EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

07.03.15

Links 3/7/2015: KDE Applications 15.04.3, Ubuntu-Flavored Compute Stick

Posted in News Roundup at 3:21 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Q&A: Zipcar founder Robin Chase on open source and the collaboration economy

    Robin Chase is a transportation entrepreneur known for founding the transportation related companies such as Zipcar, Buzzcar and Veniam. She wears many hats and is an inspiration to women all around the globe. She is also a strong supporter of Open Source and Open Collaborative technologies. She recently authored a book called Peers Inc: How People and Platforms Are Inventing the Collaborative Economy and Reinventing Capitalism. Chase will be delivering a keynote at the upcoming LinuxCon event.

  • Exclusive interview with Hans de Raad

    In my daily life (both personal and professional) I use open source for just about anything, from LibreOffice to Drupal, Kolab, Piwik, Apache, KDE, etc.

    Being part of the communities of these projects for me is a very special extra dimension that creates a lot of extra motivation and satisfaction.

    For me, open source isn’t so much of a choice it is simply the standard.

  • 7 stories that make you feel good about open source in 2015 (so far)

    One of the great things about open source is its reach beyond just the software we use. Open source isn’t just about taking principled stands, it’s about making things better for the world around us. It helps spread new ideas by letting anyone with an interest modify and replicate those ideas in their own communities.

    In this collection, let’s take a look back at some of the best articles we’ve shared this year about the ways that open source is making an impact on communities and improving the lives of people across the world.

  • Project Ascension: Reddit-born open source game launcher unveils user interface for ‘better gaming’

    Forget about having multiple game launcher clients slowing down your computer – a community born on Reddit wants to unify all the popular game launchers into one multi-platform launcher.

    Project Ascension started as a community discussion on social bookmarking website Reddit in April, when users complained that they were tired of having many different game launcher ecosystems, such as Steam, Origin, GOG and uPlay.

  • Google makes deep learning AI software open-source
  • Google open-sources its software for making trippy images with deep learning
  • Google opens up Deep Dream software, terrifies world
  • Google Opens Up its Deep Dream Code to Let People Create Hallucinogenic Images
  • Google’s trippy project DeepDream project goes public
  • Open source platform security considerations

    In the enterprise, open source software can be a great benefit for those who take the time to weigh the risks and select the right platform.

  • How Open Source Drives IBM’s Systems Unit

    “Fifteen years ago, we made the decision to bring Linux into the mainframe. In fact, this was the first $1 billion commitment IBM made to Linux back in the year 2000. And I’d like to think, in some small way, we helped bring Linux to the enterprise with that commitment of over 15 years ago,” Balog said.

  • Where are they now? 5 open source projects
  • SourceForge forming Community Panel

    SourceForge has begun outreach to Open Source developers and end-users in an effort to form a Community Panel to help guide future development of our products and policies.

    We expect to have ongoing communications with members of our Community Panel in coming weeks, to be followed by an in-person event at summer’s end on the east coast of the US.

  • Events

    • OSI at OSCON 2015

      Once again the OSI and our Board of Directors will be at OSCON. Just like in years past, the OSI will again be strongly represented with presentations form our Board Directors, Affiliate Members and Individual Members, a booth in the Expo Hall and even a dedicated session on how to use OSI’s resources to change the open source world.

  • Web Browsers

    • Chrome

      • 5 Best Enterprise Apps and Extensions for Google Chrome

        We have already covered a lot of enterprise applications on our site before. However, one would never expect apps in this genre to exist on a browser like Google Chrome. But, nothing could be further from the real truth. Google’s effort to outsmart even the biggest players in the enterprise market are gradually paying off. Slowly spreading its wings into the business world, Google is venturing into arenas where Microsoft once reigned supreme. While the competition doesn’t concern us much, but what has happened, in effect, is that the rivalry is bringing out the best in both companies.

    • Mozilla

      • Firefox 39 Arrives After a Three-Day Delay

        Mozilla has finally released the stable version of Firefox 39 after it delayed the launch for a couple of days. It’s not a major release, but it does have a few interesting features and quite a few bug fixes.

      • New Sharing Features in Firefox

        Whichever social network you choose, it’s undeniable that being social is a key part of why you enjoy the Web. Firefox is built to put you in control, including making it easier to share anything you like on the Web’s most popular social networks. Today, we’re announcing that Firefox Share has been integrated into Firefox Hello. We introduced Firefox Share to offer a simple way of sharing Web content across popular services such as Facebook, Twitter, Tumblr, LinkedIn and Google+ and other social and email services (full list here) to help you share anything on the Web with any or all of your friends.

  • SaaS/Big Data

  • Oracle/Java/LibreOffice

  • Business

  • BSD

    • finding bugs in tarsnap

      Some people were hanging around Michael Lucas’s table at BSDCan, and the topic of conversation turned to Tarsnap. (Lucas has a book about it.) Each person went round the circle and said they were happy to pay Colin for his service, but when it was finally my turn I was forced to admit that while I would pay for Tarsnap, I found a bug and so, thanks to the bounty, it may be more accurate to say I get paid to use it.

    • bsdtalk 254 [Ogg]
    • Pfmatch, a packet filtering language embedded in Lua

      Greets, hackers! I just finished implementing a little embedded language in Lua and wanted to share it with you. First, a bit about the language, then some notes on how it works with Lua to reach the high performance targets of Snabb Switch.

    • OPNsense 15.7 Released As Fork Of Pfsense

      The OPNsense 15.7 release added i386 and NanoBSD support, LibreSSL support, re-based to FreeBSD 10.1, added OpenDNS support, intrusion detection support, new local/remote backlist options, some security fixes, and added many other new features.

    • OPNsense 15.7 ‘Brave Badger’ is Released, The Next Step in Open Source Security
  • FSF/FSFE/GNU/SFLC

    • Teaching Email Self-Defense: Campaigns intern leads a workshop at PorcFest

      My workshop on Email Self-Defense took place at the 12th annual Porcupine Freedom Festival in Lancaster, New Hampshire. Around eight people attended, which was a few more than I expected. Christopher Waid and Bob Call of ThinkPenguin joined me in helping everyone who brought a laptop to set up GnuPG properly. Those who didn’t bring a laptop participated by observing the process on the system most similar to their own and asking questions about particular steps, so as to enable them to achieve the same configuration when they returned home.

  • Project Releases

  • Public Services/Government

    • Q&A: Why Congress is Jumping on the Open Source Bandwagon

      Members of the House, committees and staff have officially received the green light to obtain open source software for their offices, and to discuss software code and policy with developers, citizens and other legislators in communities such as GitHub, according to the Congressional Data Coalition advocacy group.

      The White House joined open source code repository site GitHub in 2012. But it wasn’t until this May a sitting congressman, Rep. Gerry Connolly, D-Va., first joined the site. Connolly used it to make edits to guidance on implementation of the Federal IT Acquisition Reform Act.

  • Licensing

  • Openness/Sharing

    • Grateful Dead Open Source Business Model One of the Most Successful

      The Dead was one of the first and most successful open source business models. They never felt their albums captured their true sound and musical depth. This could only come through their live performances. And yet, because they were very experimental and bold risk takers, any particular show could fall flat or even spontaneously combust. Thus, it was important to see many shows because magic would inevitably transpire and they wanted all of their fans to know what that was like and have a hunger for more once it had been experienced. A true natural high for anyone that has experienced it. As it’s been said, there is nothing like a Grateful Dead show.

    • Atom 1.0 from GitHub, the new R consortium, and more news
    • Open Hardware

      • Long live ROS: Why the robotics revolution is being driven by open source development

        The 2015 DARPA Robotics Challenge (DRC) wrapped up last month, and while teams from Korea and the U.S. took away $3.5M in prize money, the real winner was the open source robotics movement. Of the 23 teams competing in the DRC, 18 utilized the open-source Robotic Operating System (ROS) and 14 used Gazebo, an open source robot simulator that allows developers to test concepts in robust virtual environments without risking valuable hardware.

  • Programming

Leftovers

  • Health/Nutrition

    • Bill Gates’ Temporary Sterilization Microchip In Beta Female Testing By End of Year

      The same developers who are bringing wireless remotely controlled microchip implants are actually focusing on their first flagship product: Gates Foundation-funded birth-control microchip implants. Wireless technology allows the remotely controlled chip to turn a woman’s ability to conceive off or on at will – temporary sterilization.

  • Security

  • Defence/Police/Secrecy/Aggression

  • Environment/Energy/Wildlife

  • Finance

    • Bernie Sanders and the Rebirth of Socialism in the US?

      Yes, it may be unlikely that Sanders will win the nomination. In national polls for the primaries Hillary Clinton, the favorite, did not poll less than 50 percent since April. Bernie Sanders has not polled over 25 percent since June 2014. But recent polls seem to suggest growing support for Sanders, particularly in the Iowa caucus and the New Hampshire primary. Regardless of the results, however, Sanders’ bid for the candidacy has led to a discussion around socialism.

    • Beware Greeks Bearing Rifts

      The Euro project will continue to be extremely strong. New money will be funnelled into the pockets of bankers. It is important to recall that 100% of these bailout funds go to bankers, none of it goes to the Greek people and none of it stays in Greece. The same bankers will become the beneficiaries of servicing of new loans provided to vast corporations to buy up Greek public assets, cheap.

    • Europe is heading towards constitutional crisis, with or without Greece

      As Greek Prime Minister Alexis Tsipras stands off against the so-called Troika, questions abound about the future of his country.

      But there should also be pressing questions about the future of the European Union. The shaky legal foundations of the EU have been laid bare by this crisis.

    • Lidl has received almost $1bn in public development funding

      Supermarket chain owned by one of Germany’s wealthiest families given money over past decade by World Bank and others as it expands into eastern Europe

  • PR/AstroTurf/Lobbying

    • NPR Ombud Responds on ‘All-Corporate Lobbyist’ Alert – Report not as one-sided as FAIR claimed, Jensen said–but opposition voice would have strengthened it

      NPR ombud Elizabeth Jensen wrote a column (7/1/15) responding to a FAIR Action Alert, “NPR Celebrates Fast-Track Victory With an All-Corporate Lobbyist Segment” (6/27/15).

      Jensen acknowledges that the report in question (Morning Edition, 6/25/15), which featured three executives from business lobbies talking about Congress’s passage of corporate-backed Fast-Track legislation, “would have been stronger and more complete if it had included a voice representing the opponents.”

    • National Plutocrat Radio – Corporate One-Percenters dominate NPR affiliates’ boards

      For a public radio service, NPR is notoriously known for its lack of diversity within its staff, audience and guests invited onto their shows—problems that NPR has itself acknowledged (6/30/14).

      A new FAIR study finds that NPR’s diversity problem also extends into the board of trustees of its most popular member stations: Two out of three board members are male, and nearly three out of four are non-Latino whites. Fully three out of every four trustees of the top NPR affiliates belong to the corporate elite.

    • James Loewen on Racism and US History

      He’s the author of the classic book, Lies My Teacher Told Me, which assesses the textbooks used in US classrooms, turning up falsehoods, elisions and distortions. He explains some of the reasons students say they hate history–and non-white students hate it most of all.

  • Censorship

    • Reddit moderators in revolt, Reddit on lockdown

      Reddit has been in the news a lot in recent months, and not for any positive reasons. Now the site is again making headlines as its moderators go on a strike and put Reddit in a virtual state of lockdown.

    • Reddit rebellion: huge chunks of the site have gone down following a staff member’s departure

      Reddit is in revolt. This week, Victoria Taylor, director of talent and coordinator of the site’s popular “Ask me Anything” (r/IAmA) subreddit, left reddit, apparently against her will. In response, a group of the site’s coordinators have pulled the shades on some of the site’s most popular sections.

    • BEL MOONEY: Why does my alma mater have one rule for hate preachers and another for scientists who make daft jokes?

      People may wonder why this issue has attracted so much attention. After all, a speech made by an eminent scientist — a Nobel Prize-winner, no less — to a small group of journalists in South Korea in a previous age would have received no attention at all.

      But after the 72-year-old Prof’s weak jokes about how ‘girls’ are a distraction in laboratories — which made some listeners titter and others roll their eyes — just three people tweeted shock-horror, and the storm began.

      Sir Tim quickly found his career and reputation, built up over 50 years, all but ruined. Although he apologised for his error, he was still unceremoniously hounded out of honorary positions at UCL, the Royal Society and the European Research Council.

      That response was, in my view, hasty and disgraceful —and out of all proportion to his alleged ‘crime’.

    • David Cameron Promises To Do Away With ‘Safe Spaces’ On The Internet

      Earlier this year, there were some questions raised when it appeared that UK Prime Minister David Cameron was suggesting that he wanted to undermine all encryption on the internet. Later, some suggested he was looking more at undermining end point security. However, after being re-elected, and apparently believing that this gave him the mandate to go full Orwell, Cameron is making it clear that no one should ever have any privacy from government snoops ever.

  • Privacy

    • GCHQ did spy on Amnesty International, secret tribunal admits

      The Investigatory Powers Tribunal (IPT), which provides oversight for UK intelligence services, admitted yesterday that its judgement made on 22 June wrongly failed to declare that Amnesty International had been subject to unlawful surveillance by GCHQ. The IPT revealed this in an e-mail sent to the ten NGO claimants involved in the earlier legal challenge to UK government surveillance. As Amnesty International explained: “Today’s communication makes clear that it was actually Amnesty International Ltd, and not the Egyptian Initiative for Personal Rights (EIPR) that was spied on in addition to the Legal Resources Centre in South Africa.”

    • GCHQ did illegally spy on Amnesty International, Investigatory Powers Tribunal admits

      The IPT said in its original judgement that communications by the Egyptian Initiative for Personal Rights and the South African non-profit Legal Resources Centre had been illegally retained and examined.

      However, the tribunal made it clear in the email sent on Wednesday that it was Amnesty International and not the Egyptian organisation that had been spied on, as well as the Legal Resources Centre in South Africa.

      The IPT email made no mention of when or why Amnesty International was spied on, or what was done with the information obtained. The organisation is calling for an independent inquiry into how and why a UK intelligence agency has been spying on human rights organisations.

    • Harvard University admits to IT systems data breach

      THE PRESTIGIOUS HARVARD UNIVERSITY has revealed that it was the victim of a security breach in June affecting eight schools and administrative organisations at the university.

      The intrusion in the IT systems of Harvard’s Faculty of Arts and Sciences and Central Administration was discovered on 19 June, and is thought to have exposed various log-in credentials, including for Office 365, which were stored on the compromised networks.

      “At this time, we have no indication that research data or personal data managed by Harvard systems (e.g. Social Security numbers) have been exposed,” said the university IT team in an advisory on its website.

    • A Look at the Inner Workings of NSA’s XKEYSCORE

      The sheer quantity of communications that XKEYSCORE processes, filters and queries is stunning. Around the world, when a person gets online to do anything — write an email, post to a social network, browse the web or play a video game — there’s a decent chance that the Internet traffic her device sends and receives is getting collected and processed by one of XKEYSCORE’s hundreds of servers scattered across the globe.

    • XKEYSCORE: NSA’s Google for the World’s Private Communications

      One of the National Security Agency’s most powerful tools of mass surveillance makes tracking someone’s Internet usage as easy as entering an email address, and provides no built-in technology to prevent abuse. Today, The Intercept is publishing 48 top-secret and other classified documents about XKEYSCORE dated up to 2013, which shed new light on the breadth, depth and functionality of this critical spy system — one of the largest releases yet of documents provided by NSA whistleblower Edward Snowden.

    • Privacy Is Personal

      Linux would not be here without the Net. Nor would countless other building materials and methods that support networked life and the institutions that rely on networks, which now include approximately everything.

      [...]

      All these things need to be as casual and easily understood as clothing and shelter are in the physical world today. They can’t work only for wizards. Privacy is for muggles too. Without agancy and scale for muggles, the Net will remain the Land of Giants, who regard us all as serfs by default.

  • Civil Rights

    • Amnesty International Responds to U.K. Government Surveillance

      A British tribunal admitted on Wednesday that the U.K. government had spied on Amnesty International and illegally retained some of its communications. Sherif Elsayed-Ali, deputy director of global issues for Amnesty International in London, responds:

      Just after 4 p.m. yesterday, Amnesty International received an email from the Investigatory Powers Tribunal (IPT), which hears cases related to U.K. intelligence agencies. The message was brief: There had been a mistake in the tribunal’s judgment 10 days earlier in a case brought by 10 human rights organizations against the U.K.’s mass surveillance programs. Contrary to the finding in the original ruling, our communications at Amnesty International had, in fact, been under illegal surveillance by GCHQ, the U.K.’s signals intelligence agency.

    • No Craig Newmark Did Not Donate To EFF; He Helped Make CFAA Worse Instead

      There’s been a bunch of fuss online over the “news” that Craigslist is supposedly donating $1 million to EFF when the money is not actually from Craig. It’s from a startup that Craigslist has sued out of business, under a dangerous interpretation of the CFAA that harms the open internet. Obviously, EFF getting an additional $1 million in resources is really great. But it’s troubling to see so many people congratulate Craigslist and Craig Newmark for “supporting EFF.” Craig himself has contributed to this misleading perception with this tweet implying he’s giving his own money to EFF…

      [...]

      And yet Craigslist sued these companies under a tortured definition of the CFAA, arguing that the mere scraping of its data to provide value on top of it (none of which took away any value from Craigslist) was “unauthorized access.”

  • Internet/Net Neutrality

    • IPv4 address stock dwindles as North American database runs dry

      The number of available IPv4 address spaces has fallen so low that the US organisation responsible for handing out addresses has rejected a request because there was not enough stock.

      The American Registry for Internet Numbers (ARIN) posted a note on its website confirming the move, although it did not say from where the request had come.

      “ARIN activated the IPv4 Unmet Requests policy this week with the approval of an address request that was larger than the available inventory in the regional IPv4 free pool,” said ARIN chief executive John Curran.

  • DRM/Restriction

    • iOS 8.4 kills Home Sharing for music and people aren’t happy about it

      APPLE QUIETLY KILLED OFF Home Sharing for music in iOS 8.4, and has pissed off its customers in the process.

      Home Sharing for music launched in 2011 as part of iOS 4.3, and allowed iPhone, iPad and iPod users to stream music from a computer running iTunes, as long as the devices were connected to the same WiFi network.

  • Intellectual Monopolies

    • Copyrights

      • Kim Dotcom Appeals to Reclaim ‘Mega Millions’ from U.S.

        In an effort to reclaim an estimated $67 million in assets, Megaupload’s legal team has appealed the forfeiture the U.S. Government won earlier this year. The filing refutes the claim that Kim Dotcom and his former colleagues are fugitives, and warns of the dangerous precedent the District Court ruling will set.

      • The battle to reform 300-year-old copyright law for the digital age

        The Internet is built on copying. That’s true at a purely technical level: as packets of data move around the world, they are copied from network to network, and finally to the end-user’s device. But it’s also true in terms of how people use the Internet: they are constantly sending copies across the network, whether partial snippets or entire works. That’s a big problem, because once a creation is in a fixed form, it is automatically subject to copyright, an intellectual monopoly that gives creators the power to prevent copies being made of their work. Quite simply, this situation ensures that almost everyone using the Internet is also breaking the law multiple times every day.

07.02.15

Links 2/7/2015: KDE Plasma 5.3.2, antiX 15

Posted in News Roundup at 12:46 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • NHS IT failures mount as GP data system declared unfit for purpose

    The towering scrapheap of NHS IT failures may about to rise further, with the increasingly expensive GP Extraction Service IT system deemed not fit for purpose by the government’s spending watchdog.

    Costs for the GPES IT system, which is supposed to extract data from all GP practices in England, have ballooned from £14m to £40m, with at least £5.5m wasted on write-offs and delay costs, said the National Audit Office.

    The GPES has so far managed to provide data for just one customer – NHS England – who received four years later than originally planned.

    The NAO said the need for the service remains and further public expenditure is required to improve or replace it.

  • Alton Towers apologises for taking up to an hour to evacuate passengers from monorail in searing heat
  • Science

  • Security

    • Security advisories for Wednesday
    • What We Call Security Isn’t Really Security

      Well, it’s probably no shock to you that the security industry can’t agree on a definition of security. Imagine if the horse industry couldn’t agree on what is a horse. Yes, it’s like that.

    • UH OH: Windows 10 will share your Wi-Fi key with your friends’ friends

      Those contacts include their Outlook.com (nee Hotmail) contacts, Skype contacts and, with an opt-in, their Facebook friends. There is method in the Microsoft madness – it saves having to shout across the office or house “what’s the Wi-Fi password?” – but ease of use has to be teamed with security. If you wander close to a wireless network, and your friend knows the password, and you both have Wi-Fi Sense, you can now log into that network.

    • Former L0pht man ‘Mudge’ leaves Google for Washington

      L0pht co-founder and CTO of Veracode Chris Wysopal told Security Ledger software remains among “the last products that has no transparency to what the customer is getting, adding that the “pseudo-monopolies” in the industry can simply refuse to co-operate with third-party testers.

  • Defence/Police/Secrecy/Aggression

  • Finance

    • Economic Update: Pope Questions Capitalism

      We have fun with why US govt leaving Waldorf Astoria hotel in New York and we celebrate rising UK movement against austerity. Second half of show interviews veteran reporter Bob Hennelly on the Pope’s statement about ecology, environment, and a failing economic system.

    • Socialism Means Abolishing the Distinction Between Bosses and Employees

      Regulated private capitalism. State capitalism. Socialism. These three systems are entirely different from each other. We need to understand the differences between them to move beyond today’s dysfunctional economies. With confidence waning in whether modern private capitalism can truly be fixed, the debate shifts to a choice between two systemic alternatives that we must learn to keep straight: state capitalism and socialism.

  • Privacy

    • WikiLeaks: New intelligence briefs show US spied on German leader

      On Wednesday, WikiLeaks published two new top-secret National Security Agency briefs that detail American and British espionage conducted against German leaders as they were discussing responses to the Greek economic crisis in 2011.

      The organization also published a redacted list of 69 German government telephone numbers that were targeted for snooping. That list includes Oskar Lafontaine, who served as German finance minister from 1998 to 1999, when the German government was still based in Bonn—suggesting that this kind of spying has been going on for over 15 years at least.

    • VPNs are exposing sensitive user data due to IPv6 leakage vulnerability

      A STUDY has found that 11 out of 14 virtual private network (VPN) providers are exposing personal information through a vulnerability known as IPv6 leakage.

      This is damning for such privacy services, many of which have seen increased use since the Edward Snowden PRISM revelations of 2013.

    • Orfox Is The Guardian Project’s Latest App For Bringing The Tor Browser Experience To Android, First Alpha Release Is Available

      The Guardian Project, the group behind previous efforts to bring Tor and other privacy-preserving software to Android, is working on a Tor-friendly browser built on the desktop equivalent’s codebase. This app, named Orfox, will replace its WebView-based predecessor Orweb.

  • Civil Rights

    • TSA Asks America To LOL At Traveler Who Had $75,000 Taken From Him By Federal Agents

      The TSA runs a fairly entertaining Instagram account, if you’re the sort of person who is impressed by pictures of weapons seized from stupid passengers. That would be the extent of its social media prowess. Its blog is pretty much a 50/50 mix of Yet Another Thing You Can’t Take Onboard and Blogger Bob defending the TSA’s latest gaffe.

      One of the TSA’s official Twitter flacks tried to loft a lighthearted “hey, look at this thing we came across!” tweet. She couldn’t have picked a worse “thing” to highlight, considering the ongoing outrage over civil asset forfeiture.

  • Internet/Net Neutrality

    • Europe to end mobile roaming charges by June 2017

      Lawmakers agreed a final proposal to scrap roaming charges and introduce rules based on “net neutrality”. Roaming charges are a part of life when you travel abroad and customers are penalised that just have to use their mobile phone for data. The good news now is that nonsense will come to end in June 2017, there will however be the usual fair use policy.

  • Intellectual Monopolies

    • Copyrights

      • UK police seize thousands of Android streamers modded for piracy

        Set-top boxes help deliver streaming services like Netflix and Now TV into our homes, but they’re also giving rise to less-than legal methods of watching films, TV shows and sport. As manufacturers have embraced the open nature of Android, enterprising users have found ways to install apps that facilitate piracy, which has become a business in its own right. This week, a number of police forces conducted raids on sellers of “pirate” Android streamers, confiscating thousands of units in the process.

      • Supreme Court won’t weigh in on Oracle-Google API copyright battle

        The Supreme Court on Monday rejected Google’s appeal of the Google-Oracle API copyright dispute. The high court’s move lets stand an appellate court’s decision that application programming interfaces (APIs) are subject to copyright protections.

      • Supreme Court Won’t Hear Oracle v. Google Case, Leaving APIs Copyrightable And Innovation At Risk

        This is unfortunate, even if it was somewhat expected: the Supreme Court has now rejected Google’s request to hear its appeal over the appeals court decision that overturned a lower court ruling on the copyrightability of APIs. The lower court decision, by Judge William Alsup (who learned to code Java to understand the issues), noted that APIs were not copyrightable, as they were mere methods, which are not subject to copyright.

07.01.15

Links 1/7/2015: OpenDaylight Lithium, OpenMandriva Lx 2014.2

Posted in News Roundup at 2:51 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • 6 things technical leaders should consider around open-source software

    Many organisations have a wide array of open-source applications and code in use today – whether it be at the infrastructure and application layers, or in development frameworks and GitHub repositories.

    However, the applications developer and infrastructure teams come under increasing pressure as organisations rush to develop new services for customers, comply with growing amounts of industry regulation, or simply strive to meet the needs of the information generation.

  • Navigating through an open-source world
  • Open Source to power financial services innovations
  • AWS security looks to avoid cloud reboots with s2n
  • ​Amazon introduces new open-source TLS implementation ‘s2n’
  • Amazon Web Services Delivers Open Source Cryptographic Tool
  • Amazon Releases S2N TLS Crypto Implementation to Open Source
  • Amazon releases open source cryptographic module

    The software, s2n, is a new implementation of Transport Layer Security (TLS), a protocol for encrypting data. TLS is the successor of SSL (Secure Sockets Layer), both of which AWS uses to secure most of its services.

  • Engineers at Etsy play by their own rules

    Etsy, the leading marketplace for handmade goods, has grown by leaps and bounds over the past five years. During that time they’ve iterated on their model, their strategy, and their mission. One thing that’s driven the success of those changes is their open workplace culture.

    I talked to senior engineering manager John Goulah about what it means to fail faster at Etsy, and he shared with me some interesting insights into the communication techniques Etsy uses to empower their associates and improve the experience of buyers and sellers on the site.

  • Altera, Brain4Net and CertusNet Join the OPNFV Project to Accelerate Open Source NFV
  • SaaS/Big Data

  • Databases

    • NoSQL and the next generation of big data

      Ingo is a senior solutions architect at MongoDB. He is active in many open source projects, and is the author of Open Life: The Philosophy of Open Source, a book on open source community ethics and business models.

  • Oracle/Java/LibreOffice

    • LibreOffice 4.4.4 Released

      The Document Foundation today announced LibreOffice 4.4.4, the latest update to the 4.4 branch. Today’s release brings 74 bug fixes including several crashes and import/export bugs. The announcement today also brought news of version 5.0 as well as reminders for the LibreOffice Conference in September.

  • BSD

    • PC-BSD 10.2 Gets Ready For Release, 11.0-CURRENT For Testing

      The PC-BSD development team today announced their 10.2 pre-release, which continues to be derived from FreeBSD. Additionally they’ve also announced new 11.0-CURRENT images for those wishing to get a look ahead at FreeBSD/PC-BSD 11.0.

      The PC-BSD 10.2 pre-release / 11.0 current announcement didn’t offer many details about all of the changes in store, but once PC-BSD 10.2 and PC-BSD/FreeBSD 11.0 are officially out, you can expect lengthy write-ups on Phoronix.

      More details via the PCBSD.org blog.

  • FSF/FSFE/GNU/SFLC

  • Public Services/Government

    • It’s 2015 And Congress Is Now, Finally, Allowed To Use Open Source Technologies

      First, the good news: members of the House of Representatives in the US Congress are now allowed to use open source technology in their offices, rather than the very limited list of proprietary offerings they were given in the past. Second, the bad news: how the hell is it 2015 and this is only becoming an option now? I guess we can’t change the past, and so let’s celebrate the House of Reps finally getting to this point — which just happens to coincide with the upcoming launch of the House Open Source Caucus (led by Reps. Blake Farenthold and Jared Polis).

    • The House opens up to open source

      Traditionally, members of the House of Representatives have been presented with a limited plate of options when choosing technology to run their offices and manage their web presences. Members that wanted to take advantage of open source solutions — which are restriction-free, reusable and frequently more cost-effective — faced significant uncertainty and were pushed towards a small selection of proprietary options.

    • Extremadura schoolboard’s software deal protested

      Advocates of free software are protesting a tender by the school board of the Spanish region of Extremadura requesting proprietary software licences. The advocacy group, Extremadura Focus Initiative, is supported by the new, incoming government of the region and by several of Extremadura’s school teachers.

  • Licensing

  • Openness/Sharing

  • Programming

    • The Problem With Putting All the World’s Code in GitHub

      The ancient Library of Alexandria may have been the largest collection of human knowledge in its time, and scholars still mourn its destruction. The risk of so devastating a loss diminished somewhat with the advent of the printing press and further still with the rise of the Internet. Yet centralized repositories of specialized information remain, as does the threat of a catastrophic loss.

    • R, Matey: Hoisting the Sails for a Programming Language

      So what is R? The R programming language is a free and open source programming language for statistical computing and provides an interactive environment for data analysis, modeling and visualization. The language is used by statisticians, analysts and data scientists to unlock value from data.

    • A Code Boot Camp for Underprivileged Kids

      A science center in Johannesburg, South Africa, has opened the doors to a five-month course in Linux-based Web apps and entrepreneurial skills. The training is available free of charge to underprivileged students from nearby townships; if it’s successful, it will be rolled out nationwide.

    • MIT develops donor ‘transplants’ for buggy code without access to the source

      A team from the Massachusetts Institute of Technology (MIT) have come up with a way to use ‘donor’ programs to improve the functionality and reduce system errors and flaws in open-source programs.

      Outlined in a paper dubbed “Automatic error elimination by horizontal code transfer across multiple applications,” MIT researchers describe the Code Phage system, which automatically transfers code from donor programs to other applications which have buggy code and errors.

    • PHP for Non-Developers
    • PHP SIG – Autoloader

      The Fedora PHP SIG (Special Interest Group) is back / working.

  • Standards/Consortia

    • Op-ed: Safari is the new Internet Explorer

      Last weekend I attended EdgeConf, a conference populated by many of the leading lights in the Web industry. It featured panel talks and breakout sessions with a focus on technologies that are just now starting to emerge in browsers, so there was a lot of lively discussion around Service Worker, Web Components, Shadow DOM, Web Manifests, and more.

      EdgeConf’s hundred-odd attendees were truly the heavy hitters of the Web community. The average Twitter follower count in any given room was probably in the thousands, and all the major browser vendors were represented—Google, Mozilla, Microsoft, Opera. We had lots of fun peppering them with questions about when they might release such-and-such API.

Leftovers

  • Walmart Apologizes for Making ISIS Cake for Man Denied Confederate Flag Design

    A man in Louisiana is asking for an explanation from Walmart after his request for a Confederate flag cake at one of its bakeries was rejected, but a design with the ISIS flag was accepted.

    Chuck Netzhammer said he ordered the image of the Confederate flag on a cake with the words, “Heritage Not Hate,” on Thursday at a Walmart in Slidell, Louisiana. But the bakery denied his request, he said. At some point later, he ordered the image of the ISIS flag that represents the terrorist group.

  • Science

  • Health/Nutrition

    • Everyone Gets Cosmetic Procedures, Says Time–and by ‘Everyone,’ They Mean Almost No One

      Even by the standards of newsweekly hyperbole, this is ridiculous. In the piece, Stein writes that “in the US, doctors performed over 15 million cosmetic procedures in 2014, a 13 percent increase from 2011 and more than twice as many as in 2000.”

      The population of the United States is now 319 million, so 15 million is about 5 percent per capita.

      Even that overstates how big “everyone” is, since most of those procedures are injections like Botox–a muscle relaxant that has to be readministered as often as four times a year. Coupled with the fact that Botox can be used on multiple parts of the body—each of which may be considered a different “procedure”—the “everyone” who “gets work done” turns out to be a tiny fraction of the population.

  • Security

  • Defence/Police/Secrecy/Aggression

    • Kirsty’s Story

      I knew with certainty that the BBC and official line of a lone gunman being responsible for the Tunisian attacks was a lie, because one of the victims of one of the “other” gunmen was my dear niece Kirsty.

  • Transparency Reporting

  • Environment/Energy/Wildlife

  • Finance

    • Greeks are rushing to Bitcoin

      With bank doors slammed shut, frantic Greeks are turning to online trading platforms to see if the digital money Bitcoin is a better bet than the euro.

    • Confusing Lending and Spending at the New York Times

      In fact, central banks have not spent this money, they have lent this money, mostly by buying government bonds. This matters hugely, because lending is a much more indirect way to boost the economy than spending.

      Lending by central banks is supposed to boost growth by lowering interest rates. This encourages borrowing in the public and private sectors. This helps to explain the growth in debt in recent years: Rather than indicating a troubling situation, this was actually the point of the policy.

      Rather than focus on the amount of debt countries, companies and individuals have incurred, it would be more reasonable to examine their interest burdens. These are mostly quite low.

  • PR/AstroTurf/Lobbying

    • Feds Awarded Colorado Charter Schools $46 Million because of “Hiring and Firing” Rules

      Between 2010 and 2015, the U.S. Department of Education (ED) awarded Colorado $46 million under the Charter Schools Program. Part of the reason the state landed the competitive grant was that charters are free to hire unlicensed teachers and then fire them at will, documents reviewed by CMD show.

      Designed to create and expand “high-quality” charter schools, the quarter-billion-dollar-a-year program has been repeatedly criticized by the watchdogs at the department’s Office of the Inspector General watchdog for suspected waste and poor financial controls.

    • Jeb Bush dogged by decades of questions about business deals

      In early 1989, seven weeks after his father moved into the White House, Jeb Bush took a trip to Nigeria.

      Nearly 100,000 Nigerians turned out to see him over four days as he accompanied the executives of a Florida company called Moving Water Industries, which had just retained Bush to market the firm’s pumps. Escorted by the U.S. ambassador to Nigeria, Bush met with the nation’s political and religious leaders as part of an MWI effort to land a deal that would be worth $80 million.

    • STUDY: How The Media Is Covering Presidential Candidates’ Climate Science Denial

      43 Percent Of Newspaper Coverage Failed To Note That Candidates’ Climate Statements Conflict With Scientific Consensus. From March 23 — when Sen. Ted Cruz (R-TX) became the first candidate to announce his presidential bid — to June 22 of this year, newspapers and wire services surveyed by Media Matters published 54 news stories (in print and online) that included a presidential candidate denying either that climate change is occurring or that human activity is largely responsible for it. But the newspapers and wires failed to indicate that the candidate’s position conflicts with the scientific consensus in 23 of those stories, or 43 percent of the coverage.

  • Censorship

    • Banned Books Week Celebrates Young Adult Books in 2015

      Banned Books Week celebrates the freedom to read by encouraging read-outs, displays, and community activities that raise awareness of the ongoing threat of censorship. Last year, tens of thousands of people participated in Banned Books Week online. More than 500 videos were posted in a virtual read-out, and thousands participated in hundreds of events in bookstores, libraries, and schools and universities across the country.

  • Privacy

    • If You Can’t Beat ’Em: France, Up In Arms Over NSA Spying, Passes New Surveillance Law

      Yet also today, the lower house of France’s legislature, the National Assembly, passed a sweeping surveillance law. The law provides a new framework for the country’s intelligence agencies to expand their surveillance activities. Opponents of the law were quick to mock the government for vigorously protesting being surveilled by one of the country’s closest allies while passing a law that gives its own intelligence services vast powers with what its opponents regard as little oversight. But for those who support the new law, the new revelations of NSA spying showed the urgent need to update the tools available to France’s spies.

    • Surveillance Court Rules That N.S.A. Can Resume Bulk Data Collection

      The Foreign Intelligence Surveillance Court ruled late Monday that the National Security Agency may temporarily resume its once-secret program that systematically collects records of Americans’ domestic phone calls in bulk.

    • Secret US court allows resumption of bulk phone metadata spying

      A secret US tribunal ruled late Monday that the National Security Agency is free to continue its bulk telephone metadata surveillance program—the same spying that Congress voted to terminate weeks ago.

      Congress disavowed the program NSA whistleblower Edward Snowden exposed when passing the USA Freedom Act, which President Barack Obama signed June 2. The act, however, allowed for the program to be extended for six months to allow “for an orderly transition” to a less-invasive telephone metadata spying program.

    • Cloudflare Reveals Pirate Site Locations in an Instant

      According to an announcement from the site, Rights Alliance lawyer Henrik Pontén recently approached Cloudflare in an effort to uncover Sparvar’s email address and the true location of its servers. The discussions between Rights Alliance and Cloudflare were seen by Sparvar, which set alarm bells ringing.

    • Snoopers’ Charter: Lobby your MP in Parliament

      The Government’s planning to publish a draft of a new law that’s likely to extend the surveillance powers of the police and GCHQ in early autumn.

  • Civil Rights

    • Fox News vs. Fox News Latino: NBC Dumps Trump Edition

      Fox News Latino’s coverage of NBC’s decision to sever ties with Donald Trump differed dramatically from Fox News’ rush to defend the presidential candidate’s incendiary remarks about Mexican immigrants. While Fox hosts praised Trump’s stance and reticence to apologize, Fox News Latino characterized NBC’s move as a victory for Latino media advocacy leaders.

      NBCUniversal announced Monday that it would sever ties with Trump after he characterized Mexican immigrants as criminals and “rapists,” explaining in a statement: “At NBC, respect and dignity for all people are cornerstones of our values. Due to the recent derogatory statements by Donald Trump regarding immigrants, NBCUniversal is ending its business relationship with Mr. Trump.”

    • O’Reilly Gives Donald Trump A Platform To Continue Calling Latin American Immigrants Rapists And Criminals
    • Judge Orders Lying, Cheating Government To Return $167,000 To The Man They Stole It From

      A federal judge has just ordered the government to return $167,000 it took from a man passing through Nevada on his way to visit his girlfriend in California. The officers really wanted that money, too. They used two consecutive stops to jerry-rig some probable cause… even though at that point they thought they were only dealing with $2000. From the original stop forward, the entire situation was deplorable, indisputably showing that everyone involved was more interested in taking (and keeping) a bunch of cash than enforcing laws or pursuing justice.

  • Internet/Net Neutrality

    • Cisco to buy cybersecurity firm OpenDNS in $635m deal

      Announced on Tuesday, the tech giant said the move will accelerate the development of the Cisco Cloud Delivered Security Portfolio, and OpenDNS will prove a boost to advanced threat protection services for Cisco clients.

    • EU plans to destroy net neutrality by allowing Internet fast lanes

      A two-tier Internet will be created in Europe as the result of a late-night “compromise” between the European Commission, European Parliament and the EU Council. The so-called “trilogue” meeting to reconcile the different positions of the three main EU institutions saw telecom companies gaining the right to offer “specialised services” on the Internet. These premium services will create a fast lane on the Internet and thus destroy net neutrality, which requires that equivalent traffic is treated in the same way.

    • Net Neutrality: Trialogue betrayed European Parliament’s vote

      After months of negotiations behind closed doors between the Council of the European Union, the European Commission and the European Parliament (trialogue), the very positive text on Net Neutrality adopted by the European Parliament in April 2014 has become more ambiguous and weaker. Net Neutrality deserves more guarantees and La Quadrature du Net is regretting a third-rate agreement.

    • Court sets schedule for net neutrality case

      A federal court has set a schedule for the legal case over the Federal Communications Commission’s controversial net neutrality rules.

      The telecom companies, trade groups and individuals suing the FCC must submit briefs to the U.S. Court of Appeals for the District of Columbia by July 30. Their supporters have until August 6 to submit their own filings.

    • Net Neutrality: Europe Slips Into Reverse

      Following a mammoth negotiating session that ended in the early hours of this morning, the European Union (EU) has released their long awaited rules on Net Neutrality.

      The EU Commissioner’s tweet and an accompanying press release proclaimed the rules as strong protection for net neutrality, but we’re not so sure. In fact, our initial response is one of disappointment. As others have pointed out, the proposals are unclear. At best they will lead to disputes and confusion, and at worst they could see the creation of a two-tier Internet. If enacted, these rules would place European companies and citizens at a disadvantage when compared to countries such as Chile and the USA.

    • The EU Could Kill Net Neutrality With a Loophole

      It seems the European Union has learned little from the hard-won fight in the United States to preserve net neutrality. Today, the European Commission announced an agreement between the European Parliament and EU Council that—on the surface—claims to promise to protect net neutrality, while simultaneously allowing for exceptions that would threaten its very existence.

    • Data roaming charges to be phased out within EU by 2017

      Data roaming charges associated with using your mobile phone while travelling abroad within the 28 member countries of the European Union will be a thing of the past as soon as June 2017. After that, consumers will pay the same price for calls, text messages and internet surfing throughout the EU.

      [...]

      The commission said it would also reserve the right to control traffic if it was in the public interest, for example, to combat child pornography or a terrorist attack.

  • Intellectual Monopolies

06.30.15

Links 30/6/2015: Linux Mint 17.2, OpenMandriva

Posted in News Roundup at 5:52 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Node.js and Docker realigned

    It’s not really a surprise, but after just over six months since the “forking” of both Node.js and Docker, the two different projects have ended up back in some sort of alignment. For Node.js, it was the reunification with io.js under the Node.js Foundation, which was officially launched under the Linux Foundation’s umbrella. The Node.js and io.js technical development is now driven by a technical committee and hopefully this will all work out well for all.

  • Libreboot Now Supports An AMD/ASUS Motherboard

    The Libreboot “fork” of Coreboot now has support for its first AMD motherboard — or more broadly, its first desktop motherboard.

  • IBM Insists It’s Open to Open Source

    So it’s interesting when a senior IBM exec turns up in a keynote slot. Big Blue’s heritage, at least at the high end, had for years been dominated by proprietary architecture. No longer, said Doug Balog, general manager of IBM Power Systems. The founding of OpenPOWER roughly two years ago, sale of IBM’s x86 business, and the sprint away from the formidable but proprietary Blue Gene (and re-embrace of the battle-tested mainframe) are all part of IBM’s about-face.

  • The Open Information Security Foundation Joins Open Source Initiative as Affiliate Member

    The Open Source Initiative® (OSI) today announced that The Open Information Security Foundation (OISF) has been accepted as an Affiliate Member. “The OSI is excited to welcome OISF,” said Patrick Masson, General Manager and Director at the OSI. “Just as we’re seeing with open source software projects, more and more organizations are looking for support from mature, robust and relevant security communities. The OISF and the open source technologies they support are ready to help and we’re happy to promote their good work.”

  • The evolution of the big data platform at Netflix

    I caught up with Eva to get a bit of a background on her, Netflix, and how open source is being used to improve services at Netflix. Not only has Netflix used and contributed to existing open source projects, but they have released their own projects like Genie as open source. To learn more about Netflix’s open source projects you can pursue their GitHub.

  • Events

    • ATO Opens Reg – Releases Partial Speakers List

      The All Things Open conference today pushed out a notification to recipients on its mailing list announcing that registration for the event, slated for October 19th and 20th. has begun. For the first time ever, event organizers are offering something of a super early bird special: Buy a ticket before July 7th and get admission for both days for only $99 — which is a deal since that’s what a single day will cost once the Early Bird Special kicks-in next Tuesday.

  • SaaS/Big Data

  • Oracle/Java/LibreOffice

    • Can LibreOffice successfully compete with Microsoft Office?

      Michael Meeks, a leading LibreOffice developer, says the open source suite is currently being used by about 20 million Linux users. (LibreOffice is included in many Linux distributions.) He adds that update requests are also regularly received from 120 million different IP addresses – with one million new ones appearing every week — and suggests that in total there may be 80 million LibreOffice users around the globe.

    • LibreOffice 5.0 to Bring More DOCX Improvements

      The Document Foundation has released the second RC for the upcoming LibreOffice 5.0 version, and it looks like the developers are making a final push for the new version of the office suite that is scheduled to land in July.

    • The job is not done until the documentation is complete

      And yet there is a lot of really good documentation out there. For example, the documentation for LibreOffice is excellent. It includes several documents in multiple formats including HTML and PDF that range from “Getting Started” to a very complete user’s guide for each of the LibreOffice applications.

  • Funding

    • Roundcube Next crowdfunding success and community

      A couple days ago, the Roundcube Next crowdfunding campaign reached our initial funding goal. We even got a piece on Venture Beat, among other places. This was a fantastic result and a nice reward for quite a bit of effort on the entire team’s part.

  • BSD

    • DragonFly BSD 4.2 Gets Improvements for i915 and Radeon, Moves to GCC 5

      DragonFly BSD is a distribution that belongs to the same class of operating systems as other BSD-derived systems and UNIX. The developers have released a new version of the distro, and they have integrated quite a few changes and improvements.

    • OpenBSD from a veteran Linux user perspective

      For the first time I installed a BSD box on a machine I control. The experience has been eye-opening, especially since I consider myself an “old-school” Linux admin, and I’ve felt out of place with the latest changes on the system administration.

      Linux is now easier to use than ever, but administration has become more difficult. There are many components, most of which are interconnected in modern ways. I’m not against progress, but I needed a bit of recycling. So instead of adapting myself to the new tools, I thought, why not look for modern tools which behave like old ones?

    • DragonFlyBSD 4.2 Released: Brings Improved Graphics & New Compiler

      DragonFlyBSD 4.2 was released this morning as the next major release to this popular BSD operating system. For end-users there are a lot of notable changes with this update.

    • Call for Testing: Valgrind on OpenBSD

      The editors are certainly salivating over the possibility of valgrinding our way to victory.

  • FSF/FSFE/GNU/SFLC

  • Public Services/Government

    • Galicia publishes open source tools

      The government of Galicia (Spain) has made available three open source solutions over the past year, one for PC classrooms, one for land-management, and a third for computer network enhancement. The tools are available at Galicia’s software repository, and information about the solutions is now also available at Spain’s Centre for Technology Transfer (CTT).

    • Aragon publishes updates of eGovernment software

      The government of Aragon (Spain) has published updates of the open source software it uses for 25 eGovernment services. The updates have been available at the repository of Spain’s Centre for Technology Transfer since late last month.

    • House gets green light for open source

      The House of Representatives has officially jumped on the open source bandwagon. A June 25 announcement declared that U.S. representatives, committees and staff would be able to procure open source software, participate in open source software communities and contribute code developed with taxpayer dollars to open source repositories.

    • Cracking the Code: U.S. House of Representatives Allows Use Of Open Source Software

      As the executive branch of the United States government quietly works on creating an official open source policy, the legislative branch is also moving into the 21st century: Open source software is now officially permitted in the U.S. House of Representatives. That means software developed in the People’s House with taxpayer funds will eventually be available to the people. According to the nonpartisan OpenGov Foundation, there will soon be an Open Source Caucus in Congress.

  • Programming

    • LINUX, RUBY AND WEB CODING LAB FOR GRADUATE TRAINEES OPENS AT SCI-BONO

      The Simplon course was developed in France to teach skills in Linux, Ruby on Rails, CSS, Javascript, Meteor.js and other web development langauges. Co-founder Andrei Vladescu-Olt attended the opening of the SAP-funded laboratory, and explained that there’s more to the course than coding.

Leftovers

  • Science

    • Matti Makkonen, inventor of the SMS text message, died on Friday

      It is a sad day in tech. This is such a young industry in mobile that most who built it are still alive. One of the biggest pioneers, however, died this past Friday. Matti Makkonen, the inventor of the SMS text message, was a former Telecoms Finland (later known as Sonera) exec and then Nokia VP and later Finnet Group boss and ended his career as Managing Director of Anviva before he retired from active business management work. He still continued on some part-time jobs in telecoms in Finland. In 2008 Matti received the Economist Innovation Award for inventing the SMS and we celebrated that occasion here on this blog at the time.

  • Security

  • Defence/Police/Secrecy/Aggression

    • Serbia fetes Franz Ferdinand’s assassin 101 years later

      Serbia unveiled a statue on Sunday of the man whose killing of Archduke Franz Ferdinand 101 years ago lit the fuse for the First World War, feting an assassin who still divides his native Balkans.

      Many Serbs regard Gavrilo Princip, a Bosnian Serb, as a pan-Slavic hero, the shot he fired in Sarajevo on June 28, 1914 marking the death knell for centuries of foreign occupation over the various nations and faiths that would make up the Yugoslavia that emerged.

      To others he is a terrorist, a nationalist fanatic whose act triggered a war in which 10 million soldiers died and the world order was rewritten.

    • Is more war abroad with troops on the ground what’s needed to defeat ISIS?

      It’s too early to say whether yesterday’s ‘day of terror’ was coordinated, or whether it was a random convergence of events whose perpetrators share the same commitment to ‘leaderless resistance’ jihad which makes it equally possible to murder ‘apostate’ Shia worshippers in a mosque or ‘kufar’ tourists in Tunisia.

      Whoever they are, their broader intentions are not difficult to fathom. Islamic State has claimed responsibility for the Kuwait and Tunisia attacks. Both are acts of ‘strategic’ terrorism.

      The attack in Kuwait is clearly intended to foment the sectarian war that IS believes it can exploit for its own purposes.

    • Killer drones raise new moral questions

      Technologies are making humans who remote-control drones more and more like children playing video-games. That is the main problem. When deaths or killings seem to be happening so far away, the “combat mentality” can combine with the comfort zone to highly murderous effect. When it’s so easy to kill without risking your own life, will you be merciful or shoot them up?

    • Killer robots are coming next: The next military-industrial complex will involve real-life Terminators
    • The human rights crisis is about domination, not perception

      When Israel is criticized about its rights-abusive policies in the West Bank and Gaza Strip, the refrain most often heard among local politicians is that the government’s hasbara—the Israeli propaganda machine—is inadequate. The problem, in other words, is not what Israel actually does to the Palestinians, but rather the inability to get its positive message across to the international community. This is usually referred to as “rebranding Israel”. The underlying assumption here is that the merchandise is fine, and only the packaging needs to be replaced.

    • Operation Hannibal

      Here’s how Israel deals with hostages. The results aren’t pretty.

      [...]

      The war in Gaza, which had raged for three weeks by then and claimed the lives of dozens of Israelis and some 1,500 Palestinians, seemed to be tapering off. The ambush near Rafah would have gone down as one more skirmish. But as the surviving Palestinians retreated, they did something that would turn that Friday into the bloodiest day of the summer and embroil Israel in a possible war-crimes ordeal that reverberates even now: They dragged the third Israeli, Lieutenant Hadar Goldin, with them underground.

    • AP withdraws photos in row over gun pointing at senator’s head

      Conservatives immediately turned on the news agency, which released a statement saying the five photos it issued “were not intended to portray Senator Cruz in a negative light”.

      After “consideration”, said the statement, “we have decided to remove those photos from further licensing through AP Images”.

    • Black churches taught us to forgive white people. We learned to shame ourselves
    • Barack Obama to deliver eulogy for Charleston church victims
    • Is the FBI Ignoring White Violence by Refusing to Call Dylann Roof a Terrorist?

      Civil rights activist Kevin Alexander Gray and Richard Cohen, president of the Southern Poverty Law Center, discuss whether the shooting in Charleston was an act of domestic terrorism. “Dylann Roof was a human drone, and every Tuesday morning the Obama administration uses drones to kill people whose names we don’t even know and can’t pronounce,” Kevin Alexander Gray says. “So I don’t know if I feel comfortable with the idea of expanding this word ‘terror.’” But Richard Cohen calls the shooting “a classic case of terrorism.” “It’s politically motivated violence by a non-state actor and carried out with the intention of intimidating more persons than those who were the immediate victims,” Cohen says. “I think in some ways it’s important to talk about terrorism in that way, not so we can send out drones, not so we can deny people their due process rights, but so we can understand the true dimensions of what we’re facing.”

    • “A Classic Case of Terrorism”: Is FBI Ignoring White Violence by Refusing to Call Roof a Terrorist?
    • White Americans are the biggest terror threat in the United States

      White Americans are the biggest terror threat in the United States, according to a study by the New America Foundation. The Washington-based research organization did a review of “terror” attacks on US soil since Sept. 11, 2001 and found that most of them were carried out by radical anti-government groups or white supremacists.

    • The question is: Will war ever end?

      I don’t rate any of our wars since to have been justified morally. I am morally shaken by our U.S. war these days involving drone use. Innocent civilians are being killed. We call it “collateral damage,” which I believe actually means “unintended murder.” How have we come to justify that? We claim to be doing it for the right reason. We have identified terrorists in these locations. When our drones strike, there are too often innocent civilians caught in the hell fire. It was not our intention to kill innocent people, but there are too many unanticipated consequences.

    • Let’s Not Forget Our Own Extremism

      To deem behavior or opinion as extremist depends on a particular point of view.

    • US Drone Strikes Kill Nine ‘Suspects’ in Yemen

      A pair of US drone strikes over the past 48 hours have killed at least nine people, none of them identified by name but all of them labeled “al-Qaeda suspects” by local officials on the ground in Yemen.

    • UK faces calls for intelligence-sharing guidance over drone attacks

      Ex-chief of navy Lord West says Britain must protect covert relationships but must also clear up grey areas over involvement in non-war zone killings

    • New Details About Drone Attacks Reported From Documents Leaked by Snowden

      The New York Times on Wednesday reported details about American counterterrorism officials’ use of drone strikes in countries such as Yemen, as well as the working relationship between intelligence agencies in the U.S. and the U.K.

    • Snowden papers suggest possible UK role in US drone strike

      The documents are said to show the extremely close cooperation between the NSA and its British counterpart, the Government Communications Headquarters better known as GCHQ, in regards to the controversial drone program.

    • US and British Wild West Spying…and the Entertainment Business

      Britain’s murky operations against the United Nations were first made public in 2004 when government minister Clare Short stated she “had read transcripts of some of Mr Annan’s conversations. She said she recalled thinking, as she talked to Mr Annan: “Oh dear, there will be a transcript of this and people will see what he and I are saying”.” She admitted in a BBC interview that British intelligence agencies had recorded conversations of the UN Secretary General in his office in New York. This astonishing revelation attracted an intriguing reaction from her own government, with prime minister Blair declaring her statement to be “deeply irresponsible” rather than taking any action about this manifestly irresponsible and illegal operation. It was obvious that the British government was up to its neck in a program of espionage against the leader of the organization that is intended to “reaffirm faith in fundamental human rights, in the dignity and worth of the human person,” and there was no possibility that the prime approver of such funtime capers was going to admit his culpability.

    • New York Times, ACLU Make Case For Access To Drone Strike Memos

      The American Civil Liberties Union and the New York Times continued their fight in court Tuesday as they try to secure nine Department of Justice memos they believe outline the federal government’s legal justification for tactical drone strikes that have killed hundreds — including U.S. citizens — across the world.

      Attorneys on both sides presented their arguments to the 2nd U.S. Circuit Court of Appeals in New York on Tuesday — the latest round of courtroom discussions that date back four years.

      In 2011, the ACLU submitted a Freedom of Information Act request regarding the targeted killings of U.S. citizens Anwar Al-Awlaki, his 16-year-old son, Abdulrahman Al-Awlaki, and Sameer Khan earlier that year in September.

    • Civil Liberties Union Takes Court Action over US Drone Strikes

      The appealing parties want the public to know who and why the U.S. is killing in drone strike operations.

    • Drone strike kills 5 militants in E. Afghanistan

      Five militants have been killed following a NATO airstrike in eastern Afghanistan’s Nuristan province, a source said on Sunday.

    • Drone strike kills five militants
    • Wars killed 149,000 in Pakistan, Afghanistan from 2001 to 2014

      Wars in Pakistan and Afghanistan have killed at least 149,000 people between 2001 and 2014, says a recent report by a US think-tank.

    • Wars killed 149,000 in Pakistan and Afghanistan since 2001: report
    • South Asian tensions and the fight against militancy

      Recent escalation in tension between nuclear-armed Pakistan and India figured high among US international concerns last week, with Secretary John Kerry cautioning against implications of South Asian hostilities, amidst tenuous search for Afghan stability.

    • Drone protesters vow to close down Staffordshire factory

      Protesters from 25 UK-based campaign groups are expected to take part in the latest rally on July 6 outside the Lynn Lane factory which they claim supplies arms to Israel.

    • Smart Talk: Legality of military drones on trial

      The U.S. actually trains more unmanned pilots than traditional fighter pilots today.

    • U.S. Army Begins Training Ukrainian Soldiers

      Fighting surged again this week in eastern Ukraine, where government troops are battling separatist militias and their Russian allies.

      NATO is responding by sending troops and equipment to eastern Europe, and it’s also giving defensive training to Ukraine’s beleaguered army.

    • Moving ever closer to a new Cold War

      Nato defence ministers are meeting in Brussels to agree their next steps in dealing with the renewed threat from Russia.

    • Under the rubble of drones

      It is harder for eyes from the sky or those pushing the drone buttons from the other end of the world to see precisely what lies wasted under the rubble of mud houses in the tribal regions of Pakistan. The loud claims of ‘successfully’ targeting wanted al Qaeda and Taliban terrorists have drowned the cries of the local populations for about a decade over their children, women and men having been killed. Over 2,000 civilian casualties must not disappear from the human radar after being termed collateral damage. True, we cannot escape human tragedies for larger ends of the war on terror, but we also need to take responsibility for errors of judgment.

    • Israel Bombs Lebanon

      Sunday reports indicate an Israeli warplane bombed a remote Lebanese Bekaa region to destroy one of its drones apparently downed.

      An IDF spokeswoman declined to comment. A Lebanese security source said it’s not entirely clear what happened “but most probably it was an Israeli airstrike to destroy its downed drone” – whether because of mechanical failure or by Hezbollah isn’t known.

      America, its rogue NATO partners and Israel unilaterally or together bomb other nations in blatant violation of international law.

    • Jared Keyel: It’s time to end US military interventions

      The Obama administration is contemplating setting up bases in Iraq and sending hundreds of additional American troops there. And a few months ago, President Barack Obama announced that nearly 10,000 American troops will remain in Afghanistan through the end of the year. This is in spite of US interventions in the two countries that have left hundreds of thousands dead, millions displaced and continuing instability all over the region.

  • Transparency Reporting

  • Environment/Energy/Wildlife

    • World’s Aquifers Losing Replenishment Race, Researchers Say

      From the Arabian Peninsula to northern India to California’s Central Valley, nearly a third of the world’s 37 largest aquifers are being drained faster than they are being replenished, according to a recent study led by scientists at the University of California, Irvine. The aquifers are concentrated in food-producing regions that support up to two billion people.

    • Council blocks Little Plumpton fracking application

      An application to start fracking at a site on the Fylde coast in Lancashire has been rejected by councillors.

      Energy firm Cuadrilla wanted to extract shale gas at the Little Plumpton site between Preston and Blackpool.

      Lancashire County Council rejected the bid on the grounds of “unacceptable noise impact” and the “adverse urbanising effect on the landscape”.

    • Fracking plans rejected by council in shock result after worries about environment

      Plans to frack for shale gas in Lancashire have been rejected by county councillors.

      Energy firm Cuadrilla wanted to undertake exploratory drilling and fracking at a site between Preston and Blackpool.

      Planning officials recommended approval of the operation subject to a number of conditions – but councillors rejected the advice and voted against.

    • US supreme court strikes down Obama’s EPA limits on mercury pollution

      Justices invalidate new rules in move that could make Environmental Protection Agency more vulnerable to challenges to new regulations on carbon emissions

  • Finance

    • Bitcoin poker site founder takes plea deal to avoid jail time

      A man who ran a Bitcoin-based online poker site and then fled to Antigua after being raided earlier this year has pleaded guilty to a lesser gambling violation in Nevada as a way to stay a near-free man.

      According to the Las Vegas Review Journal, Bryan Micon accepted probation on Thursday and will also pay a $25,000 fine, surrender the computers, 3.0996 bitcoins ($750) and the $900 that were seized from him during the raid. Once complete, his charge will be reduced to a gross misdemeanor of operating an unlicensed interactive gaming system.

    • Dutch city of Utrecht to experiment with a universal, unconditional ‘basic income’

      The Dutch city of Utrecht will start an experiment which hopes to determine whether society works effectively with universal, unconditional income introduced.

      The city has paired up with the local university to establish whether the concept of ‘basic income’ can work in real life, and plans to begin the experiment at the end of the summer holidays.

      Basic income is a universal, unconditional form of payment to individuals, which covers their living costs. The concept is to allow people to choose to work more flexible hours in a less regimented society, allowing more time for care, volunteering and study.

    • Greek PM makes plea to voters as debt deadline nears

      Tsipras asks voters to reject austerity proposals offered by creditors as thousands of his supporters rally in Athens.

    • Greek Investigator’s Report Finds Evidence of Plot Against Former PM’s Life, ‘Silver Drachma’ Plan

      Evidence pointing to international espionage, a plot to murder former Greek Prime Minister Costas Karamanlis and a 2012 plan for Greece’s exit from the euro code-named the “Silver Drachma” are just some of the sensational findings unveiled in a report by Greek Anti-Corruption Investigator Dimitris Foukas, released on Friday and sent to the Justices’ Council for consideration.

      The report outlines the findings of three converging judicial investigations spanning several years, initiated after the notorious phone-tapping scandal in 2005 and revelations that the mobile phones of then Prime Minister Karamanlis and dozens of other prominent Greeks were under surveillance.

    • ‘Nein Danke’ – smaller German firms see U.S. trade deal as threat

      Martina Roemmelt-Fella, who owns a small, family-run turbine manufacturer in Bavaria, should be a cheerleader for a trade deal between Europe and the United States that promises to ease the flow of goods and services across the Atlantic.

      But instead she fears the Trans Atlantic Trade and Investment Partnership (TTIP) being hammered out between Brussels and Washington will give too much power to big multinationals at the expense of small companies like hers.

  • PR/AstroTurf/Lobbying

    • George Will Won’t Throw Out a Perfectly Good Column Just Because Its Premise Is Completely Wrong

      At some point, Will either noticed, or someone pointed out to him, that Roberts’ decision did the opposite of what Will’s column says it did: It did not defer to the executive branch’s interpretation of the ACA, but instead produced its own definitive interpretation of the law. This makes most of Will’s criticism–starting with the first paragraph, which denounces “decades of populist praise of judicial deference to the political branches”–irrelevant to the opinion Roberts actually wrote.

  • Privacy

    • Humans: Are the scientists developing robots in danger of replicating the hit Channel 4 drama?

      Anyone who has been freaked out by the robots in Channel 4’s new hit drama Humans knows what life in the Uncanny Valley feels like. The same goes for those who have met or seen footage of Aiko Chihira, a realistic humanoid who has just started welcoming visitors to a department store in Japan. She’s creepy, in the extreme.

    • Two keys to rule them all: Cisco warns of default SSH keys on appliances

      Cisco revealed a security vulnerability in a number of the company’s network security virtual appliances that could give someone virtually unlimited access to them—default, pre-authorized keys for Secure Shell (SSH) sessions originally intended for “customer support” purposes. As Threatpost’s Dennis Fisher reported, Cisco has released software patches that correct the problem, but there’s no temporary workaround for systems that can’t immediately be patched.

      Cisco released an advisory on the vulnerability on June 25. There are two separate SSH key vulnerabilities for the Cisco Web Security Virtual Appliance (WSAv), Cisco Email Security Virtual Appliance (ESAv), and Cisco Security Management Virtual Appliance (SMAv).

    • Default SSH Key Found in Many Cisco Security Appliances

      Many Cisco security appliances contain default, authorized SSH keys that can allow an attacker to connect to an appliance and take almost any action he chooses. The company said that all of its Web Security Virtual Appliances, Email Security Virtual Appliances, and Content Security Management Virtual Appliances are affected by the vulnerability.

      This bug is about as serious as they come for enterprises. An attacker who is able to discover the default SSH key would have virtually free reign on vulnerable boxes, which, given Cisco’s market share and presence in the enterprise worldwide, is likely a high number. The default key apparently was inserted into the software for support reasons.

    • When a Company Is Put Up for Sale, in Many Cases, Your Personal Data Is, Too

      That respect could lapse, however, if the company is ever sold or goes bankrupt. At that point, according to a clause several screens deep in the policy, the host of details that Hulu can gather about subscribers — names, birth dates, email addresses, videos watched, device locations and more — could be transferred to “one or more third parties as part of the transaction.” The policy does not promise to contact users if their data changes hands.

    • Nissan shuns cloud for physical communications infrastructure

      While this project is separate from the ongoing developments in Nissan’s connected vehicle technology, Deacon said that there were “huge developments” ongoing in bringing customer service to the car dashboard and more automated systems.

      Last year Renault also revealed a major overhaul of its internal and customer-facing interactions through a Europe-wide Salesforce rollout that would link its systems to its dealerships, allowing it to claw back valuable customer data.

    • Online Data Policies … in Plain English

      Clauses in privacy policies that enable online services to transfer or sell personal data about consumers as part of a merger, bankruptcy or other transaction are becoming common practice, an examination by The New York Times of the top 100 websites in the United States has found. The prevalence of these data-transfer clauses illustrates how little control people typically have over the dissemination of information about them. Details from privacy policies of five companies offer a sampling of the information that may be collected and how companies may handle the data in the event of a sale or bankruptcy. — Natasha Singer

    • Warrantless phone tapping, e-mail spying inching to Supreme Court review

      In 2013, the Supreme Court rejected a challenge to a once-clandestine warrantless surveillance program that gobbles up Americans’ electronic communications—a project secretly adopted in the wake of the 2001 terror attacks on the United States. Congress legalized the surveillance in 2008 and again in 2012 after it was exposed by The New York Times.

      Human-rights activists and journalists brought the Supreme Court challenge amid claims that the FISA Amendments Act was chilling their speech. But the Supreme Court tossed the case, telling the challengers’ lawyers from the American Civil Liberties Union to bring proof by real targets of the warrantless e-mail and phone surveillance. In a 5-4 ruling (PDF) by Justice Samuel Alito at the time, the court said the case was based on “assumptions” and that the plaintiffs “merely speculate” that they were being spied upon.

      Fast forward to the present day: a US resident of Brooklyn, New York, accused of sending $1,000 to a Pakistani terror group has won the right to become the nation’s second defendant to challenge the surveillance at the appellate level. This could mean a Supreme Court bid is likely several months or more away.

    • The most dangerous data breach ever known

      But the true nature and scope of the information required by the government and subsequently collected by the government on an employee is massive. Take a look at Standard Form 86. This is a 127-page form that usually takes a week or more to complete and requires the entry of the applicant’s Social Security number on each page. The data included on this form is not just enough for identity theft, but enough to allow a person to literally become another person. Each Standard Form 86 fully documents the life of the subject. The only thing missing is the name of your first crush, though that might be in there somewhere too.

    • Why Facebook Is Opening An Office In Africa

      Facebook is to open a new office in Africa, a region with more than one billion people but only 120 million Facebook users.

  • Civil Rights

    • Bernie Needs To Speak Truth To Power (and try to stay alive)

      One thing I was obsessed with was campaign finance reform. I almost cut my throat when Citizens United was allowed to participate in financing political campaigns because corporations have the same rights as people. I believe that decision absolutely destroyed our so-called democracy. I also observed the Democrats that stood by and let that happen. What that showed me was how corrupt and devious our elected officials are. I stand with Bernie on this issue on overturning Citizens United.

    • China Issues Report on Human Rights Violation by the United States

      China’s State Council Information Office on Friday issued a list of human rights violations committed by the United States government. The annual report is intended to counter US allegations of human rights abuses in China.

    • China criticizes United States’ human rights record
    • US Police Killings Violate International Law

      Amnesty International finds all 50 states and Washington, DC, fail to comply with international law and standards on the use of lethal force by law enforcement officers

    • Don’t expect rhetoric to match reality

      The transition from Bush to Obama was much less dramatic than one imagined and the transition from Obama to someone else is likely to be more nuanced

    • EU launches navy operation against migrant-traffickers

      More than 100,000 migrants have entered Europe so far this year, with some 2,000 dead or missing during the perilous quest to reach the continent. Dozens of boats set off from lawless Libya each week, with Italy and Greece bearing the brunt of the surge.

    • Australia’s New Law Would Strip Citizenship For Possessing A ‘Thing’ Connected With Terrorism, Or Whistleblowing
    • ‘Australians fighting in Syria will lose citizenship’ says PM Tony Abbott

      Australians who engaged in terrorism will be stripped of their citizenship, under new laws aimed at preventing militants fighting overseas from returning home.

    • Coalition defends proposed citizenship laws – as it happened

      The prime minister announces an expansion of powers ‘to reflect modern conditions’ and says laws could be applied retrospectively; Julie Bishop can’t confirm deaths of two Australians reportedly killed in drone strikes; and the ABC is under attack for allowing a former terrorism suspect to appear on Q&A. As it happened

    • Terror suspects to lose citizenship: PM
    • BBC News: Australia prepares new citizenship laws

      The laws would also strip citizenship from dual nationals who engage in terrorism inside Australia.

    • An Open Letter to the NRA and Its Trolls

      When are we going to have an honest conversation about guns in America? While I vigorously disagree with the Supreme Court’s most recent interpretation of the Second Amendment, I’ll concede that the right of individuals to bear arms is, for now, the law of the land.

    • First Texas abortion clinic closes, more to follow barring Supreme Court involvement

      Operation Rescue has confirmed that the Routh Street Women’s Clinic in Dallas, Texas, halted abortions earlier this month, beginning what is expected to be a series of clinic closures in the wake of a ruling by the Fifth Circuit Court of Appeals. That ruling upheld a 2013 law, HB2, that requires abortion clinics to meet minimum safety standards.

      In addition, Planned Parenthood has apparently abandoned its efforts to open a larger clinic to replace its outdated facility located at 104 Babcock Road in San Antonio. Pro-life supporters with the Stop Planned Parenthood SA Coalition sued and successfully blocked a planned opening in January 2015, citing deception and zoning violations.

    • Destruction of Evidence

      David Cameron, echoed by the corporate media, calls upon the millions of law-abiding Muslims in the UK to denounce and distance themselves from a few terrorist nutters with whom 99.99% of British Muslims have no connection anyway. That apparently is acceptable. But to ask that the Zionist and Jewish organisations denounce the long term criminal activities of the man who actually led those organisations, is portrayed as unacceptable racism.

  • Internet/Net Neutrality

    • Charter: We won’t impose data caps after buying Time Warner Cable

      Charter yesterday promised that it won’t impose any data caps or overage charges on customers for at least three years if the Federal Communications Commission allows it to buy Time Warner Cable.

    • EU Parliament must defend Net Neutrality against pressure from Member States

      The Council of the European Union is looking to remove all reference to Net Neutrality in the regulation of telecommunications. While the Council has always refused to take a step towards a compromise, it has been looking for several weeks to put the responsibility for the failure of the negotiations on the European Parliament. Thus, it is with bad faith that the Council is taking on this 4th trialogue today ; with their aim to make the Parliament to give in.

  • Intellectual Monopolies

    • Copyrights

      • Sad day for developers: SCOTUS denies Google’s appeal on APIs

        Supreme Court’s decision is bad news for developers targeting the U.S. market, who will now have to avoid any API not explicitly licensed as open

      • US Supreme Court denies Google’s request to review API Copyright decision

        A week after making the US LGBTQI community happy last week by ruling gay marriage legal across all the states, the US Supreme Court made the decision to not review the Google v. Oracle API Copyright decision made by the Federal Circuit Court of Appeals last year. The Federal Circuit have been accused for misunderstanding both computer science and copyright law.

      • Pirate Bay Founder Still Wants to Clear His Name

        Last week Pirate Bay founder Gottfrid Svartholm lost his appeal against his hacking conviction in Denmark. With an August release potentially on the horizon but an unexpected situation still to be resolved in Sweden, Gottfrid is longing to get in front of a computer and back into the world of IT. But before then he wants to set the record straight.

06.28.15

Links 28/6/2015: Manjaro Linux Cinnamon 0.8.13, VectorLinux 7.1

Posted in News Roundup at 11:17 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Enterprise DevOps, open source hit Target’s bull’s-eye

    No matter how many times we say DevOps is a culture and a mindset, it’s hard to deny that it is also a fairly sizeable chest of tools.

    Target operates two main data centers to support its retail locations as well as distribution centers. The retail giant moved to an enterprise DevOps model to empower the backend IT team to provide technology services in an entrepreneurial way.

  • BSD

  • Openness/Sharing

    • Open source project grows & prunes trees into furniture (Video)

      Eight years sounds like a long time to make a chair, but Munro insists that this method is the “faster, cheaper and more efficient” than the conventional method of mass production. Munro estimates that his grove of furniture has offset 5,000 kilograms of carbon since its initial planting, and only uses the equivalent energy consumed by ten 60-watt lightbulbs burning for eight hours per day, for a year. Full Grown furniture is estimated to have only one-quarter of the carbon footprint of conventionally mass-made furnishings.

    • Open Hardware

      • Italian makers unveil the Felfil, an open source 3d printing filament extruder

        Among other interesting parts of the open source project – which has been released under the Creative Commons license for non-commercial use and can be downloaded over at Felfil.com – is that the design team has incorporated a number of commonly found objects into their final design. Among others include a bicycle chain and a windshield wiper motor. The decision to use these found parts certainly falls in line with the team’s dedication towards “giving new life to unused components”.

Leftovers

  • Computers are Bullshit

    Not really, no. Computers are exciting, liberating technology that are doing wonderful things in the world. I’m a technologist who is saddened by the state of computing, the things we’ve given up in an effort to digitize the world. We’ve given up privacy for the ability to show people what we’re eating, we’ve traded the ability to live without needing corporate overlords for the ability to always know if someone at work needs to get a hold of us. Technologists can be more closed minded and insular than anyone else while claiming to be liberal and open-minded. Tech culture and Silicon Valley culture make me sad.

  • Map shows where world’s oldest and youngest populations live

    Using data from the CIA Factbook, Global Post created graphics to visualize the median age of every country in the world. The world’s 15 youngest countries are all in Africa.

  • Security

    • Drupal Core – Critical – Multiple Vulnerabilities – SA-CORE-2015-002

      A vulnerability was found in the OpenID module that allows a malicious user to log in as other users on the site, including administrators, and hijack their accounts.

      This vulnerability is mitigated by the fact that the victim must have an account with an associated OpenID identity from a particular set of OpenID providers (including, but not limited to, Verisign, LiveJournal, or StackExchange).

    • Legendary hacker: We tapped into Nixon’s phone to warn him of toilet paper crisis in L.A.

      As the world dives deeper and deeper into the digital depths of technology, with most civilizations dependent on computers and networks, with phone lines kept under the scrutiny of spy agencies – isn’t it time to talk to those, who were in on things at the beginning? Today’s special guest was a pioneer of digital technologies. The man, who hacked into phone lines from the White House to Vatican – and did it just for fun. Today we talk to John “Captain Crunch” Draper – the legendary hacker is on Sophie&Co.

  • Defence/Police/Secrecy/Aggression

  • Transparency Reporting

    • With Its French NSA Leak, WikiLeaks Is Back

      Classified documents appear on WikiLeaks.org, revealing that the American government is spying on its allies. American officials rush to deal with a sudden diplomatic crisis while publicly refusing to comment on leaked materials. And WikiLeaks proclaims that it’s just getting started.

    • Assange, Snowden Asylum in France Doubtful – Wikileaks Spokesman

      Wikileaks spokeswoman Kristinn Hrafnsson said that France will most likely not offer political asylum to whistleblowers Edward Snowden and Julian Assange regardless of the French Justice Ministry’s predictions.

    • France may offer asylum to Snowden, Assange

      After the reveal of the scandal, France summoned the U.S. ambassador while the U.S. said there will be more cooperation between the two countries. Moreover, White House wanted Hollande to be sure that he is not wiretapped. However, France gave a political response to the U.S. through saying that asylum may be offered to WikiLeaks founder Julian Assange and Edward Snowden.

    • French minister: It’s possible asylum will be offered to Snowden, Assange

      French Justice Minister Christiane Taubira said Thursday she “wouldn’t be surprised” if France decided to offer asylum to Edward Snowden and Julian Assange.

      Assange, the founder of WikiLeaks, has been holed up in London’s Ecuadorian Embassy for more than two years to avoid extradition to Sweden, where prosecutors want to question him about 2010 allegations that he raped one woman and sexually molested another.

    • French Newspaper Cites U.S. “Contempt” as Reason to Offer Snowden Asylum

      France should respond to the U.S.’s “contempt” for its allies by giving Edward Snowden asylum, the leftist French daily newspaper Libération declared on Thursday.

      France would send “a clear and useful message to Washington, by granting this bold whistleblower the asylum to which he is entitled,” editor Laurent Joffrin wrote (translated from the French) in an angry editorial titled “Un seul geste” — or “A single gesture.”

    • French Asylum For Snowden And Assange Would Send ‘Clear Message’ To US

      French Justice Minister Christiane Taubira would “absolutely not be surprised” if whistleblower Edward Snowden and WikiLeaks founder Julian Assange received asylum in France.

      “It would be a symbolic gesture,” Taubira told French news channel BFMTV on Thursday, adding that it would not be her decision to offer asylum, but that of the French Prime Minister and President.

    • New NSA Whistleblower behind French presidential surveillance leak

      American and European security agencies are reportedly investigating a possible new whistleblower behind the WikiLeaks publication that exposed alleged NSA spying on top French officials, including three presidents.

      The website on Tuesday released what appear to be classified NSA documents alleging the US agency spied on three successive French presidents: Jacques Chirac, Nicolas Sarkozy and incumbent François Hollande.

    • WikiLeaks: France plays the victim in the intelligence game

      French officials have reacted with outrage to new WikiLeaks revelations that the US spied on French presidents. But some analysts say the response is just an act of political theatre from a nation that does some significant spying of its own.

    • 5 things we’ve learned from the Saudi Arabia Wikileaks documents

      Friday’s document drop consisted of around 60,000 different files. Almost all of these documents are scanned pieces of paper, written in Arabic.

      Wikileaks claim they have more than half a million files, and they’re going to be released in batches of tens of thousands over the next few weeks.

      Naturally, with this many documents, there’s a lot of inconsequential memos that don’t give too much away. However, only around 12 per cent of the documents have been released so far, and they contain some very important information.

    • WikiLeaks exposes Saudi liquor runs, Clinton’s passport

      WikiLeaks’ publication of more than 60,000 Saudi documents has set pens racing across the Middle East with disclosures about the secretive Arab monarchy’s foreign affairs. But lost amid the torrent of revelations are offbeat memos showing the underbelly of Riyadh’s diplomacy, including candid accounts of booze runs and pork smuggling.

    • Saudi Arabia has bailed out failing Middle East media organizations in exchange for pro-Saudi coverage

      A financially troubled Lebanese TV network received a $2 million Saudi bailout in return for adopting a pro-Riyadh editorial policy.

      A news agency in Guinea got a $2,000 gift, while small publications across the Arab world received tens of thousands of dollars in inflated subscription fees.

    • WikiLeaks: Saudis tried to shield students from US scandal

      A group of Saudi students caught in a cheating scandal at a Montana college were offered flights home by their kingdom’s diplomats to avoid the possibility of deportation or arrest, according to a cache of Saudi Embassy memos recently published by WikiLeaks and a senior official at the school involved.

    • A Cheating Scandal With Diplomatic Dimensions

      That scandal came back to life this week when the Associated Press reported on Saudi Arabian embassy memos released by WikiLeaks suggesting that almost all of the students who were involved were Saudis studying in the U.S. on government scholarships and that their government attempted to shield them from potential criminal liability.

    • Chancellor says no conspiracy in flying out Saudi students

      Montana Tech’s chancellor said Tuesday that he did not conspire to fly students involved in a grade-changing scandal out of the U.S., despite recently published Saudi Embassy memos saying he suggested removing them from the country to avoid deportation or arrest.

    • Blackketter: Audit techniques now safeguard Tech transcripts

      Documents published by WikiLeaks recently revealed that many of the students who had their grades changed were Saudis, and that they gave tokens of appreciation to a college employee who changed their transcripts.

    • After WikiLeaks scandal, Montana college chancellor says transcripts safe
    • How Saudi funded Rs 1,700 crore for Wahabi influence in India

      Last year violence broke out near a Mosque in Bommanhalli, Bengaluru and what was being termed as minor tiff was in fact a case of some youth trying to impose the Wahabi preachings.

    • Why the CIA isn’t covering up a Saudi-9/11 connection in their declassified commission report

      It’s no secret that 15 of the 19 hijackers on 9/11 were Saudi nationals, and speculation has long existed as to whether the oil-rich country had a hand in aiding al-Qaeda’s actions on that fateful day. Conspiracy theorists have long speculated that the U.S. is hiding a Saudi connection to 9/11 due to their high reliance on their petroleum.

    • WikiLeaks Reveals Saudi Arabia”s Plans against Syria

      Damascus, Jun 25 (Prensa Latina) Documents revealed by WikiLeaks show the Saudi government”s commitment to the terrorist groups al-Qaeda and the Islamic State (IS) to overthrow Syrian President Bashar al-Assad.

      International media and several websites on Thursday published letters and documents that confirm Saudi Arabia’s financial, logistic and military support for the armed extremist groups that operate in Arab countries, mainly in Syria.

    • France attempted to restart Israel-Palestinian talks behind US’s back: WikiLeaks

      France sought to go ahead with a bid to restart direct peace talks between Israel and the Palestinians in 2011, and even considered keeping other world powers out of the effort and issuing an ultimatum to the United States, according to a leaked cable released by WikiLeaks on Tuesday.

    • IT tools can help declassification backlog, but is there funding?

      The federal government is facing a mounting pile of electronic documents and other material that are due to be reviewed for declassification. But there just aren’t enough people and enough budget to meet the statutory deadlines.

  • Environment/Energy/Wildlife

    • Why the Saudis Are Going Solar

      Prince Turki bin Saud bin Mohammad Al Saud belongs to the family that rules Saudi Arabia. He wears a white thawb and ghutra, the traditional robe and headdress of Arab men, and he has a cavernous office hung with portraits of three Saudi royals. When I visited him in Riyadh this spring, a waiter poured tea and subordinates took notes as Turki spoke. Everything about the man seemed to suggest Western notions of a complacent functionary in a complacent, oil-rich kingdom.

      [...]

      Such talk sounds revolutionary in Saudi Arabia, for decades a poster child for fossil-fuel waste. The government sells gasoline to consumers for about 50 cents a gallon and electricity for as little as 1 cent a kilowatt-hour, a fraction of the lowest prices in the United States. As a result, the highways buzz with Cadillacs, Lincolns, and monster SUVs; few buildings have insulation; and people keep their home air conditioners running—often at temperatures that require sweaters—even when they go on vacation.

    • What Do You Do When Your Land Sinks Into the Earth?

      Slowly, the earth began moving. The ground underneath buildings started to sink as the water supporting it was pumped to the surface. One family reported a quarter-inch crack that started in the kitchen floor and began creeping throughout the house.

    • Emerging Israel gas deal ignites fierce debate

      When natural gas was discovered a few years ago off the shores of resource-poor Israel, it was heralded as nothing short of a miracle, but an emerging deal with developers has been plagued by criticism, with opponents accusing Prime Minister Benjamin Netanyahu of caving to a monopoly.

      After long negotiations, a government committee has struck a deal with the firms, which aims to break up their monopolistic control of Israel’s gas reserves and introduce competition while maintaining incentives for fresh investment. But liberal lawmakers and environmentalists say the deal would squander a national treasure.

  • Finance

    • IMF and USA set to ruin Ghana

      Just ten years ago, Ghana had the most reliable electricity supply in all of Africa and the highest percentage of households connected to the grid in all of Africa – including South Africa. The Volta River Authority, the power producer and distributor was, in my very considerable experience, the best run and most efficient public utility in all of Africa. Indeed it was truly world class, and Ghana was proud of it.

      Obviously the sight of truly successful public owned and run enterprise was too much of a threat to the neo-liberal ideologues of the IMF and World Bank. When Ghana needed some temporary financial assistance (against a generally healthy background) the IMF insisted that VRA be broken up. Right wing neoliberal dogma was applied to the Ghanaian electricity market. Electricity was separated between production and distribution, and private sector Independent Power Producers introduced.

      The result is disaster. There are more power cuts in Ghana than ever in its entire history as an independent state. Today Ghana is actually, at this moment, producing just 900 MW of electricity – half what it could produce ten years ago. This is not the fault of the NDC or the NPP. It is the fault of the IMF.

    • NYT Warns Greece to Accept Endless Depression–Because Default Might Be Painful

      First, it is difficult to describe the default in Argentina as a disaster. The economy had been plummeting prior to the default, which occurred at the end of the year in 2001. The country’s GDP had actually fallen more before the default than it did after the default. (This is not entirely clear on the graph, since the data is annual. At the point where the default took place in December of 2001, Argentina’s GDP was already well below the year-round average.) While the economy did fall more sharply after the default, it soon rebounded, and by the end of 2003 it had regained all the ground lost following the default.

      Argentina’s economy continued to grow rapidly for several more years, rising above pre-recession levels in 2004. Given the fuller picture, it is difficult to see the default as an especially disastrous event, even if it did lead to several months of uncertainty for the people of Argentina.

      In this respect, it is worth noting that Paul Volcker is widely praised in policy circles for bringing down the US inflation rate. To accomplish this goal, he induced a recession that pushed the unemployment rate to almost 11 percent. So the idea that short-term pain might be a price worth paying for a longer-term benefit is widely accepted in policy circles.

    • The 1% are changing America. It’s our move.

      The moment approaches when every American sees that the 1% are taking it away. Then we each make a choice to go with the flow or resist. Here are a few events that show this time is close. I’ve predicted the events leading to this point, but have no idea how we’ll react. Much depends on our choice.

    • The Real Reason Russia and China Are Dumping U.S. Debt

      You see, when the dollar reigns supreme, countries like China and Russia unwittingly find themselves paying for U.S. military expansion.

  • PR/AstroTurf/Lobbying

    • ACTION ALERT: NPR Celebrates Fast-Track Victory With an All-Corporate Lobbyist Segment

      After the Senate joined the House of Representatives in granting President Barack Obama fast-track authority to negotiate trade agreements, National Public Radio aired one report (Morning Edition, 6/25/15) on the legislative action that paves the way for the Trans-Pacific Partnership (TPP), the Transatlantic Trade and Investment Partnership (TTIP) and other corporate-friendly international deals.

    • Europe Seeks to Counter Kremlin Success Pushing World View

      Larry King’s back on the air, beaming his high-octane brand of talk to households around the world. Where can you catch him? Kremlin-backed television.

      Moscow wants you to pay better attention to what it’s saying, and to better reach your eyes and ears it’s spending around a half-billion dollars a year and carrying top-name talent like King and former governor and professional wrestler Jesse “The Body” Ventura.

    • Europe seeks to counter Kremlin ‘success’ world view
    • Department Of Homeland Security Still Controls What You Read

      With all of the establishment media owned by just a handful of corporations, six to be exact, it’s never been easier for the U.S. government to manipulate the news. A diversity of outlets, from websites to traditional newspapers, repeat the same stories to create an illusion of choice that allows propaganda to take root in the American imagination.

      Infiltration of the media by intelligence agencies has been standard practice since at least the 1950s, as exposed by watchdog journalist Carl Bernstein in a landmark 1977 report for Rolling Stone.

      “The use of journalists has been among the most productive means of intelligence‑gathering employed by the CIA,” wrote Bernstein.

  • Censorship

    • List of BBC web pages which have been removed from Google’s search results

      Since a European Court of Justice ruling last year, individuals have the right to request that search engines remove certain web pages from their search results. Those pages usually contain personal information about individuals.

      Following the ruling, Google removed a large number of links from its search results, including some to BBC web pages, and continues to delist pages from BBC Online.

      The BBC has decided to make clear to licence fee payers which pages have been removed from Google’s search results by publishing this list of links. Each month, we’ll republish this list with new removals added at the top.

      We are doing this primarily as a contribution to public policy. We think it is important that those with an interest in the “right to be forgotten” can ascertain which articles have been affected by the ruling. We hope it will contribute to the debate about this issue. We also think the integrity of the BBC’s online archive is important and, although the pages concerned remain published on BBC Online, removal from Google searches makes parts of that archive harder to find.

    • Tim Cook takes Apple down the dark road of censorship

      A couple of days ago, I wrote about the difficulties Apple would face if it tried to censor the Confederate flag in its online stores. Unfortunately, the company – under Tim Cook’s leadership – wasted no time in engaging in reactionary censorship of the Confederate flag in its app store.

    • Confederate Flag Purge Goes Nuts Almost Immediately, Hits Harmless Strategy Games
    • Apple reinstates removed Civil War game with the Confederate flag
    • Kanye West’s Glastonbury slot causing BBC censorship headache amid fears of sweary set
    • Julian Assange: Mainstream Media Rife With Censorship

      Julian Assange (JA): We have contracts with more than a hundred media organizations around the world, still. But it varies among mainstream press outlets. For example, the one in Pakistan can be great on issues outside of Pakistan. Issues inside Pakistan are different. It’s the same for Russia Today, outside Russia and Ukraine, it can be great, but inside Russia is a different story and through this we need to understand the political and economic dynamics that mean the organization might be trustworthy on one matter and not trustworthy on another matter.

    • Australian senate passes controversial anti-piracy, website-blocking laws

      In the eyes of at least one intellectual property academic, the passing of controversial anti-piracy website-blocking legislation in the senate on Monday night represented “a very dark day for the internet in Australia”.

      But for the film and TV industry, which has been battling online piracy at record levels, it was a watershed moment. Finally they could seek a remedy in the courts to block access to sites offering their content for free.

    • Users Betrayed as Australia Adopts a Copyright Censorship Regime

      Since our report last week on Australia’s Internet censorship bill, the bill did indeed pass the Senate yesterday, and will become the Copyright Amendment (Online Infringement) Act 2015. The new law provides an accelerated process for rightsholders to obtain court orders for ISPs to block sites that have the primary purpose of infringing copyright, or “facilitating” its infringement—a term that the law does not define.

    • Copyright industry buys its very own censorship regime

      The Pirate Party condemns the passage of the Copyright Amendment (Online Infringement) Bill 2015 through both Houses of Parliament. The legislation means that Australia now joins a list of countries that allows individuals and companies to seek orders to censor websites they allege infringe copyright.

    • Australian Senate Give The Green Light To Anti-Piracy And Website-Blocking Laws
    • Google’s Struggle Against Censorship Heats Up

      Google, once a global bastion against censorship, is having a pretty tough time of it these days. From being forced to comply with Right To Be Forgotten legislation in the EU to pressure from numerous industries to censor results which may violate copyright, Google’s defenses against censorship are crumbling. Even Google themselves — arguably in a very positive move — is taking steps to censor their own results when it comes to “revenge porn” and hacking victims, as previously reported by the Inquisitr.

    • Hard choices for Google as judges grow bold on censorship

      Google is in a tough spot. For years, it has met censorship demands in different countries by offering a local workaround. But now some judges have caught on and are asking the company to rip out search listings worldwide – a trend that is likely to embolden more courts to do the same.

    • Citing Ben Affleck’s ‘Improper Influence,’ PBS Suspends ‘Finding Your Roots’

      PBS said on Wednesday that it was postponing a future season of “Finding Your Roots” after an investigation revealed that the actor Ben Affleck pressured producers into leaving out details about an ancestor of his who owned slaves.

      PBS will not run the show’s third season until staffing changes are made, including hiring a fact checker, it said.

    • PBS’ ‘Finding Your Roots’ Suspended Over Allegations Of Ben Affleck Censorship

      PBS has suspended the ancestry-finding program Finding Your Roots following allegations that actor Ben Affleck used his clout to get the network to censor information about a slave-owning ancestor, the Washington Post is reporting.

      Affleck appeared in a 2014 episode of Finding Your Roots that the actor had hoped would reveal information about his ancestors that would give credibility toward the actor’s interest in activism in progressive causes, says Post writer Sarah Kaplan. And, in fact, the show did turn up some ancestors that made Affleck look good, including an ancestor who had fought in the Revolutionary War.

    • PBS Has Buried Finding Your Roots After Ben Affleck’s Slave-Owning Ancestry Cover-Up!
    • Ben Affleck’s Genealogy Kerfuffle Might Have Cost ‘Finding Your Roots’ A Fourth Season
    • Affleck Roots show broke standards

      An episode of Finding Your Roots which omitted references to Ben Affleck’s ancestor as a slave owner violated PBS standards, the public TV service has said.

    • Alhambra Unified School District denies censorship; Students stage protest at board meeting

      Others reiterated a previous demand that the district should release to the public the reason for Nguyen’s dismissal. They also asked for accessible video recordings of future board meetings, as well as meeting minutes written in various languages to accommodate the surrounding population.

    • State GOP Chair defiant in face of coup attempt
    • State GOP Chair defiant in face of coup attempt
    • A teen whose YouTube video tested Singapore’s censorship limits has been remanded at a mental health institute

      Last month Singapore teenager Amos Yee was found guilty of circulating obscene imagery and “wounding religious feelings,” after posting a YouTube rant in which he criticized the recently deceased Lee Kuan Yew, the nation’s widely revered first prime minister. Today Yee was scheduled to receive his sentence.

      Instead, he has been remanded at a mental health institute for a few weeks.

      A district judge said that because Yee possibly suffers from an autism spectrum disorder, she’ll explore other sentencing options besides the up to three years in prison Yee faced.

    • Blogger in Singapore faces financial ruin following defamation suit

      “If we want our freedom, we have to fight for it,” wrote blogger Roy Ngerng last year after he was sued for defamation by Singapore’s prime minister. The case was sparked by a blog post in which Ngerng allegedly suggested Prime Minister Lee Hsien Loong had misappropriated funds in a state pension system. In November, the court ruled in favor of the prime minister.

    • Singapore Blogger Faces ‘Financial Ruin’

      Criticizing the leaders of Singapore can come with a high price.

      Last year, blogger Roy Ngerng was sued for defamation by Singapore’s current Prime Minister, Lee Hsien Loong. Ngerng had suggested that the leader had misappropriated funds in a state pension system.

    • Singapore teen in anti-Lee video to undergo mental tests

      A Singapore court on Tuesday ordered psychiatric tests for a teenager who made online attacks on late former leader Lee Kuan Yew as international rights advocates sought his release.

      Amos Yee, 16, will be remanded at the Institute of Mental Health for two weeks to undergo further examination after previously being declared mentally and physically fit for an 18-month stint in a reformatory.

    • UN Urges Singapore To Release 16-Year-Old Blogger Amos Yee: UPDATED

      16-year-old Singaporean blogger Amos Yee is facing up to three years in prison for uploading remarks and images critical of the late Lee Kuan Yew, the founding Prime Minister of Singapore.

      Now, the UN Human Rights Office calls for the immediate release of Amos Yee in line with its commitment under the UN Convention on the Rights of Child.

      Amos was remanded on Jun. 2 for three weeks after he refused probation and is currently detained in Changi prison where, according to his lawyer, his physical and psychological status is deteriorating, the United Nations Human Rights Office for South-East Asia (OHCHR) said in a statement.

    • Poland: Journalist Lukasz Masiak fatally beaten

      Journalist Lukasz Masiak, founder of news site NaszaMlawa.pl, was attacked and killed in Poland on 14 June 2015. Masiak, who had been subject to numerous threats believed to be connected to his work, died of traumatic brain injury after being assaulted, according to TVN24.

      Launched in 2010, NaszaMlawa.pl covers Mlawa, a town of about 30,000 in the north central part of Poland. Masiak’s site reported on several controversial issues, including the dealings of local businessmen, drug use involving participants of the local mixed martial arts league, incidents involving Roma citizens in the area and the botched investigation into the death of a young woman. He received death threats following the latter story.

      The attack on 31-year-old Masiak took place in the bathroom of a local establishment at about 2am on 14 June. Police have issued an international arrest warrant for Bartosz Nowicki, a 29-year-old mixed martial arts fighter. Two people who were earlier detained have now been released. Police consider them witnesses to the incident.

    • Oppose political censorship at the University of Western Sydney!

      The International Youth and Students for Social Equality (IYSSE) calls on all students to oppose the political censorship imposed on the IYSSE student club at the University of Western Sydney (UWS), Bankstown campus.

      [...]

      Significantly, IYSSE supporters were first forced to shut down a campaign in April, amid a deluge of militarist propaganda by the entire political establishment, including the universities, to glorify the centenary of the “Anzac Day” British-led invasion of Turkey at Gallipoli.

      On April 23, IYSSE supporters distributed statements advertising a Socialist Equality Party public meeting entitled “Anzac Day, the glorification of militarism and the drive to World War III.” The leaflets called on students, workers and young people to oppose the political censorship of that meeting by the Labor Party-controlled Burwood Council, which cancelled a booking for the event, and the University of Sydney, which refused to permit the meeting to be held on its campus.

    • What is Facebook not telling us about machiavellian censorship?

      Take a browse through the data that’s presented for each country, and you’ll eventually come to the USA. While ‘Content Restrictions’ in Turkey are justified (“We restricted access to items primarily reported by the Turkish courts (and Access Providers Union) and Telecommunications Authority under local law 5651, which covers a range of offenses including defamation of Ataturk, personal rights violations, and personal privacy”) as are those in Russia, the Content Restrictions section is notable by its absence from the United States’ page.

    • Israel Culture Minister Booed as Censorship Debate Escalates

      Culture Minister Miri Regev, a member of Prime Minister Benjamin Netanyahu’s right-wing Likud Party who has been unabashed in her disdain for artistic projects that criticize the Israeli occupation, was at Tel Aviv’s Einav Theater on Friday to present an award. She was booed by the protesters as she entered the theater, and heckled by several audience members as she took the stage.

    • Al-Midan theater: We’ll turn to European Union for funding

      In reaction to culture minister’s decision to freeze funds to Arab theater which staged play about Israeli-Arab terrorist, a meeting of Arab artists and MKs says it will seek funds from the EU.

    • Israeli artists fear political censorship from government

      The newly appointed Minister of Culture Miri Regev sparks strong criticism. A series of recent statements lead to believe freedom of expression could be threatened by the government’s policies.

    • Israel’s Minister of Culture Miri Regev vows to withhold funds from artists who ‘defame’ the state

      Miri Regev, the hard-right Israeli Minister of Culture, has accused the country’s artists and performers of being “tight-assed” hypocrites after they raised vocal objections to her policies, which many consider a threat to freedom of expression.

    • Note to Minister Regev: No Israeli film has delegitimized the state

      With her ‘delegitimization’ obsession, the minister has to realize her paranoia is shaking the foundations of local culture.

    • With each headline, Miri Regev grows stronger

      Two words have been embedded in the consciousness of millions of Israelis recently: Miri Regev, Miri Regev and again Miri Regev. Compared to her, who is the immigrant absorption minister, the housing minister, or even the finance minister?

    • Culture Minister Regev gets mix of heckling, silent treatment at award ceremony

      Demonstrators protest ‘atmosphere of dictatorship’ created by Likud pol day after she calls artists ‘ungrateful tight-asses’

    • Leftists Protest ‘Being Silenced’ at Theater Award Ceremony

      Twenty leftist protestors have gathered outside the Israeli Theater Awards ceremony at the Einav center in Tel Aviv on Friday, to protest alleged censorship from current Culture Minister Miri Regev (Likud).

      The activists carried blank signs and bandages on their mouths to say they are “being silenced,” so to speak.

    • ‘NYT’ focuses on fears of Hamas censorship but leaves out Israeli government’s threats

      Today’s New York Times has an interesting story about a satirical political show in Gaza inspired by Jon Stewart. Headlined, “A Show Finds Humor in Gaza’s Headlines. Will Hamas Get It?” the article says the Gaza comics have screened their political show for hundreds at a theater, and aim to put the episodes on Youtube.

    • Octogenarian Arrested for Questioning WWII History on TV

      Ursula Hedwig Meta Haverbeck-Wetzel, an 86-year-old German woman who was ethnically cleansed from her home following WWII, has been arrested following her appearance on a public television program in Germany. There, she openly disputed the state-sanctioned-and-enforced “Holocaust” narrative of WWII, describing it as “the biggest and most persistent lie in history.” In many countries in Europe, including Germany, it is a crime to dispute, question or openly challenge the official narrative of the Holocaust specifically and WWII generally.

  • Privacy

    • What could the United States do to regain the trust of Brasil?

      During the approach to Brazilian President Dilma Rousseff’s re-scheduled visit to the United States there has been much talk about what Brasil can do to improve relations between two of the Western Hemisphere’s largest countries. The majority of reporting focuses on Brazilian failures but most of the problem lies in Washington.

      Decades of weak engagement by the United States combined with a willful blindness towards why the Brazilian government is suspicious of the their northern neighbour’s intentions in the region have left relations near stagnant.

      As Brasil Wire discussed in Chasing the Dragon the United States has too often confused its own interests with those of Brasil. Brasil is a friend to the United States, but Brazilian leaders, especially those on the left, have had little interest in engaging with Washington as anything but equals. The Brazilian leadership did not pursue closer relations with China, and to a much more limited extent Russia out of an ideological position, but a cold pragmatism that would make Henry Kissinger proud.

    • James Risen, Obama, Holder and the NSA

      Earlier this year I did an hour long interview with James Risen. We discussed his case with the Department of Justice, where he was being threatened with incarceration for refusing to reveal his source who gave him insights about NSA activities. This was before Obama and Eric Holder decided to drop the prosecution against him. I saw him give the keynote speech at the luncheon for the Investigative Reporters and Editors 2015 conference and after his talk, in which he lambasted former Attorney General Eric Holder, I asked him to do a brief interview, based on his comments on Obama, Eric Holder and their legacies.

    • My name is only real enough to work at Facebook, not to use on the site

      I always knew this day would come. The day that Facebook decided my name was not real enough and summarily cut me off from my friends, family and peers and left me with the stark choice between using my legal name or using a name people would know me by. With spectacular timing, it happened while I was at trans pride and on the day the Supreme Court made same sex marriage legal in the US.

    • CIA director talks of spying on House members, June 25, 1975

      On this day in 1975, William Colby, director of the CIA, told members of a House subcommittee that they and their congressional colleagues were not “immune” from surveillance by the agency during their travels abroad.

      Testifying before the House Government Operations Subcommittee on Government Information and Individual Rights, Colby said “if a congressman appeared abroad with some group that was a legitimate target of this agency that name would undoubtedly appear in the files of that group” and would show up in the CIA’s computer system.

    • Facebook Recruits Yahoo’s Alex Stamos As New Security Chief
    • Facebook nabs Yahoo’s chief information security officer
    • Facebook! Exfiltrates! Yahoo! Security! Boss!
    • Why Facebook Poached Yahoo’s NSA Hating Chief Security Officer [VIDEO]
    • CIA-backed tech company finds stolen government log-ins all over Web

      A CIA-backed technology company has found logins and passwords for 47 government agencies strewn across the Web — available for hackers, spies and thieves.

      Recorded Future, a social media data mining firm backed by the CIA’s venture capital arm, says in a report that login credentials for nearly every federal agency have been posted on open Internet sites for those who know where to look.

      “The presence of these credentials on the open Web leaves these agencies vulnerable to espionage, socially engineered attacks, and tailored spear-phishing attacks against their workforce,” the company says.

      The company says logins and passwords were found connected with the departments of Defense, Justice, Treasury and Energy, as well as the CIA and the Director of National Intelligence.

    • US government log-ins, passwords easy to find on the open Web, researcher says
    • Passwords From 47 Government Agencies Leaked Online
    • WikiLeaks: NSA eavesdropped on the last 3 French presidents

      WikiLeaks published documents late Tuesday that it says show the US National Security Agency eavesdropped on the last three French presidents, releasing material which appeared to capture officials in Paris talking candidly about Greece’s economy, relations with Germany – and, ironically, American espionage.

    • NSA’s high-level spy targets
    • WikiLeaks says documents show NSA eavesdropped on French presidents

      Angry and embarrassed, France summoned the U.S. ambassador Wednesday to respond to the revelations by WikiLeaks that the U.S. National Security Agency eavesdropped on three successive French presidents and other top officials.

    • How France could get revenge for the NSA spying

      I told you yesterday about the leaked files showing that the NSA wiretapped three French presidents since 1995. France is understandably upset, what with being an ally and all.

    • UPDATE: France says US must repair damage from NSA spying reports
    • French Prime Minister: US Must Act Fast to Repair Damage From NSA Spying Revelations
    • Tactless courtship—NSA’s espionage in France

      On June 23rd, WikiLeaks unveiled a number of documents from the National Security Agency’s “Espionnage Elysée” program, that demonstrated the NSA’s targeted espionage against high level French government officials, including ministers and three presidents of the French Republic. This espionage against U.S. allies is tactless and is likely to fray relations with U.S. allies and must be reformed.

    • Two Overlooked Aspects Of Those Leaks About NSA Spying On French Presidents

      Of course, Mr Crypto himself, Bruce Schneier, did spot it, and pointed out it could be one of his “other” US intelligence community leakers, listed a couple of months ago, or even a completely new one. As that post shows, there are now a few people around that are leaking secret documents, and that’s a pretty significant trend, since you might expect enhanced security measures taken in the wake of Snowden’s leaks would have discouraged or caught anyone who attempted to follow suit.

    • New NSA whistleblower suspected behind French president surveillance leak

      American and European security agencies are reportedly investigating a possible new whistleblower behind the WikiLeaks publication that exposed alleged NSA spying on top French officials, including three presidents.

      The website on Tuesday released what appear to be classified NSA documents alleging the US agency spied on three successive French presidents: Jacques Chirac, Nicolas Sarkozy and incumbent François Hollande.

    • Obama calls Hollande to promise NSA is no longer spying on French president

      Barack Obama has assured the French president, François Hollande, that American intelligence services are no longer tapping his phone. During a brief telephone call, the American leader was reported to have reiterated a pledge made two years ago to stop spying on his French counterpart, according to Hollande’s office.

    • Obama reassures France after ‘unacceptable’ NSA spying

      U.S. President Barack Obama reaffirmed in a phone call with his French counterpart Francois Hollande on Wednesday Washington’s commitment to end spying practices deemed “unacceptable” by its allies.

    • French ministers flock to US despite ‘unacceptable’ NSA phone-tap revelations

      French ministers seemed keen to resume business as usual with the US on Thursday, even though Paris the day before declared American wiretaps on President François Hollande and others “unacceptable”. Despite WikiLeaks’ revelation of the snooping, Economy Minister Emmanuel Macron continued his visit to the US, while promising to raise the question in Washington.

    • NSA: connecting people
    • NSA, GCHQ Excesses Stem From Their Role as Secret Guardians and Protectors

      On Tuesday, WikiLeaks published documents revealing that the NSA had secretly spied on former French presidents Jacques Chirac, Nicolas Sarkozy and current President Francois Hollande over a period of at least six years.

      [...]

      In another revelation, GCHQ spied on South African Legal Resources Centre and the Egyptian Initiative for Personal Rights, Britain’s official Investigatory Powers Tribunal revealed.

    • Still Funny? Paris Diplomats Joke About NSA Spying Before WikiLeaks Release

      During the meeting of the Normandy group in Paris, Russia’s Foreign Ministry noticed how the microphones were operating “strangely”, turning on and off by themselves; the blinking lights caused the diplomats to joke that the US is probably up to its usual tricks again. One however should give it a thought in light of WikiLeaks recent revelations.

    • Q&A: All you need to know about WikiLeaks claims that NSA spied on French leaders

      WikiLeaks spokesman Kristinn Hrafnsson said he was confident the documents were authentic, noting that WikiLeaks’ previous mass disclosures — including a large cache of Saudi diplomatic memos released last week — have proven to be accurate.

    • No friends or enemies in spying game

      Despite the furious protests of France over the latest U.S. spying claims, experts say that in the intelligence game there are no friends or enemies — only interests — and all means are justified to pursue them.

    • The progressive roots of NSA’s privacy violations

      The NSA’s actions have roots in progressive New Deal ideology, with its contempt for the constitutional separation of powers and private property rights. More specifically, this debate is traced to the New Deal-era erosion of the centuries-old rule of law that only judges may issue warrants, and after a showing of probable cause.

    • Steinmeier: NSA spying activities to affect relations

      The NSA’s spying activities in France will have an impact on transatlantic relations, Germany’s foreign minister Frank Walter Steinmeier told DW in an interview. He also called for new approaches in the attempt to stem violence in Ukraine.

    • Privacy is awesome, in theory: Column

      When it comes to intrusions on their privacy, Americans don’t care as much as they think they should. Most of us feel the same way about privacy as we do about African children: We care just enough to say we care.

      According to a Pew Research Center survey last month, 90 percent of Americans consider their privacy to be “important,” but 10 percent or less take significant steps to safeguard it. Lots of people (59 percent) clear their cookies and browser histories — probably because they would be divorced if they didn’t — but only 10 percent bother to encrypt their phone calls, texts or emails. Our privacy is important, but not so important as to require more than three seconds of effort.

    • How the NSA Started Investigating the New York Times’ Warrantless Wiretapping Story

      Three days after the New York Times revealed that the U.S. government was secretly monitoring the calls and emails of people inside the United States without court-approved warrants, the National Security Agency issued a top-secret assessment of the damage done to intelligence efforts by the story. The conclusion: the information could lead terrorists to try to evade detection. Yet the agency gave no specific examples of investigations that had been jeopardized.

    • Google’s ‘listening network’ could be vulnerable to US govt, NSA – Falkvinge to RT

      Voice recognition technologies are part of the future, but should trigger concern that IT companies are essentially building “listening networks” which can be exploited by the likes of the NSA, Swedish Pirate Party founder Rick Falkvinge told RT.

    • Google-NSA Nexus: New Chromium Browser Installs Eavesdropping Tool on Your PC

      By now, most experts will admit that Google is one giant data and intelligence gathering operation. This latest browser revelation (see full story below) only confirms what we already suspected.

    • Google is Worse Than the NSA.

      If you’re running Google Chrome as your browser – and we used to – you might want to reconsider it. The bottom line is that Google has built a “feature” into Chrome that, without your knowledge and without your permission, turns the microphone of your computer (and phone?) on and listens to everything you say.

    • Has the CIA Asked the FISC to Restart Its Bulk Collection Program?

      There’s a curious gap in the documents currently posted on the FISC’s public docket — one that suggests the NSA call records program isn’t the only type of bulk collection the government has asked the FISC to reauthorize following the USA Freedom Act’s passage on June 2. It’s an exercise in reading tea leaves at this point, but the gap raises important and unanswered questions about bulk collection programs we still know little about.

      In the weeks since the USA Freedom Act became law, the FISC has published a series of filings and orders on its website. Those documents indicate that the government has submitted at least four applications for orders under the post-USA Freedom version of Section 215. One of them, docketed as BR 15-75, is the government’s application to restart the NSA’s bulk call records program. (The “BR” stands for FISA’s “business records” provision, while “15” stands for the year.) Two others, numbered BR 15-77 and BR 15-78, are addressed by Judge Saylor’s opinion concerning the appointment of an amicus curiae and the question of whether Section 215’s brief expiration made gibberish of Congress’ effort to renew the law in the USA Freedom Act. Based on the description in the opinion and the scope of the issues addressed, one can fairly surmise that these are targeted applications for records under Section 215.

    • NSA and GHCQ targeting antivirus developers, say Snowden documents

      New documents provided by former American secret service employee-turned whistleblower Edward Snowden claim that the U.S. and UK security services have been carrying out attacks against antivirus developers around the world, including Russian company Kaspersky Lab.

    • Kaspersky says NSA, GCHQ tracking its activities

      Popular antivirus company, Kaspersky has made a controversial announcement declaring that it is being attacked by hackers, who have been tracking the activities of the Russian company. A report from Engadget reveals that a few of these unwarranted activities are also sourced from major intelligentsia like the American NSA and UK’s GCHQ.

    • NSA, British counterpart targeted cybersecurity firms

      The U.S. and United Kingdom have been trying to find ways around anti-virus and security software by surreptitiously studying the products and the companies that make them, according to various published reports.

    • GCHQ and NSA broke antivirus software so that they could spy on people, leaks indicate

      The British and American spy agencies deliberately broke anti-virus software so that they could read the messages of their citizens, according to new leaks.

      Both the NSA and GCHQ have long been said to have deliberately reversed engineer software so that they could find weaknesses in software and exploit them to read communications. But new documents show that the agencies did so to some of the most popular antivirus software, potentially exposing hundreds of millions of people to dangerous viruses, according to a report from The Intercept.

    • After NSA Targeting, Google Researcher Exposes ‘Trivial’ Antivirus Hacking

      Earlier this week, fresh Edward Snowden leaks showed how the National Security Agency (NSA) targeted a range of foreign antivirus firms. It was no surprise intelligence agencies were interested in exploiting antivirus; such security software has access to most files across operating systems, from Windows to Macs.

    • NSA Leaker Edward Snowden To Stay In Russia For Now

      Apparently former NSA contractor and secret document leaker Edward Snowden is not planning on leaving Moscow anytime soon. According to Snowden’s attorney Anatoly Kucherena, who was recently interviewed by Interfax, he can’t go back to the U.S. right now given the various legal charges against him are politically motivated.

    • Disturbing Video Incites Police Rebellion Against Ecuador’s President Correa

      The video, which appears to incite rebellion among the ranks of the Ecuadorean police department, is particularly alarming due to the role of the police in a 2010 coup attempt against President Rafael Correa.

    • On the Trail of Turkey’s Terrorist Grey Wolves

      Turkey, as a NATO country near Russia’s border, developed a powerful “deep state” where intelligence operatives, terrorists and gangsters crossed paths and shared political alliances, a grim reality that author Martin A. Lee explored in 1997 and a dark legacy that reaches to the present.

    • US, NATO powers intensify preparations for nuclear war
    • Luxembourg scholar explodes myths about Tibet independence

      Now we know that the separatists in Tibet have been in touch with the US government since the 1950s. The CIA and the Dalai Lama have always held hands. His brother, especially his oldest brother Thubten Jigme Norbu, was recruited by the CIA’s “Radio Free Asia.” Gyalo Dondrub was recruited as CIA’s anti-Communism terrorist.

    • America’s U.N. Ambassador Continues Standing Up for Nazis

      Recently, President Barack Obama’s friend whom he appointed to represent this Vcountry at the United Nations visited Ukraine and used the Ukrainian-language translation and variant of the German Nazi Party’s “Deutschland über alles,” or “Germany above all,” to honor Ukraine’s own racist fascists, that nation’s ideological nazis, whom the U.S. had used in February 2014 for overthrowing Ukraine’s neutralist democratically elected President. This was not our U.N. Ambassador’s first foray into international nazi political pandering.

    • Ukraine’s Pres. Poroshenko Says Overthrow of Yanukovych Was a Coup

      Ukraine’s President Petro Poroshenko requests the supreme court of Ukraine to declare that his predecessor, Viktor Yanukovych, was overthrown by an illegal operation; in other words, that the post-Yanukovych government, including Poroshenko’s own Presidency, came into power from a coup, not from something democratic, not from any authentic constitutional process at all.

    • Georgia’s Former President Lobbied US Senator

      Lobbyists representing former Georgian President Mikheil Saakashvili met with staffers from US Senator Marco Rubio’s office just months before Rubio called for integrating Georgia into the NATO alliance as a way of punishing Russia, a US campaign finance watchdog group said in a blog post.

    • ‘Stalin’s daughter’ delves into the life of a tyrant’s child
    • ‘Stalin’s Daughter’: The extraordinary life of a Soviet defector

      “Wherever I go, whether to Australia or some island, I will always be the political prisoner of my father’s name.” Such was the lament of Svetlana Alliluyeva, whose life sentence it was to be the only daughter of Joseph Stalin.

    • Russian defectors living the dead end of the American dream in distant Oregon

      But their dreams of living the life they imagined defectors enjoy – having the run of Europe with new identities, invented histories and flush with money – are long gone. Instead they get to live like so many Americans, struggling to make ends meet, fighting off the debt collectors and worrying about the immigration service banging on the door.

    • Ongoing weekly demo, Tuesday evenings at NSA/NRO Menwith Hill

      Menwith Hill is the largest US spy base outside the USA. Run by the National Security Agency (National Reconnaissance Office also present), it is situated in the Yorkshire dales, approximately 8 miles from Harrogate adjacent to the A59.

    • How USA Freedom Impacts Ongoing NSA Litigation

      Digital liberties groups across the country have both celebrated and criticized the recent passage of the USA Freedom Act. Here at EFF, we did a little bit of both. While USA Freedom will undoubtedly impact the court cases challenging the NSA’s mass surveillance, the full scope of this law and how the courts and even the government will interpret it remains unclear.

      However, we do know that the government believes it can renew its daily bulk collection of telephone records during the 180-day “transition period” in which USA Freedom’s amendments to the phone records authority goes into effect. This is particularly troubling given the Second Circuit’s ruling in ACLU v. Clapper that this sort of dragnet surveillance is illegal.

    • NSA Not Yet Pointing Finger at China as Suspect in OPM Data Theft (UPDATED)
    • US to raise breach of government records at talks with China

      China has openly denied involvement in the break-in. Obama administration officials have said they are increasingly confident that China’s government, not criminal hackers, were responsible.

    • NSA Chief: Don’t Assume China Hacked OPM

      The U.S. military’s top cyber warrior says it’s merely an “assumption” that the Chinese government was behind the recent hack at the Office of Personnel Management, or OPM — and not necessarily one he shares. That puts Adm. Michael Rogers, commander of U.S. Cyber Command and director of the National Security Agency, in opposition to unnamed sources within the U.S. government who blamed Beijing in June 4 interviews with the New York Times and Washington Post.

    • NSA’s Rogers Won’t Say China Did OPM Hack
    • Reports: NSA Chief Michael Rogers Declines to Attribute OPM Hack
    • Rogers mum on OPM attribution, but says hack shows value of data
    • Intercept – an account of a revolution in spying

      Gordon Corera, the BBC’s security correspondent – a difficult assignment – has written a most readable account (Intercept, Weidenfeld & Nicolson) of how computers and the internet have transformed spying, a term I use in this context to include all ways of intercepting communications, including hacking and cyber attacks, whatever the motive.

    • Will Israeli spy Jonathan Pollard be released in November?

      The Obama administration refuses to say if Pollard will be released on his scheduled parole date. Pollard can blame himself and Benjamin Netanyahu for the sorry state of affairs.

    • NSA/Surveillance: Damning new revelations and still no judicial inquiry

      FIDH and LDH recall that they filed a complaint in July 2013 aimed at the NSA, the FBI and their surveillance practices under the PRISM programme. After more than 18 months since the opening of the preliminary investigation into the case, the Paris Prosecutor had still not made clear how it would procede with this affair.

      Confronted with the Prosecu’s inaction, our organisations filed a new complaint as civil parties before the same court on 8 April 2015, hoping to shed light on the alleged violations of individual freedoms.

      FIDH and LDH deplore the fact that the French justice system has not moved forward with this complaint implicating the NSA as well as the companies that provided access to their networks, thereby contributing to the installation of the surveillance programme called PRISM. The lack of progress is all the more unacceptable considering damning new revelations showing the NSA tapped the telephones of three French presidents.

    • Rousseff Seeks U.S. Reconciliation Two Years After NSA Spying

      Brazil is seeking a rapprochement with the U.S. as the Western Hemisphere’s two largest economies try to realign interests after a decade of diplomatic skirmishes.

      Brazil president Dilma Rousseff will arrive in New York on Saturday for a five-day tour including San Francisco. It is her first official travel to Washington since she canceled a state visit in 2013 after allegations the U.S. had spied on her.

    • Congresswoman Esty voted wrong on NSA bill

      Privacy is a non-partisan issue. In the final vote, 88 Members of the House, almost equally divided between the two parties, voted against this pyrite bill.

    • NSA Chief Wants to Watch, as Well as Listen and Read

      The National Security Agency, while primarily occupied by sweeping up billions of phone calls, emails, texts and social media messages each day, wants better visual information about the earth and its residents, too, Admiral Michael Rogers said Wednesday.

      “Signals intelligence … ain’t enough, you guys,” the NSA chief told a gathering of contractors in the geospatial intelligence business. “We gotta create a much broader picture.”

      We need “the ability to visualize,” he explained, because “man is fundamentally a visual creature.”

    • NSA to crunch big data in AWS C2S

      The National Security Agency is moving some of its IT operations to Amazon’s cloud.

      The National Security Agency (NSA) was represented by Alex Voultepsis, chief of the engineering and planning process for the NSA’s Intelligence Community Special Operations Group, at a session during the AWS Public Sector Symposium here this week. Voultepsis said during a panel discussion the agency plans to migrate some of its infrastructure to Amazon Web Services (AWS).

  • Civil Rights

    • Hastings’ Lessons From the Grave—Have We Learned Anything?

      Hastings was known for challenging conventional wisdom and investigating authority at the highest levels. With a Polk Award-winning article in Rolling Stone, he brought down General Stanley McChrystal, commander of NATO’s International Security Assistance Force and US Forces-Afghanistan.

      At the time of his death, Hastings had been working on a story about CIA Director John Brennan. The president of Strategic Forecasting Inc. (“Stratfor”), a CIA contract global intelligence firm, has described Brennan in secret emails as someone on a “witch hunt” of investigative journalists. Brennan, of course, has denied these claims: a CIA spokesperson told reporter Kimberly Dvorak in an email that notwithstanding WikiLeaks, “any suggestion that Director Brennan has ever attempted to infringe on constitutionally-protected press freedoms is offensive and baseless.”

      Is it possible that Brennan felt threatened by the content of Hastings’ would-be story? If yes, how would the CIA have responded to such an expose ?

    • Detention centres and State censorship

      Australia’s detention centres have become propaganda tools of terror.

    • Leaked Damage Assessment Shows Government Mostly Interested In Investigating Leakers, Withholding Information From Public

      The Intercept has just released an interesting document from its Snowden stash: an unredacted damage assessment of the New York Times’ 2005 exposure of the NSA’s warrantless wiretapping program — a program that saw the agency monitoring the emails and phone calls of US citizens.

    • Trial Starts Tuesday for Diego Gomez, Colombian Student Facing Prison Time for Sharing a Paper Online

      Fundación Karisma is continuing to support Gomez in his case to fight against these excessive criminal charges. The organization says that he has good standing for a strong legal defense for two reasons. First, there was no malicious intent behind his sharing the paper online. Second, there was no actual harm to the author’s economic interests as Gomez made no profit off of the paper. Under Colombian criminal law, the court must weigh both of these factors, and it would take a significant misrepresentation of facts to paint Gomez as a criminal who posted the paper online for private profit.

    • Gitmo briefing: prisoners use attorneys, media to “discredit the U.S. government”
    • CIA photos of ‘black sites’ could complicate Guantanamo trials

      Military prosecutors this year learned about a massive cache of CIA photographs of its former overseas “black sites” while reviewing material collected for the Senate investigation of the agency’s interrogation program, U.S. officials said.

      The existence of the approximately 14,000 photographs will probably cause yet another delay in the military commissions at Guantanamo Bay, Cuba, as attorneys for the defendants demand that all the images be turned over and the government wades through the material to decide what it thinks is relevant to the proceedings.

    • Photos of CIA ‘black sites’ come to light

      Military prosecutors earlier this year learned about a massive cache of CIA photographs of its former overseas “black sites” while reviewing material collected for the Senate investigation of the agency’s interrogation program, according to US officials.

      The existence of the approximately 14,000 photographs will probably cause yet another delay in the military commissions at Guantanamo Bay, Cuba, as attorneys for the defendants demand all of the images be turned over to them and the government wades through the material to decide what it thinks is relevant to the proceedings.

    • Anti-torture day: speakers call for an end to custodial torture

      Speakers at a seminar on the occasion of the International Day in Support of Torture Victims on Friday demanded to end the custodial torture by the state institutions and urged the government to Pakistan to form the anti-torture law in the country to provide justice to the victims, their families and punish the preparatory.
      Pakistan had ratified the Convention against Torture (UN CAT) in 2010 but despite passage of five years, no legislation is made against torture in Pakistan, said the speakers at a seminar on the International Day in Support of Victims of Torture jointly organized by Pakistan Institute of Labour Education and Research (PILER), Human Rights Commission of Pakistan (HRCP) and Asian Human Rights Commission (AHRC) at Arts Council of Pakistan, Karachi.

    • EIPR supports call for CIA torture ‘accountability’

      The Egyptian Initiative for Personal Rights (EIPR) supported a call from international rights groups on “the need to ensure accountability for the United States CIA torture programme”.

    • United States: Coalition Statement to U.N. Human Rights Council Demanding Accountability on CIA Torture Program – HRC29

      Last December, the U.S. Senate Select Committee on Intelligence released the summary, findings and conclusions of its four-year investigation into the Detention and Interrogation Program operated by the Central Intelligence Agency (CIA). Since then, the international human rights community has reiterated the call for full transparency about and accountability for this unlawful program, in which systematic human rights violations, including the crimes under international law of torture and enforced disappearance were committed. Last March, more than 20 human rights groups called on the Council to take action and demand that the United States fulfill its international human rights obligations on truth, accountability and remedy, including by appointing a special prosecutor to conduct a comprehensive and credible criminal investigation of alleged serious crimes described in the report and to establish a special fund to compensate victims.

    • The Myth of the Bamboo Pentagon: The Vietnam War’s Phantom Enemy Headquarters

      The Vietnam War had any number of controversial battles, but the invasion of Cambodia stands out—an unnecessary, bloody move that cost the lives of hundreds of U.S. soldiers on the ground and led to widespread rioting at home, including the Kent State tragedy.

      Remarkably, a new book based on information from recently released documents confirms that one of the key rationales for this act was a mirage, a conspiracy theory. President Nixon had embarked on a mad hunt for the “Bamboo Pentagon,” a shadowy headquarters and command center from which the Communist forces were directing their side of the fighting.

    • The Honduran meltdown: Made in USA

      In May 2005, US Deputy Secretary of State Robert Zoellick appeared at the conservative Heritage Foundation in Washington to rally support for CAFTA, a free trade agreement between the US, the Central American countries, and the Dominican Republic.

      In his remarks, Zoellick played up the notion that, for Central America and the DR, the agreement would “strengthen democracy through economic growth and open societies based on the rule of law”, while also entailing various perks for the gringos; a T-shirt reading “Made in Honduras”, he enthused, would likely contain over 60 percent US content.

    • Robert Kennedy Jr.’s 25 Truths on the Secret Negotiations between Fidel Castro and President Kennedy

      More than half a century ago, Fidel Castro and John F. Kennedy conducted secret negotiations aimed at normalizing relations between the United States and Cuba. Robert Kennedy Jr., nephew of the assassinated President, recounts these events and praises Obama’s policy of rapprochement, which is making his uncle’s “dream” a “reality(1)”.

    • Obama: U.S. Will No Longer Threaten To Prosecute Families Who Pay Terrorists Ransom

      President Barack Obama announced several changes to U.S. hostage policy on Wednesday, including that the government will no longer threaten to criminally prosecute families who pay terrorists for the release of loved ones.

    • US ransom policy shift undermines UK’s hardline stance

      Barack Obama’s decision to relax Washington’s blanket ban on paying ransoms to free hostages will be seen as belated American acceptance of an unpleasant but unavoidable necessity by west European countries criticised in the past for buying off terrorist kidnappers with cash.

    • White House imposes order on often confused ransom policy

      Following months of pressure from grieving families, President Barack Obama unveiled a slate of new policies on Wednesday intended to bring some level of standardization to how the federal government deals with international hostage situations.

    • Human rights record of U.S. criticized by China
    • US, China Exchange Criticisms on Human Rights

      The U.S. State Department has accused China of wide-ranging and routine human rights violations, prompting Beijing to shoot back with its own report slamming Washington’s “increasingly grave” rights record.

    • China says US kettle calling pot black. No kidding … Printer friendly page Print This
    • China Slams US Human Rights Record in New Report
    • China trolls U.S. on ‘arbitrary police killing of African-Americans’ after U.S. human rights rebuke

      On Thursday, the U.S. State Department released its annual report on human rights around the world, finding fault with the records of Cuba, Iran, Russia, Myanmar, and China, among other nations. In China, the report said, “repression and coercion were routine” against journalists, dissidents, ethnic minorities — Uigurs and Tibetans, especially — and lawyers that took on sensitive cases, and censorship was rampant.

    • China slams US with counter human rights report

      A day after the US released its country report, China answers back with its own, calling the US ‘a country with grim problems’

    • US Foreign Policy: A Reflection of the Legacy of Racism and National Oppression

      At the same time there is almost no debate over the redeployment of military forces in Iraq. There is almost no information about the ongoing war in Syria. Most people in the U.S. who watch the news originating from inside the country are barely aware of the war in Yemen and the role of Washington in this genocidal process.

      Consequently, we need to intensify our activism aimed at ending racism domestically and imperialist militarism around the world. These two imperatives merge when we look at the growing militarization of the police in the U.S. and the vast prison industrial complex.

    • China Lashes Out at US for ‘Terrible Human Rights Record’ Citing Police Brutality and Racism

      After the United States released a report on human rights in China on Thursday, the communist country hit back with its own report on the “terrible human rights record” in the US.

      In a scathing report, titled ‘Human Rights Record of the United States in 2014′, China rebuked the US over its problems of “rampant use of guns, frequent violent crimes and the excessive use of force by police”.

      “Plenty of facts show that, in 2014, the US, a self-proclaimed human rights defender, saw no improvements in its existent human rights issues, but reported numerous new problems,” the report said.

    • Full text of Human Rights Record of the United States in 2014 (9)
    • Full text of Human Rights Record of the United States in 2014

      On June 25 local time, the State Department of the United States released its country reports on human rights practices once again, making comments on the human rights situations in many countries while showing not a bit of regret for or intention to improve its own terrible human rights record. Plenty of facts show that, in 2014, the U.S., a self-proclaimed human rights defender, saw no improvements in its existent human rights issues, but reported numerous new problems. While its own human rights situation was increasingly grave, the U.S. violated human rights in other countries in a more brazen manner, and was given more “red cards” in the international human rights field.

    • How an eastern Idaho farm boy became a contract torturer

      Bruce Jessen has been called a war criminal. A torturer. An “American Mengele.” The retired Air Force colonel and trained psychologist was, according to a 2014 report from the U.S. Senate Select Committee on Intelligence, an architect of the “brutal,” “inherently unsustainable” and “deeply flawed” detainee-interrogation program that “damaged the United States’ standing in the world” in the years following the attacks of Sept. 11, 2001.

    • Obama Should Close Gitmo to End Torture of Detainees – Advocacy Group

      US President Barack Obama needs to close the Guantanamo Bay, Cuba detention facility to end the suffering of detainees victimized by CIA torture techniques, Center for Constitutional Rights (CCR) Advocacy Program Manager Aliya Hana Hussain told Sputnik during a rally in Washington, DC.

    • CIA Whistleblower On Threats DOJ Should Target

      CIA whistleblower John Kiriakou speaks out on the threats the Justice Department should be targeting and how the FBI’s warning of white supremacists infiltrating law enforcement has been forgotten. Alyona cuts through the spin on Free Speech Zone.

    • Megyn Kelly Moment: Fox’s “Rising Star” Invites Anti-LGBT Hate Group Leader To Discuss Same-Sex Marriage Ruling

      Megyn Kelly invited anti-LGBT hate group leader Tony Perkins to respond to the Supreme Court’s ruling in favor of marriage equality. Kelly’s insistence on inviting Perkins highlights the host’s cozy relationship with the ardent anti-gay group.

    • Washington Post Reserves Dignity in Death for Some Women

      How do you know that the women whose murders the Washington Post is reporting were sex workers or dealing with substance abuse?

      Because if they weren’t, they would not be unfeelingly described as “washing up dead.”

    • CIA Engaged In Human Experimentation Torture

      They would also be wise to pay attention to the news. A few days before this vote, a new report from The Guardian explained how our use of torture against detainees in the war on terror occasionally crossed the line into human medical experimentation. Ring of Fire’s Farron Cousins talks about this story with attorney Michael Burg.

    • Human Experimentation

      Non-consensual experimentation on institutionalized children and adults was common in the United States before, during, and even more so after the U.S. and its allies prosecuted Nazis for the practice in 1947, sentencing many to prison and seven to be hanged. The tribunal created the Nuremberg Code, standards for medical practice that were immediately ignored back home. Some American doctors considered it “a good code for barbarians.”

    • Majority Around the World Say US Torture Methods ‘Not Justified’ – Poll

      A vast majority of people around the world say they are opposed to the US government’s enhanced interrogation techniques following the September 11, 2001 terrorist attacks on the United States, and consider them torture, according to a new poll released by Pew Research Center on Tuesday.

    • Italy denies role in CIA’s extraordinary rendition of Egyptian imam

      Omar, also known as Osama Mustafa Hassan Nasr, brought the case after kidnapping convictions against top Italian spies were overthrown on appeal last year.

    • Italy denies role in CIA rendition of imam

      Italy denied any involvement on Tuesday in the CIA’s “extraordinary rendition” of an Egyptian imam kidnapped in Milan in 2003 on charges of terrorist connections.

    • Italy Denies Role in CIA Plot to Abduct Egyptian Imam

      Italy has denied having any involvement in the CIA’s “extraordinary rendition” of an Egyptian imam who was kidnapped by US officials in Milan in 2003 on charges of having terrorist connections.

    • Italy denies role in CIA extraordinary rendition of imam

      Italy denied any involvement on Tuesday in the CIA s “extraordinary rendition” of an Egyptian imam kidnapped in Milan in 2003 on charges of terrorist connections.

    • I Was Tortured. I Know How Important It Is to Hold the CIA Accountable.

      More than once, I begged my torturers to kill me. Years later, I think about it and wonder if I really meant it. I think I did, at the time.

      I was tied up, nude and blindfolded, and electrically prodded all over my body. Twice they pretended they were executing me by placing a gun to my head or in my mouth and clicking the trigger.

      To my abusers, who interrupted this torture with question after question, this was merely “enhanced interrogation.”

      That was decades ago, in Argentina. But today, U.S. political figures — including presidential candidate Rick Perry — are using this same euphemism to describe the CIA’s torture and ill treatment during its secret detention operations from 2002 to 2008. And earlier this month, John Oliver’s HBO show “Last Week Tonight” reported that of 14 declared U.S. presidential candidates, only four said they would keep an executive order put in place by President Barack Obama in his first days in office that seeks to ensure the U.S. does not commit torture.

      When U.S. media and political figures repeat the euphemism enhanced interrogation, they reframe the debate in a way that implicitly downplays the pain and inhumanity of torture. Instead, torture becomes a matter of rational decision making and calibrated legality.

    • ACLU, Amnesty International, Human Rights Watch Urge DOJ to Appoint Special Prosecutor for CIA Torture
    • Rights groups call on US Justice Department to probe CIA torture

      Three major rights groups called on Attorney General Loretta Lynch to investigate the CIA for alleged torture and other rights violations of prisoners in the agency’s custody.

    • Over 100 International Groups Call on US to Prosecute Torture
    • Rights groups petition US to create special prosecutor for torture claims
    • Human rights groups ask attorney general to order new CIA torture probe
    • CIA Torture Report: Human Rights Groups Write Letter Urging Attorney General Loretta Lynch To Pursue Criminal Investigations

      A joint letter sent by human rights groups to U.S. Attorney General Loretta Lynch on Tuesday called for the appointment of a special prosecutor to investigate the Central Intelligence Agency’s use of enhanced interrogation techniques revealed by a Senate report released late last year. The letter, signed by Human Rights Watch, the American Civil Liberties Union and Amnesty International, asked Lynch’s office to investigate “torture and other violations of U.S. law” in connection to the programs.

    • Ethiopia’s election insult to the people and democracy

      “Won” is not really an accurate description of the election result; as the chairman of the Oromo Federalist Congress, Merera Gudina, put it, this “was not an election, it was an organised armed robbery”.

    • South Koreans sentenced to hard labour in North Korea

      Two South Korean citizens arrested in North Korea in March on charges of spying have been sentenced to hard labour for life, South Korea said.

    • Rape culture and Rolling Stone

      Behind all the manifestations of rape-skeptic journalism lie the interests of the 1%, who want to preserve the exploitative, oppressive relations that exist under capitalism and prop them up.

    • CIA torture is only part of medical science’s dark modern history

      The controversy over the CIA torture is very similar to another debate raging within the US medical community – that over doctor involvement in the death penalty.

    • USA Senate passes ban on torture
    • Senate passes amendment to ban torture as US policy

      The amendment would require USA government interrogators to adhere strictly to techniques outlined in the Army Field Manual, which would have to be updated every three years to ensure it complies with USA law and “reflects current evidence-based best practices for interrogation that are designed to elicit reliable and voluntary statements and don’t involve the use or threat of force”.

    • Two grilled at CIA black site in Afghanistan freed after more than a decade

      The Pentagon secretly repatriated two Tunisians who were interrogated at a CIA black site in Afghanistan and imprisoned by the U.S. military in that country for more than a decade, U.S. officials said.

      A U.S. military cargo plane flew Lutfi al-Arabi al-Gharisi and Ridha Ahmad al-Najjar from Afghanistan to Tunisia on June 15, according to U.S. officials, who spoke on the condition of anonymity to discuss a detainee transfer that had not been made public.

    • Two Tunisians interrogated at CIA black site in Afghanistan secretly flown home

      The Pentagon secretly repatriated two Tunisians who were interrogated at a CIA black site in Afghanistan and imprisoned by the U.S. military in that country for more than a decade, U.S. officials said.

      A U.S. military cargo plane flew Lutfi al-Arabi al-Gharisi and Ridha Ahmad al-Najjar from Afghanistan to Tunisia on June 15, according to U.S. officials, who spoke on the condition of anonymity to discuss a detainee transfer that had not been made public.

    • Putting a Stop to US and International Torture

      Today is the UN’s International Day in Support of Victims of Torture.

    • Major rights groups beg DOJ to prosecute CIA
    • US Justice Department Must Expose CIA Use of Torture – Amnesty Int’l

      The US Department of Justice must speak out against Central Intelligence Agency (CIA) torture practices, Amnesty International Director of Security with Human Rights Naureen Shah told Sputnik in an interview.

    • 100 Groups From Around the World to UN: Demand Accountability for CIA Torture

      This Friday, the world will mark International Day in Support of Victims of Torture. This day is commemorated every year to reaffirm the universal commitment to the total eradication of torture, which is categorically prohibited under international law.

    • US: Joint Appeal to Investigate Torture

      Human Rights Watch, the American Civil Liberties Union, and Amnesty International called on United States Attorney General Loretta Lynch in a June 23, 2015 letter to appoint a special prosecutor to investigate torture and other violations of US law in connection with the Central Intelligence Agency (CIA)’s detention and interrogation program. The letter was attached to petitions signed by 111,788 concerned individuals supporting appointment of a special prosecutor.

    • Rights groups call to probe CIA torture

      “If our laws have meaning, we can’t accept that some of our country’s most senior officials authorized criminal conduct and were never held accountable. Torture is a crime,” said Anthony Romero, executive director of the American Civil Liberties Union. “We know it happened. The Senate torture report documented it in excruciating detail. It’s up to Attorney General Lynch to uphold the laws of our land and ensure that a criminal investigation of the U.S. torture program is conducted.”

    • Remember the Time the CIA Bugged a Cat to Spy on the Soviets?

      My favorite story about American spying is one I’ve never been able to verify with the Central Intelligence Agency, and not for lack of trying.

      At the height of the Cold War, the story goes, officials in the United States hatched a covert plan to keep tabs on Russians in Washington, D.C. They would, they decided, deploy surveillance cats—yes, actual cats surgically implanted with microphones and radio transmitters—to slip by security and eavesdrop on activity at the Soviet Embassy. The project went by the thinly disguised code name “Acoustic Kitty.”

    • Healing and Hope for Torture Survivors

      It is also a day to stand up to prevent torture from occurring. For years, I have been advocating for New York State legislation to prevent health professionals from participating in the torture and mistreatment of detainees. We know from the release of the U.S. Senate Select Committee on Intelligence’s Summary that U.S. health professionals played a central role in the design and implementation of the CIA’s torture program, making this legislation timelier than ever.

    • Statement by the President on the International Day in Support of Victims of Torture
    • Minneapolis Rally Protests Government Torture

      A human rights organization hosted demonstrations in nine cities Friday to raise awareness about government torture, including a rally in Minneapolis.

      Amnesty International wants to pressure the Department of Justice to investigate and prosecute torture committed by people working in the name of the United States government.

      A spokesman for Amnesty International says the department’s stance on the Senate report on CIA torture is contradictory.

    • Amnesty blasts alleged torture tactics in protest
    • Letter from more than 100 groups to UN demanding accountability for US torture and other abuses

      Last December, the U.S. Senate Select Committee on Intelligence released the summary, findings and conclusions of its four-year investigation into the Detention and Interrogation

    • Group urging action on torture report

      They held signs in Raleigh on Friday stating: “Take a moral stand vs. torture,” “No to government secrecy,” “Like genocide & slavery, torture is always wrong,” and “North Carolina hosts CIA torture planes.”

    • Protesters want to put an end to torture

      Amnesty International is holding rallies across the nation, including Amherst, to shed light on a senate report on C-I-A torture.

      Thousands of people have been tortured all around the world. According to a senate report, the C-I-A is ALSO responsible for carrying out torture tactics.

    • Why is the CIA Being Let off the Hook on torture?

      More than 6 months ago, the Senate Intelligence Committee released the Executive Summary of its investigation into CIA torture practices during the Bush Presidency. The process of producing the report itself was highly controversial with the CIA doing everything in its power to stymie the investigation, including spying on Senate members of the committee.

      The actual report itself remains classified but there is now enough information in the public that questions are arising about why there has been no legal action taken. If the CIA has been documented as having tortured detainees captured during the so-called War on Terror in the report, then why has the Obama Administration and its Justice Department, not built on the Senate report? That question troubled human rights organizations so much that several of them signed onto a letter this week calling on Attorney General Loretta Lynch to conduct a truly independent investigation and push for accountability for what was done.

    • CIA Torture Report, Cost of War, and Ecuador Protests
    • How CIA torture goes unpunished

      Soon after I was tortured, in the late 1970s, I joined a worldwide Amnesty International campaign against torture premised on the notion that, with a consistent, determined effort by democratic governments and international organizations supported by common men and women across borders, torture could be abolished in our time just as the African slave trade had been abolished a century earlier.We have come far. Today, laws against torture are in place almost everywhere.

  • Internet/Net Neutrality

    • ISPs do throttle traffic — and the FCC can’t stop it

      Lots of attention was paid this week to a study showing that major ISPs are throttling traffic. At first glance, it seems a clear test case for the FCC’s Net neutrality rules, which prohibit blocking, throttling, or creating special “fast lanes” for content. The problem is, this is not the throttling you’re looking for, Obi-Wan.

      The new rules went into effect a fortnight ago, and aside from scattered accounts of consumers who wrangled price breaks from their cable companies after filing complaints with the FCC about unfair billing practices, and news that Sprint stopped slowing traffic for customers who use a lot of data, very little has changed for Internet users — or is likely to anytime soon.

    • Internet access “not a necessity or human right,” says FCC Republican

      Federal Communications Commission member Michael O’Rielly yesterday argued that “Internet access is not a necessity or human right” and called this one of the most important “principles for regulators to consider as it relates to the Internet and our broadband economy.”

  • Intellectual Monopolies

    • Copyrights

      • Canada Saves Public From Public Domain, Extends Copyright On Sound Recordings Another 20 Years

        Lest it be left behind by other countries bullied into submission by US trade agreements, the Canadian government has now expanded copyright terms for recording artists from 50 years to 70 years. (It was previously passed, but has now received the Official Royal Assent.) While not as obnoxiously long as the terms afforded to songwriters (life plus 50 years… which will probably be life plus 70 before too long…), it’s still a needless expansion that does little for living artists while carving another 20-year hole in the public domain.

06.26.15

Links 27/6/2015: Wine 1.7.46, SparkyLinux 4.0

Posted in News Roundup at 7:34 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Coreboot Adds Intel Braswell SoC Support
  • OSI Welcomes Summer Interns

    Recognizing successful open source projects need a variety of “developers” to create everything from code to community, the OSI Internship Program seeks participants from across academic disciplines–Business, Communications, Sociology, Informatics, and of course Computer Science to name a few–the program seeks to provide real life experiences common across open source projects and the communities that support them, giving students first hand experiences as well as opportunities to work with some of the most influential projects and people in open source software and the technology sector.

  • Events

  • Web Browsers

  • SaaS/Big Data

    • BlueData Massages Data for Hadoop and Spark to Leverage

      BlueData Software Inc., an infrastructure startup focused on Big Data, is working on solutions to the problem. The company recently announced that it is adding support for Docker containers on its BlueData EPIC platform. BlueData was founded by VMware veterans, and is focused on making Hadoop and Spark easy to deploy in a lightweight container environment.

  • BSD

    • Open Source History: Why Didn’t BSD Beat Out GNU and Linux?

      If you use a free and open source operating system, it’s almost certainly based on the Linux kernel and GNU software. But these were not the first freely redistributable platforms, nor were they the most professional or widely commercialized. The Berkeley Software Distribution, or BSD, beat GNU/Linux on all of these counts. So why has BSD been consigned to the margins of the open source ecosystem, while GNU/Linux distributions rose to fantastic prominence? Read on for some historical perspective.

    • out with the old, in with the less

      Notes and thoughts on various OpenBSD replacements and reductions. Existing functionality and programs are frequently rewritten and replaced for the sake of simplicity or security or whatever it is that OpenBSD is all about. This process has been going on for some time, of course, but some recent activity is worth highlighting.

  • Project Releases

    • Oz 0.14.0 Release

      Oz is a program for doing automated installation of guest operating systems with limited input from the user.

  • Public Services/Government

    • Why the government needs to renew its public commitment to open source software

      The government has played an important role as champion of open source in the public sector and this has been essential to the great progress that has been made to date. As the new government lays out its strategy, it should publicly reaffirm its commitment to open source software. This will add impetus to those in the public sector considering open source if the government acknowledges its value in relation to its agile vision.

    • NRO jumps on open source bandwagon

      Given the growing need for advanced databases with multiple levels of security to store geospatial intelligence, NRO contractor Lockheed Martin along with partners like Red Hat and Crunchy Data Solutions rolled out an open source relational database at a geospatial intelligence symposium in Washington this week that is billed as supporting multilevel security.

  • Openness/Sharing

    • Open Hardware

      • Introducing Felfil: An Italian Open Source 3D Printing Filament Extruder

        It’s an open source project designed for home use, and Felfil is an extruder for plastic 3D printing filament, designed by a team of young makers from the Politecnico of Turin.

        They say the device was built in answer to a desire by users of 3D printers to produce their own plastic filament. It’s all about reducing the cost of printing, saving on materials, and being able to experience the potential of 3D printing.

  • Programming

    • Google creates cloud code cache

      With an uncharacteristic lack of fanfare, Google has decided to hang around the kitchen at the code repository party.

    • 6 time-consuming tasks you can automate with code

      Literacy used to be the domain of scribes and priests. Then the world became more complicated and demanded that everyone read and write. Computing is also a form of literacy, but having it only understood by a priesthood of programmers is not going to be enough for our complex, online world. “Learn to code” has become a mantra for education at all ages. But after clearing away the hype, why do people need to learn to code? What does it get us exactly?

      Not everyone needs to become a software engineer, but almost every office worker uses a laptop as a daily tool. Computers are such a huge productivity booster because they support a large market of programs and apps designed for these workers. But commercial and open source software have a “last mile” problem: that they don’t automate every conceivable task. There are still computing chores that require a lot of repetitive (and fairly mindless) typing and clicking. Even if you have an intern to push these tasks on, they’re tasks that require a human because there’s no software to automate it. These tasks are too small-scale or specific to your organization’s workflow for it to be economical for a software company to create a custom solution.

    • libnice is now mirrored on GitHub

      libnice, everyone’s favourite ICE networking library, is now mirrored on GitHub (and GitLab), to make contributing to it easier — just submit a pull request. The canonical git repository is still on freedesktop.org.

Leftovers

  • Security

  • Defence/Police/Secrecy/Aggression

    • Terror Attacks in France, Kuwait and Tunisia

      Friday’s attacks in France, Tunisia and Kuwait came at roughly the same time, and days after the Islamic State terror group called for such operations during the Muslim holy month of Ramadan. But there was no immediate indication that they had been coordinated.

  • Privacy

    • Hated Care.data scheme now ‘unachievable’, howls UK.gov watchdog

      The hated Care.data programme is one of four government IT projects progressing so poorly its delivery has been deemed “unachievable”, according to a government watchdog report.

      The scheme has been flagged with the highest “red” risk rating by the Major Projects Authority, along with the NHS choices website, the Health and Social Care Network, and the Ministry of Justice’s National Offender Management Services ICT programme.

      The scheme has encountered serious delays, following an outcry from the public who largely objected to the idea of their personal information being shared with world+dog without their consent.

      So far, 700,000 individuals have requested to opt out of having their data shared with third parties. However, concerns have been raised that the Health and Social Care Information Centre has been unable to implement those objections.

    • Yet Another Leaker — with the NSA’s French Intercepts

      Wikileaks has published some NSA SIGINT documents describing intercepted French government communications. This seems not be from the Snowden documents. It could be one of the other NSA leakers, or it could be someone else entirely.

      As leaks go, this isn’t much. As I’ve said before, spying on foreign leaders is the kind of thing we want the NSA to do. I’m sure French Intelligence does the same to us.

  • Internet/Net Neutrality

    • Europe: The Next Front in the Battle for Net Neutrality

      Americans won big on net neutrality in February, when the FCC voted to adopt new rules that would allow it to rein in the abusive and discriminatory practices of big telecommunications operators, such as blocking or throttling of Internet data, and charging content providers for access to an Internet “fast lane.”

  • Intellectual Monopolies

    • Copyrights

      • Freedom of panorama: what is going on at the EU level?

        It is the so called freedom of panorama, which of course has its roots in a beloved piece of EU legislation, the InfoSoc Directive, more specifically its Article 5(3(h). This provision allows Member States to introduce into their own national copyright laws an exception to the rights of reproduction, communication/making available to the public and distribution to allow “use of works, such as works of architecture or sculpture, made to be located permanently in public places”.

Links 26/6/2015: Ardour 4.1, GNOME 3.17.3 Released

Posted in News Roundup at 6:03 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • BMW: ‘Our competitor is not Audi, Jaguar Land Rover or Mercedes but consumer electronics players’

    BMW is bringing software back in-house so it can deliver seamless digital experiences for its customers – something more valued than horsepower or engines in today’s market, its digital business models lead said.

  • Science

    • 10 Reasons Tape Backup Remains Important to the Enterprise

      Digital tape is about the hardest-to-kill storage IT there is, unless you count carving out data onto rocks, the way it was done hundreds of thousands of years ago. Tape technology celebrated its 63rd birthday on May 21; IBM first made available its IBM 726 Magnetic tape reader/recorder in 1952. Strangely, unlike later IBM tape drives, the original 726 could read tape backward and forward. Tape has managed to get better with age. When tape first went to market, the media itself weighed 935 pounds and held 2.3MB of data. In 2015, that much tape weighs closer to 12 pounds, and 2.3MB would comprise one large photo or a short pop song. Tape storage densities are broken regularly; IBM’s tape team recently demonstrated an areal recording density of 123 billion bits of uncompressed data per square inch on low-cost, particulate magnetic tape. The breakthrough represents the equivalent of a 220TB tape cartridge that could fit in the palm of your hand. Companies such as Iron Mountain, Spectra Logic, IBM and others maintain large installed bases of tape storage around the world. Here are some key facts about tape storage.

  • Security

  • Defence/Police/Secrecy/Aggression

    • Charleston Massacre Media Coverage: Recognizing the Crime, Downplaying the Causes

      When a white male kills people in a mass shooting in the US, the corporate media follow an algorithm not unlike the Kübler-Ross model of the five stages of grief.

      First, media deny that the attack constitutes terrorism. In their view, acts of political violence carried out against civilians are indisputably terrorism when they are committed by a Muslim, but this is not necessarily the case when they are committed by a white person.

      This is the stage in which most media coverage of shootings by white Americans remains stuck. When Elliot Rodger massacred six people and injured 14 more in May 2014, he was not classified as a terrorist–even though he explicitly stated that his attack was motivated by an intense hatred of women, and that he sought to “punish” women, collectively, for “rejecting” him in the past.

      Yet because of mounting pressure and criticism from independent media, activists and social media, in the wake of mass shooting after mass shooting carried out disproportionately by white men, corporate media are no longer able to remain in a state of such denial.

    • That Most Terrorists Aren’t Muslim May ‘Come as a Surprise’–if You Get Your News From Corporate Media

      The “surprise” is that more people are killed by “white supremacists, antigovernment fanatics and other non-Muslim extremists than by radical Muslims”: 48 vs. 26 since 9/11, according to a study by the New America Foundation. (More comprehensive studies cited in a recent New York Times op-ed–6/16/15–show an even greater gap, with 254 killed in far-right violence since 9/11, according to West Point’s Combating Terrorism Center, compared to 50 killed in jihadist-related terrorism.)

      The Times suggests that “such numbers are new to the public”–but they won’t come as much of a surprise to those familiar with FAIR’s work. In articles like “More Terror, Less Coverage” (Extra!, 5/11) and “A Media Microscope on Islam-Linked Violence” (Extra!, 8/13), FAIR’s Steve Rendall has debunked the claim that terrorism is mostly or exclusively a Muslim phenomenon, pointing out that white, right-wing Christians are responsible for the bulk of political violence in the United States.

  • Transparency Reporting

    • With Its French NSA Leak, WikiLeaks Is Back

      Classified documents appear on WikiLeaks.org, revealing that the American government is spying on its allies. American officials rush to deal with a sudden diplomatic crisis while publicly refusing to comment on leaked materials. And WikiLeaks proclaims that it’s just getting started.

  • Environment/Energy/Wildlife

    • What’s Killing the Babies of Vernal, Utah?

      Every night, Donna Young goes to bed with her pistol, a .45 Taurus Judge with laser attachment. Last fall, she says, someone stole onto her ranch to poison her livestock, or tried to; happily, her son found the d-CON wrapper and dumped all the feed from the troughs. Strangers phoned the house to wish her dead or run out of town on a rail. Local nurses and doctors went them one better, she says, warning pregnant women that Young’s incompetence had killed babies and would surely kill theirs too, if given the chance.

      [...]

      Then there’s pollution of the eight-wheeled sort: untold truck trips to service each fracking site. Per a recent report from Colorado, it takes 1,400 truck trips just to frack a well — and many hundreds more to haul the wastewater away and dump it into evaporation ponds. That’s a lot of diesel soot per cubic foot of gas, all in the name of a “cleaner-burning” fuel, which is how the industry is labeling natural gas.

  • Finance

    • Unregulated Capitalism Is Destroying the Planet

      We are in the middle of the first great mass extinction since the end of the age of the dinosaurs.

      That’s the conclusion of a shocking new study published Friday in a journal called Science Advances.

      The study, which was conducted by a group of scientists from some of the United States’ leading universities, found that over the past century-plus, vertebrate species have gone extinct at a rate almost 114 times faster than average.

      See more news and opinion from Thom Hartmann at Truthout here.

      That’s right – not one, not two, not 50, but 114 times faster than average!

      The study also found that as many 477 different vertebrate species have disappeared since 1900, a mind-boggling statistic because it usually takes between 800 to 10,000 years for that many species to disappear.

    • The Senate Passes Fast Track—But We Can Still Prevent the TPP Train Wreck

      The U.S. Senate has paved the way for the passage of Fast Track legislation, to give the White House and the U.S. Trade Representative almost unilateral power to negotiate and finalize secret anti-user trade deals like the Trans-Pacific Partnership (TPP). Yesterday a “cloture” vote was held—this was a vote to end debate on Fast Track and break any possibility for a filibuster, and it passed by the minimum votes needed—60 to 37. Today, the Senate voted to pass the legislation itself. TPP proponents only needed 51 votes, a simple majority, to actually pass the bill, and they got it in a 60 to 38 vote. Following months and months of campaigning, Congress has ultimately caved to corporate demands to hand away its own constitutional mandate over trade, and the President is expected to the sign the bill into law as early as tonight or later this week.

    • Senate approves fast-track, sending trade bill to White House

      he Senate voted Wednesday to approve fast-track authority, securing a big second-term legislative win for President Obama after a months-long struggle.

      The 60-38 Senate vote capped weeks of fighting over the trade bill, which pitted Obama against most of his party — including Senate Democratic Leader Harry Reid (Nev.) and House Minority Leader Nancy Pelosi (D-Calif.).

      Passage of the bill is also a big victory for GOP leaders in Congress, including Senate Majority Leader Mitch McConnell (R-Ky.) and Speaker John Boehner (R-Ohio). The Republican leaders worked closely with an administration they have more frequently opposed to nudge the trade bill over the goal line.

    • Network Rail upgrade delayed by government

      The government says it will delay or cut back a number of modernisation projects planned for Network Rail.

      Transport Secretary Patrick McLoughlin says rising costs and missed targets make the £38.5bn plan untenable.

      He blamed Network Rail, saying it should have foreseen the improvements would cost more and take longer.

      Labour said it had warned the government needed to change how the railways were run but had “dithered” over taking action.

      Network Rail said the plan, which was launched last year as the “largest modernisation of the railways since Victorian times”, was too ambitious.

      Network Rail controls 2,500 stations as well as tracks, tunnels and level crossings.

    • Why Catholic Americans are rejecting the Pope: They worship the free market now

      Pope Francis’ much-anticipated climate change encyclical, released last week, is every bit as strong as environmentalists and other proponents of dramatic action on climate change had hoped. The pontiff affirms the scientific consensus that climate change is largely the result of human activity, calls for “urgent action” to develop renewable energy alternatives, and slams global development paradigms that create an “ecological debt” between the Global South and the wealthier North.

      Many are predicting that the encyclical will be a game changer that will mobilize religious groups and galvanize lagging western nations, particularly the United States, to address climate change. And the encyclical will undoubtedly give the cause a huge moral push, especially at the upcoming international climate negotiations. But there are ominous warning signs already that a significant percentage of American Catholics — the very faith constituency that should be most receptive to the pope’s message — may turn a deaf ear to Francis. This means that not only are they unlikely to give up their SUVs, but also to support policies to address climate change or the candidates that back them.

    • Divide-and-Conquer Walker Thinks Equal Pay Is Divisive

      Scott Walker is taking heat for claiming that supporting equal pay for women “pit[s] one group of Americans versus another.”

      Here in Wisconsin, howls of laughter could be heard echoing through the marble walls of the state capitol: after all, this is a governor whose divisive approach has helped make his state one of the most bitterly polarized in the country.

  • PR/AstroTurf/Lobbying

    • Federal Documents Debunk Baltimore ‘Gang Threat’ Narrative

      This fact—that there are always young kids at Mondawmin (it’s a major transportation hub, and the only way thousands of kids can get home)—is erased entirely from the equation. The use of the term “juveniles” is meant to prejudice the reader and criminalize otherwise legal and peaceful assembly. From the beginning of the Baltimore Uprising, in other words, it’s been evident the Baltimore Police Department was far more interested in manipulating the press and hyping the threat than they were protecting First Amendment activity and people’s property.

  • Censorship

  • Privacy

    • Dropbox Is Struggling and Competitors Are Catching Up

      Dropbox made itself a household name by giving away cloud storage. The eight-year-old company, valued at $10 billion, had 300 million registered users a year ago; now it’s got 400 million. Its two-year-old effort to make money from business users has been less impressive. While Dropbox led the $904 million global market for business file-sharing last year with about a 24 percent share, No. 2 Box and No. 3 Microsoft each took about 21 percent and doubled their slice of the pie, growing almost twice as fast, according to researcher IDC.

    • The NSA, Windows & Antivirus

      Poor Microsoft. The beleaguered company just can’t catch a break. We’ve already told you about how Snowden’s revelations have forced the pride of Redmond to spend who knows how many millions opening two “transparency centers” to allow government IT experts to pore through source code to prove there’s no back doors baked into Windows or other Microsoft products. Trouble is, while its engineers have been busy plastering over all traces of old back doors, they’ve left a side door standing wide open, waiting to be exploited.

      [...]

      The spooks have been reverse engineering. They’ve been dismantling Karpersky’s software, searching for weaknesses. They’ve been mining sensitive data by monitoring the email chatter between Kaspersky client and server software. In other words, while IT security folks outside the U.S. have been keeping a wary eye on their Windows servers while trusting their antivirus to be a tool to help them secure the unsecurable…well, their antivirus software has been being a Trojan in the truly Homeric sense of the word.

      [...]

      In the meantime, Windows becomes less safe by the minute for corporations and governments hoping to keep private data private. I’m certain that Red Hat, SUSE, and even Ubuntu are taking advantage.

    • Norway needs more digital border surveillance, spy agency says
    • Commission proposal on new data protection rules to boost EU Digital Single Market supported by Justice Ministers

      On the 16 of June, Ministers in the Justice Council have sealed a general approach on the Commission proposal on the Data Protection Regulation. Modern, harmonised data protection rules will contribute to making Europe fit for the digital age and are a step forward to the EU Digital Single Market. Trilogue negotiations with the Parliament and the Council will start in June; the shared ambition is to reach a final agreement by the end of 2015.

    • French Surveillance Bill: LQDN Files an Amicus Brief to the Constitutional Court

      La Quadrature du Net, French Data Network and the FDN Federation are publishing an essay to accompany their legal action before the French Constitutional Court against the French Surveillance Bill. The three associations, opposed to the French Surveillance Bill since its introduction in the Council of Ministers on 19 March, continue their mobilisation against this unjust law, in spite of its adoption in the National Assembly1 and the Senate2. Citizens are invited to support this approach by sharing and commenting on this essay by Thursday 7am to bring their thoughts or suggestions for improvement before sending it to the Constitutional Council.

    • Secure Server Deployments in Hostile Territory

      Would you change what you said on the phone, if you knew someone malicious was listening? Whether or not you view the NSA as malicious, I imagine that after reading the NSA coverage on Linux Journal, some of you found yourselves modifying your behavior. The same thing happened to me when I started deploying servers into a public cloud (EC2 in my case).

      Although I always have tried to build secure environments, EC2 presents a number of additional challenges both to your fault-tolerance systems and your overall security. Deploying a server on EC2 is like dropping it out of a helicopter behind enemy lines without so much as an IP address.

      In this article, I discuss some of the techniques I use to secure servers when they are in hostile territory. Although some of these techniques are specific to EC2, most are adaptable to just about any environment.

  • Civil Rights

    • France proposes empty ISDS reforms

      The French proposal would grant for-profit arbitrators, working in a system that creates perverse incentives, vast discretionary powers. This creates a serious risk on expansionist interpretations. Foreign investors would be able to use this biased system to challenge governments. As it is practically impossible to withdraw from trade agreements, the EU would be locked in.

  • Internet/Net Neutrality

    • BT aims to shut down traditional phone network to help it battle US tech giants

      BT is calling on the communications watchdog to let it scrap the traditional telephone network, as part of a campaign to loosen regulations that it says will help telecoms companies compete better with US internet companies such as Apple and Facebook.

      The telecoms giant is planning to move all domestic and business customers to internet-based voice calls within a decade, but under current Ofcom rules must continue to provide a traditional phone service.

    • Major internet providers slowing traffic speeds for thousands across US

      Study finds significant degradations of networks for five largest ISPs, including AT&T and Time Warner, representing 75% of all wireline households in US

  • Intellectual Monopolies

    • Copyrights

      • Cox Wants Rightscorp’s Piracy Tracking Source Code

        Cox Communications, one of the largest Internet providers in the United States, has asked the court to order anti-piracy firm Rightscorp to hand over its tracking source code. The ISP describes the company’s settlement scheme as extortion and hopes to punch a hole in its evidence gathering techniques.

06.24.15

Links 25/6/2015: Docker Focus, NVIDIA Opening Slightly

Posted in News Roundup at 6:27 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Different Types of Open Source End Users

    The use of open source software has become more and more commonplace as the technological world advances. It powers millions of devices many of which we depend on every single day. In fact this very web page you are reading this post on is powered by bits of open source code.

    Software would be useless if there were not people there to use it and there are many different types of people who use open source software every day.

  • Arno, the first open source platform for NFV

    The OPNFV Project, a carrier-grade, integrated, open source platform for accelerating the introduction of new Network Functions Virtualization (NFV) products and services. We recently issued our first community-led software release, OPNFV Arno. This foundational release is intended for anyone exploring NFV deployments, developing Virtual Network Functions (VNF) applications, or interested in NFV performance and use case-based testing. With developers in mind, Arno provides an initial build of the NFV Infrastructure (NFVI) and Virtual Infrastructure Manager (VIM) components of the ETSI NFV architecture.

  • Facebook open-sources Nuclide source code for Atom
  • Facebook Open Sources Nuclide, the Company’s Internal Code Editor
  • Facebook Nuclide Is Now Open Source
  • Facebook open-sources IDE based on GitHub Atom

    Facebook has begun opening up source code for its Nuclide IDE, which is designed to offer a unified experience for Web and native mobile development.

  • Events

  • SaaS/Big Data

    • OpenStack Cinder: Block storage on the open-source cloud platform

      The OpenStack platform is an open-source collaboration to develop a private cloud ecosystem, delivering IT services at web scale.

      OpenStack is divided into a number of discrete projects, each with a code name with parallels to the purpose of the project itself.

  • Education

    • 8 open source platforms for IT consideration

      Usually, the higher-ed industry has a reputation as being one of the slowest adopters of new technology. But when it comes to open source software (OSS), campus IT departments are ahead of other industry and consumer tech adoption curves, says Scott Wilson, service manager of OSS Watch at the University of Oxford.

      “On the face of it, higher education has been relatively quick to realize the benefits, notes Wilson. “Over 50 percent of higher education institutions use open source, both on the server and on the desktop. And one of the great open source success stories in higher education is the Moodle Virtual Learning Environment (VLE).”

  • Funding

    • Massive open source email & collaboration platform Roundcube beats Indiegogo funding goal

      Simply put, Roundcube is the unsung work horse of web mail.

      But a decade is an eternity in technology. When Roundcube started, mobile devices were large, clunky affairs used by the few. Today they are the most commonly used communication device. Roundcube Next is today’s answer to that radical change. Instead of once more embarking alone on that ten year journey, Roundcube Next is about building a strong, healthy and diverse Open Source community to achieve that task within 12 to 18 months.

Leftovers

  • [OT] Manchester Storm reform and replace Hull in Elite League

    Manchester Storm are to reform and make a return to ice hockey’s Elite League next season.

    The will replace Hull Stingrays in the league following their liquidation.

  • No joke: Iceland’s Pirate Party surges into first place in the polls

    Iceland has long been one of the more right-leaning Nordic countries. In contrast to Denmark, Finland, Norway, and Sweden, which all have a long tradition of electing Social Democratic governments, Iceland’s parliament has been dominated by right-of-center parties for all but four years since World War II. The only break in that streak came in 2009, when the left won for the first time ever—and elected the world’s first openly gay head of state. The unusual result came about because the global financial meltdown hit Iceland with particular ferocity, but tradition seemingly reasserted itself four years later when the right-leaning Independence and Progressive parties regained power in a landslide.

  • Defence/Police/Secrecy/Aggression

    • GCHQ documents raise fresh questions over UK complicity in US drone strikes

      British intelligence agency GCHQ is facing fresh calls to reveal the extent of its involvement in the US targeted killing programme after details of a fatal drone strike in Yemen were included in a top secret memo circulated to agency staff.

      A leading barrister asked by the Guardian to review a number of classified GCHQ documents said they raised questions about British complicity in US strikes outside recognised war zones and demonstrated the need for the government to come clean about the UK’s role.

      The documents, provided to the Guardian by NSA whistleblower Edward Snowden and reported in partnership with the New York Times, discuss how a joint US, UK and Australian programme codenamed Overhead supported the strike in Yemen in 2012.

      The files also show GCHQ and Overhead developed their ability to track the location of individuals – essential for the targeted killing programme – in both Yemen and Pakistan. The legality of the US’s lethal operations in both countries has been questioned by international lawyers and human rights groups.

    • WaPo: Don’t Say ‘Terrorist’ About ‘White People Like Ourselves’

      Corporate media are demonstrably reluctant to use the word “terrorist” with regards to Charleston shooting suspect Dylann Roof–even though the massacre would seem to meet the legal definition of terrorism, as violent crimes that “appear to be intended…to intimidate or coerce a civilian population.”

      Generally, news outlets don’t explain why they aren’t calling Roof a terrorist suspect; they just rarely use the word. But the Washington Post‘s Philip Bump gave it a shot in a piece headlined “Why We Shouldn’t Call Dylann Roof a Terrorist” (6/19/15), and his rationale is worth taking a look at.

    • How One Outlet Covered the Charleston Massacre Right

      Yet there was at least one news item that ran the day after the shooting that was not afraid to refer to it as a terrorist attack: “US State Senator Killed by Terrorist With White Supremacist Sympathies, 8 Others Dead,” reads the headline of a news item that appeared on Sahara Reporters, a New York City-based news website that primarily covers government corruption in Africa, with a particular focus on Nigeria.

      The Sahara Reporters piece uses the word “terrorist” six times to describe Roof and his alleged action, including in the headline, the subhead and a photo caption. The words “mental illness,” “troubled” and “loner” do not appear — in fact, no speculation whatsoever is made regarding Roof’s mental state or stability. Instead, South Carolina’s “known hate groups” are mentioned to provide context for Roof’s alleged actions, and Roof’s white supremacist activities and the historic allusions made by the patches on his jacket are front and center in the piece. And the massacre is clearly contextualized as occurring at “a time where the persecution of black ethnic minorities in the United States has been making world headlines.”

    • For Media Factcheckers, It’s ‘Mostly False’ to Say Mass Violence Is More Frequent in US

      In theory, factchecking is one of the most important functions of journalism. In practice, systematic efforts by corporate media to “factcheck” political statements are often worse than useless.

      Take PolitiFact, a project of the Tampa Bay Tribune, and its recent offering “Is Barack Obama Correct That Mass Killings Don’t Happen in Other Countries?”

  • Environment/Energy/Wildlife

    • Netherlands loses landmark global warming case, ordered to cut emissions

      In a landmark case that may set a very important precedent for other countries around the world, especially within Europe, the Dutch government has been ordered by the courts to cut greenhouse gas emissions by 25 percent.

      The ruling came from a class-action lawsuit that was brought before the Dutch courts by Urgenda in 2012. The case, rather magnificently, was based on human rights laws. Specifically, Urgenda asked the courts to “declare that global warming of more than 2 degrees Celsius will lead to a violation of fundamental human rights worldwide,” and that the Dutch government is “acting unlawfully by not contributing its proportional share to preventing a global warming of more than 2 degrees Celsius.”

    • Royal Navy bomb explosions caused mass whale deaths, report concludes

      Four large bombs exploded underwater by the Royal Navy were to blame for a mass stranding which killed 19 pilot whales on the north coast of Scotland in 2011, government scientists have concluded.

      A long-delayed report released on Wednesday by the Department for Environment Food and Rural Affairs says that the noise from the explosions could have damaged the hearing and navigational abilities of the whales, causing them to beach and die.

  • Finance

  • PR/AstroTurf/Lobbying

    • Coalitions of the willing are latest lobbying trend

      The single-minded groups are popping up on all manner of issues, including to lobby on rules regulating commercial drones that weigh less than 55 pounds, to rewrite the nation’s patent laws and to engage in the big legislative fight over the Export-Import Bank.

      Coalitions offer lobbyists a big advantage by allowing firms to collect combined fees from a number of corporations and interest groups that may not otherwise engage on an issue. For instance, a company may not consider an issue pressing enough on which to spend hundreds of thousands of dollars, but the idea of spending a few thousand dollars — that’s then combined with similarly smaller fees from other coalition members — is more enticing.

    • Scott Walker’s Unprecedented Voucher Expansion

      In crafting the budget, Walker is taking his cues from the American Federation for Children (AFC), a major force for school privatization nationwide. It is funded and chaired by billionaire Betsy DeVos, and pushes its privatization agenda in the states with high-dollar lobbying and attack ads.

  • Censorship

    • Australia’s own Immortan Joe turns off the water, I mean, Internet

      In the documentary Mad Max: Fury Road, we learned how Australia is controlled by a psychotic strongman who believes in traditional gender roles, strict limits on immigration, and social control through imposed scarcity. This is why Tony Abbott, current Prime Minister of Australia, announced his new Internet censorship plan by warning Aussies, “Do not, my friends, become addicted to the Web.”

  • Privacy

    • Is the Council Selling Our Personal Data to Private Companies?

      Finally, no measures were agreed on on the anonymisation of data. Only the pseudonymisation is considered, which is totally insufficient to preserve the anonymity of a person. Pseudonymisation within the processing of personal data is not protection at all and is only another gift for private companies which will allow them to work, with complete impunity, on data whose the origin can be easily found. This gift is re-enforced by the will to authorise profiling person with their explicit agreement. Such an authorisation is necessary but insufficient if there is not a strict framework on the finalities of the profiling. The absence of a regulation of the issue of Safe Harbor in spite of the adoption of the Moraes 2014 report is making the breaches in the protection of personal data every time wider.

    • France in the Era of Mass Surveillance! We must resist!

      It’s a sad day for freedom! French representatives just adopted the French Surveillance Law. As an ironic echo to the recent WikiLeaks revelations about NSA spying on French political authorities, this vote calls for a new type of resistance for citizens.

    • François Hollande holds emergency meeting after WikiLeaks claims US spied on three French presidents

      The French president, François Hollande, is holding an emergency meeting of his country’s defence council after claims that American agents spied on three successive French presidents between 2006 and 2012. According to WikiLeaks documents published late on Tuesday, even the French leaders’ mobile phone conversations were listened to and recorded.

      The leaked US documents, marked “top secret”, were based on phone taps and filed in an NSA document labelled “Espionnage Elysée” (Elysée Spy), according to the newspaper Libération and investigative news website Mediapart. The US was listening to the conversations of centre-right president Jacques Chirac, his successor Nicolas Sarkozy, and the current French leader, Socialist François Hollande, elected in 2012.

    • French president holds emergency meeting over NSA intercepts
    • Revealed: how US tapped phones of three French presidents

      The United States has eavesdropped on at least three French presidents and a whole raft of senior officials and politicians in France for at least six years, according to secret documents obtained by WikiLeaks and revealed here by Mediapart. The top secret reports from America’s National Security Agency (NSA) show that the phones of presidents François Hollande, Nicolas Sarkozy and Jacques Chirac were all tapped. But they also show that the espionage carried out on a supposedly key ally of Washington’s went even further and deeper, and that senior diplomats, top civil servants and politicians also routinely had their phones tapped. The documents seen by Mediapart reveal proof of the spying on the French state that took place from 2006 to 2012 but there is no reason to suggest that this espionage did not start before 2006 and has not continued since. The revelations are certain to spark a major diplomatic row and highlight once again the uncontrolled and aggressive nature of American spying on friends and foes alike, as first revealed by NSA whistleblower Edward Snowden in 2013. Mediapart’s Fabrice Arfi and Jérôme Hourdeaux and Julian Assange of WikiLeaks report.

    • Espionnage Élysée

      Today, 23 June 2015, WikiLeaks began publishing “Espionnage Élysée”, a collection of TOP SECRET intelligence reports and technical documents from the US National Security Agency (NSA) concerning targeting and signals intelligence intercepts of the communications of high-level officials from successive French governments over the last ten years.

    • French president: Obama promises to stop US spying tactics

      Hollande said in a statement that the two spoke by telephone Wednesday after the release of WikiLeaks documents about NSA intercepts of conversations involving Hollande and his two predecessors between 2006 and 2012.

    • US embassy in Paris is ‘home to secret spy nest’

      Reports in France suggest the US spied on French presidents from a secret spy nest on the roof of its embassy in Paris, which stands just a stone’s throw from the Elysée palace.

    • The NSA, and America’s madness

      It’s hard to pretend to be surprised. Since Edward Snowden revealed, in June 2013, the planetary scope of the electronic surveillance and data collection programs carried out by American intelligence agencies, we have gone from surprise to surprise. We discovered, amongst other things, that this mass surveillance went as far as eavesdropping on the German chancellor’s phone conversations. It also enabled Airbus to be spied on by the German secret services on behalf of the American agencies. Nothing, therefore, should surprise us any more. Sooner or later, we were bound to have a confirmation that the French presidents and top-ranking officials were also spied on by the United States. We now have the proof, according to the WikiLeaks documents published, on June 23rd, by the French daily newspaper Libération and and the Mediapart investigative website

      Knowing is one thing, accepting is another. Such practices are obviously unacceptable! Nevertheless, we must not be naive. Intelligence is a crucial tool in the struggle against terrorism. The French parliament has recently approved a far ranging bill to reinforce its interception capabilities. Some provisions of the text have been vividly criticised by civil liberties campaigners, who point out French intelligence services could use them to bypass the right to privacy of French citizens – and even more so, the right to privacy of foreign nationals. In this fight, intelligence services across Europe do need to cooperate with the US, and they have to be able to keep doing so… But only within the framework of the law.

    • Obama reassures France after ‘unacceptable’ NSA spying

      U.S. President Barack Obama reaffirmed in a phone call with his French counterpart Francois Hollande on Wednesday Washington’s commitment to end spying practices deemed “unacceptable” by its allies.

      The presidents’ conversation, announced by Hollande’s office, came after transparency lobby group WikiLeaks revealed on Tuesday that U.S. National Security Agency (NSA) had spied on the last three French presidents.

    • Uniquely Nasty: J. Edgar Hoover’s war on gays

      The directive was stern and uncompromising. In the depths of the Cold War, then-FBI Director J. Edgar Hoover ordered his agents to undertake a new mission: Identify every gay and suspected gay working for the federal government.

      Only Hoover didn’t describe his targets as gays. He called them “sex deviates.”

    • GCHQ’s surveillance of two human rights groups ruled illegal by tribunal

      GCHQ’s covert surveillance of two international human rights groups was illegal, the judicial tribunal responsible for handling complaints against the intelligence services has ruled.

      The UK government monitoring agency retained emails for longer than it should have and violated its own internal procedures, according to a judgment by the investigatory powers tribunal (IPT). But it ruled that the initial interception was lawful in both cases.

    • Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law

      British spies have received government permission to intensively study software programs for ways to infiltrate and take control of computers. The GCHQ spy agency was vulnerable to legal action for the hacking efforts, known as “reverse engineering,” since such activity could have violated copyright law. But GCHQ sought and obtained a legally questionable warrant from the Foreign Secretary in an attempt to immunize itself from legal liability.

      GCHQ’s reverse engineering targeted a wide range of popular software products for compromise, including online bulletin board systems, commercial encryption software and anti-virus programs. Reverse engineering “is essential in order to be able to exploit such software and prevent detection of our activities,” the electronic spy agency said in a warrant renewal application.

    • GCHQ psychological operations squad targeted Britons for manipulation

      The once-secretive, now-notorious Joint Threat Research Intelligence Group ran its online propaganda and manipulation operations at home as well as abroad.

      JTRIG’s domestic operations used fake accounts to “deter,” “promote distrust” and “discredit” in political discussions on social media, uploaded fake book/magazine articles with “incorrect information,” hacked websites, set up ecommerce sites that were fraudulent operations designed to rip off their adversaries and so on. They relied on psychological research on inspiring “obedience” and “conformity” to inform their work.

    • Controversial GCHQ Unit Engaged in Domestic Law Enforcement, Online Propaganda, Psychology Research

      The spy unit responsible for some of the United Kingdom’s most controversial tactics of surveillance, online propaganda and deceit focuses extensively on traditional law enforcement and domestic activities — even though officials typically justify its activities by emphasizing foreign intelligence and counterterrorism operations.

      Documents published today by The Intercept demonstrate how the Joint Threat Research Intelligence Group (JTRIG), a unit of the signals intelligence agency Government Communications Headquarters (GCHQ), is involved in efforts against political groups it considers “extremist,” Islamist activity in schools, the drug trade, online fraud and financial scams.

    • DoJ’s Gag Order On Reason Has Been Lifted — But The Real Story Is More Outrageous Than We Thought

      Last Friday the folks at Reason confirmed what I suggested on Thursday — that the U.S. Attorney’s Office for the Southern District of New York, after hitting Reason with a federal grand jury subpoena to unmask anonymous hyperbolic commenters, secured a gag order that prevented them from writing about it.

      Nick Gillespie and Matt Welch describe how it all went down. Read it.

      So, the truth is out — and it’s more outrageous than you thought, even more outrageous than it appears at first glance.

      What, you might ask, could be more outrageous than the United States Department of Justice issuing a questionable subpoena targeting speech protected by the First Amendment, and then abusing the courts to prohibit journalists from writing about it?

      The answer lies in the everyday arrogance of unchecked power.

  • Civil Rights

  • Internet/Net Neutrality

    • Net Neutrality in Europe in danger

      Net neutrality is the principle that Internet Service Providers should treat all data on the Internet equally. It’s about minimising the restrictions on which parts of the Internet you can access. And it’s about allowing startups to compete with big Internet firms and supporting innovation in the digital economy.

    • Letter to S&D and ALDE MEPs: Stand Up for Net Neutrality

      Negotiations on Net Neutrality between the European Parliament, the European Commission and the Council of the European Union (trialogue) started on 11 March in order to settle an agreement on the final regulation. Political groups send few representatives to the trialogue but political groups do not necessarily adopt it and compromise with a text that does not respect main democratic values. Citizens shall urgently call all S&D and ALDE Members of European Parliament (MEPs), who are about to decide, in the next days, of their group positions, and urge them to resist against a text that would infringe fundamental rights and liberties of any European citizen. La Quadrature has sent MEPs the following letter.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts