02.14.13
Posted in Dell, GNU/Linux, Microsoft at 3:31 pm by Dr. Roy Schestowitz
Summary: Upset investors can still prevent Microsoft from ‘pulling a Novell’ on Dell
Ashlee Vance, formerly a FOSS-centric writer at The Register, has an interesting hypothesis about Microsoft Dell, which VAR Guy keeps opposing whilst identifying unhappy investors:
Done deal? Hardly. Dell’s (NASDAQ: DELL) $24.4 billion deal to go private apparently faces pushback from at least fo-.ur major shareholders, Reuters reported. And don’t forget: A special Dell committee is managing a 45-day “go-shop” period, during which the committee is actively soliciting alternative bids. So who will wind up owning Dell, and how will the current variables impact partners and the PC maker?
The VAR Guy is no fan of Microsoft and he believes that the abusive monopolist uses fake shortages (as hype generation strategy) for reasons he summarised here. Walt Mossberg is still unsatisfied with the latest hardware that has a Microsoft badge (the one with fake shortages) based on his article which is not a favourable review, again.
Nokia and Dell are deep in the mud unless they dump Microsoft. Already, the monopolist alienates mobile partners and soon it will be OEMs, too. There are other implications,. As Chris Hall puts it: “Let’s say it finally happens and the big OEMs get tired of dealing with Microsoft and decide to make Windows only one choice of several on new computers. Not a world like we have now, where the likes of Dell halfheartedly offer half baked and broken installs of Ubuntu, installs that need serious tweaking before they’ll work. Not that world, but a pretend world of Linux being offered across all models, with a choice between two or three distros. You know, OEMs giving Linux exactly the same treatment as they give Windows today.” █
Permalink
Send this to a friend
02.13.13
Posted in News Roundup at 9:11 pm by Dr. Roy Schestowitz
Contents
-
Writing is not a thing of the past, with several technological advancements happening in this arena too. The latest development corresponds to Lernstift, a company destined to create smart-products for a better living and they have just rolled out a pen of the same name as them.
-
-
For a long time the Linux gaming scene was stagnating, relegated to a limited number of open source games and a few popular but very old closed source games such as Doom 3, Quake 4, Unreal Tournament 2004 and whatever game you could force to run using WINE, an open source software for running Windows applications on Linux. Let’s face it, most gamers who have attempted to run games on Linux in the past probably spent more time wrestling with installers and searching for the right drivers than actually playing the game on their specific Linux configuration.
-
-
-
-
Should companies that produce mostly proprietary software invest in Linux development? In one sense, that seems as illogical as the artisanal-organic bread guy from the local farmers’ market buying shares in Wonder Bread. But in a move that reveals the growing influence of open source beyond its traditional space, Perforce has joined the Linux Foundation and is very committed to supporting and protecting open-source code. Here’s what Don Marti, technical marketing manager, had to say.
-
“The computer came back two days later. The computer started up in less than a minute in Ubuntu where it used to take up to five minutes in Windows Vista. It had all the software we needed – word processor, spreadsheet and more and it is all legal without licence payments,” said Mr Mullen.
-
-
Desktop
-
My wife needs a new PC. Her old machine is quite competent, if dated — a 1 GHz Athlon 64, with 1 GB of RAM. Running Debian Linux with LXDE it is quite fast, and indeed she has no problem with OpenOffice or Thunderbird or any application save one: web browsing with Firefox. And I don’t think it’s Firefox’s fault. The problem is, for her work she needs to visit a lot of websites, and as I’ve commented before, too many websites are now larded up with the crappiest Javascript code you can imagine. Sure, she has NoScript installed, but she needs to enable Javascript to view these sites, and they’re sites she can’t avoid. (Like CNN.com, and several other news sites.)
So about a month ago we decided she needs a computer fast enough to run CNN’s pig-awful Javascript. I missed a great post-Christmas deal at Staples, but I found the same deal at Newegg.ca: a refurbished HP DC5850 desktop for $209. It has a dual-core 2.3 GHz Athlon 64, and 4 GB of RAM — I always like to upgrade by a factor of 4 when I can — and a monster 750 GB hard drive. It’s capable of running Windows 7, so it should fly under Linux.
-
Server
-
I don’t know about your environment, but in mine, keeping up to date with available patches is hard. It is tempting to just ignore the patches and keep the server up for as long as possible, but doing so might leave your system open to attacks, or cumulative bugs in the running daemons. On the other hand, patching means an interruption in service, and introducing a change into the environment, which further means that the patches need to be tested before production. But, test for too long, and by the time the patches are applied to production, they might be an entirely new batch of patches.
-
Kernel Space
-
Kernel developer Greg Kroah-Hartman has reported on his plans to extend the Linux kernel to include a system for inter-process communication (IPC) that will be reliable, quick and secure and will allow for both direct point-to-point and multicast communications. According to Kroah-Hartman’s blog post, the goals include providing a “libdbus” interface, which will allow existing D-Bus applications to work with the kernel implementation without modification.
-
-
-
-
Applications
-
-
Proprietary
-
Instructionals/Technical
-
-
-
-
-
-
-
Email still is, and will remain for a while, THE standard for many forms of non-real-time, online communications. Even if it has big issues like spam and no built-in security, we are all sure we can exchange email with anybody with any computer, tablet, or smartphone, worldwide.
One obvious downside of its ubiquity is that (even ignoring spam) email floods our Inboxes. Search “email overload” online, and you’ll find plenty of complaints about people “spending a quarter of their day on email-related tasks”, or because the average response time to email would have grown 13% in 2012.
-
Wine or Emulation
-
Games
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
-
-
Aaron Seigo tried to break into the tablet space with the KDE powered ‘Sparks’ tablet, which due to trademark issues was re-christened as Vivaldi. When he announced the tablet, there as a huge demand for the devices but the devices never saw the light of the day due to problems with supply chain.
The OEM changed some hardware which made it impossible for the OS to run on those device. There was a long silence and Seigo has started talking about it. He gave me hints about some big announcement around Vivaldi when I asked him about meeting at FOSDEM and he said that he was canceling the FOSDEM trip due to Vivaldi.
-
It’s been a silly busy week for me, and I’ll be working into the night to get reasonably through my “must be done by today” list .. but I finally got to this one: blog about tomorrows Luminosity of Free Software Google Hangout. This will be the third one and hopefully the best yet.
-
GNOME Desktop/GTK
-
A few months ago GNOME announced that they would be dropping the fallback mode, but met with a bit of resistance. To appease the peasants, developers said they would start supporting extensions that mimicked classic GNOME 2 features. Well, Matthias Clasen announced the early results of their efforts.
-
As you probably know, the fallback mode will be dropped with GNOME 3.8 and instead, users will be able to use a set of GNOME Shell extensions that provide a GNOME2-like layout. Recently, these changes have landed in the GNOME Testing PPA for Ubuntu 12.10 and 13.04.
-
-
-
The latest release of Chakra Linux brings the recently released KDE 4.10 to the users of the Arch Linux based distribution. Chakra Linux 2013.02, code-named “Benz”, also includes updates to the distribution’s own tools such as its installation assistant and its theme. Chakra was originally aimed at providing a live CD that allowed for easy uptake by new users but still maintained the powerful roots and extensive package selection of Arch. The distribution can be installed and provides a modern Linux desktop; although it is still based on Arch Linux, it now uses its own repositories.
-
New Releases
-
Snowlinux 4 Cinnamon & E17 non-PAE are based upon Debian GNU/Linux 7.0 “Wheezy”. There are two ISO images available, one with Cinnamon, the other with E17 non-PAE. While the Cinnamon edition is using Linux 3.5, the E17 edition is using Linux 3.2 non-PAE to support older PCs, too. The Cinnamon edition is using Cinnamon 1.6.7 and the E17 edition is using E17.1. There were introduced much new features like snowMount, the Snowlinux mount tool for drives. We changed the default color of our Snowlinux-Metal-Theme from green to blue and updated our Icon set.
-
Traditionally, original versions of ROSA Desktop operating system are provided with KDE desktop environment which includes a lot of design modifications and functionality enhancements. A nice-looking ROSA theme and a set of brand-name applications highly integrated with KDE (TimeFrame, StackFolder, RocketBar, KLook, KDM) have already become recognizable ROSA features and made ROSA familiar to Linux users.
-
PCLinuxOS/Mageia/Mandrake/Mandriva Family
-
If you are running a rolling-release distribution, this short article will likely be of no use to you, but if you are running an installation of Mageia 2, you’ll learn that is brings good tidings, when it comes to upgrading an existing installation of Mageia.
-
Arch Family
-
In today’s post in my prep for my yearly weekend at the Southern California Linux Expo (SCALE) I’m going to cover the subject of Arch Linux.
I’m going to have to admit to a little bias on this one. I’ve never really cared for Arch Linux. I gave it a try when I used to listen to a popular Linux podcast I liked called the Linux Link Tech Show. They loved this Linux distribution and I felt exactly the opposite. I discussed in an earlier blog post what a package manager is. Well, this one uses one called pacman. I can not show how much I don’t like this package manager. I had to struggle with a media system I had hooked to my computer that I absolutely loved. Mythtv (well actually a MythTV variant call Linhes). Don’t get me wrong. I really liked that system a lot HOWEVER, whenever I tried to go deep into the guts and update stuff it would either make it crash or break. I hated that. I had to backup often. I ended up just not trying to add features to it because I was scared to touch it. I’m not one to be scared of touching any technology.
-
Red Hat Family
-
Chrome, the browser in question here, is based on the open source project Chromium. Chromium developers seems to prefer the new C++11 for the obvious security reasons and ease of maintenance but it also means adopting a new toolchain and upgrading to GCC 4.6. This makes it hard to support those operating systems that ship with older C++ standard libraries. RHEL 6, among many others, is one such operating system.
That’s the reason why such operating systems won’t be supported by the newer versions of Chrome. Chrome will continue to work on such distributions but it won’t get any updates for the above mentioned reasons. So, the notification WildeBoer saw was Google telling such users that their OS won’t be supported unless they are upgraded to newer toolchains and GCC.
I think Google and Red Hat can work together to solve this issue.
-
Red Hat and its top officials have recently come out with some technology predictions that are worth taking note of. To begin with, the company has released its Top 10 IT Predictions for 2013, including some big possible shifts in cloud computing norms and data storage practices. And, CEO Jim Whitehurst is quoted in a widely read story predicting that Big Data won’t just transform how we yield meaningful results from data but will also shake up the way that upper management structures at many companies work.
-
Google generated quite a lot of heat recently when its Chrome started showing “Google Chrome is no longer updating because your operating system is obsolete.” message on those GNU/Linux based systems which were using older C++ standard libraries. We covered the story in detail here.
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
Speaking for myself, I believe it’s a serious possibility.
-
-
The developers from Ubuntu have been busy lately building an all new Ubuntu Phone OS that aims to take Android and other smartphones to a new level. Their entire UI is completely different full of gesture-based on screen actions. We’ve covered it plenty in the past and even got some hands-on time with their new OS. For those that don’t want to wait, read on for more details on this new 3rd party app mimicking the OS.
-
-
Raspberry Pi users have another reason to rejoice; the popular game Minecraft is now available for Raspberry Pi. Good news is this game is available for free to download.
-
It may not come as a surprise to anyone who regularly reads my column that I tried to be first in line to order the Raspberry Pi. I mean, what’s not to like in a $35, 700MHz, 256MB of RAM computer with HDMI out that runs Linux? In the end, I didn’t make the first batch of 10,000, but I wasn’t too far behind either. So, now that I’ve had a Raspberry Pi for a week, I’ve already found a number of interesting uses for it. You can expect more Raspberry Pi columns from me in the future (possibly including an update to my beer fridge article), but to start, in this article, I talk about a combination of two of my favorite pocket-size Linux computers: the Raspberry Pi and my Nokia N900.
At first you may wonder why combine the two computers. After all, both are around the same size and have similar initial hardware specs. Each computer has its own strengths, such as cellular networking and a touchscreen on the N900 and an Ethernet port and HDMI video output on the Raspberry Pi. In this article, I explain how to connect the N900 to the Raspberry Pi in a private USB network, share the N900′s cellular connection, and even use the N900 as a pocket-size display. In all of the examples, I use the default Debian Squeeze Raspberry Pi image linked off the main http://www.raspberrypi.org page.
-
Before our sun collapses and goes supernova, Minecraft developer Mojang will probably release its brick-building games on all available platforms — and then some that aren’t available, like toasters and cats.
-
The main Raspberry Pi rival that was announced last year is now available! It’s called Odroid U2, and it’s powered by a 1.7GHz Exynos4412 Prime quad-core CPU and an also quad-core Mali-400 GPU that clocks at 440MHz! And the price for this baby is $89, worldwide shipping being available (so about $110 with the shipping).
-
Phones
-
Ballnux
-
LG is staying true to its rich design heritage at this year’s Mobile World Congress (MWC) with the introduction of the Optimus L SeriesII. The widely successful L Series has evolved to include contemporary design aesthetics and innovations that improve on the original. With more than 10 million Optimus L Series phones sold in the first 10 months, L SeriesII looks to continue this momentum with its sophisticated style and differentiated features.
-
Android
-
-
Android captured a reported 70 percent of the global smartphone share in the last quarter of 2012, solidifying its position as a popular and solid Apple iOS alternative.
Though Apple and its iOS devices get most of the press, Android and its partners have turned their alternative ecosystem into a serious competitor. Android devices span almost every form factor and tablet/smartphone market, from branded devices such as the Kindle Fire and Barnes & Noble Nook to the open, tinker-friendly tablets such as the Nexus 7 and 10.
-
-
-
-
Owners of Nexus-branded Android devices can expect a system update to hit their tablet or smartphone in the near future. Owners of the Nexus 10 and Nexus 7 tablets, as well as the GSM variant of the Galaxy Nexus are already reporting that Android 4.2.2 is being made available as an over-the-air update.
Google has not officially released any details about Android 4.2.2, but screenshots from users show the update to include performance enhancements and bug fixes befitting of its x.x.1 version jump.
-
-
-
-
Sub-notebooks/Tablets
-
Setting up Amazon’s consumption device as a productive Android tablet isn’t for the faint of heart.
-
The kernel of the two stories is: “Software is not a manufacturing industry” and therefore, “software is not a product.” As Eric Raymond rightly pointed out a long time ago in his book, The Cathedral and the Bazaar: “Software is a service industry” and to be more precise, software itself is only a platform for delivering services. Just like highways, waterways, the power grid, the phone network, and the piping of the water supply.
Once we understand that what matters in the software industry is simply to have robust software that supports the delivery of the services that flow through it, then it becomes clear that the economics of software cannot possibly be based on one-time payments for licenses, nor “selling software by the unit.”
Software is built and maintained through a very labor intensive process. Therefore, to properly account for its cost, we must use an approach based on the hourly cost of professional services that developers dedicate to building and maintaining such service.
This is nothing new. Charging an hourly rate for professional services is how lawyers, doctors, accountants, mechanics, pilots, and nurses have operated in the economic system for many decades (and some for centuries).
-
The majority of robotic latex tentacle users have, up until this point, had to make do with locked in proprietary software code to power their mechanical rubber appendages.
Users have had no other option than to opt for a pre-boxed heavily corporate-registered code base.
Many who want to be able to operate a potentially mentally disturbing rubber arm on either their workplace desk… or, alternatively, as some part of a decorative piece and talking point inside a home dwelling have had to go proprietary when it comes to management code.
-
Events
-
Web Browsers
-
-
Today, we announced that Opera has reached 300 million active users. At the same time, we made the official announcement that Opera will move from Presto to WebKit as the engine at the core of the browser.
With this, Opera will be the first major browser to switch to a completely new rendering engine.
-
-
Today, Opera has announced that its browser has reached 300 million active users, but perhaps the biggest news is that the browser will be dropping the longstanding Presto rendering engine and moving to WebKit.This means that the number of browsing rendering engines to take seriously moves down to only three players, and WebKit–already legendary in the open source world–gets even more momentum and community involvement.
-
Mozilla
-
For several weeks now, Mozilla has been aggressively sponsoring events–including a series of hack days–to woo app developers to its emerging Firefox OS for mobile devices. Called “Firefox OS App Days,” hack day events took place in more than 25 locations around the world, starting on 19 January in Mountain View, California and ending on 2 February in Berlin, Germany.
-
Brandon Burton of Mozilla will be speaking on Simple Patterns for Scaling Websites: Some lessons learned at Mozilla with Chris Turra on Friday, Feb. 22, at 4:30 p.m. in the La Jolla room. Here is a Q-and-A from a member of the SCALE Publicity Team:
-
SaaS/Big Data
-
I have yet to meet a sysadmin who is happy about the proliferation of the marketing term known as “The Cloud”. Perhaps it is because we are too close to the metal, because we see how the sausage is made. Maybe it is because we share a common dislike for non-descriptive marketing terminology. Whatever the cause, and if we are happy about it or not, the cloud is here, and it is important to understand its implications.
-
Oracle/Java/LibreOffice
-
-
Apache OpenOffice is a project within the Apache Software Foundation, a non-profit organization. We don’t charge for Apache OpenOffice; we make it available to all for free. We don’t pay developers; we rely on volunteers.
People need office productivity software. Among our users are students, teachers, doctors, lawyers, ministers, public servants, and business people from all industries. Perhaps 20 years ago it was only businesses that needed this kind of software. In 1992 the price of a spreadsheet application alone, not even a complete suite, was $595. Only business could afford it at that price. But today almost everyone with a computer needs a word processor, a spreadsheet and/or a presentation editor. Office productivity applications are used in the home, at school and in the office.
-
-
-
-
CMS
-
This guest article was authored by Prosper Chikomo, an internet entrepreneur and author of Turning Iron into Gold: Golden Opportunities: How to Spot Them, Create Them, Make Money from Them, and How Not to Miss Them (Available on Amazon.com)
-
Funding
-
BSD
-
FSF/FSFE/GNU/SFLC
-
On February 14th Free Software Foundation Europe asks all Free Software users to show their appreciation for Free Software.
-
-
-
-
Several unsuccessful attempts at rebooting just make you want to give your computer the boot? ZE Rescue Disk can save the day. It not only bypasses the fault preventing a successful boot, but it resets GRUB menus so computers don’t need the equivalent of hospital defibrillation kits to bring them back to life.
-
Public Services/Government
-
NASA’s shift to open-source content management is back on after the incumbent contractor withdrew a bid protest on Feb. 4.
The withdrawal of the protest, filed by e-Touch Federal Systems on Dec. 28 after NASA awarded Rockville-Md.-based InfoZen a $40 million blanket purchase agreement, allows InfoZen to begin replacing NASA’s existing content management system with open source architecture to run its 140 websites and 1,600 web assets and applications.
-
Licensing
-
Modern copyright law grants copyright automatically to any creative work, including simple things like blog posts – and small pieces of code on github. This default copyright creates an assumption that for someone to do anything further with someone else’s creative work requires permission from the author—what Lawrence Lessig calls “the permission culture.” The open license ecosystem often takes this permission culture for granted, rather than fighting back—and that may be contributing to the proliferation of unlicensed code.
-
-
Openness/Sharing
-
Open source software — code that’s free for anyone to use, as long as they share what they’re doing with it — plays a small, but growing, role in the smart grid. Examples include OpenADR, a Berkeley Labs-California Energy Commission-backed standard for automating demand response, and OpenPDC, a Tennessee Valley Authority’s Hadoop-based data management tool for transmission grid synchrophasor data.
-
Another victory for ill-intentioned hackers and a blow for the security of open source systems: OpenX, the online and mobile advertising company that announced a $22.5 million fund raising just last month, says that it is closing down its OnRamp open source ad serving platform, after the service was hacked on February 9, and the company determined that it would be too risky and costly to continue using it securely.
-
-
-
With the cost of software programs such as Photoshop and antivirus suites rising, many people turn to alternative software they can legally download from the Internet for free.
But penny-pinching students are not the only people turning to Free and Open Source Software (FOSS). Many software developers use these programs to study and improve their peers’ programs, which cannot be done with licensed software.
-
Open Data
-
One of the more benighted moves by the European Union was the introduction of a special kind of copyright for databases in 1996: not for their contents, but for their compilation. This means that even if the contents are in the public domain, the database may not be. Thanks to a recent court judgment in France, this “database right” now threatens to become a real danger for the burgeoning open data movement in Europe (original in French).
-
Open Access/Content
-
Over the weekend, a petition on Whitehouse.gov calling for the dismissal of Heymann reached 25,000 signatures, the threshold that requires a response from the administration under the rules outlined on the site. The outcry follows the suicide of activist Aaron Swartz last month, who was being prosecuted by Heymann for allegedly violating computer crime laws in his downloading of millions of academic papers from the website JSTOR.
-
Open Hardware
-
Programming
-
The annual Google Summer of Code (GSoC) is now preparing for the 2013 cycle of the program which sees Google offer student developers stipends to write code for a wide range of open source projects. Google is assisted by a number of mentoring organisations around the world who help the students achieve their goal of completing enhancements and improvements to open source projects. This will be the ninth year that GSoC has run; over the past eight years, six thousand students have completed the program.
-
Standards/Consortia
-
Anyone who reads eBooks is aware that a number of content vendors are using proprietary platforms in an effort to lock you into their content libraries: most obviously, Amazon, with its Kindle line, Barnes & Noble with its Nook devices, and Apple with its iPads and iPhones. But there are many non-content vendors that would love to sell you an eReader as well, such as Kobo, and Pocketbook, not to mention the smartphone vendors that would be happy to have you use their devices as eReaders, too.
-
-
“MERITOCRACY” tends to be spoken of approvingly these days. Its ascendancy is seen as a measure of progress. In the dark ages, the dumb scions of the aristocracy inherited their seats on cabinets and on the boards of great companies. These days, people succeed through brains and hard work.
-
For at least the next 36 hours, the political media will be talking about President Barack Obama’s State of the Union address (SOTU) as if it’s a meaningful event. Will Obama go bold or timid into this good night, will he make the case for more taxes and fewer guns, for engaging North Korea or ignoring the Hermit Kingdom, for stuffing versus potatoes? – that sort of thing. As my colleague Matt Welch pointed out yesterday, SOTUs are equal parts WTF and completely forgettable, so it’ll all be over soon except for the ardent declarations that we can make lifesaving machines more quickly in a zero-gravity environment.
-
Hardware
-
Is the PC market collapsing or is that not true at all and the ARM hype is on the retreat? In either case, the PC manufacturers have to reorientate themselves – Dell, for instance, went public 25 years ago and now intends to go private again – lots of movement in the IT scene.
-
Security
-
-
Lucky13 SSL exploit reveals hidden risk in the pervasive security technology.
-
Barrett Brown, a self-proclaimed spokesman for Anonymous, has been hit with new charges by authorities in Texas for concealing evidence.
-
Defence/Police/Secrecy/Aggression
-
Inside a federal courtroom packed to beyond capacity, lawyers for President Obama argued that their boss has the right to deploy the U.S. armed forces to apprehend and indefinitely detain American citizens that he alone suspects of somehow supporting groups threatening national security.
Last Wednesday, judges of the Second Circuit Court of Appeals heard the government’s arguments in their appeal of an earlier ruling blocking the enforcement of this controversial provision of the National Defense Authorization Act for 2012.
-
-
Society runs on trust. Over the millennia, we’ve developed a variety of mechanisms to induce trustworthy behavior in society. These range from a sense of guilt when we cheat, to societal disapproval when we lie, to laws that arrest fraudsters, to door locks and burglar alarms that keep thieves out of our homes. They’re complicated and interrelated, but they tend to keep society humming along.
The information age is transforming our society. We’re shifting from evolved social systems to deliberately created socio-technical systems. Instead of having conversations in offices, we use Facebook. Instead of meeting friends, we IM. We shop online. We let various companies and governments collect comprehensive dossiers on our movements, our friendships, and our interests. We let others censor what we see and read. I could go on for pages.
-
We live at a time in the United States when the notion of political enemies has become a euphemism for dismantling prohibitions against targeted assassinations, torture, abductions and indefinite detention. Under the elastic notion of permanent war and the use of Orwellian labels like terrorists, enemy combatants, enemies of the state or the all-encompassing “evil-doers,” the United States has tortured prisoners in Iraq and Guantanamo for more than a decade. It also kidnapped suspected terrorists, held them in CIA “black sites,” and subjected them to extraordinary rendition – “the practice [of] taking detainees to and from US custody without a legal process … and often … handing [them] over to countries that practiced torture.”
-
Despite the protesters’ dogged attempts to disrupt John Brennan’s nomination hearings on Thursday, the would-be CIA director, now chief White House counterterrrorism advisor, made it plain that the U.S government is institutionalizing, rather than rethinking its use of drone strikes in the wake of some 424 CIA attacks and upwards of 4,750 people killed in Pakistan, Yemen and Somalia since 2002..
-
-
-
-
-
-
-
-
During his first term in office, President Barack Obama often pledged to honor American ‘values’—especially transparency—in the war on terror. During the first State Of The Union address of his second term, Obama returned to that theme, promising to “enlist our values” while killing suspected terrorists.
-
-
-
IN THE EVOLVING tactics of battling terrorists, drones — unmanned, remotely controlled aircraft — morphed from useful surveillance tools into uniquely effective weapons.
Al-Qaida and its associated groups proved a particularly elusive enemy for conventional war fighting. The insurgents traveled fast, in small groups, tried to blend with the population and when not on operations holed up in inaccessible areas.
-
-
-
-
-
The Times told of a Muslim cleric in Yemen named Salem Ahmed bin Ali Jaber, standing in a village mosque denouncing al Qaeda. It was a brave thing to do — a respected tribal figure, arguing against terrorism. But two days later, when he and a police officer cousin agreed to meet with three al Qaeda members to continue the argument, all five men — friend and foe — were incinerated by an American drone attack. The killings infuriated the village and prompted rumors of an upwelling of support in the town for al Qaeda, because, the Times reported, “such a move is seen as the only way to retaliate against the United States.”
-
-
-
-
In his Feb. 5 Op-Ed article, “The case for drone strikes,” Michael W. Lewis presents a distorted picture of the methodology and conclusions of a report I coauthored, “Living Under Drones: Death, Injury, and Trauma to Civilians from U.S. Drone Practices in Pakistan.”
-
-
-
The incoming head of the CIA converted to Islam while working as a station chief in Saudi Arabia in the 1990s, a former FBI agent has claimed.
-
-
A disgraced former FBI agent claims that CIA director-nominee John Brennan is a convert to Islam. That’s false — and it doesn’t matter anyway.
-
-
-
It sounded like a throwaway line. Toward the end of a four-hour Senate hearing on gun violence last week, Wayne LaPierre, the National Rifle Association’s executive vice president of over two decades, took a break from extolling the virtues of assault rifles and waded briefly into new territory: criminal justice reform. “We’ve supported prison building,” LaPierre said. Then he hammered California for releasing tens of thousands of nonviolent offenders per a Supreme Court order—what he’d previously termed “the largest prison break in American history.”
-
-
-
-
But is that the real takeaway from the survey?
For long-time critics of Obama’s handling of numerous policies left over from his predecessor George W. Bush, that assessment won’t be especially shocking. From his failure to close the detention center in Guantanamo Bay, to his signing of the controversial National Defense Authorization Act (NDAA) and the recent alarm caused by a leaked “white paper” summarizing aspects of key Office of Legal Council memos that describe the legal basis for targeting individuals for assassination by drone (both foreign nationals and U.S. citizens), the Obama administration has little to boast about regarding its record on civil liberties.
-
-
-
-
-
-
-
-
-
-
-
-
-
Is the targeted killing program moral, legal or efficacious? What’s driving the overwhelming domestic support for the president’s policy, particularly from liberals who criticized the Bush administration for lesser executive overreach? Is there any way in which such a program could be executed in a manner that comports with the constitutional right to due process?
-
-
After the US corporations’ victory in the European Parliament’s “Consumer” committee (IMCO) in late January, more committees will cast their opinion votes on the data protection regulation next week1. As lobbying pressure from industrial actors intensifies, La Quadrature du Net publishes the “compromise amendments” currently negotiated in the “Industry” (ITRE) Committee to illustrate how the protection of our privacy is under attack. Citizens must react by urging Members of the Parliament to impose tough safeguards against the commercialization of our private lives and behaviour online.
-
Those defending the language on imminence in the white paper released last week are right on one count: it is not new language. Below the fold, I’ve excerpted the language on imminence from three different formulations on imminence –Brennan’s speech at Harvard, the white paper, and Holder’s Northwestern speech — to show the consistency (and also, with John Brennan’s September 16, 2011 speech, exactly two weeks to Anwar al-Awlaki notice that this was now US policy).
-
-
Obama has spoken out against impending cuts to the defense budget, saying that our national defense would be put at risk if the upcoming sequester is not avoided. The same sentiment has also been expressed by outgoing defense secretary Leon Panetta, who said that defense cuts are the greatest risk to our national security.
-
-
A militarized State Department is more than a repudiation of the Department’s basic charter of 1789, for the then-named Department of Foreign Affairs, which envisioned diplomacy as its mission. Secretary Clinton reveled in tough, belligerent talk and action on her many trips to more than a hundred countries. She would warn or threaten “consequences” on a regular basis. She supported soldiers in Afghanistan, the use of secret Special Forces in other places and “force projection” in East Asia to contain China. She aggressively supported or attacked resistance movements in dictatorships, depending on whether a regime played to Washington’s tune.
-
Like a villain in a horror movie, the widely debunked concept of terrorist “radicalization” is once again raised from the grave by the Congressional Research Service (CRS) in its 2013 report, “American Jihadist Terrorism: Combating a Complex Threat.” CRS is an influential legislative branch agency charged with providing objective policy analysis for members of Congress, which makes its continued reliance on the “radicalization” model promoted in a now-discredited 2007 New York Police Department report, “Radicalization in the West,” particularly troublesome.
-
-
-
The Bush regime’s response to 9/11 and the Obama regime’s validation of this response have destroyed accountable democratic government in the United States. So much unaccountable power has been concentrated in the executive branch that the US Constitution is no longer an operable document.
Whether a person believes the official story of 9/11 which rests on unproven government assertions or believes the documented evidence provided by a large number of scientists, first responders, and structural engineers and architects, the result is the same. 9/11 was used to create an open-ended “war on terror” and a police state. It is extraordinary that so many Americans believe that “it can’t happen here” when it already has.
-
-
If the world is just, only the guilty are tortured. So believers in a just world are more likely to think that the people who are tortured are guilty. Perhaps especially so if they experience the torture closely and so feel a greater need to overcome cognitive dissonance. On the other hand, those farther away from the experience of torture may feel less need to justify it and they may be more likely to identify the tortured as victims. The theory of moral typecasting suggests that victims are also more likely to be seen as innocents (a la Jesus).
-
Extrajudicial killing is official US policy. Doing so violates fundamental international, constitutional, and US statute laws.
Article 3 of the Universal Declaration of Human Rights states:
“Everyone has the right to life, liberty and security of person.”
Article 6 of the International Covenant on Civil and Political Rights states:
“Every human being has the inherent right to life. This right shall be protected by law. No one shall be arbitrarily deprived of his life.”
-
-
Even as it announces a review and reduction of its solitary confinement practices, the US Bureau of Prisons has confirmed that a newly acquired prison in Illinois will hold federal prisoners in supermax conditions. “Thomson will be a high security prison holding inmates with various security needs, including SMU and ADX type inmates,” BOP spokesperson Chris Burke said via email.
-
This past week has been a strangely clarifying political moment. It was caused by two related events: the leak of the Justice Department’s “white paper” justifying Obama’s claimed power to execute Americans without charges, followed by John Brennan’s alarming confirmation hearing (as Charles Pierce wrote: “the man whom the administration has put up to head the CIA would not say whether or not the president of the United States has the power to order the extrajudicial killing of a United States citizen within the borders of the United States”). I describe last week’s process as “strange” because, for some reason, those events caused large numbers of people for the first time to recognize, accept and begin to confront truths that have long been readily apparent.
-
Yesterday, I attended the Senate Intelligence Committee’s hearing on the nomination of John Brennan to lead the CIA. More accurately, I attended five minutes of the hearing, before Senator Dianne Feinstein (D-CA) kicked out the public after repeated criticism of Brennan’s record on torture, human rights, and extrajudicial assassination and executive fiat.
-
-
Is the position of God subject to the confirmation process?
Does the Lord Almighty require the advice and consent of the Senate?
These are no longer abstract questions.
-
-
-
In one of President Barack Obama first acts in the White House, he ordered the closure of the CIA’s so-called “black-site” prisons, where terror suspects had been held and, sometimes, tortured. The CIA says it is “out of the detention business,” as John Brennan, Obama’s pick to head the agency, recently put it.
But the CIA’s prisons left some unfinished business. In 2009, ProPublica’s Dafna Linzer listed more than thirty people who had been held in CIA prisons and were still missing.
-
-
-
-
The Senate intelligence committee is delaying a vote to confirm John Brennan as director of the CIA as it demands more details from the White House about lethal drone strikes and last year’s attack in Benghazi, Libya, that left the U.S. ambassador and three Americans dead.
-
…enator understated civilian casualties from drones…
-
…track down these rogues and serve them with subpoenas to appear in court…
-
-
Defense Secretary Leon Panetta has announced a new medal for troops who fight from behind a screen. According to unnamed officials, the “Distinguished Warfare Medal” will honor members of the military who have performed an accomplishment “so exceptional and outstanding as to clearly set the individual apart from comrades or from other persons in similar situations.” Unlike other medals of its level, though, it doesn’t require an “act of valor” that would put one’s life in danger during combat. That means it can be given to drone pilots or members of military cyberwarfare operations.
-
-
Although heavily implied, one thing Obama didn’t directly mention in his State of the Union speech was drones.
-
-
…our lives are not of the same value as yours?
-
President Obama took office convinced that his predecessor had adopted immoral national security policies. He was determined not to make the same mistakes.
-
Cablegate
-
WikiLeaks may have faded from the headlines, but in a corner of Eastern Europe, a copycat is playing out the secret-spilling site’s saga again. And it’s learned all of its predecessor’s tricks.
-
Male : Former Maldives president Mohamed Nasheed, who once held a cabinet meeting under water to highlight global warming, took refuge at the Indian High Commission here Tuesday after a court issued an arrest order for his failing to attend a hearing in the illegal detention of a judge.
-
Ahead of a hearing against him, former Maldives president Mohamed Nasheed on Wednesday took refuge at the Indian high commission in Malé where, sources said, he will be given shelter for as long as he wants.
Even as New Delhi worked the phones with the Maldivian government to defuse the crisis, sources said India has decided to let Nasheed stay at the high commission.
-
London: Maldives opposition leader Mohamed Nasheed has “done a Julian Assange”, said WikiLeaks on Twitter after the former president took refuge at the Indian High Commission in Male.
-
The governments of the United States and Sweden are conniving directly with an extreme-right wing network in Latin America in a move to sabotage the summit meeting in Santiago de Chile of Heads of State from the European Union (EU) and the Community of Latin American and Caribbean States (CELAC). To do so they are working with the CIA and the most reactionary elements of the anti-Cuban mafia in Miami.
-
A Leaked ‘Confidential’ US diplomatic cable, dated June 13, 2006, updated the Secretary of State regarding and a meeting Ambassador Jeffrey J. Lunstead had with Foreign Secretary H. M. G. S. Palihakkara. The Colombo Telegraph found the related leaked cable from the WikiLeaks database. The cable is signed by the US Ambassador to Colombo Jeffrey J. Lunstead.
-
-
Foreign Minister Bob Carr’s office has revealed an Australian diplomat was aware Melbourne man Ben Zygier had been detained in an Israeli prison before his death in 2010.
Fresh questions have been raised about what the Australia government knew about the case after Mr Zygier was identified in a news report on Tuesday night as Israel’s ”Prisoner X” – a former Mossad spy jailed without an open trial.
A spokesman for Senator Carr on Wednesday corrected previous statements by the government that it knew nothing of the Zygier case until the prisoner died and his relatives – a prominent Jewish family in Melbourne – asked for his body to be repatriated.
-
Investigations by the ABC’s Foreign Correspondent program have revealed Ben Zygier, who used the name Ben Alon in Israel, was found hanged in a high-security cell at a prison near Tel Aviv in late 2010.
-
Senator Carr has shown little sympathy for his fellow-countryman and Wikileaks founder, Julian Assange. On the other hand he has been happy to entertain and encourage the Swedish ambassador with whom he planted a mixture of pines and maples on the campus of Canberra University in November 2012.[5] At this event, he unveiled a plaque in memory of Raoul Wallenberg. Ironically he used an epithet ascribed to Edmund Burke, which incidentally Burke never actually said or wrote, but many think he did:
-
-
-
-
Wikileaks founder Julian Assange took the first step toward becoming a senator on Tuesday when supporters handed his electoral enrollment application to the Australian Electoral Commission in Melbourne, reported Australian daily The Age.
We already knew he wanted to run and we already knew it was going to be hard for him to even be considered eligible, let alone win the seat. But now we know he’s indeed going to try.
A group of supporters, including his father and John Shipton, a Sydney architect who’s been actively involved with the newly formed Wikileaks Party, filed the paperwork. Shipton noted that this is just “a first step.”
-
-
A leading human rights lawyer yesterday hit out at a decision banning a West Papua independence activist from speaking at Parliament.
Jennifer Robinson, a member of Julian Assange’s defence team, is in New Zealand briefly with Benny Wenda, a leader of the self-determination campaign for West Papua, which is under Indonesian control.
Several MPs wanted Mr Wenda, who lives in exile in London, to speak at Parliament but the new Speaker, David Carter, refused the request.
-
So says paranoid, stoner gumshoe Doc Sportello to the protohacker Fritz in Thomas Pynchon’s stem-winding psychedelic noir novel Inherent Vice. Doc’s referring to ARPANET, an early form of the internet. Pynchon may just have been playing to countercultural nostalgia, but then again, as any Pynchon nut will tell you, the hermetic author has always been on the side of misfits, running his subversive types through a gauntlet of endless Menippean carnivals.
-
-
Why are Swedish political parties and MSM altogether hostile against WikiLeaks and Assange?
-
What could end Sweden’s prestige-bound deadlock of the case Assange? Analysing important developments in Latin-America
-
By his own admission, Mr. Sven-Olof Petersson, Sweden’s Ambassador to Australia, has revealed that he was fully aware of the pending CIA rendition flight which took place on 18th December 2001 from Stockholm to Egypt. This flight ended in two Egyptian nationals, Ahmed Agiza and Muhammad al-Zery, being illegally rendered and tortured. His admission comes from a statement to the Swedish Parliament’s Constitutional Committee which confirms his presence at a briefing on 17th December 2001, a briefing at which the rendition process was being finalised. However, the Constitution Committee report shows that he knew about the renditions at the end of November and probably even in mid-November. In fact, it was he who kept the Minister of Foreign Affairs, Anna Lindh, updated with progress about deportation arrangements with the CIA in November 2001.[i] At the time Petersson was Sweden’s Director-General for Political Affairs at the Ministry for Foreign Affairs
-
-
-
Finance
-
Nor will it. There is no record of a dying civilization reassessing its values (or lack of values, in our case) and altering its trajectory. Whether the type of moral order that Professor Barber has in mind actually exists, or might someday exist somewhere on the planet, is certainly worth debating. But what is not worth debating is whether such a moral order might make an appearance on American soil. History is about many things, but one thing it is not about is miracles.
-
A university graduate has won a legal challenge on appeal, claiming that a government scheme forces people to work without pay.
Cait Reilly, 24, claimed that requiring her to work for free at a Poundland store breached laws banning slavery and forced labour.
The University of Birmingham geology graduate lost her original case at the High Court, but has now won on appeal.
-
-
The argument for an increase in the minimum wage ought not to rely on or focus on economics. The political, ethical, and social reasons for higher minimum wages make the case better, more clearly and more definitively.
Economists have accumulated a vast literature on the minimum wage. That literature is divided into two opposing schools. The first, comprised of paid spokespersons for business and their various allies in politics, media and the academy, strives to establish the following sort of argument. Raising minimum wages will reduce the number of jobs available to those earning the pre-rise minimum wage. This is because of the “law” of supply and demand which holds that demand for anything fall as its price rises. Raise the price of labor power, less will be demanded. In short, raising the minimum wage will push more workers out of jobs into unemployment. It is thus bad for just those in whose name the minimum wage is to be raised.
-
Just off of Country Road 518 in Hopewell, New Jersey, sits Double Brook Farm. It’s run by a self-exiled New Yorker but it’s not one of those now-standard upstart farms, with roving bands of earnest college kids tending rocket and a hearty couple of ex-Brooklynites overseeing the whole grass-fed operation. Double Brook’s turn-of-the-century-barn, its grazing cattle, and its hundreds of Rhode Island Reds clucking and strutting about all belong to Jon McConaughy, a 46-year-old with an all-American face, a football player’s build, money to blow, and a beautiful wife. Last year, McConaughy exchanged a two-decade long career as a commodities trader on Wall Street for these two hundred acres.
Double Brook, a small farm specializing in grass-fed meat, free range poultry, and various vegetables symbolizes one of the most unexpected turns the American economy has taken in recent years. For decades, banks have shied away from granting loans to farmers because, like restaurants, farms are considered risky investments. But the tides might be turning as the price of nearly every commodity on the face of the earth is on the rise.
-
-
The government’s employment strategy lies in tatters after judges declared that almost all work-for-your-benefit schemes were unlawful due to a lack of basic information given to the unemployed.
-
Scantily dressed male students from Kasetsart University gathered at the entrance to parliament on Wednesday to protest against a privatisation plan, demanding all parties involved first be consulted.
Some of the students were clad in only boxer shorts, with protest banners wrapped around the lower half of their body. They also held up written messages opposing the privatisation of their university.
-
It’s important to step back and figure out what “divisive” means here. As Annie Lowrey reports, Republicans and corporate interests are opposed to this idea, and there is some research that suggests that raising the wage floor might hurt more than it helps (as well as research that says the opposite; I guess we call it a tie?).
-
We’ve noted many times that when it comes to corporate media coverage of the so-called budget “sequester”–the immediate cuts to military and social spending set to hit in a matter of weeks–what matters most is what will happen to the military. The Washington Post had a whole piece (2/13/13) devoted to yet another round of complaints from military leaders–without a single comment from anyone who might take the view that cutting military spending would not be such a disaster.
-
PR/AstroTurf/Lobbying
-
It’s becoming clear that the lobbying around the proposed EU directive on Data Protection is some of the most intense ever seen – some activists have said it’s even worse than during ACTA, while on the US side there’s mutterings about starting a “trade war” if it’s passed in its present form.
Given that pressure to water down protection for our privacy, a key issue is: who is fighting our corner? The obvious answer would be the MEPs, since they are our elected representatives in the European Parliament. Their job is exactly that: to represent and defend us in just these circumstances. And some, like the Green MEP Jan Albrecht, are certainly doing their best, as I noted in a previous column. But what about the rest – what exactly are they up to?
-
President Obama announced plans for a nonpartisan commission to “improve the Election Day experience” in his State of the Union address, a response to the long lines and heavy burdens that states imposed on voters during the 2012 elections. But his proposal — which some have called “the policy equivalent of a sock drawer” — falls short of what many had hoped.
-
-
Censorship
-
Prominent artists touring in China may be stuck between a rock critic and a hard place: between censure from China for making “disrespectful” political gestures, and Western condemnation for failing to. Bob Dylan faced harsh criticism in 2011 for alleged self-censorship at Chinese concerts, which according to Maureen Dowd at The New York Times was “a whole new kind of sellout — even worse than […] Elton John raking in a fortune to serenade gay-bashers at Rush Limbaugh’s fourth wedding.”
-
Journalists under the Human Rights Network for Journalists Uganda – Chapter (HRNJ-U) have gone to Court to block the planned switching off of unregistered sim cards by the Uganda Communications Commission (UCC).
Through Web Advocates and Legal Brain Trust (LBT), HRNJ-U on Thursday filed a civil suit seeking, among other things, a declaration that the UCC order to switch off unregistered SIM-cards by March 1, 2013 or any other deadline set without obtaining parliamentary approval is inoperative, null and void.
-
Albuquerque radio station KOB-FM’s “Morning Mayhem” crew interviewed him in August. The last time the Wall Street Journal did so was in 2009.
America’s newspapers have trouble enough these days, what with shrinking ad revenue and straying readers. But the daily print-and-pixel press also hasn’t gotten much love lately from the biggest newsmaker in the business: President Obama.
-
Until last week, the Obama administration’s official position was that it had never technically acknowledged the existence of a memo from the Office of Legal Counsel laying out the legal framework for the targeted killing of an American citizen.
“The very fact of the existence or nonexistence of such documents is itself classified,” the Justice Department wrote in a previous letter, despite wide discussion from members of the administration on the general principles of the targeted killing program.
Even a broader document — a so-called “white paper” — that spelled out the less-specific legal basis for targeted killings was “protected by the deliberative process privilege” though it was turned over to select members of Congress, a Justice Department official wrote late last month to a reporter from The New York Times who had requested that document.
But once the white paper was disclosed by Michael Isikoff of NBC News, the government had a change of heart. Jason Leopold, a reporter for Truthout who had submitted a Freedom of Information Act request for the white paper in August, contacted DOJ after the leak, reminding them he was granted expedited processing. An official called to tell him it would take three months to disclose the already-public paper but wound up turning over the document in an email to Leopold late Friday as a matter of “agency discretion.” Other requestors got the same document on Friday.
-
Privacy
-
A few months ago, EFF warned of a secretive new surveillance tool being used by the FBI in cases around the country commonly referred to as a “Stingray.” Recently, more information on the device has come to light and it makes us even more concerned than before.
-
The US intelligence community is obsessed with data. The NSA wants it all, and is prepared to keep it for as long as 100 years. The National Counter Terrorism Center (NCTC) last year told us it’s now dipping into or collating every bit of information we give to federal government agencies under one roof, to mine it for ‘suspicious’ information that may be linked to terrorism. State and local law enforcement, with help from the Department of Homeland Security, have established so-called intelligence “fusion centers” in most states nationwide — little spy centers of their own, where they can view surveillance camera feeds and access intelligence databases. United States surveillance drones at home and abroad collect impossibly enormous quantities of data. Satellites do, too.
-
-
-
The House cybersecurity bill that allows the National Security Agency (NSA) and the military to collect your private internet records is scheduled for an encore appearance on Wednesday. House Intelligence Committee Chairman Mike Rogers (R-MI) and Ranking Member Dutch Ruppersberger (D-MD) will reintroduce the Cyber Intelligence Sharing and Protection Act (CISPA), which news reports say will be the same bill that passed the House of Representatives last year.
-
-
Unable to reach a deal with Congress, President Obama plans to use his power to exert executive actions against the will of lawmakers. The president will issue orders addressing controversial topics including cybersecurity.
Although President Obama has issued fewer executive orders than any president in over 100 years, he is making extensive plans to change that, Washington Post reports quoting people outside the White House involved in discussions on the issues. Due to conflicts with a Congress that too often disagrees on proposed legislation, Obama plans to act alone and is likely “to rely heavily” on his executive powers in future, according to the newspaper.
-
-
Federal Justice Minister Rob Nicholson says the controversial Bill C-30, known as the online surveillance or warrantless wiretapping bill, won’t go ahead due to opposition from the public.
The bill, which was known as the Protecting Children from Internet Predators Act, was designed to help police combat child pornography. But civil liberties and privacy groups — even the federal privacy commissioner — said the bill violated the rights of Canadians.
Opponents lobbied strenuously against C-30, saying it was an overly broad, “Big Brother” piece of legislation that would strip all Canadians of the right to privacy.
-
-
-
Every new computing technology seems to bring with it a privacy flap. Cloud computing is going through that phase right now, at least outside the United States. Canadian and European elites fear that putting data in the cloud will somehow let the US government paw through it at will, a fear that usually centers on Section 215 of the USA PATRIOT Act.
-
Multi-national defense company Raytheon is getting ready to ship a big data social networking spy system. But they are far from the only ones tracking you.
-
A military lawyer at Guantanamo Bay, Cuba, acknowledged Tuesday that microphones are hidden inside devices that look like smoke detectors in the rooms where defense lawyers meet detainees, but he said the government does not listen in on attorney-client communications.
Both civilian and military defense lawyers at Guantanamo Bay meet their clients at a facility known as Echo 2, a camp that has about eight meeting huts.
-
-
Civil Rights
-
A poll by the The Hill has found that a majority of “likely voters” think President Barack Obama has been the same or worse than Bush when it comes to “balancing national security with protecting civil liberties.”
-
Implicit in this statement, and in pretty much all of what we do at Sunlight, is an understanding that openness and transparency, enabled by technology, lead to more democratic accountability, and that, on balance, this leads to better governance. It’s an understanding that we share with a growing global community.
-
Shortly before 4:20 p.m. Tuesday, the White House emailed reporters that President Obama had signed a highly anticipated Executive Order aimed at protecting cyber security.
The order — setting up new programs aimed at stopping online espionage and terrorism — was already the law of the land, signed by the president. But it was also secret.
-
-
-
Aiming to determine the impact of border searches on Americans’ civil liberties, the Department of Homeland Security has produced a report on its policy of combing through and sometimes confiscating travelers’ laptops, cell phones, and other electronic devices—even when there is no suspicion of wrongdoing. The report was completed sometime between October 2011 and September 2012, and last week DHS quietly posted only the executive summary on its website, without many people noticing.
The report draws the highly questionable conclusion that the border search policy does not violate our Fourth Amendment right to privacy, chill our First Amendment rights to freedom of speech and association, or even result in discriminatory search practices.
-
Internet/Net Neutrality
-
The White House is poised to release an executive order aimed at thwarting cyberattacks against critical infrastructure on Wednesday, two people familiar with the matter told The Hill.
-
The leaders of the House Intelligence Committee plan to re-introduce on Wednesday a controversial cybersecurity bill that has faced pushback from the White House.
House Intelligence Committee Chairman Mike Rogers (R-Mich.) and ranking member Rep. Dutch Ruppersberger (D-Md.) said Friday that they plan to re-introduce the Cyber Intelligence Sharing and Protection Act (CISPA) next week during a speech at the Center for Strategic and International Studies in Washington. The bill is aimed at improving information-sharing about cyber threats between government and industry so cyberattacks can be thwarted in real time.
-
President Obama invoked the pageantry of his State of the Union address this evening to announce a long-anticipated executive order on cybersecurity, a move that caps months of discussions with technology companies and could reduce pressure on Congress to move forward with controversial new legislation.
-
Internet scholar Susan Crawford explains how media conglomerates put profit ahead of the public interest, and author Nick Turse shares what we never knew about the Vietnam War.
-
The Government claims the bill is necessary to address three data types: Reconcile IP addresses, capture weblogs and to deal with third party data.
In practice, what would this mean? Well, the first data type is required to give the police “the ability to reconcile an Internet Protocol (IP) address to an individual”
-
DRM
-
Intellectual Monopolies
-
Trademarks
-
Brazil’s Institute of Industrial Property has decided that Apple cannot hold exclusive rights to the “iPhone” trademark in the country. Apple lost the trademark after a long fight with Gradiente, the company that registered the iPhone trademark seven years before the Apple device came out.
-
Copyrights
Following in the steps of other courts around Europe, Finland’s Court of Appeal has now confirmed that two ISPs previously ordered to block The Pirate Bay must continue doing so. With another ISP’s appeal to the Supreme Court just rejected it now seems likely that anti-piracy company CIAPC has succeeding in its quest to deny 80% of the country direct access to the world’s most infamous torrent site. But still the downloading continues.
-
The already controversial Bill C-30, that’s actually more known as the Protecting Children from Internet Predators Act, didn’t passed because of the public opposition. The bill, as its known name says, was designed to aid in solving the child pornography problem, but at what cost?
-
-
-
-
The Obama Administration has stepped into a long-running file-sharing lawsuit in Minnesota, urging the United States Supreme Court not to get involved in a six-figure verdict against a young mother from Northern Minnesota. The feds don’t buy the woman’s argument that the massive size of the award makes it unconstitutional.
-
Rumors of CISPA’s demise were apparently greatly exaggerated, according to various privacy rights advocates and organizations today.
CISPA, or the Cyber Intelligence Sharing and Protection Act, initially sought to give American companies more legal breathing room (protection against lawsuits) when collecting and sharing consumer/user data for the purpose of preventing massive Internet security threats. It passed a House vote with few guarantees that it wouldn’t grossly violate a person’s privacy rights (even in the face of a presidential veto threat). The White House eventually put a stamp of approval on the bill, pending certain amendments. But the Senate vote failed, and the president resorted to other methods for the time being.
-
-
Five erroneous assertions have kept appearing in the public debate since 1990 about file-sharing vs. the copyright monopoly. These assertions have persisted for 25 years, despite being obviously false. This is a reference article to link to and point at whenever one of them pops up the next time.
-
In so many areas, I see digital tools disrupt longstanding practices. That disruption brings challenges – but many opportunities, too, with new innovative ways suddenly available to meet specialised consumer needs. The overall effect is a benefit for consumers, for our economy, and our society – as long as you can adapt properly to digital developments.
The film sector is a very good example. Currently some rules and practices in that sector restrict flexibility – like rigid ‘release windows’. (‘Release windows’ set out when films can be released in cinemas, on DVD, online and so on – so that, for example, a film can’t be shown online until a certain number of weeks after the cinema release. Such “windows” can be based on regulation, public funding conditions, industry practice or individual negotiations). For me, while such “exclusive” periods may be important to finance some films, or get the most out of them, rigid and uniform rules can make it harder for the sector to capture digital benefits.
-
As many know, copyright had its origins in censorship and control. But over the last few hundred years, that fact has been obscured by the rise of the powerful publishing industry and the great works it has helped bring to the public. More recently, though, laws and treaties like SOPA and ACTA have represented a return to the roots of copyright, posing very real threats to what can be said online. That’s not because their intent was necessarily to crimp freedom of expression, but as a knock-on effect of turning risk-averse ISPs into the copyright industry’s private police force.
Permalink
Send this to a friend
02.12.13
Posted in Antitrust, GNU/Linux, Microsoft at 4:14 pm by Dr. Roy Schestowitz
Summary: Former Novell people and others who help normalise anticompetitive behaviour
Recently, boards were made which self-destruct because of Microsoft demands. A lot of journalists were missing the point, which is that UEFI restricted boot is controlled by and imposed by Microsoft, and is generally better off rejected as it doesn't really contribute to security.
Dr. Garrett passes blame to Samsung for a scheme that was Microsoft’s idea, as seen here. One must not forget that without Microsoft pressure, none of it would have happened.
The UEFI saga is being rewritten now as Garrett is generating press coverage to blame Samsung, not Microsoft. To quote a pro-Linux site, “Linux developer Matthew Garrett, who does a lot of research into UEFI topics, writes in a blog post that by storing a large amount of data in UEFI variables, he managed to disrupt a Samsung notebook running Windows to such a degree that it subsequently refused to start. In his post, the developer also points to some sample code of the Windows program that he executed at administrator level to disable the notebook. The developer had previously speculated that some Samsung notebooks with UEFI firmware may be rendered inoperative under Windows in the same way that they were when starting Linux under certain circumstances. The experiment to confirm this was successful.”
Trying to ‘prove’ it can be reproduced with Windows actually helps Microsoft dodge blame. Former Novell staff is meanwhile doing Microsoft’s work, too.
Here is one article that says:
The Linux Foundation proudly announced a few hours ago, February 8, that they have officially unleashed the highly anticipated UEFI secure boot system for all Linux distributions, courtesy of the Microsoft Corporation.
James Bottomley, the Director of The Linux Foundation was happy to announce on his blog the immediate availability for download of the Linux Foundation UEFI secure boot system.
Here is another article about it. Watch former Novell staff revealing Microsoft’s involvement:
As promised, here is the Linux Foundation UEFI secure boot system. This was actually released to us by Microsoft on Wednesday 6 February, but with travel, conferences and meetings I didn’t really get time to validate it all until today.
SUSE too is organising events, but it is not what it used to be:
Did anybody else notice Novell BrainShare 2013 occurred this week in Salt Lake City? It was a prime opportunity to promote Novell’s progress under Attachmate’s ownership. Plus, SUSE Linux (Novell’s sister business) could have published some updated business milestones of its own. Did Novell and SUSE deliver? Here’s the scorecard.
Alas, the annual Novell user and partner conference generated exactly one Novell press release, no SUSE press releases, one partner release from MessageSolution, one media story in the Salt Lake City Tribune and one on ZDnet.
Now that SUSE depends financially on Microsoft its main goal is to help Microsoft tax GNU/Linux and advance dubious agenda. Some people in the FOSS world do sell out. And we do need to name them, no matter how offensive they may find it. █
“News is something someone doesn’t want printed. All else is advertizing.” –William Randolph Hearst
Permalink
Send this to a friend
Posted in Intellectual Monopoly, Site News at 3:58 pm by Dr. Roy Schestowitz
Summary: CISPA rears its ugly head again, so action from the public is needed
TECHRIGHTS has expanded somewhat in terms of scope and focus, as our daily links help reflect. Swartz, who was involved in Wikileaks, i.e. transparency and accountability, fought against SOPA, which is about censorship, just like CISPA, which can help shut down Wikileaks and also harm privacy. A lot of recent press propaganda will serve as pretext for cracking down on the Web with new laws. CISPA is one of them.
Obama signed an executive order for CISPA, kneeling to his bosses in Hollywood, as usual. What will you do? █
Permalink
Send this to a friend
02.11.13
Posted in News Roundup at 12:26 pm by Dr. Roy Schestowitz
Contents
-
Audiocasts/Shows
-
-
-
In this episode: KDE 4.10 has been released and includes lots of Qt Quick enhancements. Ubuntu Phones are going to be available in October. Samsung laptops are breaking after a Linux installation and the ‘Model A’ Raspberry Pi is available now. Hear our discoveries, your own opinions in our Open Ballot and our brand new old section, Challenge Us!
-
Kernel Space
-
There’s been a lot of information scattered around the internet about these topic recently, so here’s my attempt to put them all in one place to (hopefully) settle things down and give my inbox a break.
Last week I spent a number of days at the GNOME Developer Hackfest in Brussels, with the goal to help make the ability to distribute applications written for GNOME (and even more generally, Linux) in a better manner. A great summary of what happened there can be found in this H-Online article. Also please read Alexander Larsson’s great summary of what we discussed and worked on for another view of this.
-
-
-
-
Graphics Stack
-
With the Radeon Gallium3D driver (and Mesa/Gallum3D drivers in generally) finally moving on to properly handling more visually demanding and modern OpenGL games and other workloads, it’s time for CS memory accounting to be implemented within the open-source driver.
-
The nicer Radeon Gallium3D (R600g) shader disassembler that was previously talked about on Phoronix has finally been merged into mainline Mesa.
-
Applications
-
Proprietary
-
-
So rumors are swirling right now that Microsoft is considering releasing Microsoft Office for Linux. I suppose that this might have been big news…about ten years ago. But does anybody really care at this point if Microsoft Office runs on Linux?
-
Instructionals/Technical
-
Wine or Emulation
-
The Wine development release 1.5.23 is now available.
-
Games
-
Senscape, the people who brought Shivers to the PC world are doing a new expanded world of psychological horror : Asylum. This could be the greatest horror genre game available on Linux since Amnesia: The Dark Descent.
-
-
-
Heroes of Newerth, the game that’s had a Linux client available from the start and back in 2009 excited many Linux gamers as we gave away thousands of early access keys to the game, has released a major new version of the game.
-
-
Desktop Environments/WMs
-
-
K Desktop Environment/KDE SC/Qt
-
KDE Meetup will be the largest KDE event in India since conf.kde.in in 2011. It will be held February 23rd and 24th at the Dhirubhai Ambani Institute of Information and Communication Technology (DA-IICT) in Gandhinagar. KDE Meetup will be a great opportunity for anyone who is interested in free and open software or who wants to get involved with the KDE Community.
-
-
-
-
KDE 4.10 has been released, and I’ve upgraded my old desktop computer that sits on a shelf in the storage cupboard and runs a NoMachine server to have KDE 4.10.0 on it.
First attempt: migrate my existing KDE 4.9.5 desktop environment.
-
KDE team has released KDE 4.10.0, their latest major release which brings lots of improvements and also bug fixes scattered around the area. There are a lot of shinny things here on KDE 4.10.0 and you can see them all in the Announcement Page.
-
Hard on the heels of news earlier this week that KDE has been named the best desktop environment in a recent Linux user survey, the team behind the popular project on Wednesday launched a fresh new version of the software.
-
-
There are plenty of Linux desktop environments to choose from, but if KDE has a special place in your heartware, you’ll be pleased to know its first 2013 update is out. Making the jump from 4.9 to 4.10 brings various tweaks to Plasma Workspaces, including upped support for high-res displays, a streamlining of the default Air theme, and plenty of behind the scenes adjustments.
-
The Amarok 2.7 release delivers nearly 500 bug fixes, and an impressive list of new features. Here I will be reviewing some of the latest features after experimenting with 2.7 for a few days. Installation instructions for Ubuntu 12.10 are provided for anyone who would like to try this version.
-
-
New Releases
-
Screenshots
-
Red Hat Family
-
Red Hat (NYSE: RHT) has introduced technical account management (TAM) services for cloud computing, virtualization and storage. The consulting offerings are highly important as the open source company attempts to compete more aggressively against VMware (NYSE: VMW) and EMC (NYSE: EMC), in particular.
-
Red Hat may finally get to developing a KMS/DRM driver for QXL/SPICE to be used in conjunction with QXL for virtualization. This is a stepping-stone to eventually supporting SPICE 3D for allowing Red Hat virtual machines to tap hardware graphics acceleration support.
-
Fedora
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
Ubuntu chief Mark Shuttleworth has revealed that plans to bring Ubuntu to phones is on track. The OS, which will run on smartphones, is expected to be available from October 2013, but developers are already hard at work to develop apps for the platform.
In fact, a version of Ubuntu for the popular Samsung Galaxy Nexus handset is expected to be available for download towards the end of the month, Shuttleworth informed The Wall Street Journal earlier this week.
-
If you’ve been following us for the past few weeks then you should know that at the beginning of the year Canonical has unveiled a lot of information regarding its upcoming Ubuntu OS for smartphones. Since then, the OS in question has been showcased during CES where it didn’t do so great, but the operating system has quickly improved and we’re now waiting for it to become available to developers, being a truly open source project and all that good stuff.
-
-
Flavours and Variants
-
Fuduntu is a very strange distribution. It’s based on Fedora, but tries to be more user-friendly, sort of like Ubuntu. Then, the big difference between Fuduntu and other RedHat-based distributions like CentOS and Scientific is that it aims specifically for the desktop crowd, bringing you the latest kernel technologies and apps.
-
-
-
Phones
-
Android
-
-
The latest figures from Google show that the share of Android devices running version 4.0 or later is slowly expanding. At the beginning of January, nearly 40% of Android devices that accessed the Google Play Store were running a 4.x version. Over January that grew to 42.6% with Android 4.0 “Ice Cream Sandwich” slightly down at 29% and Android 4.1 and 4.2 “Jelly Bean” up from 10.2% to 13.6%.
-
-
-
Sub-notebooks/Tablets
-
Maybe it’s about time the tech industry gets ready for the waning of the importance of the PC?
-
-
Not satisfied with the experience on current forum software packages, Stack Exchange co-founder Jeff Atwood founded Civilized Discourse Construction Kit Inc to come up with a software package to replace them. Its open source Discourse software is built with JavaScript, Ruby on Rails and PostgreSQL and, according to the developers, can be used whenever a mailing list or forum is needed. According to the team: “Discourse is a from-scratch reboot, an attempt to re-imagine what a modern, sustainable, fully open-source Internet discussion platform should be”.
-
SaaS/Big Data
-
Oracle/Java/LibreOffice
-
-
A little more than two years after it forked from OpenOffice.org, the free office suite LibreOffice has come out with a sleek and faster version 4.0.
A media release described the release as the largest independent free software project focused on end user desktop productivity.
-
Business
-
BSD
-
With LLVM/Clang having become the default FreeBSD x86 compiler as of last year and the recent FreeBSD 9.1 release shipping not only LLVM/Clang but also the libc++ library, new benchmarks were carried out of FreeBSD 9.1 looking at its two stock compilers.
-
Openness/Sharing
-
What excites me about ZWheelz is the potential to improve our education system, environment, energy independence, and economy—all with what I like to call, one “EZ” project.
It all began when I built a plane from a kit, then saw the documentary, Who Killed The Electric Car?, and decided to build an electric car. Turns out, it functioned really well, and I began wondering: “Why aren’t there more electric vehicles on the road?”
-
Open Access/Content
-
When Aaron Swartz died, I told you that I’m no expert on criminal law, and I’m not. So I couldn’t really provide a star to guide anyone. But what I could do is research and provide information so you could be fully informed. That’s what journalists are for.
And now I’ve come across something that I think might be helpful, a May 19, 2010 memo [PDF] by Attorney General Eric H. Holder, Jr. to all federal prosecutors, letting them know that he wanted them to be fair and reasonable in exercising their prosecutorial discretion. He told them that he wanted them to be flexible, too, not necessarily bound by maximum/minimum guidelines, but to look at the individual circumstances of each case, stating that the “reasoned exercise of prosecutorial discretion is essential to the fair, effective, and even-handed administration of the federal criminal laws”. That raises a natural enough question, of course, about whether that policy was followed in the Swartz case, but that isn’t what struck me.
-
-
A few years ago, software developer Stephen Schultze helped create a nifty piece of code called “RECAP” that makes some federal court documents free on the Internet.
-
Open Hardware
-
Open-source hardware firewalls are something of a misnomer. Though these Internet protection appliances are based on open-source operating systems, their programming is often proprietary. Furthermore, security needs have forced many of these product to go beyond mere firewalling to include anti-spam filtering, intrusion protection and more.
-
Programming
-
-
If you want a massive improvement in the software you use, the cheapest way to get it is to host a competition on TopCoder.
-
GCC has had support for 64-bit ARM, a.k.a. AArch64, going back to last summer for using the open-source compiler with next-generation ARMv8 hardware. Being merged today is finally support for the LLVM compiler infrastructure with an experimental 64-bit ARM/AArch64 back-end target.
-
HUNDREDS of cash-strapped Scots students have signed up to an internet dating site to meet wealthy men offering to pay their tuition.
-
-
Thousands of major — and not-so-major — websites found their traffic redirected to a Facebook error page yesterday, a phenomenon that lasted upward of an hour, according to varying accounts. Although the social networking site dismissed the event as the result of a Facebook error that was “quickly repaired,” it would be imprudent to blithely view the event as a glitch or mere inconvenience. It’s downright concerning, both from a business and a privacy perspective.
First, here’s what happened: Starting at around 4 p.m. Pacific time Thursday, users attempting to visit an array of disparate websites and services — from CNN to The Sydney-Melboure Herald to Pinterest to Reddit to Hulu — were redirected to Facebook and a message reading, “An error occurred. Please try again later.” Sites were affected anywhere from 15 minutes to an hour, according to reports.
-
Security
-
Thakur said that the Bamital malware was initially delivered by a combination of methods, including in packages over peer-to-peer filesharing networks disguised as other content. But the majority of systems infected were the victim of “driveby downloads” from websites configured with malicious software intended to exploit browser security flaws. “We have evidence of [the botnet operators] polluting search engine results for certain search terms with links to servers with exploits,” he said.
-
Defence/Police/Secrecy/Aggression
-
-
-
The FBI is at it again, boasting about stopping another contrived terror plot of their own making. This time they nabbed a right-winger working with the Taliban which happen to be an FBI agent provocateur.
“
-
-
Similarly, when the government’s only chance of keeping an inconvenient truth out of the news media is to warn of a national security threat, it’s amazing how these threats pop up.
This has turned out to be a powerfully effective tool. News organizations, after all, don’t want to endanger the nation’s safety, or be accused of doing so, so editors often listen to government officials when they make their case for not publishing. And, after listening, editors occasionally consent.
[...]
Keeping the government’s secrets is not the news media’s role, unless there is a clear, direct and life-threatening reason to justify it.
-
-
-
During the build up to and aftermath of the 2004 overthrow of Jean-Bertrand Aristide, Haiti’s popular priest-turned-president, the Haitian and international press reported two conflicting narratives. Even in the left-wing media office of ZNet, where Justin Podur was an editor, stories filed from Haiti just “didn’t add up.”
-
-
For months, there have been human rights or civil liberties groups sharply condemning President Barack Obama’s targeted killing program especially because he holds all the power to decide who lives and who dies, however, up until a Justice Department “white paper” on the program was leaked by NBC News, there was little discussion by US news media about the nature of the program.
-
-
-
He said his handler told him that the department considered “being a religious Muslim a terrorism indicator.”
-
-
-
On 11 January, seemingly out of the blue, François Hollande announced that France would ‘respond to the request of the Malian president’ and send forces to its former colony to fight ‘terrorist elements coming from the north’. ‘Today, the very existence of this friendly nation is at stake,’ he declared. ‘Military operations will last for as long as required … Terrorists must know that France will always be there when it’s a matter not of its fundamental interests but the right of a population … to live in freedom and democracy.’ In France, though ominous warnings did the rounds, the president’s approval ratings soared from a nadir of 40 per cent to 63 per cent. Hitherto seen as weak, Hollande was suddenly perceived as a strong commander-in-chief (linguistically, it’s a small step from chef d’état to chef de guerre). Abroad, despite offers from Western allies of logistical or humanitarian support (France’s plea for military support from its European allies remains unanswered), many suspected that neocolonial ghosts were haunting Paris yet again. La Françafrique, that infamous amalgam of truncated African sovereignty and French interventionism in sub-Saharan Africa, seemed to have returned.
-
The biggest problem with the recently disclosed Obama administration white paper defending the drone killing of radical clerk Anwar al-Awlaki isn’t its secrecy or its creative redefinition of the words “imminent threat.” It is the revolutionary and shocking transformation of the meaning of due process.
-
Writing at the Originalism Blog, Michael Ramsey of the University of San Diego Law School examines the Obama administration’s drone policy in light of the original meaning of the Due Process Clause of the 5th Amendment, which forbids the government from depriving any person of “life, liberty, or property, without due process of law.”
-
Turse, who devoted 12 years to tracking down the true story of Vietnam, unlocked secret troves of documents, interviewed officials and veterans — including many accused of war atrocities — and traveled throughout the Vietnamese countryside talking with eyewitnesses to create his book, Kill Anything That Moves: The Real American War in Vietnam.
-
-
The national religion of the United States of America is nationalism. Its god is the flag. Its prayer is the pledge of allegiance.
The flag’s powers include those of life and death, powers formerly possessed by traditional religions. Its myths are built around the sacrifice of lives to protect against the evils outside the nation. Its heroes are soldiers who make such sacrifices based on unquestioning faith. A “Dream Act” that would give citizenship to those immigrants who kill or die for the flag embodies the deepest dreams of flag worship. Its high priest is the Commander in Chief. Its slaughter of infidels is not protection of a nation otherwise engaged, but an act that in itself completely constitutes the nation as it is understood by its devotees. If the nation stopped killing it would cease to be.
-
-
In case you don’t want to read these two long posts, I want to point to two passages from the white paper that show, on two key points, the government wasn’t even claiming Anwar al-Awlaki was the “senior operational leader of Al Qaeda or associated forces” they keep saying he was when they killed him.
-
-
John Kiriakou, the Greek-American CIA analyst who was sentenced last month to more than two years in jail for revealing the identity of a covert operative, has revealed to Kathimerini his thoughts about the possible emergence of new terrorist activity in Greece and his concerns about the future of the US intelligence agency.
Kiriakou told Sunday’s Kathimerini that he would differentiate the activity of urban guerrilla groups in Greece today and the actions of the November 17 terrorist organization.
-
John Brennan’s testimony before the Senate Intelligence Committee on Thursday was a microcosm of the Obama administration’s approach to counterterrorism: The right assurances, with little transparency.
Brennan said the United States should publicly disclose when American drone attacks kill civilians. He called waterboarding “reprehensible” and vowed it would never occur under his watch. And he said that countering militancy should be “comprehensive,” not just “kinetic,” and involve diplomatic and development efforts as well.
-
Secret, unaccountable no-fly lists are one of many weapons the US government uses to extra-judicially punish American Muslims
-
How low must the number of Muslim-American ‘terror plots’ go before Congress thinks again about giving the FBI an annual $3 billion of our tax dollars –nearly half the FBI’s budget – just for its counterterrorism work?
And to what lengths is the FBI prepared to go to manufacture plots and suspects in order to keep those dollars flowing?
In his fourth annual survey of Muslim-American terrorism, Charles Kurzman, of North Carolina’s Triangle Center on Terrorism and Homeland Security, found that the number of Muslim-Americans indicted as terrorists has been in steady decline over the past three years and no deaths or injuries were caused by their actions.
-
-
-
…more than 6,000 pages and 35,000 footnotes…
-
A former CIA contractor involved in a fatal shootout in Pakistan is due in court in Colorado on Monday over a fight over a parking space.
A judge will consider a plea agreement for Raymond Allen Davis, who is charged with felony assault and misdemeanor disorderly conduct in the fight outside a suburban Denver bagel shop.
-
-
Secret bases, targeted killings, leaked memos and elaborate cover-ups – the latest developments in an ongoing controversy involving the Obama administration and CIA with a question at its core that has been asked for generations: “How far are we willing to go to protect the citizens of the United States?”
-
The marked increase in numbers at the US embassy in Asunción over the past year is being necessitated by the need to maintain control over the Paraguayan government. The pre-election campaign is in full swing and in order to «manage it by hand», the intelligence apparatus operating under the roof of the US embassy need staff reinforcements. Political forces potentially hostile to the interests of the United States must not be allowed to come to power. Federico Franco, the acting president of Paraguay who, in June 2012, ensured the CIA-scripted «constitutional removal» of the legally elected president, Fernando Lugo, has fulfilled his mission. His successor needs to be just as reliable and just as manageable.
-
Moscow hopes that an investigation into the CIA’s secret prisons abroad will be completed and all suspects will be brought to court, the Russian Foreign Ministry spokesman said on Monday.
-
The release of a Justice Department white paper defending the legality of the targeted killing of U.S. citizens in foreign countries outside areas of active hostilities is an opportunity for every American to reflect on how our government conducts its armed conflict against al-Qaeda and associated forces, especially since the man who is at the center of such targeting decisions, John Brennan, might soon be confirmed as CIA Director.
-
-
Cablegate
-
-
WikiLeaks founder Julian Assange has waded into the row over American drone strikes, urging the leak of confidential government guidelines on drones during an interview with US talk show host Bill Maher.
-
-
-
Those following the saga of Julian Assange, the founder (also editor-in-chief) of the transparency organization Wikileaks will be well aware of the long-running feud with the UK’s Guardian newspaper. Initially partners in the explosive release of US diplomatic cables in 2010, the two suffered a very public falling-out. The period since then has been characterized by smear after hit piece after smear, and given that The Guardian’s website is one of the most visited news sites in the world with millions of unique visitors every day, any misleading or negative article on Mr. Assange or his organization is certain to adversely influence public opinion on an enormous scale.
-
-
It’s a serious thing to have the Government of the USA for an enemy. If it continues for very long, you’ll notice friends crossing the street to avoid you. Jemima Khan has this week used a rather rambling article in the New Statesman to announce that she will be keeping to the far side of Julian Assange’s street from now on.
-
“When a government becomes invisible, it becomes unaccountable. To expose its lies, errors, and illegal acts is not treason, it is a moral responsibility. Leaks become the lifeblood of the Republic.”—Daniel Ellsberg and John Perry Barlow
-
The note is dated 25 July 2012 and was submitted in two versions, Spanish and English.
‘The embassy has been informed that Mr Julian Assange, through his lawyers, has made known to the Swedish Prosecution’s Office his availability to be interrogated in the facilities of the Embassy of Ecuador in London. In this context, the Embassy of Ecuador makes patent the National Government willingness to provide the cooperation that would be necessary accordingly with the decision of the relevant Swedish authorities.’
-
-
Environment/Energy/Wildlife
-
As people are coming to understand, Asian economic growth over the past two decades—despite its great adoption of oil—essentially runs on electricity, most of which is supplied by the burning of coal. Here is the night sky over Asia twenty years ago, as captured in a still photograph from a film loop provided by NOAA’s national geophysical data center.
-
Finance
-
-
The Government’s higher education policy is supposedly about cutting red tape, yet it requires a new army of six-figure-salaried bureaucrats to outsource existing jobs.
-
The UK’s super-rich, the top 1% of earners, now pocket 10 pence in every pound, while the bottom half have seen their share of the nation’s wealth drop in the last 15 years. Middle earners have also seen their earning power stagnate.
-
-
Barclays misled shareholders and the public about one of the biggest investments in the bank’s history, a BBC Panorama investigation has found.
-
Austerity policies include various combinations primarily of government spending cuts and secondarily of general tax increases. Republicans and Democrats have endorsed austerity since 2010. Austerity was the result of their deal on taxes last December 31: increasing the payroll tax on wages and salaries from 4.2 to 6.2 percent. Austerity is what they are negotiating now in regard to federal spending cuts.
-
In worker self-directed enterprises (WSDEs), workers democratically run the affairs of the enterprise. They make the decisions whose consequences shape their lives. Their job descriptions require them to perform some specific tasks within the enterprise’s division of labor, but their job descriptions also obligate their participation in directing the enterprise.
To perform their specific tasks, workers in WSDEs must learn how to do the required work, must be trained and educated, first in schools before employment and afterwards on the job as well. The same applies to the other part of their job description that concerns participation in directing their WSDE. School curricula must provide everyone with the broad-based, liberal arts education that builds flexibility and the capacity for creative enterprise adjustments to an ever-changing world. In short, establishing an economy based on widespread WSDEs will exert profound and effective pressures for educational changes. Democratizing the workplace will help democratize education.
-
Apple Inc on Thursday confronted its first major challenge from an activist shareholder in years as hedge fund manager David Einhorn’s Greenlight Capital filed suit against the company and demanded that it dole out a bigger piece of its $137 billion cash pile to investors.
-
Einhorn is asking management to sell that call/put option straddle now, and forgo the ability to capitalize on future opportunities while running naked against margin compression at the same time that Apple’s competition has surpassed it in technical ability (product/service wise) while Apple has shown ineptitude in competing in the cloud (see the maps fiasco), the next battle ground for the end user. This option sale will be had for the one time premium of a cash distribution. Wise, eh?
-
Censorship
-
A Cairo court on Saturday ordered the government to block access to the video-sharing website YouTube for 30 days for carrying an anti-Islam film that caused deadly riots across the world.
Judge Hassouna Tawfiq ordered YouTube blocked for carrying the film, which he described as “offensive to Islam and the Prophet (Muhammad).” He made the ruling in the Egyptian capital where the first protests against the film erupted last September before spreading to more than 20 countries, killing more than 50 people.
The ruling however can be appealed, and based on precedent, might not be enforced. A spokeswoman for YouTube’s parent company, Google, said in a statement that the firm had “received nothing from the judge or government related to this matter.”
-
-
This Saturday, a Cairo court ordered to block access to the most popular video-sharing website on the Internet, Youtube, for one month(30 days to be more precise), because on this very website an anti-Islam film was posted, apparently becoming the cause for deadly riots across the globe.
-
-
Privacy
-
-
A multinational security firm has secretly developed software capable of tracking people’s movements and predicting future behaviour by mining data from social networking websites.
-
Under existing laws, collecting or making documents likely to facilitate terrorists acts carry a maximum 15-year jail term.
But ASIO, the Australian Federal Police, and the states’ Joint Counter-Terrorist Teams want new criminal offences to net those looking up assassination manuals and other terrorist material on computers.
-
The US Central Intelligence Agency monitors activity on Facebook and other social media outlets through companies its investment arm has stakes in.
-
-
President Barack Obama’s nominee to head the Central Intelligence Agency, John O. Brennan, was about as cagey as they come last week at his confirmation hearing before the Senate Intelligence Committee. Asked right off the bat by the committee chairwoman, Sen. Dianne Feinstein, whether he would be more forthcoming than his predecessors in apprising committee members of covert U.S. military operations abroad — particularly the administration’s secret drone program of targeted killings — he vigorously affirmed that to be his intention. Then, for the next 31/2 hours, he politely declined to say virtually anything else of substance on the subject.
-
The powerful Democratic senator says that fewer than 10 civilians per year are typically killed by America’s targeted killing program — despite extensive evidence to the contrary.
-
-
There’s widespread resentment against drone strikes in Pakistan, says the former commander of US and Nato forces in Afghanistan, Gen Stanley McChrystal.
-
-
-
Civil Rights
-
The Department of Homeland Security’s civil rights watchdog has concluded that travelers along the nation’s borders may have their electronics seized and the contents of those devices examined for any reason whatsoever — all in the name of national security.
-
This month, the U.S. Department of Homeland Security published the executive summary for their civil liberties assessment of U.S. Customs searches of traveler’s electronic devices. To put it briefly, DHS has concluded that additional civil liberties safeguards to protect traveler’s privacy either are not needed or would not be effective. However, they have decided not to publish the reasoning behind these conclusions.
In the absence of an explanation, all we can do is speculate as to what their reasoning might be, but if the kind of safeguards that DHS considered in their assessment would not be effective, perhaps this means that it is time to reconsider the framework of Constitutional safeguards that are available.
-
-
It’s been nearly eight months since the last of the Occupy D.C. protesters cleared out of public parks around downtown Washington, but they scored a victory yesterday in federal court.
-
On Wednesday a few hundred activists crowded into the courtroom of the Second Circuit, the spillover room with its faulty audio feed and dearth of chairs, and Foley Square outside the Thurgood Marshall U.S. Courthouse in Manhattan where many huddled in the cold. The fate of the nation, we understood, could be decided by the three judges who will rule on our lawsuit against President Barack Obama for signing into law Section 1021(b)(2) of the National Defense Authorization Act (NDAA).
-
-
-
-
Internet/Net Neutrality
-
The Cyber Intelligence Sharing and Protection act (CISPA) will be reintroduced by House Intelligence Committee Chairman Mike Rogers (R-Mich.) and ranking member Rep. Dutch Ruppersberger (D-Md.) before the US House next week.
CISPA would’ve allowed any company to give away all the data its collected on you if asked by the government and The bill that plan to introduce next week will be identical to the version of CISPA that passed the House last spring.
-
-
-
Europe’s economic slowdown and the introduction of caps on mobile data usage have slightly damped growth of mobile data traffic despite more mobile users, devices and machine-to-machine connections, according to Cisco Systems
-
DRM
-
Although unlocking a phone that’s still tied to a contract was recently deemed illegal in the US, jailbreaking isn’t, according to the latest review of exceptions to the DMCA in October. But that doesn’t mean the practice isn’t frowned upon by the likes of Apple, which has issued a warning in response to the Evasi0n unthethered jailbreak for iOS 6.1 devices.
-
Intellectual Monopolies
-
Trademarks
-
To engage a lawyer to defend me from this spurious claim would cost more money than I have, certainly more than the book has ever earned me. Rather than earning money for my family, I’d be taking money from them, when previously my writing income paid for my daughter’s schooling. And I’d have to use the little time I have to write novels to fight a protracted legal battle instead.
-
Copyrights
-
Two of the most respected and forward looking schools for journalism are the Knight Center for Journalism at the University of Texas at Austin and the Poynter Institute. I’ve long been a fan of both, but I’m now quite disappointed in both of them too. Last week, we had a few stories concerning a woman named Teri Buhl, who (to put it mildly) had some “unique” (and, by that we mean “totally wrong”) legal theories concerning whether or not someone could quote her public statements on Twitter, as well as basic copyright and fair use rules. By the end of the week, she was threatening to sue us and others as well.
-
A high court in the United Kingdom has ruled that a copyright owner does not have the right to claim profits from copyright infringement.
“A copyright owner does not have a proprietary claim to the fruits of an infringement of copyright. I shall not, therefore, grant proprietary injunctions,” wrote judge Guy Newey of the England and Wales High Court of Justice, Chancery Division, in a ruling published on Tuesday.
-
An analyst suggests that the renewal of an obscure satellite-TV law could command the attention of the major broadcasters, big pay-TV distributors and giant tech companies.
-
Earlier this month, the Court issued an important judgment, Ashby Donald and others v France (judgment in French), on the tensions between copyright law and the freedom of expression. It is my great pleasure to put online a guest post about this judgment by professor Dirk Voorhoof of Ghent University and Inger Høedt-Rasmussen of Copenhagen Business School. Thanks to both!
Permalink
Send this to a friend
02.10.13
Posted in FSF, GPL, Microsoft at 8:58 pm by Dr. Roy Schestowitz
Microsoft too daemonises GPLv3 because it helps remove restrictions
Summary: Some FUD from patent lawyers and a badge of honour for the GPLv3 (our enemies’ enemy)
The patent lawyers, known for their systematic lying, win another case. They always win, no matter which side gets a favourable ruling. It’s like arms industries during war. So lawyers alone got nearly £10,000,000, enough to buy 100 cheap houses. This is just what we see as the result of one single lawsuit. And yet, with patent debates we usually just see lawyers everywhere. Here, as part of a long-running rigged ‘debate’, is a lawyer at Wired with “It’s Time to Make Vague Software Patents More Clear” (link). Yes, we see calls for more of the same. And no, we oughtn't listen to lawyers when it comes to patent policy and this latest suggestion is definitely not the solution to the problem, it’s a distraction.
Other patent lawyers are currently smearing the GPLv3 for what they call “patentleft” (oh, the horror!), showing to us just how apathetic they are towards software freedom. To quote:
The much publicised patent litigation between Apple and Samsung (reportedly the highest-value claim in patent litigation to date) has served as a reminder that software patents are increasingly important. Thus, it is essential to protect patent portfolios from negative impacts – which could be caused by the ‘patentleft’ effect when dealing with open source software.
Some other patent lawyers cite Kappos, another lawyer, as figure of authority and the UK’s Open Source Consortium responds thusly:
Departing #uspto director shows fine sense of #irony “we need to fix #swpats”
This is the same man who has defended software patents (swpats) while he was heading the USPTO. What we really need right now is GPLv3 in EFI/UEFI restricted boot as it would help eliminate FAT patent threats universally. Intel EFI was released under the BSD license or Eclipse Public License (EPL) as TianoCore. EFI was also used to deter against the use of GPLv3, under the premise that it would be incompatible with restricted boot. █
Permalink
Send this to a friend
Posted in GNU/Linux, Microsoft, Patents at 8:37 pm by Dr. Roy Schestowitz
Just so you know who’s in control…
Summary: What EFI teaches us about Microsoft’s use of software patents
THE emergence of UEFI restricted boot is probably the latest major attack on computing freedom, or merely the denial of users’ control over their computers (booting control is Microsoft’s, not the users’). UEFI restricted boot helps Microsoft control what people are allowed to do with hardware, not just with software. This is a serious antitrust issue, but it was never pursued by those who are affected in this way. UEFI going mainstream (with FAT as part of) helps Microsoft only as long as Microsoft controls and uses it to tax every device formatted with FAT (when it is used widely by Linux-based devices). And we are talking about software patents that should never have been granted in the first place. TomTom‘s mistake is that it used Linux in conjunction with FAT, which is a Microsoft trap. This whole episode helps teach us that, for monopolists, patents have nothing to do with innovation and everything to do with control, i.e. power over others. The OIN’s CEO confirmed to us that FAT is Microsoft's method of taxing just about any Linux vendor which is claims to be paying for Linux. I recently talked about this with Dr. Garrett, who kindly provided some pointers to the role of FAT patents in UEFI. It’s similar to what we saw in Novell with patent traps like Mono, OOXML, etc. and it should be noted that the Linux Foundation — unlike the FSF — serves Microsoft’s agenda by letting former Novell staff prop up Microsoft with UEFI. SUSE does too. James Bottomley is not alone in this, but here he is in a new article from SJVN:
-
James Bottomley — Parallels’ CTO of server virtualization, well-known Linux kernel maintainer, and the man behind the Linux Foundation’s efforts to create an easy way to install and boot Linux on Windows 8 PCs — announced on February 8 that the Linux Foundation UEFI secure boot system was finally out.
Please don’t do this. Please file a formal complaint. And as one follower put it in JoinDiaspora.com:
This may come to you as a shock, but I’m not particularly happy with Linux Foundation going that route. Not that I don’t want to have new hardware working with GNU/Linux. It’s just that Linux Foundation is playing Microsoft’s game from now on, and they’re gonna have some pretty tough time playing it later. Once you’re cached you’re actually dead. Never allow yourself to play the game of your enemy. It’s their rules, they know the tricks and they know better than you how to destroy the enemy.
Sad, but true IMHO.
We have studied the UEFI FAT licence and found some information of relevance in Wikipedia
Disk device compatibility
In addition to the standard PC disk partition scheme, which uses a master boot record (MBR), EFI works with a new partitioning scheme: GUID Partition Table (GPT). GPT is free from many of the limitations of MBR. In particular, the MBR limits on the number and size of disk partitions (up to 4 primary partitions per disk, up to 2 TiB (240 bytes) per disk) are relaxed.[19] GPT allows for a maximum disk and partition size of 8 ZiB (270 bytes).[19][20] The UEFI specification explicitly requires support for FAT32 for system partitions, and FAT12/FAT16 for removable media; specific implementations may support other file systems.
[...]
OS loaders are a class of UEFI applications. As such, they are stored as files on a file system that can be accessed by the firmware. Supported file systems include FAT32, FAT16 and FAT12. Supported partition table schemes include MBR and GPT. UEFI does not rely on a boot sector.
There is also a talk about it in Wikipedia:
I’ve also left the information regarding FAT issues on the talk page below. These are certainly an issue for providers of EFI systems and Open Source operating systems, but I don’t think that an article describing EFI needs to get bogged down in a patent discussion: it’s certainly not an issue particularly specific to EFI as compared to any other computer technology. You wouldn’t include a huge patent debate in a digital camera article, even though they use FAT, too…
Tmassey 20:06, 12 January 2006 (UTC)
Regarding FAT, many links are included there too:
According to this presentation from WinHec 2004 (page 15), the EFI System Partition (ESP) is FAT-32: EFI And Windows “Longhorn”
And Microsoft just won the case about the FAT patents: Microsoft’s file system patent upheld
So to use FAT you need to license the IP from Microsoft: Microsoft FAT license (Broken link?)
But you can do that for free if you are implementing EFI, here:
http://www.microsoft.com/whdc/system/platform/firmware/fatgen.mspx
The standard doesn’t say anything about other partitions than the ESP, so that doesn’t rule out MacOS.
So FAT is OK when it puts Microsoft in charge, but it’s a patent trap otherwise. The whole thing is about control, it’s not about innovation, ‘respecting’ patent law, or whatever Microsoft claims it to be. The Linux Foundation must stop being submissive and acknowledge the problem for what it really is. Complicity has no excuses. █
Permalink
Send this to a friend
Posted in Google, Patents at 8:26 pm by Dr. Roy Schestowitz
Summary: The Federal Circuit appeals court (CAFC) is taking some major steps that can help end software patents and Google plays a role in it
THE corporate/political campaign to change the patent system is gathering more steam. The Federal Circuit appeals court (CAFC), which we criticised before, is prepared to re-consider software patents; meanwhile we also learn that Google plays a role in asking for change:
The world’s largest search-engine company contends that too many other software patents hurt innovation more often than they lead to viable businesses. Google, along with JPMorgan Chase & Co. and the Yelp Inc. business-review site, say they need to be able to quickly resolve cases in which a patent owner sues a large number of companies over widely used software features.
An appeals court specializing in U.S. patent law will consider the issue tomorrow, in arguments about when software programs represent legitimate innovations and when they simply computerize ideas that couldn’t otherwise be patented. The question is important because challenging an invention’s eligibility for a patent can be quicker and cheaper than contesting a patent’s validity on other grounds.
The issue was considered at the end of last week and coverage of it depended on the messenger. SCOTUS Blog, i.e. lawyers, was bickering over this, whereas Groklaw, a more progressive legal site, had progressive people at the scene. Just being non-conformist does not make one “wrong”. Abolishing software patents is actually quite the norm in the software world, putting aside lawyers, MBAs, etc.
Here is some corporate press coverage and a bit from Rupert Murdoch’s main paper. IDG said that “Appeals court considers software patents,” potentially affecting the USPTO:
U.S. companies shouldn’t be able to get patents on abstract ideas when they combine those ideas with a computer process, a lawyer argued in an appeals court Friday.
The U.S. Court of Appeals for the Federal Circuit should invalidate four patents held by electronic marketplace Alice because the process described in the patents can be done in a person’s head or with a paper and pencil, argued Mark Perry, a lawyer representing CLS Bank, which was sued by Alice for infringement.
IDG also had this report which said:
Should an abstract idea written into software and run on a computer be patentable? That’s one question a U.S. appeals court will consider Friday when it hears arguments in a case with broad implications for software patents for companies as diverse as Google and Red Hat.
The U.S. Court of Appeals for the Federal Circuit is unlikely to invalidate all software patents in the CLS Bank v. Alice Corp. case, but it could force tech companies to narrow their claims when applying for software patents, some patent experts said.
Simon Phipps, writing for IDG, called it “turning point in war on software patents” and his summary was as follows: (no ads)
A seemingly unassuming court hearing today could be the beginning of the end of software patents as we know them
At TechDirt, the leading headline was “Key Case About Software Patents May Hinge On How You Define ‘Significantly More’” and it says:
Last year, we wrote about the next important lawsuit concerning software patents, the CLS Bank v. Alice case, which the full Federal Circuit appeals court (CAFC) heard today. Our last post on the case provided the background, but the short version was that it involves some software concerning doing a “shadow transaction” to see if there are really enough funds to complete a transaction, before completing the actual transaction. The district court found that this was just a representation of an abstract idea, and thus not patentable. CAFC, using a typical three judge panel, reversed that decision, saying that it was patentable subject matter. However, CAFC agreed to rehear “en banc” with the entire 10 judges, because there was some concern about the original ruling (which was split 2 against 1).
[...]
While Sachs was disappointed that there wasn’t a clear attempt to define what constitutes an “abstract idea,” I’m not as sure that’s an issue. In fact, it almost seems oxymoronic to say that you need a strict definition of an abstract idea. The reason an idea is abstract is just that: it’s abstract. But, at the same time, I can understand why patent lawyers would generally prefer a brightline, objective rule that can demarcate what is and what is not patentable. Either way, lots of patent lawyers will be waiting eagerly for this ruling.
Here is another report:
A federal appeals court is set to consider a case closely watched by Google Inc, Facebook Inc and other technology companies that could determine how far the patent system should go in protecting software inventions.
The U.S. Court of Appeals for the Federal Circuit, which specializes in patent cases, will hear arguments on Friday over whether patents should be granted for business methods whose main innovation is that they require the use of a computer.
Many of our readers have probably read about this news already because it’s everywhere, including major news sites. But it’s worth keeping our own summary/record of this major development; surely it’s not the end of it. In Re Bilski, for instance, lasted years. █
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »