EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

06.29.13

Links 29/6/2013: Fedora 19 Due July 2nd, Android 4.3 Ousted

Posted in News Roundup at 10:25 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Logic Supply partners with Linux developer for digital signage, kiosks

    Industrial and embedded computer provider Logic Supply recently announced a new partnership for with RapidRollout, a developer of custom Linux platforms for computing appliances. This partnership will allow Logic Supply to offer customers complete Linux operating system solutions in addition to its computer hardware, the company said.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • KDE Releases Second Beta Of Plasma Workspaces, Applications and Platform 4.11

        The KDE community has released the second beta version of their new Plasma Workspaces, Applications and Development platforms. The KDE team is now focusing on bug fixing and polishing, while API, dependency and features remain fixed.u

      • QUndoStack versus Kate’s Undo System
      • qt-signal-tools 0.2
      • More Software Compositing

        One of the most often repeated misconceptions about Wayland is that it requires hardware acceleration. I would have thought that this issues would have been resolved once the reference compositor, Weston, supported rendering through Pixman. The reason for this misconception is most likely that the earlier versions of Weston required hardware acceleration.

      • Qt 5.2 Plans Are Laid With New Features

        With Qt 5.1 finally being released soon, Digia has begun to formalize plans for the Qt 5.2 tool-kit successor. Qt 5.2 is anticipated for a November release and will carry new features and functionality.

  • Distributions

    • New Releases

    • Red Hat Family

      • Red Hat’s OpenShift Online Expands the Company’s Cloud Horizons

        In June, Red Hat has steadily taken its next significant steps in the cloud computing arena, as it expanded the focus of its OpenShift open source Platform-as-a-Service hybrid cloud computing offering, launching a new cloud-hosted commercial edition called OpenShift Online. OpenShift Online is Red Hat’s public cloud application development and hosting platform for automating the provisioning, management and scaling of applications. Now, Red Hat runs private and public versions of OpenShift, and note that there is a free usage policy for OpenShift Online, although more resource-intensive applications will probably require subscription services.

      • Fedora

        • Fedora 19 Go for July 2 Release

          Since the June 25 release candidate a couple more internal releases have been tested. Several major bugs have been squashed and while some issues remain, there are none blocking final release. At last night’s Go/No-Go meeting, it was decided to release July 2.

    • Debian Family

      • Derivatives

        • Canonical/Ubuntu

          • Mir in Ubuntu 13.10, Benchmarking, and More

            Many of you will have seen the recent news about Mir coming to Ubuntu 13.10 in October 2013. For those of you who are unaware of Mir, it is an Open Source display server we are building that we will use across desktops, phones, tablets, and TV. It currently works with Open Source drivers and we are currently in discussions with the major GPU manufacturers to discuss Mir support in their proprietary drivers.

          • Ubuntu Planning on Shipping Mir in 13.10

            ubuntu_logoIn Stephen King’s Dark Tower series, the giant, insane, cyborg bear named Shardik is known by the forest dwelling people around his territory as Mir, the world beneath the world. Ubuntu’s naming of Mir probably leans more towards the African heritage deriving the name from “Mayor”, or “Leader”, but personally I like the insane bear analogy better. ThePowerBase.com has a story linked to fridge.ubuntu.com reporting that Ubuntu plans to ship their controversial replacement for X11 in the next version of Ubuntu, 13.10, by default, along with XMir, an X11 compatibility layer running on top of Mir.

          • Flavours and Variants

            • München and Monaco go Lubuntized

              These are good news for the open software. And it demonstrates that Lubuntu isn’t at all the “little brother” of Ubuntu. Well, maybe yes talking about setup size or memory requierements, but not less considered. So I want to thank Julien Lavergne, the coordinator of the Lubuntu Team, and their respective collaborators (and users) for a rewarded great job.

            • Linux MintBox 2 priced at $600
            • The MintBox 2
            • MintBox 2 announced, runs Linux Mint 15 Olivia on a Core i5

              If you are considering a switch to Linux as an operating system, then giving it a trial run first couldn’t be easier. There are multiple distributions that have the option of running the OS from a USB stick or dual booting with your existing OS before deciding to replace it completely. It’s actually more difficult to buy a new PC with Linux preinstalled than it is to replace a copy of Windows, but Linux Mint is trying to change that.

            • Intel Core i5 CPU update sweetens MintBox mini-PC

              The Linux Mint project and CompuLab announced an updated version of their MintBox mini-PC, which comes with Linux Mint pre-installed. The MintBox 2 switches to a faster Intel Core i5 processor, doubles the storage to a 500GB HDD, adds a second gigabit Ethernet port, and bumps the price up to $599.

            • A Quick Look at Linux Deepin 12.12

              When I learned of Linux Deepin about a week ago, I jumped to the conclusion that it was just “another Ubuntu derivative”. As it turns out, I was way off-the-mark. While Deepin is based on Canonical’s ultra-popular distribution, Deepin has been around since at least 2004. Originally, the distro was based on Debian, but it shifted over to the Ubuntu base in 2006, and through its time, 11 major versions have been released.

              The reason most of us haven’t heard of Deepin until now is that it’s Chinese-based, although English versions have been offered since at least 2009. After hitting up the main website, you’ll want to click on the “English” link at the top to be able to navigate around (unless of course, you can read Mandarin). Once translated to English, we can see what Deepin is about: “Fast, Elegant and easy to use.“

  • Devices/Embedded

    • Get into Linux in under an hour on a Raspberry Pi
    • EOMA-68 PC-on-a-card goes dual-core, supports Debian Linux, has new accessories in the works

      Rhombus Tech‘s EOMA-68 project involves cramming all the key components of a PC onto a small board out the size of an old-school PCMCIA card. Then you can slot that card into a desktop, laptop, or tablet dock to function as the brains of a computer, and when you want to replace or upgrade you can just swap out the card for a new one.

    • Tiny control computer runs Linux on Atmel ARM9 SoC
    • Rugged Mini-ITX board runs quad-core AMD Kabini SoC

      Elitegroup Computer Systems (ECS) announced a ruggedized Mini-ITX motherboard based on an AMD A6-5200 Kabini system-on-chip processor, which integrates four 2GHz Jaguar CPU cores plus a Radeon HD 8400 GPU. The KBN-I/5200 offers PCIe and mini-PCIe expansion, along with interfaces for dual SATA, HDMI, VGA, serial, gigabit Ethernet, six USB ports, and more.

    • Phones

      • Ballnux

        • Backup program allows root access to LG smartphones

          At least 40 LG Android smartphones are vulnerable as a result of security vulnerabilities in the pre-installed backup program Sprite Backup. Crafted backups can be used to execute commands as a root user, apparently without the user’s knowledge – that at least is the suggestion in an advisory, which states that this is possible “under specific circumstances”. An exploit (CVE-2013-3685) is already available on GitHub.

      • Android

        • Android 4.3 Leaked!

          While we were waiting for Google to officially announce the latest Android Jelly Bean 4.3, folks over at SamMobile got their hands on Android 4.3 test build firmware for the Google Pay Edition Galaxy S4(GT-19505G). This news tells us that indeed Android Jelly Bean 4.3 will make its way to devices soon.

        • New MIPS processors coming, may target Android

          Imagination Technologies announced a MIPS “Warrior” family of 32/64-bit processors designed for everything from high-end networking equipment to Android tablets, and also announced updates to its embedded-focused MIPS Aptiv 32-bit processor line. The Warrior IP will feature multi-core hardware virtualization and multi-threading, MIPS SIMD architecture, and Imagination’s security framework.

          The new Warrior and updated Aptiv product lines are the first new MIPS processors to be announced since MIPS Technologies was acquired by Imagination Technologies for $100 million in early February (see farther below for background).

    • Sub-notebooks/Tablets

Free Software/Open Source

  • Free Software post-PRISM

    The news has been full of talk of spying, whistleblowing and data mining. Glyn Moody looks at how open source has been used to threaten freedom and privacy and how it could be used to defend them.

  • Adobe open sources Flash C++ compiler

    Adobe has open sourced its Flash C++ compiler, FlasCC. An open source version of the tool is now hosted as part of the CrossBridge project on GitHub; previously, FlasCC was part of Adobe’s Creative Cloud product. Adobe is hoping that the move to open source will deliver faster development and plenty of innovation from an active community. The software company has said it will itself remain actively involved in the development of the code as part of CrossBridge.

  • Web Browsers

    • Chrome

    • Mozilla

      • Firefox 22 offers real-time video communications and faster JavaScript

        Firefox 22 has been released by Mozilla and, unlike recent updates to Firefox which have been feature-light, the new release offers some important enhancements for future web development. Leading the feature list is full WebRTC support, which will allow web developers to integrate real-time audio and video connections between browsers. Working with JavaScript-based applications, WebRTC can potentially be used for anything from multiplayer interactive games on the web, like Mozilla’s own BananaBread game or Google’s Cube Slam demo, to simple user-to-user chatting with video calls and file sharing. More information on WebRTC can be found in a post on the Mozilla Hacks blog.

      • Serious accusations against AdBlock Plus

        The plugin, which is available for Chrome and Firefox, introduced a whitelist for web sites with non-obtrusive ads in version 2.0 and Pallenberg is questioning how this list of “acceptable ads” is compiled. Pallenberg is accusing the ABP developers of having connections to advertising and affiliate programmes and that their advertisements are included in the whitelist as a result.

  • SaaS/Big Data

  • Healthcare

    • Two deep dives into open source EHR

      As meaningful use and the various components of the Affordable Care Act begin to activate, medical professionals and facilities are beginning to face the same proprietary vs. open source choice that many other IT operations have faced over the years.

  • FSF/FSFE/GNU/SFLC

    • Your input needed: Questions for panel w/ Eben Moglen, RMS, 4 MEPs

      For this discussion we’re bringing some of the Free Software movement’s leading minds together with the people who represent us in the European Parliament. We’re extremely happy to have a list of first-rate participants:

      Eben Moglen (Columbia University / Software Freedom Law Center)
      Richard M Stallman (FSF)
      Judith Sargentini (MEP Greens/EFA)
      Marc Tarabella (MEP S&D – tbc)
      Nils Torvalds (MEP ALDE)
      Ioannis A. Tsoukalas (MEP EPP)

    • GNU lightning 2 second alpha is available
    • Hi, I’m Sankha, summer campaigns intern

      I am Sankha Narayan Guria, a second-year undergraduate in India. I will be working with the Free Software Foundation as an intern this summer. I am primarily a developer and contribute to Mozilla Firefox. I have also been a Mozilla Rep and have been involved in creating communities in different software-related fields.

  • Programming

    • Rails 4.0 rolls out to reduce client-side coding

      Focusing on a need to build modern web applications without having to create client-side JavaScript applications that talk to a server with JSON, the new version of Ruby on Rails, version 4.0, has arrived. To achieve this goal, the new release uses techniques such as Russian Doll caching to make caching much more efficient by maximising cache hits, Turbolinks that turn links into JavaScript-driven content reloading, and declarative ETags (entity-tags) so that servers can quickly determine if content is up to date. In combination, this should mean that sites which don’t use the JavaScript/JSON route for performance should run much faster, especially under load.

Leftovers

  • The Big Comparison Of Google Reader RSS Feed Alternatives
  • A hail and farewell to AltaVista

    It once was the best of the bunch, in the era before Internet search meant Google and three guys named Moe. Ancient history by now.

  • Health/Nutrition

    • 120,000 People Cut Off From Aid

      An estimated 120,000 people have fled fighting in and around the main towns in Pibor County in South Sudan’s Jonglei state and are now hiding in unsafe and malaria-infested swamps without access to safe drinking water, food, or medical care, the international medical humanitarian organization Médecins Sans Frontières (MSF) said today.

  • Security

    • Google’s Transparency Report shows malware spread

      It is now possible to see the statistics on the presence of malware and of sites linking to malware, thanks to Google’s latest move to make its data more transparent. Google has announced that it is expanding its transparency reporting to include statistics from its Safe Browsing programme. The Transparency Report, which also carries information about copyright removal requests and government agencies’ and courts’ demands for user data now has a Safe Browsing section. As part of that Safe Browsing data, Google is identifying autonomous systems (AS) on the internet and how much malware they contain. This is available through a Malware Dashboard.

  • Defence/Police/Secrecy/Aggression

    • U.S. Begins Shipping Arms for Syrian Rebels
    • American killed in Egypt rival demonstrations
    • US student among dead as riot-ridden Egypt descents into ‘security crisis’

      Tens of thousands of supporters and opponents of President Morsi join protests across Egypt with violent clashes between the rival parties reported in Alexandria, where police used tear gas as at least two people were killed and nearly 90 injured.

    • Governor seeks to delay freeing 10K Calif. inmates

      Gov. Jerry Brown’s administration on Friday asked a panel of federal judges to delay its order that California release nearly 10,000 additional inmates by year’s end, granting him time to appeal the decision to the nation’s high court.

      The judges have said they will permit no further delays in reducing prison crowding, which they previously found was the leading cause of an unconstitutional level of inmate medical care. The judges have threatened to cite Brown for contempt if he does not immediately begin complying.

    • Hollywood helped Adolf Hitler with Nazis’ propaganda drive, academic claims

      Historian Ben Urwand says he has cache of documents that prove Tinseltown enthusiastically cooperated with Nazis’ global propaganda effort

    • Rogue drone crashes, gives up operator’s secrets

      “I am disturbed by the revelation that the FBI has unilaterally decided to begin using drone surveillance technology without a governance policy, and thus without the requisite assurances that the constitutional rights of Americans are being protected,” Paul said.

    • Drone protest planned at Horsham Air Guard Station

      The protesters will toll a bell, read the names of drone-strike victims, and carry a 10-foot drone replica as part of the action.

    • The NYPD Embedded Four CIA Officers After 9/11

      In the decade after 9/11, the New York Police Department embedded four Central Intelligence Agency Officers, including one who assisted with surveillance in the United States, reports the New York Times.

    • UK ‘must come clean’ on GCHQ support for CIA drone strikes, says Reprieve

      Speaking in Los Angeles on 25 June, UK Foreign Secretary William Hague said of the UK’s policy on intelligence-sharing with the United States: “We operate under the rule of law and are accountable for it. In some countries secret intelligence is used to control their people. In ours, it only exists to protect their freedoms.”

      His comments come as the UK government is locked in a battle to avoid revealing what GCHQs policy is on providing intelligence to support CIA drone strikes.

    • Assange: US waging war against whistleblowers

      US federal prosecutors have charged whistleblower Edward Snowden with espionage, theft and conversion of government property in a criminal complaint after he revealed to the Guardian newspaper the extent of the NSA’s surveillance programs, including PRISM, which can monitor email and phone calls of anyone in the world and has been shared with the British surveillance center GCHQ.

    • CIA Report to US Congress Justifies Torture Programs

      Brennan now faces the possibility of incurring the wrath of Congress if they perceive a program he stands condemned by public opinion, or, conversely, can earn the rejection of his colleagues if strength protects the views of their subordinates.

    • CIA Presence in NYPD Leads to Charges of Domestic Spying

      “The CIA is not permitted to engage in domestic surveillance,” Ginger McCall, director of the group’s Open Government Project, told The Times. “Despite the assurances of the CIA’s press office, the activities documented in this report cross the line and highlight the need for more oversight.”

    • CIA Classifies NFL As Domestic Terrorist Organization [Satire]

      “Oh no, we’re just classifying them as a terrorist organization. We are required by law to do so based on the number of people NFL players have killed or injured. But I assure you that the NFL is far too important to this country to actually do anything about it. Besides, as a Cincinnati Bengals fan I would hate to destroy the league now that the team is finally turning it around.”

    • Polish Authorities Must Ensure Independent Investigation Into Secret CIA Prison – OpEd

      Global human rights organization Amnesty International called for immediate completion of the investigation into Poland’s involvement in the US-led secret detention programs and bringing to justice in fair trials those responsible for human rights violations.

      According to the published information, the Polish government is accused of colluding with the US Central Intelligence Agency (CIA) to establish a secret prison at Stare Kiejkuty, 180 km north of Warsaw, where suspects were subjected to enforced disappearance and tortured between 2002 and 2005. The investigation has dragged on since 2008 and has been repeatedly delayed due to changes in prosecution personnel, a shift in location from Warsaw to Krakow, and claims that cooperation from the US government has not been forthcoming.

    • Pentagon Helicopters Purchased from Syrian Enabler May Never Fly

      Human Rights First today denounced news that the Pentagon is spending millions of taxpayer dollars to purchase helicopters from a congressionally-barred Russian arms dealer that is fueling atrocities in Syria and then sending the aircraft to Afghanistan, where there are not enough troops with the expertise to fly them. The group notes that the irresponsible and wasteful Pentagon contracts will have lethal implications for the people of Syria and threaten U.S. national security interests.

    • Senate lays out $625.1 billion for the National Defense Authorization Act

      That amount includes $526.6 billion for DoD base budget and $17.8 billion for the Energy Department, which is the same topline levels as the House version (H.R. 1960). A difference in the two bills is with the overseas contingency operations funding which is set at $80.7 billion in the Senate bill and $85.8 billion in the House bill.

  • Cablegate

  • Finance

    • Will the Fed chair finally crack down on Wall Street?

      If appointed, US Central Bank Vice Chairwoman Janet Yellen is likely to be a tougher regulator than Bernanke

    • Thinking Utopian: How about a universal basic income?

      In light of the recent Oregon Medicaid study, several people have discussed the idea of taking parts of the social insurance system and replacing them with cash benefits. This naturally brings up the debate about whether it should be a policy goal for the United States to adopt a universal basic income (UBI). These poverty-level targeted incomes are universal and unconditional, so everyone would get them regardless of their income, status or work participation. Wonkblog’s Dylan Matthews wrote an overview of universal basic incomes and some proposals for such a system last year.

    • U.S. feds make their first-ever Bitcoin seizure

      It may be the currency of the future, but it now appears that Bitcoin is not immune to the U.S. government’s prying eyes and hands — especially when it’s being used to fuel black market activities.

  • Censorship

    • Dentist Threatens Patient Who Left Yelp Criticism With Criminal Charges

      As Ken White points out, Texas repealed its criminal libel law in 1974. Also, just recently Texas passed what is probably the strongest anti-SLAPP law in the country, even better than the one in California. While de la Riva’s letter initially worked in stifling Jen B’s speech — scaring her into pulling the review — after White connected her with Leif Olson, a lawyer in Texas who was willing to help her out pro bono, things are looking up. Olson sent de la Riva and Coppola quite the epic reply.

  • Privacy

    • Who is Leaking More: Edward Snowden or the Government Officials Condemning Him?

      In the month since the Guardian first started reporting on the surveillance documents provided by NSA whistleblower Edward Snowden, the government has taken to the media to condemn his leaks and insist he is flagrantly violating the law. To prove this, the government has been incessantly leaking information itself.

      Huffington Post’s Michael Calderone extensively detailed this week’s NSA media counteroffensive against Snowden, as officials have tried to explain—anonymously and without real proof—that Snowden’s leaks have hurt national security. On Wednesday, intelligence officials described to ABC News, Washington Post, Reuters, and AP about the how terrorists are allegedly “changing their tactics” now that they’ve been tipped off the US is monitoring the Internet.

    • The Daily News has officially committed this week the most heinous act in contemporary journalism.

      I want to say Greenwald is now even braver than he was before the smears, in contextualizing these smears, hanging tough, and refusing to be cowed by slurs that are so disgusting and inappropriate — that is, for other ‘journalists’ to traffic in. And the Guardian is gutsy too in carrying on with the proper focus — on getting the news out.

      All of us, all of us have done things that are not illegal or even relevant to our professional lives but that could be used against us, to embarrass or discredit us.

      I think we should start a movement to tweet our ‘embarrassing’ revelations from our pasts in support of Glenn Greenwald.

      I applaud Greenwald’s defense of his and by extension everyone’s right to have lived complex, adult lives.THAT IS WHAT THE FOURTH AMENDMENT IS FOR. I deplore this smearing and effort at distraction politics, aimed at a courageous journalist; and it is truly despicable to see other journalists or news outlets give any air or space to a form of attempted destruction of reputation that could any day, any moment, be aimed at them — now, post NSA revelations, with more ammunition than ever.

    • Senators’ letter to US director of national intelligence James Clapper

      Bipartisan group of 26 US senators complain that the Obama administration is relying on a ‘body of secret law’ to collect massive amounts of data on US citizens

    • Ex-Microsoft adviser backs Snowden leaks

      British MPs and a former Microsoft privacy chief say Brussels must stand up to America to protect European citizens from illegal internet surveillance. VoR’s Vivienne Nunis reports from Westminster.

    • Royal Family granted new right of secrecy

      Special exemptions to be written into Freedom of Information Act

    • Glenn Greenwald: NSA Can Store A Billion Cell Phone Calls Every Day

      Guardian journalist Glenn Greenwald says he has another big scoop about the National Security Agency’s surveillance practices up his sleeve.

      Speaking over Skype to the Socialism Conference in Chicago, Greenwald claimed that the NSA has the ability to store one billion phone calls each day.

    • The NSA Can’t Tell the Difference Between an American and a Foreigner

      The National Security Agency has said for years that its global surveillance apparatus is only aimed at foreigners, and that ordinary Americans are only captured by accident. There’s only one problem with this long-standing contention, people who’ve worked within the system say: it’s more-or-less technically impossible to keep average Americans out of the surveillance driftnet.

    • Guardian editors discuss NSA surveillance with Charlie Rose – video
    • India’s new surveillance network will make the NSA green with envy

      India doesn’t seem to worry that the surveillance scandal recently rocking the US might perturb its own citizens. The country is going ahead with an ambitious program that will let it monitor any one of its 900 million telecom subscribers and 120 million internet users.

      The Centralised Monitoring System (CMS) will be operational in 10 of the country’s 22 telecom “circles” (i.e., regions) by the end of the year, according to the Press Trust of India. The far-reaching surveillance program rivals the worst in the world, and makes the US National Security Agency (NSA) look like a model of restraint.

    • U.S. Prism, Meet China’s Golden Shield

      On Tuesday, shortly before China escalated its criticism of the United States over its global surveillance programs, saying they showed not just the “hypocrisy” but also the “true face” of the U.S., a Beijing lawyer named Xie Yanyi filed a public information request with the police asking about China’s own surveillance operations.

    • What It’s Like to Get a National-Security Letter

      In the summer of 2011, while he was fighting an indictment for alleged computer crimes, Aaron Swartz, an information activist, read Kafka’s “The Trial” and commented on it at his Web site.

    • If PRISM doesn’t freak you out about cloud computing, maybe it should, says privacy expert

      Caspar Bowden warned Parliament that governmental snooping should make companies think twice before going to cloud.

    • Why Monopolies Make Spying Easier

      These days, America has one dominant search engine, one dominant social-networking site, and four phone companies. The structure of the information industry often goes unnoticed, but it has an enormous effect on the ease with which the government spies on citizens. The remarkable consolidation of the communications and Web industries into a handful of firms has made spying much simpler and, therefore, more likely to happen.

    • Oliver Stone, Noam Chomsky, Tom Hayden Urge President Correa to Grant Snowden Asylum
    • Revealed: Whistleblower Edward Snowden posted comments attacking citizen surveillance while working for CIA

      The ex-CIA employee and whistleblower Edward Snowden posted hundreds of messages on a public internet forum railing against citizen surveillance and corporate greed, it was revealed today.

    • Senators accuse government of using ‘secret law’ to collect Americans’ data

      Bipartisan group seeks answers from intelligence chief James Clapper over scale of and justification for NSA surveillance

    • Stellar Wind: NSA collected US email records for more than two years under Obama
    • Total Surveillance

      In 1952, in a famous Supreme Court case that arose when President Truman attempted to seize control of the steel industry to support the Korean War effort when workers threatened to continue striking…

    • Contra George Mitchell, NSA Surveillance Is Not a Minor Issue

      In an item yesterday, I praised the considerable accomplishments and reflectiveness of statesman George Mitchell. I also noted that I often disagree with his politics without giving an example. A statement of his that touched on the NSA controversy captures the differences in our perspectives.

    • Obama Defends NSA Surveillance, But Is Anyone Buying It?

      President Obama brags about the situation as proof of his “transparency,” but the reality is that he got caught, well into his second term in office, in a decidedly secret scheme, and has been fighting vigorously to punish the whistleblower who uncovered it.

  • Civil Rights

  • Intellectual Monopolies

    • Copyrights

      • The Miracle in Marrakesh: Copyright Reform to End the “Book Famine”

        An international copyright treaty, adopted by the World Intellectual Property Organization (WIPO) in Marrakesh on June 27, will dramatically increase access to reading materials for the 300 million visually impaired people around the world. This is a historic moment for the blind. The treaty was adopted 32 years after WIPO and UNESCO first investigated the need for a solution to end the “book famine”—the fact that blind people have access to only 1–5 percent of published works.

      • Police plot against intellectual property profiteers

        City of London launches IP crime unit

      • UK Government Announces New Intellectual Property Crime Unit

        Following news earlier this month that UK police had begun sending threatening letters to torrent site operators, today the government has announced the creation of a brand new unit dedicated to cracking down on intellectual property offenses. The Intellectual Property Crime Unit at the City of London Police will be funded with £2.5m of public funds and is set to launch in September, targeted those said to be illegally profiteering on the back of content creators’ work.

06.28.13

Links 28/6/2013: MintBox is Out, Google Builds Android-powered Game Console

Posted in News Roundup at 4:39 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Events

    • Intel is Committed to Open Source, Security + Governance | #hadoopsummit

      John Furrier and Dave Vellante, theCUBE co-hosts, broadcast live today from Hadoop Summit 2013 in San Jose, discussing the Hadoop Driven Business and the challenges arising from massive Hadoop adoption in terms of security and governance.

      Their guest, Aaron Davies-Morris, Managing Director, Worldwide Professional Services with Intel, talked about his company’s current business strategy.

  • Web Browsers

    • Mozilla

      • Firefox gets a new logo, rolls out desktop and Android Beta updates

        Firefox is an ever evolving beast, and that includes both its friendly orange fox logo, and its Beta channel browser. Today Mozilla unveiled the fourth Firefox logo, a (slightly) less textured and glossy icon for its favored web browser. Meanwhile, the latest update for for Firefox Beta brings access to the company’s Social API and, consequently, Share buttons to the platform — so Facebook fanatics can have one-click sharing of images, articles, videos and links from the Firefox toolbar. The new Beta is also getting a Mixed Content Blocker that prevents HTTP (read: nonsecure) content from loading on HTTPS websites. Plus, there’s a new Network Monitor feature to let devs see how quickly individual page components load and optimizations for OS X 10.7 that enable its scrollbar style and and the scroll bounce behavior Apple fans love.

  • BSD

    • GhostBSD 3.1 Now Available

      Eric is pleased to announce that GhostBSD 3.1 is now available! This release is a respin of 3.0 including many bug fix. GhostBSD 3.1 does not include any updated package or new feature its only to fix issue that some user had find.

  • FSF/FSFE/GNU/SFLC

  • Project Releases

    • Puppet Enterprise 3.0 offers better performance

      Puppet Labs has released version 3.0 of the commercial edition of its open source configuration management tool, Puppet. With Puppet, administrators and developers define the required configuration settings using a domain specific language (DSL) – the actual implementation of those settings on the machines being what Puppet handles. Thanks to work from partners such as VMware, Cisco and Juniper, not only can compute resources be configured, but also storage and networking. In terms of performance, the addition of a centralised storage service with PuppetDB has brought a 200% improvement in agent run times and catalog compilation time has dropped by 60%. The developers say this should support twice the number of nodes that the previous versions supported.

    • Puppet Enterprise 3 Orchestrates Configuration
    • First beta of XBian 1.0 for Raspberry Pi

      The first beta version of XBian 1.0, a media centre Linux distribution for the Raspberry Pi mini-computer, is now available. Since the alpha, the developers have made XBMC Frodo 12.2 the default; that version of XBMC contains many Raspberry-Pi-specific changes. SuperRepo, the add-on repository for XBMC, is also included by default, giving users access to over 1000 add-ons that can be installed from within the media centre application.

  • Openness/Sharing

Leftovers

  • Why Software Platforms Should Be More Like Pandora

    For many years after the de facto industry standardization on the MP3 format, the primary problem remained music acquisition. There were exceptions, of course: serious Napster addicts, participants in private online file trading or even underemployed office workers who used their company LAN to pool their collective music assets. All of these likely had more music than they knew what to do with. But for the most part, the average listener maintained a modestly sized music catalog; modest enough that millions of buyers could fit the entirety of their music on the entry level first generation iPod, which came with a capacity of 5 GB. Even at smaller, borderline-lossy compression levels – which weren’t worth using – that’s just over a thousand songs.

  • RCMP Service To Citizens Crashes And Burns In Alberta
  • Science

  • Health/Nutrition

    • NZ Exports Face Destruction If Minister Changes GMO Rules
    • With Recent Victories, Movement to Label GMOs Gains Steam

      More than six months after a big defeat in California, the movement to label foods containing genetically modified organisms appears to be picking up steam across the country.

      In the past three weeks, Connecticut and Maine passed labeling bills, the U.S. Department of Agriculture for the first time approved a non-GMO label claim for meat products, Chipotle began voluntarily labeling menu items containing GMO ingredients online, and, perhaps most notably, the Senate Appropriations Committee voted last week to give the U.S. Food and Drug Administration funding to label genetically modified salmon if the agency approves the fish.

      These are all small steps compared to what California’s Proposition 37 would have accomplished – since the populous state consumes a significant share of groceries in the United States, some speculated that food giants would have reformulated their products to avoid creating two supply chains – but the string of victories has many in the so-called ‘Right to Know’ movement confident the tide is turning in their favor.

      “It’s simply a matter of time,” said Scott Faber, who serves as executive director of Just Label It, a national advocacy campaign. Faber, who is vice president of government affairs at the Environmental Working Group, used to be a lobbyist for the Grocery Manufacturers Association, which actively lobbies against mandatory labeling initiatives.

  • Security

  • Defence/Police/Secrecy/Aggression

    • How The U.S. Is Paying Millions To Fight Itself In Syria

      The United States’ decision to supply arms to the Syrian rebels is being met and challenged with an equally impressive flow of money from a place the Pentagon is intimately familiar with: itself.

    • Pulse of The People: America is addicted to war

      The recent NSA revelations of widespread surveillance on American citizens should be cause for intense protest. Surely it will be, as a day of nationwide mass action to restore the Fourth Amendment has been planned for the Fourth of July. But any awake American can see that PRISM is only one sock on a long line of dirty laundry. The list of U.S. government abuses and failures to protect stretches far and wide, an alphabet soup of depravity: PRISM, NDAA, CISPA, SOPA, Patriot Act, the Monsanto Protection Act, drones, secret kill lists, Guantanamo Bay, DNA tests, Abu Ghraib, Afghan Massacre, Keystone, Tar Sands, Hanford. I’m certain you’ll think of more.

      While PRISM and the rest of the gang are individually sordid, when combined they are the track marks of a far more pervasive, widespread, life-wasting problem. One that has systematically attacked not just the Fourth Amendment, but also the First, Second, Fifth, Sixth, Eighth, and 10th. No matter how hard we advocate for the Fourth Amendment now, others will fall so long as this substance burns through the veins of the Republic.

      This is your government on war.

    • Bill Would Ban Drone Strikes Against U.S. Citizens

      There’s one measure that quietly passed in the House along with Friday’s massive defense bill that libertarians may like: a ban on drone strikes against U.S. citizens.

      The idea that the United States military could target citizens with Hellfire missiles from an unmanned aerial vehicle caught prominence when Sen. Rand Paul held an epic 13-hour filibuster demanding to know whether the Obama administration thought it had the authority to carry out such a strike.

    • America’s Edward Snowden problem

      The main problem for Edward Snowden is that he ran away. That’s not Edward Snowden’s problem; it’s America’s problem. The idea that Edward Snowden decided to flee overseas in order to deliver his revelations of massive US government surveillance is awkward for the United States politically, and difficult for a lot of Americans on the emotional level.

    • John Kerry and the Taliban: The secret emails revealed
    • What keeps Obama awake?

      Actor George Clooney was quoted by the January 2012 issue of Esquire magazine as having asked President Obama: What single issue keeps him awake at night? The president’s answer: Pakistan.

      Clooney said, “I get that” and the “question of whether Zardari’s government is actually in control or whether the military is. And how close the Taliban, or Al Qaeda, or whoever else, is to having their hands on real weapons of mass destruction. It’s the closest government there is to allowing those weapons to either be used or sold…”

      Clooney, of course, does not really ‘get it’. He was regurgitating the myths propagated against Pakistan. Hopefully, an intelligent and rational leader like Obama does ‘get it’. Such dire conclusions, portraying Pakistan as the “nexus of terrorism and weapons of mass destruction”, have been concocted from fact and fiction, old and new, by Pakistan’s enemies for reasons that are not secret.

    • Fresh questions for NYPD as CIA collaboration revealed in new report

      Campaigners for greater accountability at New York’s powerful police force have seized on a report that details for the first time the extent of the collaboration between the CIA and the NYPD in the years after 9/11.

    • How The CIA Aided The NYPD’s Surveillance Program

      In the years after the attacks on September 11th, 2001, the NYPD had at least four “embedded” CIA officers in their midst. And because at least one of the officers was on unpaid leave at the time, the officer was able to bypass the standing prohibition against domestic spying for the agency and help conduct surveillance for the police force. In his words, he had “no limitations.”

    • New Report Suggests CIA Planted Spies Inside NYPD
    • Leaked: CIA aims crackdown on leaks inside CIA

      The director of the CIA has outlined plans to launch a new campaign aimed at keeping the organization’s operations secret. The memo, issued by director John Brennan, was itself leaked late on Wednesday.

      The ‘Honor the Oath’ campaign has the intention of reinforcing “our corporate culture of secrecy” according to the memo, which was obtained by Associated Press. The document had been labeled unclassified and for official use only.

      Brennan wrote that the campaign is a result of a CIA security review conducted last summer by the organization’s former director, David Petraeus, after “several high-profile anonymous leaks and publications by former senior officers,” were identified, according to Brennan.

    • Biden Gathers Senators For Last-Minute Syria Briefing; CIA Torture Report Nixed

      On Capitol Hill Thursday, an intimate briefing between CIA Director John Brennan and the top two members of the Senate Intelligence Committee exploded into an impromptu and classified briefing on Syria with top leaders at the State Department, CIA, White House and Congress.

    • CIA Spying: Think the CIA Doesn’t Spy on Americans? Think Again

      According to a New York Times article published yesterday, a recently disclosed CIA report found that “four Central Intelligence Agency officers were embedded with the New York Police Department in the decade after Sept. 11, 2001, including one official who helped conduct surveillance operations in the United States.”

    • Raymond Kelly defends program that allowed CIA agents to embed with the NYPD

      A newly declassified report by the CIA Inspector General was critical of the arrangement, which allowed one of the CIA officials, who was on leave from the agency, to participate in domestic surveillance

    • Transforming the CIA

      U.S. intelligence agency has become a secret killing machine

      [...]

      This secretive “shadow war” — or the so-called “way of the knife” — is mostly being waged by the CIA (via its influential Counterterrorism Center), U.S. special forces operations and private military contractors (with their less than stellar results) in dangerous places like Pakistan, East Africa and Yemen.

    • The CIA’s Campaign To Squash Leaks Has Already Been Leaked To The Media

      This secretive “shadow war” — or the so-called “way of the knife” — is mostly being waged by the CIA (via its influential Counterterrorism Center), U.S. special forces operations and private military contractors (with their less than stellar results) in dangerous places like Pakistan, East Africa and Yemen.

    • CIA Memo On Stopping Leaks To Reporters Is Promptly Leaked To Reporters
    • CIA chief announces new campaign to stop leaks
    • Spy leaks: CIA chief John Brennan’s new campaign to ensure secrecy

      The Associated Press obtained the memo yesterday, marked unclassified and for official use only.

    • CIA docs find a home on Amazon

      But Amazon is already storing CIA documents — just not necessarily those the agency would like.

    • CIA Struggles To Better Keep Secrets

      The sudden change in objectives is likely a direct result of Edward Snowden’s recent actions. By informing the media of the government’s surveillance programs, the CIA needs to insure that information is not so easily leaked again on such a great and reputation-damaging scale.

    • New CIA memo on how to contain leaks was leaked
    • How the CIA helped South African police arrest Mandela

      In an article published in January of 2005, William Blum sets out the background of the CIA involvement in the arrest of Nelson Mandela. Ultimately Mandela was convicted and was jailed for a total of 28 years.
      By the time Mandela was released in February of 1990, his stature had changed dramatically and then President George Bush Sr. telephoned Mandela to say that Americans rejoiced at his release. Blum points out that this was the same George Bush who once was head of the CIA and who was second in power during an administration that worked closely with South African Intelligence service to provide information about Mandela’s African National Congress. The African National Congress was seen by the US as part of the “International Communist Conspiracy”.

    • CIA Agents Were Embedded With NYPD And Had “No Limits”

      According to a recently declassified Inspector General report the CIA embedded four intelligence officers inside the New York Police Department even though an Executive Order and the National Security Act of 1947 explicitly forbid the CIA from conducting domestic surveillance. The report, completed in 2011, says that officers believed there were no limitations on their activities and the scope of their work went beyond foreign intelligence.

    • The NSA and CIA’s Dilemma: Vetting Employees for Being Without Conscience

      Yes, there was a sign they missed – Edward Snowden had something inside him shaped like a conscience, just waiting for a cause.

      It was the same with me. I went to work at the State Department, planning to become a Foreign Service Officer, with the best – the most patriotic – of intentions, going to do my best to slay the beast of the International Communist Conspiracy. But then the horror, on a daily basis, of what the United States was doing to the people of Vietnam was brought home to me in every form of media; it was making me sick at heart. My conscience had found its cause, and nothing that I could have been asked in a pre-employment interview would have alerted my interrogators of the possible danger I posed because I didn’t know of the danger myself. No questioning of my friends and relatives could have turned up the slightest hint of the radical anti-war activist I was to become. My friends and relatives were to be as surprised as I was to be. There was simply no way for the State Department security office to know that I should not be hired and given a Secret Clearance.[1]

  • Environment/Energy/Wildlife

    • Biggest Dead Zone Ever Forecast in Gulf of Mexico

      Unusually robust spring floods in the U.S. Midwest are flushing agricultural runoff—namely, nitrogen and phosphorus—into the Gulf and spurring giant algal blooms, which lead to dead zones, or areas devoid of oxygen that occur in the summer.

      The forecast, developed by the University of Michigan and Louisiana State University with support from the U.S. National Oceanic and Atmospheric Administration, estimates a Gulf dead zone of between 7,286 and 8,561 square miles (18,870 and 22,172 square kilometers). The largest ever reported in the Gulf, 8,481 square miles (21,965 square kilometers), occurred in 2002.

  • Trade/Finance

    • Obama to Suspend Trade Privileges With Bangladesh

      The administration has come under intense pressure to suspend the privileges in recent months — first after a factory fire there killed 112 workers last November and then after an eight-story factory building collapsed in April, killing 1,129 workers.

    • Ecuador Tells US To Take Its Trade Agreement And Shove It, After Threats Relayed Over Snowden

      One of the points that many people have made concerning most countries in the world is that they’re loathe to challenge the US on many things, even when they’re in the right, because they’re so reliant on the US for trade. The US regularly lords this fact over countries in seeking to get its way. In fact, US officials had been very strongly suggesting to Ecuador that if it decides to take in Ed Snowden and grant him asylum, that there could be consequences for trade under the Andean Trade Preference Act that both countries are signed to, but which needs to be renewed next month. Specifically, US politicians suggested that they might not allow the renewal if Ecuador granted asylum.

    • Ecuador breaks trade pact with US to counter ‘blackmail’ over Edward Snowden
    • Obama refuses to barter over Snowden
    • Planet Linux Caffe: Miami’s First Bitcoin Restaurant

      Bitcoin, the world’s foremost digital currency, has finally made it to Miami, and this week Planet Linux Caffe in Coral Gables will become the first business in the city to accept the decentralized digital currency as payment for items on its menu, says owner Daniel Mery.

      If this news means nothing to you, maybe you should attend the Day of Bitcoin Secrets seminar hosted by HackMiami and Miami-Coral Gables Open Source Group at Planet Linux Caffe Thursday, June 27, at 6:30 p.m.

    • A ‘sitting man’ at Goldman Sachs

      Max Zahn, founder of the new website Buddha on Strike, is currently on strike in front of Goldman Sachs. I asked him a few questions about what he’s up to.

    • Pushback Against Privatization Across the Country

      The decades-long effort to privatize public services and assets is hitting some bumps, with state and local governments reconsidering whether for-profit companies should be allowed to indiscriminately profit off of taxpayer dollars with limited accountability.

  • Censorship

  • Privacy

    • MPs: laws on GCHQ snooping “completely useless”

      Revelations of mass snooping programs from GCHQ and the US National Security Agency have shown up the UK’s laws governing surveillance as totally ineffective, MPs have said.

      Conservative MP David Davis and Labour deputy chair Tom Watson said Prism, and its UK counterpart Tempora, had highlighted that parliamentary supervision over surveillance was “completely useless”.

      “Our supervision procedures are completely useless, not just weak as we thought,” said Davis, speaking at an Open Rights Group meeting chaired by Watson. “Let’s say the foreign secretary signs this off. It then comes up in the House of Commons – what does he say? That we never comment on security matters. There’s no accountability to Parliament.”

    • Snooper’s charter has practically zero chance of becoming law, say senior MPs

      Labour’s Tom Watson and Tory David Davis say Guardian revelations mean data communications bill is probably doomed

    • Privacy: the more we know, the more we care….

      To some people, the PRISM revelations have been deeply shocking. The idea that the authorities could be spying on pretty much all our activities on the internet was something that they had never really believed – indeed, they had thought that those of us who had been going on about this kind of thing were, to be blunt, paranoid geeks. Now that Edward Snowden has brought it out in to the open, that’s not something so easy to maintain.

    • The Next NSA Spying Shoe to Drop: “Pre-Crime” Artificial Intelligence

      NSA spying whistleblower Edward Snowden’s statements have been verified. Reporter Glenn Greenwald has promised numerous additional disclosures from Snowden.

      [...]

      This is especially concerning given that the people who created the NSA spying program in the first place say that information gained through spying will be used to frame Americans that the government takes a dislike to.

    • Memories of Stasi color Germans’ view of U.S. surveillance programs

      Wolfgang Schmidt was seated in Berlin’s 1,200-foot-high TV tower, one of the few remaining landmarks left from the former East Germany. Peering out over the city that lived in fear when the communist party ruled it, he pondered the magnitude of domestic spying in the United States under the Obama administration. A smile spread across his face.

      “You know, for us, this would have been a dream come true,” he said, recalling the days when he was a lieutenant colonel in the defunct communist country’s secret police, the Stasi.

    • SSL: Intercepted today, decrypted tomorrow

      Millions of websites and billions of people rely on SSL to protect the transmission of sensitive information such as passwords, credit card details, and personal information with the expectation that encryption guarantees privacy. However, recently leaked documents appear to reveal that the NSA, the United States National Security Agency, logs very high volumes of internet traffic and retains captured encrypted communication for later cryptanalysis. The United States is far from the only government wishing to monitor encrypted internet traffic: Saudi Arabia has asked for help decrypting SSL traffic, China has been accused of performing a MITM attack against SSL-only GitHub, and Iran has been reported to be engaged in deep packet inspection and more, to name but a few.

      The reason that governments might consider going to great lengths to log and store high volumes of encrypted traffic is that if the SSL private key to the encrypted traffic later becomes available — perhaps through court order, social engineering, successful attack against the website, or through cryptanalysis — all of the affected site’s historical traffic may then be decrypted at once. This really would open Pandora’s Box, as on a busy site a single key would decrypt all of the past encrypted traffic for millions of people.

    • Putin: NSA whistleblower Snowden is in Moscow airport

      Russian president brings end to mystery over whistleblower’s whereabouts after days of confusion

    • US ‘will not scramble jets’ to fetch NSA whistleblower Edward Snowden, says Barack Obama

      Speaking in Senegal at start of his African tour, US president tries to calm frenzy surrounding NSA whistleblower, currently believed to be in Moscow

    • A simple SSL tweak could protect you from GCHQ/NSA snooping

      An obscure feature of SSL/TLS called Forward Secrecy may offer greater privacy, according to security experts who have begun promoting the technology in the wake of revelations about mass surveillance by the NSA and GCHQ.

      Every SSL connection begins with a handshake, during which the two parties in an encrypted message exchange perform authentication and agree on their session keys, through a process called key exchange. The session keys are used for a limited time and deleted afterwards. The key exchange phase is designed to allow two users to exchange keys without allowing an eavesdropper to intercept or capture these credentials.

    • NSA expanded bulk collection of internet data under newly uncovered surveillance programs
    • Snowden distributed encrypted copies of NSA files across the world

      Taking another page out of the WikiLeaks playbook, Edward Snowden has apparently distributed an encrypted copy of at least “thousands” of documents that he pilfered from the National Security Agency to “several people,” according to Glenn Greenwald, the Guardian reporter who first published Snowden’s leaks.

    • What the NSA Does With the Data It Isn’t Allowed to Keep

      In the latest scoop on NSA surveillance at The Guardian, Glenn Greenwald and James Ball post two different documents leaked to them by Edward Snowden. One concerns “minimization procedures.”

    • NSA collected masses of raw Internet data on Americans -report

      Citing a top-secret draft report prepared in 2009 by NSA’s inspector general, the Guardian said that the collection of the raw Internet traffic information – described as “bulk internet metadata” – began shortly after the attacks of Sept. 11, 2001.

    • Former NSA leakers: We told you so

      Drake and former NSA employee William Binney said Snowden’s leaks confirmed many of their past warnings about the NSA’s growing surveillance efforts in recent decades. Following the 9/11 terrorist attacks on the U.S., officials at the agency and President George Bush’s administration chose to disregard the U.S. Constitution and laws against surveillance of U.S. residents and allow the agency to sweep in their communications, said Drake, who was indicted on 10 felony counts that were later dropped.

      After 9/11, Drake said he witnessed the “United States government, in the deepest of secrecy, unchaining itself from the Constitution.”

      The NSA and Bush administration “revoked” the Constitution’s Fourth Amendment, giving U.S. residents freedom from unreasonable searches, and “violated the legal regime” against domestic spying that the NSA had operated under since the late 1970s, he added.

    • Where Might the NSA Whistleblower, Edward Snowden Be Relatively Safe?

      The recent events surrounding Edward Snowden, the NSA whistleblower, gives us the chance to engage in an interesting thought experiment.

    • Details Emerge on NSA’s Now-Ended Internet Program

      U.S. officials said they canceled the bulk Internet metadata program, which didn’t collect the content of communications, in 2011. NSA Director Gen. Keith Alexander said at a conference Thursday the program didn’t justify the privacy concerns, and the data was purged.

    • Where Else Should the NSA Be Snooping?

      I find it extremely odd that the NSA is wasting its time tapping into the servers of PalTalk.

    • Latest Glenn Greenwald Scoop Vindicates One Of The Original NSA Whistleblowers

      However, the NSA subsequently gained authority to “analyze communications metadata associated with United States persons and persons believed to be in the United States,” according to a secret Justice Department memo from 2007 that was obtained by the Guardian.

      Binney says that ThinThread was built to track electronic activities — phone calls, emails, banking and travel records, social media , etc. — and map them to collect “all the attributes that any individual has” in every type of activity and build a real-time profile based on that data.

      Read more: http://www.businessinsider.com/nsa-whistleblower-william-binney-was-right-2013-6#ixzz2XVhZHfzt

    • Surveillance ‘partnership’ between NSA and telcos points to AT&T, Verizon

      Newly disclosed classified document suggests firms allowed spy agency to access e-mail and phone call data by tapping into their “fiber-optic cables, gateway switches, and data networks.”

    • History repeats itself in today’s outcry over NSA’s reach

      The year was 1975 and remarks were made by then-Idaho Sen. Frank Church, who headed a special committee to investigate overreaches by U.S. intelligence operations.

    • NSA collected masses of raw Internet data on Americans -report

      The U.S. National Security Agency for over two years collected masses of raw data on the email and Internet traffic of U.S. citizens and residents, the website of Britain’s Guardian newspaper reported on Thursday, bringing to light another mass surveillance program that affected Americans.

      Citing a top-secret draft report prepared in 2009 by NSA’s inspector general, the Guardian said that the collection of the raw Internet traffic information – described as “bulk internet metadata” – began shortly after the attacks of Sept. 11, 2001.

    • Bitmessage’s NSA-Proof E-Mail

      Revelations about the National Security Agency’s surveillance program of the e-mails and phone records of Americans have been a boon to makers of commercial encryption programs such as Hushmail and Silent Circle. Yet unless customers bother to read these programs’ service agreements, they may not realize these companies—just like tech giants Google (GOOG) and Yahoo! (YHOO)—honor requests for customer data made by governments and courts in cases involving potential security threats.

    • NSA collected U.S. email records, Internet use for years

      The Bush White House authorized the NSA to collect US records following the 9/11 attacks, documents show

    • NSA secretly gathered Americans’ email records en masse

      Another leak sheds more light on the NSA’s controversial intelligence gathering operations

    • More NSA surveillance leaks on way, says Assange

      Intelligence whistleblower Edward Snowden is likely to reveal much more information about the global surveillance programs of the US National Security Agency, WikiLeaks publisher Julian Assange says.

      ”I believe we will see a lot more detail, a lot more information,” Mr Assange said on Friday.

      He said Mr Snowden’s disclosures of US signals intelligence and internet surveillance programs published by The Guardian and The Washington Post offered a ”bird’s-eye perspective” but the fine detail was essential for the leaks to achieve lasting political impact.

    • Over 500,000 People Want The NSA To Stop Watching Them

      Earlier this month, Mozilla launched an anti-NSA spying campaign called Stop Watching Us. The goal of the group is simple – pressure Congress into passing laws that remove the NSA’s ability to gather data on American citizens. In just two weeks, the petition has already proven itself to be a success.

    • Web petition urging Congress to act on NSA hits half-million mark

      More than half a million people have signed an online petition demanding Congress more fully probe the recent revelations about the National Security Agency.

    • The clear and present threat posed by the NSA surveillance programme

      Of course, there is a basis of legality for the NSA’s surveillance programme, as found in the PATRIOT Act. This point was recently discussed by David Simon, creator of cult TV series The Wire, who argued that in respect to telephone tapping, Americans have little to fear. Yet even one of the act’s authors, Republican congressman Jim Sensenbrenner, has argued that it has been misapplied to justify the programme. Furthermore, given what we know about the programme, it is difficult to know whether or not there exists anything resembling sufficient oversight, massively undermining the American people’s ability to determine the extent of the intelligence community’s actions.

    • Is Congress Beginning to Rein in NSA Spying?

      This isn’t much positive to say about the virtues of Congressional oversight in the aftermath of Edward Snowden’s leaks of the NSA’s vast domestic surveillance apparatus. Congress has been little more than an active participant in the systematic violation of Americans’ rights and privacy.

    • New NSA leaks show email surveillance under Obama

      The Obama administration permitted the National Security Agency to continue collecting vast amounts of records detailing the email and Internet usage of Americans for more than two years, new documents reveal.

      According to two leaked NSA documents published by The Guardian on Thursday, a secretive surveillance program that put email and Internet metadata into the hands of the United States government was authorized after the September 11, 2001 terrorist attacks by President George W. Bush and continued under President Barack Obama through 2011.

    • FISA Court Colludes with NSA to Allow Unconstitutional Surveillance

      Not surprisingly, neither the Fourth Amendment nor the freedoms against tyranny that it protects are honored by Holder or the other architects and construction crews erecting the surveillance state.

    • NSA inspector general report on email and internet data collection under Stellar Wind – full document

      Top-secret draft report from 2009 by the NSA’s inspector general shows development of ‘collection of bulk internet metadata’ under program launched under Bush

    • Snowden Is Helping Terrorists (But Don’t Quote Me on That)

      It looks like we might be on to a new phase in the Edward Snowden saga: anonymous government officials going to compliant media outlets to complain that his revelations have made it easier for terrorists to evade capture.

    • The Criminal N.S.A.

      THE twin revelations that telecom carriers have been secretly giving the National Security Agency information about Americans’ phone calls, and that the N.S.A. has been capturing e-mail and other private communications from Internet companies as part of a secret program called Prism, have not enraged most Americans. Lulled, perhaps, by the Obama administration’s claims that these “modest encroachments on privacy” were approved by Congress and by federal judges, public opinion quickly migrated from shock to “meh.”

    • Is It the Dawn of the Encryption App?

      We might live in an age of persistent and pervasive surveillance. The recent revelations about the secret National Security Agency programs aimed at collecting vast amounts of data on Americans and foreigners seemingly confirm what tinfoil-wearing netizens have feared for years: They’re watching us; technology has turned against its users.

    • Despite vague NSA assurances, telecom exec says US emails gathered

      The National Security Agency has claimed that it doesn’t intentionally gather emails sent between U.S. citizens on U.S. soil, but an unnamed tipster claimed today that it has no way of actually filtering domestic emails out.

    • Telecom exec: NSA can’t distinguish between Americans and foreigners during data sweeps
    • Tor Anti-Censorship and Anonymity Infrastructure

      Professionally operated, distributed and independent Tor infrastructure for anonymity and anti-censorship online.

    • Senators: NSA must correct inaccurate claims over privacy protections
    • How Hackers Beat The NSA In The ’90s And How They Can Do It Again

      While the world parses the ramifications of the National Security Agency’s massive snooping operation, it’s important to remember an earlier government attempt at data collection and, more important, how a group of hackers and activists banded together to stop it.

      In the early 1990s, the military was petrified that encryption technologies would leave them blind to the growing use of mobile and digital communications, so they hatched a plan to ban to place a hardware patch that gave the NSA backdoor wiretap access, the so-called “Clipper Chip“.

    • Overwhelm The NSA With Vice’s New Spam Generator
    • Facebook’s outmoded Web crypto opens door to NSA spying

      It’s relatively easy for the National Security Agency’s spooks to break outdated Web encryption after vacuuming up data from fiber taps, cryptographers say. But Facebook is still using it.

    • What could the NSA do with a quantum computer?

      After many false starts it’s a research field that is just now coming of age – when harnessed, particles can perform staggeringly powerful computation.

    • NSA whisteblower Edward Snowden: The psychology of an international fugitive revealed by the man who brought down Barings Bank

      As he tries to elude arrest, Edward Snowden’s heart will be pounding and his palms sweating, writes Nick Leeson, the man who brought down Barings Bank and someone who knows what it is like to be the world’s most-wanted

    • NSA Snooping Scandal: Ecuador Revokes Edward Snowden’s Travel Pass Because Assange is ‘Running the Show’

      Ecuador has cancelled whistleblower Edward Snowden’s travel pass, apparently due to concerns about the influence of Julian Assange.

    • Ecuadorean Disarray Clouds Snowden Bid
    • Senators Press Intelligence Chief To Release More Data On NSA Spying Programs
    • NSA director claims leaks damaged US security as Senators question legality of surveillance
    • 26 Senators vs. Secret National Security Law

      Dan Roberts scoops that 26 senators, led by Oregon’s Sen. Ron Wyden, have sent a formal letter to DNI James Clapper asking whether its spy programs “essentially relied for years on a secret body of law.”

    • Senators want public answers on NSA surveillance
    • The NSA vs. democracy

      By its very nature, covert intelligence work creates almost insoluble problems for a democracy.

      In a democracy, after all, power is exercised with the consent of the people. If the people don’t know about the powers being exercised, they can’t offer consent. But if they do know about the powers being exercised, those powers, almost by definition, are no longer covert.

      You see the problem.

    • NSA Surveillance Prompts Several Bills But Little Action In Congress

      In the three weeks since Edward Snowden revealed the National Security Agency’s widespread surveillance programs, the legislative response to his revelations on Capitol Hill has slowed to a glacial pace and public obsession has noticeably shifted from a debate on national security versus privacy to Snowden’s latest whereabouts.

    • In NSA surveillance debate, tech firms urge transparency

      Some of the Internet companies at the heart of the outcry over U.S. government surveillance today joined with human rights and press freedom groups, including CPJ, in calling for greater government disclosure of electronic communications monitoring.

    • How the NSA is still harvesting your online data

      Files show vast scale of current NSA metadata programs, with one stream alone celebrating ‘one trillion records processed’

    • Encryption practices vary widely in the cloud, survey finds

      A survey by Ponemon Institute of 4,205 business and IT managers around the world found that more than half now transfer sensitive or confidential data to the cloud, while taking various approaches to encrypting that data.

    • PRISM Parliamentary event packed out

      Around 70 people attended our PRISM and Tempora event in Parliament yesterday, hosted by Tom Watson MP. The speakers, Caspar Bowden, Simon McKay and David Davis MP, helped give context to some of the recent claims on surveillance made by the government.

    • Encryption Has Foiled Wiretaps for First Time Ever, Feds Say

      For the first time, encryption is thwarting government surveillance efforts through court-approved wiretaps, U.S. officials said today.

      The disclosure, buried in a report by the U.S. agency that oversees federal courts, also showed that authorities armed with wiretap orders are encountering more encryption than before.

      The revelation comes as encryption has come front and center in the wake of the NSA Spygate scandal, and as Americans consider looking for effective ways to scramble their communications from the government’s prying eyes.

    • Who authorised the NSA and GCHQ to spy on Germans?

      The US and Britain claim they have operated within the law. But they are not our laws and we shouldn’t be subject to them

    • NSA whisteblower Edward Snowden: Like living in a parallel universe – the weird world of the airport transit zone

      As Edward Snowden will have discovered by now, the airport transit lounge constitutes the most superficial travel experience on the planet.

    • Ex-Stasi boss green with envy over NSA’s domestic spy powers

      For Wolfgang Schmidt, who used to head East Germany’s feared spy service, the NSA’s reported spy program “would have been a dream come true.”

    • Former Stasi Officer: The NSA Domestic Surveillance Program Would Have Been ‘A Dream Come True’ For East Germany

      The National Security Agency’s domestic surveillance capabilities would have been “a dream come true” for East Germany, a former lieutenant colonel in the defunct communist country’s secret police told Matthew Schofield of McClatchy.

    • Memories of Stasi color Germans’ view of US surveillance programs

      Wolfgang Schmidt was seated in Berlin’s 1,200-foot-high TV tower, one of the few remaining landmarks left from the former East Germany, peering out over the city that lived in fear when the communist party ruled it, when he pondered the magnitude of domestic spying in the United States under the Obama administration. A smile spread across his face.

      “You know, for us, this would have been a dream come true,” he said, recalling the days when he was a lieutenant colonel in the defunct communist country’s secret police, the Stasi.

    • Growing Number Of Senators Demand Answers About NSA Surveillance
    • Epstein on NSA (Again) Part I: PRISM & the FISA Amendments Act

      I’m disappointed to see that renowned libertarian legal scholar Richard Epstein is persisting in his defense of the National Security Agency’s surveillance programs. This time, he co-authors with the American Enterprise Institute’s Mario Loyola in a Weekly Standard essay blasting the “Libertarians of LaMancha”—among whose ranks I have the dubious distinction of being named specifically. As with Epstein’s previous op-ed on this topic, which I responded to here, there are both factual mistakes and some broader conceptual problems. So many, alas, that to prevent this from becoming unwieldy, it’s better to divide my reply into two posts, each dealing with one of the NSA programs the authors discuss.

    • Director Imagines NSA, Edward Snowden Movie
  • DRM

  • Civil Rights

    • California man faces 13 years in jail for scribbling anti-bank messages in chalk

      Jeff Olson, the 40-year-old man who is being prosecuted for scrawling anti-megabank messages on sidewalks in water-soluble chalk last year now faces a 13-year jail sentence. A judge has barred his attorney from mentioning freedom of speech during trial.

      According to the San Diego Reader, which reported on Tuesday that a judge had opted to prevent Olson’s attorney from “mentioning the First Amendment, free speech, free expression, public forum, expressive conduct, or political speech during the trial,” Olson must now stand trial for on 13 counts of vandalism.

    • House Passes 2014 NDAA; NSA Surveillance Will Lead to Indefinite Detention

      A few of the amendments represent significant improvements to the NDAA of 2012 and 2013. The acts passed for those years infamously permitted the president to deploy U.S. military troops to apprehend and indefinitely detain any American he alone believed to be aiding enemies of the state.

    • Pennsylvania Bill Would Nullify NDAA “Indefinite Detention”

      The bill would prohibit state employees from cooperating with federal enforcement of sections 1021 and 1022 of the National Defense Authorization Act of 2012 (NDAA) that purport to allow arrest and detention without charge or trial on U.S. soil.

    • Indefinite Detention is Patently Unconstitutional.

      The Act authorized $662 billion in funding, “for defense of the United States and it’s interests abroad.” Central to Hedges’ suit, a controversial provision set forth in subsection 1021 of Title X, Sub-title (d) entitled “Counter-Terrorism,” authorizing indefinite military detention of individuals the government suspects are involved in terrorism, including U.S. citizens arrested on American soil.

    • The Senate Armed Services Committee’s GTMO Transfer Provisions in the 2014 NDAA

      The SASC, by contrast, has altered the transfer provisions to make them less stringent, requiring the SecDef’s decision on whether to certify a transfer to be based on the Period Review Board’s findings that the detainee is no longer a threat to national security. The Senate bill would also allow transfers required to effectuate a court order and transfers where the detainee has been tried in a court and either acquitted or convicted and completed his sentence. The Senate bill requires that the SecDef ensure that action has or will be taken to mitigate the recidivism risk for the detainee, as well as that he find that the transfer is in the national security interest. There would be congressional notification required, too: the SecDef must notify the committees with jurisdiction at least 30 days prior to the transfer or release.

    • California Action Alert: Pass AB351, Help Stop “Indefinite Detention”

      Tim Donnelly’s AB351, a bill which starts the process of stopping “Indefinite Detention” under the NDAA and other so-called federal “laws,” has passed the State Assembly and is up for an important State Senate committee hearing and vote on June 25th. Your action is needed right now to help this bill move forward!

    • Alaska Becomes Second State to Pass Nullification of Indefinite Detention

      Last Friday, Alaska Gov. Sean Parnell signed a sweeping nullification bill providing broad protections against indefinite detention, violations of the Second Amendment and blocking implementation of a federal identification program in The Last Frontier.

    • The march of protest

      A FAMILIAR face appeared in many of the protests taking place in scores of cities on three continents this week: a Guy Fawkes mask with a roguish smile and a pencil-thin moustache. The mask belongs to “V”, a character in a graphic novel from the 1980s who became the symbol for a group of computer hackers called Anonymous. His contempt for government resonates with people all over the world.

    • Egyptian troops move to bases near cities ahead of protests

      Troop reinforcements and armour have been brought to army bases near cities ahead of protests this weekend aimed at forcing the Islamist president out, security officials have said.

      Clashes between supporters and opponents of President Mohammed Morsi erupted, killing at least one person in the coastal city of Mansoura.

  • Intellectual Monopolies

    • Generic drug makers can’t be sued if they have FDA approval

      The Supreme Court ruled last Monday that Generic drug makers can’t be sued for defective designs when their previously FDA-approved products cause injuries link here. That might appear to be a questionable decision. But it is also a victory for competition and lower prices in a product line that raises already high medical care costs.

    • Welcome to another blogger questioning intellectual property law

      Felix Salmon has an engaging blog on how the world benefits from Chinese piracy link here. His argument is simple; we benefit from cheap imports that seem to be copies (good or not so good but serving the same purpose) of something we also make. The article takes off from a Foreign Affairs piece, entitled Fake It Til You Make It link here whose argument is that we all benefit. We get cheap imports and cheaper domestic manufactures, they get cheap goods and the foreign exchange to buy competitive imports. And the competition forces the pace of innovation both at home and abroad, a process that seems to have slowed.

    • Copyrights

06.27.13

Links 27/6/2013: Kubuntu to Deviate Further From Canonical, New Debian Derivatives

Posted in News Roundup at 4:03 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • Digg Reader Opens in Beta

    Digg Reader is designed for a power-user demanding the freshest and the hottest. The challenge of replacing the Google Reader is in the infrastructure. Reader needs to be reliable and snappy. Jake Levine (GM) and Andrew McLaughlin (President) of Digg promise their reader to be just as good and better than Google Reader.

  • 2 Amazing Google Reader Replacements You Haven’t Heard Of
  • Health/Nutrition

    • USDA Forces Whole Foods To Accept Monsanto

      In the wake of a 12-year battle to keep Monsanto’s Genetically Engineered (GE) crops from contaminating the nation’s 25,000 organic farms and ranches, America’s organic consumers and producers are facing betrayal.

  • Finance

  • PR/AstroTurf/Lobbying

    • Does Jon Meacham Remember the 2000 Election?
    • Seven Faces of NRA/ALEC-Approved “Stand Your Ground” Law

      As George Zimmerman’s trial for shooting and killing unarmed 17-year-old Trayvon Martin in early 2012 gets underway, the “Stand Your Ground” law that initially kept Zimmerman from being arrested is still the subject of much controversy. Florida’s law became the template for an American Legislative Exchange Council (ALEC) “model bill” that has been introduced in dozens of other states. As the Center for Media and Democracy (CMD) has reported, the bill was brought to ALEC by the National Rifle Association (NRA).

    • For Bradley Foundation, Challenging Affirmative Action & Voting Rights Is Part of Long-Term Crusade

      The Milwaukee-based Bradley Foundation is one-for-two in legal challenges to civil rights and racial equality this term, with the U.S. Supreme Court striking down a key provision of the Voting Rights Act of 1965 in one case bankrolled by Bradley, and in another, remanding an affirmative action case to a lower court, turning back the Bradley-backed challenge. The cases represent the latest in the Bradley Foundation’s long-term effort to dismantle the gains of the civil rights era.

  • Privacy

    • The personal side of taking on the NSA: emerging smears

      When I made the choice to report aggressively on top-secret NSA programs, I knew that I would inevitably be the target of all sorts of personal attacks and smears. You don’t challenge the most powerful state on earth and expect to do so without being attacked. As a superb Guardian editorial noted today: “Those who leak official information will often be denounced, prosecuted or smeared. The more serious the leak, the fiercer the pursuit and the greater the punishment.”

      One of the greatest honors I’ve had in my years of writing about politics is the opportunity to work with and befriend my long-time political hero, Daniel Ellsberg. I never quite understood why the Nixon administration, in response to his release of the Pentagon Papers, would want to break into the office of Ellsberg’s psychoanalyst and steal his files. That always seemed like a non sequitur to me: how would disclosing Ellsberg’s most private thoughts and psychosexual assessments discredit the revelations of the Pentagon Papers?

    • Facebook, Apple, Microsoft, Skype & Yahoo Hit With Prism Data Protection Complaints In Europe

      The European data protection activists behind the Europe v Facebook (evf) campaign group, that has long been a thorn in Facebook’s side in Europe, have filed new complaints under regional data protection law targeting Facebook, Apple, Microsoft, Skype and Yahoo for their alleged collaboration with the NSA’s Prism data collection program.

    • NSA takes surveillance fact sheets off website
    • Potential Blind Spots in Clearance Process that Gave Snowden Top-Secret Access

      More than a million Americans have security clearances to access classified information. Here’s what the government does–and doesn’t–do when deciding who’s trustworthy

    • An EFF sticker on your laptop is an Insider Threat warning sign?
    • NSA collected US email records in bulk for more than two years under Obama

      The Obama administration for more than two years permitted the National Security Agency to continue collecting vast amounts of records detailing the email and internet usage of Americans, according to secret documents obtained by the Guardian.

    • FAQ: What You Need to Know About the NSA’s Surveillance Programs

      A record of most calls made in the U.S., including the telephone number of the phones making and receiving the call, and how long the call lasted. This information is known as “metadata” and doesn’t include a recording of the actual call (but see below). This program was revealed through a leaked secret court order instructing Verizon to turn over all such information on a daily basis. Other phone companies, including AT&T and Sprint, also reportedly give their records to the NSA on a continual basis. All together, this is several billion calls per day.

    • EFF Sues FBI For Access to Facial-Recognition Records

      As the FBI is rushing to build a “bigger, faster and better” biometrics database, it’s also dragging its feet in releasing information related to the program’s impact on the American public. In response, the Electronic Frontier Foundation (EFF) today filed a lawsuit to compel the FBI to produce records to satisfy three outstanding Freedom of Information Act requests that EFF submitted one year ago to shine light on the program and its face-recognition components.

    • ‘World order unjust and immoral!’ Ecuador’s Correa rips into Snowden coverage

      Ecuador’s President Rafael Correa came up with scalding online remarks over criticism his country faced from the US press for potentially granting asylum to NSA whistleblower Edward Snowden.

      “They’ve managed to focus attention on Snowden and on the ‘wicked’ countries that ‘support’ him, making us forget the terrible things against the US people and the whole world that he denounced,” Correa said Wednesday in response to a Tuesday Washington Post editorial.

      “The world order isn’t only unjust, it’s immoral,” Correa added.

      The US newspaper accused Correa of adhering to double standards in the NSA leaker case, as Ecuador is considering harboring Snowden from prosecution over US espionage charges. It descried the Ecuadoran president as “the autocratic leader of a tiny, impoverished” country with an ambition to replace the late Venezuelan leader Hugo Chavez as “the hemisphere’s preeminent anti-US demagogue”.

  • Civil Rights

    • Pandering to Racism

      It is unpleasant for a nation to be singled out as comprised of particularly untrustworthy individuals against whom special measures are needed. Theresa May appears quite deliberately to be singling out countries whose citizens are normally black or brown – India, Pakistan, Bangladesh, Sri Lanka, Ghana and Nigeria. They are all citizens with extremely close ties to the UK. For example, all of those countries supplied large numbers of men to British armed forces in two World Wars; with little resulting gratitude.

    • A failiure of oversight that goes beyond the police

      The revelations about the Metropolitan Police’s efforts to discredit the family of Steven Lawrence have rightly brought cross-party condemnation. Taken alongside disclosures from NSA whistleblower Edward Snowden, the wider questions about the oversight of our law enforcement and intelligence agencies are too important to ignore.

      As David Davis MP wrote in the Guardian:

      “Sadly this is not an isolated example. Back in 2002 the Labour government set out to smear members of the Paddington Survivors Group, an organisation made up of those injured in the rail crash that killed 31 people. When the group’s leader, Pam Warren, dared to criticise Stephen Byers, then transport secretary, muckraking spin doctors quickly went digging for dirt on her political affiliations and even her sexual history.

    • Federal Judge Dismisses Abu Ghraib Case Under Sweeping Ruling Under The Alien Tort Statute

      The Lee ruling illustrates the hypocrisy of the United States in proclaiming our government as committed to the rule of law while denying review of the most egregious abuses by our government and its contractors. It also reflects the Obama Administration continue scorched earth approach to public interest litigation seeking review of the actions of the government from warrantless surveillance to torture to prison abuse. President Obama has made clear that his preferred court and form of transparency is the secret FISA court with secret rulings, rubber stamp approvals, and no adversarial process.

  • Internet/Net Neutrality

  • Intellectual Monopolies

06.26.13

Links 26/6/2013: Ouyas Are Out, Fedora 19 RC

Posted in News Roundup at 3:55 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • The Best and Worst Features of Linux Desktops

    In any given week, I am likely to use two or three Linux desktop environments. Partly, I switch so often to keep up to date. But the main reason is that, whatever environment I am using, I soon become aware of its shortcomings and start thinking of another’s advantages.

    Clearly, the only Linux desktop with which I am likely to be completely satisfied would be one I built for myself. However, since I am unlikely to do that any time soon — or at all — I can only continue to switch regularly, repelled by a feature in one desktop and attracted by a feature in another, like a piece of iron between constantly shifting magnetic fields.

    Meanwhile, here are the best and worst features that I keep noticing in each of the six major desktop environments for Linux:

  • More career options for Linux developers seen
  • Kernel Space

    • New Linux Foundation Members Expand Linux Ecosystem in Cloud, Semiconductor and IP Multimedia Industries

      The Linux Foundation, the nonprofit organization dedicated to accelerating the growth of Linux, today announced that dotCloud, LSI Corporation and Nefedia are joining the organization.

    • Joystick and Other Game Controllers

      Linux systems support a wide variety of games and emulators. Obviously, many Linux gamers will want to use joystick controllers or other game controllers for gaming instead of a keyboard. Thankfully, Linux supports many game controllers. The Linux kernel contains drivers for several joysticks and controllers, so many Linux gamers can plugin their game controller and begin playing. However, the Linux kernel does not support all joysticks and controllers. Adding support for these controllers and making them work is easy to do.

    • OpenDaylight SDN Project Expands Membership and Technology

      OpenDaylight is run as a collaborative project operated by the Linux Foundation, which is no stranger to the world of open source collaboration. Jim Zemlin, executive director at the Linux Foundation, told Enterprise Networking Planet that while there is a lot of interest in open source SDN, the Linux Foundation is not actively recruiting members for the OpenDaylight Project.

    • Red Hat Is Indeed Working On 3D QEMU Support

      In continuation of my earlier Research Underway With QEMU 3D Support posting, Red Hat is indeed internally working on getting 3D-accelerated support up and running for virtual machines under QEMU.

      While VirtualBox and VMware right now support 3D/OpenGL acceleration by passing the graphics commands onto the host machine for processing, QEMU/KVM does not but it’s (hopefully) going to be changed soon by Red Hat. After a Gallium3D SPICE driver was long talked about, there’s finally action happening per my posting a few days ago.

    • Graphics Stack

      • “SimpleDRM” Driver Published For Simple KMS

        The SimpleDRM driver is the new name for his simple/generic DRM graphics driver. The driver was formerly known as the DVBE driver in his first version but renamed it as SimpleDRM, isnce it’s supposed to be the most basic Direct Rendering Manager driver. SimpleDRM is similar to efifb.c, vesafb.c, offb.c, simplefb.c, and other simple graphics display drivers within the kernel.

  • Applications

  • Desktop Environments/WMs

  • Distributions

    • Mr. Cranky Pants takes the soapbox

      It’s been a busy few weeks here in the land of the giant redwoods. Scratch that: It’s been a busy and hectic few weeks here in the land of the giant redwoods.

      Nevertheless, during the course of daily visiting — more like daily hangouts — in the CrunchBang forums a couple of topics came up that are normally items which cause me to put on my cranky pants, grab the nearest soapbox, step up on it and start my impassioned plea to the masses (or, at least, to those within an earshot, digital or otherwise).

    • Linux Deepin 12.12 review

      Summary: This article provides a review of Linux Deepin 12.12, the latest edition of the popular desktop distribution published by Wuhan Deepin Technology Co. Ltd., China.

      Linux Deepin is based on Ubuntu Desktop, and it used to be that a Linux Deepin release came two months after the most recent Ubuntu Desktop release. So if Ubuntu is released in April, the corresponding Linux Deepin is released in June. That held true until Linux Deepin 12.06, which was actually released in July 2012.

    • What would be my own ideal Linux distribution?

      I’ve recently re-installed three different distributions on my new laptop: Debian 7 Wheezy Xfce, Mageia 3 KDE and Linux Mint 15 Olivia Cinnamon. The closest to the “ideal” of these three is Cinnamon, I must admit, with Mageia following very close. Debian, for well-known reasons, comes far behind. It does not mean that I dislike Debian. I like it. But there are some aspects that will never make Debian my personal ideal Linux Distribution.

      Is it possible to get such a distro? I hope the day will come!

      In the meantime, if you want to try any distribution, but cannot create a disk with it yourself for whatever reason, you can always request one from Buy Linux CDs site. The disk will be delivered into your mailbox anywhere in the world!

    • PCLinuxOS/Mageia/Mandrake/Mandriva Family

    • Red Hat Family

      • Red Hat Stock Rating Reaffirmed by JPMorgan Chase & Co. (RHT)

        underweight rating on shares of Red Hat (NYSE: RHT) in a research report sent to investors on Thursday morning, Analyst Ratings Network.com reports.

        “We believe a better metric (akin to license growth for a traditional model) that adjusts billings for FX, duration, and renewals also grew 12%, versus the 25% implied with consensus expectations (and not to mention against an easy comp of -7%). We believe that Red Hat’s growth has and will likely continue to decline despite management’s comments of large deals signed and additional runway. Although management has attempted to supplement its RHEL success with Virtualization, Middleware, Storage, and Cloud, declines in true growth seem at odds with this expansion.,” the firm’s analyst wrote.

      • Red Hat workers bring energy to new downtown Raleigh headquarters

        Mike Esser, a six-year veteran at Linux software company Red Hat, is delighted that the company moved its headquarters from N.C. State University’s Centennial Campus to the center of the city.

      • Fedora

        • Attention Fedora 19 prerelease users

          Fedora 19 is winding up to release soon, and so it’s that time in the cycle when a new fedora-release package pushes out that disables the fedora-updates-testing repository so folks who install after this point don’t get testing packages unless they opt in.

        • Getting the pretty grub screen back in Fedora 19
        • Fedora 19 Release Candidate Quietly Posted

          The final release of Fedora 19 is due July 2 and a Release Candidate 1 was quietly released to testers in the early hours of June 25. Fedora’s list of new features is never boring and version 19 follows suite. Let’s see what’s coming.

    • Debian Family

      • Debian Project News – June 24th, 2013

        When the DebConf team announced the official location and dates for DebConf13, there was much uncertainty about whether a DebCamp could be organised, for budget reasons. The DebConf team has now announced that DebConf13 will have its DebCamp, which will last for almost a full week, starting from August 6, at the main conference venue.

        If you plan to go to DebConf13, you have until June 30 to reconfirm your attendance and thus validate your registration.

      • Derivatives

        • Elive 2.1.52 development released

          This version includes some misc features like:

          Automated cooling for newer intel CPU’s by decreasing the cpu clock when the temperature gets high
          Vim colorscheme changed to elive an own colorscheme that focuses on intuitiveness.
          Internet Configurator now automatically pops up with a list of available connections.
          E17 Fix: Language and Keyboard are not correctly saved.
          E17 Fix: Application menu no longer freeze your environment.

        • Canonical/Ubuntu

          • Ubuntu to Consolidate Web Account Services Under ‘Ubuntu One’ Brand

            Canonical has announced plans to group its user-facing account services under one unified branding.

            ‘Ubuntu Single Sign On’ – used to get access to online services like Launchpad and the Ubuntu Forums – and ‘Ubuntu Pay’ – the payment handling process for software and media purchases – will be rebranded under the ‘Ubuntu One’ moniker.

          • First Ubuntu Weekly Update Video
          • Flavours and Variants

            • Mint 15 freshens Ubuntu’s bad bits

              Mint is a relative newcomer to the world of popular desktop distros, but it has recently started to take the GNOME and Unity-hating Linux world by storm.

              The recent release of version 15, called Olivia, should help it secure a reputation as “the” alternative desktop. If you’d like a modern set of desktop tools without a completely new desktop interface to go with, then Mint 15 has what you’re after.

  • Devices/Embedded

    • Raspberry Pi bot tracks hacker posts to vacuum up passwords and more

      Password and credit-card details leak online every day. So no one really knows just how much personally identifiable information is available by clicking on the right link to Pastebin, Pastie, or similar sites. Using a platform that runs on the hobbyist Raspberry Pi platform to drink from this fire hose, a security researcher has cataloged more than 3,000 such posts in less than three months while adding scores more each week.

    • Android-controlled exercycle excites Kickstarter fans

      After only two days on Kickstarter, an Android 4.1-powered exercise bike project has reached almost half its $250,000 goal. Peloton Cycle’s Peloton Bike is equipped with a 21.5-inch touchscreen console that runs Android 4.1 on a 1.5GHz dual-core ARM processor, offers multiple wireless options for connecting heart rate monitors, and delivers 1080p video chat and live on-demand indoor cycling classes.

    • Getting Closer to the Network Virtualization Vision
    • Phones

      • Ballnux

      • Android

        • Dragon NaturallySpeaking brings a form of Siri to your desktop, Android

          Nuance Communications (NUAN) has made some big-time improvements to its popular Dragon NaturallySpeaking voice recognition software, including improved performance on Gmail and Hotmail and a new Android app that lets customers use their Android device as a remote microphone for the PC app.

        • Ouya seeks to shake up video-game console business

          The video game console wars welcome a new combatant.

          Tuesday marks the arrival of Ouya, the home video-game console born through crowd-funding and introducing a lower-price alternative to higher-price competitors.

          “The consoles are still incredibly expensive,” Ouya CEO Julie Uhrman says. “The business model hasn’t changed. We offer something very different. We really carved out our own space.”

          Industry veteran Uhrman joined Yves Behar, the console’s product designer and chief creative officer of audio hardware company Jawbone, to create Ouya. It was unveiled last July through a campaign on crowd-funding site Kickstarter, raising more than $8.5 million in one month. Early versions of the Ouya (pronounced “ooo-yah”) shipped to backers in March.

        • Countless Ouyas Find Their Way Into Gamers’ Hot Hands

          No one seems to know just how many Ouya video game consoles were shipped to retailers in the first place, but however many — or few — it was, most of them are now gone. “It would be a bad story if it wasn’t sold out on day one,” said Lewis Ward, research manager for gaming at IDC. “Whether this was created by design to build some buzz isn’t clear.” – See more at: http://www.linuxinsider.com/rsstory/78349.html#sthash.6X1l4NW0.dpuf

        • Sony SmartWatch 2 Announced, Will Happily Swim in Water with You

          A few days back we reported about Sony opening up its SmartWatch SDK to developers. Today Sony announced an update to its SmartWatch series of Android-powered watches at Mobile Asia Expo, Shanghai. SmartWatch belongs to the category of wearable smart devices, and is an attempt by Sony to create a mass market of its own in this uncommon category. The smartwatch trend was undoubtedly popularised by Apple iPod Nano, which is so small people started wearing it around their wrists.

        • Sony Xperia Z Ultra hands-on: the smartphone that evolved into a tablet

          The original Xperia Z was already pushing the boundaries of reasonable handset dimensions with its 5-inch screen, but the new 6.4-inch Z Ultra categorically breaks past them and strays into the territory of small tablets. That’s not necessarily a bad place to be, as it allows Sony to insert a sizeable 3000mAh battery and provides a big old canvas for stylus input — which the company is pushing in a big way with this new product. You just have to be cognizant of what you’re getting yourself into when purchasing an Android slate that makes 5-inch devices look positively compact.

        • Sony’s SmartWatch 2 is the company’s latest effort to get on your wrist
        • CyanogenMod 10.1 released, monthly release series begins

          After just over six months of development and some tentative early nightly releases for some devices, the CyanogenMod developers have now declared version 10.1 of their alternative Android-based firmware ready for general use. CyanogenMod 10.1.0 is based on the Android 4.2.x “Jelly Bean” family of releases and focuses mostly on integrating the features of the upstream AOSP (Android Open Source Project) into the third-party firmware. The CyanogenMod developers say that they will now start to focus on adding new functionality of their own with more frequent monthly releases.

Free Software/Open Source

  • XenServer.org and the Xen Project
  • Find an open source RSS reader today

    Google Reader is shutting down on Monday. This is disappointing to more than a few RSS junkies—and we get it. We’re right there with you.

    In our recent poll, many folks from our community told us they’re seeking alternatives to Google’s beloved tool. So that you don’t miss a single unread item, and for those of you who have been searching for an open source RSS reader, we’ve put together a short list of Google Reader replacements.

  • 50 community building tips from Feverbee
  • Apache gets a PaaS

    WSO2, the provider of open source middleware, has been developing an open source PaaS (Platform as a Service) called Stratos since 2010. Now WSO2, with initial contributors from NASA, Cisco, Citrix and Engine Yard, are donating the project to the Apache Software Foundation. The move to the ASF is said to be “signalling that the door is wide open for external contributors,” whereas the project has formerly been developed by sponsored WSO2 coders. Version 2.0 of Stratos was launched on 19 June.

  • Web Browsers

  • SaaS/Big Data

    • Want a cloud where you call the shots? Consider ownCloud

      Nervous about the NSA, PRISM and your public cloud? Not sure you want to put all your data eggs in one Amazon Web Services zone basket? Then, maybe ownCloud’s just released enterprise version of its open-source cloud program, ownCloud 5.0 Enterprise Edition, is what you want need.

    • AppScale Delivers Open Source Tools for Robust Cloud Deployments
    • Netflix releases open source Genie for Hadoop

      Netflix, the movie streaming company, has open sourced a job and resource management system for Hadoop, called Genie. The Genie software was developed to help Netflix manage workloads with their multiple differently configured Hadoop clusters that run on the Amazon Web Services cloud. Using Genie, an end user can submit jobs to an execution service and let Genie “match-make” the job with an appropriate Hadoop cluster, while administrators can use Genie to browse through the registered Hadoop clusters that are available and view their associated configurations. Genie does not handle workflow scheduling, task scheduling or resource management such as provisioning or scaling Hadoop clusters.

    • Upcoming ownCloud Enterprise 5 improves authentication speed

      Cloud collaboration company ownCloud has announced that it will make version 5 of its open source ownCloud Enterprise product available at the beginning of July. A release candidate for the software is now available for customers wanting to try out the new features. Building on ownCloud Community Edition 5, which appeared in March, the Enterprise Edition adds Oracle and Microsoft SQL Server backends, a provisioning API, mobile applications, anonymous uploads without an ownCloud account, and home directory mounting. Enterprise Edition customers will benefit from support for the platform, which has been tested explicitly for production use in enterprise deployments, and also from access to the ownCloud developers.

  • Databases

    • EnterpriseDB’s Ed Boyajian: Pinching Pennies the Open Source Way

      “Open source use is getting stronger. Almost every branch of government that we know of is looking at or already using Postgres, either a free version or a version from us. Open source is now cutting across all divisions and all departments. Even the contractors that serve the government are also adopting Postgres. This is a really important ecosystem change.”

  • Oracle/Java/LibreOffice

    • Three great ways to use variables in LibreOffice and OpenOffice

      When I was looking for the seven great features of OpenOffice and LibreOffice that you probably ignore, one of those features turned out to be variables. This week I’m going to give you a bit more reason to know how variables work, including the real world example that granted them a place in that list.

  • Licensing

    • FSFE compliance workshop discovers GPL violation by FANTEC, Welte wins in court

      The Regional Court of Hamburg [Landgericht Hamburg] found FANTEC GmbH guilty of violating the GNU General Public License in their media player FANTEC 3DFHDL. In the case between Harald Welte versus FANTEC GmbH the court decided that FANTEC has to pay a penalty fee plus additional costs for the lawyers, and has to give out the exact information about their chain of distribution of the FANTEC 3DFHDL Media Player.

  • Programming

Leftovers

  • Is the Government About to Can Its Own Anti-Spam Law?

    In May 2010, then-Industry Minister Tony Clement introduced anti-spam legislation that he admitted was long overdue. Clement acknowledged that “Canada is seen as a haven for spammers because of the gaps in our current legislation…a place where spammers can reside and inflict their damage around the world.” Despite heavy lobbying against the legislation by groups concerned with new rules on electronic marketing, the government pushed ahead, with the bill receiving all-party support and royal assent by the end of that year.

  • Justices invalidate Arizona voter registration law

    The U.S. Supreme Court on Monday struck down an Arizona law that required people registering to vote in federal elections to show proof of citizenship, a victory for activists who said it had discouraged Native Americans and Latinos from voting.

  • Journalistic/Blogger Ethics Question
  • Bus co. owner threatens redditor yet again, records users’ IP addresses

    In a repeat performance that would make even Barbara blush, Illinois bus company owner Dennis Toeppen is pushing the so-called Streisand Effect to its limits by again trying to get reddit to shut up about his company. Once notorious as a domain squatter, Toeppen more recently became notorious for his war with social media users who speak ill of his Suburban Express bus service.

    Toeppen has now taken it up a notch, quintupling his legal threats and trolling his critics more ferociously on reddit. In this latest wrinkle, Toeppen unleashed his lawyer, James Long, and reiterated a legal threat against a redditor over a banner on the University of Illinois Urbana-Champaign subreddit. The banner on the UIUC subreddit—a discussion area for UIUC students and the community around the university—reads, “Don’t ride Suburban Express! They’ve sued hundreds of their customers, threatened the mods with legal action, have terrible reviews, and more.”

  • Geniuses Ordered To ‘Capture’ Laptops Because Of New MacBook Air Problems
  • Health/Nutrition

    • New book finds many U.S. foods banned overseas for cancer links

      Put down the Mountain Dew and step away from the Pringles. An estimated 80 percent of all packaged foods sold in America are actually so unhealthy and packed with chemical additives that they’re banned in much of the world, a new book reveals.

      Six food additives in particular are the worst-of-the-worst, the Daily Mail reported. A new book, “Rich Food, Poor Food,” by Dr. Jayson Calton and Mira Calton, a certified nutritionist, explains how the Food and Drug Administration’s stamp of approval means little to other nations — and that much of what America is eating is actually considered cancerous in other nations.

  • Security

    • You Have No Control Over Security on the Feudal Internet

      Facebook regularly abuses the privacy of its users. Google has stopped supporting its popular RSS feeder. Apple prohibits all iPhone apps that are political or sexual. Microsoft might be cooperating with some governments to spy on Skype calls, but we don’t know which ones. Both Twitter and LinkedIn have recently suffered security breaches that affected the data of hundreds of thousands of their users.

    • ‘Secure Work Space’ Brings BlackBerry Security to iOS, Android

      BlackBerry today rolled out a new security option for BlackBerry Enterprise Service 10 that will let those with iOS and Android smartphones separate their work and personal information.

    • Leaked Document Shows EU Approach To Cybercrime Is Completely Misguided

      We didn’t pay as much attention to the new proposals in the EU to ratchet up penalties for “cybercrime” in part because they came out just about the same time that the NSA surveillance information started leaking. However, someone who shall remain anonymous passed along to us a “group briefing” document from the EU Parliament team that came up with the latest cybercrime directive, which highlights a bit of the approach and some of the problems. The document is actually from a year ago, but it’s definitely reflected in the final product. The entire focus of the document is on harsher penalties, even though there’s no evidence that such penalties do any good or act as a deterrent.

    • Serious accusations against AdBlock Plus
  • Defence/Police/Secrecy/Aggression

    • The US Remains Guilty in Guatemala

      On Mother’s Day, May 12, The Boston Globe featured a photo of a young woman with her toddler son sleeping in her arms.

      The woman, of Mayan Indian heritage, had crossed the U.S. border seven times while pregnant, only to be caught and shipped back across the border on six of those attempts. She braved many miles, enduring blisteringly hot days and freezing nights, with no water or shelter, amid roaming gunmen.

    • Al Qaeda-affiliated militants training in using shoulder-fired anti-aircraft missile

      A Xerox copy of a 26-page manual with instructions on how to use man-portable air-defense systems, or MANPADS – also called SA-7 — was found in a building in Timbuktu in North Mali which was used by Al Qaeda in the Islamic Maghreb operatives during the 8-month control – April 2012 to February 2013 — of the area by Islamist militants. The Libyan military under Col. Qaddafi had about 15,000 SA-7s, but after the Qaddafi regime fell in November 2011, NATO forces and Libyan militias loyal to the government gained possession of only 5,000 of them. The rest have disappeared into the arsenals of different militias, and have probably found their way to different terrorist organizations in North Africa and the Middle East.

    • Obama Backs First-Strike Nuclear War As U.S. Policy

      In other words, “nuclear deterrence” is not now and has not been the policy of the Obama administration going back to and including their 2010 Nuclear Posture Review as well. Since “nuclear deterrence” is not now and has never been the Obama administration’s nuclear weapons policy from the get-go, then by default this means that offensive first-strike strategic nuclear war fighting is now and has always been the Obama administration’s nuclear weapons policy. This policy will also be pursued and augmented by means of “integrated non-nuclear strike options.” Id.

    • Washington Post: Let’s Punish Ecuador (Again)

      Correa is the overwhelmingly popular, democratically elected president of a country that has experienced remarkable growth over his time in office. The Post, clearly missing its old left-wing Latin American target, sneers that “replacing the deceased Hugo Chavez as the hemisphere’s preeminent anti-U.S. demagogue” is Correa’s mission.

    • Friend: Michael Hastings was investigating CIA before death

      A friend of an award-winning reporter, who died last week in a car accident, says Michael Hastings was investigating the CIA at the time of his suspicious death.

      Sgt. Joe Biggs told Fox News on Tuesday that Hastings was working on a story about the CIA and that it was “going to be the biggest story yet.” He added that “something didn’t feel right” after Hastings sent a panicked email saying the authorities were on his tail.

    • John Kerry Has Been Pushing For Air Strikes In Syria
    • Report: CIA training Syrian rebels

      CBS reports: CIA, US Special Forces training rebels in Turkey, Jordan. Meantime, Kerry arrives in Doha for talks, rebels confirm western military aid has begun to flow, in bid to turn tide against Assad

    • Report: CIA Has Been Training Syrian Rebels for Months
    • FBI investigation of Petraeus continues

      Attorney General Eric Holder acknowledged the ongoing probe during a little-noticed exchange last month with Rep. Jason Chaffetz, a Utah Republican and member of the House Judiciary Committee.

    • Lawsuit Over CIA ‘War Crimes’ Probe Points To The Underbelly Of Secret Ops
    • ‘Hypocrite of the century’: Irish MP blasts US president’s G8 visit

      Barack Obama is a “war criminal” and a “hypocrite,” an Irish politician has said…

    • Anti-War Activists Targeted as ‘Domestic Terrorists’

      Shocking new revelations come as activists prepare to sue the U.S. military for unlawful spying

    • Russia withdraws its remaining personnel from Syria
    • ‘Russia said pulling army personnel from Syria’

      Moscow pulls out all military staff from embattled Syria, strategic Mediterranean port, AFP cites Russian daily as saying.

    • Syria: The “Western Faces” Behind The Terror

      While Daly was quite right in censuring Obama for his criminal policies, including aiding terrorists in Syria, it is worthwhile noting that Obama is merely a willing instrument; the faces and factors behind his handlers and the policies merit greater scrutiny and exposure.

  • Environment/Energy/Wildlife

    • Obama: No time for ‘flat-earth society’ on climate change

      President Barack Obama laid out a far-reaching set of proposals meant to address the driving causes of climate change, headlined by a new directive to begin limiting carbon emissions for new and existing power plants and the announcement of high environmental standards for the proposed Keystone XL oil pipeline to be met before his administration signs off on the project.

    • Barack Obama pledges to bypass Congress to tackle climate change

      Barack Obama has taken an historic step forward in confronting climate change, asserting his power as US president to cut carbon pollution and protect future generations from catastrophic global warming.

      In a speech on Tuesday at Georgetown University, delivered outdoors on a sweltering hot day, Obama went further than any previous US president in outlining a comprehensive strategy for dealing with climate change. He also said he would continue to press the issue as a priority of his second term even in the face of implacable opposition from Republicans in Congress.

    • The bee keepers

      How a Harvard scientist, a sixth-generation bee whisperer, and a retired entrepreneur joined forces to rescue an embattled insect and save the American food supply.

  • Finance

    • Sweden’s Princess Madeleine to wed New York banker

      Three years ago she crossed the Atlantic with a broken heart. Now Sweden’s “party princess” returns from New York to Stockholm to tie the knot with her new, British-American love.

    • Co-operatives’ turnover soars to £37bn as record 15m join

      Co-operative businesses have reached an all-time high with a record 15.4 million members, an increase of 36 per cent since 2008 and up 13.6 per cent over the year.

      The turnover of co-operatives has surged to £37bn, a rise of 3.3 per cent in the last 12 months, according to a report published today by Co-operatives UK.

    • California man faces 13 years in jail for scribbling anti-bank messages in chalk

      Jeff Olson, the 40-year-old man who is being prosecuted for scrawling anti-megabank messages on sidewalks in water-soluble chalk last year now faces a 13-year jail sentence. A judge has barred his attorney from mentioning freedom of speech during trial.

    • China Banking Crisis Escalates: Some Banks Suspend Lending Activity

      It feels like 2008 all over again. News about troubled banks hit the wires every single day. In 2013, however, the United States is not the epicenter of the crisis; it is China and things are getting worse by the day. According to Chinese media, banks have curbed lending activity in a bid to reduce risk and repair their balance sheets.

      The trouble started at the end of May when reports emerged that the Industrial and Commercial Bank (ICBC) could not repay an interbank loan. Later in June, the Chinese central bank was forced to intervene to prop up the Bank of China (BoC), according to market sources. Bank of China “solemnly” denied these reports, but the damage was done.

    • Philosopher Renata Salecl: ‘Capitalism Is Humanity’s Neurosis’

      Freedom is a good thing, isn’t it? Not always, argues Slovenian philosopher Renata Salecl. The liberty to choose from an unlimited number of career options or coffee brands ultimately becomes a burden. Our modern capitalist society is ruled by a “tyranny of choice.”

  • PR/AstroTurf/Lobbying

    • Trans-Pacific Partnership and Monsanto

      Something is looming in the shadows that could help erode our basic rights and contaminate our food. The Trans Pacific Partnership (TPP) has the potential to become the biggest regional Free Trade Agreement in history, both in economic size and the ability to quietly add more countries in addition to those originally included. As of 2011 its 11 countries accounted for 30 percent of the world’s agricultural exports. Those countries are the US, Australia, Brunei, Chile, Canada, Malaysia, Mexico, New Zealand, Peru, Singapore and Viet Nam. Recently, Japan has joined the negotiations.

      Six hundred US corporate advisors have had input into the TPP. The draft text has not been made available to the public, press or policy makers. The level of secrecy around this agreement is unparalleled. The majority of Congress is being kept in the dark while representatives of US corporations are being consulted and privy to the details.

    • Shareholders Push Firms to Cut Ties to ALEC; 49 Corporations Now Out

      Scores of investors working together through Ceres and the Interfaith Center on Corporate Responsibility are challenging companies that fund the American Legislative Exchange Council (ALEC), reminding them that such support backs ALEC’s anti-environmental agenda.

    • Hey, Remember That IRS Tea Party Scandal?

      Not too long ago there was a massive scandal clogging up the front pages of the papers and the cable news airwaves: The IRS was either denying or delaying tax-exempt status to right-leaning “Tea Party” groups. But now things are starting to look a little different.

      There seems to be no denying that an inappropriate political test was being applied; the IRS apparently had a policy that applications with certain keywords would be flagged for additional scrutiny. The tax agency was dealing with a flood of applications from groups applying for 501(c)(4) tax-exempt status; some of these organizations were quite clearly set up to do election-related advocacy, which is what they were not supposed to be doing.

  • Privacy

    • FBI Performs Massive Virtual Line-up by Searching DMV Photos

      Through a Freedom of Information Act request, EPIC obtained a number of agreements between the FBI and state DMVs. The agreements allow the FBI to use facial recognition to compare subjects of FBI investigations with the millions of license and identification photos retained by participating state DMVs. EPIC also obtained the Standard Operating Procedure for the program and a Privacy Threshold Analysis that indicated that a Privacy Impact Assessment must be performed, but it is not clear whether one has been completed.

    • Privacy is not a commodity to be traded

      Trade has often been a positive driver in encouraging countries to adopt data protection laws, to ensure compliance and ability to conduct business with the European Union and other privacy-respecting partners. However, when free trade agreements are negotiated in secret and influenced by powerful business interests, the result is a severe watering down of existing privacy protections.

      There is a high risk of this happening in the free trade negotiations between the European Union and the United States (US), which are being launched on the 8th July in Washington. One of the hot topics in the agreement regards “data flows”, a euphemistically named term that in reality means the flow of personal user information. The problem is that data protection and privacy provisions in the US are far below best practice standards. Since recent lobbying efforts by American corporations and its government sought to undermine the EU data protection Regulation currently being debated in Brussels, supporters of the trade agreement who would like weaker privacy protections are likely to find more fertile ground behind closed doors of trade negotiations.

    • Snoopers’ Charter: What’s the situation now?
    • Prophetic analysis warned about US-based cloud

      One of the weak points in the new European data protection regulation that privacy advocates have been warning about is the ease by which data can be exported from the EU into FISAAA-ready services in the USA. In short, the European Commission have been trying to make “data exports” easier, but in the process have made it harder to enforce our fundamental privacy rights.

    • NSA Spying Scandal: Sir Tim Berners-Lee Warns Against Government Web Control [VIDEO]

      Sir Tim Berners-Lee, the inventor of the world wide web, has spoken out about the international spying scandal, accusing Western governments of hypocrisy over internet snooping.

    • NSA Snooping Scandal: Senators Propose Bill to Reform Surveillance Guidelines

      A group of United States Senators is challenging the government’s power to conduct warrantless surveillance on US and foreign citizens, by proposing a bill that will require greater transparency from security agencies and shorten the lifespan of legislation that allows for the mass-collection of communications data.

    • Students cite EU data protection laws, challenge firms over NSA data transfers

      In the wake of the disclosure of the National Security Agency’s mass digital surveillance program, a group of Austrian students have filed a series of formal complaints with a number of European data protection agencies. The case could become the first legal proceeding challenging disclosure of non-American data to the American government on the basis of alleged violations of European Union data protection law.

    • A Typeface Designed To Thwart NSA Surveillance

      Worried about spying eyes? Here’s a typeface created with the government’s prying computers in mind.

    • Glenn Greenwald Teases More NSA Info: ‘Majority’ Of ‘Significant’ Revelations ‘Have Yet To Be Made’

      Glenn Greenwald has been the subject of both praise and criticism since the NSA surveillance story took center stage in the news cycle. And he’s not done yet. Speaking to the Wall Street Journal, Greenwald teased future revelations, saying the most significant ones are still to come.

      “The majority of revelations that are significant have yet to be made,” Greenwald told the paper.

    • Germany blasts Britain over GCHQ’s secret cable trawl
    • Police unit monitors 9,000 ‘extremists’

      Officers familiar with workings of unit indicate that many of campaigners listed on database have no criminal record

    • Secret to Prism program: Even bigger data seizure

      In the months and early years after 9/11, FBI agents began showing up at Microsoft Corp. more frequently than before, armed with court orders demanding information on customers.

      Around the world, government spies and eavesdroppers were tracking the email and Internet addresses used by suspected terrorists. Often, those trails led to the world’s largest software company and, at the time, largest email provider.

      The agents wanted email archives, account information, practically everything, and quickly. Engineers compiled the data, sometimes by hand, and delivered it to the government.

      Often there was no easy way to tell if the information belonged to foreigners or Americans. So much data was changing hands that one former Microsoft employee recalls that the engineers were anxious about whether the company should cooperate.

    • A Database of Their Own

      If they were at all gracious, they would have waited for the ink on Maryland v. King to dry. But no, that would be too much to ask. In fact, they weren’t waiting for the Supreme Court to pull out the big ol’ approved stamp at all. They were already way down the slope.

    • Five myths about privacy

      When privacy is compromised, though, the problems can go far beyond the exposure of illegal activity or embarrassing information. It can provide the government with a tremendous amount of power over its people. It can undermine trust and chill free speech and association. It can make people vulnerable to abuse of their information and further intrusions into their lives.

    • Do Judges Play a Role After the NSA Call Records Have Been Collected?

      I think these commentators are probably wrong. Director Clapper seems to talking about the FISC’s review of the overall program, not suggesting that FISC judges play a role in approving each query of the data.

    • After Profits, Defense Contractor Faces the Pitfalls of Cybersecurity

      When the United Arab Emirates wanted to create its own version of the National Security Agency, it turned to Booz Allen Hamilton to replicate the world’s largest and most powerful spy agency in the sands of Abu Dhabi.

    • Lawyers Scrutinize Constitutionality of Surveillance Programs

      Susan Freiwald, a professor at University of San Francisco School of Law, said today that two recently revealed government surveillance programs likely ran afoul of the Fourth Amendment. George Mason University School of Law Professor Nathan Sales countered that there was a national security need for broader surveillance programs and pointed to what he believed were certain protections already in place against government overreach.

    • Data Protection Responses To PRISM “A Smokescreen”

      At the Open Rights Group conference in London recently, one of the most popular talks — How to wiretap the Cloud (without anybody noticing) — was given by independent privacy and surveillance expert Caspar Bowden. Until 2011 he was Chief Privacy Adviser to Microsoft and he has a deep understanding of the extent of US and other national surveillance of the Web.

      The risks related to PRISM came as no surprise to him. Indeed, earlier in the year he had co-authored a report to the European Parliament of November 2012 which was the first explanation of the problem of FISA 702, and associated loopholes in EU Data Protection law. The Q & A with Caspar that follows was prepared in February for a French publication. At that time he had no knowledge of the existence of PRISM, and the analysis was based entirely on research from open sources. As Caspar commented when I asked him this weekend, the analysis is still completely relevant.

    • A Reply to Epstein & Pilon on NSA’s Metadata Program

      Last week, my colleague Roger Pilon and Prof. Richard Epstein co-wrote a Chicago Tribune op-ed defending the National Security Agency’s bulk metadata collection program. I had not, initially, intended to respond directly: Cato scholars often disagree among themselves—as Roger and I long have in this area—and normally it suffices for us each to state our own affirmative arguments and let readers decide for themselves which is most convincing. However, as I now see that some observers—and in particular, a significant number of libertarians—have mistakenly taken this to mean that “Cato” supports the NSA program, which continues to dominate the news, I feel it’s necessary to say something here about why I (and, as I believe, the majority of my colleagues) reject that view.

    • Phew, NSA Is Just Collecting Metadata. (You Should Still Worry)

      We now know that every day, U.S. phone companies quietly send the government a list of who called whom and when — “telephony metadata” — for every call made on their networks, because of a secret order by the Foreign Intelligence Surveillance Court. It turns out that this has been going on for seven years (and was even reported by USA Today then); the difference now is that the government — uncharacteristically for such a secret intelligence operation — quickly acknowledged the authenticity of the leaked order and the existence of the metadata collection program.

    • NSA Boss Pretends He Doesn’t Know Anything About Wikileaks

      Of course, this comes out at about the same time as the federal government confirmed that several government agencies are still investigating Wikileaks. To think that the NSA would not be a part of that is somewhat unbelievable, especially given their mandate for foreign surveillance and anything that might lead to terrorism.

    • Thumb Drive Security: Snowden 1, NSA 0

      The humble storage device is again under fire after reports surfaced that National Security Agency (NSA) whistle-blower Edward Snowden, 29, used a removable USB storage device to exfiltrate top-secret information from the agency, reported the Los Angeles Times.

    • Read Angelina Jolie Stunt Double’s Wiretapping Lawsuit Against News Corp.

      Eunice Huthart says that tabloids were getting exclusives on the actress by intercepting her voice messages.

    • Retired Federal Judge: Your Faith In Secret Surveillance Court Is Dramatically Misplaced

      A retired federal judge warned Friday against blind faith in the secret court deciding the scope of U.S. government surveillance. During a panel discussion on constitutional privacy protection in the wake of a leaked Foreign Intelligence Surveillance Court decision that revealed widespread NSA data collection, U.S. District Judge Nancy Gertner stood up in the audience to counter the statements of conservative law professor Nathan Sales that secret surveillance requests are subject to meaningful judicial review.

    • Feds Must Produce NSA Dragnet Records for Criminal Defense

      In light of the recently revealed National Security Agency surveillance program, Brown’s attorneys challenged the government’s claim that it has no access to records of Brown’s phone calls. Prosecutors claimed they were missing records of calls to and from two of Brown’s telephones before Sept. 1, 2010. They claimed Brown’s service provider, MetroPCS, no longer had the records.

    • Simple kit turns Raspberry Pi into portable Tor gateway

      If you have been on the internet in the past couple of years, you’re likely quite aware that the Raspberry Pi is a cheap, tiny, machine of barely adequate power and wonders. One problem you may have encounter with the Pi is that, though cheap and easily obtainable, you have no idea what to do with it once you get it, or don’t have the time or gumption to create something useful. If you fall into the latter camp, the folks over at Adafruit have created just the mini-project for you: Onion Pi, a Raspberry Pi turned into a Tor proxy and access point.

    • Onion Pi turns Raspberry Pi into Tor proxy and wireless access point
    • EFF Joins Over 100 Civil Liberties Organizations and Internet Companies in Demanding a Full-Scale Congressional Investigation Into NSA Surveillance

      Dozens of civil liberties organizations and Internet companies—including the Electronic Privacy Information Center, National Association of Criminal Defense Lawyers, ThoughtWorks, and Americans for Limited Government—today joined a coalition demanding Congress initiate a full-scale investigation into the NSA’s surveillance programs. This morning, we sent an updated letter to Congress with 115 organizations and companies demanding public transparency and an end to illegal spying.

    • Privacy Guard: Scientists Develop Goggles That Block Facial Recognition Systems [VIDEO]

      Scientists have developed a means of ultimate privacy: glowing glasses that block photographs and facial recognition systems.

    • France Threatens Google With Privacy Fines

      Now it’s up to Google to decide whether the relatively small fines are enough of an incentive to rethink its privacy rules — the Internet giant risks a €300,000 euro ($402,180) penalty in France.

    • Blowback from the NSA Surveillance

      There’s one piece of blowback that isn’t being discussed — aside from the fact that Snowden has killed the chances of any liberal arts major getting a DoD job for at least a decade — and that’s how the massive NSA surveillance of the Internet affects the US’s role in Internet governance.

    • How the NSA’s Surveillance Procedures Threaten Americans’ Privacy

      Newly released documents confirm what critics have long suspected—that the National Security Agency, a component of the Defense Department, is engaged in unconstitutional surveillance of Americans’ communications, including their telephone calls and emails. The documents show that the NSA is conducting sweeping surveillance of Americans’ international communications, that it is acquiring many purely domestic communications as well, and that the rules that supposedly protect Americans’ privacy are weak and riddled with exceptions.

    • Tradeoffs

      The stupidest framing of the controversy over ubiquitous surveillance is that it reflects a trade-off between “security” and “privacy”. We are putting in jeopardy values much, much more important than “privacy”.

    • Montana Requires Warrants for Cell Phone Tracking

      With little fanfare, Montana became the first state to require police to obtain a warrant before tracking the location of a suspect in a criminal investigation through his cell phone.

    • NSA surveillance may be legal — but it’s unconstitutional

      The National Security Agency’s recently revealed surveillance programs undermine the purpose of the Foreign Intelligence Surveillance Act, which was established to prevent this kind of overreach. They violate the Fourth Amendment’s guarantee against unreasonable search and seizure. And they underscore the dangers of growing executive power.

    • Snowden receives refugee document of passage from Ecuador

      “In relation to Hong Kong, Mr Snowden was supplied with a refugee document of passage by the Ecuadorean government,” Assange told reporters from inside the Ecuador embassy in London where he has been himself hiding from arrest for more than a year.

    • There is no “right to be forgotten” by search engines, says top EU court advisor

      The senior advisor to Europe’s top court said Tuesday that Google is not responsible for third party information in its search results and that there is no general “right to be forgotten” under the current data protection laws.

    • Liberal icon Frank Church on the NSA

      Almost 40 years ago, the Idaho Senator warned of the dangers of allowing the NSA to turn inward

    • If the government wants you, where you store your data doesn’t matter

      The worst fears of the anti-cloud cabal came true recently…

    • David Davis warns that spy agencies are only subject to law ‘in theory’

      Former shadow home secretary says intelligence agencies can hand over personal data to US to get around ‘inconvenient laws’

    • Clear Thinking Needed in a Cloudy World

      Last week I wrote about the perils of using proprietary software, where companies regularly hand over zero-day vulnerabilities to the US authorities who then go on to use them to break into foreign systems (and maybe domestic ones, too, but they’re not owning up to that, yet….). Of course, cloud-based solutions are even worse, as we’ve known for some time. There, you are handing over all your data to the keeping of a company that may be on the receiving end of a secret US government order to pass it on to them – perhaps with necessary encryption keys too.

    • William Hague says we can’t do without PRISM

      Hague was speaking in Los Angeles, the BBC reported, when the topic turned to snooping and sharing. He was happy to talk about how grand it is.

      “We should have nothing but pride in the unique and indispensable intelligence-sharing relationship between Britain and the United States. In recent weeks this has been a subject of some discussion,” he said.

      “Let us be clear about it – in both our countries intelligence work takes place within a strong legal framework. We operate under the rule of law and are accountable for it. In some countries secret intelligence is used to control their people – in ours, it only exists to protect their freedoms.”

      People are not really buying that, and in the UK the civil rights group Liberty has filed a legal complaint against GCHQ, the UK government’s centralised intelligence agency.

    • Sorry, NSA, Terrorists Don’t Use Verizon. Or Skype. Or Gmail.

      The NSA has to collect the metadata from all of our phone calls because terrorists, right? And the spy agency absolutely must intercept Skypes you conduct with folks out-of-state, or else terrorism. It must sift through your iCloud data and Facebook status updates too, because Al Qaeda.

      Terrorists are everywhere, they are legion, they are dangerous, and, unfortunately, they don’t really do any of the stuff described above.

    • People Who Urge Calm Over NSA Spying Make Me Nervous

      It’s a defense often made of NSA surveillance, and it’s peculiar: It’s as if it’s not possible for the government to violate people’s Fourth Amendment rights (to be protected against “unreasonable searches and seizures”) unless it violates their First Amendment rights at the same time.

      In reality, of course, our civil liberties are violated–concretely, certainly and specifically–whenever we are subjected to an unreasonable search, which is to say one that is conducted without a judge having been convinced to warrant that there is probable cause to believe that we’ve done something wrong. It’s not OK for the government to sneak into our homes just to have a look around–even if they don’t use what they saw there to mess with us.

    • Critics question whether NSA data collection is effective

      The mass collection of data overwhelms investigators with information, critics at privacy conference say

    • Kimmel’s NSA Parody: ‘We’re Here And We Care’ (VIDEO)
    • Jagger jabs Obama over NSA scandal

      President Barack Obama didn’t attend The Rolling Stones concert in Washington, DC Monday night, but lead singer Mick Jagger said that wasn’t likely to keep the commander-in-chief from checking out the show.

    • NSA Chief: Massive Surveillance Has ‘Noble’ Intent

      NSA Chief Gen. Keith Alexander went on ABC today in an attempt to placate the American public’s growing disquiet about his organization’s massive surveillance of day-to-day activities.

      [...]

      Though most of the interview consisted of Alexander defending the notion of surveillance as a matter of course and condemning whistleblower Edward Snowden for “betraying” the NSA’s trust, while providing the sort of equivocation-ridden non-answers that Director of National Intelligence James Clapper famously described as the “least untruthful” things he could think of.

    • ‘US govt benefits most from NSA leak as people now know it has surveillance weapon’

      Surveillance is a weapon government deploys against its “biggest enemy” -the people. However, there is no use in it if no one knows about this deterrent, Joerg Platzer, from the Berlin based Crypto Currency Consulting Group told RT.

    • The US got Edward Snowden’s middle name wrong on extradition documents

      Edward Snowden, NSA-leaker extraordinaire, is such a familiar face in world news that he’s almost a household name. But for all the extensive NSA spying capabilities he revealed, US authorities were still not able to get his name right on extradition documents issued to Hong Kong, according to Rimsky Yuen, the city’s justice secretary.

    • Forget NSA Surveillance, Your Company Is Watching You

      Each year, the Association of Certified Fraud Examiners (ACFE) brings together fraud investigators from around the world to network with their peers and to talk about today’s cutting edge investigative techniques …. a Fraudapalooza (I’m coining that phrase). This year the gathering is taking place in Las Vegas and in addition to some prominent speakers (Preet Bharara and Andrew Fastow … talk about polar opposites), there are some breakout sessions on new developments in the world of fraud investigations. One of the session breakouts was led by Vincent Walden (Ernst & Young Partner – Fraud Investigations & Dispute Services) on how companies are developing tools to not only detect fraud in their organizations but predict where fraud is most likely to occur. Halt, you are about to commit a crime!

    • Student group files complaint against U.S. firms over NSA data snooping

      A student group has charged several U.S. technology companies with violations of European law for allegedly cooperating with the NSA to collect data on private citizens.

      Known as Europe-v-Facebook (EVF), the group of Austrian students announced Wednesday that it filed formal complaints with the EU against Facebook, Apple, Microsoft, Skype, and Yahoo. The group contends that since the five companies do business in Europe through subsidiaries, they fall under European privacy laws.

      Such laws allow the export of data only if the company’s European subsidiary can guarantee an “adequate level or protection” in the home country. Following the revelations of the National Security Agency’s PRISM program, the group believes that the “adequate level of protection” requirement was violated.

  • Civil Rights

    • The judges who preside over America’s secret court
    • Do You Have A Right to Remain Silent? Thoughts on the “Sleeper” Criminal Procedure Case of the Term, Salinas v. Texas
    • Aaron’s Law, much-needed reforms to computer crimes law, introduced in Congress

      Reps. say law must distinguish “common online activities and harmful attacks.”

    • David Gregory Is Just Wondering If Glenn Greenwald Should Face Criminal Charges for Doing Journalism [Updated]

      A conversation between Guardian journalist Glenn Greenwald and Meet the Press host David Gregory got pretty uncomfortable after Gregory asked Greenwald whether he should be charged with a crime for “aiding and abetting” his most famous source, Edward Snowden, who left Hong Kong on Sunday morning. Greenwald did not take kindly to the question. “I think it’s pretty extraordinary that anybody who would call themselves a journalist would publicly muse about whether or not other journalists should be charged with felonies,” he said. Greenwald then called “the assumption” that he “aided and abetted” Snowden “completely without evidence.” (It’s not clear if Gregory was suggesting that Greenwald did anything but publish the material Snowden gave him.) Greenwald also brought up the Obama administration’s pre-Snowden spying on Associated Press and Fox News reporters who worked with government leakers, which he called an attempt to “criminalize investigative journalism” by accusing reporters of “being co-conspirator in felonies for working with sources.”

    • NBC’s Gregory: Why Shouldn’t Greenwald Be Charged?

      NBC “Meet the Press” host David Gregory got a rise out of Glenn Greenwald on Sunday by asking the Guardian reporter why he shouldn’t be charged with a crime for having “aided and abetted” former National Security Agency analyst Edward Snowden.

      Greenwald replied on the show Sunday that it was “pretty extraordinary that anybody who would call themselves a journalist would publicly muse about whether or not other journalists should be charged with felonies.”

      Greenwald first reported Snowden’s disclosure of U.S. government surveillance programs. On Sunday, Ecuador’s foreign minister and the anti-secrecy group WikiLeaks said that Snowden was headed to Ecuador to seek asylum.

      During his interview with NBC’s Gregory, Greenwald declined to discuss where Snowden was headed. That refusal seemed to prompt Gregory to ask: “To the extent that you have aided and abetted Snowden, even in his current movements, why shouldn’t you, Mr. Greenwald, be charged with a crime?”

    • Greece: Abusive Crackdown on Migrants

      Athens police are conducting abusive stops and searches and have detained tens of thousands of people in a crackdown on irregular migration, Human Rights Watch said in a report released today.

    • 100,000 expected to protest before Brazil match

      Demanding better public services and angered by World Cup costs, about 100,000 people are expected at a protest Wednesday before Brazil plays Uruguay in the Confederations Cup semifinals.

      Local officials have declared a holiday in Belo Horizonte and authorities say they are expecting confrontations with the demonstrators.

      Belo Horizonte has had some of the most violent clashes between police and protesters since the country was swept by a wave of demonstrations calling for better education, transport and health services.

    • Dirty Wars author Jeremy Scahill: is journalism being criminalised? – video interview

      In the wake of whistleblower Edward Snowden’s leak of NSA files, Jeremy Scahill, author of Dirty Wars: The World is a Battlefield and featured reporter in the new documentary film of the same name, says under the Obama administration journalists are being intruded upon and whistleblowers are being charged with crimes. Scahill is also a national security correspondent for the Nation

    • Israeli authors campaign against eviction of West Bank villagers

      Some of the most celebrated figures in Israeli literature are campaigning to stop the forcible eviction of Palestinian communities in the barren hills of the southern West Bank to clear land for an Israeli military firing zone.

    • Supreme Court Strikes Key Parts of Voting Rights Law (Updated)

      The Supreme Court has ruled key parts of the 1965 Voting Rights Act as unconstitutional, dealing a disappointing decision to minority voting rights activists and asking Congress to develop new guidelines for the landmark law.

    • Vivienne Westwood dedicates latest menswear collection to Bradley Manning, US soldier on trial

      Vivienne Westwood, the British designer known for her eccentric fashion, dedicated her latest menswear collection to Bradley Manning, an American soldier currently on trial in the U.S. for leaking classified material to the website WikiLeaks. He was arrested in May 2010 in Iraq.

    • Doctors to Obama: Let us treat hunger-striking detainees at Guantanamo

      In an open letter to President Barack Obama published Tuesday, dozens of doctors asked to be allowed to treat hunger-striking prisoners at the U.S. detention center at Guantanamo Bay, Cuba.

    • Venezuelan Workers Meet for Worker Control Congress

      Activists from across the Venezuelan labour movement met last weekend for the country’s first ever Workers’ Congress, where workers discussed workplace democracy and the construction of socialism.

      The congress, billed “I Workers’ Congress: Balance and Challenges of Worker Control and Workers’ Councils for the Construction of Socialism”, was organised by the National Worker Control Movement and saw the participation of over fifty groups from factories across the country.

    • The Man Who Didn’t Disappoint

      Nelson Mandela was a rallying focus for any progressive thinker of my generation. I attended numerous events of which the aim was to free Nelson Mandela. I carried a torch through Edinburgh, danced round a bonfire in Dundee and talked to the startled tourists in Norwich cathedral, among other things.

    • California Senate Committee Unanimously Passes NDAA Nullification Bill

      Today, the California State Senate Public Safety Committee gave a unanimous “Do-Pass” approval to a bill which starts the process of stopping “Indefinite Detention” under the NDAA and other so-called federal “laws.” The bill, authored by Republican Assemblymember Tim Donnelly was previously passed by the State Assembly by a vote of 71-1. It is is expected to get a vote in the Senate appropriations committee next, which is the final stop before a vote in the state senate. If it passes both, it’ll go on to the Governor’s desk for a signature.

    • Is the South more racist than the North?

      Study finds “Southerners are more likely than Northerners to use prejudice in making political decisions”

  • Internet/Net Neutrality

  • DRM

  • Intellectual Monopolies

    • Ed Fast and US trade rep commit to concluding TPP in 2013

      Trade Minister Ed Fast and his recently-confirmed American counterpart, Michael Froman, came out of their first tête-à-tête in Washington on Tuesday with an ambitious objective to conclude the Trans-Pacific Partnership before the end of the year.

    • Copyrights

      • Happy Birthday to You, Happy Birthday to You, Here’s a Copyright Lawsuit, Happy Birthday to You

        I don’t know that I’d call this “a lawsuit for the ages,” like the New York Times does. But that’s mainly because around here that title is reserved for the four-year struggle over a $65 million legal claim that the plaintiff called a “public interest lawsuit by a private attorney general” but the court called “a personal vendetta against a dry cleaners over a pair of pants.” So the bar is pretty high.

        But a copyright lawsuit claiming that “Happy Birthday to You,” arguably the most recognized and most-often-performed song in the English language and possibly in any language, is actually in the public domain could definitely be in the same ballpark as the Pants Suit.

      • Arizona Court Skeptical Of ‘Medical Excuse’ From Prenda Lawyers
      • Google Makes Google News In Germany Opt-In Only To Avoid Paying Fees Under New Copyright Law

        Google News in Germany will soon change. Starting August 1, it will only index sources that have decided to explicitly opt-in to being shown on the search giant’s news-aggregation service. Google News remains an opt-out service in the other 60 countries and languages it currently operates in, but since Germany passed a new copyright law earlier this year that takes effect on August 1, the company is in danger of having to pay newspapers, blogs and other publishers for the right to show even short snippets of news.

      • Obama Issues New Anti-Piracy Plan

        The government updates statistics on investigations and arrests and also talks about its priorities including transparency, communication and education.

      • Snowden Revelations Cast New Doubts On Intelligence Oversight Process

        Depending on which elected official you asked this week or last, the revelation that the NSA regularly collects U.S. phone records, and can easily access some private content like emails and chat transcripts from Internet companies, was either no big deal, an enormous shock to the conscience, or an “I told you so” moment.

06.25.13

Links 25/6/2013: Zorin OS 7, Linux Mint 15 KDE RC

Posted in News Roundup at 3:06 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Apriorit Adapts Nanomites for Linux: Modern Antidebug Protection

    Being a software R&D company, Apriorit frequently faces the questions of reliable code protection for both Windows and Linux applications. Experienced also in software research and legal reverse engineering, Apriorit chose the most efficient antidebug technology so far – nanomites.

  • Startup Linux Offering to Rival Network Tech Giants

    Startup Cumulus Networks released its Linux-based network operating system last week, noting its ability to bring flexibility and low-cost benefits of open standards to data center networks that are dominated by Cisco and other vendors.

  • Munich to distribute Linux CDs to get people to ditch Windows XP

    Next year, the Munich city council plans to distribute two thousand copies of Lubuntu to local residents who still own computers running Windows XP. The goal is to reduce the amount of electronic waste its citizens generate when upgrading their computer systems.

  • Munich to distribute Lubuntu CDs to replace Windows XP
  • German City Hopes to Wean Citizens Off Windows XP With Free Linux CDs

    Munich City Council plan to make Ubuntu discs available as a ‘replacement for Windows XP’ – Microsoft’s 11-year old operating system for which support officially ends in April of next year.

    The proactive effort is been billed as an attempt to ‘prevent electronic waste’ from discarded computers that, whilst still serviceable with an alternative OS, would fail to meet the requirements of Windows 7 or Windows 8.

  • Cumulus Networks is Linux in Name Only

    Cumulus Networks recently unveiled their flagship product, Cumulus Linux, as Sam reported yesterday, but don’t let the name fool you. Although Cumulus Linux is based on Debian, it is not open source. It is an operating system optimized for a short list of networking devices. Cumulus Linux has an impressive list of capabilities designed for a modern data center, but using the Linux name when they are not giving back to the community is a missed opportunity.

  • OSX Airdrop functionality in Linux..

    Within OS’s there are many different features, some are shared between OS’s like icons and pointers however every OS needs an edge, something which makes it a little different. OSX has one of these features and its a gem which should be included in every OS by default.

  • Audiocasts/Shows

    • Burning Circle Episode 119

      This week’s episode is posted slightly early. Mentioned in this episode are the need to sign the Ubuntu Code of Conduct as only 85 out of over 400 members have signed it, the need to find a deputy to sign the Ohio Linux Fest 2013 table contract, and that we’re looking at an upcoming alpha release for Saucy Salamander.

  • Kernel Space

    • The Kernel Column – The development of Linux Kernel 3.9

      Jon Masters summarises the goings-on in the Linux kernel community as the 3.9 kernel was being prepared for release. Ongoing development brings with it security headaches, and kernel testing is improved by the Trinity ‘Fuzzer’

    • Thunderbolt Still Has Problems For Linux

      While the popularity and future of the Apple/Intel Thunderbolt interface can be debated, the current state of Thunderbolt on Linux still leaves a fair amount to be desired. While on the state of Linux hardware support, the Google Chromebook Pixel does work with modern Linux distributions, but not all support has been perfected.

      Greg Kroah-Hartman has written a new blog post this afternoon entitled Hardware, past, present, and future. In the post he says a few things about the state of Linux hardware support, which is summarized below.

    • Linux 3.10-rc7

      So this is hopefully the last -rc in the series, and things have indeed be calming down finally, so assuming that trend continues, we’re all good.

    • Graphics Stack

      • Research Underway With QEMU 3D Support

        There’s long been a need for QEMU/KVM to have guest 3D support for virtual machines (especially with more of the modern Linux desktops requiring OpenGL support) and Red Hat engineers have talked about such support previously, but now it looks like code is finally materializing.

      • AMD Radeon KMS Still Being Ported To FreeBSD

        It’s been a while since last talking about the project to bring the Linux driver for AMD Radeon KMS to FreeBSD. The project is still going forth for expanding FreeBSD kernel mode-setting, but there hasn’t been too much progress as of late.

      • [ANNOUNCE] xf86-video-intel 2.21.10
      • Intel Driver Gets More Fixes, Performance Tweaks
      • Kernel-Based X11 Server Claims 2x Performance Over X.Org

        MicroXwin is an X.Org Server alternative for an X Windows System implementation for Unix/Linux desktop. The developers behind MicroXwin are claiming that by implementing their X Server in the kernel they are getting a 2x performance advantage while using less memory and being binary compatible with Xlib.

      • Intel Dramatically Speeds Up NSS With AVX2

        Intel has managed to dramatically speed-up Network Security Services (NSS) for the new Haswell (and forthcoming Broadwell) processors that boast AVX2 instruction set support.

        Yesterday a patch surfaced by Intel’s Shay Gueron on the Mozilla bug tracker for dramatically boosting the performance of NSS. “It provides an efficient and constant-time implementation of modular exponent function, using the AVX2 instructions set, and achieves high performance on Intel 4th Generation Core Processors…Applying this ‘vectorized’ algorithm to modular exponentiation improves the performance of: DH1024, DH2048, RSA2048 sign and verify, RSA1024 verify, JPAKE and DSA1024 with DSA2048 sign and verify.”

      • “SimpleDRM” Driver Published For Simple KMS

        David Herrmann, the Linux developer that has a mission to kill the Linux kernel console, published the code on Monday for a “SimpleDRM” graphics driver.

    • Benchmarks

      • GCC 4.8 vs. LLVM/Clang 3.3 On Intel’s Core i7 4770K

        Complementing the earlier Phoronix article about optimized binaries for Intel Haswell CPUs via the “-march=core-avx2″ Haswell compiler optimizations, in this article is a comparison of the GCC and LLVM/Clang compilers when targeting the new Core i7 4770K CPU. GCC 4.7.3, GCC 4.8.1, LLVM Clang 3.2, and LLVM Clang 3.3 were the tested compilers under Ubuntu Linux when seeing how well these different compilers optimized for Haswell.

      • 16-Way Linux OS Performance Comparison

        Building on our earlier 11-Way Linux/BSD Platform Comparison, starting a new week we’re up to a 16-Way Linux operating system comparison. Added in now are results from PCLinuxOS, ROSA, the lightweight antiX distribution, and then the Gentoo-based Sabayon and Calculate Linux Desktop distributions.

      • The Latest Mesa 9.2 Results For Intel Haswell

        With new code going into Mesa on a daily basis, here’s the very latest benchmarks comparing the state of stable Mesa 9.1.3 against the Mesa 9.2 development code with all of the performance optimizations it brings to the Intel DRI driver for the latest-generation Haswell graphics hardware.

      • Is Intel Sandy Bridge Getting Faster On Linux?

        With the extensive coverage on Phoronix this month of Intel’s new Haswell processors on Linux, many articles have shown that when using the latest components (e.g. Linux 3.10 kernel and Mesa 9.2) that the OpenGL performance is a whole lot faster. But are these changes specific to Haswell or benefit Intel’s driver as a whole? In this article are new benchmarks from an older Intel “Sandy Bridge” system with HD 3000 graphics to see whether the performance there is also improving with the latest Linux code.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • Is Krita for you? (II)

        Here we are again! This is our second post to increase your love for Krita. Enjoy it and don’t forget that we can resolve your doubts in Krita Forum and #krita channel on IRC.

      • Results are in: One Open Source Dictation System Coming Up
      • New KDE screen management tool ready for widespread use

        Blue Systems developer Àlex Fiestas has announced that the open source KScreen management tool has seen its first stable release. With version 1.0, the screen management utility is now considered by its developers to be ready for general use and planning for the features of KScreen 1.1 is already under way, according to Fiestas. KScreen is designed to bring next generation screen management to the KDE desktop.

      • News in kdepim 4.11: new mail notifier
      • GSoC: Collaborative text editing in kate + kde-telepathy

        First of all, I’ve been accepted for GSoC this year! I’ll be working on creating a collaborative text editor based on the KTextEditor interface and libinfinity library, and on integrating that editor into kde-telepathy. The point of integration with kde-telepathy is that it will allow for a nice user experience in setting up connections: instead of typing IP addresses, they can just select a person from their contact list.
        “Integration” doesn’t mean you’ll be required to use it, though — it’ll work just fine with the old-fashioned way, too.

      • Simon 0.4.1

        Simon 0.4.1 was just released to the public and can now be downloaded from the Simon homepage.

      • Amarok MTP GSoC: week 1

        Hi, this is my first weekly report describing my work on my Google Summer of Code project to rewrite MTP (Android) support in Amarok from scratch. This week I’ve laid the very basic building blocks and I even have some screen-shots. :-)

    • GNOME Desktop/GTK

      • Xfce, LXDE, & GNOME Are Running On Ubuntu XMir

        With all of the controversy surrounding the Mir Display Server for Ubuntu Linux on non-Unity desktops, a Canonical engineer sought to find out what Linux desktops would work atop Mir if using the XMir X.Org Server compatibility layer.

  • Distributions

    • The most popular end-user Linux distributions are…

      The only surprise on that list is Mageia, which is a Mandriva fork that I’ve honestly never seen anyone use. Maybe I’m just not hanging out with the right crowd.

      Personally, my own top Linux distributions mirror the list of the most popular ones. I use Android on my tablets and my smartphone; Chrome OS on a Chromebook Pixel; and Mint on my Dell desktop and my Lenovo ThinkPads.

    • First look at ROSA 2012 R1 “Desktop Fresh”

      [ROSA] The ROSA distribution is a fork of Mandriva and one of the project’s editions is called “Desktop Fresh”. This branch of the ROSA project “is targeted at advanced users and enthusiasts who will appreciate rich functionality and freshness of distribution components without serious loss of quality.” Or, put another way, ROSA Fresh tries to deliver up to date packages combined with user friendly technology, much of it developed by Mandriva with some new features added by the ROSA team. The new release of Fresh includes a few interesting features, including support for the Steam game portal as well as Azure and Hyper-V support. This version comes with the KDE 4.10 desktop and is available in 32-bit and 64-bit builds. The install image for ROSA Desktop Fresh is 1.5 GB in size and does double duty as a live DVD.

    • Top Five Best Linux Distros

      I’m a sucker for every kind of “Top Five” (or Top 10 or Top 20) list there is. I love reading them and I enjoy writing them. There’s just one thing I’ve learned, never take them seriously. They’re just a way to have fun. They never speak anything like the whole truth, unless they’re listing something based on quantity, like the five best selling brands of soda. Even then, pay attention to who’s counting the quantity. Pepsi would probably come up with a different list than Coke.

    • What Was Your First Linux Distro?
    • AntiX Keeps Going For Low-End Computers

      AntiX 13.1 was released this past week for those looking to load Linux on low-end computers. AntiX isn’t a Linux distribution about killing off X.Org, but rather is about running Linux on low-end hardware.

      The antiX distribution follows Debian Wheezy at the moment with its version 13 “Luddite” series. The antiX 13.1 release pulls in various updates from Wheezy over its original 13.0 release, plus provides various bug-fixes as pointed out on its project page at MEIPS.org.

    • New Releases

      • Zorin OS 7 Review Linux Distro Reviews
      • Linux Mint 15 KDE RC released

        KDE Plasma is one of the most advanced, future ready (thus the name Plasma), desktop environments around which empowers users to stay in control of their PCs. KDE is not only the most customizable, expandable Des but also the most elegant one. Linux Mint’s own Cinnamon brings the same level of customization and control to Gnome 3. So with Linux Mint you get the best experience of the two leading desktop environments.

    • Screenshots

    • PCLinuxOS/Mageia/Mandrake/Mandriva Family

      • Mandriva Linux: Which Fork Is Right for You?

        Mandriva Linux is a newbie-centric distribution that has become less of a highlight in the news over the past few years. At one time, Mandriva was considered the de facto Linux distribution for anyone looking to switch from Windows to Linux. Today, Linux has evolved into a complex ecosystem, and selecting Mandriva isn’t as black and white as it once was.

        In this article, I’ll examine where Mandriva is today, how various forks of Mandriva Linux work within the Linux space and whether or not they’re something I would recommend trying out for yourself.

      • FISL14 – Nós Vamos!
    • Red Hat Family

      • Evercore Partners Lowers Red Hat Price Target to $55.00 (RHT)

        Evercore Partners has also modified their ratings on a number of other information technology stocks in the few days. The firm lowered its price target on shares of Oracle Corp. from $36.00 to $34.00. They have an equal weight rating on that stock. Also, Evercore Partners raised its price target on shares of Microsoft Corp. to $36.00. They have an equal weight rating on that stock. Finally, Evercore Partners lowered its price target on shares of Zynga Inc from $3.35 to $2.50. They have an underweight rating on that stock.

      • Deutsche Bank Reiterates “Hold” Rating for Red Hat (RHT)
      • Xen Support Returns to CentOS at Last
      • Red Hat Stock Rating Reaffirmed by Bank of America (RHT)

        Bank of America reiterated their buy rating on shares of Red Hat (NYSE: RHT) in a research note released on Thursday morning, ARN reports.

        “We think RHT is capable of growing billings at a sustainable rate in mid teens, with multiple growth drivers validating our thesis (see our report for details). RHT is becoming a multi-product company benefiting from open source adoption and Cloud platform build-out. In our view, the stock could be poised to move higher from billings reacceleration. We reiterate Buy with PO of $61, based on 25x CY13e FCF, in line with comps (CRM, VMW).,” Bank of America’s analyst commented.

      • Red Hat Beats Analyst Estimates on EPS
    • Debian Family

      • The value of a good distro wide test suite…

        In the Debian Edu / Skolelinux project, we include a post-installation test suite, which check that services are running, working, and return the expected results. It runs automatically just after the first boot on test installations (using test ISOs), but not on production installations (using non-test ISOs). It test that the LDAP service is operating, Kerberos is responding, DNS is replying, file systems are online resizable, etc, etc. And it check that the PXE service is configured, which is the topic of this post.

      • Derivatives

  • Devices/Embedded

    • Artila Releases Matrix-505 Linux Ready Box Computer
    • BeagleBone Black SBC gains $15 metal enclosure

      Logic Supply will soon ship an enclosure for BeagleBoard.org’s BeagleBone Black open source development board. Selling for $15 in July, the LGX BB100 comprises a plated steel chassis with a multipoint mounting lid that fits BeagleBone Capes, and offers access to USB, microSD, microHDMI, Ethernet, and other ports.

      Considering the BeagleBone Black single-board computer (SBC) is priced at $45 — or almost half the price of the original BeagleBone — Logic Supply is gambling that customers will have some money left over for a $15 enclosure. The company announced the LGX BB100 in late May, and has now released pricing, availability info (mid-July), and other details.

    • PiCloud Is A Model Cloud Made Of Raspberry Pi & LEGO For Teaching Students About Web Platforms
    • Phones

      • Ballnux

      • Android

        • HP 21-inch touchscreen PC runs Android on Nvidia Tegra 4
        • Rugged, multiwireless, multifunction GPS runs Android

          Garmin announced a ruggedized, 4-inch personal navigation device (PND) that runs on Android. Expected to ship in the third quarter starting at $650, the handheld Monterra offers Google Play compatibility, a dual-band GPS/GLONASS receiver, a 3-axis compass, an 8-megapixel camera, and wireless features including WiFi, ANT+, Bluetooth 3.0, NFC, FM, and NOAA radios, and a sunlight-readable display.

        • Google opening Android Nation retail stores across India

          Web giant’s latest attempt is further aimed at penetrating the Indian market with Android devices, and will see retail stores set up across India starting in New Delhi later this year.

        • GEAK Watch – the First Android Smart Watch

          While there are rumors that Apple, Samsung, Google, Microsoft and other companies keep their “smart” watches still in the air, the Chinese GEAK company already has a pretty compelling product that belongs to this segment of the market.

        • Sony hints a new SmartWatch is coming next week

          Sony’s SmartWatch was part of a rush of smartphone-connected watches released between 2010 and 2012, as developers looked to update Dick Tracy’s wristwear for a world full of Android and iOS devices. But the Kickstarter-funded Pebble swept many of them away, gaining the kind of cultural cachet that other connected watches never even approached. With the Pebble a few months past release and Apple’s iWatch still a rumor, Sony is teasing an update to its SmartWatch for this year’s Mobile Asia Expo.

        • The first ten Android apps a professional should download
    • Sub-notebooks/Tablets

      • Shisutena to launch a 10 inch Tizen Linux tablet in Japan

        Smartphones and tablets running the Tizen operating system are expected to hit the streets this year, and it looks like Japan could be a good place to find some of the first. Hot on the heels of news that wireless carrier NTT DoComo would offer one of the first Tizen-powered phones, a company called Shisutena has announced it’s developed a 10 inch Tizen tablet.

      • HP Launches Android PC Slate 21

        HP just doubled the troubles for Microsoft by launching an Android powered desktop PC called Slate 21. Though it’s not the first time any PC maker tried to put Android on a PC, but HP is the first major company to push ‘Android only’ desktop to the market.

      • Android Sneaks Onto the Desktop in Giant HP Tablet

        t’s a tablet! It’s a desktop PC! Actually, the new Android-powered HP Slate 21 is a little of both. Featuring a Nvidia Tegra 4 processor and a kickstand to prop it up on the desk, the device targets primarily home users. “This is the rich experience consumers really want,” said Jim McGregor, principal analyst at Tirias Research. “I would expect to see more of this.”

      • Why New Tablets and PCs Running Android Make Lots of Sense

        As Android continues to win market share despite being a very young mobile operating system, the number of applications for it is rising too. That has already expanded Android’s influence from smartphones to tablets, but there has also been interest in bringing Android to desktop computers. For example, I’ve written about BlueStacks App Player a number of times, which lets you run Android apps on a PC through emulation.

      • HP Slate 21 all-in-one PC is powered by Android, Tegra 4 chip

        The company shows off its new desktop/tablet hybrid that eschews Intel and Windows at an event in Beijing. It arrives in the U.S. in September starting at $399.

Free Software/Open Source

  • CertiVox launch open source authentication client
  • Joeffice Is An Open Source Office Application That Was Built In 30 Days
  • Douglas Arellanes – building strong independent media through open-source software

    A long-time resident of Prague, Doug Arellanes has been involved in internet innovations in this country since the early 1990’s. A few years ago, he became one of the founders of Sourcefabric, an organization that creates open-source online tools for media organizations all over the world. Douglas began by telling me about how he was first enticed to come to Czechoslovakia from Los Angeles, having received a letter from his friends who at the time founded the newspaper Prognosis, the precursor to The Prague Post.

  • Major part of DCGS now open source

    A recently created military software open source foundation received its first major chunk of code when Lockheed Martin donated in May middleware software used in the Distributed Common Ground System, a military data analysis tool the subject of mounting controversy.

  • Cubietruck is a small, open source mini PC with an Allwinner A20 dual-core CPU

    The Cubietruck is an upcoming mini-computer with a dual-core ARM Cortex-A7 processor, up to 2GB of RAM, Gigabit Ethernet, and WiFi and Bluetooth built in.

  • AppScale Launches As An Open-Source Backup Equivalent To Google App Engine

    Startup AppScale has launched its open-source backup up service for Google App Engine (GAE), which is compatible with standard cloud services that developers use when building apps.

    The company, which was one of six startups that presented at the Structure conference last week, stood out even if it did not win an award for overall best startup and even though it wasn’t the audience award winner. Here’ why: It is a backup Platform as a Service (PaaS) for a PaaS and infrastructure services.

  • Exclusive Interview with Illumos Founder Garrett D’Amore

    During the week, Unixmen exclusively interviewed Illumos Founder, Garrett D’Amore. Garrett has worked for the likes of Sun Microsystems and Nexenta. Upon the announcement of Oracle closing development of OpenSolaris, he founded the Illumos project which would become a continuation of the OpenSolaris kernel. We asked him to shed some light on what he thinks of the current situation with OpenIndiana, the open-source desktop project which would continue on from where OpenSolaris stopped so suddenly.

  • Free Software post-PRISM

    The news has been full of talk of spying, whistleblowing and data mining. Glyn Moody looks at how open source has been used to threaten freedom and privacy and how it could be used to defend them.

  • Forces Driving Open Source Enterprise IT Applications to the Cloud

    Nothing is bigger in the technology industry these days than the cloud. And right in the middle of this migration and brave new world are open source applications.

  • Web Browsers

    • Chrome

      • Google to scan for malicious apps in Chrome Web Store

        Google is trying to better protect the users of its Chrome Web Store from malicious browser apps and extensions. As is already the case in the Google Play Android apps store, content uploaded to the Chrome Web Store will now also be automatically scanned for malware.

    • Mozilla

      • Firefox Delivers 3D Gaming, Video Calls and File Sharing to the Web

        Rich activities like games and video calls were some of the last remaining challenges to prove that the Web is a capable and powerful platform for complex tasks. We conquered these challenges as part of Mozilla’s mission to advance the Web as the platform for openness, innovation and opportunity for all.

        Firefox allows developers to create amazing high-performance Web applications and enables video calls and file-sharing directly in the browser, all without the need for plugins or third-party software. What has been difficult to develop on the Web before is now much easier, faster and more fun.

  • SaaS/Big Data

  • Databases

    • State Of The Sea Lion – June 2013

      The Board of the MariaDB Foundation thought it would be good to provide an update — hopefully the first of a regular quarterly series — on how we’re progressing with the interim activities around constructing governance, identifying a new representative Board and structuring an engineering council.

    • Enterprise Open Source: Talend and Neo Technology Advance NoSQL Capabilities with Support for Big Graph Databases

      Talend, a global open source software leader, and Neo Technology, creators of Neo4j, the world’s leading graph database, today announced a partnership to advance the deployment and integration of NoSQL graph databases to enterprise environments. As part of the agreement, Talend has added a new connector for Neo4j in its integration solutions, Talend Platform for Big Data and Talend Open Studio for Big Data, enabling users to easily connect and analyze data from disparate systems to help drive and improve business performance.

  • Oracle/Java/LibreOffice

    • LibreOffice 4.1′s first release candidate arrives

      The arrival of the next version of LibreOffice nears with the publication of the first release candidate for LibreOffice 4.1. The LibreOffice developers released the RC1 with release notes listing 61 bugs fixed since Beta 2′s publication two weeks ago, with various fixes for the experimental sidebar, OOXML conversion fixes for crashes and border width reading, some fixes to rendering and runaway lines reverted, and corrections for various crashes in Writer, Base and the document converter.

  • CMS

  • BSD

    • PS4 runs Orbis OS, a modified version of FreeBSD that’s similar to Linux

      The PS4, which is scheduled to be released in November at the delightful price of $400, appears to run an operating system called Orbis OS, which is a modified version of FreeBSD 9.0. FreeBSD is a free version of BSD Unix that is generally fairly compatible with most Linux applications, and to the untrained eye a BSD-based system looks a lot like Linux. In theory, with a bit of work, this means you could almost take a PS4 game and run it on a Linux PC — but don’t get your hopes up for some kind of Linux gaming renaissance.

    • Details about Playstation 4 OS development
    • FreeBSD turns 20 years old

      OPEN SOURCE OPERATING SYSTEM FreeBSD has hit its 20th birthday.

      FreeBSD has over the years seen its mainstream popularity dwindle as the Linux kernel and the many distributions that use it have seen rapid development. However FreeBSD turned 20 on 19 June and it continues to run vital network infrastructure services.

    • Sony’s PlayStation 4 Is Running Modified FreeBSD 9

      It’s been exposed that the operating system powering the PlayStation 4 is Orbis OS, which is a Sony spin of FreeBSD 9.0. It’s not a huge surprise FreeBSD is being used over Linux, in part due to the more liberal licensing. The PlayStation 4 is x86_64 based now rather than Cell-based, which makes it easier to use FreeBSD.

  • FSF/FSFE/GNU/SFLC

    • A second FSF-certified device from ThinkPenguin: long-range USB Wifi adapter with Atheros chip

      The Free Software Foundation (FSF) today awarded Respects Your Freedom (RYF) certification to the TPE-N150USBL long-range 802.11n USB adapter, sold by ThinkPenguin. This wireless adapter is based on the Atheros AR9271, using the same chip and firmware as the TPE-N150USB, which was awarded RYF certification in April. The RYF certification mark means that the product meets the FSF’s standards in regard to users’ freedom, control over the product, and privacy. The TPE-N150USBL can be purchased from http://www.thinkpenguin.com/TPE-N150USBL.

    • GIMP 2.8.6 Released
  • Project Releases

    • Annual update released for TeX Live

      The developers of the TeX Live distribution of LaTeX have released their annual update. However, after 17 years of development, the changes in TeX Live 2013 mostly amount to technical details.

  • Public Services/Government

    • EC tells public bodies to break free from lock-in

      In a Communication published today, the European Commission urges public bodies to break free from vendor lock-in in their IT systems. The Commission wants public bodies to rely on standards rather than brand names and proprietary technology when they buy software.

      In its Communication titled “Against lock-in”, the Commission highlights that public bodies unnecessarily spend 1.1 billion Euro every year because they do not allow more competition among their suppliers. The Commission cites studies saying that 16% of public procurements make reference to brand names. According to the Communication, costs for IT contracts drop by 9% when public bodies manage to double the number of companies bidding for those contracts.

    • Italian Genoa to use open source ‘wherever possible’

      The Italian city of Genoa is increasing its use of free and open source software, aiming to reduce its dependency on IT vendors. “The Municipality will favour the use of free software or open source, wherever possible”, Genoa announced last week Friday.

    • South Tyrol government to standardise on LibreOffice

      A report on the EC’s open source portal, Joinup, states that the decision to move to LibreOffice was taken by a roundtable representing the province’s IT experts, municipalities, health care and others. The reason given for the switch is to avoid “vendor lock-in, increase flexibility, save costs and support the region’s small and medium sized ICT service providers.”

    • European Commission foresees €1.1bn savings from open standards

      THE EUROPEAN COMMISSION (EC) has said that using open standards could save the public sector €1.1bn a year.

      The EC has long been in favour of using open source software, highlighting the benefits that governments that make the jump from closed source software enjoy. Now the commission has said that using open standards when buying IT systems could save the European public sector €1.1bn a year.

  • Licensing

  • Programming

    • Eclipse Foundation opens up to social coding

      In an admission that the role of a modern open source foundation has changed, the Eclipse Foundation has said it will start allowing projects to host their core development on third-party forges such as GitHub. The reasons behind this change are outlined in a blog post by Mike Milinkovich, Executive Director of the Eclipse Foundation.

    • PHP 5.5 Released With Zend Opcache, Generators

      The PHP development community announced today the release of PHP 5.5.0. The PHP 5.5 release brings with it the Zend Opcache extension, support for generators, the “finally” keyword, and other new additions to the popular scripting language.

    • LLVM Clang 3.3, Early Clang 3.4 Benchmarks

      For those curious how AMD’s Bulldozer CPUs are performing with this week’s release of LLVM 3.3, here are some benchmarks of LLVM/Clang 3.3 along with some early benchmarks of the latest Clang 3.4 development code from the AMD FX-8150 Eight-Core CPU.

  • Standards/Consortia

    • Daala: A Next-Generation Video Codec From Xiph

      Xiph.Org is now working on Daala, a new general-purpose video codec designed to be next-generation beyond VP9 and HEVC. The project is still considered “pre-pre-alpha”, but it gives hope to a new generation of open-source video support.

Leftovers

  • Could SCOTUS ruling actually endanger affirmative action policies?

    The Supreme Court’s decision on Monday to send its big affirmative action case back to the lower courts has been hailed by civil rights groups as a victory for the policy’s advocates. But some legal experts are not so sure.

    The case, called Fisher v. University of Texas at Austin, involved a white woman who sued the school after it rejected her in 2008, arguing that the school’s affirmative action policy violated the Equal Protection Clause of the 14th Amendment. In a 7-1 decision, the Court found that in this case, the 5th Circuit Court of Appeals improperly applied the “strict scrutiny” test, and gave undo deference to the “good faith” of the University of Texas when it ruled in the school’s favor.

  • Supreme Court Puts New Pressure on Colleges to Justify Affirmative Action

    The U.S. Supreme Court’s ruling on Monday in a lawsuit challenging race-conscious admissions at the University of Texas at Austin does not substantially alter the legal landscape for colleges, but it does put them under more pressure to justify such affirmative-action policies than they had been under before.

  • Did the Court Punt? Or Not?

    In the initial flurry of e-mails and Twitter comments about the Supreme Court’s ruling Monday on affirmative action, the metaphor of choice was football. The Supreme Court had punted, the comments said, by sending the case back to a federal appeals court for further review.

    And in some ways, the Supreme Court didn’t appear to be shifting the law, referencing its past rulings as defining its course of action in Fisher v. University of Texas at Austin, in which Abigail Fisher, a white woman rejected for admission by the university, said that her rights had been violated by UT-Austin’s consideration of race and ethnicity in admissions decisions. And it’s certainly true that the decision didn’t have the sort of finality many had expected.

  • Bus company that threatened redditor with lawsuit tries to reopen suits

    Remember the bus company owner who threatened to sue a redditor for libel, sued a customer for complaining about offensive comments made by a driver, and filed over 100 lawsuits against passengers for “liquidated damages” over issues like handing over the wrong printed ticket for a round trip or violating his company’s terms of service?

  • Science

  • Health/Nutrition

    • Growth in crop yields inadequate to feed the world by 2050 – research

      Agriculture productivity not rising fast enough to meet the needs of a rapidly growing population

    • ECO-REVOLUTION: GMO Crops TORCHED in America
    • GM crops won’t help African farmers

      As Esther Bett, a farmer from Eldoret in Kenya, said last week: “It seems that farmers in America can only make a living from GM crops if they have big farms, covering hundreds of hectares, and lots of machinery. But we can feed hundreds of families off the same area of land using our own seed and techniques, and many different crops. Our model is clearly more efficient and productive. Mr Paterson is wrong to pretend that these GM crops will help us at all.”

    • Monsanto Bt Pesticide Damages Red Blood Cells

      Studies are now showing that Monsanto crops damage red blood cells which are responsible for delivering oxygen to the body. And without functioning red blood cells, our bodies are in critical condition — desperate for life support.

  • Defence/Police/Secrecy/Aggression

    • Chicago Police Accused of Using Gun to Sodomize Innocent Man

      A federal lawsuit alleges that Chicago police sodomized a man with a gun until he agreed to become a participant in a drug sting, the Courthouse News Service reports. Plaintiff Angel Perez is suing police officer Jorge Lopez and the city of Chicago for excessive force related to the incident, which, according to the lawsuit, was quite the nightmare.

    • FBI Can Assassinate Anyone They Want To – Rachel Maddow

      Did you know that the FBI can assassinate anyone that they want to; you, me, your kids, grand kids or mine? Rachel Maddow takes on the FBI and provides an impressive butt whipping of a federal agency badly in need of one in this video that comes with a graphic content warning. Will the FBI continue to ‘get away with murder’ or will they remember their PROPER place, along with the rest of this out of control gang of bullies and thugs that calls itself ‘government’, as being SERVANTS to the American people rather than playing God?

    • Tahrir to Taksim: West interferes

      While Arab dictators brutalized mostly peaceful protesters, wars, in the full sense of the word, didn’t actualize until the North Atlantic Treaty Organization (NATO) countries began meddling. In Libya, they guided an uprising with a limited armed component to a full-fledged war that resulted in the death, wounding and disappearance of thousands.

      [...]

      But the response of some European Union leaders to the anti-government protests in Istanbul, Ankara and Izmir in recent weeks was most sobering. Even Prime Minister Tayyip Erdogan’s best efforts are simply not enough to sway Europe from capitalizing on Turkey’s misfortunes. German Chancellor Angela Merkel quickly took a stance to block “moves to open a new chapter in Ankara’s EU membership talks”, Reuters reported on June 20, supposedly because of her concern regarding the Turkish police crackdown on protesters. Of course the chancellor is often forgiving when extreme violence is applied by Israel against Palestinians, since no political capital can be attained from responding otherwise.

    • Lieberman: Israel needs to conquer and thoroughly cleanse Gaza Strip

      Prime Minister Benjamin Netanyahu’s closest political ally has called for Israel to carry out a “thorough cleansing” of the Gaza Strip as a tenuous ceasefire between its Hamas rulers and the Jewish state frayed.

    • Alistair Dawber on Yasser Arafat: After so many years in power, why kill a man at the end of his career?

      “Let’s get rid of him.” Those were the words of the former Israeli defence minister, Shaul Mofaz, speaking to Ariel Sharon during a public conference two and a half years before Yasser Arafat died.

    • A drone strike that killed Pakistan tourism

      When Tehreek-e-Taliban Pakistan’s (TTP) number two in command, Waliur Rehman Mehsud,was killed in a US drone strike in May, many anti-US conspiracy theorists cried foul, citing the attack as an act aimed at ensuring the TTP would refuse the new government’s dialogue overtures. The killing of Waliur Rehman would necessitate acts of vengeance by the TTP that would destabilise the country and throw the Pakistan Muslim League–Nawaz (PML-N) led government off course from day one, they said.

    • Rand Paul demands FBI explain drone ops
    • NYT Public Editor Joins Critics of Hastings Obit
    • Hastings Obituary Did Not Capture His Adversarial Spirit

      An obituary of the journalist Michael Hastings missed an opportunity to convey to Times readers what a distinctive figure he was in American journalism.

      The obituary, which has drawn criticism — most notably in a strongly worded e-mail from Mr. Hastings’ widow, Elise Jordan, to the executive editor, Jill Abramson, and others at The Times, including the public editor’s office — is not factually inaccurate, as far as I can tell.

      But it doesn’t adequately get across the essence of Mr. Hastings’ journalism or the regard in which he was held. And, in the way it presents the Pentagon’s response to his most celebrated article in Rolling Stone, which brought down Gen. Stanley A. McChrystal, the obituary seems to diminish his work’s legitimacy.

  • Cablegate

    • Assange, Back in News, Never Left U.S. Radar
    • Meet the WikiLeaks Guy Who Got His Gmail Seized by the Feds

      Last week, Herbert Snorrason received a “spammy” looking email from Google informing him that the US District Court for the Eastern District of Virginia had requested the contents of his inbox and other data in 2011. The tech company had complied, handing over a vast amount of his personal information.

      Snorrason is a 27-year-old, blue-eyed, bearded Icelandic guy, a self-described anarchist who is finishing up a postgraduate degree at the University of Iceland in international relations. For two months in 2010, he was also a volunteer chat moderator for WikiLeaks, an informal position where he answered user questions and directed people to more knowledgeable staff. The court that requested Snorrason’s info reportedly convened a federal grand jury probe into WikiLeaks founder Julian Assange after the site published sensitive information allegedly provided by Army private Bradley Manning.

    • NYT uses work of journalist covering Manning hearings, refuses to call her a journalist

      Alexa O’Brien, the independent journalist who has been doggedly covering the Bradley Manning case and has been in court every day at Ft. Meade, doing what the New York Times hadn’t—covering the pretrial hearings every day from court— wrote a scathing letter to the Times after they published this piece updating the legal proceedings against Wikileaks and Mannings, but referred to her as “an activist.” The Times article has a lot of new information about the case, and it’s worth reading.

  • Environment/Energy/Wildlife

  • Finance

    • Documents Show Liberals in I.R.S. Dragnet

      The instructions that Internal Revenue Service officials used to look for applicants seeking tax-exempt status with “Tea Party” and “Patriots” in their titles also included groups whose names included the words “Progressive” and “Occupy,” according to I.R.S. documents released Monday.

      The documents appeared to back up contentions by I.R.S. officials and some Democrats that the agency did not intend to single out conservative groups for special scrutiny. Instead, the documents say, officials were trying to use “key word” shortcuts to find overtly political organizations — both liberal and conservative — that were after tax favors by saying they were social welfare organizations.

    • Capitalism, Democracy, and Elections

      Capitalism and real democracy never had much to do with one another. In contrast, formal voting in elections has worked nicely for capitalism. After all, elections have rarely posed, let alone decided, the question of capitalism: whether voters prefer it or an alternative economic system. Capitalists have successfully kept elections focused elsewhere, on non-systemic questions and choices. That success enabled them first to equate democracy with elections and then to celebrate elections in capitalist countries as proof of their democracy. Of course, even elections were and are allowed only outside capitalist enterprises. Democratic elections inside them — where employees are the majority — never happen.

    • Sinopec to buy Angolan oil field for US$1.52 billion
    • UK and China sign three year currency swap to make business in Yuan
    • JP Morgan wants Europe to be rid of social rights, democracy, employee rights and the right to protest

      What J P Morgan is making clear is that ‘socialist’ inclinations must be removed from political structures; localism must be replaced with strong, central, authority; labour rights must be removed, consensus (call it democracy if you will) must cease to be of concern and the right to protest must be curtailed. This is an agenda for hard right, corporatist, centrist government. There’s another word for that, and it’s what the bankers seem to want.

    • This pretty much kills the IRS scandal

      The scandal has been a fiction all along as new documents show the IRS targeted liberal groups as well

    • Exit From the Bond Market Is Turning Into a Stampede
    • California Says the Bitcoin Foundation Is a Money-Transferrer

      The California regulator that oversees the state’s banks, money-transmitters and credit unions thinks the nonprofit organization that advocates for Bitcoin might be in the money-sending business.

      So late last month Paul Crayton, a lawyer with the California Department of Financial Institutions sent the foundation a letter, telling it to “cease and desist from conducting the business of money transmission in this state.” The letter threatens $1,000-per-day fines for non compliance.

    • ICIJ Releases Offshore Leaks Database Revealing Names Behind Secret Companies, Trusts

      When Bernard Madoff built his $65 billion house of cards; when food distributors passed off horsemeat as beef lasagna in Europe; and when Apple, Google and other American companies set up structures to channel their profits through Ireland — they all used tax havens.

      They bought secrecy, minimal or zero taxes and legal insulation, the distinctive products that tax havens market and that allow companies to operate in a fiscal and regulatory vacuum. Using the offshore economy is akin to acquiring your own island where the rules that most citizens follow don’t apply.

      The International Consortium of Investigative Journalists publishes today a database that, for the first time in history, will help begin to strip away this secrecy across 10 offshore jurisdictions.

      The Offshore Leaks Database allows users to search through more than 100,000 secret companies, trusts and funds created in offshore locales such as the British Virgin Islands, Cayman Islands, Cook Islands and Singapore. The Offshore Leaks web app, developed by La Nación newspaper in Costa Rica for ICIJ, displays graphic visualizations of offshore entities and the networks around them, including, when possible, the company’s true owners.

  • PR/AstroTurf/Lobbying

    • Bill Moyers: United States of ALEC — A Viewers Guide

      A new episode of the Moyers and Company television program by the legendary broadcaster Bill Moyers aired on public television stations across the U.S. over the weekend. The program was packed with new material about ALEC’s latest moves and relies heavily upon the research and reporting of CMD’s award-winning “ALEC Exposed” project. The program features interviews with CMD Executive Director Lisa Graves, Deputy Director Mary Bottari and Director of Research Nick Surgey. Madisonians John Nichols of the Nation, U.S. Rep. Mark Pocan and University of Wisconsin professors Joel Rogers and Julie Underwood are also interviewed about the expansive ALEC agenda.

    • David Gregory Doesn’t Understand David Gregory’s Snowden Question

      When Gregory and Todd suggest that Greenwald is not an actual journalist–”someone who claims that he is a journalist,” or someone “involved in the plot”–what they ware really saying is that Glenn Greenwald is not their kind of journalist.

    • ABC Pundits on Snowden: The Center Holds!
    • Russophobia

      Firstly, from our own history and geography, we think of colonies as something reached exclusively by ship. The idea that colonies can be a contiguous land mass with the metropolitan, yet still in effect colonies, is not a pre-received idea for us. Russia’s absorption of the entirely alien cultures of the vast Centre, Siberian belt, North and North-west of Asia was undoubtedly a massive colonial expansion. Working in Central Asia today, for example, political societal and economic developments could only be understood as a post-colonial situation.

  • Privacy

    • U.S. Rebukes China, Russia and Ecuador Over Snowden
    • White House presses Russia to expel Snowden; sharp words for China

      The White House pressed Russia on Monday to exercise all options to expel Edward Snowden and slammed China for allowing the former U.S. spy agency contractor who disclosed government surveillance secrets to leave Hong Kong.

    • Google handed over years of e-mails belonging to WikiLeaks chatroom admin

      Smári McCarthy, in his Twitter bio, describes himself as a “Information freedom activist. Executive Director of IMMI. Pirate.”
      SHARE Conference

      On Friday, two Icelandic activists with previous connections to WikiLeaks announced that they received newly unsealed court orders from Google. Google sent the orders earlier in the week, revealing that the company searched and seized data from their Gmail accounts—likely as a result of a grand jury investigation into the rogue whistleblower group.

      Google was forbidden under American law from disclosing these orders to the men until the court lifted this restriction in early May 2013. (A Google spokesperson referred Ars to its Transparency Report for an explanation of its policies.)

      On June 21, 2013, well-known Irish-Icelandic developer Smári McCarthy published his recently un-sealed court order dating back to July 14, 2011. Google sent him the order, which included McCarthy’s Gmail account metadata, the night before. The government cited the Stored Communications Act (SCA)(specifically a 2703(d) order) as grounds to provide this order.

    • USA must not hunt down whistleblower Edward Snowden

      The US authorities must not prosecute anyone for disclosing information about the government’s human rights violations, Amnesty International said after Edward Snowden was charged under the Espionage Act.

      The organization also believes that the National Security Agency (NSA) whistleblower could be at risk of ill-treatment if extradited to the USA.

      “No one should be charged under any law for disclosing information of human rights violations by the US government. Such disclosures are protected under the rights to information and freedom of expression,” said Widney Brown, Senior Director of International Law and Policy at Amnesty International.

    • Cranking Up the Washington Lie Machine

      Just for the sake of argument, let’s suspend our disbelief for a moment and pretend (I know it’s a stretch) that the Obama administration and the apologists for the nation’s spy apparatus in Congress, Democratic and Republican, are telling us the gods’ honest truth.

      They have, as the Wall Street Journal puts it, “amped up” their defense of the NSA’s massive spying program, claiming that not two, but 50 terrorist plots have been foiled thanks to their metadata mining and their intrusive monitoring of our phone and email conversations and website browsing activity.

    • President Obama: Guarantee due process for Edward Snowden
    • Edward Snowden whereabouts unknown as US presses Russia – as it happened
    • Snowden’s Escape

      Now that Edward Snowden is safely away out of the clutches of the US police state, at least for now, let’s take a moment to contemplate how this one brave man’s principled confrontation with the Orwellian US government has damaged our national security state.

      Firstly, there are the four computers loaded with National Security Agency secrets, which have already exposed the details of how our government is monitoring our entire national communications grid, prying into the details of the telephonic and internet activity of every American citizen. We’ve only begun to learn about the ugly totalitarian activities of our government, and now that Snowden is safe from arrest, we will no doubt learn much more.

    • ‘Who betrayed whom?’ Ecuador considers Snowden’s asylum, dubs persecution ‘paradoxical’

      Has Edward Snowden betrayed people of the world or certain elites in a particular country, asked Ecuador Foreign Minister Ricardo Patino as he confirmed that the whistleblower was in Russia following the asylum bid the South American country.

      Patino said on Monday that human rights principles were the most important consideration in the case of former CIA contractor.

      Ecuador has been in contact with the Russian government over Edward Snowden and has informed Russia that it is considering him asylum appeal, Ecuador’s Foreign Minister said at a press conference in Hanoi on Monday.

    • Kerry calls Snowden ‘traitor’, warns Russia and China of impact on relations

      US Secretary of State John Kerry has said that America is not aware about the intended travel destination of former NSA contractor Edward Snowden but he “would be deeply troubled” if China and Russia knew about the whistleblower’s plans.

    • Pirate Party Norway: – Snowden Passed Through Norway to Iceland

      The party leader Øystein Jakobsen would meet with Snowden when he landed on Sunday evening, according to the party’s twitter account.

      - We have received information from our international umbrella party, the Pirate Parties International (PPI), that he will stop in Norway. The reason is that this is probably the quickest and easiest way to fly to Iceland, says Tale Østrådal from the Pirate Party to TV2 Norway

    • Assange reveals details of ‘Snowden Op’, slams US ‘war on whistleblowers’

      WikiLeaks founder Julian Assange has said that former NSA contractor Edward Snowden was safe and healthy, in a “safe place.” It was also revealed Ecuador supplied Snowden with a refugee document of passage.

      “The current status of Mr Snowden and Harrison is that both are healthy and safe and they are in contact with their legal teams,” the WikiLeaks founder said during a conference call with the media broadcast by RT. “I cannot give further information as to their whereabouts,” Assange added.

    • The Freedom Online Coalition in Tunis: A Call To Governments To Limit Surveillance

      The Freedom Online Coalition (FOC) is a group of governments that have declared themselves “committed to collaborating to advance Internet freedom.” When the coalition first formed in the Hague two years ago, EFF noted the “disconnect … between what these state leaders practice, and what they preach.” Nonetheless, many of the members of the FOC—which has grown since 2011 from 18 to 21 countries—have put their money where their mouths are, donating millions toward technology and other projects promoting online freedom.

    • How can we invest our trust in a government that spies on us?

      ‘If you are a law-abiding citizen of this country, going about your business and your personal life, you have nothing to fear.” That’s how William Hague, the foreign secretary, responded to the revelations of mass surveillance in the US and the UK. Try telling that to Stephen Lawrence’s family.

      Four police officers were deployed to spy on the family and friends of the black teenager murdered by white racists. The Lawrences and the people who supported their fight for justice were law-abiding citizens going about their business. Yet undercover police were used, one of the spies now tells us, to hunt for “disinformation” and “dirt”. Their purpose? “We were trying to stop the campaign in its tracks.”

    • Demonizing Edward Snowden: Which Side Are You On?

      As I write this, a bunch of reporters are flying from Moscow to Havana on an Aeroflot Airbus 330, but Edward Snowden isn’t sitting among them. His whereabouts are unknown. He might still be in the V.I.P. lounge at Sheremetyevo International Airport. He could have left on another plane. There are even suggestions that he has taken shelter in the Ecuadorian Embassy in Moscow.

      What we do know is that, on this side of the Atlantic, efforts are being stepped up to demonize Snowden, and to delegitimize his claim to be a conscientious objector to the huge electronic-spying apparatus operated by the United States and the United Kingdom. “This is an individual who is not acting, in my opinion, with noble intent,” General Keith Alexander, the head of the National Security Agency, told ABC’s “This Week” on Sunday. “What Snowden has revealed has caused irreversible and significant damage to our country and to our allies.” Over on CBS’s “Face the Nation,” Senator Dianne Feinstein, head of the Senate Intelligence Committee, said, “I don’t think this man is a whistle-blower… he could have stayed and faced the music. I don’t think running is a noble thought.”

    • Dear Everyone: Please Don’t Turn Edward Snowden Into Julian Assange

      The irony that exists, of course, is that the United States government has been caught hacking and surveilling those same countries. For Kerry to then turn and accuse them of risking a free internet, which wasn’t even the crux of what Snowden revealed, is hubris so strong it might just power motor vehicles. What Snowden was actually exposing, of course, was the American government’s policy of subversive collection of communications data globally. Sure, you can point to the Chinese and Russian governments and say they don’t have a free and open internet, though I’d caution levying that charge against Hong Kong. Of course you can say that they have similar spying programs in place, too. But this isn’t about China and Russia, it’s about America and what Snowden revealed.

      The lesson here is that Snowden can’t turn into another Assange. The cult of personality is the worst kind of celebrity worship, since it distracts so completely our attention from the actual issues in this case. Focus on what is being revealed, not who is revealing it, I’m begging you.

    • Icelandic Pirate Party statement on asylum for Snowden

      Icelandic Pirate Party MP Birgitta Jónsdóttir has released a statement on the possibility of NSA whistleblower Edward Snowden being granted asylum in Iceland: “Snowden should not come to Iceland unless he will request and be granted citizenship by the Icelandic Parliament. Citizenship is the only legal protection that will shelter him from any demands of extradition to the USA.”

    • Iceland opts out of joining EU

      Iceland has withdrawn its bid to join the European Union, announced its foreign minister Gunnar Bragi Sveinsson.

    • Pelosi booed for defending NSA wiretapping

      “It’s not a balance. It’s not constitutional!” shouted 57-year-old Marc Perkel from Gilroy, Calif., before being escorted out. “No secret laws!”

    • Anger at US Policies Ease’s Snowden’s Escape

      Plenty of Countries Resent US Surveillance

    • US left helpless as Snowden takes flight

      US threats that China and Russia face “consequences” if leaker Edward Snowden evades capture may prove just hot air, experts say, with Washington powerless in a game of cat-and-mouse.

      Left red-faced after Snowden brazenly waltzed out of Hong Kong bound for Moscow at the weekend even after his passport was apparently canceled, US officials have angrily called on Russia to hand him over for trial.

      President Barack Obama said Washington was using every legal channel to apprehend the former technician and the self-confessed source of explosive leaks detailing the extent of covert US phone and Internet surveillance.

      Read more: http://www.smh.com.au/it-pro/security-it/us-left-helpless-as-snowden-takes-flight-20130625-hv0e9.html#ixzz2XD9Ff6C1

    • US & NSA Accused of Criminal Privacy Violations in Dozens of Nations – Snowden Blowback

      The NSA revelations pose an immediate economic problem for US cloud providers on the international market — the big name telecoms. Richard Stiennon, chief research analyst at IT-Harvest, wrote in Forbes that this kind of, “vast foreign and domestic spying & threatens the global competitiveness of U.S. tech companies.”

    • NSA Whistleblower: NSA Spying On – and Blackmailing – Top Government Officials and Military Officers

      We’re agnostic about McGovern’s theory. We don’t know whether Obama is a total corrupt sell-out … or a chicken. We don’t think it matters … as the effect is the same.

    • Original NSA Whistleblower: I Saw The Order To Wiretap Barack Obama In 2004
    • U.S. Surveillance Is Not Aimed at Terrorists

      The debate over the U.S. government’s monitoring of digital communications suggests that Americans are willing to allow it as long as it is genuinely targeted at terrorists. What they fail to realize is that the surveillance systems are best suited for gathering information on law-abiding citizens.

      People concerned with online privacy tend to calm down when told that the government can record their calls or read their e-mail only under special circumstances and with proper court orders. The assumption is that they have nothing to worry about unless they are terrorists or correspond with the wrong people.

    • Scotland Yard spied on critics of police corruption

      Exclusive: undercover officers in Special Demonstration Squad targeted political campaigns against Metropolitan police

    • Australia shelves plans to store phone, Internet metadata

      Australia’s government on Monday shelved plans to force phone and Internet companies to hold two years of phone call and email data following concerns raised by a parliamentary inquiry into telecommunications interception laws.

    • Australia Drops Snooping Plans — For Now
    • GCHQ Revelations Destroy Case for Snooper’s Charter

      So the revelations from Edward Snowden keep on coming, exposing ever-more profound attacks on privacy and democracy in the UK and elsewhere. News that GCHQ is essentially downloading, storing and searching through the entire flow of Internet traffic that comes into and goes out of the UK without any specific warrant to do so is one side of that. That seems to be taking place through an extremely generous interpretation of the out-of-date RIPA law that is supposed to bring some level of accountability to just this sort of thing. The fact that it doesn’t shows that we must reform RIPA and make it fit for the Internet age.

      That should be a priority for the future, but here I want to concentrate on a more pressing threat: the Snooper’s Charter. Despite the fact that it is disproportionate, will create additional risks of private data being misused, and simply won’t work, the usual authoritarians on both the Right and Left of politics are still calling for it to be brought in. But prompted by the leaks about GCHQ’s activities, “sources” have been revealing to The Guardian some interesting facts beyond Snowden’s information that have a direct bearing on the Snooper’s Charter:

    • MSNBC Censors NSA Whistleblower Russ Tice Minutes Before Interview

      “We Don’t Want a Word on Your Allegations Pertaining to NSA Wiretapping of Obama, Judges & Activists”-MSNBC

    • NSA Surveillance Leaks Prompt Legislation
    • Podcast Show #112: NSA Whistleblower Goes on Record -Reveals New Information & Names Culprits!

      In this bombshell episode of the Boiling Frogs Post Podcast Show NSA whistleblower Russ Tice joins us to go on record for the first time with new revelations and the names of official culprits involved in the NSA’s illegal practices. Mr. Tice explains in detail how the National Security Agency targets, sucks-in, stores and analyzes illegally obtained content from the masses in the United States. He contradicts officials and the mainstream media on the status of the NSA’s Utah facility, which is already operating and “On-Line.”

    • Ecuador: ‘Freedom of Expression’ Basis for Snowden Asylum

      Nation’s foreign minister says NSA whistleblower request for safe harbor will be considered thoughtfully

    • Senators Introduce Legislation to Restore Americans’ Privacy, Limit Data Collection

      U.S. Senators Bernie Sanders (I-VT), Mark Udall (D-CO), and Ron Wyden (D-OR) have introduced two pieces of legislation that would limit the ability of federal government intelligence agencies to track and collect data on Americans.

      Sen. Sanders’ bill, the Restore Our Privacy Act (S. 1168), would put limits on records that may be searched by the National Security Agency (NSA) and Federal Bureau of Investigation (FBI) and eliminate open-ended court orders that have resulted in the wholesale data mining recently disclosed by The Guardian and the Washington Post. It would require the government to provide “reasonable suspicion to justify search

    • Two Senators Say the NSA Is Still Feeding Us False Information

      President Obama avows that he welcomes a debate about the NSA, privacy and national security*. Before Edward Snowden’s leak, Americans lacked the information necessary for that debate; Obama would strongly prefer that we were still oblivious to his domestic surveillance activities. Still, national security officials right up to Obama himself continue to give the impression that they’re eager to level with Americans about certain aspects of their behavior, if only to persuade the polity that what’s happening every day isn’t as alarming as we’ve been told.

    • Snowden: NSA hacked China telcos, submarine cable network firm

      Former NSA contractor reportedly provided documents pointing to the U.S. government hacking of major Chinese telcos, Internet submarine cable giant Pacnet, and Chinese research institute Tsinghua University.

    • The NSA Has No Idea How Much Secret Data Edward Snowden Took, And That Has Them Very Worried

      U.S. intelligence agencies still don’t know how much sensitive material former Booz Allen contractor Edward Snowden obtained before leaking top-secret documents and fleeing the country, Mark Hosenball of Reuters reports.

      Snowden was able to cover some of his tracks when he accessed information about the operations of the National Security Agency (NSA) and its British equivalent, Government Communications Headquarters (GCHQ), U.S. officials told Reuters.

    • Senators strike at surveillance laws authorizing NSA’s warrantless data collection

      New bill would shorten the lifespans of FISA and Patriot Act provisions

    • Ex-CIA head Woolsey: US ‘lost leverage’ in Snowden talks

      The US has criticised Russia and China for allowing fugitive former US intelligence contractor Edward Snowden to leave Hong Kong for Moscow.

    • Spy marketing: CIA rolls out ‘new and improved website’
    • Lithuania: Reopen Investigation Into Secret CIA Prisons

      As Lithuania takes over the European Union’s rotating presidency it should lead by example, meet its legal obligations, and reopen its investigation into its own complicity in CIA secret prisons, US enforced disappearances, and alleged torture, Human Rights Watch and the Vilnius-based Human Rights Monitoring Institute said today.

      On July 1, 2013, Lithuania starts its six months as the EU’s rotating presidency, the first Baltic state to hold that post.

    • Netanyahu and Israel’s Threat to Attack Iran. Former CIA Official
    • CIA rolls out ‘sleek’ new website

      The CIA prides itself on secrecy but the spy agency unveiled a revamped website Monday that promises a user-friendly layout and a “sleeker, more modern web experience.”

      Borrowing the jargon of corporate marketing, the Central Intelligence Agency touted its new online look for job-seekers or people interested in the spy service’s origins.

    • Russia Doesn’t Plan to Detain CIA Leaker Snowden
    • Court: Serbian Intelligence Agency must reveal electronic snooping data

      Following a judgement today, the European Court of Human Rights has declared that Serbian intelligence chiefs must reveal data gained through electronic surveillance.

    • Don’t even bother asking governments not to spy on us

      The Government, its members and its security services all share one primary role: to defend the state; and currently defend is synonymous with control.

    • British intelligence is involved in PRISM, says Liberty

      CIVIL RIGHTS GROUP Liberty claims deep relationships exist between the British intelligence services and their US counterparts that indicate PRISM involvement this side of the pond.

      Liberty said it has issued a legal claim against the intelligence services over their “suspected involvement in the PRISM and Project Tempora privacy scandal”.

    • Questions for the UK government

      The Guardian’s revelations about the Tempora programme, including global Internet and telecoms surveillance, leave the UK’s reputation in great danger. Using legal loopholes, and hiding the extent of these programmes from the public eye, the UK has breached the rights of both our own citizens, and those of every country whose citizens’ data has been harvested.

    • Using Tor and other means to hide your location piques NSA’s interest in you
    • Looks Like The Internet Finally Got An Identity Layer
    • The United States Seized Confidential Mail Records Of European Parliament
    • China targets U.S. products, calls them ‘terrible security threat’
    • Cisco China Sales Vulnerable as Media Urge Domestic Shift

      Cisco Systems Inc. (CSCO) faces a backlash in China, where it generates about $2 billion in annual sales, after state-run media said the company poses a security threat and urged a shift toward domestic suppliers.

      While Cisco has said it didn’t participate in U.S. surveillance programs revealed earlier this month by former government contractor Edward Snowden, state-owned Chinese media outlets are calling for the company to face restrictions there.

    • ACLU to Obama: ‘We are tired of living in a nation governed by fear’

      Under President Obama, the United States is “a nation governed by fear,” the American Civil Liberties Union says in an open letter that echoes the criticisms Obama has made of George W. Bush’s national security policies.

      “[W]e say as Americans that we are tired of seeing liberty sacrificed on the altar of security and having a handful of lawmakers decide what we should and should not know,” the ACLU writes in a statement circulated to grassroots supporters and addressed to Obama. “We are tired of living in a nation governed by fear instead of the principles of freedom and liberty that made this nation great.”

    • John Oliver: Snowden exposes the blindness of the all-seeing U.S. government

      The Daily Show host John Oliver on Monday night mocked the failing U.S. efforts to track down and extradite NSA leaker Edward Snowden. Oliver observed that Snowden had ironically exposed the government’s power and its powerlessness. The “all-seeing, all-knowing” government couldn’t “find the front of a human centipede if their mouth was sewn to its ass.”

    • Perfect Forward Secrecy can block the NSA from secure web pages, but no one uses it

      Suppose, for the sake of argument, that you wanted to spy on people using Microsoft’s outlook.com website. First, you would need to capture requests to the site along with the returned web pages. But those pages are encrypted (sent via HTTPS rather than HTTP), so you would also have to break the encryption. Firefox tells us this is “very difficult” and “very unlikely” (see below).

    • Putin says no to US request to extradite Snowden

      Russian President Vladimir Putin bluntly rejected U.S. pleas to extradite National Security Agency leaker Edward Snowden on Tuesday, saying Snowden is free to travel wherever he wants and insisting that Russian security agencies haven’t contacted him.

    • How to stop the NSA listening in
    • China’s state newspaper praises Edward Snowden for ‘tearing off Washington’s sanctimonious mask’

      China’s top state newspaper has praised the fugitive US spy agency contractor Edward Snowden for “tearing off Washington’s sanctimonious mask” and rejected accusations Beijing had facilitated his departure from Hong Kong.

      The strongly worded front-page commentary in the overseas edition of the People’s Daily, the official newspaper of the Chinese Communist party, responded to harsh criticism of China from the US for allowing Snowden to flee.

    • Greenwald: Snowden’s Files Are Out There if “Anything Happens” To Him

      As the U.S. government presses Moscow to extradite former National Security Agency contractor Edward Snowden, America’s most wanted leaker has a plan B. The former NSA systems administrator has already given encoded files containing an archive of the secrets he lifted from his old employer to several people. If anything happens to Snowden, the files will be unlocked.

    • Introducing the NSA-Proof Font
    • Feds Claim Phone Data It Scooped Up Doesn’t Include Location Data, And Also [REDACTED]

      Soon after the NSA leaks came out, we pointed to a murder trial in which the lawyers for one of the defendants used the news that the NSA was collecting so much metadata on all mobile phone calls to seek discovery on the data concerning the defendant’s mobile phone location information, in the belief that it would present evidence that he was nowhere near the crime. The feds had claimed, initially, that when they subpoenaed his phone carrier during the original case, MetroPCS, that the data had already been destroyed. However, the defendant, Terrance Brown, pointed out that according to the leaked information, the NSA was collecting all such data, so the federal government should already have the data. The court seemed intrigued by this argument, and ordered the government to reply with a very short turnaround.

    • Yes, Journalists Should Be Advocates For Shedding Light On Secret Government Powers
    • DOJ Guidelines: Inappropriate To Prosecute Leaking Gov’t Information As ‘Theft Of Gov’t Property’

      Well, this is interesting. Last week, of course, it was revealed that the DOJ has charged Ed Snowden for various crimes, including “theft of government property.” In fact, Rep. Mike Rogers, the head of the House Intelligence Committee, seems to think this is the key charge, and argues (ridiculously) that the documents “belong to the people of the US” and that Snowden somehow “stole” them by giving the documents to those very same “people of the US.”

    • Netflix, Facebook — and the NSA: They’re all in it together

      NSA, Netflix, Facebook and other e-commerce goliaths are collaborating on tools that track us in very intimate ways

    • NSA-proof encryption exists. Why doesn’t anyone use it?

      Computer programmers believe they know how to build cryptographic systems that are impossible for anyone, even the U.S. government, to crack. So why can the NSA read your e-mail?

    • On Prism, partisanship and propaganda

      The Congresswoman is absolutely right: what we have reported thus far is merely “the tip of the iceberg” of what the NSA is doing in spying on Americans and the world. She’s also right that when it comes to NSA spying, “there is significantly more than what is out in the media today”, and that’s exactly what we’re working to rectify.

      But just consider what she’s saying: as a member of Congress, she had no idea how invasive and vast the NSA’s surveillance activities are. Sen. Jon Tester, who is a member of the Homeland Security Committee, said the same thing, telling MSNBC about the disclosures that “I don’t see how that compromises the security of this country whatsoever” and adding: “quite frankly, it helps people like me become aware of a situation that I wasn’t aware of before because I don’t sit on that Intelligence Committee.”

    • Constitution Check: Has the ACLU cleared a big hurdle to challenging secret spying?
    • l Gore: NSA Programs Unconstitutional, ‘Not Really The American Way’

      Former Vice President Al Gore weighed in on the matter of National Security Agency surveillance programs on Friday, calling them a massive illegal undertaking that violate Americans’ constitutional rights.

    • Investigate Booz Allen Hamilton, not Edward Snowden
    • What Did Congress Really Know About NSA Tracking?
    • Encrypted e-mail: How much annoyance will you tolerate to keep the NSA away?

      How to to encrypt e-mail, and why most don’t bother.

    • Secret Surveillance and the Crisis of Legitimacy
    • Rep. Grayson: Let Me Tell The NSA: There Is No Threat To Our Nation When I Call My Mother

      So far, we’ve seen lots of Congressional Representatives falling over each other to attack Ed Snowden and Glenn Greenwald over the NSA surveillance efforts. A few have raised concerns, but if you want to see an elected official say what’s on many of our minds, listen to Rep. Alan Grayson’s speech about the NSA scooping up all phone records.

  • Civil Rights

    • FBI Admits That Obeying The Constitution Just Takes Too Much Time

      Having some amount of oversight, someone in a position to make sure that the data requested is legit would just take too long? It seems like Mueller maybe has been watching too many episodes of 24. First off, it does not take an “awful” long time. Law enforcement has regularly been able to go through legal processes to get a wiretap or subpoena other information very, very rapidly, especially when they make it clear it’s an emergency situation. But the fact is, it’s unlikely that most of these searches are such a timely emergency that they need the data now, and can’t wait an hour or so until an employee at the telco can retrieve it for them.

    • Battle of Indonesia: resisting corporate destruction
    • New research: Global attitudes to privacy online

      Our latest research looks at consumer attitudes towards online privacy, with the findings confounding presumptions that consumers – young or old – do not care about their privacy.

    • Slew of NDAA Amendments Expected on Nukes, Afghanistan, Iran, Drones, Etc.

      Another bipartisan amendment would proposing ending the permanent basing of an Army unit in Germany.

    • US factory boss held hostage by workers in Beijing

      An American executive said he has been held hostage for four days at his medical supply plant in Beijing by scores of workers demanding severance packages like those given to 30 co-workers in a phased-out department.

      Chip Starnes, 42, a co-owner of Coral Springs, Florida-based Specialty Medical Supplies, said local officials had visited the 10-year-old plant on the capital’s outskirts and coerced him into signing agreements Saturday to meet the workers’ demands even though he sought to make clear that the remaining 100 workers weren’t being laid off.

    • Bombshell: Government’s ‘Insider Threat Program’ Obligates Federal Workers to Spy on Their Colleagues

      Once again, the McClatchy company is doing mainstream media’s heavy lifting, exposing the secrets of an increasingly hidden government. In 2003, it was McClatchy alone among the major media groups that questioned the government’s certain claim that Iraq had weapons of mass destruction.

    • Election rigging in Headlands

      Rigging of the elections that are scheduled to be held on 14 August (if the concourt upholds the SADC ruling) is already underway. I was in Mutasa’s constituency last week and met senior war veterans. I had lunch in Headlands Thursday 13 June with a senior war veteran who works with officials in the Registrar General’s office who are taking part in the mobile voter registration exercise that commenced on Monday 10 June 2013.

      The rigging mechanism is very easy. Prior to the commencement of the voter registration exercise, Zanu PF provincial commissariat officials compiled lists of all Zanu PF supporters at cell, ward and district levels, in all rural constituencies. Using the 2008 March harmonized elections statistics, Zanu PF has identified so-called swing constituencies, in which the party either won or lost marginally.

  • Internet/Net Neutrality

    • Do offline legislators deserve the votes of the 250 million net-generation europeans?

      Today, thanks to the Internet, people can organize by the hundreds of thousands – even in the millions – at a cost so low it was unthinkable only two decades. This is fantastic for volunteer efforts, and it has already begun to reshape the world we live, work and play in. But unfortunately, many legislators still seem to regard the Internet as a toy world where laws and rights don’t apply.

  • Intellectual Monopolies

    • Large Corporations Seek U.S.–European ‘Free Trade Agreement’ to Further Global Dominance

      The Transatlantic Trade and Investment Partnership is the latest plan of conglomerates to strengthen their grip over the planet.

    • Rep. Alan Grayson: I’ve Seen The Details And There Is No Reason To Keep TPP Secret

      Rep. Alan Grayson has apparently been allowed to see a copy of the latest text of the Trans Pacific Partnership (TPP) agreement, and he’s mystified about why it’s being negotiated in secret. As we’ve noted in the past, the USTR likes to claim how “transparent” they are because (1) they “listen” to whoever wants to talk and (2) they’ll show things to Congress. Neither of those things are “transparency.” Listening to people is great, but transparency is about information flowing in the other direction, from the government to the public. As for showing things to Congress, we’ve explained how that’s not really accurate. Elected officials in Congress can see the text, but they have to go to the USTR, where they can look at the document, but they’re not allowed to take notes, make copies or bring any staffers (such as experts on trade or any of the issues in the document) with them.

    • Copyrights

      • Warner Bros: Pirates Show Us What Consumers Want

        Major content companies are beginning to acknowledge that “pirates” aren’t necessarily all evil, but actually lead the way to future business models. Movie studio Warner Bros. is among those who are starting to interpret piracy as a marker signal. “We view piracy as a proxy of consumer demand,” Warner Bros. anti-piracy chief David Kaplan notes, adding that the company adjusts its legal offerings to better compete with piracy.

      • MPAA’s Actions, Emails Show That They’re Doing Everything Possible To Screw Over The Blind

        Back in April, we pointed out that the MPAA was working overtime to screw over the blind in the negotiations for a WIPO treaty to make it easier for the blind and those with vision impairment to access works for the blind. They’d already succeeded in screwing over the deaf by getting them excluded from the treaty, despite it initially being for both. Over the past two months, however, the MPAA tried to go on a charm offensive going on and on about how much they really, really liked blind people and wanted to help get a treaty passed, even somehow getting the National Federation for the Blind to throw their own members under the bus by issuing a joint statement claiming to support the treaty.

      • JDownloader Court Ruling Worries Open Source Software Developers

        This week news broke that the popular JDownloader download tool had been declared illegal by a German court. The headline was open for debate since the court only took exception to one particular and long-since removed feature which allowed the downloading of encrypted video streams. However, the ruling has concerned the creators of JDownloader who say that it represents a threat to the development of Open Source Software.

      • SOPA Didn’t Die, It Just Emigrated

        That’s a good summary of the problem with this and similar SOPA-like laws. Those proposing them believe, incorrectly, that it is possible to stop people sharing files online if the measures are harsh enough. At the most, that will simply encourage people to swap files on new sites still under the radar, or to exchange them in person using portable hard drives or high-capacity USBs.

        But the collateral damage is serious: entire sites can be shut down because of one or two infringements, causing large numbers of people to lose access to their personal files; at the same time, startups will struggle with the disproportionate burden of policing their users, and high-tech investments will fall, put off by the unfavorable market conditions. Bringing in these kind of laws certainly won’t get rid of infringing content online, but is likely to impoverish the online landscape in Russia, which is bad for Internet users, bad for Internet companies — and bad for the whole economy there.

      • Prenda Law Claims Its Winding Down Its Operations; Very Angry About Having To Pay Bond

06.24.13

Links 24/6/2013: Cumulus Networks, More GNU/Linux Migrations in Germany, PHP 5.5.0 Released

Posted in News Roundup at 12:21 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Small Brick Open Source PLC

    The OSPLC SMALL BRICK is an open-source PLC (programmable logic controller) that can be programmed using open source C language programming tools.

    The PLC is a general-purpose controller with a wide variety of applications. It is useful to the engineer, technician, student and hobbyist.

  • Open source summer reading list

    Earlier this month, Facebook officially announced its implementation of hashtags, prompting both celebration and outcry from users. But the event also sparked a spate of critical analyses addressing the nature of conversations today, as well as the ways technologies facilitate and organize even the most banal ones. Love them or hate them, hashtags have become an overwhelmingly popular convention for pursuing those recurring questions: What’s going on right now? And how should we make sense of it?

  • Opensource.com summer book Twitter drawing rules

    Enter for your chance to win a book from our summer reading list. Here’s what you need to do:

  • JDownloader Court Ruling Worries Open Source Software Developers

    This week news broke that the popular JDownloader download tool had been declared illegal by a German court. The headline was open for debate since the court only took exception to one particular and long-since removed feature which allowed the downloading of encrypted video streams. However, the ruling has concerned the creators of JDownloader who say that it represents a threat to the development of Open Source Software.

  • Web Browsers

    • Mozilla

      • Firefox 24 for Linux gets native MP3, AAC and H.264 support

        Firefox users who use the Windows 7 or Windows 8 operating system benefit from support for H.264, Mp3 and AAC formats that Mozilla implemented in version 21 of the web browser. Support means that users of the browser on those systems can play audio and video files requiring these formats in the browser without plugins.

      • Launching Maker Party 2013
      • Mozilla checks in with Cookie Clearinghouse for better cookie handling

        The Center for Internet and Society at Stanford Law School has announced a list-based exception platform for managing cookies, called the Cookie Clearinghouse (CCH). Mozilla has committed to work with the CCH Advisory Board to develop the platform.

        Mozilla’s recent attempts to bring in better handling of cookies – in the form of Safari’s third-party cookie block – and reduce the tracking of users ended up in “development hell” a month ago. This was not, though, a result of criticism from advertising groups, but because it was generating too many false positives and false negatives when deciding whether to block cookies from third-party sites.

  • SaaS/Big Data

    • Rackspace, Fidelity: OpenStack Hybrid Cloud Partnership

      The public cloud’s heyday has passed, and enterprises should focus on hybrid cloud investment. So say executives at Rackspace (RAX), the OpenStack-powered cloud hosting vendor. And if deals like the one Rackspace just announced with Fidelity Investments to build an OpenStack cloud is any indication, Rackspace’s vision is on the mark. Here’s the scoop.

  • Databases

    • Oracle Databases: From MySQL to NoSQL Switch?

      Is the NoSQL database trend a threat to Oracle (ORCL)? This is a big week for the company, which announced somewhat disappointing Q4 new software licenses yesterday. While cloud computing and hardware sales are Oracle’s big challenges, you can’t overlook the open source database wars as well. Indeed, Oracle and MySQL faces challenges from smaller NoSQL vendors.

    • MongoDB GUIs that Shine

      MongoDB is a high performance, open source, non-relational NoSQL database written in C++. MongoDB stores structured data as JSON-like documents with dynamic schemas (MongoDB calls the format BSON). This property helps make the integration of data in certain types of applications easier and faster. MongoDB is network accessible, has full index support, query profiling, replication and fail-over support, indexing, auto-sharding for cloud-level scalability, load balancing and more.

    • Oracle Advances Open Source MySQL Clustering
    • TokuMX brings “Fractal Tree indexing” to MongoDB

      Tokutek has announced version 1.0 of TokuMX, a version of MongoDB that has its storage layer replaced with Tokutek’s storage engine. The storage engine, which is available for MySQL and MariaDB, uses the company’s patented Fractal Tree indexing. In developing TokuMX, the developers have also replaced the locking and replication code of MongoDB to get better workload performance as the client count increases. The focus for TokuMX is on large databases of over 50GB, where its indexing technology can bring the most benefit to performance.

  • Oracle/Java/LibreOffice

    • LibreOffice is getting better, even better

      The group responsible for overseeing the development of the LibreOffice free and open source “Office”-style productivity suite of applications has confirmed its latest release.

      The Document Foundation says that 98 bug reports and improvements have been included in LibreOffice 4.0.4, with the 4.1.x (and onward) set of releases due to follow as soon as this July.

  • CMS

    • WordPress 3.5.2 Released – Maintenance and Security Fixes

      WordPress 3.5.2 is now available. This is the second maintenance release of 3.5, fixing 12 bugs. This is a security release for all previous versions and we strongly encourage you to update your sites immediately.

      The WordPress security team resolved seven security issues, and this release also contains some additional security hardening.

    • CMSs mostly vulnerable through addons says German security agency

      Unpatched vulnerabilities not closed by the developers in time or the lack of a crisis communication plan or brute force protection did have the biggest negative impact on the BSI’s overall rating, while a clunky integration into existing management software only brought down the score a little. However, the security experts did not conduct a penetration test for the study.

  • Education

    • How libraries can be a haven for makers

      I work at a public library in the Washington DC-area and often think about what needs to be designed into the space of future public libraries. I was recently visiting the MAKE magazine website when I saw a fascinating how-to video about building your own portable Raspberry Pi game system.

  • Funding

  • FSF/FSFE/GNU/SFLC

  • Project Releases

    • Suricata 1.4.3 released!

      Photo by Eric LeblondThe OISF development team is pleased to announce Suricata 1.4.3. This is a small but important update over the 1.4.2 release, fixing some important bugs.

    • Touch-aware Magnolia 5.0 released

      Version 5.0 of the open source Magnolia CMS has been released after a year and a half spent redeveloping the front end tools that deliver content to the CMS’s users. Talking with The H, Pascal Mangold, CEO of Magnolia, explained that Magnolia 4.5 had seen the redevelopment of the backend of Magnolia to create a foundation for the work that has been delivered in Magnolia 5.0. Magnolia is a Java CMS that is built around the concept of being an enterprise integration platform, connecting users with enterprise systems in an accessible way.

    • Google’s Dart hits beta

      Google has released the first beta version of its scripting language Dart, which it originally unveiled as its alternative to JavaScript in October 2011. Google’s new programming language essentially aims to replace JavaScript – unlike Microsoft’s TypeScript and CoffeeScript, two supersets that add important features to the older scripting language.

    • Build Tool Version 0.6.8 Released
  • Openness/Sharing

    • The most inspiring introduction to Open Science. Ever.

      The video never went viral, probably because it has an unexplained ‘interlude’ after 42 minutes 57 seconds which makes it seem to end at a random point. This bizarre showstopping moment didn’t deter your intrepid iij innovation hunters (it actually resumes after about a minute of serious onscreen weirdness) from recognizing a gem and it certainly shouldn’t stop you watching it

    • Open Access/Content

      • Funders have all the power in OA negotiations. So why aren’t they using it?

        A few days ago I explained why I don’t think “hybrid OA” is a legitimate path to the full-open-access world we all want. The TL;DR is first that it’s offered at stupidly high prices, and secondly that it’s completely impossible to detect or prevent double-dipping because journal subscriptions are the most opaquely priced good in the known universe.

        Then I found that Stuart Shieber had written much the same article but much better four years ago, from the perspective of explaining why the Harvard open-access fund does not cover hybrid fees.

  • Programming

    • 13 Linux Debuggers for C++ Reviewed

      Most time in debuggers is spent doing the same few things: setting breakpoints, stepping through code, looking at variables. Which products make those features supremely accessible and useful? We compare 13 debuggers and find out.

      Have you compared debuggers lately? Until recently, I’d been programming using only one debugger — the one supplied by my compiler vendor. Suddenly, with a new job programming on Linux, I find the range of choices in debuggers is dizzying. Wikipedia lists 18 GUI front ends for GDB alone. This article is the result of my effort to choose a debugger with a good GUI front end for my first UNIX/Linux job in several years.

    • Zend Framework 2.2.1 Released

      The Zend Framework community announced the immediate availability of Zend Framework 2.2.1!

      Packages and installation instructions are available at: http://framework.zend.com/downloads/latest

    • Google’s JavaScript challenger gains better tools, performance

      Like TypeScript, Dart is a language aimed at making it easier to develop large, complex web applications that are efficient, secure, and maintainable. It compiles into JavaScript, so it can run in any modern web browser, but its syntax is designed to ameliorate some of JavaScript’s more glaring flaws.

    • PHP 5.5.0 Released
    • PHP 5.5.0 adds optimizer and drops Windows XP support
  • Standards/Consortia

    • Google’s VP9 web video codec enters home straight

      As planned in May, Google has now finalised the bit stream for VP9, its open video compression format. Chromium has included a beta VP9 decoder for some time and this has now been activated by default according to an entry in the issue tracker reading “Remove VP9 flag, and enable VP9 by default”. VP9 can also be enabled in the developer version of Chromium and Chrome (“Enable VP9 playback in video elements”). Google is planning to incorporate the final version of VP9 into Chrome 29 and enable it by default by 20 August. It is nonetheless likely to be some time before VP9 achieves a critical mass on YouTube – to date VP9 is limited to a few demo videos.

Leftovers

  • Second Life turns 10: what it did wrong, and why it may have its own second life
  • Silvio Berlusconi sentenced to seven years in jail in bunga bunga sex trial
  • Science

    • Black hole mysteries

      Scientists are just getting to know the black holes that help anchor our cosmos

  • Health/Nutrition

    • EU Approves the Use of Laser “Tattoos” on Fruit as Replacement for Sticky Labels

      Sticky fruit labels may soon be things of the past thanks to a new EU ruling that allows grocers and retailers to make laser marks on the skin of citrus fruit, melons and pomegranates. Laser branding, previously banned because of the use of iron oxides and hydroxides, was approved after three years of liaising between the EU and Laser Food – the company behind the technology. The new law will come into effect on June 23rd.

      Read more: EU Approves the Use of Laser “Tattoos” on Fruit as Replacement for Sticky Labels | Inhabitat – Sustainable Design Innovation, Eco Architecture, Green Building

    • When Jeremy Hunt can become health secretary, it’s a sign Britain is sick

      How can one have faith in the democratic process and the ruling elite when such a man is passing judgment as health secretary?

  • Security

    • Kaspersky Secure OS vs China, Iran, North Korea Hackers?

      Kaspersky Lab is developing a cyber secure operating system to combat state-sponsored hackers in China, Iran, North Korea and more. But when will CEO Eugene Kaspersky offer updates?

    • DNS provider’s error caused LinkedIn “hack” and affected 5,000 more

      LinkedIn, the professional networking site which had been reported as hacked or hijacked yesterday, was in fact the victim of human error at the company’s DNS provider, Network Solutions, an error which appears to have affected up to 5,000 domains in all. Network Solutions has said in a blog posting that while trying to resolve a DDoS (Distributed Denial of Service) attack, it accidentally changed the DNS records of a “small number” of customers.

  • Defence/Police/Secrecy/Aggression

    • Report: Stronger Border Led to More Migrant Deaths

      Tucson, Arizona – As immigration reform debates run hot on Capitol Hill, many members of Congress say a more secure border has to be part of any bill they approve. One of those is Arizona Sen. John McCain, one of the “Gang of Eight” of bipartisan lawmakers pushing reform.

    • First State Department Benghazi photos released
    • Latest Brazil protests bring 250,000 on to streets

      More than 250,000 anti-government protesters have again taken to the streets in several Brazilian cities and engaged police in isolated intense conflicts. Demonstrators vowed to stay in the streets until concrete steps are taken to reform the political system.

      Across Brazil protesters gathered to denounce legislation known as PEC 37 that would limit the power of federal prosecutors to investigate crimes. Many fear the laws would hinder attempts to jail corrupt politicians.

    • Turkish police use water cannon to disperse remembrance gathering

      Turkish police used water cannon to disperse thousands who had gathered in Istanbul’s Taksim Square on Saturday to observe a memorial for four people killed during recent anti-government protests. The officers later fired teargas and rubber bullets to scatter demonstrators who regrouped in side streets.

      The police move came as Turkish Prime Minister Recep Tayyip Erdoğan declared that foreign-led conspirators he alleges are behind the anti-government movement in his country also are fomenting the recent unrest in Brazil.

    • Guevara’s ‘betrayer’ tells his story: ‘When I heard Che had died it was like a bullet had hit me’

      He was one of Guevara’s most trusted collaborators, yet he has been framed by some as the man who betrayed him. Now Ciro Bustos tells his story

    • Boy’s death highlights anger some Yemenis feel over U.S. drone strikes

      If an apparent U.S. drone strike this month in the village of Mahashama had killed only its intended targets – an al Qaida chief and some of his men – locals might’ve grumbled about a violation of Yemen’s national sovereignty and gone on with their lives.

      But the strike also killed a 10-year-old named Abdulaziz, the younger brother of the targeted militant, Saleh Hassan Huraydan, according to local tribal leaders and Yemenis with close ties to the al Qaida branch here. And that set off a firestorm of complaints that underscores how American airstrikes can so outrage a community that even though al Qaida loses some foot soldiers, it gains dozens of sympathizers.

    • Ex-CIA chief to Obama: Strike North Korea

      The Obama administration should “seriously consider” a surgical strike to prevent North Korea from developing long-range missiles capable of carrying a nuclear warhead, argued former CIA director James Woolsey.

      In a radio interview Sunday night, Woolsey warned the U.S. is currently wide open and virtually defenseless against a missile coming from a southerly direction, and that both Iran and North Korea made advances toward firing missiles in that direction.

    • Obama’s Secret CIA Hit Squad Detailed in “The Way of the Knife”

      The story behind the development and deployment of this presidential killing corps is told inThe Way of the Knife: The CIA, a Secret Army, and a War at the Ends of the Earth, the latest book by Pulitzer Prize-winning journalist Mark Mazzetti.

    • Jihawg Ammo: Pork-laced Bullets Designed To Send Muslims Straight ‘To Hell’
    • How Barrett Brown shone light on the murky world of security contractors

      Unlike Edward Snowden or Bradley Manning, Brown is not a celebrity. But after helping expose a dirty tricks plot, he faces jail

  • Environment/Energy/Wildlife

  • Finance

    • California sends a cease and desist order to the Bitcoin Foundation

      California’s Department of Financial Institutions has issued a cease and desist letter to the Bitcoin Foundation for “allegedly engaging in the business of money transmission without a license or proper authorization,” according to Forbes. The news comes after Bitcoin held its “Future of Payments” conference in San Jose last month. (The license information is available on CA.gov and Forbes placed the cease and desist letter on Scribd.)

      If found in violation, penalties range from $1,000 to $2,500 per violation per day plus criminal prosecution (which could lead to more fines and possibly imprisonment). Under federal law, it’s also a felony “to engage in the business of money transmission without the appropriate state license or failure to register with the US Treasury Department,” according to Forbes. Penalties under that law could be up to five years in prison and a $250,000 fine.

    • Starbucks pays corporation tax in UK for first time in five years

      Starbucks, one of the companies exhorted by the prime minister to “wake up and smell the coffee” over tax, has handed over £5m to HM Revenue and Customs – its first payment in five years.

      But the cash has only gone some way towards assuaging critics, one of whom complained that companies should not be able to “pick and choose” how much tax they wanted to pay.

      The coffee shop chain said on Sunday it had made the contribution to please its customers and would be paying a second £5m instalment in the last half of the year despite claiming the business overall continued to make a financial loss in Britain.

    • Why Spain And Italy Are Like Cyprus, Slovenia, And Greece

      The “XXXXX is not YYYYY” jokes aside, Europe’s union of nations is beginning to separate increasingly between the haves and the have-nots. The sad truth, as Bloomberg’s Niraj Shah notes, is that recession/depression has pushed Spanish and Italian GDP-per-capita below the EU average in purchasing power terms – just like Cyprus, Slovenia, and Greece. Irish GDP per capita was 29% above the average, while Greek and Portuguese per capita output were 25% below. Output per head for the EU ranged between 47% (Bulgaria) and 271% (Luxembourg) of the average. With today’s news that retroactive ESM recaps are unlikely, the banking-sovereign symbiosis of Spain and Italy will increasingly come under pressure and with productivity so dismal, there is little hope for now.

    • Southeast Asia: The Next Crisis?

      Southeast Asia, so long a byway of the world economy, has become a well-worn path for foreign investors seeking refuge from the continuing after-effects of the global financial crisis. They have come because the region has been surging ahead over the last few years, even as the West slumped, China readjusted and India stuttered.

      As confidence grew in Southeast Asia’s newfound ability to realize its potential, success followed success: Indonesia is on the cusp of becoming the region’s first trillion-dollar economy, and achieved an investment-grade credit rating for the first time in 14 years in late 2011, something the Philippines also attained for the first time ever earlier this year; manufacturing has been booming in Malaysia and Thailand; and the Philippines began to challenge India as the top destination for offshore services, while posting first-quarter GDP growth of 7.8%, Asia’s best performance.

    • Bitcoin Foundation Receives Cease And Desist Order From California

      Directly following last month’s Bitcoin 2013 conference event in San Jose, CA that brought decent revenue into the state, California’s Department of Financial Institutions decided to issue a cease and desist warning to conference organizer Bitcoin Foundation for allegedly engaging in the business of money transmission without a license or proper authorization.

      If found to be in violation of California Financial Code, penalties can be severe ranging from $1,000 to $2,500 per violation per day plus criminal prosecution which could result in fines and/or imprisonment. Additionally, it is a felony violation of federal law to engage in the business of money transmission without the appropriate state license or failure to register with the U.S. Treasury Department. Convictions under the federal statute are punishable by up to 5 years in prison and a $250,000 fine.

    • Bernanke’s stand-off with markets: who will blink first?

      US Federal Reserve Chairman Ben Bernanke is playing a potentially dangerous game of chicken with global financial markets sent reeling by his threat to scale back the central bank’s huge stimulus program.

    • China stocks tumble on credit tightening fears

      Chinese stock markets have fallen sharply as the country’s central bank indicated its credit tightening policy would continue.

      The Shanghai Composite SSE index fell 5.3% to 1,963.24 points, over 1,540 points below its 52-week high.

    • How Austerity Has Failed

      Austerity has failed. It turned a nascent recovery into stagnation. That imposes huge and unnecessary costs, not just in the short run, but also in the long term: the costs of investments unmade, of businesses not started, of skills atrophied, and of hopes destroyed.

    • U.S. Seemingly Unaware of Irony in Accusing Snowden of Spying

      At a press conference to discuss the accusations, an N.S.A. spokesman surprised observers by announcing the spying charges against Mr. Snowden with a totally straight face.

      “These charges send a clear message,” the spokesman said. “In the United States, you can’t spy on people.”

    • 6 Facts About Hunger That Demonstrate the Shameful Excesses of American Capitalism

      Of all the miseries placed on human beings in their everyday lives, the lack of food may be the most inexcusable. Even in a world controlled by unbending attitudes of self-reliance and individual responsibility, the reality of children and seniors and disabled citizens going hungry is a stain on humanity, a shameful testament to the capitalist goal of profit without conscience.

    • Teachers to close schools with strike against cuts

      The strike, which will be followed by regional strikes elsewhere in the UK next term leading to a one-day national stoppage before Christmas if the dispute is not solved, is over government curbs on teachers’ pay, cuts to their pension and changes to their working conditions.

  • PR/AstroTurf/Lobbying

    • Brazil Protests Peaceful, And Not About Bus Fares

      In preparation for FISL (where I hope to be speaking next week), I have been continuing to try to understand the protests in Brazil, which are now regularly bringing crowds the size of a European town onto the streets. They aren’t really about “bus fares” — and as far as I have been told are free of violence by the protesters apart from a statistically insignificant number of them. With so many people on the streets, there are bound to be a few disorderly encounters; to focus on them is try to distract from the real issues.

      The real issues every Brazilian friend I have spoken to cares about relate to a sequence of governments failing to address structural issues and widespread corruption, and even perhaps joining in. The protesters are people just like you and me, who just won’t take it any more and are peacefully but loudly saying so.

  • Privacy

    • Edward Snowden seeks asylum in Ecuador amid diplomatic storm

      The intelligence whistleblower Edward Snowden will on Monday attempt to complete an audacious escape to the relative safety of South America after his departure from Hong Kong escalated already fraught diplomatic relations between the United States and China.

    • NSA leaker Snowden arrives in Moscow en route to ‘third country’ with WikiLeaks help

      The plane carrying whistleblower Edward Snowden has landed at Moscow’s Sheremetyevo airport. The former CIA contractor, who left Hong Kong in a bid to elude US extradition on espionage charges, is on his way to a ‘third country’ via Russia.

    • RT interview re Snowden flying to Russia

      As the news broke that NSA whis­tleblower, Edward Snowden, had fled Hong Kong for Rus­sia today, I was invited on RT to do an inter­view. At that point few people had any idea of his plans. How­ever, it appears that the USA had charged Snowden under the Espi­on­age Act 1917 (no sur­prises) and then asked Hong Kong to arrest and hold him, pending extra­di­tion. Equally unsur­pris­ingly, Hong Kong found mis­takes in the paper­work and used the oppor­tun­ity to com­plain about US spy­ing activ­ity in its territory.

    • WikiLeaks Statement On Edward Snowden’s Exit From Hong Kong

      Mr Edward Snowden, the American whistleblower who exposed evidence of a global surveillance regime conducted by US and UK intelligence agencies, has left Hong Kong legally. He is bound for the Republic of Ecuador via a safe route for the purposes of asylum, and is being escorted by diplomats and legal advisors from WikiLeaks.

      [...]

      “The WikiLeaks legal team and I are interested in preserving Mr Snowden’s rights and protecting him as a person. What is being done to Mr Snowden and to Mr Julian Assange – for making or facilitating disclosures in the public interest – is an assault against the people”.

    • Edward Snowden asks for asylum in Ecuador: live updates

      The NSA whistleblower left Hong Kong on an Aeroflot flight to Moscow, two days after the US charged him with espionage, before applying for asylum in Ecuador

    • Now the Government Knows You’re a Dog

      “On the Internet, nobody knows you’re a dog.” That phrase is ingrained in web culture, stemming from a Peter Steiner comic that was published in a 1993 issue of The New Yorker.

    • Anger mounts after Facebook’s ‘shadow profiles’ leak in bug

      Facebook said Friday it fixed a bug that exposed contact info for over six million accounts. The admission revealed its ‘shadow profile’ data collection activities, and users are furious.

      [...]

      …users behind closed doors, without their consent.

      [...]

      One man commented this afternoon, “I just downloaded the “extended backup” and I’m still viewing emails and phone numbers that are NOT PUBLIC!!!!”

      [...]

      The yearlong gap of exposure as described by Reuters creates a scenario of horrifying possibilities for any woman who has begin to experience harassment, abuse or stalking by an ex within the past year. Or, anyone being maliciously stalked and harassed by a tech-savvy aggressor (or a stalker’s Facebook sock puppet) they may have accidentally friended over the past year.

    • Obama’s ‘Insider Threat’ Program a ‘Sweeping’ Crackdown on Leakers

      A program being implemented by the Obama administration titled “Insider Threat” requires millions of federal employees to keep a close watch on each other—a “sweeping” effort to crackdown on whistleblowers and leakers across the U.S. government, McClatchy reports Friday after obtaining a series of government documents.

    • We can use European law to challenge this spying

      If the law says you can do whatever you like, saying that everything you do is “in accordance with the law” doesn’t mean anything. If “supervision” over state spying is done in secret, by “trusted” cronies appointed by the executive itself, it offers no safeguards either. We need strict legal rules, transparency at least about the law and the basics of practice, and spies who are accountable to parliament and to the general public.

    • Bush’s Foiled NSA Blackmail Scheme

      In early 2003, as the U.S. and British governments were seeking international acquiescence to their aggressive war on Iraq, an unexpected cog throw into the propaganda machine was the disclosure that the National Security Agency was spying on UN Security Council members in search of blackmail material.

      The revelation received little attention in the mainstream U.S. news media, which was almost fully onboard the pro-war bandwagon, but the disclosure received wide international attention and stopped the blackmail scheme. U.S. President George W. Bush and British Prime Minister Tony Blair were forced to abandon a UN resolution and invade Iraq with a ragtag “coalition of the willing.”

    • EXCLUSIVE: Snowden reveals more US cyberspying details
    • Greenwald Tears Into Gregory: With Newsmen Like You, ‘Who Needs Government To Criminalize Reporting?’

      Guardian journalist Glenn Greenwald took Meet The Press host David Gregory head on in an interview Sunday morning, after Gregory asked if Greenwald would be criminally culpable for “aiding and abetting” NSA leaker Edward Snowden.

      “I think it’s pretty extraordinary that anybody who would call themselves a journalist would publicly muse about whether or not other journalists should be charged with felonies,” Greenwald said. “The assumptions in your question, David, is completely without evidence, the idea I’ve aided and abetted him in any way. The scandal that arose in Washington before our stories began was about the fact that the Obama administration is trying to criminalize investigative journalism by going through the e-mails and records of AP reporters, accusing a Fox News journalist of the theory you just embraced, being co-conspirator in felonies for working with sources.”

      “If you want to embrace that theory,” Greenwald continued, “it means that every investigative journalist in the United States who works with their sources, who receives classified information, is a criminal. It’s precisely those theories and precisely that climate that has become so menacing in the United States. It’s why the New Yorker’s Jane Mayer said investigative reporting has come to a standstill, as a result of the questions you just mentioned.”

    • Obama says FBI nominee Comey will balance privacy, security

      In nominating Jim Comey to be the next FBI director on Friday, President Barack Obama said the former Justice Department official will help strike a balance between the need for information on terrorist plots and respecting Americans’ privacy.

    • An Apology to my European IT Team

      As more information comes out on Prism, two criteria consistently show up that we would have consistently triggered oversight…

    • NSA director: Edward Snowden has caused irreversible damage to US

      Keith Alexander defends agency’s broad surveillance as being in line with Americans’ expectations for preventing another 9/11

    • Edward Snowden and the NSA files – timeline
    • Former Facebook security chief is now working for the NSA
    • Support NSA whistleblower Edward Snowden, says Julian Assange

      The WikiLeaks founder, Julian Assange, has called on the world to “step forward and stand with” Edward Snowden, after the NSA whistleblower was charged with espionage by US federal prosecutors.

      According to a statement on the WikiLeaks website, Assange said: “A few weeks ago, Edward Snowden blew the whistle on an ongoing program – involving the Obama administration, the intelligence community and the internet services giants – to spy on everyone in the world. As if by clockwork, he has been charged with espionage by the Obama administration.”

    • Venezuela or Ecuador: where next for NSA whistleblower Edward Snowden?
    • NSA leaks: US and Britain team up on mass surveillance

      Latest revelations from Edward Snowden show that the state risks crossing ever more ethical and legal boundaries

    • NSA Targeted Communications in China and Hong Kong – Snowden

      Earlier, he had said that the British agency, GCHQ, is worse than the NSA when it comes to cyber-snooping on worldwide communications.

    • NSA Now Revealing A Lot More About What It Does Than Snowden Leaks Did; So Is That Harming America?

      One of the key refrains that has come out from those who are unhappy about the revelation of details around the NSA’s surveillance efforts is that Edward Snowden’s leaks are somehow harmful to America. During hearings about all of this, NSA boss Keith Alexander claimed that “Americans will die” because of these sorts of leaks. But… between those same hearings and other revelations from the administration and Congress, we’re actually learning much more about the various programs directly from the government, as information is now being “declassified.” And, apparently, President Obama is asking the NSA and the Justice Department to look into declassifying even more. So while the initial shove to declassify information may have come via Snowden, the stuff that we’re really learning about is coming through revelations following Snowden’s leaks — revelations that never would have happened without his leaks.

    • Snowden’s plane leaves Moscow, NSA leaker not seen aboard

      Ex-CIA contractor, Edward Snowden, has not been seen aboard the plane to Havana on which he would reportedly be traveling, reports RT’s correspondent on the flight. The plane has already departed from Moscow’s Sheremetyevo airport.

    • Edward Snowden due to fly to Cuba in Ecuador asylum bid
    • LinkedIn DNS hijacked, traffic rerouted for an hour, and users’ cookies read in plain text

      According to Berg, that site does not require SSL (secure sockets layer), which means that anyone who visited in the last hour or so sent it their long-lived session cookies in plain text … a potential security risk.

    • To the Guardian – why PRISM? ECHELON has been around since 1948 supported by US, UK, Canada, Australia

      It is not at all clear to me why everyone is so excited about PRISM and the apparently new ability to monitor private communications that the Guardian got all excited about last week. It took me a day or two to remember the name, but I have this piece (below) from 2003 which documents ECHELON which has been around since 1948. PRISM reads like an extension/ subset/ addition to ECHELON.

    • NSA PRISM puts “public” cloud in a new light

      It’s all those other three-letter acronym (TLAs) organizations, such as the FBI, IRS, and SEC, which might have access to my data that I worry about.

    • Snowden receives refugee document of passage from Ecuador
    • Google must delete last of UK Street View data

      The payload data was collected by Google’s Street View cars when driving around the countryside; the software that was mapping out the location of Wi-Fi access points was also recording any data packets it could see which could include fragments of Wi-Fi users’ email, passwords or other personal data. The decision to enforce and prosecute over the payload data came as a result of investigations started when ICO reopened the case in April 2012 after concerns about the engineer’s actions working with the data. This then immediately raised questions about how the search company has handled the data.

    • Why A Special Congressional Committee Must Be Created To Investigate NSA’s Unconstitutional Domestic Spying

      In the past couple of weeks, the NSA has, unsurprisingly, responded with a series of secret briefings to Congress that have left the public in the dark and vulnerable to misstatements and word games. Congress has many options at its disposal, but for true accountability any response must start with a special investigative committee. A coalition of over 100 civil liberties groups agrees. Such a committee is the right way the American people can make informed decisions about the level of transparency and the reform needed.

    • EXCLUSIVE: Snowden sought Booz Allen job to gather evidence on NSA surveillance
    • Rep. Rogers: Snowden’s Secrets ‘Belong To The People Of The US’ & He’s A Traitor For Giving Them What They Own

      Over the past few years, we’ve found that Rep. Mike Rogers, the head of the House Intelligence Committee, has an incredible knack for spewing pure bullshit in defense of whatever he’s supporting, rarely even bothering to make sure his statements are internally consistent. Still, his statements on Meet the Press this weekend take that nonsense to a new high.

    • GCHQ Revelations Destroy Case for Snooper’s Charter

      So the revelations from Edward Snowden keep on coming, exposing ever-more profound attacks on privacy and democracy in the UK and elsewhere. News that GCHQ is essentially downloading, storing and searching through the entire flow of Internet traffic that comes into and goes out of the UK without any specific warrant to do so is one side of that. That seems to be taking place through an extremely generous interpretation of the out-of-date RIPA law that is supposed to bring some level of accountability to just this sort of thing. The fact that it doesn’t shows that we must reform RIPA and make it fit for the Internet age.

  • Civil Rights

    • Civil liberties: Guarding the guards
    • to understand terrorism and threat assessment, look to Aum

      Just as important was what the Japanese government and people did not do. They didn’t panic. They didn’t make sweeping changes to their way of life. They didn’t implement a vast system of domestic surveillance. They didn’t suspend basic civil rights. They didn’t begin to capture, torture, and kill without due process. They didn’t, in other words, allow themselves to be terrorized. Instead, they addressed the threat. They investigated and arrested the cult’s leadership. They tried them in civilian courts and earned convictions through due process. They buried their dead. They mourned. And they moved on. In every sense, it was a rational, adult, mature response to a terrible terrorist act, one that remained largely in keeping with liberal democratic ideals.

    • Stephen Lawrence family and friends targeted by police ‘smear’ campaign

      Exclusive: former undercover officer Peter Francis says superiors wanted him to find ‘dirt’ shortly after 1993 murder

    • Journalist Hastings Sent Out Mysterious Email Hours Before Death
    • Meet The Man In Charge Of America’s Secret Cyber Army (In Which “Bonesaw” Makes A Mockery Of PRISM)

      With his revelations exposing the extent of potential, and actual, pervasive NSA surveillance over the American population, Edward Snowden has done a great service for the public by finally forcing it to answer the question: is having Big Brother peek at every private communication and electronic information, a fair exchange for the alleged benefit of the state’s security. Alas, without further action form a population that appears largely numb and apathetic to disclosures that until recently would have sparked mass protests and toppled presidents, the best we can hope for within a political regime that has hijacked the democratic process, is some intense introspection as to what the concept of “America” truly means.

      However, and more importantly, what Snowden’s revelations have confirmed, is that behind the scenes, America is now actively engaged in a new kind of war: an unprecedented cyber war, where collecting, deciphering, intercepting, and abusing information is the only thing that matters and leads to unprecedented power, and where enemies both foreign and domestic may be targeted without due process based on a lowly analyst’s “whim.”

      It has also put spotlight on the man, who until recently deep in the shadows, has been responsible for building America’s secret, absolutely massive cyber army, and which according to a just released Wired profile is “capable of launching devastating cyberattacks. Now it’s ready to unleash hell.”

    • Obama’s crackdown views leaks as aiding enemies of U.S.

      Even before a former U.S. intelligence contractor exposed the secret collection of Americans’ phone records, the Obama administration was pressing a government-wide crackdown on security threats that requires federal employees to keep closer tabs on their co-workers and exhorts managers to punish those who fail to report their suspicions.

      President Barack Obama’s unprecedented initiative, known as the Insider Threat Program, is sweeping in its reach. It has received scant public attention even though it extends beyond the U.S. national security bureaucracies to most federal departments and agencies nationwide, including the Peace Corps, the Social Security Administration and the Education and Agriculture departments. It emphasizes leaks of classified material, but catchall definitions of “insider threat” give agencies latitude to pursue and penalize a range of other conduct.

    • Time to repeal the Patriot Act, NDAA and abolish DHS

      Many Americans have known for a long time that the IRS is a rogue agency that will readily break the law to accomplish its “mission.”

      A friend of ours tells the story: He got a call from the local police department in the pre-dawn hours of a dark night. The dispatcher told him he needed to go immediately to his business, a heating and air conditioning business. When he arrived he learned that his business had been burglarized. The investigating police wanted him to determine what had been taken. After a couple of hours of searching he could find nothing noticeable missing. Even some cash had been left behind. “Well, you need to get ready for an IRS audit,” the policeman said. Sure enough, a few days later when he arrived at work he found a chain and padlock on his door and a notice from the IRS to contact them.

      In case you’re interested, the audit revealed that he was due a refund. Nobody paid any attention, even the Congressman whom the business man contacted.The result of what happens when government operates in secret—whether it be the Beaufort County Sheriff’s Department and the Washington Police Department or the FBI/CIA, can be seen in the FISA Court. That’s the apparatus set up by the Patriot Act to review government eavesdropping. We now learn that the “Foreign Intelligence Surveillance Act” Court approved 99.97% of the government’s request to snoop, and that many of them were aimed at Americans, within America, not foreigners outside the USA.

    • Who’d try to smear Stephen Lawrence’s family? A Met that’s out of control

      The Met is out of control. The revelation that it sought to smear the Lawrence family in the hunt for Stephen Lawrence’s killers – perhaps to stifle racist aspersions on its detectives – beggars belief. Less surprising is that the operation was unknown to the then police chief, Sir Paul Condon, to the home secretary and to the Macpherson inquiry. It is merely further evidence of the Met’s gift for malpractice and skulduggery.

    • Global protest grows as citizens lose faith in politics and the state

      The myriad protests from Istanbul to São Paulo have one thing in common – growing dissent among the young, educated and better-off protesting against the very system that once enriched them. And therein lies the danger for governments

  • Intellectual Monopolies

06.23.13

Links 23/6/2013: Russian-Based OpenMandriva Goes Alpha, Snowden in Russia

Posted in News Roundup at 11:25 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • New and amazing features of Linux

    The Linux operating system has been around since the beginning of the first computers and the first operating systems. Since its first formation in the form of a small operating system running on the command line interface it has been constantly evolving into a much more powerful and robust operating system capable of sustaining heavy workload and performing multiple tasks at once.

  • Uruguay Fights For GNU/Linux

    Uruguay is a small country, only 3 million people. That explains the fluctuations on the graph but the trend and substance is clear. According to Statcounter Uruguayans are using GNU/Linux regularly and in great numbers. That almost certainly means government, business and consumers have ready access.

  • Linux on Film: Dredd (2012)

    One of the elements that made the original RoboCop (1987) so good was seeing Alex Murphy deal out some major butt-kicking in spite of the losing battle he was facing against the city, politicians and his makers. And Dredd (2012) serves this very experience ala carte. I don’t think the reboot of Robocop can come close to the sheer audacity of Dredd. Dredd is a straightforward no-nonsense cop-thriller set in the future. Judge Dredd is presented as he should be – a dedicated, incorruptible cop with a powerful firearm.

  • When it comes to a new networking OS, Linux is the Linux of networking

    How is networking like farming? JR Rivers, the co-founder and CEO of Cumulus Networks, which launched earlier today, tried to use our evolution from a hunter-gatherer society to today’s food acquisition environment to explain how technological advances that speed up distribution and make distribution or product manufacturing cheaper change societies.

  • Why Every GNU/Linux User Should Support Tesla Motors
  • Desktop

    • Could Google Deliver a Chrome OS-based Tiny Stick PC?

      While the Raspberry Pi has grabbed many headlines as a tiny, ultra-inexpensive, pocketable computer that runs various open source operating systems, it’s actually only one of many tiny LInux computers being touted as part of a new “Linux punk ethic.” As we’ve noted, there are various pocket-size Android devices selling online for under $100 (see the photo).

  • Audiocasts/Shows

  • Kernel Space

    • Hardware, Past, Present, and Future.

      Here’s some thoughts about some hardware I was going to use, hardware I use daily, and hardware I’ll probably use someday in the future.

    • The People Who Support Linux: 19-Year-Old Aims to be a Kernel Developer
    • Linux Foundation sees broadening role for developers

      Linux developers were once just that, developers. But their role is changing says the Linux Foundation, which is expanding its training options to help them.

      The foundation, an industry supported non-profit, has added two courses to its program, OpenStack Cloud Architecture and Deployment and Linux Enterprise Automation.

    • Linux-3.9.7

      I don’t need to have the latest and greatest from the bleeding edge of FLOSS but I do like the polish being put on the Linux kernel…

    • Graphics Stack

      • NVIDIA Driver Soon Likely To Support EGL, Mir

        With NVIDIA entering the GPU IP licensing business, the need to support EGL by their binary display driver — and with that the Ubuntu Mir display server and Wayland — has become more pressing.

        While there hasn’t been any official communication out of NVIDIA yet, it’s likely that their binary display driver will soon be bearing EGL support to complement their GLX windowing system support. The EGL interface is for sitting between OpenGL and the windowing system. EGL is used by Google’s Android operating system for mobile devices. Beyond that, both the Mir Display Server and Wayland/Weston are using EGL rather than the GLX windowing system API.

      • Oracle To Work On Mesa Driver For VirtualBox
    • Benchmarks

      • Ubuntu 13.10 Performance On Intel Core i7 “Haswell”

        The many Intel Haswell Linux benchmarks delivered on Phoronix this month have been from updated Ubuntu 13.04 configurations. However, if you’re curious about what the performance is like when upgrading to an Ubuntu 13.10 “Saucy Salamander” daily development snapshot, here are some benchmarks.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • Getting started on KDEPIM

        Or so they say. We developers are used to high-resolution screens but many users use netbooks with 1024×600 screens (the horror!). Unfortunately, KMail configuration dialog did not fit in such a small rectangle, so I massaged the various configuration pages to reduce the minimum necessary size for the dialog. The minimum size for the dialog is now 780×567 pixels on my machine (you may get different results depending on widget style and fonts).

    • GNOME Desktop/GTK

      • Gnome Shell 3.9.3 Release

        We are less than 100 days away from the official GS 3.10 release and another little step towards another amazing major release has been made yesterday with the release of 3.9.3. This new version brings some tweaks and fixes, while also porting to new technologies like the bluez 5.

      • Every Detail Matters is Open for Business

        Everyone’s favourite UX polish extravaganza is back for another round. For the next months we will be targeting a host of bugs that will add polish and finesse to the GNOME 3 user experience.

        This is the third time that I’ve run Every Detail Matters. Over the last two rounds, the initiative has gone from strength to strength. A total of 82 bugs have been fixed so far, and the GNOME 3 user experience has been massively improved as a result of everyone’s contributions.

  • Distributions

    • Fedora vs OpenSuse vs Gentoo vs Ubuntu vs OSX vs Windows

      Lets start with the honest truth right out of the blocks, there isn’t a best OS, there isn’t a worst OS, there is only preference and the right tool for the job you want it to do.

      [...]

      We are bound by our choices, find it hard to change them unless we have a reason to, but can do if the pain level is righ. There is no such thing as the perfect OS, only the right tool for us and the job we want them to perform. We find excuses, reasons to justify out choices however most to the time they are just that, sometimes they are based on experience, most of the time on FUD. Forcing an OS on someone is never going to work, and suggesting one might seem like a great idea, but usually ends in disaster.

    • Pisi Linux Beta: A Real-life Test

      I waited eagerly for the beta release of Pisi Linux. As soon as it was out, I downloaded it and installed it into a partition my ZaReason’s Alto 4330 had.

      The installation took about 25 minutes. Once it was over, I noticed a few bugs. For example, Pisi’s Grub 2 installed into the MBR, not into the partition I chose. Well, that’s not a show stopper to me. Besides, Pisi’s Grub is very well designed. Anyway, I booted my brand new Linux kitten to see what it looked like and what it was capable of.

      Those who used old-school Pardus will feel familiar with Pisi. Kaptan greets you and lets you choose your first-time settings. Yes, it was great to see Kaptan again!

    • AntiX 13.1 Will Resurrect Your Old Computer

      AntiX, a fast, lightweight and easy-to-install Linux Live CD distribution based on Debian Testing and MEPIS, for Intel-AMD x86 compatible systems, is now at version 13.1.

    • New Releases

    • Screenshots

    • PCLinuxOS/Mageia/Mandrake/Mandriva Family

    • Gentoo Family

    • Red Hat Family

      • Red Hat CEO: Expect Better Economy in 2013

        Red Hat (RHT), the largest provider of open-source software, noted that the IT spending environment isn’t as strong as everyone would like it to be. However, it’s not getting worse, either.

        In an interview with TheStreet, CEO Jim Whitehurst noted that it’s a “tough IT environment” right now, but nothing has fundamentally changed for Red Hat. “It’s a little bit of a slower IT environment right now, and projects are a little slower. Nothing has fundamentally changed about the business, though.”

      • Red Hat OpenStack: No Revenues This Year, But…

        Red Hat OpenStack will generate zero revenues, billings and bookings this year. Does that make the open source cloud platform a failure? Absolutely not. Here’s why Red Hat (RHT) partners need to pay attention.

      • Fedora

        • A Week With Fedora: End Of The Line

          So I’ve been working with Fedora for over a week now, and I have to say that it’s been fun. I haven’t hit any major issues that are deal breakers for me. I’ve fully personalised Fedora’s Gnome Shell desktop environment, and I’m really happy. However, I think it’s time to go back to Ubuntu,and here’s why…

    • Debian Family

      • Derivatives

        • Canonical/Ubuntu

          • Ubuntu community donation plans detailed

            Ubuntu Community Council member Elizabeth Krumbach and Community Manager Jono Bacon have detailed Canonical’s plans to distribute community-oriented donations from the donations page on the Ubuntu web site. After Canonical implemented a page asking for donations from users who download the Linux distribution, the company faced criticism for not making it sufficiently clear exactly how the money collected under the “community participation”, “better coordination with Debian and upstreams” and “better support for flavours” sliders would be used. Bacon promised to deliver a plan to make the process more transparent and accountability more clear and this plan has now been delivered and has been approved by the Community Council.

          • Ubuntu 13.04 Raring Ringtail review – best Linux OS shows why Unity interface was made

            With the Unity design aesthetic allied to a speedy and robust engine, Ubuntu 13.04 Raring Ringtail may just be the one Linux OS to rule them all. Read our Ubuntu 13.04 Raring Ringtail review to find out why.

          • Canonical denies move towards open core

            Canonical, the company behind the Ubuntu GNU/Linux distribution, has reiterated its decision not to create a firm based on open core products.

          • First steps with a brand new Ubuntu virtual machine
          • Mir’s GPLv3 License Is Now Raising Concerns

            Taking a break from blogging about UEFI and Secure Boot, Linux kernel developer Matthew Garrett is now writing about how Canonical’s choice of license for their Mir Display Server is a bit scary. It’s not the GPLv3 license alone that’s raising eyebrows, but the GPLv3 combined with the Ubuntu Contributor’s License Agreement that is unfortunate in the mobile space.

            Basically, Matthew explains how Canonical is trying to push Ubuntu (in the form of Ubuntu Phone/Touch) into markets generally hostile towards the GPLv3 licensem since the license requires users be able to replace the GPLv3 code. Android and other open-source mobile platforms tend to be under a more liberal license that keeps open-source enthusiasts happy along with mobile phone vendors.

  • Devices/Embedded

    • Tiny ARM CPU module targets embedded Linux apps

      DAVE announced an SODIMM-style computer-on-module based on a Texas Instruments Sitara AM335x ARM Cortex-A8 system-on-chip, complete with dual CAN interfaces, Linux support, and two evaluation baseboard options. The Diva computer module is also available from U.S.-based Smart Embedded Systems, with turnkey support including Linux drivers and firmware for the processor’s programmable real-time unit (PRU).

    • Phones

      • Android

        • Android smartwatch is loaded with wireless

          A Chinese startup called “Geak” (seriousy!) has developed an Android 4.1 smartwatch with built in WiFi, Bluetooth 4.0, NFC, and GPS wireless communications. The China-targeted Geak Watch runs on a 1GHz MIPS architecture SoC equipped with 512MB RAM and 4GB flash, and features a 1.55-inch 240 x 240-pixel touchscreen and IPX3 water resistance.

        • Boxfish Hatches a Hot Idea for Searchable TV

Free Software/Open Source

  • Download Hosts Withdrawing

    With news this week that GitHub is banning storage of any file over 100Mb and discouraging files larger than 50Mb, their retreat from offering download services is complete. It’s not a surprising trend; dealing with downloads is unrewarding and costly. Not only is there a big risk of bad actors using download services to conceal malware downloads for their badware activities, but additionally anyone offering downloads is duty-bound to police them at the behest of the music and movie industries or be treated as a target of their paranoid attacks. Policing for both of these — for malware and for DMCA violations — is a costly exercise.

  • What it Takes to be an Open Source Expert

    OSFY speaks to industry leaders to bring you their thoughts on this hot topic…

  • Is that really the source code for this software?

    I’ve been looking into how easy it is to confirm that a binary package corresponds to a source package. It turns out that it is not easy at all. So I’ve written down my findings in this blog entry.
    I think that the topic of reproducible builds is one that is of fundamental importance to the free software and larger community; the trustworthiness of binaries based on source code is a topic quite neglected. We know about tivoization and the reality that code can be open yet unchangeable. What is not appreciated in sufficient measure is that parties can, quite unchecked, distribute binaries that do not correspond to the alleged source code.

  • State of OpenIndiana

    When Oracle announced it was discontinuing the development of OpenSolaris, there was shock among the free Unix community. OpenSolaris was popular and had a very loyal user-base and good support from developers, internal and community. A fork of OpenSolaris was quickly announced. A fork of the kernel would become what is known as Illumos. And the operating system would become OpenIndiana, which would use the Illumos kernel.

  • GlobalSign Pushes SSL for Open Source
  • Open-Source Off-Road Simulator Called Rigs of Rods Shows the Power of Free Software

    Scroll down and watch the selection of videos…

  • Cyber experts suggest using open source software to protect privacy

    One enterprising netizen has compiled a list of services, from social networks to email clients, and even web browsers, that offer better protection from surveillance. They are listed on a web page called prism-break.org.

    When asked about steps that a digital native can take to protect his privacy and online data, Sunil Abraham, executive director of Bangalore-based non-profit Center for Internet and Society said, “Stop using proprietary software, shift to free/open source software for your operating system and applications on your computer and phone. Android is not sufficiently free; shift to CyanogenMod. Encrypt all sensitive Internet traffic and email using software like TOR and GNU Privacy Guard. Use community based infrastructure such as Open Street Maps and Wikipedia. Opt for alternatives to mainstream services. For example, replace Google Search with DuckDuckGo.”

  • This week in open source news: 3D-printed hands, smart light bulbs, and more
  • 13 Things People Hate about Your Open Source Docs

    Most open source developers like to think about the quality of the software they build, but the quality of the documentation is often forgotten. Nobody talks about how great a project’s docs are, and yet documentation has a direct impact on your project’s success. Without good documentation, people either do not use your project, or they do not enjoy using it. Happy users are the ones who spread the news about your project – which they do only after they understand how it works, which they learn from the software’s documentation.

  • Small Brick Open Source PLC

    The OSPLC SMALL BRICK is an open-source PLC (programmable logic controller) that can be programmed using open source C language programming tools.

    The PLC is a general-purpose controller with a wide variety of applications. It is useful to the engineer, technician, student and hobbyist.

    All the source files for the small brick OSPLC are provided, including schematic diagrams so that you can build this project yourself or modify it.

  • Web Browsers

    • Mozilla

      • Firefox Web browser to move ahead plan to block tracking

        The maker of the popular Firefox browser is moving ahead with plans to block the most common forms of Internet tracking, allowing hundreds of millions of users to eventually limit who watches their movements across the Web, company officials said Wednesday.

        Firefox’s developers made the decision despite intense resistance from advertising groups, which have argued that tracking is essential to delivering well-targeted, lucrative ads that pay for many popular Internet services.

      • Mozilla again postpones Firefox third-party cookie-blocking, this time for months

        Decision to use blocking blacklists and whitelists means another delay in adding auto-blocking to browser

      • Mozilla Joins Forces with Stanford Group on Privacy Scheme

        If you’re like nearly everybody else, you get annoyed by how advertising cookies in your browser seem to know what your interests are and serve up creepy ads that hit a little too close to home. With that problem in mind, Mozilla has been steadily working toward standardizing Do Not Track features in the Firefix browser. The idea is not welcome to everyone, though. The Internet Advertising Bureau (IAB) has accused Mozilla of “undermining American small business” with the move.

  • SaaS/Big Data

    • Netflix open sources its Hadoop manager for AWS

      Netflix runs a lot of Hadoop jobs on the Amazon Web Services cloud computing platform, and on Friday the video-streaming leader open sourced its software to make running those jobs as easy as possible. Called Genie, it’s a RESTful API that makes it easy for developers to launch new MapReduce, Hive and Pig jobs and to monitor longer-running jobs on transient cloud resources.

    • What is OpenStack and what is its role in open source cloud computing?

      In an effort to commoditize the world of open source cloud computing, Red Hat is throwing their weight behind OpenStack in the same way they threw their weight behind Linux over a dozen years ago.

    • City of Chicago Joins Open Cloud Consortium

      Who says you have to be a vendor or a channel partner to get involved in industry associations driving the adoption of cloud computing? If there’s an unwritten rule somewhere, nobody bothered to tell the City of Chicago, which announced this week it had joined the Open Cloud Consortium (OCC).

      The OCC is a not-for-profit organization that manages and operates cloud computing infrastructure to support Big Data for scientific, medical, healthcare and environmental research. That’s quite the huge mandate, and the organization’s membership is made up of a variety of corporations (most in the technology sector in some way), universities, U.S. national laboratories and federal agencies, as well as international partners.

    • Fidelity Likes OpenStack, Despite High-Profile Departures

      In a major missive from Dell Computer recently, the company announced that its public cloud ecosystem and strategy will be centered on partners Joyent, ScaleMatrix and ZeroLag, and will emphasize recent acquisition Enstratius. That represented a very major reversal of its plans to deliver public cloud services based on the open source OpenStack cloud platform. Right on the heels of that news, IBM–which has been firmly in the OpenStack camp–announced that it is spending billions to buy SoftLayer for its cloud computing infrastructure tools and services.These were high level departures from the OpenStack camp, although IBM is still pursuing OpenStack cloud plans by pass-through, since SoftLayer delivers OpenStack services.

  • Databases

    • Comic Relief uses open cloud big data on MongoDB

      Comic Relief has confirmed its use of 10gen’s open source non-relational NoSQL database, MongoDB, to create a computing for this year’s event which raised £75 million.

      The charity enlisted cloud services firm Armakuni to build the platform so that it could handle 10,000 concurrent call centre operators and a peak of 500 donations per second.

  • Oracle/Java/LibreOffice

  • CMS

  • Business

  • BSD

  • FSF/FSFE/GNU/SFLC

    • Free Software alternatives to help you outwit PRISM

      Just because your activities are being monitored by the powers that be does not mean that you should throw up your arms in the air and give up. Yes, complete privacy is almost impossible to achieve in the age of bits and bytes, but there are things you can do to minimize how much of your privacy you give up.

      Mostly, it comes down to the tools you employ to navigate this interconnected universe of ours. The most popular tools are owned by major technology companies, the same outfits that give government agencies free, warrantless access to your data.

    • GNU Parallel 20130622 (‘Snowden’) released

      GNU Parallel 20130622 (‘Snowden’) has been released. It is available for download at: http://ftp.gnu.org/gnu/parallel/

  • Openness/Sharing

    • Open-Source Solution for Temperature Monitoring

      Here’s a nice example of the DIY spirit at work. A former Portland, OR, restaurant owner was looking for a way to better monitor food storage temperatures (which had to be regularly checked and written in a notebook). There didn’t seem to be a good automated system available, so he built his own, using open-source hardware to develop a unit that can monitor temperature, humidity and barometric pressure of a given location, then transmit the data via the Internet and a Wi-Fi network.

    • Open Hardware

      • Open Source Robots Are on the Move This Month

        Open source robots are back in the news. In late May, we reported on the Arduino Robot (shown) — which puts much of the intelligence in the open hardware Arduino kit on wheels and includes an interface for creating custom robots. The Arduino Robot’s Motor Board controls motors, and the Control Board reads sensors and helps to operate. Each of the boards is a full Arduino board using the Arduino IDE. Now, there are robots arriving based on the open platform that you can control with swipes from your smartphone.

  • Programming

    • System Manageability

      The greatest need for improving the manageability of Linux systems is to provide a standard programming interface – an API – for system management functions.

      The API should be a low-level interface that provides the needed control over managed systems. It should also support a higher level abstraction, making it easy for system administrators to use it for routine tasks.

    • Open Source PHP 5.5 Released with Opscode Caching

      One of the biggest open source PHP releases in years is now out and you can count me among those that are excited and eager to deploy and use it.

    • Open Source Foundations in a Post-GitHub World
  • Standards/Consortia

    • Xiph unveils “next-next-generation” video codec

      The Xiph.Org Foundation has taken the wraps off Daala, a “next-next-generation” video codec that has been under development for some time; this was until recently overshadowed by development work on the Opus audio codec at Xiph. However, the developers at the foundation think that the right time has come to open up development of the codec to a wider audience, even though they still classify the software as “pre-pre-alpha”. According to Xiph, a prototype of the codec successfully encoded and decoded a video stream over the internet at the end of May.

Leftovers

  • English is no longer the language of the web
  • Colombia to Seal Agreement with NATO in Brussels

    Defense Minister Juan Carlos Pinzón will travel Sunday to Belgium where he is scheduled to sign Tuesday its first cooperation agreement with the North Atlantic Treaty Organization.

    According to El Tiempo newspaper, the two-page document will be signed by Pinzon and NATO Secretary General Anders Fogh Rasmussen, and will be broadened with a second chapter in the next two months.

  • No Traction For Windows On Arm
  • Windows RT facing pressure from being isolated

    Microsoft’s Windows RT operating system may fall to the same fate as Hewlett-Packard’s (HP) webOS as most brand vendors have already stopped developing related products, leaving Microsoft’s second-generation Surface RT, the only Windows RT-based device in the next-generation tablet competition, according to sources from the upstream supply chain.

  • Science

    • 3-D printed trachea splint saves baby’s life

      A Michigan baby’s life was saved by the insertion of a 3-D printed trachea at two months old.

    • How 3D printing will rebuild reality

      When Star Trek debuted in the mid-60s, everybody geeked out about the food synthesizers. Even my mom, a reluctant but compulsory Trek viewer, recognized the utility of this amazing gadget, particularly with two ravenous boys around the house. My brother and I knew, of course, that the real magic food box was the refrigerator.

    • Bacterial DNA in Human Genomes

      A team of scientists from the University of Maryland School of Medicine has found the strongest evidence yet that bacteria occasionally transfer their genes into human genomes, finding bacterial DNA sequences in about a third of healthy human genomes and in a far greater percentage of cancer cells. The results, published today (20 June) in PLOS Computational Biology, suggest that gene transfer from bacteria to humans is not only possible, but also somehow linked to over-proliferation: either cancer cells are prone to these intrusions or the incoming bacterial genes help to kick-start the transformation from healthy cells into cancerous ones.

  • Health/Nutrition

    • The Frankenfood Conspiracy: Secret summit where slick lobbyists for bio-tech giants seduced Tory Ministers into changing their tune on GM food

      Even by the standards of an industry that claims to be able to end hunger, prevent environmental catastrophe and bring prosperity to the developing world, it must have felt like a breathtakingly audacious move.

      Last summer, the world’s biggest biotech corporations decided the time was right to convince the Government to allow so-called Frankenstein food to be grown in its fields.

    • Breastfeeding figures fall as NHS budget is cut

      The number of new mothers attempting to breastfeed has fallen in England for the first time in almost a decade.

      New figures suggest that 5,700 fewer women initiated breastfeeding with their child in 2012-13 than the year before. It is the first recorded fall since the Department of Health began collecting and releasing the statistics in 2004.

    • U.S. Approves a Label for Meat From Animals Fed a Diet Free of Gene-Modified Products

      The Agriculture Department has approved a label for meat and liquid egg products that includes a claim about the absence of genetically engineered products.

      It is the first time that the department, which regulates meat and poultry processing, has approved a non-G.M.O. label claim, which attests that meat certified by the Non-GMO Project came from animals that never ate feed containing genetically engineered ingredients like corn, soy and alfalfa.

    • The upcoming EU-US and EU-Canada trade deals have serious implications for the NHS

      After the government pushed through its widely opposed privatisation regulations it is time now to focus on the big trade deals and look to the G8 meeting in June. There is a reason the public are being told nothing about them – because they won’t like what they hear.

  • Defence/Police/Secrecy/Aggression

    • LA Times Reports Hastings Was Going Into Hiding Before His Death
    • Authorities, Media Dismiss Michael Hastings Assassination Claims

      Authorities and media outlets have predictably moved to dismiss claims that Rolling Stone journalist Michael Hastings – who complained of being under investigation by the FBI before his death in a fiery car crash on Tuesday – was murdered as a result of foul play, despite the vehicle’s engine being found 100 feet away from the scene of the blaze.

      [...]

      Following his role in bringing down Gen. Stanley A. McChrystal, Hastings was told by a McChrystal staffer, “We’ll hunt you down and kill you if we don’t like what you write.” The Rolling Stone journalist also “had the Central Intelligence Agency in his sights” and was set to release an article exposing the agency, according to L.A. Weekly.

      Despite the fact that investigating whether or not a journalist who had made a number of enemies at the very top of the power structure could have been the target of an assassination is a perfectly legitimate question, news outlets have characterized such inquiry as being insensitive and crass.

    • The U.S. Policy Coup Explained by 4-Star General Wesley Clark

      General Wesley Clark, on the talk circuit in 2007, explained how the U.S. military planned to destroy the governments of seven countries in five years and enumerates them in this YouTube video.

    • Native Americans prepare to defend homelands, walk across America

      Native Americans focused on defending their homelands and upholding the Rights of Nature during June, as they prepared for non-violent resistance to the threats of the tarsands pipeline, uranium mining and coal-fired power plants.

    • Ruins of Maya City Discovered in Remote Jungle
    • From Afghanistan, Thank You Bradley Manning!

      Recognition that 95 million human beings were killed in World War I and II has helped the people of the world understand that the method of war is not cost-effective. An awakened world hoped the United Nations could, as determined in the UN Charter, eventually ‘save succeeding generations from the scourge of war’.

      The scourge of war in Afghanistan continues, with the United Nations reporting that more than 3,000 Afghan civilians have been killed and wounded in the first five months of this year, a fifth of whom were Afghan children. So, ordinary people should seize opportunities to tell the truth about war.

  • Cablegate

  • Environment/Energy/Wildlife

    • Worst Hanford tank may be leaking into soil

      The first ever double-shell tank to have leaked at Hanford may be in far worse condition than anyone imagined. Hanford workers conducting routine maintenance on the tank, known as AY-102, Thursday were shocked to find readings of radioactivity from material outside the tank. Until now leaked nuclear sludge had only been detected in what’s known as the tank’s annulus — the hollow safety space between the tank’s two walls.

    • Goodbye, Miami

      By century’s end, rising sea levels will turn the nation’s urban fantasyland into an American Atlantis. But long before the city is completely underwater, chaos will begin

  • Finance

    • The Last Mystery of the Financial Crisis

      It’s long been suspected that ratings agencies like Moody’s and Standard & Poor’s helped trigger the meltdown. A new trove of embarrassing documents shows how they did it

    • Bank of Spain calls for elimination of the minimum wage

      The Bank of Spain has called for the elimination of the minimum wage, more flexibility in the labour market and other attacks on the working class.

      Its annual report states, “The seriousness of the labour market advises maintaining and intensifying reform momentum through the adoption of additional measures to promote job creation in the short term and facilitate wage flexibility.”

  • PR/AstroTurf/Lobbying

    • The BBC Business Unit and the public interest

      The BBC’s reporting of issues from NHS reform, welfare reform and the looming EU US trade deal can be better understood by looking at the BBC’s Business Unit. A narrow and questionable ‘business perspective’ drives more coverage than viewers may think.

  • Privacy

    • When in doubt, NSA searches information on Americans

      According to newly revealed secret documents, the NSA retains wide discretion over targeting individuals for surveillance – including, potentially, Americans. Civil libertarians say ‘it confirms our worst fears.’

    • Arrest of N.S.A. Leaker Seen as Easier Than Transfer to U.S.

      The request from the United States that Hong Kong detain Edward J. Snowden, who has been accused of stealing government secrets, before it seeks his return to America is likely to set off a tangled and protracted fight, with Mr. Snowden and his legal advisers having multiple tools to delay or thwart his being surrendered to American officials.

    • The other hacking scandal: Suppressed report reveals that law firms, telecoms giants and insurance companies routinely hire criminals to steal rivals’ information

      Some of Britain’s most respected industries routinely employ criminals to hack, blag and steal personal information on business rivals and members of the public, according to a secret report leaked to The Independent.

      The Serious Organised Crime Agency (Soca) knew six years ago that law firms, telecoms giants and insurance were hiring private investigators to break the law and further their commercial interests, the report reveals, yet the agency did next to nothing to disrupt the unlawful trade.

      [...]

      Victims of computer hacking identified by Soca – who suffered eBlaster Trojan attacks which allowed private investigators to monitor their computer usage remotely – include the former British Army intelligence officer Ian Hurst. He was hacked by private investigators working for News of the World journalists who wanted to locate Freddie Scappaticci, a member of the IRA who worked as a double-agent codenamed “Stakeknife”.

    • Sheeple Waking Up To NSA Spying: Privacy Search Engines Booming

      StartPage and Ixquick, two strongly privacy oriented search engines owned by the same company, announced recently that they surpassed three million daily searches for the first time.

      According to information Startpage provided to Infowars, traffic to the Search Engine has grown from 2.8 million daily searches to now approaching 4 million.

    • Does NSA Surveillance Remind You of Anything?
    • GCHQ monitoring described as a ‘catastrophe’ by German politicians

      Britain’s European partners have described reports of Britain’s surveillance of international electronic communications as a catastrophe and will seek urgent clarification from London.

      Sabine Leutheusser-Schnarrenberger, the German justice minister said the report in the Guardian read like the plot of a film.

      “If these accusations are correct, this would be a catastrophe,” Leutheusser-Schnarrenberger said in a statement to Reuters. “The accusations against Great Britain sound like a Hollywood nightmare. The European institutions should seek straight away to clarify the situation.”

      Britain’s Tempora project enables it to intercept and store immense volumes of British and international communications for 30 days.

    • If you think GCHQ spying revelations don’t matter, it’s time to think again

      So is it a Milly Dowler moment? Will the revelation that GCHQ taps every internet communication that enters or leaves the UK mark the moment when ordinary citizens stop and say: “Oh, now I get it.” A moment when people realise that the stuff that nerds and activists had been droning on about might actually affect them?

      My hunch is that it isn’t such a moment. Most people will just shrug their shoulders and get on with life. They will accept the assurances of those in authority and move on. If they do, then they will have missed something important. It is that our democracies have indeed reached a pivotal point. Ever since it first became clear that the internet was going to become the nervous system of the planet, the 64 billion dollar question was whether it would be “captured” by giant corporations or by governments. Now we know the answer: it’s “both”.

    • MI5 feared GCHQ went ‘too far’ over phone and internet monitoring

      Senior figures inside British intelligence have been alarmed by GCHQ’s secret decision to tap into transatlantic cables in order to engage in the bulk interception of phone calls and internet traffic.

      According to one source who has been directly involved in GCHQ operations, concerns were expressed when the project was being discussed internally in 2008: “We felt we were starting to overstep the mark with some of it. People from MI5 were complaining that they were going too far from a civil liberties perspective … We all had reservations about it, because we all thought: ‘If this was used against us, we wouldn’t stand a chance’.”

    • Nancy Pelosi Booed, Heckled Over Edward Snowden, NSA Comments At Netroots Nation 2013
    • Pelosi Faces Questions, Criticism about NSA Surveillance at Netroots Nation

      At the Netroots Nation conference this weekend, Representative Nancy Pelosi (D-CA) was questioned publicly about her stance on NSA spying. While she was quick to defend the program as markedly different from the warrantless wiretapping program established under President Bush, she also noted that more needed to be done to improve transparency around the program.

      Pelosi’s comments were met with skepticism and disapproval from at least some members of the audience. Marc Perkel, a small business owner and technology activist, interrupted Pelosi when she was talking about finding a balance between security and civil liberties. According to Politico, Marc Perkel yelled, “It’s not a balance. It’s not constitutional!…No secret laws!”

    • EXCLUSIVE: US spies on Chinese mobile phone companies, steals SMS data: Edward Snowden
    • GCHQ intercepted foreign politicians’ communications at G20 summits
    • Skynet rising: Google acquires 512-qubit quantum computer; NSA surveillance to be turned over to AI machines
    • EXCLUSIVE: US hacked Pacnet, Asia Pacific fibre-optic network operator, in 2009
    • Facebook Bug Exposed 6 Million Users
    • Facebook Says Technical Flaw Exposed 6 Million Users

      Facebook has inadvertently exposed six million users’ phone numbers and e-mail addresses to unauthorized viewers over the last year, the company said late Friday.

    • Snowden spy row grows as US is accused of hacking China

      Edward Snowden, the former CIA technician who blew the whistle on global surveillance operations, has opened a new front against the US authorities, claiming they hacked into Chinese mobile phone companies to access millions of private text messages.

      His latest claims came as US officials, who have filed criminal charges against him, warned Hong Kong to comply with an extradition request or risk complicating diplomatic relations after some of the territory’s politicians called for Snowden to be protected.

      The latest developments will raise fears that the US’s action may have pushed Snowden into the hands of the Chinese, triggering what could be a tense and prolonged diplomatic and legal wrangle between the world’s two leading superpowers.

    • U.S. seeks Snowden’s extradition, urges Hong Kong to act quickly

      The United States said on Saturday it wants Hong Kong to extradite Edward Snowden and urged it to act quickly, paving the way for what could be a lengthy legal battle to prosecute the former National Security Agency contractor on espionage charges.

    • For Spiegel, Tempora is front page news. Apart from The Guardian the British press stays silent.

      Clearly a crashing ferry that injured no-one, and some high society wedding are more important than a programme which, if proven, would be equivalent to PRISM and conducted by the UK.

      A D-Notice has been issued to the press (see Guido Fawkes here) to not report on the leaks in this case, but when one newspaper is still leaking, surely a point has to come that others should report and debate it too?

    • GCHQ and security services ‘need parliamentary oversight’

      Labour’s Douglas Alexander says widespread surveillance allegations need to be addressed by intelligence agencies

    • House Committee Conducts Lovefest With NSA Chief

      The Kansas City man is Khalid Ouazzani, who, as part of a plea bargain in 2010, admitted that he sent money to Al Qaeda. He was never charged with planning any attacks inside the United States, and the NYSE bombing was described as “nascent plotting,” so it’s hard to know just how serious this was. Still, at least Ouazzani actually did something. The San Diego man merely planned to send money.

    • Web’s Reach Binds N.S.A. and Silicon Valley Leaders

      When Max Kelly, the chief security officer for Facebook, left the social media company in 2010, he did not go to Google, Twitter or a similar Silicon Valley concern. Instead the man who was responsible for protecting the personal information of Facebook’s more than one billion users from outside attacks went to work for another giant institution that manages and analyzes large pools of data: the National Security Agency.

      [...]

      The disclosure of the spy agency’s program called Prism, which is said to collect the e-mails and other Web activity of foreigners using major Internet companies like Google, Yahoo and Facebook, has prompted the companies to deny that the agency has direct access to their computers, even as they acknowledge complying with secret N.S.A. court orders for specific data.

    • Petition To Preemptively Pardon Ed Snowden Reaches Goal Of 100k Signatures

      The Whitehouse petition to pre-emptively pardon NSA whistleblower Edward Snowden for “crimes he may have committed while blowing the whistle” has reached its goal of 100,000 signatures. This means that the U.S. Administration, by its own rules, need to take it seriously enough to craft a response to it. While that response is unlikely to be anything else than “we politely disagree and intend to impolitely hunt this man down”, it is still an important signal of dissent.

    • Communications Surveillance, Protest and Control…

      What is the real reason that certain of the authorities are so keen on universal surveillance of communications data? Is it the fight against terrorism? It doesn’t seem very likely. It’s a supremely ineffective method of dealing with terrorism at best – even the examples quoted by the security services as ‘proof’ that it works have pretty much all been swiftly debunked (see for example here). In practice, it seems, targeted, intelligence-driven, almost ‘traditional’ methods seem to do the job far better. So why do the authorities all around the globe seem to be so enthusiastic about communications surveillance? One word: control

    • Whistleblower Edward Snowden Lands In Moscow
    • Edward Snowden leaves Hong Kong for Moscow
    • Spy-leaker Snowden leaves Hong Kong
    • Edward Snowden leaves Hong Kong on Moscow flight

      US intelligence fugitive Edward Snowden has flown out of Hong Kong, from where the US was seeking his extradition on charges of espionage.

    • Bill Clinton on NSA: Americans need to be on guard for abuses of power by US
    • Liberal activists show irritation with Obama over surveillance
    • Pelosi booed for saying NSA leaker Snowden violated the law

      House Minority Leader Nancy Pelosi (D-Calif.) was booed onstage Saturday when she said former government contractor Edward Snowden broke the law by leaking classified documents on National Security Agency (NSA) surveillance programs.

      Speaking at the NetRoots Nation conference in San Jose, Calif., Pelosi told the audience to reject comparisons between President Barack Obama and his predecessor, President George W. Bush, on their oversight of surveillance programs. The top House Democrat said Obama is poised to reveal “in another few days, a few more proceedings” of the secret Foreign Intelligence Surveillance Court.

    • 5 Fun Facts From the Latest NSA Leak

      After a brief respite, the Guardian newspaper has resumed its publication of leaked NSA documents. The latest round provides a look at the secret rules the government follows for collecting data on U.S. persons.

  • Civil Rights

    • US steps up efforts to break Guantánamo hunger strike

      Shaker Aamer, last British resident held in camp, tells of harsh regime to break strikers’ resistance

    • Autonomy: an idea whose time has come
    • Million Protesters Demonstrate In 100 Brazilian Cities

      More than a million protesters have taken to the streets in Brazil as demonstrations over a range of social issues grow. Demonstrating people flooded into Rio de Janeiro and more than 100 cities. Violence and clashes erupted in many places and an 18-year-youth died when a car drove through a barricade in Sao Paulo state. This is the largest protests in the country in more than two decades.

      Government announcement to lower transport fares and promises of better public services failed to stem the tide of discontent in the country.

    • Candidate Obama Debating President Obama On Civil Liberties vs. Government Surveillance

      We recently had a video showing then Senator Joe Biden, from seven years ago, “debating” the current President Obama on government surveillance. I hadn’t seen this until now, but someone else has put together a much better video showing Presidential candidate Obama in 2008 vs. President Obama in 2013.

06.22.13

Links 22/6/2013: Linux Caixa Mágica 20, Syria Proxy War Brewing

Posted in News Roundup at 8:24 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • 23 Pictures That Prove Society Is Doomed
  • Health/Nutrition

    • Follow the money: Monsanto and the World Food Prize

      Although genetic engineering has been widely adopted in a few major crops—mainly soybeans, corn, cotton and canola—only two general types of engineered genes, for resistance to herbicides and for killing certain insects, have been widely commercially successful after 30 years of trying.

      These have provided some benefits, such as a reduction of chemical insecticide use on some of these crops, and some relatively small yield increases. Most of the yield increases for small farmers are from cotton, a low value crop, which is unlikely to pull these farmers out of poverty.

      At the same time, in the countries that have used these technologies the longest, big problems are emerging. Weeds resistant to the herbicide used on Monsanto’s crops have reached epidemic proportions in the U.S., reportedly infesting about 60 million acres and increasing rapidly. This has increased herbicide use by hundreds of millions of pounds above where it probably would have been had these crops not existed.

      And now insects resistant to Bt are emerging around the world. I was at the University of Illinois recently, where I heard a respected corn entomologist bemoaning the intention of corn farmers toreturn to the use of chemical insecticides to control rootworms that have developed resistance to Monsanto’s Bt gene for controlling that important pest.

    • Genetically engineered sugar beets destroyed in southern Oregon
    • Chipotle Is The First U.S. Fast Food Chain To Identify Products With GMO Ingredients

      Sure, you probably know the basic ingredients in your fast food lunch — chicken or beef, lettuce and tomato, whathaveyou — after all, you’re the one who ordered it. But if you, like many consumers, care whether or not those ingredients include genetically modified organisms (GMOs), the ingredient list usually is no help. Chipotle announced that it will now mark those ingredients on its website for discerning consumers.

  • Defence/Police/Secrecy/Aggression

    • What Cop T-Shirts Tell Us About Police Culture

      Earlier this week, an anonymous public defender sent Gothamist this photo of an NYPD warrant squad officer wearing a t-shirt with a pretty disturbing quote from Ernest Hemingway

    • Noam Chomsky: Obama Is ‘Running Biggest Terrorist Operation That Exists’

      June 21, 2013 “Information Clearing House – Continuing his streak of fiercely criticizing President Obama’s foreign policy and civil liberties record, pre-eminent left-wing scholar Noam Chomsky told GRITtv that this administration is “dedicated to increasing terrorism” throughout the world via its own “terrorist” drone strikes in foreign lands.

    • CIA secretly providing training for Syrian rebels
    • CIA Training Syria Rebels: Report
    • REPORT: The CIA Has Been Secretly Training Syrian Rebels For Months
    • CIA and the US military operatives train rebels in Turkey and Jordan – report

      The CIA and US special operational troops and have been secretly training Syrian rebels at bases in Jordan and Turkey since November 2012. Up to 100 from all over Syria have gone through courses in the last month alone, according to US media reports.

    • CIA secretly providing training for Syrian rebels: Report

      The CIA and US special operations forces have been training Syrian rebels for months, since long before President Barack Obama announced plans to arm the opposition, the Los Angeles Times has reported.

    • US Leaves 700 troops in Jordan as CIA Trained Militants Fighting in Syria

      US President Barack Obama said the United States left around 700 combat-ready troops in Jordan after a training exercise in the country.

    • US special forces and CIA training Syrian rebels – Report

      The CIA and US special forces have been secretly training Syrian rebels since last year at bases in Jordan and Turkey, the Los Angeles Times reported Friday.

    • Unwinding “Unwitting”

      For around fifteen years, this arrangement “worked.” Those who knew about it accepted it—sometimes queasily, more often eagerly. It made them feel important, adventurous, grown up. It meant that they weren’t just playing in a student-government sandbox. Anyway, promoting liberal-democratic ideas among Third World students, opposing Communist and Soviet influence, and helping anti-apartheid student groups in South Africa did not present problems of conscience. Moreover, while the C.I.A. money was earmarked for overseas activities, it freed up funds derived from other sources to be used for the N.S.A.’s domestic purposes, which included campaigning for academic freedom, demanding the abolition of the House Un-American Activities Committee, and supporting the civil-rights movement. (For example, the N.S.A. helped found the Student Nonviolent Coordinating Committee and provided it with crucial political and financial assistance.) For these reasons, it’s too simple, and not truly correct, to dismiss the N.S.A. as nothing but a C.I.A. front. It was better than that. But it was deeply compromised. The secrecy and deception inherent in the arrangement amounted to a kind of moral corruption.

    • Iran: Sixty Years After The 1953 CIA Coup That Toppled Democracy

      The election of a moderate new president in Iran, Hassan Rouhani, who has promised to enact reforms, including the release of political prisoners, comes almost exactly 60 years after a cataclysmic episode that continues to define geopolitical relations in the Middle East and profoundly influence the image of the United States in the region.

    • CIA head paid a visit to Moscow secretly – sources

      CIA Director John Brennan paid an unannounced visit to Moscow on Wednesday and Thursday, sources told Interfax on Friday.

      Russian Foreign Intelligence Service declined to confirm or deny that Brennan had been to Moscow, but senior Kremlin aide Yury Ushakov told reporters in mid-May that “a contact with the director of CIA is being planned.”

    • Libertarians Claim James Gandolfini Killed By CIA

      In the wake of The Sopranos star James Gandolfini’s sudden death,libertarians everywhere are saying the actor was assassinated by the Central Intelligence Agency.

    • CIA deputy director, Cuyahoga Falls native retires
  • Cablegate

    • Edward Snowden Asylum: Olafur Vignir Sigurvinsson Readies Private Plane To Iceland

      An Icelandic businessman linked to WikiLeaks said he has readied a private plane to take Edward Snowden, the former National Security Agency contractor who exposed secret U.S. surveillance programmes, to Iceland if the government grants him asylum.

      “We have made everything ready at our end now we only have to wait for confirmation from the (Icelandic) Interior Ministry,” Olafur Vignir Sigurvinsson told Reuters. He is a director of DataCell, a company which processed payments for WikiLeaks.

    • Julian Assange Emerges As Central Figure In Bradley Manning Trial

      Bradley Manning is at the defense table. Casting a long shadow over his trial, however, is the figure of someone else the government would apparently like to put on trial: Julian Assange.

      On Tuesday, government prosecutors sparred with defense lawyers for Manning, the Army private first class who has admitted to leaking a massive cache of documents to the transparency organization that Assange founded. At issue was whether the judge should accept as evidence two WikiLeaks tweets and a crowdsourced document called “The Most Wanted Leaks of 2009.”

    • In WikiLeaks Probe, Feds Used a Secret Search Warrant to Get Volunteer’s Gmail

      The Justice Department used a secret search warrant to obtain the entire contents of a Gmail account used by a former WikiLeaks volunteer in Iceland, according to court records released to the volunteer this week.

      The search warrant was issued under seal on October 14, 2011 by the Alexandria, Virginia federal judge overseeing the WikiLeaks grand jury investigation there. The warrant ordered Google to turn over “the contents of all e-mails associated with the account, including stored or preserved copies of e-mails sent to and from the account, draft e-mails, deleted e-mails [...] the source and destination addresses associated with each e-mail, the date and time at which each e-mail was sent, and the size and length of each e-mail.” The warrant also ordered Google not to disclose the search to anyone.

  • Environment/Energy/Wildlife

    • Houston to buy half its power from renewable sources

      The city of Houston has agreed to purchase half its electricity from renewable sources.

      That will make Houston the largest municipal purchaser of renewable energy in the nation, according to the city, which cited estimates from the Environmental Protection Agency.

      “Houston is already known as the energy capital of the world, but we are committed to becoming the alternative energy capital of the world as well,” Mayor Annise Parker said in a written statement Thursday.

    • Billionaire U.S. activist kicks off campaign to turn Obama against Keystone

      Billionaire anti-Keystone XL activist Tom Steyer wants to rally legions of digital-savvy Obama supporters to persuade the President that Canadian oil sands crude poses a threat to the United States.

      The wealthy Californian upped the ante Thursday in the high-stakes political showdown over Keystone XL by launching a social media campaign aimed at re-awakening the fervent hordes of mostly, young Obama supporters.

    • During Record Drought, Frackers Outcompete Farmers for Water Supplies

      The impacts of 2013′s severe drought are apparent across the nation in forests, on farms and on once snowy peaks. Meanwhile, the oil and gas industry is demanding unprecedented amounts of water for hydraulic fracturing, better known as fracking.

  • Finance

    • No admission of guilt. No denial. No justice.

      Financial adviser Chauncey Mayfield allegedly stole $3.1 million from the pension funds of Detroit police officers and firefighters so he could buy shopping centers in California, according to the Securities and Exchange Commission.

      Did he do it? Who knows? Mayfield and several of his associates settled the case last week without admitting or denying guilt. All they had to do to make the SEC go away was agree to give the money back.

    • Ex-Enron CEO Jeff Skilling to leave prison early

      U.S. District Judge Sim Lake of the Southern District of Texas announced at a hearing in Houston today that Skilling will serve 14 years. His original conviction called for him to serve 24 years in connection with the collapse of the once high-flying energy trading firm. Under the agreement with federal prosecutors, Skilling could be released as early as 2017.

    • Bless the Borrowers

      Robert Kuttner’s title refers, first, to the “medieval institution” that was the fate of improvident souls in England who could not repay their debts, including Daniel Defoe. In 1692, Defoe was committed to King’s Bench Prison in London, where he began to agitate for a change in the legal system. Forcing debtors to rot, Defoe not disinterestedly pointed out, was injurious to both parties, since “after a debtor was confined in prison both he and the creditor lost through his prolonged distress.” Society responded, eventually, with bankruptcy laws, but it is very much Kuttner’s point in “Debtors’ Prison” that we — America and Europe in the age of the financial crisis — have yet to absorb the principal lesson of Defoe’s “bitter experience.”

  • Privacy

    • The Dragnet at the Edge of Forever

      Amidst the havoc surrounding the earth-shattering revelations being made about the massive catch-all surveillance being conducted by the US government against virtually everybody with an Internet connection, a set of relatively unremarkable letters arrived in our GMail inboxes on Tuesday evening, containing a series of attachments.

      These attachments were scanned court orders, sealed and later unsealed, issued to Google by the United States District Court for the eastern district of Virginia. These orders demanded that Google hand over to the United States (yes, they were that specific), various information relating to accounts we hold with Google, including whom we communicated with, when, from where, and for how long.

      The court orders were almost certainly related to the Grand Jury investigation of the unauthorized public disclosure of information showing considerable misconduct, including a number of probable cases of war crimes, by US military forces in Iraq and Afghanistan during their wars in these countries, a list of people being held without trial or legal recourse in Guantanamo Bay, and a trove of diplomatic cables detailing the ways the US government have conducted themselves – both good and bad – over many years.

    • Mastering the internet: how GCHQ set out to spy on the world wide web

      Project Tempora – the evolution of a secret programme to capture vast amounts of web and phone data

    • GCHQ taps fibre-optic cables for secret access to world’s communications

      Exclusive: British spy agency collects and stores vast quantities of global email messages, Facebook posts, internet histories and calls, and shares them with NSA, latest documents from Edward Snowden reveal

    • NSA: If Your Data Is Encrypted, You Might Be Evil, So We’ll Keep It Until We’re Sure

      There’s been plenty of commentary concerning the latest NSA leak concerning its FISA court-approved “rules” for when it can keep data, and when it needs to delete it. As many of you pointed out in the comments to that piece — and many others are now exploring — the rules seem to clearly say that if your data is encrypted, the NSA can keep it. Specifically, the minimization procedures say that the NSA has to destroy the communication it receives once it’s determined as domestic unless they can demonstrate a few facts about it.

    • U.S. charges Snowden with espionage
    • Ex-Contractor Is Charged in Leaks on N.S.A. Surveillance

      Edward J. Snowden, the former National Security Agency contractor whose leak of agency documents has set off a national debate over the proper limits of government surveillance, has been charged with violating the Espionage Act and stealing government property for disclosing classified information to The Guardian and The Washington Post, the Justice Department said on Friday.

    • Latest NSA Leak Shows How Obama Misled Public on Surveillance of Americans

      Last week, President Obama claimed in an interview that the National Security Agency could not listen to Americans’ phone calls or read their emails. But newly revealed secret government documents—the latest in the series of high-profile leaks about classified surveillance—outline how the NSA can sweep up and store Americans’ communications.

      The documents, published by the Guardian late Thursday, are signed by Attorney General Eric Holder and stamped with the date July 29, 2009. They were submitted to the secret Foreign Intelligence Surveillance Court and outline the so-called “minimization procedures” the NSA is supposed to follow to limit any “incidental” spying it does on the communications of Americans or permanent U.S. residents. The disclosure sheds light on highly significant surveillance procedures the government has until now managed to keep beyond public scrutiny.

    • Wired/John Hodgman animated series about NSA spooks

      Wired’s kicked off a new animated webcomedy starring John Hodgman as a crusty old NSA agent and Nicole Winters as his young protege. It’s pretty promising stuff!

    • Reassured by NSA’s Internal Procedures? Don’t Be. They Still Don’t Tell the Whole Story.

      Yesterday, the Guardian released two previously-classified documents describing the internal “minimization” and “targeting” procedures used by the NSA to conduct surveillance under Section 702. These procedures are approved by the Foreign Intelligence Surveillance Court (FISC) on an annual basis and are supposed to serve as the bulwark between the NSA’s vast surveillance capabilities and the private communications of Americans. As we noted earlier today, the procedures, themselves, aren’t reassuring: far too much discretion is retained by NSA analysts, the procedures frequently resolve doubt in favor of collection, and information is obtained that could otherwise never be obtained without a warrant.

    • The NSA Can Hold Onto Americans’ Communications for Years, Leaked Docs Say
    • Evil in a Haystack
    • WikiLeaks plane ‘ready’ to bring Snowden to Iceland
    • U.K. Spy Agency Secretly Taps Over 200 Fiber-Optic Cables, Shares Data With the NSA

      The British spy agency GCHQ has secretly tapped more than 200 fiber-optic cables carrying phone and internet traffic and has been sharing data with the U.S. National Security Agency, according to a news report.

    • Facebook Accidentally Exposed Contact Info for Six Million Users

      According to a post on Facebook’s security blog, a bug in the company’s friend recommendation system exposed the contact information of some six million users to others. The bug has been present for about a year, but the company only found out about it in the last 24 hours. The affected users will be notified by email. The company says there’s no evidence the bug was exploited maliciously.

    • Ellsberg Says: Put A Stop To Indiscriminate Spying On Americans

      To Daniel Ellsberg, the well-known whistleblower and lifelong advocate for freedom who leaked the “Pentagon Papers” 40 years ago, “there has not been in American history a more important leak than Edward Snowden’s release of NSA material.”

    • Timeline of NSA Domestic Spying
    • Russ Tice, Bush-Era Whistleblower, Claims NSA Ordered Wiretap Of Barack Obama In 2004

      Russ Tice, a former intelligence analyst who in 2005 blew the whistle on what he alleged was massive unconstitutional domestic spying across multiple agencies, claimed Wednesday that the NSA had ordered wiretaps on phones connected to then-Senate candidate Barack Obama in 2004.

      Speaking on “The Boiling Frogs Show,” Tice claimed the intelligence community had ordered surveillance on a wide range of groups and individuals, including high-ranking military officials, lawmakers and diplomats.

    • Mastering the Internet and GCHQ

      Nick Pickles, director of Big Brother Watch, said: “This appears to be dangerously close to, if not exactly, the centralised database of all our internet communications, including some content, that successive Governments have ruled out and Parliament has never legislated for.

      “Britain has a clear legal process in place to govern the interception of the content of communications and blanket interception is not a part of that system. If GCHQ have been intercepting huge numbers of innocent people’s communications as part of a massive sweeping exercise then I struggle to see how that squares with a process that requires a warrant for each individual intercept. This question must be urgently be addressed in Parliament.

      “The fact GCHQ staff have been discussing how light the UK’s oversight regime is compared to the US highlights why we need a wholesale review of surveillance law, including the fact that there is absolutely no judicial process within the current system and the people making these decisions are able to hide in the shadows rather than face public scrutiny.”

    • EE Dragging its Feet on Mobile Data Transparency

      Mobile company EE has been quite open in explaining the sale of data analytics based on their customers data in partnership with Ipsos MORI. But we are concerned that they think the storm is over and can return to business as usual. We may need your support to make them listen.

      EE has already met with ORG to explain how their data services work, how they aggregate data and what general legal framework they operate. For this, we commend EE on their openness and hope that it continues.

    • Police State Canada: Communications Security Establishment Canada (CSEC) Runs Massive Domestic Spying Program

      Communications Security Establishment Canada (CSEC), the NSA’s Canadian counterpart and longstanding partner, has been scrutinizing the metadata of Canadians’ electronic communications since at least 2005.

      Moreover, the NSA routinely provides Canada’s security agencies with intelligence on Canadians and CSEC reciprocates by providing U.S. intelligence officials with information about people living in the U.S. This arrangement allows both agencies to circumvent legal bans on warrantless surveillance of their own citizenry’s communications.

      It was “common” for NSA “to pass on information about Canadians,” Wayne Easter, Canada’s Solicitor-General in 2002-3, told the Toronto Star this week. As Solicitor-General, Easter was responsible for overseeing the operations of the Canadian Security Intelligence Service (CSIS) and the Royal Canadian Mounted Police (RCMP).

    • Google told to delete Street View payload data or face UK prosecution

      Information commissioner’s office says it will launch contempt of court proceedings if data is not deleted within 35 days

    • In Depth Review: New NSA Documents Expose How Americans Can Be Spied on Without A Warrant

      The Guardian published a new batch of secret leaked FISA court and NSA documents yesterday, which detail the particulars of how government has been accessing Americans’ emails without a warrant, in violation of the Constitution. The documents lay bare fundamental problems with the ineffectual attempts to place meaningful limitations on the NSA’s massive surveillance program.

      Essentially, the new documents, dated July 2009 and approved in August 2010, detail how the NSA deals with the huge streams of information it receives during the collection program that gathers the content of email and telephone calls, allowing it to keep vast quantities of content it could never get with a warrant. They may not be the current procedures – more on that in another blog post shortly.

    • Spying on the World From Domestic Soil

      The world is still reeling from the series of revelations about NSA and FBI surveillance. Over the past two weeks the emerging details paint a picture of pervasive, crossborder spying programs of unprecedented reach and scope: the U.S. has now admitted using domestic networks to spy on Internet users both domestically and worldwide. The people now know that foreign intelligence can spy on their communications if they travel through U.S. networks or are stored in U.S. servers.

    • Edward Snowden is a true patriot

      A million people marched in London to stop Blair going to war.

    • US Surveillance: Doubts Over FBI And NSA Claims

      Terrorism analysts and specialist journalists say claims of thwarted terror plots from phone and data mining do not stand up.

    • Government-tech ties: Ex-Facebook exec moved to NSA, Amazon’s CIA deal, more

      • Where did Facebook chief security officer Max Kelly go after he left the social network in 2010? To the NSA, according to the New York Times, which says it’s the first to report that tidbit. Also previously unreported, says the NYT, is that Internet-call provider Skype developed a program to make it easier to cooperate with law enforcement and the government.

  • Civil Rights

  • Intellectual Monopolies

    • Copyrights

      • Opening Pandora’s Box

        I first placed music online in 1996, a WAV file recorded through a microphone to promote the sale of an album I had under license on my indie BeanBag label featuring Georgie Fame and Van Morrison. I cheered for other music industry executives like Larry Rosen of GRP Records when he launched Music Boulevard online around 1997. I licensed songs by Jesse Colin Young (founder of The Youngbloods) to music publishing expert Bob Kohn’s eMusic.com for a cash advance against future royalties that had us partying like it was 1999.

        But by the year 2000, any hope of that engagement between legal music and the Internet leading to a new future was pretty much dashed by an online startup corporation named Napster that provided free music downloads. Though a Federal court would find Napster guilty in 2001 of providing illegal copying similar to a counterfeiting operation, the business model known as “DMCA ‘Safe Harbor’ corporations” was launched.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts