03.31.15
Posted in News Roundup at 8:36 am by Dr. Roy Schestowitz
Contents
-
My favorite distributions are Fedora for my main workstation, laptop, and netbook. I generally use Centos for servers and firewalls. I have tried other distributions, but I prefer the Red Hat related ones because I started out with Red Hat 17 years ago, and I worked as a trainer for Red Hat for a while. It is what I know best.
I also use Centos and, to a lesser extent, Fedora for teaching the classes I have written myself for the training portion of my business.
I use LibreOffice Writer for writing documents like this article and the class lab projects, and I also keep records of the work I do for my customers; sort of a log of my activities. I use LibreOffice Calc for creating invoices, LibreOffice Impress for presentations, and GnuCash for my personal and business accounting needs.
Thunderbird and Firefox provide for email and Internet browsing, respectively. I have added a few plugins to each to expand their capabilities to better meet my personal and business needs. For example, I use the Lightning calendar extension for Thunderbird and a Google extension to keep my calendar synchronized on multiple devices.
-
Desktop
-
For ages, China has been a world-leader in manufacturing and a tail-end-charlie in adoption of GNU/Linux on the desktop.
-
-
Google has been increasingly pushing its Google Now virtual assistant and its “cards” convention across its different services and apps. The last one to get card-y was YouTube, where the cards will replace the older popups that relay additional information about videos. Now Google is teasing the next product to get a Google Now makeover, one that is probably long overdue anyway. The beta channel of its Chrome operating system has just gotten a new “Chrome Launcher 2.0″, and the most outstanding feature is the presence of Google Now.
-
Google is building a next generation interface for its Chrome OS operating system, which powers Chromebook laptop computers. Google is now offering users in its beta-channel the opportunity to preview features that are currently in development for Chrome OS, including a new launcher and a new look to the overall system.
-
Two teachers in Cumberland County are offering up their classrooms as testing ground for new technology. Students in Sarah Pharris’ seventh-grade language arts students and Jackie Hancock’s seventh-grade math students are using Chromebooks and a variety of Google learning tools to facilitate instruction in their classrooms.
-
Kernel Space
-
Queued up in Git for the next version of PulseAudio, v7.0, is the enabling of LFE remixing by default after some upstream work was done by Canonical developers working on Ubuntu.
-
The latest version of the stable Linux kernel, 3.14.37, has been released by Greg Kroah-Hartman, making this one of the most advanced long-term support version available for download.
-
-
The systemd project began as an alternative implementation of init, the software which brings an operating system on-line when a computer boots. Traditionally, Linux distributions have used either the SysV init software or Upstart. While these older init systems had their benefits, systemd developers saw room for improvement and the chance to leverage several underutilized features available to modern Linux distributions. Using systemd, distributions are able to more easily start services in parallel, simplify service dependencies and make easier use of cgroups.
-
A wave of minor myocardial infarctions were reported today as Linux users read the news of a systemd kernel fork. Most were treated and released with only one admitted to the hospital with more severe symptoms. Elsewhere, folks are beginning to discuss the feasibility of Docker replacing Linux package management solutions. But there are several obstacles to container package utopia.
Systemd continues to be distrusted by many in the Open Source world while others have uncomfortably accepted its presence in their everyday lives. However, when news broke this morning that systemd developers have forked the Linux kernel and plan on developing a whole distribution around it, repercussions were felt community-wide. As Distrowatch.com reporter Jesse Smith said this morning, “It appears as though the systemd developers have found a solution to kernel compatibility problems and a way to extend their philosophy of placing all key operating system components in one repository.” Smith quoted systemd developer Ivan Gotyaovich saying, “There are problems, problems in collaboration, problems with compatibility across versions. Forking the kernel gives us control over these issues, gives us control over almost all key parts of the stack. We will soon have GNU/systemd, [a] much simpler, unified platform.”
-
Graphics Stack
-
George Kyriazis of AMD has provided patches to the Blender project for vastly improving their OpenCL Cycles renderer support and allow for it to work with AMD GPUs.
-
There hasn’t been too much to report on lately with regard to Wayland/Weston 1.8 development, but with this next release, the reference Weston compositor’s terminal will now have a minimize menu item.
-
Canonical developers have been hard at work on the next version of their Mir Display Server for Ubuntu Touch 15.04.
-
Applications
-
All of us have been very addictive to check our email accounts. Wherever we are or whoever is talking to us does not matter, we want to be notified whenever any email arrives to our any accounts. It is not possible though with web app for which you need to open your browser and log in to check new emails. So here comes email clients very handy. I am reviewing Top 4 email clients that are free, open source and easy to use.
-
The modern Geary email client that is currently used in several well-known distributions, has been updated on March 30 to version 0.10.0, a quite small release, but an important milestone in the development cycle towards the final 1.0.0 release of the software.
-
Conventional wisdom holds that containers are fast on their way to remaking everything from application deployment to the design of ultralean Linux distributions. That last part raises a question, though: Could container technologies like Docker be used to solve Linux’s long-standing conundrums with package management? Might containers provide a path away from dependency hell and competing (and incompatible) package standards?
In the yes camp: The folks at CoreOS, creators of the Linux distribution that revolves entirely around containers, not packages, as its basic unit of modularity.
-
Some of the big additions set to debut in Docker 1.6 will be a native Windows client. Building Docker images will also get a boost with the ability to building images from an image ID as well as having the ability to impose constraints (memory etc) on images.
-
Pushbullet Indicator was updated today with new features like bidirectional universal copy and paste, option to send SMS from the desktop and more.
-
flareGet, a full-featured, multi-threaded, multi-segment download manager and accelerator for Linux, is now at version 4.2-92 and is ready for download. This is minor update, but it does bring a few important changes.
-
Paolo Bacchilega has announced earlier today, March 30, that the gThumb 3.3 image viewer application has been updated for the newly released GNOME 3.16 desktop environment and GTK+ 3.16 toolkit. This is the fourth maintenance version of gThumb 3.3 and introduces a number of improvements, bugfixes, and updated translations over the previous stable release.
-
The Limba package format should be stable by now – since Limba is still Alpha software, I will however, make breaking changes in case there is a huge flaw which makes it reasonable to break the IPK package format. I don’t think that this will happen though, as the Limba packages are designed to be easily backward- and forward compatible.
-
Instructionals/Technical
-
-
-
-
-
-
-
-
-
-
-
-
-
Typically when a network is under my control, I like my servers to have static IPs. Whether the IPs are truly static (hard-coded into network configuration files on the host) or whether I configure a DHCP server to make static assignments, it’s far more convenient when you know a server always will have the same IP.
-
Games
-
As promised, no roguelike is shown here unless it can brag of something unusual.
-
While these days there’s more than 1,000 Linux games on Steam, just three years ago in their early Source Engine porting process they were barely able to get good frame-rates.
-
One fateful Wednesday in 2010, the fortunes of gamers that preferred Linux over Windows changed forever when the good folks at Wolfire Games launched the inaugural Humble Indie Bundle.
Not only were they doing something really cool — “Pay what you want for X games and donate money to charity” — the games in the bundle would all support Linux.
-
Super Meat Boy, an indie 2D platformer developed by Team Meat, is now available on Steam for Linux with a 75% discount that will expire in a little over a day.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
Today we got mail from Kayoko Matsumoto that the first book about Krita has gone into print!
-
My name is Odysseas Stamoglou, I am an artist born in Athens, Greece. I am currently based in Vienna, working as a freelancer illustrator for board games and historical covers and comics.
-
GNOME Desktop/GTK
-
-
Reviews
-
Privacy and security are difficult to come by in our progressively connected world. Advertisers track our browsing habits, employers monitor productivity and government agencies monitor our communications. Most operating systems do not take steps to protect our privacy or our identities, two things which are increasingly difficult to guard. Tails is a Linux distribution that is designed to help us stay anonymous on-line and protect our identity. Tails is a Debian-based live disc that we can use to scrub our files of meta data, browse the web with some degree of anonymity and send private messages. According to the project’s website, “Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to: use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.”
-
New Releases
-
Q4OS is a Linux operating system that implements a desktop environment that is very similar with the older Windows versions. The developer have just released a new update and they are now much closer to a much stable release.
-
4MLinux Allinone Edition, a Linux operating system built from scratch that wants to provide a complete desktop experience while keeping the smallest size possible, has been upgraded to version 12.0.
-
The first Service Pack (SP) release of Smoothwall Express 3.1, an open source best-of-breed Internet firewall and router operating system designed to run on commodity hardware, has been released today with a great number of improvements over the previous stable version.
-
Screenshots
-
Gentoo Family
-
The Sabayon development team had the pleasure of informing its users about the immediate availability for download of the latest monthly release of their Sabayon Linux operating system derived from the well-known Gentoo distribution.
-
Arch Family
-
We’re happy to inform you that the Manjaro Linux Unity 0.8.12 operating system has been released today, March 31, bringing you the latest technologies from the stable Manjaro Linux 0.8.12 distribution, which is based on Arch Linux.
-
The BlackArch Linux developers were proud to announce earlier today, March 30, the immediate availability for download of a new updated version of his BlackArch Linux computer operating system designed for penetration testers and security researchers. News ISO images of the BlackArch Linux distribution have also been generated and are available for download today.
-
Today we released new BlackArch Linux ISOs. The new ISOs include over 1200 tools for i686 and x86_64 and over 1000 tools for armv6h and armv7h.
-
BlackArch v2015.03.29 has been released for those interested in this flavor of Arch Linux.
BlackArch continues to be focused as a Linux distribution focused on penetration testing and it includes 1,200 different tests for carrying out security tests, etc.
-
Slackware Family
-
Some folks asked whether the new KDE4-based packages in my KDE5 repository would also apply to KDE 4.14.3. The answer: no they probably won’t, so you better not try what happens.
-
Red Hat Family
-
The Koozali SME Server development team, through Terry Fage, was pleased to announce today, March 30, the immediate availability for download and testing of the SME Server 9.1 Beta 1 computer operating system, which is now based on the upstream CentOS distribution, which in turn is based on Red Hat Enterprise Linux.
-
Red Hat Inc(NYSE:RHT) announced that it was honored by Google for Work as the 2014 Global Partner of the Year: Technology. The award was presented to Red Hat at TeamWork 2015, the annual global partner summit of Google for Work, which took place in San Diego. The Technology partner of the year award that was awarded to the company emphasizes on the proven track record of Red Hat Inc(NYSE:RHT) of enabling the product adoption for its customers on Google Cloud Platform.
-
Fedora
-
Considering that the fix for the first issue is widely available in most distributions and the second one is only a modprobe away, I’d say this laptop is pretty darned Linux compatible. I’m currently running Fedora 21 without any problems.
-
The alpha release of Fedora 22 was released a few weeks ago for the primary CPU architectures while finally coming out today is the F22 Alpha for 64-bit ARM and PowerPC architectures.
Peter Robinson announced this afternoon the Fedora 22 Alpha release for AArch64 and Power64 architectures. These alternative architecture spins of the very promising Fedora 22 are primarily focused on the Server Edition of Fedora Linux.
AArch64 and Power64 users of Fedora can learn more about this first Fedora 22 development release via the mailing list announcement. Fedora 22 is expected to be officially released in May.
-
Peter Robinson, on behalf of the Fedora Project, has announced today, March 30, that the recently announced Fedora 22 Alpha Linux kernel-based operating system is now available for the AARCH64 and POWER64 (PPC64/PPC64LE) architectures.
-
Debian Family
-
Derivatives
-
The Linux Mint developers have announced today, March 30, in their monthly newsletter, that the team works hard these days to release the final version of the LMDE (Linux Mint Debian Edition) 2 (codename Betsy), as well as to implement its awesome new features to the upcoming Linux Mint 17.2 update of the current stable distribution of the project, Rebecca.
-
Canonical/Ubuntu
-
Today we take a quick look at the first time boot and configuration of the BQ Aquaris E4.5 Ubuntu Edition smartphone. Those of you who watched our unboxing video of the first ever Ubuntu Phone device, would know that it takes some time for the operating system to start when used for first time.
-
Canonical and Ericsson have announced a partner deal that will bring Ubuntu Linux, in conjunction with OpenStack and OPNFV, to a new cloud platform for the telecom market.
-
On it’s own, Ubuntu is a solid desktop Linux experience. It offers ample application choices and it’s easy to use. But one area I would like to see greater focus is mirroring one desktop to another. That is, being able to find the same documents and other files I use on both desktop machines. In this article I’ll explore options I’ve found useful in creating a unified Ubuntu Experience.
-
Parallels of the New Coke can be drawn with Microsoft’s efforts with Windows 8 and Ubuntu’s Unity desktop. Contrary to what has been said by some so-called technology blogs, both initiatives were not pulled out of the thin air and forced on unwitting users. They were both outcomes of research.
Unity was a desktop that had previously shipped as part of the Ubuntu Netbook Remix flavor of the Ubuntu operating system for a while before it supplanted GNOME to become Canonical’s default user interface on the Ubuntu Desktop in Ubuntu 11.10. It is important to note that Unity was, just like New Coke, a result of “secret research” in computer user habits and an attempt to better serve the user based on these habits.
-
After announcing last week the Ubuntu Origami Unicorn contest, which can bring an awesome new BQ Aquaris E4.5 Ubuntu Edition phone to a user that folds the best-looking Unicorn, today Canonical decided that it’s finally time to show the world how to make the perfect origami unicorn.
-
The Ubuntu Touch platform is still young and it’s only available “officially” on a single phone, that was made available only sporadically through flash sales, but the number of apps in the store has been increasing on a constant basis, so much so that there are now more than a 1,000 apps available.
-
Flavours and Variants
-
Black Lab Software, the creator of the Black Lab Linux series of computer operating systems based on the world’s most popular Linux distribution, Ubuntu, announced earlier today, March 30, on their Twitter account, that they will offer customers who use Ubuntu 10.04 LTS a fully supported upgrade path to their Professional Desktop edition.
-
The Linux Mint developers are also working on the Cinammon desktop environment, so the distribution is not their entire focus. They are now trying to make it load faster and they say they already had some success.
-
The release candidate for LMDE 2 “Betsy” was announced. Bugs were fixed and we’re now getting ready for a stable release. Working on Betsy was very exciting and it paved the way for some of the work planned for Linux Mint 18 (in 2016). It also highlighted a few areas where things could be improved further, so some of Betsy’s improvements will also find their way into Linux Mint 17.2. I’d like to thank all the people who helped us test Betsy and who sent us their feedback.
-
We’ve announced earlier today, March 30, that the Linux Mint developers have released their monthly newsletter where they’ve reported the changes implemented in the upcoming releases of the LMDE 2 (Linux Mint Debian Edition), dubbed Betsy, as well as the Linux Mint 17.2 (Rebecca) operating systems.
-
You can pre-order your own copy of Ubuntu 15.04 (or Xubuntu, or Lubuntu, or Kubuntu), including Ubuntu 15.04 GNOME and Ubuntu 15.04 MATE right now. It means that a DVD with your favourite OS will be burnt to you as early as possible, and dispatched on the 23rd of April 2015, or soon after. Dispatched to anywhere in the world.
-
-
Xilinx has joined the Linux Foundation, the industry organisation supporting growth of Linux and collaborative development.
The FPGA firm’s interest indicates how Linux is expanding its footprint beyond consumer and computing markets and in high reliability industrial, automotive and aerospace systems.
The theme of this year’s Embedded Linux Conference, which is sponsored by The Linux Foundation, was ‘Drones, Things and Automotive.’
-
Denx released a rugged, IPC-A-610 Class 3 rated “M6R” COM that runs its Yocto-based ELDK embedded Linux on a single, dual, or quad core Freescale i.MX6 SoC.
The Denx M6R computer-on-module, which is available with an M6REVK carrier board, follows in the steps of earlier Freescale-based COMs from Denx Computer Systems such as the i.MX53x based M53. The 80 x 60mm module, which uses the newer Cortex-A9-based i.MX6 system-on-chip, similarly runs the Embedded Linux Development Kit (ELDK) distribution from its sister company Denx Software Engineering. ELDK has been evolving for well over a decade, long before it switched to a Yocto Project foundation.
-
Pimoroni’s $13 “Explorer HAT” add-on for the Raspberry Pi can drive motors and touchscreens, integrate sensors, interface with 5V devices, and more.
The Raspberry Pi Foundation’s HAT (Hardware Attached on Top) add-on board standard enables the Linux-ready Raspberry Pi SBC to automatically configure its GPIO signals and drivers for use with external devices. Pimoroni has released Explorer HAT and Explorer HAT Pro models that support the HAT standard on the Raspberry Pi 2 Model B, as well as the first-generation Model B+ and Model A+ boards.
-
Phones
-
Android
-
Android Lollipop 5.0 was supposed to change everything. It was supposed to inspire a revolution, a better—and better looking—Android. Instead it was a little disappointing, starting with a slow rollout, and followed by a motley parade of bugs.
-
Earlier this month, Sony finally started pushing its Android 5.0 Lollipop update to the Xperia Z3, Z3 Compact and the Z3 Tablet Compact. The new software was limited to just a few European countries at the time, but now it’s rolling out around the world.
-
If you’re in the market for a new Android phone, you’ll have no shortage of choices this spring. On April 10, three flagship devices — the HTC One M9, Samsung Galaxy S6 and Samsung Galaxy S6 Edge — will launch with all four major U.S. carriers.
-
-
-
-
The original HTC One aka One (M7) is reportedly receiving Android 5.0 Lollipop update in India, Malaysia, Singapore and other regions.
-
-
The highly anticipated LG G2 Android 5.0 Lollipop update has finally started rolling out to more and more owners this month. Today we’ve learned that ahead of the LG G3 Android 5.0 update, those with a Verizon LG G2 can expect the update to arrive starting today.
-
-
-
-
I have been pretty hard on Samsung over the past few years, but let’s be honest: the company deserved it. Time and time again, we’ve seen Samsung launch fantastic flagship smartphones that are class leaders in almost every key area. Samsung’s mobile displays are the best in the world, many of its software additions have mass appeal, and its phones are always among the best available when it comes to performance.
-
We’ve released over 50 open source projects, with several more in the pipeline. We also host regular public NetflixOSS meetups in the Bay Area.
-
In my recent interview with Brent Turner, from the California Association of Voting Officials (CAVO), we heard about the public interest case for making voting machines open source. In this article, I further explore the unfortunate trend for vendors in this space to “openwash” their offerings; that is, to misrepresent proprietary products as if they were open source, with the intent of making them more appealing.
-
The Open Source Initiative ® (OSI), recognized globally for their work in promoting and protecting open source software and development communities, announced today the Affiliate Membership of OpenMRS®, a free and open source health IT platform.
-
Transticket provides the ticketing and commerce platforms used by Sweden’s biggest sporting and entertainment events such as the ATP Tennis Tour, the Swedish Hockey League and SkyView, the rail system taking visitors to the top of Ericsson Globe in Stockholm, the world’s largest spherical building.
-
To some degree, open source is already present throughout the Internet of Things value chain. Cloud apps that collect and analyze data are heavily dependent on open source software and standards, for example.
-
Events
-
I rubbed elbows with some impressive people at LibrePlanet 2015. I spoke with a number of programmers and project team members of active Linux applications. I asked them how to fix broken free open source software. I asked what to do when originating programmers have no interest or intention of improving his work. (S)he has no intention of making it easier to use for the other 99 percent of us. That wasn’t his purpose when (s)he wrote the software.
-
-
-
-
-
KDAB’s popular 3 day Training course: What’s new in C++11/C++14 training has SOLD OUT in April but don’t despair, you can still get up to speed with the new language for better productivity and performance in your project.
-
Web Browsers
-
Mozilla
-
We’re happy to announced that the final builds of the popular Mozilla Firefox 37.0 web browser were published on Mozilla’s download servers for all supported computer operating systems, including GNU/Linux, Mac OS X, and Microsoft Windows.
-
SaaS/Big Data
-
Snowflake Computing, a cloud data warehousing company that only recently emerged from startup stealth mode, has announced the results of an independent, national survey of more than 315 technology and analytics professionals with responsibility for corporate data initiatives. Conducted by Dimensional Research, the goal of the research was to understand the state of the data warehouse and Big Data initiatives – including experiences, challenges and trends in data warehousing and data analytics.
-
StackStorm’s toolset is 100 percent open source and used to tie together environments with the aid of a rules engine, workflows, audit and access controls, and more.
-
Silicon Valley startup ClearStory Data says the new release of its Apache Spark-based analytics software significantly speeds up complex analyses based on multiple sources.
-
Databases
-
Apple’s recent acquisition of formerly open source FoundationDB has stirred a larger debate. Even before news of the acquisition went public, the startup reportedly turned off software downloads from its website and announced to users that it would no longer provide support for the NoSQL database software, leaving those who were using it and engaged in the open source project in a tight spot. FoundationDB didn’t have many known customers, but the open source world was upset.
-
Business
-
Customer relationship management (CRM) tools come in many different flavors, though not every application can meet the need of every customer. Often, large and complicated tools are overkill for smaller businesses, while some smaller tools require customization to meet specific needs. I would like to share with you the open source tool EspoCRM, which is designed to meet the needs of small and medium businesses.
-
FSF/FSFE/GNU/SFLC
-
WHEN I wrote about free software guru Richard Stallman last week, I didn’t realize I would have the opportunity to hear him speak just a few days later. Fortuitously, I got that chance when I attended the RightsCon Southeast Asia Summit at the Crowne Plaza Manila Galleria Hotel, where Stallman was a guest speaker.
The summit, which drew 600 participants from over 50 countries, focused on protecting human rights online and fighting for an open Internet, which seemed to be a good fit for Stallman, who remains an activist at the age of 62.
His talk, entitled “Brave GNU World,” was a play on the free operating system that became the centerpiece of his free (as in freedom, not as in zero-cost) software movement.
Stallman began his talk with the four essential freedoms that computer users ought to have: the freedom to run a program; the freedom to study and change it in source code form; the freedom to redistribute exact copies of it; and the freedom to distribute modified versions of the program.
-
-
Project Releases
-
I am happy to announce that GNU APL 1.5 has been released.
-
The GnuCash development team proudly announces GnuCash 2.6.6, the sixth maintenance release in the 2.6-stable series. Please take the tour of all the new features.
-
Version 2.1 of the Audacity open-source audio editor/recorder has been released.
-
Audacity, the best open-source audio editor, has reached version 2.1.0 today, March 29, a major release that brings a great number of new features and improvements over the previous stable release. While there’s no official announcement on the project’s homepage at the moment of writing this article, we can tell you what exactly has been changed since Audacity 2.0.6.
-
Public Services/Government
-
According to a new policy issued by the Indian Government, all employees will have to use open-source software on their computers. The new policy encourages the adoption of open source software across all Indian Government offices, on both desktop and server stations, in order to reduce the costs for acquiring computer software.
-
Licensing
-
Meet Doug Kim. He’s a computer engineer-turned-lawyer who chairs the Intellectual Property Practice Group at McNair Law Firm in Columbia, South Carolina. Doug’s practice includes patent preparation and prosecution, trademark, service mark preparation and prosecution, and securing copyright registrations in areas that include Geographical Information Systems (GIS), software, books, music, product packaging, and distribution. He has expertise in software, method, and mechanical patents as well as open source licensing.
-
But rather than eschew the mountains of code being released on GitHub, would-be adopters of GitHub code need to start asking that code be licensed. It may be the only way to change the seemingly permanent shift toward completely open source.
-
Openness/Sharing
-
Open Data
-
Slovakia has held a public consultation to build its Open Government Partnership’s Action Plan for 2015. The consultation, organized by the Office of the Plenipotentiary of the Slovak Government for the Development of Civil Society (ÚSVROS) and the National Agency for Network and Electronic Services (NASES), was opene to “the public, the business sector, non-profit organizations, public institutions and local government”, the organisers said in a statement. The public consultation is now closed (on March 17th).
-
Programming
-
Since March 26, GitHub has been under attack, but users are likely not even noticing as the site continues to be highly available.
-
Open source coding site GitHub said it was fending off a days-long DoS attack that had caused intermittent outages for the social coding site.
China has been identified as the source of the attack and the software being hit is banned behind the bamboo curtain. It would appear that someone is taking pro-active censorship steps by taking down the entire site..
-
Apple’s OS X operating system for the Mac seems to be a very popular choice among web developers. But why have so many of them forsaken Linux in favor of OS X? A Linux redditor asked about this and got some interesting answers from fellow redditors.
-
Standards/Consortia
-
A new toolkit is being launched to target faster public sector adoption of Open Document Format. Released today by the Community for Open Interoperability Standards (the UK arm of Open Forum Europe), the toolkit contains a folder of principles and infographic for Government Technology leaders to use in educating public sector workers on the options and opportunities for ODF use. This publication joins global Document Freedom Day week celebrations of Open Standards, which numbers 58 events in 30 countries this year. The toolkit arrives as UK Government moves to comply with use of ODF 1.2 across departments, following a change in Cabinet Office policy in July last year.
-
Fascinating early posts from the founders of eBay, Amazon, Google, and others.
-
A second-tier German professional basketball team has been relegated to an even lower tier as a result of being penalized for starting a recent game late—because the Windows laptop that powered the scoreboard required 17 minutes to perform system updates.
-
Science
-
Studies show that children from low-income families have smaller brains and lower cognitive abilities.
-
Security
-
A bit of a brouhaha has broken out about a “Black Box” that can brute force your iPhone PIN by trying every possible combination, from 00..00 to 99..99.
[...]
Even if you only set a 4-digit PIN, that gives a crook who steals your phone just a 10 in 10,000 chance, or 0.1%, of guessing your unlock code in time.
But this Black Box has a trick up its cable.
Apparently, the device uses a light sensor to work out, from the change in screen intensity, when it has got the right PIN.
-
-
Defence/Police/Secrecy/Aggression
-
An unidentified car attempted to ram the entrance gate at the NSA’s Fort Meade headquarters this morning, with shots fired in the wake of the collision. Authorities say one person is dead and two men (a 20-year-old and 44-year-old) have been airlifted to a Baltimore trauma center with serious injuries. CNN is reporting that two assailants were involved in the attack — one killed, the other wounded — citing a federal law enforcement official who had been briefed on the matter.
-
Advocating for war is not like advocating for most other policies because, as peace activist David Swanson points out, war is a crime. It was outlawed in 1928 by the Kellogg-Briand Pact, in which the United States, the Soviet Union, China, Britain, Germany, France, Japan and 55 other nations “condemn[ed] recourse to war for the solution of international controversies, and renounce[d] it, as an instrument of national policy in their relations with one another.”
-
Corporate media typically portray Muslims as cruel monsters driven by unexplainable hate for the West…
-
Though widely reported in corporate media, the largely aggressive thrust of the text has been overlooked in most mainstream coverage. The text emphasizes, for example, that the US must continue to remain the world’s preeminent superpower, an ominous assertion particularly in light of the recent standoff with Russia concerning Syria and Ukraine.
-
A Saudi-led coalition is targeting Shiite rebels and their allies in Yemen in a campaign of airstrikes that began last week.
-
An air strike killed at least 40 people at a camp for displaced people in north Yemen on Monday, humanitarian workers said, in an attack which apparently targeted a nearby base for Houthi fighters battling President Abd-Rabbu Mansour Hadi.
Yemen’s state news agency Saba, which is under the control of the Houthis, said the camp at Haradh was hit by Saudi planes. It said the dead included women and children, and showed the bodies of five children laid out on a blood-streaked floor.
-
The airstrikes targeted Ansar Allah, the armed wing of the Zaidi Shia group known as the Houthis, that has controlled much of northern Yemen since September 2014. In January, the group effectively ousted the government of President Abdu Rabu Mansour Hadi. Human Rights Watch found that on March 26 warplanes struck populated urban neighborhoods in Sanaa and observed Ansar Allah forces who appeared to be firing anti-aircraft weapons from residential neighborhoods.
-
Beyond legitimacy, the second most apprehended criterion was fear: inducing fear, manufacturing fear, exploiting and manipulating fear, and this, both present in the intent to commit the terrorist act and into the intended consequences of the terrorist action. The complexity of whether all political violence is terrorism, while all terrorism is political violence, was sometimes exhilarating to debate, sometimes frustrating to unravel. Most of them of European upbringing, the reference to ‘simple terrorism’ – ethno-political terrorism – was fast weighed against the current wave of religious extremism. This was not the only instance of questioning legitimacy of political action.
-
Transparency Reporting
-
Stacey Singer, a health reporter for the Palm Beach Post in Florida, was perusing a medical journal in 2012 when she came across something startling: a federal epidemiologist’s report about a tuberculosis outbreak in the Jacksonville area. Singer promptly began pursuing the story.
-
Environment/Energy/Wildlife
-
The 2011 nuclear reactor meltdown in Fukushima Japan continues unresolved despite the fact that governmental authorities and major news media have assured their constituencies the situation has been contained.
-
PR/AstroTurf/Lobbying
-
School testing corporations have spent at least $20 million on lobbying along with wining and dining or even hiring policymakers in pursuit of big revenues from federal and state testing mandates under “No Child Left Behind” measures and the Common Core curriculum, according to a new analysis by the Center for Media and Democracy (CMD).
-
After the town of Denton, Texas passed a ballot initiative banning fracking in November 2014, the oil and gas industry reacted with outrage and swiftly filed suit. Politicians in the state capitol responded with a fusillade of bills to preempt local authority over public health and safety and to subject local ballot initiatives to pre-approval by the state attorney general. There was even a bill to end local home rule altogether.
-
Privacy
-
A report from the Institute of Directors (IoD) warns that the government’s rollout of smart meters “should be ‘halted, altered or scrapped’ to avoid a potentially catastrophic government IT disaster.”
The report, entitled “Not too clever: will Smart Meters be the next Government IT disaster?” describes the £11bn scheme as “unwanted by consumers, over-engineered and mind-blowingly expensive.”
-
-
The director of Europol, the European Union’s law enforcement agency, has warned about the growing use of encryption for online communications. Speaking to BBC Radio, Rob Wainwright said: “It’s become perhaps the biggest problem for the police and the security service authorities in dealing with the threats from terrorism.” Wainwright is just the latest in a string of high-ranking government officials on both sides of the Atlantic that have made similar statements, including FBI Director James Comey, NYPD Commissioner Bill Bratton, the head of London’s Metropolitan Police, Sir Bernard Hogan-Howe, and UK Prime Minister David Cameron.
Wainwright told the BBC that the use of encrypted services “changed the very nature of counter-terrorist work from one that has been traditionally reliant on having good monitoring capability of communications to one that essentially doesn’t provide that anymore.” What that overlooks is that the “good monitoring capability” was of very few channels, used sporadically. Today, by contrast, online users engage with many digital services—social media, messaging, e-mail, VoIP—on a constant basis, and often simultaneously. Although the percentage of traffic that can be monitored may be lower, the volume is much higher, which means that, overall, more information is available for counter-terrorism agencies.
-
Under the rubric of state security on the one hand and commercial openness on the other, we are being lulled into an online world of fear and control where our every move is monitored in order to more efficiently manage us.
-
The story of the powerful spy agency most Canadians still don’t know, and the security bill that would expand its resources and reach
-
None of that explains why the NSA wasn’t able to ingest some cell phone production. But it may explain why NSA accepts moving the phone dragnet to the telecoms.
-
Civil Rights
-
Fox News anchor Bret Baier debunked the network’s defense of Indiana’s discriminatory “religious freedom” law, explaining that the law is broader than both federal law and similar measures in other states.
-
Here is a panel discussion I did about whistleblowing at the Logan Symposium in London last November. With me on the panel are Eileen Chubb, a UK health care whistleblower who runs Compassion in Care and is campaigning for Edna’s Law, and Bea Edwards of the US Government Accountability Project. With thanks to @newsPeekers for filming this.
-
On the so-called dark web, drug dealing and other illicit sales have thrived in recent years, the authorities have said, through hidden websites like Silk Road and hard-to-trace digital currencies like Bitcoins.
On Monday, the government charged that in the shadows of an undercover investigation of Silk Road, a notorious black-market site, two federal agents sought to enrich themselves by exploiting the very secrecy that made the site so difficult for law enforcement officials to penetrate.
-
The tragedy in the office of late Missouri state auditor Tom Schweich has deepened.
A month after Schweich died of a self-inflicted gunshot wound amid an alleged political smear campaign focused on his faith, a top aide appears to have committed suicide by the same means, police said.
Robert “Spence” Jackson, who served as Schweich’s media director, was found dead in his bedroom Sunday, Jefferson City police said in a statement. Police have not released any details about the timing of Jackson’s death, but they did say that there were no signs of a struggle or forced entry into the home.
-
At a Senate Armed Services Committee hearing on policies related to the release of prisoners from Guantanamo Bay, a Pentagon official and an intelligence official testified on how closing the prison is a national security imperative. Yet, their expertise did not seem to matter.
Senators rejected the expertise of military and intelligence agencies preferring to believe that releasing anyone from Guantanamo will endanger Americans and President Barack Obama’s administration is engaged in a conspiracy of mass deception that is putting the United States at great risk.
-
An Intercept reporter is suing the St. Louis County Police Department after he was shot with rubber bullets and arrested while reporting on protests in the suburb of Ferguson, Missouri, over the shooting of unarmed teenager Michael Brown last August.
-
Geraldine Thomas-Flurer, who campaigns for environmental protection on behalf of indigenous First Nations in Canada, wasn’t surprised when, in 2012, she found out that the Royal Canadian Mounted Police had been keeping tabs on her. The Toronto Star that year obtained documents showing that federal police had monitored private meetings held between her coalition and local environmental groups.
Now she just laughs when asked whether she’s comforted by assurances from government officials that new surveillance and policing powers outlined under a proposed Canadian Anti-Terror Law wouldn’t be aimed at peaceful protesters.
Permalink
Send this to a friend
03.30.15
Posted in News Roundup at 5:51 am by Dr. Roy Schestowitz
Contents
-
If you are a Linux open source operating system user then this recent news from Microsoft can make your life tougher. The new Secure Boot requirements can make installing the Linux operating system much harder than it ever used to be. Microsoft gives manufacturers an option to enable UEFI Secure Boot without providing you a manual kill switch, which means that you could only be able to boot your PCs with Microsoft approved operating systems.
-
Desktop
-
Google has announced a couple of days ago, on March 27, that the Chrome OS Beta channel is now open to anyone daring to test the upcoming major release of the Linux kernel-based operating system designed for Chromebooks, which will bring a number of attractive features.
-
France has been a hotbed of GNU/Linux adoption for years and the effort is bearing fruit. Schools, governments and business are all playing a part.
-
Kernel Space
-
Linus Torvalds had the pleasure of announcing today, March 29, the immediate availability for download and testing of the sixth Release Candidate (RC) version of forthcoming Linux 4.0 kernel. Apparently, some important bugs have been squashed, which means that the final Linux kernel 4.0 will be released sooner than expected.
-
-
Graphics Stack
-
The NIR intermediate representation for Mesa continues taking flight and driven by Intel’s open-source developers.
-
Emil Velikov has pushed out a weekend update for stable Mesa users.
-
Benchmarks
-
Applications
-
We’ve introduced Cutegram 2 a while back as the best Telegram Client for Linux ever. Since then, the application received several maintenance releases and it has been updated today, March 29, to version 2.1.1, a point release that brings many cool features to the application.
-
Rhythmbox 3.2 has been released today, March 29. This is the second maintenance release since Rhythmbox 3.0 was announced and it brings several new features, but also fixes those annoying bugs that you’ve reported since the last stable release of the software, version 3.1, which is still used as the default music player in many popular distributions, such as Ubuntu.
-
A new maintenance release of the powerful and popular MKVToolnix software that allows users to manipulate MKV (Matroska) files in Linux, Mac OS X, and Microsoft Windows operating systems, has been updated today to version 7.8.0, a release that introduces numerous improvements and some new features.
-
I’ve just released gnutls 3.3.14. This is a bug-fix release on the current stable branch.
-
Instructionals/Technical
-
-
-
-
-
-
-
-
-
-
-
-
-
In my previous post I showed how to install CuterCode and Qreator, two simple GUI applications for producing QR Codes, in Gentoo Linux. I have now found a couple of other GUI applications, both of which offer more features than the aforementioned two, such as allowing you to specify the amount of error correction to be incorporated into the QR Code. QR Code codewords are 8 bits long and use the Reed–Solomon error correction algorithm, with four error correction levels possible in the case of QR Codes:
-
Games
-
Captain Forever Remix is a colourful and fun spaceship action and building game that just released into early access, and I took a look.
-
The contract between the two companies means that before PC and PS4, Activision has to release its ‘Call of Duty’ expansion packs on Microsoft consoles, which at the moment are Xbox One and Xbox 360. This may not be a big deal for most gamers, but can play a vital role in deciding which console to opt for if the person is a COD fan. Microsoft has a similar deal with EA Sports over ‘FIFA Ultimate Team Legends’.
-
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
For anyone who has been paying any attention of PyKDE5 over the last year or so, it is no secret that development and maintenance has been at a standstill. I’ve been very busy with a family and small children, and that eats time like you wouldn’t believe. (Unit number 2 is almost 6 months now, healthy and happy I can report.) But another important factor is that my interests have shifted towards web related technologies over the last few years.
-
qt-kde-620x350Here’s the latest and greatest of KDE’s software collection (Frameworks, Plasma, Applications). SInce my last ‘ktown’ release, all of KDE’s sources have been renewed, and today I am making public a package set for KDE 5 aka Plasma 5 with version 5_15.03: my March ’15 release.
-
The KDE Project developers announce that KDE Applications 15.04 RC has been released and is now ready for testing. It will be a while until this is ready for shipment, but until then we’ll be able to take it for a spin.
-
KDE’s third update of its 14.12 series of Applications and Frameworks 5.8.0 are now available in Chakra’s stable repositories. With this release kde-workspace has also been updated to version 4.11.17 and kdelibs to 4.14.6.
-
-
OpenELEC
-
Since I laid my hands on the Raspberry Pi 2 (RPi2) I have been experimenting with Raspbian and various Ubuntu builds. But that’s just the starting point for my adventures with the RPi2. One distribution I have been wanting to try for a while is OpenELEC (the Open Embedded Linux Entertainment Center), an embedded operating system. This distro turns PCs into a home theatre centre. My WDTV media player is showing its age, and the RPi2 looks a suitable low cost replacement.
-
The OpenELEC development team has announced today, March 29, the seventh maintenante release of the OpenELEC 5.0 Linux kernel-based operating system for embedded devices, such as Raspberry Pi or Apple TV, transforming them into portable media centers based on the popular Kodi software, formerly XBMC Media Center.
-
The OpenELEC team is proud to announce OpenELEC 5.0.7.
OpenELEC-5.0 is the next stable release, which is a feature release and the successor of OpenELEC-4.2.
-
New Releases
-
The availability of the Beta version of the upcoming HandyLinux 2.0 computer operating system has been announced today, March 30, on the distribution’s website, which has been redesigned to match the look and feel of the OS.
-
Zbigniew Konojacki had the pleasure of announcing today, March 28, on his Twitter account that the development cycle towards the 4MLinux 12.0 computer operating system has started with the Beta release for the 4MLinux Allinone Edition, 4MLinux Core, and 4MLinux distributions.
-
On March 27, 2015, French developer Rodolphe Bachelart, the creator of the Live Voyager series of GNU/Linux distributions based on Ubuntu/Xubuntu, was proud to announce the immediate availability for download of a new computer operating system, Live Voyager X 14.04.4 LTS.
-
François Dupoux has announced today, March 30, the second maintenance release for his popular SystemRescueCd 4.5 Linux kernel-based Live CD operating system that can be used by system administrators for all sorts of system rescue and recovery tasks.
-
Screenshots
-
Arch Family
-
Last time we looked at the Manjaro Linux Cinnamon computer operating system, about one month ago, when version 0.8.12 was made available for download, it was using a default Cinnamon theme with a mix of icons borrowed from the Ubuntu Linux distribution.
-
Debian Family
-
Arne Exton had the pleasure of informing Softpedia earlier today, March 29, about the immediate availability for download of a new build (150329) of his DebEX Barebone computer operating system derived from the upcoming Debian GNU/Linux 8 Jessie distribution and built around the recently released Xfce 4.12 desktop environment.
-
All of my improvements have been committed into the various Debian packages involved, and the latest release candidate for Jessie’s debian-installer build (RC2) works just as well as my test builds on the Bay Trail system I’ve been using (Asus X205TA). Job done!
-
Derivatives
-
Canonical/Ubuntu
-
As you may know, Canonical has started working at Dekko, its own email client for Ubuntu Touch, using the lightweight Trojita email client as code-base.
-
-
Canonical has struck a three-year deal with Ericsson to power up the Ericsson’s Cloud System platform with the Ubuntu operating system.
-
Ubuntu 15.04 (Vivid Vervet) is almost here and the developers are mostly done with the development, but the kernel team still has some time for various updates. In fact, the Linux kernel has been updated to a newer version.
-
Flavours and Variants
-
Not only are the Linux Mint developers working on the operating systems, they are also making sure that third-party developers have a say in their project as well. That is why they have started to work on a new project called “mint-dev-tools,” which is aimed specifically at devs, as the name implies.
-
-
Phones
-
Android
-
LG has launched one of its new curved mid-range smartphones in India, the LG Spirit, listing it on its country-specific website at Rs. 14,250. The company has not yet announced availability details for the smartphone.
-
The popular Video LAN Client may finally have a stable release for Android, but that doesn’t mean it can’t be improved. The 1.2 update adds support for audio playlists, which was apparently missing from the previous releases. Unfortunately due to the limitations of M3U files (the default playlist type for the desktop version of VLC) it’s tricky to simply copy your playlists from your computer to your phone. You’ll probably need to set them up manually in the app, as below.
-
Verizon is re-seeding the Google Android 5.0 (Lollipop) OS update, for Samsung Galaxy S5 users who have subscribed to its wireless network services in the US.
-
After the Nexus devices, Motorola is rumored to be next in line to receive the Android 5.1 Lollipop update. And with news that the Android 5.1 Lollipop notes already up at the Motorola website, it seems practically imminent that the Moto X will be getting the updated Android OS soon.
-
A new Android 5.1 Lollipop CM12.1 custom ROM has been made available to the Samsung’s 2014 flagship smartphone, Galaxy S5.
-
Owners of the 2014 Moto G in the U.K. are now receiving the handset’s latest Android 5.0 Lollipop software. The release brings lots of new features and improvements, including Google’s gorgeous new Material Design overhaul.
-
Verizon customers with a Galaxy S5 are finally getting Lollipop again, almost two months after the update began its rollout and was subsequently pulled. In addition to visual improvements, the update brings numerous new features.
-
According to a report published this weekend, the new version of TouchWiz that is found on the Samsung Galaxy S6 and Samsung Galaxy S6 edge could be made available to the Samsung Galaxy Note 4 when the phablet receives its Android 5.1 update. The first Samsung devices to get the Android 5.1 update will be the Galaxy S6 and Galaxy S6 edge. Keep in mind that none of this has been confimed by Samsung and is all speculation at this point.
-
-
Unlike a smartwatch, A high-quality traditional watch doesn’t need to be recharged on a daily basis. Also, it will likely be perfectly useful decades after its purchase, while a smartwatch isn’t likely to endure the tests of time very well. But can you change a classic watch’s face? Nope, we don’t think so.
-
While Mesa is talked about as being able to be built for Google’s Android operating system to run these open-source graphics drivers on Android devices with OpenGL ES support, in reality there’s a lot left to be desired.
Over the years there’s been a handful of developers working on Android Mesa support to let the popular open-source graphics drivers run over there — from the Intel driver now that they’re using HD Graphics within their low-power SoCs (rather than PowerVR), AMD has made a few steps toward Android netbook/laptop devices with Radeon graphics, and we’re starting to see Gallium3D drivers for Qualcomm Adreno (Freedreno) and the Raspberry Pi (VC4) where there’s interest from Android users. This year as part of Google Summer of Code we also might see a student focused on Freedreno Android support.
-
Two Technologies’s LTE-ready “N5Print” handheld runs Android on a Snapdragon 800 and has a built-in printer plus Smart Card, magstripe, and barcode support.
Early smartphones were modeled in part on field-service handhelds, which in turn have increasingly imitated smartphones. This has been especially true in recent years as the product category has migrated from Windows Mobile and CE (and to a lesser extent plain Linux) to Android. In the past, handhelds, which are often available in commercial, as well as similar, but more robust military models, have trailed the current smartphone technology by several years. Yet, we’re seeing and more Android handhelds that rival high end smartphones, such as Arbor’s quad-core, 5.5-inch Gladius 5.
-
After the One M9 that was announced earlier this month, it looks like there are more devices from the Taiwanese manufacturer than everyone expected.
First on the list is the One M9 Plus, which is already expected to make an appearance in an April 8 event in China.
-
One of the major modifications in Android’s newest system update, revolves around the ‘quick settings’ menu. For those who aren’t aware, sliding down the notifications bar twice(or once with two fingers), brings up a quick settings menu, within which one can toggle settings like screen brightness, WiFi, Bluetooth, a flashlight, airplane mode, auto rotate settings, location, screen casting etc. Additionally, in Android 5.0, activating a specific toggle led to it being added to the quick settings menu, the first time they’re activated. In Android 5.1 however, it is possible to hide these icons with a long press.
-
While yesterday I was talking about many Intel Broadwell improvements landing in Coreboot, the new Git activity today for Coreboot is about 64-bit ARM.
-
I’ve written about the potential for open source in China several times, and the same can be said about India. Here’s some big news on that front, just announced by the Government of India’s Department Of Electronics & Information Technology [.pdf]:
-
India has said it will use open source software in all e-governance projects, though it did not rule out the use of proprietary software to meet specialized requirements.
-
The government on Sunday announced a policy on adoption of open source software, which makes it mandatory for all software applications and services of the government be built using open source software, so that projects under Digital India “ensure efficiency, transparency and reliability of such services at affordable costs”.
-
In a move sure to delight iOS and Android developers, Facebook has launched React-Native, an open source, cross-platform JavaScript framework for building mobile applications. Announced Thursday at the company’s F8 developer conference, the framework is based on React, another open source JavaScript framework Facebook released two years ago to help developers build user interfaces for Web projects.
-
The Innovative Technology Partnerships Office at NASA’s Goddard Space Flight Center in Greenbelt, Maryland, announced the release of its core Flight System (cFS) Application Suite to the public. The cFS application suite is composed of 12 individual Command and Data Handling (C&DH) flight software applications that together create a reusable library of common C&DH functions.
-
Events
-
In a departure from prior Plumbers tradition, we are pleased to announce not a Development Tools Microconference, but rather a set of Development Tools tutorials, including interactive tutorials, demos, and short presentations. Topics include Coccinelle (Julia Lawall), testing and debugging tools (Shuah Khan), issues with copying and pasting Linux kernel code (Michael Godfrey), and LLVM/clang and the Linux kernel (Behan Webster).
-
OSCAL (Open Source Conference Albania) is the first annual international tech conference in Albania organized by the open source community in Albania to promote software freedom, open source software, free culture and open knowledge.
-
CMS
-
Version 4.2 of WordPress, the world’s most popular web software that allows anyone to create beautiful blogs and websites in minutes, is getting closer with the recently released Beta 3 version that brings over 65 changes. The new version is available for download here.
-
BSD
-
For years now, Linux has been all the rage. But in recent times, there have been murmurings among some veterans — long-time users — after the introduction of systemd, the init system that seems to overstep its boundaries.
-
Public Services/Government
-
Proxy FatturaPA [1], an eInvoicing software solution co-financed by the Autonomous Province of South-Tyrol (Italy), is made public using the GPLv3 free software licence. The software is developed by Link.it, a IT company based in Pisa.
-
Openness/Sharing
-
-
Open Hardware
-
Facebook showed plans last week for drone aircraft that beam lasers conveying high-speed data to remote parts of the world.
As powerful as that sounds, Facebook already has something that could be even more potent: a huge sharing of its once-proprietary information, the kind of thing that would bring a traditional Silicon Valley patent lawyer to tears.
-
Programming
-
Security
-
Finance
-
On Wednesday afternoon, PayPal reached a settlement with the US Treasury Department, agreeing that it would pay $7.7 million for allegedly processing payments to people in countries under sanction as well as to a man the US has listed as involved in the nuclear weapons black market. The company neither confirmed nor denied the allegations, but it voluntarily handed over its transaction data to the US Department of Treasury’s Office of Foreign Assets Control (OFAC).
-
The Natural Resources Defense Council recently put out an alarming press release claiming the Xbox One is causing consumers to waste an aggregate of $250 million annually in energy costs. The culprit: the “instant on” mode that draws significant power 24 hours a day, even when the system is supposedly “off.”
The NRDC put out the release in an effort to convince Microsoft to turn off this “instant on” setting by default, or to at least offer an option to turn it off on the system’s initial setup (as it does in Europe). Until Microsoft takes that step, though, we thought we’d bust out the old Kill A Watt power meter and confirm just how much energy our consoles are wasting when they’re not in use, and offer you some tips on how to avoid that potential waste.
-
PR/AstroTurf/Lobbying
-
President of the Xinhua News Agency Cai Mingzhao and his Associated Press (AP) counterpart Gary Pruitt discussed cooperation between the two news outlets in the new media era on Friday at the Xinhua head office in Beijing.
Xinhua and the AP should forge a strategic cooperative relationship, Cai said, expressing the wish that the two news agencies will expand cooperation onto a wider range of areas.
Xinhua has been turning out omni media products integrating texts, pictures and videos, and reducing costs through application of technologies to meet the new demand of its clients, Cai noted.
-
Censorship
-
The government has introduced a bill that will allow copyright holders to apply for court orders forcing ISPs to block access to pirate websites.
Communications Minister Malcolm Turnbull today introduced the Copyright Amendment (Online Infringement) Bill 2015.
“Existing copyright law is not adequate to deter a specific type of infringing activity, which is the facilitation of the online infringement of copyright owners’ content… by online operators,” the minister said, introducing the bill into the lower house.
“There are a number of foreign-based online locations that disseminate large amounts of infringing content to Australian Internet users.”
If the bill becomes law rights holders will be able to apply to the Federal Court for an injunction that will force an ISP to block a site.
-
Privacy
-
The NSA in no way went “cold turkey” in 2011. Starting in 2009, just before it finally confessed to DOJ it had been violating collection rules for the life of the program, it rolled out the SPCMA program that allowed the government to do precisely the same thing, from precisely the same user interface, with any Internet data accessible through EO 12333. SPCMA was made available to all units within NSA in early 2011, well before NSA “went cold turkey.” And, at the same time, NSA moved some of its Internet dragnet to PRISM production, with the added benefit that it had few of the data sharing limits that the PRTT dragnet did.
That is, rather than going “cold turkey” the NSA moved the production under different authorities, which came with the added benefits of weaker FISC oversight, application for uses beyond counterterrorism, and far, far more permissive dissemination rules.
That AP’s sources claimed — and AP credulously reported — that this is about “cold turkey” is a pretty glaring hint that the NSA and FBI are preparing to do something very similar with the phone dragnet. As with the Internet dragnet, SPCMA permits phone chaining for any EO 12333 phone collection, under far looser rules. And under CISA, anyone who “voluntarily” wants to share this data (which always includes AT&T and likely includes other backbone providers) can share promiscuously and with greater secrecy (because it is protected by both Trade Secret and FOIA exemption). Some of this production, done under PRISM, would permit the government to get “connection” chaining information more easily than under a phone dragnet. And as with the Internet dragnet, any move of Section 215 production to CISA production evades existing FISC oversight.
-
Mr Wainwright said that in most current investigations the use of encrypted communications was found to be central to the way terrorists operated.
-
Of the 10,000-plus staff at the Government Code and Cypher School during World War II, two-thirds were female. Three veteran servicewomen explain what life was like as part of the code-breaking operation during World War II.
-
Civil Rights
-
San Francisco Sheriff’s deputies have been organizing jail inmate fights and gambling on the outcomes, according to the city’s public defender.
At a hastily-arranged press conference Thursday, Public Defender Jeff Adachi said that deputies at the city’s jail at the Hall of Justice were involved in setting up gladiator-style fights and betting on who would win.
“I can only describe this an an outrageously sadistic scenario,” said Adachi.
-
Adachi said the ringleader in the fights was Deputy Scott Neu, who was accused in 2006 of forcing inmates to perform sexual acts on him. That case was settled out of court.
-
It doesn’t happen often, but a judge has called out police officers for using a non-existent offense — “contempt of cop” — to justify the use of force against a detained person. Multnomah County (OR) Judge Diana Stewart cleared 16-year-old Portland resident Thai Gurule of several charges brought against him after he was pummeled and tased by police officers for… well, basically for responding angrily to a somewhat derogatory gesture.
-
A Multnomah County judge Thursday found a 16-year-old boy not guilty of all criminal charges filed against him after a violent tussle with Portland police last year on a North Portland sidewalk.
Circuit Judge Diana Stuart ruled that Thai Gurule, a Roosevelt High School sophomore, didn’t resist arrest. He also didn’t strangle and assault police officers, she said.
-
Saudi blogger Raif Badawi has spoken for the first time since being jailed and sentenced to 1,000 lashes to say it was ‘miraculous’ that he had survived the first 50.
Badawi was arrested in 2012 for offences including insulting Islam, cyber crime and disobeying his father (a crime in Saudi Arabia).
-
Michigan cops pulled a man over for a minor traffic violation, proceeding to yank him out of his car and brutally abuse him, including one officer who placed him in a chokehold and punched him repeatedly while another officer kicked him and a third officer tased him several times.
Inkster police say they were only trying to protect themselves from a man who threatened to kill them.
But a police dash cam video shows they approached him at gunpoint, then yanked him out of the car without provocation on the evening of January 28, 2015.
-
My son Matt has seen the ugly and inhumane side of US jails and prisons.
-
Internet/Net Neutrality
-
Now that the FCC is the subject of several lawsuits, and its leader, Chairman Tom Wheeler, was dragged in front of Congress repeatedly to answer the same battery of inanity, it’s worth checking in to see how the agency is feeling. Is it confident that its recent vote to reclassify broadband under Title II of the Telecommunications Act will hold?
-
With either an ISP lawsuit or a 2016 party shift the only way to kill our new net neutrality rules, neutrality opponents have some time to kill. As such, they’re in desperate need of somewhere to direct their impotent rage at the foul idea of a healthier Internet free from gatekeeper control. Step one of this catharsis has been to publicly shame the FCC for daring to stand up to broadband ISPs in a series of increasingly absurd and often entirely nonsensical public “fact finding” hearings. Step two is to push forth a series of editorials that tries to rewrite the history of the net neutrality debate — with Netflix as the villainous, Machiavellian centerpiece.
-
Intellectual Monopolies
-
Copyrights
-
When I grew up, file-sharing was already rampant. But we didn’t have any Internet. We had a so-called Sneakernet. And it was actually quite comparable in sharing efficiency – not just over large distances.
-
With bots performing all sorts of intellectual property policing these days, fair use considerations are completely off the table. Nuances that can’t be handled by a bot should theoretically be turned over to a human being in disputed cases. Unfortunately, dispute processes are often handled in an automated fashion, leading to even more problems.
-
The MPAA and RIAA are backing a new copyright curriculum showing kids how to become “Ethical Digital Citizens.” After public pressure the curriculum was edited to include fair use principles, but a leaked MPAA email shows that there’s more fair use in the lesson plans than Hollywood wanted.
-
Infamous torrent site The Pirate Bay has a new European block to contend with after a judge in Spain handed down a ruling against the site today. Local ISPs now have 72 hours in which to block the site, the first instruction of its type under the country’s so-called Sinde Law.
-
City of London Police and US Immigration and Customs Enforcement, Homeland Security Investigations underlined their relationship this week with the signing of a Memorandum of Understanding. Focusing on IP crime, the agencies collaborate to suspend domains, shut down file-sharing sites, and arrest uploaders.
-
A draft of new legislation aimed at stopping Aussie consumers accessing ‘pirate’ sites has been made available this morning. The amendments, which contain criteria that could see hundreds of sites blocked by ISPs, is believed to have been reworded to ensure that VPN services don’t become caught in the dragnet.
Permalink
Send this to a friend
03.29.15
Posted in Europe, Patents at 12:56 pm by Dr. Roy Schestowitz
Summary: Benoît Battistelli’s right-hand man is characterised as suspected of corruption in European Parliament questions
THREE WEEKS ago, while I was still in southeast Asia, several people in Twitter and via E-mail told me that Techrights had been cited by European Parliament.
A link to a European Parliament question from MEP Dennis de Jong indeed cited Techrights. “For your information,” told us one person (among more who told us about it, including Florian Müller), “Techrights is referenced in footnote no. 2″ (see below).
Titled “Rights of staff and ethical standards at the European Patent Office,” the list of questions to the European Commission from MEP Dennis de Jong (whom we mentioned here before) could very well address some core issues; these need to be answered. “The footnotes contain a reference to an article by Techrights,” told us a source, noting that Benoît Battistelli’s right-hand man is “suspected of corruption” (Dennis de Jong’s words). Here is the English version of the questions:
E-002507/2015
Parliamentary questions
16 February 2015
Question for written answer to the Commission
Rule 130
Dennis de Jong (GUE/NGL)
Subject:
Rights of staff and ethical standards at the European Patent Office
Reports are emerging of an unpleasant working environment and staff intimidation at the European Patent Office (EPO). Further information can be found on the EPO Staff Union website[1]. Because of the importance of the EPO for EU patents legislation, the Commission cannot afford to ignore the problem.
1. Does the Commission still intend to work together with the EPO on the single European patent?
2. If so, what guarantees have been or will be given to the Commission regarding respect for the trade union and other rights of EPO staff?
In addition to the rights of staff members, a number of ethical issues are also arising within the EPO, including the recruitment and dismissal of senior officials. For example EPO President, Benoît Battistelli, has succeeded in dissolving the Audit Committee and replacing a number of executives with a team of his own choice that is suspected of corruption[2].
3. What guarantees has the Commission obtained to satisfy it regarding the integrity of the EPO?
_____________
[1] http://www.suepo.org/public/news
[2] See for example the ZAMP affair and controversies surrounding other questionable practices
http://techrights.org/2015/02/11/zeljko-topic-kopcic-and-sanader
For justice to be upheld corrupt officials need to be held accountable and staff needs to have its rights restored, then protected. █
Permalink
Send this to a friend
Posted in Europe, Patents at 12:30 pm by Dr. Roy Schestowitz
Summary: Questions that targeted the Dutch Minister of Justice amidst EPO abuses against staff and a shameful failure to enforce a court’s decision
WE HAVE MISSED some very important developments due to absence (holiday), but fortunately enough we have loyal readers who sent us material in the interim, chronicling the earlier stages of the Dutch scandal which Battistelli had stepped into.
“For your information,” said one source, “[f]ollowing the attempt of the Netherlands Justice Minister to prevent execution of the recent judgment against the EPO, two members of the national parliament (Tweede Kamer) have now put a series of questions to the Minister (see here). The European Patent Office (EPO) sure paid attention to the following questions, put forth to the Netherlands’ Minister of Justice by Members of Parliament. As we shall soon find out (or at least cover later this week), there was a cover-up supported by crooks.
“An approximate translation,” said our source, “is given below.
“Both members are from the Labour Party (PvdA) that currently forms a coalition government with the Liberal Party (VVD).”
For context, based on our source (see the original PDF which is in Dutch): “In July 2014 they posed the earlier questions referred to in Question 2 which were answered in August. On that occasion, the answers mainly referred to the EPO’s immunity and the possibility for its employees to appeal to the ILOAT. Interestingly, the minister of social affairs answering those questions did seem to agree, referring to Art. 20 of the Protocol on Privileges and Immunities, that the EPO should comply with relevant Dutch legislation. However, the Dutch labour inspection could do nothing without permission of the EPO’s president.”
Here are the questions put to the Netherlands Minister of Justice by Members of Parliament:
Question 1. Are you aware of the article “Opstelten: Judicial ruling does not apply to European institution” ? (Volkskrant – 26 February 2015)
http://www.volkskrant.nl/politiek/opstelten-bureau-mag-vakbond-weren~a3873491/
Question 2. Do you remember the earlier questions regarding the working conditions at the EPO? Is it true that the tense situation continues to exist, including the restriction of the right to strike?
Question 3. Is it true that the EPO refuses to revoke the controversial measures in accordance with the appeal court’s judgment? If yes, what are the reasons therefor?
Question 4. Is it true that you are not willing to enable the judgment’s execution as is usual in The Netherlands? If yes, can you explain your position? What is the legal basis of your power to prevent the judgment’s execution? How often have you made use of this power in the last five years?
Question 5. On which legislation and international treaties does your decision to block the judgment’s execution rely? Have you considered a more dynamic application of the existing legislation?
Question 6. Can you give an overview of recent European and Dutch jurisprudence relating to conflicts between immunity of international organisations and judgments of domestic courts?
Question 7. What is your reaction to the opinion of experts that your position is at odds with the rule of law and that you prioritise immunity over human rights? What is your reaction to the statement that this erodes the authority of the courts? What is your reaction to the statement that this leads to a further worsening of the existing problem of international organisations that place themselves above the law?
Question 8. What do you mean when you say that the matter has “our attention” and “that of other member states”? What does this attention consist of and what is it aimed at?
Question 9. Is it possible that one of the parties appeals to the Hoge Raad (Dutch Supreme Court) or that “cassation in the interest of the law” is requested? Do you intend to request cassation in the interest of the law?
Question 10. Have you taken note of the recent ILO agreement between employers and employees regarding the right to strike and ILO Convention 87? Can you explain how the situation at the EPO relates to ILO Convention 87?
“Battistelli’s reaction to the Dutch court decision,” jokes our source (“just for fun”), would be something like the following:
- “Je m’en fous!” which means “I don’t give a damn!”
- “L’Office c’est Moi” which means “The Office, that’s ME.”
We eagerly wait to share some press articles (translations take time to produce and process) about embarrassing news that led the Battistelli and the EPO to a frantic retreat. Probably as means of saving face only — for we have no evidence of practical changes — they now acknowledge of some staff rights, at least the very least a right to organise. It wouldn’t have happened without political involvements across Europe. █
Permalink
Send this to a friend
Posted in News Roundup at 11:48 am by Dr. Roy Schestowitz
Contents
-
Applications
-
After 15 years, application developers are still using ActiveState’s Komodo IDE.
Tools to build websites and applications change over time, but one tool that has stood the test of time is ActiveState’s Komodo IDE (integrated developer environment). This week ActiveState released Komodo 9, continuing the legacy of the IDE that began its life 15 years ago.
-
Instructionals/Technical
-
Games
-
It was only in January that we saw signs of Shadow Warrior being ported to Linux, and it’s officially due next week! Get ready for some beautifully frantic and brutal action.
-
Well there goes my Tuesday night. Outlast, one of the scariest games ever made is releasing for Linux on Tuesday the 31st of March!
-
Spirits of Xanadu is a creepy mix of exploration and adventure that was just released, and I decided to take an early look to see if it’s worth your time.
-
The game was released originally some years ago, and with the latest updates they added in Linux support.
-
-
Guild Software announced that Vendetta Online, a 3D space combat MMORPG (Massively multiplayer online role-playing game) for Linux, Mac, Windows, Android, and iOS, has been updated on March 27 to version 1.8.330.
-
Desktop Environments/WMs
-
GNOME Desktop/GTK
-
The highly anticipated GNOME 3.16 desktop environment for Linux kernel-based operating systems has been announced on March 26, 2015, and has been declared by the GNOME development team as the best GNOME release yet. Of course, we wanted to give GNOME 3.16 desktop environment a try and see for ourselves the new features, apps, and improvements.
-
-
A large part of Google’s OS success hasn’t been because of its awesomeness. No. Frankly, we think nothing speaks louder than the almighty dollar in this world. But both are “free,” right? So this is tie? Not really. Although Android is technically free since Google doesn’t charge device makers for it, there are costs associated with getting devices “certified.” Oh, yeah, and then there’s Apple and Microsoft, both of which get healthy payouts from device makers through patent lawsuits. Microsoft reportedly makes far more from Android sales than Windows Phone sales. You just generally don’t see the price because it’s abstracted by carriers. Chrome OS, on the other hand, actually is pretty much free. A top-ofthe-line Chromebook is $280, while a top-of-the-line Android phone full retail is usually $600. We’re giving this one to Chrome OS because if it’s generally cheaper for the builder, it’s cheaper for you.
-
New Releases
-
Kodi 14.2 was released today as the last planned point release in the 14.x series. Next stop is the Kodi 15 “Isengard” release!
-
The Kodi development team, through Nathan Betzen, had the pleasure of announcing today, March 28, the immediate availability for download of the second and last maintenance release for Kodi 14 (codename Helix), before they continue with the development cycle for the upcoming release, Kodi 15, dubbed Isengard.
-
This release has the same features as the basic version of 4MLinux, but it also includes 4MLinux Printing Suite (CUPS 2.0.2, SANE 1.0.24, Xpdf 3.0.4, Ghostscript 9.15) and 4MLinux QtPack (Qt 4.8.6 and 5.4.0, QupZilla Git-2014-02-18, SMplayer r6737).
-
Screenshots
-
Red Hat Family
-
Software company Red Hat Inc (NYSE:RHT) surged more than 11% on Thursday and hit a new 52-week high after reporting quarterly results that the market clearly liked.
-
-
The overall health and vibrancy of the enterprise technology sector and the open source community in general appears to be reflected in the financial results of one of its leading lights, Red Hat Inc.
-
Debian Family
-
-
The Debian Installer team had the pleasure of announcing on March 27 that the second Release Candidate (RC) version of the Debian 8.0 “Jessie” installer is now available for download and testing. The RC2 version of the installer brings a great number of improvements and fixes.
-
Derivatives
-
Canonical/Ubuntu
-
Flavours and Variants
-
The Zentyal development team was proud to announce today, March 27, the immediate availability for download of their Zentyal Server 4.1 open-source operating system that is natively interoperable with Microsoft’s Exchange Server and Active Directory (AD) protocols.
-
-
Phones
-
Android
-
-
Chinese smartphone maker Xiaomi’s Redmi 1S did extremely well because of its low price point and powerful specs. Clearly, the company knows how to make a good, cheap phone.
-
Google’s Nexus 5 Android 5.1 Lollipop update was first released more than two weeks ago. Since then, the update’s trickled out to some users but not all of them. With a Nexus 5 Android 5.1 Lollipop upgrade on the minds of many users, particularly those dealing with Android 5.0 problems, we want to take a look at what we expect from the Nexus 5 Android 5.1 release going forward.
-
Google’s Nexus 7 Android 5.1 Lollipop update was first released nearly three weeks ago. Since then, the update’s trickled out to some Nexus 7 users but not all of them. With a Nexus 7 Android 5.1 Lollipop upgrade on the minds of many users, particularly those dealing with Android 5.0 Lollipop problems, we want to take a look at what we expect from the Nexus 7 Android 5.1 release going forward.
-
-
-
-
Plex, the popular media server application, has just received a major update on Android. Version 4.0 brings a revamped user interface with Material Design enhancements, support for Plex Home, and increased access to Android TV.
-
Google finally unveiled the latest Android 5.1 build for its Nexus 5 and Nexus 6 smartphones yesterday, just a week after the mobile operating system for the Nexus 6 was updated. The new factory image for the 5.1 version of Android was given the build number LMY47I, and it is expected to roll out soon.
-
While Android 5.0 Lollipop OTA release dates are still hard to come by for many flagship Android devices manufactured by third party OEMs, Motorola has been one of the swiftest to get its devices the latest Google OS possible.
-
Roughly five months after the release of Android 5.0 Lollipop and the Nexus 9, and Google’s now released a few small updates as well as a bigger bug fixing Android 5.1 Lollipop update. We’ve seen countless Nexus devices all get updated to Android 5.1 Lollipop, but those with the latest Nexus 9 tablet are still stuck waiting, but it should be coming soon.
-
Is it a “deal alert” if the cheapest option is still way more than most people want to pay? Probably not, but if you’re in the market for Pioneer’s first car stereo head units equipped with Android Auto, you can save some considerable cash anyway. The new models have been heavily discounted on Amazon almost immediately after being released, often by hundreds of dollars. For example, the top-of-the-line AVIC-08100NEX, with a wallet-pounding suggested retail price of $1400, is going for just $934 on Amazon.
-
-
The Motorola Moto X has had two iterations with the first generation being released in 2013, and the next gen or second gen having been released last year in August/September. This has led to fans of the Moto X wondering when the generation or 2015 model is on the way. Fortunately, Motorola’s president has given us a hint of the Motorola Moto X 2015 version release date. There has also been recent news on the Android L Update for the first and second generation Moto X.
-
Events
-
The 2015 Linux Plumbers Conference organizing committee is pleased to announce that the registration for this year’s conference is now open. The conference will be taking place in Seattle, Washington, USA, August 19th through August 21st. Information on how to register can be found on the ATTEND page. Registration prices and cutoff dates are also published in the ATTEND page. As usual, contact us if you have questions.
-
Web Browsers
-
Chrome
-
Tucked away in the settings area of mobile Chrome, there’s an option to reduce how much data you use by having Google compress websites before loading them. The feature, known as Data Saver, made its way over to the desktop version of the browser sometime this week.
-
Oracle/Java/LibreOffice
-
BSD
-
The HAMMER2 file-system has been slow to mature since being announced three years ago, but now at least there’s a man page for HAMMER2.
-
Project Releases
-
What’s the point of releasing open-source code when nobody knows about it? In “Release Notes” I give a round-up of recent open-source activities.
-
Openness/Sharing
-
Open Data
-
Open Hardware
-
You can buy a dongle with a weird industrial connector that fits under the dash of any car on the road for $15. This is just a simple ODB-II transceiver meant for reading error codes and turning a Crown Vic into a police interceptor. There’s a lot more to the CAN Bus than OBD-II; robots and industrial control units, for instance, and Hackaday alum [Eric] has developed an open source tool for all things CAN.
-
Programming
-
Over the time I started to get more and more requests to have python-gammu working with Python 3. Of course this request makes sense, but I somehow failed to find time for that.
-
Health/Nutrition
-
What did concern the young student was the amount of misinformation available on the internet, most of which he believes is fear-based and inaccurate.
“For someone that doesn’t have a science background they would have a hard time vaccinating because there’s a lot of scary information. It’s fear mongering, no other way to put it and I’ll believe in vaccination while the weight of evidence is in favour of it, or someone proves otherwise,” he said.
-
Webb reported that tons of cocaine were being shipped into San Francisco by supporters of the CIA backed Contras, then distributed down to LA to a Nicaraguan, who then on sold it to street vendors. He also alleged this epidemic was having a disproportionate affect on African Americans.
Gary Webb’s career was destroyed as a result of these investigations, and is now the subject of a new DVD called “Kill the Messenger’.
-
Security
-
-
Worried that you might get compromised by hackers? The bad news is that the rest of the internet might know before you do
-
Over the past several years mainstream news outlets have conveyed a litany of cyber doomsday scenarios…
-
It turns out that American smartphone owners are not great at protecting their privacy. In a new report from security firm Lookout, 34 percent of American mobile users who claimed to be the most aware of privacy risks didn’t even set a pin or passcode on their phone. Another 35 percent downloaded apps from unofficial marketplaces, which is a great way to get malware on your phone. The results come from 1,012 U.S. respondents found through an online surve
-
Defence/Police/Secrecy/Aggression
-
U.S. and Israeli politicians often claim that Israel’s bombing of Iraq in 1981 significantly set back an already-existing Iraqi nuclear weapons program. The truth is almost exactly the opposite. Harvard Physics Professor Richard Wilson, who visited the ruins of Osirak in 1982 and followed the issue closely, has said the available evidence “suggests that the bombing did not delay the Iraqi nuclear-weapons program but started it.” This evidence includes the design of the Osirak reactor, which made it unsuitable for weapons production, and statements by Iraqi nuclear scientists that Saddam Hussein ordered them to begin a serious nuclear weapons program in response to the Israeli attack.
-
When I lived in China, there was a story going around about a China Airlines flight in which both the pilot and the co-pilot had left the cockpit and then, on their return, found the door locked. They reportedly got a fire ax, and with the whole planeload of freaked out passengers watching in horror, started wailing in the metal door. The co-pilot then turned, and seeing the panic developing, calmly drew the curtain across the aisle, hiding their work from view. The axe’s bashing continued until they broke the latch and got back to the controls.
-
The United States could supply Kiev with ‘not offensive’ weapons if the Minsk agreements on Ukrainian reconciliation fail, US Department of State spokesperson Jen Psaki said Wednesday.
-
Latin America does not depend solely on exports from extra-regional powers for military equipment. On the contrary, the region boasts its own thriving domestic weapons industry. The crown jewel of Latin America’s defense industries is arguably Brazil’s, which has made a name for itself by domestically producing military equipment for export. Case in point is the Super Tucano, a light military aircraft that can be utilized for either training or combat operations, which is produced by the Brazilian aerospace conglomerate Empresa Brasileira de Aeronautica (EMBRAER) and enjoys significant prominence in the field. According to the latest headlines, the Portuguese-speaking nation is predicted to have a good year in weapon sales, bolstering Brazil and Latin America in terms of capital and relevancy in the global arms market.
-
Almost all wars that are currently under way in the world are targeting Muslims. Just about every bomb, every drone, every prison, every cage, every orange jumpsuit are produced for Muslims. Look around carefully; all the world’s intelligence services target Muslims. Even more, Muslims are driven to war and destruction at the hands of other Muslims.
-
-
The head of the CIA’s Counterterrorism Center, who presided over the agency’s drone campaign and directed the hunt for Osama bin Laden, is being removed from his post, officials said, a watershed moment as the CIA turns its focus to a new generation of extremist threats.
-
For years, the Americans saw President Ali Abdullah Saleh a key ally in the fight against al-Qaeda. He allowed his air bases to be used by US drones to strike at the movement’s operatives, and gladly received Western aid in development cash and arms supplies.
Yet according to claims in a United Nations report last month, one of the first things Mr Saleh did when his three-decade rule was threatened by the 2011 Arab Spring was strike a secret deal to give an entire southern province to al-Qaeda. The more he could portray Yemen as falling into militant hands, he calculated, the more the West want to keep him in office at all costs.
-
General Dempsey and his colleagues may be right. Current levels of Pentagon spending may not be able to support current defense strategy. The answer to this problem is right before our eyes: cut the money and change the strategy. That would be acting in the name of a conception of national security that was truly strategic.
-
The U.S. military insists its drones and other high-tech gadgets can kill “bad guys” with an unmatched precision. But these assassination weapons may just be the latest example of putting too much faith in the murderous technology of war, as Andrew Cockburn explains in a new book reviewed by Chuck Spinney.
-
Bombs dropped by unmanned remote-controlled drones have become routine forms of warfare, allowing the US to pick off people it deems unworthy of life within a complex and secretive chain of command that has almost no public accountability. The ACLU just sued the Obama Administration to reveal the details of how and why people are targeted by drones. Particularly since some of those people are US citizens.
-
I dread the morning news for it is as sure as the rising sun that the Muslim subject is everywhere: dead, maimed, bombed and bloody. Muslims are keeping the journalistic enterprise afloat by sheer madness of actions committed in the name of Islam. No news day is a good day but these are rare and far between for if it bleeds it leads and daily the Muslim wound is deepening and gushing profusely.
-
The US military no longer does war. It does assassinations, usually of the wrong people. The main victims of the US assassination policy are women, children, village elders, weddings, funerals, and occasionally US soldiers mistaken for Taliban by US surveillance operating with the visual acuity of the definition of legal blindness.
-
It seems like a no-brainer: If we could win a war by having an engineer in the United States simply push a button rather than by putting thousands of troops in harm’s way, we should embrace the new technology, right? But in Elaine Romero’s drama “Graveyard of Empires,” the answer is more complicated than a simple affirmative.
-
-
-
Imagine a future in which a competitor assassinates you via a robotic spider. That’s one way to see new technology’s potential.
-
Frightening but never fear-mongering, the information supplied by the authors of The Future of Violence posits a tomorrow full of techno-threats demanding discerning vigilance.
-
Nowhere can I find any article in the corporate news media asking what role the US’s massively unpopular campaign of bombings and drone-fired missile attacks on alleged terrorists — attacks that have killed countless civilians, and that have also included wholly erroneous massacres of innocents such as wedding caravans — has played in the creation of a situation that is likely to become a bloody civil war. This in a country that already endured one such catastrophe lasting from roughly 1964 – 1994. We’re talking about a generation’s worth of bloodletting, both between tribes, and between a north dominated by the US-puppet Saudi monarchy, and a south supported by the Soviet Union and, for many years, its alley, Egypt. The idea that the US would casually take actions that could re-ignite such a horror in a place that had to be seen as a tinderbox is simply appalling.
-
Once hailed by President Barack Obama as a model for fighting extremism, the U.S. counterterrorism strategy in Yemen has all but collapsed as the country descends into chaos, according to U.S. and Yemeni officials.
-
Yemen’s descent into chaos has undermined the US campaign against Al-Qaeda there, forcing Washington to abandon a strategy once touted as a model for counter-terrorism efforts.
-
Fifty years after the U.S. ground invasion of Vietnam began, we look back at the 1968 My Lai massacre, when American troops killed hundreds of civilians. Journalist Seymour Hersh broke the story of the massacre and cover-up, winning a Pulitzer Prize for his work. But Hersh never actually went there — he interviewed soldiers stateside. Forty-seven years later, he recently traveled to My Lai for the first time, which he documents in a new article for The New Yorker, “The Scene of the Crime: A Reporter’s Journey to My Lai and the Secrets of the Past.” Hersh joins us to discuss how he exposed the massacre nearly five decades ago and what it was like to visit My Lai for the first time.
-
Factual information is out of fashion. American society now devalues it.
-
Britain became known as America’s poodle.
-
Rosa Brooks’ article in Foreign Policy is called “There is no such thing as peacetime.” Brooks is a law professor who has testified before Congress to the effect that if a drone war is labeled a proper war then blowing children apart with missiles is legal, but that if it’s not properly a war then the same action is murder.
Rosa Brooks has apparently come to see the problem with that distinction. How can a secret presidential memo in a drawer somewhere, that she and her colleagues have empowered to determine whether of not an action is part of a war, actually decide on the legitimacy of sending hellfire missiles into houses and restaurants, the behavior of futuristic gangsters on steroids?
-
President Barack Obama’s decision to maintain troop levels in Afghanistan through 2015 is partly to bolster counterterrorism efforts in that war-torn country, including the CIA’s ability to conduct drone strikes, The New York Times reported on Wednesday.
-
President Obama has again delayed the withdrawal of U.S. troops from Afghanistan. Obama had vowed to remove half of the 10,000 troops currently in Afghanistan in the coming months. But following a request from visiting Afghan President Ashraf Ghani, Obama announced he will leave 9,800 soldiers at least through the end of 2015. Obama said the United States will still meet its goal to consolidate forces in Kabul and remove all but 1,000 forces by the end of his term in early 2017.
-
-
-
Antiwar actions called Spring Rising, focusing on the 12th anniversary of the criminal U.S. invasion and occupation of Iraq and continued war in Afghanistan, were held in Washington, Los Angeles, San Francisco, Minneapolis and other cities around the United States. Spring Rising was initiated by Cindy Sheehan, anti-war activist and mother of U.S. Army Specialist Casey Sheehan who was killed in Iraq.
-
Although most news outlets sanitize it, the United States is, as the Reverend Dr. Martin Luther King, Jr. said in 1967, the greatest purveyor of violence on the planet. This is manifested by drone strikes, which in the last ten years have killed at least 5,000 people, only an estimated 150 of whom were the actual targets; the remainder were ‘collateral damage’; by the bombing of suspected ISIS sites in Iraq; bombing of Syria; financial and military support for the apartheid regime of Israel; continued war against Afghanistan, and several other examples. Nothing has changed in decades; the statement about violence was true when Dr. King said it, it had been true for years before and it remains true today.
-
A number of recent studies have questioned the wisdom and effectiveness of drone strikes, yet the targeted bombings remain one of the central tools of the U.S. war on terrorism.
The U.S. has recently shifted focus towards radical hotspots such as Yemen, but the vast majority of drone strikes have taken place in North Waziristan, a mountainous region on the Pakistan-Afghanistan border.
A Stanford University study in 2012 undertook a thorough examination of the effect of drone strikes on the local population and found that, rather than reducing terrorist ranks by taking out top Taliban and al-Qaida leaders, drones tended to serve as a recruitment tool.
In many cases, it turned neutral citizens into radicals.
“Before the drone attacks, we didn’t know (anything) about America,” one Waziri told researchers. “Now everybody has come to understand and know about America. … Almost all people hate America.”
-
The top risk from war is nuclear holocaust. That danger continues to grow with active U.S. assistance. The second worst thing a U.S. president can do about war is grab more war powers and pass them on to all future presidents. In that regard, President Obama has outdone President Bush. Lying to Congress is now totally routine: Congress and the United Nations can simply be ignored. Secrecy has mushroomed. President Obama picks out men, women, and children to murder from a list on Tuesdays. The public, the Congress, and the courts have no say and often no knowledge. President Obama has dramatically increased U.S. weapons sales abroad — the U.S. being far and away the top supplier of weapons to regions that the U.S. public thinks of as inherently violent.
-
If Amnesty International is seen as one of the “most prestigious” international NGOs, it is also thought to harbor “a consistent institutionalized bias against Israel.” It is particularly interesting, then, that Amnesty this week released a report blaming Palestinians for a much-publicized incident that resulted in the deaths of Palestinian children and other civilians during last summer’s war between Hamas and Israel.
-
As the United States begins bombing the Iraqi city of Tikrit and again delays a withdrawal from Afghanistan, a new report has found that the Iraq War has killed about one million people. The Nobel Prize-winning International Physicians for the Prevention of Nuclear War and other groups examined the toll from the so-called war on terror in three countries — Iraq, Afghanistan and Pakistan. The investigators found “the war has, directly or indirectly, killed around one million people in Iraq, 220,000 in Afghanistan and 80,000 in Pakistan. Not included in this figure are further war zones such as Yemen. The figure is approximately 10 times greater than that of which the public, experts and decision makers are aware. … And this is only a conservative estimate.” The true tally, they add, could be more than two million. We are joined by two guests who worked on the report: Hans von Sponeck, former U.N. assistant secretary-general and U.N. humanitarian coordinator for Iraq, who in 2000 resigned his post in protest of the U.S.-led sanctions regime; and Dr. Robert Gould, president of the San Francisco Bay Area chapter of Physicians for Social Responsibility.
-
Only days after President Obama announced that troops would remain in Afghanistan through 2015, a new study reveals the massive cost of war. Through its campaigns in Iraq, Afghanistan, and Pakistan, the US may be responsible for the deaths of millions.
-
Arab coalition warplanes bombed rebel camps in Yemen today in a second straight day of strikes led by Saudi Arabia, which accused Iran of “aggression” across the region.
-
It seems that a day rarely passes without news of a new atrocity committed by an increasingly notorious terrorist group. And, without fail, this news is accompanied by an increase in U.S. military interventions around the world.
-
White House spokesman Josh Earnest told the press gaggle yesterday that the administration still considers Yemen a “template” for the success of its counterterrorism efforts.
-
Yet chief among the factors must be the mental flashbacks to some ghastly horror, perhaps long ago, and the question arises as to how the individual veterans view their participation in the horror.
-
This is, unfortunately, the very goal of much spin and propaganda. We rightly hold public parades to honour those who fought in Afghanistan and Iraq and to remember the dead and their families but ignore the plight of those who fled our enemies – on whose behalf our troops were supposedly there. Many of the children in detention whose plight was highlighted in the report of the Human Rights Commission, The Forgotten Children, were doubly victimised – once at the hands of our enemies the Taliban and again when they fled to us for safety.
It should also be remembered that war has its victims on both sides. Whatever we think of the Taliban and their ethics, they suffer and bleed as we do. Afghan mothers will miss their sons and Afghan lovers be torn apart by lives tragically cut short in just the same way as American and Australian ones.
-
On Friday, I concluded that modifying a civilian-looking vehicle into a military object to attack an adversary could indeed amount to perfidy during an international armed conflict. This question was triggered by Ryan Goodman and Sarah Knuckey’s post on the 2008 killing of Hezbollah’s Imad Mughniyah by the US and Israel where, among other things, they ask how using a car bomb differs from certain other means and methods of surprise attacks. I will briefly address them below.
-
-
As the US grapples with whether it should pursue a larger role in the Syrian War – and just how much military aid to give Iraqi troops battling the Islamic State – it is also trying to figure out how to avoid one of the most basic and nettlesome blunders of all: inadvertently creating a Frankenstein’s monster in the form of corrupt local power brokers.
-
There is no historical controversy as contentious or long-lasting as the North Korean and Chinese charges of U.S. use of biological weapons during the Korean War. For those who believe the charges to be false — and that includes much of American academia, but not all — they must assume the burden of explaining why the North Koreans or Chinese made up any bogus claims to attack the credibility of U.S. forces. Because they had no reason to do that.
It is a historical fact that the United States carpet-bombed and napalmed North Korea, killing nearly 3 million civilians thereby.
In other words, massive war crimes are already self-evident, and if there is any mystery, it is how historical amnesia and/or callous disregard for crimes such as those committed by the U.S. and its allies in Korea, or the millions killed by the U.S. in Southeast Asia, can go ignored today.
-
Sergei Sokolov says he doesn’t believe Russian tycoon took his own life
The 67-year-old was found hanging at ex-wife’s Berkshire home in 2013
Berezovsky had evidence of plot to topple President Putin, it is alleged
Sokolov claims Russian tycoon was killed by Western security services
An outspoken critic of Putin, Berezovsky had sent him ‘repentance’ letter
-
Call it the revenge of the nerds, Washington-style. The gun-toting F.B.I. agent and the swashbuckling C.I.A. undercover officer are being increasingly called upon to share their clout, their budgets and even their Hollywood glamour with the humble, deskbound intelligence analyst.
-
FBI’s cooperation with the CIA and NSA is better than ever, but more is needed to make the Bureau a truly global intelligence and investigative agency, says a newly released US government report on agency’s post-9/11 transformation.
-
The CIA has a history of contributing to coups in Ecuador. Back in 1963, the CIA led a coup which deposed President Carlos Julio Arosemena because he criticized the United States and supported Fidel Castro’s revolution in Cuba.
-
I don’t believe Kurdistan is a pipedream, but a real-life dream that can come true, and bring freedom to 40 million Kurds—just as the implosion of the Soviet Union ushered in freedom for fifteen nations. The Middle East is now imploding, and the possibility of a free Kurdistan looms even greater—to the chagrin of our well-meaning author, Graham Fuller, and his beloved Turkish friends.
-
The US Central Intelligence Agency will not release an updated assessment of the Malaysia MH17 flight crash because it would exonerate the Russian government from involvement, US journalist Robert Parry, known for helping expose the Iran-Contra affair, told Sputnik.
-
Wow, they really think you’re stupid.
I’m talking about all of those bought-and-paid-for radio talkers as well as the neocon nincompoops posing as conservative pundits.
They’re trying to convince you that for some reason the Saudis – you know, those people who execute apostates and who funded the 9/11 attacks – are now our allies in the fight against the Houthis in Yemen.
Do you even know who the Houthis are? Do you know where Yemen is?
-
In Ireland there is a place called Morley’s Bridge and it is located on the border between County Cork and Kerry. At this remote spot there is a plaque in memory of a local man.
-
-
CIA director John Brennan said on March 13 that the US did not want the Assad regime to collapse. Three days later, secretary of state John Kerry called for discussions with Mr Al Assad rather than, as in the past, his resignation. This was anathema until the fanatics of ISIS unleashed their terror on the region. Apart from setting most of the world against it and bringing succour to the regimes in Damascus and Baghdad that ISIS wanted to destroy, ISIS provided a haven for insane youth from much of the world. If ISIS falls, where will they go?
-
“Before the attack I was accused of exaggerating the potential costs of the war when I warned that it could end up costing as much as $100 billion,” Paul writes. Despite that criticism, Paul may have even been lowballing the total cost. Last March, Reuters estimated that the war continues to cost in excess of $1.7 trillion. And that’s not including the War in Afghanistan.
-
Eleven years after the UN mission began in Haiti, it brought dictatorship, a virulent cholera epidemic, tens of thousands of deaths, rapes of women, men and children and more jails than ever before in Haiti’s 200 year old history.
-
Have you ever undertaken some task you felt less than qualified for, but knew that someone needed to do? Consider this piece my version of that, and let me put what I do understand about it in a nutshell: based on developments in our post-9/11 world, we could be watching the birth of a new American political system and way of governing for which, as yet, we have no name.
And here’s what I find strange: the evidence of this, however inchoate, is all around us and yet it’s as if we can’t bear to take it in or make sense of it or even say that it might be so.
-
Israel killed more Palestinian civilians in 2014 than in any other year since the occupation of the West Bank and Gaza Strip began in 1967, a UN report has said.
-
The director of the CIA’s Counterterrorism Center, a dark-suited, anonymous figure known as “Roger,” is leaving the post he has held since 2006.
[...]
He led the agency’s signature program, a relentless series of drone strikes against al-Qaida whose occasional imprecision and lack of legal transparency angered many civilians in the Muslim world. But Roger himself is, by all accounts, a practicing convert to Islam, a religion he embraced upon marrying his Muslim wife.
-
The role of the leader of Iran’s elite Quds Force in directing Iraqi forces against the Islamic State is complicating the US mission against terrorism and contributing to destabilization in Iraq, the director of the CIA said Sunday.
-
But a journalist must be careful too, and I wondered if Kiriakou still felt a romantic attachment to the CIA. In a recent interview with Ken Klippenstein, he acknowledged that the war on terror is as much a war of revenge as it is a paramilitary police and espionage action designed to protect Americans from harm. He acknowledged that drone strikes have killed “dozens” of innocent people at wedding celebrations and “do more to help recruitment for groups like al-Qaeda or ISIS than anything they could do.” He even equated the Al Qaeda fighters he captured with the average American prisoner or soldier – functionally illiterate, lacking job skills, propagandized and manipulated. “So these were not hardened terrorists,” he told Klippenstein, “these were just confused young men.”
-
The office of the attorney general in Ecuador is investigating if the death of former President Jaime Roldos was an assassination of Operation Condor.
-
AS we wait for the publication of the Chilcott Inquiry into our involvement in the illegal invasion of Iraq it would appear that events in the United States have provided the evidence that George W Bush and Tony Blair made statements to justify the invasion knowing they were false.
-
-
“If the opposition marches had been organized by the CIA, they wouldn’t have been such colossal failures,” Ecuador’s president said.
-
Ecuadorean government officials charged the AFP with taking President Rafael Correa’s remarks out of context and publishing a story based on lies.
-
Ecuador has denied that leftist president Rafael Correa had accused the United States of trying to destabilise his government by infiltrating it with spies, according to an official statement.
Correa had said the US Central Intelligence Agency was trying to “wear down the government” and accused it of helping to organise opposition protests.
-
-
-
-
The use of Agent Orange constitutes a war crime with devastating effects on the people in Vietnam not only during the war but even today. The U.S. military knew that its use of Agent Orange would be damaging, but, as an Air Force scientist wrote to Congress “because the material was to be used on the enemy, none of us were overly concerned.”
Ecocide was committed when “the U.S. military sprayed 79 million liters of herbicides and defoliants over about one-seventh of the land area of southern Vietnam.” The 2008-2009 President’s Cancer Panel Report found that nearly five million Vietnamese were exposed to Agent Orange, resulting in “400,000 deaths and disabilities and a half million children born with birth defects.”
-
While the majority of the internet media presume that the US had already made its choice of oligarchs in Ukraine and has opted to support the head of state, Petro Poroshenko, the German online newspaper Deutsche Wirtschafts Nachrichten believes that Washington might still change its mind and shift the balance of power in favor of Ihor Kolomoiskyi.
-
We can take this terrible example as a metaphor for the whole “war on terror,” which has created a self-serving political culture that allows us to silently evade our national responsibility while loudly projecting collective blame onto abstract “others.” If we want a better, saner, more just future, then the “war on terror” must come to an end—and for that to happen, we must become more critical and discerning about the full spectrum of horrors that have occurred (and are still taking place) during this war. “It is part of the mechanism of domination to forbid recognition of the suffering it produces,” the German philosopher Theodor Adorno wrote. Only when we face up to our delusions and actions and stop torturing others into silence will we be able to keep ourselves out of the darkness.
-
Transparency Reporting
-
The Federal Chief Information Officers Council is taking home this year’s Rosemary Award for giving the “worst open government performance of 2014.”
-
It is obvious, almost by definition, that excessive governmental secrecy and true democracy are incompatible. If the people of a country have no idea what their government is doing, they cannot possibly have the influence on decisions that the word “democracy” implies.
-
McGovern was commenting on the Obama administration’s recent decision to cease accepting Freedom of Information Act (FOIA) requests, which stands in stark contrast to the progressive platform Obama ran on as a candidate.
-
In a bizarre, first-of-its-kind decision, a US court has dismissed a defamation lawsuit between a Greek shipping magnate and an advocacy group against a “Nuclear Iran.” The reason? Despite the fact that the case involves no government agencies, an unknown official convinced the judge that a trial could reveal critical state secrets.
-
Finance
-
According to exlusive reporting by Reuters on Friday, big Wall Street banks are so upset with Elizabeth Warren’s call to “un-rig” the economy and proposals for stronger financial regulations that discussions are underway about withholding campaign contributions to Senate Democrats as a form of “symbolic” protest against the freshman senator from Massachusetts.
-
Washington wants its allies to stay away from the Asian Infrastructure Investment Bank
-
PR/AstroTurf/Lobbying
-
While NATO puppets in eastern and central Europe are involved in a propaganda war against Russia and its May 9 Victory Day event, three US ex-ambassadors to Ukraine – Steven Pifer, John Herbst, and William Taylor – have demanded that the leaders of the UK, Germany and France should participate in a WWII Victory in Europe ceremony in Kiev, “a city where neo-Nazis and skinhead mercenaries from around Europe enjoy political and military power,” the author stressed.
-
Hillary Clinton has always had a tenuous relationship with the media. But that didn’t stop her from headlining a journalism awards ceremony Monday night.
“Some of you may be a little surprised to see me here tonight,” Clinton acknowledged. “You know my relationship with the press has been at times, shall we say, complicated.
-
Censorship
-
-
-
-
-
-
With the uproar over comic books, Congress began holding hearings. The hearings were biased. Tennessee Senator Estes Kefauver, who harbored presidential aspirations, may have conspired to discredit moderate witnesses, including two female librarians bold enough to say they thought the comic books were basically harmless.
-
Turkish journalist Aydogan Vatandas warned Friday night at the Turkish Cultural Center of Staten Island in Dongan Hills that freedom of the press in his country is under siege.
He was the guest speaker during an event titled “Democracy and Freedom of the Press in Turkey,” which explored the nation’s long and difficult history with the media – a relationship that has often included extreme censorship.
-
Omar recently wrote a short satire of the “check your privilege” fad. It was just a tongue in cheek article that described how a system of right-handed privilege was oppressing left-handed people everywhere through daily right-handed “micro-aggressions.”
The article was humorous, harmless and conservative.
In response, The Michigan Daily invoked a technicality to kick Mahmood out of his writing gig, claiming a conflict of interest. Much worse, a group of students vandalized his room, pelted the door with eggs and hot dogs, attached hateful messages calling Mahmood “scum” and told him to “shut up” and leave the school.
-
Take your pick: press conferences without questions, intimidation, threats, slander, state harassment, privileged access, and even restrictions on newsprint purchases.
These are some of the problems facing the media in Latin America, according to a group of academics, politicians, and journalists convened for the Freedom of the Press Colloquium, hosted in Montevideo, Uruguay, on Monday by the Konrad Adenauer Foundation.
-
A Mexican broadcast news journalist, fired after helping to reveal a conflict of interest scandal that embarrassed the country’s president, said her former employer tried to suppress the report before she published it on her own website.
-
-
When India banned a BBC documentary about rape, it was motivated by more than misplaced national pride. Like other examples of state censorship that bode ill for the supposedly secular democracy, this was a sop to hardline Hindu factions, says Zareer Masani
-
India’s top court affirmed people’s right to free speech in cyberspace Tuesday by striking down a provision that had called for imprisoning people who send “offensive” messages by computer or cellphone.
-
India’s supreme court has struck down a controversial law that made posting “offensive” comments on social media a crime punishable by jail.
-
A professor at the University of South Dakota is refusing calls to cancel the screening of a controversial documentary that depicts brutality against Muslim women.
The “Honor Diaries” is scheduled to be screened at the university’s annual women and gender conference on April 10. But another screening of the film that was supposed to take place Sunday didn’t happen for reasons unknown, and there is pressure from some staff and faculty members to cancel next month’s showing.
-
Following the terrorist attacks in Paris in January, including the murder of several journalists at the satirical newspaper Charlie Hebdo, we anticipated that the French government would overreact. Sure enough, recent reporting has revealed that France is censoring websites and pushing for broader surveillance powers.
-
Privacy
-
The newest toy for children from Mattel is called Hello Barbie and it can converse with your child and record the answers in real time via wifi. It saves that information in the cloud.
-
UN envoy to Libya, Bernardino Leon, proposed a unity government composed of a three-person presidential council but it also would incorporate the House of Representatives of the Tobruk-based internationally recognized government.
-
In 1958, at the height of the Cold War and long before satellite photo reconnaissance was thought possible, President Dwight Eisenhower endorsed a project called Corona.
-
A powerful bipartisan pair of senators is pressing the Obama administration over the development of spy tools that mimic cell towers in order to track people’s cellphones.
-
The top two lawmakers on the Senate Judiciary Committee are pressing the Justice Department with concerns the Central Intelligence Agency helped domestic law enforcement develop technology to scan U.S. cellphones.
-
Getting one from Index On Censorship was different. This is a group people trust. They’re establishing norms for how we should all behave in the increasingly complicated and networked world of free expression. So I took them to task in a one-sided conversation for having such terrible security norms and endangering their users. They ignored me, which didn’t shock me. When you work in internet security you get used to the world ignoring you. But I figured, the least I owe Index On Censorship, and the many other NGO, newsrooms, small companies, freelancers, and people at home is some ideas on how to improve their security practices.
-
A major security flaw in a network gateway popular among hoteliers can be exploited by hackers to launch attacks against guests by injecting malware into their downloads over unencrypted connections. Compromised gateways can also be used to infiltrate sensitive areas of a hotel’s network, such as its reservation systems, it’s claimed.
-
An examination of the server that housed the personal email account that Hillary Rodham Clinton used exclusively when she was secretary of state showed that there are no copies of any emails she sent during her time in office, her lawyer told a congressional committee on Friday.
After her representatives determined which emails were government-related and which were private, a setting on the account was changed to retain only emails sent in the previous 60 days, her lawyer, David Kendall, said. He said the setting was altered after she gave the records to the government.
-
A law bill introduced in the US House of Representatives on Tuesday seeks to abolish the Patriot Act, ban Uncle Sam from forcing backdoors into technology, and safeguard whistleblowers like Edward Snowden.
Ever since Snowden leaked top-secret files detailing the NSA and GCHQ’s global surveillance of innocent people, there have been calls for reforms – which have sparked little more than tinkering at the edges of the laws enabling the blanket snooping.
-
One would be installing so-called “backdoors” in encryption — an access point known only to law enforcement agencies. Security experts find this concept abhorrent, since cyber crooks or foreign intelligence agencies would likely exploit it.
-
-
A technology coalition headed by Apple, Microsoft, and Google urged President Barack Obama and other government officials to end the National Security Agency’s bulk collection of phone call “metadata.” In a letter addressed to the President and other key figures, the coalition, made up of privacy advocates, technology firms, and trade companies, called the NSA program “untenable,” and urged the House to move forward with reforms.
-
Under a programme called “Prism” they are keeping records of your phone’s geolocation, harvesting your metadata and tracking your browser history. They are filing and documenting your most intimate details, and as we know from whistleblower Edward Snowden, NSA workers routinely share your nude photos with their colleagues (in an office culture apparently closer to fraternity “bros” than intelligence specialists).
-
-
The Commission has also conceded before the European Court of Justice that the Harbour framework can’t ensure the data privacy of European citizens.
-
The European Commission Attorney Bernhard Schima has told the Court Of Justice of the European Union (CJEU) the US-EU Safe Harbor framework doesn’t work.
-
“You might consider closing your Facebook account, if you have one,” European Commission attorney Bernhard Schima told attorney-general Yves Bot at the CJEU on Tuesday, suggesting that personal data transferred from Europe to the U.S. isn’t necessarily protected under the U.S.-EU pact, even though the Framework should ensure data privacy and security.
-
-
Juliet Barbara, the senior communications manager for Wikimedia, agrees.
“Mass surveillance is a threat to intellectual freedom and a spirit of inquiry, two of the driving forces behind Wikimedia,” she told Truthdig. “Wikipedia is written by people from around the world who often tackle difficult subjects. Very frequently they choose to remain anonymous, or pseudonymous. This allows them to freely create, contribute and discover without fear of reprisal. Surveillance might be used to reveal sensitive information, create a chilling effect to deter participation, or in extreme instances, identify individual users.”
-
According to a filing published by the World Trade Organization Thursday, the United States is outraged by China’s proposed restrictions on US-made information technology in the banking sector – by all accounts a reaction to the disclosure of secret documents by former NSA contractor Edwards Snowden.
-
-
Want to understand why far-reaching, poorly scrutinized spying programs are dangerous? Here’s why. The Intercept and the New Zealand Herald have obtained a document showing that New Zealand used the US National Security Agency’s XKeyscore surveillance system to spy on other countries’ candidates for the World Trade Organization’s director general role. The 2013 snooping campaign searched for keywords in communications that referenced New Zealand’s own candidate (Minister of Trade Tim Groser, above), the competition and the WTO itself. Any relevant results were passed on to a “trade team” within the country’s surveillance agency, the Government Communications Security Bureau, which is rather alarming when the leadership run had nothing to do with national security.
-
Texas is home to a massive physical NSA facility that relies on the independent Texas power grid to operate. That power is provided by the country’s largest public utility, and Texas can turn it off by passing HB3916. (learn more here) It has been referred to the House State Affairs Committee.
-
A recent Pew Research Center report found that some Internet users have changed their use of social networking services, apps, email, and even search engines as a result of former National Security Agency (NSA) contractor Edward Snowden’s 2013 revelations about the government’s pervasive online surveillance. So how does your smartphone — the device that many of us find indispensable in our day-to-day lives — have the potential to expose your personal data and your online activity to government snooping? How does your mobile device protect your anonymity, and how does it leave your communications vulnerable to interception by the NSA and other intelligence agencies?
-
The new law would give French spy agencies the power to hack into computers and spy on anyone linked to a “terrorist” inquiry – without having to obtain a judicial warrant first.
-
“High-level” discussions on surveillance overhaul aren’t taking place, Rep. Adam Schiff said.
-
Of late, American and British hackers have maximized crime by encroaching to hack database of the largest SIM card selling company. They have collected million tons of data from these SIM cards and they distorted the facts. It is a well fabricated crime and it is also heinous. On the other hand, NSA and GCHQ agencies have upgraded an encrypted key to break the privacy of people. They collected the configuration of privacy codes used by Gemalto to upgrade the chips of mobile phones. So it is now easier for NSA to steal valuable information from people.
-
“NSA whistleblower Edward Snowden warned of how U.S. intelligence works with a number of E.U. countries that filter out traffic belonging to their own citizens. However, because of the number of collaborating countries, the U.S. is ultimately able to obtain data on all E.U. citizens. … Parliament members are in broad agreement that it is unacceptable for foreign intelligence services to conduct legally baseless large-scale interception, storage and monitoring of the communications data of Austrian and European citizens. To prevent this from continuing, all legal and diplomatic measures will be taken.”
-
The United Nations human rights council said it will establish a special rapporteur position to cover privacy-related issues, a move that comes in the wake of Edward Snowden’s revelations about mass surveillance programs by U.S. and U.K. agencies. The resolution, which was passed by the Geneva-based council on Thursday, was championed by Germany and Brazil, two of the countries that were allegedly most aggressively monitored by foreign espionage services.
-
The United Nations has agreed to set up a privacy watchdog in response to the growing concerns of the effects of digital technology on human rights.
In a debate yesterday, the Human Rights Council adopted four resolutions to create the mandate for a special reporter for the next three year, as well as calling on all members of the UN to support the initiative and comply with requests for information and visits.
-
Exact details about how this works in practice are thin on the ground, but we’re assuming Cisco briefs its customers about its delivery plans beforehand. At least you’d hope.
It’s also not clear if other tech firms are following Cisco’s lead on this, but we have a sneaky suspicion Royal Mail might be, given how haphazard their deliveries seem to be these days.
-
It is often argued that data retention is necessary to combat terrorism. However, data retention cannot prevent any terrorist attacks. At best it may, as its proponents claim, assist the police to find the culprits and their accomplices after an attack has already taken place.
-
Australia has passed a controversial security law that will require its internet and mobile phone providers to store customer data for two years.
-
-
-
Crikey has been covering data retention for several years, and we’ve written tens of thousands of words in that time explaining what it is, why it’s important and the threat it poses to Australians. We know that a lot of people, especially in the media, have only started to focus on the issue in recent days, so we’ve further expanded this Q&A we prepared last year to take into account recent developments and give you a one-stop document for what will be Australia’s biggest ever mass surveillance regime.
-
Israel spied on the recent US-Iran nuclear talks, alleges America. And the US knows enough about it to say it publicly because the NSA is spying on Israel, along with everyone else.
-
On some level, the reports that Israel spied on Iran-U.S. nuclear talks don’t come as a shock. Just last year, German newsmagazine Der Spiegel reported that Israel had eavesdropped on Secretary of State John Kerry during Middle East peace talks. Jonathan Pollard, who was arrested in November 1985 after passing secret documents to Israel while working as a civilian analyst for the U.S. Navy, has become a cause celebre among some Israelis.
-
Former U.S. Sen. Mark Udall gained notoriety for his vocal opposition to National Security Agency surveillance programs in the wake of the Edward Snowden disclosures of June 2013.
-
Over the last month, privacy advocates have slammed the Cybersecurity Information Sharing Act, arguing that it’s surveillance legislation hidden in a security bill’s clothing. But those protests didn’t stop a Senate committee from passing the bill by a vote of 14-1. And now they haven’t stopped the House’s intelligence committee from following in the Senate’s surveillance-friendly footsteps.
-
The House and Senate Intelligence Committee just passed a cybersecurity bill that critics argue isn’t likely to improve cybersecurity. In fact, because it undermines the privacy of electronic communications by encouraging companies to broadly share private data with the government and each other, it may actually damage cybersecurity.
-
Canada’s electronic surveillance agency has secretly developed an arsenal of cyberweapons capable of stealing data and destroying adversaries’ infrastructure, according to newly revealed classified documents.
Communications Security Establishment, or CSE, has also covertly hacked into computers across the world to gather intelligence, breaking into networks in Europe, Mexico, the Middle East and North Africa, the documents show.
-
While the NSA headlines most of Ed Snowden’s revelations of mass surveillance, the latest leaked documents reveal the Canadians are a dab hand at cyber-stuff, both defensive and offensive.
Top-secret files, published by the Canadian Broadcasting Corporation and The Intercept, show that Canuck intelligence has developed its own technology to keep government servers secure. The EONBLUE system uses a mix of malware signatures and heuristics to identify network threats and maintain communications security.
[...]
Using its own infrastructure, the CSE claims it has the ability to process 125GB of internet communications metadata per hour for intelligence, and store 300TB at a time. In 2009 it collected an average of 112,794 blobs of interesting network traffic every day, in association with “allied sources.”
-
A group of British and Israeli academics are set to participate in a £1.2 million cyber security research venture as part of the government’s “long-term economic plan,” the Cabinet Office announced on Tuesday.
The bilateral project will consist of three cross-border partnerships linking Bar-Ilan University in Tel Aviv with the University of Bristol and University College London, and Israel’s Ministry of Science and Technology with the University of Kent.
-
-
In a House Appropriations subcommittee hearing this morning on the FBI budget for the upcoming fiscal year, FBI Director James Comey was again critical of new encryption features from Apple and Google that he claims would make it impossible for law enforcement to access the contents of mobile device communications.
-
An in-house review of the FBI has found the agency failing to go far enough in its expansion of physical and cyber surveillance programs, urging the bureau to recruit deeper networks of informants and bring its technological abilities up to pace with other intelligence agencies.
-
Brazilian President Dilma Rousseff’s office says she has again been invited to make a state visit to Washington, two years after she declined a similar invitation to protest an American spy program.
-
Rousseff had originally been scheduled to make a state visit, which involves a black-tie dinner at the White House and is considered the strongest expression of friendly ties between allies, in October 2013.
-
Google and the White House manage to hook up more than the majority of married couples, having met up once a week for the past five years.
-
When Hillary Clinton learned that a committee of the U.S. House of Representatives had subpoenaed her emails as secretary of state and she promptly destroyed half of them—about 33,000—how did she know she could get away with it? Destruction of evidence, particularly government records, constitutes the crime of obstruction of justice.
-
Citizenfour is a portrait of a one person who has chosen to resist the strong arm of the state
-
Being in the latter part of my life, I surmise that the consequences of my views will be minimally felt if at all. I worry, however, for the future of my two sons, both in their late 20s, as technology employed by the NSA and other government agencies tightens the grip on their every thought and action. As we know from history, increasing monitoring of its citizens (under the banner of security) is virtually always prelude to the establishment of a totalitarian state.
-
There are two governments — a double government — operating today in the realm of national security. There’s the one the voting public thinks they control when they go to the polls — what Glennon refers to as the “Madisonian institutions.” Congress, the courts and the presidency.
And there’s the “Trumanite network,” the labyrinthine national security apparatus that encompasses the military, intelligence and law enforcement communities that Pres. Harry Truman created when he signed the National Security Act of 1947.
-
New Zealand’s ambassador to Brazil, Caroline Bilkey, has been called upon to explain leaked documents showing New Zealand’s Government Communications Security Bureau (GCSB) spied on rival candidates for the top job at the World Trade Organisation (WTO).
-
Brazil has demanded an explanation from New Zealand after reports New Zealand’s foreign intelligence agency the GCSB spied on its campaign to get Brazilian diplomat Roberto Azevedo elected as Secretary General of the World Trade Organisation in 2013 – successfully.
Brazil media have reported that New Zealand’s ambassador in Sao Paulo, Caroline Bilkey, was summoned by the Secretary General of Brazil’s foreign ministry (MRE), Sergio Danese, to explain.
-
On Tuesday, New Zealand Prime Minister John Key wrapped up a three-day visit to South Korea during which he signed a free trade agreement. As might be expected, the South Korean media covered the visit, focusing mainly on the removal of tariffs and New Zealand’s cooperation in denuclearizing North Korea.
-
An expert on computer security, Schneier has written over a dozen books in the last 20 years on the subject, some highly technical, but this one is a call to action addressed to a mainstream audience. The impetus for writing such a book, it seems, were the 2013 revelations of the NSA mass surveillance. Schneier worked with The Guardian’s Glenn Greenwald, helping in the analysis of some of the more technical documents that were leaked by Edward Snowden.
-
Today the bigger threat is from lots of “Little Brothers,” a multitude of corporations, companies, and online mechanisms that want to track your every move.
-
On Friday, Access and a coalition of civil society organizations, including the Center for Democracy & Technology, the Electronic Frontier Foundation, and New America’s Open Technology Institute, called on the Home Office of the United Kingdom to address questions about the lack of human rights protections found in its surveillance authorities.
-
When it comes to the NSA’s mass surveillance programs, however, the FISA court is not acting like a court at all. Originally created to provide a check on the executive branch, the court today behaves more like an adjunct to the intelligence establishment, giving its blanket blessing to mammoth covert programs. The court’s changed role undermines its constitutional underpinnings and raises questions about its ability to exercise meaningful oversight.
-
You don’t need to be the NSA to tap calls on Cisco’s SPA 300 and 500 IP phones: An authentication flaw allows potential attackers to do that by default.
An unpatched vulnerability in the firmware of the SPA 300 and 500 series IP phones, typically used by small businesses, could allow eavesdropping on calls.
-
Edward Snowden’s laptop and hard drive were destroyed by Guardian editors under pressure from the UK government’s secret services GCHQ
-
-
US spies operate in Switzerland without much fear of being unmasked, because Swiss intelligence, though knowledgeable and very professional, poses no threat to them, former NSA contributor Edward Snowden told Swiss TV.
-
Wizner said the growth of technology has outpaced the creation of laws to regulate how the government protects the privacy of citizens. He said people don’t realize how much data they create each day when they send text messages, make phone calls, read news online or shop online.
-
Washington’s threat to stop sharing intelligence with Berlin if it offers asylum to Snowden is either US bullying, or a convenient excuse on Berlin’s part to shift the blame for not allowing him to go onto the US, believes former MI5 agent Annie Machon.
-
If you attended the WHD.global 2015 keynote with former NSA contractor and whistleblower Edward Snowden on Wednesday morning, it is very likely that you were being watched.
“Unfortunately in many ways I am the X,” Snowden told the packed conference room at WHD.global. “I expect and accept that at this point I’m going to be scrutinized by every government and every bad actor in the world.”
-
The second in line to the throne was flown by helicopter to the headquarters of Britain’s elite spy agency for a secret visit amid fears members of the royal family could have their emails and social media hacked by spies.
-
-
“There are more devices and more types of devices, so this just gives you more ways for people to track you or hurt you,” Corman, a long-time security expert and cofounder of I Am The Cavalry, says. “What we’ve done is blindly assume that [adding software and connectivity] is always good. And we’re making really horrible, horrible choices.”
-
HP (NYSE:HPQ) is close to selling a 51% stake in its H3C Technologies Chinese networking hardware unit to state-backed Tsinghua Unigroup, the WSJ reports. Echoing an October report about HP’s sale efforts, the paper states H3C is “worth roughly $5 billion in total.”
-
The United States’ limits itself in one very narrow context. After acknowledging that the United States engages in economic espionage, DNI Clapper said in 2013: “What we do not do . . . is use our foreign intelligence capabilities to steal the trade secrets of foreign companies on behalf of – or give intelligence we collect to – US companies to enhance their international competitiveness or increase their bottom line.” This very carefully worded statement is the only admitted U.S. limit on economic espionage. Note what it permits. It permits economic espionage of foreign governments and institutions. It even permits theft of trade secrets from foreign firms. It just doesn’t allow such theft “on behalf of” U.S. firms, and it doesn’t permit the government to give the stolen information to U.S. firms.
-
‘The latest revelations about the GCSB pose a stark question: is the GCSB’s “trade team” spying on governments with whom New Zealand is negotiating international deals, especially th
e Trans-Pacific Partnership Agreement (TPPA)?’, asked University of Auckland law professor Jane Kelsey.
-
The United States’ mass surveillance of internet and phone use flies in the face of global public opinion, says Amnesty International as it published a major poll to launch its worldwide #UnfollowMecampaign.
The poll, which questioned 15,000 people from 13 countries across every continent, including New Zealand, found that 71% of respondents were strongly opposed to the United States monitoring their internet use.
-
On 24 March, the Court of Justice for the European Union (CJEU) heard argument on a case that could significantly impact, if not invalidate altogether, the Safe Harbor framework that facilitates the flow of personal data from the European Union (EU) to the US.
-
Civil Rights
-
About 85 percent of the 779 men ever held at Guantánamo are no longer there. Most left during the Bush administration. While the number of transfers has been much smaller under the Obama administration, the pace accelerated in the latter part of 2014.
-
Fidgeting, whistling, sweaty palms. Add one point each. Arrogance, a cold penetrating stare, and rigid posture, two points.
These are just a few of the suspicious signs that the Transportation Security Administration directs its officers to look out for — and score — in airport travelers, according to a confidential TSA document obtained exclusively by The Intercept.
-
Enshrined in both national constitutions and international treaties, these democratic precepts ensure that individual citizens can express their views and campaign for causes without fear of persecution or discrimination. Yet, when they were first codified during the seventeenth and eighteenth centuries’ modernising revolutions which overthrew aristocratic and priestly despotism in western Europe and North America, these fundamental freedoms were initially restricted to a minority of the population: white male property-owners.
[...]
The recent revelations by Edward Snowden and other whistle-blowers about the American empire’s megalomaniac scheme to spy upon every inhabitant of the planet have discredited ‘the West’s’ self-identification as the global champion of human rights.
-
According to media reports Petraeus plead guilty to one count of unauthorized removal and retention of classified material for which he may face up to a year in prison. His paltry sentence is a far cry from the many years of prison time that many whistleblowers face when they disclose protected information in an attempt to further the public interest. Petraeus claimed no such motive. He seems only to have wanted to help his mistress and biographer, and Panetta and Vickers shared it with a producer from Hollywood – the common thread between the three stories is that these men both leaked information for purely personal gain and each received little more than a slap on the wrist.
-
Following the late January guilty verdicts in the espionage trial of former CIA officer Jeffrey Sterling, more proof emerged — if any more were needed — that many elite mainstream journalists abhor whistleblowers and think they should go to prison when they divulge classified information.
-
Thousands of people in Canada have access to top secret government documents, but if any of them are considering following in the footsteps of Edward Snowden and leaking records to journalists, they will find comparatively few reporters in this country who are capable of protecting them.
Snowden, an NSA contractor-turned-whistleblower, leaked a massive trove of documents that revealed potentially illegal surveillance programs throughout the “Five Eyes” intelligence alliance of Australia, Canada, New Zealand, the United Kingdom and the United States. Intelligence agencies in these countries not only monitor the communications of terrorists and foreign states, they also collect private and potentially compromising information from journalists and the public at large.
However, since the Snowden leaks were made public, only a handful of reporters in Canada have taken steps to secure themselves and their sources. Many investigative reporters and even some national security reporters in Canada are not equipped with email encryption.
-
The fatal shooting of unarmed Black teenager Michael Brown at the hands of White police officer Darren Wilson in Ferguson, Missouri, not only sparked a nationwide social movement challenging police brutality, but it also amplified media scrutiny of the US legal system. One example is the recent Guardian investigation of a detention facility in Chicago’s Homan Square, where police take people for harsh, off-the-book interrogations without reading them their rights and denying access to attorneys. The facility is deemed “the domestic equivalent of a CIA black site” since suspects are effectively “disappeared.” While this is the first time Homan Square has been discussed in the mainstream press, it hardly represents anything new or unique in Chicago, or in the United States as a whole. If anything, Homan Square reflects a norm rather than a deviation from US legal and national security policy.
-
Last week New Jersey Governor Chris Christie signed into a law a bill (passed unanimously by both houses) that made his state the first to require local approval before any local law-enforcement agency can accept military equipment from the U.S. government. It won’t be the last.
Even stronger bills banning the practice, under the so-called “1033 Program” of local law-enforcement agencies dealing directly with the Department of Defense for free military equipment, are pending in Montana, Massachusetts, and Minnesota.
-
The Church Committee’s investigation revealed more about the secret, sometimes illegal, work of the nation’s top intelligence agencies than any comparable effort before or since. And it led to reforms meant to rein in the agencies and protect civil liberties, though many of those reforms were weakened in the years following the 2001 attacks on the World Trade Center and Pentagon.
-
In June 2005, a federal judge ordered the Bush administration to safeguard “all evidence and information regarding the torture, mistreatment, and abuse of detainees now at the United States Naval Base at Guantanamo Bay.” Five months later, the CIA destroyed hundreds of hours of interrogation videos of suspected terrorists Abu Zubaydah and Abd al-Rahim al-Nashiri, who were being held overseas in a network of secret CIA prisons. By the time President George W. Bush acknowledged the existence of those prisons and the prisoners were transferred to Guantanamo, the tapes were long gone.
-
“If we really care about national security and being a model for the world of justice,” Goodman says of the George W. Bush administration’s actions after 9/11, we have “to move from assessment to an accounting and to accountability.” She also elicits responses from her fellow forum participants Porter Goss, former CIA director, and John Negroponte, former director of national intelligence, about the U.S.-led Iraq War, and its use of torture.
-
On March 5, the New York–based Center for Constitutional Rights (CCR) and the European Center for Constitutional and Human Rights (ECCHR) urged a French Appeals Court to fully investigate claims by three French nationals that they were sexually and physically tortured during their detention at the Guantánamo Bay prison in 2002. But a lack of cooperation from U.S. authorities has stymied the French investigation.
-
As the Obama administration and Cuban negotiators examine the 54-year-old unilateral embargo (or “blockade” as the Cubans refer to it), one obstacle—particularly painful for Cubans and extremely important to American interests—must be addressed: Cuba’s continued presence on the U.S. State Department’s list of state sponsors of terrorism.
-
Fifty years ago tonight, following the end of Dr. Martin Luther King’s Voting Rights March from Selma to Montgomery, Alabama, Viola Liuzzo, a 39-year-old Detroit homemaker and mother of five, was shot and killed by a carload of Ku Klux Klansmen. She was the only white woman to lose her life working for the civil rights movement. Her murder helped accelerate passage of the historic Voting Rights Act.
-
In the March 2015 edition of Harper’s, a U.S. magazine, Adam Hochschild reviews a book by Karen M. Pate in which she presents her research into the CIA’s secret infiltration of the National Student Association during the 1960s and ’70s.
Hochschild, a staff writer with Ramparts at the time, became somewhat involved and confirms in his review Pate’s allegations of CIA’s involvement in the National Student Association.
-
President Barack Obama will meet with Iraqi Prime Minister Haider al-Abadi at the White House on April 14, the administration announced Monday.
Al-Abadi has expressed frustration in what he called “slowness” of the U.S.-led international coalition in providing military support against the Islamic State of Iraq and the Levant.
-
A surveillance mission was exposed last week when a Predator drone crashed in northwest Syria while spying on the home turf of President Bashar al-Assad. U.S. officials believe the drone was shot down, but they haven’t ruled out mechanical failure. Regardless, the wreckage offered the first hard evidence of a U.S. confrontation with Assad’s forces.
-
The impact of Cold War anticommunism on our national life has been so profound that we no longer recognize how much we’ve lost.
-
The leaders will celebrate the relationship between the nations developed during the 70 years since the end of World War II, according to White House Press Secretary Josh Earnest said.
-
The U.S. is ready to provide Lebanese security services with equipment and training to help them fight terrorism, Interior Minister Nouhad Machnouk said after holding talks with CIA director John O. Brennan.
-
Internet/Net Neutrality
-
CIA Director John Brennan declined Sunday to confirm or deny reports that the United States disrupted North Korea’s Internet system in December in retaliation for Pyongyang’s hack on Sony Entertainment.
North Korea’s Internet connections suffered outages for a few days in late December after U.S. President Barack Obama blamed the communist nation for the massive hack on Sony and promised a “proportional response.”
Permalink
Send this to a friend
03.28.15
Posted in GNU/Linux, Google, Microsoft at 2:59 pm by Dr. Roy Schestowitz
“Embrace and extend” manoeuvre in action
Image credit: Linux Veda
Summary: Articles in the corporate media and some analysis from smaller media sites serve to highlight the role which Microsoft plays in Cyanogen
THIS topic was covered here before (to some degree), but the severity could not be emphasised strongly enough because Microsoft is in the “extend” phase of its infamous “embrace, extend, extinguish” (EEE) manoeuvre and this time it targets Android.
In our previous posts about Cyanogen (almost a dozen of them) we highlighted Microsoft’s offers of funding to Cyanogen and Microsoft-friendly sources of financing to Cyanogen. Rupert Murdoch aside (a friend of Bill Gates and sworn enemy of Google), Twitter reportedly helps fund the Microsoft-serving actor known as Cyanogen; it is worth noting that Twitter partnered with Microsoft on translations, ads, etc.
To avoid us having to recapitulate and repeat the broad evidence connecting Microsoft and Cyanogen, consider reading articles such as:
For those who still believe that Microsoft is trying to be ‘nice’ here, see what we wrote exactly one week ago; it’s a 6-part series:
There is a new article from Jack Germain and the article is titled “Big Money Helps Cyanogen Go for Android’s Jugular”.
ECT’s Germain foolishly (if not foolishly, then it’s malicious) quotes Microsoft mouthpiece Rob Enderle regarding this Microsoft proxy, Cyanogen. It is not surprising that he comes up with phrases like: “In some developer communities, negative reactions toward Google rival the disdain usually reserved for Microsoft.”
That’s actually not true. Many developers love Google or at least accept it much more openly than they accept Apple for example. Google not only funds many FOSS projects but also runs many of its own. This article not only relays Enderle’s Microsoft-inspired talking points but neglects to mention ECT also gave Enderle its platform for a pay in the past. Very irresponsible ‘journalism’. See part 6 of the 6-parts series above. Microsoft relies on such media distortion to distract from its crimes and abuses.
“Many developers love Google or at least accept it much more openly than they accept Apple for example.”A much better article has just come from Eric Brown, who explained Cyanogen’s connection to Microsoft. He correctly noted that Samsung’s Microsoft ‘deal’ came just one “month after Microsoft and Samsung settled a longstanding royalties lawsuit” (there is a connection there).
“An acquisition,” he explains, “also remains a possibility. Like Microsoft, most of Cyanogen’s employees are based in Seattle.” It would not be shocking if some of the staff is former Microsoft staff trying to disrupt Google.
Cyanogen and Microsoft are “close to finalizing a wide-ranging partnership,” he added, citing seemingly reliable sources.
Brown’s article, “Are Cyanogen and Microsoft Ready to Stick it to Google?”, is a good and comprehensive roundup of many things we have covered. It says: “The rumor of a Cyanogen partnership with Microsoft emerged in January in a Wall Street Journal report that Microsoft would be a minority investor in the fast growing software firm. The Forbes story reports that the rumored $80 million funding round has just been completed, but did not include Microsoft. An investment may well be part of the bundling deal expected later this year, however.”
Brown also explains that “many of CyanogenMod’s 50 million users purchase Google Apps, even if they’ve just flashed it from their Android phone in order to load CyanogenMod. The open source Android clone has gained its huge following, including some 9,000 open source developer volunteers, due to its up-to-date, open source, bloatware-free Android code. Also popular are its extensive customization opportunities, better battery life, and often faster performance. The project was launched in 2009 by hacker extraordinaire Steve Kondik, who continues on as Cyanogen’s CTO.
“Mobile device vendors who pay big money to Google to pre-install the popular Google Apps have long chafed at the relationship. Google has reportedly used the apps as leverage to ensure greater control over Android or sell other Google services. Samsung’s backing of the Linux-based Tizen platform was seen as a response to Google’s app domination, although the company now appears to have slowed its push for Tizen on phones even as it continues to deploy it elsewhere.”
“Bribes and extortion don’t make Microsoft ‘nice’; they make it more evil (and arguably more dangerous) than ever before.”Cyanogen as a Microsoft proxy does not require unsound hypotheses. It’s not far-fetched at all given all the evidence, including patent extortion against Samsung and OEM partners like Dell (now directly connected to Microsoft). “A month after Microsoft and Samsung settled a longstanding royalties lawsuit,” Brown explains, “the companies expanded a partnership this week that was announced at Mobile World Congress. In addition to pre-installing Microsoft OneNote, OneDrive, and Skype on Samsung’s new Galaxy 6 phones, Samsung says it will soon bundle those apps, along with Android-optimized Office apps (Microsoft Word, Excel, and PowerPoint), on selected Samsung Android tablets. Microsoft also announced it has signed similar deals with Dell, as well as 10 other lesser known hardware partners.”
Those other hardware partners were always — as far as we can tell — subjected to patent extortion from Microsoft. Brown concludes: “It’s unclear whether that bullet may someday ride in on a deal with Microsoft that goes beyond apps to include a version of Windows Phone based on Cyanogen OS. An acquisition also remains a possibility. Like Microsoft, most of Cyanogen’s employees are based in Seattle.”
Brown does not omit context such as Microsoft’s hatred of GNU/Linux. He additionally notes: “The ironies are thick here, considering that for many years Microsoft strong-armed PC vendors into pre-installing Office, or pressured them into loading Windows on netbooks instead of Linux. Now, after Google ruined its plans to establish Windows Phone as the rival mobile platform to Apple’s iOS, Microsoft is playing the underdog game while increasingly cozying up to open source projects, including the Raspberry Pi Foundation and perhaps Cyanogen.”
We have already chastised the Raspberry Pi Foundation over this. Its response to us was sarcastic, not factual, which does make one wonder if Microsoft is indeed paying the Raspberry Pi Foundation a lot of money to do this. Bribes and extortion don’t make Microsoft ‘nice’; they make it more evil (and arguably more dangerous) than ever before. █
Permalink
Send this to a friend
Posted in News Roundup at 6:33 am by Dr. Roy Schestowitz
Links 28/3/2015: FoundationDB OSS Shut Down by Apple, European Commission Support for Free Software
Contents
-
Desktop
-
-
I’d like to make time for switching my main system but it is not there yet. What I plan to do is however use Linux on my laptop and get used to it this way. While it will take longer than a radical switch, it is the best I can do right now. Eventually though, I’d like to run all but one system on Linux and not Windows.
-
Server
-
The open-source Docker container application virtualization project turned two-years old on March 20, marking a robust period of market hype, interest and adoption. Docker was originally just the Docker-engine project started by Solomon Hykes at platform-as-a-service vendor dotCloud. The original dotCloud business has been sold, and Docker Inc. is its own business and has raised $66 million in multiple funding rounds. The project has grown to include Hykes as chief architect, Steve Francia as the chief operator and Michael Crosby as chief maintainer. In the last two years, many vendors—including Red Hat, IBM, Microsoft, VMware and Amazon—have embraced Docker technology. Other companies are creating technologies and products that extend, complement and support it. Docker needs a host OS on which to run, which has led to Red Hat’s creating Project Atomic. CoreOS and RancherOS have also emerged as purpose-built optimized operating systems for container deployment. eWEEK examines the wide world of Docker container virtualization.
-
Kernel Space
-
As I noted at the beginning of this year, open source has won, even if it’s not finished. That’s easy to show at the top end, since Linux currently runs 485 of the top 500 supercomputers in the world. But at the other end of the spectrum, data has been harder to come by. That makes a new post on Linux.com reporting on the embedded sector particularly welcome. Here’s the key finding.
-
-
Usually Greg issues a preview a few days before release. Rarely is anything wrong. Sasha did not this time. I hope nothing goes wrong…
-
-
-
While there’s been Broadwell support code within Coreboot for a number of months, pushed in the past few hours has been a lot more Broadwell code. This is likely indication that more Google Chromebooks based on this latest-generation Intel architecture should be surfacing soon.
-
Graphics Stack
-
Those with a bit of humor will love the demo NVIDIA recently used for showing off their Nouveau-based open-source graphics driver stack on the Tegra K1 SoC.
Last month at FOSDEM was a presentation on the Nouveau Tegra K1 driver stack by Alexandre Courbot of NVIDIA. In there NVIDIA talked about their great experience working on this open-source driver and engagement with the Nouveau community, which will continue for future Tegra SoCs. That aforelinked article covered all of the important details of that presentation.
-
The TITAN X is out of reach to most Phoronix readers given the $1000 USD price, but its performance is fantastic. The GeForce GTX TITAN X is home to 3072 CUDA cores and 24 streaming multi-processors and boasts a 1000MHz base clock speed and 1075MHz boost clock speed. There’s 12GB of GDDR5 video memory running at 7.0 Gbps to allow for 336.5 GB/s of bandwidth. In comparison, the GeForce GTX 980 has just 16 streaming multi-processors and 2048 CUDA cores and a modest 4GB of GDDR5 memory.
-
Applications
-
Instructionals/Technical
-
Games
-
After a successful Kickstarter campaign the new RPG game from Obsidian Entertainment entitled Pillars of Eternity, is now available to purchase via Steam and is available to play on PC, Mac and Linux systems.
-
-
-
The Shadow Warrior remake of the 1997 3D Realms’ game of the same name is seeing its native Linux release next week! The remake of Shadow Warrior has been out since 2013 by Flying Wild Hog while next week will mark its debut for Linux and OS X.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
Today’s announcement for Ubuntu 15.04 (Vivid Vervet) Final Beta also mentioned the immediate availability for download and testing of Kubuntu 15.04 Beta 2, an official Ubuntu flavor built around the modern and attractive KDE Plasma 5 desktop environment, as well as the KDE Applications project.
-
When I talk to people about our quest to make KDE Activities work, one of the things I hear most often is: “I never really understood what they are!”. There are several reasons for that, a very obvious one is: They are buggy (e.g. concerning non KDE apps).
-
While it’s possible to install ‘KDE’ software and Plasma desktop on most Linux based distributions, I have picked the distros which offer Plasma as their default desktop environment. These ‘KDE-based’ distros offer a better Plasma experience compared to those where you can ‘also’ install KDE.
At some point in time I have used each of these distros as my primary OS except for Mageia and Open Mandriva, which I tried but never used due to uncertainty around their future.
-
It was a bit of a slow news day today without any big item overtaking the rest. Several folks celebrated the Ubuntu 15.04 Beta release and Danny Stieben discussed reasons for GNOME’s resurgence. Martin Brinkmann asked “What is keeping you from switching to Linux?” Simon Phipps today discussed the challenges ahead for LibreOffice Online and Swapnil Bhartiya posted a slideshow of the top nine KDE distributions.
-
It didn’t take nearly as long to count the votes for our desktop poll as it did for last week’s distro poll, mainly due to the fact that not as many of you voted, but also because there aren’t nearly as many desktop environments and window managers as their are Linux distros. Also, unlike the distro poll, there was a clear cut winner instead of a virtual tie.
-
GNOME Desktop/GTK
-
On March 26, we announced the release of the GNOME 3.16 desktop environment, and we unveiled its awesome features, including updated and new applications. However, we completely missed one app: GNOME Builder, a powerful IDE (Integrated Development Environment) for GNOME.
-
When the team behind GNOME came out with GNOME 3, which included the infamous GNOME Shell, the most popular desktop environment of the time saw a sharp decrease in users. And honestly, that trend is pretty easy to explain. When GNOME 3 initially came out, it was incomplete, buggy, and foreign. The concepts behind GNOME Shell were never before seen on a desktop system, and lots of users who were used to panels/taskbars and menus didn’t like the rather dramatic changes.
-
-
Suppose you’re a developer and want to experiment with Drupal 7.7 or WordPress. Maybe you’re a K-12 teacher or university professor and want to teach your students Moodle administration or how to create some network-attached storage. You could download a tarball from Drupal.com or WordPress.org and configure on your own desktop or laptop, but then you would also need to configure Apache and MySQL too. All of these operations take effort and know-how that you may or may not have time for.
-
New Releases
-
Zentyal Development Team is proud to announce Zentyal Server 4.1, a new release of the Zentyal Server with native Microsoft® Exchange protocol implementation and Active Directory interoperability.
-
Preserving current 0.5 line, the new Q4OS version applies security patches and solves several minor issues. Desktop Profiler application has been slightly tweaked as well.
-
Screenshots
-
Red Hat Family
-
Debian Family
-
-
Debian 8.0 “Jessie” is still working towards its long-awaited release.
-
Derivatives
-
Canonical/Ubuntu
-
Good news Ubuntu lovers!! Yes, the second and final beta of Ubuntu 15.04, code named Vivid Vervet, is now ready for download. The final and stable version will be out on April 23, 2015. This beta release includes images from not only the Ubuntu Desktop, Server, Cloud, and Core products, but also the Kubuntu, Lubuntu, Ubuntu GNOME, Ubuntu Kylin, Ubuntu Studio and Xubuntu flavours. Ubuntu 15.04 will be supported for 9 months for Ubuntu Desktop, Ubuntu Server, Ubuntu Core, Kubuntu, Ubuntu Kylin along with all other flavours.
-
NFV and OpenStack expertise are at the core of the deal that will see Ubuntu become the host operating system for Ericsson’s cloud offering.
-
-
A two pair of technology giants has teamed up on Network Function Virtualization offerings. Oracle is using Intel’s Open Network Platform, and Canonical and Ericsson are teaming up to target the telecom cloud space. Both pairings are focusing their efforts atop OpenStack.
-
Canonical, through Adam Conrad, had the pleasure of announcing today, March 26, the immediate availability for download and testing of the Ubuntu 15.04 (Vivid Vervet) Final Beta operating system for personal computers and laptops. Users are urged to test the distribution and report major issues in order for the Ubuntu developers to fix them before the final version gets out in less than one month from now.
-
Flavours and Variants
-
After announcing the Ubuntu 15.04 Final Beta and Kubuntu 15.04 Beta 2, it is now time to take a look at the second and last Beta release of the upcoming Ubuntu Kylin 15.04 (Vivid Vervet) operating system that has been designed especially for the Chinese Ubuntu Linux community.
-
The Ubuntu GNOME 15.04 Beta 2 has been released on March 26 along with the Ubuntu 15.04 Final Beta, Kubuntu 15.04 Beta 2, Ubuntu MATE 15.04 Beta 2, Xubuntu 15.04 Beta 2, Lubuntu 15.04 Beta 2, Ubuntu Kylin 15.04 Beta 2, and Ubuntu Studio 15.04 Beta 2 operating systems.
-
Martin Wimpress had the pleasure of announcing today, March 26, the immediate availability for download and testing of the Ubuntu MATE 15.04 (Vivid Vervet) Beta 2 operating system, a development release that includes assorted new features and bugfixes.
-
After announcing the release of the Ubuntu 15.04 Final Beta, Kubuntu 15.04 Beta 2, Ubuntu Kylin 15.04 Beta 2, and Ubuntu MATE 15.04 Beta 2, it is now time to take a quick look at the Xubuntu 15.04 Beta 2 operating system, which has been unleashed earlier today.
-
Kubuntu Vivid Beta 2 is out. This is the first major distro to ship with Plasma 5 so it’ll be the first time many people get to see our lovely new desktop. Scary.
-
Lubuntu 15.04 is the last in our screenshot tour articles related to the Final Beta a.k.a. Beta 2 of the Vivid Vervet development cycle. Lubuntu 15.04 Beta 2 offers one of the most lightweight desktop experiences and it is now powered by Ubuntu 15.04’s Linux 3.19.2 kernel.
-
-
OpenEmbed launched a 52 x 28mm “SOM9331″ COM for IoT that runs OpenWRT Linux on a MIPS-based Atheros AR9331 SoC, and offers WiFi and extended temperatures.
-
Phones
-
Tizen
-
The following is a video recorded at FOSDEM 2015, entitled Porting Tizen Common to open source hardware devices, presented by Philippe Coval and Leon Anavi, in which it Introduces you to the Tizen platform development and provides you the technical details with regards to the Tizen:Common porting efforts to Allwinner A10/A20, Rockchip RK3188/RK3288 ARM SoC and MinnowBoard MAX with Intel Atom CPU. The Tizen Project will be discussed and information provided about U-Boot, Yocto project, the Linux-Sunxi and Linux-Rockchip, Minnowboard communities.
-
-
Android
-
-
-
Most of Facebook’s announcements at its F8 developer conference this week were iOS-centric, but today, the company also released three new open source tools for Android developers.
The first is a performance segmentation library called Year Class that is meant to help developers quickly figure out what kind of device a user is running.
-
Samsung’s Galaxy S6 and Galaxy S6 Edge flagship phones are finally here. They are beautiful phones (unlike the uninspired Galaxy S5). The S6 Edge, with its unique curved screen, is especially eye-catching.
-
iOS and Android have been battling for mobile supremacy for years. But iOS still offers some features that Android doesn’t have. If Google…er…borrowed those features, they might add real value for many Android users.
-
While the unit carries an MSRP of $700, Amazon’s deal marks it down from its previous list price of $849.99. While it’s still a tad expensive, the discount makes it a bit easier to get some Android Auto into your car.
-
Early this morning, the new HTC One M9 and Samsung Galaxy S6 became available for pre-order. As a mobile phone fanatic, it was very difficult for me to choose one over the other.
-
The Asus ZenWatch is a surprise. It is comfortable, looks great and works well. The heart rate monitor is well suited to infrequent checks, and the screen is bright and can be clearly read in sunlight.
-
Today, Android powers about 85% of all smartphones globally, while the iPhone accounts for only 11%. It’s making a push into wristwatches, cars, and TVs. It’s not hard to envision a time when Android will be in every single device from stove and thermostats to toothbrushes.
-
If there’s a poster child for the challenges facing open source security, it may be Werner Koch, the German developer who wrote and for the last 18 years has toiled to maintain Gnu Privacy Guard (GnuPG), a pillar of the open source software ecosystem.
Since its first production release in 1999, GnuPG has become one of the most widely used open source security tools in the world, protecting the email communication of everyone from government officials to Edward Snowden.
-
Compared to Q4 2013, last quarter’s US online sales rose 14.6 percent to a staggering $79.6 billion dollars. This accounted for 6.7 percent of the total US retail sales market. Major trends fueling this growth include the proliferation of mobile devices, faster online checkout flows and improved fulfillment practices.
-
Allegedly, Apple has recently acquired FoundationDB, a company specialized in fast and cost-effective database software.
-
Earlier this week, Ben Kepes reported here on Forbes that Apple acquired enterprise database startup FoundationDB. As often happens in these situations, FoundationDB stopped accepting new customers for its paid services. But the company’s code repository was also emptied or made private, leaving third party developers dependent upon open source code associated with this database with no official place to get it. Some have been quick to suggest this is a good reason not to build products or services that rely upon open source software. It would be a mistake to believe them.
-
Travis Jeffery is a software developer who’s been using a database system called FoundationDB for a project at his startup. Earlier this week, he noticed that the software had been pulled from the web. He soon received a terse email confirming that the software had been taken down intentionally, but little else. “We have made the decision to evolve our company mission,” it read. “And as of today, we will no longer offer downloads.”
-
Apple’s acquisition of FoundationDB is a warning to all: contribute to the open-source projects you love, or risk losing them.
-
Bazel, the tool that Google uses to build the majority of its software has been partially open sourced. According to Google, Bazel is aimed to build “code quickly and reliably” and is “critical to Google’s ability to continue to scale its software development practices as the company grows.”
-
Events
-
For the past three years, KDAB has had the honor and pleasure to bring you the European Qt Developer Days Conference in Berlin.
-
Linux is expanding its reach, promising to play a significant role in the Internet of Things. But the open source software needs more attention to interoperability, security and its kernel, according to experts at the Embedded Linux Conference here.
-
Web Browsers
-
Mozilla
-
Anyways, to the point, I hate to open a can of worms but when I heard this news I thought back to this same time last year and remembered how gung ho OkCupid was over Mozilla’s appointment of Brendan Eich because of his personal beliefs and that they ultimately decided to block all Firefox users.
-
SaaS/Big Data
-
Yesterday, I reported on Red Hat delivering its fourth quarter and year-end financial results, which were strong. There were some interesting forces driving the numbers, though. In particular, Red Hat is now a couple of years into a strategic shift toward facilitating OpenStack cloud computing for enterprises, and CEO Jim Whitehurst pointed to that fork in the road as beginning to pay off. Here are some more detailed glimpses into Red Hat’s increasingly significant cloud business.
-
We’re now in the stretch run for the OpenStack Kilo platform release.
-
When it comes to security, what does it take to make Hadoop “enterprise ready?”
-
Icelandic cloud provider GreenQloud, which has been a major open source cloud supporter, has informed customers it is closing its public cloud service. The company will go on focusing on selling Apache CloudStack cloud called QStack to be managed by others. The public compute and and storage services are ending in October 2015.
-
Databases
-
Adding PostgreSQL coverage to the solution has enabled IT operators to manage the three most popular open source databases – MySQL, MongoDB and PostgreSQL – from one ClusterControl platform. The upgrade also boosts increased monitoring capabilities and encryption between MySQL and MariaDB to protect costumers from losing sensitive data.
-
Oracle/Java/LibreOffice
-
The announcement of LibreOffice Online this week came as welcome news to many people concerned about the paucity of online options for those who want software freedom with their online document solutions. But can open source SaaS succeed?
The open source community needs a truly open alternative to current mainstream online document collaboration solutions, all of which are compromised by lock-in. LibreOffice Online will offer the full flexibility to deploy in-house or hosted cloud instances while using true open standards for its documents.
-
Ordinarily, I’m all for diversity in free software projects. However, I make an exception in the case of LibreOffice and OpenOffice. The sooner they become a single project, the better.
In other cases, I’m slow to accept arguments against duplication of projects. Combining projects does not automatically make for greater efficiency or quicker development; especially in the beginning, personalities can sabotage or even reverse any gains.
-
FSF/FSFE/GNU/SFLC
-
So the next time you’re trying to convince someone of the important of free and open software, and they chime in with the fact that don’t want to change it, try pointing out that by using proprietary code they’re limiting their options for getting it fixed when it inevitably breaks.
-
Project Releases
-
Version 7.10.1 of the Glasgow Haskell Compiler (GHC) is now available as a major release for this open-source project.
-
Public Services/Government
-
The Government of India is soon coming out with an “Open software policy” according to Union Minister for Telecommunications and IT, Ravi Shankar Prasad. Speaking at the 3rd Web Ratna Awards ceremony, the Minister mentioned that under the new policy, all proposals for e-governance projects will include a mandatory clause for considering open source software as a preferred option.
-
Software providers such as Microsoft and Oracle are aggressively targeting public sector customers with licence “audit reviews” in a bid to plug falling subscription revenue, according to research.
Over one-third of the 436 councils surveyed across the UK have been subject to at least one software licence review in the last 20 months, according to a report from software licensing costs advice company Cerno.
-
Just a few days ago it was anounced publicly that not only is the Pleio community is hard at work on improving the platform to raise the bar yet again, but that Kolab will be a part of that. A joint development project has been agreed to and is now underway as part of a new Pleio pilot project.
-
The European Commission will create a level playing field for open source software when procuring new software solutions, it announced on 27 March. Evaluation of open source and proprietary software will take into account their total cost of ownership and exit costs.
-
Equal treatment in procurement
Contribution to communities
Clarification of legal aspects
Open-source and interoperable Commission-developed software
Transparency and better communication
-
NHS ENGLAND HAS been talking about the latest strand of its move toward open digital solutions to provide interoperability between the myriad departmental systems that are proprietary, incompatible or just plain disparate.
The organisation is to adopt Vendor Neutral Archive (VNA) as a standard format to store everything from X-rays to scanned letters and patient notes, in order to avoid lock-in with proprietary systems and allow easy sharing of data across the NHS.
-
Openness/Sharing
-
-
In the growing hubbub around student data privacy and security, it can be hard for edtech companies to identify concrete steps to demonstrate their commitment to protecting student information. But last week, Clever made a commitment to transparency by making their privacy policies open source, posting the policy on GitHub so anyone can track changes.
-
A new 3D-printed drone called the ELF VR Nano is available for pre-order on Indiegogo and for download on Thingiverse. That’s right: you can either buy the product and receive pre-printed parts or you can simply print it yourself. It’s one of the purest open source hardware plays I’ve seen in a long while and it just goes to show how cool it is to be able to print your own plastic parts at home.
-
Open Hardware
-
A lot has changed since the first Arduino board arrived a decade ago. Today, the Arduino family has grown to include more than two dozen low-cost, open hardware boards and an active community of more than 250,000 tinkerers.
-
The Open Source Virtual Reality (OSVR) platform has partnered with more than 20 research institutions and universities for its OSVR Academia program. As part of the initiative, OSVR Academia provides hardware development kits and support to universities, so they are able to develop VR-based software.
-
-
-
Investigators didn’t find a suicide note or claim of responsibility at the home of Germanwings co-pilot Andreas Lubitz, but they did find a torn-up sick note from the day of the plane crash, German authorities said Friday.
-
The object will now be tested to see if it will illuminate why Lubitz locked the captain out of the cockpit and engaged and reset the autopilot to take the doomed plane from 38,000 feet to just 100ft.
-
Science
-
Najla Bulous wants to change the face of Silicon Valley.
The daughter of immigrants from Mexico and Egypt, Bulous is a Harvey Mudd College-trained software engineer. After graduation in May, she’s starting a new job at a Silicon Valley technology giant.
Bulous knows she isn’t the stereotypical Silicon Valley geek. She didn’t study computer science until college and never intended to major in it. But after just one introductory course, Bulous was hooked on the challenge of mastering problems with lines of code.
Now this 21-year-old is not just planning a career in technology. She wants a hand in re-engineering the culture of Silicon Valley to be more inclusive of women and people from underrepresented groups.
-
Security
-
Social engineering and weaponised USB sticks help the “world’s most famous hacker” to take control of target PCs
-
The popular GitHub website suffered a minor service outage on March 26 due to a distributed denial-of-service (DDoS) attack. At the moment, the website appears to work properly on our end, but some users still report intermittent connectivity with Git operations.
-
-
-
Defence/Police/Secrecy/Aggression
-
Since the Arab Spring, many Middle Eastern countries have fallen into political chaos like dominoes. This week’s explosion of conflict in Yemen is just the most recent example. Though many of these conflicts are based on local grievances, they are being exacerbated by the involvement of the region’s larger states, and by the United States.
-
Transparency Reporting
-
This attitude is documented and questioned in a piece by John Hanrahan, a former Washington Post reporter who later headed the Fund for Investigative Journalism, that appeared on the pro-whistleblower Expose Facts site (3/24/15) and was reposted as “Journalists Who Hate Whistleblowers” by Consortium News (3/25/15).
-
Privacy
-
A group of technology companies, non-profits and privacy and human rights organizations have sent a letter to President Barack Obama, the director of national intelligence and a wide range of Congressional leaders, calling for an end to the bulk collection of phone metadata under Section 215 of the USA PATRIOT Act.
-
The demise of RadioShack left techies with one less place to congregate and buy obscure batteries and soldering equipment. And if that wasn’t bad enough, now the bankrupt company is trying to sell off the devotees’ data.
-
The story of your life in metadata is an open book. It paints a picture of where you went, who you spoke with, how long you were there for. What were you doing talking on the phone to the sexually transmitted infections clinic? What were you doing on the street corner where the man was murdered last night?
-
Little-noticed change to judicial rules gives the FBI greater powers to conduct remote searches, and the ‘zombie bill’ CISA is on the fast track to a Senate vote
-
Ever since Edward Snowden leaked thousands of top secret documents to journalists laying bare its most guarded secrets, the NSA, a government agency that was once known as the No Such Agency for its love for secrecy, has been thrown in the media limelight.
-
Speaking before the House of Representatives Appropriations Committee on Wednesday, FBI Director James Comey urged Congress to pass legislation requiring tech companies to install backdoors in their encryption programs. These backdoors would allow government agencies to easily intercept the electronic communications of American citizens, the District Sentinel reports.
-
Civil Rights
-
The goal of the Norwegian penal system is to get inmates out of it.
-
What punishment should Sgt. Bowe Bergdahl receive for allegedly deserting his post in Afghanistan? The answer comes by asking another question: What punishment has been handed out to American generals and politicians whose incompetence caused far more bloodshed and grief than anything Bergdahl did?
A key thing about justice is that it should be fair — people should be punished no matter their rank or title. The problem with the bloodlust for more action against Bergdahl — beyond his five years of horrific suffering as a Taliban prisoner — is that inept generals, rather than being court-martialed or demoted or reprimanded, have been rewarded and celebrated despite their dereliction in Iraq and Afghanistan.
-
Starting weeks before Islamic militants attacked the U.S. diplomatic outpost in Benghazi, Libya, longtime Clinton family confidante Sidney Blumenthal supplied intelligence to then Secretary of State Hillary Clinton gathered by a secret network that included a former CIA clandestine service officer, according to hacked emails from Blumenthal’s account.
-
When Hillary Clinton learned that a committee of the U.S. House of Representatives had subpoenaed her emails as secretary of state and she promptly destroyed half of them – about 33,000 – how did she know she could get away with it? Destruction of evidence, particularly government records, constitutes the crime of obstruction of justice.
-
As a candidate for president, Barack Obama promised that his would be the most “transparent” administration in American history. It hasn’t worked out that way. Instead, it may be the most secretive, threatening the very fabric of representative democracy, which depends upon the American people and their elected representatives in Congress knowing exactly what government is doingin our name and with our taxpayer dollars.
-
State Department spokesdrone Jen Psaki is now just straight out making things up to explain away the questions surrounding Clinton and her email, and the State Department’s complicity.
Her “misstatements” can now be debunked with a click of a mouse, which we will do in a moment.
The devil is in the details on these things, as no one expects to find a notarized document that reads “Yes, I did it all to hide embarrassing stuff from the Freedom of Information Act because dammit it is my turn to be president, signed, Hillary”).
So let’s drill down.
-
-
According to an independent report commissioned by the Colombian government and FARC rebels, United States soldiers and military contractors are responsible for sexually abusing at least 54 children between 2003 and 2007 — but they were not prosecuted because of immunity clauses in the American diplomatic treaties with the government.
-
For what it’s worth, Muslim communities increasingly agree that the FBI — and the federal government generally — should not be in the business of CVE. But that’s largely because the government approaches it with the same view Comey does: by thinking immediately of his analysts thinking dark thoughts at Quantico. So if some agency that had credibility — if some agency had credibility — at diverting youth (of all faiths) who might otherwise get caught in an FBI sting, I could support it moving someplace else, but I’m skeptical DHS or any other existing federal agency is that agency right now.
While the Review doesn’t say explicitly in this section what it wants the FBI to be doing instead of CVE, elsewhere it emphasizes that it wants the FBI to do more racial profiling (AKA “domain awareness”) and run more informants. Thus, I think it fair to argue that the Ed Meese-led panel thinks the FBI should spy on Muslims, not reach out to them. Occupation-style federal intelligence gathering, not community based.
-
At just 150 pounds, it was hardly fair to pit Ricardo Palikiko Garcia against an opponent well over twice his size. But Garcia had to fight him — or else he’d allegedly face torture.
Running away was not an option for the inmate locked inside a San Francisco jail.
Like the gladiators of old, Garcia and others were forced into pugilistic matches, local authorities said. Four sheriff’s deputies then placed bets on their bouts.
Permalink
Send this to a friend
03.27.15
Posted in Deception, Free/Libre Software, Microsoft, Security at 8:53 am by Dr. Roy Schestowitz
Microsoft is ‘open’ like BP is ‘green’ (openwashing follows greenwashing tactics)
Summary: Microsoft’s charm offensives against Free/libre software are proving to be rather effective, despite them involving a gross distortion of facts and exploitation of corruptible elements in the corporate media
SIX days ago we published a series of six articles which are listed in order below:
The issue discussed in part 1 receives a lot of media attention, even from corporate media (in this case, GOP-leaning media). To quote one such report: “The feature we’re concerned with is called Secure Boot, and it’s designed to protect you: The installed OS becomes locked to the hardware itself, and if any other OS attempts to interfere (like a low-level malware app for example) then the system simply won’t start up. OEMs were ordered to make Secure Boot optional with Windows 8 but it looks like they are going to be given the opportunity to make it mandatory in Windows 10.”
“Microsoft is pretending to be Open Source because of new policies that require procuring Open Source software, e.g. in India.”What the corporate media gets wrong is the part about security. It’s not “designed to protect you”. In fact, much of the recent press coverage serves to show that UEFI reduces security in many cases. Some media sites/conglomerates such as IDG already explained (last year) how it can be used for remotely bricking PCs (pretty much at hardware level). We have covered several examples over the past 3 years, so evidence continues to mount. IDG’s Microsoft booster Andy Patrizio wrote: “I suspect if you are smart enough to use Linux, you are smart enough to shut off Secure Boot in the UEFI.”
That’s not an excuse. It also perpetuate myths about GNU/Linux being “hard to use”. “Still,” he continues, “it’s a PR hit for Microsoft, a company that has been earning a lot of goodwill lately.”
That’s utter nonsense as well. As pointed out in part 6 above, Microsoft just manipulates the media (or relies on boosters like Patrizio) to make it seem as though it changed its attitude. As we’ve pointed out in 3 recent articles, there are changes in tendering processes worldwide. Microsoft is pretending to be Open Source because of new policies that require procuring Open Source software, e.g. in India. Yesterday KV Kurmanath planted a Microsoft puff piece in The Hindu Business Line, relaying the bogus narrative of Microsoft as “Open Source”. People must react and counter these lies or else Microsoft will become indistinguishable from Free/libre software, based on a reality-distorting campaign. Microsoft already pretends that Windows, its common carrier, is 'Open Source' or something along these lines. █
Permalink
Send this to a friend
« Previous entries Next Page » Next Page »