06.21.14
Posted in News Roundup, Site News at 10:54 am by Dr. Roy Schestowitz
Contents
-
Server
-
HP wants to blow your minds with what’s in its development pipeline. The Machine, it says, will introduce a new kind of system architecture that will use memristors and silicon photonics to “replace a data center’s worth of equipment with a single refrigerator-sized machine.” It will be able to address 160 petabytes of data in 250 nanoseconds. It will pump up to 100 terabytes of storage into a single Android phone.
-
OnMetal Cloud Servers are built with Open Compute Project-specified hardware and run OpenStack.
-
Kernel Space
-
3.14.x is no longer the newest kernel that you can get for your distribution and its place has been taken by the 3.15 branch. Even if that is the case, this is still one of the most advanced releases that you can find and it’s still a very popular choice for many Linux distributions.
-
Outside of Logitech, there’s many Linux users that have come up with several different open-source utilities for supporting Logitech under Linux. For most of these apps the hardware support is limited to the few keyboards/mice that the developer owns, but it isn’t too hard reverse-engineering a USB keyboard for others to help out and contribute.
-
Graphics Stack
-
-
-
While the Linux 3.16 kernel is still many weeks away from being released, Intel’s Open-Source Technology Center already has some new code for testing that will ultimately end up in Linux 3.17.
-
While the support is still experimental and isn’t intended for end-users, here are some fresh benchmarks of the Nouveau driver DRM code for Linux 3.16 when re-clocked.
-
Applications
-
Instructionals/Technical
-
Games
-
OpenRA, an open source project that aims to recreate the classic Command & Conquer, is now at version 20140608.
-
The Steam Summer Sale 2014 starts later today and there will be numerous discounts available for a couple of weeks, but there are a few games that don’t get all that much publicity and that are actually hidden gems.
-
-
FlightGear 3.0, an open source flight simulator that supports a variety of popular platforms and is developed by skilled volunteers from around the world, is available for download.
FlightGear aims to create a sophisticated and open flight simulator framework for use in research or academic environments, pilot training, or as an industry engineering tool. This is probably the only simulation of its kind on the Linux platform, especially in terms of complexity…
-
-
-
The Steam Summer Sale is here, and Lord GabeN and his minions are tossing out deep, deep discounts on games left and right. There are flash sales and hidden gems galore, but alas: Only a small proportion Steam’s catalog includes Linux support. What’s an open-source aficionado to do?
-
Desktop Environments/WMs
-
Both LXDE and Xfce are fast and easy to use. The desktops they produce are uncluttered and efficient. That said, I find that Xfce is a bit more pleasant for me to use due to its additional special effects and fewer design quirks. That is where the LXQt difference comes into play. The additional tweaking that the QT settings panel brings to LXDE seems to close the LXDE and Xfce gap considerably.
-
Edje is the library within the Enlightenment realm that seperates the UI from the application and allows for skinning the UI to easily change the GUI of Enlightenment applications. For encouraging skinning of apps and making it easier to handle, Eflete is under development as a new Enlightenment program to serve as a theme editor for Edje.
-
K Desktop Environment/KDE SC/Qt
-
Packages for the release of KDE SC 4.13.2 are available for Kubuntu 12.04LTS, 13.10 and our development release. You can get them from the Kubuntu Backports PPA.
-
With KDE Frameworks 5 and Plasma 5 not too far away our awesome Blue Systems build crew now increased the cadence at which we publish new Neon 5 Live ISO images for you to test.
-
GNOME Desktop/GTK
-
-
-
PDF Annotations in Evince — the default PDF viewer in Fedora — are currently getting some much needed attention by GNOME Google Summer of Code student Giselle Reis. Basic PDF annotation support has been available in Evince for a while now, however, it currently only supports pop-up (sticky notes) style annotations, and there is also the bug where annotations can’t be deleted.
-
-
Once upon a time SimplyMEPIS, Mandrake Linux, and Lindows were popular and generated a lot of attention. Where are they now?
-
Red Hat Family
-
Red Hat Wednesday said it plans to acquire eNovance, a Paris-based cloud services provider and major contributor to the OpenStack community championed by Red Hat.
-
Tesla Motors Inc (NASDAQ:TSLA) CEO Elon Musk made waves last week when he opened the company’s patents to other firms to use ‘in good faith’, saying that he was acting in the spirit of the open source community, and Red Hat, Inc. (NYSE:RHT) CEO Jim Whitehurst, one of the de facto leaders of that community, has welcomed him to the fold.
-
Fedora
-
-
The reason you are reading an article on Fedora Scientific during Open Source Week is obvious. Outlined here are the benefits of using Fedora Scientific for scientific work. I encourage you to use Fedora Scientific and help make it better.
-
Debian Family
-
There is no love between Linux and Windows users, but that doesn’t stop Linux users to transform their operating system until it looks like the latest Windows 8. In fact, the WinAte theme is actually perfect for this task.
-
The press picked up the recent press release about Debian LTS but mainly to mention the fact that it’s up and running. The call for help is almost never mentioned.
-
Derivatives
-
Canonical/Ubuntu
-
Canonical is preparing to pull the plug on Ubuntu 13.10 (Saucy Salamander), the operating system that was launched only nine months ago.
Ubuntu 13.10 (Saucy Salamander) was released on October 17, 2013 and the developers from Canonical have announced right from the start that they intend to only provide support for nine months.
This latest announcement finally corrects the support period for all the Ubuntu OSes. After Canonical switched from 18 months to 9 months of support, some unusual situations were created with the upgrade path, but now everything is in order…
-
Jack Wallen digs into the upcoming Samsung Tizen release to uncover how the mobile giant managed to beat Canonical to the Linux-phone punch.
-
Flavours and Variants
-
Finally as far as content goes, for the most important (commonly used) applications these distributions are similar to the Cinnamon/Mate distributions — Firefox browser, VLC Media Player, Libre Office, and GIMP. For other common applications and utilities they have what is included or at least typical with their respective desktop software collections, such as (KDE) Amarok music player, Dolphin file manager, k3b CD/DVD disk burning, Kate text editor, digiKam photo management; (Xfce) Banshee music player, Thunar file manager, Xfburn CD/DVD burning, gedit text editor, gThumb photo viewing/management.
-
-
GS4 unveiled an autonomous, Linux-based robot security guard called Bob, based on a MetraLabs “Scitos A5″ robot programmed by the University of Birmingham.
U.K.-based security firm GS4 Technology has launched a three week trial at its Gloucestershire headquarters of a robot called Bob that was designed by the University of Birmingham School of Computer Science. GS4 will evaluate Bob’s performance as a trainee security officer. Bob is part of a £7.2 million ($12.2 million) project called STRANDS, hosted by the University of Birmingham, with an aim of expanding the role of robots in the workplace.
-
Another day, another small-form-factor PC. This one, the pcDuinos3S, meets that fine line between budget-friendly and usable, being priced at $99 and able to run either Android or Linux, depending on your needs. We’ve got a rundown of its features after the jump.
The pcDuino3S is a case-toting alternative to the slightly cheaper and case-lacking pcDuino3, which is sold for $77. With the 3S model comes the same features, as well as a white box around the board that saves those without DIY inclinations some hassle.
-
Phones
-
APlus Mobile is seeking Kickstarter funding for a Linux-based “Personal Drone Detection System” that detects nearby drones using mesh grid triangulation.
It sounds at first like an April Fool’s joke delayed in development, but it appears to be legit: APlus Mobile and its R&D spinoff Domestic Drone Countermeasures (DDC) have launched a Kickstarter project for a device that will detect when a drone aircraft approaches within 50 feet. The Personal Drone Detection System is available in $499 (alpha testing) and $699 (beta testing) funding packages, shipping in November 2014 and April 2015, respectively.
-
Android
-
Google has pushed yet another update to its Android OS, just within a few weeks of 4.4.3 release. But before you get too excited about any new feature, let me tell you it’s mostly a security fix release.
-
There’s a new kid in town. Yes, this is the same town that is ruled by the widely popular Galaxy smartphones, the shiny-looking iPhones, and the ever-reliable Nexus devices. In other words, this is a tough market to break in and yet another Android device entering into this market seems like a premature death sentence. However, it isn’t.
-
Researchers have built a free open-source honeypot software program aimed at propelling the hacker decoys into security weapons for everyday organizations.
-
Google conducted research to determine why girls are opting out of learning how to code? As a result Google found that most girls decide before they even enter college whether they want to learn to code—so the Tech-world must win them over them at a young age. They also found that there were four major factors that determined whether girls opted into computer science: social encouragement, self-perception, academic exposure and career perception. According to recent studies less than 1 percent of high school girls express interest in majoring in computer science.
-
Web Browsers
-
Mozilla
-
-
Android: Mozilla is best known for its web browser, but the company also produces Firefox OS for a limited number of handsets. With a little sideways thinking, though, you can try some of its apps in Android.
Much like Google Chrome, Firefox supports webapps—the OS and apps are built with the same technology—and this is how you can bring Firefox OS to Android. Apps work like browser extensions, so they take up very little room making them ideal for older devices or those with limited storage. Download a copy of Firefox for Android from the Google Play Store, or update your existing copy to 29 or above.
Fire up Firefox and visit the Firefox Marketplace, the Firefox version of Google Play or the Chrome Web Store. Take a browse through the Marketplace and tap an app that takes your fancy. Just as with regular Android apps, Firefox OS apps let you know about the permissions they need, and you have to accept this before you install anything.
-
SaaS/Big Data
-
A Structure conference panel discussing the state of open source cloud computing agreed that open source clouds need to get easier to use, but not on much else.
-
-
There I was, 4 years ago (this past January) at CampKDE in San Diego, giving a talk on data privacy, warning the audience about the risks to their privacy from cloud vendors – in particular, Dropbox. So, build it yourself they said. Sure, I’ve built things in the past, so sure, I’ll do it. And there is where I started my odyssey, first, to protect myself, my friends and my colleagues from the snooping of governments, and other bad guys, and later – as I saw the worldwide interest grow – to build a real and successful project.
I had to decide a few things before I got started of course, including what it is I wanted ownCloud to do, what development platform to use, how I wanted to structure ownCloud, and of course, to name it ownCloud.
-
Oracle/Java/LibreOffice
-
-
The Document Foundation has announced that the final version for LibreOffice 4.2.5 has been released for all the available platforms, including Linux.
This is just a maintenance release for the 4.2.x branch, but users of this particular version should consider upgrading nonetheless. The developers have squashed numerous bugs for this release and that can be easily observed from the changelog,
LibreOffice 4.2.5 is now the most advanced build available from The Document Foundation, but the developers maintain a number of other branches as well. Users will be able to find the 4.1.6, 4.2.3, and 4.2.4 downloads on the official website…
-
BSD
-
The news comes three months after the passing of Pat McGovern, who started IDG in 1964 as a research firm and put out Computerworld with a tiny staff in its earliest days. It’s sad to think of IDG losing its founder and flagship print publication so close together, but in a way, it’s also fitting.
-
Just for fun, I checked to see which countries are the wealthiest in the world, based on a ranking of Gross Domestic Product (GDP) per capita. According to the Central Intelligence Agency’s (CIA’s) World Factbook, the crown goes to energy-rich Qatar, where GDP per capita last year stood at more than $102,000 US.
Rounding out the list of top-10 richest nations are Liechenstein, Macau, Bermuda, Monaco, Luxembourg, Singapore, Jersey, Norway, and the Falkland Islands.
Paraguay ranked a lowly 143rd, with a GDP per capita of just $6,800 per person in 2013. In fact, most of the happiest countries according to the Gallup poll results failed to crack the top-100 list of the world’s wealthiest nations, based on the CIA’s data.
-
Hardware
-
Security
-
-
-
-
At Docker we take security very seriously and try to be as transparent as possible. This morning proof of concept exploit code was published showing how to break out of a Docker Engine 0.11 container.
-
Chrome OS is taking an extra precaution to warn users about sources of spyware that can come from installing alternate keyboard layouts. These keyboard layouts, if installed from third-party sources, can use keystroke logging and collect user input for nefarious purposes. François Beaufort, a Chromium developer, revealed that the developer channel of Chrome OS has already implemented a popup warning to educate users about the risk.
-
-
Defence/Police/Secrecy/Aggression
-
Iraq is back, as in blowback: this replaces Ukraine for the moment, America always on the lookout for a situation which can be turned, because of US policy in the first place, into a source of provocation. Iraq, our intervention guaranteed internal civil war, here, with the gains of ISIS, a chance to return in some form, concentrated drone attacks, rather than so-called “boots on the ground,” possibly to inflame the entire region, itself destabilized for obvious reasons (protection of Israel and the continued plight of the Palestinians). As Spinney and Polk wrote in CounterPunch, contradiction plagues American policy, in this case, turning to Iran for help against ISIS while threatening Iran for some time with severe military and economic punishment. How Obama and Kerry can keep straight faces is one for the annals of war.
-
The US is playing all sides of this exploding conflict, towards larger US/NATO objectives.
The invading force, ISIS, is a creation of the US CIA and oil-soaked US allies Saudi Arabia, Kuwait and Qatar.It is an Al-Qaeda front. Al-Qaeda has been the military-intelligence arm of the CIA since the Cold War. ISIS is the Anglo-American empire’s leading military-intelligence army in its ongoing war against Syria.
-
Back in the early 2004, comedian Dave Chappelle produced a masterpiece entitled “Black Bush” – a comedic mockumentary of the events leading up to (and immediately following) the United States’ “second crusade” in Iraq, led by former president George W. Bush.
[...]
Now they’re our allies or something … sort of like al-Qaeda (who we were supporting in Syria) is now our enemy in Iraq.
-
At the White House on Thursday afternoon, the American president outlined an everything-but-the-war strategy that was classic Barack Obama: his press briefing offered perhaps a telling signal about his own expansive version of the Global War on Terror, while still managing to be subtly evasive about what he might actually do in Iraq.
The US military will be increasing surveillance, Obama said, preparing to send military “advisers” to Iraq and urging, not so subtly, for a political shift away from Nouri al-Maliki’s government. He did not, of course, answer the question on everyone’s minds about how America plans to deal with the Iraq crisis: Will Obama engage in fighting to stabilize the country?
-
Six suspected militants were killed in a drone strike in Miranshah Tehsil in North Waziristan, Pakistan, local tribesmen and Pakistani intelligence sources not authorized to speak to media told CNN on Wednesday.
The drone struck a house and a pickup truck in the Daraga Mandi area of Miranshah, they said.
-
-
This should be obvious to pretty everyone by now, but apparently the Wall Street Journal didn’t get the message. Today, the paper published an editorial by Cheney and his daughter Liz in which the former Vice President blasts the “collapsing Obama doctrine” of foreign policy.”
-
According to a recent report by the U.N. 356 people have been killed in the conflict in eastern Ukraine. Of these 257 were civilians, 86 were Ukrainian military. If these numbers are accurate it would mean that only 13 separatists have been killed so far (I find that hard to believe). The real death toll is likely higher than this.
-
TV coverage of the current Iraq crisis looks a lot like 2003, when pro-war pundits, former generals and hawkish politicians dominated the debate. CNN’s Situation Room, hosted by Wolf Blitzer, illustrates how TV has returned to that narrow, pro-government discussion of Iraq.
-
The Bertrand Russell Society held its 41st annual conference at the University of Windsor in Windsor, Ontario on June 13-15, 2014. Dozens of academics, students, and Russell admirers from five countries and eight US states attended the conference, which featured presentations on various aspects of Russell’s diverse interests and works, including his work in logic and philosophy, and his political writing and activism. Bertrand Russell was one of the twentieth century’s most important and influential philosophers and public intellectuals. He was awarded the Nobel Prize for Literature in 1950, and he was a founder and early leader of the nuclear disarmament movement.
-
President Barack Obama announced on Thursday that he will send 300 Green Beret Army special operations soldiers to Iraq. They will be detailed to Iraqi National Army Headquarters and brigade HQs and their primary task will apparently be intelligence-gathering and helping with the Iraqi National Army response to the advances of the Islamic State of Iraq and Syria (ISIS or ISIL). Likely the intelligence-gathering in turn is intended to allow the deployment in Iraq of American drones. At the moment, the US has no good intelligence on the basis of which to fly the drones.
-
Obama has ruled out returning combat troops to Iraq in order to quell the insurgency. However, he has notified Congress that up to 275 armed U.S. forces are being positioned in and around Iraq to provide support and security for U.S. interests.
-
As the latest reporting from both Baghdad and Washington, D.C. reveal diplomatic machinations paving the way for possible U.S. airstrikes in Iraq, increasing numbers of people are asking President Obama—and the American people—to look at the repeated and failed policy of military intervention in the region as the best argument against making the same mistake yet again.
-
Critics claim these drone strikes have killed thousands of innocent civilians, including children.
-
-
More than 400 large US military drones have crashed in major accidents around the world since 2001, a record of calamity that exposes the potential dangers of throwing open American skies to drone traffic, according to a year-long Washington Post investigation.
-
The unmanned military planes have slammed into homes, farms, runways and a transport plane in midair.
-
Commercial drone flights are set to become a widespread reality in the United States, starting next year, under a 2012 law passed by Congress. Drone flights by law enforcement agencies and the military, which occur on a limited basis, are projected to surge.
-
-
Transparency Reporting
-
Wikileaks founder Julian Assange was not subjected to torture whilst detailed in a UK prison but was still the target of aggressive surveillance, the whistleblowing organisation’s official spokesman, Kristinn Hrafnsson, has told RIA Novosti.
-
-
There is some confusion as to precisely what this money is being spent on. Four teams of eight police officers, plus logistics, waiting to arrest Assange around-the-clock for two years should not cost more than £3,234,176 – which leaves £3,115,824 unaccounted for. That the Met has refused to release a “break down” of the policing costs “on national security grounds” adds to concerns that this money is being used to surveil the embassy.
-
Embattled WikiLeaks publisher Julian Assange announced Wednesday from London the publication of a secret draft text of the Trade in Services Agreement (TISA), a controversial global trade agreement said to make it easier for corporations to make profits and operate with impunity across borders.
The whistleblower and transparency website WikiLeaks published on Thursday the secret draft text of the Trade in Services Agreement (TISA) Financial Services Annex, a controversial global trade agreement promoted by the United States and European Union that covers 50 countries and is opposed by global trade unions and anti-globalization activists.
-
-
-
-
Environment/Energy/Wildlife
-
A study of abandoned oil and gas wells in Pennsylvania finds that the hundreds of thousands of such wells in the state may be leaking methane, suggesting that abandoned wells across the country could be a bigger source of climate changing greenhouse gases than previously thought.
-
-
-
Finance
-
Ed Miliband will set out Labour’s first plans for cuts to the welfare system, ending out-of-work benefits for roughly 100,000 18-to-21-year-olds and replacing them with a less costly means-tested payment dependent on training.
-
The number of British households falling below minimum living standards has more than doubled in the past 30 years, despite the size of the economy increasing twofold, a study on poverty and deprivation in the UK claims .
According to the study, 33% of households endure below-par living standards – defined as going without three or more “basic necessities of life”, such as being able to adequately feed and clothe themselves and their children, and to heat and insure their homes. In the early 1980s, the comparable figure was 14%.
-
While the Trade in Services Agreement Financial Services Annex document leaked overnight doesn’t quite justify some of the headlines it has attracted, there is plenty in the draft that is deeply concerning.
-
The text of a 19-page, international trade agreement being drafted in secret was published by WikiLeaks on Thursday as the transparency group’s editor commemorated his two-year anniversary confined to the Ecuadorian Embassy in London.
-
Mehdiganj plant at centre of protests accused of extracting too much groundwater and releasing pollutants above limits
-
PR/AstroTurf/Lobbying
-
Khan strayed from most media coverage around New York’s “biggest gang raid ever” by writing about the people living in the housing projects at the heart of the early-morning 400+ officer raid (complete with helicopters and riot gear), and by including voices of residents critical of it. The initial New York Times story (6/4/14) included only official accounts. The Rupert Murdoch-owned New York Post (6/4/14) printed Facebook quotes of some of the teenagers indicted (an apparent attempt to prove their guilt in the court of public opinion–a guilt assumed by the headline’s flat assertion about “Rival Gangs Arrested”), as well as quotes from the Manhattan district attorney and residents offering comments supportive of the end to alleged violence–if not the raid itself.
[...]
It’s of course this type of media objectivity that allows for authorities to dominate public discourse through the virtual invisibility of criticism. Their heightened voice, made possible by the media’s willingness to become echo chambers for them, point to a relationship where the line between media and the state is blurred.
-
Censorship
-
Every time a government attempts to censor the Internet and block access to websites, advocates of Web freedom ritually respond that the effort is useless: Technology will beat police action every time. It’s true — but only to the extent that people are interested in resisting. Most aren’t, which is why governments have not stopped messing with site blockages and other Web restrictions.
A few days ago, Iraq blocked the social networks, as beleaguered governments sometimes do, believing it would cut off activists from each other and stop them from organizing. Immediately, traffic to Tor, the anonymous network supported by volunteers throughout the world, rocketed…
-
-
The Star has obtained documents related to the Conservatives’ controversial Internet surveillance bill that have been heavily censored — even blocking out the “Canada” in “Government of Canada.”
-
Privacy
-
Yet they don’t seem to think about what they lose when Facebook hands that personal data over to the NSA, or to any other security or intelligence authorities, such as GCHQ in the UK.
-
Any EU-level judgement on a case filed against Facebook for its alleged involvement in helping the Americans snoop on millions of people is likely to take over a year.
-
-
Facebook currently limits the number of your “friends” who can see your posts to about 7 or 8%. What? You thought that “friends” list was yours? It’s not. It’s theirs. And think about it, if you had a thousand friends, and 25 of them, that’s 2.5% posted 3 or 4 times a day, another 25 posted once a day, and a hundred posted once a week, that would be at least 150 daily posts for you to comb through, leaving little room for Facebook to insert ads and promoted content which customers have paid for into your news feed.
-
The German Government has reportedly tightened the rules for awarding sensitive public IT contracts, following whistleblower Edward Snowden’s revelations regarding the US National Security Agency’s (“NSA”) mass surveillance activities.
-
One year ago, Europeans were livid when Edward Snowden revealed NSA mass surveillance of European citizens. Now that new documents show most EU countries are in cahoots with the NSA, the public remains mostly mum.
-
-
-
Denmark’s Defence Intelligence Service (DDIS) is intercepting data sent through fibre cables from Norway, according to newly published documents leaked from the US’s National Security Agency (NSA)
-
Another set of leaked NSA documents has been posted in a team effort by The Intercept and Danish newspaper Dagbladet. This one deals with the NSA’s RAMPART-A program, a surveillance effort that depends on the cooperation of involved countries to be successful. As the NSA has always made an effort to point out, its interception of foreign communications is both completely legal and the sort of thing people would expect a national security agency to be doing.
-
-
The UK needs to grant Germany access to RAF Croughton military base which reportedly hosts a joint CIA/NSA unit, a Labor MP told British PM David Cameron, urging him to help the German federal investigation of the phone tapping of Angela Merkel.
-
Paglen’s latest work, a site-specific piece for the London Underground stop, is a huge photographic panorama that depicts the area surrounding Menwith Hill, an RAF base used by the NSA. At first glance, the landscape is idyllic and unmistakably British, with luscious green fields and a smattering of stone cottages. But lurking on the horizon are a series of white bubbles; a rare but tell-tale physical sign of the secretive surveillance conducted by the security agency.
-
-
The British government is reportedly intercepting communications from social networks, emails and text messages even when there is no suspicion of wrongdoing. According to a report from Privacy International, British spy agencies have been monitoring the Facebook and Twitter activity of every Internet user in the country. Authorities are also said to be collecting data on people’s web searches and emails.
-
So why doesn’t the NSA start watching Wall Street’s agents of financial terror? Why don’t its snoops look into every nook and cranny of our economy where investment bankers, hedge fund managers, private equity kingpins, and derivative wheeler-dealers are trading inside information and rigging markets, milking mergers and nuking jobs, all the while stuffing multiple millions (or billions) in their pockets?
-
-
In what’s being billed as a momentum boost for anti-surveillance advocates, the US House of Representative on Thursday approved an amendment that significantly reigns in warrantless searches on Americans’ communication records.
-
According to these documents, India is an “Approved SIGINT partner” with the NSA. SIGINT is a common term used in intelligence circles that stands for signals Intelligence, and refers to capturing of communication between two people. Decrypting of messages, traffic analysis etc are also part of SIGINT. The agency then taps these SIGINT partnerships for creating two major programs called RAMPART-A and WINDSTOP for collecting data in transit between the source and the servers, as opposed to collecting data from each Internet company (Google, Microsoft, Yahoo) separately. Considering WINDSTOP only partners with second parties, primarily the UK, to access communications into and out of Europe and Middle East, third-party partner like India should fall under RAMPART-A.
-
Whether you consider Edward Snowden a traitor or a patriot, before he hit the news most people didn’t give much thought to government spying on everyday citizens. During a recent interview, he said that the NSA has the ability to spy on your smartphone, even if it’s turned off.
-
Keep in mind what the NSA is up to. This goes well beyond a sniffer program scanning Karachi-bound text messages for “Death to the Great Satan! Allahu Akbar!” The NSA has been intercepting laptop computers being shipped to customers in order to install software bugs in them, redirecting Web traffic to install malware on computers, installing agents in video games, and generally behaving like an implausible villain in a Robert Ludlum novel. It is using the flimsiest rationales to extend its surveillance to domestic targets. The toothless USA Freedom Bill passed by the House last month was intended to curtail some of this, but would have relatively little practical effect even if it were to become law, its enforcement protocols being remarkably loosey-goosey. The bipartisan amendment put forth by Kentucky’s Thomas Massie (R.) and California’s Zoe Lofgren (D.) passed 293 to 123, and would impose funding restrictions as well as implement a specific ban on any agency effort “to mandate or request that a person redesign its product or service to facilitate” surveillance.
-
A new release of Snowden’s leaked NSA docs detail RAMPART-A, through which the NSA gives foreign governments the ability to conduct mass surveillance against their own populations in exchange for NSA access to their communications. RAMPART-A, is spread across 13 sites, accesses three terabytes/second from 70 cables and networks. It cost US taxpayers $170M between 2011 and 2013, allocated through the NSA’s “black budget.”
-
-
-
Several new Snowden-leaked documents show how closely Germany’s intelligence agencies work with the NSA. But did the German government deliberately soften laws protecting privacy to make life easier for them?
-
Documents published earlier this week by German magazine Der Spiegel reveal that one of the National Security Agency’s surveillance programs in Germany was named “WILDCHOCOBO.”
-
-
Germany’s lead federal prosecutor has opened a criminal probe into espionage operations by the National Security Agency (NSA) of the nation’s leadership; especially the allegation of NSA’s spying against German Chancellor Angela Merkel.
-
The House on Friday passed a defense spending bill with an amendment that would bar the National Security Agency from conducting warrantless searches of its databases for Americans’ communications records.
-
U.S. intelligence officials disclosed late Friday that the Obama administration has received approval from a special federal court to continue the National Security Agency’s collection of telephone metadata for another three months.
-
-
-
-
-
-
In an unusual show of bipartisan unity, the U.S. House of Representatives passed a funding bill Friday with an amendment, co-sponsored by San Jose Democrat Zoe Lofgren, that would limit the surveillance powers of the National Security Agency.
-
-
-
The United States has made top-secret deals with more than 30 third-party countries so that the National Security Agency can tap into fiber optic cables carrying internet data in those parts of the world, new leaks reveal.
-
Over the past year, the United States government has been in the news a lot for its efforts to undermine the Internet’s basic privacy and security protocols.
There were the Edward Snowden revelations about the National Security Agency sweeping up metadata, paying contractors to embed backdoors into their security technologies, hacking various private accounts of network administrators and developing malware to infect computers.
-
Rousseff summed it all up rather succinctly in a blunt speech at the United Nations last September, denouncing “a situation of grave violation of human rights and of civil liberties; of invasion and capture of confidential information concerning corporate activities, and especially of disrespect to national sovereignty.”
-
Canadians were largely unmoved by the Edward Snowden leaks and the disclosure of mass surveillance programs like PRISM, with few showing any serious worries about domestic government surveillance in a poll by Abacus Data in June 2013. But now a new poll by Forum Research suggests Canadians are growing suspicious of the latest Conservative cyberbullying bill C-13, with most rejecting a piece of legislation many think is more about beefing up government surveillance powers than protecting teens from bullies.
-
ACLU uncovers e-mails regarding Stingray devices borrowed from US Marshals Service.
-
Scott Ainslie at MuckRock has pried loose a few more Stingray documents with a FOIA request. What was requested were contractual documents, which seem to be something law enforcement agencies feel more comfortable with releasing. Anything pertaining to the actual use of Stingray devices still remains heavily shrouded, thanks in no small part to the intercession of the federal government.
-
The Wilmington Police Department has surveillance equipment called Stingray. It turns your phone into a tracking device, giving law enforcement crucial information on where you are. But it might violate your rights.
-
Journalist Glenn Greenwald defended the value of digital privacy and slammed those who dismiss its importance during a stop on his national book tour Thursday.
“We all need places where we can go to explore without the judgmental eyes of other people being cast upon us,” he said. “Only in a realm where we’re not being watched can we really test the limits of who we want to be. It’s really in the private realm where dissent, creativity and personal exploration lie.”
He said that people who downplay the importance of privacy typically say, “I have nothing to hide.” But, he added, those people aren’t willing to publish their social media and email passwords.
-
Even when the government conducts secret activities, those ventures have to be funded, and a vote in the U.S. House of Representatives last night took a swipe at the NSA’s domestic spying practices by cutting some of its funding.
-
On March 14, 2013, an SSO weekly briefing included a note regarding such a discovery. The unit had been informed two days earlier that “the access point for WHARPDRIVE was discovered by commercial consortium personnel. Witting partner personnel have removed the evidence and a plausible cover story was provided. All collection has ceased.”
According to Der Spiegel, Wharpdrive was a fiber-optic cable tap (underseas fiber is often laid by consortia of companies, so it’s possible this took place at an onshore landing point for such a cable). Employees from one of the companies involved—though not the company that had a relationship with NSA and the German intelligence agency BND—apparently noticed some unusual gear and commented on it. In response, the company involved with the NSA (“witting partner personnel”) removed the tap and made up a story to explain what the gear in question had been doing.
-
In Edward Snowden’s archive on NSA spying activities around the world, there are numerous documents pertaining to the agency’s operations in Germany and its cooperation with German agencies. SPIEGEL is publishing 53 of them, available as PDF files.
-
During the Cold War, West Germany’s foreign intelligence service cooperated closely with the NSA. Klaus Eichner, an agent with the East German Stasi, monitored it at the time, and now he tells SPIEGEL what he knew about the collaboration.
-
European Union countries need stricter controls to protect citizens from spying, a top data protection official said on Thursday, a warning that may rekindle a debate about snooping before an EU summit next week.
-
After a somewhat desultory year of little to no change, reform of the United States surveillance state appears to have finally found momentum.
Recently the USA FREEDOM Act was gutted and rammed through the House, and two funding amendments that would have cut monies for forced backdoors and certain government searches failed.
Last night, however, the House passed a single amendment to the military funding bill that did what the two failed amendments had attempted. At once, a large House majority had taken an unambiguous stand against certain parts of the government’s surveillance activities.
-
An overwhelming House vote to cut funds for back doors into your private life sets up a summer surveillance fight: will the Senate stand up before the White House shuts it down?
-
We’ve already written about the surprising, but encouraging, vote late last night to defund backdoor searches by the NSA. But it’s worth looking at some of the floor debate on the amendment last night — in particular the push against the amendment from Reps. Goodlatte and Ruppersberger, who both appear to flat out admit that the NSA does warrantless spying on Americans’ communications, in direct contrast to earlier claims. The reasons for these two to argue against the amendment are clear. Goodlatte was the guy who negotiated the “deal” with the White House and the House Intelligence Committee to completely water down the USA Freedom Act, and he knows that this amendment puts some of the substance that he stripped out right back in. Ruppersberger, of course, represents the district where the NSA is headquartered, and is the ranking member for the House Intelligence Committee. His loyalty to the NSA over the American public has always been clear. But to have them basically admit that the NSA does warrantless spying on Americans is quite impressive.
-
A bipartisan coalition of 38 civil liberties and public interest organizations, including the Electronic Frontier Foundation, sent a letter to Congress yesterday that draws a line in the sand on NSA reform. The coalition made it clear that it cannot support the watered-down version of the USA FREEDOM Act passed in the House of Representatives without significant changes to the legislation, and outlined clear steps that Congress can take to address problems with the bill.
-
-
The House voted 293 to 123 late Thursday to approve amendments to a Defense appropriations bill (HR 4670) that would defund warrantless seraches of NSA-collected communications and prevent the NSA and CIA from requiring products have “back doors” that allow them to more easily conduct searches.
-
Roughly three days ago, an Indiegogo surfaced promising “to protect people around the world from the mass surveillance that is currently being perpetrated by governments and corporations around the world.” More than $116,000 has already been raised, and that’s without the viral guidance of media attention.
-
Anyone that has to regularly pay for food, water, gas, electricity or anything else knows that inflation is too high. In fact, if inflation was calculated the same way that it was back in 1980, the inflation rate would be close to 10 percent right now.
-
Within the next week, the U.S. Supreme Court is scheduled to decide on a pair of cases that will have major implications for the over 91 percent of Americans who carry a cellphone. At issue is the question of whether police officers are legally allowed to search through the contents of someone’s phone—that is to say, much of a person’s private life—without first obtaining a warrant.
-
Amongst the new trove of classified documents released by Der Speigel is a rather academic discussion, in the NSA’s own foreign affairs journal, about the differences between American signals intelligence collection and German signals intelligence collection.
One passage in particular stands out, as it highlights how the Germans give far more weight to privacy than the NSA does.
-
A poll suggests intelligence agencies could benefit from some controlled leaks.
-
Former federal government contract worker Edward Snowden’s disclosures of virtually limitless surveillance of American citizens by the National Security Agency corroborated the late Supreme Court Justice Louis Brandeis’ wisdom that sunshine is said to be the best of disinfectants.
-
Civil Rights
-
Is the liberty movement more dangerous than al-Qaida? CNN national security analyst Peter Bergen thinks so.
-
Mustafa Aslan died on Friday afternoon after being shot in the head by an Israeli soldier at Qalandiya refugee camp near Ramallah a few hours previously. He was 22-years-old.
Mustafa is the third Palestinian victim of the Israeli authorities’ ‘search’ for three teenagers – two Israeli and one US-Israeli – who went missing on 12 June after leaving the illegal Israeli settlement bloc of Gush Etzion near Hebron.
-
Let’s say it all together now: The United States has a problem with guns.
Since the horrifying Sandy Hook tragedy of 2012, there have been 74 school shootings and 17,042 gun deaths.
To the frustration of many Americans, a stalled debate stands in the way of solving our gun violence problem, even though the solution is staring us in the face. The Onion captured this feeling perfectly with one of its headlines last month: “‘No Way to Prevent This,’ Says Only Nation Where This Regularly Happens.”
-
In a case over retaliation against a public employee who was fired after testifying about corruption, the Supreme Court says the man gave testimony as a concerned citizen and should not have been punished. The decision was unanimous, overturning lower courts.
-
TECHNOLOGY saves stress. Except when it adds stress. Supermarket self-checkout machines may look inviting enough, but were, in fact, inspired by medieval devices of torture.
-
The issue of whether it is legal or illegal to fly radio-controlled and unmanned aircraft in South Africa is a complex one involving three different organisations.
As things stand today, the South African Civil Aviation Authority (SACAA) has no regulations to govern what it calls Unmanned Aircraft Systems (UAS’s), which means it is illegal to fly unmanned drones in South Africa.
-
This past Memorial Day weekend, New Yorkers who happened to look up may have seen the words EXISTENCE OR NONEXISTENCE appear across the skyline in synchronized bursts of white smoke.
The seemingly spontaneous event was a project of mine called Severe Clear. It was inspired by a letter the CIA sent the ACLU rejecting their Freedom of Information Act request for documents relating to the U.S. government’s classified drone program. The letter reiterates the now familiar Glomar response, stating that the agency can “neither confirm nor deny the existence or nonexistence” of records responsive to the request.
-
-
-
The CIA secretly developed a “demonic” Osama bin Laden action figure to scare Pakistani and Afghan children and undermine public support for the al-Qaida figurehead, it has emerged.
-
What the journalists’ body asked for from other newspapers was a form of censorship: self-censorship. George Orwell has written about the damages of self-censorship in any democratic society. The first priority of journalists is to unearth the truth and if they start exercising self censorship than truth is going to be the first casualty.
-
At a conference in New York in March, Risen said the Obama administration has shown itself to be “the greatest enemy of press freedom that we have encountered in at least a generation”. By then his case had reached the Supreme Court, where the Justices declined to intervene.
-
The letter was sent to Sens. Harry Reid, D-Nev., and Mitch McConnell, R-Ky., a few days after the Supreme Court refused to hear the appeal of James Risen, a New York Times reporter who has been contesting a subpoena requiring him to testify at the upcoming trial of a former CIA agent.
The agent, Jeffrey Sterling, is accused of revealing classified information about a failed CIA plan to compromise Iran’s nuclear program, an operation described in a book by Risen.
-
-
In the meantime, Senator Feinstein, Chair of the SSCI, has stated that the Director of National Intelligence has assured her that the declassification of the SSCI’s executive summary and findings and conclusions will be completed by early next month, ideally before July 4. If this is still the case, it is not necessarily inconsistent with the CIA’s status reports filed today. Presumably the Executive branch will be finished with its declassification review of the SSCI’s documents before it turns to the two ancillary documents (the CIA response and the Panetta Report), and will then deliver the declassified versions of the executive summary and findings and conclusions to the SSCI, which could decide to publish them before August 29. The period between early July and August 29 would also give the SSCI and the Executive branch eight weeks or so to negotiate over any possible disagreements about the scope of the declassification.
-
In the 1950s, the CIA produced a pornographic film starring an actor made up to resemble Indonesian President Sukarno. The idea was to discredit Sukarno in the eyes of his countrymen, according to the 1976 memoir of a CIA officer, Joseph Burkholder Smith, as the Indonesian leader was viewed as insufficiently pro-West at the time.
-
There’s been a lot of talk coming out of Washington, D.C. lately about the need for “regime change” in Iraq – which is particularly ironic when you consider the current regime was hand-picked by the Central Intelligence Agency (CIA) during an American military invasion that cost trillions of dollars and thousands of lives.
-
Biden’s visit, though, only serves to highlight the historical role the U.S. has played in prompting some of the problems seen today in Guatemala. In 1954, the C.I.A. helped organize a coup to oust a popular leader and install a right-wing dictator who plunged the country into a 36-year civil war. Effects of the war, which Amnesty International and many other groups label a genocide of the Mayan people, are still felt today and contribute greatly to Guatemala’s current problems.
-
We live in an age now where the Western media has been virtually subsumed by banking and military interests. If “our side’s” dirty deeds are kept out of the news, and the latest “bogeyman” kept in, then today’s war profiteers can get away with whatever they want. “Defensive” NATO with its proxy armies and “deniable” private military contractors sponsoring butchery across the globe has become a Napoleon with nukes, bringing the day ever closer when these wonder-weapons might again be used in anger.
-
The controversial program called Project Camelot had been operational nearly a decade into the Vietnam war, as the Special Operations Research Office (SORO) located at American University had received millions in funding from the US Army to conduct a six country study on civil unrest. The current social science program directed by Minerva and the Department of Defense (DoD), appears to have also partnered with some of the most well-known universities in the United States by studying the behavior of peaceful activism and how political ideology shapes protest movements in the world at large.
-
And now a former CIA operative may get a day in court to add to that peculiar lore. On Friday a federal trial judge in Washington, D.C. could rule on a discovery motion by “Peter B.,” a former CIA officer who contends that the spy agency fired him without due process and then badmouthed him, scuttling his chances for a job with a CIA contractor.
-
Jake Newsome was jailed last week for posting offensive comments online. His is the latest in a string of cases that have led to prison terms, raising concern that free speech may be under threat from over-zealous prosecutors
-
Intellectual Monopolies
-
Copyrights
-
The Senate Intelligence Committee is moving forward with its Cybersecurity Information Protection Act—a problematic, potentially civil liberties-killing piece of legislation that looks just like the CISPA bill the internet fought so hard to kill last year—and the year before that.
CIPA, written by Senate Intelligence Chair Dianne Feinstein (D-Calif.) and Sen. Saxby Chambliss (R-Ga.) will be considered by the committee next week, according to Feinstein.
-
Half the major publishers in Germany have started a process of arbitration — which, no doubt, will lead to suits — to demand that Google pay them for quoting from and thus linking to their content. And now we know how much they think they deserve: 11% of Google’s revenue related to their snippets. From their government filing, they want a cut of “gross sales, including foreign sales” that come “directly and indirectly from making excerpts from online newspapers and magazines public.” [All these links are in German.]
-
As you may have heard, there’s been some hubbub this week about claims that YouTube is going to remove some videos from indie musicians/labels who don’t agree to the contract terms for YouTube’s upcoming music subscription service. Ellen Huet, over at Forbes, has a good article explaining how this isn’t as dire as some are making it out to be, but the more I’m digging into it, it seems even less than that. There’s no doubt that this is a royalty dispute, with some indie labels upset about the basic terms that Google is offering, but, if you haven’t noticed, the complaints seem to be coming from the same folks who complain about the royalty rates of every single online music service. There are some people who will just never be satisfied. Furthermore, the deeper you dig into this, it becomes quite clear that any artist who wants to have their videos on YouTube can continue to do that.
Permalink
Send this to a friend
06.20.14
Posted in Microsoft at 7:24 am by Dr. Roy Schestowitz
NSA thanks you for installing the blob
Summary: Criticism of promotion of Skype for GNU/Linux, which basically compromises the whole platform and plants a bug (as in listening device with a camera) inside people’s Free/libre systems
FOR A number of days now we have been systematically ignoring (not overlooking) several reports about a nasty piece of software. Many FOSS sites cover Skype because another malicious blob has been just made available for GNU/Linux, requiring root
to install and offering no source code at all. It is bad idea to install this blob because we already know that Skype is used extensively for surveillance (this fact is well established), more now than ever before as it was snatched by the NSA’s PRISM #1 company, Microsoft. Yes, here we have the company which famously reads people’s E-mails and uses people’s personal data against them, putting some in prison and deporting them. Why would anyone wish to take the risk of using Skype when good software such as Linphone and Jitsi exists and is freely available for GNU/Linux, Android, among many other free/libre platforms, sporting real encryption (Skype has no end-to-end encryption, based on revelations from last year)?
Microsoft is a huge liar when it comes to privacy and ITWire is one among several publications that we saw recently giving Microsoft’s lies a platform. Microsoft claims it will not use your personal data against you (it does not say “won’t spy”) but we already know this to be a lie, based on the Kibkalo case.
Microsoft is not the only company which lies about privacy. VMware too spouts out nonsense (many Microsoft executives moved there, so the lies travel), hoping that people forget about RSA-NSA collusion (VMware is RSA’s sister because both are owned by EMC). There is a back door there, just as there is a back door in Hyper-V hosts (it only runs on Windows, hence there’s a back door that leads downwards to guest VMs).
Generally speaking, any piece of proprietary software is quite likely a back door, if not by accident then by design (unlike Free software one would struggle to prove either, but leaks wre help). People who brag about using a Free/libre and secure platform completely compromise it when they install the blob called “Skype”. Convenience may be tempting, but it’s a trap. British intelligence agencies alone have grabbed footage from many people’s webcam, harvesting videos and photographs (many of which sexual) from millions of people while the NSA used harvested photos to covertly construct biometric models of law-abiding Americans. Just because you do nothing illegal doesn’t mean you are not under surveillance. Espionage champions like to collect potential ‘dirt’ against everyone (they derive power through blackmail) and British intelligence, for example, already intercepted and saved footage of hundreds of thousands of people masturbating. █
Permalink
Send this to a friend
Posted in Hardware at 6:54 am by Dr. Roy Schestowitz
Yet another reason to boycott Intel
Summary: The dark hearts of computers, with a lot of secrets and circuitry whose behaviour cannot be verified, are also convenient back doors, even without additional bugs (implanted en route)
THE FSF has this interesting new article about “Active Management Technology”. It was written by Ward Vandewege, Matthew Garrett, and Richard M. Stallman, who awarded Garrett for his work on UEFI.
One year ago, around the same time that Snowden leaked some NSA documents, we warned that UEFI could be used to remotely brick PCs. Later on, after the NSA leaks had gone maintream, the NSA pretty much confirmed it was a possible strategy (but defecting this to the Chinese). Going back to 2008 we also warned about back doors, some of which facilitated by broken encryption in hardware (e.g. Intel’s ‘hardware-accelerated’ RNG). That was about a decade after Microsoft had allegedly built back doors into Windows (we know that there are back doors now, but it’s just hard to say when Microsoft started it).
We already wrote a great deal about the problem with UEFI patents, UEFI ‘secure’ boot (taking control over computers, moving control away from the users to put itinto corporate hands and governments), but we have not done much to cover UEFI remote control capabilities, or more broadly Intel’s rogue role in intelligence, leading to a ban in some places (some variants of BSD refuse to use Intel RNGs due to fear of intentionally low entropy that derails encryption).
Quoting the article from Vandewege et al.: “Intel’s Active Management Technology (AMT) is a proprietary remote management and control system for personal computers with Intel CPUs. It is dangerous because it has full access to personal computer hardware at a very low level, and its code is secret and proprietary.”
Intel is a deeply criminal company, so to blindly trust its proprietary technology would be foolish. We have always campaigned against Intel not just because “intel” is shorthand for something rather insinuative although this latter point is now a growing factor, too. Watch what China is doing these days when it comes to hardware policy, not just software policy. Or simply watch what Snowden has been leaking; it’s rather revealing. █
Permalink
Send this to a friend
Posted in Law, Patents at 6:21 am by Dr. Roy Schestowitz
Randall R. Rader: The corrupt judge who ran CAFC until the scandal which ultimately led to his resignation
Photo from Reuters
Summary: The Court of Appeals for the Federal Circuit (CAFC) is in trouble after its extent of misconduct was revealed, not just because rulings are repeatedly incorrect but also because its chiefs are corrupt (in bed with patent lawyers)
The United States should gradually if not instantaneously revoke CAFC’s power amid revelations of misconduct and errors. CAFC almost always gets its rulings wrong, based on the judgment of courts above it, notably SCOTUS. Perhaps it’s time to just shut shut down the CAFC. The disgrace which is ‘judge’ Rader has finally stepped down, so there’s no better time to end CAFC. He had conflicts of interest and did great damage to patent policy. He encouraged the perception of corruption in the courtroom. Rader was just one of several because not a single judge ruled incorrectly on cases that involve patents. Rader is raider, taking away from programmers and giving to monopolies and their patent lawyers. Ars Technica wrote about his “ethical breach”:
US Circuit Judge Randall Rader, who was just weeks ago the top patent judge in the nation, has announced he will step down, following an admission that he made an ethical “lapse” when he sent an e-mail praising an attorney who appears frequently before his court.
From 2010 until two weeks ago, Rader served as Chief Judge on the US Court of Appeals for the Federal Circuit, which hears all patent appeals and interprets most of the nation’s patent laws. The Washington, DC-based court is frequently the final arbiter in some of the highest-stakes technology battles in the world.
Here is more from the corporate press, which said: “The ex-chief judge of the top U.S. patent court will retire at the end of June, after acknowledging that an email he sent raised questions about his judicial ethics because it praised an attorney who appears before the court.”
Shut it down. Now is the time. This court has been the target of a coup and it cannot restore trust.
There’s no lack of stories about the harms of software patents. Here is the recent report titled “Divorcees Brawl Over Time Warner-Acquired Software Patents” and alluding in part to software patents, here is an article which speaks of a “Nightmare”. An Australian lawyers’ Web site seems to be turning its back on software patents not because they’re not something that patent lawyers want but because they have apparently become less profitable (harder to uphold in Australia). To quote: “A new unfavourable examination practice by the Australian Patent Office for software patents precipitated two separate appeals to the Federal Court of Australia, which resulted in the two decisions Research Affiliates LLC v Commissioner of Patents [2013] FCA 71 (“Research Affiliates”), and RPL Central Pty Ltd v Commissioner of Patents [2013] FCA 871 (“RPL”). The two decisions are, on the face of it, contradictory. The patent office favours Research Affiliates, which imposes strict limits on the patentability of software. RPL does not impose the strict limits of Research Affiliates. Both decisions have been appealed to the Full Court.”
In the US, patent policy is written by corporations and their lobbyists or moles (companies like Microsoft and IBM). Until not so long ago an IBM lawyer who is a software patents proponent controlled the USPTO (that’s David Kappos). He ensured that the USPTO sought only to increase its own income (and patent lawyers’) by expanding scope and in his new article in the plutocrats’ press (Forbes) he pretends that it’s about prosperity for the US economy. This is complete nonsense. It’s the very opposite of the truth, unless by “American economy” Kappos means “the 1%” (of which he is a part).
If the USPTO cannot be abolished, then its facilitator (a corruptible court like CAFC which let it patent software) should be eliminated, leaving the SCOTUS to make baby steps towards the solution (or towards justice, which SCOTUS is not exactly famous for, either). █
Permalink
Send this to a friend
Posted in Law, Patents at 5:54 am by Dr. Roy Schestowitz
Many patents killed in a fire
Summary: The US Supreme Court has just ruled a lot of software patents “invalid” (by generalisation), raising hopes that things are improving
WE are exceedingly delighted to learn that the Supreme Court (SCOTUS) ruled against software patents. Before lots of law firms (patent lawyers) issue their revisionist ‘articles’ on why it doesn’t change anything let’s look at what happened.
SCOTUS has, without exception among the Justices, decided that some software patents are too vague to merit a win in court. Essentially, they’re rendered toothless, by precedence. It is possible that hundreds of thousands of software patents have just been rendered dead. Since SCOTUS is the top court, not even the software patents-friendly CAFC can reverse this decision. As one good writer (patent matters expert) put is: “The most-anticipated patent decision from this Supreme Court term was published today. The decision involves finance-related software patents that were being used against CLS Bank, a key part of the global financial infrastructure.”
Here is the response from Red Hat’s site, an Android-hostile site, a Linux-friendly site, and from the FSF, which says “more work needed to end software patents for good”. There was a lot of coverage in the corporate media too, including [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22] and the message is quite uniform. Not even lawyers’ sites can deny the truth here. They will surely try later. We have done an extensive media survey and the media is as unanimous about this as the SCOTUS is. Here is the response from TechDirt, which sheds light on why it’s not enough. To quote the headline: “Supreme Court Rejects Software Patents On Performing Generic Functions; Pretends That Lots Of Other Software Must Be Patentable” (lawyers are going to have a day field around the latter part).
This is clearly not the end of software patents, but it’s a good start. Let’s enjoy this small victory while it lasts. A future patent case can be escalated to SCOTUS again, shedding doubt on this decision. It doesn’t happen quite so often though (In Re Bilski was half a decade ago). █
Permalink
Send this to a friend
Posted in Deception, Microsoft at 5:32 am by Dr. Roy Schestowitz
“Mind Control: To control mental output you have to control mental input. Take control of the channels by which developers receive information, then they can only think about the things you tell them. Thus, you control mindshare!”
–Microsoft, internal document [PDF]
Summary: Federal Trade Commission (FTC) is expected to do nothing, as usual, even through there is overwhelming evidence that Microsoft breaks the law by bribing journalists and bloggers, not just government officials
THE FTC promised to fight bribery of bloggers, but it never really did anything (not a single action that we are aware of). A cynic may simply conclude that there are face-saving laws and rules, but they are not being enforced against criminal enterprises like Microsoft, which habitually engages in AstroTurfing, even in Wikipedia [1, 2, 3] which now bans it and demands disclosure of payments. Microsoft’s PR agencies do this too (they are void of ethics just like Microsoft and some literally emanate from inside Microsoft), not just moles whom Microsoft pays secretly. Microsoft has been bribing bloggers and journalists (with laptops) in exchange for positive reviews of operating systems and nothing is improving these days because Microsoft is paying people to comment in Reddit (now owned by the Microsoft-friendly Condé Nasty), maybe even to misuse moderation to ban opposing views or to submit stories. Microsoft got caught doing this just months ago and there was a similar abuse involving bribed-for YouTube placements (bribing vloggers).
Microsoft is a criminal company and criminals don’t obey laws. After Condé Nasty took over Reddit the site began advertising (in the content section) the most NSA-friendly Web browser (many back doors with new ones every month, enabling whole OS capture due to illegal integration/bundling), probably in exchange for a lot of money. It is a form of AstroTurfing, distorting and ultimately derailing the editorial process.
Well, Microsoft has just been caught bribing bloggers to covertly advertise the most NSA-friendly Web browser (Internet Explorer of course). The pushback actually came from Michael Arrington almost a decade after Arrington had played along with Microsoft and got caught (and shamed for it, losing a lot of credibility). Arrington blew the whistle, but Microsoft lies to him (and his readers) by claiming it had nothing to do with it (see the update). is Microsoft trying to distance itself from it all, but now we finally know Arrington was right all along:
Why in the world is Microsoft (through an agency) trying pay bloggers to write about Internet Explorer? Do people still do this? And given my position on paid posts, why would they think I’d be willing to participate?
This is just layers of stupid.
Here’s the link in the request below. Here’s the hashtag (#IEbloggers) that they’re requesting people use, so I’m guessing anyone using that is getting paid.
Arrington once agreed to do the “people-ready” Microsoft propaganda, embedded in articles for some Microsoft cash (hence a violation, as per the FTC’s rules). Microsoft could not escape such scandals, later confirming — implicitly — that it was definitely something Microsoft was behind. Even a site that serves Microsoft propaganda very routinely has covered it. Here is a quote: “Microsoft Internet Explorer officials are attempting to distance themselves from a paid social-media effort by an advocate marketing company meant to promote Microsoft’s IE browser.”
Coming from ZDNet this is quite grand because the site was paid by Microsoft to become its propaganda mill (we exposed this numerous times in the past).
What can people do? Well, given that the FTC won’t do anything (highly unlikely), people should boycott Microsoft and urge journalists ban Microsoft from various circles of the media, not just from procurement.
Microsoft is run by the same unethical thugs, even if the public face (CEO) has changed. People who don’t wish to reward criminals should pay not a penny to Microsoft. █
Permalink
Send this to a friend
06.19.14
Posted in News Roundup at 7:00 pm by Dr. Roy Schestowitz
Contents
-
Desktop
-
A journey from Windows through doubt, frustration and despair to relief and a finally joy. This journey started on 31 May 2014 the day after the release of Linux Mint 17 “Qiana” Cinnamon and finished on the 17 June 2014. I worked on this continually for 8 or more hours a day over this time can’t work at the moment so I had time on my side.
-
Server
-
High-performance computing (HPC) for the past ten years has been dominated by thousands of Linux servers connected by a uniform networking infrastructure. The defining theme for an HPC cluster lies in the uniformity of the cluster. This uniformity is most important at the application level: communication between all systems in the cluster must be the same, the hardware must be the same, and the operating system must be the same. Any differences in any of these features must be presented as a choice to the user. The uniformity and consistency of running software on an HPC cluster is of utmost importance and separates HPC clusters from other Linux clusters.
-
HP Helion uses its own version of Linux based on the the open-source Debian Linux operating system at its core, which is a shift away from Ubuntu Linux, the Linux distribution previous iterations of HP’s cloud efforts had been using.
-
-
-
SOCIAL NETWORK Facebook has introduced some of the fruits of its Open Compute project, revealing a networking switch and a supporting Linux operating system (OS).
-
-
A lot has changed since then. Commodity servers running Linux are the norm, virtualisation and Cloud services are common, but some organisations are still running UNIX or Windows systems because Linux migration seems like a lot of work and a big risk. It didn’t do Amazon any harm though, did it?
-
Puppet Labs, a Portland, Ore.-based provider of IT infrastructure automation software, announced today that it had raised $40 million in a Series E round of financing from a pool of backers that reads like a who’s who of the tech and venture capital communities.
-
Kernel Space
-
Writing poems about the Linux kernel has been enlightening in more ways than one for software developer Morgan Phillips.
Over the past few months she’s begun to teach herself how the Linux kernel works by studying text books, including Understanding the Linux Kernel, Unix Network Programming, and The Unix Programming Environment. But instead of taking notes, she weaves the new terminology and ideas she learns into poetry about system architecture and programming concepts. (See some examples, below, and on her Linux Poetry blog.)
-
Ivan Shapovalov is back on track with his Reiser4 file-system contributions.
Shapovalov has been working on Reiser4 support for TRIM/Discard on SSDs. It’s been some weeks since the last revision but the fourth version of the patches are now out there for this common file-system feature of being able to discard blocks by informing the solid-state drive about blocks that are no longer in use by the file-system. Most mainline Linux file-systems already support SSD discard, which is generally exposed via the discard mount option — which is also the case for Reiser4.
-
Graphics Stack
-
Another set of AMD RadeonSI Gallium3D driver improvements were committed on Wednesday for Mesa.
-
-
The X.Org Foundation reminds us that the first announcement for the X Window System came out on June 19, 1984.
-
-
The Nouveau X.Org driver (xf86-video-nouveau) now has basic support for NVIDIA’s newest Maxwell graphics processor. Related to that, there’s also GLAMOR 2D acceleration support available within the Nouveau DDX.
-
Benchmarks
-
As it’s been a while since last delivering any “4K” resolution OpenGL benchmarks at Phoronix, out today — now that we’re done with our massive 60+ GPU open-source testing and 35-way proprietary driver comparison — are benchmarks of several NVIDIA GeForce and AMD Radeon graphics cards when running an assortment of Linux games and other OpenGL tests at the 4K resolution.
-
Applications
-
-
-
-
The Tanglu project is now a proud member (licensee) of the Open Invention Network (OIN), which build a pool of defensive patents to protect the Linux ecosystem from companies who are trying to use patents against Linux. Although the Tanglu community does not fully support the generally positive stance the OIN has about software patents, the OIN effort is very useful and we agree with it’s goal. Therefore, Tanglu joined the OIN as licensee.
-
-
The open-source Docker virtualization technology is one of the most exciting innovations to enter the enterprise IT space in years. Docker is a container virtualization technology that offers the promise of a more efficient, lightweight approach to application deployment than most organizations are currently implementing. With a traditional virtualization hypervisor like VMware ESX, Microsoft Hyper-V or the open-source Xen and Kernel-based Virtual Machine (KVM) technologies, each virtual machine (VM) needs its own operating system. In contrast, with Docker, applications sit inside a container that resides on a single host operating system, that can serve many containers. Although Docker is a relatively new effort that got under way in March 2013, the project has matured quickly and the Docker 1.0 milestone was released on June 9. Alongside the Docker 1.0 release came the official debut of the Docker Hub, which is a repository for what are known as “dockerized” applications that can be deployed to any Docker host. Some of the world’s largest technology vendors, including IBM, Microsoft, Google, Amazon and Red Hat, support Docker. eWEEK examines the world of Docker container virtualization.
-
Instructionals/Technical
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Massive Open Online Courses (MOOCs) are increasing in their popularity. We’ve seen first hand how much people want to be able to access and learn new information on their own schedule. For example, our Introduction to Linux MOOC, hosted by edX, has received more than 150,000 registrations, and it doesn’t even start until August 1.
With summer up on us, we’ve done some research for you to surface additional MOOCs that could be useful to the Linux and Linux.com community this summer and early fall.
-
Games
-
-
Steam Marines an excellent looking squad based procedural death labyrinth set on a space-ship has now arrived on Linux after teasers from the developer.
-
-
Many Linux gamers have written in today with excitement that XCOM: Enemy Unknown is now available via Steam on Linux.
-
-
-
The mass migration of big-name triple-A games to Linux continues, as publishers rush to have top titles available for the 2015 launch of Valve’s SteamOS operating system. On Thursday, Feral Interactive announced that the blockbuster XCOM: Enemy Unknown is now available for Linux, as is all of its add-on content—including the large XCOM: Enemy Within expansion.
-
-
I don’t game as much as I used to. Although I’ve certainly spent countless hours of my life in front of a Nintendo, SNES, or after that, playing a first-person shooter on my computer (Linux only, thank you), these days, my free time tends to go toward one of the many nongaming hobbies I’ve accumulated. Recently though, I found myself dusting off my Wii console just so I could play an NES and SNES game I re-purchased for it. The thing is, those games require using a somewhat strange controller, and I already have a modified SNES controller that can connect over USB. That was enough to encourage me to search for a better solution. Of course, I simply could connect three or four consoles and stack up games in my living room, but I’ve grown accustomed to ripping my CDs and DVDs and picking what I want to listen to or watch from a central media center. It would be nice if I didn’t have to get up and find a cartridge every time I wanted to switch games. This, of course, means going with emulation, but although in the past I’d had success with a modified classic Xbox, I didn’t have that hardware anymore. I figured someone must have gotten this set up on the Raspberry Pi, and sure enough, after a brief search and a few commands, I had a perfect retro-gaming arcade set up on a spare Raspberry Pi.
-
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
The KDE e.V. Quarterly Report for the fourth quarter of 2013 features a brief note of all the activities and events carried out, supported and funded by KDE e.V in this span of time, as well as a short overview of the major events, conferences and mentoring programs. !ll of this in one document that you should not miss out on to know about almost everything that has been KDE in those four months!
-
While browsing a popular computer retailer in Ireland, Jonathon Riddell (the big boss man over at Kubuntu) found a few rather compelling deals, all running the distro we all know him for. The retailer is Adverts.ie, and they are selling more than one model for HP laptop pre-loaded with the trusty (no pun intended) operating system. Here is what they have on offer!
-
Kubuntu 13.10 was released in April and it comes with the brand new KDE Plasma workspaces and other KDE technologies. Like any other operating system Kubuntu also needs a little bit of work to get it ready for you. There are a few things which are optional and I have added them here based on my own usage, you may not need them.
-
Kubuntu is an example of what is known as “open source software”. The basic idea behind the open source model is that the developer gives away a computer program for free, including the source code used to create that program. Users are free to make any changes they require in the future and share their modifications with others.
-
-
This is an unplanned release. Quicken dropped support for 2011 and banks followed suit, so the online import using Quicken 2011 as ID has stopped working. We added IDs for latest versions, and released a new tarball.
-
So look forward to Marble 1.9, bringing previews for geo data files to your filemanager and in the file dialogs! (And do not forget to enable them in Dolphin > Settings > Configure Dolphin… > General > Previews, disabled for all types by default).
-
Marble Tours, when they are played from the played from the playlist that is contained in the kml file containing the tour, they follow an order shown as given below. That is, there are basically two types of items that are being played here, just like a “track” is played:
-
-
GNOME Desktop/GTK
-
In Linux news today, Red Hat released their first quarter financial results today and the markets reacted in kind. WorldofGNOME.org gives users a peek and poke at GNOME 3.14. Newbie Tony Ireland shares his story and Michael Hall shares why he uses Open Source.
-
GNOME 3.14 is releasing in September and Ubuntu-GNOME in October, therefore this is an early access to the development versions of both of them. However Ubuntu development releases are quite stable and the same also applies for GNOME, so it should be a very usable system.
Running GNOME in Ubuntu won’t give a genuine GNOME experience and not all things work as supposed to, but on the other hand Ubuntu will give you the best out of Linux desktop (the term is wrong) in general, meaning easy access to all available software, free and no-free.
-
Humanity Colors, an icon theme pack designed by the Ravefinity Project which provides Humanity (the default Ubuntu icon theme) in various colors, was updated with 3 new colors along with other changes and bug fixes.
-
-
Screenshots
-
Red Hat Family
-
-
-
Red Hat reported its first quarter fiscal 2015 revenues on June 18, showing continued demand and momentum for its Linux and open-source technologies. Red Hat has been particularly busy of late, acquiring a pair of companies and launching its Red Hat Enterprise Linux 7 (RHEL) flagship platform.
-
Red Hat sidestepped typical seasonal slowness, posting Q1 earnings late Wednesday that beat analyst views, led by its Linux unit.
-
Red Hat Inc, the world’s largest commercial distributor of the Linux operating system, reported better-than-expected adjusted profit and revenue for the first quarter, helped by growth in subscriptions.
-
-
-
Red Hat Inc. (RHT: Quote) reported first quarter adjusted EPS of $0.34 after the close Wednesday, compared to $0.32 last year. Analysts expected EPS of $0.33. The stock is now up 2.15 on 455K shares.
-
-
-
Fedora
-
The Fedora developers are discussing whether to replace Firefox with Gnome Web as the default browser on Fedora 21, due to the fact that the current Mozilla browser is built with GTK+2 and GNOME 3.14 uses GTK+3.
Gnome Web (previously name Epiphany) uses GTK+3, has support for HiDPI displays, provides good integration with Gnome Shell and supports hardware acceleration, while Mozilla’s browser doesn’t.
Due to the fact that Firefox is open-source, some Fedora developers have already started to port Firefox from GTK+2 to GTK+3. If everything goes well, the first GTK+3 based Firefox will be built on the Firefox 32 code base.
-
-
Debian Family
-
-
Five years ago Debian and most derivatives switched from the standard GNU C Library (GLIBC) to the Embedded GLIBC (EGLIBC). Debian is now about to take the reverse way switching back to GLIBC, as EGLIBC is now a dead project, the last release being the 2.19 one. At the time of writing the glibc package has been uploaded to experimental and sits in the NEW queue.
-
Derivatives
-
Canonical/Ubuntu
-
GNOME Shell 3.12 and GTK +3.12 have been added to the proposed repositories of Ubuntu 14.10 Utopic Unicorn. Most likely, they will be soon added to the default repositories so the users will be able to have the latest versions of the Gnome applications, on their system.
-
As a reminder, Canonical has announced that Ubuntu Touch has been installed on 10.000 devices, most probably Google Nexus smartphones and tablets, while the first Ubuntu smartphones have not been made available yet. Also worth mentioning, the developers have proposed to create a special RTM (release-to-manufacturer) branch, for bringing stability improvements to Ubuntu Touch.
-
As you may know, Canonical has been working a lot at the Mir display server, in order to get it ready for both the desktop and mobile versions of Ubuntu. While the Ubuntu Touch already uses Mir by default, Ubuntu 14.04 runs over the good old X.org.
-
Canonical developers have been making progress on allowing GTK+ applications to work natively atop Ubuntu’s Unity 8 desktop with the Mir display server in place of the X.Org Server or even XMir for that matter.
-
As you may know, Ubuntu 14.10 Utopic Unicorn will come with interesting changes. The integration of Qt 5.3 is almost done, but the developers still have to fix some known issues.
The developers hope to make Qt 5.3 available as default next week, due to the fact it has passed 99% of the tests.
-
Canonical software engineers Ryan Lortie and Robert Ancell have shared word on work they’ve been doing to get GTK+ applications up and running on Mir in the Unity 8 preview session that’s available in Ubuntu 14.10.
-
-
Flavours and Variants
-
If you have read my previous articles then you will know that I started off by listing 5 reasons why Lubuntu is a good replacement for Windows XP and you may have read the alternative reviews that I listed and following on from that you may have tried out the live version of Lubuntu.
-
-
An MIT spinoff is Kickstarter-funding its AllJoyn and OpenWRT Linux based “Q” system, which syncs its smart bulbs to mobile music it streams to a stereo.
The Q name derives from the system’s Q Station router, “allowing you to both create a Q (queue) of music and send lighting Qs (cues) from the same smartphone app,” says MIT spinoff Belleds Technologies. (And if you also happen to envision hardware hacker hero Q from James Bond, so much the better.)
-
If you’ve been following along with our earlier articles on next-gen filesystems like btrfs and zfs, but wanted an easy way to get started without having to learn anything on the command line (or need an easy way to take advantage even though you’re a Windows-only user), you’re in luck. Today, we’re going to look at two ready-to-rock ZFS-enabled network attached storage distributions: FreeNAS and NAS4Free.
-
-
-
-
Technologic unveiled a Yocto Linux-ready COM with a single- or quad-core Freescale i.MX6 SoC and optional wireless and industrial temperature support.
-
The networking focused Enea Linux 4.0 has arrived with new virtualization features including KVM and Open vSwitch support, plus a Yocto 1.6 build.
Swedish telecom software company Enea announced version 3.0 of its Yocto-based commercial Linux distribution and development platform in May 2013, adding real-time Linux support, among other features. Enea Linux 4.0 instead focuses on virtualization, largely absent from previous versions. The additions bring it up to speed in serving Network Function Virtualization (NFV) solutions, says Enea.
-
I have been particularly interested in the subject of device interoperability for a while now, and long thought that to reach our tech visions of the future, we will need cooperation way beyond what we have today. We would need open source, community-driven protocols and platforms, just like what we’ve had for years in various Internet protocols, only a level higher. After discovering AllJoyn, realising that there are others out there who share my vision, and seeing that lots of progress had already been made, I obviously became very excited! After writing a blog post, and getting in contact with a number of people from the AllSeen Alliance, the subject of a sponsored membership was brought up, and of course I was more than happy to get on the bus!
-
Phones
-
Intel created the Modello User Interface as an open source Interface mainly as a proof of concept. It was developed using HTML5, and hopes to show the advantages, and speed of development of HTML5 applications opposed to native apps. This IVI solution is designed for the modern world that Intel sees that we deserve to have, as part of our car IVI system. Modello can also be used to test Tizen web and javascript APIs, and also their performance on various hardware, in this case being the Nexcom VTC-1010 IVI unit.
-
Ballnux
-
There is much hubbub around Amazon’s Fire Phone this week. The newly announced smartphone is Amazon’s first foray into smartphones, and the press is heralding many of the innovative new hardware-driven features in the phone, some of which will make reading and consuming content very easy.
-
Android
-
Amazon have JUST announced their new edition to the Fire family. Today at a special launch event in Seattle Amazon announced what many had been long expecting. The ‘Fire Phone’ is the first Amazon manufactured phone to hit the market and comes with a wealth of features and services.
-
-
-
Please note this guide is only for officially supported devices. If you are one of the many devices which are not currently supported then don’t worry. In the next couple of days we will post a more in-depth tutorial to help you install CM on your unofficially supported device manually.
-
If you’re worried about the NSA listening in on your smartphone, Silent Circle’s “Blackphone” may be the last best hope.
-
How is your phone doing? Does it look tired? Are you fed up with its slow performance and lagging features? Well, not to worry. Themukt.com is here to give you a run-down of what we think are the best custom ROM’s available for 2014.
-
The next version of Google Android will likely include a major change that average users won’t notice at all… unless they notice that apps generally run more quickly.
Google has been working on replacing the Dalvik virtual machine that powers Android apps with something called ART since last year. Now it looks like ART is just about ready for prime time.
-
Facebook may create some of the world’s best open-source software, but other companies must rise to support it.
-
There are many useful open-source technologies out there. With all of this competition, it’s critical to make it clear why your particular open-source offering should be considered, and for which needs. That’s the reality any builder of an open-source community needs to adopt right from the start: While participation by developers in an active, viable open-source community will undoubtedly improve their projects, as well as your product’s evolution, getting a community up and running can be a challenge.
-
-
-
Web Browsers
-
Mozilla
-
Thanks to a $3.89 million grant from the John S. and James L. Knight Foundation, a Miami-based philanthropic group that focuses on media and the arts, Mozilla is embarking on a project that will help connect some of the world’s top journalists with readers, viewers and content consumers.
-
The New York Times and The Washington Post announced on Thursday that they had teamed up with Mozilla to develop a new platform that will allow them to better manage their readers’ online comments and contributions. The platform will be supported by a grant of roughly $3.9 million from the John S. and James L. Knight Foundation, an organization that gives substantial money to promote journalism innovation. Mozilla, the maker of the Firefox web browser and a nonprofit that works for open standards on the web, will help The Times and The Post build the technology for a platform tailored to news organizations.
-
-
-
SaaS/Big Data
-
OpenStack, the open source cloud operating system, is not the most widely deployed private-cloud platform. But it’s a close second, according to a new survey from database vendor Tesora, which also said the rise in OpenStack adoption is helping push organizations toward scalable database and database-as-a-service (DBaaS) solutions.
-
-
-
Interest in software defined networking continues to grow, and for many, OpenStack and OpenDaylight are the natural tools for transitioning data centers to this new paradigm in network communications. Both are active and growing open source projects backed by a large community of companies and individual developers.
-
Databases
-
Tesora hopes its OpenStack contributions will give it an edge on Amazon, but this may be wishful thinking at best.
-
Funding
-
Today it’s announced a $30 million Series C funding round which they claim was oversubscribed.
-
BSD
-
The FreeBSD “Newcons” effort to provide a new VT console driver continues making progress for its more proper debut in the next major FreeBSD release.
-
For years the open-source Intel Linux graphics driver developers have been working on frame-buffer compression (FBC) support but never it’s worked out quite good enough to turn it on by default in full. Frame-buffer compression has the ability to reduce power consumption for those using Intel HD Graphics while reducing the amount of memory bandwidth used for screen refreshes. Now though the Intel DRM FBC code has been re-worked and perhaps this time it will be flipped on by default.
-
FSF/FSFE/GNU/SFLC
-
I’m in the process of moving to a new OpenPGP key, and I want to include a small JPEG image of myself in it. The OpenPGP specification describes, in section 5.12.1 of RFC 4880, how an OpenPGP packet can contain an JPEG image. Unfortunately the document does not require or suggest any properties of images, nor does it warn about excessively large images. The GnuPG manual helpfully asserts that “Note that a very large JPEG will make for a very large key.”.
-
Openness/Sharing
-
The man who trained more than 66 countries in open source methods calls for re-invention of intelligence to re-engineer Earth
-
In a letter to the Republican and Democratic leaders of the Senate, 75 media organizations — including Tribune Co., the parent corporation of the Los Angeles Times — have called for a floor vote on the bill. The letter was sent to Sens. Harry Reid (D-Nev.) and Mitch McConnell (R-Ky.) a few days after the Supreme Court refused to hear the appeal of James Risen, a New York Times reporter who has been contesting a subpoena requiring him to testify at the upcoming trial of a former CIA agent. The agent, Jeffrey Sterling, is accused of revealing classified information about a failed CIA plan to compromise Iran’s nuclear program, an operation described in a book by Risen.
-
I am personally responsible for the break in by five CIA employees into the Democratic Natl Hq at the Watergate office complex. Let’s walk this back a bit. Among Pres Nixon’s close aides in the 1970s who went into the slammer for (among other crimes) obstruction of justice were my two UCLA drinking buddies also my political enemies, Bob Haldeman and John Ehrlichman. The “third man” at UCLA, also a drinking companion at Westwood’s Glen bar, was Alex Butterfield, another Nixon aide, who spilled the beans with his surprise disclosure that Nixon taped his criminal activities. (Later, when I spoke to Alex, who was never prosecuted, and asked if it was all a CIA plot to dethrone the president, he just smiled at me signaling well yeah maybe but you didn’t hear it from me.)
-
-
Open science research and development hybrid development model can protect pharma company profits while reducing costs of medicines for consumers
-
Programming
-
The Freecode site has been moved to a static state effective June 18, 2014 due to low traffic levels and so that folks will focus on more useful endeavors than site upkeep.
-
-
Kerala chief minister Oommen Chandy is apparently okay with the suggestion of converting the massive holding of the treasures, discovered in the cellars of the famous Sree Padmanabhaswamy temple, into a museum.
-
Health and OBL
-
A piglet rests at a farm in southern Spain. Low fertility rates among sows on Spanish pig farms in 2010 were traced to chemicals used to produce plastic semen bags.
-
Frank Dörner sees the rise in large scale attacks as a worrying development. He sees the state’s use of medical aid as a political instrument as one contributing factor. Dörner recalls how the US intelligence service CIA organized a fake vaccination campaign in 2011 to cover up the search for Osama bin Laden. As a result, “vaccine activists were killed in Pakistan,” and genuine campaigns had to be stopped.
-
For more than a decade, the CIA has deployed drones, satellites, spies, informants and tracking devices to thwart al-Qaeda in Pakistan.
The spy agency also considered a plan to wage war with toys.
-
-
Security
-
A security exploit has surfaced that can allow rogue programs to break out of Docker containers and access files on their host OS, but the flaw has been sealed in the latest version of the tech.
-
Defence/Police/Secrecy/Aggression
-
More than a decade after the beginnings of George W. Bush’s two wars, bombs are still falling in the invaded countries.
-
The most grotesque spectacle in recent years has been that of an Australian prime minister on tour in the United States. The bib has to be procured to capture the drool. Fawning admiration accompanies unqualified assertions of promise and valour in the face of common enemies and those who do not share the “values” of each country.
-
Supporting and arming a brutal dictator in Saddam Hussein and his catastrophic war against Iran, then bombing Iraq and imposing the most murderous sanctions in history, and then newly bombing Iraq and occupying it for 8 years while arming and training death squads and torturers and imposing sectarian segregation, creating 5 million refugees, and killing a half-million to a million-and-a-half people, while devastating the nation’s infrastructure, and then imposing a puppet government loyal to one sect and one neighboring nation. That, plus arming the new government for vicious attacks on its own people, while arming mad killers in neighboring Syria, some of whom want to combine parts of Syria and Iraq: that was all it took, and suddenly, out of nowhere, ignorant Arabs are killing each other, just out of pure irrationality, just like in Palestine.
-
If Hillary Clinton had had her way, the US would have armed Syrian rebels “two-plus years ago,” she says. The former secretary of state told CNN that she, the defense secretary, and the head of the CIA sought to arm moderates, but the president disagreed. “We pushed very hard. But as I say in my book, I believe that Harry Truman was right, the buck stops with the president.” Would that have affected the current crisis in Iraq? “It’s very difficult, in retrospect, to say that would have prevented this,” she noted, per Reuters.
-
US officials are all set to launch air strikes against ISIS-controlled parts of Iraq, but are warning of a major “intelligence gap” in the CIA regarding where potential targets might conceivably be.
-
The Green Party of the United States is calling for no new U.S. military action in Iraq, including on-the-ground troop deployment and airstrikes.
Greens are urging President Obama to resist demands by belligerent politicians and pundits for a U.S. assault in Iraq against ISIS (Islamic State of Iraq and Syria).
-
When a fire is raging, firefighters are called – not the arsonist who started it, especially if they return to the scene of the crime dragging a barrel of gasoline behind them. Yet, this is precisely what the US proposes – that they – the geopolitical arsonists – be allowed to return to Iraq to extinguish the threat of heavily armed sectarian militants streaming from NATO territory in Turkey and edging ever closer to Baghdad.
-
The United States is flying F-18 surveillance missions over Iraq from an aircraft carrier in the Persian Gulf, officials confirm to Fox News, as President Obama weighs options for “increased security assistance” in the country.
-
Although few in the United States dare say it, the U.S. military lost the war in Afghanistan a long time ago. As in Vietnam, if the weaker insurgents don’t lose, they win by just keeping an army in the field and hoping the stronger foreign occupier will tire of the conflict and go home. The American colonists used the same strategy to win their independence from Britain. After the U.S. forces leave Afghanistan at the end of 2016, the Taliban will likely be resurgent, and eventually most U.S. political and economic development efforts in Afghanistan likely will be reversed. Thus, unfortunately, much of what U.S. service personnel died or were wounded for will have been lost.
-
President Barack Obama has shifted his focus away from airstrikes in Iraq as an imminent option for slowing a fast-moving Islamic insurgency, in part because there are few clear targets that U.S. could hit, officials said.
-
On the face of it, “Pattern of Life” mines predictable territory, going back and forth between an American drone operator and a Pakistani villager, skillfully portrayed by Lewis Wheeler and Nael Nacer. Wheeler’s Carlo starts off as a callow macho man, but becomes more and more wary of what he’s doing.
-
-
British-Iraqi artist Athier Mousawi has fused these natural and man-made phenomena to create pictures that show the helplessness and despair of the countless, nameless people crushed or enmeshed by the tentacles of war.
-
Ten years ago today, the first CIA drone strike hit Pakistan, starting a bombing campaign that would span two US presidencies and three Pakistani administrations.
On the evening of June 17 2004, a drone targeted Nek Mohammed, a senior Taliban figure. But it also killed five other people – two of whom were children. While Nek Mohammed received detailed obituaries in major Pakistani newspapers, the children were not even identified by name. And 10 years after their deaths, details of what happened that evening are only just starting to emerge.
-
Nothing has exposed the delusionary disaster of the war on terror like the past week’s eruption of its mutant progeny across Iraq. David Cameron declared today that the Islamic State of Iraq and Greater Syria, rejected as too extreme and sectarian by al-Qaida itself, is now the most serious threat to Britain’s security.
-
“It’s a walk against drone warfare. The slogan is ‘Ground the Drones.’ We’re here to highlight that the drones kill primarily civilian noncombatants and create enmity among the countries where we’re using them. And if there’s one thing that will create more terrorists, it’s to keep using these drones.”
-
An American drone strike killed at least five people in North Waziristan on Wednesday, Pakistani officials said, as the Pakistani military continued its offensive against militants in that tribal district.
The officials said that two drones fired at least six missiles on a compound near Miram Shah, the main town in North Waziristan, as tens of thousands of civilians fled in anticipation of intense fighting.
-
A mining company has ordered 25 Desert Wolf Skunk unmanned aerial vehicles for breaking up riots with pepper spray and “blinding lasers.”
-
-
The supplier, South African-based Desert Wolf, describes the ‘Skunk’ as a “riot control copter” – but there are concerns it breaks international treaties on the use of torture, lasers and even the Geneva Convention.
-
-
-
American military involvement would inflame, not ease, Iraq’s sectarian divisions.
-
President Barak Obama has not yet announced a decision on the shape and extent of US military intervention in Iraq, but he may be considering targeted and selective air strikes.
-
chelsea-manningUS Army whistleblower Chelsea Manning wrote a remarkable piece for the Sunday edition of the New York Times (6/15/14), one of the most prestigious venues in the corporate media. It represents an extraordinarily clear statement from someone who is certainly one of the country’s most important political prisoners.
-
Tony Blair’s deceit over Iraq still contaminates British politics and continues to have the most shocking and lethal consequences. Time to lance this boil says Daily Mail’s Simon Heffer.
-
The United States was not “drawn” into Iraq in 2003; it made a conscious decision to launch a war. Thus it cannot be “drawn back” into the conflict either. It is nonetheless quite revealing that journalists employ this language, making US warmaking sound like a reaction–not an action.
-
The yearning to intervene, to bomb someone even if just to “send a message”, shows how thin is the veneer of sanity cloaking great power aggression.
-
The great command of the Nuremberg Tribunal convened after the Second World War to punish the evil that had shaken Europe was to abolish the “supreme international crime” – the planning and waging of wars of aggression. “War is essentially an evil thing,” the Tribunal held as it passed judgment on German leaders. “Its consequences are not confined to the belligerent states alone, but affect the whole world.”
-
The violent coming to power of a rightist regime in Kyiv, Ukraine in late February 2014 has opened an exceptionally dangerous political period in Europe. For the first time since World War II, a European government has representatives of fascist parties as ministers. These are the ministers of the armed forces, prosecution service and agriculture, and deputy ministers of national security (police), education and anti-corruption.
-
The US is keen to take a tighter grip on the Ukrainian energy sector, and the new government in Kiev is eager to help it do so. On Tuesday, Ukrainian Prime Minister Arseniy Yatsenyuk announced that the country’s gas transportation system was being handed over to US and European partners. Moreover, US Vice-President Joe Biden’s son is now a board director at the Ukrainian private oil and gas company Burisma.
-
Born and raised in Ukraine, Igor Kornelyuk worked as a journalist for over 15 years. He went to Ukraine to cover bloodshed there, but never returned home. His colleague sound engineer Anton Voloshin was killed alongside him in Ukraine’s army shelling.
Igor Kornelyuk and Anton Voloshin both worked for Rossiya TV channel. They are the first Russian journalists to have died while on professional duty in Ukraine since the coup in Kiev and the beginning of civil unrest in eastern regions.
-
Transparency Reporting
-
The Trade in Services Agreement document WikiLeaks has obtained is arcane, but it shows that Australia, the US, the European Union and 20 other large and small countries are talking about unprecedented mutual access to their financial service sectors.
-
This memorandum provides a preliminary analysis of the leaked financial services chapter of the Trade in Services Agreement dated 14 April 2014. It makes the following points:
The secrecy of negotiating documents exceeds even the Trans-Pacific Partnership Agreement (TPPA) and runs counter to moves in the WTO towards greater openness.
The TISA is being promoted by the same governments that installed the failed model of financial (de)regulation in the WTO and which has been blamed for helping to fuel the Global Financial Crisis (GFC).
The same states shut down moves by other WTO Members to critically debate these rules following the GFC with a view to reform.
They want to expand and deepen the existing regime through TISA, bypassing the stalled Doha round at the WTO and creating a new template for future free trade agreements and ultimately for the WTO.
TISA is designed for and in close consultation with the global finance industry, whose greed and recklessness has been blamed for successive crises and who continue to capture rulemaking in global institutions.
A sample of provisions from this leaked text show that governments signing on to TISA will: be expected to lock in and extend their current levels of financial deregulation and liberalisation; lose the right to require data to be held onshore; face pressure to authorise potentially toxic insurance products; and risk a legal challenge if they adopt measures to prevent or respond to another crisis.
Without the full TISA text, any analysis is necessarily tentative. The draft TISA text and the background documents need to be released to enable informed analysis and decision-making.
-
“And the quietest room is the women’s bathroom, the only room that’s easy to sleep in. So I thought I’d try and somehow get hold of it and renovate it. Eventually, somewhat reluctantly, the staff relented. They ripped out the toilet. They’ve been very generous.”
-
-
Julian Assange, a modern day hero and enemy of state, is preparing to mark two years in captivity inside the Ecuadorian embassy in London, with another major leak of state secrets and a fresh challenge to escape legal limbo.
-
Two years after he took refuge in the Ecuadorian embassy in London, lawyers for the controversial Wikileaks honcho rally for another attempt to secure his freedom.
-
We remember anniversaries that mark the important events of our era: September 11 (not only the 2001 Twin Towers attack, but also the 1973 military coup against Allende in Chile), D-day, etc. Maybe another date should be added to this list: 19 June.
Most of us like to take a stroll during the day to get a breath of fresh air. There must be a good reason for those who cannot do it – maybe they have a job that prevents it (miners, submariners), or a strange illness that makes exposure to sunlight a deadly danger. Even prisoners get their daily hour’s walk in fresh air.
-
Julian Assange. Well, it’s not happy per se, but tomorrow marks two years that he has spent stuck in the Ecuadorian embassy in London, which is surrounded at all hours by police. It is a good day to look back on the accomplishments of his information-leaking organization and reflect on how large an impact Assange has had and continues to have on issues of government, journalism, and whistle-blowing.
-
Julian Assange calls for US Attorney General Eric Holder to drop WikiLeaks investigation or resign.
-
-
Julian Assange – the Australian journalist, editor-in-chief and co-founder of WikiLeaks whistle-blower website – has now spent two years in the Ecuadorian embassy in London.
He went to live in the embassy after the UK Supreme Court had ordered his extradition to Sweden, where he awaits investigations of sexual assault allegations.
-
-
A room, shower, and the Internet – such is daily life for Julian Assange. For two years, the controversial and enigmatic co-founder of the whistleblower site WikiLeaks has been living at the Ecuadorian embassy in London.
-
The money spent on policing the embassy would be enough to keep 325 bobbies on the beat for a year, while the £9,000 daily cost is the same as it costs to put a child through state school for a year.
-
Finance
-
Zibechi’s new book forcefully exhibits how the insatiable drive for capital accumulation continues to dispossess and repress Brazil’s marginalized poor.
-
The news comes on the first full day of a visit by its leader.
The BBC understands the projects the state-owned China Development Bank (CDB) wants to invest in include High Speed 2 and the next generation of nuclear power stations.
A major deal between BP and China National Offshore Oil Corporation is worth about $20bn (£11.8bn).
-
Satochi Nakamoto (the nom de guerre of the mind behind Bitcoin) designed this flaw into the software because of one false assumption. What was that assumption? He believed that it was possible to build an open and free economic system built purely on simple self-interest (selfishness). Lots of people make this mistake (famously, Greenspan believed that selfish decision making would prevent the banking crisis of 2008).
-
PR/AstroTurf/Lobbying
-
-
Ever since the Supreme Court removed corporate spending limits on political campaigns via Citizen United, the field of American politics has become overwhelmingly dominated by the messaging of corporate donors and wealthy individuals. And two months ago, the situation got much worse. McCutcheon v. FEC removed limits on the total amount any one person can contribute. Now individuals can give more than $3.5 million over two years, instead of the previous $123,200 limit.
Who can afford to spend that kind of money on politics other than the very rich? And what, exactly, are they getting in return for their million-dollar donations? A lot more than a campaign t-shirt.
-
The Bradley Foundation and its directors have given nearly $18 million to groups that are now connected to individuals involved in the John Doe investigation and the campaign against it. That high-profile probe is examining possible campaign finance violations during the 2011 and 2012 recall elections as Wisconsin Club for Growth and other nonprofit “dark money” groups spent tens of millions trying to protect the seats of Scott Walker and Republican legislators.
-
Censorship
-
At a highly anticipated meeting last week, President Vladimir Putin spoke to Yandex’s Arkady Volozh and Mail.Ru’s Dmitry Grishin, both Internet industry leaders who stand to lose huge sums of money if the Kremlin’s Internet crackdown causes Russian consumers to take their business to foreign competitors like Google.
-
The government’s campaign for online censorship has created a backlash, with the number of Russia-based users of anonymous web surfing software Tor more than doubling in the past three weeks.
-
Privacy
-
-
In the last four hours, over 400 ORG supporters have contacted their ISPs to demand that they stop retaining customers’ email, SMS, web and phone data. It’s crucial that we keep up the pressure.
-
When the anonymous authors of the Truecrypt security tool mysteriously yanked their software last month, there was widespread suspicion that they had been ordered by the NSA to secretly compromise their software. A close look at the cryptic message they left behind suggests that they may have encoded a secret clue in the initials of each word of the sentence (“Using TrueCrypt is not secure as it may contain unfixed security issues”), the Latin phrase “uti nsa im cu si” which some claim can be translated as a warning that the NSA had pwned Truecrypt.
-
When popular security software TrueCrypt closed its doors, many users simply couldn’t believe that the stated reason – that the developers had decided to stop work because Microsoft had rendered their software obsolete – was true.
-
For example, the audit raised serious questions about code quality and the antediluvian build environment. But this is a bit like criticising a donkey for not being a horse. The groundwork was laid when Microsoft was only just waking up to the need for a secure development methodology.
-
Six additional Internal Revenue Service workers lost emails sought by congressional investigators when their computers crashed, investigators announced Tuesday, escalating Republican suspicions that the employees may have been trying to cover up political targeting of Tea Party organizations.
-
Lawmakers on Wednesday voiced concern over the Obama administration’s plans for monitoring individuals who hold security clearances as part of a crackdown in the wake of leaks by former government contractor Edward Snowden.
Sens. Charles Grassley (R., Iowa) and Ron Wyden (D., Ore.) said in a letter to Director of National Intelligence James Clapper that the stated possibility of “continuous evaluation” of legislative officials would raise constitutional questions and that extensive employee monitoring could inhibit people from coming forward to point out fraudulent or illegal activities. These concerns suggest growing worries among lawmakers about the extent to which the government’s monitoring capabilities will be turned on the legislative branch.
-
Facebook, the world’s most popular social media website, crashed for a brief while on Thursday. “We’re working on getting this fixed as soon as we can,” said an message on the website when users tried to log in.
-
-
-
The so-called “German NSA dossier” leaked on the Internet. According to Edward Snowden, over 50 files in the dossier contain information about the locations, where NSA agents stay in Germany.
-
According to new documents released by NSA whistleblower Edward Snowden, the US National Security Agency (NSA) is using third-party countries to gain access to thousands of fibre-optic cables in their jurisdictions.
-
Huge volumes of private emails, phone calls, and internet chats are being intercepted by the National Security Agency with the secret cooperation of more foreign governments than previously known, according to newly disclosed documents from whistleblower Edward Snowden.
-
One year ago this month, Americans learned that their government was engaged in secret dragnet surveillance, which contradicted years of assurances to the contrary from senior government officials and intelligence leaders.
-
Using documents leaked by National Security Agency whistleblower Edward Snowden, Der Spiegel reports that the NSA has turned Germany into its most important base of operations in Europe. “NSA is more active in Germany than anywhere else in Europe,” reports the paper, “And data collected here may have helped kill suspected terrorists.”
-
Europe’s top court is to rule on a case that seeks to force data protection authorities to investigate allegations that Facebook passes personal data to the US National Security Agency.
The case, brought by Austrian privacy campaigner Max Schrem, was referred to the European Court of Justice (ECJ) in Luxembourg by the high court in Dublin.
-
-
-
Leaks from the NSA’s Edward Snowden revealed the extent to which US technology companies were cooperating with intelligence agencies. Many at the time claimed that their hands were forced.
-
Ireland’s High Court has asked the European Court of Justice (ECJ) to review a European Union-US data protection agreement in light of allegations that Facebook shared data from EU users with the US National Security Agency.
-
THE European Court of Justice will be asked to examine the law governing data protection, following a student’s legal challenge over the mass transfer of data by Facebook to the US intelligence services.
-
The NSA may seem like an intimidating giant, but it has a serious Achilles’ heel— the enormous budget it claims from taxpayer dollars every year. While change to the actual words of the laws that govern NSA surveillance seems to be a difficult task, a group of representatives have decided to take the battle to the bank.
-
-
A bipartisan group of Congress members have proposed an amendment to the Fiscal Year 2015 Department of Defense Appropriations Act aimed at reining in government surveillance. The amendment would ban the funding of government to either demand or request a “backdoor” into products built by technology companies. It would also ban the funding of searches of the data of US persons under the authority of Section 702 of the Foreign Intelligence Surveillance Act (FISA).
-
If you call your Congressional rep today, we can stop NSA mass surveillance in its tracks. Today, Congress will vote on a critical amendment to the Defense Appropriations Bill: under this amendment, the NSA will be prohibited from using its prodigious budget to conduct mass, warrantless surveillance and to sabotage security standards and technology. This doesn’t solve all the surveillance problems, but it’s the cleanest, quickest and most plausible way to hamstring NSA spying. The last time this happened, Congress came within seven votes of passing it. The chances are even better now. CALL.
-
-
RADIO hackers have reverse-engineered some of the wireless spying gadgets used by the US National Security Agency. Using documents leaked by Edward Snowden, researchers have built simple but effective tools that can be attached to parts of a computer to gather private information in a host of intrusive ways.
The NSA’s Advanced Network Technology catalogue was part of the avalanche of classified documents leaked by Snowden, a former agency contractor. The catalogue lists and pictures devices that agents can use to spy on a target’s computer or phone. The technologies include fake base stations for hijacking and monitoring cellphone calls and radio-equipped USB sticks that transmit a computer’s contents.
-
-
The European Union has to rely on antitrust and privacy rules to curb Google’s search-engine dominance and can’t just break up the company, German Interior Minister Thomas de Maiziere said.
-
One of my primary responsibilities as your representative in Congress is to ensure that the privacy and civil liberties guaranteed in the Constitution for every American remain protected. Revelations that U.S. intelligence agencies have been collecting phone records, e-mails, credit card transactions and other private communications in the name of national security are breathtaking in their potential ramifications for the rights of our citizens. While law enforcement and the intelligence community should have all the resources necessary to combat terrorism, they should be held within the bounds of the Constitution.
-
A year after the Snowden revelations, Germany’s domestic spy agency has so little to say about the NSA surveillance scandal it calls into question the intelligence of the intelligence agency, says DW’s Marcel Fürstenau.
-
When talking of freewheeling domestic spying, it would behoove us to remember that it’s not just the National Security Agency (NSA) that needs reform and a tight leash. Hell, it’s not even just federal agencies who are disinterested in your Fourth Amendment rights. Like the war toys that move from the Pentagon down to myriad local law enforcement agencies, dragnet spying is happening at the state and city level, too.
-
One year ago this month, Americans learned that their government was engaged in secret dragnet surveillance, which contradicted years of assurances to the contrary from senior government officials and intelligence leaders. – See more at: http://www.vindy.com/news/2014/jun/19/time-to-end-nsas-secret-dragnet-surveill/?newswatch#sthash.r1kBLsr4.dpuf
-
-
The impact of Edward Snowden’s leaks about NSA spying have been the single biggest issue that has changed the conversation for VMware’s cloud clients, said Bill Fathers, VMware’s SVP of hybrid cloud services, at Gigaom’s Structure conference on Wednesday. “It’s been absolutely fascinating,” Fathers said in a conversation about making the enterprise comfortable with the public cloud. Currently just two or three percent of work loads are in the public cloud, but Fathers expects that to move to 20 percent over the years.
-
-
U.S. Vice President Joe Biden, who cheered Team USA onto victory over Ghana at Monday’s World Cup match in Rio de Janeiro, is on a mission of soccer diplomacy to repair relations with Brazil.
-
U.S. Vice-President Joe Biden briefly met with Brazilian President Dilma Rousseff on Tuesday in a bid to thaw stalled relations between the two nations
Biden, speaking to reporters in the U.S. Embassy after the abrupt cancellation of a joint statement he was expected to make with Brazil’s vice-president, said he reassured Rouseff that the U.S. had changed espionage tactics that previously led to direct spying of the Brazilian leader’s communications.
-
-
Speaking to reporters after the abrupt cancellation of a joint statement he was expected to make with Brazil’s vice president, Biden said he reassured Rousseff that the U.S. had changed espionage tactics, since it emerged last year that the NSA had spied on her personal communications.
-
The meeting was part of a diplomatic drive to improve relations between the two countries, which were damaged after Brazilian companies and Rousseff herself appeared among the alleged targets of espionage activities conducted by the US National Security Agency (NSA).
-
-
-
Britain’s GCHQ intelligence agency said on Tuesday it would start to share classified cyber threat information with private companies amid concerns over increasingly sophisticated targeting of businesses by hackers.
-
Iain Lobban, the UK spy chief, has defended GCHQ in light of the British media’s publication of the Snowden documents
-
-
Facebook status updates and Twitter posts are being intercepted by the UK Government because they are regarded as external communications from countries based overseas, it has been revealed.
-
Local officials in Bluffdale, Utah, have voted to help keep the NSA’s new data center hidden from public view.
Back in March, we introduced you to Nate Carlisle, a Salt Lake Tribune reporter who was waging war with local officials to learn a simple fact about the NSA’s sprawling data center, just completed in nearby Bluffdale.
-
The government is “truly devoted to the elimination of privacy in the digital age,” the lawyer and journalist told a sold-out crowd of 850 at Town Hall Seattle Tuesday night. “That’s not hyperbole.”
-
GCHQ has given itself legal justification for sweeping up the Facebook, Google, Twitter and YouTube data of UK citizens, without warrant, by labelling that kind of information “external communications.”
-
A majority of lawmakers in the House of Representatives now support a bill requiring agencies like the National Security Agency to get warrants before accessing private emails.
-
Actor and director Ralph Fiennes has described as “profoundly frightening” the idea that internet companies such as Google and Facebook hold data on their users that can be used by governments.
-
German magazine Der Spiegel on Wednesday posted a new cache of documents related to National Security Agency surveillance activities within Germany. Among the trove is a report that sheds new light on how the U.S. government may be using games to motivate analysts using XKeyscore, a tool for searching through online data that the agency collects that was revealed last year by former NSA contractor Edward Snowden.
-
For quite some time we’ve talked about the importance of ECPA reform. ECPA — the Electronic Communications Privacy Act — is woefully outdated. Passed in the 1980s, when the internet was just a small network that connected a few universities, it has allowed law enforcement and other government officials to snoop on your email based on some very outdated definitions and assumptions. As we’ve discussed in the past, one very obvious example, is the idea that, under the law, emails stored on a server for over 180 days are considered “abandoned” and that there’s no need to get a warrant to view those emails. Of course, that was back when people expected old emails to be either deleted or downloaded. No one predicted “cloud” computing with virtually unlimited storage.
-
Britain should grant Germany’s federal prosecutor access to an RAF base which is alleged to have acted as a relay station for data intercepted from Angela Merkel’s mobile phone by the US National Security Agency (NSA), the Labour MP Tom Watson has said.
-
Demand for cybersecurity skills in general began rising within the last five years, the report says, not because hackers are attacking networks more but because the defenders of those networks are far more aware of the hackers and are eager to employ someone who can set up ways to detect and stop them. In addition, the rise of state-sponsored stealthy cyber-espionage—and in some cases, even hard-hitting attacks suggestive of cyberwar–is heightening concerns.
-
At the front of the room, under a swag of the heavy red draperies and the American flag, sat the panel. The lineup was peculiar. The speakers, waiting for the audience to settle in, included a number of very big names from the intelligence community, including General Michael Hayden, by this time the former director of both the CIA and the NSA; James Woolsey, former CIA director; and Michael Mukasey, former Attorney General for George W. Bush.
And then there were the others. First among them was the facilitator and director of the Economic Warfare Institute herself. Dr. Rachel Ehrenfeld was a relative unknown who, throughout the long afternoon, would aggressively use her academic title at every opportunity, an unusual practice in this company. According to the available brochure, one of the other panelists would argue that jihadists were setting the wildfires ravaging Colorado that summer. Another, a former alternate director for the United States at the International Monetary Fund (IMF), would present a memorable anecdote involving complex terror scenarios not even Hollywood had ever produced.
-
Sens. Rand Paul (R-Ky.), Ron Wyden (D-Ore.) and Mark Udall (D-Colo.) pledged on Tuesday to fight against “limited” and “watered down” legislation to reform the spy agency, which they said includes the bill that passed the House last month.
-
NSA’s mass surveillance may unfairly implicate the country’s courageous reporters for communicating with insurgents
-
John Fleming sees plenty of parallels between police departments’ use of automatic license plate scanning technology and widespread electronic surveillance by the National Security Agency.
-
Cyber attacks are “not just about trying to paralyze people’s networks,” says senior NATO official Jamie Shea. “It’s also about trying to use cyberspace for propaganda.” Shea recently spoke to Deutsche Welle.
-
Germany’s top federal prosecutor has opened a criminal probe into espionage operations by the U.S. National Security Agency, particularly focused on the NSA snooping directed against German Chancellor Angela Merkel (shown).The goal, he said at a press conference, is to bring to justice specific individual U.S. government agents who were allegedly involved in the unlawful snooping operations against German officials. Prosecutions for spying on everyday citizens, while a violation of German law, will not be forthcoming — at least not yet.
-
The “Snowden effect” has hit the Show-Me State, and two state lawmakers hope the feds will take notice.
Sen. Rob Schaaf and Rep. Paul Curtman, both Republicans, have added a ballot to the August 5 primary that will allow Missourians to vote on whether the government shall be allowed to access their electronic communications without a search warrant.
-
-
Is there a benefit to understanding how your users, suppliers or employees relate to and influence one another? It’s hard to imagine that there is a business that couldn’t benefit from more detailed insight and analysis, let alone prediction, of its significant relationships.
-
The mainstream U.S. media prefers personalities over substance, so it was perhaps not a surprise that its focus at the first anniversary of Edward Snowden’s NSA leaks was on his alleged peculiarities, not the frightening prospect of a Big Brother state, says ex-State Department official William R. Polk.
-
A coalition of more than two dozen privacy and digital rights groups is asking President Obama not to renew a contested National Security Agency program when its legal authority expires this week.
-
Mary Barra, the embattled CEO of General Motors, currently embroiled in a recall scandal, is also on the Board of NSA surveillance contractor General Dynamics. Specifically, General Dynamics is the contractor helping the NSA process recorded phone calls going in and out of the Bahamas…
-
The London-based asset manager has already made its first two investments, investing US$ 8 million (£5 million) in Balabit, a Luxembourg-based company which specialises in detecting insider threats. The company does this with its technology which monitors normal and unusual behaviour, using algorithms to discover the latter.
-
The United States Court of Appeals for the Seventh Circuit has ruled against terrorism suspect Adel Daoud, saying that he and his attorneys cannot access the evidence gathered against him. The Monday ruling overturns an earlier lower district court ruling that had allowed Daoud and his lawyers to review the legality of digital surveillance warrants used against him.
-
-
The Bank of England’s CIO has advised businesses to be aware that partnering with US-based cloud suppliers could result in confidential data being accessed by government agencies such as the FBI and CIA.
-
The FBI released its 83-page “Twitter Shorthand” dictionary this week in order to give you a laugh or perhaps finally discern what that person you follow was getting on about in their last tweet.
-
Civil Rights
-
While Islamabad’s authority does not extend to the tribal areas, Taliban’s unofficial court in Waziristan rules on cases in Karachi
-
Weeks after he started working quietly as an FBI informant, Hector Xavier Monsegur, known by his online alias “Sabu,” led a cyber attack against one of the bureau’s very own IT contractors.
-
Len Padilla, Vice President Product Strategy, NTT Communications Europe discusses how ICT decision-makers have responded to PRISM allegations
-
A White House badly in need of some good news on the international front got some today with the capture of Ahmed Abu Khattala, a senior leader of the militant group Ansar al-Sharia and one of the primary suspects in the 2012 Benghazi attack that killed Ambassador Christopher Stevens and three other Americans. Abu Khattala’s capture may also show that the administration, which has been criticized for its reliance on lethal drone strikes and its failure to close the detention facility at Guantánamo Bay, has settled on a preferred method for dealing with senior terrorist leaders.
-
An Iraqi detainee at Guantánamo Bay, Cuba, was arraigned Wednesday on war-crimes charges before a military commission, setting in motion a case that could help determine whether the tribunals system will be used extensively in the future or wither away after the handful of cases before it are completed.
-
Britain must renegotiate the deal which allows a key American military base on Diego Garcia to demand that any use of the Indian Ocean island for “extraordinary rendition” can only take place with London’s prior approval, MPs warn today.
-
Detainee and combat operations by US on Chagos island must have cooperation of Britain, says Commons defence committee
-
The Commons Foreign Affairs Committee said public confidence had been “dented” by the disclosure in 2008 that the US had secretly used the island as part of its “extraordinary rendition” programme without informing British ministers – in contravention of previous assurances.
-
A PANEL OF TDs and senators have pledged to consider a petition asking for the Government to set up an investigation into US Military and CIA use of Irish airspace and Shannon Airport in particular.
-
Shannonwatch made a number of recommendations to the Oireachtas Committee, including that the government should establish an independent and impartial inquiry into the possible use of Shannon in the CIA’s illegal renditions programme.
-
Within hours of the Pentagon’s announcement that the key suspect in the Benghazi attack on the U.S. mission had been apprehended, the usual suspects came out to denounce the Obama administration.
-
While the CIA’s MK-ULTRA mind control research, and associated experimental programs concerned with interrogation, torture, and use of incapacitating agents and lethal weapons, involved many dozens, if not hundreds of top U.S. researchers, and cost many millions of dollars, actual testimony from its victims is extremely difficult to find.
Publishers, news agencies, and mainstream bloggers have shunned such stories, while most victims have been either too psychologically and physically damaged, or too frightened, to come forward. Others have been written off as “crazy.” Indeed, CIA stories about “mind control” have sometimes brought out persecutory delusions in the purely mentally ill.
-
Born just before the big crash of 1929, the brutal, charismatic James “Whitey” Bulger worked his way up through Beantown’s notorious Winter Hill Gang. This was after stints in juvenile hall, army stockades, and Alcatraz. The movie doesn’t mention it, but Bulger claims he was also forced into a CIA experiment with LSD. If so, his mind didn’t expand much past murder, mayhem, and vast extortion rackets. He was sharp enough to take advantage of the early-’60s crackdown on the Italian Mafia—something FBI chief J. Edgar Hoover once claimed did not exist.
-
The eagerly awaited autobiography of ‘Freeway’ Rick Ross has just been released. A notorious drug kingpin reigning over Los Angeles, California and operating across numerous other states, Rick was sentenced to life imprisonment in 1996. But following the discovery his drug source was linked to the CIA and he had been used as a pawn in the Iran-Contra scandal, he received a reduced sentence.
-
A British parliamentarian can sue the CIA, Pentagon and other intelligence agencies for information on the United Kingdom’s complicity in the extraordinary rendition of terrorism suspects, the D.C. Circuit ruled.
-
Cody Marrone, a Hernando County cop, was taken into custody over the weekend after it was discovered that he used the hot end of a hairdryer to repeatedly scorch the body of a 3-yr-old toddler.
-
The parents of a 19-month-old severely injured when police threw a flash bang grenade into his playpen during a raid met with federal authorities in Georgia Tuesday to plead for justice.
-
Internet/Net Neutrality
-
I and many others recently met to discuss the future of global Internet governance at the NETmundial conference in Brazil. Next week is the next milestone in the roadmap we set out there: the 50th meeting of ICANN, and the High Level Governmental Meeting of ICANN’s Governmental Advisory Committee on Monday 23rd. I thank the UK government and Minister Ed Vaizey for hosting such significant events in Europe, and would like to remind you all – colleagues, friends, stakeholders and Internet users of all kinds – why this is important.
-
Democratic lawmakers will unveil a piece of bicameral legislation Tuesday that would force the Federal Communications Commission to ban fast lanes on the Internet.
-
Intellectual Monopolies
-
Copyrights
-
Starting today, “The Internet’s Own Boy,” Brian Knappenberger’s award-winning, acclaimed documentary about Aaron Swartz, is available to pre-order as a Creative Commons-licensed (CC-BY-NC-SA) video download. You can stream the movie for $7 from most platforms, and for $10, you can buy it from Vimeo as a shareable, remixable download.
Permalink
Send this to a friend
06.18.14
Posted in News Roundup at 3:46 pm by Dr. Roy Schestowitz
Contents
-
Desktop
-
In the last fifteen years, the Linux desktop has gone from a collection of marginally adequate solutions to an unparalleled source of innovation and choice. Many of its standard features are either unavailable in Windows, or else available only as a proprietary extension. As a result, using Linux is increasingly not only a matter of principle, but of preference as well.
Yet, despite this progress, gaps remain. Some are missing features, others missing features, and still others pie-in-the sky extras that could be easily implemented to extend the desktop metaphor without straining users’ tolerance of change.
-
The government of the Indian state of Kerala has ordered all of its public sector agencies using Windows XP to migrate to free and open source (FOSS) operating systems by 30 June.
Nor is Kerala alone in doing so in India:
Since March this year, there have been moves across the Indian public sector to open source. The central government’s IT arm has encouraged agencies to switch to open source operating systems. Another state, Tamil Nadu, has told its departments to install open source operating systems.
-
Server
-
Manufacturers are getting on board with Linux virtual server hosting in part because oflower set-up and maintenance costs, and the ability to modify the OS according to their needs. Because of its flexibility, scalability, high availability and open-source nature, Linux virtual server hosting is becoming an increasingly attraction option for small and midsize manufacturing concerns.
-
Kernel Space
-
ALSA 1.0.28 features various small updates to the alsa-oss and alsa-tools components, adds new sound firmware files for the Cirrus Logic CS46xx, boasts small changes to alsa-plugins, and as usual most of the work happened within the alsa-lib and alsa-utils components. Within the ALSA library for 1.0.28 are many API updates while within the ALSA utilities area are many updates to ALSA Control and Speaker Test.
-
A few years ago we put together the CloudOpen conference to unite the open source projects and products companies are using to create cloud or elastic computing infrastructures inside their companies: OpenStack and CloudStack, containers technology like Docker, data clustering platforms like Hadoop, storage platforms like Gluster and Ceph, and automation tools like Puppet, to name just a few. The defining characteristic of all of these projects (besides being open source) is that they are delivering on the promise of distributed and elastic computing to enable scalable and responsive infrastructures.
-
Building upon the major blk-mq work for the multi-queue block layer, the SCSI multi-queue code is now in good shape according to its developers, is delivering very promising performance results, and should be merged into the Linux 3.17 kernel cycle.
-
The Ext2Fsd project that provides an EXT3/EXT4 file-system driver for Microsoft Windows operating systems was recently updated with Windows 8 support and other changes.
-
Graphics Stack
-
There’s been a bit of flip-flopping from various AMD sources and reports about whether their Mantle API will come to Linux in the near-term, which is AMD’s high-performance graphics API designed to complement OpenGL and Direct3D for the gaming space by offering faster frame-rates. Mantle for now remains Windows-only and bound to just the Catalyst driver with the more recent “GCN” graphics cards.
-
A number of commits have landed within mainline Mesa today for improving the open-source Radeon driver’s video encoding support via the recently exposed VCE video encoding engines and the recently introduced OpenMAX state tracker to Gallium3D.
-
Work on a Gallium3D approach to Mesa “mega drivers” is still progressing. The final reported patch series is now out there and the developer hopes to have the support merged over the next month.
-
Beginning this week, Eric Anholt is now working for Broadcom after working for Intel’s Open-Source Technology Center the past several years on the Intel Linux graphics driver stack. While Eric just started there, he’s already made some headway on a Broadcom DRM driver and expects to begin developing a Gallium3D driver soon.
-
Applications
-
-
-
-
We looked at some excellent open source security applications for small businesses in our article, 5 Open Source Security Tools for Small Business. This roundup includes more open source tools to protect your online privacy, evade snoops and censors, protect your passwords, and protect your data.
-
-
-
Instructionals/Technical
-
Wine or Emulation
-
Linux users need Wine to run applications from the Windows platform, but the bulk of apps accessed in this way is actually quite old. Sure enough, it’s possible to run newer software as well, but most users need Wine for much older stuff.
One of the latest updates for Linux kernel 3.14.x brought some modifications and users found out that they couldn’t run Wine configured as Windows 9x, which is actually an important option.
-
Games
-
-
-
-
As you may know, Valve, now a member of The Linux Foundation, has initiated some ambitions projects: the SteamOS, a Linux operating system optimized for gaming, the Steam Machine, a gaming colsole that will run with SteamOS and the Steam Controller, a game controller specially designed for SteamOS and the Steam Machine. A demo video presenting the updated Steam Controller is available here.
-
-
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
Here we are in conversation with Sanjiban Bairagya, a current Google Summer of Code 2014 intern who is working on Marble for KDE and is one of the younger, fresher, newer lots at KDE and has quite a bit to offer in terms of enthusiasm and brilliant ideas as well as zeal!
-
KDE is organizing a “coding sprint” in Randa, Switzerland. KDE Developer Sprints are focused gatherings of KDE developers to work on a specific part of KDE. Sprints are an opportunity to plan, design, and hack (think 20% socialization and 80% perspiration). Though sprints are supported by KDE e.V. financially and organizationally, we are having more enthusiastic people than funds allotted to us by KDE e.V. We need your support in helping us to fill this gap.
-
Phonon, a pillar of our multimedia solutions, was revived in Randa. Kdenlive, our video editor, became 302% more awesome in Randa. The KDE Frameworks 5 movement seeking to make our awesome libraries more useful to all the world started in Randa. Amarok 2 was planned in Randa. Approximately a godzillion bugs were fixed in Randa.
-
Two years later I gave a presentation summarizing these thoughts at Akademy in Dublin. A desktop layer that was stackable like a normal window (“dashboard” in today’s jargon), scripted components instead of compiled applets, dataengines, network services, dynamically loading different layouts for different user activities, using threads to keep the UI fluid, easy animation systems, configure/manipulate-in-place, a window manager that did more than just put title bars around things, etc. It was finally time to get to turning scribbles in notebooks into code. (I was still maintaining various parts of KDE’s 3.x desktop at the time, in particular kicker, as well as working on a variety of other bits of KDE software. This, along with a semi-crazy travel schedule kept me busy with productive things while these ideas were crystallizing.)
-
-
KDE Frameworks 5 will be released in 2 weeks from now. This fifth revision of what is currently known as the “KDE Development Platform” (or, technically “kdelibs”) is the result of 3 years of effort to modularize the individual libraries (and “bits and pieces”) we shipped as kdelibs and kde-runtime modules as part of KDE SC 4.x. KDE Frameworks contains about 60 individual modules, libraries, plugins, toolchain, and scripting (QtQuick, for example) extensions.
-
KIG currently has filters for various formats ( Cabri, Dr-Geo, KGeo, KSeg ). I have been working on implementing the Geogebra-filter for KIG. Here’s some introduction about the Geogebra-filter that we are trying to implement :
-
As the title (Lyrics Support improvements) of my Google Summer of code project suggests, I am improving the way lyrics are fetched and displayed in Amarok. Personally, I like to follow the lyrics of the song that is playing; so I added this is idea to the Idea Page for GSoC 2014. And now here I am, working on it. I goal of my project is to highlight the particular line from the entire lyrics text that is being played.
-
In the last two weeks, besides the coding work on the git repositories, Boudewijn has made available a hefty number of testing builds for the windows community. This builds brings up the latest novelties and features developed in the master branch. Note, however, not all feature sets are finished and it is not recommended for production use. Get the bleeding edge build
-
GNOME Desktop/GTK
-
Previously, I described a work-in-progress design that we have been pursuing in GNOME design. Since that post, the process has diversified, and we are exploring several variations on the original design. These different options are in a state of evolution, and we are developing and evaluating them in parallel. To help with this, Jasper has created a couple of rough prototypes that we’ve been testing.
-
-
Linux isn’t a complete operating system — it’s just a kernel. Linux distributions take the Linux kernel and combine it with other free software to create complete packages. There are many different Linux distributions out there.
If you want to “install Linux,” you’ll need to choose a distribution. You could also use Linux From Scratch to compile and assemble your own Linux system from the ground up, but that’s a huge amount of work.
-
There are so many Linux distributions in the world that sometimes it’s difficult to keep track of each and every one of them. Despite what people might think about Linux distros, the truth is that most of them are actually uninteresting and of sub-par quality.
-
Red Hat Family
-
According to DeLisa Alexander, executive vice president and chief people officer at Red Hat, they will also need to listen to their employees in a different way. And perhaps trying not to see them as Millennials could help avoid the pitfalls of stereotyping, she says.
-
-
-
-
-
-
-
-
Red Hat, the world’s largest Open Source company, is all set to acquire eNovance, a provider of open source cloud computing services. eNovance specializes in systems integration capabilities so Red Hat is adding more Open Stack capabilities to its arsenal.
-
-
Fedora
-
FedoraToday in Linux news, Fedora 21 is not delayed says Matthew Miller, newly appointed project lead. Bruce Byfield thinks he knows the seven things the Linux desktops needs to be nearly perfect. Jamie Watson says KaOS is solid and focused. Richard Hughes gives his thoughts on replacing Yum with DNF in Fedora 22. And finally, OMG!Ubuntu! is speculating that Civilization IV is probably heading towards Linux.
-
I’ve been interested in Linux and FOSS in general since 1997, and employed by Red Hat since 2001. My current job is in the Open Source & Standards team in the Red Hat CTO Office. I am leading up the effort within Red Hat to promote Free and Open Source Software in education. I also do work to promote open hardware and support 3D printers on Fedora. Last, but not least, I handle Fedora’s legal issues (but am not a lawyer). I maintain around 300 packages in Fedora.
-
Last week it looked like Fedora 21 might be delayed to allow more time for some ongoing work within the Fedora Server Working Group. Fortunately, a delay has been avoided for now.
-
-
-
-
Android is one of the most popular mobile operating systems (and it is based on the Linux kernel too.) However, diving into developing apps for Android can appear to be a bit daunting at first. The following how-to runs you through the basics of setting up an Android development environment on your Fedora machine. The basic workflow is to download the Android SDK, use the SDK to generate a quick first “hello world” application, then test out that application with either a physical Android device or the Android emulator.
-
Debian Family
-
As some good news for Debian users running a Radeon HD 7000 series or newer graphics card where the GLAMOR 2D acceleration support is required, GLAMOR support has been enabled within the Debian experimental repository.
-
Derivatives
-
Canonical/Ubuntu
-
Ubuntu is one of the most popular GNU/Linux-based operating system, along with Linux Mint. Ubuntu started off as a great operating system which, with the help of LUGs and communities, became extremely popular.
-
Unlike other attempts at aping the appearance of Cupertino’s finest OS, this one actually looks and feels like it was made for Linux and not the half-hearted mish-mash of OS X assets laid over basic theming that other themes of this ilk tend to resemble. If Apple made a GTK3 theme chances are it would look like Zukimac.
-
Ubuntu is the distro people love to hate. That is ironic, as it’s spawned a larger number of currently forked distros than any other flavour of Linux. Just take a look at the GNU/Linux Distribution Timeline from futurist.se/gldt. It’s a truly nuts diagram of just how forked the Linux world has become. Totting up the currently live distros, Ubuntu is easily the most fertile with 70 forks. Debian and Red Hat have just over 60 each, and as for the total? We lost count after 280…
True, Ubuntu is a fork of Debian, but without the hard work of Canonical and its contributors I doubt those 70 distros would exist as forks of Debian. So I puzzle over the level of animosity that Canonical stirs in some sectors of the Linux community. The recent Debian debate on Systemd or Upstart generated a lot of noise against Upstart, but why would Canonical do anything but put Upstart forward as its primary choice? Why hate a company for putting its own developed project first?
Certainly, Canonical does make some odd decisions, but then many large companies do. Internal politics, lawyers, and the personal preferences of charismatic owners can sway decisions that look odd from the outside. That’s why this issue we’re going to fix Ubuntu. It’s the ideal time, too: the latest long term support release, 14.04 Trusty Tahr, is out, and you’ve likely installed it. So now’s the time to put right all those things that annoy you about Ubuntu. You can get started right now with this issue!
-
-
Ubuntu for phones is becoming more stable and new applications arrive every day, but some of the older core apps, like the Dialer and Contacts, remained a little behind the general design. That has changed now, as the Dialer is using the folded background concept and the Contacts entry has been improved.
-
-
The Linux kernel is one of the most important packages in a distro and, in fact, it’s essential to the OS. Most users won’t actually feel the impact of a new kernel, but having the newest one possible is very important, if only for the improved hardware support.
-
Flavours and Variants
-
Personally I think Lubuntu is great, especially for low end computers short of RAM. Lubuntu lends itself perfectly to netbooks and I wrote an article when Lubuntu 13.10 was released explaining why.
Shortly I will be showing how to try Lubuntu out without messing up your current Windows XP installation. Before I do though I thought I would list a few alternative reviews so that you can get a fully balanced opinion.
-
Starting with Linux Mint 17 Qiana, the next Linux Mint systems will be using only the LTS versions of Ubuntu as code bases. While Linux Mint 17 Qiana is based on Ubuntu 14.04 Trusty Tahr and is supported until 2019, the next systems will be Linux Mint 17.1, Linux Mint 17.2, Linux Mint 17.3, all based on the same Ubuntu 14.04, while Linux Mint 18 will be based on Ubuntu 16.04, and so on.
-
It’s always nice to come across Kubuntu being used in the wild. Recently I was pointed to a refurbished laptop shop in Ireland who are selling HP laptops running Kubuntu 14.04LTS. €140 for a laptop? You’d pay as much for just the Windows licence in most other shops.
-
-
CircuitCo debuted an HDMI- and flash-free OEM version of the BeagleBone Black called the “BlueSteel-Basic,” to be followed by industrial and COM versions.
-
-
As you may know, the IFC6410 Pico-ITX is a single-board computer powered by a Qualcomm Snapdragon 600 CPU, having 2 GB of RAM memory, 4 GB internal storage, 2 USB ports, Gigabit Ethernet port, Wifi, Bluetooth, a SATA connector and other pins and conectors, capable of running Ubuntu 14.04 and Fedora 20 systems, with open source graphics drivers from the Freedeno project.
-
Already, MIPS is widely used in smartwatches, such as the new Android-ready SpeedUp Smartwatch-S, and it supports Google’s upcoming Android Wear platform, claims Imagination.
-
Phones
-
Android
-
Oppo is a relative newcomer out of China offering high-end phones that are gaining popularity in developed and emerging markets. Its new offering the R1 combines processing power, design and feel. Powered by the MediaTek MT6582 with 4 cores humming along at 1.3GHz with Mali-400 graphics unit the phone has a 1GB RAM and 16GB of storage. The R1 runs Android 4.2.2. The 5-inch (1280×720) high-definition screen is crisp and clear. Both front and back are a mirror-like glass. The buttons on the front have very faint markings but do light up a little when the screen is on. This device certainly has a quality feel and look.The cameras are 8MP rear and 5MP rear. Travel a lot? Duel sims give you carrier flexibility. Oppo is clearly a new kind of Chinese manufacturer and this is a solid phone for the business traveler.
-
Marc Cohn, senior director of market development at Ciena Corp. (NYSE: CIEN) and chair of the ONF market education committee, kicked off the discussion and highlighted the European Telecommunications Standards Institute (ETSI) Network Functions Virtualization ISG’s decision to start its own open source project, called Open Platform for NFV, or OPN, with the Linux Foundation , which already runs OpenDaylight .
The idea, Cohn said after the panel, is to develop a framework for an open NFV platform in a similar way that OpenDaylight has created an open source approach to an SDN controller. Participation in the OPN requires a financial buy-in for both network operators and industry hardware and software vendors, and if it follows the Open Daylight model, would also require the contribution of code.
-
By open sourcing that technology, the global security community can probe it for weaknesses and make it even stronger, said Professor Alan Woodward, security expert from the computing department at the University of Surrey. It should also inspire confidence that there are no backdoors or purposeful weaknesses, as the security community would be keen to probe the code, he added.
-
-
TextTeaser, the text-summarization API that TechCrunch first profiled back in October 2013, is now open source and available on GitHub. Creator Jolo Balbin says that he decided to make the code available after “stumbling upon some scalability issues, especially in the API.”
So he took down the API and recoded TextTeaser to make its auto-summarization process faster. Developers can chose from two plans, including one that costs $12 for every 1,000 articles summarized. The second is an enterprise plan that costs $250 per month and comes with a dedicated server that can store the article source. That means each time someone uses the tool to summarize an article, TextTeaser will learn the keywords in the text and use it to improve its results.
-
Web Browsers
-
Chrome/Google
-
The PDF code in Google Chrome has been made open source and available for use in apps for viewing, printing and form filling PDF files.
-
Virtualization is changing the IT landscape, and two news items last week drove home its impact. The first was Google’s release of Kubernetes under an open-source license. Kubernetes is basically a public version of Borg, the software that the company has used internally to harness computing power from across its data centers into a massive virtual machine.
-
SaaS/Big Data
-
Databases
-
MemSQL, which provides Big Data analytics based on an in-memory database, and GoGrid have partnered to simplify deployment of the analytics solution within the cloud.
-
How do you choose the best Linux filesystem for your MariaDB server? The primary factors to look at are data integrity, performance, and ease of administration. Data integrity tops the list because fixing a corrupted database is even less fun than it sounds, and filesystems play a key role in data integrity. Performance is important because faster is better and time is money, and ease of administration matters for the same reasons as performance.
[...]
Trying to figure out which filesystem gives the best performance may be fun, but the filesystem won’t make a large difference in the performance of your MariaDB server. Your hardware is the most crucial factor in eking out the most speed. Fast hard drives, discrete drive controllers, lots of fast RAM, a multi-core processor, and a fast network have a larger impact on performance than the filesystem. You can also tailor your MariaDB configuration options for best performance for your workloads.
-
Oracle/Java/LibreOffice
-
Here at the Fedora Project, we love our upstream projects, they are the folks that produce all the awesome software that we ship to make Fedora awesome. This weekend the folks at LibreOffice — the default office suite shipped in Fedora — are holding a bug hunt event in the lead up to their next release (LibreOffice 4.3.0). To participate in the BugHunt, simply download a development RPM, test it out, and file bugs.
-
-
-
FSF/FSFE/GNU/SFLC
-
When most of us are looking for a photo-editing tool, we immediately think of Photoshop. Adobe’s program is powerful and popular, but it’s pricey at $100—and that’s for the “light” version called Photoshop Elements.
Meanwhile, $20 per month is the standard charge for individual one-app subscriptions to Photoshop Creative Cloud. Adobe offers a free in-browser version called Photoshop Express Editor, but it’s very limited and only allows you to edit JPEG files.
A better free alternative is to turn to the open-source world and a popular program called GIMP. The GNU Image Manipulation Program is the standard photo-editing tool included or available to most Linux distributions. GIMP is also available for Windows (XP and up) and Mac.
-
-
Public Services/Government
-
Next Monday, the European Parliament’s budget committee will consider a proposal from the Green/EFA group to pilot the use of open source encryption software, to be used by parliament members and their staff. The Green/EFA group is also asking to trial the use of open standards and open source to make available the EP’s data available in machine-readable format.
-
Openness/Sharing
-
EZTV users may download many TV-shows for free, but they are by no means cheapskates. A team of filmmakers from Laos recently noticed that nearly all traffic to their Indiegogo campaign came from the torrent site. As a token of their appreciation they have now offered to open source their first horror film, if their funding goal is reached.
-
If you haven’t heard, science has been experiencing some issues. Though most scientists believe in the ideals of openness, transparency, and reproducibility, the reality is that the incentive structure of academic research encourages exactly the opposite. So, scientists have a stronger professional incentive to get results published than to get them right. To make things worse, many scientists are stuck with outdated and closed source tools that aren’t up to the task of managing their increasingly complicated workflows.
-
Kaitlin Thaney is the Director of Mozilla’s Science Lab and an open science advocate. Her work in this space began with John Wilbanks building the science wing of Creative Commons (formerly known as “Science Commons”). Their focus was on crafting the infrastructure, policy and advocacy for Open Access and sharing data on the web. She moved to Digital Science, where the focus was on tools and science software, but there was still a gap.
-
Programming
-
Python 3.4 added a new asynchronous I/O module named asyncio (formerly known as Tulip). The asyncio module provides a new infrastructure with a plugabble event loop, transport and protocol abstractions, a Future class (adapted for use within the event loop), coroutines, tasks, threadpool management, and synchronization primitives to simplify coding concurrent code. In this overview of asyncio, I provide a brief introduction to the main components of the module and a few simple sample applications that work with some of the event loop functions.
-
When Kushal Das helped found the Durgapur, India, Linux users group in 2004, he was struggling to find a teacher who could show him the open source ropes.
“During that time,” Das said in a recent presentation at PyCon 2014, “there was almost no one to tell us what exactly to do with this thing called Linux, other than clicking randomly.”
-
While the open source community is filled with some of the most talented minds in the world, fresh perspectives from the next generation of developers is essential to the continued pioneering spirit of open source projects. Such an injection of youthful enthusiasm lends new creative blood to the open source community, allowing projects to stay cutting edge and in keeping with current trends.
-
Both OS X and Windows 8 are fairly closed operating systems, merely allowing coders to run commands and pulling a veil over the internals of the software powering the machine. The same goes for hardware: all-in-ones, laptops, and tablets alike aren’t easy for curious types to take apart and see what’s inside.
-
Standards/Consortia
-
In the context of its Action 2.15 on e-Documents, the ISA Programme of the European Commission has recently released the reports of two new studies…
-
“For various reasons, including my wife Claudia is slightly worried I could get killed, I am changing all of the names. All of the other details are intact.” A true story by James Altucher
-
I grew up in Los Angeles, the city by the freeway by the sea. And if there’s one thing I’ve known ever since I could sit up in my car seat, it’s that you should expect to run into traffic at any point of the day. Yes, commute hours are the worst, but I’ve run into dead-stop bumper-to-bumper cars on the 405 at 2 a.m.
-
Health/Nutrition
-
The early Hawaiian settlers, who arrived in the uninhabited islands around A.D. 300 from Polynesia, developed a unique system of resource management to support their growing population. Recognizing the connection between the mountains and the oceans and the key role of freshwater in linking the two, they divided the islands into self-sustaining units called ahupua’a. The ahupua’a were usually wedge-shaped sections of land that ran from the mountains to the sea (extending into coastal fishing grounds) and contained a freshwater source such as a stream, spring, or river. Each ahupua’a contained within it all the resources needed for a community to sustain itself independently.
-
Security
-
A recently disclosed vulnerability in version 3.14.5 of the Linux kernel is also present in most versions of Android and could give attackers the ability to acquire root access on affected devices.
-
-
-
-
-
Defence/Police/Secrecy/Aggression
-
CNN’s Brian Stelter–formerly of the New York Times–introduced an interview with New York Times reporter John Burns (Reliable Sources, 6/15/14) by calling him “one of the most famous war correspondents of all time.” This would put Burns in the same league as Edward R. Murrow, Ernie Pyle, Walter Cronkite, George Orwell, Ernest Hemingway, Stephen Crane, Jack London, Walt Whitman and Thucydides.
-
-
-
Transparency Reporting
-
Two years after WikiLeaks founder Julian Assange walked into Ecuador’s embassy in the UK seeking asylum, his whistleblowing group says it is set to release new classified documents pertaining to “international negotiations.”
-
Two years after WikiLeaks founder took refuge in Ecuadorian embassy, lawyers poised to challenge Swedish detention order
-
Finance
-
I appreciate that smart, ambitious people like you are thinking about a future of universal prosperity. You borrow terminology from finance in saying that you’re “way long human creativity”. While I’m creeped out by the commodification of our species’s ingenuity, I appreciate the sentiment. If our industry stops painting anyone who questions our business models as Luddites and finds creative ways to build products and services that sustainably address real needs, maybe we can hold on to the receding myth of triumphal disruption. Hopefully we can agree that there are many more meaningful quality of life improvements technology has yet to deliver on before we can start brainstorming the “luxury goods markets” of the future.
Meanwhile, we don’t need to wait until a hypercapitalist techno-utopia emerges to do right by our struggling neighbors. We could make the choice to pay for universal health care, higher education, and a basic income tomorrow. Instead, you’re kicking the can down the road and hoping the can will turn into a robot with a market solution.
[...]
The factory owner gets rich. The line worker, not so much.
-
In the first six months of this year, Senate Republicans used the filibuster to block the Senate majority from increasing the minimum wage, providing paycheck fairness to women, and enabling those with student debt to refinance at lower rates, paid for by insuring millionaires pay a minimum tax.
Senate Republicans joined Democrats to pass extension of unemployment insurance and comprehensive immigration reform. But Republican House Speaker John Boehner has refused to allow either measure a vote in the House, despite likely majority support for both.
Profits are at record heights and wages near record lows as a portion of the economy. CEO pay soars to new heights. The wealthiest 1 percent pockets nearly all of the nation’s income growth, while typical household income continues to decline. We are five years into the official “recovery” that has yet to reach most Americans.
-
Censorship
-
On 22 May 2014, General Prayuth Chan-ocha, Commander of the Royal Thai Army, launched a coup d’état, replacing the Kingdom’s beleaguered civilian political institutions with a military-led National Council for Peace and Order (NCPO). The move came after months of street protests, the most recent in Thailand’s ongoing political unrest. While Thailand is no stranger to military coups, this time the military junta is focusing unprecedented efforts towards restricting online speech and the digital rights of users in Thailand.
[...]
The most popular way to secure email communications is using Pretty Good Privacy (PGP), popularly available through its open source implementation, Gnu Privacy Guard (GPG). While PGP leaves metadata traces unencrypted (such as the email subject line and the sender’s and recipient’s email addresses), it encrypts the content and attachments of your email to ensure that only the intended recipients can read the message (all recipients must have GPG for this to work). For help installing GPG, follow Security in a Box’s walkthrough, which covers Windows, Mac OSX, and Linux operating systems. GPG is also available for Android devices with K-9 Mail and APG.
-
Privacy
-
So you already know about the NSA’s massive information-collection system to spy on U.S. citizens (courtesy Edward Snowden) which, perhaps, sends shivers down your spine? But did you also know that there is a network called Tor which you can use while surfing the Internet to dodge the NSA?
-
Mikko Hypponen has slammed US Secretary of State John Kerry for branding Edward Snowden a “coward” and a “traitor,” and saying that the US National Security Agency (NSA) document leaker should “man up” and return to the United States from Russia to “make his case”.
In not so many words, Hypponen said that Kerry should pipe down and have respect for Snowden after he blew the whistle on the world’s largest intelligence agency, the NSA.
-
It’s like hiring Darth Vader to build planetary defense systems to thwart the Death Star.
Except the analogy doesn’t quite work. Vader switched to the light side because of his love for his son. These guys are just doing it for the money.
-
Civil Rights
-
Today we’re in year four of the third spy investigation of a publisher in U.S. history. Since 2010 the Justice Department has investigated WikiLeaks, confirmed by court filings this April. Obama called the organization “deplorable” and continues to sponsor confining the organization’s editor-in-chief, Julian Assange, to the Embassy of Ecuador in London. June 19th marks the two-year anniversary of Assange’s entry into the Embassy. Public officials accused WikiLeaks of treason, called for Assange’s assassination, and asked private companies to cut ties to the organization. Ecuador granted Assange political asylum owing to the credible risk of torture, inhumane treatment, and unfair trial he would face here.
-
Whenever we write about Aaron Swartz and the criminal prosecution against him, some of our (and Aaron’s) critics scream that it was “obvious” that he knew he was up to no good, because he chose to spoof his MAC address on the machine he used to download JSTOR articles. Of course, as many people explained, spoofing a MAC address isn’t some crazy nefarious thing to do, and often makes a lot of sense. In fact, Apple recently announced that iOS 8 will have randomized MAC addresses to better protect people’s privacy. Simply speaking: Apple is making “MAC spoofing” standard. And, as the folks over at EFF are noting, this is a very good thing for your privacy.
-
It was close to 3 a.m. on June 6 when Courtland Kelley burst into his bedroom, startling his wife awake. General Motors (GM), Kelley’s employer for more than 30 years, had just released the results of an investigation into how a flawed ignition switch in the Chevrolet Cobalt could easily slip into the “off” position—cutting power, stalling the engine, and disabling airbags just when they’re needed most. The part has been linked to at least 13 deaths and 54 crashes. GM Chief Executive Officer Mary Barra, summoned before Congress in April to answer for the crisis, repeatedly declined to answer lawmakers’ questions before she had the company’s inquest in hand. Now it was out, and Kelley had stayed up to read all 325 pages on a laptop on the back porch of his rural home about 90 miles northwest of Detroit.
-
Internet/Net Neutrality
-
Intellectual Monopolies
-
Copyrights
-
In what is being viewed as an over-broad action with serious implications, a Canadian court has ordered Google to completely block a group of websites from its worldwide search results. The ruling was handed down despite Google’s protestations that the court has no jurisdiction over Google locally or in the United States.
-
As that indicates, this is a fairly specific result, rather than a broad general right as in the US digitization case. However, what is encouraging is that it is the latest in a string of good decisions handed down by the European Union’s Court of Justice that are starting to introduce a modicum of common sense to Europe’s outdated copyright laws.
-
When the police coerce registrars to suspend domain names there are a series of damaging knock-on effects, Iceland’s top domain registry says. ISNIC says that it’s difficult to repair the kind of damage suspensions cause to the credibility of top-level domains, something that could be avoided through better understanding of Internet functionality.
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »