EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

07.27.16

OIN Makes Claims About “Open Source Innovation”, But It Produces Nothing and Protects Virtually Nobody

Posted in Free/Libre Software, GNU/Linux, OIN, Patents at 4:43 pm by Dr. Roy Schestowitz

A better initiative would strive and work towards ending software patents, not faith-based ‘protection’

“Where knowledge ends, religion begins.”

Benjamin Disraeli

Summary: The Open Invention Network (OIN) reports growth, but in practical terms it does little or nothing to help developers of Free/Open Source software

THE function of OIN seems benign if not benevolent on the surface; the problem is, it helps distract from better efforts that would more effectively defend Free/Open Source software (FOSS). Another not-so-useful initiative was Peer-to-Patent, but it seems to be gone by now.

OIN is growing (see the OIN ‘Community’) and MRV has just joined OIN (see the press release [1, 2], mostly or completely overlooked by reporters). This is a sign of growth, but it is growth which won't help FOSS all that much because it was never truly designed with FOSS in mind. The “Open Source Innovation” mentioned in the title of the press release wrongly assumes this will be beneficial to FOSS, but unless every company in the world joined and vowed not to sue any of the other members (like Oracle suing Google), what would it achieve? And what about lawsuits by proxy? Even if Microsoft was ever to join, its patent trolls (two of which we wrote about last night) would still be capable of suing Linux developers/companies.

Speaking of which, even Android players are a patent menace at times (e.g. Sony). A new and relatively long article by Professor Jason Rantanen speaks about Ericsson’s patent troll, Unwired Planet, and its case against Apple. “This post will focus on the issue of fault in the context of Unwired Planet,” he wrote upfront, “although its observations about fault are relevant to issues of culpability in the context of enhanced damages determinations.”

Even if Ericsson was ever to join OIN, this would not prevent it from suing Android OEMs, directly or via proxies like Unwired Planet (which even operates in Europe now).

Links 27/7/2016: New CrossOver, Blackmagic for GNU/Linux

Posted in News Roundup at 4:06 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • Science

    • Mystery ancient human ancestor found in Australasian family tree

      Who’s your daddy? An unknown hominin species that bred with early human ancestors when they migrated from Africa to Australasia has been identified through genome mapping of living humans.

      The genome analysis also questions previous findings that modern humans populated Asia in two waves from their origin in Africa, finding instead a common origin for all populations in the Asia-Pacific region, dating back to a single out-of-Africa migration event.

      Modern humans first left Africa about 60,000 years ago, with some heading west towards Europe, and others flowing east into the Asia-Pacific region.

    • Stop the privatization of health data

      In many ways, the migration of clinical scientists into technology corporations that are focused on gathering, analysing and storing information is long overdue. Because of the costs and difficulties of obtaining data about health and disease, scientists conducting clinical or population studies have rarely been able to track sufficient numbers of patients closely enough to make anything other than coarse predictions. Given such limitations, who wouldn’t want access to Internet-scale, multidimensional health data; teams of engineers who can build sensors for data collection and algorithms for analysis; and the resources to conduct projects at scales and speeds unthinkable in the public sector?

      Yet there is a major downside to monoliths such as Google or smaller companies such as consumer-genetics firm 23andMe owning health data — or indeed, controlling the tools and methods used to match people’s digital health profiles to specific services.

  • Health/Nutrition

    • Infojustice: NGO And Academics Letter To US Secretary Of State On Access To Medicines

      Dear Secretary Kerry: We are writing to express our concern about recent statements made by representatives of the State Department on issues regarding intellectual property (IP) and access to medicines in various settings, including proceedings in Colombia, several important United Nations fora, and in India.

    • Will plain-packaged smokes help bring about the ‘endgame’ for tobacco?

      It’s as if the No Name brand was getting into the tobacco game. No more super slims. No choice of regular or king size. No logo on the filter. No colourful graphics next to the horrifying health warnings on packs, pouches and tins.

    • How Uruguay’s tobacco victory could boost Canada’s fight for plain packaging

      Canada’s efforts to force tobacco manufacturers to use plain packaging will get a boost from a recent decision on similar measures in Uruguay, health advocates said Monday.

      The South American country successfully beat back an international trade challenge by Philip Morris International, which objected to rules requiring warning labels on 80 per cent of packaging and restricting each brand to only a single product.

      Rob Cunningham, a senior policy analyst with the Canadian Cancer Society, called the decision just the latest in a string of international defeats for the tobacco industry on the controversial issue of plain packaging.

    • Italy parliament begins debate on legalizing cannabis

      Italian lawmakers on Monday began discussing whether to legalize recreational cannabis, a fiercely-contested proposal likely to spark parliamentary battles.

      Loosening Italy’s marijuana laws is divisive, supported by those who say regulating the drug’s production and sale would strip mafia groups of an important source of income, but opposed by conservative groups and the Roman Catholic Church.

      Before the bill, backed primarily by deputies from Prime Minister Matteo Renzi’s Democratic Party (PD) and the anti-establishment 5-Star Movement, even arrived for discussion in the lower house, opponents lodged more than 1,300 amendments.

  • Security

  • Defence/Aggression

    • There’s No Business Like the Weapons Business

      When American firms dominate a global market worth more than $70 billion a year, you’d expect to hear about it. Not so with the global arms trade. It’s good for one or two stories a year in the mainstream media, usually when the annual statistics on the state of the business come out.

      It’s not that no one writes about aspects of the arms trade. There are occasional pieces that, for example, take note of the impact of U.S. weapons transfers, including cluster bombs, to Saudi Arabia, or of the disastrous dispensation of weaponry to U.S. allies in Syria, or of foreign sales of the costly, controversial F-35 combat aircraft. And once in a while, if a foreign leader meets with the president, U.S. arms sales to his or her country might generate an article or two. But the sheer size of the American arms trade, the politics that drive it, the companies that profit from it, and its devastating global impacts are rarely discussed, much less analyzed in any depth.

    • The Obama Administration Has Brokered More Weapons Sales Than Any Other Administration Since World War II

      When American firms dominate a global market worth more than $70 billion a year, you’d expect to hear about it. Not so with the global arms trade. It’s good for one or two stories a year in the mainstream media, usually when the annual statistics on the state of the business come out.

    • Revealed: the £1bn of weapons flowing from Europe to Middle East

      Eastern European countries have approved the discreet sale of more than €1bn of weapons in the past four years to Middle Eastern countries that are known to ship arms to Syria, an investigation has found.

      Thousands of assault rifles such as AK-47s, mortar shells, rocket launchers, anti-tank weapons and heavy machine guns are being routed through a new arms pipeline from the Balkans to the Arabian peninsula and countries bordering Syria.

      The suspicion is that much of the weaponry is being sent into Syria, fuelling the five-year civil war, according to a team of reporters from the Balkan Investigative Reporting Network (BIRN) and the Organised Crime and Corruption Reporting Project (OCCRP).

      Arms export data, UN reports, plane tracking, and weapons contracts examined during a year-long investigation reveal how the munitions were sent east from Bosnia, Bulgaria, Croatia, Czech Republic, Montenegro, Slovakia, Serbia and Romania.

    • The most ignored aspect of the South China Sea brawl might be the key to solving it

      Amidst the fracas between China, the Philippines, Vietnam, Taiwan, Malaysia, and Brunei over claims in the South China Sea, it’s the fish and coral that are the silent victims. With every move made to bolster their claims over the region, these countries, particularly China, are slowly destroying its unique marine havens.

    • Syria car bomb: Isis claims responsibility after attack in northern city of Qamishli kills at least 44 people

      Isis has claimed responsibility after least 44 people were killed and more than 100 wounded in a twin bombing in a predominantly Kurdish town in the north of Syria.

      Syrian state-TV said a truck loaded with explosives blew up on the western edge of the town of Qamishli, near the Turkish border.

    • France church attack: Priest killed by two ‘IS soldiers’

      An 84-year-old priest was killed and four other people taken hostage by two armed men who stormed his church in a suburb of Rouen in northern France.

      The two attackers, who said they were from the so-called Islamic State (IS), slit Fr Jacques Hamel’s throat during a morning Mass, officials say.

      Police surrounded the church and shot dead both hostage-takers. French media named one of them as Adel K.

      One of the hostages is in a critical condition in hospital.

    • This Is What It Was Like To Take Part In The Failed Turkish Coup, In The Words Of The Plotters

      There are two sources for the WhatsApp conversation. One was widely circulated on Twitter soon after the coup, and consists of a video purporting to show messages on the phone of a plotter. The other source is a series of photos obtained by a journalist with Al Jazeera, although no further information on them is given. Naturally, claims that these are authentic need to be treated with caution, and this is where the Bellingcat method of drawing on diverse sources shows its strength.

  • Environment/Energy/Wildlife/Nature

    • Scientists caught off-guard by record temperatures linked to climate change

      Record temperatures in the first half of 2016 have taken scientists by surprise despite widespread recognition that extreme weather events are becoming more frequent and intense, the director of the World Climate Research Program said.

      The earth is on track for its hottest year on record with June marking the 14th straight month of record heat, the World Meteorological Organization (WMO) said last week.

      Temperatures recorded mainly in the northern hemisphere in the first six months of the year, coupled with an early and fast Arctic sea ice melt and “new highs” in heat-trapping carbon dioxide levels, point to quickening climate change, it said.

      In a further announcement on Tuesday, the U.N. agency said it would examine whether a temperature of 54 degrees Celsius (129 degrees Fahrenheit) reported in Kuwait last Thursday was a new high for the eastern hemisphere and Asia.

    • Greens take final Senate seat in Tasmania as grassroots campaign to save Labor’s Lisa Singh also claims victory

      The Greens have scraped into the final Senate seat in Tasmania and the Australian Electoral Commission has confirmed the return to Parliament of Labor’s Lisa Singh, who has been re-elected on a wave of public support after being dropped to an otherwise “unwinnable” spot on the ALP ticket.

      The AEC announced the 12 elected senators on Wednesday, with Green Nick McKim’s success coming at the expense of Liberal minister Richard Colbeck – another Tasmanian who fell victim to party power plays.

    • Indonesia Forest Fires Carbon Emissions Surpass All of EU

      The 2015 fires were the worst since 1997 when a strong El Niño also fanned widespread Indonesia forest fires, says the study published in Scientific Reports, which was a collaboration between scientists in King’s College London and the Center for International Forestry Research (CIFOR).

      The practice of burning in Sumatra and Kalimantan, exacerbated by extended drought associated with El Niño, released 857 million tonnes of carbon dioxide from September to October 2015, which was 97 per cent of annual carbon emissions in Indonesia.

      Martin Wooster, one of the study’s authors and an earth observation science professor at King’s College London, says the data produced from the study were based on satellite observation and on-site measurement of the air in Palangkaraya, the capital city of Central Kalimantan province which experienced the thickest smog during the 2015 fires.

  • Finance

    • UK economic growth accelerated to 0.6% before Brexit vote

      Britain’s economy is now 7.7% higher than the pre-economic downturn peak, in the first quarter of 2008.

    • This could be the last economic growth Britain sees for a while

      The UK has recorded three-and-a-half years of uninterrupted economic growth, its third-longest streak since 1955. (But it’s probably over.)

      Gross domestic product increased 0.6% between April and June, including the days after Britain voted to leave the European Union, the Office for National Statistics said today (July 27). The data—which was better than expected—was skewed towards the beginning of that period and only takes into account a week of a post-Brexit world. And most of the GDP figure is derived from estimates of economic activity, as opposed to hard data.

    • European Commission appoints chief Brexit negotiator but says he won’t speak to UK until Article 50 triggered

      The European Commission has appointed a chief Brexit negotiator but has made clear he will not engage with Britain until Article 50 is formally triggered – nor start work until 1 October.

      Michel Barnier, a former French government minister and ex-European Commission vice-president, will start work after the holiday season and then spend the next few months preparing the ground in Brussels for the negotiations. His appointment was announced by commission president Jean-Claude Juncker, who said he wanted “an experienced politician for this difficult job”.

      Describing Mr Barnier as “a skilled negotiator with rich experience in major policy areas relevant to the negotiations”, Mr Juncker said: “I am very glad that my friend Michel Barnier accepted this important and challenging task. I wanted an experienced politician for this difficult job.

    • Olympics Committee Says Non-Sponsors Are Banned From Tweeting About the Olympics

      The US Olympics Committee has gone off the deep end, when it comes to intellectual property. It’s willing to sue anyone to protect their trademarks, even when the use is no real threat. But the committee’s latest claim is an entirely new level of absurdity.

      What’s getting the US Olympics Committee in a tizzy this time? Tweets. Specifically any company that tweets about the Olympic Games and isn’t a sponsor. ESPN obtained a letter from the US Olympic Committee chief marketing officer Lisa Baird who outlines the absurd demands.

    • At World’s Largest Hedge Fund, Sex, Fear and Video Surveillance

      Ray Dalio, the billionaire founder of the world’s largest hedge fund, Bridgewater Associates, likes to say that one of his firm’s core operating principles is “radical transparency” when it comes to airing employee grievances and concerns.

      But one employee said in a complaint earlier this year that the hedge fund was like a “cauldron of fear and intimidation.”

      The employee’s complaint with the Connecticut Commission on Human Rights and Opportunities, which has not been previously reported, describes an atmosphere of constant surveillance by video and recordings of all meetings — and the presence of patrolling security guards — that silence employees who do not fit the Bridgewater mold.

    • Bitcoin’s not money, judge rules as she tosses money-laundering charge

      The hotel room was wired with cameras and microphones, and in it sat $30,000 in fake $100 bills. Miami Beach Detective Ricardo Arias, working undercover as an identity thief, flipped them in front of Michell Abner Espinoza. A “flash-roll,” it’s called, the kind you see in the movies where bad guys flick through wads of cash before holding it up in the air.

      For that $30,000, Espinoza had agreed to sell a slew of bitcoins, the almost unregulated virtual currency, which Arias’s character said he would exchange for stolen Russian credit-card numbers.

      The sting was designed to catch Espinoza, then 30 of Miami, laundering money. Florida law prohibits using financial transactions to “promote” illicit activity, such as, in this case, credit-card fraud.

      Ultimately, Arias arrested Espinoza on three felony counts of money laundering, capping a three-month investigation in 2014 into South Florida’s exchange of computerized money.

    • EU Plans Database of Bitcoin Users with Identities and Wallet Addresses

      The European Commission is proposing the creation of a database that will hold information on those using virtual currencies and that will record data on the users’ real-world identity, along with all associated wallet addresses.

      This is the first proposal part of an action plan that the EU got rolling after the Paris November 2015 terror attacks and that it officially put forward in February 2016 and later approved at the start of July 2016.

      As we wrote in our article from a few weeks back, the action plan, a reform of the Anti-Money Laundering Directive (AMLD) so it would also include the terms “virtual currency,” was only approved by the (EU President) Juncker Commission.

    • Highest-paid CEOs run worst-performing companies, research finds

      The highest-paid CEOs tend to run some of the worst-performing companies, according to new research.

      The study, carried out by corporate research firm MSCI, found that for every $100 (£76) invested in companies with the highest-paid CEOs would have grown to $265 (£202) over 10 years.

      But the same amount invested in the companies with the lowest-paid CEOs would have grown to $367 (£279) over a decade.

      Titled ‘Are CEOs paid for performance? Evaluating the Effectiveness of Equity Incentives’, the report looked at the salaries of 800 CEOs at 429 large and medium-sized US companies between 2005 and 2014 and compared it with the total shareholder return of the companies.

  • AstroTurf/Lobbying/Politics

    • Those Viral Trump Supporting Singing, Dancing ‘Freedom Kids’ Now Plan To Sue Trump Campaign

      The fact that no lawsuit has yet been filed suggests that going public first is the latest method by which Popick is hoping to get paid by the campaign. Unless there are more details here, I’m not sure how much success Popick is likely to have with a lawsuit. It seems like a stretch from a legal angle. Without a written agreement, and with any verbal agreement sounding fuzzy at best, with Popick adding his own after-the-fact requirements for alternative compensation, I doubt any legal dispute stands much of a chance. Of course, it still doesn’t look good for the Trump campaign, which had a (somewhat ridiculous) viral sensation in their camp and appears to have squandered it:

    • Ex-NSA EMPLOYEE: It’s ‘essentially impossible’ to draw a straight line from the DNC hack to the Russian government

      The FBI suspects the Russian government could be behind the hack of the Democratic National Committee after about 20,000 emails from the political organization were leaked late last week.

      But as one expert tells Business Insider, it would be “essentially impossible” to make a direct connection between the hackers and the Russian government.

      “I mean, it’s essentially impossible, 100%, given the advanced tactics these guys can deploy,” said Will Ackerly, a former cloud security architect at the National Security Agency and cofounder of the data security company Virtru. “It is relatively straightforward to design a misattribution system, where it looks like the attack is coming from somewhere else.”

    • US Media Hides Real Scandal, Says ‘Trump a Manchurian Candidate for Putin’

      America’s corporate media have gobbled up the Hillary Clinton campaign’s spoon-fed lines that the real story of the WikiLeaks email revelations isn’t that they stole a US election, but rather that Putin and Russia are somehow interfering with the election to benefit Trump — despite zero evidence.

    • Report: FBI Investigating DNC Hack

      Last month, DNC officials and security experts told the Washington Post that Russian government hackers gained access to the computer network of the Democratic National Committee, stealing login credentials and monitoring email and chats. Security firm Crowdstrike was hired by the DNC to investigate, and it concluded that two separate hacking cells with known ties to the Russian government compromised the DNC’s systems.

      This weekend, Wikileaks then posted the emails that had been stolen from the DNC in a searchable format online, revealing that the party’s top brass tried to help presumptive nominee Hillary Clinton clinch the nomination over Bernie Sanders, despite a claim that it was neutral. That prompted the Sunday resignation of the party’s leader, Debbie Wasserman Schultz.

    • Kerry Confronts Russia About DNC Hack, Russia Threatens To Swear

      Russia’s foreign minister refused to answer U.S. Secretary of State John Kerry’s question about Democratic National Committee (DNC) hacking allegations because he didn’t “want to use four-letter words.”

      Kerry raised the allegations July 26 in Laos at the ASEAN summit, and told reporters, “I raised the question and we will continue to work to see precisely what those facts are.” Kerry did not reveal Sergei Lavrov’s private response, but highlighted the FBI had opened an investigation into the allegations that Russian intelligence services were behind the DNC hack.

    • Lavrov dismisses claims Russia behind DNC leak

      While speaking ahead of talks at the ASEAN summit in Laos with US Secretary of State John Kerry, Russian Foreign Minister Sergey Lavrov soundly dismissed allegations that the Russian government was behind the Democratic National Committee (DNC) email leaks.

      Lavrov told a reporter, “I don’t want to use four-letter words”, in response to a question regarding Russia’s unproven involvement.

    • Talk Nation Radio: Jill Stein on Why You Should Help Make Her President of the United States
    • Internet troll facing jail after violent antisemitic threats to Labour MP

      John Nimmo, previously jailed for abusive messages, sent emails to Luciana Berger telling her she would ‘get it like Jo Cox’

    • Hillary Clinton spokeswoman: We believe Russians behind WikiLeaks release of DNC emails

      Hillary for America communications director Jennifer Palmieri discusses the campaigns take on last week’s WikiLeaks release of DNC emails. Palmieri speaks with McClatchy’s political editor Steve “Buzz” Thomma on the sidelines of the Democratic National Convention in Philadelphia.

    • What WikiLeaks Emails Reveal About The DNC, The White House And Lobbyists

      When Barack Obama became the Democratic presidential nominee in 2008, he directed the national party to reject donations from federal lobbyists. “We will not take a dime from Washington lobbyists or special interest PACs,” he said. “We’re going to change how Washington works. They will not fund my party.”

      The ban was perceived as symbolic and did little to stop the flow of corporate cash to the Democratic party, but it was heralded by government watchdog groups as a positive step towards limiting the influence of business interests over policymaking. Now, late into Obama’s presidency, the Democratic National Committee has begun accepting and soliciting lobbyist cash, and the White House has warmed to the idea of lobbyists playing a role in the party’s fundraising.

      Under the party’s new fundraising policy, detailed by the Washington Post in February, lobbyists cannot participate in DNC events with President Obama, Vice President Joe Biden or their wives. But lobbyists can attend party events with White House staffers, according to a MapLight review of DNC emails. The messages were part of the nearly 20,000 emails from hacked DNC accounts that were released by WikiLeaks on Friday.

    • Democrats Ignored Cybersecurity Warnings Before Theft

      The Democratic National Committee was warned last fall that its computer network was susceptible to attacks but didn’t follow the security advice it was given, according to three people familiar with the matter.

      The missed opportunity is another blow to party officials already embarrassed by the theft and public disclosure of e-mails that have disrupted their presidential nominating convention in Philadelphia and led their chairwoman to resign.

      Computer security consultants hired by the DNC made dozens of recommendations after a two-month review, the people said. Following the advice, which would typically include having specialists hunt for intruders on the network, might have alerted party officials that hackers had been lurking in their network for weeks — hackers who would stay for nearly a year.

      Instead, officials didn’t discover the breach until April. The theft ultimately led to the release of almost 20,000 internal e-mails through WikiLeaks last week on the eve of the convention.

    • Assange: Why I Created WikiLeaks’ Searchable Database of 30,000 Emails from Clinton’s Private Server

      In March, WikiLeaks launched a searchable archive for over 30,000 emails & email attachments sent to and from Hillary Clinton’s private email server while she was secretary of state. The 50,000 pages of documents span from June 2010 to August 2014; 7,500 of the documents were sent by Hillary Clinton. The State Department released the emails as a result of a Freedom of Information Act request.

    • This Isn’t the First Time Donald Trump Has Asked Hackers for Help Taking Down His Enemies

      Donald Trump on Wednesday urged Russia to hack Hillary Clinton’s emails, setting off howls of outrage from across the political spectrum for actually soliciting foreign espionage on his opponent. “Russia, if you’re listening, I hope you’re able to find the 30,000 emails that are missing,” Trump said.

    • Putin’s Internet Trolls Are Stoking The Vitriolic Fire By Posing As Trump Supporters

      Over the last year we’ve repeatedly noted how Putin’s Internet propaganda efforts go well beyond flinging insults in news story comment sections. Thanks to whistleblowing by the likes of Lyudmila Savchuk, we learned how Putin employs multiple factories operated by a rotating crop of shell companies whose sole purpose is to fill the internet with Putin-friendly drivel twenty-four-hours a day. Early reports noted how these efforts focused on what you’d expect from Putin: discrediting reporters, distorting Russia’s invasion of the Ukraine, or opposing Finland’s entry into NATO.

      But a little more than a year ago, New York Times Magazine’s Adrian Chen decided to see just how deep that particular rabbit hole went.

    • Leaked emails reveal Atherton’s bill for Obama fundraiser

      Buried in the avalanche of the WikiLeaks email drop that brought down Democratic National Committee Chair Debbie Wasserman Schultz is an interesting item closer to home — this one dealing with President Obama’s fundraising visit in February to the Atherton home of millionaire businessman and former state Controller Steve Westly.

      Not everyone in the exclusive Peninsula enclave has been happy about the president’s repeated drop-ins. After a fundraising event in 2013 wound up costing Atherton about $8,000, the City Council drafted an ordinance allowing the town to seek repayment from hosts of such large-scale gatherings.

      The leaked emails show that Atherton officials sent Westly an itemized invoice to cover $5,909 for the February fundraiser, including the pay for eight police officers, a police sergeant, a dispatcher and a public works crew.

      The emails also show that upon receiving the invoice, Westly wrote to Democratic National Committee officials, asking, “How you like us to handle this?

      “I will do whatever you would like here, including paying the bill,” messaged Westly, who has been eyeing a 2018 run for governor. “We are all very loyal to you and the president.”

    • Declaring Cyberwar On Russia Because Of The DNC Hack Is A Bad Idea

      There’s been plenty of talk, of course, about whether or not Russia did the hack that exposed various Democratic National Committee emails and other documents. While we’ve already pointed out that this shouldn’t impact the newsworthy nature of the material leaked, it’s still an interesting story. We’ve highlighted some reasons to be skeptical of the claims attributing the hack to Russia, but it does appear that more and more evidence is pointing in that direction. Thomas Rid, over at Vice, has a pretty good analysis of why much of the evidence points to Russia as being behind the attack, and the FBI is now apparently on board with that as well. While I’d still prefer more evidence, at least at this point, it should be admitted that there’s quite a lot of evidence pointing in Russia’s direction making it, at the very least, the most likely suspect.

      [...]

      This is insane for a variety of reasons, and hopefully no one is seriously listening to this. First of all, hacking happens all the time. In fact, as Ed Snowden points out, revealed documents show that the US itself has authorized the hacking of foreign political parties. So if Russian hackers possibly doing that to us is a “cyberwar attack” and it’s the kind of thing we need to hit back on, then, uh, haven’t we been committing “cyberwar” on tons of other parties via the NSA — for which we, too, deserve retaliation?

    • Jill Stein vs. Ben Jealous: Should Progressives Reject Hillary Clinton & Vote Green?

      After a tension-filled opening day of the Democratic National Convention that saw Senator Bernie Sanders endorse his former rival Hillary Clinton, we host a debate between Green Party presidential candidate Dr. Jill Stein and Ben Jealous, former NAACP president and CEO and a Bernie Sanders surrogate.

    • Who Is Jill Stein? Meet The Third-Party Alternative To Hillary Clinton And Donald Trump

      With Donald Trump officially named the Republican presidential nominee last week and Hillary Clinton poised to become the Democratic candidate Thursday, you may feel like your options for the November general election are locked in.

      But you’re wrong. Jill Stein, a 66-year-old physician, is also in the running for the White House.

      Stein is on track to become the Green Party’s 2016 nominee for president, just like she was four years ago. And though a third-party candidate has never landed in the Oval Office, Stein is performing well among voters who are dissatisfied with the establishment and faced with choosing between Trump and Clinton. As of Tuesday morning, she was polling at about 3 percent support, according to RealClearPolitics.

    • Bernie Sanders Delegates Prepare to Confront Obama About TPP, Symbol of Corporate Control

      Hillary Clinton and Bernie Sanders both now oppose the Trans-Pacific Partnership (TPP) — so why were so many Bernie Sanders delegates yelling about it Monday night and waving anti-TPP signs over their head?

      The TPP has become a hot-button issue for a lot of progressives who want the party to take a more anti-corporate tone.

      Some of the opposition comes from bad memories of the job-losses that came in the wake of the NAFTA agreement in the 1990s. But the TPP is not actually a free-trade pact. It won’t lower tariffs, the most common trade barriers.

    • The Trump-Putin Fallacy

      In the earlier months of the Donald Trump campaign, many people I knew asked me to comment on the similarities between Trump and Russian President Vladimir Putin. Recently I have been asked to comment on direct connections between Trump and Putin. And now, with the release of nearly 20,000 emails apparently stolen from the Democratic National Committee’s email server by Russian hackers, has come the suggestion that Putin may actually be interfering in the US election to help get Trump elected. These ideas—that Trump is like Putin and that he is Putin’s agent—are deeply flawed.

      Imagine that your teenage child has built a bomb and has just set it off in your house. The house is falling down all around you—and you are blaming the neighbor’s kid, who threw a pebble at your window. That’s what the recent Putin fixation is like—a way to evade the fact that Trump is a thoroughly American creation that poses an existential threat to American democracy.

    • Did Russian Intelligence Hack the DNC Servers?

      The only experts cited work for a company hired by the Democratic National Committee to investigate the hack. There is no indication of any neutral third party investigation. The company, Crowdstrike, issued a publicly available report on what they found.

    • Assange: WikiLeaks to release ‘a lot more’ on US elections

      WikiLeaks founder Julian Assange says his organization plans to publish “a lot more material” concerning elections in the U.S.

      “This is having so much political impact in the United States,” he told CNN on Tuesday, referencing last Friday’s leak of 20,000 internal emails from the Democratic National Committee (DNC).

      Assange said Hillary Clinton’s presidential campaign is trying to disrupt focus on the messages by blaming Russia for their release.

      “What we have right now is the Hillary Clinton campaign using a speculative allegation about hacks that have occurred in the past to try and divert attention from our emails, another separate issue that WikiLeaks has published,” he said.

      “I think this raises a very serious question, which is that the natural instincts of Hillary Clinton and the people around her, that when confronted with a serious domestic political scandal, that she tries to blame the Russians, blame the Chinese, etc,” Assange added. “If she does that when she’s in government, that’s a political, managerial style that can lead to conflict.”

    • Some Sanders backers spurn Clinton, say they’ll go Green Party

      Bernie Sanders delegates and supporters speak out about the DNC email scandal, the Democratic Party and how they should move forward. Delegates on the floor during the Democratic National Convention often booed as Clinton was mentioned. USA TODAY

    • The DNC email leaks expose the rampant elitism that made way for Trump

      Compared to the sturm und drang swirling around last week’s Republican National Convention, the Democratic convention this week seemed likely to be a fairly placid affair. Then, as Democrats prepared to gather in Philadelphia to officially nominate Hillary Clinton as their presidential candidate, Wikileaks released a dramatic cache of hacked emails sent and received by members of the Democratic National Committee.

      The emails confirmed many Sanders supporters’ fears—previously derided as conspiracy theories—about both anti-Sanders sentiment within the DNC and the role of money in politics. The emails showed, among other things, that supposedly neutral DNC staffers were actively hostile to Bernie Sanders’s presidential campaign and gave donors access to president Barack Obama and other key White House staffers.

    • Leaks show DNC asked White House to reward donors with slots on boards and commissions

      Email exchanges involving top officials at the Democratic National Committee released along with private documents by WikiLeaks show that DNC officials hoped to reward top donors and insiders with appointments to federal boards and commissions in coordination with the White House.

      The revelations give an inside look into how the Democratic Party attempted to leverage its access and influence with the White House to bring in cash.

      In an April 20, 2016 email, DNC National Finance Director Jordan Kaplan canvassed what appears to be the committee’s finance department – its fundraising office – for names of people (mainly donors) to reward with federal appointments on boards and commissions.

      That email exchange yielded a list compiled by DNC Finance Chief of Staff Scott Comer and emailed to Kaplan on April 26 titled “Boards and Commissions Names_Final,” which listed the names of twenty-three DNC donors and insiders.

    • ALEC 2016 Agenda Boosts Charters, Coal, and Other Corporate Funders

      The American Legislative Exchange Council will push bills to protect failing charter schools, silence political speech, and obstruct environmental protections in the ALEC 2016 agenda introduced at its annual meeting in Indianapolis this week.

      ALEC faces renewed public attention as it gears up for the annual meeting, where corporate lobbyists sit side-by-side with state legislators in luxury hotels to vote as equals on “model bills” that then get pushed to become law in states across the country.

      As the Center for Media and Democracy has reported, Donald Trump chose an ALEC ally, Indiana Governor Mike Pence, as his running mate, while his party’s 2016 platform was clearly stamped in the Koch-fueled ALEC mold.

  • Censorship/Free Speech

    • Russian Censor Bans Comodo… Doesn’t Realize Its Own Security Certificate Is From Comodo

      The Russian government’s state censorship organization, Roskomnadzor (technically its telecom regulator) has been especially busy lately as the government has continued to crack down on websites it doesn’t like. However, as pointed out by Fight Copyright Trolls, it appears that Roskomnadzor may have gone a bit overboard recently, in response to a court ruling that had a massive list of sites to be banned (over a thousand pages). Apparently, as part of that, various sites associated with Comodo were all banned. That’s pretty bad for a variety of reasons, starting with the fact that Comodo remains one of the most popular issuers of secure certificates for HTTPS.

    • Anti-Vax Film Distributors Threaten Critic And Autistic Rights Advocate With Defamation

      Any time we discuss the segment of our population that is still, despite all evidence to the contrary, pushing anti-vaccination conspiracy theories out into the ether, the comments section is inevitably invaded by these proponents. I know I can’t stop it, so just go ahead and leave what I’m sure will be your well-reasoned, science-backed arguments as to why we shouldn’t trust one of the most life-saving kinds of medicine ever invented.

      That said, this is not a post about the plausibility that vaccinations are the reason for all the world’s ills. It is instead a post about how the distributors of the upcoming sure-to-be smash hit film about the horror of vaccinations, creatively entitled Vaxxed, are also going around threatening people arguing against its message with defamation for pointing back at the filmmakers’ own words.

      Meet Fiona O’Leary of Ireland. Fiona is an advocate for autistic children, helping to run a group called ART (Autistic Rights Together) as well as a Tumblr page dedicated to dispelling the myths of autism and vaccines. On that Tumblr page and on social media, O’Leary has often set her sights on the makers and distributors of Vaxxed, including producers Polly Tommey and Del Bigtree. Included in her pushback, O’Leary points out some rather unfortunate comments both have made about autistic children, as well as interviews and videos in which Tommey in particular pushes religious faith to treat autism. Through it all are the calls for parents to not vaccinate their children.

    • Vaxxed anti-vaccine film distributor threatens autism rights advocate

      Cinema Libre Studio, the distributor of the dishonest Andrew Wakefield anti-vaccination fiction-film, Vaxxed, has threatened an Irish autism-rights advocate with defamation.

    • Students debate censorship and the EU

      Censorship in society and a second EU referendum were subject to debate when two schools competed against each other.

    • Entire website blackholed over one allegedly plagiarised story

      Russian ISPs have been ordered by the Moscow City Court to block access to a website for 15 days over one allegedly plagiarised story that it ran.

      The story—a travel piece about what to do in Baku, the capital of Azerbaijan—was first published by the popular Russian site Gazeta.ru back in March, but then apparently plagiarised by Story-media.ru.

      It is not currently possible to check whether the two texts are indeed the same, since Story-media.ru is currently offline, and there is no copy on Archive.org.

    • Kerala writer attacked over book title

      An upcoming Malayalam writer was allegedly attacked by a group of people for using the word ‘padachon’ (the creator) in the title of his soon to be released book at Koottanad in the district.

      ‘Padachon’ is a colloquial Malayalam word used to refer to ‘God, the Creator’. It is used generally by the Muslim community in the state.

    • Kuwaiti PM sentenced 14 years jail for insulting Saudi and Bahrain

      Kuwait has handed one of its parliamentarians, Abdul-Hamid Dashti, to 11 years and six months in prison for insulting Saudi Arabia and a seperate sentence for insulting Bahrain.

      He was tried as well for defaming Kuwait’s judiciary.

      In March, the National Assembly of Kuwait, approved the claim presented for lifting Dashti’s parliamentary immunity. The request was based on the case on a homeland security lawsuit issued against Dashti for incitement against Saudi Arabia.

    • Colorado Republican Committee Tries To Use CFAA To Get Even With A Bogus Tweeter, Fails Completely

      The tweet was taken down minutes later and the official Twitter account explained that someone with “unauthorized access” had posted the tweet and it was not a reflection of the Colorado GOP’s official stance.

      This led to a brief internet wildfire, where CRC reps were interviewed by reporters about the tweet and enraged Trump supporters [also: 4chan] — believing the fix was in — began posting threatening messages to and about Colorado GOP leaders. So far, so internet.

      The CRC took this a step further though, attempting to sue the “Doe” with allegedly “unauthorized access” for breaching the “threat to public health or safety” clause of the CFAA. The original complaint [PDF] shows the CRC is perhaps far better at electioneering than investigating.

    • Mudzvova speaks on censorship

      AWARD winning actor, Sylvanos Mudzvova, who was recently in Norway for the Bergen Afro Arts Festival, said Zimbabwe’s censorship laws were archaic and draconian compared to other progressive societies.

    • Censorship company drops bogus lawsuit against researchers who outed them
    • An Internet Censorship Company Tried to Sue the Researchers Who Exposed Them

      Netsweeper is a small Canadian company with a disarmingly boring name and an office nestled among the squat buildings of Waterloo, Ontario. But its services—namely, online censorship—are offered in countries as far-flung as Bahrain and Yemen.

      In 2015, University of Toronto-based research hub Citizen Lab reported that Netsweeper was providing Yemeni rebels with censorship technology. In response, Citizen Lab director Ron Deibert revealed in a blog post on Tuesday, Netsweeper sued the university and Deibert for defamation. Netsweeper discontinued its lawsuit in its entirety in April.

      [...]

      When reached over email, Deibert said Citizen Lab is not offering comments to the press on the lawsuit. Netsweeper did not respond to Motherboard’s request for comment.

      If the lawsuit had gone to court, Deibert wrote that Citizen Lab intended to lean on the 2015 Protection of Public Participation Act, which was designed to thwart litigation against organizations acting in the public interest.

      “Citizen Lab does rigorous research into censorship, surveillance, and digital attacks and it is clearly in the public interest for them to be able to share those results,” Brenda McPhail, director of the surveillance project at the Canadian Civil Liberties Association, wrote Motherboard in an email. “We support their right to freely disseminate and discuss their important work.”

    • Lawsuit charging USDA censorship dismissed

      A lawsuit that accused the USDA of censoring its scientists in violation of their free speech rights has been dismissed by a federal judge.

      Last year, the non-profit Public Employees for Environmental Responsibility, or PEER, filed a complaint claiming that USDA’s “scientific integrity policy” unconstitutionally muzzled scientists to appease “corporate stakeholders.”

      The USDA policy, issued in 2013, states that “scientists should refrain from making statements that could be construed as being judgments of or recommendations on USDA or any other federal government policy, either intentionally or inadvertently.”

      According to PEER, the policy effectively prohibited USDA researchers from making public statements about controversial subjects, stifling scientific discourse about agriculture.

      Specifically, the complaint pointed to Jonathan Lundgren, an entomologist for USDA’s Agricultural Research Service, who was prevented from speaking publicly about certain subjects.

      For example, USDA barred Lundgren from speaking to the media about the impact on non-target insects from crops that are genetically engineered to have pesticidal qualities, the complaint said.

    • South Africa sacked reporters win SABC censorship case
    • South African Court Rules Journalists Sacked in Censorship Row Must be Reinstated
    • New battle in SABC censorship row

      A new court battle is expected after an employment tribunal in South Africa ordered the state broadcaster, SABC, to reinstate four journalists. They’d been sacked for fighting its policy of not showing footage of violent protests. But William Bird from the campaign group Media Monitoring Africa says the arguments are set to rage on.

    • SABC management incur third legal setback
    • Sacked SABC journos must return to work, says court
    • Fired SABC journalists reinstated by Labour Court
    • Labour court finds SABC’s dismissal of four journalists unlawful
    • Sanef welcomes court decision on SABC journalists
    • Censorship in Turkey: what it really means for terrorism and freedom of speech
    • Facebook admits it blocked links to DNC email leaks after censorship accusations
  • Privacy/Surveillance

    • Snowden is designing an anti-spyware gadget for iPhone 6
    • Edward Snowden Designs Device To Detect iPhone Snooping
    • Edward Snowden has Designed a Phone Case that Can Tell if You’re Being Hacked
    • Edward Snowden’s Ears Must Be Burning in Russia– He’s Mentioned in Two Movies Opening this Weekend
    • Who Hacked The Democratic National Committee?
    • Snowden: US should modernize disclosure process
    • Snowden On Russia Backing DNC Hack: I Wanna See The Receipts
    • US Intel Has ‘High Confidence’ Russia Behind DNC Email Hack
    • US Intel Agencies Have ‘High Confidence’ Russia Hacked DNC Emails
    • Snowden says NSA would know if Russian behind DNC leaks
    • NSA Whistleblower: Not So Fast On Claims Russia Behind Hillary Clinton Email Hack
    • Edward Snowden said the NSA could ‘certainly’ trace the DNC hack — here’s what experts think
    • Tor: Statement

      Seven weeks ago, I published a blog post saying that Jacob Appelbaum had left the Tor Project, and I invited people to contact me as the Tor Project began an investigation into allegations regarding his behavior.

      Since then, a number of people have come forward with first-person accounts and other information. The Tor Project hired a professional investigator, and she interviewed many individuals to determine the facts concerning the allegations. The investigator worked closely with me and our attorneys, helping us to understand the overall factual picture as it emerged.

    • Democrats wants to balance liberty and security in encryption debate

      In 2012, the Democratic party platform document (released every four years at the Democratic National Convention) made barely a mention of internet privacy and how it affects US citizens. But that was before Edward Snowden’s revelations. This year, as the DNC kicks off in Philadelphia, the new Democratic Party platform addresses the privacy concerns brought to light in 2013. It also gets into the recent battle over encryption that was highlighted by the FBI trying to force Apple to decrypt an iPhone connected to a murder suspect.

    • The Internet of Things Will Turn Large-Scale Hacks into Real World Disasters

      Disaster stories involving the Internet of Things are all the rage. They feature cars (both driven and driverless), the power grid, dams, and tunnel ventilation systems. A particularly vivid and realistic one, near-future fiction published last month in New York Magazine, described a cyberattack on New York that involved hacking of cars, the water system, hospitals, elevators, and the power grid. In these stories, thousands of people die. Chaos ensues. While some of these scenarios overhype the mass destruction, the individual risks are all real. And traditional computer and network security isn’t prepared to deal with them.

      Classic information security is a triad: confidentiality, integrity, and availability. You’ll see it called “CIA,” which admittedly is confusing in the context of national security. But basically, the three things I can do with your data are steal it (confidentiality), modify it (integrity), or prevent you from getting it (availability).

    • Hiding Internet Infrastructure Doesn’t Really Keep It Safe

      There are two questions that come up pretty frequently when I tell people that I document and write about network infrastructure. The first one is, So, where’s the cloud? (Spoiler: mostly, northern Virginia, but also it’s not a cloud and you should really stop calling it that.) The other is, Why do you want to let terrorists destroy the internet? The implication is that by mapping out the internet’s geography, I’m basically offering up a blueprint for destroying it.

      Anxiety about physical infrastructure security is understandable. Sometimes the threats to infrastructure security can feel a little over the top, as in the case of the New York Times report on the possibility of Russian submarine cable taps. It isn’t a purely speculative concern, however. Last year, a spate of mysterious fiber optic cable cuts in northern California left parts of the region disconnected for hours.

      My book, Networks of New York, is an illustrated guide to identifying network infrastructure, including internet cables. Conceivably, this could guide a would-be vandal to their targets—but the primary method they’d use to find those targets is a tactic explicitly already used to keep cables safe. Labeling buried utilities with color-coded flags, posts, or spray paint is a well-established part of street excavation. If one utility provider needs to do work that requires digging up a road, they need to know what’s buried under that road so they don’t end up damaging anything else buried nearby.

    • EU Data Protection Official Says Revised Privacy Laws Should Ban Backdooring Encryption

      The EU’s “Cookie Law” is a complete joke and waste of time. An attempt to regulate privacy in the EU, all it’s really served to do is annoy millions of internet users with little pop up notices about cookie practices that everyone just clicks through to get to the content they want to read. The EU at least recognizes some of the problems with the law and is working on a rewrite… and apparently there’s an interesting element that may be included in it: banning encryption backdoors. That’s via a new report from European Data Protection Supervisor (EDPS) Giovanni Buttarelli, who was put in charge of reviewing the EU’s ePrivacy Directive to make it comply with the new General Data Protection Regulation (GDPR) that is set to go into effect in May of 2018.

    • Privacy International reveals extent of MI5, MI6 and GCHQ bulk data collection

      THE HEARING into Privacy International’s challenge to the UK security services’ collection of bulk communications and personal data opened in London on Monday, and previously secret documents revealed for the first time the extent of government surveillance into ordinary citizens’ communications.

      This follows a ‘dirt dump’ in April which showed that successive home secretaries have allowed this to carry on since at least 2005.

      The documents provide evidence that MI5, MI6 and GCHQ collected data on every citizen in the UK, including location information, telephone numbers dialled and calls received, as well as metadata regarding time, date and duration of calls.

      In addition, the security services are accused by Privacy International of collecting data in bulk via the internet, including browsing history, IP addresses visited, instant messaging data and operating systems. The bulk collection of personal information even includes physical post data.

    • Oliver Stone’s Snowden, about NSA whistle-blower, to premiere at Toronto film festival

      Director Antoine Fuqua’s remake of the 1960s Western The Magnificent Seven is expected to kick off the Toronto International Film Festival on September 8, which will include movies about whistle-blower Edward Snowden and former US president Lyndon Johnson among the usual Oscar hopefuls.

    • ‘Honions’ Used To Find More Than 100 Snooping TOR Nodes

      TOR anonymity network is one of the most useful online security measures that we’ve got.

  • Civil Rights/Policing

    • Official who oversees whistleblower complaints files one of his own

      The Obama administration’s top official overseeing how intelligence agencies handle whistleblower retaliation claims has lodged his own complaint, alleging he was punished for disclosing “public corruption.”

      Daniel Meyer, who previously oversaw the Defense Department’s decisions on whistleblowing cases, also says he was targeted for being gay, according to records obtained by McClatchy.

      Meyer made the allegations in a complaint before the Merit Systems Protection Board, an administrative panel that handles employment grievances from federal employees, after another agency rejected his claims.

    • Disobedience Has Its Award

      As one whose early early political education, after I was old enough to quit listening to my father and think for myself, came largely from the various civil disobedience factions in the 1960s, it’s heartening to see that disobedience now has an award. So far it’s one off, but if successful might be repeated and perhaps be awarded annually. The award will also offer the recipient more than mere accolades, as it’s attached to a $250,000 prize.

    • MIT Media Lab Launched Disobedience Award, Funded By Reid Hoffman

      That’s a pretty cool idea for a prize. And I particularly like Michael Petricone’s suggestion that the award should be named after Aaron Swartz, who of course was engaged in a great number of civil disobedience projects. And, unfortunately, one of them involved MIT turning on him, leading him to getting arrested and charged with a variety of ridiculous charges. Since then, there has been a struggle among many at MIT to figure out how that happened and what the university should do to prevent similar things in the future. Naming this kind of award after him would be a great start.

      We recently wrote about the book The Idealist, about Swartz and the world of free culture (and had the author, Justin Peters, appear on our podcast for an excellent two-part discussion about the book). One things that becomes clear from the book was the absolute disbelief by Swartz and his family of the fact that MIT refused to support Swartz after his arrest. The university basically turned its back on him completely. It’s something that the university still ought to do something about, and naming this award after Swartz would be a step in the right direction.

    • Catalonia tells Spain it will push for secession with or without assent

      The Catalan government has intensified its war of words with Spain by vowing to use its democratic mandate to forge a separate Catalan state with or without the approval of Madrid.

      Catalonia is preparing to defy Spain’s constitutional court this week by debating the conclusions of a working group on sovereignty, nine months after the Catalan parliament put forward a resolution calling for the “beginning of a process of the creation of an independent Catalan state”.

    • Official who oversees whistleblower complaints files one of his own

      The Obama administration’s top official overseeing how intelligence agencies handle whistleblower retaliation claims has lodged his own complaint, alleging he was punished for disclosing “public corruption.”

      Daniel Meyer, who previously oversaw the Defense Department’s decisions on whistleblowing cases, also says he was targeted for being gay, according to records obtained by McClatchy.

      Meyer made the allegations in a complaint before the Merit Systems Protection Board, an administrative panel that handles employment grievances from federal employees, after another agency rejected his claims.

      Meyer’s claims add to a barrage of allegations that the federal government’s handling of defense and intelligence whistleblower cases is flawed.

      In the complaint, Meyer, who once worked for the Pentagon’s inspector general’s office, accused his former Defense Department bosses of “manipulation of a final report to curry favor” with then-Defense Secretary Leon Panetta.

    • Bradford woman’s death in Pakistan investigated after ‘honour’ killing claims

      Police are investigating the death of a British woman in Pakistan after her husband claimed she was the victim of an “honour” killing for marrying a man from outside the family allegedly against her parents’ wishes.

      Samia Shahid, a beauty therapist from Bradford, died on Wednesday while visiting relatives in Pandori village near Mangla Dam in northern Punjab, the Foreign Office confirmed.

      Shahid’s local MP, Naz Shah, has demanded that authorities in Pakistan exhume her body and commission an independent autopsy.

      The police officer leading the investigation in Pakistan told the Guardian he had sent samples from the body to the country’s top forensics lab in Lahore on Tuesday.

      Mohammad Aqeel Abbas, the station house officer for Jhelum district who is investigating the case, said a postmortem was carried out immediately after Shahid died and she was then buried in her village graveyard. There were no visible injuries or signs of violence on her body, he said.

    • Illinois politician resigns after fighting social network fakes

      Politicians tend to quit over scandals or sheer public outcry, but fake social networking accounts? That’s new. Illinois House representative Ron Sandack has resigned after spending weeks battling with “cyber security issues” — namely, people creating multiple impersonating Facebook and Twitter accounts. The fight made him “re-evaluate” his role in office and whether or not it was worth missing “important family events” to be there, he says.

    • Young Muslims Threaten Nudist Bathers With ‘Extermination’

      A swimming pool in the town of Geldern in the North Rhine-Westphalia region of Germany is home to bathers who prefer a more “natural” form of swimming. Nudists at the pool were verbally abused by a group of young Muslim men who threatened them because they consider swimming in the nude ‘indecent behaviour’. The group of Muslims not only threatened the male bathers but also spat upon them and several women and children, reports Junge Freiheit.

      A total of six Muslim men were involved in the incident and are described by witnesses as being in their mid 20’s, all with full Islamic-style beards. The men insulted and threatened the nudists in both German and Arabic, yelling “Allahu akbar” at the bathers along with other Arabic insults.

    • Homicide rate surging for black Chicagoans, report finds

      Chicago’s per capita homicide rate climbed over the last decade, and the chances of an African-American being killed in the city spiked drastically, according to a new report.

    • Black Lives, Blue Lives, and the Fight Over Criminal Justice in America

      Two people from Milwaukee took to the national stage at the Republican National Convention (RNC) and the Democratic National Convention (DNC) to present two very different perspectives on one of the most divisive issues of our time, the shootings of unarmed African Americans by police and civilians.

      The conventions took place against a backdrop of traumatic news stories. The shooting death of Philando Castile and its dramatic aftermath, live-streamed on Facebook by his girlfriend, sparked national protests. At one protest in Dallas, Texas, five police officers were shot and killed by an African American military veteran who had served in Afghanistan. This was followed by the shootings of police in Baton Rouge. The very next week, Charles Kinsey, an African American caregiver for an autistic adult, was shot by police while he was on the ground with his arms raised.

      While the terrible events and constant media churn left many wondering if the nation was coming apart at the seams, some fanned the flames of division.

      Milwaukee County Sheriff David Clarke, an African American and right-wing commenter for Fox News, who has blamed several of the victims of police killings, took to the floor in full dress uniform: “Ladies and Gentlemen, I would like to make something very clear: Blue Lives Matter!”

    • Singapore PM’s visit is chance to address censorship, LGBT protections

      United States President Barack Obama should press visiting Prime Minister Lee Hsien Loong to address the Singapore government’s severe restrictions on fundamental freedoms, Human Rights Watch said today. President Obama will meet with Prime Minister Lee in Washington, DC, on 2 August 2016.

  • Internet Policy/Net Neutrality

    • Is the internet being ruined and manipulated by big companies?

      We think of the internet as disrupting, and sometimes replacing, traditional institutions and industries, as it has grown and changed. There are now more than 3.2 billion users, and over time, a handful of companies — Facebook, Apple and Google among them — have come to have an outsize influence on how we use the internet.

      Zeynep Tufekci, a professor at the University of North Carolina, Chapel Hill who studies the social impact of technology, noticed a troubling problem in August 2014. She was following the news on Facebook and Twitter, and realized that Twitter was full of updates after the shooting of Michael Brown, an 18-year-old black resident of Ferguson, Missouri, by a white police officer.

      Meanwhile, Facebook’s algorithm — with its emphasis on what people “like” — largely missed the protests. “I’d go to Facebook and I’d see nothing,” Tufekci told Freakonomics recently. “These complex algorithms are having all these downstream effects. … Facebook is unleashing these computer programs that are designed to make Facebook advertiser-friendly and that are designed to keep us on the site.”

  • Intellectual Monopolies

    • IP Lawyers Tell Copyright Office To Stop Screwing The Public By Opposing Cable Box Reform

      Last week we noted how the cable industry was distorting the definition of copyright to try and fend off the FCC’s attempt to bring competition to the cable box market. Through misleading editorials and leveraged relationships with beholden lawmakers, the cable industry has been successfully convincing some regulators that we can’t bring competition to the cable box or we’ll face a piracy and copyright apocalypse.

      Dig deeper and you’ll find that copyright has nothing to do with the proposed changes being tabled. The FCC’s proposal simply requires (pdf) that cable providers deliver their existing programming, sans CableCARD, to third party set tops with an eye toward boosting competition. The FCC has stated repeatedly that under their plan, cable providers can utilize the standards and copyright protection of their choice to make this happen, keeping existing DRM in place (for better or worse). Again, it’s important to understand that for cable providers this fight is about control and $21 billion in annual rental fees.

    • South African Government Staves Off Critics With IP Consultative Framework

      South Africa’s Department of Trade and Industry (DTI) appears to be meeting its detractors halfway with a new intellectual property consultative framework it says will help pave the way for consultative engagement with IP stakeholders both inside and outside of government.

    • Many Hepatitis C Patients Do Not Have Access To Medicines In India, Group Says

      Despite being the global leader of generic drug manufacturing, access to hepatitis C treatment in India remains out of reach for a large portion of the population, a civil society group has said in a new paper. The authors call for India to work on a national programme of prevention and treatment of hepatitis, and warn against voluntary licences developed by multinational pharmaceutical companies.

    • WTO DG Sees Positive Changes, More Engagement; Would Consider A Second Term

      World Trade Organization Director General Roberto Azevêdo today said he would consider a second mandate at the head of the organisation. He also described a positive momentum in the organisation in the first semester of 2016, after two successful ministerial conferences, with members coming up with new ideas. About Brexit, potential scenarios are being explored but it seems a lot of renegotiations might be on the United Kingdom’s plate.

    • Copyrights

      • Court Orders News Site Blocked Following Article Piracy

        Blocking torrent and streaming sites is a regular occurrence in many countries but the practice is now extending to other areas. Following a complaint by Russian news site Gazeta, the Moscow City Court has ordered a news portal to be blocked by ISPs after it ‘pirated’ a tourism article.

      • Pirate Bay Founder: The ‘Piracy’ Scene Needs Innovation

        Pirate Bay co-founder Peter Sunde says that the “piracy” scene needs more innovation if it wants to sustain itself. In the wake of the KickassTorrents shutdown, he argues that the current ecosystem relies too heavily on a few large sites. More decentralization is the key to solve this vulnerability.

      • But Wait: Copyright Law Is So Screwed Up, Perhaps The Rolling Stones Are Right That Donald Trump Needed Their Permission

        So for years and years and years, every time a musician or a group whined about politicians using their music at an event, we’d point out that they have no legal basis to complain. Assuming either the venue or the campaign (or both) had the proper blanket licenses from ASCAP/BMI/SESAC no other permission was needed. That’s actually part of the point of the structure of those blanket performance licenses. Everyone recognizes that it would be virtually impossible to play music publicly without such a blanket license structure. And so, every time a musician complains that the use was “unauthorized,” they’re almost certainly wrong. In fact, we pointed that out (again) for the nth time earlier this week. Now, as we’ve said all along, we still think smart politicians and smart campaigns should first seek out musicians who don’t mind (or, better yet, who endorse the candidate), because otherwise they’re just giving someone famous an easy platform to slam them. But, from a legal standpoint, we’ve always pointed out that there’s basically no legitimate argument here, and people who toss around non-copyright theories like publicity rights and Lanham Act arguments are generally wrong.

        But… we forgot about one thing. Copyright law is so screwed up that there actually may be a case where the law does require permission. And it has to do with pre-1972 sound recordings. If you’ve been reading Techdirt for any length of time, you know that we’ve discussed this issue many times in the past. Historically, while compositions were covered by copyright, under the 1909 Copyright Act sound recordings were not. This resulted in a patchwork of state laws (and state commonlaw) that created special forms of copyright at the state level. Eventually, sound recordings were put under federal copyright law, but it only applied to works recorded after February 14, 1972. Works recorded before that are not under federal copyright law, but remain basically the only things under those state copyright laws (the 1976 Copyright Act basically wiped out state copyright laws for everything but that one tiny thing).

07.26.16

The Death of Software Patents and Microsoft’s Coup Against Yahoo! Made the Company Worthless

Posted in America, Microsoft, Patents at 5:23 pm by Dr. Roy Schestowitz

Microsoft has swallowed everything it could from within Yahoo!

“Bartz says search engine Bing unlikely to make significant mark”

MarketWatch (June 2009)

Summary: A look at what happens to companies whose value is a house of software patents rather than code and a broad base of users/customers

QUINN (Watchtroll), who does not know how software works, is actually one of the most vocal proponents of software patents out there. He can also be quite rude when he doesn't get his way. Watch how Watchtroll bemoans being rejected over a bogus software patent application, then calling the process “bogus” (blaming/hating the game, not the player). Benjamin Henrion politely asked him: “Which part of abstract you don’t understand?”

As we have been showing here since 2014, Alice is having a profound effect on software patenting in the US and this new blog post looks into how Alice eliminates software patents (or does not). As one might expect, the legal profession only focuses on the rare cases where software patents somehow survive scrutiny (they hope to replicate the outcome).

“There is so much at stake here (billions if not a trillion dollars across all companies).”Curiously enough — albeit not too shockingly — since Monday morning we have been seeing a lot of articles about the sale of Yahoo! (there were rumours about it over the weekend). Journalists are rewriting the recent history of Yahoo! and omitting the role of Microsoft in killing Yahoo. A few months ago people noted that Alice would significantly reduce the value of Yahoo, but what about the damage caused by Microsoft, reducing the bidding price for the company by almost 90%? This new article titled “Yahoo, Verizon Deal Clears Way for Patent Sale” says that “Yahoo’s sale of its core internet business to Verizon on Monday opens the door for the company’s next major step — the sale of more than 3,000 granted and pending patents covering e-commerce, search and other components of the modern web.”

It also noted that Alice “resulted in many software patents being thrown out. Many top tech firms also already have cross-licensing deals with Yahoo, so a firm purchasing the patents would face barriers to monetizing them.”

One has to wonder how much of their value companies like IBM and Microsoft lost after Alice. There is so much at stake here (billions if not a trillion dollars across all companies). The bubble has burst.

Munich Attack Mentioned by EPO But Not Ansbach

Posted in Europe, Patents at 4:57 pm by Dr. Roy Schestowitz

A militant EPO

Summary: The EPO does the usual right-wing thing (exploiting disaster/emergency for domestic crackdowns), but some bemoan the omission of the explosion at Ansbach (also in Germany)

IT was so obvious that the EPO would mention the attack on Monday. We predicted this over the weekend, having seen Battistelli (personally) milking just about every major incident outside of Germany (especially in France and in one case Belgium, then the US).

“Let us now wait and see whether Mr. Battistelli will express heartfelt sympathy to” Munich, one person wrote, alluding specifically “to the people of the host nation of the EPO headquarters.”

“How very Republican of him.”The “news” item (yes, they filed this under news) came a bit later than usual and it came from the EPO this time, for a change (it did not mention Battistelli, perhaps for the first time ever). It said (warning: epo.org links can be tracked by HTTP_REFERER) not so much and later on this was mentioned in Twitter.

One person says that “Battistelli has belatedly expressed his solidarity with the citizens of Munich.”

“But what about the people of Ansbach? Are they second-class citizens? Does he not care about them?”

Another person writes: “It is well known, several people, perhaps more, have been summoned to the president and told, “You are either for me, or you are against me.” It cannot be accepted, that a civil service career should serve a personality cult, and that threats to career and eventually pensions used as the weapons to enforce that cult. The crash when it comes will be big, unfortunately for those of us who are still trying to apply the EPC, which is in fact our only master.”

Battistelli, as we noted before, is trying to unify the staff around a common cause which is war on terror (“You’re either with us, or against us”). How very Republican of him. Watch what happens in Turkey this month.

Kluwer Thinks People Are Clueless About the Unitary Patent System and Pretends It’s Business as Usual

Posted in Deception, Europe, Patents at 4:32 pm by Dr. Roy Schestowitz

Wolters Kluwer

Summary: Flogging the dead UPC horse at times of great uncertainty (enough to bring the UPC to a standstill)

THE EPO lies not only to journalists but also to staff, as we showed here numerous times before. “The European patent microcosm tries to convince itself that its Unitary Patent castle is not collapsing,” wrote someone who was bullied by the EPO some years ago because he had criticised the UPC (Battistelli's EPO is very legally aggressive towards UPC critics). He links to the latest nonsense from the EPO — nonsense which we rebutted earlier this month.

“What we have here is lobbying and meddling by patent lawyers and other who stand to profit from more litigation in more places.”The Kluwer Patent Blog, one of the biggest pushers of the UPC for a number of years now, still pretends that IP Federation somehow speaks for British businesses, but people should know better. To quote the latest regarding IP Federation: “The IP Federation in the UK is even more adamant. In a position paper published this week, it states that certainty regarding the future should be a prerequisite for further steps by the UK government and parliament: ‘We support the Unitary Patent), and the Unified Patent Court with the UK participating on the current terms, including the location of the branch of the Central Division in London. Without a guarantee of continued UK participation post-Brexit, the UK should not ratify the UPC at present. We consider that ratifying the UPC to bring it into effect and subsequently being forced to leave the system would bring an unacceptable amount of uncertainty to industry across the UK and EU.’”

What we have here is lobbying and meddling by patent lawyers and other who stand to profit from more litigation in more places. Team UPC (people from the inside) is still at it in spite of Brexit, but what will they say when it all fizzles and goes away? Over the past few weeks we saw very little coverage about the UPC (virtually none). It seems like it’s dying or at least put on the ice.

Almost Everything That the Government Accountability Office Says is Applicable to the EPO

Posted in America, Europe, Patents at 4:14 pm by Dr. Roy Schestowitz

Without patent quality, convergence is reached near registration/filing rather than proper examination (but with a hefty price tag)

On quality
I left my bank when it bragged about giving a mortgage to nine out of ten applicants

Summary: The Government Accountability Office in the United States produces reports which can serve as a timely warning sign to the European Patent Office, where patent quality is rapidly declining in order to meet ‘production’ goals

THE USPTO has been scrutinised here for a number of years primarily because of patent quality (or lack thereof). Few people can honestly say that it’s hard to get granted a patent at the USPTO (there are like 10 million of them and one single company like IBM can gain 7,355 patents in just one year). Recent figures suggest that eventually 92% of applications are “successful”, so what kind of quality control is that? Engineers at Sun once joked about how silly an application can be accepted and even competed over this as applicants (to see who gets the stupidest patent claims through the examiners). A lot of granted patents are simply dubious, but small companies would not be able to afford challenging them in court (or it would be a lot more expensive than simply settling).

“When the Government Accountability Office (GAO) asks for improvement in patent quality it also alludes to patent scope and software patents explicitly.”Matt Levy, who habitually complains about patent trolls and even about software patents (in his more recent articles), has just mentioned the US Government Accountability Office's rant about US patent quality (which we first wrote about last week). He says [1, 2] that “[e]ven if you’re not a patent lawyer, you’ve probably noticed that patents have been in the news more. The growing problem of patent trolls, companies who make their money by suing other companies for patent infringement, has been the primary reason. Patent trolls now account for nearly two-thirds of all patent infringement lawsuits, draining billions of dollars away from productive companies.”

According to this article (behind paywall) a “US High Court Restores Treble Damages For Patent Infringement,” which means that things are not necessarily improving.

When the Government Accountability Office (GAO) asks for improvement in patent quality it also alludes to patent scope and software patents explicitly. Benjamin Henrion said that “improving quality does not mean much for the average programmer, just more spam.” Well, in practice, raising the bar may mean that few software patents would be authorised at all (both at the courts and the patent office). That’s definitely a step forward. IBM’s Manny Schecter, a longtime proponent of software patents, was yammering that: “Backlog easy to measure, quality not, but…”

Backlog depends on the number of examiners or the lenience of examination. There are some correlations there and under David Kappos, who had joined from IBM, the USPTO tackled backlog by just granting lots of things faster (basically the same error Battistelli and his goons make at the EPO).

Here is a good article about the GAO report. It says: “The Patent and Trademark Office, at a time of rising lawsuits charging patent infringements, needs to improve quality and better monitor examiners’ work, a watchdog found.

“This is not a sign of innovation. Quite the contrary.”“In a pair of reports and staff survey released on Wednesday, the Government Accountability Office said that patent examiners report being pressed for time as they process patent applications without a consistent and clear definition of quality.

““District court filings of new patent infringement lawsuits increased from about 2,000 in 2007 to more than 5,000 in 2015, while the number of defendants named in these lawsuits increased from 5,000 to 8,000 over the same period,” GAO wrote in one report addressing quality in intellectual property protections.”

This is not a sign of innovation. Quite the contrary. A patent trolls expert (he conducted academic studies on the subject), Professor James Bessen, said: “The GAO finds Patent Office issues 1000s of “unclear & overly broad” patents, causing excessive litigation” (“Stop issuing Software Patents & there wouldn’t be a backlog” was one response to this).

“Most disputes concern new computer technology and software,” according to another new article about the GAO study/reports. Just like in the EPO, the US office is “focusing too much on the timeliness of reviews, customer service and “process or production goals” rather than quality.”

It’s added that “[e]xaminers are rated largely on their production, auditors said, and they are given different times” and “GAO recommended that the agency define what is a good patent, update its performance goals for reviewers” (the same should be done at the EPO).

Microsoft Says It Loves Linux, But Its Anti-Linux Patent Trolls Are Still Around and Active

Posted in GNU/Linux, Google, Microsoft, Patents at 3:26 pm by Dr. Roy Schestowitz

Rockstar Consortium

Summary: Highlighting just two of the many entities that Microsoft (and partners) use in order to induce additional costs on Free (as in freedom) software

AN article from exactly 5 years ago spoke about Intellectual Ventures, Microsoft’s largest patent troll. To quote the outline from BoingBoing: “NPR’s Planet Money looks at Intellectual Ventures, the patent-exploitation firm started by former Microsoft CTO Nathan Myhrvold. Intellectual Ventures presents itself as a firm that goes to bat for inventors, buying up their patents with the intention of getting big guys who abuse them to pay up. But the reality discovered by Planet Money is very different: Intellectual Ventures doesn’t put up very many compelling reference customers for their “protecting and enriching inventors” mandate, but there are examples of patents being sold on again to out-and-out trolls who make nothing but lawsuits, using shaky patents to attack big and small firms and extract rent from them. It appears there’s even a town in Texas where empty office buildings house the “headquarters” of shell companies who buy poor-quality patents from distressed companies and get big judgements from a sympathetic local court. Overall, Planet Money paints a picture of software patent aggregators like IV as parasitic bullies who use their enormous patent portfolios to intimidate other firms into paying fees that end up being incorporated into the prices that you and I pay when we buy goods and services.”

Well, Intellectual Ventures is still being treated so favourably by IAM, which receives money from patent trolls and sets up events for them. Today it said that “a slowdown in buying activity at Intellectual Ventures (IV) has been highlighted as having had a substantial impact on Transpacific’s income.”

Layoffs at Intellectual Ventures have been mentioned over the past couple of years, but as Intellectual Ventures is not Microsoft’s only weapon we can look further into another new IAM article which says: “Recently published research has shed new light on the strategies employed by the world’s three leading sovereign patent funds (SPFs) – while discussion about the creation of similar entities in other countries appears to be picking up.”

Towards the end it says that “$4.5 billion eventually paid for it by the Rockstar consortium,” which is a Microsoft-connected patent troll we wrote about in past years. This is the troll which already targets Android/Linux with lawsuits [1, 2, 3, 4], just as Intellectual Ventures did (albeit less directly).

Links 26/7/2016: Microsoft Growing Desperate, Linux 4.8 Visions

Posted in News Roundup at 2:34 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • Last gasp: Microsoft updates Get Windows 10 nagster, KB 3035583, yet again

      With nine days to go, Microsoft really, really wants you to claim your free upgrade to Windows 10. Come to think of it, Microsoft has really, really wanted you to upgrade your Windows 7 or 8.1 PC to Windows 10 for more than a year, and backed it with the GWX subsystem — first installed by KB 3035583 in March 2015, 15 months ago.

  • Server

    • Open Source Docker Monitoring & Logging

      Docker is growing by leaps and bounds, and along with it, its ecosystem. Being light, the predominant container deployment involves running just a single app or service inside each container. Most software products and services are made up of at least several such apps/services. We all want all our apps/services to be highly available and fault tolerant. Thus, Docker containers in an organization quickly start popping up like mushrooms after the rain. They multiply faster than rabbits.While, in the beginning, we play with them like cute little pets, as their numbers quickly grow we realize we are dealing with a herd of cattle, implying we’ve become cowboys. Managing a herd with your two hands, a horse, and a lasso will only get you so far. You won’t be able to ride after each and every calf that wonders in the wrong direction. To get back to containers from this zoological analogy—operating so many moving pieces at scale is impossible without orchestration—this is why we’ve seen the rise of Docker Swarm, Kubernetes, Mesos, CoreOS, RancherOS, and so on.

    • DevOps: A Pillar of Modern IT Infrastructure

      A massive transformation is underway in the way we manage IT infrastructure. More companies are looking for improved agility and flexibility. They are moving from traditional server stacks to cloudy infrastructure to support a new array of applications and services that must be delivered at breakneck pace in order to remain competitive.

    • The one big change in IT

      Yet Bob does not believe the devops hammer should be used on anything that looks remotely like a nail. Accounting systems, supply chain management systems, warehouse management systems, and so on do not benefit from the constant modification enabled by devops. Those are bound by precise, interlocking processes along with granular permissions and regulations. Here, continuous change invites disaster of the type that ITIL-huggers and OCM (organizational change management) proponents fear most.

  • Kernel Space

  • Applications

    • Conversation With Jonathan Thomas of OpenShot

      I think my initial fascination with Linux was based on rebuilding all my old, broken computers laying around my office/garage. I was having a ton of fun, pulling components out of old computers, installing various distros and seeing what worked/didn’t work. And then there was the 3D desktop cube, which was pretty awesome! Pretty soon I had built my kids their own computer, with “safe” web-browsing, education games, etc. It was many months of playing around with Linux before I learned about Python and started slowly getting more into the programming side of things.

    • OpenVZ 7.0 Becomes A Complete Linux Distribution, Based On VzLinux

      OpenVZ, a long-standing Linux virtualization technology and similar to LXC and Solaris Containers, is out with their major 7.0 release.

      OpenVZ 7.0 has focused on merging the OpenVZ and Virtuozzo code-bases along with replacing their own hypervisor with that of Linux’s KVM. Under OpenVZ 7.0, it has become a complete Linux distribution based upon VzLinux.

    • OpenVZ 7.0 released

      I’m pleased to announce the release of OpenVZ 7.0. The new release focuses on merging OpenVZ and Virtuozzo source codebase, replacing our own hypervisor with KVM.

    • Announcing git-cinnabar 0.4.0 beta 2

      Git-cinnabar is a git remote helper to interact with mercurial repositories. It allows to clone, pull and push from/to mercurial remote repositories, using git.

    • FreeIPA Lightweight CA internals

      In the preceding post, I explained the use cases for the FreeIPA lightweight sub-CAs feature, how to manage CAs and use them to issue certificates, and current limitations. In this post I detail some of the internals of how the feature works, including how signing keys are distributed to replicas, and how sub-CA certificate renewal works. I conclude with a brief retrospective on delivering the feature.

    • Lightweight Sub-CAs in FreeIPA 4.4

      Last year FreeIPA 4.2 brought us some great new certificate management features, including custom certificate profiles and user certificates. The upcoming FreeIPA 4.4 release builds upon this groundwork and introduces lightweight sub-CAs, a feature that lets admins to mint new CAs under the main FreeIPA CA and allows certificates for different purposes to be issued in different certificate domains. In this post I will review the use cases and demonstrate the process of creating, managing and issuing certificates from sub-CAs. (A follow-up post will detail some of the mechanisms that operate behind the scenes to make the feature work.)

    • RcppArmadillo 0.7.200.2.0

      The second Armadillo release of the 7.* series came out a few weeks ago: version 7.200.2. And RcppArmadillo version 0.7.200.2.0 is now on CRAN and uploaded to Debian. This followed the usual thorough reverse-dependecy checking of by now over 240 packages using it.

      For once, I let it simmer a little preparing only a package update via the GitHub repo without preparing a CRAN upload to lower the update frequency a little. Seeing that Conrad has started to release 7.300.0 tarballs, the time for a (final) 7.200.2 upload was now right.

      Just like the previous, it now requires a recent enough compiler. As g++ is so common, we explicitly test for version 4.6 or newer. So if you happen to be on an older RHEL or CentOS release, you may need to get yourself a more modern compiler. R on Windows is now at 4.9.3 which is decent (yet stable) choice; the 4.8 series of g++ will also do. For reference, the current LTS of Ubuntu is at 5.4.0, and we have g++ 6.1 available in Debian testing.

    • Instructionals/Technical

    • Games

      • Stardew Valley is now in beta for Linux

        The Stardew Valley developer tweeted out a password for a beta, but after discussing it with them on their forum I was able to show them that we can’t actually access it yet.

        While what I was telling them may not have been entirely correct (SteamDB is confusing), the main point I made was correct. Normal keys are not able to access the beta yet, but beta/developer keys can, as it’s not currently set for Linux/Mac as a platform for us.

      • Physics-based 3D puzzler Human: Fall Flat released on Steam for Linux

        Human: Fall Flat is an open-ended physics puzzler with an optional local co-op mode, developed by No Brakes Games, and available now on Steam for Linux.

      • 7 Mages brings a touch more of traditional dungeon crawling to Linux

        Controlling a party of adventurers, exploring dungeons and fighting weird magical creatures is an RPG tradition as old as the genre. Expect all that and more in this modern iteration of the classical dungeon crawler.

  • Desktop Environments/WMs

    • NWM: An X11 Window Manager Written In Node.js

      In case you ever wanted to have a Node.js window manager, there’s now one that works for X11 environments that works on Chrome OS, Debian, and friends.

    • K Desktop Environment/KDE SC/Qt

    • GNOME Desktop/GTK

      • Bringing your kids to GUADEC 2016
      • GNOME Keysign – Report #2 GSoC 2016

        More than a week ago I blogged about the new GUI made with GtkBuilder and Glade [1]. Now, I will talk about what has changed since then with the GUI and also the new functionality that has been added to it.

        I will start with the new “transition” page which I’ve added for the key download phase. Before going more in depth, I have to say that the app knows at each moment in what state it is, which really helps in adding more functionality.

  • Distributions

    • Chakra GNU/Linux Users Get KDE Plasma 5.7.2, Qt 5.7 and KDE Applications 16.04.3

      Chakra GNU/Linux developer Neofytos Kolokotronis today, July 25, 2016, announced the release of the latest KDE and Qt technologies, along with new software versions in the main repositories of the Linux kernel-based operating system.

    • Reviews

      • Point Linux 3.2

        Point Linux released their newest version, 3.2, in June 2016. Their goal is, “To combine the power of Debian GNU/Linux with the productivity of MATE, the GNOME 2 desktop environment fork. Point Linux provides an easy-to-set-up-and-use distribution for users looking for a fast, stable and predictable desktop.”

        Point Linux aims to use MATE as their primary desktop environment, but also offers Xfce as an option. The Point Linux website is simple and professional. The download page is full of fresh and very nice options that allow the user to download the exact distro they require to fit their needs. Some of the options include 32- or 64-bit, torrent or direct download, and the location of the download server. I found using the website was effortless and the options available cut down on the download time (by giving the option to torrent or the location of the server) and lowered the install time by giving the consumer options before retrieving the whole file.

        The MATE desktop environment (DE) is available in the standard Debian installation media, but the full Debian installer image is 4.7GB, overwhelmingly large, and has too many DE options to make the disc any smaller. This is the small void that Point Linux fills. They provide the MATE desktop environment (or Xfce) and a significantly smaller live OS / installation media. Even when selecting the full featured desktop from the options on their website, the Point Linux installer is only 1.00GB. The “Desktop with core components” option lowers this installation media size further to 772MB.

    • PCLinuxOS/Mageia/Mandriva Family

    • OpenSUSE/SUSE

      • Introducing: openSUSE heroes

        During the last weeks, the openSUSE board and others expressed their concern about the current state of some openSUSE infrastructure: especially the reaction times to change something in the setup were mentioned multiple times. Looks like we lost some administrators and/or contact points at SUSE who helped out in the past to eliminate problems or work together with the community.

        As result, there was a meeting held during the openSUSE Conference 2016, including some SUSE employees and openSUSE community members to discuss the current situation and search for some possible solutions. The discussion was very fruitful and we’d like to share some of the results here to inform everyone and actively ask for help. If you want to join us, the openSUSE heroes, do not hesitate to contact us and join an incredible team!

    • Slackware Family

      • The saga continues with Slackware 14.2

        Slackware is the oldest surviving Linux distribution and has been maintained since its birth by Patrick Volkerding. Slackware has a well deserved reputation for being stable, consistent and conservative. Slackware is released when it is ready, rather than on a set schedule, and fans of the distribution praise its no-frills and no-fuss design. Slackware adheres to a “keep it simple” philosophy similar to Arch Linux, in that the operating system does not do a lot of hand holding or automatic configuration. The user is expected to know what they are doing and the operating system generally stays out of the way. The latest release of Slackware, version 14.2, mostly offers software updates and accompanying hardware support. A few new features offer improved plug-n-play support for removable devices and this release of Slackware ships with the PulseAudio software. PulseAudio has been commonly found in the audio stack of most Linux distributions for several years, but that is a signature of Slackware: adding new features when they are needed, not when they become available. In this case PulseAudio was required as a dependency for another package.

        Slackware 14.2 is available in 32-bit and 64-bit builds for the x86 architecture. There is also an ARM build. While the main edition of Slackware is available as an installation disc only, there is a live edition of Slackware where we can explore a Slackware-powered desktop environment without installing the distribution. The live edition can be found on the Alien Base website. Both the live edition and the main installation media are approximately 2.6GB in size. For the purposes of this review I will be focusing on the main, installation-only edition.

        Booting from the install media brings us to a text screen where we are invited to type in any required kernel parameters. We can press the Enter key to take the default settings or wait two minutes for the media to continue booting. A text prompt then offers to let us load an alternative keyboard layout or use the default “US” layout. We are then brought to a text console where a brief blurb offers us tips for setting up disk partitions and swap space. The helpful text says we can create partitions and then run the system installer by typing “setup”.

    • Red Hat Family

      • Finance

      • Fedora

        • Fedora 24: systemd-analyze

          I am still searching for an explanation, but Google searches are not turning up much that is useful. In the end it is curiosity more than something that is actually impacting me as I am able to start working long before systemd-analyze is capable of giving me results and certainly it is not taking 1 minute and 30 seconds for the computer to boot. In fact, when I timed the boot it only took 18.5 seconds for me to get to the desktop.

        • It’s Time to Upgrade to Fedora 24 Linux If You’re Still Using Fedora 22

          Fedora Program Manager Jan Kurik announced that the Fedora 22 Linux operating system officially reached end of life on July 19, 2016, urging users to upgrade to either the Fedora 23 or Fedora 24.

          Of course, this is not the first time we inform our readers about the end of life (EOL) support for the Fedora 22 GNU/Linux distribution, but just in case you haven’t noticed our previous story, and you’re still using Fedora 22 on your personal computers or servers, it’s time to upgrade to a newer release immediately.

        • Blivet-gui 2.0
        • FISL17

          Ana Mativi, Rino (@Villadalmine), Itamar Jp, Ezequiel (QliXed) Brizuela, Bruno R. Zanuzzo, Eduardo Echeverria, Junior Wolnei e Daniel Lara. I personally knew only two of those people so it’s nice to see new faces behind the nicknames.

        • Looking forward to flock 2016

          Just over one week until flock ( https://flocktofedora.org ), Fedora’s main yearly conference. This time it’s in Kraków, Poland. This of course means a long time traveling for myself and other North American Fedorans, but it’s always well worth it.

        • PreLinuxDay: Talk about Fedora QA and L10N

          Linux Day is a global celebration of Linux. According to the event site, there is currently 9 teams in 5 countries. One of these teams is from my country, Panama. The responsible of doing this is Jose Reyes, our newest Panamanian Fedora Ambassador.

        • Final phase

          Last week I finished up the prototype for the release widget fully and started coding the calendar widget monthly view and weekly view. So far the implementation consists of the main view and weekly view (link). I am hoping to finish this by Monday evening and concentrate on prototyping the empty state widget.

        • Reworking Docs

          In May of this year the docs team, with the help of some great folks from Red Hat and the CentOS project held a Documentation FAD. During that event we discussed a lot of important topics including the docs team’s publishing toolchain, and the barrier to entry that is docbook.

        • Korora 23 – is it an alternative to Linux Mint?

          Cinnamon is a desktop environment that is widely promoted by the Linux Mint team. Linux Mint Cinnamon is their flagship distribution. In its turn, Linux Mint is a leader in the world of Linux distributions, especially for the newbie-oriented part of it. Unfortunately, the recent release of Linux Mint 18 made things worse, and many Linux bloggers wrote about this.

          There was a comment on my recent post about Linux Mint 18 Cinnamon that asked me to look into the Korora distribution.

        • Check out these Korora Wallpapers
        • Slack 14.2 & Korora 23 Reviewed, Distros for Average Joe

          Jesse Smith reviewed Slackware 14.2 in today’s Distrowatch Weekly, saying it was stable as always if a bit dated topping Monday’s Linux news. Elsewhere, The Everyday Linux User listed his top five distributions for the “everyday Linux user” and DarkDuck test drove Korora 23 Live. Christine Hall gave Mint 18 a solid meh and OpenBSD kicked Linux to the curb.

        • Korora 24 “Sheldon” Linux Is Available Only for 64-bit PCs, Based on Fedora 24

          After a long wait, the Korora 24 GNU/Linux distribution has been released, based, as its version number suggests, on many of the technologies included in the popular Fedora 24 operating system.

        • Dale Raby: How do you Fedora?

          Dale started using Linux around 1999 when he became disconcerted with his Windows 95 computer and a young clerk in an office supply store told him about Linux. “I started reading some of the magazines, most notably Maximum Linux and eventually got to know their senior editor, Woody Hughes and Show Me the Code columnist Mae Ling Mak,” said Raby. His first distribution was Mandrake 6.5 which came in a box with a boot floppy.

          Raby manages a small gun shop in Green Bay, Wisconsin. He is also an author with four published books: The Post-Apocalyptic Blacksmith, 777 Bon Mots for Gunslighers and Other Real Men, The Wives of Jacob I, and In the Beginning.

        • Lennart Poettering Announces systemd 231 Init System for GNU/Linux Distributions

          Today, July 25, 2016, systemd creator Lennart Poettering has proudly announced the release and general availability of the systemd 231 init system for major GNU/Linux OSes.

          Bringing lots of fixes and numerous additions, systemd 231 is now the most advanced version of the modern and controversial init system that has been adopted in the last few years by more and more Linux kernel-based operating systems, including Fedora, Ubuntu, Arch Linux, openSUSE, Red Hat Enterprise Linux, and many others.

        • Systemd 231 Officially Released
        • systemd 231
        • New Taskotron Tasks

          For a while now, we, Fedora QA, have been busy with building Taskotron core features and didn’t have much resources for additions to the tasks that Taskotron runs. That changed a few weeks back when we started running task-dockerautotest, task-abicheck and task-rpmgrill tasks in our dev environment. Since we have been happy with the results of having run those tasks, we deployed them to the production instance as well last week. Please note that the results of those tasks are informative only. Lets introduce the tasks briefly:

    • Debian Family

      • Debian LGBTIQA+

        I have a long overdue blog entry about what happened in recent times. People that follow my tweets did catch some things. Most noteworthy there was the Trans*Inter*Congress in Munich at the start of May. It was an absolute blast. I met so many nice and great people, talked and experienced so many great things there that I’m still having a great motivational push from it every time I think back. It was also the time when I realized that I in fact do have body dysphoria even though I thought I’m fine with my body in general: Being tall is a huge issue for me. Realizing that I have a huge issue (yes, pun intended) with my length was quite relieving, even though it doesn’t make it go away. It’s something that makes passing and transitioning for me harder. I’m well aware that there are tall women, and that there are dedicated shops for lengthy women, but that’s not the only thing that I have trouble with. What bothers me most is what people read into tall people: that they are always someone they can lean on for comfort, that tall people are always considered to be self confident and standing up for themselves (another pun, I know … my bad).

      • [GSOC] Week 8&9 Report

        This particular week has been tiresome as I did catch a cold ;). I did come back from Cape Town where debconf taking place. My arrival at Montreal was in the middle of the week, so this week is not plenty of news…

      • Debian on Jetson TK1

        I became interested in running Debian on NVIDIA’s Tegra platform recently. NVIDIA is doing a great job getting support for Tegra upstream (u-boot, kernel, X.org and other projects). As part of ensuring good Debian support for Tegra, I wanted to install Debian on a Jetson TK1, a development board from NVIDIA based on the Tegra K1 chip (Tegra 124), a 32-bit ARM chip.

      • RC bugs 2016/01-29
      • Derivatives

        • Canonical/Ubuntu

          • Women In Tech: Jane Silber, CEO Of Canonical

            When I sat down to interview Jane Silber, CEO of Canonical, I don’t think it was lost on either of us that our ability to chat freely even though I was in my office in the middle of the U.S. and she was in her office in London, England had everything to do with cloud computing, an area in which her company does brisk business.

            Silber has been running Canonical (maker of Ubuntu, among a great many other software products) in one form or another for well over a decade at this point, first as COO and now CEO. She answers questions thoughtfully, with carefully chosen words; even though I’m sure I’m not the first journalist to ask her some of the below questions (maybe not even the first one this week), she had no canned responses, and she never veered off course to discuss her own agenda. There were no preset talking points; simply, I asked questions, and she answered them.

          • Flavours and Variants

  • Devices/Embedded

Free Software/Open Source

  • Wal-Mart Proves Open Source Is Big Business
  • Keeping the FCC and Open Source Happy

    The FCC is worried. You and they spend all this time and energy getting your radio certified, and then some bozo hacks in, changes how the radio works, and puts you out of spec.

    And so, back in early 2015, the FCC issued some guidelines or questions regarding WiFi devices – particularly home routers – in an effort to ensure that your radio isn’t hackable.

    The result has been that some router makers have simply locked down the platform so that it’s no longer possible to do after-market modifications, and this has caused an outcry by after-market modifiers. The reason why it’s an issue is that these open-source developers have used the platform for adding apps or other software that, presumably, have nothing to do with the radio.

    In an attempt to find the magic middle way, the prpl organization, headed by Imagination Technologies (IMG) and featuring the MIPS architecture, recently put out a proof of concept that they say gives both assurance to the FCC and freedom to open-source developers.

    Questions from the FCC

  • Wire open-sources messaging client, woos developers

    Communications startup Wire has open-sourced the full codebase for its Wire app, so it’s easier for developers to build their own encrypted messaging clients.

    Wire open-sourced the rest of the client base that wasn’t initially publicly available, including components related to the user interface, the web and native clients, and some internal developer tools. The company always planned to open-source the codebase, but didn’t start out that way initially “because we were still working on other features,” Alan Duric, co-founder and CTO of Wire, wrote in a Medium post.

  • Events

  • Web Browsers

    • Mozilla

      • Servo Is Planning For More GPU-Accelerated WebRender Improvements

        As mentioned in today’s This Week in Servo newsletter, their Q3 roadmap plans have been published.

        Among the work to be tackled by Mozilla developers working on the next-generation Servo layout engine this quarter includes finishing the development of WebRender, experiments around WebRender 2, Stylo as the sryle system in Gecko integration work, and continuing with the Servo nightly builds support. There’s also work around Promise API, Autolander migration, Android work, auto-updating, JavaScript error reporting, Web Font loading, performance improvements, correcting more layout bugs, etc. You can see the current road-map via this GitHub page.

      • What Happens to Mozilla and its Deal with Yahoo?

        In late 2014, many observers were flummoxed to see that Yahoo and Mozilla had announced a “strategic five-year partnership” agreement which would make Yahoo the primary search option for Firefox. Mozilla was up for renewal negotiations for its deal with Google, which had historically subsidized more than 90 percent of Mozilla’s revenues, to the tune of more than $300 million per year at times. In return, for lots of money, Google got primary search placement in the Firefox browser over the years.

        Last week, though, Verizon,announced its intention to purchase Yahoo for $4.8 billion. What are the implications for Mozilla and its deal? Here are the details.

  • SaaS/Back End

  • Pseudo-Open Source (Openwashing)

  • BSD

  • Openness/Sharing/Collaboration

    • Open Data

      • Austria awards ‘Open Data Oscars’

        Last month, the Austrian State Secretary Muna Duzdar handed out the ‘Oscars of the Open Data Community’. The awards were part of the ‘open4data.at challenge 2016′ organised earlier this year. The annual challenge aims to bring open data and ideas together in innovative and creative solutions.

      • Open data platform on Emilia-Romagna reconstruction

        After the two earthquakes that caused multiple casualties and widespread damage in the Italian region of Emilia-Romagna in 2012, multiple programmes were launched to reconstruct the affected areas. To make these efforts more transparent, a team from the Gran Sasso Science Institute last week presented an Open Data platform that will provide all information on who is responsible, which company is doing what, and how the money is being spent.

        The ‘Open Data Ricostruzione’ initiative was presented last week at the Italian Festival of Participation. The platform will bring together all the numbers, figures and information on the reconstruction, and allow visitors to visualise, filter, track and map the available data. All information will be made available as open data, in the original database format as well as JSON.

    • Open Access/Content

      • Open is the solution to improving 21st century education

        Much of the Internet runs Linux and open source software, yet in most of our schools—whether PK-12 or higher education—Linux and open source software are given short shrift.

        Linux has made serious inroads on hand-held devices, the desktop, and the Internet of things (IoT) that use platforms such as Raspberry Pi, Galileo, and Arduino. Despite this astounding growth, a relatively small number of secondary and post-secondary schools offer technology training that prepares students for increasingly in-demand technical skills. The growth of the maker movement and the concurrent interest in STEM skills, which include coding and ethical hacking, may provide a much-needed impetus to change this trend.

    • Open Hardware/Modding

      • AArch64 desktop hardware?

        Soon there will be four years since I started working on AArch64 architecture. Lot of software things changed during that time. Lot in a hardware too. But machines availability still sucks badly.

        In 2012 all we had was software model. It was slow, terribly slow. Common joke was AArch64 developers standing in a queue for 10GHz x86-64 cpus. So I was generating working binaries by using cross compilation. But many distributions only do native builds. In models. Imagine Qt4 building for 3-4 days…

        In 2013 I got access to first server hardware. With first silicon version of CPU. Highly unstable, we could use just one core etc. GCC was crashing like hell but we managed to get stable build results from it. Qt4 was building in few hours now.

      • RISC-V on an FPGA, pt. 1

        Last year I had open source instruction set RISC-V running Linux emulated in qemu. However to really get into the architecture, and restore my very rusty FPGA skills, wouldn’t it be fun to have RISC-V working in real hardware.

        The world of RISC-V is pretty confusing for outsiders. There are a bunch of affiliated companies, researchers who are producing actual silicon (nothing you can buy of course), and the affiliated(?) lowRISC project which is trying to produce a fully open source chip. I’m starting with lowRISC since they have three iterations of a design that you can install on reasonably cheap FPGA development boards like the one above. (I’m going to try to install “Untether 0.2” which is the second iteration of their FPGA design.)

      • RISC-V on an FPGA, pt. 2
      • RISC-V on an FPGA, pt. 3
      • RISC-V on an FPGA, pt. 4
      • RISC-V on an FPGA, pt. 5

Leftovers

  • Hardware

    • In Memoriam: The VCR, 1956 – 2016

      The future was closer than ever with the hip-sounding Sony U-matic, which came on the market in 1971. It could fast-forward and rewind! Then the Philips VCR, made available to consumers in 1972, changed the game with its first model, the N1500, that incorporated all the best qualities of recorders that came before it. There were basic controls — the play, pause, fast-forward, and rewind buttons — plus a clock with a timer, so you could record shows when you weren’t even home.

  • Health/Nutrition

    • The Porn ‘Public Health Crisis’ Has Competition

      With all the protests, plagiarism allegations, and literal smoke that swirled around the Republican National Convention, it’s easy to forget about the drier parts—like approving the 2016 GOP platform. But you should probably read it, because more than any word salad Duck Dynasty dude or Scott Baio might have to offer, the Republican platform indicates the GOP grownup’s actual priorities. Same deal with the Democratic platform, passed on the first day of the Democratic National Convention.

      One of the Republican platform’s buzziest stances is that pornography “has become a public health crisis that is destroying the lives of millions.” Not that porn can’t be sleazy and problematic. But a crisis of public health? Like, say, Zika? Or opioid addiction? Or, you know, cancer?

    • Swift Decision On Plain Packaging At WTO Unlikely; Ukraine Drops Out

      As the list of countries adopting legislation making the packaging of tobacco products a lot less sexy is growing, the long-awaited decision of a World Trade Organization panel on Australia’s decision to enforce such legislation might not be coming before the end of the year. Meanwhile, one of the countries complaining about Australia’s legislation has left the fight.

    • Officials Discuss Meeting Global Fund Target Of US$13B

      As the fund to help the world’s most suffering prepares for a conference hosted by Prime Minister Justin Trudeau and the government of Canada in September to raise US$13 billion for its 2017-2019 period, the prospect of failing to meet the target is unsettling for the civil society and the health community.

    • The U.S. Blew $1.4 Billion on Abstinence Education in Africa

      That is the amount of money the U.S. spent over a 10-year period from 2004 through 2013 promoting abstinence before marriage as a way of preventing HIV in 14 countries in sub-Saharan Africa. Unfortunately, according to the most comprehensive independent study conducted to date of the effort, the money was more or less wasted. A rigorous comparison of national data from countries that received abstinence funding under the U.S. President’s Emergency Plan for AIDS Relief (PEPFAR) with those that got none of the funding showed no difference in the age of first sexual experience or in the number of sexual partners or teenage pregnancies—all aspects of behaviors that have been linked to a higher risk of becoming infected with HIV.

    • Abortion and contraception in India: the role of men

      The callous attitude of Indian men that ‘she can always abort’ in cases of an unwanted pregnancy caused by failure to use a condom needs to be tackled at the root.

  • Security

    • Security advisories for Monday
    • EU to Give Free Security Audits to Apache HTTP Server and Keepass

      The European Commission announced on Wednesday that its IT engineers would provide a free security audit for the Apache HTTP Server and KeePass projects.

      The EC selected the two projects following a public survey that took place between June 17 and July 8 and that received 3,282 answers.

      The survey and security audit are part of the EU-FOSSA (EU-Free and Open Source Software Auditing) project, a test pilot program that received funding of €1 million until the end of the year.

    • What is your browser really doing?

      While Microsoft would prefer you use its Edge browser on Windows 10 as part of its ecosystem, the most popular Windows browser is Google’s Chrome. But there is a downside to Chrome – spying and battery life.

      It all started when Microsoft recently announced that its Edge browser used less battery power than Google Chrome, Mozilla Firefox or Opera on Windows 10 devices. It also measured telemetry – what the Windows 10 device was doing when using different browsers.

      What it found was that the other browsers had a significantly higher central processing unit (CPU), and graphics processing unit (GPU) overhead when viewing the same Web pages. It also proved that using Edge resulted in 36-53% more battery life when performing the same tasks as the others.

      Let’s not get into semantics about which search engine — Google or Bing — is better; this was about simple Web browsing, opening new tabs and watching videos. But it started a discussion as to why CPU and GPU usage was far higher. And it relates to spying and ad serving.

    • Is Computer Security Becoming a Hardware Problem?

      In December of 1967 the Silver Bridge collapsed into the Ohio River, killing 46 people. The cause was determined to be a single 2.5 millimeter defect in a single steel bar—some credit the Mothman for the disaster, but to most it was an avoidable engineering failure and a rebuttal to the design philosophy of substituting high-strength non-redundant building materials for lower-strength albeit layered and redundant materials. A partial failure is much better than a complete failure.

      [...]

      In 1996, Kocher co-authored the SSL v3.0 protocol, which would become the basis for the TLS standard. TLS is the difference between HTTP and HTTPS and is responsible for much of the security that allows for the modern internet. He argues that, barring some abrupt and unexpected advance in quantum computing or something yet unforeseen, TLS will continue to safeguard the web and do a very good job of it. What he’s worried about is hardware: untested linkages in digital bridges.

    • Your Smart Robot Is Coming in Five Years, But It Might Get Hacked and Kill You

      A new report commissioned by the Department of Homeland Security forecasts that autonomous artificially intelligent robots are just five to 10 years away from hitting the mainstream—but there’s a catch.

      The new breed of smart robots will be eminently hackable. To the point that they might be re-programmed to kill you.

      The study, published in April, attempted to assess which emerging technology trends are most likely to go mainstream, while simultaneously posing serious “cybersecurity” problems.

      The good news is that the near future is going to see some rapid, revolutionary changes that could dramatically enhance our lives. The bad news is that the technologies pitched to “become successful and transformative” in the next decade or so are extremely vulnerable to all sorts of back-door, front-door, and side-door compromises.

    • Trump, DNC, RNC Flunk Email Security Test

      At issue is a fairly technical proposed standard called DMARC. Short for “domain-based messaging authentication reporting and conformance,” DMARC tries to solve a problem that has plagued email since its inception: It’s surprisingly difficult for email providers and end users alike to tell whether a given email is real – i.e. that it really was sent by the person or organization identified in the “from:” portion of the missive.

    • NIST Prepares to Ban SMS-Based Two-Factor Authentication

      The US National Institute of Standards and Technology (NIST) has released the latest draft version of the Digital Authentication Guideline that contains language hinting at a future ban on SMS-based Two-Factor Authentication (2FA).

      The Digital Authentication Guideline (DAG) is a set of rules used by software makers to build secure services, and by governments and private agencies to assess the security of their services and software.

      NIST experts are constantly updating the guideline, in an effort to keep pace with the rapid change in the IT sector.

    • 1.6m Clash of Kings forum accounts ‘stolen’

      Details about 1.6 million users on the Clash of Kings online forum have been hacked, claims a breach notification site.

      The user data from the popular mobile game’s discussion forum were allegedly targeted by a hacker on 14 July.

      Tech site ZDNet has reported the leaked data includes email addresses, IP addresses and usernames.

    • Hacker steals 1.6 million accounts from top mobile game’s forum [Ed: vBulletin is proprietary software -- the same crap Canonical used for Ubuntu forums]
    • Tuesday’s security updates
    • Oops: Bounty-hunter found Vine’s source code in plain sight

      A bounty-hunter has gone public with a complete howler made by Vine, the six-second-video-loop app Twitter acquired in 2012.

      According to this post by @avicoder (Vjex at GitHub), Vine’s source code was for a while available on what was supposed to be a private Docker registry.

      While docker.vineapp.com, hosted at Amazon, wasn’t meant to be available, @avicoder found he was able to download images with a simple pull request.

    • US standards lab says SMS is no good for authentication

      America’s National Institute for Standards and Technology has advised abandonment of SMS-based two-factor authentication.

      That’s the gist of the latest draft of its Digital Authentication Guideline, here. Down in section 5.1.3.2, the document says out-of-band verification using SMS is deprecated and won’t appear in future releases of NIST’s guidance.

  • Defence/Aggression

    • Exclusive: MH370 Pilot Flew a Suicide Route on His Home Simulator Closely Matching Final Flight

      New York has obtained a confidential document from the Malaysian police investigation into the disappearance of Malaysia Airlines Flight 370 that shows that the plane’s captain, Zaharie Ahmad Shah, conducted a simulated flight deep into the remote southern Indian Ocean less than a month before the plane vanished under uncannily similar circumstances. The revelation, which Malaysia withheld from a lengthy public report on the investigation, is the strongest evidence yet that Zaharie made off with the plane in a premeditated act of mass murder-suicide.

    • Japan Knife Attack Kills 19 at Center for Disabled

      A former employee of a center for the disabled in a Tokyo suburb broke into the building and killed 19 people with a knife early Tuesday, local officials said.

      The suspect, Satoshi Uematsu, 26, went on a rampage around 2:20 a.m. in Sagamihara, a town an hour west of Tokyo, according to the authorities in Kanagawa Prefecture. Twenty-five people were reported wounded, all but one of them seriously.

      Just half an hour after the attack, Mr. Uematsu turned himself in at a nearby police station and was charged with attempted murder. Additional charges were expected. The attack was the worst mass killing in Japan in decades. The country has one of the lowest crime rates in the world.

    • Defeating Islamic Terrorism. Here’s How…

      As terrorism struck again in Nice and Germany and… Donald Trump outlined his policy against Islamic State: as president, he will seek a full declaration of war from Congress, the first such formal invocation since Pearl Harbor.

      Trump was short on specifics but very clear he would take the strategies of the post-9/11 era into a presidency. Clinton, for her part, intends on “intensifying the current air campaign [and] stepping up support for local forces on the ground.” Their French counterpart, President Francois Hollande, declared “We will continue striking those who attack us on our own soil.”

    • Doctors in Danger: How the Assad Regime is Targeting Syrian Physicians

      In Syria’s civil war, it’s dangerous to even treat the wounded. Since the beginning of the civil war, the Syrian government has killed hundreds of medical personnel, and dozens of doctors have been assassinated by ISIS. The few doctors who dare to treat the casualties have been forced to work in secret.

      In his piece for the New Yorker, journalist Ben Taub profiles some of the underground community of health providers, documenting how they’re keeping clinics open and preserving medical knowledge, despite the risk of violence from both President Bashar al-Assad’s regime and ISIS.

    • The Atlantic Council: The Marketing Arm of the Military/Security Complex

      The sales pitch is titled “Arming For Deterrence.” The Kremlin is unpredictable, say the arms salesmen, and could at any moment decide to attack Poland. However the Russian regime “respects a show of force” and would back down if Poland has a sufficient inventory of US weapons.

      The sales pitch encourages Poland to take many aggressive and dangerous steps toward Russia, such as targeting Russia cities and facilities including RT. But before provoking the Bear like this, Poland needs “to join the tactical nuclear capability scheme within NATO, so enabling its F-16s to be carriers of tactical nuclear ordnance.”

    • French officer claims interior ministry made her alter Nice attack report

      A senior French police officer has claimed that the interior ministry “harassed” her into altering a security report from the deadly terrorist attack in Nice.

      Sandra Bertin, the officer in charge of Nice’s CCTV control room, told the Journal du Dimanche newspaper on Sunday that an unnamed interior ministry official contacted her after the attack and pressured her into altering her report for the night of the incident.

      On July 14, a truck driver plowed through a Bastille Day crowd in Nice, killing 84 people and wounding 200 others.

      Bertin claims that she was “harassed for an hour” by the official who wanted her to detail the presence of local and national police at the fireworks event where the carnage took place.

    • How US Propaganda Fuels New Cold War

      The anti-Russian propaganda across the U.S. political/media system is so pervasive that even members of Congress know little about the events that launched a new Cold War, as Elizabeth Murray learned and David Swanson reported.

    • Israel/Palestine: Bad Policy, Bad Politics

      To understand why the United States fails so miserably in efforts to achieve an Israeli/Palestinian peace, all you need to do is take a look at the mix of bad policy and bad politics found in the Israel/Palestine sections of platforms of both the Republican and Democratic parties.

    • The Secret US-UK Airwar Against Iraq

      The Chilcot Inquiry, set up to look into the British role in the war in Iraq, reported on July 6, and although it was overshadowed by the political fallout from the Brexit vote to leave the European Union, received a largely favorable reception from the media and commentators. It is unclear why those commentators judged it to be “hard-hitting” because in terms of its conclusions all it did was tell us what we already knew.

      Then British Prime Minister Tony Blair pursued a war that was arguably illegal has had disastrous consequences, not least for the 179 British servicemen and women killed and their loved ones, but also for Iraq, its people and the fight against terrorism.

      I was staggered by the rush to say the report was hard hitting. It wasn’t. It simply laid out the facts in a narrative format and let the reader decide. Those facts were of course damning but I struggle to find anything in the report that a well informed reader of British newspapers wouldn’t already know.

      It was a very workmanlike narrative of what happened taken from secret documents and witness testimony and therefore providing far more detail than had been previously available but it was not anything like a proper inquiry in the real sense. It was more like a neutral court report than the solid analysis which was required, and what we actually got from the curiously much derided Butler report.

    • There’s No Business Like the Arms Business

      When American firms dominate a global market worth more than $70 billion a year, you’d expect to hear about it. Not so with the global arms trade. It’s good for one or two stories a year in the mainstream media, usually when the annual statistics on the state of the business come out.

      It’s not that no one writes about aspects of the arms trade. There are occasional pieces that, for example, take note of the impact of U.S. weapons transfers, including cluster bombs, to Saudi Arabia, or of the disastrous dispensation of weaponry to U.S. allies in Syria, or of foreign sales of the costly, controversial F-35 combat aircraft. And once in a while, if a foreign leader meets with the president, U.S. arms sales to his or her country might generate an article or two. But the sheer size of the American arms trade, the politics that drive it, the companies that profit from it, and its devastating global impacts are rarely discussed, much less analyzed in any depth.

  • Transparency/Investigative Reporting

    • Wikileaks Leak Of Turkish Emails Reveals Private Details; Raises Ethical Questions

      Last week, we (like many others) reported on the news that Turkey was blocking access to Wikileaks, after the site released approximately 300,000 emails, supposedly from the Turkish government. We’ve long been defenders of Wikileaks as a media organization, and its right to publish various leaks that it gets. However, Zeynep Tufekci, who has long been a vocal critic of the Turkish government (and deeply engaged in issues involving the internet as a platform for speech) is noting that the leak wasn’t quite what Wikileaks claimed it was — and, in fact appears to have revealed a ton of private info on Turkish citizens.

    • WikiLeaks Put Women in Turkey in Danger, for No Reason

      Just days after a bloody coup attempt shook Turkey, WikiLeaks dumped some 300,000 emails they chose to call “Erdogan emails.” In response, Turkey’s internet governance body swiftly blocked access to WikiLeaks.

      For many, blocking WikiLeaks was confirmation that the emails were damaging to Turkish President Recep Tayyip Erdogan and the government, revealing corruption or other wrongdoing. There was a stream of articles about “censorship.” Even U.S. National Security Agency whistle-blower Edward Snowden tweeted the news of the WikiLeaks block with the comment: “How to authenticate a leak.”

      But Snowden couldn’t have been more wrong about an act that was irresponsible, of no public interest and of potential danger to millions of ordinary, innocent people, especially millions of women in Turkey.

  • Environment/Energy/Wildlife/Nature

    • Crisis on high

      At the top of the world a climate disaster is unfolding that will impact the lives of more than 1 billion people.

      Deep in the Himalayas sits a remote research station that is tracking an alarming trend in climate change, with implications that could disrupt the lives of more than 1 billion people and pitch the most populated region of the world into chaos.

      The station lies in the heart of a region called the Third Pole, an area that contains the largest area of frozen water outside of the North Pole and South Pole.

      Despite its relative anonymity, the Third Pole is vitally important; it is the source of Asia’s 10 largest rivers including the Yellow, the Yangzi, the Mekong, the Irrawaddy and the Ganges — and their fertile deltas.

    • Peru Scrambles to Drive Out Illegal Gold Mining and Save Precious Land

      The miners use so much mercury to process the gold that the government declared a health emergency in much of the Madre de Dios region in May. Tests in 97 villages found that more than 40 percent of the people had absorbed dangerous levels of the heavy metal. Mercury poisoning affects people in many ways, from chronic headaches to kidney damage, but it is most harmful to children, who are likely to suffer permanent brain damage.

    • The global environmental impact of air conditioning is big and will get even bigger

      With a heat wave pushing the heat index well above 100° F (38 °C) through much of the US, most of us are happy to stay indoors and crank the air conditioning. And if you think it’s hot here, try 124 °F in India. Globally, 2016 is poised to be another record-breaking year for average temperatures. This means more air conditioning. Much more.

      In a paper published in the Proceedings of the National Academy of Science (PNAS), Paul Gertler and I examine the enormous global potential for air conditioning. As incomes rise around the world and global temperatures go up, people are buying air conditioners at alarming rates. In China, for example, sales of air conditioners have nearly doubled over the last five years. Each year now more than 60 million air conditioners are sold in China, more than eight times as many as are sold annually in the United States.

    • EPA Admits Airplane Pollution’s Climate Danger But Drags Feet on Emissions Rules

      After nine years of delay, the U.S. Environmental Protection Agency today officially acknowledged in a so-called “endangerment finding” that planet-warming pollution from airplanes disrupts the climate and endangers human welfare. But the agency failed to move forward on rules to actually reduce aircraft emissions.

      “EPA officials finally acknowledged airplane pollution’s obvious climate threat, but they’re still not actually cutting the airline industry’s skyrocketing emissions,” said Vera Pardee, senior counsel at the Center for Biological Diversity. “After nearly a decade of denial and delay, we need fast, effective EPA action. The Obama administration must quickly devise ambitious aircraft pollution rules that dramatically reduce this high-flying hazard to our climate.”

    • British badgers are more afraid of the BBC than of bears — and that’s very bad

      Armed with a speaker system and a bucket full of peanuts, wildlife ecologist Liana Zanette hiked into the Wytham Woods with just one mission: to terrorize some woodland creatures with recordings of the BBC.

      For five nights, she broadcast snippets of BBC documentaries and news programs — as well as clips from the Canadian radio show “Quirks and Quarks” and the audiobook of “The Wind in the Willows” — to a forest full of unsuspecting English badgers. She and her colleagues then monitored the animals’ response to the sounds in order to measure how much they feared humans.

      “Oh, I don’t want to be dissing public radio and television,” Zanette hurriedly insisted when I asked whether she thought the BBC was frightening. She laughed, “I had all these clips on hand because it’s what I love to listen to.”

      Zanette, a professor at Western University in Ontario, has spent much of her career studying “the landscape of fear,” how animals’ anxiety about getting eaten by predators shapes their behavior and in turn, shapes the ecosystem in which they live. She’s used a similar methodology — playing predator sounds through a speaker system, then watching to see how animals respond — at least a dozen times before. Then, last year, she read a study in Science claiming that humans had become a “superpredator,” killing mesocarnivores like badgers four times as much as non-human predators do.

    • Planned Gas Pipeline Construction on East Coast Puts Climate at Risk: Report

      Nineteen now-pending pipeline projects, if constructed, would let enough natural gas flow out of the Appalachian basin to cause the entire US to blow through its climate pledges, ushering the world into more than 2 degrees Celsius of global warming, a newly released report by Oil Change International concludes.

      Even if the Environmental Protection Agency’s recently-announced methane rules manage to slash leaks from new natural gas infrastructure as planned, building those pipelines would be catastrophic for the climate, the researchers warn.

      “All together, these 19 pending pipeline projects would enable 116 trillion cubic feet of additional gas production by 2050,” the report, entitled A Bridge Too Far: How Appalachian Basin Gas Pipeline Expansion Will Undermine U.S. Climate Goals, says. “The currently planned gas production expansion in Appalachia would make meeting U.S. climate goals impossible, even if the [Obama] Administration’s newly proposed methane rules are successful in reducing methane leakage by 45 percent.”

    • The Remarkable Inconsistency Of Climate Denial

      This is a year of politics. That means everyone has opinions about where the world should be headed and how we should get there.

      No matter how weird this political season has been, however, there remains a key difference between opinions and facts. That difference comes into the starkest relief when people must face their own inconsistencies in reconciling the two domains.

      And nowhere is the gap between opinions and facts more apparent than the subject of climate change. As a recent action by the American Association for the Advancement of Science (AAAS) demonstrates, for climate deniers there is a chasm between what is said and what is done.

  • Finance

    • UK suspended payments from £3bn EU development fund days after Brexit vote

      Payments from a £3bn European development fund were suspended indefinitely by the UK Government, just days after the vote to leave the EU, The Independent can reveal.

      In a move that exposes the almost immediate impact of Brexit on the UK economy, businesses say they have been told they will not now receive money that was due to be paid out under the European Regional Development Fund (ERDF).

    • Panama Papers Reveal Wide Use of Shell Companies by African Officials

      Entrepreneurs and corrupt officials across Africa have used shell companies to hide profits from the sale of natural resources and the bribes paid to gain access to them, according to records leaked from a Panamanian law firm.

      Owners of the hidden companies include, from Nigeria alone, three oil ministers, several senior employees of the national oil company and two former state governors who were convicted of laundering ill-gotten money from the oil industry, new reports about Africa based on the Panama Papers show. The owners of diamond mines in Sierra Leone and safari companies in Kenya and Zimbabwe also created shell companies.

      Some of the assets cycled through the shell companies were used to buy yachts, private jets, Manhattan penthouses and luxury homes in Beverly Hills, Calif., the law firm documents show.

      Articles posted on Monday by the International Consortium of Investigative Journalists, and reports being published this week by news media organizations in 17 African countries, underscore the critical role that secret shell companies can play in facilitating tax evasion, bribery and other crimes. In Africa, offshore finance often underlies the exploitation of mineral wealth, with the benefits bypassing the public and going largely to wealthy executives and the government officials they pay off.

    • Brexit rewrites UK budget rules as borrowing set for first big rise since 2010

      Britain could borrow nearly 65 billion pounds more than planned in the next couple of years as new Chancellor Philip Hammond seeks to ‘reset’ government budget policy to ease the shock of last month’s vote to leave the European Union.

      Ratings agencies and economists widely expect borrowing to rise materially next year for the first time since 2010, as Hammond has to call time – temporarily – on the austerity which dominated his predecessor George Osborne’s six years in office.

      After taking office two weeks ago, Hammond said the darker post-Brexit outlook meant policies the Conservative government had pursued since 2010 needed to change – and economists are now starting to put numbers on what this might mean.

      Hammond told reporters on Sunday the scale of any stimulus would hinge on how rapidly the economy was slowing by the time of the Autumn Statement, the half-yearly budget update that usually comes in late November or early December.

    • Vicenza: dark heart of Italy’s banking crisis where locals have lost millions

      From a distance, Vicenza does not look like a city engulfed in turmoil. On the elegant Corso Andrea Palladio, named after the Renaissance architect whose work defines this city, a finely dressed woman clutches a Chanel handbag during her evening passeggiata. Locals sit back and enjoy their Campari spritz cocktails in the July heat. A black Maserati rolls slowly down the street.

    • Father of EU divorce clause demands tough stance on British exit

      A former Italian premier who wrote the European Union divorce clause that Britain is poised to trigger said on Thursday that Brussels should offer no concessions to London in looming negotiations to quit the trading bloc.

      “When it comes to the economy they have to lose,” said Giuliano Amato, explaining that only then might the British reconsider abandoning the world’s largest single market.

      Britain voted in a referendum on June 23 to leave the EU. To do so, London will have to invoke Article 50 of the Lisbon Treaty, which starts a two-year countdown to a formal exit from the 28-nation bloc.

      “I wrote Article 50, so I know it well,” Amato told a conference in Rome, saying he had inserted it specifically to prevent the British from complaining that there was no clear cut, official way for them to bail out of the Union.

      “My intention was that it should be a classic safety valve that was there, but never used. It is like having a fire extinguisher that should never have to be used. Instead, the fire happened.”

    • First Brexit, now this: British companies could be forced to pay to put their money in the bank

      In yet another sign the financial world is being turned on its head, one of the UK’s biggest banks has warned customers that it may saddle them with negative interest rates. That is, depositors would be charged for putting their money in the bank.

      Royal Bank of Scotland, one of Britain’s largest banks, and Natwest, one of its subsidiaries, sent letters to 1.3 million business customers warning them of the change, citing low interest rates. The letter announcing the changes said: “Global interest rates remain at very low levels and in some markets are currently negative. Dependent on future market conditions, this could result in us charging interest on credit balances.”

      Some central banks already charge commercial lenders for their deposits, and interbank lending markets have also featured negative interest rates. A third of government bonds globally now have yields below zero, meaning investors won’t get all their money back if they hold the securities to maturity.

    • Doubling Down on Wall Street: Hillary and Tim Kaine

      By picking Tim Kaine, Hillary Clinton has revealed her true preferences and shown that her move to the left on policy issues during the primaries was simply a tactical move to defeat Bernie Sanders. It’s not what you say, it’s what you do.

      Clinton can talk about caring about the U.S. public, but this choice cuts through the rhetoric. The two politicians to whom she gave serious consideration to choosing as her running mates were Kaine and Secretary of Agriculture Tom Vilsack. What both men share in common is, like the Clintons, being leaders of the Democratic Leadership Council (DLC). The DLC was, on economic and foreign policy issues, a servile creature of Wall Street – funded by Wall Street.

    • Clinton Running Mate Tim Kaine Supported TPP, Offshore Drilling & Anti-Union Right-to-Work Measures

      As the Democratic National Convention begins in Philadelphia, tension is rising between supporters of Hillary Clinton and Bernie Sanders. The Democratic National Committee chair, Florida Congressmember Debbie Wasserman Schultz, resigned Sunday following WikiLeaks’ release of nearly 20,000 emails revealing how the Democratic Party favored Hillary Clinton and worked behind the scenes to discredit and her rival, Senator Bernie Sanders. When Sanders speaks tonight at the Democratic convention, he is expected to praise the Democrats for agreeing to what he describes as the most progressive platform in Democratic Party history. But he lost a major battle with the platform when the Democratic National Committee defeated an amendment brought by his delegates to abolish superdelegates. We speak with Zaid Jilani of The Intercept, who reported on how the “DNC Votes to Keep Superdelegates, But Sets Some Conditions.”

    • Brexit supporters hit with record £935bn pension deficit because of the EU referendum

      The UK pension deficit hit a record level of £935 billion following UK’s vote to leave the EU, likely hitting pro-Brexit voters the hardest.

      Support for the UK to leave the EU bloc grew with each age category, peaking at 60 per cent among those aged 65 and over, according to a survey of 12,356 referendum voters by Lord Ashcroft.

      Ironically, the same voters are reliant on defined benefit pension to deliver their retirement income.

    • One Woman’s 10-Year Fight to Save Her Family From Foreclosure

      Many people are responsible for the financial disaster of 2008, and the economic hardship that has continued to unravel since. We still have not seen one criminal prosecution among the CEOs who were – and many still are – at the frontlines where everything started to crumble. Those people are hiding behind corporate protection, always blaming the next in line behind them, never accepting responsibility, and very often putting the blame on the very people they have ruined with their fraudulent dealings.

  • AstroTurf/Lobbying/Politics

    • The influence diaries: Dispatches from the Democratic National Convention
    • Susan Sarandon: DNC email leak confirms Sanders backers’ fears weren’t “paranoia”

      Actress Susan Sarandon was feeling the Bern during the Democratic primary-and on Monday blasted the Democratic National Committee for its bias against Bernie Sanders, saying the DNC email leak is proof Sanders supporters’ concerns about a rigged system weren’t “paranoia.”

      “I mean, it’s not surprising. It’s great that everyone finally understands that this wasn’t some kind of paranoia,” she said in an interview with Democracy Now. “But every little thing, from not allowing Bernie’s table with his information into the dinners in some of the states I went to and what I saw at caucuses, and I know what happened in New York, where all of that information, the wall went down, and then 137,000 people were just disappeared out of Brooklyn, and I know other people that went and were registered as–I mean, it was clear in California what happened, in Puerto Rico what happened.”

      She added that Sanders supporters are disappointed in the results of the primary, but that it’s important that Sanders gets to speak directly to those people from the convention stage Monday night.

    • WikiLeaks founder: DNC emails show ‘collusion’ by Clinton, Wasserman Schultz

      The founder of WikiLeaks told NBC News on Monday there is no evidence Russia was behind the hacking of the Democratic National Committee’s email server.

      Julian Assange told “Nightly News” correspondent Richard Engel the issue is not who stole the information, but what is in the emails.

      “Well, there is no proof of that whatsoever. We have not disclosed our source, and of course, this is a diversion that’s being pushed by the Hillary Clinton campaign. That’s a meta-story. The real story is what these emails contain and they show collusion,” Assange said in the pre-taped interview that aired Monday night.

      Assange pointed to the effect of the scandal. He said even though the emails were leaked three days ago, DNC Chairwoman Debbie Wasserman Schultz has already resigned for her role in “subverting” the nomination process to ensure Hillary Clinton beat Sen. Bernie Sanders.

    • DNC Leak Shows Mechanics of a Slanted Campaign

      As is sadly the case with most political stories these days, whether or not you care about the so-called “DNC leak” probably depends on which candidate you supported in the primaries.

    • Randy Quaid Screams He Is ‘Glad As Hell’ About the DNC Email Leak

      Randy Quaid hasn’t acted in years, but he’s still making movies. The difference is that the 65-year-old who played roles in such films as National Lampoon’s Vacation and Independence Day is now making them for social media instead of the multiplex.

      On Monday, Quaid posted a series of clips that featured him, with his signature Santa Claus-like beard, screaming directly at the camera about the email leak plaguing the Democratic Party, which kicked off its convention in Philadelphia on Monday. While the vids are certainly entertaining, we’re not sure whether we should laugh or cry. What happened to Cousin Eddie?

    • DNC emails: Behind the scenes look at care of big donors
    • Former Dem faith director condemns plot to attack Sanders’ religion

      The former director of Faith Outreach for the Democratic Party “absolutely” condemns an alleged plot by a Democratic operative to undermine Bernie Sanders by questioning his religion.

      “I can certainly say from first-hand experience that I was part of a campaign where it was a solemn vow in no way, shape or form to use faith as a wedge issue,” Rev. Dr. Derrick Harkins, who also served as an adviser to President Obama, told the Washington Examiner.

      His remarks, which came as he spoke Monday on a “Faith Council” panel hosted as part of the Democratic National Convention in Philadelphia, were made in reference to his role campaigning in 2012 against former Massachusetts Gov. Mitt Romney.

    • Leaked DNC Email Mocks Past Accusations Of Weak Cybersecurity
    • What We Know So Far About WikiLeaks’ #DNCLeaks

      Commonly asked questions and answers about WikiLeaks’ #DNCLeaks as the Democratic National Convention kicks off.

    • Facebook Admits It Blocked Links To Wikileaks DNC Emails

      Facebook Chief Security Officer says the company has fixed the error, after receiving heavy criticism from WikiLeaks.

      This isn’t the first time Facebook has accidentally blocked high profile news events on the platform. Earlier this month, Facebook briefly removed video showing Philando Castile dying, covered in blood, moments after being shot by a police officer. Prior to that, the company admitted to removing a meme circulating about convicted Stanford rapist Brock Turner.

    • WikiLeaks fires off warning to MSNBC host

      WikiLeaks made waves on Friday by releasing a huge trove of internal emails from the Democratic National Committee (DNC).

      The hacked emails included what appears to be evidence of a concerted effort by DNC Chairwoman Debbie Wasserman Schultz and other party officials to thwart the presidential campaign of Sen. Bernie Sanders (I-Vt.) during the primary season. Wasserman Schultz resigned Sunday and will serve as an honorary chair on presumptive Democratic presidential nominee Hillary Clinton’s campaign instead.

      According to CNN, U.S. officials briefed on the investigation into the compromised DNC emails now suspect Russian hackers are part of a bigger effort targeting political organizations and Washington, D.C., think tanks.

      On ABC’s “This Week,” Clinton’s campaign manager, Robby Mook, said the emails were leaked right before the Democratic National Convention “by the Russians for the purpose of helping Donald Trump,” citing “experts.” Mook could not offer any evidence for the claim.

    • The Good TPP

      So Baby DonDon was reading all these stories about how Russia hacked the email system of the Democratic National Committee and this led to the ouster of DNC chair Debbie Wasserman Schultz. And I got nervous.

    • WikiLeaks founder Julian Assange: ‘No proof’ Russian intelligence responsible for DNC hack

      WikiLeaks founder Julian Assange says “there is no proof whatsoever” that Russian intelligence is behind the thousands of hacked emails from the Democratic National Committee that WikiLeaks released.

      “The real story is what these emails contain and they show collusion,” Assange said during an interview with NBC News that will air Monday night on “NBC Nightly News with Lester Holt.”

      While three cybersecurity experts told NBC that the DNC emails were hacked by Russian intelligence, Assange stressed that Wikileaks has not disclosed the source of the leak.

    • Julian Assange: Choosing Between Trump or Clinton is Like Picking Between Cholera or Gonorrhea

      Following the end of the Republican National Convention, Donald Trump has received a surge in his popularity. He’s now leading Hillary Clinton 44 to 39 percent in a four-way match-up, according to the most recent CNN poll. Libertarian presidential candidate Gary Johnson received 9 percent, and Green Party candidate Dr. Jill Stein received 3 percent. But for WikiLeaks founder Julian Assange, the threat of a Donald Trump presidency doesn’t inspire him to back Hillary Clinton. When asked, Assange said: “You’re asking me, do I prefer cholera or gonorrhea?”

    • Leaked DNC emails reveal the inner workings of the party’s finance operation

      In the rush for big donations to pay for this week’s Democratic convention, a party staffer reached out to Tennessee donor Roy Cockrum in May with a special offer: the chance to attend a roundtable discussion with President Obama.

      Cockrum, already a major Democratic contributor, was in. He gave an additional $33,400. And eight days later, he was assigned a place across the table from Obama at the Jefferson Hotel in downtown Washington, according to a seating chart sent to the White House.

    • WikiLeaks emails: Pro-Clinton CNN political commentator pre-checked op-ed with DNC

      On May 18, CNN.com published a pro-Hillary Clinton op-ed by Maria Cardona, a CNN political commentator. Titled “Why Sanders must take the high road,” the piece was published in the aftermath of an out-of-control Nevada Democratic state party convention.

    • WikiLeaks blows up Clinton’s shot at smooth convention

      Before WikiLeaks struck, Hillary Clinton already had work to do at this week’s Democratic National Convention to unify her party.

      Now that task has become a lot more difficult. The weekend release by WikiLeaks of more than 19,000 hacked emails from Democratic National Committee staffers has provided embarrassing evidence of DNC favoritism toward Mrs. Clinton during the primaries – a bias long suspected by Bernie Sanders, the runner-up for the Democratic presidential nomination.

      The scandal led to the forced resignation Sunday of DNC chair Debbie Wasserman Schultz, who will step down after the convention.

    • Assange Slams Clinton Campaign, Says There Is No Evidence Putin Behind Wikileaks

      If the Russian government is behind the theft and release of embarrassing emails from the Democratic Party, as U.S. officials have suggested, it may reflect less a love of Donald Trump or enmity for Hillary Clinton than a desire to discredit the U.S. political system.

      A U.S. official who is taking part in the investigation said that intelligence collected on the hacking of Democratic National Committee emails released by Wikileaks on Friday “indicates beyond a reasonable doubt that it originated in Russia.”

    • Leaked DNC Memo Complains Gay Donor Is ‘Extremely High Maintenance’

      In an internal DNC memo published by WikiLeaks, one party staffer complained to colleagues that one of the party’s gay donors was just too high maintenance for her to handle.

      The leaked memo, which is titled “Close out memo” and dated April 22, 2016, was authored by DNC staffer Julia Lahl, who recaps much of the work done with the party’s LGBT Leadership Council. The memo contains information on dozens of donors — not all of which is positive.

    • Let’s Be Honest: The DNC Asked To Be Hacked With Passwords This Dumb

      Perhaps these passwords had been changed, but if they were anything remotely close to the above, they were no good.

    • Hillary’s Name Booed At Democratic Convention [VIDEO]

      At the start of the Democratic National Convention on Monday when chair Marcia Fudge mentioned Hillary Clinton’s name, the crowd promptly booed.

    • Leaked DNC Email Mocks Past Accusations Of Weak Cybersecurity

      A leaked email from a Democratic National Committee (DNC) staffer ridiculed reports from experts that the DNC and Republican National Convention had glaring cybersecurity issues.

      DNC staffer Eric Walker called a Buzzfeed article detailing the security weaknesses of the DNC “The dumbest thing I’ve ever read.” The email is dated May 5, 2016, just over two months before the Wikileak release of over 20,000 DNC emails.

    • [Satire] ‘Fear Not—She Means You No Harm,’ Says Elizabeth Warren, Revealing Docile Hillary Clinton To Crowd

      Sending terrified gasps through the audience as she pulled back a thick velvet curtain onstage to reveal the formidable politician, Massachusetts senator Elizabeth Warren assured the thousands of progressive onlookers at the Democratic National Convention Monday night that the docile Hillary Clinton standing before them meant them no harm. “Ladies and gentlemen, there is no need to fear this candidate, for despite her menacing reputation, she will not attack you or your progressive movement,” said Warren, who then wowed those in attendance by signaling for the compliant Clinton to repeat a series of talking points about regulating financial institutions in an effort to prove that the presumptive Democratic nominee could easily be trained and was not roused into a horrible frenzy by the presence of radical reforms. “Despite the tales you may have heard, she is nothing but a tame, pragmatic Democrat. The terror she stirs inside you belies her true gentle nature. I assure you she is no threat to the policies you hold most dear.” At press time, Clinton had broken free from her iron restraints, ripped off both of Warren’s arms, and tossed the senator’s body into the crowd.

    • DNC sought to hide details of Clinton funding deal

      Leaked emails show the Democratic National Committee scrambled this spring to conceal the details of a joint fundraising arrangement with Hillary Clinton that funneled money through state Democratic parties.

      During the three-month period when the DNC was working to spin the situation, state parties kept less than one half of one percent of the $82 million raised through the arrangement — validating concerns raised by campaign finance watchdogs, state party allies and Bernie Sanders supporters.

      The arrangement, called the Hillary Victory Fund, allowed the Clinton campaign to seek contributions of hundreds of thousands of dollars to attend extravagant fundraisers including a dinner at George Clooney’s house and a concert at Radio City Music Hall featuring Katy Perry and Elton John. That’s resulted in criticism for Clinton, who has made opposition to big money in politics a key plank in her campaign platform.

    • In Hacked D.N.C. Emails, a Glimpse of How Big Money Works

      Last October, a leading Democratic donor named Shefali Razdan Duggal emailed a sweetly worded but insistent list of demands to a staff member at the Democratic National Committee.

      Ms. Duggal wanted a reminder of how much she had raised for President Obama and the Democrats (the answer: $679,650) and whether it qualified her for the premium package of hotel rooms and V.I.P. invitations at the party’s convention in Philadelphia. She asked whether she could have an extra ticket to Vice President Joseph R. Biden’s holiday party, so she could bring her children. But most on her mind, it seemed, was getting access to an exclusive November gathering at the White House.

      “Not assuming I am invited…just mentioning/asking, if in case, I am invited :),” wrote Ms. Duggal, who was appointed by Mr. Obama to oversee the United States Holocaust Memorial Museum and is married to a San Francisco financial executive. “Might you have an intel?”

    • Democratic National Committee chief resigns after hacked e-mails show anti-Sanders tone

      Late Friday, WikiLeaks published 20,000 internal e-mails from the Democratic National Committee acquired in a hacking attack last month. The dumped messages, including some that had a derisive tone toward primary candidate Bernie Sanders, roiled the Democratic Party on the eve of its convention and led to the resignation yesterday of DNC chief Debbie Wasserman Schultz.

      The DNC hack was discovered on June 14, and soon after, some evidence of a Russian connection was found. Now, the belief that the hack was sponsored by the Russian government on some level has been explicitly endorsed by Hillary Clinton’s campaign. Yesterday on CNN’s “State of the Union,” Clinton’s campaign manager, Robby Mook, said Russian hackers are explicitly trying to get Clinton’s opponent, Donald Trump, elected in November.

      “I don’t think it’s coincidental that these e-mails were released on the eve of our convention here, and I think that’s disturbing,” Mook told program host Jake Tapper. The leak took place just after the Republican Party changed its platform “to make it more pro-Russian,” Mook added.

    • Clinton and Kaine, #SoProgressive!

      Barack Obama will be the last President of the Democratic party. Hillary Clinton with her choice for Tim Kaine as VP has declared war to the Progressive side of her own party. Donald Trump could benefit from this situation by using a “divide and conquer” strategy. Clinton just made a Trump presidency more likely, because she choose to divide her party instead of trying to unite blue. Progressives are wise enough not to let Trump exploit this situation. Progressives are also wise enough to hold Clinton accountable for her decisions at the right time.

      It is up to Progressives to first defeat Trump, and then Clinton. This means with all the pain in their hearts Progressives will have to vote for Clinton. And not forget this declaration of war of Clinton, but wait with fighting Centrist Democrats until 2017. In a militant non-violent way; in the good tradition of Martin Luther King Jr.

    • Is the DNC Hack an Act of War?

      But the truth is that there is no public evidence whatsoever tying Russia to the hack. Attribution for cyberoperations of this sort is very tricky and tends to take some time.

    • DNC Emails Published by WikiLeaks Show Links to AFT and Common-Core Anxiety

      By now you’ve probably heard about the trove of emails to and from the Democratic National Committee that were released last week by WikiLeaks, an organization that publishes leaked documents to expose what it says is corruption and malfeasance by governments, as well as corporations.

      So what if any links do these emails reveal between the DNC and teachers’ unions in particular?

    • Will The FTC Investigate People & Companies Paid By Facebook To Use Facebook Live?

      In the last few months, Facebook Live has certainly become “a thing.” Launched just recently, it was suddenly everywhere — from the pure (but very viral) joy of Candace Payne and her Chewbacca mask to the live streaming of the tragic aftermath of Philando Castile being shot by a police officer in Minnesota. Of course, it appears that part of the reason why Facebook Live is getting so much usage isn’t necessarily that it’s a better product than its competitors, but rather that Facebook has been generously throwing around cash to all sorts of people and companies to get them to use the platform.

    • Emergency Censorship: Schultz Has Speaking Privilege Revoked by Clinton

      Just hours after the breaking news regarding the DNC’s hacked e-mail servers, it has been announced that chairwoman Debbie Wasserman Schultz has been removed from the position of party chair and will now be revoked from participating at the convention.

    • The Democrats’ Second Email Problem
    • Heckled offstage, Wasserman Schultz now seeks re-election
    • Florida congresswoman faces harsh reception at Democratic National Convention
    • Sanders Delegates Slam Clinton For Hiring Wasserman Schultz
    • Clinton, Wasserman Schultz and the Wheezing Corpse of the Democratic Process Revealed

      Wikileaks over the last few days dumped tens of thousands of emails hacked from the Democratic National Committee (DNC) server.

      The disclosures of dirty tricks directed against Bernie Sanders contained in those emails are startling, and only add to the whirlpool of corruption and sleaze surrounding Hillary Clinton and the wheezing corpse of the democratic process.

    • Robert Kagan and Other Neocons Are Backing Hillary Clinton

      As Hillary Clinton puts together what she hopes will be a winning coalition in November, many progressives remain wary — but she has the war-hawks firmly behind her.

      “I would say all Republican foreign policy professionals are anti-Trump,” leading neoconservative Robert Kagan told a group gathered around him, groupie-style, at a “foreign policy professionals for Hillary” fundraiser I attended last week. “I would say that a majority of people in my circle will vote for Hillary.”

      As the co-founder of the neoconservative think tank Project for the New American Century, Kagan played a leading role in pushing for America’s unilateral invasion of Iraq, and insisted for years afterwards that it had turned out great.

    • Group of Bernie Sanders Delegates Object to Tim Kaine VP Pick — May Protest on Floor

      A group of Bernie Sanders delegates to the Democratic National Convention announced their discontent with the selection of Tim Kaine as the vice presidential nominee on Monday and signaled they might protest that decision on the convention floor.

      Calling themselves the Independent Bernie Delegates Network, the group includes 1,250 Sanders delegates — about two-thirds of the total Sanders delegate count — who have been organized by RootsAction.org and Progressive Democrats of America. The group is holding snap straw polls among its members to help inform options for its actions at the convention.

      In a survey of the delegates taken 10 days ago, just 3 percent said that Tim Kaine was an “acceptable” vice presidential choice for presumptive nominee Hillary Clinton, with 9 percent saying they were undecided, and 88 percent said the choice would not be acceptable.

    • “The Real Revolution Is Down the Street, to Your Left” — The Green Party Rallies at the Democratic Convention

      For many Bernie Sanders supporters, the move to the Green Party’s Jill Stein was easily laid out. On Monday afternoon, hours before their candidate took the Democratic convention stage to reiterate his support for Hillary Clinton to the boos of some of his own delegates, a young man with a loudspeaker directed protesters to a park down the road from the Wells Fargo Center.

      “The real revolution is down the street, to your left,” he told them, as others handed out “Jill 2016” posters to people still wearing their “Bernie 2016” shirts.

      As several hundred people sat on a grass field waiting for Stein, the vibe was as much Coachella as it was leftist political rally. The crowd — as with Sanders rallies, largely white — lit up joints and hung out under trees, as speakers called attendees comrades, shouted out indigenous movements in Central America and the boycott movement in Palestine, and spoke in Spanish about Jill being “the only revolutionary.”

      Stein, who took the stage in a sleeveless top and green scarf, introduced by Cornel West and hailed by a roaring crowd chanting “Jill not Hill,” welcomed Sanders supporters to her party, calling the move a “marriage made in heaven.”

    • The Two Intelligence Agency Theory of Handing Trump the Election

      Now, again, I’m not saying the Russians didn’t do this hack, nor am I dismissing the idea that they’d prefer Trump to Hillary. By far the most interesting piece of this is the way those with the documents — both the hackers and Wikileaks — held documents until a really awkward time for some awkward disclosures, with what may be worse to come.

      But discussions that want to make the case should explain several things: Which of the two agencies alleged to have hacked DNC are behind the operation — or are they both, even though they weren’t, at least according to eh report that everyone is relying on without question, apparently cooperating? How certain can they be that the GRU is Guccifer, and if Guccifer is supposed to be a false flag why was it so incompetently done? What explains Guccifer’s sort of bizarre strategy along the way, encompassing both Wikileaks (an obvious one) and The Hill?

      Again, I absolutely don’t put this kind of thing beyond Putin. Russia has used hacking to influence outcomes of elections and authority in various countries in the past and the only thing new here is that 1) we wouldn’t already be playing the other side and 2) we’re big and can fight back. But the story, thus far, is more complex than being laid out.

    • Bernie Sanders Left Delegates With No Way to Fight But Boo

      The first night of the Democratic National Convention featured rousing tributes to Hillary Clinton, blistering critiques of Donald Trump – and a chorus of boos from Bernie Sanders delegates at invocations to vote for Clinton, even when it came from Sanders himself.

      Many commentators wondered why the Sanders delegates persisted in their protest, weeks after their nominee had conceded the election to presumptive nominee Hillary Clinton.

      The answer may rest in a step that Sanders himself took.

      In the lead-up to the convention, the Sanders campaign worked with both the Clinton campaign and the Democratic National Committee to help write the party’s platform. Those meetings featured debates between the Sanders and Clinton teams, and while there was progress on many issues, there were many more where Team Sanders suffered defeats – including opposition to the Trans-Pacific Partnership and Israel’s occupation of the Palestinians, banning fracking, and enacting a carbon tax.

    • “The People Want Bernie” — Sanders Supporters Protest Hillary Clinton Nomination at DNC

      If the Democratic nominee were chosen by those who showed up in the streets of Philadelphia to protest the convention, there would be one uncontested winner. “The people want Bernie,” read a sign at a rally Sunday that drew the same enamored crowds that turned out for the Vermont senator along the primary trail. The sign summed up the general sentiment of the crowd, as the rally grew into the thousands and began marching from City Hall in 93-degree weather. As the DNC kicked off, downtown Philadelphia was all about Bernie.

      Hillary Clinton’s name and image showed up mostly in signs and chants saying “Never Hillary,” “Warlord,” and “Hell no, DNC, we won’t vote for Hillary.” Last week’s DNC email leaks and the ensuing party scandal spilled into the streets, leaving Bernie supporters bitter and upset, and prompting calls for a “DemExit” from the party. Using the same slogans seen at the Republican convention in Cleveland, some Bernie supporters sported “Hillary for Prison” shirts.

    • On Day One of the Democratic Convention, the Boos Have It

      Sanders backers got some of the concessions they wanted from the Democratic National Committee. This year, 700 superdelegates, who are not bound by state voters, helped give Clinton a decisive edge over Sanders in the primary campaign. In the 2020 election, that number will be reduced to 250. The DNC also agreed to appoint a commission to study the possibility of opening up the party’s primaries to Republican and independent voters, another one of Sanders’s complaints.

    • EXCLUSIVE: WikiLeaks’ Julian Assange on Releasing DNC Emails That Ousted Debbie Wasserman Schultz

      WikiLeaks founder and editor-in-chief Julian Assange joins us from London about their release of nearly 20,000 emails revealing how the Democratic Party favored Hillary Clinton and worked behind the scenes to discredit and defeat Bernie Sanders. This comes as the Democratic National Convention is opening today in Philadelphia, Pennsylvania, amid massive party turmoil. The DNC chair, Florida Congressmember Debbie Wasserman Schultz, has resigned following the leak. The emails also reveal a close relationship between mainstream media outlets and the DNC.

    • If Russian Intelligence Did Hack the DNC, the NSA Would Know, Snowden Says

      As my colleague Glenn Greenwald told WNYC on Monday, while there may never be conclusive evidence that the Democratic National Committee was hacked by Russian intelligence operatives to extract the trove of embarrassing emails published by WikiLeaks, it would hardly be shocking if that was what happened.

    • Sanders Delegates Push DNC to Reform Anti-Democratic Superdelegates
    • Florida Town Proposes a Ban on Super PACs—What Could Happen?

      It could have seemed like a singular act of defiance to abolish super PACs in one Florida town. Members of the City Council in St. Petersburg approved 6-1 today a motion to consider an ordinance that would limit the amount donors can give to groups that support or oppose candidates in local elections.

      The ordinance, if passed later this year, would directly affect only elections in St. Petersburg. But it’s part of a far-reaching legal strategy to reduce the influence of money in politics by abolishing super PACs—groups that can take unlimited amounts of money from donors to spend in political campaigns—at the national level.

      “This is a serious issue in our country and it has a corrosive effect on our elections and in our democratic process,” said Darden Rice, vice chair of the City Council. “But we are going to have to tackle it on all levels—from our city halls all the way up to the Supreme Court.”

  • Censorship/Free Speech

  • Privacy/Surveillance

    • The Internet Of Things Is a Security And Privacy Dumpster Fire And The Check Is About To Come Due

      If you’re a long-standing reader of Techdirt, you know we’ve well documented the shitshow that is the “internet of things.” It’s a sector where countless companies were so excited to develop, market and sell new “smart” appliances, they couldn’t be bothered to embrace even the most rudimentary security and privacy standards once these devices were brought online. The result is an endless stream of stories about refrigerators, TVs, thermostats or other “smart” devices that are busy hemorrhaging personal data, inadvertently advertising that sometimes the smart option — is actually the dumb one.

      This systemic incompetence has now fused with a cultural disdain for more modern consumer privacy protections. The end result has been an obvious uptick in concern about how much data is now being collected by even childrens’ toys like Barbie dolls, something that last year’s Vtech hack illustrated isn’t just empty fear mongering. Convincing parents who already find technology alienating has proven to be difficult, as is attempting to craft intelligent regulation that protects kids’ playtime babbling from being aggressively monetized, without hindering emerging sector innovation and profits.

      To that end, the Family Online Safety Institute and the Future of Privacy Forum held a presentation last week (you can find the full video here) where analysts and experts argued, among other things, that privacy policies need to be significantly simplified and modernized for an era where a child’s doll can profoundly impact the privacy of countless people. It has been, needless to say, an uphill climb.

    • Malicious computers caught snooping on Tor-anonymized Dark Web sites

      The trust of the Tor anonymity network is in many cases only as strong as the individual volunteers whose computers form its building blocks. On Friday, researchers said they found at least 110 such machines actively snooping on Dark Web sites that use Tor to mask their operators’ identities.

      All of the 110 malicious relays were designated as hidden services directories, which store information that end users need to reach the “.onion” addresses that rely on Tor for anonymity. Over a 72-day period that started on February 12, computer scientists at Northeastern University tracked the rogue machines using honeypot .onion addresses they dubbed “honions.” The honions operated like normal hidden services, but their addresses were kept confidential. By tracking the traffic sent to the honions, the researchers were able to identify directories that were behaving in a manner that’s well outside of Tor rules.

    • Privacy – why is it mostly a buzzword?

      Nowadays even mainstream media is full with privacy related concerns. Ever since the Snowden leaks, people are aware that they are watched by different governmental agencies in the US and around the world. We give up our privacy for cheap / free on-line services, like Gmail. Facebook knows more about us than our own parents. Pokemon Go is a location-based game, therefore its creators know the location of about a hundred million players around the world. Lenovo has installed privacy-threatening bloatware to Windows machines using the BIOS.

      [...]

      The use of open hardware can help to avoid ugly surprises, for example in case of Lenovo. There are many definitions of open hardware. The simplest definition is that it does not require a binary blob loaded under Linux to run. I find this definition a bit too broad, however, such hardware is still difficult to find. Many x86 PC hardware belongs to this category.

      Hardware can be open by having all information to rebuild the same hardware or to perform some modifications to the design on our own available. For example, Novena has all of its design sources online. It can also be open on the firmware side, like u-boot on most ARM developer boards.

      While most open hardware efforts involve underpowered older parts, there are some notable exceptions. The Librem 2-in-1 tablets from Purism are blob-free and have a privacy-oriented Linux-based operating system. Raptor Engineering with its POWER-8-based Talos Secure Workstation goes even further with its schematics and firmware being fully open and auditable. In addition to this, its performance beats anything running on an x86 CPU.

    • Privacy International releases new tranche of previously secret documents shedding further light on Government mass surveillance

      Previously secret official documents, containing new revelations about the Government’s mass surveillance regime, have today been disclosed as a result of litigation brought by Privacy International against the Intelligence Agencies (MI5, MI6, GCHQ). These documents shed further light on the secretive bulk data collection regime operating under section 94 of the Telecommunications Act 1984 and the Bulk Personal Data-set regime.

    • Nonagenarian model citizen wants secret surveillance data on him deleted

      A 91-year-old civil liberties campaigner, John Catt, is taking his fight to have police surveillance records of his peaceful participation in protests deleted to the European Court of Human Rights (ECHR).

      Catt is classified by UK police as a “domestic extremist,” even though he has no criminal record. His name was added to a secret national database run by the UK’s National Public Order Intelligence Unit. It contains details of his attendance at over 80 lawful demonstrations with his daughter, including their appearance and slogans on their T-shirts.

    • Researchers discover 110 snooping Tor nodes

      In a period spanning 72 days, two researchers from Northeastern University have discovered at least 110 “misbehaving” and potentially malicious hidden services directories (HSDirs) on the Tor anonymity network.

    • Police seek to unlock murder victim’s phone using 3D replica of fingertips

      Computer science professor Anil Jain spends most of his time researching and improving biometric systems, like fingerprint scanners and facial recognition software. Last month, however, law enforcement agents approached the Michigan State University academic with an unusual request: to create a 3D-printed replica of a dead man’s finger.

      Police needed the prosthetic digit to try and unlock a murder victim’s smartphone, protected by a fingerprint scanner instead of a password.

      “The authorities think that unlocking the phone could give them the identity of the murderer,” Jain said. “We are doing our social duty to assist in a criminal investigation.”

      Law enforcement agents had seen a YouTube demonstration of a technique developed by Jain’s lab which could transform fingerprint scans into fake fingertips that could fool the sensors on smartphones.

    • Suspect required to unlock iPhone using Touch ID in second federal case

      A second federal judge has ruled that a suspect can be compelled to unlock their iPhone using their fingerprint in order to give investigators access to data which can be used as evidence against them. The first time this ever happened in a federal case was back in May, following a District Court ruling in 2014.

    • Canadian Teens Cause an International Incident Playing Pokémon Go

      Two Canadian youngsters distracted by playing Pokémon Go accidentally crossed the border into the U.S. and had to be apprehended in Montana by federal agents, officials said Friday.

      The U.S. Customs and Border Protection said agents found the pair of juveniles illegally entering the U.S. last Thursday by foot. The two were “unaware of their surroundings” while playing the popular game on their cellphones.

      “Both juveniles were so captivated by their Pokémon Go games that they lost track of where they were,” U.S. Customs and Border Protection spokesman Michael Rappold said in a statement.

    • Yahoo Ordered to Show How It Recovered ‘Deleted’ Emails

      Just what kind of email retentions powers does Yahoo have? According to a policy guide from the company, Yahoo cannot recover emails that have been deleted from a user’s account—simple as that. If the email is in a user’s account, it’s fair game, and Yahoo can even give law enforcement the IP address of whatever computer is being used to send said email.

      Or, at least, that’s what Yahoo has said. A magistrate judge from the Northern District of California has ordered Yahoo to produce documents, as well as a witness for deposition, related to the company’s ability to recover seemingly deleted emails in a UK drug case.

      As Motherboard reports, a UK defendant was convicted—and is currently serving an extra 20-year prison sentence—as part of a conspiracy to import drugs into the United Kingdom. He’s currently appealing the conviction, in part because the means by which Yahoo recovered the emails in question allegedly violate British law.

    • Commission plans export controls for surveillance technology

      Technology companies may face stricter licensing requirements to export products that could be used to violate human rights, as part of a change to EU rules.

      The European Commission is set to propose controversial measures in September that may force firms to go through lengthy approval processes when they export technologies including location tracking devices, biometrics and surveillance equipment.

      A draft proposal, obtained by EurActiv.com, would require export controls for cyber-surveillance technologies under a revised EU law that covers so-called dual-use goods that can either be used as weapons or for civil purposes.

      Technology firms are worried the change will make it harder to export a broad range of common products like smartphones because they can track users’ locations.

      “You can’t make suspects out of the whole branch for items that are harmless. It will overwhelm the licensing authorities,” one industry source said.

    • Feds try to forcefully search Wall Street Journal reporter’s phone

      A Wall Street Journal reporter was detained by federal agents at the Los Angeles airport who demanded to confiscate her two cell phones — and was surprised to find that border agents have the authority to do that.

  • Civil Rights/Policing

    • Thousands of Turkish soldiers ‘RAPED and STARVED’ as punishment for failed Turkey coup

      The human rights group said it has “credible evidence” that around 10,000 Turkish soldiers face the severe punishments for their part of the failed military coup against president Erdogan.

      Victims are being held in makeshift cells, such as stables and sports halls, and are being tortured and held in stress positions for 48 hours, the group said.

    • Turkey Cracks Down on Journalists, Its Next Target After Crushing Coup
    • teleSUR Host Abby Martin Released After Violent Arrest at DNC

      Martin and her producer, Mike Prysner, got into an Uber transport to try to get to the location and were dropped off by the Uber driver at the DNC site where only those with credentials are allowed.

      The police stopped them and told them to leave the area. As they were complying and leaving the area, another police officer grabbed Martin, tore her dress and arrested her for “disorderly conduct.”

    • 40 HOUSE DEMOCRATS URGE SECRETARY KERRY TO CALL FOR DEMOCRACY IN BRAZIL

      U.S. Representatives John Conyers, Jr. (D-MI), Marcy Kaptur (D-OH), Keith Ellison (D-MN) and more than thirty other members of the House of Representatives sent a letter today to Secretary of State John Kerry, urging him to refrain from gestures that could be interpreted as supportive of Brazil’s interim government and to instead “express strong concern” regarding the impeachment process targeting Brazilian President Dilma Rousseff and to “call for the protection of constitutional democracy and the rule of law in Brazil.” The letter is the first Congressional letter expressing concern over Brazil’s democracy in more than two decades.

      The letter notes that the legal basis for the ongoing impeachment of Brazil’s first female elected president has been widely contested and that there is compelling evidence showing that key promoters of the impeachment campaign are seeking to remove Rousseff in order to contain the investigation of corruption cases and impose a far-right policy agenda that was rejected by Brazilian voters in the country’s most recent elections.

    • Hate crime levels are rising in England and Wales. How bad is it where you live?

      The Bureau sent Freedom of Information Requests to every police force in England and Wales, asking them to provide complete outcome data for all hate crimes recorded in 2014/15 and, separately, 2015/16.

      Forty police forces responded to our request. Because of discrepancies in their recording systems, particularly among smaller forces, we weren’t able to perform detailed comparisons of each of them. However, we are able to map changes in recorded hate crime at a regional level.

      There are significant regional difference, but the vast majority have seen increases in recorded hate crime. West Yorkshire, which has a large Muslim population, has seen the greatest rise, with recorded hate crimes up 69% from the previous year. Out of the 40 respondents, six forces have seen a fall. To see how your region compares, hover your mouse over the map and click for the data.

      The data obtained by the Bureau revealed that the chances of police or prosecutors taking action against hate crime offenders have plummeted over the last year. Victims of hate crime now have only a one in four chance of seeing a perpetrator charged, cautioned or dealt with in some other way by the police – down from one in three in the previous year.

    • Turkey’s president is using the failed coup as an excuse to snuff out secular democracy

      In the immediate aftermath of the Turkish military’s attempted coup on July 15, the international community responded with relief. While many people within Turkey and outside of it are no fans of president Recep Tayyip Erdogan’s authoritarian regime, the bloodshed and chaos that would have resulted from a government overthrow seemed like the worse of two options.

      But a little more than a week after the failed coup, it’s clear that the Turkish president is taking advantage of it in an attempt to gain absolute power in Turkey, enacting draconian measures and targeting any person or institution who might act as a voice of dissent. As Turkey moves toward dictatorial rule, here’s what the international community needs to know.

    • Non-Spanish-Speaking Teacher Sues Miami-Dade After She’s Denied Job Teaching Spanish

      An English-speaking teacher says the Miami-Dade County School Board discriminated against her by not hiring her for a job. The position? Teaching an hour of Spanish per day.

      Tracy Rosner, a third-grade teacher at Coral Reef Elementary, filed a federal lawsuit in the Southern District of Florida last week claiming employment discrimination on the basis of her race — which is white.

      Miami-Dade School Board attorneys have not filed a formal response in court and did not return calls for comment Thursday. We’ll update this post if they provide one.

    • Yavuz Baydar: The largest clampdown in modern Turkey’s history
    • The internet saved Turkey’s president from a coup. Now he’s doubling down on censorship.
    • Letter to US Government Officials Concerning Recent Events in Turkey

      We, the undersigned, condemn the actions taken by the Turkish government in violation of human rights and the rule of law. The principle of independence and impartiality of the judiciary—together with freedom of the media—is at the foundation of the rule of law and democracy. The political independence and the academic freedom of the educational profession is essential for free societies.

    • Arab Street Shocked as Saudi Delegation Visits Israel

      The Egyptian news site the Arab Observer Network reports that the visit to Israel of a former Saudi military intelligence officer, Gen. Anwar Eshki, came as a body blow to the Arab in the street. He conducted several meetings with Israeli officials last week, along with a “high level” Saudi delegation.

      Saudi Arabia and Israel, the old hegemons in the Middle East, are increasingly coordinating to confront a rising Iran.

      Eshki met with Dore Gold, the general director of the Israeli foreign ministry, as well as Israeli members of parliament. On his agenda was restarting the Israel-Palestine peace process on the basis of the 2002 Saudi/ Arab League plan, which calls for a two-state solution on the basis of 1967 borders.

    • Robot-Delivered Death in Dallas

      The Dallas police decision to use a robot-delivered bomb to kill the cornered shooter blamed for murdering five police officers raises troubling legal, technological and public-safety questions, writes Marjorie Cohn.

    • Do Black Kids Matter in Memphis?

      PREA is the Prison Rape Elimination Act, sweeping federal legislation targeting the nation’s prisons and jails. Passed in 2003, the law was aimed in part at places like this — facilities for youth who present a danger to others or themselves. But while PREA has proven hard to implement, that’s not why I was there that day. Less than a year after Shelby County Sheriff Bill Oldham took over the detention center that sits directly above juvenile court, officials were running dangerously afoul of a different federal intervention — one designed specifically for Shelby County.

    • NSA and CIA Hacked Enrique Peña Nieto before the 2012 Election

      Part of the frenzied discussion about the possibility that Russia hacked the DNC includes claims that the US would never do something so dastardly.

      Except that the Foreign Government Section 702 Certificate makes it clear the NSA is authorized to spy on foreign based political organizations even within the US (and would have far more liberty under EO 12333). Among the parties specifically authorized for targeting in 2010 was Pakistan’s People Party, the incumbent party in a nominal ally.

    • Israel’s Tightening But Weakening Grip

      Zionism’s range of influence is shrinking. One can see this progression worldwide. At a popular level the Israelis have lost control of the historical storyline of Israel-Palestine. They may teach their own citizens their version of the story, the one wherein the Jews have a divine and/or historical right to all of Palestine’s territory. But beyond their fellow Zionists and the loony Christian Right, no one else believes this story. Significantly, an increasing number of Jews no longer accept it either.

      None of this means that the Zionists are not still influential. Yet their influence no longer has a broad popular base. It is now largely restricted to Western government circles. Of course, that is still impressive, and such lobby power does a lot of damage in the West through the corruption of elites and the perversion of state policies. We are seeing examples of this in the many stories of American police officers being trained by Israelis while (coincidently?) episodes of police brutality in the U.S. multiply.

    • Federal “Blue Lives Matter” Legislation Picks up Steam, Advances Myth that Cops are Under Threat

      If Donald Trump’s “Law and Order” convention is any indication, Republicans in Congress could soon try to amend federal law to equate violence against police officers to assaults fueled by bigotry.

      The Blue Lives Matter Act of 2016, which was introduced to the House in April, gained two co-sponsors in the two weeks prior to the Republican Convention. The bill would amend Chapter 13 of Title 10 of the US Code to “make an attack on a police officer a hate crime.”

      Trump’s convention focused heavily on the idea that crime is out of control, in part, because police are on the receiving end of unfair criticism.

      “I have a message to every last person threatening the peace on our streets and the safety of our police,” Trump said during his speech on Thursday. “When I take the oath of office next year, I will restore law and order our country.”

  • Internet Policy/Net Neutrality

    • EC approves EUR 4 billion Italian broadband plan

      In June, the European Commission approved Italy’s high-speed broadband plan to deliver fast Internet access to 7300 of the country’s 8000 municipalities. The EUR 4 billion plan will build a country-wide network infrastructure, improving Internet access for citizens, businesses, and public administrations – including schools and hospitals.

    • Poland studies ways to improve broadband for SMEs

      Poland’s Ministry of Digitisation is studying how it can best help the country’s small and medium-sized enterprises (SMEs) that wish to offer broadband Internet access. Recently, the ministry met with banking organisations and SME telecom trade groups, to discuss options for financing infrastructure upgrades, including possibilities for European co-financing.

  • Intellectual Monopolies

    • How A Supreme Court Case On Cheerleader Costumes & Copyright Could Impact Prosthetic Hands And Much, Much More

      Every time this case has come up (and it’s been bouncing around the courts for a while now), I’ve been meaning to write about it, but am only just getting around to it now that organizations are filing amici briefs with the Supreme Court. The case is Star Athletica v. Varsity Brands, and it sounds kind of stupid: the issue is that both companies make cheerleading uniforms, and Varsity Brands accused Star of copying its uniform designs. Star argued that as a “useful article” a cheerleading uniform is not subject to copyright protection, and it won at the district court level. The 6th Circuit, however, reversed that ruling about a year ago, saying that while the uniform design may not be copyrightable, elements within the design (stripes, zigzags, chevrons, etc.) could be.

      This is problematic for a variety of reasons. Clothing and fashion have never been considered covered by copyright for many good reasons, and it’s actually helped create a more innovative, more competitive, thriving market for fashion. There’s a reason why copyright is not allowed on “useful articles,” and it’s worked. We shouldn’t suddenly be changing those rules now.

      The Supreme Court has agreed to hear the case, and various amici have begun filing their briefs. You can also see Star Athletica’s own filing as well, which focuses (as it should) on the narrow technical question regarding “separability” and whether or not you can “separate” the design that’s being claimed for copyright from the article itself. That is, you could argue that a square painting done on a T-shirt could be “separable” from the T-shirt and thus get a copyright, while the T-shirt itself could not. Here, however, we’re talking about basic elements of a cheerleading uniform such as stripes and color patterns that help identify it as a cheerleading uniform.

    • Copyrights

      • New Piracy Kings And KickassTorrents Alternatives — The Pirate Bay And ExtraTorrent

        After the demise of KickassTorrents, internet pirates are looking for alternatives.

      • Katcr.co: Original KickassTorrents Community Is Back, Without Torrents

        Some KickassTorrents employees have grouped to form a KickassTorrents community website that has become a home to the loyal users. Named Katcr.co, this website doesn’t offer any torrent links. Many original staffers and team members are present on the website that are acting as moderators and admins of the forum.

      • IsoHunt Settles The Last Of Its Lawsuits, Laughably Agrees To ‘Pay’ Recording Industry $66 Million

        You may recall that almost three years ago, the BitTorrent search engine IsoHunt agreed to shut down and to “pay” Hollywood studios $110 million. The number was a joke, because IsoHunt and its creator didn’t have $110 million. It’s just that the legacy copyright players always like to end these lawsuits with a giant headline grabbing number, while they’ve quietly agreed to accept very little, if any, actual money (and whatever money they do receive is not then distributed to any artists). The Sony email hack a few years back revealed that the industry does this frequently in closing out its lawsuits against search engines. IsoHunt was more or less forced into that settlement after the MPAA misled the court about IsoHunt’s actions. But the court bought it, and the IsoHunt court rulings have created some really unfortunate precedents. It’s the case that the legacy players always point to, because it’s the only case to find that a search engine platform has “red flag knowledge” of copyright infringement without having specific knowledge of infringing files.

        The case against Hollywood, however, wasn’t the only case IsoHunt was fighting. It also was fighting the recording industry up in Canada in a case that began with IsoHunt filing for declaratory judgment that it didn’t infringe in Canada, all the way back in 2008. The Canadian Recording Industry Association (CRIA), then sued back — but did everything it could to keep the case out of the news because it was also fighting for new copyright laws in Canada… and part of its argument was that the existing Canadian copyright laws were inadequate to go after IsoHunt and similar sites.

      • 20th Century Fox Accuses Kim Dotcom of Asset Freeze Breach

        20th Century Fox has accused Kim Dotcom of breaching a freeze on his assets imposed following his arrest in 2012. According to claims made by the studio in the New Zealand High Court, Dotcom took a US$154,000 loan from his lawyers on behalf of a trust for his children.

      • KAT Takedown Triggers Traffic Spike at Torrent Sites

        Earlier this week KickassTorrents was taken down following a criminal investigation into the site’s alleged owner. Since then, millions of frequent users have taken refuge elsewhere. The Pirate Bay and ExtraTorrent are among the major beneficiaries, with the latter reporting an instant traffic spike of more than 300%.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts