EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

06.21.14

Links 21/6/2014: Russia Dumps x86/Wintel, Steam Summer Sale is On

Posted in News Roundup, Site News at 10:54 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Open-Source Tool Aimed At Propelling Honeypots Into the Mainstream

    Researchers have built a free open-source honeypot software program aimed at propelling the hacker decoys into security weapons for everyday organizations.

  • Google investing $50 million to get girls to code

    Google conducted research to determine why girls are opting out of learning how to code? As a result Google found that most girls decide before they even enter college whether they want to learn to code—so the Tech-world must win them over them at a young age. They also found that there were four major factors that determined whether girls opted into computer science: social encouragement, self-perception, academic exposure and career perception. According to recent studies less than 1 percent of high school girls express interest in majoring in computer science.

  • Web Browsers

    • Mozilla

      • Mozilla working on a WordPress, Disqus competitor?
      • ​How to Try Firefox OS Apps on Android

        Android: Mozilla is best known for its web browser, but the company also produces Firefox OS for a limited number of handsets. With a little sideways thinking, though, you can try some of its apps in Android.

        Much like Google Chrome, Firefox supports webapps—the OS and apps are built with the same technology—and this is how you can bring Firefox OS to Android. Apps work like browser extensions, so they take up very little room making them ideal for older devices or those with limited storage. Download a copy of Firefox for Android from the Google Play Store, or update your existing copy to 29 or above.

        Fire up Firefox and visit the Firefox Marketplace, the Firefox version of Google Play or the Chrome Web Store. Take a browse through the Marketplace and tap an app that takes your fancy. Just as with regular Android apps, Firefox OS apps let you know about the permissions they need, and you have to accept this before you install anything.

  • SaaS/Big Data

    • It’s time to stop the open-on-open violence in cloud computing

      A Structure conference panel discussing the state of open source cloud computing agreed that open source clouds need to get easier to use, but not on much else.

    • LeaseWeb Offers CloudStack-based Flat-Fee Private Cloud Service
    • Why I Built OwnCloud and Made It Open Source

      There I was, 4 years ago (this past January) at CampKDE in San Diego, giving a talk on data privacy, warning the audience about the risks to their privacy from cloud vendors – in particular, Dropbox. So, build it yourself they said. Sure, I’ve built things in the past, so sure, I’ll do it. And there is where I started my odyssey, first, to protect myself, my friends and my colleagues from the snooping of governments, and other bad guys, and later – as I saw the worldwide interest grow – to build a real and successful project.

      I had to decide a few things before I got started of course, including what it is I wanted ownCloud to do, what development platform to use, how I wanted to structure ownCloud, and of course, to name it ownCloud.

  • Oracle/Java/LibreOffice

    • LibreOffice 4.3 RC1 Get Multiple DOCX Improvements
    • LibreOffice 4.2.5 Released with Fixes from 800 Contributors

      The Document Foundation has announced that the final version for LibreOffice 4.2.5 has been released for all the available platforms, including Linux.

      This is just a maintenance release for the 4.2.x branch, but users of this particular version should consider upgrading nonetheless. The developers have squashed numerous bugs for this release and that can be easily observed from the changelog,

      LibreOffice 4.2.5 is now the most advanced build available from The Document Foundation, but the developers maintain a number of other branches as well. Users will be able to find the 4.1.6, 4.2.3, and 4.2.4 downloads on the official website…

  • BSD

Leftovers

  • After Forty-Seven Years, Computerworld, Tech Publishing’s Elder Statesman, is a Print Publication No More

    The news comes three months after the passing of Pat McGovern, who started IDG in 1964 as a research firm and put out Computerworld with a tiny staff in its earliest days. It’s sad to think of IDG losing its founder and flagship print publication so close together, but in a way, it’s also fitting.

  • Maybe it’s time to consider a Gross Domestic Happiness Index

    Just for fun, I checked to see which countries are the wealthiest in the world, based on a ranking of Gross Domestic Product (GDP) per capita. According to the Central Intelligence Agency’s (CIA’s) World Factbook, the crown goes to energy-rich Qatar, where GDP per capita last year stood at more than $102,000 US.

    Rounding out the list of top-10 richest nations are Liechenstein, Macau, Bermuda, Monaco, Luxembourg, Singapore, Jersey, Norway, and the Falkland Islands.

    Paraguay ranked a lowly 143rd, with a GDP per capita of just $6,800 per person in 2013. In fact, most of the happiest countries according to the Gallup poll results failed to crack the top-100 list of the world’s wealthiest nations, based on the CIA’s data.

  • Hardware

  • Security

  • Defence/Police/Secrecy/Aggression

    • Reflections on Fascism

      Iraq is back, as in blowback: this replaces Ukraine for the moment, America always on the lookout for a situation which can be turned, because of US policy in the first place, into a source of provocation. Iraq, our intervention guaranteed internal civil war, here, with the gains of ISIS, a chance to return in some form, concentrated drone attacks, rather than so-called “boots on the ground,” possibly to inflame the entire region, itself destabilized for obvious reasons (protection of Israel and the continued plight of the Palestinians). As Spinney and Polk wrote in CounterPunch, contradiction plagues American policy, in this case, turning to Iran for help against ISIS while threatening Iran for some time with severe military and economic punishment. How Obama and Kerry can keep straight faces is one for the annals of war.

    • The Redrawing of the Map of the Middle East Begins with the Destruction of Iraq

      The US is playing all sides of this exploding conflict, towards larger US/NATO objectives.

      The invading force, ISIS, is a creation of the US CIA and oil-soaked US allies Saudi Arabia, Kuwait and Qatar.It is an Al-Qaeda front. Al-Qaeda has been the military-intelligence arm of the CIA since the Cold War. ISIS is the Anglo-American empire’s leading military-intelligence army in its ongoing war against Syria.

    • Amerika’s “Third Crusade” In Iraq Is Having Trouble …

      Back in the early 2004, comedian Dave Chappelle produced a masterpiece entitled “Black Bush” – a comedic mockumentary of the events leading up to (and immediately following) the United States’ “second crusade” in Iraq, led by former president George W. Bush.

      [...]

      Now they’re our allies or something … sort of like al-Qaeda (who we were supporting in Syria) is now our enemy in Iraq.

    • Is Obama’s new Iraq strategy just a cover for expanding his secret war?

      At the White House on Thursday afternoon, the American president outlined an everything-but-the-war strategy that was classic Barack Obama: his press briefing offered perhaps a telling signal about his own expansive version of the Global War on Terror, while still managing to be subtly evasive about what he might actually do in Iraq.

      The US military will be increasing surveillance, Obama said, preparing to send military “advisers” to Iraq and urging, not so subtly, for a political shift away from Nouri al-Maliki’s government. He did not, of course, answer the question on everyone’s minds about how America plans to deal with the Iraq crisis: Will Obama engage in fighting to stabilize the country?

    • Pakistan condemns drone strike in North Waziristan

      Six suspected militants were killed in a drone strike in Miranshah Tehsil in North Waziristan, Pakistan, local tribesmen and Pakistani intelligence sources not authorized to speak to media told CNN on Wednesday.

      The drone struck a house and a pickup truck in the Daraga Mandi area of Miranshah, they said.

    • More than 400 US military drones lost in crashes: report
    • Dick Cheney Should be Rotting in The Hague, Not Writing Editorials

      This should be obvious to pretty everyone by now, but apparently the Wall Street Journal didn’t get the message. Today, the paper published an editorial by Cheney and his daughter Liz in which the former Vice President blasts the “collapsing Obama doctrine” of foreign policy.”

    • The U.N. Says 257 civilians Have Been Killed in East Ukraine but Refuses to Condemn the Ongoing Bombardment

      According to a recent report by the U.N. 356 people have been killed in the conflict in eastern Ukraine. Of these 257 were civilians, 86 were Ukrainian military. If these numbers are accurate it would mean that only 13 separatists have been killed so far (I find that hard to believe). The real death toll is likely higher than this.

    • CNN Brings Back Those Who Were Wrong on Iraq

      TV coverage of the current Iraq crisis looks a lot like 2003, when pro-war pundits, former generals and hawkish politicians dominated the debate. CNN’s Situation Room, hosted by Wolf Blitzer, illustrates how TV has returned to that narrow, pro-government discussion of Iraq.

    • Bertrand Russell Society Calls for the Elimination of Nuclear Weapons and Supports Lawsuit

      The Bertrand Russell Society held its 41st annual conference at the University of Windsor in Windsor, Ontario on June 13-15, 2014. Dozens of academics, students, and Russell admirers from five countries and eight US states attended the conference, which featured presentations on various aspects of Russell’s diverse interests and works, including his work in logic and philosophy, and his political writing and activism. Bertrand Russell was one of the twentieth century’s most important and influential philosophers and public intellectuals. He was awarded the Nobel Prize for Literature in 1950, and he was a founder and early leader of the nuclear disarmament movement.

    • Obama Prepares for Drone War in Iraq

      President Barack Obama announced on Thursday that he will send 300 Green Beret Army special operations soldiers to Iraq. They will be detailed to Iraqi National Army Headquarters and brigade HQs and their primary task will apparently be intelligence-gathering and helping with the Iraqi National Army response to the advances of the Islamic State of Iraq and Syria (ISIS or ISIL). Likely the intelligence-gathering in turn is intended to allow the deployment in Iraq of American drones. At the moment, the US has no good intelligence on the basis of which to fly the drones.

    • Iraq strategy: Obama, Congress leaders meeting

      Obama has ruled out returning combat troops to Iraq in order to quell the insurgency. However, he has notified Congress that up to 275 armed U.S. forces are being positioned in and around Iraq to provide support and security for U.S. interests.

    • Best Case Against Attacking Iraq? The Last Attack On Iraq

      As the latest reporting from both Baghdad and Washington, D.C. reveal diplomatic machinations paving the way for possible U.S. airstrikes in Iraq, increasing numbers of people are asking President Obama—and the American people—to look at the repeated and failed policy of military intervention in the region as the best argument against making the same mistake yet again.

    • Local Christians unite to protest for peace

      Critics claim these drone strikes have killed thousands of innocent civilians, including children.

    • Pentagon crashed more than 400 military drones
    • 400 drones crashed since 2001, six in Pakistan

      More than 400 large US military drones have crashed in major accidents around the world since 2001, a record of calamity that exposes the potential dangers of throwing open American skies to drone traffic, according to a year-long Washington Post investigation.

    • Military drones fall from the sky

      The unmanned military planes have slammed into homes, farms, runways and a transport plane in midair.

    • Drones crash with alarming frequency

      Commercial drone flights are set to become a widespread reality in the United States, starting next year, under a 2012 law passed by Congress. Drone flights by law enforcement agencies and the military, which occur on a limited basis, are projected to surge.

    • Report: Over 400 Military Drones Have Crashed Since 2001
  • Transparency Reporting

  • Environment/Energy/Wildlife

  • Finance

  • PR/AstroTurf/Lobbying

    • Criminal Justice Media’s ‘Twisted’ Coverage

      Khan strayed from most media coverage around New York’s “biggest gang raid ever” by writing about the people living in the housing projects at the heart of the early-morning 400+ officer raid (complete with helicopters and riot gear), and by including voices of residents critical of it. The initial New York Times story (6/4/14) included only official accounts. The Rupert Murdoch-owned New York Post (6/4/14) printed Facebook quotes of some of the teenagers indicted (an apparent attempt to prove their guilt in the court of public opinion–a guilt assumed by the headline’s flat assertion about “Rival Gangs Arrested”), as well as quotes from the Manhattan district attorney and residents offering comments supportive of the end to alleged violence–if not the raid itself.

      [...]

      It’s of course this type of media objectivity that allows for authorities to dominate public discourse through the virtual invisibility of criticism. Their heightened voice, made possible by the media’s willingness to become echo chambers for them, point to a relationship where the line between media and the state is blurred.

  • Censorship

    • Laziness Is Censoring the Internet

      Every time a government attempts to censor the Internet and block access to websites, advocates of Web freedom ritually respond that the effort is useless: Technology will beat police action every time. It’s true — but only to the extent that people are interested in resisting. Most aren’t, which is why governments have not stopped messing with site blockages and other Web restrictions.

      A few days ago, Iraq blocked the social networks, as beleaguered governments sometimes do, believing it would cut off activists from each other and stop them from organizing. Immediately, traffic to Tor, the anonymous network supported by volunteers throughout the world, rocketed…

    • Twitter ends censorship of ‘blasphemous’ tweets after #TwitterTheocracy campaign
    • Government of [CENSORED] censors cyberbullying docs

      The Star has obtained documents related to the Conservatives’ controversial Internet surveillance bill that have been heavily censored — even blocking out the “Canada” in “Government of Canada.”

  • Privacy

    • Don’t panic about Facebook outages, the NSA has your back

      Yet they don’t seem to think about what they lose when Facebook hands that personal data over to the NSA, or to any other security or intelligence authorities, such as GCHQ in the UK.

    • EU judgement on Facebook to take over a year

      Any EU-level judgement on a case filed against Facebook for its alleged involvement in helping the Americans snoop on millions of people is likely to take over a year.

    • The case that might cripple FacebookThe case that might cripple Facebook
    • Top 10 Reasons Why Corporate Social Media is Not Your Friend, and Dark Social Media Is

      Facebook currently limits the number of your “friends” who can see your posts to about 7 or 8%. What? You thought that “friends” list was yours? It’s not. It’s theirs. And think about it, if you had a thousand friends, and 25 of them, that’s 2.5% posted 3 or 4 times a day, another 25 posted once a day, and a hundred posted once a week, that would be at least 150 daily posts for you to comb through, leaving little room for Facebook to insert ads and promoted content which customers have paid for into your news feed.

    • The German Government has reportedly tightened tender rules for sensitive public IT contracts

      The German Government has reportedly tightened the rules for awarding sensitive public IT contracts, following whistleblower Edward Snowden’s revelations regarding the US National Security Agency’s (“NSA”) mass surveillance activities.

    • Opinion: Where is Europe’s outrage?

      One year ago, Europeans were livid when Edward Snowden revealed NSA mass surveillance of European citizens. Now that new documents show most EU countries are in cahoots with the NSA, the public remains mostly mum.

    • House votes 293-123 to cut funding for NSA spying on Americans
    • EU states let NSA tap data cables, Danish media say
    • Danes tapped Norway data for NSA: Information

      Denmark’s Defence Intelligence Service (DDIS) is intercepting data sent through fibre cables from Norway, according to newly published documents leaked from the US’s National Security Agency (NSA)

    • NSA Working With Denmark, Germany To Access ‘Three Terabits Of Data Per Second’ From Overseas Cables

      Another set of leaked NSA documents has been posted in a team effort by The Intercept and Danish newspaper Dagbladet. This one deals with the NSA’s RAMPART-A program, a surveillance effort that depends on the cooperation of involved countries to be successful. As the NSA has always made an effort to point out, its interception of foreign communications is both completely legal and the sort of thing people would expect a national security agency to be doing.

    • NSA uses 33 countries to intercept web traffic – Snowden Files
    • UK urged to give Germany access to RAF base that ‘helped spy on Merkel’

      The UK needs to grant Germany access to RAF Croughton military base which reportedly hosts a joint CIA/NSA unit, a Labor MP told British PM David Cameron, urging him to help the German federal investigation of the phone tapping of Angela Merkel.

    • Scenes of the NSA Are Watching Over the London Underground

      Paglen’s latest work, a site-specific piece for the London Underground stop, is a huge photographic panorama that depicts the area surrounding Menwith Hill, an RAF base used by the NSA. At first glance, the landscape is idyllic and unmistakably British, with luscious green fields and a smattering of stone cottages. But lurking on the horizon are a series of white bubbles; a rare but tell-tale physical sign of the secretive surveillance conducted by the security agency.

    • ZOMG! The FBI commissioned this WTF list of netspeak
    • British gov’t reportedly intercepting conversations from Facebook, Twitter, and Google

      The British government is reportedly intercepting communications from social networks, emails and text messages even when there is no suspicion of wrongdoing. According to a report from Privacy International, British spy agencies have been monitoring the Facebook and Twitter activity of every Internet user in the country. Authorities are also said to be collecting data on people’s web searches and emails.

    • How did ‘don’t mess with the money’ become the NSA’s motto?

      So why doesn’t the NSA start watching Wall Street’s agents of financial terror? Why don’t its snoops look into every nook and cranny of our economy where investment bankers, hedge fund managers, private equity kingpins, and derivative wheeler-dealers are trading inside information and rigging markets, milking mergers and nuking jobs, all the while stuffing multiple millions (or billions) in their pockets?

    • House Votes to Defund NSA ‘Backdoor’ Searches
    • House unexpectedly votes to stop warrantless NSA searches

      In what’s being billed as a momentum boost for anti-surveillance advocates, the US House of Representative on Thursday approved an amendment that significantly reigns in warrantless searches on Americans’ communication records.

    • Here’s how the NSA snoops on India

      According to these documents, India is an “Approved SIGINT partner” with the NSA. SIGINT is a common term used in intelligence circles that stands for signals Intelligence, and refers to capturing of communication between two people. Decrypting of messages, traffic analysis etc are also part of SIGINT. The agency then taps these SIGINT partnerships for creating two major programs called RAMPART-A and WINDSTOP for collecting data in transit between the source and the servers, as opposed to collecting data from each Internet company (Google, Microsoft, Yahoo) separately. Considering WINDSTOP only partners with second parties, primarily the UK, to access communications into and out of Europe and Middle East, third-party partner like India should fall under RAMPART-A.

    • Can you spy on a phone when it is turned off?

      Whether you consider Edward Snowden a traitor or a patriot, before he hit the news most people didn’t give much thought to government spying on everyday citizens. During a recent interview, he said that the NSA has the ability to spy on your smartphone, even if it’s turned off.

    • Spook Rebuke

      Keep in mind what the NSA is up to. This goes well beyond a sniffer program scanning Karachi-bound text messages for “Death to the Great Satan! Allahu Akbar!” The NSA has been intercepting laptop computers being shipped to customers in order to install software bugs in them, redirecting Web traffic to install malware on computers, installing agents in video games, and generally behaving like an implausible villain in a Robert Ludlum novel. It is using the flimsiest rationales to extend its surveillance to domestic targets. The toothless USA Freedom Bill passed by the House last month was intended to curtail some of this, but would have relatively little practical effect even if it were to become law, its enforcement protocols being remarkably loosey-goosey. The bipartisan amendment put forth by Kentucky’s Thomas Massie (R.) and California’s Zoe Lofgren (D.) passed 293 to 123, and would impose funding restrictions as well as implement a specific ban on any agency effort “to mandate or request that a person redesign its product or service to facilitate” surveillance.

    • NSA helps foreign governments conduct mass surveillance at home

      A new release of Snowden’s leaked NSA docs detail RAMPART-A, through which the NSA gives foreign governments the ability to conduct mass surveillance against their own populations in exchange for NSA access to their communications. RAMPART-A, is spread across 13 sites, accesses three terabytes/second from 70 cables and networks. It cost US taxpayers $170M between 2011 and 2013, allocated through the NSA’s “black budget.”

    • Senator Wyden Congratulates House on Bipartisan Vote to Ban Backdoor Searches
    • House backs limits on government spying
    • New leaks show Germany’s collusion with NSA

      Several new Snowden-leaked documents show how closely Germany’s intelligence agencies work with the NSA. But did the German government deliberately soften laws protecting privacy to make life easier for them?

    • Even The NSA Likes Final Fantasy

      Documents published earlier this week by German magazine Der Spiegel reveal that one of the National Security Agency’s surveillance programs in Germany was named “WILDCHOCOBO.”

    • WILDCHOCOBO: Evidence of Final Fantasy fans at the NSA?
    • Germany opens criminal probe into spying operations by NSA

      Germany’s lead federal prosecutor has opened a criminal probe into espionage operations by the National Security Agency (NSA) of the nation’s leadership; especially the allegation of NSA’s spying against German Chancellor Angela Merkel.

    • House passes measure aimed at NSA snooping

      The House on Friday passed a defense spending bill with an amendment that would bar the National Security Agency from conducting warrantless searches of its databases for Americans’ communications records.

    • Court Approves NSA Gathering of Phone Metadata for Three More Months

      U.S. intelligence officials disclosed late Friday that the Obama administration has received approval from a special federal court to continue the National Security Agency’s collection of telephone metadata for another three months.

    • US lawmakers pass bill to curb NSA
    • House votes to expand protections against NSA
    • European Union’s Highest Court To Consider PRISM’s Impact On EU Data Protection Laws
    • Edward Snowden won’t meet with German officials in Moscow
    • Edward Snowden rejects German plans for meeting in Moscow
    • Digital Rights Activist Hails House Vote on Bill Limiting NSA Surveillance

      In an unusual show of bipartisan unity, the U.S. House of Representatives passed a funding bill Friday with an amendment, co-sponsored by San Jose Democrat Zoe Lofgren, that would limit the surveillance powers of the National Security Agency.

    • “Politically Explosive” Docs Show How NSA Wiretaps Earth
    • Fisa court grants extension of licence for bulk collection of US phone records
    • Macedonia gave permission to NSA to spy on citizens?

      The United States has made top-secret deals with more than 30 third-party countries so that the National Security Agency can tap into fiber optic cables carrying internet data in those parts of the world, new leaks reveal.

    • U.S. Government at War With Itself Over Civil Liberties

      Over the past year, the United States government has been in the news a lot for its efforts to undermine the Internet’s basic privacy and security protocols.

      There were the Edward Snowden revelations about the National Security Agency sweeping up metadata, paying contractors to embed backdoors into their security technologies, hacking various private accounts of network administrators and developing malware to infect computers.

    • Another US spying problem in Latin America: The DEA

      Rousseff summed it all up rather succinctly in a blunt speech at the United Nations last September, denouncing “a situation of grave violation of human rights and of civil liberties; of invasion and capture of confidential information concerning corporate activities, and especially of disrespect to national sovereignty.”

    • Canadians Don’t Trust the Harper Government’s New Cyberbullying Bill

      Canadians were largely unmoved by the Edward Snowden leaks and the disclosure of mass surveillance programs like PRISM, with few showing any serious worries about domestic government surveillance in a poll by Abacus Data in June 2013. But now a new poll by Forum Research suggests Canadians are growing suspicious of the latest Conservative cyberbullying bill C-13, with most rejecting a piece of legislation many think is more about beefing up government surveillance powers than protecting teens from bullies.

    • Cops hid use of phone tracking tech in court documents at feds’ request

      ACLU uncovers e-mails regarding Stingray devices borrowed from US Marshals Service.

    • Stingray Documents Show Law Enforcement Using ‘Terrorism’ To Obtain Equipment To Fight Regular Crime

      Scott Ainslie at MuckRock has pried loose a few more Stingray documents with a FOIA request. What was requested were contractual documents, which seem to be something law enforcement agencies feel more comfortable with releasing. Anything pertaining to the actual use of Stingray devices still remains heavily shrouded, thanks in no small part to the intercession of the federal government.

    • Lawyers, locals react to WPD’s surveillance device

      The Wilmington Police Department has surveillance equipment called Stingray. It turns your phone into a tracking device, giving law enforcement crucial information on where you are. But it might violate your rights.

    • Glenn Greenwald On Why Privacy Is Vital, Even If You ‘Have Nothing To Hide’

      Journalist Glenn Greenwald defended the value of digital privacy and slammed those who dismiss its importance during a stop on his national book tour Thursday.

      “We all need places where we can go to explore without the judgmental eyes of other people being cast upon us,” he said. “Only in a realm where we’re not being watched can we really test the limits of who we want to be. It’s really in the private realm where dissent, creativity and personal exploration lie.”

      He said that people who downplay the importance of privacy typically say, “I have nothing to hide.” But, he added, those people aren’t willing to publish their social media and email passwords.

    • US House Votes To Cut Funding For NSA Spying On American Citizens

      Even when the government conducts secret activities, those ventures have to be funded, and a vote in the U.S. House of Representatives last night took a swipe at the NSA’s domestic spying practices by cutting some of its funding.

    • Tell a lie, remove the gear: How the NSA covers up when cable taps are found

      On March 14, 2013, an SSO weekly briefing included a note regarding such a discovery. The unit had been informed two days earlier that “the access point for WHARPDRIVE was discovered by commercial consortium personnel. Witting partner personnel have removed the evidence and a plausible cover story was provided. All collection has ceased.”

      According to Der Spiegel, Wharpdrive was a fiber-optic cable tap (underseas fiber is often laid by consortia of companies, so it’s possible this took place at an onshore landing point for such a cable). Employees from one of the companies involved—though not the company that had a relationship with NSA and the German intelligence agency BND—apparently noticed some unusual gear and commented on it. In response, the company involved with the NSA (“witting partner personnel”) removed the tap and made up a story to explain what the gear in question had been doing.

    • The NSA in Germany: Snowden’s Documents Available for Download

      In Edward Snowden’s archive on NSA spying activities around the world, there are numerous documents pertaining to the agency’s operations in Germany and its cooperation with German agencies. SPIEGEL is publishing 53 of them, available as PDF files.

    • Interview with Ex-Stasi Agent: ‘The Scope of NSA Surveillance Surprised Me’

      During the Cold War, West Germany’s foreign intelligence service cooperated closely with the NSA. Klaus Eichner, an agent with the East German Stasi, monitored it at the time, and now he tells SPIEGEL what he knew about the collaboration.

    • Watchdog urges EU leaders to shield citizens from snooping

      European Union countries need stricter controls to protect citizens from spying, a top data protection official said on Thursday, a warning that may rekindle a debate about snooping before an EU summit next week.

    • NSA Reform Gathers Momentum In Congress After Late-Night Vote

      After a somewhat desultory year of little to no change, reform of the United States surveillance state appears to have finally found momentum.

      Recently the USA FREEDOM Act was gutted and rammed through the House, and two funding amendments that would have cut monies for forced backdoors and certain government searches failed.

      Last night, however, the House passed a single amendment to the military funding bill that did what the two failed amendments had attempted. At once, a large House majority had taken an unambiguous stand against certain parts of the government’s surveillance activities.

    • Congress wants NSA reform after all. Obama and the Senate need to pass it

      An overwhelming House vote to cut funds for back doors into your private life sets up a summer surveillance fight: will the Senate stand up before the White House shuts it down?

    • Reps. Goodlatte And Ruppersberger Admit That NSA Is Warrantlessly Spying On Americans’ Communications

      We’ve already written about the surprising, but encouraging, vote late last night to defund backdoor searches by the NSA. But it’s worth looking at some of the floor debate on the amendment last night — in particular the push against the amendment from Reps. Goodlatte and Ruppersberger, who both appear to flat out admit that the NSA does warrantless spying on Americans’ communications, in direct contrast to earlier claims. The reasons for these two to argue against the amendment are clear. Goodlatte was the guy who negotiated the “deal” with the White House and the House Intelligence Committee to completely water down the USA Freedom Act, and he knows that this amendment puts some of the substance that he stripped out right back in. Ruppersberger, of course, represents the district where the NSA is headquartered, and is the ranking member for the House Intelligence Committee. His loyalty to the NSA over the American public has always been clear. But to have them basically admit that the NSA does warrantless spying on Americans is quite impressive.

    • 38 Civil Liberties and Public Interest Organizations Call on Congress to Pass Real NSA Reform

      A bipartisan coalition of 38 civil liberties and public interest organizations, including the Electronic Frontier Foundation, sent a letter to Congress yesterday that draws a line in the sand on NSA reform. The coalition made it clear that it cannot support the watered-down version of the USA FREEDOM Act passed in the House of Representatives without significant changes to the legislation, and outlined clear steps that Congress can take to address problems with the bill.

    • Amash spokesman: ‘Congress is clued in’ on NSA spying programs with passage of bipartisan proposal
    • House Votes To Defund Warrantless Communications Searches

      The House voted 293 to 123 late Thursday to approve amendments to a Defense appropriations bill (HR 4670) that would defund warrantless seraches of NSA-collected communications and prevent the NSA and CIA from requiring products have “back doors” that allow them to more easily conduct searches.

    • More Than $116K Has Been Raised in 3 Days for NSA-Proof Encrypted Email

      Roughly three days ago, an Indiegogo surfaced promising “to protect people around the world from the mass surveillance that is currently being perpetrated by governments and corporations around the world.” More than $116,000 has already been raised, and that’s without the viral guidance of media attention.

    • Inflation? Only If You Look At Food, Water, Gas, Electricity And Everything Else

      Anyone that has to regularly pay for food, water, gas, electricity or anything else knows that inflation is too high. In fact, if inflation was calculated the same way that it was back in 1980, the inflation rate would be close to 10 percent right now.

    • The Supreme Court is about to decide what police can do with your phone

      Within the next week, the U.S. Supreme Court is scheduled to decide on a pair of cases that will have major implications for the over 91 percent of Americans who carry a cellphone. At issue is the question of whether police officers are legally allowed to search through the contents of someone’s phone—that is to say, much of a person’s private life—without first obtaining a warrant.

    • The NSA’s big problem, explained by the NSA

      Amongst the new trove of classified documents released by Der Speigel is a rather academic discussion, in the NSA’s own foreign affairs journal, about the differences between American signals intelligence collection and German signals intelligence collection.

      One passage in particular stands out, as it highlights how the Germans give far more weight to privacy than the NSA does.

    • How to Keep Public Support for Spying

      A poll suggests intelligence agencies could benefit from some controlled leaks.

    • Senators should take Snowden’s lead, shine light on NSA

      Former federal government contract worker Edward Snowden’s disclosures of virtually limitless surveillance of American citizens by the National Security Agency corroborated the late Supreme Court Justice Louis Brandeis’ wisdom that sunshine is said to be the best of disinfectants.

  • Civil Rights

    • New Meme: Liberty Movement More Dangerous Than Al-Qaida

      Is the liberty movement more dangerous than al-Qaida? CNN national security analyst Peter Bergen thinks so.

    • How many Palestinians will die in the search for missing Israeli youths?

      Mustafa Aslan died on Friday afternoon after being shot in the head by an Israeli soldier at Qalandiya refugee camp near Ramallah a few hours previously. He was 22-years-old.

      Mustafa is the third Palestinian victim of the Israeli authorities’ ‘search’ for three teenagers – two Israeli and one US-Israeli – who went missing on 12 June after leaving the illegal Israeli settlement bloc of Gush Etzion near Hebron.

    • Japan Brought an End to Gun Violence by Doing What The U.S. Won’t

      Let’s say it all together now: The United States has a problem with guns.

      Since the horrifying Sandy Hook tragedy of 2012, there have been 74 school shootings and 17,042 gun deaths.

      To the frustration of many Americans, a stalled debate stands in the way of solving our gun violence problem, even though the solution is staring us in the face. The Onion captured this feeling perfectly with one of its headlines last month: “‘No Way to Prevent This,’ Says Only Nation Where This Regularly Happens.”

    • Supreme Court Sides With Whistleblower In Retaliation Case

      In a case over retaliation against a public employee who was fired after testifying about corruption, the Supreme Court says the man gave testimony as a concerned citizen and should not have been punished. The decision was unanimous, overturning lower courts.

    • Let’s have a day off from ‘joy’ of technology

      TECHNOLOGY saves stress. Except when it adds stress. Supermarket self-checkout machines may look inviting enough, but were, in fact, inspired by medieval devices of torture.

    • Flying drones, quad-copters in SA: legal or illegal?

      The issue of whether it is legal or illegal to fly radio-controlled and unmanned aircraft in South Africa is a complex one involving three different organisations.

      As things stand today, the South African Civil Aviation Authority (SACAA) has no regulations to govern what it calls Unmanned Aircraft Systems (UAS’s), which means it is illegal to fly unmanned drones in South Africa.

    • EXISTENCE OR NONEXISTENCE: CIA’s Linguistic Somersault Takes to the Sky

      This past Memorial Day weekend, New Yorkers who happened to look up may have seen the words EXISTENCE OR NONEXISTENCE appear across the skyline in synchronized bursts of white smoke.

      The seemingly spontaneous event was a project of mine called Severe Clear. It was inspired by a letter the CIA sent the ACLU rejecting their Freedom of Information Act request for documents relating to the U.S. government’s classified drone program. The letter reiterates the now familiar Glomar response, stating that the agency can “neither confirm nor deny the existence or nonexistence” of records responsive to the request.

    • G.I. Joe creator made Osama bin Laden action figure for CIA
    • CIA, G.I. Joe inventor made ‘demon’ bin Laden dolls
    • CIA Created ‘Demonic’ Osama Bin Laden Toy to Scare Afghan Children

      The CIA secretly developed a “demonic” Osama bin Laden action figure to scare Pakistani and Afghan children and undermine public support for the al-Qaida figurehead, it has emerged.

    • The State of the Fourth State in the State

      What the journalists’ body asked for from other newspapers was a form of censorship: self-censorship. George Orwell has written about the damages of self-censorship in any democratic society. The first priority of journalists is to unearth the truth and if they start exercising self censorship than truth is going to be the first casualty.

    • David Usborne: President, press and prejudice: it’s America

      At a conference in New York in March, Risen said the Obama administration has shown itself to be “the greatest enemy of press freedom that we have encountered in at least a generation”. By then his case had reached the Supreme Court, where the Justices declined to intervene.

    • Another View: Journalist shield law critical to democracy

      The letter was sent to Sens. Harry Reid, D-Nev., and Mitch McConnell, R-Ky., a few days after the Supreme Court refused to hear the appeal of James Risen, a New York Times reporter who has been contesting a subpoena requiring him to testify at the upcoming trial of a former CIA agent.

      The agent, Jeffrey Sterling, is accused of revealing classified information about a failed CIA plan to compromise Iran’s nuclear program, an operation described in a book by Risen.

    • Media seeks Guantanamo force-feeding videos
    • Status of CIA Detention and Interrogation Program Declassification (updated)

      In the meantime, Senator Feinstein, Chair of the SSCI, has stated that the Director of National Intelligence has assured her that the declassification of the SSCI’s executive summary and findings and conclusions will be completed by early next month, ideally before July 4. If this is still the case, it is not necessarily inconsistent with the CIA’s status reports filed today. Presumably the Executive branch will be finished with its declassification review of the SSCI’s documents before it turns to the two ancillary documents (the CIA response and the Panetta Report), and will then deliver the declassified versions of the executive summary and findings and conclusions to the SSCI, which could decide to publish them before August 29. The period between early July and August 29 would also give the SSCI and the Executive branch eight weeks or so to negotiate over any possible disagreements about the scope of the declassification.

    • Here Are Some Of The Most Bizarre Ideas From The CIA

      In the 1950s, the CIA produced a pornographic film starring an actor made up to resemble Indonesian President Sukarno. The idea was to discredit Sukarno in the eyes of his countrymen, according to the 1976 memoir of a CIA officer, Joseph Burkholder Smith, as the Indonesian leader was viewed as insufficiently pro-West at the time.

    • America Is Also “Ripe For Regime Change”

      There’s been a lot of talk coming out of Washington, D.C. lately about the need for “regime change” in Iraq – which is particularly ironic when you consider the current regime was hand-picked by the Central Intelligence Agency (CIA) during an American military invasion that cost trillions of dollars and thousands of lives.

    • Why The World Should Care About The War Against Guatemalan Women

      Biden’s visit, though, only serves to highlight the historical role the U.S. has played in prompting some of the problems seen today in Guatemala. In 1954, the C.I.A. helped organize a coup to oust a popular leader and install a right-wing dictator who plunged the country into a 36-year civil war. Effects of the war, which Amnesty International and many other groups label a genocide of the Mayan people, are still felt today and contribute greatly to Guatemala’s current problems.

    • The assassin’s guide to Western ‘democracy’

      We live in an age now where the Western media has been virtually subsumed by banking and military interests. If “our side’s” dirty deeds are kept out of the news, and the latest “bogeyman” kept in, then today’s war profiteers can get away with whatever they want. “Defensive” NATO with its proxy armies and “deniable” private military contractors sponsoring butchery across the globe has become a Napoleon with nukes, bringing the day ever closer when these wonder-weapons might again be used in anger.

    • Pentagon Funds “Cold War-Style” Science Study to Track Political Protest in America

      The controversial program called Project Camelot had been operational nearly a decade into the Vietnam war, as the Special Operations Research Office (SORO) located at American University had received millions in funding from the US Army to conduct a six country study on civil unrest. The current social science program directed by Minerva and the Department of Defense (DoD), appears to have also partnered with some of the most well-known universities in the United States by studying the behavior of peaceful activism and how political ideology shapes protest movements in the world at large.

    • Did CIA Smear a Former Operative to Cover Up a Bad Firing?

      And now a former CIA operative may get a day in court to add to that peculiar lore. On Friday a federal trial judge in Washington, D.C. could rule on a discovery motion by “Peter B.,” a former CIA officer who contends that the spy agency fired him without due process and then badmouthed him, scuttling his chances for a job with a CIA contractor.

    • Is it right to jail someone for being offensive on Facebook or Twitter?

      Jake Newsome was jailed last week for posting offensive comments online. His is the latest in a string of cases that have led to prison terms, raising concern that free speech may be under threat from over-zealous prosecutors

  • Intellectual Monopolies

    • Copyrights

      • The Senate Is Officially Considering a CISPA Clone

        The Senate Intelligence Committee is moving forward with its Cybersecurity Information Protection Act—a problematic, potentially civil liberties-killing piece of legislation that looks just like the CISPA bill the internet fought so hard to kill last year—and the year before that.

        CIPA, written by Senate Intelligence Chair Dianne Feinstein (D-Calif.) and Sen. Saxby Chambliss (R-Ga.) will be considered by the committee next week, according to Feinstein.

      • The German war against the link

        Half the major publishers in Germany have started a process of arbitration — which, no doubt, will lead to suits — to demand that Google pay them for quoting from and thus linking to their content. And now we know how much they think they deserve: 11% of Google’s revenue related to their snippets. From their government filing, they want a cut of “gross sales, including foreign sales” that come “directly and indirectly from making excerpts from online newspapers and magazines public.” [All these links are in German.]

      • That Story You’ve Read About YouTube ‘Blocking’ Indie Artists… Yeah, That’s Not Accurate

        As you may have heard, there’s been some hubbub this week about claims that YouTube is going to remove some videos from indie musicians/labels who don’t agree to the contract terms for YouTube’s upcoming music subscription service. Ellen Huet, over at Forbes, has a good article explaining how this isn’t as dire as some are making it out to be, but the more I’m digging into it, it seems even less than that. There’s no doubt that this is a royalty dispute, with some indie labels upset about the basic terms that Google is offering, but, if you haven’t noticed, the complaints seem to be coming from the same folks who complain about the royalty rates of every single online music service. There are some people who will just never be satisfied. Furthermore, the deeper you dig into this, it becomes quite clear that any artist who wants to have their videos on YouTube can continue to do that.

06.20.14

Why Do FOSS Sites Promote NSA-Friendly Malware Like Microsoft Skype?

Posted in Microsoft at 7:24 am by Dr. Roy Schestowitz

NSA thanks you for installing the blob

Webcam

Summary: Criticism of promotion of Skype for GNU/Linux, which basically compromises the whole platform and plants a bug (as in listening device with a camera) inside people’s Free/libre systems

FOR A number of days now we have been systematically ignoring (not overlooking) several reports about a nasty piece of software. Many FOSS sites cover Skype because another malicious blob has been just made available for GNU/Linux, requiring root to install and offering no source code at all. It is bad idea to install this blob because we already know that Skype is used extensively for surveillance (this fact is well established), more now than ever before as it was snatched by the NSA’s PRISM #1 company, Microsoft. Yes, here we have the company which famously reads people’s E-mails and uses people’s personal data against them, putting some in prison and deporting them. Why would anyone wish to take the risk of using Skype when good software such as Linphone and Jitsi exists and is freely available for GNU/Linux, Android, among many other free/libre platforms, sporting real encryption (Skype has no end-to-end encryption, based on revelations from last year)?

Microsoft is a huge liar when it comes to privacy and ITWire is one among several publications that we saw recently giving Microsoft’s lies a platform. Microsoft claims it will not use your personal data against you (it does not say “won’t spy”) but we already know this to be a lie, based on the Kibkalo case.

Microsoft is not the only company which lies about privacy. VMware too spouts out nonsense (many Microsoft executives moved there, so the lies travel), hoping that people forget about RSA-NSA collusion (VMware is RSA’s sister because both are owned by EMC). There is a back door there, just as there is a back door in Hyper-V hosts (it only runs on Windows, hence there’s a back door that leads downwards to guest VMs).

Generally speaking, any piece of proprietary software is quite likely a back door, if not by accident then by design (unlike Free software one would struggle to prove either, but leaks wre help). People who brag about using a Free/libre and secure platform completely compromise it when they install the blob called “Skype”. Convenience may be tempting, but it’s a trap. British intelligence agencies alone have grabbed footage from many people’s webcam, harvesting videos and photographs (many of which sexual) from millions of people while the NSA used harvested photos to covertly construct biometric models of law-abiding Americans. Just because you do nothing illegal doesn’t mean you are not under surveillance. Espionage champions like to collect potential ‘dirt’ against everyone (they derive power through blackmail) and British intelligence, for example, already intercepted and saved footage of hundreds of thousands of people masturbating.

‘Active Management Technology’ is Quite Likely a Back Door, Along With Intel’s UEFI

Posted in Hardware at 6:54 am by Dr. Roy Schestowitz

Yet another reason to boycott Intel

Chips secrets

Summary: The dark hearts of computers, with a lot of secrets and circuitry whose behaviour cannot be verified, are also convenient back doors, even without additional bugs (implanted en route)

THE FSF has this interesting new article about “Active Management Technology”. It was written by Ward Vandewege, Matthew Garrett, and Richard M. Stallman, who awarded Garrett for his work on UEFI.

One year ago, around the same time that Snowden leaked some NSA documents, we warned that UEFI could be used to remotely brick PCs. Later on, after the NSA leaks had gone maintream, the NSA pretty much confirmed it was a possible strategy (but defecting this to the Chinese). Going back to 2008 we also warned about back doors, some of which facilitated by broken encryption in hardware (e.g. Intel’s ‘hardware-accelerated’ RNG). That was about a decade after Microsoft had allegedly built back doors into Windows (we know that there are back doors now, but it’s just hard to say when Microsoft started it).

We already wrote a great deal about the problem with UEFI patents, UEFI ‘secure’ boot (taking control over computers, moving control away from the users to put itinto corporate hands and governments), but we have not done much to cover UEFI remote control capabilities, or more broadly Intel’s rogue role in intelligence, leading to a ban in some places (some variants of BSD refuse to use Intel RNGs due to fear of intentionally low entropy that derails encryption).

Quoting the article from Vandewege et al.: “Intel’s Active Management Technology (AMT) is a proprietary remote management and control system for personal computers with Intel CPUs. It is dangerous because it has full access to personal computer hardware at a very low level, and its code is secret and proprietary.”

Intel is a deeply criminal company, so to blindly trust its proprietary technology would be foolish. We have always campaigned against Intel not just because “intel” is shorthand for something rather insinuative although this latter point is now a growing factor, too. Watch what China is doing these days when it comes to hardware policy, not just software policy. Or simply watch what Snowden has been leaking; it’s rather revealing.

The Corrupt Court Which Brought Software Patents to the United States is in a State of Crisis, Should be Disbanded

Posted in Law, Patents at 6:21 am by Dr. Roy Schestowitz

Randall R. Rader: The corrupt judge who ran CAFC until the scandal which ultimately led to his resignation

Randall R. Rader
Photo from Reuters

Summary: The Court of Appeals for the Federal Circuit (CAFC) is in trouble after its extent of misconduct was revealed, not just because rulings are repeatedly incorrect but also because its chiefs are corrupt (in bed with patent lawyers)

The United States should gradually if not instantaneously revoke CAFC’s power amid revelations of misconduct and errors. CAFC almost always gets its rulings wrong, based on the judgment of courts above it, notably SCOTUS. Perhaps it’s time to just shut shut down the CAFC. The disgrace which is ‘judge’ Rader has finally stepped down, so there’s no better time to end CAFC. He had conflicts of interest and did great damage to patent policy. He encouraged the perception of corruption in the courtroom. Rader was just one of several because not a single judge ruled incorrectly on cases that involve patents. Rader is raider, taking away from programmers and giving to monopolies and their patent lawyers. Ars Technica wrote about his “ethical breach”:

US Circuit Judge Randall Rader, who was just weeks ago the top patent judge in the nation, has announced he will step down, following an admission that he made an ethical “lapse” when he sent an e-mail praising an attorney who appears frequently before his court.

From 2010 until two weeks ago, Rader served as Chief Judge on the US Court of Appeals for the Federal Circuit, which hears all patent appeals and interprets most of the nation’s patent laws. The Washington, DC-based court is frequently the final arbiter in some of the highest-stakes technology battles in the world.

Here is more from the corporate press, which said: “The ex-chief judge of the top U.S. patent court will retire at the end of June, after acknowledging that an email he sent raised questions about his judicial ethics because it praised an attorney who appears before the court.”

Shut it down. Now is the time. This court has been the target of a coup and it cannot restore trust.

There’s no lack of stories about the harms of software patents. Here is the recent report titled “Divorcees Brawl Over Time Warner-Acquired Software Patents” and alluding in part to software patents, here is an article which speaks of a “Nightmare”. An Australian lawyers’ Web site seems to be turning its back on software patents not because they’re not something that patent lawyers want but because they have apparently become less profitable (harder to uphold in Australia). To quote: “A new unfavourable examination practice by the Australian Patent Office for software patents precipitated two separate appeals to the Federal Court of Australia, which resulted in the two decisions Research Affiliates LLC v Commissioner of Patents [2013] FCA 71 (“Research Affiliates”), and RPL Central Pty Ltd v Commissioner of Patents [2013] FCA 871 (“RPL”). The two decisions are, on the face of it, contradictory. The patent office favours Research Affiliates, which imposes strict limits on the patentability of software. RPL does not impose the strict limits of Research Affiliates. Both decisions have been appealed to the Full Court.”

In the US, patent policy is written by corporations and their lobbyists or moles (companies like Microsoft and IBM). Until not so long ago an IBM lawyer who is a software patents proponent controlled the USPTO (that’s David Kappos). He ensured that the USPTO sought only to increase its own income (and patent lawyers’) by expanding scope and in his new article in the plutocrats’ press (Forbes) he pretends that it’s about prosperity for the US economy. This is complete nonsense. It’s the very opposite of the truth, unless by “American economy” Kappos means “the 1%” (of which he is a part).

If the USPTO cannot be abolished, then its facilitator (a corruptible court like CAFC which let it patent software) should be eliminated, leaving the SCOTUS to make baby steps towards the solution (or towards justice, which SCOTUS is not exactly famous for, either).

SCOTUS Finally Smacks Down Software Patents, But Further Action is Needed

Posted in Law, Patents at 5:54 am by Dr. Roy Schestowitz

Many patents killed in a fire

Fire

Summary: The US Supreme Court has just ruled a lot of software patents “invalid” (by generalisation), raising hopes that things are improving

WE are exceedingly delighted to learn that the Supreme Court (SCOTUS) ruled against software patents. Before lots of law firms (patent lawyers) issue their revisionist ‘articles’ on why it doesn’t change anything let’s look at what happened.

SCOTUS has, without exception among the Justices, decided that some software patents are too vague to merit a win in court. Essentially, they’re rendered toothless, by precedence. It is possible that hundreds of thousands of software patents have just been rendered dead. Since SCOTUS is the top court, not even the software patents-friendly CAFC can reverse this decision. As one good writer (patent matters expert) put is: “The most-anticipated patent decision from this Supreme Court term was published today. The decision involves finance-related software patents that were being used against CLS Bank, a key part of the global financial infrastructure.”

Here is the response from Red Hat’s site, an Android-hostile site, a Linux-friendly site, and from the FSF, which says “more work needed to end software patents for good”. There was a lot of coverage in the corporate media too, including [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22] and the message is quite uniform. Not even lawyers’ sites can deny the truth here. They will surely try later. We have done an extensive media survey and the media is as unanimous about this as the SCOTUS is. Here is the response from TechDirt, which sheds light on why it’s not enough. To quote the headline: “Supreme Court Rejects Software Patents On Performing Generic Functions; Pretends That Lots Of Other Software Must Be Patentable” (lawyers are going to have a day field around the latter part).

This is clearly not the end of software patents, but it’s a good start. Let’s enjoy this small victory while it lasts. A future patent case can be escalated to SCOTUS again, shedding doubt on this decision. It doesn’t happen quite so often though (In Re Bilski was half a decade ago).

Federal Trade Commission Should Launch Legal Action Against Microsoft Over Bribes to Bloggers in Exchange for Coverage

Posted in Deception, Microsoft at 5:32 am by Dr. Roy Schestowitz

“Mind Control: To control mental output you have to control mental input. Take control of the channels by which developers receive information, then they can only think about the things you tell them. Thus, you control mindshare!”

Microsoft, internal document [PDF]

Summary: Federal Trade Commission (FTC) is expected to do nothing, as usual, even through there is overwhelming evidence that Microsoft breaks the law by bribing journalists and bloggers, not just government officials

THE FTC promised to fight bribery of bloggers, but it never really did anything (not a single action that we are aware of). A cynic may simply conclude that there are face-saving laws and rules, but they are not being enforced against criminal enterprises like Microsoft, which habitually engages in AstroTurfing, even in Wikipedia [1, 2, 3] which now bans it and demands disclosure of payments. Microsoft’s PR agencies do this too (they are void of ethics just like Microsoft and some literally emanate from inside Microsoft), not just moles whom Microsoft pays secretly. Microsoft has been bribing bloggers and journalists (with laptops) in exchange for positive reviews of operating systems and nothing is improving these days because Microsoft is paying people to comment in Reddit (now owned by the Microsoft-friendly Condé Nasty), maybe even to misuse moderation to ban opposing views or to submit stories. Microsoft got caught doing this just months ago and there was a similar abuse involving bribed-for YouTube placements (bribing vloggers).

Microsoft is a criminal company and criminals don’t obey laws. After Condé Nasty took over Reddit the site began advertising (in the content section) the most NSA-friendly Web browser (many back doors with new ones every month, enabling whole OS capture due to illegal integration/bundling), probably in exchange for a lot of money. It is a form of AstroTurfing, distorting and ultimately derailing the editorial process.

Well, Microsoft has just been caught bribing bloggers to covertly advertise the most NSA-friendly Web browser (Internet Explorer of course). The pushback actually came from Michael Arrington almost a decade after Arrington had played along with Microsoft and got caught (and shamed for it, losing a lot of credibility). Arrington blew the whistle, but Microsoft lies to him (and his readers) by claiming it had nothing to do with it (see the update). is Microsoft trying to distance itself from it all, but now we finally know Arrington was right all along:

Why in the world is Microsoft (through an agency) trying pay bloggers to write about Internet Explorer? Do people still do this? And given my position on paid posts, why would they think I’d be willing to participate?

This is just layers of stupid.

Here’s the link in the request below. Here’s the hashtag (#IEbloggers) that they’re requesting people use, so I’m guessing anyone using that is getting paid.

Arrington once agreed to do the “people-ready” Microsoft propaganda, embedded in articles for some Microsoft cash (hence a violation, as per the FTC’s rules). Microsoft could not escape such scandals, later confirming — implicitly — that it was definitely something Microsoft was behind. Even a site that serves Microsoft propaganda very routinely has covered it. Here is a quote: “Microsoft Internet Explorer officials are attempting to distance themselves from a paid social-media effort by an advocate marketing company meant to promote Microsoft’s IE browser.”

Coming from ZDNet this is quite grand because the site was paid by Microsoft to become its propaganda mill (we exposed this numerous times in the past).

What can people do? Well, given that the FTC won’t do anything (highly unlikely), people should boycott Microsoft and urge journalists ban Microsoft from various circles of the media, not just from procurement.

Microsoft is run by the same unethical thugs, even if the public face (CEO) has changed. People who don’t wish to reward criminals should pay not a penny to Microsoft.

06.19.14

Links 19/6/2014: New Mir, Dalvik Changes, X.org Turns 30

Posted in News Roundup at 7:00 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • Kerala govt all prepared to keep Padmanabhaswamy temple wealth in museum

    Kerala chief minister Oommen Chandy is apparently okay with the suggestion of converting the massive holding of the treasures, discovered in the cellars of the famous Sree Padmanabhaswamy temple, into a museum.

  • Health and OBL

  • Security

  • Defence/Police/Secrecy/Aggression

    • The absurdities of U.S. involvement in Iraq and Afghanistan: Siddiqui

      More than a decade after the beginnings of George W. Bush’s two wars, bombs are still falling in the invaded countries.

    • A Note on Fawning and US-Australian Ties

      The most grotesque spectacle in recent years has been that of an Australian prime minister on tour in the United States. The bib has to be procured to capture the drool. Fawning admiration accompanies unqualified assertions of promise and valour in the face of common enemies and those who do not share the “values” of each country.

    • A Brief History of Iraq for Westerners

      Supporting and arming a brutal dictator in Saddam Hussein and his catastrophic war against Iran, then bombing Iraq and imposing the most murderous sanctions in history, and then newly bombing Iraq and occupying it for 8 years while arming and training death squads and torturers and imposing sectarian segregation, creating 5 million refugees, and killing a half-million to a million-and-a-half people, while devastating the nation’s infrastructure, and then imposing a puppet government loyal to one sect and one neighboring nation. That, plus arming the new government for vicious attacks on its own people, while arming mad killers in neighboring Syria, some of whom want to combine parts of Syria and Iraq: that was all it took, and suddenly, out of nowhere, ignorant Arabs are killing each other, just out of pure irrationality, just like in Palestine.

    • Clinton: I Wanted to Arm Syrian Rebels

      If Hillary Clinton had had her way, the US would have armed Syrian rebels “two-plus years ago,” she says. The former secretary of state told CNN that she, the defense secretary, and the head of the CIA sought to arm moderates, but the president disagreed. “We pushed very hard. But as I say in my book, I believe that Harry Truman was right, the buck stops with the president.” Would that have affected the current crisis in Iraq? “It’s very difficult, in retrospect, to say that would have prevented this,” she noted, per Reuters.

    • US Poised to Strike Iraq, But CIA Has No Idea Who They’re Aiming At

      US officials are all set to launch air strikes against ISIS-controlled parts of Iraq, but are warning of a major “intelligence gap” in the CIA regarding where potential targets might conceivably be.

    • Green Party LogoGreen Party: No new U.S. military action in Iraq

      The Green Party of the United States is calling for no new U.S. military action in Iraq, including on-the-ground troop deployment and airstrikes.

      Greens are urging President Obama to resist demands by belligerent politicians and pundits for a U.S. assault in Iraq against ISIS (Islamic State of Iraq and Syria).

    • ISIS “Made in USA”. Iraq “Geopolitical Arsonists” Seek to Burn Region

      When a fire is raging, firefighters are called – not the arsonist who started it, especially if they return to the scene of the crime dragging a barrel of gasoline behind them. Yet, this is precisely what the US proposes – that they – the geopolitical arsonists – be allowed to return to Iraq to extinguish the threat of heavily armed sectarian militants streaming from NATO territory in Turkey and edging ever closer to Baghdad.

    • US flying F-18 surveillance missions over Iraq, Obama reviews options with lawmakers

      The United States is flying F-18 surveillance missions over Iraq from an aircraft carrier in the Persian Gulf, officials confirm to Fox News, as President Obama weighs options for “increased security assistance” in the country.

    • The Worst Effect of the Afghan War

      Although few in the United States dare say it, the U.S. military lost the war in Afghanistan a long time ago. As in Vietnam, if the weaker insurgents don’t lose, they win by just keeping an army in the field and hoping the stronger foreign occupier will tire of the conflict and go home. The American colonists used the same strategy to win their independence from Britain. After the U.S. forces leave Afghanistan at the end of 2016, the Taliban will likely be resurgent, and eventually most U.S. political and economic development efforts in Afghanistan likely will be reversed. Thus, unfortunately, much of what U.S. service personnel died or were wounded for will have been lost.

    • US shifts focus away from Iraq airstrikes

      President Barack Obama has shifted his focus away from airstrikes in Iraq as an imminent option for slowing a fast-moving Islamic insurgency, in part because there are few clear targets that U.S. could hit, officials said.

    • New Rep Unveils Drone Strikes’ ‘Pattern Of Life’ — And Death

      On the face of it, “Pattern of Life” mines predictable territory, going back and forth between an American drone operator and a Pakistani villager, skillfully portrayed by Lewis Wheeler and Nael Nacer. Wheeler’s Carlo starts off as a callow macho man, but becomes more and more wary of what he’s doing.

    • THEATER REVIEW Grounded
    • Artist shows suffering caused by brainless killing machines

      British-Iraqi artist Athier Mousawi has fused these natural and man-made phenomena to create pictures that show the helplessness and despair of the countless, nameless people crushed or enmeshed by the tentacles of war.

    • Ten years on: Eyewitnesses describe the aftermath of the first Pakistan drone strike

      Ten years ago today, the first CIA drone strike hit Pakistan, starting a bombing campaign that would span two US presidencies and three Pakistani administrations.

      On the evening of June 17 2004, a drone targeted Nek Mohammed, a senior Taliban figure. But it also killed five other people – two of whom were children. While Nek Mohammed received detailed obituaries in major Pakistani newspapers, the children were not even identified by name. And 10 years after their deaths, details of what happened that evening are only just starting to emerge.

    • More US bombs and drones will only escalate Iraq’s horror

      Nothing has exposed the delusionary disaster of the war on terror like the past week’s eruption of its mutant progeny across Iraq. David Cameron declared today that the Islamic State of Iraq and Greater Syria, rejected as too extreme and sectarian by al-Qaida itself, is now the most serious threat to Britain’s security.

    • Pezz: Punk with a Conscience

      “It’s a walk against drone warfare. The slogan is ‘Ground the Drones.’ We’re here to highlight that the drones kill primarily civilian noncombatants and create enmity among the countries where we’re using them. And if there’s one thing that will create more terrorists, it’s to keep using these drones.”

    • Drones Kill 5 as Pakistan and U.S. Target Tribal Belt

      An American drone strike killed at least five people in North Waziristan on Wednesday, Pakistani officials said, as the Pakistani military continued its offensive against militants in that tribal district.

      The officials said that two drones fired at least six missiles on a compound near Miram Shah, the main town in North Waziristan, as tens of thousands of civilians fled in anticipation of intense fighting.

    • Pepper spray and laser-armed drone receives first orders

      A mining company has ordered 25 Desert Wolf Skunk unmanned aerial vehicles for breaking up riots with pepper spray and “blinding lasers.”

    • ‘Riot control drone’ that shoots plastic bullets with ‘real stopping power’ goes on sale
    • Mining company buys armed drones for ‘riot control’

      The supplier, South African-based Desert Wolf, describes the ‘Skunk’ as a “riot control copter” – but there are concerns it breaks international treaties on the use of torture, lasers and even the Geneva Convention.

    • African firm is selling pepper-spray bullet firing drones
    • This drone shoots crowds with pepper spray paintballs
    • Against Intervention in Iraq

      American military involvement would inflame, not ease, Iraq’s sectarian divisions.

    • Obama considering ‘selective” air strikes: Report

      President Barak Obama has not yet announced a decision on the shape and extent of US military intervention in Iraq, but he may be considering targeted and selective air strikes.

    • Chelsea Manning Speaks–But Who Listened?

      chelsea-manningUS Army whistleblower Chelsea Manning wrote a remarkable piece for the Sunday edition of the New York Times (6/15/14), one of the most prestigious venues in the corporate media. It represents an extraordinarily clear statement from someone who is certainly one of the country’s most important political prisoners.

    • Impeach Blair: As Iraq burns, parliament should put this deluded liar on trial

      Tony Blair’s deceit over Iraq still contaminates British politics and continues to have the most shocking and lethal consequences. Time to lance this boil says Daily Mail’s Simon Heffer.

    • ‘Drawn Back Into War’ in Iraq

      The United States was not “drawn” into Iraq in 2003; it made a conscious decision to launch a war. Thus it cannot be “drawn back” into the conflict either. It is nonetheless quite revealing that journalists employ this language, making US warmaking sound like a reaction–not an action.

    • Further military intervention by the west in Iraq? The very idea beggars belief

      The yearning to intervene, to bomb someone even if just to “send a message”, shows how thin is the veneer of sanity cloaking great power aggression.

    • Iraq: The US Sponsored Sectarian “Civil War” is a “War of Aggression”, The “Supreme International Crime”

      The great command of the Nuremberg Tribunal convened after the Second World War to punish the evil that had shaken Europe was to abolish the “supreme international crime” – the planning and waging of wars of aggression. “War is essentially an evil thing,” the Tribunal held as it passed judgment on German leaders. “Its consequences are not confined to the belligerent states alone, but affect the whole world.”

    • The Russia as “Imperialist” Thesis Is Wrong and a Barrier to Solidarity With the Ukrainian and Russian People

      The violent coming to power of a rightist regime in Kyiv, Ukraine in late February 2014 has opened an exceptionally dangerous political period in Europe. For the first time since World War II, a European government has representatives of fascist parties as ministers. These are the ministers of the armed forces, prosecution service and agriculture, and deputy ministers of national security (police), education and anti-corruption.

    • US appetite for European market responsible for Ukrainian crisis – experts

      The US is keen to take a tighter grip on the Ukrainian energy sector, and the new government in Kiev is eager to help it do so. On Tuesday, Ukrainian Prime Minister Arseniy Yatsenyuk announced that the country’s gas transportation system was being handed over to US and European partners. Moreover, US Vice-President Joe Biden’s son is now a board director at the Ukrainian private oil and gas company Burisma.

    • ‘No chance to survive’: Rossiya TV journalists Kornelyuk and Voloshin killed in Ukraine shelling

      Born and raised in Ukraine, Igor Kornelyuk worked as a journalist for over 15 years. He went to Ukraine to cover bloodshed there, but never returned home. His colleague sound engineer Anton Voloshin was killed alongside him in Ukraine’s army shelling.

      Igor Kornelyuk and Anton Voloshin both worked for Rossiya TV channel. They are the first Russian journalists to have died while on professional duty in Ukraine since the coup in Kiev and the beginning of civil unrest in eastern regions.

  • Transparency Reporting

    • The bottom line is: Will we be better or worse off under this agreement?

      The Trade in Services Agreement document WikiLeaks has obtained is arcane, but it shows that Australia, the US, the European Union and 20 other large and small countries are talking about unprecedented mutual access to their financial service sectors.

    • Secret Trade in Services Agreement (TISA) – Financial Services Annex

      This memorandum provides a preliminary analysis of the leaked financial services chapter of the Trade in Services Agreement dated 14 April 2014. It makes the following points:

      The secrecy of negotiating documents exceeds even the Trans-Pacific Partnership Agreement (TPPA) and runs counter to moves in the WTO towards greater openness.
      The TISA is being promoted by the same governments that installed the failed model of financial (de)regulation in the WTO and which has been blamed for helping to fuel the Global Financial Crisis (GFC).
      The same states shut down moves by other WTO Members to critically debate these rules following the GFC with a view to reform.
      They want to expand and deepen the existing regime through TISA, bypassing the stalled Doha round at the WTO and creating a new template for future free trade agreements and ultimately for the WTO.
      TISA is designed for and in close consultation with the global finance industry, whose greed and recklessness has been blamed for successive crises and who continue to capture rulemaking in global institutions.
      A sample of provisions from this leaked text show that governments signing on to TISA will: be expected to lock in and extend their current levels of financial deregulation and liberalisation; lose the right to require data to be held onshore; face pressure to authorise potentially toxic insurance products; and risk a legal challenge if they adopt measures to prevent or respond to another crisis.

      Without the full TISA text, any analysis is necessarily tentative. The draft TISA text and the background documents need to be released to enable informed analysis and decision-making.

    • Julian Assange’s Life Inside A Converted Women’s Toilet At The Ecuadorian Embassy

      “And the quietest room is the women’s bathroom, the only room that’s easy to sleep in. So I thought I’d try and somehow get hold of it and renovate it. Eventually, somewhat reluctantly, the staff relented. They ripped out the toilet. They’ve been very generous.”

    • Hope and anger: WikiLeaks’ Julian Assange marks two years in Ecuador’s London embassy
    • Assange marks two years in legal limbo

      ​Julian Assange, a modern day hero and enemy of state, is preparing to mark two years in captivity inside the Ecuadorian embassy in London, with another major leak of state secrets and a fresh challenge to escape legal limbo.

    • Wikileaks’ Julian Assange: I’m still here

      Two years after he took refuge in the Ecuadorian embassy in London, lawyers for the controversial Wikileaks honcho rally for another attempt to secure his freedom.

    • How WikiLeaks opened our eyes to the illusion of freedom

      We remember anniversaries that mark the important events of our era: September 11 (not only the 2001 Twin Towers attack, but also the 1973 military coup against Allende in Chile), D-day, etc. Maybe another date should be added to this list: 19 June.

      Most of us like to take a stroll during the day to get a breath of fresh air. There must be a good reason for those who cannot do it – maybe they have a job that prevents it (miners, submariners), or a strange illness that makes exposure to sunlight a deadly danger. Even prisoners get their daily hour’s walk in fresh air.

    • Assange’s Anniversary: Two Years Cornered, but Still World-Changing

      Julian Assange. Well, it’s not happy per se, but tomorrow marks two years that he has spent stuck in the Ecuadorian embassy in London, which is surrounded at all hours by police. It is a good day to look back on the accomplishments of his information-leaking organization and reflect on how large an impact Assange has had and continues to have on issues of government, journalism, and whistle-blowing.

    • Assange calls for US to drop investigation into WikiLeaks

      Julian Assange calls for US Attorney General Eric Holder to drop WikiLeaks investigation or resign.

    • Julian Assange calls on US to drop Wikileaks investigation after two years in Ecuador embassy
    • Julian Assange: Life in Ecuadorian Embassy ‘May Never End’

      Julian Assange – the Australian journalist, editor-in-chief and co-founder of WikiLeaks whistle-blower website – has now spent two years in the Ecuadorian embassy in London.

      He went to live in the embassy after the UK Supreme Court had ordered his extradition to Sweden, where he awaits investigations of sexual assault allegations.

    • WikiLeak’s Julian Assange tries to end deadlock with Swedish legal challenge
    • Embassy life cramped, quiet for Julian Assange

      A room, shower, and the Internet – such is daily life for Julian Assange. For two years, the controversial and enigmatic co-founder of the whistleblower site WikiLeaks has been living at the Ecuadorian embassy in London.

    • Policing Assange Embassy Has Cost £6.5m

      The money spent on policing the embassy would be enough to keep 325 bobbies on the beat for a year, while the £9,000 daily cost is the same as it costs to put a child through state school for a year.

  • Finance

    • The New Brazil: the continuation of imperialism by other means

      Zibechi’s new book forcefully exhibits how the insatiable drive for capital accumulation continues to dispossess and repress Brazil’s marginalized poor.

    • China says it wants to back major UK infrastructure projects and has signed £14bn in trade deals.

      The news comes on the first full day of a visit by its leader.

      The BBC understands the projects the state-owned China Development Bank (CDB) wants to invest in include High Speed 2 and the next generation of nuclear power stations.

      A major deal between BP and China National Offshore Oil Corporation is worth about $20bn (£11.8bn).

    • The NSA now owns Bitcoin

      Satochi Nakamoto (the nom de guerre of the mind behind Bitcoin) designed this flaw into the software because of one false assumption. What was that assumption? He believed that it was possible to build an open and free economic system built purely on simple self-interest (selfishness). Lots of people make this mistake (famously, Greenspan believed that selfish decision making would prevent the banking crisis of 2008).

  • PR/AstroTurf/Lobbying

    • We finally gave Congress email addresses
    • Taking American leadership back from political elites

      Ever since the Supreme Court removed corporate spending limits on political campaigns via Citizen United, the field of American politics has become overwhelmingly dominated by the messaging of corporate donors and wealthy individuals. And two months ago, the situation got much worse. McCutcheon v. FEC removed limits on the total amount any one person can contribute. Now individuals can give more than $3.5 million over two years, instead of the previous $123,200 limit.

      Who can afford to spend that kind of money on politics other than the very rich? And what, exactly, are they getting in return for their million-dollar donations? A lot more than a campaign t-shirt.

    • Bradley Foundation Bankrolled Groups Pushing Back on Scott Walker John Doe Criminal Probe

      The Bradley Foundation and its directors have given nearly $18 million to groups that are now connected to individuals involved in the John Doe investigation and the campaign against it. That high-profile probe is examining possible campaign finance violations during the 2011 and 2012 recall elections as Wisconsin Club for Growth and other nonprofit “dark money” groups spent tens of millions trying to protect the seats of Scott Walker and Republican legislators.

  • Censorship

    • Putin Goes After Bloggers, Not Profits

      At a highly anticipated meeting last week, President Vladimir Putin spoke to Yandex’s Arkady Volozh and Mail.Ru’s Dmitry Grishin, both Internet industry leaders who stand to lose huge sums of money if the Kremlin’s Internet crackdown causes Russian consumers to take their business to foreign competitors like Google.

    • Anonymous Browser Mass Hit as Russians Seek to Escape Internet Censorship

      The government’s campaign for online censorship has created a backlash, with the number of Russia-based users of anonymous web surfing software Tor more than doubling in the past three weeks.

  • Privacy

    • Demand your ISP stops retaining your data
    • Data retention: why we have to keep the pressure on ISPs

      In the last four hours, over 400 ORG supporters have contacted their ISPs to demand that they stop retaining customers’ email, SMS, web and phone data. It’s crucial that we keep up the pressure.

    • Possible hidden Latin warning about NSA in Truecrypt’s suicide note

      When the anonymous authors of the Truecrypt security tool mysteriously yanked their software last month, there was widespread suspicion that they had been ordered by the NSA to secretly compromise their software. A close look at the cryptic message they left behind suggests that they may have encoded a secret clue in the initials of each word of the sentence (“Using TrueCrypt is not secure as it may contain unfixed security issues”), the Latin phrase “uti nsa im cu si” which some claim can be translated as a warning that the NSA had pwned Truecrypt.

    • TrueCrypt probably didn’t leave a Latin message alerting users to NSA spying

      When popular security software TrueCrypt closed its doors, many users simply couldn’t believe that the stated reason – that the developers had decided to stop work because Microsoft had rendered their software obsolete – was true.

    • TrueCrypt – a matter of assurance

      For example, the audit raised serious questions about code quality and the antediluvian build environment. But this is a bit like criticising a donkey for not being a horse. The groundwork was laid when Microsoft was only just waking up to the need for a secure development methodology.

    • Lawmakers Skeptical on Emails and I.R.S.

      Six additional Internal Revenue Service workers lost emails sought by congressional investigators when their computers crashed, investigators announced Tuesday, escalating Republican suspicions that the employees may have been trying to cover up political targeting of Tea Party organizations.

    • Lawmakers Sound Alarm Over Wider Internal Surveillance

      Lawmakers on Wednesday voiced concern over the Obama administration’s plans for monitoring individuals who hold security clearances as part of a crackdown in the wake of leaks by former government contractor Edward Snowden.

      Sens. Charles Grassley (R., Iowa) and Ron Wyden (D., Ore.) said in a letter to Director of National Intelligence James Clapper that the stated possibility of “continuous evaluation” of legislative officials would raise constitutional questions and that extensive employee monitoring could inhibit people from coming forward to point out fraudulent or illegal activities. These concerns suggest growing worries among lawmakers about the extent to which the government’s monitoring capabilities will be turned on the legislative branch.

    • Facebook down, people take to Twitter to poke fun

      Facebook, the world’s most popular social media website, crashed for a brief while on Thursday. “We’re working on getting this fixed as soon as we can,” said an message on the website when users tried to log in.

    • NSA Turned Germany Into Its Largest Listening Post in Europe
    • ​Germany is NSA’s primary host of surveillance architecture in Europe – report
    • Snowden’s German NSA dossier leaks online

      The so-called “German NSA dossier” leaked on the Internet. According to Edward Snowden, over 50 files in the dossier contain information about the locations, where NSA agents stay in Germany.

    • NSA using third-party countries to tap into broadband cables worldwide

      According to new documents released by NSA whistleblower Edward Snowden, the US National Security Agency (NSA) is using third-party countries to gain access to thousands of fibre-optic cables in their jurisdictions.

    • How Secret Partners Expand NSA’s Surveillance Dragnet

      Huge volumes of private emails, phone calls, and internet chats are being intercepted by the National Security Agency with the secret cooperation of more foreign governments than previously known, according to newly disclosed documents from whistleblower Edward Snowden.

    • Let’s end the NSA dragnet

      One year ago this month, Americans learned that their government was engaged in secret dragnet surveillance, which contradicted years of assurances to the contrary from senior government officials and intelligence leaders.

    • Germany is NSA’s largest listening post, according to new report based on Snowden leaks

      Using documents leaked by National Security Agency whistleblower Edward Snowden, Der Spiegel reports that the NSA has turned Germany into its most important base of operations in Europe. “NSA is more active in Germany than anywhere else in Europe,” reports the paper, “And data collected here may have helped kill suspected terrorists.”

    • Top European court to rule on NSA Facebook data privacy challenge

      Europe’s top court is to rule on a case that seeks to force data protection authorities to investigate allegations that Facebook passes personal data to the US National Security Agency.

      The case, brought by Austrian privacy campaigner Max Schrem, was referred to the European Court of Justice (ECJ) in Luxembourg by the high court in Dublin.

    • Data sharing deal with U.S. referred to EU’s top court
    • Facebook privacy case sent to Europe
    • Irish court raises questions on Facebook’s relationship with NSA

      Leaks from the NSA’s Edward Snowden revealed the extent to which US technology companies were cooperating with intelligence agencies. Many at the time claimed that their hands were forced.

    • US data sharing deal referred to EU’s top court

      Ireland’s High Court has asked the European Court of Justice (ECJ) to review a European Union-US data protection agreement in light of allegations that Facebook shared data from EU users with the US National Security Agency.

    • Europe v Facebook: higher court to decide on giving data to spies

      THE European Court of Justice will be asked to examine the law governing data protection, following a student’s legal challenge over the mass transfer of data by Facebook to the US intelligence services.

    • Congress Decides This Week Whether to Shut the NSA Backdoor: Here’s How You Can Help

      The NSA may seem like an intimidating giant, but it has a serious Achilles’ heel— the enormous budget it claims from taxpayer dollars every year. While change to the actual words of the laws that govern NSA surveillance seems to be a difficult task, a group of representatives have decided to take the battle to the bank.

    • Stop The NSA’s Backdoor: Call Congress Today To Support Key Amendment
    • Funding Amendment To Curtail Warrantless Surveillance Proposed In House

      A bipartisan group of Congress members have proposed an amendment to the Fiscal Year 2015 Department of Defense Appropriations Act aimed at reining in government surveillance. The amendment would ban the funding of government to either demand or request a “backdoor” into products built by technology companies. It would also ban the funding of searches of the data of US persons under the authority of Section 702 of the Foreign Intelligence Surveillance Act (FISA).

    • CALL CONGRESS NOW, END NSA MASS SURVEILLANCE

      If you call your Congressional rep today, we can stop NSA mass surveillance in its tracks. Today, Congress will vote on a critical amendment to the Defense Appropriations Bill: under this amendment, the NSA will be prohibited from using its prodigious budget to conduct mass, warrantless surveillance and to sabotage security standards and technology. This doesn’t solve all the surveillance problems, but it’s the cleanest, quickest and most plausible way to hamstring NSA spying. The last time this happened, Congress came within seven votes of passing it. The chances are even better now. CALL.

    • Hail hackers for reverse-engineering NSA bugs
    • Hackers reverse-engineer NSA’s leaked bugging devices

      RADIO hackers have reverse-engineered some of the wireless spying gadgets used by the US National Security Agency. Using documents leaked by Edward Snowden, researchers have built simple but effective tools that can be attached to parts of a computer to gather private information in a host of intrusive ways.

      The NSA’s Advanced Network Technology catalogue was part of the avalanche of classified documents leaked by Snowden, a former agency contractor. The catalogue lists and pictures devices that agents can use to spy on a target’s computer or phone. The technologies include fake base stations for hijacking and monitoring cellphone calls and radio-equipped USB sticks that transmit a computer’s contents.

    • Gmail Encryption May Stop NSA Snooping, Not Google’s
    • German minister rules out Google breakup

      The European Union has to rely on antitrust and privacy rules to curb Google’s search-engine dominance and can’t just break up the company, German Interior Minister Thomas de Maiziere said.

    • Over-intrusive government surveillance

      One of my primary responsibilities as your representative in Congress is to ensure that the privacy and civil liberties guaranteed in the Constitution for every American remain protected. Revelations that U.S. intelligence agencies have been collecting phone records, e-mails, credit card transactions and other private communications in the name of national security are breathtaking in their potential ramifications for the rights of our citizens. While law enforcement and the intelligence community should have all the resources necessary to combat terrorism, they should be held within the bounds of the Constitution.

    • Opinion: An agency of questionable intelligence

      A year after the Snowden revelations, Germany’s domestic spy agency has so little to say about the NSA surveillance scandal it calls into question the intelligence of the intelligence agency, says DW’s Marcel Fürstenau.

    • Your Local Police May Be Collecting Metadata

      When talking of freewheeling domestic spying, it would behoove us to remember that it’s not just the National Security Agency (NSA) that needs reform and a tight leash. Hell, it’s not even just federal agencies who are disinterested in your Fourth Amendment rights. Like the war toys that move from the Pentagon down to myriad local law enforcement agencies, dragnet spying is happening at the state and city level, too.

    • Time to end NSA’s secret dragnet surveillance

      One year ago this month, Americans learned that their government was engaged in secret dragnet surveillance, which contradicted years of assurances to the contrary from senior government officials and intelligence leaders. – See more at: http://www.vindy.com/news/2014/jun/19/time-to-end-nsas-secret-dragnet-surveill/?newswatch#sthash.r1kBLsr4.dpuf

    • Government Defends Social Media Spying As Perfectly Legal
    • VMware: NSA revelations have been the single biggest issue for cloud clients

      The impact of Edward Snowden’s leaks about NSA spying have been the single biggest issue that has changed the conversation for VMware’s cloud clients, said Bill Fathers, VMware’s SVP of hybrid cloud services, at Gigaom’s Structure conference on Wednesday. “It’s been absolutely fascinating,” Fathers said in a conversation about making the enterprise comfortable with the public cloud. Currently just two or three percent of work loads are in the public cloud, but Fathers expects that to move to 20 percent over the years.

    • Brazil reinvents optical fiber encryption to foil NSA
    • U.S. seeks to repair relations with Brazil after NSA surveillance fallout

      U.S. Vice President Joe Biden, who cheered Team USA onto victory over Ghana at Monday’s World Cup match in Rio de Janeiro, is on a mission of soccer diplomacy to repair relations with Brazil.

    • US VP Biden meets Brazilian leader Rousseff in effort to thaw relations, offers no details

      U.S. Vice-President Joe Biden briefly met with Brazilian President Dilma Rousseff on Tuesday in a bid to thaw stalled relations between the two nations

      Biden, speaking to reporters in the U.S. Embassy after the abrupt cancellation of a joint statement he was expected to make with Brazil’s vice-president, said he reassured Rouseff that the U.S. had changed espionage tactics that previously led to direct spying of the Brazilian leader’s communications.

    • Joe Biden, Dilma Roussef Meeting: Brazil’s President and American VP Have First Meeting Since NSA Scandal
    • Biden visits Colombia as part of regional tour to repair ties, address immigration

      Speaking to reporters after the abrupt cancellation of a joint statement he was expected to make with Brazil’s vice president, Biden said he reassured Rousseff that the U.S. had changed espionage tactics, since it emerged last year that the NSA had spied on her personal communications.

    • Biden assures Rousseff that NSA activities are ‘under review’

      The meeting was part of a diplomatic drive to improve relations between the two countries, which were damaged after Brazilian companies and Rousseff herself appeared among the alleged targets of espionage activities conducted by the US National Security Agency (NSA).

    • It’s perfectly legal for us to rummage in your cloud data, states UK’s top spy boss
    • Government defends its Facebook snooping
    • UK spy agency says to share cyber threat data with private firms

      Britain’s GCHQ intelligence agency said on Tuesday it would start to share classified cyber threat information with private companies amid concerns over increasingly sophisticated targeting of businesses by hackers.

    • GCHQ boss attacks British media over Snowden leaks

      Iain Lobban, the UK spy chief, has defended GCHQ in light of the British media’s publication of the Snowden documents

    • UK admits to spying on citizens via Google, Facebook
    • Facebook updates, Twitter posts and Google searches spied on by Government

      Facebook status updates and Twitter posts are being intercepted by the UK Government because they are regarded as external communications from countries based overseas, it has been revealed.

    • NSA’s Data Center Back in the Shadows After Government Maneuver

      Local officials in Bluffdale, Utah, have voted to help keep the NSA’s new data center hidden from public view.

      Back in March, we introduced you to Nate Carlisle, a Salt Lake Tribune reporter who was waging war with local officials to learn a simple fact about the NSA’s sprawling data center, just completed in nearby Bluffdale.

    • 3 ways Glenn Greenwald changed how I look at privacy

      The government is “truly devoted to the elimination of privacy in the digital age,” the lawyer and journalist told a sold-out crowd of 850 at Town Hall Seattle Tuesday night. “That’s not hyperbole.”

    • How GCHQ Justifies the Mass Surveillance of UK Social Media Users

      GCHQ has given itself legal justification for sweeping up the Facebook, Google, Twitter and YouTube data of UK citizens, without warrant, by labelling that kind of information “external communications.”

    • House Supports Bill Requiring Warrants For Email Searches

      A majority of lawmakers in the House of Representatives now support a bill requiring agencies like the National Security Agency to get warrants before accessing private emails.

    • Ralph Fiennes interview: Logging Google searches like ‘getting inside people’s brains’

      Actor and director Ralph Fiennes has described as “profoundly frightening” the idea that internet companies such as Google and Facebook hold data on their users that can be used by governments.

    • How the NSA may be using games to encourage digital snooping

      German magazine Der Spiegel on Wednesday posted a new cache of documents related to National Security Agency surveillance activities within Germany. Among the trove is a report that sheds new light on how the U.S. government may be using games to motivate analysts using XKeyscore, a tool for searching through online data that the agency collects that was revealed last year by former NSA contractor Edward Snowden.

    • More Than Half Of The House Co-Sponsoring Email Privacy Reform; So Why Isn’t It Moving?

      For quite some time we’ve talked about the importance of ECPA reform. ECPA — the Electronic Communications Privacy Act — is woefully outdated. Passed in the 1980s, when the internet was just a small network that connected a few universities, it has allowed law enforcement and other government officials to snoop on your email based on some very outdated definitions and assumptions. As we’ve discussed in the past, one very obvious example, is the idea that, under the law, emails stored on a server for over 180 days are considered “abandoned” and that there’s no need to get a warrant to view those emails. Of course, that was back when people expected old emails to be either deleted or downloaded. No one predicted “cloud” computing with virtually unlimited storage.

    • Call to open RAF base for investigation into NSA tapping of Merkel’s phone

      Britain should grant Germany’s federal prosecutor access to an RAF base which is alleged to have acted as a relay station for data intercepted from Angela Merkel’s mobile phone by the US National Security Agency (NSA), the Labour MP Tom Watson has said.

    • “H4CKERS WANTED” report: NSA not having trouble filling cybersecurity jobs

      Demand for cybersecurity skills in general began rising within the last five years, the report says, not because hackers are attacking networks more but because the defenders of those networks are far more aware of the hackers and are eager to employ someone who can set up ways to detect and stop them. In addition, the rise of state-sponsored stealthy cyber-espionage—and in some cases, even hard-hitting attacks suggestive of cyberwar–is heightening concerns.

    • Secret Collaboration Between the Power of Force and the Pursuit of Profit

      At the front of the room, under a swag of the heavy red draperies and the American flag, sat the panel. The lineup was peculiar. The speakers, waiting for the audience to settle in, included a number of very big names from the intelligence community, including General Michael Hayden, by this time the former director of both the CIA and the NSA; James Woolsey, former CIA director; and Michael Mukasey, former Attorney General for George W. Bush.

      And then there were the others. First among them was the facilitator and director of the Economic Warfare Institute herself. Dr. Rachel Ehrenfeld was a relative unknown who, throughout the long afternoon, would aggressively use her academic title at every opportunity, an unusual practice in this company. According to the available brochure, one of the other panelists would argue that jihadists were setting the wildfires ravaging Colorado that summer. Another, a former alternate director for the United States at the International Monetary Fund (IMF), would present a memorable anecdote involving complex terror scenarios not even Hollywood had ever produced.

    • Senators: No ‘watered down’ NSA reform

      Sens. Rand Paul (R-Ky.), Ron Wyden (D-Ore.) and Mark Udall (D-Colo.) pledged on Tuesday to fight against “limited” and “watered down” legislation to reform the spy agency, which they said includes the bill that passed the House last month.

    • Afghanistan’s journalists betrayed

      NSA’s mass surveillance may unfairly implicate the country’€™s courageous reporters for communicating with insurgents

    • Automatic license plate scanners ‘just like’ NSA surveillance, congressman says

      John Fleming sees plenty of parallels between police departments’ use of automatic license plate scanning technology and widespread electronic surveillance by the National Security Agency.

    • NATO’s Jamie Shea reflects on the balance between security and participation

      Cyber attacks are “not just about trying to paralyze people’s networks,” says senior NATO official Jamie Shea. “It’s also about trying to use cyberspace for propaganda.” Shea recently spoke to Deutsche Welle.

    • Germany Seeks Criminal Prosecution of NSA Snoops

      Germany’s top federal prosecutor has opened a criminal probe into espionage operations by the U.S. National Security Agency, particularly focused on the NSA snooping directed against German Chancellor Angela Merkel (shown).The goal, he said at a press conference, is to bring to justice specific individual U.S. government agents who were allegedly involved in the unlawful snooping operations against German officials. Prosecutions for spying on everyday citizens, while a violation of German law, will not be forthcoming — at least not yet.

    • Inspired by Edward Snowden, Lawmakers Want Missouri to Stand Against NSA Surveillance

      The “Snowden effect” has hit the Show-Me State, and two state lawmakers hope the feds will take notice.

      Sen. Rob Schaaf and Rep. Paul Curtman, both Republicans, have added a ballot to the August 5 primary that will allow Missourians to vote on whether the government shall be allowed to access their electronic communications without a search warrant.

    • Missourians To Vote On Updated Fourth Amendment Against NSA
    • Why Facebook and the NSA love graph databases

      Is there a benefit to understanding how your users, suppliers or employees relate to and influence one another? It’s hard to imagine that there is a business that couldn’t benefit from more detailed insight and analysis, let alone prediction, of its significant relationships.

    • Treating Snowden as a ‘Personality’

      The mainstream U.S. media prefers personalities over substance, so it was perhaps not a surprise that its focus at the first anniversary of Edward Snowden’s NSA leaks was on his alleged peculiarities, not the frightening prospect of a Big Brother state, says ex-State Department official William R. Polk.

    • Privacy groups ask Obama not to renew NSA powers

      A coalition of more than two dozen privacy and digital rights groups is asking President Obama not to renew a contested National Security Agency program when its legal authority expires this week.

    • Is General Motors Working with the NSA to Snoop on Auto Owners?

      Mary Barra, the embattled CEO of General Motors, currently embroiled in a recall scandal, is also on the Board of NSA surveillance contractor General Dynamics. Specifically, General Dynamics is the contractor helping the NSA process recorded phone calls going in and out of the Bahamas…

    • VC funding for European cyber security firms

      The London-based asset manager has already made its first two investments, investing US$ 8 million (£5 million) in Balabit, a Luxembourg-based company which specialises in detecting insider threats. The company does this with its technology which monitors normal and unusual behaviour, using algorithms to discover the latter.

    • Court: Terror suspect can’t get NSA evidence gathered against him

      The United States Court of Appeals for the Seventh Circuit has ruled against terrorism suspect Adel Daoud, saying that he and his attorneys cannot access the evidence gathered against him. The Monday ruling overturns an earlier lower district court ruling that had allowed Daoud and his lawyers to review the legality of digital surveillance warrants used against him.

    • Brothers who worked for the NSA and George W. Bush now defend against snoops
    • Bank of England CIO: “cloud opens UK data to CIA spies”

      The Bank of England’s CIO has advised businesses to be aware that partnering with US-based cloud suppliers could result in confidential data being accessed by government agencies such as the FBI and CIA.

    • FBI And CIA Have A Sense Of Humor?

      The FBI released its 83-page “Twitter Shorthand” dictionary this week in order to give you a laugh or perhaps finally discern what that person you follow was getting on about in their last tweet.

  • Civil Rights

    • Pakistan’s parallel justice system proves Taliban are ‘out-governing’ the state

      While Islamabad’s authority does not extend to the tribal areas, Taliban’s unofficial court in Waziristan rules on cases in Karachi

    • How an FBI Informant Helped Orchestrate the Hack of an FBI Contractor

      Weeks after he started working quietly as an FBI informant, Hector Xavier Monsegur, known by his online alias “Sabu,” led a cyber attack against one of the bureau’s very own IT contractors.

    • NSA Aftershocks: Businesses in the wake of Snowden

      Len Padilla, Vice President Product Strategy, NTT Communications Europe discusses how ICT decision-makers have responded to PRISM allegations

    • Alleged Benghazi Mastermind Enters Obama’s Hybrid Terrorism Justice System

      A White House badly in need of some good news on the international front got some today with the capture of Ahmed Abu Khattala, a senior leader of the militant group Ansar al-Sharia and one of the primary suspects in the 2012 Benghazi attack that killed Ambassador Christopher Stevens and three other Americans. Abu Khattala’s capture may also show that the administration, which has been criticized for its reliance on lethal drone strikes and its failure to close the detention facility at Guantánamo Bay, has settled on a preferred method for dealing with senior terrorist leaders.

    • Guantánamo Detainee Arraigned in Case That Could Help Decide Fate of Tribunals

      An Iraqi detainee at Guantánamo Bay, Cuba, was arraigned Wednesday on war-crimes charges before a military commission, setting in motion a case that could help determine whether the tribunals system will be used extensively in the future or wither away after the handful of cases before it are completed.

    • Government told to renegotiate with US over use of Diego Garcia for rendition flights

      Britain must renegotiate the deal which allows a key American military base on Diego Garcia to demand that any use of the Indian Ocean island for “extraordinary rendition” can only take place with London’s prior approval, MPs warn today.

    • MPs demand control over CIA activity on British territory of Diego Garcia

      Detainee and combat operations by US on Chagos island must have cooperation of Britain, says Commons defence committee

    • US commitments sought over base

      The Commons Foreign Affairs Committee said public confidence had been “dented” by the disclosure in 2008 that the US had secretly used the island as part of its “extraordinary rendition” programme without informing British ministers – in contravention of previous assurances.

    • “We are now a blood-ridden country”: Margaretta D’Arcy rounds on TDs over Shannon…

      A PANEL OF TDs and senators have pledged to consider a petition asking for the Government to set up an investigation into US Military and CIA use of Irish airspace and Shannon Airport in particular.

    • Shannonwatch raises concerns over suspected rendition planes

      Shannonwatch made a number of recommendations to the Oireachtas Committee, including that the government should establish an independent and impartial inquiry into the possible use of Shannon in the CIA’s illegal renditions programme.

    • Sending Benghazi suspect to Gitmo would be obstruction of justice

      Within hours of the Pentagon’s announcement that the key suspect in the Benghazi attack on the U.S. mission had been apprehended, the usual suspects came out to denounce the Obama administration.

    • Book Review – Surviving Evil: CIA Mind Control Experiments in Vermont

      While the CIA’s MK-ULTRA mind control research, and associated experimental programs concerned with interrogation, torture, and use of incapacitating agents and lethal weapons, involved many dozens, if not hundreds of top U.S. researchers, and cost many millions of dollars, actual testimony from its victims is extremely difficult to find.

      Publishers, news agencies, and mainstream bloggers have shunned such stories, while most victims have been either too psychologically and physically damaged, or too frightened, to come forward. Others have been written off as “crazy.” Indeed, CIA stories about “mind control” have sometimes brought out persecutory delusions in the purely mentally ill.

    • Boston’s most vicious gangster profiled in Whitey

      Born just before the big crash of 1929, the brutal, charismatic James “Whitey” Bulger worked his way up through Beantown’s notorious Winter Hill Gang. This was after stints in juvenile hall, army stockades, and Alcatraz. The movie doesn’t mention it, but Bulger claims he was also forced into a CIA experiment with LSD. If so, his mind didn’t expand much past murder, mayhem, and vast extortion rackets. He was sharp enough to take advantage of the early-’60s crackdown on the Italian Mafia—something FBI chief J. Edgar Hoover once claimed did not exist.

    • The Story of a Reformed Drug Kingpin – ‘Freeway Rick Ross: The Untold Autobiography’

      The eagerly awaited autobiography of ‘Freeway’ Rick Ross has just been released. A notorious drug kingpin reigning over Los Angeles, California and operating across numerous other states, Rick was sentenced to life imprisonment in 1996. But following the discovery his drug source was linked to the CIA and he had been used as a pawn in the Iran-Contra scandal, he received a reduced sentence.

    • U.S. Rendition Records May Face Disclosure

      A British parliamentarian can sue the CIA, Pentagon and other intelligence agencies for information on the United Kingdom’s complicity in the extraordinary rendition of terrorism suspects, the D.C. Circuit ruled.

    • Cop Burns the Body of a 3-yr-old Child for “Not Letting Him Sleep”

      Cody Marrone, a Hernando County cop, was taken into custody over the weekend after it was discovered that he used the hot end of a hairdryer to repeatedly scorch the body of a 3-yr-old toddler.

    • Parents of toddler injured by flash bang grenade during raid on Georgia home call for justice after meeting with feds

      The parents of a 19-month-old severely injured when police threw a flash bang grenade into his playpen during a raid met with federal authorities in Georgia Tuesday to plead for justice.

  • Internet/Net Neutrality

    • Life begins at 50: keeping the Internet unified, open, and inclusive

      I and many others recently met to discuss the future of global Internet governance at the NETmundial conference in Brazil. Next week is the next milestone in the roadmap we set out there: the 50th meeting of ICANN, and the High Level Governmental Meeting of ICANN’s Governmental Advisory Committee on Monday 23rd. I thank the UK government and Minister Ed Vaizey for hosting such significant events in Europe, and would like to remind you all – colleagues, friends, stakeholders and Internet users of all kinds – why this is important.

    • Democrats unveil legislation forcing the FCC to ban Internet fast lanes

      Democratic lawmakers will unveil a piece of bicameral legislation Tuesday that would force the Federal Communications Commission to ban fast lanes on the Internet.

  • Intellectual Monopolies

06.18.14

Links 18/6/2014: Red Hat to acquire eNovance

Posted in News Roundup at 3:46 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • 7 Improvements The Linux Desktop Needs

      In the last fifteen years, the Linux desktop has gone from a collection of marginally adequate solutions to an unparalleled source of innovation and choice. Many of its standard features are either unavailable in Windows, or else available only as a proprietary extension. As a result, using Linux is increasingly not only a matter of principle, but of preference as well.

      Yet, despite this progress, gaps remain. Some are missing features, others missing features, and still others pie-in-the sky extras that could be easily implemented to extend the desktop metaphor without straining users’ tolerance of change.

    • Kerala and Leipzig Move to Free Software on the Desktop

      The government of the Indian state of Kerala has ordered all of its public sector agencies using Windows XP to migrate to free and open source (FOSS) operating systems by 30 June.

      Nor is Kerala alone in doing so in India:

      Since March this year, there have been moves across the Indian public sector to open source. The central government’s IT arm has encouraged agencies to switch to open source operating systems. Another state, Tamil Nadu, has told its departments to install open source operating systems.

  • Server

    • Opening A Window To Linux Virtual Server Hosting

      Manufacturers are getting on board with Linux virtual server hosting in part because oflower set-up and maintenance costs, and the ability to modify the OS according to their needs. Because of its flexibility, scalability, high availability and open-source nature, Linux virtual server hosting is becoming an increasingly attraction option for small and midsize manufacturing concerns.

  • Kernel Space

    • ALSA 1.0.28 Released

      ALSA 1.0.28 features various small updates to the alsa-oss and alsa-tools components, adds new sound firmware files for the Cirrus Logic CS46xx, boasts small changes to alsa-plugins, and as usual most of the work happened within the alsa-lib and alsa-utils components. Within the ALSA library for 1.0.28 are many API updates while within the ALSA utilities area are many updates to ALSA Control and Speaker Test.

    • Welcoming #MesosCon to CloudOpen

      A few years ago we put together the CloudOpen conference to unite the open source projects and products companies are using to create cloud or elastic computing infrastructures inside their companies: OpenStack and CloudStack, containers technology like Docker, data clustering platforms like Hadoop, storage platforms like Gluster and Ceph, and automation tools like Puppet, to name just a few. The defining characteristic of all of these projects (besides being open source) is that they are delivering on the promise of distributed and elastic computing to enable scalable and responsive infrastructures.

    • SCSI Multi-Queue Performance Appears Great For Linux 3.17

      Building upon the major blk-mq work for the multi-queue block layer, the SCSI multi-queue code is now in good shape according to its developers, is delivering very promising performance results, and should be merged into the Linux 3.17 kernel cycle.

    • Ext2Fsd: EXT3/EXT4 Support Now Works On Windows 8

      The Ext2Fsd project that provides an EXT3/EXT4 file-system driver for Microsoft Windows operating systems was recently updated with Windows 8 support and other changes.

    • Graphics Stack

      • AMD Reportedly Plans To Bring Mantle To Linux, Calls Mantle An Open-Source API

        There’s been a bit of flip-flopping from various AMD sources and reports about whether their Mantle API will come to Linux in the near-term, which is AMD’s high-performance graphics API designed to complement OpenGL and Direct3D for the gaming space by offering faster frame-rates. Mantle for now remains Windows-only and bound to just the Catalyst driver with the more recent “GCN” graphics cards.

      • Radeon VCE, OpenMAX Improvements Land In Mesa

        A number of commits have landed within mainline Mesa today for improving the open-source Radeon driver’s video encoding support via the recently exposed VCE video encoding engines and the recently introduced OpenMAX state tracker to Gallium3D.

      • Gallium3D “Mega Drivers” Might Be Ready For Merging In The Next Month

        Work on a Gallium3D approach to Mesa “mega drivers” is still progressing. The final reported patch series is now out there and the developer hopes to have the support merged over the next month.

      • Broadcom VC4 Work Well Underway On DRM, Gallium3D Support Planned

        Beginning this week, Eric Anholt is now working for Broadcom after working for Intel’s Open-Source Technology Center the past several years on the Intel Linux graphics driver stack. While Eric just started there, he’s already made some headway on a Broadcom DRM driver and expects to begin developing a Gallium3D driver soon.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • Randa Meetings Interview: Sanjiban Bairagya

        Here we are in conversation with Sanjiban Bairagya, a current Google Summer of Code 2014 intern who is working on Marble for KDE and is one of the younger, fresher, newer lots at KDE and has quite a bit to offer in terms of enthusiasm and brilliant ideas as well as zeal!

      • Sponsors required for KDE code sprint in Randa

        KDE is organizing a “coding sprint” in Randa, Switzerland. KDE Developer Sprints are focused gatherings of KDE developers to work on a specific part of KDE. Sprints are an opportunity to plan, design, and hack (think 20% socialization and 80% perspiration). Though sprints are supported by KDE e.V. financially and organizationally, we are having more enthusiastic people than funds allotted to us by KDE e.V. We need your support in helping us to fill this gap.

      • Starving Developers

        Phonon, a pillar of our multimedia solutions, was revived in Randa. Kdenlive, our video editor, became 302% more awesome in Randa. The KDE Frameworks 5 movement seeking to make our awesome libraries more useful to all the world started in Randa. Amarok 2 was planned in Randa. Approximately a godzillion bugs were fixed in Randa.

      • after convergence

        Two years later I gave a presentation summarizing these thoughts at Akademy in Dublin. A desktop layer that was stackable like a normal window (“dashboard” in today’s jargon), scripted components instead of compiled applets, dataengines, network services, dynamically loading different layouts for different user activities, using threads to keep the UI fluid, easy animation systems, configure/manipulate-in-place, a window manager that did more than just put title bars around things, etc. It was finally time to get to turning scribbles in notebooks into code. (I was still maintaining various parts of KDE’s 3.x desktop at the time, in particular kicker, as well as working on a variety of other bits of KDE software. This, along with a semi-crazy travel schedule kept me busy with productive things while these ideas were crystallizing.)

      • QML module versions and automatic imports
      • Five Musings on Frameworks Quality

        KDE Frameworks 5 will be released in 2 weeks from now. This fifth revision of what is currently known as the “KDE Development Platform” (or, technically “kdelibs”) is the result of 3 years of effort to modularize the individual libraries (and “bits and pieces”) we shipped as kdelibs and kde-runtime modules as part of KDE SC 4.x. KDE Frameworks contains about 60 individual modules, libraries, plugins, toolchain, and scripting (QtQuick, for example) extensions.

      • Geogebra file support in Kig ( GSoC Report )

        KIG currently has filters for various formats ( Cabri, Dr-Geo, KGeo, KSeg ). I have been working on implementing the Geogebra-filter for KIG. Here’s some introduction about the Geogebra-filter that we are trying to implement :

      • First Report

        As the title (Lyrics Support improvements) of my Google Summer of code project suggests, I am improving the way lyrics are fetched and displayed in Amarok. Personally, I like to follow the lyrics of the song that is playing; so I added this is idea to the Idea Page for GSoC 2014. And now here I am, working on it. I goal of my project is to highlight the particular line from the entire lyrics text that is being played.

      • Last week in Krita — week 23 & 24

        In the last two weeks, besides the coding work on the git repositories, Boudewijn has made available a hefty number of testing builds for the windows community. This builds brings up the latest novelties and features developed in the master branch. Note, however, not all feature sets are finished and it is not recommended for production use. Get the bleeding edge build

    • GNOME Desktop/GTK

      • GNOME: A notifications update

        Previously, I described a work-in-progress design that we have been pursuing in GNOME design. Since that post, the process has diversified, and we are exploring several variations on the original design. These different options are in a state of evolution, and we are developing and evaluating them in parallel. To help with this, Jasper has created a couple of rough prototypes that we’ve been testing.

  • Distributions

  • Devices/Embedded

    • BeagleBone SBC goes OEM, COM version coming

      CircuitCo debuted an HDMI- and flash-free OEM version of the BeagleBone Black called the “BlueSteel-Basic,” to be followed by industrial and COM versions.

    • In-Rack Linux Development Module fosters custom code writing.
    • The IFC6410 Pico-ITX Is A Developer ARM Single-Board Computer Capable Of Running Ubuntu 14.04 And Fedora 20

      As you may know, the IFC6410 Pico-ITX is a single-board computer powered by a Qualcomm Snapdragon 600 CPU, having 2 GB of RAM memory, 4 GB internal storage, 2 USB ports, Gigabit Ethernet port, Wifi, Bluetooth, a SATA connector and other pins and conectors, capable of running Ubuntu 14.04 and Fedora 20 systems, with open source graphics drivers from the Freedeno project.

    • MIPS Takes on ARM in the Internet of Things

      Already, MIPS is widely used in smartwatches, such as the new Android-ready SpeedUp Smartwatch-S, and it supports Google’s upcoming Android Wear platform, claims Imagination.

    • Phones

      • Android

        • Oppo R1 Android Smartphone

          Oppo is a relative newcomer out of China offering high-end phones that are gaining popularity in developed and emerging markets. Its new offering the R1 combines processing power, design and feel. Powered by the MediaTek MT6582 with 4 cores humming along at 1.3GHz with Mali-400 graphics unit the phone has a 1GB RAM and 16GB of storage. The R1 runs Android 4.2.2. The 5-inch (1280×720) high-definition screen is crisp and clear. Both front and back are a mirror-like glass. The buttons on the front have very faint markings but do light up a little when the screen is on. This device certainly has a quality feel and look.The cameras are 8MP rear and 5MP rear. Travel a lot? Duel sims give you carrier flexibility. Oppo is clearly a new kind of Chinese manufacturer and this is a solid phone for the business traveler.

Free Software/Open Source

  • Is Open Source the New De Facto Standard?

    Marc Cohn, senior director of market development at Ciena Corp. (NYSE: CIEN) and chair of the ONF market education committee, kicked off the discussion and highlighted the European Telecommunications Standards Institute (ETSI) Network Functions Virtualization ISG’s decision to start its own open source project, called Open Platform for NFV, or OPN, with the Linux Foundation , which already runs OpenDaylight .

    The idea, Cohn said after the panel, is to develop a framework for an open NFV platform in a similar way that OpenDaylight has created an open source approach to an SDN controller. Participation in the OPN requires a financial buy-in for both network operators and industry hardware and software vendors, and if it follows the Open Daylight model, would also require the contribution of code.

  • GCHQ Plans to Open Source Bits of Its Spy Technology

    By open sourcing that technology, the global security community can probe it for weaknesses and make it even stronger, said Professor Alan Woodward, security expert from the computing department at the University of Surrey. It should also inspire confidence that there are no backdoors or purposeful weaknesses, as the security community would be keen to probe the code, he added.

  • NICTA to release drone OS as open source
  • Auto-Summarization Tool TextTeaser Relaunches As Open Source Code

    TextTeaser, the text-summarization API that TechCrunch first profiled back in October 2013, is now open source and available on GitHub. Creator Jolo Balbin says that he decided to make the code available after “stumbling upon some scalability issues, especially in the API.”

    So he took down the API and recoded TextTeaser to make its auto-summarization process faster. Developers can chose from two plans, including one that costs $12 for every 1,000 articles summarized. The second is an enterprise plan that costs $250 per month and comes with a dedicated server that can store the article source. That means each time someone uses the tool to summarize an article, TextTeaser will learn the keywords in the text and use it to improve its results.

  • Web Browsers

    • Chrome/Google

      • Google Open Sources PDF Software Library

        The PDF code in Google Chrome has been made open source and available for use in apps for viewing, printing and form filling PDF files.

      • Opinion: Why CIOs should cheer Google’s latest open source move

        Virtualization is changing the IT landscape, and two news items last week drove home its impact. The first was Google’s release of Kubernetes under an open-source license. Kubernetes is basically a public version of Borg, the software that the company has used internally to harness computing power from across its data centers into a massive virtual machine.

  • SaaS/Big Data

  • Databases

    • MemSQL, GoGrid Partner on High-Performance Big Data Cloud Analytics

      MemSQL, which provides Big Data analytics based on an in-memory database, and GoGrid have partnered to simplify deployment of the analytics solution within the cloud.

    • What is the best Linux filesystem for MariaDB?

      How do you choose the best Linux filesystem for your MariaDB server? The primary factors to look at are data integrity, performance, and ease of administration. Data integrity tops the list because fixing a corrupted database is even less fun than it sounds, and filesystems play a key role in data integrity. Performance is important because faster is better and time is money, and ease of administration matters for the same reasons as performance.

      [...]

      Trying to figure out which filesystem gives the best performance may be fun, but the filesystem won’t make a large difference in the performance of your MariaDB server. Your hardware is the most crucial factor in eking out the most speed. Fast hard drives, discrete drive controllers, lots of fast RAM, a multi-core processor, and a fast network have a larger impact on performance than the filesystem. You can also tailor your MariaDB configuration options for best performance for your workloads.

  • Oracle/Java/LibreOffice

  • FSF/FSFE/GNU/SFLC

    • A free photo editor worth trying: Getting started with GIMP

      When most of us are looking for a photo-editing tool, we immediately think of Photoshop. Adobe’s program is powerful and popular, but it’s pricey at $100—and that’s for the “light” version called Photoshop Elements.

      Meanwhile, $20 per month is the standard charge for individual one-app subscriptions to Photoshop Creative Cloud. Adobe offers a free in-browser version called Photoshop Express Editor, but it’s very limited and only allows you to edit JPEG files.

      A better free alternative is to turn to the open-source world and a popular program called GIMP. The GNU Image Manipulation Program is the standard photo-editing tool included or available to most Linux distributions. GIMP is also available for Windows (XP and up) and Mac.

    • Register now for the GNU Hackers’ Meeting 2014
  • Public Services/Government

    • European Parliament to weigh open source pilots

      Next Monday, the European Parliament’s budget committee will consider a proposal from the Green/EFA group to pilot the use of open source encryption software, to be used by parliament members and their staff. The Green/EFA group is also asking to trial the use of open standards and open source to make available the EP’s data available in machine-readable format.

  • Openness/Sharing

    • EZTV Users Help to Fund Horror Movie, and Open Source Another

      EZTV users may download many TV-shows for free, but they are by no means cheapskates. A team of filmmakers from Laos recently noticed that nearly all traffic to their Indiegogo campaign came from the torrent site. As a token of their appreciation they have now offered to open source their first horror film, if their funding goal is reached.

    • A web platform for streamlining scientific workflows

      If you haven’t heard, science has been experiencing some issues. Though most scientists believe in the ideals of openness, transparency, and reproducibility, the reality is that the incentive structure of academic research encourages exactly the opposite. So, scientists have a stronger professional incentive to get results published than to get them right. To make things worse, many scientists are stuck with outdated and closed source tools that aren’t up to the task of managing their increasingly complicated workflows.

    • Can we make research more like the web?

      Kaitlin Thaney is the Director of Mozilla’s Science Lab and an open science advocate. Her work in this space began with John Wilbanks building the science wing of Creative Commons (formerly known as “Science Commons”). Their focus was on crafting the infrastructure, policy and advocacy for Open Access and sharing data on the web. She moved to Digital Science, where the focus was on tools and science software, but there was still a gap.

  • Programming

    • The New asyncio Module in Python 3.4: Event Loops

      Python 3.4 added a new asynchronous I/O module named asyncio (formerly known as Tulip). The asyncio module provides a new infrastructure with a plugabble event loop, transport and protocol abstractions, a Future class (adapted for use within the event loop), coroutines, tasks, threadpool management, and synchronization primitives to simplify coding concurrent code. In this overview of asyncio, I provide a brief introduction to the main components of the module and a few simple sample applications that work with some of the event loop functions.

    • Enroll now in free, online open source programming classes

      When Kushal Das helped found the Durgapur, India, Linux users group in 2004, he was struggling to find a teacher who could show him the open source ropes.

      “During that time,” Das said in a recent presentation at PyCon 2014, “there was almost no one to tell us what exactly to do with this thing called Linux, other than clicking randomly.”

    • Real life experiences thanks to Google Summer of Code projects

      While the open source community is filled with some of the most talented minds in the world, fresh perspectives from the next generation of developers is essential to the continued pioneering spirit of open source projects. Such an injection of youthful enthusiasm lends new creative blood to the open source community, allowing projects to stay cutting edge and in keeping with current trends.

    • Inspired by Lego, fuelled by creativity: Linux-based Kano kit wants to get kids hacking again

      Both OS X and Windows 8 are fairly closed operating systems, merely allowing coders to run commands and pulling a veil over the internals of the software powering the machine. The same goes for hardware: all-in-ones, laptops, and tablets alike aren’t easy for curious types to take apart and see what’s inside.

  • Standards/Consortia

Leftovers

  • I stopped a ten million dollar robbery

    “For various reasons, including my wife Claudia is slightly worried I could get killed, I am changing all of the names. All of the other details are intact.” A true story by James Altucher

  • What’s Up With That: Building Bigger Roads Actually Makes Traffic Worse

    I grew up in Los Angeles, the city by the freeway by the sea. And if there’s one thing I’ve known ever since I could sit up in my car seat, it’s that you should expect to run into traffic at any point of the day. Yes, commute hours are the worst, but I’ve run into dead-stop bumper-to-bumper cars on the 405 at 2 a.m.

  • Health/Nutrition

    • Feeding Hawai’i

      The early Hawaiian settlers, who arrived in the uninhabited islands around A.D. 300 from Polynesia, developed a unique system of resource management to support their growing population. Recognizing the connection between the mountains and the oceans and the key role of freshwater in linking the two, they divided the islands into self-sustaining units called ahupua’a. The ahupua’a were usually wedge-shaped sections of land that ran from the mountains to the sea (extending into coastal fishing grounds) and contained a freshwater source such as a stream, spring, or river. Each ahupua’a contained within it all the resources needed for a community to sustain itself independently.

  • Security

  • Defence/Police/Secrecy/Aggression

  • Transparency Reporting

  • Finance

    • Dear Marc Andreessen

      I appreciate that smart, ambitious people like you are thinking about a future of universal prosperity. You borrow terminology from finance in saying that you’re “way long human creativity”. While I’m creeped out by the commodification of our species’s ingenuity, I appreciate the sentiment. If our industry stops painting anyone who questions our business models as Luddites and finds creative ways to build products and services that sustainably address real needs, maybe we can hold on to the receding myth of triumphal disruption. Hopefully we can agree that there are many more meaningful quality of life improvements technology has yet to deliver on before we can start brainstorming the “luxury goods markets” of the future.

      Meanwhile, we don’t need to wait until a hypercapitalist techno-utopia emerges to do right by our struggling neighbors. We could make the choice to pay for universal health care, higher education, and a basic income tomorrow. Instead, you’re kicking the can down the road and hoping the can will turn into a robot with a market solution.

      [...]

      The factory owner gets rich. The line worker, not so much.

    • Private Wealth, Public Squalor: America’s Dilemma

      In the first six months of this year, Senate Republicans used the filibuster to block the Senate majority from increasing the minimum wage, providing paycheck fairness to women, and enabling those with student debt to refinance at lower rates, paid for by insuring millionaires pay a minimum tax.

      Senate Republicans joined Democrats to pass extension of unemployment insurance and comprehensive immigration reform. But Republican House Speaker John Boehner has refused to allow either measure a vote in the House, despite likely majority support for both.

      Profits are at record heights and wages near record lows as a portion of the economy. CEO pay soars to new heights. The wealthiest 1 percent pockets nearly all of the nation’s income growth, while typical household income continues to decline. We are five years into the official “recovery” that has yet to reach most Americans.

  • Censorship

    • Flying the coup: Circumventing censorship in Thailand

      On 22 May 2014, General Prayuth Chan-ocha, Commander of the Royal Thai Army, launched a coup d’état, replacing the Kingdom’s beleaguered civilian political institutions with a military-led National Council for Peace and Order (NCPO). The move came after months of street protests, the most recent in Thailand’s ongoing political unrest. While Thailand is no stranger to military coups, this time the military junta is focusing unprecedented efforts towards restricting online speech and the digital rights of users in Thailand.

      [...]

      The most popular way to secure email communications is using Pretty Good Privacy (PGP), popularly available through its open source implementation, Gnu Privacy Guard (GPG). While PGP leaves metadata traces unencrypted (such as the email subject line and the sender’s and recipient’s email addresses), it encrypts the content and attachments of your email to ensure that only the intended recipients can read the message (all recipients must have GPG for this to work). For help installing GPG, follow Security in a Box’s walkthrough, which covers Windows, Mac OSX, and Linux operating systems. GPG is also available for Android devices with K-9 Mail and APG.

  • Privacy

    • Pentagon working on anonymity tools to dodge NSA?

      So you already know about the NSA’s massive information-collection system to spy on U.S. citizens (courtesy Edward Snowden) which, perhaps, sends shivers down your spine? But did you also know that there is a network called Tor which you can use while surfing the Internet to dodge the NSA?

    • Mikko Hypponen says John Kerry should ‘shut the f*** up’ about Snowden

      Mikko Hypponen has slammed US Secretary of State John Kerry for branding Edward Snowden a “coward” and a “traitor,” and saying that the US National Security Agency (NSA) document leaker should “man up” and return to the United States from Russia to “make his case”.

      In not so many words, Hypponen said that Kerry should pipe down and have respect for Snowden after he blew the whistle on the world’s largest intelligence agency, the NSA.

    • Ex-NSA Guys’ Startup To Protect You From NSA

      It’s like hiring Darth Vader to build planetary defense systems to thwart the Death Star.

      Except the analogy doesn’t quite work. Vader switched to the light side because of his love for his son. These guys are just doing it for the money.

  • Civil Rights

    • 70 Years Later, Still Playing Politics With Freedom of the Press

      Today we’re in year four of the third spy investigation of a publisher in U.S. history. Since 2010 the Justice Department has investigated WikiLeaks, confirmed by court filings this April. Obama called the organization “deplorable” and continues to sponsor confining the organization’s editor-in-chief, Julian Assange, to the Embassy of Ecuador in London. June 19th marks the two-year anniversary of Assange’s entry into the Embassy. Public officials accused WikiLeaks of treason, called for Assange’s assassination, and asked private companies to cut ties to the organization. Ecuador granted Assange political asylum owing to the credible risk of torture, inhumane treatment, and unfair trial he would face here.

    • When Aaron Swartz Spoofed His MAC Address, It Proved He Was A Criminal; When Apple Does It, It’s Good For Everyone

      Whenever we write about Aaron Swartz and the criminal prosecution against him, some of our (and Aaron’s) critics scream that it was “obvious” that he knew he was up to no good, because he chose to spoof his MAC address on the machine he used to download JSTOR articles. Of course, as many people explained, spoofing a MAC address isn’t some crazy nefarious thing to do, and often makes a lot of sense. In fact, Apple recently announced that iOS 8 will have randomized MAC addresses to better protect people’s privacy. Simply speaking: Apple is making “MAC spoofing” standard. And, as the folks over at EFF are noting, this is a very good thing for your privacy.

    • GM Recalls: How General Motors Silenced a Whistle-Blower

      It was close to 3 a.m. on June 6 when Courtland Kelley burst into his bedroom, startling his wife awake. General Motors (GM), Kelley’s employer for more than 30 years, had just released the results of an investigation into how a flawed ignition switch in the Chevrolet Cobalt could easily slip into the “off” position—cutting power, stalling the engine, and disabling airbags just when they’re needed most. The part has been linked to at least 13 deaths and 54 crashes. GM Chief Executive Officer Mary Barra, summoned before Congress in April to answer for the crisis, repeatedly declined to answer lawmakers’ questions before she had the company’s inquest in hand. Now it was out, and Kelley had stayed up to read all 325 pages on a laptop on the back porch of his rural home about 90 miles northwest of Detroit.

  • Internet/Net Neutrality

  • Intellectual Monopolies

    • Copyrights

      • Court Hands Google a Worldwide Site Blocking Injunction

        In what is being viewed as an over-broad action with serious implications, a Canadian court has ordered Google to completely block a group of websites from its worldwide search results. The ruling was handed down despite Google’s protestations that the court has no jurisdiction over Google locally or in the United States.

      • Advocate General Says EU Libraries May Digitize Books In Their Collection Without Permission

        As that indicates, this is a fairly specific result, rather than a broad general right as in the US digitization case. However, what is encouraging is that it is the latest in a string of good decisions handed down by the European Union’s Court of Justice that are starting to introduce a modicum of common sense to Europe’s outdated copyright laws.

      • Torrent Domain Suspensions Damage Credibility, Registrar Says

        When the police coerce registrars to suspend domain names there are a series of damaging knock-on effects, Iceland’s top domain registry says. ISNIC says that it’s difficult to repair the kind of damage suspensions cause to the credibility of top-level domains, something that could be avoided through better understanding of Internet functionality.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts