessing here. The government lawyers should hang their heads in shame for obviously undermining the Constitution they are sworn to uphold. It just goes to show there are always those, be they soldiers, police, or lawyers who will simply follow orders no matter what the consequences.

    • America No Longer the Land of the Free

      The Fifth Amendment to the Constitution states that the government may not take the life, liberty or property of any person without due process.

    • The Most Powerful Dissent in American History

      A smart new book reveals precisely how and why Oliver Wendell Holmes changed his mind about the first amendment.

  • DRM

  • Intellectual Monopolies

    • Copyrights

      • Prenda parties ordered to pay more than $63K to Doe Defendants in Minnesota

        Remember Guava LLC v. Merkel? A collusive Prenda’s lawsuit filed in Hennepin County court in Minneapolis? I thought that this lawsuit was over, and I was gladly surprised to learn (hat tip to Jason Sweet) that yesterday Judge Tanya M. Bransford ordered Prenda parties (Guava LLC, Michael Dugas and Paul Hansmeier’s Alpha Law Firm) to jointly and severally pay $63,367.02 in attorney fees.

08.17.13

Microsoft’s Emerging Attacks on Google: Bogus DMCA Notices, Fabricated Quotes, Bogus and Baseless Antitrust Complaints

Posted in FUD, Google, Microsoft at 6:56 pm by Dr. Roy Schestowitz

The rotting empire resorts to separate desperate measures

Colosseum

Summary: A glimpse at Microsoft’s latest ugly moves against Google, which is a Microsoft Nemesis in the generation of Linux/Android and services

Microsoft seems to have censored Free software which runs on Windows, reveals strong evidence. Microsoft goes further by trying to do that at Google. OpenOffice could be vanished due to a bogus DMCA notice from Microsoft. As put by Swapnil Bhartiya: “Most of the time most open source players including the Apache Foundation provides the software via torrents as it’s a better technology than direct download and these torrents are then shared across the torrent sites. These are legitimate torrents. But NSA friendly Microsoft goes ahead and terminates these links not only from its own Bing, but also from Google and other search engines.

“I think there should be some penalty for sending wrong DMCA notices to discourage the abuse of the already flawed system.”

That’s a tool Microsoft habitually abuses, as we showed before. And as part of the resurrected "Scroogled" campaign Microsoft will try to accuse Google of what Microsoft is doing.

As the above author put it:

If you are a long-term GNULinux user you would love to see Microsoft in this position. IT world and competition has suffered quite a lot under Microsoft’s abusive monopoly which killed many competitors in the bud, before iOS and Android happened.

While Microsoft’s legal team may not miss any opportunity to brag about signing bogus patent deals with Android players over undisclosed (and thus can be assumed bogus) patents, it has no respect for the work of others.

Microsoft’s Windows Phone has a very very tiny market share, and thus it’s not a viable platform for Google or any other player to create any app for Windows Phones. Looking at the popularity of YouTube, Microsoft who never bothered to create any of its apps for GNULinux, went ahead and create its own YouTube app. For the obvious reasons the app did not meet Google’s terms and conditions as it offered a download option (and removed ads) to cut the revenues of hardworking content creators who publish their content on YouTube to monetize from the ads.

Microsoft had agreed to remove the app and the two companies were supposedly working together on the problem (nice to see Microsoft getting the same treatment it’s been giving to Linux for decades).

Microsoft is now excluding Android from apps and also accusing Google of being sloppy on privacy (look who’s talking). The Microsoft-esque PR from Consumer Watchdog seems to have been more bogus than we realised. As Lauren Weinstein’s blog shows, there might be fabrication. Google never said what it’s claimed to have said. As Weinstein put it:

“There was (I like believe) a time when supposedly reputable news-oriented organizations made the effort to try independently verify “news” — at least to the extent of verifying easily available materials — before writing about or republishing items likely to inflame passions and falsely damage reputations.”

[...]

We’ve just been treated to another vivid example of this, courtesy (initially) of reliably Google-hating “Consumer Watchdog” and Putin’s propaganda channel “Russia Today (RT).”

This sorry sequence began when Consumer Watchdog breathlessly proclaimed that Google had been caught in a legal brief proclaiming that “Gmail users have no expectation of privacy.” RT picked up the story, and sites that we normally would consider to be reasonably reputable started echoing it without further investigation, playing on the current climate of government surveillance furor (and in many cases, related hyperbolic and unjustified paranoia).

[...]

I don’t really expect any better from Consumer Watchdog or Putin’s RT. But it seems reasonable to at least hope for more sense from mainstream news and other websites who portray themselves as accurate sources of information.

This JoinDiaspora discussion about it has AJ saying: “it is kind of sad, that not a single investigative reporter took the time to verify this quote

“the reason i say that is because the actual quote is sufficiently absurd, there was no need to change it :)”

Will Hill replies:

Gates gets the press he pays for. Here’s a recent example of analyst and press manipulation. You can get a small glimpse of how big the microsoft controlled press is by reading their training manuals carefully.

the financial analysts particularly carry a lot of weight. We may think that, you know, Christine Comerford and Jesse Burst and other people who write in the Windows magazines are important, but the most important analysts are the guys who work for, like, Goldman Sachs and Lehman Brothers and the other financial analysts. … everybody reads PC Week, but the VPs and above, those guys are reading the Goldman Sacks analyst reports. They’re the guys, you know, really making the decisions

There are two kinds of developer conferences. There’s those that are controlled by the platform vendors, such as our PDC. We control everything that goes on there; nobody says nothing that we don’t approve beforehand … At independent conferences, subvert them. Find the people who choose who goes on the agenda and … Just suck up to them so hard your face collapses. I mean, those people…those people are so valuable to you, it’s beyond belief, because they control who goes on that session or not.

There’s lot’s of independent programming journals. You want to infiltrate those. Again, there’s two categories. There’s those that are controlled by vendors; like MSJ; we control that. And there’s those that are independent. The ones that we control, you use. … The ones that third parties control, like the WinTech Journal, you want to infiltrate. You want to get yourself onto the advisory committee that picks out which authors are published and which ones aren’t, or which topics are covered and over these special issues, things like that Just be so helpful that they can’t do without you, and then make sure that things go your way. …that was actually my first claim to fame before I started doing presentations and forming users groups and so forth, was that I was really good on the Internet. And the main thing I did was that I was very formal and polite.

and so on and so forth. Those jerks never quit.

Microsoft, in the mean time, is also using antitrust against Google. Here is a response to this dirty trick:

Microsoft and Nokia protest “price predation” and play at being prey.

[...]

Practically, however, predatory pricing turns out to be controversial and difficult to establish. This is particularly true for predatory pricing claims against free software. An alleged predator is highly unlikely to recoup “losses” caused by free distribution, since free software’s four freedoms allow competitors liberal entry into the market. Moreover, free software licenses (including GPLv2 and Apache v2) arm these competitors with the power to redistribute royalty-free, making any alleged effort at monopoly pricing unsustainable.

[...]

Of course, Microsoft’s complaint is a bit hypocritical, since the Department of Justice and 20 states accused them of predatory pricing when they distributed Internet Explorer without charge. Recall their response at the time: That a market participant – Netscape – had already set the price for browser technology at zero. Does that sound familiar?

And by their accusations, Nokia displays ignorance about its own history with free and open source software. Speaking about Google at a recent legal conference, Nokia’s head of competition law wondered aloud: “If you make a multi-billion-dollar investment as Google has done in the Android operating system, why would you just give it away?” Presumably Google sought the same benefits as Nokia when Nokia open-sourced its own mobile operating system – Symbian.

The outcome of FairSearch’s request for a Commission investigation is not yet known. What is known is that the benefits of free software – high quality, high value, customizable, low lock-in technologies cooperatively developed, tested, distributed, and improved by an efficient global-scale community marshaled using the latest collaborative Internet tools – ring true with consumers. And these benefits, along with the disruptive business model that brings them to fruition, should identify free software distributors not as price predators, but as embodiments of “maverick firms,” a species of competitor that authorities in both the US and the EU seek to protect, not punish.

Hopefully the Commission will view free software the way consumers do and reject FairSearch’s complaint.

FairSearch is just a Microsoft proxy, one of many. We have already analysed the roots of “FairSearch” and “Consumer Watchdog” (deceiving names) before.

Reminder of Patent Lawsuits From Proxy Entities

Posted in Microsoft, Patents, SCO at 12:41 pm by Dr. Roy Schestowitz

Many road signs

Summary: Possibilities of lawsuits of interest that target Microsoft rivals and help discourage public participation (like SLAPP but bigger)

THE mysterious company that had famously sued Microsoft (VirnetX) and got paid a huge amount of money from Microsoft recently sued Apple again. It is on a path of destruction:

VirnetX Holding Corp. (NYSE MKT: VHC) today announced that on August 7, 2013, it signed a Patent License Agreement (the “Agreement”) with Avaya Inc. Under the terms of the Agreement, VirnetX has agreed to license certain of its patents to Avaya, in exchange for multiple payments to VirnetX and an ongoing reasonable royalty for future sales through the expiration of the licensed patents as outlined in the Agreement with respect to certain current and future IP-encrypted products. In further consideration, Avaya has agreed to license certain of its patents to VirnetX for its ongoing Gabriel technology product development.

Now that Apple is suing Samsung we should remember that any such troll which Microsoft and Apple pay can go after Android and GNU/Linux, equipped with precedence. Think of Nokia and its patent arrangements with Microsoft and Apple. Here is the latest from Apple’s lawsuit against Samsung:

There will be a hearing in Apple v. Samsung I in Judge Lucy Koh’s courtroom, Courtroom 8 on the 4th floor, on August 21 at 2:00 PM, so if any of you stalwarts can attend, that would be fabulous. You don’t even have to wake up early.

What’s it about? Didn’t they just have a case management hearing in April? Why yes. Yes, they did, but there have been “progress and changes” since, according to the parties’ Joint Case Management Statement [PDF], which fills us in on the details. Both parties would like some changes since the last case management hearing. Here’s the last joint case management statement, back in April. And the judge’s order on April 30 was to go forward immediately with the damages trial, unless certain things happened in the USPTO reexaminations of Apple’s patents at issue. Some of those things have almost happened, and there are other quirks, so some changes are being requested.

An article by Richard Hillesley, titled “the litigation business”, reminds us of the notion of lawsuits by proxy:

SCO’s action against IBM and others failed, but reflects a fashion in the technology industries – not restricted to SCO – for replacing innovation and business with teams of lawyers and threats of litigation, says Richard Hillesley

Lawsuits that involve patents — not copyrights — are the next wave of FUD against FOSS. Steam, a company whose CEO is “formerly” of Microsoft, has another legal tie with Microsoft created:

Jason Holtman, who spearheaded Valve’s Steam business for eight years before leaving the company in February, has a new job.

The former lawyer has taken a job with Microsoft, with a focus on PC gaming and entertainment strategy. Because he has just started at the position, Holtman declined an interview request, but confirmed the move.

Lawyer, not a technical guy. Will he help sue Microsoft’s competition over patents? Maybe, but ether way, it is important to keep track of these movement because entities like Acacia absorbed lawyers from Microsoft shortly before suing GNU/Linux from multiple fronts.

Success: Samsung’s GPL Violation and Subsequent Leak Officially Mean exFAT Driver is Being Made Free Software

Posted in GNU/Linux, GPL, Samsung at 12:28 pm by Dr. Roy Schestowitz

Microsoft’s hawkish patent extortion possibly jeopardised

Bald eagle

Summary: Just like Microsoft after its unintended or secret GPL violations, code is being made GPL-licensed and the violations covered up as though they never happened

Over the past few weeks we have covered the latest noteworthy GPL violation by Samsung [1, 2, 3. 4].

“It looks like Samsung may have fixed the licensing problem,” said iophk. “Now how to put this in a positive light? It’s strange that the big companies act as if they are under no obligations to follow copyright and seem to do so only under duress.”

It seems like pressure and leaks have worked in the same way that Snowden’s leaks led to bogus government and NSA “transparency” (making public what’s already leaked). Based on Michael’s report, Samsung makes the code GPL-licensed all of a sudden.

Back in June, Phoronix was the first to report of a native exFAT file-system implementation for Linux that appeared on GitHub. It later turned out that Samsung accidentally leaked their exFAT source code. The solution has now been corrected with Samsung formally open-sourcing their exFAT source code.

The exFAT driver talked about in June was modified from an accidental Samsung source code leak that the independent developer found on GitHub. It was a confusing situation and he removed references to the original Samsung source code and it led to a confusing situation in the weeks that followed with tons of comments in the forums.

This was reported to GPL-violations and gave Samsung bad publicity, so they released it as Free software. As for what it means to patents on FAT, I am not qualified to say. It’s not GPLv3 though.

“This was reported to GPL-violations and gave Samsung bad publicity, so they released it as Free software.”In the past, GPL violations by Microsoft were also handled in this way. Microsoft decided to pretend the violation was open-sourced to rewrite history. iophk calls it spin, noting that “‘accidentally leaked’ == Samsung got caught ripping off kernel code” (indeed).

iophk quotes: “While Samsung accidentally put out the source code in the first place, they have now formally released the code under the GPL after it was discovered they violated the GPL in the first place. Samsung was shipping this closed-source exFAT driver on a tablet yet they were relying upon GPL-only symbols.”

iophk says that “all that aside, it’s an improvement that they have properly licensed the code finally… too bad it took all that trouble… Their image got tarnished a bit and that could have been avoided if they had just respected copyright from the start. It was also a bit of necessary extra work.”

This resolves the problem/dilemma for the leakers. Without them, this would not have happened. What does all this mean to Tuxera, Paragon, and patents on exFAT in general? Lawyers might tell.

08.16.13

Links 16/8/2013: Tropico 5 for GNU/Linux, KDE 4.11 Released

Posted in News Roundup at 4:18 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Boxee: Streaming Media Goes Open Source

    As the rest of the world is catching on to the wonder that is streaming media we’re seeing more options for the serious HTPC die-hards. Boxee is the latest, an open source platform, endlessly customizable but only for experienced Mac or Linux users. If you’re interested, it begins Alpha testing next week.

  • Open source tools worth bookmarking

    One of my favorite workshops to give is the one that introduces librarians and their staff to open source software. After defining open source to them and debunking all the FUD (fear, uncertainty, and doubt) out there, I focus my talk on a list of open source tools that can be useful to libraries.

  • Survey Says: Use of Open-Source Will Increase in 2013

    The open-source movement continues to gain traction in 2013 among core groups, according to a survey released by electronics distributor Newark element14. The results conclude that more professional engineers, hobbyists, and students will all use open-source software and hardware for one or more design projects this year.

  • Open Source Web Design Utilities Listed and Live On SoftwareReviewBoffin.Com Now
  • Basho integrates open-source cloud storage with OpenStack

    Basho Technologies has integrated its cloud-storage software Riak CS with OpenStack, the popular open-source cloud architecture.

  • Google Unveils Open-Source Gumbo HTML Parser Tool

    Google is adding another open-source tool for developers with the release of its Gumbo HTML parser, which is a C implementation of the HTML5 parsing algorithm.

  • Adobe Starts Brackets From Scratch As A Web Tool For GNU/Linux

    Perhaps the ubiquity of GNU/Linux on web servers that convinced Adobe to go this way or perhaps it’s the rapid growth of GNU/Linux on the client side but it’s a better move late than never.

  • Open-Source Adobe Brackets Web Development Comes to Linux

    When it comes to Web development, Adobe’s Dreamweaver (originally from Macromedia) is a well-known and widely deployed tool. Like most of Adobe’s commercial tools, it doesn’t run on Linux. While historically Adobe’s tools haven’t been widely available for Linux users, a new era seems to be starting.

  • Our Latest Collection of Worthwhile and Offbeat Open Source Applications

    While there are lots of open source projects that are now household names, many truly good ones don’t get much attention. We’ve delved into little-known but very useful open source projects before here on OStatic. In this post, you’ll find an updated collection of interesting, free applications that you might not currently use.

  • Hobbyist coder 2.0 spreads open source in 2013

    There’s an old expression in marketing and public relations: when you’ve got no news at all and nothing product or customer related to say, try doing a survey.

  • Web Browsers

    • Chrome

    • Mozilla

      • Developers: Give us sane and sensible default system and application settings

        You know, why stuff that’s supposed to work out of the box, don’t and why some of the better features of the desktop environments and applications are buried or not enabled by default.

        Sometimes I think it has to do with the adoption of a certain ideology by the developers. For example, the developers of Chakra Linux adopted the KISS (keep it simple, s..) principle, which roughly translates into, we give you a bare system, you customize it the way you want. Freedom, they

      • Firefox To Remain Default…. Very Nice!

        Jason Warner who leads the Ubuntu Desktop Team announced today that Firefox will continue to be the default browser for Ubuntu 13.10 although he suggested the proposal which was unpopular would be re-visited at the next vUDS when plans for Ubuntu 14.04 are discussed.

  • SaaS/Big Data

    • Where does OpenStack go from here?

      Businesses love OpenStack. After only three years, OpenStack corporate backers and users now include Cisco, Red Hat, Rackspace, IBM, Intel, HP, etc., etc. You get the idea. That’s all very nice and well, but where does OpenStack go from here?

    • Open Cloud Gains Big in Past Year, Still Gauged by AWS

      There are few better occasions than a recurring yearly event to reflect and take stock of where things stand. In the personal sphere, birthdays and anniversaries are good examples of such events, of course, offering as they do a clear opportunity to assess the changes time has wrought since the last one. Here in the world of technology, annual conferences can serve a similar purpose. Case in point: CloudOpen.

    • VMware: OpenStack an opportunity for us
    • VMware Continues Campaign Against OpenStack and the Open Cloud

      Sometimes when you hear questionable comments from corporate executives, it helps to take a historical look back and see if the comments are part of a structured and strategic PR campaign. The bread crumbs tell the story. As a case in point, first consider VMware CEO Pat Gelsinger’s cloud computing comments in a current Network World interview, where he says: “Where is OpenStack, we believe, going to be adopted? We don’t see it having great success coming into the enterprise because it’s a framework for constructing clouds.”

    • 10 NoSQL, Big Data Partner Questions: 10gen Channel Chief Matt Asay

      As 10gen’s VP of business development and strategy, Matt Asay oversees the NoSQL and Big Data company’s partner initiatives. Translation: Asay, a veteran of Alfresco, Canonical, Novell and others — essentially is 10gen’s channel chief. So what are the partner opportunities for those that want to work with the MongoDB database provider? Here are 10 key questions for Asay.

  • Oracle/Java/LibreOffice

    • Must-have software for college students

      For college students, the old “reading, writing, and ’rithmetic” morphs into writing papers, doing basic stats, and creating presentations (and yes, still lots of reading). No matter what you’re studying or where, you’re going to have to perform these tasks from time to time. Even with student discounts, Microsoft Office Suite can cost anywhere between $80 and $140. But if you think there’s no alternative, you have a little research to do.

  • Education

  • FSF/FSFE/GNU/SFLC

    • GUPnP 0.20.4 Makes the User-Agent ASCII-Only

      The developers behind the GUPnP project, an object-oriented and elegant open source framework for creating UPnP devices and control points, released version 0.20.4 with various improvements and fixes.

    • Glibc 2.18 Supports New Optimizations, New Archs

      The official glibc 2.18 announcement has yet to surface, but the 2.18 release has been tagged in Git (and glibc 2.19 development now open), and packages of it can be downloaded. Fortunately, in looking at the Git tree we can already talk about the goodies of glibc 2.18 without the official release announcement.

  • Project Releases

  • Programming

  • Standards/Consortia

    • Overcoming HTML5′s Limitations

      HMTL5 is such a low-cost and portable alternative to native app development that it makes sense to explore solutions that address its limitations.

Leftovers

  • IBM wins largest federal cloud contract to date: U.S. Dept. of Interior

    IBM has won its largest federal cloud contract to date. Big Blue has signed on to be the primary cloud vendor for the U.S. Department of Interior (DOI).

    The 10-year contract is worth approximately $1 billion, consisting of IBM’s cloud computing technologies, services and hosting as the home of the National Park Service begins to deploy a new cloud infrastructure.

  • Rackspace survey suggests the hybrid cloud model has won the game
  • Why PRISM’s potential impact on cloud industry is under-valued and over-rated

    Forrester estimates the US cloud computing industry could lose up to $180 billion by 2016 thanks to the NSA’s PRISM project – but only if you believe that concerns about government spying trump the business benefits of going cloud.

  • Security

    • New York Times Website goes down

      Officially, according to the NYT twitter account, all the paper has to say is that “The New York Times Web site is experiencing technical difficulties. We expect to be back up shortly.” And, then a follow-up,a few minutes, later saying “There are technical difficulties at http://nyti.ms/w0c0wo that we hope to resolve soon. ”

      It’s not just the NYT Web site. According to sources at the paper, the nytimes.com e-mail servers are also down.

    • Remote File Inclusions Pose Threat to Web Server Security

      New research rings the alarm bell on the risks of Remote File Inclusions, which could be a more pervasive threat to Web server security than even SQL injection.

  • Defence/Police/Secrecy/Aggression

  • Transparency Reporting

  • Environment/Energy/Wildlife

  • Finance

    • Icahn says bigger buybacks can drive Apple shares to $700
    • Investigation Of Banks’ Role In Price Rigging Escalates With New Subpoenas

      Last week’s CFTC subpoena targeted one unnamed warehousing firm, and specifically focused on documents related to the London Metal Exchange (LME), which is the primary global platform for trading based on metals. The LME sets rules for how the metal industry operates, including limits on how much of a given metal may be moved out of a given warehouse on a given day – the rule which warehouse owners like Goldman Sachs are allegedly abusing for profit. The LME also takes a one percent commission off of the rent that warehouses charge to store metals. With the total global value of metals traded through the exchange measured in the trillions of dollars, changing the system that’s allowed financial firms to inflate prices would cost the LME vast sums.

    • Fannie Mae Hires an Officer it Alleges Defrauded it – and Finance Cheers

      Three Bloomberg reporters have done the Nation a service by ferreting out a scandal of moderate magnitude but emblematic importance. Dakin Campbell, Jody Shenn and Phil Mattingly broke the story on August 14, 2013 that Adam Glassner, recently described, but not named, in the Department of Justice’s (DOJ) fraud suit against Bank of America (B of A), and named as a defendant by Fannie Mae’s in its fraud suit against B of A and several officers, was hired by two companies (Ally and Fannie) bailed out by Treasury.

    • The Rule of Law in the Financial System

      Felix Salmon has a depressing blog post about the Fab Tourre verdict and a criminal conviction in another Goldman Sachs-related case. Felix concludes, “I’m increasingly coming to the conclusion that America’s system of jurisprudence simply isn’t up to the task of holding banks and bankers accountable for their actions.”

    • Cisco Plans to Cut 4,000 Jobs, as It Posts Profit Gain
  • PR/AstroTurf/Lobbying

    • What’s the Message of Clinton’s Noncampaign for the Office She Might Run for in Three Years?

      Hillary Clinton hasn’t announced that she’s running for president in 2016, and launched a campaign yet. But the Washington Post is already complaining that her nonexistent campaign for an office she may or may not seek lacks a clear message.

      [...]

      But thank you, Dan Balz and Richard Cohen, for this glimpse into the kind of campaign coverage we can look forward to for the next three years.

    • Koch-Funded Franklin Center “Watchdogs” Infiltrate State Capitols

      As newsrooms across the country have cut staff reporters — due in part to slipping ad revenue and corporate media conglomeration — the Franklin Center for Government and Public Integrity has rushed to fill the gap, as the Center for Media and Democracy (CMD) has documented. The Franklin Center has 40 state news websites, with reporters in 34 states so far. Its reporters have received state house press credentials and its stories appear as news in mainstream print newspapers in each state without alerting readers to the heavy right-wing bias of the Franklin-related publications.

    • More Corporations Drop Off ALEC’s Conference Brochure

      An examination of the promotional brochure for the Chicago meeting of the American Legislative Exchange Council (ALEC) reveals that the meeting — where corporate lobbyists secretly vote as equals with legislators on model bills at ALEC task force meetings — has fewer corporate sponsors willing to tell the public they bankroll ALEC’s operations. This news comes in the aftermath of 48 corporations and six non-profits leaving ALEC after the Center for Media and Democracy (CMD) connected the dots between “Stand Your Ground” legislation and ALEC, and coalition of organizations pressed for corporations to stop funding ALEC.

    • ALECexposed: List of Corporations and Special Interests that Underwrote ALEC’s 40th Anniversary Meeting

      Based on the sponsorship rates ALEC promoted earlier this year, the organization took in approximately $910,000 from firms specifically designated as “President” to “Trustee” level sponsors for its 40th Anniversary meeting compared with estimated revenue of approximately $1.2 million for the same level of sponsorships at last year’s meeting in Salt Lake City.

      These totals reflect the highest profile sponsorship levels promoted at the meeting, but ALEC obtained an additional amount of revenue from other event sponsorship opportunities for corporations and special interest groups, in addition to registration fees, booth fees for its convention, and other income sources. So its total revenue from this year’s meeting is certainly greater than $1 million, and it is not known if some corporations funded ALEC’s meeting at various sponsorship levels but chose not to have their names listed as sponsors in ALEC’s brochure, or not.

  • Censorship

    • To be, or not to be, blocked, that is the question

      n the latest development of over-zealous internet filtering, the British Library has blocked access to Shakespeare’s Hamlet because of its “violent content”.

    • Virgin and Sky blindly blocking innocent sites

      As reported by PC Pro, the systems implemented by both Virgin and Sky to stop access to websites blocked by the courts appear to be blocking innocent third-party sites with apparently little or no human oversight. For example the website http://radiotimes.com was reported to have been blocked.

  • Privacy

    • Obama’s Intelligence Advisory Board Cleaned Out Ahead of NSA Scandal

      Except not so much. In the months leading up to the scandals, President Obama has slashed the panel’s membership to virtually nothing. Usually a panel of 14-16 people, and 14 even last year, the PIAB now stands at just four members.

    • NSA leaks trigger steep rise in ad/third-party-cookie blocking

      An Annalect study of the public’s attitudes towards surveillance found that Internet users are becoming more concerned about privacy in the wake of Edward Snowden’s NSA leaks. They conclude that this will impact on online advertising, as more and more users adjust their browser settings to block third-party cookies and ads, and make use of privacy technologies in general. In support of the thesis, they cite strong growth in the percentage of users who have adjusted their browsers’ privacy settings. These users are still a minority, though the percentage has increased from 22 to 38 in less than a year.

    • Washington Post Slaps Back White House Over NSA Privacy Quotes

      The Post went to the NSA and the White House for comment before the article’s publication, as it does with almost any sensitive national security story. “The government was made aware of The Post’s intention to publish the documents that accompany this article online,” the article stated.

      But, in a separate post, the paper revealed that, after the Post refused to let the White House edit quotes from an on-the-record conversation Gellman had conducted with John DeLong, the NSA’s director of compliance, the administration tried to substitute the quotes with a prepared statement.

    • NSA repeatedly violated surveillance rules: report
    • How the NSA Is Hurting the Tech Sector
    • NSA broke privacy rules ‘thousands of times each year,’ report says

      The NSA broke privacy rules “thousands of times each year” since 2008, The Washington Post reported Thursday, citing an internal audit and other documents.

      Material was provided to the newspaper this summer by National Security Agency leaker Edward Snowden.

    • The NSA’s Data Haul Is Bigger Than You Can Possibly Imagine
    • Snowden handed NSA information in Dell’s employ: Reports

      Reports have surfaced claiming that Edward Snowden began his intelligence collection in 2012.

    • Edward Snowden documents show NSA broke privacy rules

      The US National Security Agency (NSA) broke privacy rules and overstepped its legal authority thousands of times in the past two years, according to documents leaked by Edward Snowden.

    • NSA broke privacy rules thousands of times per year – report

      The U.S. National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since 2008, the Washington Post reported on Thursday, citing an internal audit and other top-secret documents.

    • NSA spying ‘broke privacy rules’
    • Meet The Man Behind Palantir, The CIA’s Shifty Data-Mining Contractor

      Over at Forbes, Andy Greenberg has penned a fascinating profile of Alex Karp, the CEO of the CIA-funded data mining company Palantir. Palantir applies Silicon Valley data-gathering expertise to the tremendous amount of secret data that intelligence agencies and the military generate. Palantir then takes all the data and makes it useful, tagging the information and analyzing patterns to, for example, predict attacks in Iraq or track down cartel members. The company is moving into the private sector, away from just defense contracting, and bringing lessons from the battlefield to banks looking to stop identity theft and cyberattacks.

    • How to Encrypt Your Email

      First download Mozilla “thunderbird.” It’s a free email service that you can use with your current email address. Next download a free program called “GNU privacy guard.”

    • Keeping Abreast of Privacy Issues

      In this post-PRISM world, we need to take indi­vidual respons­ib­il­ity to pro­tect our pri­vacy and ensure we have free media. At least then we can freely read, write, speak, and meet with our fel­low cit­izens. We need this pri­vacy to be the new res­ist­ance to the creep­ing total­it­ari­an­ism of the global elites.

    • The NSA and the cloud – dispatches from the front line

      The NSA PRISM scandal rumbles on with the prospect of damage to the US cloud industry still top of the agenda as the German government called this week for greater support to create favorable European alternatives to US providers.

    • NSA establishes $60 million data analytics lab at N.C. State

      N.C. State University will join with the National Security Agency to analyze massive amounts of data at a new lab to be created at Centennial Campus, the university announced Thursday.

      The Laboratory for Analytic Sciences, funded with $60.75 million by the federal NSA, is the largest research grant in NCSU’s history, but details about the facility are top secret. Those who work in the lab will be required to have security clearance from the U.S. government.

    • Q&A: Senator Ron Wyden on NSA Surveillance and Government Transparency

      ‘If we don’t recognize that this is a truly unique moment in America’s constitutional history, our generation’s going to regret it forever.’

    • Let’s Give Every NSA Employee an Anonymous Whistleblowing Opportunity

      A reform that would protect classified information even as it helped tip off Congress and the public to surveillance abuses

    • Oracle’s Larry Ellison enthusiastically applauds NSA spying

      Oracle CEO Larry Ellison has given his enthusiastic support for the National Security Agency’s global surveillance of the internet and everyone on it.

    • Decoding NSA doublespeak

      The Electronic Frontier Foundation’s Trevor Timm has a handy guide to decoding NSA doublespeak. The spookocracy has a pathetically transparent way of lying their way out of direct questions, but the press (and, more importantly, Congress) seems incapable of detecting the low-grade BS emanating from the smoke-filled rooms. For example, when you ask the NSA if they can read Americans’ email without a warrant, they reply “we cannot target Americans’ email without a warrant.” The amazing thing about this stuff isn’t that the NSA tries it on, but that its nominal supervision doesn’t notice it. My five year old is better at this than they are.

    • Ex-CIA whistleblower Snowden contacted by father against legal advice

      The Russian lawyer for Edward Snowden revealed on Thursday that the father of the US intelligence leaker had contacted his son for the first time via the Internet in defiance of legal advice. Meanwhile a new poll shows most Russians think he is a hero for outing the secret services.

    • Lavabit founder, under gag order, speaks out about shutdown decision

      Ladar Levison took 10 years to build his company—and he’s 32, making that most of his adult life. So when he shut down his encrypted e-mail service, Lavabit, without warning last week, it was like “putting a beloved pet to sleep.”

    • How To Encrypt Your Email And Keep Your Conversations Private

      Between constant password breaches and government agencies trying to look in on everything you do, your privacy has probably been on your mind lately. If you’re looking for a little personal privacy in your communications with friends and loved ones, or you just want to trust that the documents you email to your accountant aren’t being intercepted and read, you’ll need to encrypt those messages. Thankfully, it’s easy to do. Here’s how.

    • House Intelligence Committee chairman says growing criticism of NSA, CIA is ‘dangerous trend’

      The chairman of the House Intelligence Committee said Wednesday night that “there’s plenty of oversight” given American intelligence agencies like the NSA and CIA and that “we need them to be at the top of their game” in a dangerous world.

    • Political Scene: Can the N.S.A. Be Reformed?

      On this week’s Political Scene podcast, Hendrik Hertzberg and John Cassidy join host Amy Davidson to talk about President Obama’s proposals to make the National Security Administration’s surveillance programs more transparent and more sensitive to civil liberties. The President’s plan includes appointing an independent lawyer to argue against the government before the Foreign Intelligence Surveillance Act court and reforming the Patriot Act to strengthen safeguards against the government listening in to citizens’ phone calls. “The steps he outlined,” Hertzberg says, “were gestures in the right direction, but they were really kind of feeble.” What’s more, as Cassidy says, the politics of security and counterterrorism may stand in the way of any substantial policy changes. “The political incentive for Obama and everybody in the White House is to act as tough as possible on all this national-security stuff, including this N.S.A. thing,” he says. “Even though there’s going to be a big brouhaha over this, the policies are basically going to continue.” After all, as he notes, no President wants to risk opening the doors to another terrorist attack.

    • Brazil rejects Kerry explanation on NSA surveillance

      But this tension may become more intense in coming weeks and months. According to Glenn Greenwald, the American journalist involved in the publication of leaks provided by Mr. Snowden, more revelations would be made public soon. Testifying before the Brazilian Senate foreign relations committee last Tuesday, Mr. Greenwald said, “The stories we have published are a small portion. There will certainly be more revelations on the espionage activities of the U.S. government and allied governments…on how they have penetrated the communications systems of Brazil and Latin America.”

    • The NSA Is, Like, Super Desperate: Using Twitter and Made Up Words to Hire People

      So, the NSA has had a hard time of things recently. Since everyone kind of hates them now, it has made hiring anyone a little more difficult than anticipated, because in addition to being reprimanded by college students, they’ve started tweeting job listings that may or may not use accepted English words.

    • German Backlash to NSA Spying Gets Stronger

      The German government said Wednesday that it plans to build up the European IT sector to provide stronger alternatives to American companies that are subject to surveillance by the U.S. National Security Agency.

    • US and Germany enter no-spying agreement in wake of NSA leaks

      The EU and the US should also accelerate data protection agreement talks, German Chancellor Merkel says

    • White House Knew That Mike Rogers Withheld Details Of NSA Surveillance From Others In Congress

      In the last week or so it’s come out that Rep. Mike Rogers, the head of the House Intelligence Committee has actively blocked requests from members of Congress to review details of the NSA’s surveillance program — showing that the claim that everyone in Congress was informed about these programs isn’t just a lie but a duplicitous one. And then it got worse. Rep. Justin Amash pointed out that Rogers’ committee actually withheld key information from all incoming Representatives in the class of 2010, who had to vote on the Patriot Act’s reauthorization, which renewed the program to collect data on all Americans in bulk.

    • There Is No Such Thing As NSA-Proof Email
    • Why can’t Face the Nation face dissent on NSA spying?

      The CBS Sunday morning show Face the Nation featured a discussion of NSA surveillance with the former head of the agency and two politicians who vigorously defend the agency’s mass surveillance programs.

  • Civil Rights

    • CIA Admits Spying on Noam Chomsky

      Though the file is from decades ago, the system of COINTELPRO and other intelligence activities were prologue to our current surveillance state. Only in those days they did not have the kinds of surveillance technologies that exist today.

    • CIA ‘admits’ to having file on Chomsky, might have destroyed it
    • CIA’s Chomsky file did exist

      But FBI memo reveals records were destroyed

    • CIA Cops To Spying On Noam Chomsky [Report]

      The Central Intelligence Agency denied that it had a secret file on the MIT professor for years, but finally copped to keeping tabs on the famous dissident since the 1970′s, at the height of his anti-war activities.

    • Renowned investigative journalist Michael Hastings was working on story about CIA Chief John Brennan at the time of his mysterious death
    • Journalist Michael Hastings reportedly working on story about CIA chief before death

      San Diego 6 News reports that Hastings had focused his latest project on Brennan, the former White House counterterrorism adviser and current CIA director.

    • Michael Hastings was working on a story about the CIA when he died

      Immediately after Michael Hastings died in a car crash in Los Angeles back in June, the conspiracy theories started flying. And this time it wasn’t all tin-foil hat nonsense—there was a lot to feel queasy about.

    • CIA Compiled Information on Noam Chomsky during Vietnam War
    • Barrett Brown Awaits Trial on Spurious Charges in Texas

      An astute critic of institutions, Barrett began his career criticizing the church, moved on to the corporate media and political pundits, focused on various companies in the private intelligence contracting industry, and finally took aim at the FBI and the Justice Department. Holding fast to his principles and instincts, his exemplary work always advanced the public interest and the interests of the common people. On a mission to expose corruption and abuse, he acted in the best traditions of the Constitution and muckraking journalism. His writing bleeds with his knowledge of the libertarian and anarchist schools of thought and a revolutionary sentiment. It’s no surprise that he now finds himself the target of a political prosecution which has already stolen his freedom for nearly a year and threatens to put him away for life.

    • America’s Descent Into Madness

      America is descending into madness. The stories it now tells are filled with cruelty, deceit, lies, and legitimate all manner of corruption and mayhem. The mainstream media spins stories that are largely racist, violent, and irresponsible —stories that celebrate power and demonize victims, all the while camouflaging its pedagogical influence under the cheap veneer of entertainment. Unethical grammars of violence now offer the only currency with any enduring value for mediating relationships, addressing problems, and offering instant pleasure. A predatory culture celebrates a narcissistic hyper-individualism that radiates a near sociopathic lack of interest in or compassion and responsibility for others. Anti-public intellectuals dominate the screen and aural cultures urging us to shop more, indulge more, and make a virtue out of the pursuit of personal gain, all the while promoting a depoliticizing culture of consumerism. Undermining life-affirming social solidarities and any viable notion of the public good, right-wing politicians trade in forms of idiocy and superstition that mesmerize the illiterate and render the thoughtful cynical and disengaged. Military forces armed with the latest weapons from Afghanistan play out their hyper-militarized fantasies on the home front by forming robo SWAT teams who willfully beat youthful protesters and raid neighborhood poker games. Congressional lobbyists for the big corporations and defense contractors create conditions in which war zones abroad can be recreated at home in order to provide endless consumer products, such as high tech weapons and surveillance tools for gated communities and for prisons alike.

  • Intellectual Monopolies

    • Copyright Lawyers vs Patent Lawyers Smackdown: And The Winner Is…

      As we noted last year, in a surprising move, the USPTO had already thrown its weight behind the idea that copies of scientific articles submitted as part of the patent application were indeed fair use.

    • Copyrights

      • Court Forbids IsoHunt From Indexing Dead Torrent Sites

        A California District Court has updated and clarified the permanent injunction the MPAA won against the BitTorrent search engine isoHunt. The torrent site has to keep filtering movie and TV show-related titles and terms on its site. The new order further prohibits isoHunt from indexing or linking to The Pirate Bay and the late BTJunkie and TorrentSpy. This is the first time that a U.S. court has forbidden a site from linking to other sites that have been dead for years.

Using Blackberry Patents Against Android/Linux Not a Far-Fetched Strategy in the Nation of Software Patents

Posted in GNU/Linux, Google, Microsoft, Oracle, Patents at 1:23 am by Dr. Roy Schestowitz

The demise of Blackberry is a growing patent-stacking threat to Linux and Free software

Blackberry

Summary: Identification of a looming threat to Android/Linux, especially from a company with history of Microsoft deals and a growing patent portfolio that’s being considered for sale

The United States, whose patent system is run by large corporations like IBM and Microsoft (the USPTO has long been operating outside the public interest), is a very threatening environment to Free/libre software. To distribute computer programs for free might not be legal there, but it only becomes a problem when distribution is of high volume and by a large company like Google. Microsoft even got large companies paying it for Linux, a widely used operating system kernel. This is unjust and the core cause is software patents.

“The first step to fighting patent trolls is to limit software patents to five years,” says this new article, which puts forth a sort of compromise which at least targets the real problem. To quote:

There’s a lot wrong with America’s patent system — it often serves to undercut innovation, limits competition, and rewards trolls. But there’s a relatively easy short-term fix: Cap software patents at five years from issuance, a position adapted from the Electronic Frontier Foundation’s (EFF) Defend Innovation Project. While comprehensive legislation is needed to fix patent law, this first step is critical to reviving and protecting entrepreneurship, R&D, and technological progress in the United States.

20 years if far too long a lifetime for patents that should have never been granted in the first place. Watch how software patents are preventing the spread of voice recognition, motivating this lawsuit over reasonably out-of-date ideas:

As Nuance Communications Inc. and ABBYY Software House — two competitors in optical character recognition — brought their long-running case to a jury in U.S. District Judge Jeffrey White’s courtroom on Monday, their lawyers traded classic barbs of patent warfare.

Representing plaintiff Nuance, partner James Bennett of Morrison & Foerster described ABBYY in his opening statement as “a follower, not a leader.”

Coming to the Russian company’s defense, partner Gerald Ivey of Finnegan, Henderson, Farabow, Garrett & Dunner suggested that Nuance felt threatened by a more nimble competitor.

This is just protectionism. That’s what patents are about. When some companies cannot rely on technical advantage alone they then resort to patent monopolies.

Android, which is growing rapidly and taking over the world as a de facto platform (on which most Techrights posts are composed by the way), is actually the target of protectionism from the ‘old guard’ — companies it is making less relevant over time.

It is being alleged right now that patents from RIM might get sold. One reader wrote to say: “If BlackBerry sell company… Microsoft will… get QNX which is UNIX like operating system and… patents and QNX technology and Linux?”

“Remember SCO,” he added.

Well, Microsoft could pay BlackBerry to later see RIM/BlackBerry suing Android companies. The Nokia and SCO strategy more or less…

Blackberry is of virtually no practical use to Android backers; when Google bought part of Motorola and grossly overpaid it was intended to prevent Microsoft and Apple from getting the patents (which they had reportedly bid for, just like with Nortel).

What if another CPTN member like Oracle bought this company? A new interview with Oracle’s CEO was rather revealing. He spoke of Microsoft as an enemy of an enemy (Google) and one author thinks that “Oracle (ORCL) [is] The Perfect BlackBerry (BBRY) Buyer” (for patents at least). To quote:

So BlackBerry (BBRY) has put itself up for sale while also considering a private equity move. Some pundits wonder if the Z10 smartphone maker will break itself up into a mobile service provider and mobile device company. But The VAR Guy wonders: Does a more surprising fate await BlackBerry — at the hands of Oracle (ORCL) CEO Larry Ellison? Before you dismiss Oracle potentially buying BlackBerry, consider this history lesson.

Microsoft has been publicly aiding Oracle’s litigation against Android, announcing collaborations other than CPTN (technical ones too) and filing together antitrust complaints. Here is more of what Oracle thinks of Google.

Speaking of Oracle, what about other CPTN members like Apple and Microsoft (to which Oracle is now very close)?

Apple has been fighting Samsung using patent-induced sanctions at the ITC, with support from Obama's government officials. The Against Monopoly Web site says:

ITC Allows Apple Imports That Violate Samsung Patents

The blog, Public Knowledge, argues that the International Trade Commission should consider the public interest in reaching regulatory decisions on patents. The Obama has so decreed when it overruled an ITC case and permitted imports of Apple phones that it had found to violate duly recognized patents of other companies, in this case foreign firms link here.

When I look at the mess in the whole patent system, I see a world of oligopolies and monopolies built on patents, supposedly designed to encourage innovation, but instead creating a self-perpetuating means to paralyze innovation.

Groklaw has been upset about this and the other day it covered Microsoft’s fight against Motorola, which now involves an injunction as well. To quote:

Judge James L. Robart has now ruled [PDF, 38 pages] on Microsoft and Motorola’s summary judgment motions, granting in part and denying in part.

The attacks on Android takes many different forms (also antitrust), but the main players behind this attack remain the same. Next week we will revisit the antitrust angle.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts