EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

07.29.15

Links 29/7/2015: Akademy 2015 Ends, NetBSD 7.0 RC

Posted in News Roundup at 7:23 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Open Technology Week looks at potential of open-source tech

    Experts from industry and academia gathered in Cambridge at the weekend to discuss just that as part of the city’s first Open Technology Week.

    Open technology refers to items for which the source code or designs are available free of charge for users to use and modify.

  • Intel to shift Hillsboro engineers to Texas for open source project

    Intel Corp. engineers from Portland will play a role in the development in a new tech development center that’s opening in San Antonio.

    As the San Antonio Business Journal reports, Intel announced a significant investment with Rackspace in a new OpenStack Innovation Center that will be based at Rackspace’s headquarters in San Antonio.

  • 10 tips for better documentation

    Last July, after a full week at OKFestival, I managed to find enough energy to attend the Write the Docs EU Berlin Unconference. I only managed to attend one day of the event, but it was worth it because Paul Adams, a free software advocate and Director of Engineering at KDAB, led a discussion in which we came up with rules for helping documentation teams be more productive:

  • This is why your open source project is failing

    At OSCON this year, Red Hat’s Tom Callaway gave a talk entitled “This is Why You Fail: The Avoidable Mistakes Open Source Projects STILL Make.” In 2009, Callaway was starting to work on the Chromium project—and to say it wasn’t a pleasant experience was the biggest understatement Callaway made in his talk.

  • NPR releases open source social media tools for newsrooms

    The helpful folks at NPR have released a collection of fully customisable, open source tools to help journalists create visually engaging images for social media.

    The tools – called Quotable, Factlist and Waterbug – were announced last night by Brian Boyer, editor of the NPR visuals team, as an easy way “for you to create those fashionable social graphics for your news organisation”.

  • Growing pains: Open source ubiquity raises ownership, governance issues

    Overlapping scope and membership can confuse users, Miniman warns. Unlike the rules produced by standards committees, foundations don’t guarantee interoperability between implementations. IT organizations need to develop an understanding of how open communities operate, how different licensing models work and how they can become actively involved in shaping open source software.

  • Open source software is the only way to keep up

    Between 2005 and 2010, software development accelerated so quickly that some said open source had won the corporate market. But it didn’t stop there. In 2015, surveys showed that companies were using, supporting, and creating more open source software.

    If we look at this pattern, then we can see open source will just keep growing. It’s not going anywhere. If you’re not using, contributing, or supporting it, then you’re going to be left behind.

  • DHI Group plans to sell off Slashdot and Sourceforge

    DHI Group—formerly known as Dice Holdings Incorporated prior to this April—announced plans this morning to sell the combination of Slashdot and SourceForge. The announcement was made as part of DHI’s 2Q15 financial results, which were mostly positive, with DHI showing an increase in revenue over the same period last year (totaling $65.8 million) and a net income of $5.7 million.

  • Move over Skype, Facetime, Hangouts. Here comes Spreedbox, a fully open source, secure videoconferencing solution

    Following the trend of privacy-respecting products and projects coming out of Europe (e.g., ownCloud, Kolab, and Plasma Mobile), German firm struktur AG has started a Kickstarter project called Spreedbox, which aims to offer a secure audio video conferencing service. According to the project page, “The Spreedbox is a unique device for secure audio/video conferencing, text and video messaging and file sharing. The Spreedbox is your own conferencing, meeting and file exchange service on the Internet and puts the control and security of your data into your own hands.”

  • Open Source Is Going Even More Open—Because It Has To

    Open source foundations are nothing new. Linux Foundation has been around since 2007, and other major projects like the Eclipse code editing tool and the Apache web server have been governed this way for even longer. Many of the most important open source projects in recent years, such as the Hadoop big data crunching platform and the database system Cassandra, are managed by the Apache Foundation. But it’s unusual to see so many new foundations created so quickly.

  • Student researchers collaborate virtually with help of open-source software

    A typical summer research program—the institute’s Nanobio Research Experience for Undergraduates, for example—brings students together to one host university, where they work in different laboratories on various projects. In the new pilot training program on Computational Biomolecular, students use an open-source software called Rosetta to work together on problems in computational biology and are mentored by faculty who are part of a global collaborative team known as the Rossetta Commons. The software gives users the ability to analyze massive amounts of data to predict the structure of real and imagined proteins, enzymes, and other molecular structures.

  • Dice Selling Slashdot and Sourceforge

    FS tells me that Ars Technica reports that Dice is selling the Slashdot and Sourceforge sites. The company in their second quarter earnings announcements stated they have “not successfully leveraged the Slashdot user base to further Dice’s digital recruitment business”, and are planning to divest this business.

  • Events

    • Tips for how to plan an open source event

      Step 1 is very clear: Document your event. This way you have shared document that all organizers can refer to as the event progresses. We started with a sample document Kara and Francesca provided. The document is broken down is to several sections and you’re free to copy the document and use it to plan your own event. I’ll review some of the sections in more detail below.

  • SaaS/Big Data

    • DreamHost CEO Details OpenStack Customer Use Cases [VIDEO]

      DreamHost has made a name for itself over the years as being a friendly, yet low-cost hosting provider, offering both shared hosting as well as virtual private servers (VPS). DreamHost is also a major backer of the open source OpenStack cloud platform and now offers the DreamCompute cloud server as well.

  • Databases

    • Amazon’s MySQL database challenger Aurora exits preview

      Following three years of development and nine months of testing, Amazon Web Services (AWS) on Tuesday announced that its Aurora database engine is now generally available to customers.

      AWS first debuted Aurora during its re:Invent conference in November 2014, positioning the database as a lower cost, higher performance alternative to the widely used open source MySQL database and other similar commercial offerings.

  • Oracle/Java/LibreOffice

  • BSD

  • FSF/FSFE/GNU/SFLC

    • loop optimizations in guile

      Sup peeps. So, after the slog to update Guile’s intermediate language, I wanted to land some new optimizations before moving on to the next thing. For years I’ve been meaning to do some loop optimizations, and I was finally able to land a few of them.

  • Public Services/Government

    • Open source runs Croatia’s geospatial services platforms

      Croatia’s Ministry of Environment and Nature Protection has become one of the country’s major users of open source solutions. The software is making possible two geospatial service platforms on biodiversity and environmental protection, unveiled in May.

    • Western Greece switches to using open source GIS

      The Decentralized Administration of Peloponnese, Western Greece and the Ionian is recommending the use of open source software solutions for its Geographic Information Systems. A memo from the IT department wants all public administrations to start using Qgis.

  • Standards/Consortia

Leftovers

  • Amazon proposes drones-only airspace to facilitate high-speed delivery

    Amazon is proposing that a pristine slice of airspace above the world’s cities and suburbs should be set aside for the deployment of high-speed aerial drones capable of flying robotically with virtually no human interference.

    The retail giant has taken the next step in its ambition to deliver packages via drone within 30 minutes by setting out in greater detail than ever before its vision for the future of robotic flight. It envisages that within the next 10 years hundreds of thousands of small drones – not all of them Amazon’s or devoted to delivery – will be tearing across the skies every day largely under their own automated control.

  • Science

    • New study into lack of women in Tech: It’s NOT the men’s fault

      A new study into causes of the scarcity of women in technical and scientific fields says that it is not discrimination by men in the field keeping the ladies away. Nor is it a repugnance felt by women for possibly dishevelled or unhygienic male nerds.

      No, the reason that young women don’t train in Science, Technology, Engineering and Maths (STEM) areas – and thus, don’t find themselves with jobs at tech companies, in IT etc – is quite simply that they mostly don’t know enough maths to do those courses.

      “It is all about the mathematical content of the field. Girls not taking math coursework early on in middle school and high school are set on a different college trajectory than boys,” says economics prof Donna Ginther.

  • Security

    • Security advisories for Monday
    • QEMU Vulnerability Exposes The Host Through Emulated CD-ROM Drive

      Back in May was the big “VENOM” security vulnerability affect QEMU whereby VM security could be escaped through QEMU’s virtual floppy disk drive. In June was a PCNET controller buffer overflow allowing a guest to escape to have host access. Today there’s a similar security vulnerability going public about its virtual CD-ROM drive.

    • Websites, Please Stop Blocking Password Managers. It’s 2015

      Rather than fancy zero-day exploits, or cutting-edge malware, what you mostly need to worry about when it comes to security is using strong, unique passwords on all the sites and services you visit.

      You know that. But what’s crazy is that, in 2015, some websites are intentionally disabling a feature that would allow you to use stronger passwords more easily—and many are doing so because they wrongly argue it makes you safer.

    • The Ashley Madison hack — this time it’s personal

      Last week I argued that requiring backdoors in strong encryption would result in the effective end of encryption and provide a veritable buffet of sensitive data to both the government and those with malicious intents. Encryption with backdoors is not encryption at all.

    • Malware on Linux – When Penguins Attack

      Regular Naked Security readers will know that some security topics cause more friction that others.

      Lately, artificial intelligence has provoked its fair share of excitement.

      Surveillance and privacy are other topics that draw out some very varied viewpoints.

  • Defence/Police/Secrecy/Aggression

  • Environment/Energy/Wildlife

    • Zimbabwean officials: American man wanted in killing of Cecil the lion

      The man suspected in Cecil’s death is Walter James Palmer of Eden Prairie, Minnesota, according to Johnny Rodrigues, head of the Zimbabwe Conservation Task Force.

    • Dentist who killed Zimbabwe’s Cecil the lion hires PR firm amid global backlash

      A picture of Palmer posing with another lion he had killed on a previous hunting trip was widely circulated in the media yesterday after it emerged that he paid £32,000 to take part in a big game hunt in Zimbabwe.

    • Zimbabwe: American being sought for killing of protected lion named Cecil

      Zimbabwean police said Tuesday they are searching for an American who allegedly shot a well-known, protected lion with a crossbow in a killing that has outraged conservationists and others.

      The American allegedly paid $50,000 to kill the lion named Cecil, Zimbabwean conservationists said. Authorities on Tuesday said two Zimbabwean men will appear in court for allegedly helping with the hunt. The American faces poaching charges, according to police spokeswoman Charity Charamba.

      [...]

      Palmer, 55, pleaded guilty in 2008 to making false statements to the U.S. Fish and Wildlife Service about a black bear he fatally shot in western Wisconsin outside of the authorized hunting zone, according to court documents.

      [...]

      If convicted, the men face up to 15 years in prison.

    • Cecil the lion’s killer revealed as American dentist
    • Cambridge professor ‘claims three leading climate scientists may have been assassinated’

      A Cambridge professor has reportedly claimed three scientists investigating the effect of global warming upon melting Arctic ice may have been assassinated.

      According to The Times, Peter Wadhams, a professor of ocean physics, said Seymour Laxon of University College London, Katherine Giles also at UCL and Tim Boyd of the Scottish Association for Marine Science had been murdered, after all three died within a few months of each other in 2013.

  • Finance

    • Trillion-dollar world trade deal aims to make IT products cheaper

      A new global trade agreement that eliminates tariffs on more than 200 kinds of IT products should result in lower prices to technology buyers around the world as it is implemented over the next three years.

    • Trillion euro technology trade deal could cut the cost of consoles

      A EUROPEAN TECHNOLOGY TRADE DEAL worth trillions of euros has been agreed between Europe, China and the World Trade Organisation (WTO).

      The deal follows negotiations between the above parties and sees an accord reached on things like customs duties on items including games consoles, semiconductors and digital media.

    • TPP Undermines User Control and That’s Disastrous for Accessibility

      The Trans-Pacific Partnership (TPP) threatens all users’ ability to access information and participate in culture and innovation online, but it’s especially severe for those with disabilities or who otherwise depend on content in accessible formats. That’s because it doubles down on broken policies that were heavily lobbied for by Hollywood and other major publishers that impede the distribution of accessible works.

    • The creepy reason banks want us all to have ‘tap and pay’ cards… even though they’re a godsend to fraudsters

      Are any words in the English language more abused than ‘for your convenience’? As soon as you read them you know that it’s not your convenience an organisation has in mind, but its own.

      Last week, my bank sent me a contactless debit card. If you don’t have one yet, the chances are you soon will have.

      It looks like any other credit or debit card, but contains a tiny radio receiver which – when it is waved within a couple of inches of a ticket machine or terminal at a shop checkout – can be used to make a payment.

  • Censorship

    • Lifting jokes on Twitter: no laughing matter?

      An example is a tweet by freelance writer Olga Lexell (whose Twitter account is now private) – “saw someone spill their high end juice cleanse all over the sidewalk and now I know god is on my side” – which a number of Twitter users have republished without any attribution to her as the author of the original tweet.

      Ms Lexell decided to submit a DMCA takedown request. Apparently not just God, but also Twitter was on her side. The micro-blogging platform decided in fact to withhold the allegedly infringing tweets. However (and incidentally), as IPKat readers can see here there is still a number of tweets that reproduce her joke in its entirety.

    • Donald Trump’s Clueless Lawyer Threatens Press, Says It’s Ok To Rape Your Spouse

      A few weeks ago, we wrote about the absolute ridiculousness of Donald Trump’s “lawsuit” against Univision, which made some bizarre claims about the First Amendment and defamation that clearly did not apply. While there may be a legitimate contractual dispute hidden somewhere in all that mess, there was so much fluff that it made you wonder who is actually advising the entertainer (pretending to be a politician) on legal issues. Apparently, it’s some guy named Michael Cohen, who isn’t just out of his depth on stuff, but he appears to be actively making things worse. In an astounding article over at The Daily Beast, which was initially over claims of “rape” by Donald Trump’s ex-wife Ivana during their divorce proceedings, Cohen not only claimed that you can’t rape a spouse, but also threatened to ruin The Daily Beast if they published an article. Lawyering by bullshit threats, apparently.

  • Privacy

    • Internet Australia and EFA support ALP call for Data Retention Act review

      Internet Australia and EFA have given their support to the Labor Party’s call for a review of the Data Retention Act legislation which it helped bring into law.

    • LinkedIn Just Changed This Very Popular Feature — and People Are Complaining

      LinkedIn is dealing with some very unhappy users after making it more difficult for them to export contacts.

      Business Insider reports that users can still download their contacts for the site, but it now takes longer. As of Thursday, LinkedIn users had to get an archive of their data to do the procedure, and that can reportedly can take up to 72 hours. Before, users could download user contact information immediately.

    • LinkedIn brings back contact export feature after user backlash
    • A simple developer error is exposing private information on thousands of websites

      Git is a developer’s best friend… except when it’s not used properly and exposes a site’s security.

      The tool is used for version control. It tracks changes to code over time, so that multiple developers can work together efficiently and roll back if they need to.

      Git is also the core tool used to contribute to social coding site GitHub, though they aren’t the same thing.

      It’s a glorious tool and fairly straightforward to use, but has a steep learning curve, as most of the interactions you’ll have with it are through the command line.

    • NSA ordered to destroy phone records it collected illegally

      In case you were worried the National Security Agency was still probing around your phone records, soon enough they will be deleted.

      The Office of the Director of National Intelligence announced that the “bulk collection” of phone data the NSA illegally collected under Section 215 of the Patriot act will be locked away starting November 29, 2015.

      The data will effectively be out of reach from agency employees ad infinitum, effectively making it unusable in anti-terrorism or national security investigations. The only exception will be a three-month period, in which “technical personal” can check the data for the sole purpose of verifying records produced under the new USA Freedom Act.

    • Peru Adopts Data Retention Decree: Declares Location Data No Longer Protected

      The Peruvian President today adopted a legislative decree that will grant the police warrantless access to real time user location data on a 24/7 basis. But that’s not the worst part of the decree: it compels telecom providers to retain, for one year, data on who communicates with whom, for how long, and from where. It also allows the authorities access to the data in real time and online after seven days of the delivery of the court order. Moreover, it compels telecom providers to continue to retain the data for 24 more months in electronic storage. Adding insult to injury, the decree expressly states that location data is excluded from the privacy of communication guaranteed by the Peruvian Constitution.

    • Michael Chertoff Makes the Case against Back Doors

      One of the more interesting comments at the Aspen Security Forum (one that has, as far as I’ve seen, gone unreported) came on Friday when Michael Chertoff was asked about whether the government should be able to require back doors. He provided this response (his response starts at 16:26).

    • Jim Comey Finally Has a Dastardly Criminal Who Made His Texts Unavailable
    • Nope, White House won’t pardon Snowden

      Unsurprisingly, the White House formally announced Tuesday that it will not be granting a pardon to Edward Snowden anytime soon.

      Immediately after Snowden was formally charged in 2013 with espionage, theft, and conversion of government property, supporters began petitioning the White House to pardon the famed former National Security Agency contractor.

    • Is it possible to permanently delete a social media profile?

      Put it online and it will live forever (Image: Aldo Sperber/picturetank)

      They thought they could get away with it. The 37 million people who put nude photos and intimate details of their sexual fantasies on the Ashley Madison website (which has the slogan “Life is short. Have an affair”) had a get-out clause.

      Ashley Madison, like some other sites, offers a hard delete – a guarantee that for a certain amount of money, your data will be scrubbed from all of its internal records. To permanently destroy all traces of your affiliation with the adultery social network costs £15 in the UK.

      However, a hacker collective called Impact Team has revealed that customers’ details aren’t entirely deleted. Compliance with auditing requirements means that the credit card details and name used to scrub the account remain in Ashley Madison’s database, rather defeating the point.

    • DOJ To Court: Hey, We’re Shutting Down Section 215, So We Can Probably Stop Arguing About The Legality Of Bulk Collection

      Just as James Clapper’s office was officially announcing the death of the bulk phone metadata program (ending November 29th, with three months of post-wind-down wind-down for data analysts), the DOJ was filing a motion in the Second Circuit Court of Appeals basically arguing that its finding that the program was illegal really doesn’t matter anymore.

  • Civil Rights

    • Amal Clooney launches Supreme Court appeal on behalf of Chagos islanders

      Almost a decade ago, Britain’s High Court and Court of Appeal ruled that they and their descendants could return to some of the 65 islands, though not to Diego Garcia. Those decisions were challenged by the government and overturned in 2008 by the Law Lords, then Britain’s highest court.

    • Letter to the Telegraph: End “distressing” exile of Chagossians

      In 1985, I called at Saloman Atoll, which is about 100 miles north of Diego, when crossing by yacht from Darwin to Aden. The abandoned houses and roofless church, together with the overgrown pathways were distressing to see. It is to our shame that we treated these islanders so cruelly and it is high time we made amends and repatriated them.

    • In Iraq, I raided insurgents. In Virginia, the police raided me.

      I got home from the bar and fell into bed soon after Saturday night bled into Sunday morning. I didn’t wake up until three police officers barged into my apartment, barking their presence at my door. They sped down the hallway to my bedroom, their service pistols drawn and leveled at me.

      It was just past 9 a.m., and I was still under the covers. The only visible target was my head.

      In the shouting and commotion, I felt an instant familiarity. I’d been here before. This was a raid.

    • Eight Years After Bogus Expulsion Over Supposed ‘Threat,’ Former Student Obtains $900k Settlement From University

      It’s taken former Valdosta State University (VSU) student Hayden Barnes most of a decade and two trips to the 11th Circuit Appeals Court, but his efforts to hold the school accountable for its abusive behavior have finally paid off.

    • The Wheels of Justice Turn Slowly

      On the evening March 14, 2013, a heavily-armed police force surrounded my home in Annandale, Va., after responding to a phony hostage situation that someone had alerted authorities to at our address. I’ve recently received a notice from the U.S. Justice Department stating that one of the individuals involving in that “swatting” incident had pleaded guilty to a felony conspiracy charge.

    • White House Finally Answers Snowden Pardon Petition: The Only Good Whistleblowing Is Punished Whistleblowing

      The White House has finally responded — more than two years later — to a petition asking for a pardon of Edward Snowden. The petition surfaced soon after Snowden went public with his identity. Less than three weeks later — June 25, 2013 — it had passed the 100,000-signature threshold.

  • Intellectual Monopolies

    • Copyrights

      • RIAA Wants Domain Registrar to Expose ‘Pirate Site’ Owner

        The RIAA has obtained subpoenas from a federal court in Columbia ordering domain name registrar Dynadot to hand over the IP and email addresses and all other identifying information related to the operator of the unauthorized music service Soundpiff. In addition, the RIAA notes that the registrar may want to disconnect the site due to its repeated infringements.

      • Happy Birthday Copyright Bombshell: New Evidence Warner Music Previously Hid Shows Song Is Public Domain

        Last minute evidence that completely turns a legal case on its head doesn’t come about all that often — despite what you see in Hollywood movies and TV shows. The discovery process in a lawsuit generally reveals most of the evidence revealed to everyone pretty early on. And yet… in the high profile lawsuit over the copyright status of the song “Happy Birthday,” the plaintiffs “Good Morning to You Productions” (who are making a documentary about the song and are arguing that the song is in the public domain) have popped up with a last minute filing, saying they have just come across evidence that the song is absolutely in the public domain.

        And, here’s the real kicker: they discovered this bit of evidence after two questionable things happened. (1) Warner/Chappell Music (who claims to hold the copyright for the publishing, if it exists) suddenly “found” a bunch of relevant documents that it was supposed to hand over in discovery last year, but didn’t until just a few weeks ago, and (2) a rather important bit of information in one of those new documents was somewhat bizarrely “blurred out.” This led the plaintiffs go searching for the original, and discover that it undermines Warner Music’s arguments, to the point of showing that the company was almost certainly misleading the court. Furthermore, it definitively shows that the work was and is in the public domain.

      • Filmmakers fighting “Happy Birthday” copyright find their “smoking gun”

        The “smoking gun” is a 1927 version of the “Happy Birthday” lyrics, predating Warner/Chappell’s 1935 copyright by eight years. That 1927 songbook, along with other versions located through the plaintiffs’ investigations, “conclusively prove that any copyright that may have existed for the song itself… expired decades ago.”

      • WordPress Rejects 43% Of All ‘Piracy’ Takedown Notices

        WordPress has published new data on the number of piracy takedown notices the company receives. During the first half of the year copyright holders sent close to 5,000 requests to the blogging platform. Of these takedown notices a surprisingly high percentage was rejected due to inaccuracies or plain abuse.

      • So far, WordPress denied 43% of DMCA takedown requests in 2015

        This week WordPress released the latest edition of its recurring transparency report, revealing 43 percent of the Digital Millennium Copyright Act (DMCA) takedown requests it received have been rejected in the first six months of 2015. It’s the lowest six-month period shown in the report, though it only dates back to 2014. However, WordPress said this headline figure would be even higher if it “counted suspended sites as rejected notices.” That change in calculation would bump the WordPress DMCA denial rate to 67 percent between January 1 and June 30, 2015.

07.28.15

Links 28/7/2015: Linux 4.2 RC4, New Logos and Bug ‘Branding’ for FUD

Posted in News Roundup at 5:57 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Eating our own dog food in open source

    There are no guaranteed solutions, of course, but there are smart things we can do. One of the biggest is “eating our own dog food.” If you’re putting on an open source conference, there’s no reason you can’t use open source software to create the flyers, video promos, banners, T-shirt graphics, and the myriad of other pieces of content to run and promote the show. If you’re working for a company that ostensibly has a commitment to open source, ask if your marketing material is being produced with open source software. If it isn’t, then ask why not. And if you happen to be a creative at one of these companies, why aren’t you?

  • Open Source rising as Cloud Computing, Analytics take off – Study

    Open source software has become a critical driver for innovation at leading companies and public-sector organizations around the world, according to a new research report produced by Oxford Economics in partnership with Wipro Limited.

    The report, The Open Source Era, also shows that open source software is essential to the use of other cutting-edge technologies and that open source methodologies have spread far beyond software development.

  • Check out this open source programming typeface entirely generated by code

    Typefaces designed for programmers aren’t a new idea, but I’m particularly taken with Iosevka, a monospace coding typeface that’s completely generated using Node.js.

    The project – which is inspired by existing coding typefaces Pragmata Pro, M+ and PF DIN Mono – aims to produce characters that “have a narrow shape to be space efficient and compatible to Chinese, Japanese and Korean characters.”

  • Capital One Launches Hygieia Open-Source DevOps Dashboard

    The bank launched its Hygieia DevOps dashboard at the O’Reilly Open Source Convention (OSCON) last week in Portland, Ore. The Capital One Agile development teams all use the technology.

  • New Portal For IBM Open Source Projects

    IBM has just launched developerWorksOpen to enable developers to collaborate using its open sourced technologies. It is poised to provide new tools, in particular with regards to mobile.

  • Open Source IFTTT Collection Introduced

    IFTTT (If This Then That) has this month introduced a new collection of new open source projects as well as updating existing ones.

  • Roadies vs. rock stars: The art of open leadership

    Allen Gunn is a facilitator, open source technologist and Executive Director of Aspiration, where he helps NGOs, activists, and software developers make smarter use of tech for social change. Later this month, Aspiration is partnering with Greenpeace’s Mobilisation Lab to host the first-ever Open Campaigns Camp in Berlin. We recently got together to chat about working open and the leadership required to make it work.

  • How to get designers involved in your software project

    Kravets showed us a report she found. It reviewed 23,493 GitHub projects and found that 75.3% had no gender diversity at all. This brought Kravets to the following quote from Malcolm Gladwell: “The world that we could have is much richer than the world we’ve settled for.”

  • The right way to fail

    In the open source industry, we often hear that we should fail quickly and often, but that doesn’t make failure any less scary. Failure seems like a personal problem, but it’s really a corporate problem. We use the phrase “failure is not an option,” and people are so proud to live by it. The fact of the matter, said Scavarda and Hawthorn, is that this statement should say “failure is not an option; it is a requirement.” The truth is that it’s not a matter of whether we will fail, but when we will fail and what will be our timeline for our recovery.

  • The Dronecode Foundation aims to keep UAVs open

    Unmanned Aerial Vehicles’ (UAV) applications and capabilities are advancing at a phenomenal rate, and the cost of these systems is decreasing at an equally impressive rate largely because of the open source. In many cases, open source projects are outpacing the development of their equivalent closed source systems.

  • phpMyAdmin Bids SourceForge Farewell

    phpMyAdmin, the popular free and open source web based tool for administering MySQL databases, has left the SourceForge building.

    In a blog post on Saturday, the project’s infrastructure coordinator, Michal Čihař, announced that a migration from Sourceforge is all but complete. The few remaining items left on the SourceForge server will be “hopefully handled in upcoming days as well.”

  • Boundless: Commercial open source geospatial software

    Boundless’ global customer base uses the OpenGeo Suite, a complete open source geospatial web services stack, to deploy solutions for web mapping, transportation, telecommunications, open government, and a diverse range of other solutions. The OpenGeo Suite provides a continually updated geo web services platform along with maintenance agreements that include support and training to support the growing functionality of continually enhanced open source geospatial software.

  • Web Browsers

    • Mozilla

      • Firefox 42 Nightly Is Now Built In GTK+3

        Firefox Nightly for Linux has been compiled with GTK+3 and the stable version of Firefox 42 may be the first one to be released with GTK+3.

      • Mozilla Toys with Crowdsourcing Ideas for its Browser and Tools

        Can your ideas make one of the most popular Internet browsers better? Mozilla is considering the possibility. The company is launching a testing initiative next month that will let Firefox users try out possible changes to the browser. The project is called “Idea Town” and basically seeks to crowdsource ideas for browser- and web-centric new concepts.

      • How is Firefox OS Different from Android, iOS, Windows Phone and Ubuntu Touch

        firefox-os-phone-firefox-os-phone-While choosing a new mobile phone to buy, you must consider all different available options. Earlier I’ve written about the differences between Ubuntu Touch, Android OS, and Windows Phone. Today I’m going to add another contender in the list – the Firefox OS – and I’ll discuss how is Firefox OS different from others.

  • SaaS/Big Data

    • Seven Key Milestones in OpenStack’s Five-Year History

      On July 19, 2010, Chris Kemp, at the time NASA’s CTO for IT, went on stage at the OSCON open-source conference to announce OpenStack, a new open-source effort along with Rackspace. Five years later, OpenStack has emerged as one of the leading cloud platforms governments and big-name companies around the world use. Best Buy and Walmart are among the major retailers that use OpenStack while major carriers, such as Comcast and AT&T, are also users and contributors. One of the biggest drivers of OpenStack’s growth in the last five years was the formation of the OpenStack Foundation, a vendor-neutral, multi-stakeholder effort to help build and promote the OpenStack platform. While OpenStack in 2010 was made up of two companies, the OpenStack Foundation in 2015 numbers well over 100 members. Another key driver of OpenStack’s growth is continued technical innovation. In 2010, the OpenStack Platform started with just two projects: the Nova Compute Project and the Swift Storage Project. Over the years, multiple additional projects were added, including Glance image, Horizon dashboard, Neutron network and Keystone identity. Here’s a look at key milestones in OpenStack’s five-year history.

    • A new center for innovation, celebrating five years, and more OpenStack news
    • Q&A: Pepperdata’s Chad Carson Discusses Getting Much More Out of Hadoop

      In the data analytics and Hadoop arena, the folks at Pepperdata have an interesting story to tell. Pepperdata’s cofounders ran the web search engineering team at Yahoo during the development of the first production use of Hadoop and created Pepperdata with the mission of providing a simple way of prioritizing Hadoop jobs to give resources to the ones that need them most, while ensuring that a company adheres to its SLAs.

  • Databases

    • The Companies That Support Linux: MariaDB

      MariaDB Corporation is a provider of open source database solutions for SaaS, cloud and on-premise applications that require high availability, scalability, and performance. Built by the founder and core engineering team behind MySQL, MariaDB has more than 2 million users globally and over 500 customers in more than 45 countries — most of whom are running Linux.

  • Oracle/Java/LibreOffice

  • BSD

    • FreeBSD Making Progress With Their Linux Binary Emulation & More
    • Not Learning Unix is a Mistake

      It has occurred to me that not learning Unix is a grave mistake. My relatively early exposure to Unix was important. I may not have appreciated Linux as much or even at all if I hadn’t had that ability to experiment at home with Xenix. Learning about Unix develops new mental muscles like playing a musical instrument or learning a new language. But learning these new processes becomes more difficult with age. To me the exact technical details are less important. It does not really matter if you are a Linux user or if you use one of the BSDs or even something more exotic like Plan 9. The important thing is you can learn new concepts from what I will broadly refer to as the Unix/Internet Community.

  • FSF/FSFE/GNU/SFLC

    • cps soup

      In the olden days, Guile had no compiler, just an interpreter written in C. Around 8 years ago now, we ported Guile to compile to bytecode. That bytecode is what is currently deployed as Guile 2.0. For many reasons we wanted to upgrade our compiler and virtual machine for Guile 2.2, and the result of that was a new continuation-passing-style compiler for Guile. Check that link for all the backstory.

  • Project Releases

  • Public Services/Government

    • UK health service nurtures open source communities

      The UK’s National Health Service (NHS) is nurturing a growing number of communities of software developers working on open source solutions. NHS’ Code4Health team is now supporting 17 communities that bring together health care providers, developers and supporters.

  • Programming

    • Mmm, what’s that smell, Google+? Yes it’s death: Google unhooks ‘social network’ from YouTube

      Google is no longer forcing Google+ on the world: people will be able to log into YouTube, and other Googley services, without having to create mandatory Google+ profiles.

      From now on, only those who deliberately sign up for Google+ will create profiles on the ghost town of a social network. Previously, Google harassed users of YouTube, Gmail and so on, to convert their accounts into Google+ accounts, a move obviously designed to boost G+’s sad numbers. It didn’t go down very well at all – a lot of folks hated it.

    • Google to block access to unofficial autocomplete API

      Google has decided the autocomplete API it informally offers will no longer be available for “unauthorised” users as of August 10th.

Leftovers

  • ‘Sepp Blatter deserves a Nobel Prize for Fifa leadership,’ says Vladimir Putin

    Sepp Blatter deserves a Nobel Prize for his leadership of Fifa, according to Vladimir Putin.

  • Security

    • Unhinged Linux backdoor still poses a nuisance, if not a threat

      If successfully planted, the malware tries to register itself in the system as a daemon (system service). Thereafter it uses LZO compression and the Blowfish encryption algorithm to chat to command and control servers. Every packet contains a checksum, so that the recipient could verify data integrity.

    • Researchers analyze faulty new Linux backdoor
    • Seven things security experts do to keep safe online

      Cybersecurity experts aren’t like you or I, and now we have the evidence to prove it. Researchers at Google interviewed more than 200 experts to find out what security practices they actually carry out online, and then spoke to almost 300 non-experts to find out how they differ.

    • Why Chrysler’s car hack ‘fix’ is staggeringly stupid

      More than a million Chrysler vehicles, including Jeeps, Ram pickups, and Dodge vehicles, are vulnerable to a major vulnerability that could drive them — literally — off the road.

      Last week, the company recalled 1.4 million vehicles at risk of a remote hijack vulnerability, which, as detailed by Wired, can result in a hacker remotely operating the brakes, interfering with the driver’s visibility by switching on the windshield wipers, and even shutting off the engine.

    • The Elderly & the Scam Masters

      Jane answered the phone and a pleasant young man identified himself as an internet technician with Microsoft. He told her they’d received a report that something was extremely wrong with their computers and he was calling to help.

      [...]

      From here it gets crazy. There was a $200 payment made to this “tech expert” and then he calls back and says that payment wasn’t necessary. In fact, an error was made and a draft of $2,000 had been made and not $200. He needed to take his $1,800 back. Of course, the “bank statement” Jane looked at did indeed show $2,000 instead of $200, so Jane was being asked to refund the $1,800.

    • We Can Put An End To Identity Theft
    • Darkode Hacking Forum Taken Down by FBI and Europol

      In a joint operation that included law enforcement agencies from 20 countries, the infamous Darkode hacking forum has been taken down.

  • Defence/Police/Secrecy/Aggression

    • The last thing Labour needs is a leader like Jeremy Corbyn who people want to vote for

      At last sensible Labour politicians are injecting some maturity into the leadership debate. To start with, Tony Blair’s aide John McTernan called anyone who nominated Jeremy Corbyn a “moron”, which is such a refreshing change from the divisive and childish approach of the Left.

    • A Terrorism Case in Britain Ends in Acquittal, but No One Can Say Why

      Ian Cobain, a reporter with The Guardian, is one of very few people who know why a student arrested by armed British police officers in 2013 was finally acquitted this year of terrorism charges.

      Problem is, he cannot report what he knows. He was allowed to observe much of the trial, but only under strict conditions intended to keep classified material secret. His notebooks are being held by Britain’s domestic intelligence agency. And if he writes — or even talks — about the reason that the student, Erol Incedal, 27, was acquitted, Mr. Cobain faces prosecution and possibly jail.

    • WikiLeaks: Saudi Arabia eyes Arabian Sea port

      According to a document recently published on WikiLeaks, authorities in Saudi Arabia are looking for a new access point on the Arabian Sea. This implies either a port in the Sultanate of Oman or in Yemen.

    • Daesh, The Revolutionary Neoliberal Party and the British Falsehood Corporation

      Lord Hall, the director general of the BBC, is to be questioned by MPs over his refusal to refer to Islamic State using the term ‘Daesh’ (an Arabic abbreviation that means ‘one who crushes something underfoot’ and ‘one who sows discord’) because it is pejorative and therefore biased. Controversial British prime minister David Cameron had sent a request to the BBC supported in a letter signed by 120 MPs from across the spectrum – Labour, Tory and SNP.

    • ‘Swiftboating’ J Street to Smear Iran Deal as ‘Anti-Israel’

      No explanation was given of what these goals are, nor was any evidence given that “barely any Israeli” agrees with these goals.

      While New York Times editors didn’t make Shmuel Rosner specify what the alleged goals of the avowedly pro-Israel peace group J Street are that “barely any Israeli” agrees with, context suggests the most obvious explanation: J Street has backed the Obama administration’s diplomacy with Iran and is backing the Iran nuclear deal, and that’s why opponents of the Iran nuclear deal are attacking J Street and saying that J Street’s claim to be “pro-Israel” is dubious.

  • Environment/Energy/Wildlife

  • Finance

    • Global Derivatives: $1.5 Quadrillion Time Bomb

      Along with credit default swaps and other exotic instruments, the total notional derivatives value is about $1.5 quadrillion – about 20% more than in 2008, beyond what anyone can conceive, let alone control if unexpected turmoil strikes.

      The late Bob Chapman predicted it. So does Paul Craig Roberts. It could “destroy Western civilization,” he believes. Financial deregulation turned Wall Street into a casino with no rules except unrestrained making money. Catastrophic failure awaits. It’s just a matter of time.

      Ellen Brown calls the “derivatives casino…a last-ditch attempt to prop up a private pyramid scheme” – slowly crumbling under its own weight.

      For years, Warren Buffett called derivatives “financial time bombs” – for economies and ordinary people.

    • Going Mainstream

      I pointed out that Nicola Sturgeon’s appearance in the TV leadership debates was the first major airing of an anti-Trident argument on broadcast media in England for a decade. Actually hearing anti-austerity arguments led to a huge surge in support for the SNP in England as well as Scotland.

    • UK economy accelerates with growth of 0.7%
    • Prostitution and drug dealing add £10billion to the economy under bizarre rules which mean crime boom is good news for Osborne

      Prostitution and drug dealing provide a £10billion boost to the economy, new research revealed today.

      Bizarre new European rules mean that for the first time illegal activities must be included in the official estimates of the size of the economy.

      It means a booming sex trade or an expansion in cannabis factories will provide a boost to George Osborne’s economic outlook.

  • PR/AstroTurf/Lobbying

    • A Crucial Realization About Journalism is Learned by Being its Subject

      Journalistic objectivity is a sham, a horribly misleading and self-flattering conceit.

    • Aaronovitch Blusters to a Well of Silence

      But something else struck me about the twitter record. Aaronovitch’ twitter account claims to have 78,000 followers. Yet of the 78,000 people who allegedly received his tweet about my insanity, only 1 retweeted and 2 favourited. That is an astonishingly low proportion – 1 in 26,000 reacted. To give context, Mark Doran has only 582 followers and yet had more retweets and favourites for his riposte. 1 in 146 to be precise, a 200 times greater response rate.

      Please keep reading, I promise you this gets a great deal less boring.

      Eighteen months ago I wrote an article about Aaronovitch’s confession that he solicits fake reviews of his books to boost their score on Amazon. In response a reader emailed me with an analysis of Aaronovitch’s twitter followers. He argued with the aid of graphs that the way they accrued indicated that they were not arising naturally, but being purchased in blocks. He claimed this was common practice in the Murdoch organisation to promote their hacks through false apparent popularity.

    • ‘There Is Effectively No Limit on Money in Politics’ – CounterSpin interview with Brendan Fischer on Wisconsin campaign corruption

      Walker was accused of coordinating with outside groups, namely Wisconsin Club for Growth and Wisconsin Manufacturers & Commerce. And these are groups that, after the US Supreme Court’s ruling in Citizens United, can accept unlimited secret donations, and Walker’s campaign is still bound by campaign finance limits that the US Supreme Court has consistently upheld.

  • Privacy

    • NSA has paid Utah $1 million to police entrance on Redwood Road

      From the start of 2014 through March of this year, the NSA has paid the state $1,033,850 to patrol the perimeter of the data center, according to records provided by UHP.

    • Judges slam UK’s FBI over farcical Wire-style mission: National Crime Agency comes under fire for bugging plot ‘failures’

      Britain’s equivalent of the FBI has been condemned by judges after a sophisticated bugging operation against alleged money-launderers descended into farce and a series of ‘grave failures’.

      The National Crime Agency deployed 100 officers in 30 cars to seize the bosses of a company in West London under investigation.

      While the suspects were being interviewed at a police station, NCA chiefs hid listening devices in their offices.

    • Exclusive: Feds Regularly Monitored Black Lives Matter Since Ferguson

      The Department of Homeland Security has been monitoring the Black Lives Matter movement since anti-police protests erupted in Ferguson, Missouri last summer, according to hundreds of documents obtained by The Intercept through a Freedom of Information Act request.

    • Researchers claim they’ve developed a better, faster Tor

      Tor, the world’s largest and most well-known “onion router” network, offers a degree of anonymity that has made it a popular tool of journalists, dissidents, and everyday Internet users who are trying to avoid government or corporate censorship (as well as Internet drug lords and child pornographers). But one thing that it doesn’t offer is speed—its complex encrypted “circuits” bring Web browsing and other tasks to a crawl. That means that users seeking to move larger amounts of data have had to rely on virtual private networks—which while they are anonymous, are much less protected than Tor (since VPN providers—and anyone who has access to their logs—can see who users are).

  • Civil Rights

    • ISIS Sting…or FBI Catfishing?

      Alex Ciccolo was arrested after weeks of talking to an FBI agent he thought would sell him weapons for a terror attack—and who likely knew he was mentally ill.

    • FBI Overreach? Alexander Ciccolo And The Line Between Imagined And Actual Threat

      The ever-vigilant Federal Bureau of Investigation has once again reminded us of the constant threat of domestic terrorism plots — by inventing one. But the most recent story has a more tragic twist than many other FBI “national security” capers, since it involves as well a betrayal of family values.

    • Podcast: Recent FBI Sting, White Terrorism Threat, Transgender Activist Interrupts Obama & Marriage Equality

      …the threat of white terrorism, which the US government largely ignores; a recent elaborate FBI sting against a poor black felon that shows where the agency is putting its resources; and how the FBI monitored live streams of Ferguson protests.

    • Wesley Clark Calls for Internment Camps for “Radicalized” Americans

      Retired general and former Democratic presidential candidate Wesley Clark on Friday called for World War II-style internment camps to be revived for “disloyal Americans.” In an interview with MSNBC’s Thomas Roberts in the wake of the mass shooting in Chatanooga, Tennessee, Clark said that during World War II, “if someone supported Nazi Germany at the expense of the United States, we didn’t say that was freedom of speech, we put him in a camp, they were prisoners of war.”

    • Pat Buchanan Brings His Xenophobia To Meet The Press

      Former MSNBC employee Pat Buchanan used an appearance on NBC’s Meet the Press to frame immigration as a “massive invasion” and “conquest of the West” by “third-world … border jumpers.” During the appearance, host Chuck Todd did not mention Buchanan’s past history of racist comments, or that NBC’s cable channel MSNBC parted ways with Buchanan in 2012.

    • The CIA Paid This Contractor $40 Million to Review Torture Documents

      But VICE News has exclusively obtained more than 100 pages of contracting documents [pdf below] that show it was CIA officials who insisted on outsourcing work related to the Senate’s review — and that it was the CIA that paid more than $40 million to one of its longtime contractors for administrative support and other tasks related to the report. Those tasks included compiling, reviewing, redacting, and posting to a server the more than 6 million pages of highly classified CIA cables and other documents Senate Intelligence Committee staffers pored through during the course of their probe.

    • Torture Is Bad. So Psychologists Helped the US Redefine It

      The Hoffman report (so named because the principal investigator is a lawyer named David Hoffman) was commissioned by the American Psychological Association to examine a 2005 APA publication called the Psychology Ethics in National Security document (PENS). This document, voted into policy by APA leadership at the time, outlined the conditions in which a psychologist could ethically work alongside military and intelligence interrogators. Critics from within and without the APA had—since the document’s inception—suspected foul play. The Hoffman report lays those accusations bare, by showing that the APA’s head of ethics had been directly working with the military to create a back-scratching policy.

  • Intellectual Monopolies

07.26.15

Links 26/7/2015: Purism Librem and Freedom, Akademy Updates

Posted in News Roundup at 11:28 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Migrating phpMyAdmin from SourceForge.net

    Thanks to SourceForge.net, it has been great home for us, but now we have better places to live.

  • CMS

    • PiwigoPress release 2.30

      I just pushed a new release of PiwigoPress (main page, WordPress plugin dir) to the WordPress servers. This release incorporates some new features, mostly contributed by Anton Lavrov (big thanks!)

  • BSD

    • NetBSD Ported To Run On NVIDIA’s Jetson TK1

      The latest ARM platform that NetBSD has been ported to is the NVIDIA Jetson TK1.

      This Tegra K1 ARM SoC Cortex-A15 development board is now in a fairly good working state with HDMI audio/video working along with other stability fixes. The NetBSD -current code is working on this board with the customized “JETSONTK1″ kernel.

Leftovers

  • Airline chief insulted us, claim families of young crash victims

    A group of parents whose children were killed in the Germanwings plane crash have released a scathing letter to Lufthansa’s chief executive, accusing him of ignoring their needs and feelings and insulting them with his company’s compensation offer.

  • Google will block access to its Autocomplete API on August 10, asks developers to use Custom Search Engine

    Are you a developer who uses Google’s unofficial Autocomplete API? Be warned, you won’t be able to do so anymore after August 10, 2015.

    Google currently supports more than 80 APIs that developers can use to integrate Google services and data into their applications. The company also has unsupported and unpublished APIs which people outside the company have discovered and leveraged. One of those is the Autocomplete API.

  • Science

    • Pioneering computer Commodore Amiga turns 30

      1980S BEDROOM BRILLIANCE the Commodore Amiga computer has reached the ripe old age of 30 and is still blazing in the hearts and minds of anyone who took keyboard and joystick in hand and shut the door on their parents.

    • Search for life on Jupiter’s icy moons moves a step closer as work starts on Juice spacecraft

      The search for alien life is moving to the icy moons orbiting Jupiter following the discovery of organic materials hailed as the “building blocks of life”.

      Work is due to start over the coming days on the development of a spacecraft for the European Space Agency (ESA) mission.

      Named Juice (the JUpiter ICy moons Explorer), it is scheduled for launch in 2022 and arrive in the Jovian system around Jupiter eight years later.

    • If You Don’t Fear a Robot Takeover, This Futurist Explains Why You Should

      A Dangerous Master, a new book by academic and futurist Wendell Wallach, takes us on a tour of the nefarious possibilities technological innovations can lead to. It’s not a light read if you’re not already familiar with predator drones and hacking the human genome. But it’s a perfect guidebook to the potential threats mankind faces if we continue along our current trajectory of unchecked innovative progress.

  • Security

    • The scariest thing about the Chrysler hack is how hard it was to patch

      Chrysler is having a bad week. On Tuesday, Wired published a fantastic and gripping report detailing an open vulnerability in Chrysler’s UConnect system, allowing attackers to take control of transmission, brakes, or even steering. There was already a patch available when the article was published, but because cars required physical updates, most cars hadn’t received it. Today, Chrysler upped the ante, asking 1.4 million cars to report to dealerships or install a patch mailed out over USB. It’s the biggest vulnerability we’ve ever seen from a car company, and a firsthand demonstration of how hard it is to patch a problem once it pops up.

    • 1/2 TRILLION spent on IT upgrades, but IRS, Feds still use DOS, old Windows

      President Obama’s team has spent more than a half trillion dollars on information technology but some departments, notably the IRS, still run on DOS and old Windows, which isn’t serviced anymore, according to House chairman.

    • US won’t publicly blame China for massive government hacks – reports

      Despite the fact that numerous American officials have blamed China for the massive hack that involved the personal data theft of millions of government employees, the United States has reportedly chosen not to publicly point the finger at Beijing.

      Two breaches at the Office of Personnel Management this year put the data of more than 22 million Americans at risk, raising concern about foreign cyberattacks and lax government security measures.

    • Car hack uses digital-radio broadcasts to seize control

      Several car infotainment systems are vulnerable to a hack attack that could potentially put lives at risk, a leading security company has said.

      NCC Group said the exploit could be used to seize control of a vehicle’s brakes and other critical systems.

      The Manchester-based company told the BBC it had found a way to carry out the attacks by sending data via digital audio broadcasting (DAB) radio signals.

    • After Jeep Hack, Chrysler Recalls 1.4M Vehicles for Bug Fix

      Welcome to the age of hackable automobiles, when two security researchers can cause a 1.4 million product recall.

      On Friday, Chrysler announced that it’s issuing a formal recall for 1.4 million vehicles that may be affected by a hackable software vulnerability in Chrysler’s Uconnect dashboard computers. The vulnerability was first demonstrated to WIRED by security researchers Charlie Miller and Chris Valasek earlier this month when they wirelessly hacked a Jeep I was driving, taking over dashboard functions, steering, transmission and brakes. The recall doesn’t actually require Chrysler owners to bring their cars, trucks and SUVs to a dealer. Instead, they’ll be sent a USB drive with a software update they can install through the port on their vehicle’s dashboard.

    • Fiat Chrysler recalls 1.4 million cars over remote hack vulnerability
    • Valerie Plame: OPM breach is ‘absolutely catastrophic’ to security

      “When you have access to information about the friends, family members and health issues of someone who works for the U.S. government, you can use that to try to get close to that person and gather intelligence,” she said. “To my mind, the OPM breach is absolutely catastrophic for our national security.”

    • Newest Remote Car Hacking Raises More Questions About Reporter’s Death

      As readers of WhoWhatWhy know, our site has been one of the very few continuing to explore the fiery death two years ago of investigative journalist Michael Hastings, whose car left a straight segment of a Los Angeles street at a high speed, jumped the median, hit a tree, and blew up.

      Our original report described anomalies of the crash and surrounding events that suggest cutting-edge foul play—that an external hacker could have taken control of Hastings’s car in order to kill him. If this sounds too futuristic, a series of recent technical revelations has proven that “car hacking” is entirely possible. The latest just appeared this week.

    • This Jordanian Left Her Life as a Beauty Queen to Be an Islamic State-Fighting Hacktivist

      Lara Abdallat is not your average beauty queen. She was Miss Jordan 2010 and first runner-up to Miss Arab 2011, but she abandoned her career in pageantry to do something slightly more controversial and dangerous.

      Abdallat is currently fighting the Islamic State group and Islamic extremists as a hacktivist with Ghost Security, an international counterterrorism organization tenuously affiliated with Anonymous, perusing the Deep Web and the Darknet for suspicious activity.

  • Defence/Police/Secrecy/Aggression

    • 5 Things You Should Know About the CIA’s ‘Robotic’ Drone Assassination Campaign [Ed: repeats the propaganda about ‘accuracy’]
    • War Without End

      The attack on a Navy and Marine Reserve recruitment station in Chattanooga, Tennessee, was an act of war.

      It was not terrorism.

      Was it terrifying? Certainly. War is terrifying. Was it tragic? No doubt. War is tragic. Was it terrorism? No.

      Muhammad Yousef Abdulaziz killed Marines, three of whom had served abroad.

      He did not shoot up a church, school, or movie theater–he attacked a military target. There was premeditation in his action, intent. He attacked a recruitment station, no different in purpose than the recruiters and training camps we regularly destroy in Iraq, Syria, Yemen, Pakistan, Afghanistan, and elsewhere. Although the authorities are still investigating, it is clear his was a political act.

      [...]

      14 years into the war on terror, the longest war in American history, with close to 7,000 dead U.S. soldiers and–conservatively–over 200,000 dead foreign civilians, it should not take an attack on American soil to jar us into asking these questions.

    • Top U.S. commander in Afghanistan acknowledges Pakistan’s role in peace talks
    • William Saletan: Chattanooga wasn’t terrorism — it was an act of war

      According to local and federal officials, Thursday’s bloody assault in Chattanooga, Tenn., was ruthless and deranged. The U.S. attorney says investigators are treating the attacks, committed by a lone gunman at a military recruiting station and a Navy and Marine Corps Reserve centre, as a possible “act of terrorism.” Defence Secretary Ashton Carter calls it a “senseless act of violence.” Navy Secretary Ray Mabus says the attacks were out of bounds: “While we expect our sailors and marines to go into harm’s way, and they do so without hesitation, an attack at home, in our community, is insidious and unfathomable.”

    • Chattanooga Shooting, If Linked to ISIS, is a Act of War, Not “Terrorism”

      I’m not a fan of war or of killing of any kind, but the labeling of the deadly attack by Mohammod Youssuf Abdulazeez on two US military sites in Chattanooga, Tennessee as an act of terror is absurd.

    • Chafee says drone strikes drive the unrest in Yemen

      Lincoln Chafee campaigned for president in New Hampshire last month proudly showcasing his foreign policy credentials based in large part on his opposition to the Iraq war. He also had some things to say about U.S. policy in Yemen.

      The targeting of al-Qaida terrorists with drones has killed militants and civilians in recent years. And many Yemenis have called on the Obama administration to end drone strikes, which Chafee refers to as “extrajudicial killings.”

      “No more drone strikes,” Chafee said in New Hampshire. “One of the reasons I believe we’re in trouble in Yemen is we lost the population on drone strikes issues. That’s what stirred up the population. That’s what is happening in Yemen.”

    • PolitiFact: Chafee says drone strikes are driving unrest in Yemen

      “One of the reasons I believe we’re in trouble in Yemen is we lost the population on drone strikes issues. That’s what stirred up the population. That’s what is happening in Yemen.”

    • U.S. airstrikes in Somalia signal a more direct role against Shabab

      The U.S. is shifting to a more direct role in the near decade-old fight against Al Qaeda-affiliated Shabab militants, launching as many as six drone strikes in southern Somalia over the last week to support African forces battling the group, American officials said.

    • Jon Stewart Blew Last Chance to Ask Obama a Question

      Stewart said to Obama: you’ve tried bombing and overthrowing leaders and arming rebels and … what’s that new thing … oh yeah, diplomacy.

    • They didn’t start on 9/11

      The UK Prime Minister David Cameron has delivered his second speech in as many months on the terrorist threat, proposing a top-down reorganisation of British Islam. His new approach will see ‘moderate’ and ‘reforming’ voices sponsored by the central government.

      This has provoked a mixed response from British Muslims. It is also a remarkably unconservative approach to personal belief, from a supposedly conservative prime minister.

      Cameron’s understanding and presentation of the jihadist threat is that radical Islamist ideology, not Western foreign policy, explains all. In a single sentence, his speech dismissed the latter notion: “9/11 – the biggest loss of life of British citizens in a terrorist attack – happened before the Iraq War”.

      In fact, the speech demonstrated Cameron’s exceptionally poor historical knowledge. Al-Qaeda was attacking Western targets long before September 11, 2001.

    • Obama promotes militarism and murder

      Obama made no mention of the fact that Anwar al-Awlaki was an American citizen, convicted of no crime, judged in no court, but sentenced to death on the sole authority of the president of the United States. Nor did he refer to the subsequent US government murder of Awlaki’s son, an innocent teenager, in another drone missile strike, or the thousands of other civilian victims of US drone warfare across Central Asia, the Middle East and North Africa.

    • The ethnic roots of China’s Uighur crisis

      It’s erroneous to portray the conflict in Xinjiang as a struggle between Islam and the Chinese government

    • Saudi-backed militias capture key Yemen port city

      At least 3,500 have been killed as a result of the Saudi-led war, launched on March 26 of this year. Some 1,700 of these have been confirmed as civilians, according to the UN, with some 3,800 more civilians confirmed wounded.

    • Will Tunisia host a US base to fight Daesh in Libya?

      TUNISIA has once again had to deny allegations of agreeing to host a US military base in the country, reviving speculations over the depth of US-Tunisian relations.

    • Talks with the Taliban: Can Afghanistan set an example?

      The usual Western strategy for dealing with Islamic terrorists is to kill them. President Obama vows to crush Islamic State in Iraq and Syria. The United States helps African nations repel groups like Boko Haram. It uses drones to strike Al Qaeda operatives in any country. “Negotiations cannot convince Al Qaeda’s leaders to lay down their arms,” Mr. Obama stated in 2009.

    • Afghan officials say 14 soldiers killed in US airstrike

      Deaths of civilians and Afghan army personnel in “friendly fire” has become a contentious issue in the country. The toll makes it one of the deadliest such incidents involving coalition and Afghan troops in the 14 years that global forces have fought in Afghanistan.

      Two US helicopters are believed to have carried out the attack against a military checkpoint.

      A statement on behalf of the commander of U.S. forces in Afghanistan says the U.S. deeply regrets the loss and offers condolences to those affected.

    • Afghan troops ‘killed by US friendly fire’ in Logar

      At least eight Afghan soldiers have been killed in a US air strike on an army checkpoint in Logar province, south of Kabul, Afghan officials say.

    • U.S. Airstrike Kills Seven in Afghanistan

      A U.S. airstrike in eastern Afghanistan killed at least seven Afghan soldiers, local officials said, an incident that threatens to strain relations between allies who are battling the Taliban and burgeoning Islamic State insurgencies.

    • Up to 10 Afghan Soldiers Killed in ‘Friendly’ US Airstrike

      The airstrike was part of the U.S.-led NATO coalition targeting the anti-Afghan government group the Taliban.

    • Drones and the epoch of one-click wars

      The trouble is that airstrikes and other quick applications of military force are rarely as cheap as they first appear. They tend to cause unanticipated trouble and begin conflicts without winning them. Escalation to more costly warfare then beckons. Drone strikes may prove to be especially misleading this way. Their benefits come fast and are straightforward. Most strikes bring reports of dead terrorists or insurgents, and their disrupted plans are easily imagined. The costs—especially blowback measured in violent anti-American sentiment and pressure toward escalation — arrive gradually and less discernibly.

    • Our machines will decide who lives and who dies

      We already have semi-autonomous killing machines in the battlefields but (theoretically) they will do everything except making the final decision to pull the trigger. That final, ultimate decision is supposed to be left up to a human somewhere who can analyze the situation and decide whether or not the drone is targeting a friend or an enemy and then issue the go-/no-go death sentence.

    • Op-Ed: Libyan war planes attack and sink a ship near Benghazi

      On Sunday, a Libyan war plane from the forces of the internationally-recognized Tobruk government attack and sank a vessel near the port city of Beghazi according to spokesperson for the air force.

    • Remembering the Algeria Hostage Crisis and Deaths of Japanese Nationals: Time for Japan to Listen to Russia

      The hostage crisis in Algeria in 2013 led to the deaths of ten Japanese nationals along with many other individuals from different nations. Sadly, it was abundantly clear from the start that the Libya connection would enter the equation. After all, the terrorist infiltration was extremely close to the border of Libya. Also, since the demise of Gaddafi the region is awash with military arms and countless terrorist groups. Within Libya itself you have various different Islamist terrorist organizations and the same applies to many militias that control parts of this nation. Therefore, in modern day Libya in 2015 you have chaos and a non-functioning state that can’t control the whole of this nation.

    • The Unquiet Sky

      The title comes from the testimony of a 13-year-old Pakistani boy whose grandmother was killed in a drone strike. ‘‘I no longer love blue skies,’’ the boy said, speaking before Congress. ‘‘In fact, I now prefer gray skies. The drones do not fly when the skies are gray.’’ Houtryve attached a camera to a small drone and traveled around the United States, making aerial photographs of the sorts of events that have been associated with intentional or erroneous drone strikes: funerals, weddings, groups of people at play, in prayer or during exercise. His images show Americans in the course of their daily lives, photographed from a great height, in bright sun that throws their distorted shadows far ahead of them, presenting them as unindividuated, vulnerable and human. Houtryve makes it clear that the people in Yemen, Pakistan, Somalia or Afghanistan who are killed by American drones are also just like this. With simple, vivid means, Houtryve brings the war home.

    • Deep trauma of life beneath the drones

      When a Western soldier suffers from post-traumatic stress disorder, there are doctors and organisations who can help them recover from the heartbreaking legacy of war.

      When it is someone from Afghanistan, where bombings regularly wreak devastation and tear families apart, you are unlikely to find any assistance, since there is little understanding of mental illness in the country.

      “The most common treatment is to take your loved one to a religious shrine where they are chained to walls or trees for up to 40 days, fed stale bread, water and ground pepper, and read dubious lines from the Qur’an by individuals with no medical or, for that matter, religious training,” documentary-makers Jamie Doran and Najibullah Quraishi told news.com.au.

      [...]

      “The allied nations that invaded – or liberated, as some still claim – Afghanistan at the beginning of the 21st century have managed to leave an even bigger mess than they inherited.

      “An entire generation brought up in daily fear of death does not augur well for either their future or ours. It may not be entirely fair, but they blame the West and allied nations for the state of their country. Expect some of them, at least, to seek revenge in the years to come.”

    • Chinese Officials Recruited By CIA At Macau Casinos

      Although it seems like cyber-crime gets all the news headlines these days, national and corporate intelligence agencies around the globe still often use old-fashioned cloak and dagger techniques to get the job done. That said, blackmail has long been one of the most effective ways to turn an intelligence target, and agencies have no compunctions about taking advantage of a target’s predilections for drugs, sex or even gambling to blackmail then into cooperation.

    • CIA used Macau casino to trap corrupt Chinese bureaucrats – report

      US intelligence may have used Macau casinos owned by an American tycoon to set a trap for Chinese functionaries who gamble with public money, in order to blackmail and recruit them.

    • China feared CIA worked with Sheldon Adelson’s Macau casinos to snare officials

      China feared that casinos in Macau owned by the billionaire gambling magnate and Republican party funder Sheldon Adelson were used by US intelligence agents to entrap and blackmail Chinese officials, according to a “highly confidential” report for the gambling industry.

    • China Fears CIA Used Macau Casino to Recruit Officials

      A report uncovered Wednesday said the Chinese government believes the U.S. was using Chinese officials’ gambling problems in order to blackmail them.

    • China Fears CIA Used Macau Casinos to Recruit Officials
    • Report alleges China believed Macau Sands infiltrated by CIA
    • China feared CIA used Macau casinos to trap officials: Report
    • Report says CIA used casino to trap corrupt Chinese bureaucrats
    • Beijing feared US agents would snare cadres at Macau casinos
    • Recently discovered Sands Macau report notes suspicions of US intelligence activities
    • Beijing suspected CIA and FBI would trap and blackmail officials in Macau casinos, says report
    • Bob Smith: The strange case of the CIA agent that never was – and his hoard of 1,200 firearms

      Was Bob Smith a super-spy or a super-fantasist? That was the question many in Los Angeles are trying to answer after the puzzling death of man who kept a hoard of more than 1,200 firearms and two tons of ammunition at home.

      The man, who is yet to be formally identified, was found dead in his sports utility vehicle not far from the house in LA’s affluent Pacific Palisades neighbourhood, where his body was believed to have been for two weeks in warm weather before police were alerted.

    • Ex-CIA disguise expert reveals how sex dolls tricked KGB during Cold War

      During the age of cold war espionage, CIA agents resorted to unusual techniques to outsmart the Russian KGB. One method required the use of life-size rubber sex dolls purchased in a Washington D.C. store.

      Walter McIntosh, who headed the CIA’s disguise unit from 1977 to 1979 told Newsweek magazine that the idea came about when CIA operatives in Moscow needed a trick to get Russian counterspies off their tails so they could safely meet with their secret agents.

    • How the CIA Turned a Sex Doll Into a Spy Trick

      Of all the missions Walter McIntosh undertook in his long CIA career, buying life-size rubber sex dolls in a Washington, D.C., porno shop was maybe the most memorable.

      It was all for a good cause, of course. And deadly serious, not just for McIntosh, who headed the CIA’s disguise unit from 1977 to 1979. The agency’s Moscow operatives were in desperate need of something—anything—to trick Russian counterspies into leaving them alone, if only for a few minutes, so they could meet their secret agents without fear of being arrested. A key operation was in peril.

    • The CIA built a secret and groundbreaking mobile text messaging system in the late 1970s
    • The building that’s not on the tourist map

      “People always think that picture was taken blocks away at the American embassy, but it happened here.”

    • Green Beret tells of shooting Taliban in CIA job interview, loses Silver Star for it

      Army Secretary John McHugh, who revoked the award, told The Washington Times through a spokesman that Maj. Golsteyn “assassinated an unarmed Afghan.”

    • CIA Operatives Should Not be Considered Armed Forces Under International Law

      Applying the transmittal letter’s reasoning to the aerial drone strike’s facts, it is unlikely that a US Attorney General would make similar findings with regard to CIA operatives’ participation. The opinion avoids a crucial issue by assuming the operatives carried out this mission from a remote location, presumably where an enemy could not strike, making distinction by insignia unnecessary (why the opinion assumed operatives were distant from the battlefield is unclear, though it certainly made it easier to reach the Prosecutor’s conclusion).

      [...]

      Left to a policy preference, which would be the better choice? Allowing CIA operatives to benefit from combatant immunity while also being considered lawful targets at all times, or maintaining their status as unlawful targets when not directly participating in hostilities who may face criminal liability for hostile actions. Against the lawless foes faced in Afghanistan and Pakistan, perhaps neither presents practical advantage. Nevertheless, the German opinion offers persuasive arguments that might gain support in the international community. Reaffirming US commitment to the principle of distinction might prevent its diminishment on other battlefields.

    • Barbara H. Colby, wife of controversial CIA spymaster, dies at 94

      From 1945 until their divorce in 1984, she was the wife of William Colby — the spy and later spymaster who, as CIA director from 1973 to 1976, revealed the assassination attempts and other clandestine activities known as the agency’s “family jewels.”

    • Turkey Says More Anti-PKK Strikes to Come

      A decades-old conflict between Turkey and the Kurdish PKK has been reignited.

      Turkey vowed Saturday to continue attacks against the Kurdistan Workers’ Party (PKK), along with strikes against the Islamic State group.

      “The operations will continue for as long as threats against Turkey continue,” Prime Minister Ahmet Davutoglu said, according to Turkey’s Anadolu Agency.

    • After another senseless massacre, this time in Lafayette, Louisiana, Americans continue to pretend we’re safe from our own gun-toting neighbors

      We Americans respond with anger when Donald Trump warns us of murderous Mexicans, and we worry that ISIS can hit us at any moment. Yet we continue to pretend we’re safe from our own gun-toting, bomb-making neighbors.

    • It ain’t over til it’s over: America’s wars drag on no matter what officials say

      In all three of the countries where the Obama administration declared US wars “over” in the past few years – Afghanistan, Iraq and Libya – the US military is expanding its presence or dropping bombs at an ever-increasing rate. And the government seems to be keeping the American public in the dark on the matter more than ever.

      Pentagon leaders suggested this week that the US military wants to keep remaining 9,800 troops in Afghanistan from withdrawing in 2016, despite the fact that the Obama administration declared combat operations in the country “over” six months ago. The gradual extension of the Afghanistan War hasn’t been a secret to anyone who’s been paying close attention, but sadly it has happened far away from the pomp and circumstance of Obama’s now embarrassingly false State of the Union announcement that the Afghanistan War had ended.

    • Seeking War to the End of the World

      Despite the disastrous Iraq War, neocons still dominate Official Washington’s inside-outside game…

    • ‘Munich’ comparison to Iran deal: silly or appropriate?
    • Is the ‘military option’ on Iran off the table?

      Since then, Israeli media have been pressing hard to restore the military option to its accustomed place “on the table.” Flying to Israel Sunday night for a handholding mission with top Israeli officials, U.S. Defense Secretary Ashton Carter tried to make his reception in Tel Aviv less frosty, telling accompanying journalists that the nuclear deal with Iran “does nothing to prevent the military option.” The context, however, seemed to be one in which Iran was caught cheating on the nuclear deal.

      That this kind of rhetoric, even when it is not from the president, is still poison to Tehran was clear in the immediate reaction by Iran’s Foreign Minister, Mohammad Javad Zarif, who insisted Monday: “Applying force … is not an option but an unwise and dangerous temptation.”
      cComments

      Looking for changes in official public statements was my bread and butter during a long tenure as a Kremlinologist. So on Wednesday, as I watched Mr. Obama defend the deal with Iran, I leaned way forward at each juncture — and there were several — where the timeworn warning about all options being “on the table” would have been de rigueur. He avoided saying it.

    • Iran agreement boosts peace

      The agreement has reduced the chance of a U.S. attack on Iran, which is a great development. But the interventionists will not give up so easily. Already they are organizing media and lobbying efforts to defeat the agreement in Congress. Will they have enough votes to over-ride a presidential veto of their rejection of the deal? It is unlikely, but at this point if the neocons can force the U.S. out of the deal it might not make much difference. Which of our allies, who are now facing the prospect of mutually-beneficial trade with Iran, will be enthusiastic about going back to the days of a trade embargo? Which will support an attack on an Iran that has proven to be an important trading partner and has also proven reasonable in allowing intrusive inspections of its nuclear energy program?

    • Understanding US-Iranian past is key to positive future

      Operation Ajax (1953) was a covert operation executed by the CIA to oust the democratically-elected Prime Minister of Iran, Mohammed Mossadeq. While the reasons for this now declassified covert operation exceed the scope of this letter, it is important to note that once Mossadeq was overthrown by forces funded and manipulated by the U.S., he was replaced with the tyrannical Shah of Iran (which the 1979 revolution forced from power).

    • Even on Iran, politicians too divided

      Iran has many more reasons to be suspicious of us than we of them. Our government had supported a puppet regime in their country which held them back for decades and was installed by our CIA. We have intervened in Afghanistan and Iraq, literally surrounding them.

    • Critics of the Iranian nuclear deal protest too much
    • Top CIA Official Says Nuke Deal Makes It Hard for Iran to Cheat

      A top Central Intelligence Agency official said Friday that the recently brokered nuclear agreement between leading nations and Iran will make it difficult for the Middle Eastern country to dupe nuclear inspectors.

      CIA deputy director David Cohen, speaking at the Aspen Security Forum, said intelligence officers were “reasonably” confident that the terms of the nuclear deal would prevent Iran from cheating in a way that avoided international detection.

    • Obama Bravely Ignores the Clamoring of the Warmongers with Iran Deal

      The accord struck in Vienna to rein in Iran’s nuclear activities has warmongers fulminating. Citizens worldwide should support U.S. President Barack Obama’s brave effort to outmaneuver them, taking heart from the fact that the signatories include not just the United States, but all five permanent members of the UN Security Council plus Germany.

    • Back the Iran deal, and say no to the warmongers

      Many of the warmongers are to be found in Obama’s own government agencies. Most Americans struggle to recognize or understand their country’s permanent security state, in which elected politicians seem to run the show, but the CIA and the Pentagon often take the lead — a state that inherently gravitates toward military, rather than diplomatic, solutions to foreign-policy challenges.

    • Saying no to the warmongers
    • Iran’s Longstanding US-Inflicted Nightmare

      The late Chalmers Johnson (once a CIA consultant, a former “spear-carrier,” he said) called the agency the president’s “praetorian guard,” a private army producing phony intelligence to justify extrajudicial actions.

      They include toppling democratically elected governments, assassinating foreign heads of state and other key officials, propping up friendly dictators, and abducting targeted individuals for extraordinary rendition to agency controlled black sites – torture prisons to extract forced confessions from innocent victims under extreme duress, at times bringing them close to death and back.

    • Sanctions Relief Unlikely to Alter Iran’s Policies in Syria, Yemen

      Former Central Intelligence Agency (CIA) officer Paul Pillar said that Iran’s regional policies depend on various political interests and equities and not on how much money it has in its bank account.

    • War without tears

      The relationship between video games and violence is healthier than we like to think

      [...]

      He started up the desktop computer he had built himself, and opened up the first-person shooter game Counter-Strike. The military-style video game had been updated many times since its initial release in 1999, but this was the same version that had infested my middle school computer lab back then—or some pirated incarnation. Halil connected to a server by manually entering a memorized IP address.

      [...]

      “No no no,” and he smiled, “that wouldn’t be a ‘The Great Secret.’” The team of “counterterrorists” threw a couple grenades and started firing, peering around corners and strafing.

      “Then who is playing as Israel and Lebanon?”

      “IDF,” Halil pitched his screen to the rushing counterterrorist team, “and Hezbollah,” he tilted in the direction of the virtual AK fire. “This is my ‘Middle East Peace Plan.’” He said the phrase derisively, putting on his best American accent.

      I didn’t believe him, at first. The teams in the game were made up of the same avatars that always populated it. But Halil then showed me a series of taunting pictures the two teams had posted online. Among the match reports and running commentaries, the Israelis in uniform threw up imitations of American gang signs learned from rap videos, while young men of Hezbollah held real life rifles next to computer monitors, all with their faces blurred or blacked out in Photoshop. My favorite was a succession of shots of real guns, superimposed on computer monitors displaying virtual ones.

    • D.C.’s New Push: Use Saddam’s Men to Fight Obama’s ISIS War

      An ex-senator, a former CIA officer, and an Iraqi mogul lobby Congress for a private army, led by Saddam’s officers, to take on the terrorists that have trampled America’s proxies.

    • US military drone crashes in Iraq: Pentagon

      A US military drone flying a combat mission has crashed in Iraq after losing communication, the US Defense Department has confirmed.

    • Drone Contractors: An Oversight and Accountability Gap

      A slew of news reports have highlighted the crisis of drone pilot burnout in the United States military. Indeed, pilot shortages have prompted the US Air Force to cut the number of drone flights to fewer than 60 per day. That’s an important problem, but buried in these stories is another one. The Air Force has announced that, in response to the shortage, it will increase its use of contractors for these flights. Given the service’s manpower shortages, this statement is not surprising. Yet the growing numbers of contractors in drone operations, while little discussed, raise significant concerns about oversight and accountability at a time when drone use is set to accelerate. We simply don’t know enough about how contractors will be used in the increasingly automated version of war that appears to be our future. And that means we need to ask hard questions now about how this system should operate rather than simply letting it evolve without oversight.

    • George Clooney Opposes War Profiteering, Except When He Doesn’t

      George Clooney is being paid by the world’s top two war profiteers, Lockheed-Martin and Boeing, to oppose war profiteering by Africans disloyal to the U.S. government’s agenda.

    • During Trip, Obama Should Raise Case of Kenyan Detained at Guantanamo

      Human rights activists in the country told me earlier this month that he should raise these issues sensitively, and not pretend that the U.S. record on policing and fighting terrorism has been flawless. The scandal of CIA torture and the prison at Guantanamo Bay are widely known throughout Kenya. They said President Obama should be sure to make reference to the United States’ own mistakes when he talks to his Kenyan counterparts, and fully acknowledge how much the United States still has to improve.

    • Obama Shouldn’t Take Kenyan Welcome for Granted
    • Obama in Kenya: Will He Cater to the Barons or the People?

      Kenya inherited the massive investment in the militarization of the Horn of Africa from the era of anti-communism and this militaristic link to the West was deepened during the so called War on Terror. This Global War on Terror has now backfired against the peoples and the insecurity generated within Kenya and East Africa reinforce the influence of the US military when Barack Obama and his Administration want to focus on “Doing Business with Africa.” In 2014, the Obama Administration with much fanfare had called the first major US Africa summit but the present Washington sequestered bureaucracy has not worked to turn the page with the new engagement with African peoples. There have been no resources from Congress to support the much touted Power Africa.

    • Hissene Habre, ‘Africa’s Pinochet’

      Chadian dictator Hissene Habre goes on trial in Senegal, a quarter of a century after his blood-soaked reign came to an end, in trial seen as test case for African justice

    • Profile: Hissène Habré, the deadly dictator who got caught
    • Chad dictator on trial for mass murder

      When Chad’s former president Hissène Habré strode into a Senegalese court yesterday accused of 40,000 murders, war crimes and torture, he may have been wondering what became of his old superpower friends.

    • Senegal: Trial of Former Chadian Dictator Hissène Habré Postponed

      In breaking news from Senegal, the trial of Chadian former dictator Hissène Habré has been postponed until September 7 after Habré’s lawyers did not show up to court for the second day of trial. Habré has been charged with crimes against humanity, war crimes and torture related to his eight-year reign in Chad during the 1980s. We’ll have more on this story later in the show.

    • Threat to passenger jets: RAF training foreign states to counter looted Libyan missiles

      Gunners from the Royal Air Force (RAF) Regiment and Scotland Yard police are training foreign governments in how to prevent aviation being shot down by missiles looted from Libyan armories after the 2011 war.

      As many as 10,000 handheld surface-to-air missiles are feared to have been taken from Colonel Muammar Gaddafi’s armories as the regime collapsed, leading to fears they could be used by militants to bring down civilian airliners.

      Now members of the RAF Regiment – British soldiers who specialize in defending airfields – have been deployed to Middle Eastern and North African countries to advise on missile defense.

    • RAF personnel assigned to US unit carrying out drone strikes against Isis

      Following calls for government to come clean over role in US air force unit, MoD says such UK personnel are ‘effectively operating as foreign troops’

    • In Iraq and Syria, Kurdistan fighting ISIS isn’t exactly Prince Charming

      The Kurdish Peshmerga have repeatedly been praised by U.S. congressmen from both sides of the aisle, the Department of Defense, and numerous pundits, as the most effectual allies in the fight against ISIS and a group in need of American arms. But remember that October 2014 CIA study demonstrating that nearly all attempts to arm rebels have backfired or failed? It turns out that the Kurds aren’t our perfect match. They will be no exception to the trend, with their massive human rights violations, political conflict with Syrians and Iraqis, and destabilizing role in the Middle East.

    • Judge Says Government Can Continue To Refuse To Acknowledge Certain Drone Strike Documents

      The heavily-redacted order does contain some good news, however. The presiding judge ordered the Dept. of Defense and the CIA to turn over FOIAed documents to the ACLU that contain “previously acknowledged facts,” thus preventing the Dept. of Justice from turning real life into a bizarre fantasy world where previously disclosed information can be treated as though it was still locked up in the agency’s “TOP SECRET” digital filing cabinet.

      But the obvious downside is this: because the government has been given permission to avoid confirming or denying the existence of the documents the ACLU is seeking, the search for more information on accidental deaths and collateral damage will still consist of issuing speculative FOIA requests, which will then result in more lengthy, expensive litigation.

      I’m pretty sure the involved agencies believe they can outlast FOIA requesters, especially if they continue to receive mostly-favorable decisions from judges who place more faith in the government and its assertions about national security than in those who view government secrecy with considerably more skepticism. The problem is that the government has the resources to fight long legal battles. Most FOIA requesters do not.

    • Cubans’ Rejection of Senator Rubio Demonstrates Their Independent Thinking

      But Rubio cannot accept that Cubans’ nearly unanimous rejection of his right-wing politics might mean he is badly mistaken in his Manichean view of the Cuban socioeconomic system. Rubio wears Cubans’ disapproval of him as a badge of honor. For Rubio, Cubans are incapable of independent judgement. If the Cuban people are against him, it means they must be brainwashed by the evil Castro regime.

    • Cuba and US reopen embassies: Key events in the history of the Cold War foes [Photo report]

      The United States and Cuba have re-established embassies in each other’s capitals, formally restoring diplomatic ties severed more than five decades ago.

    • Forty Years Ago, Cuban Extremists Set Off Dozens of Bombs in Miami

      As the Cuban flag was raised over Washington, D.C., on Monday, some 20 anti-Castro demonstrators gathered outside Versailles Restaurant in Little Havana to protest warming relations between the U.S. and Cuba. In Washington, a man rushed the embassy gate with red paint splattered across his shirt, yelling “This is Cuban blood.” But for the most part, protests in both cities were small and low-key.

    • Cuban flag flies again in D.C.
    • Is the Era of U.S.-Backed Anti-Castro Terrorism Over? Reflections on Restored Ties Between Nations
    • A Victory for the People in Havana (Videos)
    • Amy Goodman: U.S., Cuba begin new chapter

      On July 20, history was made in Washington, D.C., and in Havana, Cuba. As the Cuban national anthem was played, the island nation’s flag was raised over its embassy in Washington. The embassy, as well as the U.S. Embassy in Havana, was open for business, for the first time in 54 years. The Washington ceremony was attended by more than 500 people. Earlier in the day, the U.S. State Department elevated the Cuban flag to a place of honor, joining 150 other national flags on display in the main lobby. While diplomatic relations have been restored, the crushing U.S. economic embargo against Cuba is still in place, and the U.S. prison at Guantanamo Bay remains open. More than 100 prisoners are still languishing there, many of them cleared for release for over a decade.

    • Chilean judge orders arrest of army officers who burned youths alive under Pinochet

      On Tuesday, July 21, a judge in Santiago, Chile ordered the arrest of seven army officers for their participation in the burning alive of photographer Rodrigo Rojas Denegri, and student Carmen Gloria Quintana on July 2, 1986. The case is known in Chile as Caso Quemados (Case of the burned).

      The army had detained both during the repression of an anti-government demonstration. They were severely beaten, before being soaked in gasoline and set afire. The young people, still alive, were dumped in a remote area and left to die, but were found by construction workers. Quintana survived, but Rojas died from his injuries, four days later.

      The horrible crime took place during the military-fascist dictatorship of General Pinochet (1973-1989) and was part of the reign of terror against workers and youth that took place with the assistance of the US Central Intelligence Agency.

    • Rewriting the History of Plan Colombia

      It’s probably a good thing that United States Army General John F. Kelly’s May op-ed in the Miami Herald went largely unperceived, but recent developments have rendered the cynicism that informed it too blaring to ignore.

      Ostensibly, General Kelly’s editorial seeks to extrapolate salient lessons from the Colombian government’s military campaign against the country’s leftist guerrilla insurgency. Specifically, Kelly contends that Plan Colombia, the $9 billion U.S. military aid package passed in 2000, has “shown us the way” to defeat ISIS, which he claims poses a similarly “daunting challenge for the United States and its allies.”

      On first read, the article is a relatively straightforward parade of banality and adulation, remarkable only because the individual leading it is the commander of U.S. Southern Command (Southcom). Sure, the content consists almost entirely of lies, half-truths, and meaningless platitudes, but nothing that ventures too far from the official Washington line.

  • Transparency Reporting

    • Turns Out Hillary Clinton Had Hundreds Of Potentially Classified Emails On Private Server; Officials Ask For Criminal Investigation [Update]

      But, of course, that was just one batch of the emails. A few weeks ago, reports started leaking from inside the State Department that, in fact, there was classified information on that server, and late last night the other shoe dropped, with a report in the NY Times that two separate Inspectors General have requested the Justice Department open a criminal investigation into Clinton’s mishandling of sensitive information — in particular the inclusion of “hundreds” of potentially classified emails on her private server.

    • Pentagon, CIA instructed to re-investigate whistleblower cases

      A government watchdog has ordered the CIA and the Pentagon to re-investigate retaliation allegations brought by two intelligence employees who accused their agencies of major institutional failings.

      The action by the intelligence community inspector general is the first public indication that a new intelligence appeals system is underway. The panel was set up by President Barack Obama as an independent forum that can evaluate whether whistleblowers were improperly fired or otherwise punished for disclosures after their agencies rejected their claims.

      The cases, nonetheless, demonstrate that the whistleblower system continues to be beset with problems and bureaucratic delays despite being overhauled by Congress and the Obama administration.

    • Why black spies matter

      Sterling has long maintained that the CIA retaliated against him for questioning racial bias at the agency, where, as he put it in a letter to Al Sharpton’s National Action Network, he was deemed “too big and too black” to move up the ranks. The CIA does not release data on its racial demographics, but a recent internal report on diversity affirms some of Sterling’s allegations of bias. Minorities accounted for less than 24.8 percent of its workforce and only 10.8 percent of its top leadership, according to the report. The CIA’s lack of diversity underscores the racial underpinnings of the global “war on terrorism,” in which white CIA officers torture nonwhite others in secret prisons and incinerate them with drone missiles.

    • The ‘rageful guy’ who pries secrets from the govt.

      When reporter Jason Leopold gets ready to take on the U.S. government, he psychs himself up by listening to the heavy metal bands Slayer and Pantera.

      He describes himself as “a pretty rageful guy.” Mr. Leopold (45), who works for Vice News, reserves most of his aggression for dealing with the government. He has revealed about 20,000 pages of government documents, many of them the basis for explosive news stories.

    • Police convictions: How did your force respond?

      At least 309 police officers and police community support officers (PSCOs) in the UK have been convicted of criminal offences in the last three years, according to figures released after a Freedom of Information request.

  • Finance

    • The Crime of Living Without a Home in Los Angeles

      A year ago he slept in his own apartment, but today Charles Jackson sleeps under a bridge bordering Silver Lake, one of the more fashionable neighborhoods in Los Angeles. A few dozen strangers share the encampment; some become neighbors, while others come and go. Jackson wants to get off the streets, but as many of those who live on the margins have found, it is easier to lose a home than find another.

      “People say, ‘This is going to be temporary, you know, until I get out from under this rock,’” he told me. A kind-looking brown-eyed man in his mid-50s, Jackson stands in front of the tent he lives in, looking away as we talk, his voice barely louder than a whisper. Beside us, Jackson’s white-and-tan terrier, Ozzie — well-groomed and clearly beloved — pokes his nose out from the front of the tent, panting in the midday sun. “Two years pass by, four, five years pass by; before you know it, you’re ten years homeless in the streets because out here, time is nothing. You get to not know what day it is, what month it is.”

    • After the Financial Times buyout, let’s stop belittling Japan’s success

      …Japanese officials have systematically exaggerated the Japanese economy’s various weaknesses, real and imagined.

    • Greece, Iran, and the Rules of the Game

      But he chose to “follow the rules” by accepting the EU plan. Greece is getting its financial bailout, Greeks are tightening their belts, and the Eurozone will survive more-or-less intact. Tsipras learned what happens when you challenge the rules of an elite club. Once in a while, the club changes the rules. Most of the time, the club issues an ultimatum: suck it up or move on.

    • Global One Percent Celebrate at the Bohemian Grove

      July 18th 2015 was the first day of this year’s summer camp for the world’s business and political aristocracy and their invited guests. 2,000 to 3,000 men, mostly from the wealthiest global one percent, gather at Bohemian Grove, 70 miles north of San Francisco in California’s Sonoma County—to sit around the campfire and chew the fat—off-the-record—with ex-presidents, corporate leaders and global financiers.

      [...]

      On the surface, the Bohemian Grove is a private place where global and regional elites meet for fun and enjoyment. Behind the scene, however, the Bohemian Grove is an American version of building insider ties, consensual understandings, and lasting connections in the service of class solidarity. Ties reinforced at the Grove manifest themselves in global trade meetings, party politics, campaign financing, and top-down corporatism.

    • Puerto Rico’s Debt Crisis

      Washington never granted islanders control of their lives, welfare and destiny. They have no say over foreign relations, commerce and trade, their air space, land and offshore waters, immigration and emigration, nationality and citizenship, currency, maritime laws, military service, US bases on its territory, constitutionality of its laws, jurisdictions and legal procedures, treaties, radio and television, communications, agriculture, its natural resources and more.

      Independence supporters aren’t tolerated – men like Oscar Lopez Rivera, a decorated Vietnam War veteran, wrongfully imprisoned for wanting Puerto Ricans to live free, behind bars for over three decades.

      Washington wants to continue exploiting its Caribbean colony for profit – raping and pillaging it at the public’s expense, much like what’s happening to Greece.

    • 1898 INVASION OF PUERTO RICO & THE EMERGENCE OF U.S. IMPERIALISM

      For the many people who have engaged in the struggle for Puerto Rico’s independence, July 25 has a special significance. On that date in 1898, U.S. troops invaded Puerto Rico, beginning a period of U.S. colonial domination on the island that continues to this day.

      The United States invaded Puerto Rico, along with the Philippines, Guam and Cuba, in the setting of the Spanish-American War. That war was the opening of what would be the menacing role and predatory nature of the U.S. capitalist class in the Caribbean, Latin America and the entire world.
      The seizure of Puerto Rico, Cuba, Guam and the Philippines by the United States signaled the quest of the U.S. capitalist class to become a world power. European powers had pursued a policy of colonial acquisitions since the end of the 15th century.

      But only in the late 19th century had the mature and developed capitalist powers virtually colonized the entire planet. The projection of U.S. power outside of the North American mainland signified a rush not to be left behind in this global division of markets.

  • PR/AstroTurf/Lobbying

    • What Bill Gates Doesn’t Understand About Education

      Mr. Gates, you swing a lot of weight in political circles. If you told policymakers that the current thrust of reform was blocking alternative ways of improving learner performance, and educators should have enough autonomy to explore those alternatives, those of us who have been working on them for decades might have a chance to show what’s possible.

    • Smoking Gun: MPAA Emails Reveal Plan To Run Anti-Google Smear Campaign Via Today Show And WSJ

      If you talk to the reporters who work for various big media companies, they insist that they have true editorial independence from the business side of their companies. They insist that the news coverage isn’t designed to reflect the business interests of their owners. Of course, most people have always suspected this was bullshit — and you could see evidence of this in things like the fact that the big TV networks refused to cover the SOPA protests. But — until now — there’s never necessarily been a smoking gun with evidence of how such business interests influences the editorial side.

  • Censorship

    • Now You Can Make That Embarrassing Email You Sent Self-Destruct

      Everyone’s fired off a hasty email that they desperately wish they could take back. A new Gmail tool will let you do that whenever you please.

      Dmail is a new browser extension for Google Chrome that gives people more control of how long others can view their Gmail messages. When sending an email through Gmail, users can set a specific time when the message will self-destruct, ranging anywhere from an hour to a week. And even emails without a specific self-destruct timer can still be recalled by the sender at an time, making them unviewable to the recipient.

  • Privacy

  • Civil Rights

    • Schooled in Britain, Deported to Danger: UK Sends 600 Former Child Asylum Seekers Back to Afghanistan

      Hundreds of Westernised young men who grew up in Britain after fleeing war-torn Afghanistan as children have been forcibly returned to their home country due to what experts believe is an inhumane shortcoming in the UK asylum system.

    • Beyond Innocence: US Political Prisoners and the Fight Against Mass Incarceration

      President Obama’s recent statements about mass incarceration, together with his decision to commute the sentences of 46 people serving lengthy and life sentences in federal prison on drug charges, treat “nonviolent drug offenders” as the symbolic figureheads of America’s prison problem. This framing seems to imply that everyone else actually deserves to be in prison.

    • If Obama Can’t Close Guantanamo

      It’s becoming increasingly clear that the U.S. prison at Guantanamo Bay, Cuba, isn’t going to be closed during President Barack Obama’s administration — or beyond, despite the administration’s efforts. That raises a deep question about foreign policy and the rule of law: What if Guantanamo never closes, and some of its detainees remain there for the rest of their lives?

      The sad truth is that the continued operation of the prison is unlikely to do any more long-term damage to the U.S. reputation abroad — because the world has already come to the conclusion that the U.S. is no better than anyone else when it comes to dealing with terrorists.

    • Guantanamo Bay closure: Why plans to close the notorious prison may be wishful thinking

      It sounds like an old vinyl record stuck in its groove, another regular reminder of what has long since been a national disgrace. After six years of trying in vain to close the infamous prison for suspected terrorists at Guantanamo Bay, the White House, it is said, is close to finalising another plan to do just that. To which one is tempted to reply: “Dream on”.

    • House should join Senate in torture ban

      Congress is faced with the opportunity to forbid the CIA from engaging in torture forever, thanks to a bill sponsored by Sens. John McCain and Dianne Feinstein. The legislation passed the Senate in a recent impressively bipartisan 78-21 vote, and now heads to the House of Representatives.

      When we talk about torture, too often we use distant, medical language to grapple with the most vile things that can be done to a human being. Very few of us can imagine this horrific treatment, and even fewer of us want to think about it.

      But our government has too often sanctioned torture. It is critical that we understand it so that we can stop it.

      Through Survivors of Torture, International, an organization that advocates for an end to torture everywhere and treats torture survivors, I have heard stories from survivors that have never been more relevant. I shall try to share my sense of what torture is and why Congress must pass the McCain-Feinstein legislation that would prohibit it.

    • Secret Foreign Policy Is Bad for Democracy

      The government would prefer you never knew about any of that. When Montgomery was being sued by a former employer, then–Director of National Intelligence John Negroponte quashed any public court discussion of Montgomery’s bizarre relationship with U.S. intelligence. He insisted that public revelations about how easily the country’s protectors can be conned would constitute “serious, and in some cases exceptionally grave, damage to the national security of the United States.”

      Democracy is supposed to transmit the people’s will to our governors, but it’s hard to argue that’s the case when said governors can keep us ignorant about what they’re doing and what it costs. However, the U.S. government has become increasingly adept at waving the flags of democracy and national security simultaneously.

    • Obama Does Not Prosecute “Mega-Crooks”. Neither Would Hillary. Would Sanders?

      The chief reason why the USA is no longer a democracy (if it ever was) is that its mega-criminals have impunity, just like kings and other dictators in countries that make little pretense to being a ‘democracy.’

    • Hip-Hop Artist-Activist Sole Tackles US Torture Through Eyes of a Detainee

      Outspoken political activist and avant garde hip-hop artist Sole, together with DJ Pain 1, gives Sputnik readers a first look at his visually stunning new video that tells the story of a CIA black site as seen through the eyes of a detainee.

    • Anonymous has long history of activism and controversy

      Hacktivist group launches action against RCMP in B.C. following fatal shooting in Dawson Creek

    • David Cameron extremism speech: Muslim leaders give their views on the PM’s plans

      I am concerned that yet again Cameron is conflating the issue of extremism and terrorism with those of cohesion and integration.

      He says that Muslims are not doing enough to integrate and that risks fostering extremism – but just what is enough and how do you measure it?

    • Journalist Barrett Brown Receives 30 More Days of Solitary Confinement in Prison

      Jailed journalist and activist Barrett Brown has received 30 more days of solitary confinement in the prison, where he is serving a five-year and three-month sentence issued against him in January.

      Brown, who had been put in “the hole” at the Fort Worth Correctional Institution previously, was put in solitary confinement in late June after staff “singled” him out “for a search” of his locker and “found a cup of homemade alcohol.”

    • Terrorism conviction of Miami imam upheld

      The case against Khan, an imam at a Miami mosque before his 2011 arrest, was built on hundreds of FBI recordings of both telephone calls and Khan’s face-to-face conversations with an undercover informant. In the calls, Khan discussed details of numerous wire transfers to Pakistan over a three-year period that totaled about $50,000.

    • Dylann Roof is a terrorist, but won’t be charged as one

      Dylann Roof, the 21-year-old white man who stands accused of murdering nine black members of Mother Emanuel AME Church in Charleston, South Carolina, last month, was indicted Wednesday on federal hate crime charges, some of which carry the possibility of the death penalty.

    • Security concerns after man dies outside restaurant
    • 3 dead in Louisiana theater shooting
    • Louisiana police name gunman who killed two in cinema

      Louisiana police on Friday identified John Russell Houser (59) of Alabama as the suspected lone gunman who opened fire in a crowded movie theater, killing two and wounding others before turning the gun on himself.

  • DRM

    • Federal judge says you can break DRM if you’re not doing so to infringe copyright

      Here’s some remarkable news: a judge in a New Orleans-based 5th Circuit Appeals Court has ruled that the Digital Millennium Copyright Act’s ban on breaking DRM only applies if you break DRM in order to violate copyright law. This is a complete reversal of earlier rulings across the country (and completely opposite to the approach that the US Trade Representative has demanded from America’s trading partners). In the traditional view, DRM is absolutely protected, so that no one is allowed to break it except the DRM maker. In other words, a film-maker isn’t allowed to take the BluRay DRM off her own movie, a video game programmer can’t take the iPad DRM off her own game, and an audiobook author can’t take the DRM off his own Audible book.

    • Happy 30th anniversary, Tengen! Your anti-DRM NES chip fought the law, and the law won

      In 1985, Japanese giant Namco got out its wallet, and bought control of Atari Games – the coin-op arcade games maker that was doing rather well compared to its ailing home console cousin, Atari Corp.

      The deal was the first step toward a massive legal battle that changed the way console manufacturers produced, licensed, and distributed their games. And this is how it happened:

  • Intellectual Monopolies

    • Copyrights

      • Restaurateur is threatened with £1,000 fine if any customer watches TV on their mobile on her premises in an astonishing ‘bullying’ letter from BBC TV Licensing body

        A restaurateur has been threatened with a £1,000 fine or court action if any customer watches TV on their mobile phone in her premises in a ‘bullying’ letter from the BBC TV Licensing body.

        Neleen Strauss, the owner of the High Timber restaurant in central London, was sent the ‘intimidating and aggressive’ letter this week.

      • Geo-Blocking Caused Massive TV Piracy 20 Years Ago

        This week several Hollywood studios and pay TV giant Sky found themselves on the wrong end of an EU antitrust investigation for blocking cross-border access to TV shows and movies. Yet twenty years ago Sky was doing the same thing, a stubbornness that sparked a huge wave of piracy right across Europe.

      • Pirate Bay Led Hollywood The Way, Co-Founder Says

        During his stay in prison, Pirate Bay co-founder Fredrik Neij was deprived of the Internet and forced to view broadcast TV. A grueling experience, but not as bad as it used to be, something the Pirate Bay can take credit for in part. Still, Fredrik believes that there’s plenty of room for improvement.

      • Porn studio asks judge to ban talk about “copyleft” blogs at trial

        Prenda Law is gone, and today it’s a legit porno company, Malibu Media, that files more copyright lawsuits than anyone else. Malibu sues thousands of people for downloading the company’s content via BitTorrent, then asks for settlements reportedly in the several-thousand-dollar range.

      • Anatomy of a Copyright Coup: Jamaica’s Public Domain Plundered

        A bill extending the term of copyright by an additional 45 years—almost doubling it, in the case of corporate and government works—sailed through the Jamaican Senate on June 26, after having passed the House of Representatives on June 9. The copyright term in Jamaica is now 95 years from the death of the author, or 95 years from publication for government and corporate works. This makes it the third-longest copyright term in the world, after Mexico and Côte d’Ivoire respectively with 100 and 99 years from the death of the author.

      • State Of Georgia Sues Carl Malamud For Copyright Infringement For Publishing The State’s Own Laws

        The State is particularly upset that Malamud ran some crowdfunding and donation campaigns seeking to raise money to keep his operations running, saying that he raised this money “to assist the Defendant in infringing the State of Georgia’s copyrights.” The State also complains that he uploaded the code to the Internet Archive under a CC 0 public domain dedication, saying (incorrectly) that this implies that he claimed that he was the owner of the annotations. That’s not true at all. He’s claiming that everyone owns them, because they’re the law.

07.25.15

Links 25/7/2015: Plasma Mobile, Linux Mint 17.2 OEM

Posted in News Roundup at 11:08 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Open source, adaptable infrastructure key to Etsy platform business model

    For an emerging platform business model, information technology may not top the owner’s agenda. Building a community and setting the ground rules for participation and conflict resolution are often the first priority. IT, however, tends to become a higher priority as a platform scales and matures. That’s been the case for Etsy, which was founded in 2005. Today, Etsy’s technology infrastructure plays a critical role in the current stage of the platform’s evolution.

    [...]

    Etsy is largely built on open source technology, according to Allspaw. At its core, the company’s platform stack includes PHP and MySQL, Hadoop and Scalding, and Solr/Lucerne/ElasticSearch, he explained.

  • It’s Been A Great Month So Far For Open-Source/Linux Users

    Besides the open-source Mesa finally hitting OpenGL 4.0+, Vulkan being right on the horizon, there being Skylake just around the corner, AMD R9 Fury Linux benchmarks coming next week, and Intel Skylake being days away, there’s been many other exciting announcements so far this month and milestones for free software.

  • IFTTT joins the open source community

    Harnessing the power of apps, devices, and the cloud, IFTTT has just unveiled five open source projects. Now available on GitHub, the projects can be used by anyone to integrate IFTTT automation in their apps and services.

  • Tech Giants Boost Open Source Container Collaboration

    CNCF’s role is to foster developer and operator collaboration on common technologies for deploying cloud native applications and services, said Jim Zemlin, executive director at The Linux Foundation — that is, applications or services that are container-packaged, dynamically scheduled and micro services-oriented. To ease the process, CNCF aims to drive alignment among technologies and platforms.

  • Events

  • Web Browsers

    • Mozilla

      • Firefox Nightlies Are Now Built with GTK+3, Coming For Firefox 42

        As of this commit yesterday, by Mike Hommey, Firefox nightly builds are now being built with PLATFORM_DEFAULT_TOOLKIT set to cairo-gtk3! It would appear, according to the commit tag, that mainline Firefox will be built with GTK+3 for Firefox 42. Firefox 42 is expected to be released this November.

  • SaaS/Big Data

  • Hadoop Summit

    • Getting friendly with open source: Big Data firm liberates proprietary chokeholds

      Enterprise customers could consider open source as the solution to their problems. According to Anand Venugopal, Impetus’ head of real-time stream analytics platform StreamAnalytix, “People have become so friendly to open source, and they have been waiting to be liberated from the hold of proprietary vendors that they are positively biased toward open source-oriented technology.”

      Discussing a recent use-case scenario, Kankariya said, “The guy was looking for his problem to be solved; he doesn’t care if it’s Hadoop or NoSQL or whatever.” This openness has allowed Impetus to become a trusted partner and advisor for customers that want to “cross-learn from across the ecosystem.”

    • Squeezing more value out of data

      Cloudera, Inc.’s Todd Laurence, director, global partner sales, and Michael Crutcher, director of product management, joined theCUBE, SiliconANGLE’s Media team, at Hadoop Summit 2015 to discuss how Cloudera’s close relationship with EMC is benefiting its Isilon scale-out NAS storage customers and “bringing analytics to data where it lives today in EMC Isilon.”

  • BSD

    • FreeBSD 10.2 Gets Ready for Production Use, Release Candidate 1 Out for Testing

      The FreeBSD Project announced a few minutes ago that the first Release Candidate (RC) version of the upcoming FreeBSD 10.2 operating system is now available for download and testing through the usual channels.

    • FreeBSD 10.2-RC1 Released

      This latest development milestone for FreeBSD 10.2 has fixes for ZFS, Xen, SSH, pkg, and many other key components. Besides being offered for i386, amd64, PowerPC, PowerPC64, and SPARC64, there are also ARM spins for popular development boards from the RaspberryPi B to BeagleBone and PandaBoard.

    • LLVM 3.7 RC1 Ready For Testing By Developers

      One week after tagging LLVM 3.7-RC1, Hans Wennborg of Google announced its formal release on Thursday.

  • FSF/FSFE/GNU/SFLC

  • Openness/Sharing

    • Open Data

      • ODI announces winners Open Data Awards 2015

        Earlier this month, the Open Data Institute held its Open Data Awards ceremony at Bloomberg’s London office, where ODI founders Sirs Tim Berners-Lee and Nigel Shadbolt presented this year’s winners.

    • Open Hardware

      • SketchUp’s Open-Source 3D-Printable WikiHouse Snaps Together Like Lego Bricks

        What if you could assemble your house like Legos using free modeling software and a 3D printer? That’s the idea behind Eric Schimelpfening‘s WikiHouse – a home designed entirely in SketchUp that can be downloaded by anyone, customized to fit the user’s needs and sent to the 3D printer. The components are then snapped together using less than 100 screws to make rooms that can be rearranged as easily as you would rearrange furniture.

  • Programming

    • PHP 7.0 Beta 2 Released

      Just two weeks after PHP 7 decided to go into beta, the second beta release is now available for testing.

      If you’ve been living under a rock, PHP 7.0 is slated to deliver much greater performance over PHP 5.6 (as much as 2x or more), consistent 64-bit support, various new language features, better handling of fatal errors, and other changes.

  • Standards/Consortia

    • ISO updates ODF document standard

      The International Organization for Standardization (ISO) has updated the ODF open document format standard for office application. ODF version 1.2 was published on 17 June.

Leftovers

  • Security

    • Friday’s security updates
    • Researchers Enlist Machine Learning In Malware Detection

      In 100 milliseconds or less, researchers are now able to determine whether a piece of code is malware or not — and without the need to isolate it in a sandbox for analysis.

    • The OpenSSH Bug That Wasn’t

      Get your facts straight before reporting, is the main takeaway from Peter Hansteen’s latest piece, The OpenSSH Bug That Wasn’t. OpenSSH servers that are set up to use PAM for authentication and with a very specific (non-default on OpenBSD and most other places) setup are in fact vulnerable, and fixing the configuration is trivial.

    • VUPEN Founder Launches New Zero-Day Acquisition Firm Zerodium

      In the weeks since the Hacking Team breach, the spotlight has shone squarely on the small and often shadowy companies that are in the business of buying and selling exploits and vulnerabilities. One such company, Netragard, this week decided to get out of that business after its dealings with Hacking Team were exposed. But now there’s a new entrant in the field, Zerodium, and there are some familiar names behind it.

  • Defence/Police/Secrecy/Aggression

    • Hundreds of never-before-seen photos of Bush and Cheney on 9/11 released by National Archives

      The National Archives on Friday released more than 350 never-before seen photos of former President George W. Bush and Vice President Dick Cheney, along with top members of the Bush administration, on Sept. 11, 2001, as they reacted to the most deadly attack in terrorism in American history.

    • Ex US Intelligence Want the Truth from White House who Shot Down MH17

      On Tuesday, the Ukrainian government refused to release an international report on the disaster, intensifying widespread concerns that it pointed to Ukrainian rather than Russian or rebel culpability in the crash.

    • Saudi-led coalition airstrikes kill more than 120 in Yemen

      Saudi-led coalition airstrikes killed more than 120 civilians and wounded more than 150 after shelling a residential area in the Yemeni province of Taiz on Friday evening, security officials, medical officials and witnesses said.

      The officials, speaking on condition of anonymity because they were not authorized to speak to reporters, said that most of the houses in the area were leveled and a fire broke out in the port city of Mokha. Most of the corpses, including children, women and elderly people, were charred by the flames, they said.

    • John Carlin Complains that ISIL Is Targeting Same Youth FBI Is

      I’m reviewing some of the videos from the Aspen Security Forum. This one features DOJ Assistant Attorney General for National Security John Carlin and CIA General Counsel Caroline Krass.

      I’m including it here so you can review Carlin’s complaints in the first part of the video. He explains to Ken Dilanian that ISIL’s recruiting strategy is different from Al Qaeda’s in that they recruit the young and mentally ill. He calls them children, repeatedly, but points to just one that involved a minor. 80% are 40 and under, 40% are 21 and under. In other words, he’s mostly complaining that ISIL is targeting young men who are in their early 20s. He even uses the stereotype of a guy in his parents’ basement, interacting on social media without them knowing.

      Carlin, of course, has just described FBI’s targeting strategy for terrorist stings, where they reach out to young men — many with mental disabilities — over social media, only then to throw an informant or undercover officer at the target, to convince him to press the button that (the target believes) will detonate a bomb — though of course the bomb is an FBI-supplied inert bomb.

  • Transparency Reporting

    • Why Hong Kong is the only Asian hub for global media

      Hong Kong is definitely the Asian hub of the global news industry.

    • Assange says WikiLeaks is “drowning in material now”
    • Julian Assange on WikiLeaks’ Comeback: ‘We Are Drowning in Material’
    • SPIEGEL Interview with Julian Assange: ‘We Are Drowning in Material’

      In an interview, Julian Assange, 44, talks about the comeback of the WikiLeaks whistleblowing platform and his desire to provide assistance to a German parliamentary committee that is investigating mass NSA spying.

    • Hillary Clinton likely ‘mishandled’ secrets because too much is classified

      The minute that private email server Hillary Clinton used for work emails as Secretary of State became a controversy, it was clear that evidence would surface showing that classified information passed through that address – despite her repeated denials.

      Of course there was “secret” information in her emails – but not because she had attempted to cover up smoking gun Benghazi emails like conspiracy-addled Republicans hoped. It’s because the US classification system is so insanely bloated and out of control that virtually everything related to foreign policy and national security is, in some way or another, classified.

      And now it’s finally happened: the New York Times reported late Thursday that two internal government watchdogs have recommended that the Justice Department open a criminal investigation into Clinton’s private email account, because the cache of 55,000 emails from her now-deleted server reportedly include “hundreds of potentially classified emails”.

    • The Declining Half-Life of Secrets

      The nature of secrets is changing. The “half-life of secrets” is declining sharply for many intelligence activities as secrets that in the past may have been kept successfully for 25 years or more, are now exposed well before.

      For evidence, one need look no further than the 2015 breach at the Office of Personnel Management (OPM), of personnel records for 22 million U.S. government employees and family members. OPM is just one instance in a long string of high-profile breaches, where hackers have gained access to personal information, trade secrets, or classified government material. The focus of the discussion needs to be on complementary trends in information technology, including the continuing effects of Moore’s Law, the sociology of the information technology community, and changed sources and methods for signals intelligence, all of which increase the likelihood that government secrets will not remain secret for long.

      An age where secrets become known sooner, means that “the front-page” test will become far more important to decision-makers. Even if a secret operation is initially successful, the expected costs of disclosure become higher as the average time to disclosure decreases.

  • Finance

    • Elizabeth Warren 1, Wall Street Clown 0

      On this week’s podcast, we look back on Elizabeth Warren ripping apart a rip-off artist from Primerica, break down the latest effort to pass a highway funding bill, and explain why a former NSA chief is talking to a bunch of fruit growers.

  • PR/AstroTurf/Lobbying

    • Side-By-Side Coverage of Cuba and Iran Highlights Shift in US Media Villain-Making

      US relations with Cuba have had a significant time to relax, and clearly there is a still a long way to go with Iran, which George W. Bush famously included as a member of the “axis of evil” in his 2002 State of the Union address (White House Archives, 1/29/02). One might wonder, however, were the US media to grant the same kind of legitimacy to Iranian perspectives as it now does to Cuba’s, whether that latter number might tick up.

    • Megyn Kelly’s Response To The Louisiana Theater Shooting Was To Speculate About An ISIS Connection

      Fox News anchor Megyn Kelly responded to breaking news of a deadly shooting at a Louisiana movie theater by baselessly asking about possible connections to ISIS or radical Islam.

    • Politico Finds ‘Capital of American Jihad’–Based on 2 Cases, 6 Years and 268 Miles Apart

      In his piece “Tennessee Is the Capital of American Jihad,” author and “War on Terror” think-tanker James Kitfield sets out to draw a connection between the the recent Chattanooga shooter Mohammad Youssef Abdulazeez and the case of Carlos Bledsoe, who shot up a recruiting station in Arkansas in 2009. The fact that both attacked recruiting stations, both lived in Tennessee and both were Muslim is apparently enough to make Tennessee the “Capital of American Jihad.”

    • Who Is Frank Luntz, The Guy Trying To Quietly Change Your Mind About Republicans?

      On Saturday, at the 2015 Family Leadership Summit, an event which showcases Republican candidates, Donald Trump gave a notorious interview in which he discussed John McCain’s military record. Trump said, “He’s not a war hero. He’s a war hero because he was captured. I like people who weren’t captured.” His interviewer cut him off twice and and asked what he thought again. Suddenly, Trump said McCain was a war hero multiple times, creating a debate about whether Trump meant that McCain is a war hero because being captured is heroic or that McCain only got hero status because he was captured, not because he was doing anything special. Amazingly, Trump got a standing ovation — and his interviewer, Frank Luntz, knew exactly what he was doing.

      Luntz is not a journalist. He is not a fellow politician or a Republican Party executive. He is a pollster who specializes in language, and though you might not have heard of him, the Republican candidates certainly have. He knows what words to use to make you like them more.

  • Censorship

    • Sri Lanka: Colombo Telegraph facing censorship despite presidential promise

      The Colombo Telegraph, Sri Lanka’s most iconoclastic investigative news website, is gearing up for this year’s second national election. And once again they face the threat of censorship — despite a presidential promise to bring it to an end.

      January’s polls saw the website blocked to domestic voters by order of authoritarian incumbent president Mahinda Rajapaksa. Unseated by shock winner Maithripala Sirisena, one of the victor’s first acts after the vote was to lift the official banning order.

    • Universal’s agents send Google a censorship demand for “127.0.0.1″

      127.0.0.1 is the “loopback” address for your Internet stack, the address you tell your computer to visit when you want it to talk to itself.

      Links to 127.0.0.1 just go to your own computer — it’s like asking your computer to knock on its own door. Not understanding this is directly analogous to not being able to find your own ass with both hands.

    • Michigan Needs a New Voice: Challenging Censorship in the Wolverine State

      Earlier this year, the faculty advisor to Northern Michigan University’s college newspaper was outed for encouraging her students to file public records requests and draw attention to acts of secrecy performed by university administration. Noting that public records requests are legal and even encouraged as per Michigan’s Freedom of Information Act, it is unnerving to know that the accomplishments and reputations of our nation’s finest journalism educators can be undermined in the name of image control. But the Marquette-based college is not alone; the Rochester Talon, the nationally recognized and award-winning student newspaper of Rochester High School in Oakland County, has been subjected to prior review by school administration since January, when–in an attempt to raise awareness about changing smoking trends among students of legal smoking age–it ran a photo (shown below) of a teenager (lawfully, and in an off-campus location) smoking a hookah pen. The school administration’s swift retaliation made certain that no journalist would again dare attempt to inform the school community about an issue of social concern.

    • Turkey’s press council says censorship still in place

      Turkey’s Press Council has said censorship is still in place in Turkey, adding the country ranked 149th among 199 countries in press freedom reports, with 21 journalists in jail and a large number of ongoing cases filed against journalists, in a written statement issued to mark the 107th anniversary of Journalists Day.

    • Israeli artists sound alarm over growing censorship

      According to local filmmakers, the recent suppression of documentary Beyond The Fear is just one episode in a quickening erosion of artistic freedom in Israel.

      As Nanni Moretti’s Mia Madre began to roll on the opening night of the Jerusalem Film Festival in the picturesque Sultan’s Pool amphitheatre in early July, another screening was kicking off just metres above the spectators’ heads.

    • The Edge suspension triggers fears of media clampdown

      Putrajaya’s three-month ban on two local publications reveals a growing clampdown on press freedom in Malaysia and a bid to encourage self-censorship, human rights groups said today.

    • 14,000 sign petition against FPB online regulations

      “If the Film and Publication Board’s new internet regulations are implemented, they’d have the right to review and classify almost every blog, video, and personal website – even Avaaz campaigns like this one. Think apartheid-era censorship, reloaded and super-charged for an all-out assault on our digital freedoms.”

    • WeChat censorship report: 1.5% of posts get censored

      WeChat is China’s hottest social media app. But like internet services in China, discussion on WeChat isn’t entirely free – it is censored by Tencent in accordance with Chinese law. Just how censored is WeChat, and what exactly is being hidden from view? Those questions are the subject of an exhaustive new report from the University of Toronto’s Citizen Lab on WeChat censorship.

    • How Tight Is Internet Censorship In China? It Censors WeChat Even For Harmless Rumors

      The Citizen Lab report, published on Monday July 20, conducted an analysis over several thousand posts that were posted publically on the social messaging app WeChat’s public blog. WeChat is owned by Tencent.

    • Dear Instagram, I love you but you’re bringing me down
    • Robyn Lawley exposes Instagram’s censorship policy in a weekend Twitter rant
    • Bill raises online censorship fears

      Legislation that is being promoted as a way to update the country’s anti-discrimination rules has sparked controversy in the Lower House and society at large amid concerns that it could lead to censorship, particularly in online forums.

  • Privacy

  • Civil Rights

    • Are Arabs white?

      In the US, race has always mattered. Whiteness in particular has mattered most, standing as the seal of civilisation and the gateway towards citizenship.

      Since 1944, Arabs have been deemed white by law. Many Arabs still embrace and defend that status today.

    • Palace fury over Hitler salute images is guff

      “England’s difficulty is Ireland’s opportunity”. Anyone who heard that in childhood as a wise saying, not to be questioned, was being told their elders believed the Nazis were not all bad.

    • British archives hiding royal family’s links to anti-Semitism in 1930s, says historian

      While research hitherto has focused on the support German aristocrats secretly provided Hitler within Germany, Urbach’s book discusses an additional, international dimension to this secret diplomatic back channel, most notably from members of the British royal family.

    • The Queen’s Nazi salute: Historical revisionism in the service of state censorship

      Writing in the Telegraph, Conservative London mayor Boris Johnson thundered that it “makes my blood boil to think that anyone should use this image in any way to impugn the extraordinary record of service of Her Majesty to this country.”

      She was “a tiny child, and she is making that parodic salute long before her family could possibly have grasped what Hitler and Hitlerism was really all about.”

      In the Guardian, columnist Michael White wrote that the “Queen’s Nazi salute [was] a sign of ignorance shared by many in scary times.” The royal family’s “wobbly views” were, he claimed, shared by the “great British public.”

      Elsewhere, military historian James Holland opined, “I don’t think there was a child in Britain in the 1930s or 40s who has not performed a mock Nazi salute as a bit of a lark. It just shows the Royal Family are as human as the next man.”

    • It’s true, teens can’t be punished like adults

      In the past decade, advances in neuroscience have given new insights into old problems, ranging from drug addiction and post-traumatic stress disorder to adolescent shenanigans.

      For example, if the new neuroscience shows that a drug addict’s brain is physically dissimilar to a non-addict’s brain in ways that make the former more prone to addiction, then we must ask if his infractions of the law ought to be treated less punitively.

    • Race should not be unthinkingly trotted out to gag free speech
    • Traumatized Amos Yee is open for Donation

      16-year-old traumatized, Amos Yee is open for cash donation, who had already served four weeks in jail.

    • We welcome criticism within constraints, says Singapore PM Lee Hsien Loong

      Mr Lee was asked about the cases of Amos Yee and Roy Ngerng – the former found guilty of insulting a religion, the latter of defaming the Prime Minister – in an interview with Time.

    • AWARE statement on the prosecution of Amos Yee

      AWARE has grave concerns about the negative implications of the recent prosecution of Amos Yee. This statement focuses on harassment and hate speech as these areas are closest to our work, although we also share concerns that others have raised about the importance of upholding freedom of expression, children’s rights, and the integrity of people with autism and mental health issues.

    • Teen blogger Amos Yee files appeal
    • Amos Yee files appeal against conviction and sentence
    • Singaporean blogger Amos Yee appeals against conviction, sentence

      Teenage blogger Amos Yee, who received a four-week jail sentence for posting an obscene image online and posting content intended to hurt the religious feelings of Christians, is appealing against both his conviction and the sentence.

    • Lawyers want judge who’s not Christian for Amos Yee appeal

      The lawyers for teenage blogger Amos Yee want his appeal to be heard by a non-Christian judge when it goes before the High Court.

      The 16-year-old will be appealing against both his conviction and sentence. His lawyer Alfred Dodwell filed the notice of appeal on July 9, three days after Yee was released from remand.

  • Intellectual Monopolies

    • Corporate lobbying expense jumps as U.S. trade debate rages

      Washington lobbying by companies and groups involved in global trade boomed in the past nine months, records show, as Congress debated a landmark trade pact proposed by President Barack Obama, the 12-nation Trans-Pacific Partnership (TPP).

      Lobbying expenditures by members of a pro-TPP coalition increased to $135 million in the second quarter of 2015, up from $126 million in the first quarter and $118 million in the fourth quarter of 2014, according to Senate Office of Public Records reports reviewed by Reuters.

    • Trademarks

      • JDate Is Suing JSwipe Over The Letter ‘J’, Here’s What My Bubbie Would Have Said

        Today, Forbes unearthed a lawsuit from late last year that Jewish dating site JDate’s parent company filed against an app called JSwipe (also aimed at Jewish folk). It’s over the use of the letter J. The case is set to pick up again next month.

      • Jdate Sues Competitor Jewish Dating App For Using The Letter “J”

        Jdate, the popular dating service responsible for more Jewish hookups than a bottle of Manischewitz, is playing hardball in the dog-eat-dog world of nice Jewish match-making.

        Jdate’s parent company, Spark Networks, discreetly filed a lawsuit late last year against Jswipe, the ‘Tinder for Jews’ dating app, claiming intellectual property over the letter “J” within the Jewish dating scene (the company refers to the branding as the “J-family”).

      • Members Of The ‘Tribe’ Swipe For A Shidduch

        Over the sounds of the packed crowd at the lower level of Noho hotspot “Acme,” on Tuesday evening, one phrase could consistently be heard: “I work in real estate.”

      • Jdate Sues Competitor Jewish Dating App For Using The Letter “J”

        Additionally, Jdate claims it owns the patent on software that “confidentially determines matches and notifies users of mutual matches in feelings and interests.” Jswipe, like Tinder, notifies users when their romantic interest ‘swipes right’ on their picture, violating Jdate’s patent.

    • Copyrights

      • A 1990s anti-piracy law is why you haven’t seen the hacked list of Ashley Madison customers

        “Using the Digital Millennium Copyright Act (DMCA), our team has now successfully removed all posts related to this incident as well as all Personally Identifiable Information (PII) about our users published online,” said Ashley Madison parent company Avid Life Media in a statement. “We have always had the confidentiality of our customers’ information foremost in our minds and are pleased that the provisions included in the DMCA have been effective in addressing this matter.”

      • Response to IPO consultation on raising jail sentences for online infringement

        The Intellectual Property Office is consulting on proposals to increase prison penalties for criminal online copyright infringement to 10 years to bring them to the same levels as those for similar physical copyright infringement.

07.24.15

Links 24/7/2015: openSUSE Leap 42.1, Intel With Rackspace for OpenStack

Posted in News Roundup at 3:40 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

Links 24/7/2015: GNOME 3.17.4, Mozilla Developer Network Turns 10

Posted in News Roundup at 6:30 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Software Commons

    In this sense, software commons make sense, and because these commons do not effectively exist in some village somewhere in Europe during the Middle Ages, but much rather all over the Internet, they are of primary importance for software and for the world we live in.

  • The real reason Facebook does open source

    On the third day of OSCON, I heard Facebook’s James Pearce deliver one of the convention’s many keynote presentations.

    Pearce explained how Facebook does open source at scale. And according to him, Facebook launches several open source projects every month and has hundreds of engineers supporting those projects on an ongoing basis—all while they’re engaging with communities around the world to make software experiences better.

    But more interesting than how Facebook does this is the question of why they use, support, and release open source projects at a

  • IBM moves open-source business software to the cloud

    IBM has set up a new code repository that aims to foster collaborative development of enterprise open source software — and it may also drum up interest in its own Bluemix platform services.

  • 10 open source storage solutions that might be perfect for your company

    The right storage solution is critical for business, but the price tag can put many options out of reach. Luckily, there’s a host of powerful, scalable open source candidates to choose from.

  • The battle between open-source and proprietary software for drone development

    However, open-source software and hardware has become the platform of choice for developers for next-generation drone technology. Mature alternatives exist in the open-source realm. From OpenPilot to Dronecode, these projects emphasize customizability and offer ways to collaborate on development and support that are not possible with proprietary systems. For every layer of the drone, from flight code to firmware, to vision processing and collision avoidance, there are viable open-source options.

  • Creating The Open-Source Community Of Your Dreams

    When a company decides to embrace open-source software development, releasing the code under a suitable license is only the tip of the iceberg. The real challenge that companies face is learning how to attract and collaborate with contributors.

  • Monoid Is an Open Source Font That’s Perfect for Coders

    Monoid, designed by Andreas Larsen, is designed to be sleek and precise. Every single character in Monoid’s library has been designed by Larsen to be beyond easy to tell apart, so you don’t ever have to worry about confusing thetas, o’s, O’s, and 0’s (zeros). The font is also monospaced (each character takes up the same width), so it makes it easy to skim your code and spot any errors that might be fudging things up. The spacing between the characters is small, however, so you can fit as much as you need into a line of code. What makes Monoid even better is the fact that it’s alive. Since it’s an open source font, it can be adjusted and perfected over time by the very people that use it. You can check out Monoid at the link below.

  • A non-coder CAN contribute to open source

    Non programmers can write docs. They can design logos. They can help with user interface design. They can test fixes or new features. They can triage bugs by verifying that the submitted report can be recreated and adding additional details, logs, or config files. Larger projects need some infrastructure support that is more administration and security compliance than Java programmer. Many people who consider themselves non-programmers do have some pretty good scripting skills and can assist with packaging for distributions.

  • The Open Source Initiative Announces Linux Professional Institute Affiliate Membership

    Leading vendor-independent Linux certification organization extends commitment to furthering the adoption of Linux and Open Source.

  • Events

    • OSCON: Purism Respects Your Rights & Freedom

      At OSCON, Purism has on hand the Librem 13 and Librem 15 laptops – the numbers designating the screen size (13-inch and 15-inch, respectively) — which are both designed, chip-by-chip and line-by-line to respect your rights to privacy, security and freedom, which is Purism’s philosophy.

    • OSCON: From the Expo Floor

      Like many of the Linux/FOSS events that dot the calendar year, OSCON resembles that — Bonnaroo without the mosh pit (though now that I’ve written that, let’s see if something like that appears in Austin next year) — but along with the camaraderie there’s also an element of “high school reunion” in the mix.

    • OSCON Report: Big Blue Goes Big for FOSS

      “Big Blue” unveiled a new platform for developers to collaborate with IBM on a newly released set of open source technologies. IBM plans to release 50 projects to the open source community to speed adoption in the enterprise sector and spur a new class of cloud innovations around mobile and analytics, among other areas.

    • Open Container Project Gets New Name, Sees Member Growth
  • Web Browsers

    • Mozilla

      • MDN celebrates 10 years of documenting YOUR Web

        Today, Mozilla proudly celebrates the 10th anniversary of the Mozilla Developer Network, one of the richest and also one of the few multilingual resources on the Web for documentation. It started in February 2005, when a small team dedicated to the open Web took DevEdge (Netscape’s developer materials) and set out to create an open, free, community-built online resource for all Web developers. Just a couple of months later, on 23 July, 2005 the original MDN wiki site launched and has evolved steadily ever since for the convenience and the benefit of its users.

  • SaaS/Big Data

  • FSF/FSFE/GNU/SFLC

    • Founder of GNU bestows blessing upon open source crowdfunding site

      Richard Stallman, the founder of the Free Software Foundation and the GNU Project known by many in the open source worlds as rms, is not the sort of person you’d expect to endorse a product. But Stallman and the FSF have formed a partnership of sorts with Crowd Supply, a crowdfunding company that has been largely focused on open source hardware and software projects.

  • Project Releases

    • Linux: man-pages-4.01 is released

      I’ve released man-pages-4.01. The release tarball is available on kernel.org. The browsable online pages can be found on man7.org. The Git repository for man-pages is available on kernel.org.

      This release resulted from patches, bug reports,and comments from nearly 50 contributors. As well as a large number of minor fixes to over 100 man pages, the more significant changes in man-pages-4.01 include the following.

  • Public Services/Government

    • France publishes free software procurement templates

      The French government has published templates to be used by procurement officers when requesting free software-based ICT solutions. The templates include intellectual property clauses, and clarify the specifics of the free software environment.

  • Licensing

    • QEMU is Conservancy’s Newest Member Project

      Today, Software Freedom Conservancy proudly welcomes QEMU, the generic machine emulator and virtualizer, as a member project. QEMU is now one of many free and open source software projects who call Conservancy their non-profit corporate home.

  • Openness/Sharing

    • The missing discovery: CSIR’s open source drug development making waves everywhere except India

      It is an idea that has not set the country on fire, but has been noticed all over the world. For a few years now, it has been knocking at the doors of international technology awards, but losing out in the end to far more extraordinary innovations. It has also been among the few, if not the only, ideas from India to get an entire session at an American Chemical Society meeting. It is called the Open Source Drug Discovery (OSDD) model. With a bit of luck and commitment, it could break new ground in drug discovery and development.

  • Standards/Consortia

    • The French want to BAN .doc and .xls files from Le Gouvernement

      Microsoft could get the boot from the French government if a new recommendation from an official advisor is adopted.

      DISIC (Direction interministérielle des systèmes d’information et de communication de l’État) has recommended that French authorities ditch Microsoft Office tools in favour of the Open Document Format (ODF).

      DISIC is responsible for harmonising and reducing the costs of all state computers, including government ministries, state and regional departments and local authorities, and sees ODF as the best way to make them all interoperable.

      According to sources, an initial draft of the report envisaged outlawing Microsoft’s Open XML altogether, although with some agencies using tools specifically developed for use with Open XML, DISIC relented.

Leftovers

  • President Obama says the European Union is stronger with the United Kingdom

    Barack Obama has urged the United Kingdom to stay with the European Union.

    The US President also said that the UK is his nation’s “best partner” during an interview with the BBC on Thursday.

    “Having the United Kingdom in the European Union gives us much greater confidence about the strength of the transatlantic union,” he said during an interview with the broadcaster before his visit to Kenya.

  • Security

  • Defence/Police/Secrecy/Aggression

  • PR/AstroTurf/Lobbying

    • “Funding Terror”: Fox News Baselessly Fearmongers About Seattle’s Home Loans For Muslims

      Co-host Steve Doocy later worried that the loans amounted to “discrimination” in favor of Muslims, while network analyst Peter Johnson, Jr, said that it “opens up a lot of questions” such as concerns about “legitimatizing a law that is really inimical to American values.”

    • Fox Cites Misleading Anecdotes About Workers On Welfare To Attack Minimum Wage Increases

      A Fox News report on the so-called “unintended consequences” of Seattle, Washington’s municipal minimum wage increase included the unsubstantiated claim that better pay is encouraging workers to work less so that they stay in poverty and continue receiving government benefits. This report fits the network’s anti-minimum wage, poor-shaming narrative, but ignores the many benefits of increasing the minimum wage.

    • Comcast Really Wants Me To Stop Calling Their Top Lobbyist A ‘Top Lobbyist’

      Comcast executive David Cohen is, by dictionary definition, a lobbyist. And not just any lobbyist; a gushing profile piece by the Washington Post in 2012 called him a “wonk rock star” and the company’s “secret weapon,” who uses “his vast network of high-powered contacts” to help craft Comcast-friendly regulations and apply pressure on DC policy makers. You know, a lobbyist. Unless you’re Comcast, which has now e-mailed me repeatedly to demand I stop calling him that.

  • Privacy

    • Empower consumers to control their privacy in the Internet of Everything

      As an Eisenhower Fellow, Dr. David A. Bray had the opportunity to travel to Taiwan and Australia in a personal capacity to discuss the burgeoning privacy and security challenges that the Internet of Everything era presents. Throughout his meetings, everyone asked: who is responsible for ensuring security? Answering as an Eisenhower Fellow in a personal capacity, Bray was always quick to answer: Everyone is.

  • Civil Rights

    • The Transcript Of Sandra Bland’s Arrest Is As Revealing As The Video

      During the traffic stop that led to her arrest and, ultimately, her death in a Texas jail, Sandra Bland repeatedly questioned the decisions of state Trooper Brian Encinia and asserted rights she said Encinia was violating.

      A close look at the police car dashcam video that recorded the exchange shows her questions had merit: Encinia at every occasion escalates the tension. He tells Bland, a Black Lives Matter activist, she’s under arrest before she has even left her car, shouts at her for moving after ordering her to move, refuses to answer questions about why she’s being arrested and, out of the camera’s view, apparently slams her to the ground. He gets testy with her — “Are you done?” — when she explains after he points out she seems irritated. And, contrary to a recent Supreme Court decision, he unconstitutionally extends the traffic stop, it appears, out of spite.

    • Guantanamo Prisoner Balks at Working With Defense Lawyers

      A Guantanamo prisoner balked at working with his defense lawyers due to a possible conflict of interest Wednesday, prompting an indefinite recess in his pretrial hearing in Cuba.

      Abd al-Hadi al-Iraqi told the military judge Wednesday he wished to stop conferring with the two lawyers assigned to his case, at least temporarily. During the recess, prosecutors will try to arrange a meeting between al-Hadi and one of his former attorneys in hopes of resolving the issue.

    • Blame the Police

      Sandra Bland’s arrest and death are a national scandal. The police are responsible.

    • The Eroding Character of the American People

      Attorney John W. Whitehead opens a recent posting (see below) on his Rutherford Institute website with these words from a song by Bob Dylan. Why don’t all of us feel ashamed? Why only Bob Dylan?

      I wonder how many of Bob Dylan’s fans understand what he is telling them. American justice has nothing to do with innocence or guilt. It only has to do with the prosecutor’s conviction rate, which builds his political career. Considering the gullibility of the American people, American jurors are the last people to whom an innocent defendant should trust his fate. The jury will betray the innocent almost every time.

  • Intellectual Monopolies

    • Is Amazon Liable For IP Violations By Its Marketplace Vendors?

      Animal-shaped pillows are cute and fluffy, except when they spur litigation. Recently, the Milo & Gabby brand sued Amazon for IP infringement because merchants allegedly sold knockoffs of its “Cozy Companion Pillowcases.” Amazon has successfully avoided IP liability for its marketplace, and a recent ruling rejected most of Milo & Gabby’s claims. However, a key piece of Milo & Gabby’s claim survived Amazon’s dismissal attempt, leaving the possibility that Amazon could be liable for merchants’ IP violations.

    • Copyrights

      • EU Starts Geo-Blocking Antitrust Case Against U.S Movie Studios

        The European Union has today launched an antitrust investigation against several large U.S. movie studios and Sky UK. The European Commission wants to abolish geographical restrictions and has sent a statement of objections over the geo-blocking practices of six major US film studios including Disney, Paramount Pictures and Warner Bros.

      • Movie studios keep asking Google to remove pirated content on their own computers

        Google search results sometimes include a tiny message at the bottom that some sites have been removed for sharing pirated content.

        Those requests come from movie studios and other content rights holders who manually submit links to be taken down.

        What’s pretty hilarious is movie studios have been submitting takedown requests that include links to pirated content stored on their own desktop computers.

07.23.15

Links 23/7/2015: New RHEL Release, Capital One Releases Code

Posted in News Roundup at 8:57 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • Security

  • Environment/Energy/Wildlife

    • Enjoy Your Romaine—While It Lasts

      The mighty Central Valley hogs the headlines, but California’s Salinas Valley is an agricultural behemoth, too. A rifle-shaped slice of land jutting between two mountain ranges just south of Monterey Bay off the state’s central coast, it’s home to farms that churn out nearly two-thirds of the salad greens and half of the broccoli grown in the United States. Its leafy-green dominance has earned it the nickname “the salad bowl of the world.” And while the Central Valley’s farm economy reels under the strain of drought—it’s expected to sustain close to $2.7 billion worth of drought-related losses—Salinas farms are operating on all cylinders, reports the San Jose Mercury News.

  • Finance

    • At Wall Street Journal, Government-Enforced Monopolies = ‘Free Market’

      Those folks at the Wall Street Journal are really turning reality on its head. Today it ran a column by Robert Ingram, a former CEO of Glaxo Wellcome, complaining about efforts to pass “transparency” legislation in Massachusetts, New York and a number of other states.

      This legislation would require drug companies to report their profits on certain expensive drugs, as well as government funding that contributed to their development.

      [...]

      This would eliminate all the distortions associated with patent monopolies, such as patent-protected prices that can be more than 100 times as much as the free-market price. This would eliminate all the ethical dilemmas about whether the government or private insurers should pay for expensive drugs like Sovaldi, since the drugs would be cheap. It would also eliminate the incentive to mislead doctors and the public about the safety and effectiveness of drugs in order to benefit from monopoly profits.

    • What do Angela Merkel and Mitt Romney have in common?

      In May 2012, when Mitt Romney was campaigning for president, he made a statement that summed up his economic views — and came to define his run for office:

      “There are 47 percent of the people who will vote for the president no matter what,” he said. These people “are dependent upon government, who believe that they are victims, who believe the government has a responsibility to care for them … I’ll never convince them they should take personal responsibility and care for their lives.”

      Germany’s current leaders — and most of Europe’s, as well — seem to fully agree with this philosophy. They treat Greece exactly as though the country fit Romney’s description of that lazy, greedy 47 percent of Americans. And Greece’s experience prefigures what looms elsewhere: like Romney, many European leaders appeal to their publics to embrace that perspective, often effectively. This involves leading the hard-working 53 percent to rise up and refuse to pay taxes that sustain the lazy and irresponsible, recipients of public support and overindulged public employees who deliver it. Romney’s portrayal of the 47 percent matches, in words and tone, many European leaders’ portrayal of Greeks (and also Portuguese, Spanish, Italian, Irish and the peoples of whatever other country happens to be in an economic rut.)

  • PR/AstroTurf/Lobbying

    • 20-year-old SNP MP Mhairi Black isn’t happy about Tony Blair calling her party ‘cave men’

      Tony Blair’s criticism of the SNP for having a “cave man” ideology is ridiculous considering his “primitive” policy on Iraq, one of the Scottish nationalists’ rising stars has said.

      The former prime minister said on Wednesday morning that Scottish nationalism was “reactionary” and consisted of “blaming someone else” for Scotland’s problems.

    • ALEC Admits School Vouchers Are for Kids in Suburbia

      School vouchers were never about helping poor, at-risk or minority students. But selling them as social mobility tickets was a useful fiction that for some twenty-five years helped rightwing ideologues and corporate backers gain bipartisan support for an ideological scheme designed to privatize public schools.

    • Donald Trump And Fox & Friends’ Symbiotic Relationship

      Fox & Friends has emerged as Donald Trump’s biggest cheerleader and defender in the media, a role the presidential candidate is rewarding with lavish public praise.

    • ‘Media Have Been Applying a False Narrative to the Entire Issue’ – CounterSpin interview with Gareth Porter on the Iran deal

      NBC’s David Gregory said the international community, divided on many things, are united on this: “They think Iran is up to no good and wants to build a nuclear weapon.”

      US corporate media have a habit when discussing Iran, though not only then, of presenting what are overwhelmingly US points of view as those of the whole world–a less-than-helpful quality as we try to understand the deal with Iran currently making headlines.

      Here to help us sort through it is investigative journalist Gareth Porter, author of Manufactured Crisis: The Untold Story of the Iran Nuclear Scare and a regular contributor to Middle East Eye.

  • Censorship

    • New Facebook video controls let you be sexist, ageist or secretive

      Videos on Facebook are big business. As well as drugged up post-dentist footage, there is also huge advertising potential. Now Facebook has announced a new set of options for video publishers — including the ability to limit who is able to see videos based on their age and gender.

    • New Censorship Bill Passed in Australia

      Having lived in Australia this Kat tries to turn his attention to the Land Down Under as often as he can. Although the Australian intellectual property law regime takes a lot from its UK and common law counterparts, they have often been a step ahead (or to the side, depending on your perspective) in one way or another. Recently the Australian Parliament passed the Copyright Amendment (Online Infringement) Bill 2015, which aims to give the Australian courts more tools to combat online copyright infringement, or the facilitation thereof. While the provision is not necessarily hugely pertinent to those of us working here in the UK, it is still an interesting one.

  • Privacy

    • Wikipedia Founder Jimmy Wales Accuses David Cameron Of ‘Technological Incompetence’ over Encryption Bill

      The founder of Wikipedia accused David Cameron of “technological incompetence” on Tuesday, telling the British Prime Minister the idea of banning encryption was “just nonsense.”

      Speaking on HuffPost Live in New York, Jimmy Wales responded to a question about the British government’s push to gain access to encrypted sites for reasons of security.

      He called increased online security of “critical importance” in the face of “real threats from cyber crime.”

      “That means end-to-end encryption everywhere. That’s what he [Cameron] should be campaigning for,” Wales said.

      “The idea that you could ban encryption… it is just nonsense, it’s impossible, it’s math, you can’t ban math,” he added.

    • [on Washington Post]

      The Washington Post again demanded that tech companies create special ‘golden keys’ for authorities to keep and use for access to private communication. Protected by a warrant, of course. For the benefit of this discussion (which is really getting old), I just put together the reasons why it is a dumb idea.

    • Is the NSA lying about its failure to prevent 9/11?

      On March 20, 2000, as part of a trip to South Asia, U.S. President Bill Clinton was scheduled to land his helicopter in the desperately poor village of Joypura, Bangladesh, and speak to locals under a 150-year-old banyan tree. At the last minute, though, the visit was canceled; U.S. intelligence agencies had discovered an assassination plot. In a lengthy email, London-based members of the International Islamic Front for Jihad Against Jews and Crusaders, a terrorist group established by Osama bin Laden, urged al Qaeda supporters to “Send Clinton Back in a Coffin” by firing a shoulder-launched missile at the president’s chopper.

    • UK Court rules DRIPA unlawful

      The successful judicial review was brought by Liberty, represented by David Davis MP and Tom Watson MP, with ORG and PI acting as intervenors.

    • How to Create a Burner Account on Ashley Madison (And Other Sketchy Sites)

      In brief, these masked cards are burner card numbers that are linked to your real credit card—but the third-party site will have no access to your personal information (though Abine will have all your data stored—so, just hope they don’t ever get hacked). A masked card lets you use any name you want (e.g. Joe Smith, Kevin Bacon, Barack Bush—go nuts), and for the billing address, you just use Abine’s address in Boston. The cost on your real credit card will just show up as “Abine” on your card statement.

    • Facebook founder Mark Zuckerberg moves step closer to becoming world’s richest person
  • Civil Rights

    • Woman recruited by Google four times and rejected, joins suit
    • “Between the World and Me”: Ta-Nehisi Coates Extended Interview on Being Black in America

      We spend the hour with Ta-Nehisi Coates, author of “Between the World and Me,” an explosive new book about white supremacy and being black in America. The book begins, “Here is what I would like for you to know: In America, it is traditional to destroy the black body—it is heritage.” It is written as a letter to his 15-year-old son, Samori, and is a combination of memoir, history and analysis. Its publication comes amidst the shooting of nine African-American churchgoers by an avowed white supremacist in Charleston; the horrifying death of Sandra Bland, a 28-year-old African-American woman in Texas who was pulled over for not signaling a lane change; and the first anniversary of the police killings of Eric Garner in Staten Island and Michael Brown in Ferguson. Coates talks about how he was influenced by freed political prisoner Marshall “Eddie” Conway and writer James Baldwin, and responds to critics of his book, including Cornel West and New York Times columnist David Brooks. Coates is a national correspondent at The Atlantic, where he writes about culture, politics, and social issues.

    • ‘I will light you up!’: Texas officer threatened Sandra Bland with Taser during traffic stop

      According to newly released police video, a Texas trooper threatened Sandra Bland with a Taser when he ordered her out of her vehicle during a traffic stop on July 10, three days before she was found dead in a county jail.

      Bland — a 28-year old African American woman — was stopped for failing to signal while changing lanes, but the routine traffic stop turned confrontational after the officer, Brian Encinia, ordered Bland to put out her cigarette.

    • In ‘White People,’ an Attempt to Break the Cycle of Ignorance

      It turns out, according to Vargas, that white students are eligible for 96 percent of scholarships and are more than 40 percent more likely to receive private scholarships. As Katy comes to terms with reality, she begins to see her frustrations for what they truly are: resentment about limited resources in the academic arena. The fact that these statistics were so readily available to Vargas also potentially points to Katy’s poor research abilities, which may be a factor in her inability to find scholarships. What is truly frightening—but not at all shocking—is the tendency for the white millennials in the film to place blame on minorities before engaging in critical research to substantiate their beliefs.

    • ‘Selma’ director Ava DuVernay says dashcam video of Sandra Bland arrest was doctored

      Ava DuVernay, who directed the Oscar-nominated civil rights movement film Selma, suggested on Tuesday that the dashboard camera footage of Sandra Bland’s arrest earlier this month was altered.

    • Bernie Sanders becomes the first candidate to speak out on Sandra Bland: “We need real police reform”
    • 1. Whisper to NYT 2. Demand Anonymity 3. Truth!

      Glenn Greenwald (The Intercept, 7/21/15) traces the transmission of a demonstrably false claim–that ISIS’s “top leaders now use couriers or encrypted channels that Western analysts cannot crack to communicate” as a result of “revelations from Edward J. Snowden”–from nameless “intelligence and military officials” to a front-page piece by the New York Times‘ Eric Schmitt and Ben Hubbard (7/20/15) to other journalists gleefully retweeting and reprinting the false claim as fact.

    • The Spirit of Judy Miller is Alive and Well at the NYT, and It Does Great Damage

      One of the very few Iraq War advocates to pay any price at all was former New York Times reporter Judy Miller, the classic scapegoat. But what was her defining sin? She granted anonymity to government officials and then uncritically laundered their dubious claims in the New York Times. As the paper’s own editors put it in their 2004 mea culpa about the role they played in selling the war: “We have found a number of instances of coverage that was not as rigorous as it should have been. In some cases, information that was controversial then, and seems questionable now, was insufficiently qualified or allowed to stand unchallenged.” As a result, its own handbook adopted in the wake of that historic journalistic debacle states that “anonymity is a last resort.”

    • “Your Border War Stuff Is Ridiculous”: Fox’s Stossel Demolishes O’Reilly’s Anti-Immigrant Stats from CIS

      Stossel: “You’re Citing Statistics From The Center For Immigration Studies … They Spin Them”

  • Intellectual Monopolies

07.22.15

Links 22/7/2015: Kodi 15.0, MKVToolnix 8.2.0

Posted in News Roundup at 8:48 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • 6 Things You Learn Preserving America’s Past

    The sheer volume of paper out there means that there’s simply no way that archivists have been able to go through everything. Some boxes haven’t been opened since the 1800s, and we may never have any idea what these things are. See, archivists need permission to go through material like that. To do so, you need to tell the higher-ups specifically where you want to look and what you’re looking for. You can’t simply start randomly spelunking in piles of government papers — the files will get messed up even worse than they are now. Somewhere in our records are papers that could change what we know about the history of our country. Every archivist knows this. But we need to get through everything first, and with mundane governmental papers taking priority (looking at you, Veterans Affairs), archivists rarely get the chance to discover new things.

  • Science

    • Studies find genetic signature of native Australians in the Americas

      The exact process by which humanity introduced itself to the Americas has always been controversial. While there’s general agreement on the most important migration—across the Bering land bridge at the end of the last ice age—there’s a lot of arguing over the details. Now, two new papers clarify some of the bigger picture but also introduce a new wrinkle: there’s DNA from the distant Pacific floating around in the genomes of Native Americans. And the two groups disagree about how it got there.

  • Security

    • Security updates for Monday
    • Why DANE isn’t going to win

      1024 bit RSA keys are quite common throughout the DNSSEC system. Getting rid of 1024 bit keys in the PKI has been a long-running effort; doing the same for DNSSEC is likely to take quite a while. Yes, rapid rotation is possible, by splitting key-signing and zone-signing (a good design choice), but since it can’t be enforced, it’s entirely likely that long-lived 1024 bit keys for signing DNSSEC zones is the rule, rather than exception.

    • RealVNC: more open remote access protocols will increase security

      Yes but RFB 5 is new… and it’s a closed, secret, previously unpublished protocol (unlike earlier RFB 3.x versions).

      Hmm, still doesn’t sound very secure.

      Security in remote access solutions will always be a concern for some it’s true.

    • I worked at #HackingTeam, my emails were leaked to WikiLeaks and I’m ok with that

      Is radical transparency the best solution to expose injustice in this technocratic world, a world that is changing faster than law can keep up with?

      That question became even more relevant to me, a privacy activist, when I found myself in the Wikileaks archive, because I worked at Hacking Team 9 years ago.

      [...]

      This is a leak in the public interest, and I really feel that the personal and corporate damage is smaller than the improvement our society can gain from it. But to reach such an improvement, we have to focus on the bigger picture rather than getting distracted by the juicy details.

    • Hackers Remotely Kill a Jeep on the Highway—With Me in It

      Immediately my accelerator stopped working. As I frantically pressed the pedal and watched the RPMs climb, the Jeep lost half its speed, then slowed to a crawl. This occurred just as I reached a long overpass, with no shoulder to offer an escape. The experiment had ceased to be fun.

      At that point, the interstate began to slope upward, so the Jeep lost more momentum and barely crept forward. Cars lined up behind my bumper before passing me, honking. I could see an 18-wheeler approaching in my rearview mirror. I hoped its driver saw me, too, and could tell I was paralyzed on the highway.

    • 470,000 Vehicles At Risk After Hackers “Take Control & Crash” Jeep Cherokee From A Sofa 10 Miles Away
  • Defence/Police/Secrecy/Aggression

    • Mental Illness Doesn’t Explain Mass Violence–but Neither Does ‘Islamic Extremism’

      With the latest mass shooting in Chattanooga, corporate media followed the usual pattern of being ready and willing to label violence as “terrorism” so long as the suspect is Muslim—e.g., Time‘s report on the shooting, “How to Stop the Next Domestic Terrorist” (7/20/15)—despite questions occasionally raised about whether “terrorism” is the appropriate frame to describe attacks on military installations (e.g., Slate, 7/17/15).

  • Transparency Reporting

    • 800 years post Magna Carta: Why no equal justice for all whistleblowers?

      IN LIGHT OF the Magna Carta’s 800th birthday and what modern democracy is based on today, is there really equal justice for all?

      Whistleblowers Julian Assange and Edward Snowden are wanted. Chelsea Manning and Jeffrey Sterling are in gaol. John Kiriakou recently released from gaol. Thomas Drake and David Petraeus free. Free? If they all leaked classified information why are two free?

      Let’s look at each case pertaining to these whistleblowers apart from the Assange and Snowden cases.

  • Environment/Energy/Wildlife

  • Finance

    • Toshiba CEO quits over accounting scandal

      Toshiba Corp’s (6502.T) chief executive Hisao Tanaka and a string of other senior officials resigned on Tuesday for their roles in the country’s biggest accounting scandal in years.

      Tanaka will be temporarily replaced by Chairman Masashi Muromachi after an independent inquiry found the CEO had been aware the company had inflated its profits by $1.2 billion over a period of several years.

    • Greek Prime Minister Asked Putin For $10 Billion To “Print Drachmas”, Greek Media Reports

      Back in January, when we reported what the very first official act of open European defiance by the then-brand new Greek prime minister Tsipras was (as a reminder it was his visit of a local rifle range where Nazis executed 200 Greeks on May 1, 1944) we noted that this was the start of a clear Greek pivot away from Europe and toward Russia.

    • Prof. Wolff joins The Big Picture RT’s Thom Hartmann: “Is China’s Bubble About To Burst? Look Out US!”

      Prof. Wolff joins The Big Picture RT’s Thom Hartmann to discuss the latest on China. China – the world’s second biggest economy – recently saw its stock market plummet 30 percent in a month. Does this mean that next big economic crisis is right around the corner?

  • PR/AstroTurf/Lobbying

    • Five Times Local Media Exposed ALEC’s Secretive Agenda

      On July 22, the American Legislative Exchange Council’s (ALEC) annual meeting will once again see corporations and state lawmakers gather to discuss and vote on model legislation meant for introduction in state legislatures across the country. On the eve of the three-day conference in San Diego, Media Matters looks back at five examples of great reporting by local news teams who pulled back the curtain and held ALEC accountable for hosting lobbyists and legislators in secret meetings — where they wrote corporate-supported bills blocking minimum wage hikes, attacking unions, and eliminating environmental regulations — and previews this year’s agenda.

  • Privacy

    • High Court Rules UK’s Surveillance Powers Violate Human Rights

      UK’s High Court found the rushed Data Retention and Investigatory Powers Act (DRIPA) to be illegal under the European Convention on Human Rights and EU Charter of Fundamental Rights, both of which require respect for private and family life, as well as protection of personal data in the case of the latter.

    • Snowden to the IETF: Please make an internet for users, not the spies

      NSA whistleblower Edward Snowden has urged the world’s leading group of internet engineers to design a future ‘net that puts the user in the center, and so protects people’s privacy.

      Speaking via webcast to a meeting in Prague of the Internet Engineering Task Force (IETF), the former spy talked about a range of possible changes to the basic engineering of the global communications network that would make it harder for governments to carry out mass surveillance.

      The session was not recorded, but a number of attendees live-tweeted the confab. It was not an official IETF session, but one organized by attendees at the Prague event and using the IETF’s facilities. It followed a screening of the film Citizenfour, which documents the story of Snowden leaking NSA files to journalists while in a hotel room in Hong Kong.

    • The Biggest Mistake AshleyMadison Customers Made: Using Their Credit Cards

      Digital extortionists are holding the sexual profiles of potentially 37 million adulterers hostage after a breach of infidelity website AshleyMadison.com. In a ransom message published on the site’s homepage today, the hackers threaten to publish reams of private information unless AshleyMadison.com and its peer site, EstablishedMen.com, are taken offline. Among that information, the message states, are “all customer records” including “real names and addresses.”

    • Organizational Doxing of Ashley Madison

      The — depending on who is doing the reporting — cheating, affair, adultery, or infidelity site Ashley Madison has been hacked. The hackers are threatening to expose all of the company’s documents, including internal e-mails and details of its 37 million customers. Brian Krebs writes about the hackers’ demands.

    • Andrés Iniesta loses Instagram account to Andrés Iniesta, Instagram apologises to Andrés Iniesta

      Instagram has apologised after it handed control of a Spanish user’s account over to a Barcelona football player with the same name.

      Andrés Iniesta, from Madrid, is the holder of the @ainiesta Instagram account. Andrés Iniesta, from Fuentealbilla, is the captain of Barcelona football club. The former Iniesta woke up on Wednesday to find that access to his Instagram account was blocked.

  • DRM

  • Intellectual Monopolies

    • Copyrights

      • If The UK Wants People To ‘Respect’ Copyright, Outlawing Ripping CDs Is Probably Not Helping

        We had two separate stories late last week about copyright issues in the UK, and it occurred to me that a followup relating one to the other might be in order. The first one, from Thursday, was about the UK’s plan to try, once again, to push a new “education campaign” to teach people that “copyright is good.” We’ve seen these campaigns pop up over and over again for decades now, and they tend to lead to complete ridicule and outright mockery. And yet, if you talk to film studio and record label execs, they continually claim that one of the most important things they need to do is to teach people to “respect” copyright through education campaigns.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts