08.12.15
Posted in News Roundup at 3:01 pm by Dr. Roy Schestowitz

Contents
-
The Community School of Excellence (CSE) in Saint Paul, Minnesota, provides something unique to the open source world: a Linux club based in a Hmong charter school. One could say that our club, the CSE Asian Penguins, provides a dose of diversity to the Linux community, which does not have many Hmong participants (although we keep looking for them!).
-
Desktop
-
Choice has always been one of the best things about desktop Linux, but it can also be confusing to newcomers as they try to find the desktop environment that suits them best. Fortunately, PC World has a roundup of seven of the top Linux desktop environments that should be helpful to anyone trying to find the right one for their Linux computer.
-
That’s pretty much “everything you do, say, and write.” Some other tidbits from freemansperspective.com include:
* Windows now has a device encryption feature, but they keep a copy of your recovery key, stored in their (very secure, trust us) “cloud.”
* The also grab “data about the networks you connect to.” I interpret that as, “All your networks are belong to us too.”
* “[W]e will access, disclose, and preserve personal data, including your content (such as the content of your emails, other private communications, or files in private folders), when we have a good faith belief that doing so is necessary.”
-
Server
-
You’ve been telling us that you want Docker to be more extensible and composed of smaller, standalone components. We hear you loud and clear. In June, we announced our intention to release runC as a separate piece of plumbing. With this release we’re taking another step towards that goal. The system powering image signing has been implemented as a separate piece of plumbing called Notary, and volume plugins, an experimental feature in 1.7, has now been promoted to the stable release.
-
This year, LinuxCon and ContainerCon attendees will have the opportunity to hear Jerome Petazzoni speak on Docker, Containers & Security: State Of Union. Jerome works at Docker Inc., where he helps others to containerize all the things. Jerome has worked in miscellaneous technical fields, including VOIP, embedded systems, web hosting, virtualization and cloud computing.
[...]
From a high-level point of view, containers look like lightweight virtual machines. You can install whatever you want in a container, independently from (and without affecting!) other containers or the host environment. Each container has its own network stack, process (PID) space, file system, etc. And their footprint is significantly smaller than VMs: containers start faster, and they require less memory and disk space. This is because from a low-level point of view, containers are just regular processes on the host machine, using kernel features like namespaces and control groups to provide the isolation. Starting a container is just starting a regular UNIX process; creating a container is just cloning a snapshot of a copy-on-write filesystem (which is extremely cheap nowadays, both in time and disk usage).
-
Kernel Space
-
Founding Dronecode members include 3D Robotics, Baidu, Box, DroneDeploy, Intel, jDrones, Laser Navigation, Qualcomm, SkyWard, Squadrone System, Walkera, and Yuneec. Dronecode includes the APM/ArduPilot UAV software platform and associated code, which until last year was hosted by 3D Robotics, a world leader in advanced UAV autopilot and autonomous vehicle control. Today the project coordinates and prioritizes funding for five other initiatives with backing from 28 member organizations all committed to collaborating on a de facto standard platform for consumer and commercial drone/robotics open projects.
-
-
Today was my last day at Akamai. It’s been brief (Just over seven months), but things weren’t really working out for me there for a number of reasons. I’ve mentioned to a number of people who have known about my decision for a while, that it’s not that it’s a bad place to work, but it never felt like a good fit for me, and I came to realize that I’ve spent most of this last year being in denial of just how unhappy I was, in the hope “things would get better”.
-
Graphics Stack
-
NVIDIA announced from SIGGRAPH the release of this NVIDIA Linux Graphics Debugger to profile, optimize, and debug OpenGL 4.2/4.3/4.4/4.5 applications. There’s realtime viewing of draw calls, examining the GPU pipeline state, and identifying performance bottlenecks and GPU utilization.
-
The GeForce GTX 980 Ti was launched earlier this summer and then towards the end of July the review sample had finally arrived. The GeForce GTX 980 Ti is a upgrade over the original GeForce GTX 980 that launched last September. The GTX 980 Ti has 6GB of GDDR5 video memory versus 4GB with the original GTX 980, 2816 CUDA cores versus 2048, 384-bit memory bus rather than 256-bit, 176 texture units versus 128, and 96 ROP units versus 64.
-
-
Applications
-
Kartesio is not based on KDElibs anymore. I made this choice basically for two reasons: the main one is that I wanted Kartesio to run easily also on Windows, and KDElibs building is way too much complex for my taste. The second reason is that KDE developers seemed not particularly interested in Kartesio: maybe that’s because this program is designed for science laboratories (in high schools and universities, for example) and this is a way too limited set of users for KDE Edu. Obiously, it’s still a program meant to be used on KDE when possible (I’m using Oxigen icons to give that wonderful KDE feeling). But if you really want to use it without KDE, it’s not a problem anymore.
-
And finally, the last major feature available in FrostWire is the ability to easily share content with your friends or between multiple devices (such as your desktop and Android device) – for how to send files from an Android device to a desktop, see THIS video. It’s important to mention that once you share a file, it’s available to everybody on the BitTorrent network so keep this in mind before using this feature.
-
As you may know, Subversion (SVN) is an open-source versioning and revision control system developed by Apache, similar to Git.
The latest version available is Subvertion (SVN) 1.8.14, which has been released a while ago, coming with changes.
-
As you may know, Smuxi is an open-source IRC IRC, Twitter, XMPP and JabbR client developed in GTK+3. Among others, it has support for notifications, integrated spell checking, unified nickname colors, browser mode, word completion, full keyboard control, word wrapping, clickable URLs, intentation and full screen mode.
-
Kodi, a media player and entertainment hub that used to be named XBMC up until a few months ago, is preparing another major upgrade, and developers have released a Release Candidate for the 15.1 version.
-
Instructionals/Technical
-
Games
-
There was a time years ago when Linux and gaming weren’t fit to be in the same sentence. I first made the jump to Linux around the late ’90s with a copy of Doom II. There were glitches at times: the occasional crash, loss of sound and lack of some features. The flaws of the Linux version in contrast to its Windows counterpart turned me away from Linux gaming at first.
-
GOG have officially supported Linux for just over a year, and to mark the occasion they have worked out new official installers for all their Linux games.
-
-
Desktop Environments/WMs
-
Linux is all about choice, and choosing a distribution is only the first step. Linux distros usually have a default desktop environment, but there are a slew of desktop environments available to use. Heck, Ubuntu alone offers nine official alternate “flavors” with different desktop configurations.
-
K Desktop Environment/KDE SC/Qt
-
This release of Plasma brings many nice touches for our users such as much improved high DPI support, KRunner auto-completion and many new beautiful Breeze icons. It also lays the ground for the future with a tech preview of Wayland session available. We’re shipping a few new components such as an Audio Volume Plasma Widget, monitor calibration tool and the User Manager tool comes out beta.
-
When we started the compositing work in KWin the only way to initialize an OpenGL context was by using GLX. In fact GLX is even part of the OpenGL library on Linux. Being an X11 window manager and an X11 compositor it was not a big problem.
-
Work is underway on getting AppStream to work for Kubuntu and is stepping closer to having full AppStream support in Debian.
AppStream is the FreeDesktop.org specification for sharing of meta-data for application installers / packages between distributions. AppStream is handled well by GNOME / GNOME Software and is getting supported well by a number of different Linux distributions. Kubuntu support has been the latest focus as well as upstream Debian.
-
Kubuntu maintainers have put a lot of work into the project and have managed to backport Plasma 5.3.2 and Frameworks 5.12.0 for the latest Kubuntu 15.04 version of the operating system.
-
-
The Randa Meetings will benefit everyone who uses KDE software. This year, digiKam team will go to Randa meeting to continue and finalize the KF5/Qt5 port.
-
-
The beta is out today of the KDE Plasma 5.4 update, which brings new desktop features to the modern KDE desktop stack.
-
Dolphin has been the default file manager for the KDE desktop since Fedora 10. Other distributions that use KDE as a desktop option also use it as their default file manager. It’s very powerful and provides some very advanced features.
-
Plasma 5.4 has been revealed by the KDE Community, and the developers have made a series of very important changes and improvements that will soon land in the stable branch of the desktop.
-
GNOME Desktop/GTK
-
I’m happy that Jan invited me to the Owncloud conference in Berlin on 28 August, and I will probably go to set the base for files integration, which is the first step and the one we already have code working, and to discuss more and settle some design for the other ideas.
-
-
New Releases
-
The Solus operating system now has a release date, and its developers have made a firm commitment to it. So, if you want to get the stable version of Solus, you’ll have to wait until October 1.
-
We’re still buzzing and recovering from the Black Hat and DEF CON conferences where we finished presenting our new Kali Linux Dojo, which was a blast. With the help of a few good people, the Dojo rooms were set up ready for the masses – where many generated their very own Kali 2.0 ISOs for the first time. But the excitement doesn’t end for us just yet. With the end of the cons, we now find ourselves smack in the middle of the most significant release of Kali since 2013. Today is the day that Kali 2.0 is officially released.
-
The Solus operating system finally has a launch date, but that’s hardly the most interesting news about the project. Its developers have made a few very important improvements to the OS and a number of relevant package upgrades.
-
-
-
Ballnux/SUSE
-
The second milestone for openSUSE’s newest distribution Leap is scheduled for release Sept. 4.
-
The latest information on OpenSUSE Leap is pegging the second milestone on 4 September followed by the beta on 24 September. The freeze is 20 September. The official Leap release is being planned for 4 November at SUSECon Amsterdam.
-
Red Hat Family
-
Red Hat is preparing to launch new training services focussed on helping organisations develop DevOps capabilities, according to the company’s director, consulting and training, for Australia and New Zealand
-
Just after the markets closed Monday, Red Hat (NYSE: RHT) disclosed that it had added Deutsche Bank Chief Information Officer Kim Hammonds to its board of directors.
And she receives a compensation package that includes $550,000 in stock plus cash or stock totaling $92,500 a year.
-
Little did I know that the openness of the Red Hat employees I met on this journey hinted at the cultural experience I would have throughout my internship at the company. My team welcomed me into the group and asked my opinion of possible assignments so they could play to my interests and strengths while giving me opportunities to learn and add value to the team. From the start, my team encouraged me to offer my ideas and to take on tasks I saw needed to be handled. Overall, I’ve really been blown away by the environment, which was so different than what I’ve experienced with previous employers.
-
-
Wall Street analysts polled by Zacks Research have given Red Hat, Inc. (NYSE:RHT) a rating of 1.5 on a consensus basis. Using a simplified scale where 1 is a Strong Buy and 5 a Strong Sell, this is the average number of the 16 brokerages surveyed. The stock had a rating of 1.5 when analyst ratings were averaged three months ago.
-
Red Hat Satellite 6.1 is Red Hat’s systems management solution for managing Red Hat servers and services. It’s not been that long since Red Hat Satellite 6.0 appeared — in September 2014. But, Red Hat’s push into the cloud, DevOps, and containers combined to make the need for an update urgent.
-
Few things in the Linux world evoke a strong reaction like SELinux, the security enhancement for Linux. At LinuxCon, Susan Lauber hopes to soften that response and show people the light. In her talk, SELinux—it’s all about the labels, Lauber will teach SELinux basics and describe why it’s a must-run on your systems.
-
-
-
Fedora
-
Another crucial release of DNF is out with a lot of new features and over 20 bug fixes.
Basic control mechanism for weak dependencies was added. Now you are able to query for all weak dependencies forward and backward way in repoquery and allow/disallow installing weak dependencies through `install_weak_deps` DNF configuration option.
-
The Fedora Project has just announced that the first Alpha release of Fedora 23 is here, and it’s ready for testing. The new version has landed right on time, which is something new for the project.
-
Fedora’s third Flock conference kicked off Wednesday morning with a keynote by Matthew Miller, the Fedora Project Leader (FPL). How’s Fedora doing? Says Miller, “The actual state of Fedora is awesome, we’re doing very well as a project and it’s thanks to all of you.”
Miller says that the project is doing very well, and brought out some stats to prove it – with the caveat that stats can be misinterpreted and “dangerous” if used wrong. After a period of “disconcerting down releases” the Yum connection stats for Fedora 21 and 22 are showing that those releases are back up to the same levels as Fedora 14. Miller also walked through a number of other stats on downloads, and which releases are in use currently.
-
-
-
-
Debian Family
-
Derivatives
-
There are numerous other changes that might not be apparent in the daily operation of a typical user. Technical details of all the changes are listed in the Changelog.
-
Tails, a live system that aims to preserve your privacy and that helps you use the Internet anonymously, has been upgraded to version 1.5 and is now ready for download and testing.
-
Canonical/Ubuntu
-
Today, we’re happy to be open sourcing the biggest piece of our Ubuntu One file syncing service.
The code we’re releasing is the server side of what desktop clients connected to when syncing local or remote changes.
-
-
-
-
-
-
Canonical continues to make improvements to Ubuntu Touch, and a new OTA (over the air) update is in the works. If everything goes well, it should be here in the next couple of weeks.
-
Jorge Castro of Canonical has started coordinating some work around providing newer upstream NVIDIA proprietary graphics drivers for users, primarily Ubuntu gamers.
After being dissatisfied with the performance of the NVIDIA Linux driver as currently packaged on Ubuntu 14.04 LTS, he resorted to using PPAs for getting the newer NVIDIA Linux driver. He’s looking to build on that and to do a better job of testing and making available the newer binary blobs.
-
-
I had a nice email from Jorge Castro of Canonical today, and it seems they are looking at ways for Ubuntu users to get newer Nvidia graphics drivers in an easier fashion.
Currently, if you want to get newer drivers you need to either download them directly from Nvidia, which can get messy and confusing. Or even more annoying is to find a random PPA with more up to date drivers, neither is a very nice option, and it could be made a lot easier for the end user.
-
Ubuntu developers are finally considering making some sort of changes that would allow users of their operating system – especially Nvidia fans – to get access to the latest drivers.
-
Canonical has just announced that Firefox 40.0 is now available in the official repositories for Ubuntu 15.04. Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS.
-
Flavours and Variants
-
This release is a bigger deal for the Bodhi team than our previous update releases have been in the past. The reason for this is because this release is the first to use the Moksha Desktop which we have forked from E17. Because it is built on the rock solid foundation that E17 provides, even this first release of the Moksha Desktop is stable and is something I feel comfortable using in a production environment.
-
-
Joshua Montgomery has this week launched Mycroft a Raspberry Pi open source artificial intelligence system that has been created to play media, controls lights and more.
Mycroft is powered by the Raspberry Pi 2 and Arduino platform, allowing the system to be completely open source yet support a wide variety of applications and has launched the project on Kickstarter.
-
Phones
-
Android
-
-
Google has launched their Android One project last year, but the results were not as good as they expected. What is Android One? Well, that’s basically a program in which Google partners up with OEMs in order for them to manufacture a device which will run stock Android OS. This gives Google the control over software, and it’s also worth mentioning that these devices are extremely affordable, and available in developing markets. The first three Android One handsets were unveiled in India, and a number of additional markets followed. The latest Android One handset to launch is the i-mobile IQ II which launched in Thailand, and Lava Pixel v1 was announced at the end of last month in India.
-
-
-
-
-
-
-
-
-
Android smartphones and tablets are great for so many reasons. You can navigate, chat, surf, stream, bump and so much more with such ease.
-
-
-
-
-
-
-
-
-
About 80 percent of Android and iOS users stuck with their respective platforms when upgrading to a new phone, research from CIRP published today found. And that rate has held steady for the past two years, with Android gaining slightly on Apple’s mobile OS.
-
-
It’s now been over three months since I started using the LG G4, see my first impressions, and it has shared time with my T-Mobile SIM in the iPhone 6 Plus. With new phones launching soon it’s time to consider whether or not any other Android phone can trump the LG G4 functionality and value.
-
-
-
Google founders Sergey Brin and Larry Page dropped a bomb late Monday with their announcement of Alphabet, a new umbrella company to oversee the organization’s many different business units. Google remains Alphabet’s biggest individual business, and Page appointed rising star Sundar Pichai to run it.
This is good news for Android and other important Google products.
-
Philips on Tuesday launched two Android-based smartphones in India, dubbed Xenium I908 and Xenium S309, priced at Rs. 11,799 and Rs. 4,999 respectively. While both the smartphones are new in the market, the Xenium I908 has been listed on the company website since December last year.
-
If you’re in the market for a new Android phone or upgrade, this, my friends, is your time. In my six years of covering Android and the mobile space I’ve never seen such incredible phones on offer, at prices that, in many cases, simply seem too low to be true.
-
Moto G has been a joy to test and use. It is lightweight, easy to hold and store in a pocket or purse, and performs nearly as well as many of the premium devices on the market.
Aside from a somewhat beefier processor and a higher-resolution screen, the Moto G could fool many users and experts alike. The new G operates like it is a much more expensive device.
-
Google launched Android Experiments today, the mobile apps counterpart to its Chrome Experiments site.
Just like with Chrome Experiments, the idea behind Android experiments is to showcase apps that use new and cutting-edge technology, aesthetics and interfaces. All of the apps in the Android Experiments Gallery will be open source so other developers can see how they were made.
-
HashPlex is a company that specializes in hosting miner services, allowing home miners access to industry standard electricity rates in order to stay competitive. While their main focus is indeed the mining aspect of Bitcoin, the people over at HashPlex understand the importance of the Bitcoin network, which is especially seen by the debut of their new open source lightning hub. I talked to Bernard Rihn, CEO and founder, as well as Jasper Hugunin, their leading Lightning Dev, over at HashPlex regarding the Lightning Network and Hubs.
-
-
-
Web Browsers
-
Mozilla
-
Mozilla has released Firefox 40 for the Linux platform, and it brings better scrolling, graphics, and video playback performance for this particular operating system, among many other changes.
-
That is one of the most often asked questions, especially after a new CVE like CVE-2015-4495, shows up. This vulnerability in firefox allows a remote session to grab any files in your home directory. If you can read the file then firefox can read it and send it back to the website that infected your browser.
-
Mozilla released Firefox 40.0 yesterday, and it brought a lot of new interesting features for Linux, including a few that haven’t been publicized all that much. One of them is defaulting to the HTML5 video player in YouTube.
-
-
-
As you may know, Firefox 40 has been released today, bringing fixes and new features. Starting with Firefox 41, the users will be able to deactivate the support for unsigned extensions. This features will be enabled by default on FFX42 and newer.
-
-
SaaS/Big Data
-
One of the organizations working on platform infrastructures to support — create, test, deploy and manage — microservices architectures is the Cloud Foundry Foundation. Started in 2015, as an independent not-for-profit 501(c)6 Linux Foundation Collaborative Project, the Foundry currently consists of more than 185 incubating or active projects and is currently being used in hundreds of production environments, including many in the Global 2000. It’s in use at two of the top U.S. telco carriers, two of the world’s top three insurance companies — like AllState, Chase, JP Morgan, SwissCom and Verizon – and at least six Global 500 manufacturing companies, including GE.
-
Oracle/Java/LibreOffice
-
-
Writing mysteries is a lot more fun than the other type of writing I’ve been doing. Recently, I have seen a large-ish uptick in customers reverse engineering our code to attempt to find security vulnerabilities in it. [Insert big sigh here.] This is why I’ve been writing a lot of letters to customers that start with “hi, howzit, aloha” but end with “please comply with your license agreement and stop reverse engineering our code, already.”
[...]
But you know, if Oracle’s strongly-worded letters are written in Davidson’s style, I think I’d quite enjoy the entertainment value.
-
-
Perhaps thinking that all the security researchers in the world were busy recovering from Black Hat and DEF CON and would be somehow more pliant to her earnest message, Mary Ann Davidson wrote a stern message to customers entitled “No, You Really Can’t” (here in Google’s Web cache; it’s also been reproduced on SecLists.org in the event that Oracle gets Google to remove the cached copy). Her message: stop scanning Oracle’s code for vulnerabilities or we will come after you. “I’ve been writing a lot of letters to customers that start with ‘hi, howzit, aloha’,” Davidson wrote, “but end with ‘please comply with your license agreement and stop reverse engineering our code, already.’”
-
While other IT industry heavyweights have embraced bug bounties and working with security researchers more generally, Oracle has set its face in the opposite direction in a blog post likening reverse engineering to cheating on your spouse.
Mary Ann Davidson, Oracle’s chief security officer (CSO), expressed corporate dislike from the software giant for both reverse engineers and bug bounties in a long blog post on Monday. The post was pulled on Tuesday lunchtime, but its contents remain available via the Internet Archive here.
-
Opinion: Stop sending vulnerability reports already. Oracle’s chief security officer wants to go back to writing murder mysteries.
-
BSD
-
OpenSSH 7.0 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support. OpenSSH also includes
transitional support for the legacy SSH 1.3 and 1.5 protocols
that may be enabled at compile-time.
-
-
Public Services/Government
-
The University Hospital of the German city of Freiburg is using open source software for its ‘Cruciate Ligament Rupture Study’, aiming to involve users of smartphones and tablet PCs to share data that will help to improve treatments. The main application is built using ResearchKit, a toolbox for developing medical research software applications.
-
Adullact, the platform for French civil servants working on free software, in June unveiled i-CLEFS, a solution that builds on France’s e-ID to help municipalities offer eGovernment services.
-
Germany’s Minister of the Interior is looking for help with its partly Linux-based IT infrastructure. In July, the Bundesministerium des Innern (BMI) published a request for tender, seeking expertise in SUSE Linux Enterprise Server and prowess in the IT security monitoring using Nagios.
-
The Regionbibliotek Halland (Halland regional library) in the eponymous region in Sweden is developing features for KOHA, the open source library management system, to meet the needs of Sweden’s public libraries. Halland’s regional library switched to using KOHA earlier this year.
-
Openness/Sharing
-
Too much of a good thing can be a bad thing, and nitrate pollution due to agricultural fertilizer runoff is a major problem for both lakes and coastal waters. Assessing nitrate levels commercially is an expensive process that uses proprietary instruments and toxic reagents such as cadmium. But [Joshua Pearce] has recently developed an open-source photometer for nitrate field measurement that uses an enzyme from spinach and costs a mere $65USD to build.
-
Recently I’ve begun volunteering at Idea Fab Labs here in Santa Cruz, with two specific goals — expanding the space to include free/open source software ethos and hacking, and helping all these awesome makers with questions and reality around the open source way.
-
-
-
-
-
-
-
Science
-
For 40 years, computer scientists have tried in vain to find a faster way to do an important calculation known as “edit distance.”
-
Security
-
In 2012, researchers at Radboud University in the Netherlands discovered a security flaw in a common automotive security chip used in theft prevention by Volkswagen, Audi, Fiat, Honda, and Volvo vehicles. But after they disclosed their results to the auto manufacturers—a full nine months before they planned to publish them—the automakers sued to keep them quiet.
-
As if recent research on car hacking wasn’t frightening enough, a new study shows yet another danger to increasingly networked vehicles.
This time around, academics with the University of California analyzed small, third-party devices that are sometimes plugged into a car’s dashboard, known as telematic control units (TCUs).
Insurance companies issue the devices to monitor driving metrics in order to meter polices. Other uses include fleet management, automatic crash reporting and tracking stolen vehicles.
-
BlackBerry has denied rumors that its software might have played a role in the infamous “Jeep hack,” saying it’s “unequivocally” not true.
In July, security researchers revealed that certain cars built by Fiat Chrysler were vulnerable to potentially life-threatening remote attacks, thanks to a flaw in the automaker’s uConnect in-vehicle infotainment system.
The underlying operating system that powers uConnect is QNX Neutrino, a real-time OS that’s made by a BlackBerry subsidiary. On Friday, investment website Seeking Alpha published an editorial questioning whether some kind of flaw in QNX might be implicated in the Jeep hack.
-
A design flaw in Intel’s processors can be exploited to install malware beneath operating systems and antivirus – making it tough to detect and remove.
“It’s a forgotten patch to a forgotten problem, but opens up an incredible vulnerability,” said Christopher Domas, a security researcher with the Battelle Memorial Institute, who revealed the hardware bug at the Black Hat conference in Vegas last week.
-
-
-
One time paswords (OTPs) in conjunction with Basic Auth or some other way to curry the data to the server provides an interesting alternative. In theory, the user could pass the OTP along at the start of the request, the Horizon server would be responsible for timestamping it, and the password could then be used for the duration. This seems impractical, as we are essentially generating a new bearer token. For all-in-one deployments they would work as well as Basic-Auth.
-
Defence/Police/Secrecy/Aggression
-
Conservative opposition to the internationally-negotiated deal to limit Iran’s ability to obtain a nuclear weapon has been the subject of numerous editorials and op-eds in U.S. newspapers that have pushed false information about the agreement and warned that it compromises U.S. and Israeli security, despite widespread praise from nuclear arms control experts who say the deal is “excellent compared to where we are today.”
-
The Ukraine crisis and the attendant confrontation with Russia assume a “phony war” feel these days. As in the perversely calm months between the German invasion of Poland in September 1939 and the Blitzkrieg into the Low Countries the following spring, nothing much seems to be happening.
No one took comfort then—a fog of anxiety suffused everything—and no one should now. One almost prefers it when Washington politicians and other temporarily important people are out there grandstanding and warmongering. At least part of what is occurring is visible, even as the whole never is. Now one sees almost nothing, and we get an idea of what the historians mean when they describe the queasiness abroad during the phony war period.
A formidable file of political, diplomatic and military reports has accumulated by drips and drops of late, and it strongly suggests one of two things: Either we are on the near side of open conflict between two great powers, accidental or purposeful and probably but not necessarily on Ukrainian soil, or we are in for a re-rendering of the Cold War that will endure as long as the original.
One cannot look forward to either, the former being dangerous and the latter dreary. But it has to be one or the other, barring the unlikely possibility that Washington is forced to accept a settlement that federalizes Ukraine, as Europe and Moscow assert is sensible.
It is hard to say when this thought came to me, but it has to be since Secretary of State Kerry’s May meeting in Sochi with President Putin and Sergei Lavrov, his foreign minister. That session seemed to mark a dramatic turn toward sense at the time and won much applause, including here. But things have deteriorated ever since.
[...]
A few days ago came news that American soldiers are to begin training the Ukrainian army this autumn. Given the Pentagon has been training the Ukrainian national guard since April, it is not too much to say Americans have assumed de facto control of the Ukrainian defense apparatus. And no wonder, given the well-known problems of corruption and incompetence in Ukraine’s military and a lack of will among troops when ordered to shoot their own countrymen.
This is the new micro picture. In the course of a few months, Pentagon and State have re-upped their effort to encourage the Poroshenko government to resolve its crisis with rebellious citizens in the east of Ukraine on the battlefield—foursquare in opposition to Franco-German efforts to fashion a negotiated settlement in concert with Moscow. Washington thus fights two fronts in the Ukraine crisis, a point not to be missed.
-
These Google Earth exchanges began when Y.P.G. fighters sent their coordinates to the U.S. military so they could receive supplies, according to Callimachi’s account. That then evolved into airstrike coordination, which has allowed the group to force ISIS out of multiple Syrian locations including Kobani, Tal Abyad, and Hasaka.
-
Lockheed has made itself dominant on Capitol Hill – with defense jobs in virtually every state.
-
Transparency Reporting
-
Three of the four allegations of sexual assault against Wikileaks founder Julian Assange may never be investigated as the time limit required to do so will expire in seven days.
Mr Assange, whose Wikileaks website published thousands of US military and diplomatic documents in 2010, has been living in the Ecuadorian embassy in London since 2012.
-
As pressure builds on Hillary Clinton to explain her official use of personal email while serving as secretary of state, she faced new complications Tuesday. It was disclosed her top aides are being drawn into a burgeoning federal inquiry and that two emails on her private account have been classified as “Top Secret.”
The inspector general for the Intelligence Community notified senior members of Congress that two of four classified emails discovered on the server Clinton maintained at her New York home contained material deemed to be in one of the highest security classifications – more sensitive than previously known.
-
Environment/Energy/Wildlife
-
The engineering deans of Catholic colleges and universities have been meeting annually for the past three years to discuss issues, challenges and trends unique to engineering education in Catholic institutions. As a group of STEM leaders across the country, we use our collective voice to publicly address matters that impact engineering education, or matters in which engineering education may have an impact. As such, our 22-member group feels called to respond to Pope Francis’ “Laudato Si’” encyclical on the environment and human ecology.
-
Finance
-
Google’s Street View cameras have photographed locations across the world, allowing armchair tourists a view of anything from the Tower of London to Tiananmen Square. But one address is notable by its absence. The office building at 2711 Centerville Road in Wilmington, Delaware, a small town just south of Philadelphia, has not been captured by the Street View cameras. And yet this is the official address of Google Inc, the holding company of one of the world’s most successful software groups.
-
Fox News is hyping a report from the conservative American Enterprise Institute (AEI) blaming a marginal decline in restaurant employment in the Seattle-Tacoma-Bellevue metropolitan area on Seattle’s recently-increased minimum wage. The think tank and right-wing media outlet both overstated the significance of a roughly 1 percent change in restaurant employment and focused on apparent job losses in one month while ignoring job gains the following month.
-
It is now over a week since Mark Karpelès was arrested in Japan and one-time Mt. Gox quasi-interim CEO Ashley Barr-alias-Adam Turner held a searing reddit AMA session . The Mt. Gox debacle is taking on some nuance, and the revelations about Karpelès’ bizarre personality might make a halfway decent movie some day, a sort of Wolf of Shibuya with an infusion of 4chanian absurdity: anime, cats, lattes, craven flouting of fiduciary duties and the occasional samurai LARP (Live Action Role Play) .
-
Politics/PR/AstroTurf/Lobbying
-
Presidential candidates usually don’t run on promises to vacate the White House once they get in office, but that’s what Lawrence Lessig said he might do as he begins exploring a protest bid for the 2016 Democratic nomination.
-
Lawrence Lessig, the Harvard professor and cofounder of Creative Commons, announced Tuesday that he is exploring a run for the US presidency as a Democrat. He’s crowdsourcing the campaign, too. “Please give whatever you can,” he said. He wants to raise $1 million by Labor Day.
-
-
Today I announced the formation of a committee to explore my entering the Democratic Primary for President. By Labor Day, I will decide whether a run makes sense.
-
-
Censorship
-
A broad coalition of global tech firms including Google, Facebook, Twitter, Tumblr and Yahoo are protesting a broad injunction that would require search engines, ISPs and hosting companies to stop linking to or offering services to MovieTube. The preliminary injunction requested by the MPAA resurrects parts of the controversial SOPA bill, the tech giants warn.
-
Privacy
-
Am I suggesting that manufactured privacy issues are obscuring real ones? Absolutely. For proof, one needs look no further than last week’s battery brouhaha from a report that noted that websites can track people based on their batteries, skirting opt-in privacy rules that allow battery strength reports to be shared without site visitor permission. For those who bother to read the full report, its details do a wonderful job of establishing that if a site manager wants to invade someone’s privacy, that manager could do far better than peeking at energy levels.
-
Manhattan District Attorney Cyrus Vance Jr. and his counterparts in Paris, London, and Madrid took to the New York Times op-ed page Tuesday morning to pose a flawed argument against default encryption of mobile phones, a service being commercialized and implemented gradually by Apple and Google.
The op-ed misstated the extent of the obstacles to law enforcement, understating the many other ways officials bearing warrants can still collect the information they need or want—even when confronted with an encrypted, password protected device.
The authors failed to acknowledge the value to normal people of protecting their private data from thieves, hackers and government dragnets.
-
The company released its latest transparency report, which now also includes trademark notices and email privacy practices.
-
Civil Rights
-
Molly Redden and Mother Jones have acquired a stash of armored vehicle request documents from police departments all over the nation. The requests are tied to the Department of Defense’s 1033 program, in which military hand-me-downs are given to basically any law enforcement agency that asks for them, whether or not these agencies actually need them.
-
Four white civilians carrying military-style rifles and sidearms walked a riot-torn street in Ferguson, Missouri, early Tuesday, saying they were there to protect a representative from an anti-government website, but their actions drew swift criticism from protesters in the mostly black neighborhood and from St. Louis County Police Chief Jon Belmar, who called their presence “unncessary and inflammatory.”
The appearance of the four men drew stares in the neighborhood, which was rocked by violence again Sunday night as protesters marked the police killing of Michael Brown, an unarmed black teen whose death one year ago reignited a debate on race relations.
The men identified themselves as members of Oath Keepers, which describes itself as an association of current and former U.S. soldiers and police who aim to protect the U.S. Constitution. The group reports having about 35,000 members nationwide and says there are African-Americans among its ranks.
-
Florida man Isiah James served his country for 10 years. He survived two trips to Iraq and one to Afganistan.
Riviera Beach cop G. Wilson took less than 10 minutes to decide that the Army veteran Isiah James didn’t deserve a handicapped sticker.
Isiah’s $800 iPhone 6+ didn’t survive a trip to the Walgreens.
James had family in town on vacation, and father doesn’t drive, so he took father to the store. On his way home, the two man stopped at a Walgreen’s liquor store.
-
Back in May, we wrote about the European Commission’s attempt to put lipstick on the corporate sovereignty pig. Its attempt to “reform” the investor-state dispute settlement (ISDS) system was largely driven by the massive rejection of the whole approach by respondents to the Commission’s consultation on the subject last year. Of the 150,000 people who took the trouble to respond, 145,000 said they did not want corporate sovereignty provisions of any kind. Even the European Commission could not spin that as a mandate for business as usual, and so it came up with what it called a “path for reform” (pdf). By promising to solve the all-too evident “problems” of corporate sovereignty by coming up with something it claimed was better, its evident plan was to include this re-branded ISDS as part of the TAFTA/TTIP negotiations with the US.
-
Intellectual Monopolies
-
Copyrights
-
It appears that the courts are now just piling on when it comes to Prenda Law. In the case of Lightspeed v. Anthony Smith, the court that was one of the first to call out team Prenda for “flat-out lies” and then blasted their weak attempt to plead poverty — leading, instead, to holding Team Prenda in contempt — has struck again. Having lost badly on appeal, the district court slammed the lawyers again, arguing that Team Prenda lied to the court and obstructed the discovery process concerning where they hid their money. It ordered sanctions of $65,263 and asked Smith’s lawyers at Booth Sweet to submit their costs to be added on to the total. Those costs came out to $94,343.51 — and Prenda lawyers John Steele and Paul Duffy complained that the number was unfair.
Permalink
Send this to a friend
08.11.15
Posted in America, Europe, Google, Patents at 10:33 am by Dr. Roy Schestowitz
Protectionism regime has gone metaphysical

Victorian arcade in Manchester
Summary: Today’s roundup of patent news, focusing exclusively on software patents and patent scope, not the scapegoat which is patent trolls
THE patent landscape keeps changing (it’s dynamic just like every law, never static), and the more it’s subjected to public scrutiny, the more likely it is to serve the public’s interests, as opposed to corporate interests (the interests of the tiny minority which is extremely affluent). Today we break down our post into several sections as follows.
Patents Scope in the European Patent Office (EPO)
It has been quite some time since we last wrote about the EPO, but it turns out that the Board of Appeal which Battistelli and his goons try to silently crush (or at least make more subservient) is debating patent scope and doing the right thing sometimes. “The application was refused on appeal for lack of inventive step and lack of clarity,” says IP Kat.
Alicestorm Continues to Eliminate Software Patents
“Let’s hope that Alicestorm will discourage companies, or even patent trolls (JDate has begun acting like one), from blackmailing companies using software patents.”Alicestorm is a term coined to demonstrate just how profound an impact the case of Alice Corp. v. CLS Bank has had on patent scope. “US Pat 6,625,582, Converting future retirement,” wrote Patent Buddy, has just been “Killed by 101/Alice @ CAFC” [with analytics at the Patent Buddy Web site].
Chalk up another defeat for software patents (in CAFC even, despite its notorious patent maximalism).
We recently delved into the bullying (using patents) by the JDate 'meat market'. The company, as it turns out, pursues patents on software, despite lots of prior art and obvious triviality, and then uses these patents to bully competitors, even though a court (after a very expensive legal process) would likely invalidate such patents. It’s like SLAPP-type abuse by JDate. As this very long new article puts it, there is nothing novel here. “Does it change anything if it’s on a computer or the Internet?”
Addressing this question, the author says: “This is the question that has been vexing patent types for some time, but patent experts feel that the Supreme Court finally answered the question last year with the unanimous Supreme Court Decision of Alice Corp. v. CLS Bank Int’l.
“In that case, CLS Bank had software to serve as an intermediary in financial transactions, holding funds in escrow, work that financial intermediaries have been doing as long as humans have traded with money. The Alice Corporation didn’t do any work of that kind and had never created any actual software, but it had a patent describing how it could work using a computer.
“In his opinion on behalf the court, Justice Clarence Thomas wrote, “The relevant question is whether the claims here do more than simply instruct the practitioner to implement the abstract idea of intermediated settlement on a generic computer. They do not.””
Let’s hope that Alicestorm will discourage companies, or even patent trolls (JDate has begun acting like one), from blackmailing companies using software patents.
Facebook’s Surveillance Software Patents
“Facebook Patents Technology That Could Allow Banks And Businesses to Discriminate Based on Social Connections,” according to this article from AOL. A lot of the fury is directed at Facebook’s privacy violations (as if that’s news), but what about the company’s efforts to patent software — patents which the company sometimes bullies with?
What we find scandalous here is that Facebook patents software, but AOL looks at it from another angle. To quote: “Facebook, the website everyone and their sister, brother, cousin, uncle, and friends you didn’t even know you had is a member of just secured a patent on Tuesday that could help filter spam and offensive content and improve searches. Isn’t that great? Less spam and no more nude pics, Obama monkey memes, and tea-billy racist outbursts, but there’s more. A lot more and it’s not good. The technology could also allow lenders to use a borrower’s social network to determine whether he or she is a good credit risk. Let that sink in.
“Got that? Your Facebook friends and their spending habits, credit rating, behavior – hell, maybe even their character, could determine whether or not you get a loan and presumably how much interest is going to be applied to that loan.
Credit where due: “The patent was uncovered by Mikhail Avady, founder of SmartUp, a legal technology company in Atlanta. Fortune, CNN, TNW News, and VB all say they reached out to Facebook for comment, but none have heard back, according to the articles.”
In case it’s not obvious, we discourage the use of Facebook for anything at all. Facebook servers need to be blocked at operating system/router level, permanently. Facebook is an attack on the Web and nobody truly needs Facebook. It’s Facebook that needs people, not the other way around.
‘Trade’ Agreements for Patent Loopholes
We recently wrote about how so-called 'trade' agreements were exploited by software patents proponents in New Zealand. Now we learn that patent ‘reform’ in the US (not really the required reform) is closely connected to other issues such as the so-called ‘trade’ agreements, notably TPP. To quote the Washington Examiner: “The House of Representatives has delayed voting on the Innovation Act, a bill designed to curb patent trolling, until after the August recess. But patent abuse still finds itself part of the legislative discussion, in this case with the Trans-Pacific Partnership (TPP).”
“Only in secret, when few of each country’s richest people collude, can such deals be tolerated.”To quote the key part: “The concern centers on sovereign patent funds (SPFs), government-funded organizations that acquire and leverage patents in pursuit of national economic objectives. Ideally, they should act as one-stop clearinghouses where a person or entity can acquire a bundle of interrelated patent licenses instead of negotiating with every individual patent holder. Given that the average smartphone incorporates as many as 250,000 patents, patent pools provide a function in streamlining access to IP rights.”
Patents are a tool of protectionism, perpetuating injustice and social/financial disparity. Why would any country other than patent glorifiers sign these unacceptable ‘trade’ agreements? Only in secret, when few of each country’s richest people collude, can such deals be tolerated. These people are all traitors to their country, especially to their people.
Google’s ‘Good’ Software Patents
Here we go again. The IEEE, steward of leading international journals that I used to do peer reviews for back in my twenties, is doing some shameless Google PR. The “our [software] patents are good patents” nonsense received coverage from Spectrum. It’s that same tactic that IBM once used as part of its PR strategy, portraying itself as a big friend of GNU/Linux. It is still out there. After setting up OIN (headed by an IBM lawyer) we learned that it was an entity so useless against patent trolls that one may wonder whose interests it really serves. Google is now trying to do the same thing. Google keeps saying it will “help startups” (similar to “think about the children!”) by freeing up its patents, even though (as some sites have pointed out by now, even in the corporate media) this helps in no way against patent trolls, since they basically have no actual products to sue over.
Now that a Google-backed company is finding itself as a victim of patent trolls (new article from corporate media), where is Google to help? Where it Alphabet? Nothing.
“We quickly attracted attention,” said the company. “We were living the American Dream. Until a patent troll — a company whose only business is suing legitimate businesses to force expensive settlements — hit us with a frivolous lawsuit.”
So where is Google with its ‘good’ patents that are intended to help startups? Oh, that’s right, there’s no solution there for patent trolls. This alone (situations such as this) helps justify a patent reform — like those delayed until Congress returns to normal sessions after the summer’s vacation. █
Permalink
Send this to a friend
Posted in GNU/Linux, Microsoft, Vista 10, Windows at 9:21 am by Dr. Roy Schestowitz
“These procedures allegedly included helping the NSA to bypass encryption on the Outlook.com email client; providing the FBI and the NSA with easier access to SkyDrive, Microsoft’s cloud storage service, and helping the NSA to boost their capability threefold to intercept video calls made via Skype.”
Source: Edward Snowden claims Microsoft collaborated with NSA and FBI to allow access to user data
Summary: Microsoft’s unprecedented assault on privacy now targets rivals of Microsoft, not just people used by Microsoft
THERE is something worth noting amid all that Microsoft-manufactured hype about its NSA-centric spyware. There is this ‘article’ which looks like a Microsoft advertisement from UBM, encouraging GNU/Linux users to choose Microsoft as their host. How inane. As we pointed out yesterday, Microsoft wants to expand surveillance beyond Vista 10 (even to predecessors) and do the same to GNU/Linux by becoming a host of GNU/Linux instances. And let’s not put aside all the spyware Microsoft tries to put in Android (even if by patent extortion and/or entryism). It is definitely something to avoid by all means. Windows, in this age of many devices (‘smart’ phones, tablets, boards and “IoT” hype), is gradually slipping away to minority market share. Linux is becoming the dominant platform (kernel at least), not Windows. Looking at tuxmachines.org statistics, in the first week after Vista 10′s release Vista 10 share was at 0.0471%. A week later: 0.092%. Based on the past 2 days’ tuxmachines.org statistics, Vista 10 might finally break a barrier and reach 0.1% by week’s end! That’s hardly a success story, especially considering the lowered cost of Windows (Microsoft does this due to pressure from GNU/Linux).
“What we wrote a year ago about Vista 10 becoming a monstrous surveillance machine (despite Snowden’s revelations) turned out to be correct.”Microsoft gives ‘free’ spyware (Vista 10) to Raspberry Pi 2, after Raspberry Pi was targeted by Microsoft along with other such projects that typically choose GNU/Linux and BSD. Microsoft already eavesdrops (audio/video) on many GNU/Linux users through Skype, but it wants more. The abusive monopoly is hungry for personal, sensitive details. In this age of rising snitchocracy, intercepted secrets are an asset. Ask GCHQ why it intercepted videos (which is still retains) of millions of people, including over 100,000 people masturbating in front of their webcam (codename “Optic Nerve”).
Judging by this new post titled “Windows 10 phones home when you search your start menu, even with Bing disabled”, Vista 10 is malicious spyware even if you disable everything that is associated with spying. What we wrote a year ago about Vista 10 becoming a monstrous surveillance machine (despite Snowden’s revelations) turned out to be correct. Many businesses, as it increasingly becomes more evident (and provable), would blatantly violate agreements with customers if they stay with Microsoft. █
Permalink
Send this to a friend
Posted in News Roundup at 8:15 am by Dr. Roy Schestowitz

Contents
-
Linux has gotten a lot of attention over the last ten years, but certain outdated myths still persist about it. TechRepublic has a list of these myths and explains why they simply aren’t true.
-
Desktop
-
More exciting, however, is that Linux-based operating systems are optional as well. Red Hat Enterprise Linux and Ubuntu can be configured to meet your needs.
-
There was no mistaking the ire in his voice. I pushed him to tell me what he didn’t consider junk. Instead he began walking down the west wall of the shop, pointing repeatedly at desktop after desktop. “Some of these machines are six years old. How are you ‘helping’ anyone by giving them these pieces of garbage?”
The good host was completely gone from me now. All that remained was a dangerous anger I knew I had to control. I asked him just what kind of computers or laptops did he not consider to be junk. I asked him just where I was supposed to get computers that met his approval. I reminded him that we lived and died by the computers businesses and individuals donated, and that we upgraded every computer to its maximum potential before it left our facility.
-
Kernel Space
-
So last week I wasn’t very happy about the state of the release candidates, but things are looking up. Not only is rc6 finally shrinking noticeably, the issues I was worried about had fixes come in early in the week, and so I don’t have anything big pending. Assuming nothing new comes up, I suspect we will end up with the regular release schedule after all (ie in two weeks). Knock wood.
In -rc6 , the diffstat looks a bit odd, in that the ARC arch updates dominate (at around 30% of the diffs). That’s partly because the rest is pretty small, and partly because the llock/scond livelock fix wasn’t tiny. But I don’t find it in myself to worry about it.
Apart from that ARC oddity, things look normal. Mostly drivers (gpu, sound, i2c, input, usb, thermal, you name it) and other architecture updates (mips and sparc). With some filesystem and VM fixes rounding up the changes.
But please go out and test, and make sure all the issues really are solved. Ok?
Linus
-
-
Linus Torvalds just announced a few moments ago that Linux kernel 4.2 RC6 is now out and ready for testing. It’s a much calmer release, and it looks like the cycle is calming down.
-
Ubuntu was the first Linux distribution I installed. During one of our operating system classes, the faculty taught us the steps for compiling a Linux kernel. The idea fascinated me, and I thought of giving it a try. It was my first attempt at kernel compilation.
-
-
-
-
Graphics Stack
-
With The Khronos Group not declaring a new OpenGL version with the arrival of these new extensions, NVIDIA is calling this the “OpenGL 2015″ driver for the new ARB extensions. This new driver also supports the brand new OpenGL ES 3.2 specifications. The updated NVIDIA Linux beta is versioned 350.00.05 and supports the GeForce 400 “Fermi” GPUs and newer.
-
The maintainer of AMD’s HSA Linux kernel driver (AMDKFD) and Pixman is now focusing his work on enabling and optimizing the Linux graphics stack for PowerPC 64-bit LE.
The PowerPC 64-bit Little-Endian mode, as used by POWER8 and the focus of OpenPOWER, is what’s the focus for open-source Linux graphics stack improvements. The AMDKFD and Pixman maintainer, Oded Gabbay, is working on these improvements at Red Hat.
-
In my last post, I mentioned that libvpx had rate control issues; or more accurately, that libvpx as used by VLC (through FFmpeg) had. Seemingly that was actually fixed a while ago by Ilkka Ollakka; VLC now (well, since late 2013) automatically sets half a second VBV by default. I normally use one, but half a second is totally fine, too, and it will keep the bitrate use from spiraling out of control when you switch from e.g. a static slide to a fade.
-
There is indeed the support in place with the latest Git of the open-source AMD Linux driver code.
-
Applications
-
And here we go again! We’re proud to announce the new version of Smuxi, release 1.0 “Finally”. During the development, 20 bug reports and 10 feature requests in 285 commits were worked on.
-
-
-
-
-
As you may know, Phototonic is an image viewer and organizer for Linux systems, created in Qt and C++.
-
Proprietary
-
Reuters is reporting tonight that since Opera missed their Q2 revenue forecasts and cut their full-year guidance, they’re now considering a sale of the company. A strategic review of the situation is expected to conclude by the end of the year. There’s supposedly interest in Opera from “a number of parties.”
-
Instructionals/Technical
-
Games
-
Invisible, Inc., a turn-based strategy game developed and published on Steam for Linux by Klei Entertainment, is now available at a 40% discount. The promotion will end in less than 12 hours.
-
-
Dungeon Defenders II, an action tower defense game developed and published by Trendy Entertainment on Steam, will also get a Linux version.
-
-
The newest game from Paradox Interactive is called Stellaris, and it is developed by the same team who also did the Crusader Kings and Europa Universalis series. Linux has been announced as a launch platform.
-
In recent builds they have moved the save folder to conform to Linux standards (hooray!), improved performance, fixed lots of crashes and more. Remember you can see the changelog at any time here.
-
It’s sad that it seems Valve aren’t supporting their Source Engine developers very well in some cases, and the Insurgency developers are going their own way to support us.
-
-
Any website we track like GOG, Humble, GamersGate, Itch, GamesRepublic, ShinyLoot, Fireflower Games and IndieGameStand has feeds we use, but due to the mentioned issues above with character encodings, sometimes some sales may not appear.
-
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
Packages for the release of KDE’s desktop suite Plasma 5.3.2 and KDE’s Frameworks 5.12.0 are available for Kubuntu 15.04. You can get them from the Kubuntu Backports PPA.
Bugs in the packaging should be reported to kubuntu-ppa on Launchpad. Bugs in the software to KDE.
-
-
GNOME Desktop/GTK
-
It was a bit different from my usual ‘state of the union’ or ‘GTK+ roadmap’ presentations. Instead, I showed a selection of tips and tricks, things you perhaps didn’t know yet how to do with GTK+.
-
Today, I want to seriously finish the works on preferences. I need to have a conversation with my mentor about how we solve that start of the day widget for time displaying, because it still makes me mad! And right after that, I’m turning to plugins, implementing it into the lovely preferences window, with some occasional turns back to editor or search, where I have some (yet!!!) unresolved issues which should be handled to provide GTG 0.4 with full stack of well-working features soon!
-
I wanted to point everyone to Gina’s usability test results (part 1), as part of her internship with Outreachy. Gina has been working on a usability test of GNOME, and in this part of her analysis, Gina provides an overview of the usability test results: what went well, and where testers encountered difficulty.
-
Clasen’s presentation covered scrollbar steppers, context menus on scrollbars, decorative overlays, custom spin buttons, discrete scales, markup in text views, and more.
-
-
-
Reviews
-
Zorin OS 10 Core feels solid, fast, responsive and powerful. I did not experience any crashes or lags when running it in the Live mode.
-
New Releases
-
Because of the low system requrements Linux Lite can be installed and use perfectly without any issue with older hardware too. So if you want to try out Linux being on Windows you can dual boot Windows and Linux Lite or you can install it on your old pc or laptop.
-
Screenshots/Screencasts
-
Arch Family
-
Manjaro 0.8.13 has received its eighth update, and it looks like developers have been quick to add some of the newest packages that landed in the previous week.
-
Red Hat Family
-
The global chief information officer at Deutsche Bank, Kim Hammonds, has been named to Red Hat’s board of directors.
The appointment of Hammonds, who also is co-head of group technology and operations at Deutsche Bank, was announced Monday by the Raleigh-based open source software company.
-
-
The findings on the Internet of Things are particularly notable. IBM, in announcing its new $1 billion commitment to Apache Spark, also emphasized that it is focused on the Internet of Things, with enterprises in mind. As data and analytics are embedded into all kinds of objects and apps as part of the Internet of Things (IoT) push, IBM and Red Hat see enterprises gaining benefits.
-
-
-
Fedora
-
DNF 1.1.0 was released today as the newest version of the Dandified Yum for package management on Fedora systems.
DNF 1.1.0 brings support for the MIPS architecture, changes to RPM installation when running in the strict=0 mode, cosmetic improvements, documentation updates, and other changes.
-
Fedora 23 Alpha is coming next week. Here’s a look at some of the new features to find with Fedora 23.
-
We had a late-breaking problem with the cloud image and some drama with desktop wallpaper and with booting KDE on ARM, but the various groups involved in release logistics wrangled solutions and workarounds, so at today’s “Go/No-Go” meeting, we approved the Tuesday release. If you’re curious, see the meeting minutes for the process that Fedora goes through to make sure the release is ready.
-
-
Debian Family
-
As you might have noticed, Debian sid is currently largely uninstallable, due to the GCC 5 transition, which also can be see in our reproducibility test setup. Please help!
-
Derivatives
-
For those who are starving for some updates while the big gcc5 transitions brings the rest of Debian/sid to a halt, here is some fresh meat, a new TeX Live checkout. Nothing spectacular new here, just the usual big bunch of updates of and several new packages. Maybe worthwhile mentioning is that luasseq has been reincorporated into the TeX Live packages. Thanks to the maintainer for his work till now!
-
Canonical/Ubuntu
-
-
-
BQ has finally made its Ubuntu smartphone available in the US — but the handset doesn’t have 4G LTE, and it also won’t be compatible with the 3G bands in use.
-
A single Cinder vulnerability has been found and repaired in Ubuntu 15.04 (Vivid Vervet) and a new patch has been made available in the official repositories.
-
The Ubuntu Touch operating system will arrive in India in a couple of week aboard the BQ Aquaris E4.5 and BQ Aquaris E5 phones.
-
When a new version of Ubuntu is released, commercial packages in the software center must be thoroughly checked for compatibility issues (the major open-source packages in the repos are audited before the distro version is upgraded). This introduces a bottleneck, with some applications waiting for months before they can be included in the store.
-
-
Plex Media Server, a piece of software that allows users to play movies and TV shows on the computer and to connect to devices like smart TVs or tablets, has been upgraded to version 0.9.12.8 and is available for download.
-
The BQ Aquaris E4.5 and E5 with Ubuntu Phone will soon launch in India, likely later this month. These phones will be preloaded with the “vanilla” Ubuntu Phone but there will be an Indian-specific App Store and India-related Scopes.
-
-
-
-
-
Flavours and Variants
-
ExTiX 15.3 64-bit, a distribution based on Ubuntu 15.04 that uses the LXQt desktop environment, has been officially released and is now ready for download and testing.
-
-
-
Phones
-
Tizen
-
-
-
-
Are you a developer? Based in China? Who wants to learn more about coding for the Tizen Operating System (OS)? Great. Make sure you are available for the Tizen Devlab that is coming to Shenzhen, China, on Saturday, August 22, 2015 between 9:00 AM to 5:00 PM. The locations of the event will be the Shenzhen Langham Hotel (Shenzhen East Langham Hotels), Futian District, Shenzhen Shennan Road No. 7888 (Agriculture Xuan Hong Lin Road and Road intersection), Shenzhen.
-
Android
-
BlackBerry will likely release its first-ever Android phone later this year and now CrackBerry has posted some new leaked photos of the new device. Among other things, it looks like the new phone will feature an Android version of the BlackBerry Hub messaging center and an 18-megapixel camera.
-
Rumors have been swirling about an Android-powered BlackBerry for months, and now we may have our first look at it.
-
-
-
Google is planning a major reset of Android One in India as well as a massive investment in coming years to boost connectivity in the country.
-
-
-
-
-
-
-
-
A recent SMS vulnerability affects millions of Android smartphones. Jack Wallen explains the flaw and offers up a temporary (although not perfect) solution.
-
-
-
-
Over the weekend, owners of the One M8 learned some frustrating news, as HTC’s Mo Versi tweeted that the Sense 7 update will be tied directly to the release of Android M. Back in April, HTC UK declared on Twitter that Sense 7 would roll out in August.
-
“In a nutshell, advanced attackers could exploit this arbitrary code execution vulnerability to give a malicious app with no privileges the ability to become a “super app” and help the cybercriminals own the device,” said Or Peles, security researcher at IBM’s X-Force application security research team.
-
Smartphone security called into question by researchers who discovered fingerprint data and sensors are often ‘world readable’ and easy to hack
-
-
-
-
Following the popular Apple Pay and the recently introduced Samsung Pay, there soon will be an Android Pay. Meanwhile, LG’s Nexus 5 (2015), which is believed to be the successor to Nexus 6, is the talk of the industry. An earlier report pointed to an advanced fingerprint sensor on the upcoming device; now a new report from Korea says Google will introduce Android Pay alongside the Nexus 5 (2015).
-
Despite BlackBerry indicating that it has no plans to build a device that runs on Android, some hoped for an about-face abrupt enough to see the popular operating system arrive on the Silver edition of the BlackBerry Passport. That didn’t happen, but a YouTuber is claiming to have loaded the Android OS on the recently launched BlackBerry Passport Silver Edition.
-
A couple of months ago, Google created a visualization tool to understand how neural networks operate. It also open sourced the code for the Deep Dream project, allowing users to run images and video through it to get some interesting results.
-
Almost a year after the release of Google’s latest Android software version, Android Lollipop has received a small bump in the number of consumer devices that have actually got it.
A report from Google shows that the install base of devices running either Lollipop 5.0 or 5.1 has risen to 18.1%, a reasonable increase from the 12.4% share seen in reports this June.
-
As before, we can make out a new curved display design that bears a striking resemblance to the Samsung Galaxy S6 Edge. Samsung may been keen to sell its AMOLED technology to other parties, but it is also possible that LG could be providing the display. A similar looking LG prototype display was spotted behind closed doors earlier this year.
-
But neither one of these two phones was the first Android flip phone. That honor goes to the Sharp Aquos 007SH, which was launched in mid-2011 in Japan, costing the equivalent of $490. And for this amount of money, one got way more than a satisfying slap when hanging up on people. The phone had a 3.4-inch LCD display with 480 by 854 pixels of resolution and, picture this, support for glass-free 3D. In addition, there was a 0.7-inch OLED display on the outer side of the flip. Telling the time and displaying notifications were its jobs. On the back of the Aquos 007SH resided a whopping 16MP camera (remember, this was in 2011) with a CCD sensor. One also got a digital TV tuner, GPS, water-resistance, and Android 2.3 out of the box. Not bad of a package, don’t you think?
-
News broke last week that Apple, Inc. was advertising for an applications SW engineer to work on Android apps, but given Apple’s reluctance previously to provide apps for the rival Android platform, has Apple finally realized that it can’t really on users of the iPhone to cross-sell its other products, such as the Apple Watch?
According to the job listing, Apple is “looking for engineers to help [Apple] bring exciting new mobile products to the Android platform,” with, as 9to5Mac pointed out at the time, new being the only giveaway that Apple was planning to extend its range of Android apps from its current Move to iOS app and forthcoming release of Apple Music for Android.
-
-
-
Sub-notebooks/Tablets
-
Sailfish is a Linux-based operating system with an emphasis on gesture-based navigation (there are no physical navigation buttons), and support for both native apps and some Android apps.
-
Pixar Animation Studios has announced that its proprietary Universal Screen Description (USD) software will be going open source by Summer 2016, providing computer animation studios with an incredibly powerful tool to manage scenes in large scale projects.
-
-
-
-
-
-
In my experience (I was an open source community manager for several years and am deeply embedded in the community of people who do open source outreach), getting people into the funnel for your project as first-time contributors is a reasonably well-solved problem, i.e., we know what works. Showing up at OpenHatch events, making sure the bugs in the bug tracker are well-specified, setting up a “good for first-timers” task tag and/or webpage and keeping it updated, personally inviting people who have reported bugs to help you solve them, etc. If you can invest several months of one-on-one or two-on-one mentorship time, participate in Google Summer of Code and/or Outreachy internship programs. If you want to start with something that’s quantitative and gamified, consider using Google Code-In as a scaffold to help you develop the rest of these practices.
-
Web Browsers
-
Mozilla
-
It has been six weeks since the release of Firefox 39 and today Firefox 40 was pushed to the FTP servers and will roll out to users on August 11. Below is a compiled list of everything new you can expect to see in the release.
-
Mozilla on Friday released security updates to fix a zero-day flaw in the Firefox browser. An exploit that searches for sensitive files and uploads them to a server — possibly somewhere in Ukraine — has surfaced in an ad on a Russian news site, Mozilla reported last week. The exploit impacts Windows and Linux users. Mac users could be hit by a modified version. The vulnerability stems from the interaction of Firefox’s PDF Viewer and the mechanism that enforces JavaScript context separation — the “same origin” policy, Mozilla said.
-
SaaS/Big Data
-
Frank Karlitschek is a free software developer and privacy activist. He’ll be speaking at LinuxCon North America in August of this year. His topic, “Open source, safe and secure; A case for leaving data where it is,” is very timely given the rash of data breaches we’ve witnessed lately.
-
Indeed, modularity is a hallmark of many open source platforms, ranging from Hadoop to Drupal to OpenStack, but it can introduce significant complexity.
-
-
Databases
-
Still, the IT industry harbors misconceptions about how open-source software works, its performance, its benefits and its ROI. eWEEK, with input from open-source PostgreSQL database specialist EnterpriseDB, helps debunk some of the most common open-source database myths, including those about its costs and capabilities.
-
Oracle/Java/LibreOffice
-
For the past several months Caolán McNamara has been leading the charge for adding GTK3 tool-kit support to LibreOffice. With the new LibreOffice 5.0 that initial GTK3 support is in place that also brings initial Wayland support for this open-source office suite.
-
Business
-
-
For small-to-medium-sized businesses, establishing an online presence to sell products or services is an absolute must to stay competitive in today’s (and tomorrow’s) marketplace.
-
FSF/FSFE/GNU/SFLC
-
Project Releases
-
Once a ‘final’ version is released some new bugs and/or problems usually appear out of nowhere, and last release was no exception. Even though tens of thousands of users were already testing the 15.0 version before release, as soon as million started using it, some problems we either did not think of or which we did not notice popped up. To counter some of these new issues, we’re bringing you this maintenance release candidate called 15.1 RC1 which has some additional fixes on top of the 15.0 release.
-
-
Public Services/Government
-
Change management is the key to successfully replacing proprietary software by free and open source alternatives, says Eric Ficheux, IT project manager working for the administration of Nantes. In 2013, France’s sixth largest city began switching to LibreOffice, replacing a proprietary suite of office productivity tools. “Any organisation considering a similar switch should brush up on change management.”
-
Yes. Replacing a non-Free office suite with LibreOffice makes sense. It’s FLOSS. You can run, examine, modify and distribute the software under the accompanying licence. There’s no need to budget for licensing. There’s no contract. There’s no dependency on someone out to get you. LibreOffice is a cooperative product of the world, not enslavement/lock-in/a burden indefinitely. It’s easy too. After all, LibreOffice is descended from StarOffice and OpenOffice.org designed from the beginning to be easy to use even for those familiar with M$’s product.
-
Openness/Sharing
-
Around the world, young people are turning to farming and the food sector as viable career options. However, the next generation of food system leaders often lacks access to the latest data and technologies that are vital to the success of farm businesses. Projects such as Open Ag Toolkit (OpenATK), a new platform for managing agricultural tasks, and FarmBot, an open-source community for small-scale precision farming, are working to democratize innovations in agriculture by improving data transfer and small-scale technologies through open-source models.
-
-
Open Hardware
-
Capable of monitoring Volatile Organic Compounds (VOCs), basic particulate matter, carbon dioxide, temperature and humidity, it takes care of the basic metrics to measure the air quality of a room.
-
Programming
-
That’s right, boys and girls, a compiler with a bigger resident size than Firefox. Three times bigger.
-
Science
-
According to the U.S. Department of Labor, only 26% of people employed in computer and mathematical occupations are women. While that figure may be staggering, I don’t believe the way to fix it is by simply hiring more women. A meritocracy requires that the most qualified candidates are selected for positions in every industry, regardless of gender. But we can level the IT industry’s playing field by educating young women and girls about potential career possibilities.
-
Health/Nutrition
-
Last week, we wrote that among the final obstacles to completing the TPP agreement was the issue of enhanced protection for drugs. More specifically, the fight is over an important new class of medicines called “biologics,” which are produced from living organisms, and tend to be more complex and expensive to devise. The Conversation has a good feature looking at this issue in more detail.
[...]
As that makes clear, data exclusivity is a kind of super-patent in that it can’t be challenged or revoked: if a drug company has run clinical trials to establish the safety of its new drug, it has an absolute and irrevocable monopoly on the use of that data — for five years in the case of Australia, Chile, Singapore and New Zealand. This is obviously an incredibly powerful form of monopoly, so perhaps it’s no surprise that US pharmaceutical companies want TPP to require signatories to grant an even longer period — 12 years of data exclusivity — for biologics.
That’s useful for them, because even after drug patents have expired, and generic manufacturers can theoretically offer the same products without paying licensing fees, there remains the barrier of clinical testing. If the generic manufacturers can’t point to the original clinical trials as proof that the drug is safe, they will need to carry out their own, which will take time and cost money. In practice, they are more likely to wait until the period of data exclusivity is over, effectively extending the original manufacturer’s monopoly beyond that provided by patents alone.
-
Security
-
-
-
A pair of researchers from Trend Micro set up honeypots to look at what kind of attacks are targeting gasoline pumps and related technology.
-
They added that the servers, used by 4,000 government workers, were shut down in response, but that no classified information was seized or compromised during the attack.
-
Does this mean you should go out and buy a new car? Probably not. Now that the technology is readily accessible, I suspect manufacturers will try their damnedest to get workarounds and improvements onto the market in order to prevent the inevitable class-action lawsuits that will result.
-
Cryptolocker comes in a number of versions, the latest capitalising on the release of Windows 10.
-
Defence/Police/Secrecy/Aggression
-
On 9 August 1945, between 40,000 to 80,000 people were killed in the nuclear explosion that left much Nagasaki entirely pulverised.
-
New reports coming out of ISIS territory suggest that they have carried out a mass execution of 300 former employees of the Iraqi Supreme Electoral Commission, with ISIS accusing them of being “infidels.” Some 50 of the slain were reported to be women.
-
It’s no surprise that David Cameron’s five year plan to deal with Islamic extremism at home pins all the blame on the Muslim community.
-
Transparency Reporting
-
Swedish prosecutors’ plan to question WikiLeaks founder Julian Assange at Ecuador’s embassy in London has stalled as Ecuador has demanded Sweden give him asylum as a condition of the meeting, a Swedish official said on Friday.
“You can’t give anyone asylum at another country’s embassy, that’s against international law,” Cecilia Riddselius at the Justice Department said. “If he wants asylum he has to come to Sweden.”
-
The Private Sector Council was established in 2013 to engage businesses and entrepreneurs in promoting open governance, economic growth, and local innovations. The Council forms a group external to the OGP and coordinates private sector participation in OGP.
-
Finance
-
Conservative economics wrecks lives and destroys people: Just look at the impact of brutal UK austerity policies
-
That’s because being poor comes with an unexpected plethora of bizarre side effects, like an intricate chain of dominoes that fall to form a giant dick-shaped torpedo aimed straight at your mental and physical well-being. For instance …
-
The Russians had mined the cinnabar for mercury but the pit had lain abandoned for some time. I was there with a dozen other environmentalists in a training workshop to identify polluted sites. This place certainly qualified. High levels of mercury had been found in the soil of a nearby village; we were there to assess the risk. My biggest concern at the moment, however, was keeping myself from slipping on the icy edge of the mine and falling in. One glance was enough to tell me it was a long way down, and dark.
-
PR/AstroTurf/Lobbying
-
In order to counter what it delicately called “Russian messaging,” the US State Department has announced a $500,000 grant to a non-profit that offers an “innovative” journalist training program for “credible” news reporting in the Baltic states.
Washington has announced, via its embassy in Lithuania, that public and private non-profit organizations have until the end of August to apply for the grant entitled “Investigative Journalism Training to Counter Russian Messaging in the Baltics.”
The program offers financial aid for the training of early-career Russian-language journalists in Lithuania, Latvia and Estonia so they can become providers of a “fact based and credible” take on world events.
-
BuzzFeed News reported that Breitbart.com may be accepting “financial backing” from GOP presidential hopeful Donald Trump in exchange for “fawning headlines,” according to sources inside the conservative outlet.
-
-
Privacy
-
The National Informatics Centre, software solution provider of the government, has withheld information on who altered the Wikipedia page of former Prime Minister Jawaharlal Nehru and posted scandalous information about him on the grounds it may have “security implications”.
-
Call for greater penalties as examples include child protection files left on train, worker using CCTV to watch a wedding and another digging into benefit claims
-
He was fully aware of his statement’s implications.
“I found myself wishing that my life would be constantly and completely monitored,” he continued. “It might seem odd that a self-professed libertarian would wish an Orwellian dystopia on himself, but here was my rationale: If people knew a few things about me, I might seem suspicious. But if people knew everything about me, they’d see they had nothing to fear. This is the attitude I have brought to SIGINT work since then.”
When intelligence officials justify surveillance, they tend to use the stilted language of national security, and we typically hear only from senior officials who stick to their platitudes. It is rare for mid-level experts — the ones conducting the actual surveillance — to frankly explain what they do and why. And in this case, the candid confessions come from the NSA’s own surveillance philosopher. The columns answer a sociological curiosity: How does working at an intelligence agency turn a privacy hawk into a prophet of eavesdropping?
-
Civil Rights
-
Did you hear the one about the cops not wanting to use a store’s surveillance tape to help solve a crime?
Who could blame these Santa Ana cops? Video shows them smashing surveillance cameras, badmouthing a woman in a wheelchair, and perhaps even munching on marijuana-infused products after they stormed a medical marijuana shop in Southern California, which was being investigated for allegedly operating unlawfully in the city.
Three of the unidentified cops are demanding that a judge block the police department from using the tapes against them as the department investigates the officers’ conduct during the May raid. The cops at the center of the investigation say the Sky High Medical Marijuana Dispensary illegally recorded them because the officers believed they had disabled all the store’s cameras and therefore had an expectation of privacy “that their conversations were no longer being recorded,” according to the cops’ Aug. 5 lawsuit. (PDF) The suit says the tapes were also “edited” and cannot be relied upon.
-
The death of an unarmed white teenager who was shot by a white police officer in South Carolina has sparked a debate as to why the incident has not generated the same outrage as the deaths of other unarmed black Americans.
Zachary Hammond, 19, was on a date with Tori Morton, 23, when he was shot twice in the back by a police officer last month.
-
Mother Jones obtained more than 450 police department requests for armored tactical vehicles from the Pentagon. Did your police force request one? Browse all of them here.
One year ago this week, hundreds of camouflaged officers in Ferguson, Missouri bore down on residents protesting the police shooting of an unarmed black teenager named Michael Brown.
-
A University alumnus was removed from his position as ethics director of the American Psychological Association last month after an independent review alleged that he collaborated with the Department of Defense to enable torture.
-
German prosecutors have dropped a much-criticised treason investigation into two journalists who reported on secret plans to expand online surveillance in the country.
Prosecutors notified Netzpolitik.org in July that its founder, Markus Beckedahl, and fellow journalist Andre Meister were under investigation, triggering widespread criticism from free-speech advocates. The website specialises in coverage of online privacy and digital culture.
-
U.S. prosecutors want Ali Charaf Damache in the worst way.
An Irish resident originally from Algiers, Damache, 50, is accused of using online chat rooms to recruit American women into a would-be terrorist cell operating in this country and Europe.
One man and two women, including Damache’s wife, have already been convicted in U.S. courts of providing material support to terrorists. And Damache was captured by Irish authorities in 2010 in Dublin on a separate charge of making a telephone death threat and held without bail.
-
A renewed push by the White House to close the prison at Guantanamo Bay, Cuba, has been bogged down by an internal disagreement over its most controversial provision — where to house detainees who will be brought to the United States for trial or indefinite detention, according to U.S. officials.
-
The Defense Department expects to present a plan to close Guantanamo Bay to lawmakers after the August recess, a spokesman said on Monday.
-
Defenders of press freedom have accused the Pentagon of endangering journalists with new legal guidelines that liken war correspondents to spies and say they can be treated as “unprivileged belligerents” in some circumstances.
-
Internet/Net Neutrality
-
This misconception owes to mobile carriers’ longstanding practice of offering discounts on phones for customers who agree to a two-year contract. For years, the deal was generally this: You go to a company like Verizon or AT&T, you sign some paperwork locking yourself into 24 months of wireless service, and Verizon or AT&T gives you a shiny new phone at a subsidized price—or even free, if you opt for less than the very best hardware.
-
Rosanne Siino finds it amusing when students interrupt one of her lectures at Stanford University to ask: “So, what is Netscape?”
“Wow, how long has it been?” Siino, one of the first hires at Netscape, recalls telling a student. “Boy, you have no idea how much the world changed just before you were born.”
It was 20 years ago today that Netscape went public, setting off what we now know as the first dot-com boom.
-
We’re in the runup to the 20th anniversary of the “Netscape Moment” of 1995, the day when a California startup’s eye-popping market debut illuminated the World Wide Web for millions of people otherwise only vaguely familiar with its potential and promise.
-
Intellectual Monopolies
-
Copyrights
-
“Jay Z spent $100 million of his own money to build his own service. We have to show support for artists who are trying to own things for themselves,” singer says of joining Tidal
Two days after Prince announced that he would release his new album HitNRun exclusively to Tidal, the singer revealed the reason he is sidestepping a record label and offering the LP directly through Jay Z’s streaming service. “Record contracts are just like — I’m gonna say the word – slavery,” Prince said. “I would tell any young artist… don’t sign.”
-
In its ongoing war against online piracy, the MPAA is currently hoping to recruit a software developer. The Hollywood group is looking for savvy candidates who can help develop data gathering tools for enforcement purposes and to monitor, investigate and report on copyright infringement.
-
Several users of popular porn streaming site Pornhub have received settlement demands for thousands of dollars after uploading videos to the site without obtaining permission. How the users are being tracked down by the copyright troll involved remains somewhat of a mystery, but several theories persist.
-
Hollywood studio Warner Bros. and the Tolkien Estate are cracking down on a British couple building a “Hobbit house” campsite. The pair are being forced to change the project’s name and remove all Hobbit references from their Kickstarter campaign. According to Tolkien’s lawyers even words that rhyme with Hobbit are not permitted.
Permalink
Send this to a friend
08.10.15
Posted in GNU/Linux, Microsoft, Vista 10, Windows at 3:35 pm by Dr. Roy Schestowitz
Officially becoming a malware company, expanding beyond patent racketeering and political blackmail

The Microsoft apologists insist that privacy is dead, giving Microsoft the carte blanche
Summary: The villainous side of Microsoft comes out more bluntly, as any regard for privacy is dismissed as irrelevant, private networks are becoming Microsoft’s playground, Windows silently but remotely gains more malicious antifeatures (with the hallmark of espionage), and the same rogue operations are extended to Android and GNU/Linux (if Microsoft can gain a foothold there)
THE TERM “Vista 10″ has been catching on (many people use it now) and the wiki page for Vista 10 has had nearly 3,000 page views since Vista 10 was released (that’s when the page was first set up). Since then we have seen GNU/Linux-centric authors writing about Vista 10 (there are two examples today [1, 2]), but we don’t see what the big deal is. Here in Techrights, having accumulated data over the past 8 days, only 0.7% of visitors used Vista 10 (we checked the back end, which strictly retains logs for no longer than 4 weeks) and some other Web-wide surveys put it at around 3%, contradicting popular lies about adoption rates of this seemingly gratis ‘upgrade’. Vista 10 is a huge disappointment for Microsoft, but the company will never publicly admit it (we know what people from the inside, i.e. Microsoft employees, think because we confidentially hear from some). There is a massive budget dedicated to manufacturing bogus (sometimes pre-prepared or ghostwritten by agencies) ‘reviews’ and praises of Vista 10. It’s peaking right now, so it may take some time for the ‘hangover’ (real users’ feedback) to truly show up and dominate the Web. It was the same when Vista 8 was released, never to be widely adopted at all, just loathed (the boss got fired, too).
“There is a massive budget dedicated to manufacturing bogus (sometimes pre-prepared or ghostwritten by agencies) ‘reviews’ and praises of Vista 10.”Today’s article is not a rant about Vista 10 but a survey of recent revelations and key articles, as opposed to puff pieces (there are plenty of those because the release is relatively recent, meaning that the marketing budget has not been exhausted just yet). As we are going to show, Microsoft is seemingly coordinating a response to criticism, almost as if it sends talking points or memos to ‘buddies’ in order to confuse the public and berate critics.
Microsoft Abuse
Several authors (Linux-centric people on the Web) told me that they get abused for criticising Vista 10 and I too received many personal insults, none of which address anything that I wrote but instead are an attack on character. These come from people whom I never heard from or heard about. Remember that Microsoft recently got caught paying for abusive AstroTurfing of this kind (planting comments). Showing the ‘smoking guns’ is hard unless whistleblowers come out (as some recently did, acknowledging that Microsoft pays them to game Reddit).
Microsoft Crowd Says Privacy is Dead
We kindly ask readers to inform us if they see the following rather terrible ‘damage control’ from Microsoft. Here is Microsoft’s response to allegations over privacy violations. It goes along the lines of, “if they ask, we give. Erk. In the post-Snowden era, that’s going to put a few noses out of joint.”
Microsoft has done absolutely nothing to deny that it seriously violates privacy. That is far too well documented to deny. What we have found, however, is diversion tactics. Here is a Microsoft/MSN-connected site (also “Microsoft apologists,” according to iophk) responding with shameless spin, claiming “The inevitable death of privacy” (Microsoft apologists and employees use the same kind of excuse habitually).
Microsoft Peter reads from the same memo, apparently, as his best defence was his ludicrous headline “Windows 10’s privacy policy is the new normal”. Well, maybe if you pretend that BSD and GNU/Linux don’t exist!
“We have strong reasons to suspect there’s behind-the-scenes coordination here.”Notice the pattern and spot the party line. Microsoft is basically heralding the death of privacy as if this alone will make its own attacks on privacy any more acceptable. We ask readers to post a comment if they see more of this and share information about where it comes from. We have strong reasons to suspect there’s behind-the-scenes coordination here. We saw that back in the Vista days.
Security Not Guarded, Only Mocked, Stampeded
The other day The Register asked: “Are you a Windows 10 converts responsible for young computer users? Be on your guard. Child-friendly Family Features from Windows 7 and 8 won’t be recognised or accepted in the new operating system.”
It’s hardly a surprise. Based on feedback we see on the Web, many people complain about anything-but-smooth an ‘upgrade’ process.
As we pointed out the other day, installing Vista 10 turns one's PC into part of a botnet (Windows Update, which cannot be blocked). The Microsoft-operated botnet is clearly out of control, or out of the scope of what’s legal (not that Microsoft believes laws can be enforced against it, ever). It’s also a massive security breach. “Windows 10 commandeers users’ upload bandwidth,” said the headline of this IDG article, composed by a Microsoft critic. “Windows 10 is FORCING ITSELF onto domain happy Windows 7 PCs,” said this article from The Register. Is this even legal? “Windows 7 PCs are being force fed a diet of Windows 10, breaking a promise made by Microsoft,” says the author. “The problem is affecting domain-attached Windows 7 PCs not signed up to Windows Server Update Services (WSUS) for patches and updates, but looking for a Microsoft update instead.
“Based on feedback we see on the Web, many people complain about anything-but-smooth an ‘upgrade’ process.”“The upshot is PCs, ranging from 10s to hundreds at a time, simultaneously chowing down on the 3GB-plus Windows 10 load, killing business networks.
“The problem began showing up on Monday with complaints beginning to notch up online.”
Vista 7 and 8 Silently Turned (Modified) Into Malware
“And now they are adding the tracking and telemetry to Win 7 and 8 in updates,” pointed out one person to me last week, “for those who don’t upgrade https://support.microsoft.com/en-us/kb/3068708” (can this be legally tolerated?)
Clearly enough, whatever Microsoft has made of Vista 10 (and now predecessors too!) is violating privacy or data protection policies in many firms, such as law firms. They need to wipe this malware off their networks to avoid being sued for confidential document leaks. Their keystrokes, for instance, mustn’t be divulged.
“Windows has technically become malware.”“Indeed Microsoft has realized that its income is going downwards,” said one person to me. “And more important, as many other companies, they now know that the data of their “clients” is more valuable than the services and software they provide. So the tendency is clear: they are offering zero price products and services because they don’t want people thinking about expending some $ or €. They just want data, and more data and more data…”
Windows has technically become malware. It already was, but it’s getting worse. It is hard to deny that it is now malicious software, operating well outside the control (and consent) of the user. If people click “OK” to express consent to the new policy, however, their chances of a day in court greatly diminish.
One site has just explained “Why You Must Dump Microsoft NOW”. “As of August 1, 2015,” it says, “Microsoft announced a new privacy policy and a new services agreement. In the words of one network professional, “Basically, they redefined their operating system to be spyware.””
The site recommends GNU/Linux instead, stating: “The version of Linux I like best is Linux Mint. With it, you can run OpenOffice (also called LibreOffice), which does everything essential that MS Office does. Then get Firefox for a browser and Thunderbird for email, and you’re in business.”
“Microsoft does not find it sufficient to spy on Windows users but also tries to do the same in Android and in GNU/Linux (well over a billion users).”Brad of “Goodbye Microsoft” remarked on this article by saying: “In the thirteen-plus years that I’ve been using Linux, I have never signed a user agreement to do so. Nor have I checked “accept” to terms on a web page, nor opened a shrinkwrap package with a you-accept-this license inside. In fact, I couldn’t legally use Linux at all but for the fact that the authors have accepted an agreement, the GNU Public License (GPL), which says that I’m free to use their work.* (With each passing year I become more amazed at the brilliance and the foresight of the creators of the GPL.)”
It’s a Data Harvesting Venture
Microsoft does not find it sufficient to spy on Windows users but also tries to do the same in Android and in GNU/Linux (well over a billion users). Microsoft wants to spy on GNU/Linux servers too (with confidential data of customers or staff) because Scott Hanselman, whom we mentioned here for Microsoft spin (like the 'new' Microsoft uses Microsoft’s channel and “talks to Khalid Mouss about how you can monitor your Linux machines within an Azure infrastructure.” We have already explained why this is extremely dangerous.
To illustrate just how dangerous it is to let Microsoft operate servers, consider the latest excuses for Office 360 spyware at the heart of British politics (where Microsoft blackmails MPs [1, 2]). Bogus excuses are now being given, after Microsoft failed for several days to deliver mail to MPs (the article downplays this duration by a factor of 6). The Register acts as Microsoft’s courier by blindly saying (without any proof) that it’s a case of “Microsoft failing to inform itself about a technical change” (as if changing something in a mail server should take it down for several days, without expectations as such).
“When it comes to privacy, Microsoft is demonstrably far worse than Google.”“The outage occurred on 23 June,” The Register says, “and resulted in a total of 13 hours of downtime, the Parliamentary Digital Service said in response to a Freedom of Information request.”
According to reports in the British media (not much of it covered this blunder — something that people openly complain about in social media), this outage lasted days, not 13 hours. Why is The Register relaying Microsoft’s propaganda and ‘damage control’ without even a challenge?
Either way, does Vista 10 not provide enough evidence that nobody should relay mail through Microsoft (snooping of mail by Microsoft for business reasons has been done before) and definitely mustn’t host a servers (including GNU/Linux) inside Microsoft datacentres? When it comes to privacy, Microsoft is demonstrably far worse than Google. █
Permalink
Send this to a friend
Posted in Apple, Courtroom, EFF, GNU/Linux, Google, Microsoft, Novell, OIN, Oracle, Patents at 7:12 am by Dr. Roy Schestowitz
Patents not on engineering (or physical products) anymore
Summary: News about patents from all across the Web, placing special emphasis on software patents and how these affect Free software projects, including Linux and Android
THIS week’s patents roundup revolves around practicing companies that act in a way which is almost indistinguishable from patent trolls. As we have said here for several years, the term “patent trolls” can be misleading because many large companies act in the same way but don’t get labeled “trolls”, mostly because of their size. It means that a fight against “patent trolls” often turns out to be a fight over scale, waged by large corporations against smaller ones. Check again who is behind the PATENT Act [1, 2, 3, 4, 5, 6, 7, 8].
Today’s post brings together several stories and themes/strands in order to keep readers abreast of the latest developments.
Open Invention Network
We have spent over 8 years writing about the Open Invention Network (better known as OIN) and why it cannot effectively protect Free software projects. We also exchanged many E-mails with the OIN and some trolls. We saw how toothless the OIN can be in many scenarios and we challenged the OIN over it. I spoke in length with their CEO a few times over the telephone and I still think that it helps legitimise software patents and rarely achieves very much, except promote the interests of large corporations (like those which founded it and still fund it).
Earlier this morning FOSS Force published this very long interview with Deb Nicholson, who had worked for the FSF before she moved to OIN. This interview is very good and Nicholson’s views on patents are fine. We shared them here before.
“My work at OIN involves a lot of research,” Nicholson says. “I read academic papers on litigation trends and try to stay on top of who’s getting sued this week. It also involves a lot of behind the scenes emailing. I have lots of informal conversations with people about how you run a free and open source software project. Sometimes, they don’t realize that lots of other companies are succeeding with FOSS business models and shared community resources. Once they see that it can be done, they often feel more confident.”
Nicholson then speaks about the role of SCOTUS in lowering the risk of software patents.
“The Supreme Court,” she explains, “has given the lower courts the tools to rule against two specific categories of vague and frivolous patents. This is great for companies that have the cash and the time to go to court. For companies that don’t want to fight in court — which is lots of them, because it really is expensive and time-consuming — the letters will keep coming. Plus, there are still plenty of overly broad or obvious patents on the books that may not be affected by the recent rulings. So, things are improving but I wouldn’t say that we’re finished.”
She makes an important point regarding the cost of litigation, but the matter of fact is, USPTO examiners are now tougher on software patents and fewer companies (or shell firms) are eager to assert software patents for fear of losing them. Not only the extorted party (usually developers) is scared of the courts; the plaintiff, e.g. a patent troll, is too. What SCOTUS has done is, in our humble assessment, the best news in nearly a decade. We cannot recall anything bigger or better in terms of magnitude, at least not when it comes to systematically squashing software patents (not one patent at the time as per the EFF’s much-advertised earlier efforts, dubbed “patent busting”).
Finjan
The Finjan-led patent extortion crusade was mentioned here just weeks ago (they are Microsoft-connected) and now, just weeks later, this firm’s troll entity (Finjan Holdings) gets extortion money from a really nasty company, Blue Coat, which some say the EPO hired to spy on people like yours truly and EPO staff. “Finjan Holdings,” as a trolls expert explains, is “a patent-licensing company operating in the cybersecurity space” and it has just “won a hefty $39.5 million jury verdict (PDF) on Tuesday, when a San Jose jury found that Blue Coat Systems infringed five of its patents.”
Keep an eye on Finjan, not just because of its Microsoft connections. Finjan has become a very malicious company. It deserves to go out of business. The sooner, the better.
Cisco
Cisco, now known for its surveillance and back doors (which is even openly discusses when applying for standards), is receiving negative publicly because as its profits run dry (or more meager), it increasingly turns into more of a troll, just like Microsoft and Apple. Is this what Cisco wants to be renowned (or notorious) for? Remember that TrollTracker, a fighter against patent trolls. was a Cisco lawyer, but Cisco is now turning into what it fought. Arista, according to this article, says that Cisco is “Very Much Like a Patent Troll” (that’s the headline) and it’s coming all the way from the top. To quote the article, “Arista’s top lawyer used the company’s earnings call for trash-talk Thursday, saying Cisco is “behaving very much like a patent troll” in its intellectual property lawsuit against Arista.
“Arista Networks Inc. CEO Jayshree Ullal kicked off the badmouthing: “Despite all the overheated rhetoric we’ve been hearing from Cisco blogs about Arista’s brazen copying, we think the only thing brazen about the suit is the extreme length Cisco has gone to,” she said. “Our customers have shown unwavering support.”
“Cisco has basically become another very malicious company, if not for colluding with espionage agencies, then for bulling/attacking rivals using patents.”“Arista Vice President and General Counsel Marc Taxay agreed. “Ironically … it appears to us at any rate that Cisco is behaving very much like a patent troll, which is pretty much what they’ve spent the last decade condemning.” Cisco is claiming patents for widely implemented features and functionality that exist on a broad range of switches today, and some of the patents affect features the patents were never intended to cover, Taxay said.”
The Wall Street Journal, taking note of “expensive legal battle with Cisco”, also expresses concerns about this case. “That may give some investors pause,” the author claims, “especially when Arista remains embroiled in an expensive legal battle with Cisco, which has accused it of infringing on patents.”
Cisco has basically become another very malicious company, if not for colluding with espionage agencies, then for bulling/attacking rivals using patents. Cisco used to be on the defensive, but now it’s on the ofsensive, and not against trolls. For a company that is eager to be seen as a FOSS and GNU/Linux supporter, this surely is a dumb strategy whose gains — if any — are massively outweighed by public image erosion.
JDate
A new article from Timothy B. Lee helps chastise the bully called JDate, which we wrote about very recently. “JDate,” he explains, “recently sued JSwipe, a mobile dating app for Jews that works like Tinder. Most media coverage has focused on mocking JDate for essentially claiming that it has a monopoly on certain uses of the letter J.
“But in some ways, the part of JDate’s lawsuit that really merits mockery is the patent infringement claims. JDate is suing JSwipe for infringing a broad patent that essentially claims the concept of using a computer to match pairs of users who express interest in each other. The lawsuit illustrates the continuing need for patent reform, because the current system makes it too expensive for defendants to challenge dubious patents.”
There are some interesting comments about JDate here. Although this Web site only targets a small niche, we strongly encourage all readers to boycott JDate, or else they’ll continue their shameful bullying, perhaps inspiring other companies to do the same.
The Economist Versus Patents
The Economist, interestingly and surprisingly enough (given its strong pro-business bias), chastises the patents regime in at least two articles this month. One is titled “A question of utility” and says in its summary: “Patents are protected by governments because they are held to promote innovation. But there is plenty of evidence that they do not” (we have covered such evidence for almost a decade).
“The ability to patent,” says the author, “has been extended from physical devices to software and stretches of DNA, not to mention—notably in America—to business processes and financial products.”
Yes, patent scope is a huge part of the problem.
“Time to fix patents” is the second such article from The Economist and it too is an assault on the status quo. “Ideas fuel the economy. Today’s patent systems are a rotten way of rewarding them,” said the summary.
Here is a key part of this article: “Patents are supposed to spread knowledge, by obliging holders to lay out their innovation for all to see; they often fail, because patent-lawyers are masters of obfuscation. Instead, the system has created a parasitic ecology of trolls and defensive patent-holders, who aim to block innovation, or at least to stand in its way unless they can grab a share of the spoils. An early study found that newcomers to the semiconductor business had to buy licences from incumbents for as much as $200m. Patents should spur bursts of innovation; instead, they are used to lock in incumbents’ advantages.”
It is nice to see even The Economist debunking these tiresome myths, many of which still perpetually spread by patent profiteers rather than producing companies. Are we on the cusp of a mindset change?
Patent Propaganda From Lawyers’ Sites
Lawyers’ media, seeking to maximise dependence on patent lawyers, promotes patents on construction in this series that starts with the following paragraph: “In the first of this three part series, clean tech, or green construction, was defined as construction that reduces or minimizes the environmental impact in building construction, operation and use. That article also discussed the importance of building intellectual property walls, and especially with patents, to protect inventions from being incorporated into projects by unlicensed users. Equally important is knowing the patents that may prevent a company from incorporating patented technology for which it has no license. Patent rights can shape an industry; consequently, companies must develop patent strategies. Patents for green construction encompass everything from building materials, to software for optimizing various processes, to green energy systems, amongst others.”
Yes, they even suggest software patents right there.
“The US may not have a world class patent system,” say the patent maximalists of IAM, “but its professionals are second to none” (for taxing by lawyers perhaps). Another site of patent lawyers who lobby for a lot of ludicrous types of patents (including software) pretends that patents take a short time to receive, despite that infamous backlog and these notorious issues which can only be tackled by lowing examination standards, hence granting bogus patents (trivial, and/or with prior art).
“Intellectual property & intangible assets” is the headline of this British article which is so full of nonsense that we don’t know where to start. To quote one part of it: “Newton says the real value in business these days is in knowledge, which is tied up in intellectual property, patents, trademarks and designs.”
That’s nonsense. The term “intellectual property” refers to patents, trademarks, and copyrights, so it cannot be separated as above. Then there are designs, which are already (in most domains) covered by copyrights and if the author wishes to speak about trade secrets, that’s different from all the above and still pertains to knowledge, without having to introduce that vague notion of “intellectual property” and “intangible assets” — both horrible propaganda terms that equate ideas with objects.
“Patent scope has been getting so much worse over time, to the point where abstract concepts like business methods, algorithms, and even basic designs become patents although copyright should definitely suffice.”The article titled “9 Tech Startups Disrupting the Legal Industry” talks about proprietary software that patent lawyers use to keep track of their work. “Experts say the market for legal technology is as much as $400 billion,” the article says, but there is nothing like a citation to support such a figure.
“We hear the same complaints over and over every time Congress tries to improve the patent system,” Matt Levy wrote the other day. “In fact, we’ve been hearing some of them for over 70 years.” Patent scope has been getting so much worse over time, to the point where abstract concepts like business methods, algorithms, and even basic designs become patents although copyright should definitely suffice.
Design Patents and Linux Gadgets
Speaking of design patents, watch what patent maximalists celebrated this weekend: “The text cluster provided here shows that much of Hasbro’s portfolio of 1,772 patents (339 of which are active) are related to toy vehicles, electronic games and ornamental designs, indicating a fair amount of design patents.”
The notion of “design patents” has got to be one of the most loathsome and ridiculous. The article “Apple v. Samsung and a Fight Over the Patents for Designs” was published by Forbes the other day, reminding us of so-called design patents (such as the widely-ridiculed 'rounded corners' patents). Apple is very desperate to stop Android (and by extension Linux), but doing so by bullying with outright bogus patents isn’t the way to compete. CPTN members (i.e. holders of Novell’s patents) Oracle, Apple and Microsoft have been systematically attacking Android using patents and Oracle now takes this further. “Oracle’s lawsuit against Google over Java copyrights probably won’t be back in a courtroom again until next year,” wrote The Register, “but in the meantime, Oracle has asked the court to let it expand the scope of its complaint to include events that have occurred since it was first filed in 2010.”
This forever-legal-limbo scenario helps hurt Android, so we cannot just pretend that software patents are not a problem. More FOSS and GNU/Linux site must learn to address these issues as a matter of priority. Not enough are doing this at the moment and it definitely helps our foes. Many people seem to forget that Microsoft still attacks GNU/Linux using patents (albeit more discreetly than before). █
Permalink
Send this to a friend
08.09.15
Posted in IRC Logs at 7:27 pm by Dr. Roy Schestowitz
IRC Proceedings: July 26th, 2015 – August 1st, 2015
IRC Proceedings: August 2nd – August 8th, 2015
Enter the IRC channels now
Permalink
Send this to a friend
Posted in News Roundup at 7:25 pm by Dr. Roy Schestowitz

Contents
-
Desktop
-
Why Linux? For one thing, unlike a Windows disc or a Mac OS installation, it’s free. Another nice feature is Linux is less vulnerable than Windows when it comes to viruses and malware. When it comes to software, assuming there are no specialized Windows or Mac programs your professor or teacher is requiring you to own, there is no cost.
-
Server
-
CoreOS and Mirantis have just announced that CoreOS’ Tectonic has been integrated into the Mirantis OpenStack distribution. The move will help teams create software more quickly and with improved quality.
-
Kernel Space
-
So last week I wasn’t very happy about the state of the release candidates, but things are looking up. Not only is rc6 finally shrinking noticeably, the issues I was worried about had fixes come in early in the week, and so I don’t have anything big pending. Assuming nothing new comes up, I suspect we will end up with the regular release schedule after all (ie in two weeks). Knock wood.
In -rc6 , the diffstat looks a bit odd, in that the ARC arch updates dominate (at around 30% of the diffs). That’s partly because the rest is pretty small, and partly because the llock/scond livelock fix wasn’t tiny. But I don’t find it in myself to worry about it.
Apart from that ARC oddity, things look normal. Mostly drivers (gpu, sound, i2c, input, usb, thermal, you name it) and other architecture updates (mips and sparc). With some filesystem and VM fixes rounding up the changes.
But please go out and test, and make sure all the issues really are solved. Ok?
Linus
-
-
Linus Torvalds just announced a few moments ago that Linux kernel 4.2 RC6 is now out and ready for testing. It’s a much calmer release, and it looks like the cycle is calming down.
-
Arne Exton, an independent GNU/Linux developer, known for many Linux kernel-based operating systems, posted an interesting tutorial a couple of days ago about how to install the latest Linux 4.1 LTS kernel on Ubuntu, Linux Mint, or Debian distros.
-
Graphics Stack
-
For benchmarkers, or distributions that ship the closed source drivers, it might be a pain to constantly be swapping between the two closed source drivers. It would appear that one developer was annoyed by this enough to try and create a solution. Meet: gpu-driver-swap by mikeanthonywild.
-
-
-
Applications
-
I’ve released man-pages-4.02. The release tarball is available on kernel.org. The browsable online pages can be found on man7.org. The Git repository for man-pages is available on kernel.org.
-
Today marks the completion of the Rust 1.2 stable and 1.3 beta release cycles! Read on for the highlight, or check the release notes for more detail.
-
-
A new version 0.1.0 of the drat package arrived on CRAN today. Its name stands for drat R Archive Template, and it helps with easy-to-create and easy-to-use repositories for R packages, and is finding increasing by other projects.
-
The Calibre application has been updated once more, and the developer has made a number of small changes and fixes. This is an app that can be used to read, convert, and manage eBook files, and its functionality can be enhanced further with plugins.
-
Instructionals/Technical
-
Wine or Emulation
-
Alexandre Julliard announced the release of the Wine 1.7.49 development milestone on August 7, informing us that the new version brings a total of 31 bugfixes and adds various improvements to some core components.
-
-
Games
-
Crawl, a local multiplayer dungeon crawler that lets users control monsters, has been released on Steam for Linux by a studio called Powerhoof.
-
-
Homeworld Remastered Collection was released by Gearbox Software after the company bought the rights to the franchise from the former owner THQ. It was recently released for the Mac OS X, but it looks like Linux won’t be joining anytime soon.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
KDE has recently released the newest Release Candidate of the Applications 15.08 release. Among the new features and changes of this release, there is a technology preview of the new KF5-based KDE PIM suite (including reworked, faster Akonadi internals), new applications ported to KF5 (the most notable ones being Dolphin and Ark). After some consideration and thinking on how to allow users to test this release without affecting their setups too much, the openSUSE community KDE team is happy to bring this latest RC to openSUSE Tumbleweed and openSUSE 13.21.
-
I am pleased to say that now I am sponsored by Blue systems GmBH to work on Plasma mobile and Plasma mobile applications full-time for next 4 months.
-
I am sure you heard about Plasma Mobile by now. Plasma Active was the reason I joined KDE three years ago and I am happy that the journey to Free Software on multiple form factors and devices continues. Checking my mail is among the most common things I do on my phone. Plasma Mobile needs a kick ass mail application if it wants to be a viable alternative. I do mail stuff with QML. There was really only one conclusion.
-
Google’s own Android is based off of a Linux kernel and while the base of Android is open source, Google still holds some things close to the vest. The developers over at KDE are looking to provide the entire operating system for free and other developers are welcome to assist in the development and share with the community. Overall Plasma Mobile isn’t as polished as Android, iOS or Windows Phone, but it is still in prototype stage and is undergoing testing. Let’s take a look at what Plasma Mobile offers.
-
-
To get started with KDE development, newcomers usually first sent patches. Having sent several patches, the newcomers are typically encouraged by us (the reviewers) to apply for a KDE contributor account. This application includes the question of “who encouraged you to apply for a KDE contributor account”.
-
The accessibility BoF at Akademy this year consisted mainly of Alex Merry and me looking at what needs to be done to get Orca working with Plasma Next. While things are far from perfect and sighted assistance is probably still required, there is slow but steady improvement.
-
-
KDE Applications 15.08 RC is now available in Mageia cauldron with new akonadi and Kdepim based on KF5.
-
My work for now on will consist in maintaining and cleaning up the code. I am certain that my experience with KDE will not end with GSoC. Big thanks to Jasem for his assistance and guidance.
-
-
The KDE team is preparing to release the new Plasma 5.4 desktop and it’s going to bring some pretty interesting improvements, including an enhanced Breeze icon set.
-
-
GNOME Desktop/GTK
-
The GNOME Foundation is looking for qualified candidates for the position of Executive Director of the GNOME Foundation. The Executive Director is critical for the Foundation, the public face of GNOME, the liaison to the GNOME Advisory Board, and the primary fundraiser for the Foundation. It is expected that the Executive Director will execute the daily business of the Foundation, and work with the Directors of the GNOME Foundation on a regular basis.
-
-
New Releases
-
On August 7, Jerry Bezencon, the creator of the Linux Lite operating system, was more than happy to announce the immediate availability for download and testing of the first Beta release of the upcoming Linux Lite 2.6 distribution.
-
4MRecover is a small live CD designed for data recovery. It’s a part of 4MRescueKit, which in turn is one of the three main 4MLinux releases available for downloads.
-
ExTiX 15.3 LXQt DVD 64 bit is based on Debian 8.1 Jessie/Ubuntu 15.04. The original system includes the Desktop Environment Unity (Ubuntu). After removing Unity I have installed LXQt 0.9.0. LXQt is the Qt port and the upcoming version of LXDE, the Lightweight Desktop Environment. It is the product of the merge between the LXDE-Qt and the Razor-qt projects: A lightweight, modular, blazing-fast and user-friendly desktop environment.
-
Screenshots/Screencasts
-
Ballnux/SUSE
-
As we have previously written, the SUSE team is working at a new Linux systems called OpenSUSE Leap, a system focused on stability, including LTS/ESR and stable apps only.
-
Slackware Family
-
-
For our stable Slackware (which is 14.1 of course) I have packaged LibreOffice 4.4.5 which was announced at the end of July. Actually, these packages were already available in my repository for the past couple of days but I wanted to wait with writing about it here until I could bake packages for LibreOffice 5.0.0 as well. Note that “LibreOffice 4.4.5 is replacing LibreOffice 4.3.7 as the ‘still’ version for more conservative users and enterprise deployments” according to the official announcement. Therefore I decided to be conservative and stick with 4.4.5 instead of packaging 5.0.0 for Slackware 14.1.
-
Red Hat Family
-
Fujitsu today delivers a new all-in-one platform that simplifies the creation of OpenStack-based private and public cloud infrastructures, developed to support organizations planning to transform their business for the cloud era via a digital first; strategy.
-
The CentOS Project, through Karanbir Singh, had the great pleasure of announcing the release and immediate availability for download of the seventh maintenance version of the long-term supported CentOS 6 Linux operating system.
-
Red Hat today launched its Enterprise Linux OpenStack Platform 7 into general availability. The distribution combines Red Hat Enterprise Linux Server, the latest OpenStack release (“Kilo”), and the company’s services for installing and managing OpenStack Clouds into a single product.
-
On Monday a message was sent out to the centos-announce mailing list bringing attention to the newly created AltArch Special Interest Group. The focus of the group is for the community to come together and support CentOS 7 on architectures other than x86_64– architectures such as ARMv7, AArch64 (64-bit ARM), 32-bit x86.
-
Fedora
-
Debian Family
-
Over the weekend the Debian project put out a call, over Twitter, for UEFI horror stories as their developers begin to take a more serious look at Debian and UEFI, with the creation of a UEFI team.
-
Derivatives
-
Canonical/Ubuntu
-
-
BQ just announced on their Google Plus page that their Aquaris Ubuntu Edition phones will be available ‘wherever you live’, this makes it the first Ubuntu device available in the Americas, Australia, Africa and some of Asia (China already has the MX4).
-
There are only a handful of smartphones on the market that ship with Ubuntu software, and up until now they’ve been available for purchase only in a handful of markets.
-
An annoying issue with Ubuntu Touch is the fact that the apps take a lot of time until they open, on the first use, or after a reboot. If you close the app and open it again, it will not be laggy anymore.
Canonical’s Michael Hall has announced that the developers are aware of this issue that is caused by several other small issues regarding AppArmor, the launching script and the SDK.
-
The future of the Ubuntu Software Center is uncertain, even if some of the Ubuntu developers are thinking about an upgrade for the application or a replacement. The core problem seems to be related to the fact that Ubuntu uses DEB files and it’s not longer considered a viable method of providing updates through the Ubuntu Software Center.
-
The laziness of Canonical packaging contributed applications for distribution to Ubuntu GNU/Linux desktop installations has lead them to stop accepting updates and new contributions altogether.
-
After a long wait, Ubuntu phones became a reality this year. But now Linux fans outside of Europe and China will be able to try out the newcomer OS for the very first time. Spanish smartphone maker BQ has announced that it is now shipping its Aquarius E5 Ubuntu smartphone across the world.
The E5 Ubuntu Edition has a fairly barebones set of specifications that matches its affordable €199.90 price tag. It has a 5-inch, 720 x 1280 display that’d be more at home on a top-tier smartphone from a few years ago. There’s also 1GB of RAM, 16GB of memory (thankfully upgradable thanks to its microSD card slot), and a 1.7GHz, quad-core Mediatek chip.
-
-
-
Flavours and Variants
-
It’s now been just over a month since the flagship Cinnamon and MATE editions of Linux Mint 17.2 were released, hot on the heels of these releases each cycle are the KDE and Xfce versions, they have just gone live for the 17.2 release. New in these releases are the Linux 3.16 kernel, Xfce 4.12 and KDE 4.14.2, respectively.
-
-
The version of Linux I like best is Linux Mint. With it, you can run OpenOffice (also called LibreOffice), which does everything essential that MS Office does. Then get Firefox for a browser and Thunderbird for email, and you’re in business.
-
-
Two months after the Raspberry Pi default firmware upgraded to Linux 4.0, they’ve now upgraded to Linux 4.1 as the latest stable kernel.
Linux 4.1 brings many new features and improvements and is now served as the kernel for the Pi’s default firmware. The source had been available for a while already with some RPi-focused Linux distributions like OpenELEC already having opted to utilize it for the newest Linux kernel capabilities.
-
Since ever the Kobo firmwares also allowed downloading of a bunch of dictionaries, most of which I don’t need. As I am fluent in most languages I read and write, the only real dictionary I would like to see is a Japanese-English (I don’t dare asking for a Japanese-German). Unfortunately, Kobo never shipped one. OTOH, starting with firmware 3.16.10 they ships two different English-Japanese dictionaries, one excellent Japanese-Japanese dictionary, but not one Japanese-English. So I took the liberty to write a script that allows everyone to enrich the shipped Japanese-Japanese dictionary with English definitions.
-
Phones
-
Android
-
As I highlighted in Forbes’ weekly digest of news from Cupertino, Apple is on the hunt for Android software engineers (the job listing is currently here, and copied below). While there is natural speculation about what other projects the engineers could be working on (after all, the job description does say “exciting new mobile products” plural), it’s worth remembering just how pivotal Apple Music on Android could be to the continued success of Apple in the new cloud-based future of mobile.
-
It has been rumored for a long time that BlackBerry could launch a handset that’s powered by Android, in fact the company’s first flagship device for 2015 is expected to come with Google’s mobile OS. Recently the BlackBerry Passport Silver Edition was launched and while it runs BB OS 10 some images have appeared online which show the device running Android. Does this mean BB tested out prototypes of this handset with Android?
-
Google is about to take another crack at its ultra-low-cost smartphone initiative, called Android One. The company’s managing director in Southeast Asia, Rajan Anandan, says that a new plan for Android One will be unveiled in “the next few weeks.” Few details are available, but Anandan adds in an interview with The Financial Times that part of the plans will be a push to hit the “sweet spot” of $50 smartphones.
-
-
-
-
-
-
-
-
LG released the LG G4 just over three months ago and since then, it has been praised as a great device. Improving over what the previous iteration did right and bringing a completely unique smartphone experience, with better specs and new features. LG spared no expense with the LG G4, as it not only includes high quality hardware, but also an extremely well-built software. This has just been noticed by governmental entities, like the National Security Agency (NSA), and the National Information Assurance Partnership (NIAP), two entities that foremost seek out privacy and the overall protection of data. When looking at the smartphone, LG built the LG G4 with security in mind, which is why both the NSA and the NIAP, approved the handset to be used within government security and corporate environments. In order to meet the requirements to be endorsed by said entities, the smartphone in question must have enough security criteria to successfully go through the “Cryptographic Module Validation Program”.
-
LG on Thursday afternoon announced that its G4 Android smartphone has received a thumbs-up of approval from the National Security Agency’s (NSA) National Information Assurance Partnership. (NIAP). Forget the weird government acronyms: basically this just means that the G4 meets enough security criteria for “Cryptographic Modules” for use in government security and corporate environments, LG explained.
-
-
LG and Google will launch the new generation Nexus phone in October which will be the first model to have Android Pay mobile payment system.
-
Much like Grover had a bad, awful day, Android has had a bad, awful couple of weeks on the security front.
-
-
Early last month, renders of the BlackBerry Venice were discovered. One image showed what the device would look like with the QWERTY slider closed, while the other showed the phone in both black and white with the QWERTY opened. Today, we get to view three new renders, including one that visualizes what BlackBerry Hub will look like on Android. Remember, the Venice could be the first ‘Berry to use Google’s open source OS to run the entire handset. Back in June, blogger Eldar Murtazin said that the device would be powered by Android and carry BlackBerry Services. One render of the handset showed Android icons on the home screen, including one for the Google Play Store.
-
While the Daala video coding format backed primarily by Xiph.Org and Mozilla isn’t ready for mainstream use yet, looking at its Git repository does at least reveal some environmental data to discuss.
While poking around the Daala Git repository this week in looking at the state of affairs, I decided to run GitStats on the code-base for seeing the pace of code entering the mainline code repository, etc. This was mainly done out of pure curiosity and figured the stats would be of interest to other Phoronix readers too. The Daala repository has 277 files made up of 124k lines of code that as of today was done via 1,432 commits and has seen contributions by 47 authors.
-
Web Browsers
-
Mozilla
-
These issues are making Mozilla bleed and some are caused or allowed to exist because our leadership, our very governance allows them. We need to have a conversation about these problems and cannot just let Christie’s departure be in vain and roll along with the status quo.
-
It’s currently hacker season, the time when two hacker conferences are taking place and the news is chock full of stories about this and that being hacked. Breaking that trend is news that Mozilla have issued a patch for Firefox (39.0.3) due to vulnerability that is actively being exploited.
-
-
-
Oracle/Java/LibreOffice
-
Common wisdom has it that sleeping dogs are better kept snoring and I tend to agree. I’m going to do what may seem to be understood as the contrary. I believe it is not the case, as prejudice is something that is hard to fight and tends to stick around dark corners and circles of people with little knowledge of the matter.
-
FSF/FSFE/GNU/SFLC
-
Openness/Sharing
-
In this week’s edition of our open source news roundup, we take a look at the release of LibreOffice 5, a personal food computer, Creative Common’s open letter the President Obama, and more.
-
Open Data
-
The National Democratic Institute is has announced the launch of the Open Election Data Initiative. The goal of the initiative is to ensure that citizen groups have access to election data that can give a true picture of an election process, including how candidates are certified, how and which voters are registered, what happens on election day, whether results are accurate, and how complaints are resolved.
-
Open Access/Content
-
Programming
-
On Sunday, Last Week Tonight took on the issue of restricted voting rights for Washington D.C. residents, despite the fact they pay federal taxes and have a larger population than some entire states such as Vermont and Wyoming. Even the Dalai Lama once called the situation “quite strange.”
-
Health/Nutrition
-
A drone dropped a package of drugs into a prison yard while inmates were outside, sparking a fight, prison officials have said.
-
Security
-
Two researchers, Michael Auger and Runa Sandvik, will present today, at the Black Hack conference in Las Vegas, their recent findings into the world of computerized weapons security.
-
-
Part of the drama at any Black Hat or DefCon security conference in any given year usually revolves around a talk that is cancelled for some mysterious reason, typically over fears that it could reveal something truly disruptive. Such is the case in 2015 at DefCon with a talk called ProxyHam, which was supposed to reveal technology that could enable an attacker to wireless proxy traffic over long distances, hiding their true location.
-
In 2010, Black Hat had its first female keynote, Jane Holl Lute, who served at the time as the deputy secretary of the Department of Homeland Security. Lute’s first comment about the nature of cyberspace set the tone for her keynote, which was, in characteristic DHS cybersecurity style, tone-deaf to attendee levels of expertise.
-
That led founder Jeff Moss to call for a “cooling off period” during which “feds” avoided coming near the annual conference in Las Vegas.
-
A design flaw in the x86 processor architecture dating back almost two decades could allow attackers to install a rootkit in the low-level firmware of computers, a security researcher said Thursday. Such malware could be undetectable by security products.
-
The attack would enable a hacker to remotely target computers with malware that would both go undetected by security scanners and would afford the attacker a persistent hold on a system, even when it undergoes firmware and operating system updates. Because firmware updates require the assistance of the existing firmware to install, any malware in the firmware could block updates from being installed or write itself to a new update. Zetter reports that the only way to eliminate malware that’s embedded in a computer’s main firmware would be to re-flash the chip that contains the firmware.
-
The recent dump of emails from Hacking Team sheds new light on the extent of government involvement in the international market for zero-days. Rather than disclosing these vulnerabilities to software makers, so that they can be fixed, government agencies buy and then stockpile zero-days.
-
-
Defence/Police/Secrecy/Aggression
-
Bureau reporters Crofton Black and Abigail Fielding-Smith name eleven companies that have won hundreds of millions of dollars in contracts to plug a shortage in personnel needed to analyze the thousands of hours of streaming video gathered daily from the remotely piloted aircraft that hover over war zones around the world: Advanced Concepts Enterprises, BAE Systems, Booz Allen Hamilton, General Dynamics, Intrepid Solutions, L-3 Communications, MacAulay-Brown, SAIC, Transvoyant, Worldwide Language Resources and Zel Technologies. (see details below)
-
According to officials familiar with the situation, US drones fired a pair of missiles against a house in Datta Khel today, destroying the building and killing at least seven people. Two others were wounded.
-
The assassination drone campaign on the tribal areas of Pakistan, Somalia, Yemen and Afghanistan has been one of the controversial plans of the US government in the recent years.
The White House, State Department and Pentagon officials maintain that the drone attacks are aimed at targeting the Al-Qaeda terrorists in these countries and crushing their strongholds; however, figures indicate that the majority of the victims of the Unmanned Aerial Vehicles dispatched to the region are civilians. The Bureau of Investigative Journalism has recently revealed that between 2004 and 2015, there have been 418 drone strikes against Pakistan alone, resulting in the killing of 2,460 to 3,967 people, including at least 423 civilians. That’s while some sources put the number of civilian casualties in Pakistan during the 11-year period at 962.
-
“Signature strikes” are drone attacks based solely on a target’s behaviour with the identity of the target not known. Sometimes such an attack may hit a high value target but at other times they may kill innocent civilians.
-
American drone strikes killed hundreds of people in Afghanistan, Yemen and Somalia in July, according to a report by the Bureau of Investigative Journalism, a London-based nonprofit. The TBIJ produces monthly reports about highly secretive U.S. drone operations around the globe as part of its goal to provide the public “with the knowledge and facts about the way in which important institutions in our society operate, so that they can be fully informed citizens.”
-
Unmanned, remotely-operated drones supplied by private corporations are hugely profitable and attractive to those without conscience in the US government, activist Melinda Pillsbury-Foster told Sputnik.
-
Drones appear to have an expanding role in the fight against Islamic State, although it’s unclear what impact they are having on the war itself.
One year after President Barack Obama authorized airstrikes against ISIS targets, those airstrikes by the U.S. and its coalition partners, including Canada, have killed 15,000 ISIS supporters, the coalition claims.
-
Arpas says it has about 200 members, mostly small businesses and individuals, who form the country’s enthusiastic cottage industry. However, Britain’s two big aerospace groups, BAE Systems and Rolls-Royce, are also developing drones for commercial purposes.
-
-
The U.S. military launched its first strike against Islamic State from Incirlik Air Base in southern Turkey, the Pentagon said, reflecting a deepening security relationship between Washington and Ankara in the region.
-
-
Bold, honest and disturbing, “Good Kill,” in its own modest fashion, is one of the most memorable American films I’ve seen thus far in 2015.
-
Mr Coveney has revealed plans to open the country up as a “testing zone” for “advanced military and weapons guidance systems, including drones, submarine drones and other such high-tech hardware”
-
Peace activists have condemned the British government’s campaign of airstrikes against Islamic State targets in Iraq, insisting continued bombing of the region will fail to defeat the terror group and lead to further civilian fatalities.
-
All branches of the military really want laser weapons. But they don’t all want them for the same missions. What struck me after a recent conference here was how differently the US Air Force is approaching lasers.
-
-
President Obama lashed out at critics of the Iran nuclear deal on Wednesday, saying many of those who backed the U.S. invasion of Iraq now want to reject the Iran accord and put the Middle East on the path toward another war.
Obama also said that if Congress rejects the deal, it will undermine America’s standing in global diplomacy, leaving the United States isolated and putting Israel in even greater peril.
While calling the nuclear accord with Iran “the strongest nonproliferation agreement ever negotiated,” Obama also seemed to turn the vote on the deal into a referendum on the U.S. invasion of Iraq a dozen years ago, a decision he portrayed as the product of a “mind-set characterized by a preference for military action over diplomacy.”
-
The unprecedented power of the internet is staggering. Asked by Nick Dry, prosecuting, why he needed so many rounds of ammunition, Lyburd replied glibly: “I was watching videos on YouTube and the Americans, they have thousands. You can shoot 100 rounds in a few seconds.” Lyburd is aged just nineteen, as young as some of the recruits attracted to Daesh.
America legislators have for decades allowed so many high school shootings to occur that a teenager on the other side of the Atlantic felt inspired to play copy-cat. Has America just exported its first terrorist ideology?
The use of social media in the case of Daesh and Lyburd is telling. America’s pervasive gun lobby is led by establishment organisations like the National Rifle Association and enhanced by grass-roots nationalist militia groups. Together, these quasi-political gun ownership clans have populated entire YouTube channels with educational videos; filled Twitter and Instagram feeds with gun pornography; exploited Reddit pages; and even launched online and printed magazines. The US government is involved in spreading gun culture, with the Pentagon gifting hundreds of millions of dollars each year to Hollywood, an asset that Obama has said he believes is part of American foreign policy.
-
-
Who were the militants who attacked the Dinanagar police station in Gurdaspur district? What were their aims and ideology? How many of their comrades are waiting for another chance to attack? How much help are they getting from the Pakistani authorities, and what other sources of support and finance do they enjoy?
-
Yet although he bears “our skin”, Obama represents the power of those who seek to dominate us by destroying our self-confidence. Therefore his speeches reinforce a pattern of contempt that his predecessors have purveyed for decades. Thus, although his speech in Nairobi (compared to Accra in 2009) was less of headmaster lecturing his pupils and recognised the transformative changes taking place on our continent due to our initiatives, he still castigated us. His comments on political violence and corruption in Kenya continued the tradition of lecturing to us. Why does America feel obliged to comment on how African nations govern themselves, something he does not do in Western Europe? Who gives Obama and the US the moral right to lecture to Kenyans about their governance?
-
On January 20, 2017, Barack Obama will leave the presidency. Black people capable of critical thought will have many reasons to breathe sighs of relief. They will no longer have to submit to condescending lectures directed exclusively at them.
From the moment he ran for president, Obama has harangued Black people on a wide variety of issues. It doesn’t matter if his audience is made up of church congregants, graduating students, or Kenyan dignitaries. Every Black person unlucky enough to be in his vicinity risks being treated like a deadbeat dad, career criminal or Cousin Pookie, Obama’s own imaginary Willie Horton.
During his trip to East Africa the president chastened Kenyans about gay rights, domestic violence, genital cutting, forced marriage and equal rights for women. He went on and on with no mention of how well his country lives up to any accepted standards of human rights
-
An intriguing aspect of Muslim culture is that murders are rarely committed over wealth. While there may be theft in Muslim countries, theft that involves murder is almost unheard of. The idea of killing someone over something as ephemeral as a car or money or a cell phone is a rarity (except perhaps in war-torn countries where all civil society has broken down). Murder in Muslim societies tends to be motivated by political issues but more often by a misguided sense of honor. This was the case earlier this month in France, where clearly deluded and uneducated men from the ghettos of Paris, after rediscovering their faith, felt compelled to take their misperception of Islamic law into their own hands in order to “uphold the honor” of their prophet who, they believed, was being denigrated by the cartoonists at Charlie Hebdo. Without a doubt, such murders are criminal and wrong, but they can be rationally understood within the context of a society that holds the sanctity of prophets, those men of God, above all else.
-
-
China has expressed its backing for Pakistan and other parties to “push for peace and reconciliation” in the war-torn Afghanistan, days after the second round of peace talks were put off following news of Taliban chief Mullah Omar’s death.
-
Clashes persisted around Yemen’s largest air base Tuesday, a day after its declared capture by forces loyal to the country’s exiled President Abdu Rabu Mansour Hadi, military officials said.
-
After a gruelling fourteen day trial, a group of activists known as the Thales Ten,* received their verdict in Glasgow Sheriff Court last week. Five were convicted, and five acquitted, of the crime of breach of the peace.
The group scaled onto the roof and blockaded entrances to the Thales UK factory on 23rd September, 2014 in response to the war in Gaza. They hung a fifty foot Palestine flag and several banners. One read: ‘Another Scotland is Possible: Stop Arming Israel’. Another made the connection between the French arms company Thales, Israel’s Elbit Systems, and the UK Ministry of Defence.
-
U.S.-led airstrikes targeting the Islamic State group in Iraq and Syria have likely killed at least 459 civilians over the past year, a report by an independent monitoring group said Monday.
The report by Airwars, a project aimed at tracking international airstrikes targeting the terrorists, said it believed 57 specific strikes killed civilians and caused 48 suspected “friendly fire” deaths. It said the strikes have killed more than 15,000 Islamic State terrorists.
-
An independent monitoring group says some bombings carried out by the US-led coalition targeting Isis are likely to have killed hundreds of civilians.
The report by Airwars, a project aimed at tracking the international airstrikes targeting the Islamic State group, says it counted at least 459 suspected civilian fatalities from airstrikes it believes the coalition carried out in Iraq and Syria over the last year. It says the same strikes also caused at least 48 suspected “friendly fire” deaths.
-
An aircraft wing fragment washed ashore on the Indian Ocean island of Reunion came from Malaysia Airlines Flight 370, which disappeared more than a year ago with 239 people aboard, experts say.
-
Americans believe that Russia is a corrupt country where everyone from the president to regional governors to government officials are flourishing on bribes. Russia has developed corruption into a “fine art,” says a book titled “Putin’s Kleptocracy: Who Owns Russia?” written by the University of Miami professor Karen Dawisha.
-
Finally, we wrap it all up by commenting on the US ‘Institute for Peace’ chairman who said that the Pentagon should arm Kiev in order to create more – quote – “body bags of Russian soldiers”.
-
The National Security Agency paid the state of Utah more than $1 million over 14 months for state troopers to guard the entrance to the agency’s data center near Salt Lake City, according to Utah Highway Patrol records.
-
-
US officials have laid the blame for an attack against the Pentagon’s Joint Chiefs of Staff unclassified email system firmly on Russia’s doorstep.
Explaining how the second attack against the Pentagon this year had led to severe restrictions being placed on the network, officials said the work of around 4,000 military and civilian personnel had been disrupted (interestingly, The Register reports that staff were told the service disruption was an expected side effect of a planned system upgrade).
The latest attack, believed to have occurred on or around 25 July, had originally passed without any fingers being pointed, as evidenced by Pentagon spokeswoman Lieutenant Colonel Valerie Henderson’s statement to Reuters…
-
Generally speaking, the US Army Entertainment Liaison office believes most of what crosses its desk furthers the Army’s interests. There are lots and lots of supportive assessments contained in the document, with the most common being “Supports Building Resilience” — a phrase that covers everything from military-friendly documentaries to American Idol. Another popular assessment is “Supports Modernizing the Force,” something the Liaison Office has applied to blockbuster franchises like The Avengers.
-
We’re told the OPM hack will have horrific consequences for America. Just as we have been told so many times since WWII, almost always falsely. I expect this too will prove to be a wet firecracker. Here are the reasons why, obvious things few journalists have told you. {1st of 2 posts today.}
-
-
A.B. “Buzzy” Krongard, a former top CIA official and longtime Baltimore business leader, was arrested at BWI Thurgood Marshall Airport on Thursday for allegedly attempting to bring a loaded handgun onto an airplane.
-
-
-
-
Former CIA Executive Director Buzzy Krongard told BBC on Monday that the CIA did engage in torture…
-
The CIA tortured terror suspects in its programme of “enhanced interrogation”, the agency’s former executive director, Buzzy Krongard, has admitted to the BBC’s Panorama programme.
-
A former top CIA official has reportedly become the most senior agency figure to say he is “comfortable” with using the word “torture” to describe so-called enhanced interrogation techniques deployed against al-Qaeda suspects in the wake of the September 2001 terrorist attacks.
-
Outside Camden Town Hall last night, a queue stretched round three sides of the building and along Euston Road. As people began to slowly file into the vast hall, it soon became clear that there was not enough space for the crowd to all fit inside. Teenagers actually began to scale the walls and huddle around windows to look inside.
The spectacle? The 66-year-old Labour leadership candidate Jeremy Corbyn.
As the crowd swelled at the door, former mayor of London and speaker at the rally, Ken Livingstone arrived.
On his way into the venue, LondonLovesBusiness caught a few words with Livingstone about Corbyn’s campaign, and discovered that even with the tantalising prospect of a left-wing leader taking power, Livingstone’s sense of humour remains intact.
-
Lisa Monaco, the President’s Advisor on Homeland Security and Counterterrorism, said that Snowden’s move to disclose confidential data has had a grave impact on the security of the state.
-
At sentencing, my judge gave me 30 months in prison and three years of probation, and she took away my federal pension. I left for prison believing that was the totality of my punishment. I was wrong.
One of the first things that happened upon my conviction was that the company with which I had my homeowner’s and auto insurance canceled my policies. They don’t do business with felons, they said. That same week, my credit card company canceled my card and demanded the immediate payment of the balance.
Then, shortly before my departure for prison, the agency that my wife and I used to hire child care providers also jumped on the bandwagon. They dropped us as clients and left us without anybody to help her care for our three young children while I was away.
-
Last year, President Obama asked for $500 million to arm and train the Syrian rebels. This year alone, the effort is supposed to train 3,000 soldiers to fight ISIS.
-
President Obama’s big plan to train friendly Syrian rebels has had a really rough few days. The first 60 American-trained Syrian rebels, part of a group called Division 30, finally went onto the battlefield and almost immediately got attacked by al-Qaeda and suffered a humiliating defeat. According to the Guardian, al-Qaeda fighters killed five US-trained rebels, wounded 18, and kidnapped seven, including the unit’s commander. Half of the American-trained fighters were put out of commission within weeks of hitting the ground.
-
The US government threatens to further escalation against the government of Syria, according to The Wall Street Journal.
The newspaper says that, although military officials minimize the chances of direct confrontation with the forces of the Syrian Arab Army, the fact that President Barack Obama authorized the use of the Air Force to defend US-trained groups, leaves open that possibility.
-
The attack came early Friday against a Syrian militia known as Division 30, which has been the central focus of a $500 million program initiated by the Obama administration and administered by the Pentagon to arm and train a US-controlled proxy force, ostensibly for fighting against the Islamic State of Iraq and Syria (ISIS) inside Syria.
Launching the attack was the Al-Nusra Front, the Syrian affiliate of Al Qaeda and the most powerful of the Islamist militias that have been fielded in the Western, Saudi, Turkish and Qatari-backed war for regime change to oust the government of Syria’s President Bashar al-Assad.
-
The unorthodox tactic, which is seeing SAS units dressed in black and flying ISIS flags, has been likened to the methods used by the Long Range Desert Group against Rommel’s forces during the Second World War.
More than 120 members belonging to the elite regiment are currently in the war-torn country on operation Shader, tasked with destroying IS equipment and munitions which insurgents constantly move to avoid Coalition air strikes.
-
The dirty secret about the Obama administration’s “regime change” strategy in Syria is that it amounts to a de facto alliance with Al Qaeda’s Nusra Front which is driving toward a possible victory with direct and indirect aid from Saudi Arabia, Turkey and Israel, as Daniel Lazare explains.
-
The U.S. military is training locals to fight IS but not Assad, while the CIA is training Syrian rebels to fight Assad.
-
AT a CIA awards dinner in Washington in 2011 Robert M Gates, a former director of the agency whose term as US Secretary of Defence straddled the Bush and Obama administrations, spoke on the future of the war on terror. Factories were working day and night, he told the audience, to turn out the newest, most vital front line weapons. “So from now on,” he said, “the watchword is: drones, baby, drones!”
-
This Saturday marks one full year since the US military began its still-undeclared war against Islamic State that the government officials openly acknowledge will last indefinitely. What do we have to show for it? So far, billions of dollars have been spent, thousands of bombs have been dropped, hundreds of civilians have been killed and Isis is no weaker than it was last August, when the airstrikes began.
-
In June, when a CIA drone strike killed an al-Qaeda leader who the agency did not know was among a group of militants, the United States showed that it continues to fire drone missiles at targets whose identities are a mystery.
-
The Chagos Islands, one of the UK’s most remote overseas territories, could be opened up to tourism under plans allowing exiled islanders to return home, according to a Foreign Office report.
The consultation process on resettlement of the British Indian Ocean Territory (BIOT), launched this week, proposes allowing 1,500 Chagossians to live on the archipelago.
Britain forced the inhabitants off the islands in the early 1970s to make room for a US airbase that was built on the largest island, Diego Garcia. In exchange for the clearance, London received £5m off the cost of developing a joint US/UK missile programme.
-
Since her cover was famously blown, former covert CIA operative Valerie Plame is more openly protecting the country’s digital assets. In May, the author and anti-nuclear activist joined the advisory board of Global Data Sentinel, developer of a cybersecurity platform designed to encrypt and protect across domains, networks, and devices.
-
-
-
Former CIA operative Valerie Plame Wilson says the Donald Trump campaign reached out to her for support.
-
Over the past decade, a string of war movies emerged in the wake of 9/11: The Hurt Locker, Syriana, The Messenger, Green Zone, Lone Survivor, and American Sniper, to name just a few. Some have performed better than others at the box office, and many have received critical acclaim. Almost none has included portrayals of women in combat.
-
Last week we looked at the British counter-extremism bill, backed by Home Secretary Theresa May. The heated debate about this bill centers on whether it will curtail rights such as freedom of speech and whether it will target Muslims, creating an environment in which mistrust can only grow.
-
The Iran deal reached in Vienna is truly a historic diplomatic achievement.
-
Much adieu lately about how we can trust the Iranian nuclear agreement when they hate Americans.
Do the Iranians hate us? If they don’t they should.
Much of Iranian hatred is based on our CIA involvement in deposing their democratically elected prime minister in 1953 and supporting the brutal dictator (“the Shah”) who gave the U.S. and Britain unlimited access to oil.
In the year 2000 the New York Times obtained a copy of the CIA’s secret history of the Iranian coup, revealing the inner workings of a plot that set the stage for the Islamic revolution in 1979, and for a generation of anti-American hatred in one of the Middle East’s most powerful countries.
-
US Special Forces would gain an advantage and broaden its skill base by enlisting more Arab Americans, former Central Intelligence Agency (CIA) officer Larry Johnson told Sputnik on Friday.
-
The murder of the Pakistani human rights activist Sabeen Mehmud in central Karachi earlier this year triggered a huge media echo. Mehmud was famous the world over for her work, primarily in the fields of women’s rights and Internet activism. Despite the intense media coverage, not much attention was paid to the fact that during the final months of her life, the activist had focused specifically on the conflict in the south-western Pakistani province of Balochistan. Just a few hours before her murder, Mahmud and her organisation “The Second Floor” had arranged a debate on the human rights situation in Balochistan.
[...]
Balochistan has been the scene of several major rebellions in recent decades, all of which were brutally put down by the government in Islamabad. Although the region has a wealth of natural resources, the people are among the poorest in Pakistan. They barely have access to stable infrastructure, power or clean drinking water. Some 88 per cent of Balochs live below the poverty line. Although natural resources are being exploited, the authorities are failing to make adequate investments in other sectors. Only the security sector is flourishing.
-
A new report from a group of journalists and researchers says that hundreds of civilians have died during airstrikes by the U.S. and other nations fighting the Islamic State, a marked contrast to the Pentagon’s official admission of just two civilian deaths.
-
His account of the Tibetan struggle is a welcome contribution to the growing body of Tibetan resistance literature and on the CIA’s involvement.
Some of the background to the events he recounts has never been told before. The only other Tibetan to tell the whole story is the late Lhamo Tsering in his exhaustive work, Resistance, and his son Tenzing Sonam in his compelling documentary, The Shadow Circus: the CIA in Tibet. Apart from these, this aspect of Tibet’s struggle for survival has been mainly hogged by CIA operatives or by American writers drawn to the subject. Gyalo Thondup’s perspective on the cloak-and-dagger game Tibet briefly played with the CIA will remain the authoritative Tibetan account of this episode of the Tibetan struggle.
-
For liberal hawks and neoconservatives, the idea of the Congress for Cultural Freedom is an appealing fantasy. It evokes the time at the beginning of the Cold War when intellectuals played a serious role in politics because the world seemed not just caught up in a battle of armies but in a battle of ideas. Beginning in 1950, it brought together a diverse array of thinkers who, under the rubric of anti-totalitarianism, agreed that the freedom to think and write was inviolable. Its raison d’etre was anti-Communism; it sought to reduce the influence of Communist and fellow-traveling intellectuals, first concentrating on Western Europe but later expanding all around the world. In the words of one of its historians, “It was America’s principal attempt to win over the world’s intellectuals to the liberal democratic cause.” In seeking to influence left-wing intellectuals, it steered away from conservative thinkers. In Europe and elsewhere it featured social democrats, Christian Democrats, and even dissident Marxists. In the United States, its most active boosters were liberals, like Arthur Schlesinger Jr. and Daniel Bell, and former Marxists moving in neoconservative directions, such as Sidney Hook. The CCF defended pluralism, democracy, and even socialism, so long as it was anti-Communist. (Even late in life, both Bell and Hook still thought of themselves as socialists, at least on economic questions.) It had a sophisticated publishing operation, amplifying voices critical of Communism. It arranged, for example, for the publication of the Yugoslavian ex-Communist Milovan Djilas’s The New Class, which argued that the Soviet Union was not in fact a classless society but one in which class privilege accrued based on proximity to the state bureaucracy. The CCF also operated a stable of high-quality literary and political magazines, among them Encounter in London, Der Monat in Germany, Jiyu in Japan, and Mundo Nuevo in Latin America.
-
It is now fifty years since the so-called “G30S” or “Gestapu” (Gerakan September Tigahpuluh) event of September 30, 1965 in Indonesia, when six members of the Indonesian army general staff were brutally murdered.
-
In light of these findings, it seems hypocritical for the US to constantly wag its finger at other nations for their human rights shortcomings when past US government have engaged in such horrific mass killings.
-
It began in August 1953 – replacing democratically elected Mohammad Mossadeq (Iran’s most popular politician at the time) with a generation of brutal US-installed Mohammad Reza Shah Pahlavi dictatorship.
A 2013 declassified CIA document (marking the coup’s 60th anniversary) publicly acknowledged the agency’s involvement (Operation TPAJAX) – what’s been well-known for decades.
-
Most stories about the Cuban Missile Crisis start with Oct. 16, 1962, when the president and his advisors were briefed on the missile sites on the island. A few start with Oct. 13, when the U-2 flight that photographed the sites took off. U-2 overflights would collect more information during the crisis along with other reconnaissance plans. After collecting all the information, U.S. intelligence agencies believed the Russians had smuggled nearly 10,000 troops onto the island.
-
Fifty-one years ago, an American president deceived the public about the true purpose of a U.S. military mission, ushering in a decade of foreign policy disasters. Unfortunately, this method of abusing democracy has continued, on a bipartisan basis, to the present day, when it is casting a shadow over U.S. policy in Syria.
In August 1964, President Lyndon B. Johnson and his advisers deliberately misled Congress and the American people about the mission of two U.S. destroyers that were allegedly attacked off the coast of communist North Vietnam and their connection to U.S.-directed raids on nearby offshore islands. Their lie paved the way for U.S. bombing of North Vietnam and congressional passage of the administration’s Tonkin Gulf Resolution: a broadly worded measure that would soon facilitate Johnson’s escalation of the Vietnam War. A policy that began with an act of deceit about a U.S. military mission had awful and ill-considered consequences for Americans, Vietnamese and other southeast Asians, U.S. relations with the Soviet Union and China, and America’s global reputation. Many historians are convinced that a diplomatic settlement could have avoided most of this damage.
-
Fifty-one years ago today, the United States Navy reported that its ships had been attacked some miles off the shore of North Vietnam. Provocatively, the US ships were patrolling in areas where South Vietnam was conducting active operations against the North, prompting the latter, quite understandably, to perceive the Americans as participants in the hostilities. Torpedo boats approached within a few nautical miles of the USS Maddox, which responded with warning shots. The subsequent firefight killed four North Vietnamese sailors, destroyed several of their boats, and lightly wounded an American ship and a plane. Two days later, American ships again reported that they were under attack and for hours fiercely maneuvered and fired at North Vietnamese boats, two of which they claimed to have sunk. As it turned out, the American ships had only been picking up radar signals from their own equipment, chasing phantoms as Don Quixote had combated windmills. Regardless, President Lyndon Johnson seized on the incident as a pretext for bombing North Vietnam and drastically escalating American involvement in the war. The Gulf of Tonkin Resolution authorizing such action passed on August 7, 1964, with only two senators objecting: Wayne Morse of Oregon, a frequent Nation contributor, and Ernest Gruening of Alaska, managing editor of this publication in the early 1920s. In an editorial appearing in the first issue after the incident and the resolution, The Nation’s editors wrote, “The excessive retaliatory action the President saw fit to order brings us closer to the brink of World War III.” In the same issue, a former State Department official named John Gange wrote an essay titled “Misadventure in Vietnam: The Mix of Fact and Myth.”
-
-
Dino Scanavino, the head of the Italian Confederation of Farmers (CIA), said that existing business relations between Italy and Russia are generally favorable, as Russian entrepreneurs are actively assisting their Italian colleagues in recovering losses.
-
Transparency Reporting
-
Japanese journalist Tetsuya Abo is pulling a Snowden – he’s been living in the transit section of Moscow’s Sheremetyevo airport for over two months now. The 36-year-old said in an interview that his stay is politically motivated – he does not want to go back home, and is requesting Russian citizenship instead.
-
-
-
A judge for the US District Court for the Southern District of Florida [official website] on Monday sentenced Christopher R. Glenn 120 months in jail and three years of supervised release for willful retention of classified national defense information [DOJ press release] under the Espionage Act [text].
-
The FBI is investigating presidential candidate Hillary Clinton’s decision to use a private email account while presiding over the State Department.
The Washington Post has reported that the FBI is digging into Clinton’s operation of a personal email server as part of her work as the US Secretary of State between 2009 and 2012.
-
Sounds like free association triggered by some of the stories making the rounds on the 24/7 news networks.
There was the announcement that Israeli spy Jonathan Pollard will be paroled after serving the 30 years mandated by his “life” sentence in 1985. This is the same Jonathan Pollard who caused George Tenet to threaten to resign as CIA director when the idea of a pardon or commutation was suggested during the Clinton administration.
-
Here’s why Hillary Clinton may have broken the law
-
The key issue in play with Clinton is that it is a violation of national security to maintain classified information on an unclassified system.
Classified, secure, computer systems use a variety of electronic (often generically called TEMPESTed) measures coupled with physical security (special locks, shielded conduits for cabling, armed guards) that differentiate them from an unclassified system. Some of the protections are themselves classified, and unavailable in the private sector. Such standards of protection are highly unlikely to be fulfilled outside a specially designed government facility.
-
In April of this year, former CIA Director David Petraeus, one of the most accomplished military generals in our nation’s history, was prosecuted and sentenced to two years of probation plus a $100,000 fine for giving his biographer classified material while they were working on the book. What was lost in the shuffle is that his biographer was a Reserve Army Intelligence Officer, who herself possessed a Top Secret clearance, and that no classified materials were ever published or provided to anyone who didn’t have clearance.
Mr. Petraeus’ plea agreement carried a possible sentence of up to a year in prison, and in court papers, prosecutors recommended two years of probation and a $40,000 fine.
U.S. District Judge David Kessler, however, increased the fine, in his words to, “reflect the seriousness of the offense.”
-
The Army and CIA satisfied their obligations under the FOIA by releasing thousands of pages about a Nazi general turned U.S. spy, the D.C. Circuit ruled.
-
Last week, McClatchy’s Marisa Taylor reported on two cases showing the new appeals process for whistleblower retaliation claims ordered by President Obama is now operational; in the cases of Army whistleblower Michael Helms and CIA whistleblower John Reidy, the Intelligence Community Inspector General, Charles McCullough, has bounced the appeals back to the agencies in question for re-review.
That McCullough has chosen to bounce these two appeals back to the agencies is notable enough, because his commitment to whistleblower issues has never been apparent. Instead, McCullough has spent his time as IG conducting leak investigations. And last year, a complaint email sent to Daniel Meyer, who oversees whistleblower issues for the intelligence community, somehow got shared with the subject of the complaint. So McCullough’s record on these issues is less than stellar.
But McCullough’s move is particularly interesting when you consider the details of the appeal of the second complainant, John Reidy.
-
-
-
Harald Range, Germany’s top prosecutor, was dismissed from his duties on Tuesday by Justice Minister Heiko Maas [official website] after Range accused the German government of obstructing his investigation against two German journalists. Range was interested in an investigation against the two journalists from the website Netzpolitik.org, which had reported on the expansion of surveillance of online communication within Germany’s domestic spy agency. Range received information from an independent expert explaining that the information the journalists received from an unknown source was legitimate and also a “state secret.” In an effort to prevent anymore embarrassment to the German government, Range, who is 67, was dismissed [Deutsche Welle report], despite his intentions to retire next year and be succeeded by Munich federal prosecutor Peter Frank. The treason probe became public news last week following a criminal complaint filed by the spy agency which also targeted the unknown source who dispersed the leaked documents.
-
It all went very fast. On Tuesday morning August 4, Germany’s chief federal prosecutor, Harald Range, was ordered by Justice Minister Heiko Maas to withdraw an independent expert from the investigation of two journalists from Netzpolitik. The investigator had concluded that leaked documents quoted by the news website amounted to a disclosure of a state secret, one of the required criteria to pursue a treason case. The prosecutor protested: “To meddle with an internal review on the basis that the results might be inopportune is an intolerable interference with the independence of the judiciary .” A few hours later on Tuesday evening Maas asked for the prosecutor to be granted early retirement. In plain words, Harald Range was sacked.
-
Germany’s domestic spy agency named not just bloggers but also lawmakers in a criminal complaint that sparked a controversial treason probe, news weekly Der Spiegel said Friday.
-
German Chancellor Angela Merkel’s well-deserved holiday from the euro-zone crisis was disturbed this week by a domestic scandal involving a debate over freedom of the press vs. the protection of classified information, as German Justice Minister Heiko Maas requested the dismissal of federal prosecutor Harald Range for his investigation of two journalists for treason. Maas said Merkel agreed with his decision.
-
There are growing calls for the head of Germany’s domestic intelligence agency, Hans-Georg Maassen, to resign over the Netzpolitik affair, which has already claimed the scalp of the Federal Prosecutor Harald Range.
-
Environment/Energy/Wildlife
-
Minnesota dentist Walter Palmer went into hiding after he became the subject of international scorn for killing Cecil the lion in Zimbabwe. But another American is proudly advertising the game she has shot while on African safari – and thumbing her nose at her critics.
“To me it’s not just killing an animal, it’s the hunt,” Sabrina Corgatelli, of Idaho, told the Today show on Monday.
Corgatelli has been sharing photos on her Facebook page of her recent legal hunt in South Africa. On July 31 she reposted a picture of a massive giraffe she had killed.
-
When news of Cecil’s death first came out, many in Zimbabwe had never heard of the lion, said Fungai Machirori, a Zimbabwe-based journalist and social commentator.
-
Two professional hunters have appeared in a Zimbabwean court, each accused in separate cases of helping Americans kill lions.
-
Finance
-
Fifty years ago, more than 75% of college faculty members were full-time and had tenure or were on track to get it. Today, only a third are part of that elite group. Many of those doing the teaching at American universities are poorly paid, have no job security and limited benefits. Some have PhD’s but still qualify for government assistance to buy food.
-
“You can’t just offer free education, but I think tying it to work and making it deductible is a good idea,” Sen. Rand Paul says at Republican presidential forum at St. Anselm College in Manchester, N.H.
-
Imagine, if you will, that there’s a restaurant that offers diners a free, unlimited buffet. For years they’ve encouraged their patrons to come in and gorge themselves at will, subtly implying that anyone who pays for food is an idiot. There’ve been rumors that this restaurant’s been able to keep the buffet going by stealing food from competing restaurants, but most patrons don’t care — and as the restaurant drives out its competition, or buys them out, eventually the objections die down.
-
The UK is the 11th largest exporter in the world, behind the likes of the US, China and Germany, according to the CIA World Factbook. And, according to the BBC, the country is also the second biggest exporter of services behind the US. But the business body has urged Cameron and Osborne to “open up markets” for firms and encouraged British businesses to up the skills of their workforce.
-
-
Everyone has heard about Donald Trump’s soaring poll numbers as the current leader in the race for the Republican presidential nomination. Many have also heard the explanation that he appeals to those who feel left behind by the economy. Unfortunately, the way the media often tell this story has little to do with reality.
[...]
Both parts of this are seriously misleading. First, it is not just non-college grads who have struggled since the turn of the century. Most college grads have seen little or no wage gains since then. The second part is wrong also, since wages for non-college grads had also been stagnant since 1980, so for them the experience of the last 15 years has not been “a marked departure from prior decades.”
-
Communism was relegated to the dustbin of history for many reasons, foremost among them were its warped economic policies. In places like Poland during the 1960s, foreigners with access to hard currency could easily game the system and do pretty well. David Fischer recounts how Polish-American retirees lived like kings in Krakow, the way the embassy had to pay “bail” for one American with what turned out to be counterfeit zlotys made by the CIA, and how Western diplomats were able to travel abroad very cheaply.
-
It is important to note that forces of neo-colonialism are ably conquering our country today.
-
U.S. courts have been good to Jack Grynberg, netting him hundreds of millions of dollars in disputes with some of the world’s largest oil and gas producers since 1984.
Despite that fortune, the 83-year-old oilman says he’s fed up with America’s legal system and has taken his biggest suit yet — a battle over profits from Kazakhstan’s most valuable oil fields — to Switzerland.
-
PR/AstroTurf/Lobbying
-
The game focuses upon two branching military campaigns: One by the Marine Corps in an unnamed Middle Eastern country (situated on the in-game map directly atop modern Syria) run by a cartoonish dictator generically referred to as none other than “Al-Asad,” the other by a British SAS team combating “ultranationalist Russians” who are supporting this thinly veiled tin-pot Arabic dictator. After a patriotic romp through Central Asia, “Al-Asad” predictably (predicatively?) uses “Weapons of Mass Destruction” on his own people, leading to a climactic final battle at a Russian nuclear site in a bid to avoid World War III.
-
-
A majority of Americans in opinion surveys say they disapprove of the NSA’s collection programs. A Pew Research poll this May found a full 74 percent of respondents did not believe privacy should be sacrificed for safety. But Paul is one of only a few Republican candidates (Texas Sen. Ted Cruz is another) who has fought against the NSA program, and hawkish Republican candidates like Christie see attacking Paul on that as an effective way to build support among the Republican base, illustrating how out of touch that base can be on some of the important issues of the day.
-
-
Never mind that most US Attorneys don’t, themselves, go before the FISC to present cases (usually it is people from the National Security Division, though it was OIPR when Christie was US Attorney), never mind that the name of the court is the “Foreign Intelligence Surveillance Court.
The real doozie here is Chris Christie’s claim that he “was appointed U.S. attorney by President Bush on September 10th, 2001.”
[...]
Update: In an absolutely hysterical attempt to rebut the clear fact that he was not nominated when he said he was, Christie’s people said he was informed he would be on September 10 at 4:30 (as I suggested was likely). But the rest of the explanation makes it clear they hadn’t even done a background check yet!
-
At Thursday night’s GOP debates in Cleveland, moderators Bret Baier, Bill Hemmer, Megyn Kelly, Martha MacCallum and Chris Wallace peppered the party’s 17 presidential candidates with tough questions. But several of those questions had one key thing in common: They hit candidates for deviating from Republican orthodoxy.
-
The “My Dad” tee, offered for $25, is emblazoned with the quote, “My dad is the greatest man I’ve ever known, and if you don’t think so, we can step outside,” obviously referring to Bush’s father, former President George H.W. Bush. Bush referenced the shirt in one of the more colorful moments coming from a New Hampshire forum earlier this week.
-
Of all the candidates vying to become the nation’s next commander in chief, none has spent as much time in the military as Sen. Lindsey O. Graham. The South Carolina Republican retired from the Air Force this summer after a 33-year career, including two decades as a reservist while serving in Congress.
-
Before his rally on May 26th, his overall poll rating average in the Democratic race was at 10.6%. It now hovers around 20-25%, which is causing concern for the Clinton camp since her unfavorable rating is rising. The coming weeks will really tell if Sanders can catch Clinton, given that Joe Biden doesn’t jump into the race last minute.
-
Censorship
-
A teenage Singaporean blogger recently jailed after publishing an online video that criticised the late Lee Kuan Yew and was deemed to have been obscene and insulting to religious feelings, has launched another tirade, condemning the lack of freedom of speech in the city-state.
-
The moptopped Singaporean blogger Amos Yee is out of prison after having served 53 days in jail for posting a video criticizing the late Singaporean leader Lee Kuan Yew. And if Singaporean authorities thought a prison term might quiet the precocious teen, they were sorely mistaken: Yee is out with a new, obscene, and often hilarious video answering his critics and attacking Singapore’s lack of civil liberties.
-
Classifying books according to their suitability for different age ranges would be “ill-advised”, “unworkable” and would “raise serious concerns about censorship”, American free-speech campaigners have said, in the wake of a poll claiming that more than seven in 10 US adults believe a rating system similar to that used for films should be applied to books.
-
The atomic bombing of Hiroshima and Nagasaki 70 years ago, is one of the most studied events in modern history. And yet significant aspects of that bombing are still not well known.
-
The chancellor of the University of Illinois at Urbana-Champaign (UIUC), who was involved in firing Professor Steven Salaita over tweets he sent about Israel’s 2014 assault on Gaza, has announced her resignation yesterday. The announcement comes as a federal judge refused to dismiss Salaita’s lawsuit against the university for violating his free speech.
-
Three comics sat around a café table in the chilly atrium of the Minneapolis Convention Center, talking about how to create the cleanest possible set. “Don’t do what’s in your gut,” Zoltan Kaszas said. “Better safe than sorry,” Chinedu Unaka offered. Feraz Ozel mused about the first time he’d ever done stand-up: three minutes on giving his girlfriend herpes and banging his grandma. That was out.
-
In September 1945, less than a month after Japan’s surrender ending World War II and ushering in the U.S.-led Occupation, Gen. Douglas MacArthur, supreme commander for the Allied powers, began cracking down on alleged Japanese war criminals. Over the next three months, hundreds of politicians, military men, bureaucrats and industrialists would be issued arrest warrants for their role in leading Japan to, and through, the war.
Among those who found themselves under suspicion as Class-A, -B, or -C war criminals were senior members of the press. One of the most notorious was Matsutaro Shoriki, owner of the Yomiuri Shimbun newspaper.
“He was one of the most important journalists who actively propagated the Axis cause before the war and energetically supported it through the war,” read a secret report on Shoriki compiled by Occupation officials when he was arrested on Dec. 12,, 1945.
-
Index on Censorship deplores the killing of blogger Niloy Chakrabarti in Dhaka, Bangladesh, and calls on the authorities to investigate the murder and ensure that those responsible are found and brought to justice.
“We strongly condemn Niloy Chakrabarti’s brutal murder,” said Index’s senior advocacy officer Melody Patry. “We fear the death toll will increase if the authorities fail to take action to find and punish those responsible. Freedom of expression is in danger and Bangladesh must do more to protect writers online and offline.”
Chakrabarti, who wrote under the pen name Niloy Neel, is the fourth secular blogger to be murdered since the start of the year. A member of Bangladesh’s Science and Rationalist Association, he was attacked in his home in Dhaka.
-
Subjected to censorship by the Allied Forces for four years starting in the fall of 1945, the materials bear censorship markings ranging from check-in and examination dates to deletions, suppression and other changes.
-
-
-
-
-
-
-
Webster’s dictionary defines realpolitik as a system of politics based on a country’s situation and its needs, rather than on ideas about what is morally right and wrong. No doubt, US government officials would deny that realpolitik defines American policies, but it is hard to see any clear moral imperative with regard to that country’s relationship with Thailand.
The moral face the US shines on Thailand, urging for example, that the Thais take steps to end human trafficking and restore democratic rule, is two-faced.
-
-
British Prime Minister David Cameron is a calculated hypocrite on the question of Muslim radicalisation. In July, in the wake of the attack on British and other tourists in Tunisia, he announced a counterstrategy to stop the spread of extremist movements such as the Islamic State.
His four-pronged strategy includes delegitimising the ideology that underpinned these movements – especially those that argue for an Islamic caliphate – and emboldening the Muslim community to counter extremism from within. For Cameron: “The adherents of this ideology are overpowering other voices within Muslim debate, especially those who are trying to challenge it.”
Yet, in a self-defeating move, his government has prevented one of the most prominent voices countering radicalisation of the Islamic State variety from entering Britain: Na’eem Jeenah, a South African.
-
In the buzzing world of altcoins, blockchains, and crypto-startups, if you aren’t decentralized these days, you’re probably still considered a bit of a dinosaur. But in the world of electronic publishing, legacy opinion remains, that media should be submitted to a central authority, subjected to editorial policies and stored on servers in ever larger data-centres.
-
If you were scrolling through Twitter and saw a post saying “someone is playing hide-and-seek again. These people can grass-mud horse,” you might be more than a little mystified.
But if, say, you were Chinese, didn’t think much of your government, and knew something about fooling its stringent online censors, you may well understand the coded message.
-
Right-wing politicians from the culture minister down are getting screenings canceled. The fear is that filmmakers will start censoring themselves.
-
As we all know ever since the inspiring parade in Paris following the Charlie Hebdo attack, “free speech” is a cherished and sacred right in the West even for the most provocative and controversial views (of course, if “free speech” does not allow expression of the most provocative and controversial views, then, by definition, it does not exist). But yesterday in the U.K., the British-born Muslim extremist Anjem Choudary, who has a long history of spouting noxious views, was arrested on charges of “inviting support” for ISIS based on statements he made in “individual lectures which were subsequently published online.”
-
Privacy
-
A federal appeals court in Virginia has ruled that police must obtain a search warrant to obtain records about cellphone locations in criminal investigations.
The American Civil Liberties Union said Wednesday’s decision by the 4th U.S. Circuit Court of Appeals conflicts with two other federal appeals court rulings and increases the possibility that the U.S. Supreme Court will take up the issue.
-
This dubious “third-party doctrine,” enunciated before the Internet existed and mobile phones became ubiquitous, was crucial to the outcome of a case decided by the U.S. Court of Appeals for the 11th Circuit in May. The court said an armed robber named Quartavius Davis had no constitutional grounds to object when the FBI linked him to crime scenes with cellphone location data that it obtained without a warrant.
-
Going back to Christie’s big moment during the debate, it’s completely predictable he’d be in favor of continuing the government’s bulk collection of phone data. After all, he’s a former prosecutor and professed 9/11 hugger (which garnered an amusing eye roll from Paul). I find myself more on Paul’s side of the argument, but the public surprisingly backs renewal of the government’s program of data mining. Plus, I wanted to draw a cartoon about Christie, not the NSA, which I’ve offered my opinion on many, many times.
-
Last night, Fox News hosted one of the most ridiculous, deeply entertaining GOP Presidential debates I’ve ever had the pleasure of playing a drinking game to. In the midst of the Moscow Mules, Lagunitas and amazing Trump-isms came a pretty heated (and unexpected) shouting match between former Gov. Chris Christie and Sen. Rand Paul regarding the spying capabilities of the NSA.
-
New Jersey Governor Chris Christie, a former federal prosecutor, and Kentucky Senator Rand Paul, a Libertarian who has fought against widespread government surveillance of American citizens, sparred over how to best protect the United States from terrorists.
-
It’s taken seven years of legal wrangling, but one group of pro-privacy activists are hoping an appeals court will finally declare a critical part of the National Security Agency’s spying apparatus unconstitutional.
The Electronic Frontier Foundation (EFF) has been challenging the NSA’s bulk data collection program in court since 2008, largely running on whisteblower testimony from Mark Klein, a former AT&T technician who alleges the NSA inserted technology into the internet company’s infrastructure that allowed it to collect and analyze the data.
-
It’s taken many years, but one of the EFF’s longstanding cases against the NSA has finally reached an important milestone: exploring the 4th Amendment question raised by the NSA tapping the internet backbone. This is part of the Jewel v. NSA case that has been going on for years. Back in February (after a lot of procedural back and forth on other issues), the district court rejected the 4th Amendment argument, basically toeing the government’s “but… but… national security!” line. Not surprisingly, the EFF disagreed with the court and appealed to the 9th Circuit appeals court.
-
One of the most outrageous ways that the government has violated our Fourth Amendment rights against general seizures and searches has been through its system of tapping into the fiber optic cables of America’s telecommunications companies. The result is a digital dragnet—a technological mass surveillance system that subjects millions of ordinary Americans to the seizure and searching of their online correspondence, conversations, web searches, reading and other activities as they travel across the Internet. This tapping isn’t just about metadata—it includes full content searches of Americans’ communications, at the very least any international communications involving a website or a person who is abroad.
-
There are several intelligence agencies around the world, many of them headquartered in the US, which make use of the vastly developed technology of the digital age to spy on millions of people, who are not even considered terrorism suspects. The most (in)famous agency as such would be the NSA (National Security Agency), which uses a pretty smart foundation of ‘legal’ activities to justify its actions.
The issue is that NSA activities are anything but legal. They manage to claim that they operate within the frame of law because of the FISC (Foreign Intelligence Security Court), which interprets the actual law into what would be considered legal for NSA’s actions. In other words, when the NSA goes searching for information about whomever it wants, there is usually no warrant, as the person is usually not even a suspect.
-
The NSA ANT Catalog is a 50-page classified document listing technology available to the NSA Tailored Access Operations by the ANT division to aid in cyber surveillance. Most documents are described as already operational and available to U.S. nationals and members of the Five Eyes Alliance – Australia, Canada, New Zealand, the United Kingdom and the United States. The document was first revealed in an article by security researchers in the German newspaper Der Spiegel, which released the catalog to the public on December 30, 2013.
-
The only term being thrown around government more than “2016 elections” these days is “cybersecurity,” particularly following a rash of damaging and high-profile data breaches. With that focus on protecting information top of mind in agencies, USMobile officials hope to find a ready market for their commercial app, which lets government workers use their personal smartphones for top-secret communications.
-
It’s always fascinating to watch how security concepts are communicated to the general public and by “fascinating”, I mean it’s sometimes horrifying. There is no more poignant an example than that of encryption and I found the piece from CNN a few days ago on how encryption is a growing threat to security to be the absolute epitome of disinformation. It would be understandable if the general public walked away from reading and watching this piece with the distinct impression that encryption was the root of all evil. Why? Apparently “because terrorism”.
-
The NSA and FBI are major contributors to EPIC — the Electronic Privacy Information Center. But their “donations” aren’t exactly voluntary.
A hefty chunk of EPIC’s legal budget is taken from the pockets of the very agencies it sues, each time a federal judge agrees that the government was wrong to keep the information secret.
-
Sen. Rand Paul and New Jersey Gov. Chris Christie traded barbs Thursday night over the National Security Agency’s bulk collection of U.S. phone records. In the heat of the Republican presidential debate, Christie got the last word in — but who actually came out of the exchange on top?
-
Starting in 1966, the project leapt into life when the NSA fronted the money for the GCHQ to build a station in Bude, Cornwall, capable of intercepting satellite communications from Intelsat, the first commercial communications satellite network.
-
NSA documents obtained by whistleblower Edward Snowden confirm the existence of ECHELON, a secret surveillance network spying on satellite communications. Set up by the US and the UK in the 1960s, ECHELON was the precursor of today’s global dragnet.
-
If history is written by the victors, government surveillance agencies will have an awfully long list of sources to cite.
Domestic digital surveillance has often seemed to be a threat endured mostly by the social media generation, but details have continued to emerge that remind us of decades of sophisticated, automated spying from the NSA and others.
Before the government was peering through our webcams, tracking our steps through GPS, feeling every keystroke we typed and listening and watching as we built up complex datasets of our entire personhood online, there was still rudimentary data to be collected. Over the last fifty years, Project ECHELON has given the UK and United States (as well as other members of the Five Eyes) the capacity to track enemies and allies alike within and outside their states. The scope has evolved in that time period from keyword lifts in intercepted faxes to its current all-encompassing data harvesting.
-
For those inclined to think that the series of surveillance scandals and leaks over the past two years are unlikely to have much of an impact, it is worth recalling that, up until a little over 30 years ago, the British government denied the very existence of a spying organisation called GCHQ. As investigative journalist Duncan Campbell described in the Intercept yesterday, in a compelling account of a life spent chasing Britain’s spies out of the shadows, in the 70s and 80s even talking about GCHQ, let alone investigating and reporting on it, could get you followed, arrested and jailed.
-
It took more than 25 years for Duncan Campbell to finally publish confirmation of the Echelon project, completing a story he began breaking in 1988.
The scoop, released on The Register and The Intercept this week, capped off some 40 years of investigative journalism on British and American spy agencies, Campbell having begun his career by revealing the existence of Government Communications Headquarters (GCHQ).
-
-
The National Security Agency (NSA) espionage program Echelon remains active, which controls 90 percent of global communications, revealed today the intercept digital site.
In an article in the Internet portal, the British journalist Duncan Campbell made the history of this monitoring system, also known as Project P415, and sets filtered by former contractor NSA Edward Snowden, now a refugee in Russia elements.
The materials confirm that the mechanism was created in 1966, shortly after the first communication satellites began operating in earth orbit.
Overall network received the codename Frosting and consisted of two subprograms: Transient directed against communications satellite of the Soviet Union, and Echelon, which focused on electronic signals Western powers.
-
In an exclusive interview with Sputnik, the respected UK investigative reporter Duncan Campbell has said a western-led mass surveillance system developed in the 1960s is “bigger than ever, much more powerful and a critical component” of mass surveillance.
-
Legendary investigative journalist Duncan Campbell describes his life of being kidnapped by the London Metropolitan Police’s Special Branch, being surveiled and harassed by UK spies and ministers, and reveals the identity of the whistleblower who leaked the details of ECHELON to him.
Campbell’s article is accompanied by never-released Snowden docs that demonstrate the full scope of ECHELON surveillance, and traces the lineage of journalists and whistleblowers who took huge personal risks to reveal corruption, criminal wrongdoing, and secrecy among spies and their masters in government.
-
U.S. Vice President Joe Biden apologized to Prime Minister Shinzo Abe on Wednesday for “causing trouble,” after documents released last week detailed alleged spying by the U.S. National Security Agency on the government in Tokyo, a top Japanese official said.
Chief Cabinet Secretary Yoshihide Suga said the phone conversation between Biden and Abe came about at Washington’s request.
Suga declined to comment on whether Biden admitted the U.S. had spied on Japanese officials and companies over a period that started in 2006, as alleged in documents released last week by anti-secrecy group WiliLeaks.
-
Last Friday, the WikiLeaks website unveiled evidence that the U.S. National Security Agency is conducting espionage operations in Japan. On July 31, WikiLeaks published “Target Tokyo,” a list of 35 Top Secret NSA targets in Japan and five NSA reports on intercepts relating to U.S.-Japan relations, trade negotiations, and sensitive climate strategy.
-
WikiLeaks also released a statement issued by Julian Assange, where he said that the documents showed clearly the vulnerability of the Japanese government as officials had been worrying in private about how much or how little inside information they would let Washington know.
-
Tokyo is waiting for the United States to clarify situation with the revelations concerning the US National Security Agency (NSA) spying on the Japanese government and businesses, Japan’s Chief Cabinet Secretary Yoshihide Suga told journalists.
-
The Japanese government has remained relatively silent since the WikiLeaks website published documents Friday showing the U.S. National Security Agency (NSA) has spied on the Japanese government and Japanese companies.
The documents, dated from 2007 to 2009, include five NSA reports — four of which are marked top-secret — that provide intelligence on Japanese positions on international trade and climate change.
WikiLeaks also posted an NSA list of 35 Japanese targets for telephone intercepts including the Japanese Cabinet Office, the Bank of Japan, the country’s finance and trade ministries, and major Japanese trading companies.
-
Japanese Prime Minister Shinzo Abe asked US Vice President Joe Biden to investigate allegations that the United States spied on top Japanese government and corporate officials, a Japanese government spokesman said on Wednesday.
-
The latest WikiLeaks revelations documenting close National Security Agency (NSA) spying on Japan will provoke countries the United States is courting for the Trans Pacific Partnership (TPP) free trade agreement to increase their demands, experts told Sputnik.
-
New leaked documents published by Wikileaks show that the US spy agency conducted surveillance operations against Japan’s top government officials, prioritizing finance and trade ministers, as well as the Japanese central bank and two private-sector energy companies.
There’s no conceivable connection between this long-term surveillance — which included wiretaps — and national security.
-
Japanese leader Shinzo Abe told US Vice President Joe Biden he would have “serious concerns” if WikiLeaks claims Washington spied on Japanese politicians were true, and called for an investigation, a top official said Wednesday.
Tokyo’s Cabinet spokesperson Yoshihide Suga said Biden had apologised to the Japanese prime minister in a telephone call for “causing troubles”, without confirming the spying claims.
-
Prime Minister Shinzo Abe has told US Vice-President Joe Biden he will have “serious concerns” if WikiLeaks claims that Washington spied on Japanese politicians are true, calling for an investigation.
-
Commenting on the recent WikiLeaks revelations concerning US National Security Agency spying on the Japanese government, a Japanese politician told Sputnik that it might seriously undermine trust in the current government of Prime Minister Shinzo Abe and damage Japanese-American relations; however, another political analyst has a different opinion.
-
Prime Minister Shinzo Abe has told US Vice President Joe Biden he will have ‘serious concerns’ if WikiLeaks claims Washington spied on Japanese politicians are true, calling for an investigation.
Tokyo’s Cabinet spokesman Yoshihide Suga said Biden had apologised to the Japanese leader in a telephone call for ‘causing troubles’, without confirming the spying claims.
WikiLeaks said on Friday it had intercepts revealing years-long spying by the US National Security Agency (NSA) on Japanese officials and major companies.
-
The Wikileaks website on Friday posted U.S. National Security Agency (NSA) reports and a list of 35 Japanese targets for telephone intercepts, including the Japanese Cabinet Office, the Bank of Japan, the country’s finance and trade ministries, and major Japanese trading companies.
According to the website, the eavesdropping dated back to 2007, a year after Abe’s first term began, and one report from telephone intercepts of senior Japanese officials could have been shared with Australia, Canada, Britain and New Zealand — the U.S. intelligence partners.
-
-
Japanese Prime Minister Shinzo Abe called on US Vice President Joe Biden on Wednesday to investigate allegations by WikiLeaks that Washington spied on the Japanese government and companies, Tokyo said.
-
According to a legal fellow at Electronic Frontier Foundation, the German authorities seem to have plans for a mass surveillance program that parallels the NSA program.
-
On Monday, the National Security Agency tapped retired Milbank partner Glenn Gerstell as its new General Counsel.
-
-
Zalmai Azmi has taken the reins as president and chief operating officer of the IT consulting firm IMTAS, the firm announced Aug. 1.
A native of Afghanistan who served as the FBI’s CIO from 2004 to 2008 and led the bureau through an IT transformation, Azmi said he is “pleased and excited” to be taking the new role at IMTAS. Azmi has previously served as CEO of Nexus Solutions, a senior vice president at CACI and CIO for the Executive Office for United States Attorneys.
-
A federal judge dismissed most, but not all, of the National Security Agency’s requests to dismiss a reporter’s FOIA request on federal surveillance of judges.
Jason Leopold, formerly with Al-Jazeera America and now with Vice News, filed two FOIA requests for NSA and FBI “surveillance of federal and state judges.”
The NSA and the Department of Justice’s Office of Legal Counsel responded that they had no such records.
They sought summary judgment and dismissal. Leopold claims they failed to conduct adequate searches.
-
The Department of Justice refuses to reveal its unpublished rules for spying on journalists, and the Freedom of the Press Foundation demands a look at them, in Federal Court.
-
The process of generating a good random number begins with the server translating mouse movements, keyboard presses and other things a machine does into a data stream of ones and zeros. This data is gathered in a “pool” that is regularly called on for many security functions.
-
South Korea is moving to implement a policy that will have the public sector give preferential treament to local storage and server vendors over foreign counterparts starting next year to boost the market.
-
A.B. 1326 (Dababneh) is a bill that would require “virtual currency businesses” to apply for and obtain a license in order to offer services in California, and it includes significant fees and administrative hurdles. Unfortunately, the bill’s language is so vague that it’s unclear what companies are, in fact, “virtual currency businesses.” So in spite of carve-outs for smaller companies and for software developers who don’t exercise control over the currency, the proposal threatens the future of virtual currency experimentation and innovation in the state.
-
Have you ever faced the following dilemma? Your favourite website is equipped to detect whether you’re using an ad blocker, obviously you have one installed, and then you get a pop up or toolbar appear asking “Would you please add us to your ad blocker’s whitelist? Ads help keep this site running.”, obviously at this point you feel a bit bad and go ahead to disable the ads on that site. The issue you have now is that you just let an ad provider plant a cookie on your computer that will track you around the internet reporting what you’re interests are.
-
-
When the OPM breach was first discovered, the number of people said to be affected was four million. This figure quickly rose to 22 million, though the Solutionary report states this is probably a very misleading figure. The issue is that the records accessed were not only those of government employees, but also included personal data about family members and even friends, and so the number of people affected is likely to be closer to 132 million, and even this could be conservative. However the authors of the report state it will probably never be known just how big the breach was, but it is likely to have been “the biggest loss of private information ever.”
-
-
The new case creates multiple circuit splits, which may lead to Supreme Court review. Specifically, the decision creates a clear circuit split with the Fifth and Eleventh Circuits on whether acquiring cell-site records is a search. It also creates an additional clear circuit split with the Eleventh Circuit on whether, if cell-site records are protected, a warrant is required. Finally, it also appears to deepen an existing split between the Fifth and Third Circuits on whether the Stored Communications Act allows the government to choose whether to obtain an intermediate court order or a warrant for cell-site records.
-
It was recently announced that Sri Lanka had been chosen to launch the Google balloon-based internet services under a project titled ‘Google Loon Project’. Anything being rolled out for the first time and free should raise concern. Why ‘experiment’ on Sri Lanka moreover why Sri Lanka or does it align to Kerry’s success in regime change in Sri Lanka and pax Americana goal? It is not so much as the idea to provide internet coverage to the whole of Sri Lanka (though users will still have to pay to their local service provider) but the ability that the owners of the balloon have over a sovereign country and whether local laws or even international can cover the range of spying/surveillance that can be done! Associated with the project and representing the US intelligence community is Dr. Bhavani Thuraisingham Executive Director of Cyber Security Research and Education Institute which is sponsored by George Soros’s Raytheon. The most important unanswered question is why was such a project kept secret from the Sri Lankan public, why were associated stakeholders not involved to report on the pros & cons and moreover why was the fundamental rights of privacy of the people violated. None of us wish to have the entire country under a blanket of US surveillance and it is wrong to have enforced such a project overlooking the national security concerns and the privacy of the people of Sri Lanka. Even the business community will undoubtedly have reservations. Will the world’s 1.8billion internet users like to have their privacy invaded too?
-
Alessandro Ford picked a gap year involving the world’s most secretive and repressed country.
-
Contreras, who headed agency that kidnapped, tortured and killed thousands, died while serving 500 year sentence for crimes against humanity
-
-
-
Gen. Manuel Contreras, Chile’s intelligence chief during the military dictatorship of Gen. Augusto Pinochet, died on Friday in the military hospital in Santiago while serving 526 years of multiple prison terms for human rights violations. He was 86.
-
-
-
-
The Tor network is similar to a door lock: It works well, until a determined individual wants to get in. Get details on what Tor is and what it is not.
-
All espionages are a fact of life in today’s world, but none is morally acceptable, much less superior, to others.
-
When you meet a new someone who makes your heart flutter and the feeling is mutual, and the two of you have spent significant parts of your life in the same city at the same time, there is usually a conversation within the first few weeks of the relationship trying to figure out why you didn’t meet sooner. You talk about the places you hung out and usually realize that you frequented the same coffee shop or bar or music venue, and you wonder if you were ever there at the same time. Were your phones to offer up their full history of where they’ve been, you could line up your personal tracking maps and find out the exact moment you might have encountered one another earlier in life.
-
-
-
It seems clear that Edward Snowden and Julian Assange can look forward to extended vacations once their feet touch US soil. Like Pollard, Snowden’s charges fall under the US Espionage Act where defendants are not allowed to raise a defense. But unlike Mr. Pollard, Edward Snowden and Julian Assange has the internet and social media at their disposal to gain US and possibly worldwide sympathy. US Administration officials would probably not risk a drop in approval ratings and throw Snowden and Assange in Pollard’s vacated cell, or would they?
-
Data collection is only a small part of the NSA’s intelligence tasks. The main goal of the US’ intelligence agencies is to control politicians and managers in Europe, former head of the Austrian Federal Office for the Protection of the Constitution, Gerd Polli, said in an interview with DWN.
-
A group of researchers from the US government and dot-com operator VeriSign are working on a new system for secure email: using domain names.
Highlighting the problems and security holes associated with current mail systems, the team from the National Institute of Standards and Technology (NIST), a subset of the US Department of Commerce, argues that by using a new set of security protocols built around the domain name system, it is possible to provide a much higher level of security in electronic messages.
-
The Los Angeles and Chicago police departments have acquired “dirt boxes” – military surveillance technology that can intercept data, calls and text messages from hundreds of cellphones simultaneously, as well as jam transmissions from a device, according to documents obtained by Reveal.
-
The Obama administration’s spy agencies have been keeping track of the movements, communications and activities of the new crop of Black activists. Although not surprising, the recent reports should give rise to “new strategies and tactics to exchange information among groups, and new modalities to circumvent infiltration and, ultimately, government sting operations.”
-
-
U.S security officials recently stressed a need for a massive cyberweapon to provide a deterrent against ongoing and future cyber attacks by foreign powers.
Admiral Michael Rogers—National Security Agency (NSA) director and head of U.S. Cyber Command—said it will require such a counterstrike capability to deter enemy hackers trying to penetrate our security data systems.
Rogers cited the nuclear deterrence strategy of the Cold War missile race as relevant for defense against recent attacks on U.S. government and business databases.
-
But how can that be? China is accused of obtaining personal information about 20 million Americans, federal employees and contractors, and that’s a big deal. But the US’s NSA, according to documents leaked by whistleblower Edward Snowden, processes 20 billion phone calls and internet messages every day. The NSA’s unofficial motto for years has been “Collect It All.”
The article notes that the US has its own “intelligence operations inside China”—but pretends these are purely defensive, referring to “the placement of thousands of implants in Chinese computer networks to warn of impending attacks.”
-
Civil Rights
-
The American Psychological Association made a nearly unanimous decision today to bar psychologists from participating in national security interrogations, The New York Times reports. The decision was a response to an independent report that came out last month, detailing how top APA officials and psychiatrists participated in the CIA’s torture program during the Bush administration.
-
What do numerous privacy groups, civil liberties organizations, open government advocates, free market proponents, technologists, and the Department of Homeland Security have in common? Deep concern about the Cybersecurity Information Sharing Act, or “CISA,” a bill expected to come to a vote this week in the Senate.
-
Earlier this year, we covered the story of Louise Milan, a 68-year-old grandmother whose house was raided by a SWAT team (accompanied by a news crew) searching for someone who had made alleged threats against police officers over the internet. Part of the probable cause submitted for the warrant was Milan’s IP address. But the police made no attempt to verify whether any resident of Milan’s house made the threats and ignored the fact that the IP address was linked to an open WiFi connection.
-
There’s been more good news than bad concerning the Fourth Amendment recently. In addition to the Supreme Court’s ruling that searches of cellphones incident to arrest now require a warrant, various circuit court decisions on cell site location info and the surreptitious use of GPS tracking devices may see the nation’s top court addressing these contentious issues in the near future. (The latter still needs to be addressed more fully than the Supreme Court’s 2012 punt on the issue.)
-
A wave of companies with ties to the intelligence community is winning over the world of finance, with banks and hedge funds putting the firms’ terrorist-tracking tools to work rooting out employee misconduct before it leads to fines or worse.
-
Three months after President Barack Obama was sworn into office, then-CIA Director Leon Panetta sent a letter to congressional oversight committees informing them that the agency was changing its torture policies.
But the CIA would still play a significant role in the interrogation of terrorism suspects, according to a top-secret letter Panetta wrote [pdf below] that was recently declassified by the CIA and obtained exclusively by VICE News in response to a Freedom of Information Act (FOIA) request.
Panetta’s letter was sent to lawmakers just days after the Senate Intelligence Committee voted to begin an investigation into the efficacy of the CIA’s detention and interrogation program. It also followed an executive order Obama signed as one of his first acts as president outlawing the use of so-called “enhanced interrogation techniques” and shuttering the CIA’s network of black site prisons where detainees were held.
-
In a bid to bring the “rest of the story” to the nation about the CIA’s detention and interrogation of al Qaeda terrorists, eight former top CIA officials, including three directors, are publishing a rebuttal to the sensational Senate Democratic “torture report.”
-
-
In an attempt to unveil what was really behind the scenes of the Al Qaeda terrorist interrogations conducted by the CIA, eight former high-ranking CIA officials, including three former directors, are ready to publish a response to last year’s incendiary US Senate “torture report”, according to the Washington Examiner.
-
Former US State Department official William Blum does not consider the recent statements about torture used by CIA under a program of “enhanced interrogation” as “sensational.”
-
Former top CIA officials planning a major public-relations campaign to rebut the Senate torture report’s damning revelations have found themselves undermined by one of their own.
Eight former top officials wrangled by Bill Harlow — the former CIA flak who brought us the CIASavedLives.com website after the Senate report was issued last December — are publishing a book in the coming weeks titled Rebuttal: The CIA Responds to the Senate Intelligence Committee’s Study of Its Detention and Interrogation Program.
-
A former top CIA official acknowledged that the US intelligence agency tortured terror suspects after the September 11, 2001 terrorist attacks under a program called “enhanced interrogation.”
-
The book by the former CIA officers likely will be met with denunciations from Feinstein and others who accuse the U.S. of torturing Islamic terrorists. When former CIA Deputy Director Michael Morell published, “The Great War of Our Time,” earlier in 2015, Feinstein responded to his defense of CIA treatment of terrorists by issuing both a press release and a 54-page “fact check” sheet through her official senatorial website. Feinstein condemned the book through both statements and reiterated her accusation that Americans were guilty of torture.
-
We broadcast from Toronto, Canada, site of the annual convention of the largest group of psychologists in the world, the American Psychological Association. Ahead of a vote on a resolution to bar psychologists from participating in national security interrogations, the Psychologists for Social Responsibility hosted a town hall meeting. We feature highlights.
-
-
In what may seem like a no brainer, the American Psychological Association has voted to ban any member from participating in government torture programs. The decision follows a report which details the organization’s role in justifying “enhanced interrogation.”
-
The American Psychological Association (APA) voted nearly unanimously on Friday in favor of a resolution prohibiting its members from participating in national security interrogations. Retired Col. Larry James, the former top Army intelligence psychologist at Guantanamo, had the only dissenting vote, Democracy Now reports.
-
The American Psychological Association (APA) voted overwhelmingly on Friday to prohibit members from participating in interrogations conducted by United States intelligence agencies at locations deemed illegal under international law.
-
Following revelations earlier this year that American Psychological Association (APA) officials actively colluded with the CIA’s enhanced interrogation program, the group voted nearly unanimously Friday to prohibit psychologists from participating in future national security interrogations.
-
-
-
-
-
-
-
-
-
The American Psychological Association is holding its annual convention this weekend in Toronto. It’s a huge organization, about 100,000 members — academics, researchers, practitioners. This is the seventh time in 37 years that they’re meeting here, a frequency or repetition compulsion that may be worthy of research and, possibly, therapy. Canadians belong to it, the way the Blue Jays belong to the American League. We’re in it but not always of it.
-
By a nearly unanimous vote, the American Psychological Association’s Council of Representatives voted today in Toronto to adopt a new policy barring psychologists from participating in national security interrogations. Retired Col. Larry James, the former top Army intelligence psychologist at Guantánamo, cast the sole dissenting vote.
-
Torture is just torture when you get rid of the pseudo-science.
-
In 2005 the top brass in the American Psychological Association changed its code of ethics.
-
The Romanian prison was code named “Bright Light” and was part of a secret network of prisons operated by the U.S.
-
But he was best known publicly for his role in exposing the extent to which a key part of the administration’s case for war with Iraq had been built on the claims of an Iraqi defector and serial fabricator with the code name Curveball.
-
But he was best known publicly for his role in exposing the extent to which a key part of the administration’s case for war with Iraq had been built on the claims of an Iraqi defector and serial fabricator with the fitting code name “Curveball.”
In contrast to Hollywood’s depiction of spies as impossibly elegant and acrobatic, Drumheller was a bulky, rumpled figure who often seemed oblivious to the tufts of dog hair on his clothes.
-
-
Specifically, he vocally criticized the agency’s trust in an Iraqi defector code-named Curveball, who gave faulty intelligence that Saddam Hussein had developed laboratories for biological weapons. The assertions played a major role in the George W. Bush administration’s public case for invading Iraq in 2003.
Drumheller also criticized the Bush administration’s claims that Iraq was buying yellowcake uranium from Niger, which it used as evidence to support the claim that Hussein was developing weapons of mass destruction.
-
-
Most of Obama’s letter contained information we already know. One of his first acts in office was to sign an Executive Order ending the CIA’s illegal detention and interrogation program. He is working to close Guantanamo, an unenviable task that raises as many questions as it solves but still must be done.
-
Nothing is more un-American than the support of torture by our government. That is the axiom I grew up with as a first-generation American born to Latvian emigres. In the final days of World War II, my parents, now deceased, fled the totalitarian Latvian Soviet Socialist Republic because they feared they would be tortured or murdered by the NKVD, as the Soviet internal police were known, if not summarily deported to Gulag labor camps.
-
The CIA is willing to overlook some of its shadier partners’ human rights records if they can still get the goods, according to agency Director John Brennan.
In a letter sent to a trio of lawmakers and provided to The Huffington Post, Brennan expanded on the agency’s controversial relationships with less-than-desirable characters, offering an unusually candid glimpse into the spies’ liaison partnerships.
The letter, a response to Sens. Ron Wyden (D-Ore.) Martin Heinrich (D-N.M.) and Mazie Hirono (D-Hawaii), sought to clarify public remarks made by Brennan earlier this year. The unclassified response was dated Thursday.
-
More than six months after the CIA inspector general resigned, President Obama has yet to nominate a replacement, prompting mounting concerns on Capitol Hill that the delay may be affecting sensitive internal investigations — including a probe into an errant drone strike in Pakistan that killed American hostage Warren Weinstein, sources told Yahoo News.
-
-
Doug Williams used to give polygraph exams. Now he’s going to prison for teaching people how to beat them
There was something odd, Doug Williams recalls, about the clean-cut young man who came to see him on Feb. 21, 2013. When Brian Luley had called two weeks earlier, he’d introduced himself as a deputy sheriff in Virginia applying for a job with U.S. Customs and Border Protection. To get the job, Luley needed to pass a polygraph test, and there were “a couple of reasons” he thought that might be a problem.
-
On 20 July 2015, the trial of former Chadian President Hissène Habré began in Senegal. The trial reflects many of the tensions afflicting international justice. Habré, who is charged with crimes against humanity, torture, and war crimes, relating to the death of an alleged 40,000 people between 1982 and 1990, denounced the court as a colonial project before being forcibly removed from the courtroom. The trial was subsequently postponed until 7 September, for Habré’s defence counsel to review court files.
-
Donald Trump opened the door to torturing terrorism suspects if he’s elected president, telling ABC News Sunday that waterboarding “doesn’t sound very severe” given the barbarism of ISIS.
-
About 8.5% of those held at the site were white. According to the 2010 census, Chicago’s population is 32% non-Hispanic white, 33% black, and 29% Hispanic (of which 13.5% identify as racially white) .
-
When you say Black Lives Matter do you mean just Black American lives? What about the tens of thousands of black lives in Cuba that have been lost due to the covert war and the economic embargo still being waged against Cuba by the US government?
Or what about the black lives that were lost when the UN over saw the starvation deaths of 250,000 “black” Somalis during the worst drought and famine in 60 years from 2010-2012, deaths that were predicted when UNICEF, headed by former senior foreign policy advisor to Barack Obama, Anthony Lake, budgeted less than 10 cents a day to feed the Somali refugees under their care?
Do Black Lives Matter when the CIA and their capos in the human trafficking mafia in East Africa sends hundreds of Eritrean migrants to their deaths in rickety boats on the Mediterranean Sea (the Eritrean government continues to demand that the UN convene hearings so the reams of evidence they have on the CIA’s role in these crimes can be exposed to international scrutiny)?
Do these Black lives matter just as much as Black American lives?
-
Internet/Net Neutrality
-
-
The Internet is barreling down the same road of regulation and not-so-subtle censorship that has turned every other means of mass communication into a centralized and vanilla fountain of useless information. Kinda like television.
-
A U.S. appeals court will hear oral arguments on Dec. 4 in lawsuits that challenge the Federal Communications Commission’s “net neutrality” rules, which prevent broadband providers from blocking or slowing Internet traffic, the court said on Monday.
-
Intellectual Monopolies
-
Names
-
An anti-piracy firm working for Columbia Pictures has hit Vimeo with a wave of bogus copyright takedowns just because people used the word ‘Pixels’ in their video titles. Several indie productions are affected, including an art-focused NGO, an award-winning short movie and a royalty free stock footage company.
-
The dispute began in 2012 when Michael Jordan took the sports brand Qiaodan Sports to court, alleging the misuse of his name and several other marks, such as the number 23 (used by him during his tenure in the NBA) and the Jumpman logo (derived from a photoshoot with Nike, incorporating Mr Jordan’s often unique and flamboyant dunk poses) that is associated with his own Air Jordan brand. At first instance his claim was denied, and Mr Jordan subsequently appealed that decision to the High People’s Court.
-
Copyrights
-
The Recording Industry Association of America (RIAA) sent a letter to BitTorrent last week asking the company to help stop copyrighted infringement of its members’ content. Brad Buckles, RIAA’s executive vice president of anti-piracy, asked BitTorrent CEO Eric Klinker to “live up to” comments made by former chief content officer Matt Mason.
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »
Further Recent Posts
- Watchtroll a Fake News Site in Lobbying Mode and Attack Mode Against Those Who Don't Agree (Even PTAB and Judges)
A look at some of the latest spin and the latest shaming courtesy of the patent microcosm, which behaves so poorly that one has to wonder if its objective is to alienate everyone
- The Productivity Commission Warns Against Patent Maximalism, Which is Where China (SIPO) is Heading Along With EPO
In defiance of common sense and everything that public officials or academics keep saying (European, Australian, American), China's SIPO and Europe's EPO want us to believe that when it comes to patents it's "the more, the merrier"
- Technical Failure of the European Patent Office (EPO) a Growing Cause for Concern
The problem associated with Battistelli's strategy of increasing so-called 'production' by granting in haste everything on the shelf is quickly being grasped by patent professionals (outside EPO), not just patent examiners (inside EPO)
- Links 5/1/2017: Inkscape 0.92, GNU Sed 4.3
Links for the day
- Links 4/1/2017: Cutelyst 1.2.0 and Lumina 1.2 Desktop Released
Links for the day
- Financial Giants Will Attempt to Dominate or Control Bitcoin, Blockchain and Other Disruptive Free Software Using Software Patents
Free/Open Source software in the currency and trading world promised to emancipate us from the yoke of banking conglomerates, but a gold rush for software patents threatens to jeopardise any meaningful change or progress
- New Article From Heise Explains Erosion of Patent Quality at the European Patent Office (EPO)
To nobody's surprise, the past half a decade saw accelerating demise in quality of European Patents (EPs) and it is the fault of Battistelli's notorious policies
- Insensitivity at the EPO’s Management – Part V: Suspension of Salary and Unfair Trials
One of the lesser-publicised cases of EPO witch-hunting, wherein a member of staff is denied a salary "without any notification"
- Links 3/1/2017: Microsoft Imposing TPM2 on Linux, ASUS Bringing Out Android Phones
Links for the day
- Links 2/1/2017: Neptune 4.5.3 Release, Netrunner Desktop 17.01 Released
Links for the day
- Teaser: Corruption Indictments Brought Against Vice-President of the European Patent Office (EPO)
New trouble for Željko Topić in Strasbourg, making it yet another EPO Vice-President who is on shaky grounds and paving the way to managerial collapse/avalanche at the EPO
- 365 Days Later, German Justice Minister Heiko Maas Remains Silent and Thus Complicit in EPO Abuses on German Soil
The utter lack of participation, involvement or even intervention by German authorities serve to confirm that the government of Germany is very much complicit in the EPO's abuses, by refusing to do anything to stop them
- Battistelli's Idea of 'Independent' 'External' 'Social' 'Study' is Something to BUY From Notorious Firm PwC
The sham which is the so-called 'social' 'study' as explained by the Central Staff Committee last year, well before the results came out
- Europe Should Listen to SMEs Regarding the UPC, as Battistelli, Team UPC and the Select Committee Lie About It
Another example of UPC promotion from within the EPO (a committee dedicated to UPC promotion), in spite of everything we know about opposition to the UPC from small businesses (not the imaginary ones which Team UPC claims to speak 'on behalf' of)
- Video: French State Secretary for Digital Economy Speaks Out Against Benoît Battistelli at Battistelli's PR Event
Uploaded by SUEPO earlier today was the above video, which shows how last year's party (actually 2015) was spoiled for Battistelli by the French State Secretary for Digital Economy, Axelle Lemaire, echoing the French government's concern about union busting etc. at the EPO (only to be rudely censored by Battistelli's 'media partner')
- When EPO Vice-President, Who Will Resign Soon, Made a Mockery of the EPO
Leaked letter from Willy Minnoye/management to the people who are supposed to oversee EPO management
- No Separation of Powers or Justice at the EPO: Reign of Terror by Battistelli Explained in Letter to the Administrative Council
In violation of international labour laws, Team Battistelli marches on and engages in a union-busting race against the clock, relying on immunity to keep this gravy train rolling before an inevitable crash
- FFPE-EPO is a Zombie (if Not Dead) Yellow Union Whose Only de Facto Purpose Has Been Attacking the EPO's Staff Union
A new year's reminder that the EPO has only one legitimate union, the Staff Union of the EPO (SUEPO), whereas FFPE-EPO serves virtually no purpose other than to attack SUEPO, more so after signing a deal with the devil (Battistelli)
- EPO Select Committee is Wrong About the Unitary Patent (UPC)
The UPC is neither desirable nor practical, especially now that the EPO lowers patent quality; but does the Select Committee understand that?
- Links 1/1/2017: KDE Plasma 5.9 Coming, PelicanHPC 4.1
Links for the day
- 2016: The Year EPO Staff Went on Strike, Possibly “Biggest Ever Strike in the History of the EPO.”
A look back at a key event inside the EPO, which marked somewhat of a breaking point for Team Battistelli
- Open EPO Letter Bemoans Battistelli's Antisocial Autocracy Disguised/Camouflaged Under the Misleading Term “Social Democracy”
Orwellian misuse of terms by the EPO, which keeps using the term "social democracy" whilst actually pushing further and further towards a totalitarian regime led by 'King' Battistelli
- EPO's Central Staff Committee Complains About Battistelli's Bodyguards Fetish and Corruption of the Media
Even the EPO's Central Staff Committee (not SUEPO) understands that Battistelli brings waste and disgrace to the Office
- Translation of French Texts About Battistelli and His Awful Perception of Omnipotence
The paradigm of totalitarian control, inability to admit mistakes and tendency to lie all the time is backfiring on the EPO rather than making it stronger
- 2016 in Review and Plans for 2017
A look back and a quick look at the road ahead, as 2016 comes to an end
- Links 31/12/2016: Firefox 52 Improves Privacy, Tizen Comes to Middle East
Links for the day
- Korea's Challenge of Abusive Patents, China's Race to the Bottom, and the United States' Gradual Improvement
An outline of recent stories about patents, where patent quality is key, reflecting upon the population's interests rather than the interests of few very powerful corporations
- German Justice Minister Heiko Maas, Who Flagrantly Ignores Serious EPO Abuses, Helps Battistelli's Agenda ('Reform') With the UPC
The role played by Heiko Maas in the UPC, which would harm businesses and people all across Europe, is becoming clearer and hence his motivation/desire to keep Team Battistelli in tact, in spite of endless abuses on German soil
- Links 30/12/2016: KDE for FreeBSD, Automotive Grade Linux UCB 3.0
Links for the day
- Software Patents Continue to Collapse, But IBM, Watchtroll and David Kappos Continue to Deny and Antagonise It
The latest facts and figures about software patents, compared to the spinmeisters' creed which they profit from (because they are in the litigation business)