EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

10.18.16

Links 18/10/2016: Release Candidate of Leap 42.2, Looking Ahead at GTK4

Posted in News Roundup at 11:03 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Best Linux Intranet Solutions

    There’s a lot of benefits to having your local communications within the confines of your office Intranet. When it comes to keeping content and communications local, there are a number of decent Linux Intranet friendly solutions to serve content to those on your network.

  • Server

    • The Ops Identity Crisis

      A big theme in the keynotes and conversation during Velocity Conf in NYC a few weeks ago was the role of ops in an “ops-less” and “server-less” world. It’s also been a big feature in discussions on twitter and in conversations I’ve had with coworkers and friends in the industry. There are several things that stand out to me in these conversations: first, that some ops engineers (sysadmins, techops, devops, and SREs) are worried that they will be phased out if developers and software engineers are responsible for the operational tasks in their systems; second, that developers and software engineers do not have the skills needed to take over responsibility for operational tasks; and third, that building reliable systems is impossible without an operations organization.

  • Kernel Space

    • Kernel 4.9 merge window highlights

      The 4.8 kernel was released on October 2nd. This also marked the start of the merge window for the 4.9 kernel. The merge window is the time period when kernel subsystem maintainers send their pull requests for new features to be included in the 4.9 kernel. Here are a few features pulled into the 4.9 kernel that might be of interest for Fedora users.

    • The Linux Foundation strives to unite open-source JavaScript community
    • The Linux Foundation Helps Launch the JS Foundation

      Today, the Linux Foundation announced the creation of a new entity named the JS Foundation that will serve as an umbrella project and guiding force for various open-source utilities at the heart of the JavaScript ecosystem.

      The JS Foundation’s primary mission is to help manage and fund projects, but also cultivate best practices in the JavaScript ecosystem.

  • Applications

  • Desktop Environments/WMs

  • Distributions

    • Clear Linux Now Riding On Linux 4.8.1, Ships AVX2-Optimized Python

      Intel’s Clear Linux open-source operating system continues advancing as one of the less heard of but highly performant rolling-release distributions for servers, cloud, containers, and other applications.

      Clear Linux Highlights #4 was published today to make known some of the latest improvements. Some of the recent packaging changes include landing GNOME 3.22 components, adding Wayland 1.12, introducing Apache Maven, and updates to various existing packages. Some of the notable updates are using Linux 4.8.1, systemd 231, Vim 8.0, Emacs 25.1, and Node.js 6.8.

    • OpenSUSE/SUSE

      • Linux Kernel 4.8 and KDE Plasma 5.8.1 Coming Soon to openSUSE Tumbleweed Users

        openSUSE Project’s Dominique Leuenberger informed the Tumbleweed community about the latest goodies that landed in the stable software repositories of the rolling release operating system during the past week.

        We’re talking here about the openSUSE Tumbleweed snapshots released during the week of October 10, 2016, which brought several interesting software components which might get users of the rolling OS excited. For example, you can now enjoy the latest KDE Plasma 5.8 LTS desktop environment.

      • First openSUSE Leap 42.2 Release Candidate Adds KDE Plasma 5.8.1, GNOME Updates

        Just a few minutes ago, openSUSE Project, through Douglas DeMaio, proudly announced the availability of the first Release Candidate (RC) version of the upcoming openSUSE Leap 42.2 operating system.

      • OpenSUSE Leap 42.2 Release Candidate Published
      • Release Candidate Available for openSUSE Leap 42.2

        The openSUSE Project is pleased to announce the availability of the openSUSE Leap 42.2 Release Candidate 1 (RC1).

        Since mid-May, the project has been guiding the development of the next openSUSE community release Leap 42.2, which will be released in 29 days. The release of RC1 completes the development process for openSUSE Leap 42.2 based on source code from SUSE Linux Enterprise (SLE) Service Pack (SP) 2.

    • Red Hat Family

      • Why enterprises are now opting for open source software

        In March this year, Red Hat became the world’s first open source software (OSS) solutions company to cross $2 billion in revenue. The term open source implies ‘free’ access to software which developers can modify. Not many thought Red Hat would be successful when the company was founded in 1993. However, it has proved its naysayers wrong with a $14.78 billion market cap (as on September 30), $600 million revenue in Q2 FY17 and entry into the Forbes list of the World’s Most Innovative Companies in 2016 for the fourth time. Jim Whitehurst, Red Hat’s president and CEO, and Rajesh Rege, its India MD, tell Forbes India why enterprises are now opting for open source software.

      • CentOS Linux Vagrant Boxes Gets September’s Updates and XFS File System Support

        CentOS maintainer Karanbir Singh announced the availability of updated Vagrant Box images for the CentOS Linux 7 and CentOS Linux 6 operating systems for the month of September 2016.

      • Using feedback loops for greater work satisfaction

        In August I wrote about using feedback loops in your personal life to get unstuck from unproductive habits. This month I’ll talk about some new helpful feedback loops for your workplace. I’m going to make this easy for you: Here are my top three, and they’re always good ones to start with.

      • Red Hat study shows virtualization will keep growing

        With the rise of exciting new technologies like containers, virtualization might sometimes seem like it’s old hat. But not according to Red Hat, whose latest research shows that enterprise adoption is still on the rise.

        In a new survey of over 900 enterprise information technology pros, Red Hat discovered that virtualization is still gaining traction thanks to its ability to drive server consolidation, reduce provisioning times, serve as platform for app development and deployment and save enterprises money.

    • Debian Family

      • Derivatives

        • Canonical/Ubuntu

          • New Tool Lets You Easily Install the Ubuntu Touch OS on Your Mobile Devices

            Softpedia was just informed by Marius Quabeck from UbuntuFun.de about a new tool that lets users super easily install the Ubuntu Touch mobile operating system on their devices.

            The tool is developed by Marius Quabeck himself and is called magic-device-tool. The first stable version, magic-device-tool 1.0, is now available to everyone and promises to offer a simple and easy-to-use batch tool for installing Canonical’s Ubuntu Touch mobile OS, as well as Android, Cyanogenmod, or Phoenix OS.

            In other words, you’ll be able to replace your mobile operating system on your device with any of the following: the latest Ubuntu Touch release, Cyanogenmod – with or without the GAPPS (Google Apps) package, the factory Android image, as well as Phoenix OS. Please note that you’ll only be able to run one of these OSes on your mobile devices.

          • Canonical Brings Ubuntu OpenStack, Ceph to ARM Servers

            Telco and enterprise customers are looking for an alternative source of silicon beyond Intel for data center silicon, Canonical officials say.
            ARM officials took a step forward in their effort to build the software ecosystem around its efforts in the data center when Canonical said that its Ubuntu OpenStack and Ceph offerings are now commercially available on servers powered by ARM’s 64-bit chip architecture.

          • Ubuntu OpenStack and Ceph Storage now available on ARM v8-A

            Unified solution will benefit majority of public cloud services, Canonical explained

            Canonical and ARM have announced a strategic partnership, making Ubuntu OpenStack and Ceph Storage now available on ARM v8-A-based enterprise solutions.

            Working together with Ubuntu certified System on Chip (SoC) partners, ODMs and OEMs, the two companies will ensure the equipment used by customers, such as servers, storage and networking products can be used with Ubuntu Advantage.

            “We have seen our Telecom and Enterprise customers start to radically depart from traditional server design to innovative platform architectures for scale-out compute and storage. In partnering with ARM we bring more innovation and platform choice to the marketplace,” Mark Baker, product manager of OpenStack at Canonical said.

          • Canonical gives Ubuntu Linux 17.04 the name ‘Zesty Zapus’ (jumping mouse)

            Linux distributions and silly names go together like peanut butter and jelly. For whatever reason, the maintainers of these operating systems seem to enjoy having fun with what they call them — some argue it is childish. Even Google — a billion dollar company — uses sugary dessert names for the Linux-based Android operating system.

            One of the most well-known Linux distributions to use funny names is Ubuntu. It famously uses the convention of an adjective and a lesser-known animal, each starting with the same letter. The letter is chosen sequentially by alphabet. For example, Ubuntu 16.10 uses the letter “Y” — “Yakkety Yak”. The next version of the operating system will use the letter “Z”. While many folks hoped for “Zebra”, that would be too obvious. Instead, Canonical has chosen “Zesty Zapus”. Don’t know what a zapus is? Neither did I. It is apparently a type of jumping mouse. The selection was not made at random, however, as the company has an explanation for the decision.

          • Upcoming Zesty Zapus, Bodhi 4 Beta 3

            Mark Shuttleworth today blogged of the “metaphorical” naming of the release has reached the end of the alphabet with 17.04′s Zesty Zapus. Apparently, a zapus is “a genus of North American jumping mice,” thanks to Wikipedia, and is the only living mammal to have 18 teeth. The genus includes three distinct subspecies and has inhabited Earth since the Pliocene. They have long tails, long back feet, yellowish-brown backs and white bellies. Zesty means “having an agreeably pungent taste,” according to the collective dictionary databases of KDict.

          • Ubuntu MATE 16.10 – quick screenshot tour

            Ubuntu MATE became an officially supported family member not so long ago. Linux notes from DarkDuck have already published a review of Ubuntu MATE 16.04.

          • Why the IoT security nightmare could be a dream for Ubuntu

            A couple of weeks ago, I wrote about how the poor design of Internet of Things devices poses a serious threat to the Internet. By an interesting coincidence, security guru Bruce Schneier wrote about the same issue on the same day, albeit rather more authoritatively. Other articles on the topic continue to appear, as people begin to wake up to the seriousness of this issue.

            On Monday, I attended the opening day of Oscon in London, and listening to Canonical’s Mark Shuttleworth talk about “Brilliant pebbles,” it seemed to me that he was outlining part of a possible solution to IoT’s problems. Here’s a description of his keynote…

  • Devices/Embedded

    • RPi Compute Module 3 revealed, tapped for NEC signage

      On Oct. 10, NEC Display Solutions Europe announced it would produce a series of digital signage display computers equipped with the upcoming Raspberry Pi Compute Module 3, which runs Linux on the same quad-core Cortex-A53 SoC as the Raspberry Pi 3. On Oct. 14, Eben Upton, CEO of Raspberry Pi Trading, made his own announcement of the displays, adding some more details, and today, the datasheet for the Compute Module 3 leaked online.

      Long story short: the Compute Module 3 is pin compatible with the original, but will be available in 4GB eMMC and SD-only models. There’s no pricing or close-up photo, but the module will ship by the end of the year.

    • How to fly your DIY Raspberry Pi drone

      We’ve shown you how to build your own drone, and once you’d fitted all the cables and powered up, you have been able to enjoy your first flight. However, if you’ve found that your drone has a tendency to fly off in a random direction or doesn’t seem to respond in the way that you want then we’re now going to take a look at the delicate process of connection and calibration.

      The calibration of the drone will be carried out using software called APM which enables us to calibrate the RC unit with the PXFMini autopilot module.

    • Demonstrating the Future of IoT

      Yesterday was a special day. It would be a nightmare day for most tech executive. I was a keynote speaker for OpenIoT Europe / Embedded Linux Conference from The Linux Foundation and was asked to demo IoT in front of more than a thousand [potentially multiple thousands] experts. If there is one thing software companies don’t do enough, it is sending their executives to demo their new products. I survived and it went quite well. This blog post will run through my demos but also explain how each is just a building block towards a software defined future in which home, business and industrial IoT will redefine our future. My code is on Github and where possible I will give instructions to do the demo yourself.

    • Phones

      • Tizen

        • App: Smart Tutor Released by Samsung for Tizen Smartphones

          A new app named Smart Tutor has been released by Samsung Electronics Co. Ltd. and is available right now from the Tizen Store. Using the app you are able to contact Samsung customer care about your device support needs. It’s an easy, quick and safe technical support application and a good consulting tool for Samsung smartphones. You can get help from Samsung Customer Care for solve your device’s technical issues. It can be used to diagnose your device remotely in order to optimize device performance and give functional advice.

      • Android

        • Google Maps for Android can now show you nearby traffic through a one-tap shortcut
        • HTC launches virtual reality-focused Viveport M storefront for Android
        • BlackBerry Mercury, Like Pixel Phones And LG V20, Will Run Android 7.0 Nougat Out Of The Box

          BlackBerry appears to be up to speed when it comes to releasing new Android smartphones. Since releasing the PRIV and DTEK50, the Canadian company reportedly worked on a new smartphone, which is now called the DTEK60. Just this Monday, however, new information has surfaced, revealing that Apple’s former greatest rival is working on another Android hardware.

        • PBS Launches Android Tablet for Kids

          A sub-$100 Android tablet is hitting Best Buy stores in November, and its 16GB of flash storage will be prefilled with so much content you probably won’t have room to add your own.

          But it’s not all adware, as you might expect for such a cheap device. Instead, the more than 25 games and 120 video clips are educational resources from PBS Kids. Dubbed the “Playtime Pad,” the $80 tablet is a partnership between PBS and California budget electronics maker Ematic.

        • Google Pixel review: Bland, pricey, but still the best Android phone

          Welcome to the age of Google Hardware. Apparently tired of letting third-party Android OEMs serve as the stewards of Android handsets, Google has become a hardware company. (Again).

          Earlier this year Google, launched a hardware division with former Motorola President Rick Osterloh at the helm. With the high-ranking title of “Senior Vice President,” Osterloh doesn’t oversee a side project—his group is on even footing with Android, Search, YouTube, and Ads. The hardware group is so powerful inside Google that it was able to merge Nexus, Pixel, Chromecast, OnHub, ATAP, and Glass into a single business unit. The group’s coming out party was October 4, 2016, where it announced Google Home, Google Wifi, a 4K Chromecast, the Daydream VR headset, and the pair of phones we’re looking at today: the Google Pixel and Google Pixel XL.

Free Software/Open Source

  • The answer to Internet of Things madness? Open source, of course!

    “Open is always going to win,” states Ed Hemphill, CEO of WigWag, a company that hopes to make sense of the ever-expanding and ever-more-complex Internet of Things market.

    WigWag is named after the traditional flags used by the US military’s Signal Corps to communicate messages. Hemphill and his cofounder Travis McCollum both served in the Signal Corps before starting up their company in Austin, Texas.

  • What the history of open source teaches us about strategic advantage

    The free software movement started like many other movements: A group of bright, spirited people felt controlled by a greater power and rose up and took matters into their own hands.

    It’s not that different from the American Revolution. The colonists were tired of being controlled by Great Britain, so they declared their independence and started building their own system of government and military, and creating their own cultures. The revolutionaries’ methods were disorganized and improvised, but they ultimately proved to be effective. Same goes for the software revolutionaries.

  • Web Browsers

    • 7 chronic browser bugs plaguing the web

      Web browsers are amazing. If it weren’t for browsers, we wouldn’t be able to connect nearly as well with users and customers by pouring our data and documents into their desktops, tablets, and phones. Alas, all of the wonderful content delivered by the web browser makes us that much more frustrated when the rendering isn’t as elegant or bug-free as we would like.

      When it comes to developing websites, we’re as much at the mercy of browsers as we are in debt to them. Any glitch on any platform jumps out, especially when it crashes our users’ machines. And with design as such a premium for standing out or fitting in, any fat line or misapplied touch of color destroys the aesthetic experience we’ve labored to create. Even the tiniest mistake, like adding an extra pixel to the width of a line or misaligning a table by a bit, can result in a frustrating user experience, not to mention the cost of discovering, vetting, and working around it.

  • SaaS/Back End

    • 12 Top Open Source Data Analytics Apps

      For many large enterprises, open source big data analytics have become an integral part of daily business. According to a 2016 New Vantage Partners survey of executives at Fortune 1000 companies, 62.5 percent of enterprises are now running at least one big data tool or application in production. That’s nearly double the number who said the same thing in 2013. And only 5.4 percent of those surveyed had no big data plans.

      When it comes to big data analytics, open source software is the rule rather than the exception. Several of the leading tools enterprises are using are managed by the Apache Foundation, and many of the commercial tools are based at least in part on these open source solutions.

      In this slideshow, we’re featuring twelve of the top open source data analytics solutions. Some of them offer a complete end-to-end platform for big data analytics while others must be combined with other technologies. All of them are suitable for enterprise use and are among the leading tools for data analysis.

    • One CTO’s mission to boost needed OpenStack skills in future IT talent

      Virtually every employer struggles to hire people with needed tech skills. But Amrith Kumar, CTO of the OpenStack database-as-a-service company Tesora, is fighting the talent crunch in the future. He’s investing some of his time in working with college students, making sure there will be more available hires with OpenStack expertise. In an interview with The Enterprisers Project, Kumar explains why this work is so important.

    • OpenStack Summit, Barcelona: Your Guide to the Event

      The OpenStack Summit event in Barcelona is only days away, and you can still register. According to the OpenStack Foundation, approximately 6,000 attendees from 50+ countries are expected to attend the conference, taking place Oct. 25 – 28 in Barcelona.

      This event is a bi-annual gathering of OpenStack community members, technology leaders, developers and ecosystem supporters. Each year one summit event is held in North America and then one additional event rotates between Asia and Europe. Barcelona already has a packed schedule, and here is what you can expect from the event.

    • Mesosphere Embeds Marathon Container Orchestration in DC/OS

      While Marathon may not draw as much attention these days as other container orchestration technologies, work surrounding the platform continues. With the latest version of the DC/OS platform from Mesosphere, the Marathon container orchestration engine now comes baked in.

      Tal Broda, vice president of engineering for Mesosphere, says with version 1.8 of DC/OS via a new Services Feature the Marathon container orchestration engine can be more naturally invoked, with the same dashboard IT administrators employ to schedule jobs and perform other tasks. The end result is a more refined IT management experience.

    • A new kind of match-making: Speed mentoring

      My primary focus is to make contributing to the OpenStack community easier and more fun.

      I’m an upstream developer advocate for the OpenStack Foundation, and this work includes bringing new people into the community, making sure members of the community feel valued, and reducing conflict and removing roadblocks to contribution. It’s also part of my job to smooth the path for newcomers just starting to get involved in the community.

      In many cases, people looking to contribute often don’t know where to start—a mentor can point new people in the right direction and help them feel involved and engaged.

  • BSD

    • DragonFly 4.6.1 tagged

      I don’t have it uploaded yet, but DragonFly 4.6.1 is tagged. Anyone with an existing 4.6.0 or earlier system can upgrade now. Use the 4.6 release instructions if you are unsure on how to upgrade. The 4.6.1 tag commit message has all the changes.

  • Public Services/Government

    • France renews its two free software support contracts

      The French administration in charge of the public procurement, and DINSIC (the state agency in charge of the IT ) have renewed the two contracts for free software support services. Both contracts were awarded to the French free software services provider Linagora.

    • White House Open-Sources Bot Code
    • White House open sources Facebook Messenger

      The US government is looking to help other governments build bots, with the White House having shared open source code for President Obama’s Facebook Messenger bot.

      Jason Goldman, Chief Digital Officer of the White House, said in a post announcing the open source move: “we’re open-sourcing this White House technology, with the hope that other governments and developers can build similar services—and foster similar connections with their citizens— with significantly less upfront investment.”

  • Openness/Sharing/Collaboration

    • Linux & Open Source News Of The Week — Ubuntu 16.10, FreeBSD 11, Android 7.1, And More
    • Open Data

      • Open Data: 81% of European countries have a dedicated policy

        In 2016, 81% of countries in the European Union have a dedicated Open Data policy, up from 69% in 2015, according to a new report, “Open Data maturity in Europe 2016,” produced by Capgemini.

        Data collected from the European Open Data Portal showed that, in 2016, only five countries in the EU28+ zone had not yet deployed an Open Data policy (nine countries in 2015): Hungary, Liechtenstein, Lithuania, Malta and Portugal.

        The report also showed signs of improvement in the involvement of European countries in Open Data. In 2016, 57% had completed what the report called their open data journey – an incremental strategy which leads to opening data. This is a 28.6% increase compared to 2015. “A majority of the EU28+ countries have successfully developed a basic approach to address Open Data,” the report stated. “Countries are also investing in understanding the impact of Open Data for their economy and society via the launch of a number of studies and interactions with civil society,” the report went on to say.

  • Programming/Development

    • More GCC Patches To Get OpenMP Offloading To NVIDIA NVPTX Working

      Fresh patches are available for GCC to get OpenMP offloading to the NVIDIA PTX ISA working for accelerating OpenMP on NVIDIA GPUs with the GNU Compiler Collection.

      Alexander Monakov has published the latest patches for GCC to provide OpenMP offloading to NVPTX, the ISA to be consumed in turn by NVIDIA’s proprietary driver. GCC NVPTX support has been ongoing for quite a while now but these are the final pieces for getting OpenMP support in place.

Leftovers

  • The Villains of Remote Work

    Working remotely is awesome. It’s how DNSimple operates. There’s no office, there are no working hours, there is nowhere you need to be, there’s no commute, and no line for the bathroom. You’re free to work when you want, how you want, and from wherever you want.

    Working on a small team is awesome. It’s how DNSimple operates. There are no deadlines, there are no managers, there is no disconnect between the development and the business, and no HR department. You’re free to contribute wherever it’s effective, you get to know your coworkers well, you develop your own workflow, and you’re held accountable by your commitment to your team and forward progress.

    Both core aspects of DNSimple, being a small remote team is a wonderful combination, but it’s one that opens itself up to unexpected vulnerabilities. Much like how when a superhero makes their appearance, villains inevitably follow…being part of a small team that works remotely is a superpower that draws in super-villainy.

  • Science

    • Connected cars are cash cows; low margins may have killed the Apple Car

      A pair of articles published on Monday by Bloomberg and Fast Company provide an interesting snapshot of the ongoing collision between the tech and automotive industries. In the former, Mark Gurman and Alex Webb provide a fuller exploration of Apple’s ongoing “Project Titan” than we’ve read to date. The “so secret we can’t talk about it” car R&D is believed to have been heavily scaled back—along with Apple’s vehicular ambitions.

      The once thousand-strong team has now lost hundreds of members, particularly those working on a car OS, as well as chassis and suspension design, Bloomberg reports. Perhaps Apple’s scaled-back plans were inevitable; according to Bloomberg, “Apple executives had imagined an electric car that could recognize its driver by fingerprint and autonomously navigate with the press of a button.”

  • Health/Nutrition

    • [Older] Pesticide manufacturers’ own tests reveal serious harm to honeybees

      Unpublished field trials by pesticide manufacturers show their products cause serious harm to honeybees at high levels, leading to calls from senior scientists for the companies to end the secrecy which cloaks much of their research.

      The research, conducted by Syngenta and Bayer on their neonicotinoid insecticides, were submitted to the US Environmental Protection Agency and obtained by Greenpeace after a freedom of information request.

      Neonicotinoids are the world’s most widely used insecticides and there is clear scientific evidence that they harm bees at the levels found in fields, though only a little to date showing the pesticides harm the overall performance of colonies. Neonicotinoids were banned from use on flowering crops in the EU in 2013, despite UK opposition.

      Bees and other insects are vital for pollinating three-quarters of the world’s food crops but have been in significant decline, due to the loss of flower-rich habitats, disease and the use of pesticides.

    • CEO’s Death Stirs Debate About Chinese Techies’ 70-Hour Work Weeks

      The premature death of the 44-year-old founder of a prominent mobile health app startup has spurred a bout of soul searching in the Chinese tech community, where working long hours in the hope of making a quick fortune has become a way of life.

  • Security

    • Understanding and Securing Linux Namespaces

      Richard Guy Briggs, a kernel security engineer and Senior Software Engineer at Red Hat, talked about the current state of Kernel Audit and Linux Namespaces at the Linux Security Summit. He also shared problems plaguing containers and what might be done to address them soon.

      His insights are borne of deep experience. Briggs was an early adopter of Linux back in 1992, and has written UNIX and Linux device drivers for telecom, video and network applications and embedded devices.

  • Defence/Aggression

    • An ‘Epidemic of Graft’ – Anti-Corruption Efforts in Afghanistan Fail Hard

      The U.S. spends spends $5 billion of your tax money a year in “aid” to Afghanistan, plus billions more for the cost of the thousands of American troops and Pentagon-sponsored military contractors there.

      An “Epidemic of Graft”

      One of the (many) reasons why all that money has accomplished close to jack squat in 15 years of war is corruption. Extraordinary amounts of U.S. money simply disappears, siphoned off at high levels, passed on as bribes to suppliers and Taliban hustlers at the lower levels. It is, according to one study, an “epidemic of graft.”

    • The Story Changes: The Pentagon Is No Longer Sure Yemen Fired Missiles At A US Ship

      Last Thursday, after two consecutive missile attacks on the US Navy ship USS Mason, which allegedly were launched by Houthi rebel forces in Yemen, the US entered its latest military engagement in the middle east, when the USS Nitze launched several Tomahawk cruise missiles aimed at radar installations located by the Bab el-Mandab straight, and which enabled the launch of at least three missiles against the U.S. ship.

  • Transparency/Investigative Reporting

    • WikiLeaks Claims ‘State Actor’ Has Cut Off Assange’s Internet

      One of Julian Assange’s only ways of communicating with the outside world from within the Ecuadorian Embassy in London has been disconnected, according to WikiLeaks.

      WikiLeaks claims that a “state actor” has cut off Assange’s internet access, with the group’s Twitter account confirming on the morning of October 17 that Assange’s connection has been “intentionally severed” and contingency plans are being activated. It’s unclear what those contingency plans may be and Motherboard was unable to verify Wikileaks’ claim. The Ecuadorian Embassy also did not immediately provide Motherboard with any more information.

    • Wikileaks: a “state party” has cut off Julian Assange’s primary internet access

      Late yesterday, the @wikileaks account tweeted “Julian Assange’s internet link has been intentionally severed by a state party. We have activated the appropriate contingency plans.”

      The tweet followed some apparent “dead man’s switch” with what looked like cryptographic fingerprints or keys, which could be used to decrypt “insurance files” of leaks that had been posted in encrypted form to a server somewhere, or to verify future documents as having originated with Wikileaks.

      The “state party” could be the UK government, which exercises an extraordinary level of fine-grained control over the six major ISPs that serve the UK market (Assange is stuck in the Ecuadoran embassy in London), or it could be another government.

    • Assange net access cut after Clinton papers leaked

      The government of Ecuador has been accused of cutting off Internet access for WikiLeaks founder Julian Assange after the organisation released details of speeches given to Goldman Sachs by Democrat presidential contender Hillary Clinton.

      In a tweet, WikiLeaks said: “We can confirm Ecuador cut off Assange’s internet access Saturday, 5pm GMT, shortly after publication of Clinton’s Goldman Sachs speechs.”

      Assange has been taking refuge in the Ecuadorian embassy in London since August 2012. He has been accused of rape in Sweden and the country has said recently that it is willing to interview him in the embassy.

    • Someone has pulled the plug on Julian Assange’s internet

      BEFORE ANYONE asks whether someone has tried turning it off and on again, we will quickly get in the fact that somewhere in or around the Ecuadorian embassy someone has turned off Julian Assange’s internet connection and plunged him into a world of daytime television. And no-one is sure how or why.

      Assange has made a home for himself at the embassy, although reportedly not a very comfortable one, and may consider himself lucky to be in exile when he sees The Jeremy Kyle Show. He may even plead for a bit of time out of the office so that he can check any attics for cash.

    • Assange’s Internet “intentionally severed by state party”

      WikiLeaks announced via its Twitter account this morning that WikiLeaks founder Julian Assange’s Internet connection had been cut off, blaming a “state party” for the outage. Assange, who has been ensconced in the Ecuadorian embassy in London since he sought asylum there over four years ago to avoid extradition, has been “detained in absentia” by the Swedish government for questioning on allegations of rape. Other lesser allegations have been dropped because they have passed the time allowed by Sweden’s statute of limitations.

    • Wikileaks: Julian Assange’s internet access ‘cut’

      Wikileaks says that Ecuador has shut down internet access for its founder Julian Assange.

      The transparency activist has sought asylum at London’s Ecuadorean embassy since 2012 to avoid extradition over sex assault allegations.

      Ecuador’s Foreign Minister Guillaume Long made no comment on the claim, saying only: “The circumstances that led to the granting of asylum remain.”

      Wikileaks has recently been releasing emails from Hillary Clinton’s campaign.

    • These Cryptic Wikileaks Tweets Don’t Mean Julian Assange Is Dead [Update]

      In the absence of context, some users on Twitter, Reddit, and various image boards were quick to speculate that the tweets were the result of a “dead man’s switch,” triggered in the event of Julian Assange’s untimely end. Such switches do exist (both mechanically and electronically) and many speculated that all 349 gigs of the heavily-encrypted “Wikileaks insurance” from 2013 are intended for precisely that purpose.

    • What’s Going On With Julian Assange and WikiLeaks? Here Are 4 Theories [Ed: Time continues its endless, years-long attacks on Wikileaks under the guise of “coverage” or “journalism”]
    • Republicans warm up to Assange [iophk: “they are too stupid to understand WL”]

      Republicans are making common cause with an old enemy: Julian Assange.

      In 2010, prominent figures in the GOP wanted the WikiLeaks founder jailed for releasing thousands of diplomatic cables leaked by former Pvt. Chelsea Manning.

      Onetime presidential hopeful Mike Huckabee said the leak “put American lives at risk.” Former vice presidential candidate Sarah Palin said Assange had “blood on his hands” and should be “hunted down.” Rep. Pete King (R-N.Y.) called for the Australian anti-secrecy activist to be tried under the Espionage Act and asked if WikiLeaks could be designated as a terrorist organization.

  • Environment/Energy/Wildlife/Nature

    • WWF: Finnish wildlife already feeling the burn from climate change

      WWF Finland issued a report Monday in which it outlined signs that global warming is already beginning to affect Finland. The organisation noted that ice formations on lakes and open seas last for shorter periods, while vegetation has changed and the tree line is migrating further north.

      “These changes and winter temperatures in particular have a massive impact on species that depend on snow and ice in Finland,” said WWF Finland programme manager Sampsa Vilhunen in a statement.

      According to the report, the Arctic fox has almost entirely disappeared from Finland and the snowy owl has all but shunned Finland as a nesting site, only returning occasionally. Wolverines, the Saimaa ringed seal and salmon are also suffering the effects of climate change, the NGO said.

    • The Riverkeeper: Just a Florida Man Trying to Save Waterways From Toxic Algae

      Marty Baum jumped on a friend’s boat, his phone blowing up with frantic phone calls from fishermen. Forty square miles of catfish, mullet, redfish and most other common game were dead in the water. Thousands of fish, all belly-up.

      “We went out on his boat and I cried,” Baum said. “Every little thing that required dissolved oxygen was dead.”

    • The Montreal Protocol Is the Most Successful Climate Agreement Ever

      Remember the hole in the ozone layer? If you were around in the 80s, you definitely do—it was a climate bogeyman of the time, along with acid rain, and rightfully so.

      It was in that decade that scientists confirmed that chemicals called CFCs (found in aerosol cans like hairspray and deodorant) were eating away at the ozone layer, and would produce some scary consequences, from skyrocketing skin cancer rates to damaging effects on plant life and marine ecosystems, if left unchecked.

      That realization lit a fire under scientists and, importantly, government officials. (Margaret Thatcher, who trained as a chemist, was among those spooked by it.) In 1987, almost every country in the world signed the Montreal Protocol, agreeing on a plan to phase out damaging CFCs. Consumers bought in, too, voluntarily boycotting the spray cans. As a result of this global effort to get rid of CFCs, scientists now say the ozone layer is slowly healing.

  • Finance

    • SoftBank and Saudi Arabia Partner to Form Giant Investment Fund

      SoftBank of Japan has already earned a reputation as one of the most ambitious technology companies around, unafraid to strike huge deals.

      Now the conglomerate is aiming to become one of the world’s biggest investors in tech — potentially with the help of Saudi Arabia.

      SoftBank announced on Thursday that it would form a new investment fund that could invest up to $100 billion in technology companies worldwide.

      SoftBank will invest at least $25 billion into what’s provisionally called the SoftBank Vision Fund over the next five years, while Saudi Arabia is weighing putting in at least $45 billion. They may draw in other partners who could eventually push the fund’s size to its maximum.

    • Cadbury owner paid no UK corporation tax

      The owner of Cadbury paid no corporation tax in its latest financial year, despite making a profit of £177.6m on sales of £1.73bn.

      Mondelez, the UK subsidiary of US snacks giant Kraft Foods, said its annual profit was inflated by a “one-off gain” from the sale of its coffee business, behind brands such as Douwe Egberts, for £147m last year.

      This sale was not subject to tax under UK law.

    • From laptops and cars to Cadbury and Heinz: the brands accused of exploiting Brexit to ramp up prices

      Today a Sun on Sunday investigation has unearthed an epidemic of price increases in the pipeline from firms ready to blame Brexit and the falling Pound.

      Former Cabinet minister Iain Duncan Smith has blasted these “Brexit bandits” as firms are already using the impact of the vote to crank up the cost of iPads, Dell laptops and our holiday cash.

      And everyday shopping items such as Cadbury chocolate, Majestic wines and Next clothes could increase too.
      A tub of Marmite on a white background

    • Andersson: “If there were no trade unions, this would be the time to invent them”

      Holmström has predicted that the age of trade unions is about to be over. He estimated last week that changes in the nature of employment will result in a decline in trade union membership and, therefore, in the inevitable disintegration of trade unions.

      “The age of trade unions is over in the sense that their societal power will decrease and their nature and role change,” he told Talouselämä on Friday.

      Andersson acknowledged that the changing nature of traditional occupations and the working life in general will also have an impact on the position and responsibilities of trade unions.

      “Having a high rate of organisation and strong trade union movement is not self-evident, but the trade union movement has to demonstrate that it can keep step with social changes and understand the problems created by the fragmentation of employment and the working life,” she said.

    • The job juggle is real. Many Americans are balancing two, even three gigs

      Many Americans who struggled to find a job several years ago are now juggling two or three.

      The number of multiple job holders hit an eight-year high in September as several forces reshape the labor market. Many workers are seeking extra income as wages are inching up. Job openings are near record levels. And the burgeoning gig economy is putting a premium on freelance work and short-term projects.

      Michael Alfaro, 49, of Coloma, Mich., toils full-time as an executive customer service representative for an appliance manufacturer. And on most evenings and some weekends, he works the late shift — 6 PM to 10 PM or 4 PM to midnight — in the electronics department of a local department store.

      Alfaro decided to take the gig last November to whittle down about $37,000 in debt, including credit card, and student and personal loans. But he also was spurred by the struggles of area retailers and other businesses to find employees.

      “It encouraged me,” he says.

      The ranks of multiple job holders jumped by 300,000 last month to 7.8 million, according to the Bureau of Labor Statistics. The moonlighters represent 5.2% of all those employed, up from 4.9% in September 2015.

      Monthly data can be volatile, but the totals through the first nine months of 2016 have averaged 7.5 million, nearly 300,000 higher than the year-ago figure.

    • UK inflation rises to 1% in September

      The UK inflation rate rose to 1.0% in September, up from 0.6% in August, according to official figures.

      It is the biggest monthly rise in the cost of household items in more than two years, the Office for National Statistics (ONS) said.

      Rising prices for clothing, overnight hotel stays and motor fuels led to the rise in the Consumer Prices Index.

      However, the ONS said there was “no explicit evidence” the lower pound was increasing prices of everyday goods.

    • Brexit is simulated in Football Manager 2017, and it’s going to make the game harder than ever

      Miles Jacobson is frank about what he is up against: “As far as I know this is the first time a computer game has tried to predict the future of a country.”

      This would always have been a busy time of year for the man in charge of Sports Interactive, the makers of the phenomenally successful Football Manager series of videogames. A new instalment is released on 4 November, but the period leading up to the 2017 edition has been made particularly complicated by the biggest political decision taken in this country since the Second World War.

      While the rest of the world waits to see how the government approaches the triggering of Article 50, Jacobson and his team have built a Brexit simulator into this year’s game, which models some of the consequences of the UK leaving Europe.

      The world outside football is not something that had previously been incorporated into Football Manager, a game so comprehensive that some clubs are now using it as a resource to help scout players. But Brexit, says Jacobson, was too big to be left out: “We usually try and keep politics out of the game because nobody wants it rammed down their throat.

    • How Trump’s Casino Bankruptcies Screwed His Workers out of Millions in Retirement Savings

      When pressed about the multiple bankruptcies at his Atlantic City casinos, Donald Trump routinely says the episodes highlight his business acumen. He made out well, he claims, at the expense only of his greedy Wall Street financiers. “These lenders aren’t babies,” he said during a Republican primary debate last fall. “These are total killers. These are not the nice, sweet little people that you think, okay?”

      Yet among those who suffered as a result of Trump’s bankruptcies were his own casino employees, who collectively lost millions of dollars in retirement savings when the company’s value plummeted.

      Trump’s company encouraged its employees to invest their retirement savings in company stock, according to a class-action lawsuit filed by employees against Trump Hotels & Casino Resorts following its 2004 bankruptcy. Then, when the stock price was near its nadir as bankruptcy loomed, the company forced the employees to sell their stock at a huge loss. More than 400 employees lost a total of more than $2 million from their retirement accounts, the lawsuit states.

  • AstroTurf/Lobbying/Politics

    • John Oliver Treated Jill Stein and Gary Johnson Like What They Are: Presidential Candidates (Video)

      In the video seen above, the “Last Week Tonight” host powerfully dismisses the idea that third party candidates are “spoilers” and expresses his understanding at the American public’s desire for alternatives to Donald Trump and Hillary Clinton. In an assessment of both the Libertarian and Green Party candidates aired on the HBO show on Sunday, Oliver vetted their positions and statements in a segment that contained quite a few jokes, and, admittedly, quite a bit of ridicule. Johnson came under attack for his less-than-detailed desire to rid the nation of several important government organizations while Stein was criticized for making vague comments that, in Oliver’s view, seemed to egg on conspiracy theorists.

      Yet perhaps being ridiculed by the comedian is part and parcel of running for office. In this sense, Oliver has offered the third party candidates more respect than many other pundits have, including his political comedy peers (see Samantha Bee, for example, who refused to name Stein on her show). The “Last Week Tonight” host even groups the four candidates together at the end of his monologue (something most of the rest of the media have been reluctant to do, still treating third party candidates like extras rather than main players), joking that on Nov. 8 Americans will have to choose between the lesser of four evils, not two.

      “As uncomfortable as this is, everyone has to own the floors of whoever you vote for,” says the host in his wrap-up. “Whether they are a lying, handsy, narcissistic sociopath; a hawkish, Wall-Street-friendly embodiment of everything that some people can’t stand about politics; an ill-tempered mountain molester with a radical, dangerous tax plan that even he can’t defend; or conspiracy-pandering political neophyte with no clear understanding of how governments operate …”

    • The media’s extermination of Bernie Sanders, and real reform

      All politicians love to complain about the press. They complain for good reasons and bad. They cry over frivolous slights and legitimate inquiries alike. They moan about bias. They talk to friendlies only. They manipulate reporters and squirm their way out of questions. And this all makes perfect sense, because politicians and the press are, or used to be, natural enemies.

      Conservative politicians have built their hostility toward the press into a full-blown theory of liberal media bias, a pseudosociology that is today the obsessive pursuit of certain nonprofit foundations, the subject matter of an annual crop of books, and the beating heart of a successful cable-news network. Donald Trump, the current leader of the right’s war against the media, hates this traditional foe so much that he banned a number of news outlets from attending his campaign events and has proposed measures to encourage more libel lawsuits. He does this even though he owes his prominence almost entirely to his career as a TV celebrity and to the news media’s morbid fascination with his glowering mug.

    • Green Party Candidate Jill Stein: What Global Citizens Should Know

      Hillary Clinton isn’t the only woman breaking records in this year’s election.

      Dr. Jill Stein, this year’s Green Party nominee, holds the current record for most votes ever received by a woman candidate for president of the United States in the general election.

      That’s because she also ran in 2012 as the Green Party’s nominee, and since her defeat, Stein has not slowed down.

      A physician who graduated from Harvard, Stein worked in the medical field for 25 years, until 1988, when she moved into activism. This transition was more seamless than you might expect.

    • 6 Signs That the Election is Rigged
    • Donald Trump’s rigged election is GOP’s latest headache

      It might seem as though Republican presidential nominee Donald Trump is moving further away from the party that nominated him. Since he declared himself “unshackled” he’s escalated his maverick rhetoric, hammering home his claims that the November 8 election is “rigged” against him.
      Cornered by a flood of accusations of sexual assault, Trump’s Fifth Avenue headquarters has become an unlikely fort from which he’s staging a last stand against an ever-widening circle of enemies that includes not only the media and his Democrat opponent, Hillary Clinton, but much of the GOP. “100% fabricated and made up charges … may poison the minds of the American voter. FIX!” he tweeted on October 15.

    • Judicial Watch Statement on FBI Interview Document Detailing Open Source Investigation into Hillary Clinton’s Emails
    • FBI Agents Say Comey ‘Stood In The Way’ Of Clinton Email Investigation

      FBI agents say the bureau is alarmed over Director James Comey’s decision to not suggest that the Justice Department prosecute Hillary Clinton over her mishandling of classified information.

      According to an interview transcript given to The Daily Caller, provided by an intermediary who spoke to two federal agents with the bureau last Friday, agents are frustrated by Comey’s leadership.

    • Documenting Trump’s Abuse of Women

      When the news broke that Donald Trump had been caught on video in 2005 boasting that, as a celebrity, he feels free to “grab” women “by the pussy,” Harry Hurt III experienced a sense of vindication. In 1993, Hurt published “Lost Tycoon: The Many Lives of Donald J. Trump,” an unauthorized biography that has long been out of print. The day the tape surfaced, he was hitting golf balls at a driving range in Sagaponack, New York, when a text message arrived from a friend: “Donald is done!”

      After Hurt watched the tape, he said, “I thought, Finally, this behavior is coming out.” But he doubted that the revelation would do any real damage to Trump’s campaign. Researching his book, in the early nineties, Hurt discovered and documented more serious instances of Trump’s mistreatment of women, yet most news outlets had declined to report on them. Even during the current campaign, Hurt said, “I’ve been a voice in the wilderness.”

    • Companies used Clinton fundraisers to lobby State Department

      The nexus among private companies, Hillary Clinton’s State Department and the Clinton family foundations is closer and more complex than even Donald Trump has claimed so far.

      While it is widely known that some companies and foreign governments gave money to the foundations, perhaps in an effort to gain favor, one of the key parts of the puzzle hasn’t been reported: At least a dozen of those same companies lobbied the State Department, using lobbyists who doubled as major Clinton campaign fundraisers.

      Those companies gave as much as $16 million to the Clinton charities. At least four of the lobbyists they hired are “Hillblazers,” the Clinton campaign’s name for supporters who have raised $100,000 or more for her current White House race. Two of the four also raised funds for Clinton’s unsuccessful 2008 presidential bid.

    • Private Prison Company Bankrolls Pro-Trump Super-PAC

      It’s unusual for a publicly traded corporation to donate to a super-PAC, but in August, private prison company GEO Group steered $150,000 to Rebuild America Now, a pro-Donald Trump outfit launched by the GOP nominee’s longtime friend, developer Tom Barrack.

      The timing of the GEO Group’s contribution is significant. It cut a $100,000 check to the super-PAC on August 19, the day after the Justice Department announced that it would phase out the use of private prisons. (The company’s political action committee donated $50,000 to Rebuild America Now a week before the announcement.)

      The multibillion-dollar-a-year private prison industry has been under increasing scrutiny, in part thanks to a groundbreaking investigation by Mother Jones that revealed a litany of disturbing practices at a Louisiana prison run by the Corrections Corporation of America. GEO Group is one of just three companies that operate prisons and detention centers on behalf of the federal government. It’s no surprise the company is putting its money behind Trump. While Hillary Clinton has sharply criticized private prisons, Trump has expressed support for expanding their use, and his policy proposals, including his plan to deport millions of undocumented immigrants, could be a boon for the industry. In addition to backing Trump, the company recently brought on three lobbying firms to represent its interests in Washington.

  • Censorship/Free Speech

    • Porn in the classroom? Here’s why it makes sense

      What a cat I put among the pigeons last week by suggesting, in answer to a question about pornography at a literary festival, that it should be considered suitable for pupils to watch and analyse this material in schools. I was accused, on social media of course, of being a danger to innocent children, and, yes, I received my first online death threat.

      What, I wondered, do so-called grown-ups think our youngsters are up to when it comes to sex? The internet is the wild west of the information age, and the younger generation is far more adept than the older ones at gaining access to its more unsavoury territories.

      Teenagers will always be drawn to the raunchier aspects of whatever culture is available to them. This would once have been a copy of Lady Chatterley’s Lover, passed around the classroom with a giggle, disguised beneath the cover of Calculus for Beginners.

      In the 1990s there were the lads’ mags, and lots of work for any feminist mother trying to persuade her sons that the exploitation of women – putting semi-nude pictures of them on a bedroom wall – was not a good idea. That was a difficult one, because you didn’t want your kids to think sex was dirty or to make them afraid to share their interest in it with their parents. You just wanted them to know that women should never be used or objectified.

    • Posting on Facebook is now a crime under Ethiopia’s state of emergency

      A state of emergency declared in Ethiopia last week is growing more draconian by the day. Posting updates on the current status of the country, hit by anti-government protests since last November, is now a crime, the government said over the weekend.

      Watching Oromia Media Network and Ethiopian Satellite Television and Radio, outlets run by the Ethiopian diaspora supportive of the protesters, is also illegal.

      “The military command will take action on those watching and posting on these social media outlets,” Siraj Fegessa, Ethiopia’s minister of defense, said on state television. Those who violate the terms of the state of emergency risk imprisonment of three to five years.

    • Tomorrow’s Wars Will Be Livestreamed

      Hundreds of thousands of people around the world watched the start of the invasion of Mosul, a city held by ISIS in Iraq, live on Facebook and YouTube this morning.

      The most popular stream—there were several, some of which are still live—was shared by Kurdish outlet Rudaw and re-posted by outlets like the Washington Post and Channel 4 in the UK. While some viewers commented on the merits of the offensive, for others, the livestream itself was the most startling thing. As angry cartoon faces and “Wow!” emoticons floated over top of live images of war, viewers noted that it all seemed like a bit too much like a sci-fi fever dream about a war-obsessed culture.

  • Privacy/Surveillance

    • ]Older] United States v. Ganias and the Case for Selective Seizures of Digital Evidence

      Recent high-profile cases involving digital searches and seizures have largely focused on government access to data, from the battle over breaking strong encryption to the debates over whether a warrant is required to hack a computer or to obtain private communications from a third-party service provider. But the next big set of questions lurking in the wings revolves around what happens after law enforcement gains access to a cache of personal data: How much can they seize? What can they can search, and how? What happens to non-responsive data? What if it is evidence of another crime? A handful of courts and commentators have grappled with these questions, but the issues seem to be coming up with increasing frequency, highlighting the lack of clarity and consensus on a difficult suite of problems.

      Earlier this year, the Second Circuit waded into these waters when an en banc panel decided United States v. Ganias, a case that many observers expected to resolve a thorny Fourth Amendment question about how long the government can keep seized data that falls outside the scope of a warrant.

      Unfortunately, the opinion may do more to muddy the water than clear it. In particular, it operates on mistaken assumptions about the need to copy entire caches of data and search them off-site, suggesting that such an invasive process will often be reasonable for Fourth Amendment purposes. But a few additional facts make clear that such an approach ought to be exceedingly rare.

    • Court Finds UK Spies Unlawfully Collected Bulk Data for Over a Decade

      The UK government used its bulk collection powers, including sweeping up details on ordinary citizens’ internet usage, illegally for over a decade, according to privacy campaigners.

      On Monday, the Investigatory Powers Tribunal (IPT), a court tasked with keeping tabs on the country’s surveillance powers, highlighted the intense veil of secrecy that has formed around the UK’s use of bulk powers, and the lack of oversight around those powers, in a written judgment. The judgment comes when the country is just preparing for a huge overhaul in its surveillance legislation, via the Investigatory Powers Bill, which is likely to soon become law.

    • Unregulated Police Face Recognition in America

      There is a knock on your door. It’s the police. There was a robbery in your neighborhood. They have a suspect in custody and an eyewitness. But they need your help: Will you come down to the station to stand in the line-up?

      Most people would probably answer “no.” This summer, the Government Accountability Office revealed that close to 64 million Americans do not have a say in the matter: 16 states let the FBI use face recognition technology to compare the faces of suspected criminals to their driver’s license and ID photos, creating a virtual line-up of their state residents. In this line-up, it’s not a human that points to the suspect—it’s an algorithm.

      But the FBI is only part of the story. Across the country, state and local police departments are building their own face recognition systems, many of them more advanced than the FBI’s. We know very little about these systems. We don’t know how they impact privacy and civil liberties. We don’t know how they address accuracy problems. And we don’t know how any of these systems—local, state, or federal—affect racial and ethnic minorities.

    • Telemetry, an essential part of any cloud-native app [Ed: Putting surveillance in Clown Computing (servers) advocated by this network, under the guise of "diagnostics"]

      Auditing and monitoring cloud applications are often overlooked but are perhaps some of the most important things to plan and do properly for production deployments. If you wouldn’t blindly launch a satellite into orbit with no way to monitor it, you shouldn’t do the same to your cloud application.

    • GPG Sync simplifies encryption key management

      In all the discussion about using encryption, a critical point keeps getting lost: It’s difficult to work with, and it’s even harder to deploy it at scale. Nowhere is the challenge more evident than in sending secure email.

      There are many ways to interact and collaborate — instant messaging, Slack, and so on — but email still dominates in enterprises. Even as encryption goes mainstream with secure messaging tools, more websites adopting HTTPS by default, and cloud storage services allowing easier file encryption, sending an encrypted email message is still a challenge.

    • NSA contractor accused of hoarding classified information seeks pre-trial release

      A former National Security Agency contractor accused of bringing a large volume of classified information to his home is asking to be released as the legal proceedings against him grind forward.

      Harold Martin was arrested by the FBI on Aug. 27 and has been in pretrial detention since, without objection from his lawyers. The defense strategy seemed aimed at convincing investigators that Martin meant no harm with his activities and had no intention to disclose sensitive information to anyone.

      That phase of the case seemed to come to a close Monday as Martin’s defense lawyers filed a motion in federal court asking for a hearing to discuss conditions for the computer specialist’s release.

  • Civil Rights/Policing

    • Spy fraud

      Taxpayers are paying intelligence contractors to browse Facebook, watch porn, and commit crimes

    • Intelligence Watchdog Finds Contractor Abuses

      Last week brought news that another Booz Allen Hamilton employee was accused of improperly removing sensitive material from the National Security Agency (NSA). Harold Thomas Martin III was charged with theft of government property and unauthorized removal and retention of classified materials. The government alleges Martin took documents and digital files containing information that, if disclosed, “reasonably could be expected to cause exceptionally grave damage to the national security of the United States.”

      It was another black eye for Booz Allen, which was NSA surveillance program whistleblower Edward Snowden’s employer. It was equally embarrassing for the U.S. intelligence community, which pays contractors like Booz Allen billions of dollars each year to help run its global operations and keep a tight lid on our country’s more sensitive secrets.

    • The Pentagon Must Stop Abusing the War Budget

      After years of claiming that the war budget has been limited to paying for the costs of foreign conflicts, the Pentagon has finally admitted that it has been using that account to pay for tens of billion of dollars in costs that have nothing to do with fighting wars. This budget shell game has been particularly egregious in recent years, as the Pentagon has sought to evade the caps on non-war spending that were imposed by the Budget Control Act of 2011.

      The revelation was recently confirmed by Pentagon spokesman Lt. Col Eric Badger. Badger acknowledged that this year’s request for the Overseas Contingency Operations (OCO) account – the formal term for the war budget – contains $30 billion for “enduring requirements” that have always been funded whether or not the nation was at war.

    • Pentagon Admits Half of War Spending Account Is Slush

      The Overseas Contingency Operations (OCO) account was originally designed to support unanticipated and difficult-to-plan costs for operations in Iraq and Afghanistan. But over time—particularly to circumvent spending caps established by the Budget Control Act and subsequent budget deals—it’s become a slush fund for programs with little connection to our current war efforts. Now a new story by Tony Bertuca at Inside Defense reveals we grossly underestimated just how slushy this fund has truly become.

      The Congressional Research Service (CRS) previously found that even according to the Pentagon’s own accounting, $71 billion in OCO spending went to non-war programs from 2001 to 2014. The definition for OCO became increasingly squishy as Congress and the Pentagon sought opportunities to increase Pentagon spending to circumvent spending caps first established by the Budget Control Act. For example, in 2014 then-House Armed Services Committee Chairman Buck McKeon expanded the definition of OCO to include “readiness shortfalls.”

    • Out-of-control North Dakota prosecutors still pursuing reporter Amy Goodman, even after judge dismisses riot charge

      Award-winning journalist Amy Goodman won an important victory for press freedom yesterday, but given alarming new comments made by her prosecutor, it may be short lived.

      On Monday, a judge quickly dismissed an absurd ‘riot’ charge brought against her by North Dakota authorities that stemmed from her coverage on Democracy Now of a violent attack on Dakota Access Pipeline protesters. But apparently, prosecutors don’t plan on dropping their investigation into her. They announced they may charge her again and indicated they want her unaired footage.

    • Malaysian sharia laws: Parliament to debate hudud bill that could introduce stonings and amputations in state of Kelantan

      The Pan-Malaysian Islamic Party — commonly known as PAS — is pushing to introduce the proposed laws in the conservative north-eastern state, but first the bill must be passed by the Malaysian national parliament.

      Kelantan is a major stronghold for PAS, which was founded in 1951 and is among the country’s oldest and largest opposition parties.

      “Among the mandate from the people is to try to establish the Islamic system here, including the Islamic criminal law,” PAS executive council member Mohd Fadzi said.

      Kelantan’s state capital Kota Bahru is deeply religious and many of its citizens live by a strict adherence to Islam.

      At shops and supermarkets there are separate queues for males and females, while signs advising women to cover up are common outside offices and government buildings.

    • Aggravated judge tosses off robe, joins courtroom scuffle

      When McBain’s court officer went to take Larson into custody, he resisted. McBain said he was “hand fighting” the officer, Jared Schultz, then a deputized law clerk. Larson would not cooperate, tensed up and made a fist as though he was trying to fight, said Schultz, now working for the state Court of Appeals.

      There were no other officers or any sheriff’s deputies in the courtroom – they are not typically present unless there is a jailed person in court – and McBain said he assisted in getting control of Larson’s hands, arms and elbows. Schultz, a former police officer, said he was fortunate to have the judge as backup.

      Schultz said at one time he removed his Taser from its holster, but did not have to use it.

      Even when Larson was on the floor, he wouldn’t allow the officer to cuff him, said McBain, who says he was concerned about the welfare of both men.

    • Sweden’s Shaky Walk Down the Aisle of Equality

      Everything was perfect on the day of Hanna Skjutare’s wedding. On a Saturday in September the sun shone down on the rural church where the ceremony was held and Skjutare was sipping champagne and getting ready with her bridesmaids. They took a car to the church and met up with Hanna’s dad, who escorted the bride down the aisle to her groom and their toddler son.

      “That was one of the strongest memories of the whole day when my dad saw me in my wedding dress and his eyes teared up,” Skjutare explains over lunch.

    • Muslim woman who was sentenced to 40 lashes for wearing a MINISKIRT as a teenager reveals how she left Iran to forge a new life in the US as a bikini designer

      A Muslim woman who was punished for wearing a miniskirt says she’s been heavily criticised for pursuing a career as a swimwear designer.

      Tala Raassi told FEMAIL how she was sentenced to 40 lashes in her hometown of Tehran for attending a mixed party when she was 16 – but has refused to let her ordeal hold her back.

      Instead Tala moved to the States where, despite speaking no English, she carved out a career in fashion, launched her own swimwear line and has just written her first book.

    • Court: It’s entirely reasonable for police to swipe a suspicious gift card

      A US federal appeals court has found that law enforcement can, without a warrant, swipe credit cards and gift cards to reveal the information encoded on the magnetic stripe. It’s the third such federal appellate court to reach this conclusion.

      Last week, the 5th US Circuit Court of Appeals found in favor of the government in United States v. Turner, establishing that it was entirely reasonable for Texas police officers to scan approximately 100 gift cards found in a car that was pulled over at a traffic stop. Like the previous similar 8th Circuit case that Ars covered in June 2016, the defendants challenged the search of the gift cards as being unreasonable. (The second case was from the 3rd Circuit in July 2015, in a case known as US v. Bah.)

      In this case, after pulling over the car and running the IDs of both men, police found that there was an outstanding warrant for the passenger, Courtland Turner. When Turner was told to get out of the car and was placed in the patrol car, the officer returned to the stopped car and noticed an “opaque plastic bag partially protruding from the front passenger seat,” as if someone had tried to push it under the seat to keep it hidden.

    • Refugees being forced into ‘modern slavery’ by people traffickers before attempting deadly journey to Europe

      Refugees and migrants risking their lives in desperate attempts to reach Europe are being forced into “modern slavery” by ruthless people traffickers who are imprisoning, torturing and raping those they exploit.

      A new report has revealed the shocking scale of abuse by criminal gangs who prey on asylum seekers travelling across Africa – most commonly in Libya, which has become the main launching point for smugglers’ boats in the chaos following its civil war.

      Research by the International Organisation for Migration (IOM) found that almost three quarters of migrants attempting to cross the Central Mediterranean have experienced exploitation and human trafficking.

      The group said practices occurring with “alarming scare and frequency” included forced labour, imprisonment, kidnapping, ransom and physical and sexual abuse.

    • The Last Nuremberg Prosecutor Has 3 Words Of Advice: ‘Law Not War’

      When the Nazi leadership was put on trial in Nuremberg, Germany, in the wake of World War II, the notion of an international war crimes tribunal was new and controversial.

      British Prime Minister Winston Churchill proposed a summary execution of Nazi leaders. But it was decided that trials would be more effective, and would set a precedent for prosecuting future war crimes.

      Thirteen trials were held in Nuremberg from 1945 to 1949, with multiple defendants in the cases. The prosecutor for one trial was Benjamin Ferencz, who was just 27 at the time, and it was his first trial.

      “We shall establish beyond the realm of doubt facts which, before the dark decade of the Third Reich, would have seemed incredible,” Ferencz said at the trial.

      He served as a combat soldier during the war, but as the fighting was coming to an end, Ferencz says he was assigned to Gen. George Patton’s headquarters.

      “The final assignment in the army was to go into the concentration camps as they were being liberated and collect all the evidence of the crimes for future trials,” he said.

      Ferencz, who’s now 96 and living in Florida, spoke with Morning Edition host Steve Inskeep.

    • Despite a post-Snowden push for openness, report shows secret laws still abound

      The Justice Department has kept classified at least 74 opinions, memos and letters on national security issues, including interrogation, detention and surveillance, according to a report released Tuesday by the Brennan Center for Justice.

      Also still classified are between 25 and 30 significant opinions issued between 2003 and 2013 by the Foreign Intelligence Surveillance Court (FISC), the secretive federal court that interprets the law governing foreign intelligence-gathering inside the United States.

      And at the State Department, 807 international agreements signed between 2004 and 2014 have not been published.

    • The New Era of Secret Law

      An unprecedented buildup of secret law has been created by the federal government since 9/11 through legal memos, court opinions, agreements with foreign nations, and more. All have been issued without public scrutiny or input — and many impact crucial decisions about the lives and liberties of U.S. citizens, from the use of torture to mass surveillance.

    • The Government’s Addiction to ‘Secret Law’

      The Central Intelligence Agency’s torture of detainees, and the National Security Agency’s warrantless wiretapping of Americans’ international communications, were two of the most controversial programs our government implemented after Sept. 11. Both are now widely considered to have been illegal, even though both were authorized by official legal analyses that were withheld from the public — a phenomenon known as “secret law.”

      The notion of secret law is as counterintuitive as it is unsettling. When most of us think of law, we think of statutes passed by Congress, and we take for granted that they are public.

      Statutes, however, are only one kind of law. When the secret surveillance panel known as the Foreign Intelligence Surveillance Court, or FISA court, construed the Patriot Act to allow bulk collection of Americans’ phone records, that interpretation became part of the statute’s meaning. When President Obama issued procedures and standards for using lethal force against suspected terrorists overseas, agency officials were bound to follow them.

    • Former Joint Chiefs of Staff vice chairman pleads guilty to false statements in classified leak investigation

      A retired four-star Marine Corps general who served as the nation’s second-ranking military officer pleaded guilty Monday to a federal felony charge of lying to the FBI in a probe of a leak of classified information about a covert U.S.-Israeli cyberattack on Iran’s nuclear program.

      James E. “Hoss” Cartwright, who served as deputy chairman of the Joint Chiefs of Staff before he retired in 2011, entered his plea before U.S. District Judge Richard J. Leon of Washington hours after the charge was announced by the office of U.S. Attorney Rod Rosenstein of Maryland.

      A senior Obama administration official in June 2013 acknowledged that Cartwright was the target of a Justice Department investigation into a leak to New York Times reporter David E. Sanger of details about a highly classified operation to hobble Iran’s uranium-enrichment capability through cybersabotage — an effort not acknowledged by Israel or the United States.

  • Internet Policy/Net Neutrality

    • 4 reasons why an accessible website is a win-win

      Why do some people choose to make a website accessible? Some people are do-gooders who, like the World Wide Web Consortium (W3C), believe that “the web is fundamentally designed to work for all people, whatever their hardware, software, language, culture, location, or physical or mental ability.” And, some people do it because they are compelled by law, based on Section 508 of the Americans with Disabilities act. Most federal and state institutions require that websites are accessible to people with a variety of disabilities. Though they may want to do good, their main motivation is to avoid costly legal problems.

  • Intellectual Monopolies

    • WIPO launches pro bono patent programme [Ed: Charm offensive from body which is attacking its very own staff]

      The World Intellectual Property Organization (WIPO) has launched a global programme aimed at helping inventors in developing countries to file patents for their inventions.

      The “first-of-its kind” programme, in cooperation with the World Economic Forum, will see patent attorneys provide pro bono help.

      Following a successful pilot effort in Colombia, the Philippines and Morocco, the Inventor Assistance Program was officially launched yesterday, October 17.

10.17.16

Links 17/10/2016: JS Foundation, Ubuntu 17.04 Named ‘Zesty Zapus’

Posted in News Roundup at 6:45 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • Chromebooks: The smart person’s guide

      Chromebooks are any laptop that, under license from Google, runs the Linux kernel-based Chrome OS. Chrome OS is incredibly lightweight, drawing almost all of its interface from the Chrome browser. It also supports Chrome apps, and as of late 2016 will be the only platform to get new Chrome apps.

      Chromebooks are manufactured by a variety of vendors, such as Google, HP, Acer, Samsung, Dell, and others. They range in price from the mid $100 range to over $1,200 for the Google Pixel. Educational pricing is available as well.

  • Kernel Space

    • Linux 4.8.2

      I’m announcing the release of the 4.8.2 kernel.

      All users of the 4.8 kernel series must upgrade.

    • Linux Kernel 4.8.2 Is Out with x86 and ARM Improvements, Updated Drivers

      Today, October 16, 2016, renowned kernel developer Greg Kroah-Hartman was proud to announce the general availability of the second point release to the Linux 4.8 kernel series.

      That’s right, Linux kernel 4.8.2 is here, and it arrives a little over a week from the first maintenance update. According to the appended shortlog and the diff from Linux kernel 4.8.1, the new version changes a total of 52 files, with 487 insertions and 213 deletions. Overall, the Linux 4.8.2 kernel looks pretty small in changes with the exception of some ARM and x86 improvements, and the updated drivers.

    • Linux 4.7.8
    • Linux Kernel 4.7.8 Released with x86, ARM, and PowerPC Fixes, Updated Drivers

      Immediately after announcing the second point release of the Linux 4.8 kernel series, Greg Kroah-Hartman informed the community about the immediate availability of Linux kernel 4.7.8.

    • Linux 4.4.25
    • Linux Kernel 4.4.25 LTS Is a Small Update with PowerPC, ARM, and x86 Changes

      After informing us of the release of Linux kernel 4.8.2 and Linux kernel 4.7.8, Greg Kroah-Hartman announced the twenty-fifth maintenance update to the long-term supported Linux 4.4 kernel series.

    • Linus Torvalds Announces the First Release Candidate of Linux Kernel 4.9

      The first Release Candidate (RC) snapshot of the Linux 4.9 kernel was announced by Linus Torvalds on October 15, 2016, which means that the merge window is now close and development was begun.

      According to Linus Torvalds, the Linux kernel 4.9 merge window was pretty big and that’s why we’re seeing the first Release Candidate build a day earlier than expected. Another reason for shipping the RC1 earlier is to not encourage kernel developers to send in last-minute pull requests.

    • The Exciting Features Of The Linux 4.9 Kernel

      This weekend was the release of Linux 4.9-rc1 to mark the end of the 4.9 kernel merge window. As such, here’s our usual feature overview recapping all of the changes to Linux 4.9 that have us excited about the next version of this open-source kernel.

      Some of the highlights include AMDGPU GCN 1.0 experimental support, memory protection keys support, mainline support for the LG Nexus 5 and Raspberry Pi Zero (along with a lot of other ARM hardware), the Greybus subsystem was added, support for vmapped stacks, and many other additions.

    • Linux Foundation whacks open JavaScript projects umbrella

      A project fostering JavaScript’s panoply of projects has been established by the Linux Foundation.

      The JS Foundation will cultivate JavaScript application and server-side projects. The thinking is to create a centre that drives broad adoption and development of JavaScript technologies and that fosters collaboration. It should help devs and tools builders make sense of the rapid pace of change.

      The focus on standardization and mentoring, JS Foundation executive director Kris Borchers told the Open Source Business Conference in London on Monday. The Linux Foundation and Node.JS will, in particular, work to advance the JavaScript language through bodies such as ECMA TC39 and the W3C.

    • StackPath Supports JavaScript Developers as Founding Member of JS Foundation
    • JavaScript Grows Up and Gets Its Own Foundation
    • Appium joins the JS Foundation
    • Linux Foundation Launches JS Foundation
    • The Linux Foundation Unites JavaScript Community for Open Web Development
    • Node-RED moves to the JS Foundation, making STEM great again, and Blockly for iOS developer preview—SD Times news digest: Oct. 17, 2016
    • The JS Foundation forms to help javascript and servers play nicer together
    • JavaScript projects regroup under a new foundation
    • The Linux Foundation takes on the JavaScript community with the JS Foundation

      The Linux Foundation is giving JavaScript projects a new home. The company announced the JS Foundation is now a Linux Foundation Project. The JS Foundation was designed to foster JavaScript applications and server-side projects by providing best practices and policies.

      “The Linux Foundation’s primary mission is to create the world’s largest shared technology investment,” said Kris Borchers, executive director of the JS Foundation. “JavaScript is an extremely important programming language, which has seen numerous open-source projects arise around it. Many of these projects are essential to the infrastructure of the Internet, so the Linux Foundation feels it is important to ensure they have structured support and neutral governance to ensure their stability, which is why the JS Foundation is being formed.”

    • Meet ‘The Other Linux Logo’, A Modern Take on Tux

      When you look at Tux, the Linux mascot, what do you see? Do you see a penguin? Do you see a project? Or do you see something that’s dated and in need of a revamp? If it’s the latter then check out a modern reinterpretation of the famous penguin notify by designer Ecogex…

    • Graphics Stack

      • Mesa Benchmarks Post-ReZ RadeonSI Change, Another Game Jumps Up By ~20%

        Earlier this week was a discovery of a “serious performance fix” For the RadeonSI Gallium3D driver by disabling ReZ. That change landed in Mesa Git already so I ran some before/after benchmarks.

        The discovery by AMD’s Marek Olšák was described by him as luck and the small patch to disable ReZ ended up boosting the DIRT Showdown performance by about 15%. In my before/after benchmarks, unfortunately, the game wasn’t working for me on my system with its open-source driver stack… When loading the DiRT Showdown test profile as usual via the Phoronix Test Suite, the game would end up getting hung on the loading screen. Didn’t have that problem a few months back on RadeonSI last time I tried.

    • Benchmarks

      • Dota 2 Radeon OpenGL vs. Vulkan Performance With Mesa Git, Linux 4.9-rc1

        Now that the RADV Radeon Vulkan driver has landed in Mesa Git and Linux 4.9-rc1 is out, I figured it was time for some fresh benchmarks of the Radeon Vulkan driver against the RadeonSI Gallium3D OpenGL driver. Here is the first of that new data.

        For some Sunday benchmarking fun was testing RADV Vulkan vs. RadeonSI OpenGL for Dota 2, the best Vulkan benchmark on Linux to date. In addition to looking at the latest performance results, the Phoronix Test Suite was looking at the CPU utilization in both scenarios too (by setting the MONITOR=cpu.usage environment variable). The OpenGL vs. Vulkan tests were done at a variety of resolutions.

  • Applications

    • Calamares 2.4.2 Universal Linux Installer Supports Disabling of LUKS UI Elements

      The development team behind the Calamares universal installer framework for GNU/Linux distributions announced the second update to the Calamares 2.4 stable series.

      Calamares 2.4.2 is now the latest version of the installer, and, according to release notes, it implements support for disabling LUKS (Linux Unified Key Setup) related UI (User Interface) elements, adds support for Debian-style /etc/default/keyboard configuration as an option, improves the checking of system requirements configuration, and removes the dependency of chfn in the users module.

    • 10 Top Tools for Novelists

      Writing is one of the essential skills in modern society. Being able to communicate effectively is paramount both at work and at home. It makes your thinking visible to others, and is the main way in which work, learning, and intellect is judged by others.

      At first glance, the trusty word processor might seem a good tool for a novelist. After all, in days gone by, budding authors would tap away using a typewritter, and a word processor is the modern day equivalent. Linux has some excellent word processing software such as LibreOffice. However, word processors are actually not the ideal tool for some forms of writing, particularly novel-writing. In fact, it could be said that using a word processor for novel-writing is a recipe for disaster, and actually a retrograde step from a typewritter. Word processors are a general application software that are perfect for constructing business documents, letters, batch mailings using templates, etc. However, many word processors are too obtrusive and distracting for writers. What is needed is software that helps concentrate on the content of the novel, sketch out the chapters and scenes, work out the best structure, import research, add locations, characters and objects, and so on.

    • Lighttpd 1.4.42 Brings New Modules, Rewritten Authentication Framework

      Lighttpd 1.4.42 was released this Sunday morning as the newest version of this open-source, lightweight HTTP web-server.

      Lighttpd 1.4.42 introduces some new modules including mod_deflate, mod_geoip, and mod_uploadprogress. This release also has a rewritten auth framework that affects mod_authn_ldap, mod_authn_gssapi, and mod_authn_mysql.

    • Find Files Faster with FSearch, an ‘Everything Search Engine’ for Linux

      FSearch is a promising new file search utility for the Linux desktop, inspired by the Everything Search Engine tool for Windows.

    • Released OpenStack Newton, Moving OpenStack packages to upstream Gerrit CI/CD

      OpenStack Newton was released on the Thursday 6th of October. I was able to upload nearly all of it before the week-end, though there was a bit of hick-ups still, as I forgot to upload python-fixtures 3.0.0 to unstable, and only realized it thanks to some bug reports. As this is a build time dependency, it didn’t disrupt Sid users too much, but 38 packages wouldn’t build without it. Thanks to Santiago Vila for pointing at the issue here.

      As of writing, a lot of the Newton packages didn’t migrate to Testing yet. It’s been migrating in a very messy way. I’d love to improve this process, but I’m not sure how, if not filling RC bugs against 250 packages (which would be painful to do), so they would migrate at once.

    • Rcpp now used by 800 CRAN packages

      A moment ago, Rcpp hit another milestone: 800 packages on CRAN now depend on it (as measured by Depends, Imports and LinkingTo declarations). The graph is on the left depicts the growth of Rcpp usage over time.

      The easiest way to compute this is to use the reverse_dependencies_with_maintainers() function from a helper scripts file on CRAN. This still gets one or false positives of packages declaring a dependency but not actually containing C++ code and the like. There is also a helper function revdep() in the devtools package but it includes Suggests: which does not firmly imply usage, and hence inflates the count. I have always opted for a tighter count with corrections.

    • backup.sh opensourced

      All the authors agreed to a GPLv2+ licensing, so now it’s time for backup.sh to meet the world. It does about the simplest thing you can imagine: ssh to the server and use GNU tar to tar down every filesystem that has the “dump” bit set in fstab. Every 30 days, it does a full backup; otherwise, it does an incremental backup using GNU tar’s incremental mode (which makes sure you will also get information about file deletes). It doesn’t do inter-file diffs (so if you have huge files that change only a little bit every day, you’ll get blowup), and you can’t do single-file restores without basically scanning through all the files; tar isn’t random-access. So it doesn’t do much fancy, but it works, and it sends you a nice little email every day so you can know your backup went well. (There’s also a less frequently used mode where the backed-up server encrypts the backup using GnuPG, so you don’t even need to trust the backup server.) It really takes fifteen minutes to set up, so now there’s no excuse. :-)

    • Proprietary

    • Instructionals/Technical

    • Games

      • Inklings, a lemmings-style puzzle game is now out on Linux

        Inklings [Steam, Official Site] is an indie lemmings-style puzzle game with simple visuals, guide your Inklings to safety! This game comes from a family team of developers.

        The developer told me that himself and his brother developed it, while their mother had a hand at the level paintings.

        I’ve tested it out for a bit, as the developer sent in a key and I haven’t come across any problems. It’s quite a nice game, but it is rather simplistic visually.

      • Hyper Ultra Astronautics, a fast-paced competitive local multiplayer space arena
      • Stellar Overload, the block-based adventure FPS is now on Steam

        If you remember, I recently wrote about Stellar Overload [Steam, Official Site] and did a small preview. The good news is that the game is now available on Steam with Linux support.

        While there are a lot of these block games now, Stellar Overload at least offers up some unique features. The major one being cube shaped planets to explore. I’ve found it to be way more interesting than other blocky games.

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • Talos’s $18K Linux Workstation, KDE 1 on Modern Metal & More…

        KDE reissues KDE 1 for modern hardware: Now you can turn your latest and greatest PC or laptop into its own “way back machine” by fixing it up with KDE 1, the release that started everything “K.” It seems that the folks at KDE wanted to come up with a special gift for their supporters to celebrate the project’s 20th birthday, which was October 14, so they went to work fixing KDE 1 so it’ll run on modern metal. It might be a little work getting it up and operating properly on your machine, but I’m sure that some will find it worth it for such a retro experience. Read all about it, complete with screenshots, on the Helio Castro website.

    • GNOME Desktop/GTK

      • Nautilus 3.22.1 File Manager Improves the Batch Renaming Feature, Adds Fixes

        The popular Nautilus (Files) file manager saw its first point release for the latest 3.22 series, distributed as part of the recently announced GNOME 3.22.1 desktop environment.

        Yes, that’s right, we’re talking here about Nautilus 3.22.1, the latest, and most advanced, stable version of the file manager used in numerous GNU/Linux distributions, including the very popular Ubuntu, Fedora Workstation, openSUSE Leap and Tumbleweed, Solus, and many others.

      • gnome extensions

        In general when using Gnome I try and avoid extensions. Most of the ‘default’ setup is fine or I was able to get used to it and it works well enough. There are a few extensions I do use however for various reasons. All of these work with Wayland.

      • GNOME 3.22/KDE Plasma 5.8 release party in Brno

        Last Thursday, we organized a regular Linux Desktop Meetup in Brno and because two major desktop environments had had their releases recently we also added a release party to celebrate them.

        The meetup itself took place in the Red Hat Lab at FIT BUT (venue of GUADEC 2013) and it consisted of 4 talks. I spoke on new things in GNOME 3.22, our KDE developer Jan Grulich spoke on new things in Plasma 5.8, then Oliver Gutierrez spoke on Fleet Commander and the last talk was given by Lucie Karmova who is using Fedora as a desktop in a public organization and shared her experiences with the Linux desktop.

      • GNOME outreach flyer for local groups and events

        One of my very early contributions to GNOME was a flyer. FOSDEM 2014 was one of the first conferences I attended and with me I had brought printouts of this flyer which we handed out to people from the GNOME stand.

      • GTK4 Development Code Just Received 100+ Commits Dropping Old Stuff

        Development on the GTK+ 4.0 tool-kit continues moving along and this weekend has seen 100+ commits dropping various deprecated and outdated code.

  • Distributions

    • Top 5 Penetration Testing Linux Distributions

      There are a seemingly endless amount of Linux distros for just about every area of use. This includes pen testing, sometimes called hacking, distros. Some of you are undoubtedly familiar with, at least if you have spent any time looking around at all the distributions out there. ​

    • New Releases

      • 4MParted 20 Disk Partitioning Live CD Enters Beta Stage, Based on GParted 0.26.1

        Today, October 16, 2016, 4MLinux developer Zbigniew Konojacki informs Softpedia about the release and immediate availability of the Beta pre-release version of the upcoming 4MParted 20.0 Live CD.

        Based on the 4MLinux 20.0 operating system, which is also in the Beta stages of development, the 4MParted 20.0 disk partitioning Live CD is built around the popular and open-source GParted 0.26.1 graphical partition editor utility, which right now is the best tool for formatting, resizing, splitting, and joining disk partitions of any type.

      • ExLight Live DVD Is Now Based on Ubuntu 16.10, Ships with Enlightenment 0.20

        Today, October 16, 2016, GNU/Linux developer Arne Exton informs Softpedia about the release and immediate availability of a new, updated version of his lightweight ExLight Live DVD distribution.

        Based on the recently released Ubuntu 16.10 (Yakkety Yak) and Debian GNU/Linux 8.6 “Jessie” operating systems, ExLight Live DVD Build 161016 uses Arne Exton’s special kernel 4.8.0-21-exton, which is based on Linux kernel 4.8 (also used in Ubuntu 16.10), replacing the 4.6.0-10-exlight kernel used in previous releases of ExLight.

    • Red Hat Family

      • Red Hat finds virtualization vital for enterprise despite container competition

        Containers are hot, but virtualization adoption remains on the rise within the enterprise, according to recent Red Hat research.

        The survey of more than 900 enterprise IT pros found businesses are using virtualization to drive server consolidation, decrease provisioning time, and provide infrastructure for developers to build and deploy applications.

      • Why Red Hat’s OpenShift, not OpenStack, is making waves with developers
      • Happy 15th Birthday Red Hat Product Security

        This summer marked 15 years since we founded a dedicated Product Security team for Red Hat. While we often publish information in this blog about security technologies and vulnerabilities, we rarely give an introspection into the team itself. So I’d like, if I may, to take you on a little journey through those 15 years and call out some events that mean the most to me; particularly what’s changed and what’s stayed the same. In the coming weeks some other past and present members of the team will be giving their anecdotes and opinions too. If you have a memory of working with our team we’d love to hear about it, you can add a comment here or tweet me.

      • Red Hat Names University of Dammam as the first Red Hat Academy in Saudi Arabia

        Red Hat, Inc., the world’s leading provider of open source solutions, today announced that the University of Dammam has been signed as the first Red Hat Academy in Saudi Arabia. Starting today, the university will offer Red Hat courses and exams to up to 200 students per year, who will receive hands-on instruction, curriculum and labs, performance-based testing, and educator support.

        University of Dammam has chosen Red Hat to support its IT infrastructure and encourages students to learn in new and exciting ways. As a pre-eminent research-based institution, the University of Dammam has grown and developed through continually assessing and aiming to improve its curriculum and expand its academic capabilities across disciplines.

      • Dammam university named first Red Hat Academy in Saudi
      • Red Hat to flaunt open source technologies

        “Making true digital transformation is difficult unless organisations in the Middle East embrace central themes such as software-defined everything, hyperscale, containers and hybrid cloud,” said Lee Miles, General Manager Middle East and Africa, Red Hat. “Proprietary technology will no longer exist as a viable innovation model. Red Hat, the world’s leading provider of open source solutions, will participate in GITEX Technology Week where its focus will be on demonstrating how the company’s open source technologies are helping accelerate business transformation by enabling all these trends.”

      • Finance

      • Fedora

    • Debian Family

  • Devices/Embedded

Free Software/Open Source

  • How Building Strong Open Source Teams Is Like Raising Chickens

    Dr. Margaret Heffernan, in her LinuxCon North America keynote, tells an open source story that isn’t about software. It’s a story about chickens.

    If your organization is struggling to build teams that work well together, and it feels more like The Hunger Games than a smoothly functioning team, let the tale of the two chicken flocks show you the open source way. Dr. Heffernan tells how a reseacher used two flocks of laying hens to study how to breed more productive egg-layers. One was an average, nothing special flock, just ordinary hens. The other flock was composed of super-chickens, hens who were highly productive egg layers. The researcher bred only the most productive of the super-chickens, and did no selective breeding in the first flock.

  • Keynote: Beyond Measure: The True Power and Skill of Collaboration by Dr. Margaret Heffernan
  • Meet Hubot: The DevOps chat bot
  • Google Delivers its own Open Source Report Card

    In recent months, Google has open sourced a slew of useful tools, many of them tested and hardened in-house. They include machine learning applications, 3D visualization tools and more. Now, in a move that should be followed by other companies, Google has announced the ‘Open Source Report Card.’

    “Today we’re sharing our first Open Source Report Card, highlighting our most popular projects, sharing a few statistics and detailing some of the projects we’ve released in 2016. We’ve open sourced over 20 million lines of code to date and you can find a listing of some of our best known project releases on our website,” said Josh Simmons, from Google’s Open Source Programs Office.

  • IBM i Open Source Roadmap Finds Perl

    Support for open source development on IBM i has been a big deal for the Technology Refresh program. Just last week, with the latest TR announcement, support for Perl was added along with support for the current version of Node.js, which is v6. In previous TRs, we have seen support for programming languages like Ruby and Python, plus tools such as the GNU Compiler Collection and Git. The PHP language, the Eclipse integrated development environment, and the Apache web server are pre-TR open source advancements.

    Compared to Node.js, Python, Ruby, and PHP, there’s not much happening in terms of new application development in Perl. It was once one of the big three–Perl, Python, and PHP–recalled consultant Alan Seiden, after I emailed him to discuss open source support on i. Seiden, a PHP subject matter expert, was quick to note PHP originally was a macro language over Perl scripts in the days before PHP was rewritten in C. Perl scripts are under the covers for a ton of open source software.

  • Events

    • How a healthy developer conference budget can provide a big ROI for organizations

      At OpenStack Summit in Barcelona, Emily Hugenbruch, John Arwe, and Ji Chen will give a talk called How to lose clients and alienate coworkers: Lessons learned on an OpenStack enterprise journey. In a recent email interview, Emily, an Advisory Software Engineer and z/VM OpenStack Community Liaison at IBM, discusses the transition developers from proprietary backgrounds must make when they move onto open source projects, and she explains the big ROI on sending developers to conferences.

    • Event report: PyCon India 2016

      This time instead of per day report, I will try to write about things happened during PyCon India. This time we had the conference at JNU, in Delhi. It was nice to be back at JNU after such a long time. The other plus point was about the chance to meet ilug-delhi again.

  • Web Browsers

    • Chrome

      • Chrome Remote Desktop 53 adds remote sound support [APK Download]

        Chrome Remote Desktop is a rather obscure Google product, but that doesn’t mean it’s not useful. Once the desktop application is installed, you can control it from any Android device, iOS device, or computer (with Chrome). In my testing, it actually works extremely well, often with a lower latency than popular remote access applications like TeamViewer.

  • SaaS/Back End

  • Pseudo-Open Source (Openwashing)

  • BSD

    • OpenBGPD Large Communities

      Back in the early days of The Internet, when routers rode dinosaurs to work and nerds weren’t cool, we wanted to signal to our network neighbours certain information about routes. To be fair, we still do. But, back then everyone had 16 bit ASNs, so there was a simple concept called ‘communities’. This was a 32bit opaque value, that was traditionally split into two 16bit values. Conveniently, we were able to encode an “us” and a “them”, and perform actions based on what our neighbours told us.

      [...]

      OpenBGPD in OpenBSD -current has support for Large Communities, and this will be available in the 6.1 release and later.

  • Public Services/Government

    • Dutch govt ordered to use open standards for comms from 2017

      Government bodies in the Netherlands will have to use open technology standards for communications after next year, following a vote by the nation’s parliament.

      The requirement for open document standards has already been adopted by the Netherlands Senate, but a motion by Member of Parliament Astrid Oosenbrug has now unified the policy. She said the lower house would be the first government body to standardize around the use of Open Document Format (ODF).

      “We should set the right example,” she said. “Ironically, lower house published the adopted law on its website by providing a download link to a document in a proprietary format.”

      As part of the new legislation, the government will also promote the use of open source code across government and the private sector. Michiel Leenaars, head of the Dutch Internet Society, welcomed the move.

  • Openness/Sharing/Collaboration

  • Programming/Development

    • PHP 8.0 Likely To Have A New JIT Engine

      Zend has begun developing a new JIT (Just-In-Time) Engine for PHP and is expecting it will likely be ready for PHP 8.0.

      PHP 8.0 is still out in the distance with PHP 7.1 being what’s under development now for release in the weeks ahead while PHP8 is much further down the road. However, Zend has already begun work on a new JIT for PHP that they hope will be able to “deliver some useful results” for the next major PHP version.

    • Top software and the programming language in which they are written

      BackRub (Google’s first incarnation) was written in Java and Python. Now, Google’s front end is written in C and C++ and its famous crawlers (Spyders) were written in Python. However, the crawler kept crashing, and indexes got stale with old information, therefore Google developed a new crawler (capable of incremental index updates) written in C++.

    • ALLVM: Forthcoming Project to Ship All Software As LLVM IR

      Interest is growing around shipping software as LLVM IR and will be discussed at this year’s LLVM Developers’ Meeting.

      Various parties have been investigating using LLVM IR as the medium for shipping software while doing the final conversion on the host for execution. The aim would be to provide greater performance, security, and other benefits by the distributed software being LLVM IR.

  • Standards/Consortia

    • VK9: Still Pursuing Direct3D 9 Over Vulkan

      VK9 is the project formerly known as SchaeferGL as an open-source project implementing Direct3D 9 over Vulkan.

      It’s been a few months since originally writing about this open-source project and fortunately pleased this week to see its development continuing, albeit now under the name VK9. The developer, Christopher Schaefer, recently passed his “third milestone” with getting to the point where the geometry is correctly being passed to the render pipeline, texture loading is beginning to work, etc.

Leftovers

  • Annual Survey of American Fears Released — 2016 Edition

    The 2016 survey shows that the top 10 things Americans fear the most are:

    Corruption of government officials (same top fear as 2015)
    Terrorist attacks
    Not having enough money for the future
    Being a victim of terror
    Government restrictions on firearms and ammunition (new)
    People I love dying
    Economic or financial collapse
    Identity theft
    People I love becoming seriously ill
    The Affordable Health Care Act/”Obamacare”

  • Science

  • Health/Nutrition

    • 55 Civil Society Groups Ask US Government To Allow Export Of Affordable Version Of Prostate Cancer Drug Xtandi

      A range of 55 civil society organisations from around the world today sent a letter asking the United States Department of Health and Human Services to accept an offer from a Canadian generics company, Biolyse Pharma, to manufacture and export high-priced cancer drug Xtandi to countries with a per capita income of less than one-third that of the United States.

      The groups included Knowledge Ecology International, Public Citizen, Oxfam, NAACP, cancer and HIV/AIDS groups and “a host of other social justice, faith, patient, and consumer groups,” as described by KEI in a release.

    • EFF Co-Founder Announces Benefit Concert to Pay His Medical Bills

      Barlow’s family describes the last 18 months as a “medical incarceration” with “a dizzying array of medical events and complications” that has depleted his savings and insurance benefits. They’ve also set up a site for donations from “his fellow innovators, artists, cowboys, and partners-in-crime, to help us provide the quality of care necessary for Barlow’s recovery.”

    • The DEA Backs Off Its Kratom Ban…For Now

      The internet exploded in September when America’s Drug Enforcement Agency announced it would outlaw kratom—a mildly popular plant native to Southeast Asia. The DEA claimed the plant should be a Schedule I substance and join the ranks of heroin, Ecstasy and marijuana as a chemical with “no currently accepted medical use and a high potential for abuse.”

      Kratom is one of those weird, understudied substances headshops sell alongside salvia and fly agaric mushrooms. And much like any drug, kratom’s effects vary widely based on the user, the dose and the setting.

      Some fans describe a stimulant effect at low doses, others claim a high dose mimics opiates (a claim with some scientific backing) while still others can gobble up the powdered plant with no high whatsoever. There’s still a lot we don’t know about the drug, which is a big reason the DEA shouldn’t ban it. Marking a chemical Schedule I makes it incredibly hard to do any kind of scientific study.

    • Here’s How California Would Spend Its Expected $1 Billion in Marijuana Tax Revenue

      The Nov. 8 election can’t come quickly enough for some people — especially for supporters of California’s recreational marijuana legalization initiative, Prop 64.

      Prop 64 would legalize recreational cannabis for adults aged 21 and up and impose a 15% sales tax at the retail level on consumers. Additionally, growers would be subject to a $9.25 per ounce tax on marijuana flowers, and a $2.75 per ounce tax on cannabis leaves, at the wholesale level. If approved, cannabis research firm New Frontier estimates that marijuana sales in California could jump from $2.76 billion in 2015 (solely from medical cannabis) to $6.46 billion by 2020. This more than doubling in sales could lead to the state of California collecting more than $1 billion in annual tax and licensing revenue as a result.

      Early indications would suggest that Prop 64 has a good chance of passing. Nationally, Gallup puts support for marijuana in its poll at 58%, and two recent California polls from the Public Policy Institute and Field Poll/Institute for Government Studies found identical support levels for Prop 64 at 60%.

      With an approval looking likely, it’s time to consider how California plans to spend this new source of revenue.

  • Security

    • Security advisories for Monday
    • NyaDrop exploiting Internet of Things insecurity to infect Linux devices with malware

      A Linux threat known as NyaDrop is exploiting a lack of security in Internet of Things (IoT) devices to infect them with malware.

      A NyaDrop attack begins with the threat attempting to brute force the default login credentials of internet-exposed IoT device running Linux. It does so by running through its list of stored usernames and passwords, a collection which is no doubt similar to that of the Mirai botnet.

    • Smart cities: 5 security areas CIO should watch

      New worms designed to attach to IoT devices will emerge − and they could wreck more havoc given the extended reach of the new converged networks.

      Conficker is an example of a worm that spread on PC’s in 2008 and is still persistent and prevalent in 2016.

      Likewise, worms and viruses that can propagate from device to device can be expected to emerge – particularly with mobile and the Android operating system.

      Embedded worms will spread by leveraging and exploiting vulnerabilities in the growing IoT and mobile attack surface. The largest botnet FortiGuard labs has witnessed is in the range of 15 million PCs.

  • Defence/Aggression

    • US and Russia headed for new cold war

      Since the 1940s, every newly elected United States president has been confronted with the same foreign policy predicament: how to deal with a Russia which on some subjects could be a partner, but in almost all others remained an unbending strategic competitor.

      And so will be the case with whoever takes over the White House from Jan 20 next year: she or he will grapple with the same problem no fewer than 13 previous US leaders faced.

      But this time, the stakes are higher than they have been in decades. For Russia’s unprecedented meddling in the US electoral process presents the American authorities with an immediate challenge to which they have to provide a robust riposte. And there are few viable options apart from greater confrontation between Russia and the US. The future relationship between the two powers looks grim, the grimmest it has been in almost half a century.

    • Putin to Kremlin journalists: US is watching you
    • In Somalia, U.S. Escalates a Shadow War

      The Obama administration has intensified a clandestine war in Somalia over the past year, using Special Operations troops, airstrikes, private contractors and African allies in an escalating campaign against Islamist militants in the anarchic Horn of Africa nation.

      Hundreds of American troops now rotate through makeshift bases in Somalia, the largest military presence since the United States pulled out of the country after the “Black Hawk Down” battle in 1993.

      The Somalia campaign, as it is described by American and African officials and international monitors of the Somali conflict, is partly designed to avoid repeating that debacle, which led to the deaths of 18 American soldiers. But it carries enormous risks — including more American casualties, botched airstrikes that kill civilians and the potential for the United States to be drawn even more deeply into a troubled country that so far has stymied all efforts to fix it.

    • Imams in Germany brainwashed Berlin bomb attack plotter Jaber Albakr, says brother

      Jaber Albakr, the 22-year-old Syrian refugee recently arrested in Leipzig, Germany for planning a terror attack on Berlin, was radicalised by religious preachers, or imams, his brother has said. It is said that Albakr was linked to the Islamic State (Isis) in Syria, but his brother neither confirmed, nor denied the allegations.

      Jaber was arrested earlier in the week on suspicion of plotting to bomb a Berlin airport, but he killed himself in prison two days later.

      Alaa Albakr said his brother began showing signs of radicalisation while in Germany, where he was a refugee. “Last year he started posting jihadi videos and songs,” Alaa told Reuters over phone from the village of Sa’sa’ near Damascus.

      Alaa added that although Jaber started appearing to have been inspired by jihadists, considering his Facebook posts, he never thought his brother would indulge in violence. He also said that he failed to understand why his brother would have wanted to attack a country that had given shelter to thousands of fleeing Syrians, including himself.

    • ‘My Sister Is 16, They Married Her To 7 Men’: ISIS Crimes Against Women

      A handcuffed man sits on a dirty couch in a small room. The walls are painted a sickly, pale yellow that is even less appealing in the harsh fluorescent lighting. Two fighters and an officer clad in green camouflage stand by, watching.

      The prisoner is in his mid- to late 30s, relatively fair-skinned for an Iraqi, with curly auburn hair and light brown eyes. According to the Peshmerga, the fighting force of the Kurdistan Regional Government (KRG), he was the leader of an Islamic State intelligence unit. His jailers explain that the prisoner was responsible for interrogating people in Islamic State-held territory, trying to gather information and root out any internal dissent.

      I purposefully twirl a piece of my hair around my index finger. I am aware that the prisoner, as a member of an organization that insists on the complete submission of women, is likely fighting back fury at the sight of an unveiled woman looking at him without fear.

    • RSS root BJP leader hacked to death in Jihadi style in Bengaluru. City on Communal Fire.

      A RSS root – BJP Local Leader aged about 42-years was murdered in full public view on Sunday afternoon, right in the heart of Bengaluru city near Commercial Street, in a brazen attack that sent shivers down the spine of onlookers.

      Shops in Commercial street were forced to down shutters after RSS and BJP workers held protests on the streets, following which riot control police were deployed in the area.

      Rudresh R, a resident of Shivajinagar, was on his way home in the afternoon at about 1.30 after attending an event of the RSS, when the assailant on a bike attacked him with a knife near a Hindu temple on Kamaraj road. The attacker, who was riding pillion, slit Rudresh’s throat from behind in a copybook ISIS style, witnesses told the police.

    • Narendra Modi labels Pakistan ‘mothership of terrorism’

      In a barely concealed reference to Pakistan, the Indian prime minister accused his country’s neighbour of promoting terrorism. “Tragically the mothership of terrorism is a country in India’s neighbourhood,” Modi told a gathering in India of the heads of governments of the Brics countries – Brazil, Russia, India, China and South Africa.

      “Terror modules around the world are linked to this mothership,” he said. “This country shelters not just terrorists. It nurtures a mindset. A mindset that loudly proclaims that terrorism is justified for political gains. It is a mindset we strongly condemn. And against which we as Brics need to stand and act together. Brics must speak in one voice against this threat.”

      Sunday’s meeting in the Indian state of Goa was attended by the president of Russia, Vladimir Putin, and the president of China, Xi Jinping.

  • Environment/Energy/Wildlife/Nature

    • Clinton WikiLeaks Update: Leaked Emails Show Hillary Told Climate Change Activists To ‘Get A Life’

      At a meeting with environmentalists last year in which they probed Democratic U.S. presidential candidate Hillary Clinton on renouncing fossil fuels, the former secretary of state dismissed the activists saying they should “get a life.” The revelation came about when WikiLeaks dumped more emails from the accounts of Clinton aide John Podesta on Saturday.

      A section of Clinton’s meeting with the building trades union in September last year was made public Saturday where she said she defended natural gas and fracking “under the right circumstances.” The meeting occurred at a time when she was fighting a challenge from Vermont Sen. Bernie Sanders.

      “Bernie Sanders is getting lots of support from the most radical environmentalists because he’s out there every day bashing the Keystone pipeline. And, you know, I’m not into it for that,” Clinton said at the meeting, according to transcripts. “My view is, I want to defend natural gas. I want to defend repairing and building the pipelines we need to fuel our economy. I want to defend fracking under the right circumstances.”

    • Forest Fires Still Persist in Siak and Meranti

      Tera and Aqua satellites are monitoring five hot spots as the signs of forest and land fires in Riau.

      “Hot spots were observed at 4 o’clock,” Head of Pekanbaru Metorology, Climatology, and Geophysics Agency (BMKG) Sugarin said on Saturday (15/10).

      Sugarin mentioned that hot spots were observed in Pelalawan, Meranti, Siak, Downstream Rokan, and Upstream Indragiri, one in each area.

      Out of the detected five spots, two hot spots are confirmed to have a raging fire, which are in Siak and Meranti.

      The fire swept about 50 hectares of fire and land in Telesung and Tanjung Kedabu villages in Meranti.

    • How the changing weather affects our health

      Two months ago, I strained my neck. It’s better, but I now notice that every time it gets cold, I feel tingling all down my arm. I started joking that I had become one of those people who could “tell when it’s about to rain” because my joints hurt. Then I wondered: how does changing weather affect our health?

      Turns out, it’s not just that we’re more likely to get sick when the weather turns cold. Lots of health issues are associated with the changing of the seasons.

      First, there may be some truth to the old wives’ tale that old injuries can “tell” when it’s about to rain. As far back as 400 BC, people were complaining that the changing weather made their joints hurt, according to a paper on the relationship between weather and pain.

  • Finance

    • D.C. Hivemind Mulls How Clinton Can Pass Huge Corporate Tax Cut

      Treating the whole voting thing as a formality, serious political players are now pondering how exactly President Hillary Clinton can pass what Sen. Elizabeth Warren has called “a giant wet kiss for tax dodgers.”

      This discussion isn’t happening on television, where normal people would hear about it. Or on Reddit, where people would freak out about it. To the degree it’s taking place in public at all, it surfaces in elite publications, where only elites are paying attention.

      For instance, Peter Orszag, a top Obama economic official before he left to cash in with Citigroup, just wrote an op-ed in the Financial Times on how to make the wet kiss happen.

    • Boris Johnson takes waffling to world-beating levels

      Imagine a past where Britain ruled the world. Imagine a world where Britain no longer had to kowtow to the jackboot of the EU. Boris Johnson can do both, and he wanted to share his vision with the foreign affairs committee. “I was having lunch somewhere in the Gulf with this sheikh the other day,” he confided. And what the sheikh had told him was that the region was fed up with being abandoned to the French and was longing for some good old-fashioned colonial rule.

      “People want more Britain, not less,” he said, donning a pith helmet, “and that’s what I am going to give them. Now that we are about to be liberated from the EU, there will be no corner of the globe from which the union jack does not fly.”

    • Flash Crash trader Navinder Sarao loses US extradition appeal

      The London trader accused of spoofing the US financial markets will be extradited to stand trial in the States after losing his final appeal.

      Navinder Sarao, a 37-year-old from Hounslow, has been fighting the US authorities’ bid to extradite him since he was arrested at his home in April 2015.

      He has been charged with 22 offences that come with a maximum sentence of 380 years in total. His trading strategies, run from his bedroom in his parents’ home, generated $40m (£32m) in profits, prosecutors allege.

    • Retailers are finally realizing that starting Black Friday on Thanksgiving is a terrible idea

      Retailers have officially lost the so-called “war on Thanksgiving.”

      An increasing number of retailers are closing on Thanksgiving Day this year in response to backlash against the trend of starting Black Friday sales a day early.

      CBL & Associates, the operator of 89 regional malls and shopping centers, announced it would close 73 of its locations on Thanksgiving Day and not open until 6 a.m. on Black Friday, CNBC reported. Last year, the mall operator opened at 6 p.m. on Thanksgiving.

  • AstroTurf/Lobbying/Politics

    • Stein, Green Party running mate to campaign in Michigan

      Green Party Presidential candidate Jill Stein and her running mate Ajamu Baraka are scheduled to make campaign stops in Michigan this month, the Michigan coordinator for Stein’s campaign said Thursday.

      LuAnne Kozma said Stein will make a public campaign stop at 2 p.m. Oct. 28 at the Redford Theatre in Detroit before heading to Eastern Michigan University in Ypsilanti for a 6 p.m. event at the Bowen Field House. Both events are free.

    • Judge Nap: New FBI Docs Show ‘Bribe Offer’ to Agents in Hillary Email Probe

      Judge Andrew Napolitano said this morning that newly-released FBI documents show evidence of a bribe being offered by a senior State Department official to FBI agents.

      Patrick F. Kennedy, the undersecretary of state for management, is reported to have pressured FBI agents to change the classification on sensitive documents found on Hillary Clinton’s private email server.

      The new revelations were contained in just-released FBI interview summaries from the Clinton email investigation.

    • Journalists shower Hillary Clinton with campaign cash

      New Yorker television critic Emily Nussbaum, a newly minted Pulitzer Prize winner, spent the Republican National Convention pen-pricking presidential nominee Donald Trump as a misogynist shyster running an “ugly and xenophobic campaign.”

      What Nussbaum didn’t disclose in her dispatches: she contributed $250 to Democrat Hillary Clinton in April.

      On the nation’s left coast, Les Waldron, an Emmy Award-winning assignment editor at television station KFMB, the CBS affiliate in San Diego, swung right in July, shooting $28 to Trump.

      And Carole Simpson, a former ABC “World News Tonight” anchor who in 1992 became the first African-American woman to moderate a presidential debate, is not moderate about her personal politics: the current Emerson College distinguished journalist-in-residence and regular TV news guest has given Clinton $2,800.

    • Pressure Cited Against Marking Clinton E-Mails Classified

      A State Department team responsible for determining which records should be kept secret felt “immense pressure” not to label any of about 300 e-mails found on Hillary Clinton’s private e-mail server as classified, according to interview summaries released by the FBI.

      Officials from the State Department’s Information Programs and Services office began a review in March 2015 of 296 e-mails that were set to be turned over to a House committee investigating the 2012 attacks in Benghazi, Libya.

      “IPS felt immense pressure to complete the review quickly and not label anything as classified,” according to interview notes from a State Department official whose name was redacted from the FBI summary.

      The Federal Bureau of Investigation on Monday released 100 pages of redacted interview notes, known as 302s, the latest batch of summaries made public from its inquiry into Clinton’s use of private e-mail for official business while secretary of state. She has called using the private system a “mistake,” but her Republican opponent Donald Trump has said it’s a crime and told her in the second presidential debate that “you’d be in jail” if he wins on Nov. 8.

    • The Press Buries Hillary Clinton’s Sins

      If average voters turned on the TV for five minutes this week, chances are they know that Donald Trump made lewd remarks a decade ago and now stands accused of groping women.

      But even if average voters had the TV on 24/7, they still probably haven’t heard the news about Hillary Clinton: That the nation now has proof of pretty much everything she has been accused of.

    • The Clinton Foundation left a toxic legacy in Colombia

      Hillary Clinton has long said she is “very proud” of the Clinton Foundation’s work, but many of its beneficiaries in Colombia wonder why.

      Since Bill Clinton established the foundation in the late 1990s, with help over the years from Hillary and daughter Chelsea, the nonprofit “global philanthropic empire” has raised roughly $2 billion from foreign governments and various wealthy donors to tackle global development and health problems. While intense media scrutiny has focused on the foundation’s donations and its use of that money – partly because of the wealth of available information on its vast financial intake – little sustained attention has been dedicated to its accomplishments on the ground.

    • Glenn Greenwald: WikiLeaks Emails Clearly Show Serious Media Impropriety

      Glenn Greenwald joined Brian Stelter on CNN this morning to discuss the “serious impropriety” between the media and Team Clinton, as shown in the WikiLeaks emails.

      Greenwald, who personally doesn’t agree with WikiLeaks’ “dump everything” approach to transparency, still thinks not only is it ethical to report on the leaks, but it would be “incredibly unethical” if journalists didn’t.

      Stelter asked if anything shows serious “media collusion.” Greenwald said that while there’s some normal back-and-forth communications there people might be exaggerating, there is “serious impropriety” in there. And while on CNN, he cited as his chief example the mess that Donna Brazile and CNN have gotten into over an apparently-leaked town hall question to Team Clinton.

    • Stein addresses immigration, police issues, Middle East

      An overflow crowd of about more than 300 cheered for Green Party candidate Jill Stein as she spoke about various topics, including immigration, U.S. policy in the Middle East and people killed by police during a rally at Cafe Mayapan in South El Paso.

      “Don’t be fooled by the lesser evil. Don’t think for a moment that you have to drink that Kool-Aid,” Stein said.

      There is a need for a third party because of the influence by big money donors over the Republican and Democratic parties, said Stein who took shots at Democrat Hillary Clinton, Republican Donald Trump and Libertarian Gary Johnson.

      Stein’s visit was the first to El Paso by a candidate for president during the current election season. Election Day is Nov. 8.

    • New WikiLeaks emails show influence of Univision chairman in Clinton campaign

      The clashes between presidential candidate Donald Trump and the Spanish-language Univision television network began within days of Trump’s announcement last year that he was seeking the Republican nomination.

      Now, a series of emails pirated from the Democratic National Committee and published in the past week by the anti-secrecy website WikiLeaks show that within days of Trump’s June 16, 2015, announcement of his candidacy, Univision’s chairman, Haim Saban, was urging the Clinton campaign to take a tougher stance on Trump’s anti-immigrant agenda.

      “Haim thinks we are underreacting to Trump/Hispanics. Thinks we can get something by standing up for Latinos or attacking R’s (Republicans) for not condemning,” Clinton campaign Chairman John Podesta wrote July 3, 2015, in an email to other Clinton staffers.

    • Fears mount on Trump’s ‘rigged election’ rhetoric

      Donald Trump is laying the groundwork to lose on Nov. 8, refuse to concede the election, and teeter the country into an unprecedented crisis of faith in government. Republicans and Democrats, in Washington and beyond, fear that the aftermath of the 2016 election will create a festering infection in the already deep and lasting wound that the campaign is leaving on America.

      And, they say, only Republican leaders who speak up will have any chance of stopping it.

      “Polls close, but can you believe I lost large numbers of women voters based on made up events THAT NEVER HAPPENED. Media rigging election!” Trump tweeted Sunday morning in response to the latest round of numbers showing him behind.

    • Report: Tech investor Peter Thiel will donate $1.25M to Trump campaign

      Silicon Valley heavyweight Peter Thiel will soon cement his place as one of Donald Trump’s biggest financial supporters. The New York Times reported last night that the billionaire venture capitalist, who co-founded PayPal, will donate $1.25 million to Trump’s Presidential campaign.

      According to the report, part of the money will go to a pro-Trump Super PAC, while some will go directly to the campaign. Thiel declined to comment on the donation, which was sourced to “a person close to” Thiel.

      Saying that Trump’s support in Silicon Valley is slim would be an understatement. Thiel, who spoke at the Republican National Convention in July, is practically the only high-profile tech personality who has come out in support of Trump.

    • The growing list of women who have stepped forward to accuse Trump of touching them inappropriately

      Republican presidential nominee Donald Trump told CNN anchor Anderson Cooper at the second presidential debate on Oct. 9 that he had never touched women without their consent. The comment came after The Washington Post published a video of Trump bragging to “Access Hollywood” host Billy Bush in 2005 that he could kiss and grope women without their permission because he was a celebrity.

      “Have you ever done those things?” Cooper asked at the debate. “I will tell you: No, I have not,” Trump responded.

      Since then, a series of women have come forward to accuse Trump of inappropriately touching or kissing them without their permission. Trump has denied the allegations. In a Saturday morning tweet, he called them “100% fabricated and made-up charges, pushed strongly by the media and the Clinton Campaign,” warning that they “may poison the minds of the American Voter.”

  • Censorship/Free Speech

    • BBFC Appointed Censorship Role Over Websites, Porn, Adult Content

      The British Board of Film Classification has been appointed arbiter over adult content viewed by U.K., citizens via the internet. This comes after the BBFC signed an agreement with the U.K., government for the 2016 Digital Economy Bill, where the appointment of arbitration was granted to the classification board.

      The news was reported recently by Xbiz.com after the bill was weighed in on by the U.K., Parliament in a recent committee hearing that you can view over on the official Parliament website. The article explains that the BBFC will be monitoring local and foreign sites that may contain content for those 18 years of age and older, and will ensure that these sites have appropriate age gates for accessing said content.

    • ‘Maybe I said something wrong’: Putin mocks US surveillance during presser power blackout
    • The NSA’s Far Reach? Power Fails After Putin ‘Said Something Wrong’ (VIDEO)
    • Internet censorship: making the hidden visible

      Despite being founded on ideals of freedom and openness, censorship on the internet is rampant, with more than 60 countries engaging in some form of state-sponsored censorship. A research project at the University of Cambridge is aiming to uncover the scale of this censorship, and to understand how it affects users and publishers of information.

    • Flying the Isis flag is legal, Sweden declares

      Flying the Isis flag in Sweden is not illegal and cannot be considered an incitement to racial hatred, according to a Swedish prosecutor.

      A 23-year-old man from Laholm has avoided prosecution after he allegedly posted a picture of himself with the Isis flag as his Facebook profile photo.

      The photo was reported to the police in March and the men was investigated for incitement to racial hatred. The man, originally from Syria, denied the charges.

      He said he is not a supporter of Isis and claimed the flag has been used as a symbol of Islam for hundreds of years and then abused by Isis, his defence attorney Bjorn Nilsson told the Swedish newspaper Hallandsposten.

    • Germany threatens Facebook with hate speech law

      The threat from Volker Kauder, a key member of Chancellor Angela Merkel’s party, follows a similar warning by Justice Minister Heiko Maas, in a growing sign of German politicians’ frustration with such websites.

      “The time for round-tables is over. I’ve run out of patience,” said Volker Kauder, chairman of the Christian Democratic Union’s parliamentary group.

      Facebook and Twitter have seen a rise in anti-migrant commentary in Europe’s biggest economy, as public misgivings grow in some corners over the almost 900,000 asylum seekers who arrived last year.

  • Privacy/Surveillance

    • ACLU Dumps Docs On Social Media Monitoring Firm Geofeedia; Social Media Platforms Respond By Dumping Geofeedia

      Surveilling citizens engaged in First Amendment-protected activity? That’s just how Geofeedia rolls.

      Records obtained by the ACLU show the private company pitched its “firehose” connection to Facebook, Twitter, and Instagram as a way to monitor the situation in Ferguson (during the 2014 protests) and “stay one step ahead of the rioters.”

      Geofeedia itself didn’t do anything illegal. It simply provided a one-stop shop for social media monitoring of public posts. It’s the way it was pitched that was a problem. Rather than sell it as a way to keep law enforcement informed of criminal activity, its sales team highlighted its usefulness in monitoring protestors and other First Amendment activity.

      The documents the ACLU obtained show the company paid these three social media services for “firehose” attachments — beefed-up API calls that allowed Geofeedia to access more public posts faster than law enforcement could do on its own.

    • Two More Courts Find In Favor Of The FBI And Its NIT Warrant; No Suppression Granted

      Two more rulings on suppression motions in FBI Playpen cases have been handed down. (h/t Riana Pfefferkorn) The ruling [PDF] in Tennessee agrees with the defendant that the FBI’s NIT warrant exceeded Rule 41 jurisdiction limits. The following quotes are from the more substantive “Report and Recommendation” [PDF] by the magistrate judge, which has been adopted by the court overseeing the criminal trial.

    • UK surveillance agencies illegally kept data on British citizens’ communications, spying court finds
    • UK security agencies unlawfully collected data for 17 years, court rules

      British security agencies have secretly and unlawfully collected massive volumes of confidential personal data, including financial information, on citizens for more than a decade, senior judges have ruled.

      The investigatory powers tribunal, which is the only court that hears complaints against MI5, MI6 and GCHQ, said the security services operated an illegal regime to collect vast amounts of communications data, tracking individual phone and web use and other confidential personal information, without adequate safeguards or supervision for 17 years.

      Privacy campaigners described the ruling as “one of the most significant indictments of the secret use of the government’s mass surveillance powers” since Edward Snowden first began exposing the extent of British and American state digital surveillance of citizens in 2013.

      The tribunal said the regime governing the collection of bulk communications data (BCD) – the who, where, when and what of personal phone and web communications – failed to comply with article 8 protecting the right to privacy of the European convention of human rights (ECHR) between 1998, when it started, and 4 November 2015, when it was made public.

    • UK Tribunal Says Spy Agencies Illegally Collected Communications Data In Bulk For More Than A Decade

      This ruling comes at a particularly opportune time — just as the UK government is putting the finishing touches on another investigatory powers bill: the so-called Snooper’s Charter. But not necessarily because this will deter GCHQ from further bulk data collections. In fact, the ruling may give pro-surveillance politicians a better idea of how to make future collections stand up to legal challenges.

      On the other hand, the tribunal’s examination of the case uncovered some interesting statements by agency insiders who rather presciently noted the press would have a field day if information about the programs were ever made public. (The statement also shows the agency was prepared to head off backlash by questioning the media’s truthiness.)

    • Hillary Clinton’s Staff Recognize She Doesn’t Understand Encryption And Is Supporting ‘The Impossible’

      Teddy Goff, a political strategist and the digital director for Obama for America during the 2012 campaign, responds, calling it “a solid B/B+” and suggests that someone tell Clinton never to use the Manhattan Project line again. He also highlights the point that Ben Scott had raised a month earlier, and that it was clear that Clinton did not understand, that there is open source encryption out there that anyone can use already, and any attempt to backdoor proprietary encryption won’t stop anyone from using those other solutions. Finally, he suggests that having “pledged not to mandate backdoors” will be useful going forward.

    • CIA threatens cyber attacks against Russia [Ed: corrected URL]
    • Unicorn Wrangling 101: What is a Backdoor?

      There is an obviously bolted-on piece of code whose sole purpose is to provide some type of access (remote or otherwise) to an attacker. This is your traditional backdoor, it could come in the form of an extra program or app that is installed that allows a bad guy to function on the system. This is usually considered real-time remote access – many of your traditional rootkits fit into this category – but it could allow for special access if the bad guy is holding the device in their hands. Of course the more obvious the backdoor, the easier it is to spot, and the more likely forensics could trace back and identify the attacker.

    • Self-destructing messages don’t protect against the recipient – that was never the point

      This week, Signal finally introduced self-destructing messages. Regrettably, many seem to miss the point of what they’re for. The point of a self-destructing message is not to protect against the recipient, it’s to protect the message from being read by somebody else than the recipient much later if the device is lost, seized, or otherwise compromised.

      Signal has long been the go-to secure messaging for privacy activists – for long enough that I used to recommend it as TextSecure and RedPhone, before it merged to one app and changed names to Signal. The one lacking feature has been self-destructing messages, which is why I used Telegram in the most sensitive of environments, despite Telegram’s encryption being significantly weaker and not entirely best practice.

      But as of last week, Signal finally added self-destructing messages. Unfortunately, most people seem to be missing the point as to their immense value, and even the Signal pages talk of “data hygiene” and a way to “keep message history tidy”, as if the self-destruct was mostly about not cluttering your phone memory with old messages.

    • Even Clinton’s Aides Think She’s Wrong About Encryption

      As someone who has had the privilege of their emails being a part of the massive Wikileaks dump culled from the personal email account of Hillary Clinton’s campaign chair John Podesta, the Democratic nominee’s position on information security is a subject near and dear to my heart. Unfortunately, the very fact that hack happened and the emails contained so much sensitive info is pretty strong evidence that the Clinton campaign’s infosec policies are—how should I put this—not good. Or to put it another way, they are bad.

      But you don’t have to take my word for it: as the leaked emails show, even Clinton’s top tech policy advisors cringed when she started talking crypto at the Democratic debate last December.

      Things took a turn for the worse for Clinton when the debate moderator Martha Raddatz asked Clinton about her opinion on that pesky new “terrorist tool” known as encryption. In response to Raddatz’s question about whether she would make a law that would force Apple CEO Tim Cook to make a key enabling government access to encrypted information, Clinton said she “would not want to go to that point.”

      She probably should have left it at that, but instead she continued on, envisioning a “Manhattan-like project” that would see government and industry partnering to create back doors allowing access to encrypted info. What this secure encryption standard that has fundamental insecurities built into it would look like is left a mystery, however.

    • Feds Walk Into A Building. Demand Everyone’s Fingerprints To Open Phones

      In what’s believed to be an unprecedented attempt to bypass the security of Apple iPhones, or any smartphone that uses fingerprints to unlock, California’s top cops asked to enter a residence and force anyone inside to use their biometric information to open their mobile devices.

      FORBES found a court filing, dated May 9 2016, in which the Department of Justice sought to search a Lancaster, California, property. But there was a more remarkable aspect of the search, as pointed out in the memorandum: “authorization to depress the fingerprints and thumbprints of every person who is located at the SUBJECT PREMISES during the execution of the search and who is reasonably believed by law enforcement to be the user of a fingerprint sensor-enabled device that is located at the SUBJECT PREMISES and falls within the scope of the warrant.” The warrant was not available to the public, nor were other documents related to the case.

      According to the memorandum, signed off by U.S. attorney for the Central District of California Eileen Decker, the government asked for even more than just fingerprints: “While the government does not know ahead of time the identity of every digital device or fingerprint (or indeed, every other piece of evidence) that it will find in the search, it has demonstrated probable cause that evidence may exist at the search location, and needs the ability to gain access to those devices and maintain that access to search them. For that reason, the warrant authorizes the seizure of ‘passwords, encryption keys, and other access devices that may be necessary to access the device,’” the document read.

    • Freed From Gag Order, Google Reveals It Received Secret FBI Subpoena

      Google revealed Wednesday it had been released from an FBI gag order that came with a secret demand for its customers’ personal information.

      The FBI secret subpoena, known as a national security letter, does not require a court approval. Investigators simply need to clear a low internal bar demonstrating that the information is “relevant to an authorized investigation to protect against international terrorism or clandestine intelligence activities.”

      The national security letter issued to Google was mentioned without fanfare in Google’s latest bi-annual transparency report, which includes information on government requests for data the company received from around the world in the first half of 2016.

      Google received the secret subpoena in first half of 2015, according to the report.

      An accompanying blog post titled “Building on Surveillance Reform,” also identified new countries that made requests — Algeria, Belarus, and Saudi Arabia among them — and reveals that Google saw an increase in requests made under the Foreign Intelligence Surveillance Act.

    • GCHQ branded as “barbaric” by Oscar-winning director Oliver Stone at Cheltenham Literature Festival

      Oscar-winning director Oliver Stone launched an extraordinary attack on GCHQ while appearing at the Cheltenham Literature Festival tonight.

      The JFK, Platoon and Wall Street director was speaking in the Town Hall to promote a book, The Oliver Stone Experience, about his many award-winning movies.

      And after a bit of joking along the lines of ‘GCHQ is listening’ from host Mark Lawson, Stone said:”GCHQ is one of the most barbaric agencies around, very cold, very smart.

      “And likely to arrest anybody at any time, on any thing on any cause. So hello!”

      [...]

      He then referenced how editors from The Guardian destroyed computers used to store leaked documents from Edward Snowden, the National Security Agency whistleblower while being watch by GCHQ staff.

    • Yahoo Email Surveillance: the Next Front in the Fight Against Mass Surveillance

      In a bombshell published today, Reuters is reporting that, in 2015, Yahoo complied with an order it received from the U.S. government to search all of its users’ incoming emails, in real time.

      There’s still much that we don’t know at this point, but if the report is accurate, it represents a new—and dangerous—expansion of the government’s mass surveillance techniques.

      This isn’t the first time the U.S. government has been caught conducting unconstitutional mass surveillance of Internet communications in real time. The NSA’s Upstream surveillance program—the program at the heart of our ongoing lawsuit Jewel v. NSA—bears some resemblance to the surveillance technique described in the Reuters report. In both cases, the government compels providers to scan the contents of communications as they pass through the providers’ networks, searching the full contents of the communications for targeted “selectors,” such as email addresses, phone numbers, or malware “cybersignatures.”

  • Civil Rights/Policing

    • Wikileaks Activates “Contingency Plans” After Unknown “State Party” Cuts Julian Assange’s Internet Connection

      There was little actual detail, aside from a subsequent tweet in which WikiLeaks called on the public to support it by donating.

      Previously on Sunday, there was concern about Assange’s well-being when Wikileaks tweeted out what some suggested were the “dead man keys” that are allegedly the encryption codes for highly damaging secret documents to be uneviled in the case of Assange’s death.

      [...]

      Even former outspoken Trump advisor Roger Stone got involved tweeting that “John Kerry has threatened the Ecuadorian President with “grave consequences for Equador” if Assange is not silenced” adding that “Reports the Brits storm the Ecuadorian Embassy tonite while Kerry demands the UK revoke their diplomatic status so Assange can be seized.”

    • WikiLeaks Just DUMPED EVERYTHING – This is HUGE – Historic Activity by Wikileaks – Read and Share before it is taken down!

      It appears Wikileaks has signalled all operatives to take measures to protect themselves. Guccifer 2.0 has indicated he is ready for the next release. Looks like Podesta 10 is still coming, but possibly just late.

      Also developing story, RT Media’s Bank Accounts Closed in the UK (Suspected close ties to Wikileaks? or Propaganda we don’t know, will start new article on that story soon.)

    • RT: NatWest to close Russian channel’s UK bank accounts

      NatWest bank has frozen the accounts of Russia’s state-run broadcaster RT, its editor-in-chief says.

      Margarita Simonyan tweeted: “They’ve closed our accounts in Britain. All our accounts. ‘The decision is not subject to review.’ Praise be to freedom of speech!”

      An MP from Russia’s ruling party has said the country’s Parliament will “demand an explanation” from the UK.

      RT says the bank gave no explanation for its decision.

      It said the entire Royal Bank of Scotland Group, of which NatWest is part, was refusing to service RT.

    • Former general charged with false statements in leak probe

      Retired Marine Gen. James Cartwright has been charged with making false statements during a federal investigation into a leak of classified information, the Justice Department announced Monday.

      Cartwright, a former vice chairman of the Joint Chiefs of Staff, falsely told investigators that he was not the source of classified information contained in a book by New York Times journalist David Sanger, according to charging documents unsealed by prosecutors.

      Neither the book nor the classified subject is identified in court papers. But Sanger has written in his book, “Confront and Conceal,” about a covert cyberattack on Iran’s nuclear facilities and the use of a computer virus called Stuxnet to temporarily disable centrifuges that the Iranians were using to enrich uranium.

      The charging documents also say Cartwright misled prosecutors about classified information shared with another journalist, Daniel Klaidman.

      The U.S. Attorney’s Office in Maryland announced the case on Monday.

    • Ex-Joint Chiefs vice chairman charged with lying in leak investigation

      Retired Marine Gen. James Cartwright, the former Joint Chiefs vice chairman, has been charged with making false statements in an investigation into the leaking of classified information about Iran’s nuclear program.

      Cartwright, who also led the U.S. Strategic Command and was known to have a close relationship with President Barack Obama, was the subject of a federal investigation into the leaking of details of a reported joint U.S.-Israeli cyberattack targeting Iran’s nuclear program.

    • ‘Obama’s General’ Charged With Leaking Classified Info to Journalists

      Retired Marine Gen. James Cartwright, once considered one of President Obama’s favorite generals, has been charged with lying to federal investigators about revealing classified information to two journalists, including a New York Times reporter who wrote about a highly-classified U.S. cyberattack against Iran’s nuclear program.

      Cartwright is due in a Washington, D.C., courtroom at 3 PM, where he can be expected to plead guilty to one count of making false statements as described in a so-called criminal information filed with the court on Thursday. Such documents are prepared with a defendant’s knowledge and cooperation.

      The charges weren’t exactly a surprise. Cartwright has known for more than three years that he was the target of an investigation into who leaked details about the so-called Stuxnet computer virus, which the United States used to destroy centrifuges inside an Iranian nuclear enrichment facility in 2008 and 2009.

      But notably, Cartwright who previously served as vice chairman of the Joint Chiefs of Staff, is the only person to have been charged with leaking information about the highly classified program, even though it’s clear from various books and articles that he wasn’t the only source of information about it. Times reporter David Sanger revealed the operation and wrote about it extensively in his book, Confront and Conceal.

    • Protest winds down at Morton County Courthouse

      Police officers arrested one person as a protest winds down outside the Morton County Courthouse after a judge dismissed a complaint against Democracy Now journalist Amy Goodman, who reported on a clash between pipeline protesters and private security in September.

      Police ordered about 200 people to stay out of the road. Officers with batons were lined up outside the courthouse. As protesters left, some thanked officers.

      Goodman’s attorney, Tom Dickson told the crowd Judge John Grinsteiner did not find probable cause in a riot charge against Goodman. The case was dismissed.

    • Prosecutors Changing Charges Against Reporter To ‘Rioting’ Because Her Coverage Was Sympathetic To Protestors

      On Friday, we wrote about the ridiculous arrest warrant for reporter Amy Goodman for reporting on the protests over the North Dakota oil pipeline. At the time, the charges against Goodman were apparently for trespassing, but late on Friday, the state’s attorney alerted Goodman’s lawyer that they were now actually trying to charge her with rioting. Say what?

    • Breaking: ND Prosecutor Seeks “Riot” Charges Against Amy Goodman For Reporting On Pipeline Protest
    • Democracy Now reporter to return to state to face charges

      A journalist facing criminal charges after reporting on a clash between private security and protesters at a Dakota Access Pipeline protest will return to North Dakota within the next week to face the accusations, said Tom Dickson, the Bismarck-based attorney representing Amy Goodman, of Democracy Now.

  • Intellectual Monopolies

EPO Updates: Battistelli in Trouble, Grossenbacher and Battistelli Having a Fight, EPO Doubles Down on Željko Topić

Posted in Europe, Patents at 4:07 am by Dr. Roy Schestowitz

EPO Getaway Vehicle, Baaderstrasse

EPO Getaway Vehicle, Baaderstrasse

Summary: Interesting updates from the European Patent Office (EPO), where things have taken a turn for the worse for Battistelli while Željko Topić secures an extension of his notorious contract

Another EPO demonstration has ended (there were two last week) and more news is starting to trickle in (during the weekend and the start of this week). This is a roundup of items sent to us by readers.

No Right to Remain Silent in Eponia?

“God complex has no place in such an institution.”“The document CA/52/16 Rev. 1 (page 5/20, 27.),” according to a reader remarking on this post of ours, “reveals part of the reasoning ‘Blatterstelli’ used to defend his position that EPO staff should not have the right to remain silent when being investigated. The reasoning is indeed plain wrong. See the 2nd but last comment…”

“Battistelli Into a Corner”

“We followed the recent series of TechRights postings about the October meeting of the EPO Administrative Council with interest,” another reader told us.

“There were some hopeful signs during that meeting,” the reader continued. “The Administrative Council more or less pushed Battistelli into a corner with his latest “reform” proposals for the internal EPO Stasi causing him to throw a “hissy fit” and withdraw these proposals for amendment until December.

The overall sentiment we have come across (based on information we could not publish either way, for safety of our sources) is that the meeting was one Battistelli would rather forget. God complex has no place in such an institution.

“Rumours that Battistelli Has Made Unsuccessful Approaches to the Swiss Government to Have Grossenbacher Removed as Head of the Swiss Delegation.”

Last night we wrote about Roland Grossenbacher, who we understand has historically been close to Battistelli. Well, that may no longer be the case.

“Predictable behaviour from a Nicolas Sarkozy ally?”“It is even reported that his longtime ally Grossenbacher turned against him during this debate,” a source told us. “In fact some reliable internal sources claim that Grossenbacher has become openly critical of Battistelli in recent times and that relations between the two have soured to the point where Battistelli regrets having declared Grossenbacher as “honorary Chairman” of the Council back in 2009 when Battistelli himself was the Chairman. There are even rumours that Battistelli has made unsuccessful approaches to the Swiss government to have Grossenbacher removed as head of the Swiss delegation. Grossenbacher is officially retired as Director of the Swiss national IP Office but he still continues as head of the Swiss delegation to the EPO. If the rumours that Grossenbacher has really has turned against Battistelli are true then we could be in for a duel of the silverback “alpha males” at the next meeting of the Administrative Council in December.”

We previously heard of Battistelli trying to remove other heads of delegations and reportedly 'buying' them too. Predictable behaviour from a Nicolas Sarkozy ally? Do we want a patent office that’s as stigmatised (or corrupt) as political parties?

Željko Topić Gets Awarded

“Despite the hopeful signs which emerged during the last meeting,” a source told us, “there were also some details which are likely to have escaped the casual observer but which EPO insiders have seen as a signal that Battistelli is still able to get his way with Council on personnel issues. Although not yet officially announced, it has been reported by sources close to several delegations that two key members of Team Battistelli managed to get their contracts renewed due to persistent and intense lobbying by “Il Duce”. These were the Vice-Presidents Alberto Casado Cerviño and Željko Topić.

“Do we want a patent office that’s as stigmatised (or corrupt) as political parties?”“After the Council meeting finished the Presidential getaway car with its CD “Corps Diplomatique” plate was seen parked in the Baaderstrasse just around the corner from the EPO headquarters (see photo above) where the chauffeur patiently waited for his master who was rumoured to have gone for a slap-up meal with his Vice-Presidents to celebrate the prolongation of their terms.

“The reported extension of the contracts for the Vice-Presidents seems to be a good occasion for an update about the beneficiaries, Alberto Casado Cerviño and Željko Topić.”

We wrote about this back in May. It sure looks as though EPO management isn’t genuinely interested in repairing its reputation.

10.16.16

EPO Social Conference Another Example of Astronomical Waste of Money by Benoît Battistelli

Posted in Deception, Europe, Patents at 3:39 pm by Dr. Roy Schestowitz

‘Buying’ or paying for the ‘truth’ (exactly the opposite) is the latest stunt or modus operandi from this chronic liar

Battistelli liar
Source (original): Rospatent

Summary: Having paid the media and attempted to scare/intimidate staff into silence (even among one another), Battistelli now pays some firms to lie for him and present the lies while staff representatives are blocked from entering the presentation

THE EPO is wasting money — at the command of Benoît Battistelli — on all sorts of controversial lobbying events (at times grooming fraudsters), PR agencies, private spy agencies, media “partners” (this means paid-for press coverage), and lots of horrible things that each in its own right should be a scandal. Battistelli is now faking 'facts' (for a fee), trying to make up an illusion of social harmony at the Office and then setting up a so-called ‘Social Conference’ by which to disseminate the lies [1, 2].

“Battistelli is an autocrat that nobody is permitted to criticise.”How does Battistelli get to keep his job?

Well, look who ‘oversees’ him. Battistelli is an autocrat that nobody is permitted to criticise.

The EPO Social Conference “is gone. It is done. It is time to bury it because it is smelling up our professional lives,” said this one new comment. To quote the full thing:

A Social Undertakers Conference says…

My dear Eponians talk about it, rehash it, rethink it, cross analyze it, debate it, respond to it, get paranoid about it, compete with it, complain about it, immortalize it, cry over it, kick it, defame it, stalk it, gossip about it, pray over it, put it down or dissect its motives before it continues to rot in our brains. It is dead. It is over. It is gone. It is done. It is time to bury it because it is smelling up our professional lives. Join me and bury it!

Repeating the lies yet again at the end of last week (second time), the EPO wrote: “Constructive discussion between staff and management about the future at the EPO Social Conference” (this links to the EPO’s Web site again, same page as before — a page that we already rebutted).

“Check the invoices from Battistelli. He paid a lot of money to keep the Dutch and German media under control.”Where was the staff which this so-called conference was about? Staff was outside protesting in front of the building in Munich at the time. So much for ‘social’ and a ‘conference’. It was more like a staff demonstration (photo below).

Where was the media at the time of the demonstration? Check the invoices from Battistelli. He paid a lot of money to keep the Dutch and German media under control. To be more precise and specific, he had the EPO pay a lot of money to cover up his own epic abuses.

SUEPO protest

As Expected, Benoît Battistelli Puts Longtime Ally Roland Grossenbacher on Top of Boards of Appeal

Posted in Europe, Patents at 3:01 pm by Dr. Roy Schestowitz

Longtime “Friendship” and “Cronyism” (or Loyalty) Perhaps an Appointment Criterion?

Roland Grossenbacher
Image source

Summary: Benoît Battistelli’s predecessor Roland Grossenbacher, who has a track record of protection and support for Battistelli (no matter the magnitude of abuses), reportedly takes a key position with Battistelli’s approval, debunking the notion that the appeal boards will enjoy greater (perceived) independence from the Office

THE EPO (Organisation) does not function — or no longer functions — like an institution with separate branches or pillars. In principle it’s supposed to (as envisioned by the EPC), but in practice, as we noted here before, Roland Grossenbacher and Benoît Battistelli appeared to have ganged up against President Brimelow [1, 2, 3, 4] (previous EPO President) and now have have another odd couple swapping seats at the Council, namely Benoît Battistelli and Jesper Kongstad. What happened to the Council as Battistelli’s ‘boss’ (or watchdog)? They’re inseparable under Battistelli and he even jokes about it, saying it would take an “earthquake” for the Council to stop being a lapdog. He allegedly gives them gifts at the expense of the Office, European taxpayers, or both.

“EPO staff — those who have been at the Office long enough — are no strangers to Mr. Grossenbacher.”We are saddened to see that things keep getting worse rather than better. Battistelli is about to totally destroy the EPO, not just demolish the boards that he loathes so much (collective punishment for a judge, UPC fantasies, and decreased patent quality that must remain undetectable for Battistelli’s lies to stick).

EPO staff — those who have been at the Office long enough — are no strangers to Mr. Grossenbacher. He’s not exactly liked, either. Several years ago SUEPO’s front page said “there was a demonstration held in Bern, in front of the Swiss Patent Office – home of Mr. Grossenbacher, the Chairman of the Administrative Council. National and individual interests (many of which financial) are dominating the decision making process and making it increasingly difficult for staff to maintain a high quality output of valid patents.”

Mr. Grossenbacher is no longer spending quite so much time at the EPO, but when he visits the EPO he continues to protect his friend, Mr. Battistelli, who is also protected by Kongstad, a Danish man with plenty of conflicts of interest and a large 'slaughterhouse' of chinchillas. Speaking of which, see the following new comment. It spells out CHINCHILLA (this funny new ode):

Bringbackalib. says

C uddly little furry things on the farm
H ere, the Danish government sees no harm
I n an opening statement from the AC Chair
N o scandal here, no scandal there
C aptain Batters got little or nothing waved through
H ave the AC FINALLY landed a coup
I ‘m delighted to learn VP3 has been thrown some meat
L ittle less pay, but keeps him off the street
L astly, a threatening object was found under a delegates car
A rogue laptop, good weekend, I’m off to the bar

As we noted here before, the writers at IP Kat do not cover EPO scandals anymore. Perhaps the EPO scared them when it imposed sanctions on them and the Kat ran away with its tail between its legs, to use somewhat of a pun (or a catty metaphor).

“All along it was expected that Battistelli would play a role in the appointments and put in high positions people who are loyal to him and can help impose the dismissal of a judge.”“New BOAC constituted,” one new comment said this weekend, but “IPKat asleep as usual.”

This links to an article in German from Mathieu Klos of Juve. It contains new information which an automated translation (can anyone translate this manually for us, with reliable facts and no risks of mistranslation?) highlights: “According to JUVE information from the environment of the Board of Directors, the three representatives of the Member States are Bucura Ionescu, Patricia García-Escudero-Márquez and Roland Grossenbacher. Ionescu is Director-General of the Romanian Patent Office and heads the Romanian delegation to the EPO. García-Escudero-Márquez, head of the Spanish delegation, also leads the national Patent and Trademark Office. Grossenbacher represents Switzerland and is the honorary president of the Board of Directors.”

All along it was expected that Battistelli would play a role in the appointments and put in high positions people who are loyal to him and can help impose the dismissal of a judge. “Disciplinary case still open,” says the article’s translation under a heading. Here’s more of this automated translation (we manually corrected only typos in the names):

However, the Board of Directors has not taken any decision in the pending disciplinary proceedings against a Board of Appeal. This was suspended in December 2014 by Benoît Battistelli. As a disciplinary oversight, the Board had then called for the removal of his office. However, a prerequisite for this is a corresponding recommendation by the Enlarged Board of Appeal. The highest court in the EPO had refused this in June, after Battistelli had intervened in the proceedings.

According to the statutes of the Office, the imprisonment is no longer possible. The Board of Directors had reportedly instructed its Chairman, Jesper Kongstad, to work out a solution. The case was on the agenda of yesterday’s meeting, but no decision was taken.

On the other hand, according to information received from the board of directors, the Member States rejected two proposals by Battistelli concerning the revision of the provision on disciplinary and investigations. The reform had been called for by the administrative board to defuse a conflict between the authorities and the trade unions. Here, Battistelli has to improve.

Does the judge need to be found innocent (or not guilty) five times in a row for Battistelli to stop taunting him? Each time this happens Battistelli makes a mockery not just of the Office but the whole Organisation. Not to mention how bad it makes Jesper Kongstad look…

To quote another new comment:

Yes. He remains suspended. Until the end of his term.
In accordance with the will of the President.

If we are told that the boards enjoy independence (a lie), then we must assess who’s in charge of them and remember that Battistelli personally plays a role in these appointments.

Wikipedia calls Benoît Battistelli “a French civil servant” and it won’t be long before an edit made to say “a French evil servant” would be totally appropriate.

UPC Preparatory Committee Projects Optimism in an Effort to Salvage Its Dying Project, the Unitary/Unified Patent

Posted in Deception, Europe, Patents at 2:00 pm by Dr. Roy Schestowitz

Self-fulfilling prophecy methods continue to be flung at the press

Battistelli digs his own UPC grave

Summary: Refusing to let the UPC stay in its grave, Team UPC keeps digging up and dishing out UPC misinformation, in front of an audience that need not be preached to as it’s already converted (effectively an echo chamber)

THE ‘baby’ of the President of the EPO has long been the UPC, even before it was known as “UPC” and even before he was President of the EPO. Based on an exchange between the EPO’s spokespeople and Dr. Glyn Moody, author of Rebel Code and an excellent journalist, the UPC has a lot to do with the current turmoil (so-called ‘reform’) at the Office. One must recognise the fact that the social unrest at the EPO and the UPC are almost inseparable.

“One must recognise the fact that the social unrest at the EPO and the UPC are almost inseparable.”Now that the UPC is virtually dead (if not just in the UK then worldwide) we keep seeing efforts by the EPO to replace London with somewhere like Milan. We mentioned this a few days ago and just before the week closed we saw duplicate tweets from the EPO (two on a single day), stressing the same point about an event in Italy.

First tweet: “EPO lawyers & European patent attorneys will be on hand in Italy at the next event tailored to PCT users’ needs: http://buzz.mw/b1ueq_f”

Second tweet: “EPO lawyers & European patent attorneys will be on hand in Italy at the next event tailored to PCT users’ needs: http://buzz.mw/b1uea_f”

“The Brexit vote was not a “speed bump” but a death knell.”We suspect, albeit it’s still somewhat speculative, that Battistelli is trying to grease up Italian politicians so as to make Milan the new London. He’s not alone as Team UPC, a conspiracy of truly nefarious entities, does the same thing and 3 days ago IP Watch gave a platform to the liars of Team UPC (behind a paywall). To quote the public portion (which is the only part we can see to debunk): “Britain’s vote to leave the European Union is just another “speed bump” along the path to a European unified patent and patent court, the head of the committee tasked with preparing the way for the new system said during a lively session at the 13 October London IP Summit. Others aren’t so sure, since Brexit has raised many complex questions, not least of which is whether there is the political will in the UK or EU to move ahead.”

The Brexit vote was not a “speed bump” but a death knell. We already wrote many dozens of articles about it (some of them very long) and one must remember that these UPC boosters have a track record of lying. They even advertised bogus UPC jobs that did not exist and will never exist. That’s how horrible these people are. They also stomp on democracy.

Outline of Latest Press Coverage Regarding the European Patent Office (EPO)

Posted in Europe, Patents at 12:57 pm by Dr. Roy Schestowitz

EPO article in French:

EPO article in French

EPO article in Greek:

EPO article in Greek

EPO article in English:

EPO article in English

And lots more to come…

Summary: European media is beginning to cover scandals associated with the European Patent Office (EPO), in spite of Battistelli’s attempt to silence and manipulate it, at the expense of millions of Euros per year

TIRED AFTER a sleepless night (covering EPO news right after the historic meeting had ended), we have finally recovered and can now resume coverage of the topic. Here is a 5-part explanation of what happened on Wednesday and Thursday (behind closed doors and in the streets of The Hague):

  1. EPO Administrative Council Meeting Turning Point – Part I: Protest at The Hague and the Huge Things at Stake
  2. EPO Administrative Council Meeting Turning Point – Part II: More Photos From Today’s Protest at The Hague
  3. EPO Administrative Council Meeting Turning Point – Part III: How Benoît Battistelli Planned to Expand His Attacks on EPO Staff (But Failed)
  4. EPO Administrative Council Meeting Turning Point – Part IV: When ~1,200 EPO Workers March in Protest and European Politicians Say “Battistelli Must Go”
  5. EPO Administrative Council Meeting Turning Point – Part V: “Siegfried Bross as President of the Boards of Appeal!”

Some more information about the The Hague demonstration was sent to us at the end of the week. The below message was posted by SUEPO The Hague on Facebook (late on Thursday or on Friday): “about 600 colleagues gathered today peacefully in The Hague to again and again request fairness and justice at EPO, this after another demo in Munich where also ca. 600 colleagues gathered to ask for the same.

“NL MP John Kerstens and FR MP Philip Cordery were again supportive of the demonstrants since they care for fundamental rights.

THANKS TO YOU ALL”

We have meanwhile received a translation of an article in French, published just days before the above in one of the largest papers in France. In English (with our emphasis):

In the discreet and civilized world of international organizations, the event is a very rare practice. The meetings scheduled Tuesday, 11 October, in Munich, and Thursday, 13 October, in The Hague, by the examiners of the European Patent Office (EPO) are yet just the latest in a long series [of meetings] started in 2013. The employees [of the EPO] have used this method to alert the 38 States meeting in the Council of Administration on 12 and 13 October about a workplace grievance which has remained unresolved for more than three years.

“This is not about money, money will not be the issue. We are not talking about remuneration to the “Board”. With more than EUR 5 000, the sum payable to employees on being hired, to which is added the payment of a premium based on being employed as an expatriate [that is, working in a country that is considered to be not the employees’ home country], and with children’s school-fees paid, and with a few other benefits, the employees will know that they are well paid. To attract scientists from all countries, the EPO Agency has had to indeed align on the best paid officials in Europe. Except that the money is not everything.

The EPO is one such international organization as its role is to identify a narrow field of /small handle/ intellectual property/ in the world, [and] the legal /status to share/ basis on which it can be made available to others/. The [EPO], whose headquarters is located in Munich and has branch offices in Berlin, The Hague and Vienna, employs 7 000 people to examine the applications of inventors, and issue in three languages the valuable patents of which it holds the monopoly for forty years.

In July 2010, the French Benoît Battistelli took over the reins. It is shortly after the arrival of this former Director General of the National Institute of Industrial Property (INPI) that the working conditions have deteriorated,…”

The above is imperfect and in fact an improved and complete translation would be very useful. As it stands, however, it does help one get the gist of this story.

As of today, SUEPO links to this article in Greek, whose headline is translated as saying “EPO: Patented medieval working conditions” (manual translations would be desirable); in addition to this, published on a Friday morning by Kieren McCarthy of The Register was the following detailed article that describes Battistelli as “terrifying boss”. It’s based on an open letter that we mentioned here before and it says:

Staff at the European Patent Office (EPO) have asked its administrative council to adopt new guidelines to protect them from the organization’s rampaging president.

The open letter [PDF] urges the council – which meets this week in Munich – to adopt the same rules for disciplinary proceedings and internal investigations that are being developed at another scandal-hit international organization, the World Intellectual Property Organization (WIPO).

The letter comes as EPO president Benoit Battistelli continues an extraordinary campaign of intimidation of union leaders at the organization that has led to repeated strikes at the EPO and a determined effort to push the president out at the administrative council’s previous meeting in July.

Since that failed attempt to boot Battistelli out, he has continued efforts to eject a number of union officials who resisted wide-ranging reform efforts, despite having been formally rebuked by the council and instructed to stop with his investigations.

A number of union officials have been suspended on questionable charges and have been under constant pressure to quit the organization, including the threat of withdrawals of their pensions. The suspensions follow an extraordinary campaign of intimidation through a special investigation unit set up by Battistelli, which included tapping people’s phones and sending investigators to their homes, as well as planting highly damaging allegations about specific individuals in the press.

Battistelli’s efforts to rid himself of anyone who opposes his reform proposals have been stymied by the organization’s structures, so the president has made repeated efforts to rewrite EPO rules to give himself increasing amounts of power over decisions – leading us to dub him “King Battistelli.”

[...]

Despite the allegations and extremely strong criticism leveled at WIPO by the US Congress, in which it called WIPO “the FIFA of UN agencies,” Gurry is still in his position and most recently attempted to get rid of its staff council in order to exert greater personal power over the organization.

The WIPO guidelines are designed to protect staff in future from a management team with its own agenda. EPO’s staff hope that by pushing for them to be adopted by the EPO too, it will both protect them and flag the continued abuses of Battistelli and his team.

The comments on this are few and rather short. No doubt the EPO harms the EU by giving it a bad name. As one person put it:

And yet, for largely political reasons, the Administrative Council – which consists of representatives from all the European countries that make up the EPO – refuses to fire the president.

It’s stuff like this that means I’m beginning to warm up to the whole Brexit thing.

“If only it were being run on the same lines as the IICSA,” one person responded. “Except that the EPO is not an organ of the EU – at all,” another person added. But a lot of people don’t know this. To them, the EPO is like an arm of the EU or the very notion/philosophy that Europe should be united with its centre/heart in the main continent.

Another person remarked: “Reforms?

“As with those done in the UK, you need to indicate the possible reality by calling them “reforms”.

“This quotation marks would indicate that someone had used the word but that they were not necessarily truly an advancement or improvement.”

A person then responded with: “Perhaps the best reform is to bulldoze the EPO and WIPO management and start over? I recommend a Cat D10.”

Regarding the name “King Battistelli” — a term which McCarthy routinely repeats (not because of McCarthyism but because the staff of the EPO calls him that in a derogative fashion) — another person wrote: “By the sound of all this – why ‘King’ when ‘Duce’ seems so much more appropriate?”

As far as we are aware, there are quite a few journalists and several publications that are going to write about the EPO in the coming week. Battistelli wasted a lot of money trying to prevent this, but he cannot just devour all the media all around the world. It would instantaneously bankrupt the whole Office.

Links 16/10/2016: Linux 4.9 RC1, Wine 1.9.21

Posted in News Roundup at 11:54 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • NFV trends and open source SDN work with OpenDaylight

    Open source continues to gain momentum and is said to remain central to ongoing development and deployment of NFV and SDN for telecommunication operators

    The open source community remains active in bolstering support for the telecommunication market’s move towards network virtualization platforms using software-defined networking and network functions virtualization.

    In the past month alone, new platform iterations from the Open Platform for NFV project with its Colorado release; fellow Linux Foundation organization OpenDaylight with its Boron SDN platform; and the Open Networking Laboratory’s Open Network Operating System Project with its SDN-focused Hummingbird platform.

  • Google releases Open Source Report Card — does the company deserve an A+?

    The future of computing is open source. While there is still room for closed source software, more and more companies are going the open route. Major players such as Microsoft, Apple, and Facebook are all contributing to the open source community. Google in particular is a huge proponent of open source. Heck, two of the company’s operating systems — Chrome OS and Android — are Linux distributions.

    Today, the search giant announces the ‘Open Source Report Card’. This is essentially a report that explains the details of its open source projects. Google is undoubtedly a major open source contributor, but the question is, what grade should the company get?

    “Today we’re sharing our first Open Source Report Card, highlighting our most popular projects, sharing a few statistics and detailing some of the projects we’ve released in 2016. We’ve open sourced over 20 million lines of code to date and you can find a listing of some of our best known project releases on our website”, says Josh Simmons, Open Source Programs Office.

  • My FOSS Journey and Why I am applying for a Toptal Scholarship

    When I graduated from my high school in India, our class had an almost 50-50 ratio of boys-to-girls. My graduating class in one of India’s premier engineering institutions had less than 10%. It was even more interesting to see that there were more than 20% girls enrolled in Bachelors in Design (which offered courses like Product Design, Human Computer Interaction and User Experience Research) while there were none in Mechanical Engineering since the last three graduating classes. Was it that Design was considered a relatively non-technical course ? While I have never been openly discouraged from pursuing a career in technology – a predominantly male-populated field – there has always been an unconscious bias even from within my family. When I wanted to apply for a degree course in Mechanical Engineering, I was asked to take some more time to think about my future – was gently nudged towards more female-friendly engineering fields like Computer Science which wouldn’t involve as much strenuous physical effort. Was it even sublte experiences like this which had contributed towards the gender gap ? This feeling of being an ‘outsider’ in a predominantly male field never left till I started contributing to Open Source.

    I first learnt about Free and Open Source Software (FOSS) via Outreachy, a program designed to increase participation of minorities in FOSS. I liked the fact that the program had no knowledge prerequisites so that anyone interested in contributing to FOSS could be a part of it.

  • Hello fans and followers of open source voting in San Francisco!

    The Open Source Initiative works with a variety of organizations to promote the adoption of open source software throughout government. San Francisco Elections Commissioner Chris Jerdonek provides the OSI with a breakdown of the latest happening with San Francisco’s efforts to develop and certify the country’s first open source voting system!

  • Events

    • Announcing Google Code-in 2016 and Google Summer of Code 2017

      One of the goals of the Open Source Programs Office is to encourage more people to contribute to open source software. One way we achieve that goal is through our student programs, Google Summer of Code (for university students) and Google Code-in (for pre-university students).

      Over 15,000 students from more than 100 countries have worked with 23,000 mentors and contributed to 560+ open source projects, so we’re excited to announce the next round of these programs.

  • Databases

    • MySQL 8.0: The end of MyISAM

      This blog discusses the gradual end of MyISAM in MySQL.

      The story that started 20 years ago is coming to its end. I’m talking about the old MyISAM storage engine that was the only storage provided by MySQL in 1995, and was available in MySQL for 20+ years. Actually, part of my job as a MySQL consultant for 10+ years was to discover MyISAM tables and advise customers how to convert those to InnoDB.

    • Devs Await Open Source Word After Commercial RethinkDB Effort Fails

      With the company behind the RethinkDB project having failed and its engineering team scooped up by Stripe, Big Data developers are awaiting further word on plans to continue it as fully open source.

      Although failing to achieve commercial success, the RethinkDB database was lauded by many developers for its different approach and solid technology on developer-oriented social sites such as Hacker News and Reddit.

  • Oracle/Java/LibreOffice

    • First LibreOffice 5.3 BugHunting Session

      LibreOffice is approaching the 5.3 release season with the first bug hunting session, on Friday, October 21, 2016. Tests will be performed on the Alpha version of LibreOffice 5.3, which will be available on the pre-releases server (http://dev-builds.libreoffice.org/pre-releases/) a few days before the event. Builds will be available for Linux (DEB and RPM), MacOS and Windows, and will run in parallel with the actual installation.

  • CMS

    • When it Comes to Open CMS Solutions, Take a Test Drive First

      Datamation is out with an extensive evaluation of which open source content management systems (CMS) really stand out, which is a topic near and dear to us here at OStatic. Our site runs on Drupal, which powers many sites around the web, but there are key differences between CMS offerings, and if you’re looking for the right solution, we have some good resources for you.

      The Datamation story provides a nice overview of the open CMS space, but here are some of out favorite ways to go about evaluating which is the right CMS for you.

      Marking a true renaissance for tools that can help anyone run a top-notch website or manage content in the cloud, open source content management systems (CMS) have come of age. You’re probably familiar with some of the big names in this arena, including Drupal (which Ostatic is based on) and Joomla. As we noted in this post, selecting a CMS to build around can be a complicated process, since the publishing tools provided are hardly the only issue.

  • Microsoft and Openwashing

  • Public Services/Government

    • The White House open sources President Obama’s Facebook Messenger bot

      The White House today shared open source code for President Obama’s Facebook Messenger bot to help other governments build their own bots.

      The White House says it’s sharing the code “with the hope that other governments and developers can build similar services — and foster similar connections with their citizens — with significantly less upfront investment,” according to a post published today by chief digital officer for the White House Jason Goldman.

      In August, the White House launched a Facebook Messenger bot to receive messages from American citizens. The messages are read alongside letters and other communique sent to the president.

      The open source Drupal module for the president’s bot is available to download on Github.

      “While Drupal may not be the platform others would immediately consider for building a bot, this new White House module will allow non-developers to create bot interactions (with customized language and workflows), and empower other governments and agencies who already use Drupal to power their digital experiences,” Goldman said on the White House website today.

    • Obama’s Facebook Messenger Bot Is Now “Open Source” And Available On GitHub
    • Why the White House is open-sourcing its chatbot code
    • White House open-sources chatbot
    • White House encourages local governments to embrace chatbots
    • Governments favor open source, Google releases 3 new projects, and more news: Russia and the Netherlands propose moves to open source

      For years now, governments throughout Europe have been enthusiastically adopting open source software. Their main reasons for doing so have been to lower costs and to be able to modify the software to suit their needs. Governments in Russia and the Netherlands are following that trend, but for divergent reasons.

      The Russian Duma announced earlier this month that it’s drafting a law to give preference to open source over proprietary software. Specifically, “the law will require local agencies to give preference to open source software and justify any purchases of proprietary software.” In an interview with Bloomberg News, Duma official Andrey Chernogorov cites security as a major driver behind this shift. Much of the government’s IT infrastructure is based on proprietary, foreign-made platforms, and Chernogorov said that the Russian government is “seeking to close this loophole for state purchases, as it causes security risks.”

  • Openness/Sharing/Collaboration

    • Open Access/Content

      • Senate supports open-source initiatives

        The ASWSU Senate passed a resolution to support the Office of the Provost’s open education initiatives at its meeting on Wednesday. The resolution supports the use of the OpenStax program to provide textbooks created with open-source material.

        This does not force professors to use a book that does not perfectly line up with their curriculum because they can freely edit and update the source material, said Sen. Matthew Morrow, author of the resolution.

        Researchers and professors collaborate to create open-source textbooks for students at other universities to use. Morrow said they are targeting UCORE courses because open-source textbooks are currently less suitable for upper-level classes.

    • Open Hardware/Modding

  • Programming/Development

    • TFW an obituary you wrote five years ago goes viral

      This is not a new phenomenon. Social media snap-posts have killed off celebrities hundreds of times before their actual deaths (to the point where some have required websites to constantly fact-check their mortality). Facebook is full of years-late “RIP” posts. The Internet may never forget, but the humans who use it have become increasingly absent-minded.

      It wasn’t even just my story that went viral—a similar Guardian story also resurfaced, probably because of the same “memories” feature on Facebook or some other social media feature that dredges up old content. Still, there was something personally unsettling about having words I had written in tribute of “dmr”—a man whom I credited personally for making my early exposure to computing and its potential possible—suddenly resurface five years later.

      The first few times I spotted Twitter acting up, I thanked people for resurfacing the story after so much time. But reading the post again—partially to make sure I hadn’t somehow written another tribute subconsciously from my perch at my dad’s bedside—was affecting in ways I didn’t expect. Maybe I got emotional because I was in a hospital room with my father, who was recovering from an other-than-routine knee replacement surgery, and I had spent the day before sitting in a surgical waiting room.

    • Tracing HTTP request latency in Go with OpenTracing
    • How it feels to learn JavaScript in 2016
    • Why should students learn to write code?

      There are lots of efforts underway to get students (young and old) to learn to write code. There are far-reaching efforts, like the Hour of Code, and plenty of smaller, more focused projects, such as the Design and Technology Academy (part of Northeast ISD here in San Antonio, Texas). These are excellent programs that enrich the education of many students.

Leftovers

  • Smartphones are “contaminating” family life, study suggests

    Parents, which do you respond to first – your ring tone or your toddler’s crying?

    Mobile devices like smartphones and tablets can be distracting from child-rearing, upending family routines and fueling stress in the home, a small, new study finds.

    Incoming communication from work, friends and the world at large is “contaminating” family mealtime, bedtime and playtime, said study lead author Dr. Jenny Radesky. She’s an assistant professor of developmental behavioral pediatrics at the University of Michigan Medical School.

    Her comments stem from her team’s study involving interviews with 35 parents and caregivers of young children in the Boston area.

  • Science

    • FCC CIO encourages creative problem solving in IT through compassionate leadership

      When speaking with Dr. David Bray, senior executive and CIO of the U.S. Federal Communication Commission, he is always quick to assign all the credit for achievements within his organization to his team of interdisciplinary change agents – from a successful move to the cloud, to saving millions on a legacy technology upgrade.

      Bray is firm in his belief that if digital C-Suite leaders aren’t first and foremost inspiring people to be creative problem solvers, their organizations simply won’t be able to move with the speed or the resiliency necessary to survive in the fast-paced digital world. Further, he says that leading a team of diverse change agents who are intrinsically motivated takes a unique approach. We touched base with Bray to learn more.

    • Opinion: Stop Submitting Papers

      PIXABAY, STARTUPSTOCKPHOTOSI woke up to three requests for review, and two papers to handle as a subject editor. It is unusual, but it happens. I declined to do all the reviews. This is not sustainable.

      Over the last six months, I kept informal track of the reviews I received, both as an author and as a subject editor. In the overwhelming majority of papers, about half of the “major” points were actually not major, but things that improve the paper because the reviewers see it from a different perspective.

      This is burdening the peer review process for very little return (because these comments, important as they may be, do not make the paper more correct or more robust).

      Here is what we should do: stop submitting papers to journals.

      Wait, what? No, I mean it. We should write our draft, go over it with our coauthors, and then put it on a preprint server. And wait. Some reasonable amount of time. A year, maybe. After a year, when we had the opportunity to share this paper with colleagues, then we can submit it.

    • Winner of the Norwegian Digitalisation Prize 2016, Deichmanske Public Library in Oslo

      A movie that shows that putting the user at the hub and thinking untraditionally makes exctiting things happen.

    • Status digitalisation in the Norwegian Public Sector
    • Digitalisation for Renewing, Simplifying and Improving the Norwegian Public Sector
  • Hardware

    • AMD x86 Zen Architecture Will Implement Game Changing Encryption Features Such as SME, SEV and HW Based SHA – Not Present In SkyLake or KabyLake

      Today I will be talking about a very disruptive feature that will be present in AMD’s upcoming compute architecture. Disruptive is probably the most misused word in the history of technology and I do not use it casually. While the readers of this site consist primarily of technology enthusiasts, for whom this news may not mean much. From a company like AMD’s standpoint, a vast majority of revenue will come from the Enterprise segment. For Enterprise users, data security is a very important consideration and on that front AMD Zen will be introducing some very significant advanced encryption features, such as SME and SEV. These features are not present in any competing Intel architecture.

  • Security

    • Friday’s security advisories
    • Metasploit eyeing Linux and usability improvements; iOS support uncertain

      Engineers at Rapid7, which owns the popular Metasploit penetration testing tool, are preparing a variety of enhancements for the ramp-up to version 5.0 in 2017.

      Metasploit evolved in 2003, Rapid7 acquired it from the original developers in 2009, and fourth-generation software debuted in 2011. Metasploit Pro is currently in version 4.2 and costs several thousand dollars for a license; Metasploit Framework currently in version 4.12.33 is open source, officials explained.

    • Self-Checkout Skimmers Go Bluetooth

      This blog has featured several stories about payment card skimming devices designed to be placed over top of credit card terminals in self-checkout lanes at grocery stores and other retailers. Many readers have asked for more details about the electronics that power these so-called “overlay” skimmers. Here’s a look at one overlay skimmer equipped with Bluetooth technology that allows thieves to snarf swiped card data and PINs wirelessly using nothing more than a mobile phone.

      The rather crude video below shows a Bluetooth enabled overlay skimmer crafted to be slipped directly over top of Ingenico iSC250 credit card terminals. These Ingenico terminals are widely used at countless U.S. based merchants; earlier this year I wrote about Ingenico overlay skimmers being found in self-checkout lanes at some WalMart locations.

    • 10-year-old OpenSSH vulnerability caught up in IoT DDoS attacks [iophk: "not an actual ssh problem despite the parrots"]

      THE THREAT WRANGLERS AT Akamai have come up with something new for us to worry about, except that it isn’t so much new as a decade old.

      An OpenSSH vulnerability is being used to fuel distributed denial-of-service (DDoS) attacks on the bloody Internet of Things (IoT).

      DDoS attacks are a constant pain, but attacks on the IoT are relatively new. A combination of the two would be a problem, unless you are the kind of company that makes its business discovering this kind of thing.

      “Researchers at Akamai have been monitoring the growth of attacks leveraging IoT devices,” said Eric Kobrin, director of adversarial resilience at Akamai, in a blog post about the SSHowDowN Proxy.

    • a single byte write opened a root execution exploit

      As one of the maintainers of the c-ares project I’m receiving mails for suspected security problems in c-ares and this was such a one. In this case, the email with said subject came from an individual who had reported a ChromeOS exploit to Google.

      It turned out that this particular c-ares flaw was one important step in a sequence of necessary procedures that when followed could let the user execute code on ChromeOS from JavaScript – as the root user. I suspect that is pretty much the worst possible exploit of ChromeOS that can be done. I presume the reporter will get a fair amount of bug bounty reward for this.

    • Parrot Security 3.2 “CyberSloop” Ethical Hacking OS Is Out with Linux Kernel 4.7

      Today, October 15, 2016, the ParrotSec team unleashed the second point release to the Debian-based Parrot Security 3.x GNU/Linux distribution designed for ethical hackers and security researchers.

    • Parrot Security 3.2 “CyberSloop” Ethical Hacking OS With Linux Kernel 4.7 Released
    • Alpine edge has switched to libressl

      We decided to replace openssl with libressl because we believe it is a better library. While OpenSSL is trying to fix the broken code, libressl has simply removed it.

    • German nuclear plant infected with computer viruses, operator says

      A nuclear power plant in Germany has been found to be infected with computer viruses, but they appear not to have posed a threat to the facility’s operations because it is isolated from the internet, the station’s operator said on Monday.

      The Gundremmingen plant, located about 120 km northwest of Munich, is run by the German utility RWE.

      The viruses, which include “W32.Ramnit” and “Conficker”, were discovered at Gundremmingen’s B unit in a computer system retrofitted in 2008 with data visualisation software associated with equipment for moving nuclear fuel rods, RWE said.

    • The Slashdot Interview With Security Expert Mikko Hypponen: ‘Backupception’

      Mikko Hypponen, Chief Research Officer at security firm F-Secure, has answered a range of your questions. Read on to find his insight on the kind of security awareness training we need, whether anti-virus products are relevant anymore, and whether we have already lost the battle to bad guys. Bonus: his take on whether or not you should take backups of your data.

    • SourceClear Brings Secure Continuous Delivery to the Developer Workflow [Ed: I don’t trust them; they’re Microsoft connected with a negative track record]
    • Serious security: Three changes that could turn the tide on hackers

      The state of tech security is currently so dire that it feels like anything you have ever stored on a computer, or a company or government has ever stored about you, has already been hacked into by somebody.

    • Crypto needs more transparency, researchers warn

      Researchers with at the French Institute for Research in Computer Science and Automation (INRIA) and the University of Pennsylvania have called for security standards-setters to publish the seeds for the prime numbers on which their standards rely.

      The boffins also demonstrated again that 1,024-bit primes can no longer be considered secure, by publishing an attack using “special number field sieve” (SNFS) mathematics to show that an attacker could create a prime that looks secure, but isn’t.

      Since the research is bound to get conspiracists over-excited, it’s worth noting: their paper doesn’t claim that any of the cryptographic primes it mentions have been back-doored, only that they can no longer be considered secure.

      “There are opaque, standardised 1024-bit and 2048-bit primes in wide use today that cannot be properly verified”, the paper states.

      Joshua Fried and Nadia Heninger (University of Pennsylvania) worked with Pierrick Gaudry and Emmanuel Thomé (INRIA at the University of Lorraine on the paper, here.

      They call for 2,048-bit keys to be based on “standardised primes” using published seeds, because too many crypto schemes don’t provide any way to verify that the seeds aren’t somehow back-doored.

    • Is Let’s Encrypt the Largest Certificate Authority on the Web?

      By the time you read this, Let’s Encrypt will have issued its 12 millionth certificate, of which 6 million are active and unexpired. With these milestones, Let’s Encrypt now appears to us to be the the Internet’s largest certificate authority—but a recent analysis by W3Techs said we were only the third largest. So in this post we investigate: how big is Let’s Encrypt, really?

  • Defence/Aggression

    • U.S. Enters Yemen War Directly for the First Time With Attack on Houthis

      When the Houthis fired on the U.S.S. Mason earlier this week, sailors were able to deploy countermeasures and the ship was not damaged.

      The Department of Defense issued a statement describing the U.S. attack as a series of “limited self-defense strikes,” but promised to “respond to any further threat” to U.S. ships “as appropriate.”

      “The intent of our strikes were to deter future attacks and to reduce the risk to U.S. and other vessels,” White House Deputy Press Secretary Eric Schultz said Thursday. “We are prepared to respond if necessary to any future missile launches.”

      The U.S. Navy tweeted a video of the destroyer U.S.S. Nitze launching cruise missiles, captioning it with the hashtag “#Yemen” — commonly used by activists to draw attention to the humanitarian catastrophe.

    • Biden vows US will retaliate against Russia for hacks

      Vice President Biden is vowing the U.S. will retaliate against Russia for its alleged hacking of American political groups.

      “We’re sending a message,” Biden said in an interview with NBC’s “Meet the Press” that will air Sunday.

      Biden did not detail the type of response the U.S. is preparing but said Russian President Vladimir Putin will “know it” when it happens.

      “It will be at the time of our choosing,” he added. “And under the circumstances that have the greatest impact.”

      The vice president is the highest-ranking member of the Obama administration who has pledged a response to Russia for its alleged hacking.

      His comments come a week after the administration took the unprecedented step of publicly blaming Moscow for hacking the computer systems of political organizations with the goal of influencing the outcome of the November elections.

      The Department of Homeland Security and the Office of the Director of National Intelligence said the hacks of the Democratic National Committee (DNC) and campaign officials were authorized by senior Kremlin officials.

    • The Left’s Fatal Dismissal of Islamic Imperialism

      There is a general dearth of leftist discourse critical of Islamism in the English speaking West. In fact, the dominant leftist discourse in that regard is characterized by a mixture of portraying Islam as the ultimate victim and Islamism as a force of resistance to, or at least an excusable reaction to, Western policies. Meanwhile, millions of people throughout the Middle East and North Africa (MENA) continue to struggle against the rising wave of Islamism on a daily basis in the absence of acknowledgement or support from the Western left.

      For the colonized peoples of the MENA region such as Amazighs, Assyro-Chaldeans, Copts, Nubis, Kurds, and Yezidis, Islamic imperialism is the most serious threat to their very existence. One would hope that the situation of these peoples would form the foundational parameters of the international left’s outlook on the MENA region. However, it is far more often the right in the West that takes issue with the genocidal campaigns waged against these peoples.

    • Hiding US Role in Yemen Slaughter So Bombing Can Be Sold as ‘Self-Defense’

      To hear US corporate media tell it, the US was dragged into a brand new war on Wednesday.

      US destroyers in the Gulf of Aden launched airstrikes against Houthi rebels, a Shia insurgent group currently withstanding a massive bombing campaign from a Saudi-led coalition in a year-and-half conflict between largely Shia rebels and the Saudi-backed Sunni government in Yemen. The Pentagon insisted that cruise missiles had been fired onto the USS Mason on Sunday and Wednesday from Houthi-controlled territory, and called the airstrikes a “limited self-defense” response.

      Needless to say, US media followed the Pentagon’s lead. The fact that the United States has been literally fueling Saudi warplanes for 18 months while selling weapons and providing intelligence support to the Gulf monarchy—acts which even the US State Department believes could expose the US to war crimes prosecution—was either downplayed or ignored. Nor did media recall the US’s long history of drone warfare in Yemen, where the military and CIA have been carrying out long-range assassinations since 2002, killing more than 500 people, including at least 65 civilians.

      [...]

      Why are American ships in those waters? Why are Tomahawk missiles “flying”? The conflict is never explained; it’s only brought up so that Maddow can warn that the GOP nominee could make things worse. Of course, it isn’t Trump who backed the Saudis in an air campaign that’s left thousands dead, but Obama—and it’s Hillary Clinton who as secretary of State enthusiastically pushed to sell warplanes to Riyadh (The Intercept, 2/22/16). But such facts would messy up the election-season narrative.

      Maddow, like the other reports, used the loaded modifier “Iran-backed” to describe the Houthis (even though experts and Pentagon officials think Iran’s support is overblown). This is a stark asymmetry, considering that none of the reports referred to the Yemeni government as “US-backed” or “Saudi-backed.” She also said that the Navy blamed the attacks on the Houthis, when the Pentagon only claims the missiles came from rebel territory, and could very well be from other allied groups (New York Times, 10/13/16).

      Not only is the US’s backing of Saudi Arabia omitted from all these reports, the word “Saudi” isn’t uttered in any of them. The viewer is given the impression that the war, aside from Iranian meddling, is an entirely internal affair—when it actually involves over 15 different countries, mostly Sunni monarchies propping up the Yemeni government—and that the rebels just randomly decided to pick a fight with the largest military in the history of the world.

      The Houthis, for their part, vehemently deny having carried out the attack on the Mason, and there is no publicly available evidence it was them or allied forces. It should be noted, however, that Houthi forces took credit for sinking a United Arab Emirates supply ship two weeks earlier.

      As is often the case with war, the issue of “first blood”—or who started the fighting—gets muddied. Governments naturally want global audiences and their own citizens to view their actions as defensive—a necessary response to aggression, not aggression itself. US corporate media are aiding this official spin in their reporting on the US bombing of Yemen.

    • Regime Change In The Philippines

      When will the neoconservative chant begin: “Duterte must go”? Or will the CIA assassinate him?

      President Rodrigo Duterte has indicated that he intends a more independent foreign policy. He has announced upcoming visits to China and Russia, and his foreign minister has declared that it is time for the Philippines to end its subservience to Washington. In this sense, regime change has already occurred.

      Duterte has suspended military maneuvers with the US. His defense minister said that the Philippines can get along without US military aid and prefers cooperation over conflict with China.

    • I Support a No-Fly Zone in Syria – A Real One that Applies to NATO Too

      When the neo-cons in the UK parliament and the serial warmonger Hillary Clinton call for a “no-fly zone” they actually mean the opposite. They mean that NATO should be given untrammelled access to the airspace to carry out mass bombings – but that nobody else should.

      We saw it in Libya. The argument goes like this. NATO aircraft need to enforce the no-fly zone. To do this in safety, they need to attack and destroy any ground to air weapons capabilities on the ground. That does not just include surface to air missiles, both carriage mounted and hand held, but anything that can be pointed upwards and fired. They need to take out by more bombing any stores that may house such weapons. They need to take out any radar installations, including civilian ones, that may pinpoint NATO aircraft. They need to destroy any runways and hangars, including civilian ones. They need to destroy by bombing all military command and control centres, including those in built up areas. They need to destroy the infrastructure on which air defence relies, including electricity generation and water supply, including civilian assets.

      I am not exaggerating. That really is the doctrine of NATO for enforcing a “no fly zone”, as previously witnessed in Iraq and Libya. It really was NATO aircraft which did to the beautiful Mediterranean town of Sirte the destruction which you see in that picture – in order to enforce a no-fly zone. Enforcement of the no-fly zone was the only authorisation NATO had for the massive bombing campaign on Libya which enabled regime change, which enabled rival jihadist militias to take over the country. They showed their gratitude by murdering the US Ambassador. The failure of central government led to Libya becoming the operating site from which a number now in the hundreds of thousands of boat refugees have crossed to Europe.

    • How Much Will Brexit Add to the Cost of Trident and Hinkley Point?

      The spectacular and continuing fall in the value of the pound will add over £50 billion to the cost of Trident. Yes, bits of steel are being welded together in the UK, but the steel is imported and so is the missile technology.

      Similarly, Hinkley Point will be in trouble. The Chinese and French are to build it against guarantees of income from future energy prices fixed at double the cost of current wholesale electricity. But the hard currency value of that income has now been slashed. I do not know the precise details of the contracts, but the French and Chinese not being stupid, my guess is that their income from it is set in a proper stable currency not in sterling. Which means that electricity prices to the British consumer will have to not just double as planned, but go up 50% again, to cover the diminished value of sterling.

  • Transparency/Investigative Reporting

    • Pamela Anderson reveals fears for Wikileaks’ Julian Assange on Embassy visit

      Pamela Anderson has revealed her fears over Julian Assange’s health after visiting him at the Ecuadorian Embassy.

      The former Playboy model said the WikiLeaks founder was doing “really well” but expressed concern for him and his family.

      The Australian has been living in the embassy for over four years and has been granted political asylum by Ecuador.

      He is due to be questioned over a sex allegation in Sweden – which he denies. Mr Assange believes that if he goes to Sweden he will be extradited to the United States for questioning over the activities of WikiLeaks.

  • Environment/Energy/Wildlife/Nature

    • As She Campaigns With Al Gore, New Emails Show Hillary Told Environmentalists to ‘Get a Life’

      Democratic nominee Hillary Clinton’s relationship with the environmental movement has never exactly been the epitome of cordiality. At a campaign event in March, she blew up at a Greenpeace activist who asked her about her relationship with fossil fuel companies. Annoyed at the young woman’s question, she angrily pointed her finger at her and said she was “sick!” of the Bernie Sanders campaign lying about her. Now, thanks to WikiLeaks, we have proof that Clinton outright mocked green activists in her speeches to trade unions.

    • Greenland Is Very Mad About the Toxic Waste the US Left Buried Under Its Ice

      Greenland isn’t happy about being treated as a dumping ground for abandoned US military bases established at the height of the Cold War—and in a newspaper editorial, it’s calling on Denmark to deal with the mess left behind by the Americans, since the Danish long ago took responsibility for them. This editorial notes that, after decades, Greenland is “losing its patience.”

      One of the abandoned bases, called Camp Century, is full of nasty chemicals and some radioactive material, as Motherboard previously reported.

      At Camp Century, which was built in 1959, soldiers called “Iceworms” practiced deployment of missiles against Russia and literally lived inside the ice. When the US decommissioned the base in the 1960s, the military left basically everything behind, thinking that its waste would stay locked up in the Greenland ice sheet forever.

      Well, climate change has made that unlikely. Melting ice threatens to expose all kinds of toxic debris in decades to come, and Greenland wants it cleaned up, now.

    • Climate change: ‘Monumental’ deal to cut HFCs, fastest growing greenhouse gases

      More than 150 countries have reached a deal described as “monumental” to phase out gases that are making global warming worse.

      Hydroflurocarbons (HFCs) are widely used in fridges, air conditioning and aerosol sprays.

      Delegates meeting in Rwanda accepted a complex amendment to the Montreal Protocol that will see richer countries cut back their HFC use from 2019.

      But some critics say the compromise may have less impact than expected.

    • Nations, Fighting Powerful Refrigerant That Warms Planet, Reach Landmark Deal

      Negotiators from more than 170 countries on Saturday reached a legally binding accord to counter climate change by cutting the worldwide use of a powerful planet-warming chemical used in air-conditioners and refrigerators.

      The talks in Kigali, the capital of Rwanda, did not draw the same spotlight as the climate change accord forged in Paris last year. But the outcome could have an equal or even greater impact on efforts to slow the heating of the planet.

      President Obama called the deal “an ambitious and far-reaching solution to this looming crisis.”

    • Bernie Sanders Just Asked President Obama to Halt the Dakota Access Pipeline

      The Dakota Access pipeline currently hangs in a state of uncertainty. On October 9, a federal appeals court dismissed the Standing Rock Sioux tribe’s request for a permanent injunction to stop to the project. Meanwhile, Obama administration officials continue to stall; one day after the court ruling, the departments of Justice, Interior, and the Army issued a joint statement refusing to authorize construction along part of the proposed route.

      And while a federal review of the permitting process began this week, a handful of Senate Democrats, led by Vermont Sen. Bernie Sanders, have now penned a powerful letter to President Barack Obama, calling on him to suspend all construction permits for the project and to order a full environmental impact statement. Check it out below.

    • NOAA Collects Aerial Imagery in Aftermath of Hurricane Matthew

      From October 7-10, 2016, the National Geodetic Survey collected damage assessment imagery for more than 1,200 square miles in the aftermath of Hurricane Matthew. The aerial imagery was collected in specific areas identified by FEMA and the National Weather Service.

    • ‘All the Warning Signs Are There, Loud and Clear’ – CounterSpin interview with Dahr Jamail on climate disruption

      New research on attitudes to climate change suggests that people believe they are entitled to their own facts on the matter, even as scientific evidence points one way, only one way, and every day more urgently. Corporate media bear some responsibility: years of matching every piece of evidence with some statement of doubt or denial, years of placing scientific consensus alongside politicians’ folkloric ideas as though they merited the same sort of attention.

  • Finance

    • The Tax Code for the Ultra-Rich vs. the One for Everyone Else

      The revelation of details from Donald Trump’s 1995 state tax returns created exactly the political firestorm that it merited. Before they came to light, the Republican presidential candidate’s flimsy excuses for not releasing his returns produced two lines of speculation: Either he wasn’t as rich as he claimed, or he wasn’t paying any taxes. Trump’s colossal $916 million loss in 1995 partially confirmed both theories, with opponents portraying him as a bumbling businessman who exploits tax loopholes to shift his losses onto ordinary taxpayers.

      When it comes to tax policy, however, Trump’s tax returns are a distraction that crowds out more important issues. In The New York Times, the columnist James Stewart outlined how to prevent Trump’s particular form of tax avoidance: Shorten the period in which losses can be used to offset income, limit the deduction for depreciation, and so on. These are perfectly good solutions—to a minor issue. The poster child for the problems of the tax code isn’t Donald Trump; it’s Warren Buffett.

    • Why For-Profit Education Fails

      Earlier this year, LeapFrog Enterprises, the educational-entertainment business, sold itself for $1 a share. The deal came several months after LeapFrog received a warning from the New York Stock Exchange that it would be delisted if the value of its stock did not improve, a disappointing end to the public life of a company that had the best-performing IPO of 2002.

      LeapFrog was one of the very last remaining of the dozens of investments made by Michael Milken through his ambitiously named Knowledge Universe. Founded in 1996 by Milken and his brother, Lowell, with the software giant Oracle’s CEO, Larry Ellison, as a silent partner, Knowledge Universe aspired to transform education. Its founders intended it to become, in Milken’s phrase, “the pre-eminent for-profit education and training company,” serving the world’s needs “from cradle to grave.”

    • The battle of Hastings: What’s behind the Netflix CEO’s fight to charterize public schools?

      Silicon Valley electrical engineer Brett Bymaster was optimistic when Rocketship Education, a non-profit charter school chain, began building its flagship Mateo Sheedy elementary school next to his San Jose home in 2007. He and his family lived in a lower-income community, so he figured the new approach could help local kids. “I didn’t know anything about charter schools, so I thought it was a good thing,” he said.

      But the more he learned about Rocketship and charter schools, which receive government funding but operate independently of local school boards, the more concerned he became. He was struck by the school’s cramped quarters: over 600 students on a one-acre campus, compared to the 9.2 acres per 450 students recommended for elementary schools by the California Department of Education. All those students meant big classes; last year Mateo Sheedy had one teacher for every 34 students, more than the maximum allowed for traditional elementary schools under state law.

      The teacher deficit seemed to be compensated for with screen time: Thanks to its so-called “blended learning” approach, Rocketship kindergarteners were spending 80 to 90 minutes a day in front of computers in a school learning lab, nearly the daily maximum screen time recommended by the American Academy of Pediatrics. And when the kids weren’t in front of computers, they seemed to be getting disciplined throughout their extra-long school days. Bymaster says he’d constantly see teachers yelling at students. “It’s a military-style environment,” noted Bymaster, who spearheaded a 2013 lawsuit that caused Rocketship to scrap one of its planned San Jose schools. “It’s really a kill-and-drill kind of school.”

    • On TTIP, CETA, free trade and a free and open Internet

      I’m a free marketeer. I believe that free trade would be hugely beneficial for all.

      I also believe in a free and open Internet. Especially as it provides a level playing field on which entrepreneurs from all over the world can join a global market, 24/7.

      And I’m not at all happy with politicians and bureaucrats trying to force me to choose between the two.

      The CETA (EU-Canada) and TTIP (EU-US) trade agreements are problematic. CETA will undermine Europeans right to data protection and privacy online. The same goes for TTIP, which also might contain intellectual property regulations undermining the principle that Internet service providers are not responsible for what their customers are up to in their cables (the mere conduit principle). That would have huge implications, leading to a strictly controlled Internet where everything you are up to must be approved in advance. When it comes to TTIP, we still have no comprehensive information about what is going to be included or not when it comes to IP – as negotiations are carried out behind closed doors.

      Also, the ISDS mechanism in these trade agreements will make a much needed and long overdue copyright reform impossible.

    • CETA puts the protection of our privacy and personal data at risk

      We are constantly sharing parts of our lives on the internet. We feel free to do this because we believe that we can still preserve some privacy and remain in control of what we share. Governments have a moral and legal duty to protect our privacy, prevent abuses and preserve a climate of trust. This is done through laws. Nowadays, our online privacy and the protection of our personal information are threatened in “creative” ways. One of these ways can be found in the Comprehensive Economic Trade Agreement (CETA) between Canada and the European Union. Unlike traditional “trade agreements”, CETA goes far beyond trade, touching upon privacy and data protection, as well as other fundamental rights.

      Fifteen years ago, the European Union formally recognised that Canada offered EU citizens an adequate level of protection of their privacy and personal information, and this permitted EU data to be exported to Canada without additional restrictions. However, the European Court of Justice (CJEU) has recently clarified in the Schrems case that this means that non-EU countries must provide not just “adequate” but essentially equivalent protection as the EU does.

    • Boris Johnson’s ‘secret’ case against Brexit

      Boris Johnson thought Britain should stay in the European Union to avoid worsening “geostrategic anxiety” and a potential break-up of the United Kingdom, according to a “secret,” unpublished newspaper column by the foreign secretary.

      Johnson, the former mayor of London, was the figurehead for the Leave campaign in the run-up to the June 23 Brexit vote, but had flirted with supporting the other side earlier in the year.

    • Aide Planted Anti-Bank Comments in One Paid Clinton Speech to Throw Reporters Off the Scent

      A top aide calculatingly inserted a passage critical of the financial industry into one of Hillary Clinton’s many highly-paid speeches to big banks, “precisely for the purpose of having something we could show people if ever asked what she was saying behind closed doors for two years to all those fat cats,” he wrote in an email posted by Wikileaks.

      In late November 2015, campaign speechwriter Dan Schwerin wrote an email to other top aides floating the idea of leaking that passage, which had come in a speech Clinton gave to Deutsche Bank in October 2014 in return for $260,000.

      “I wrote her a long riff about economic fairness and how the financial industry has lost its way,” for that purpose, Schwerin wrote. “Perhaps at some point there will be value in sharing this with a reporter and getting a story written. Upside would be that when people say she’s too close to Wall Street and has taken too much money from bankers, we can point to evidence that she wasn’t afraid to speak truth to power.”

      Another email, from among the thousands posted by Wikileaks over the past week from Hillary Clinton Campaign Chairman John Podesta’s Gmail account, shows how panicked members of the Clinton campaign intervened at the last minute to cancel a paid Bill Clinton speech to Morgan Stanley because it was timed too close to the launch of her campaign — against the initial wishes of the candidate herself.

      In the passage that Schwerin wanted to leak from Clinton’s speech to Deutsche Bank, she quoted Chicago Mercantile Exchange president Terry Duffy warning that “some Wall Streeters can too easily slip into regarding their work as a kind of moneymaking game divorced from the concerns of Main Street.”

      In his email to his fellow aides, however, Schwerin recognized that the press response might not be entirely in the campaign’s favor. “Downside would be that we could then be pushed to release transcripts from all her paid speeches, which would be less helpful (although probably not disastrous). In the end, I’m not sure this is worth doing, but wanted to flag it so you know it’s out there.”

    • As the Spirit of Enoch Powell Presides Over England, Scotland Must Leave the Union Now

      I am genuinely stunned that, following the competitive racism-fest that was the Tory Party conference, the Tories have gone up in the opinion polls.

      I quite admit my judgement was completely wrong. I was feeling happily that the Tories had finally overreached themselves, and the implications of employers drawing up lists of foreign employees, or primary schools writing to parents demanding birth certificates, would be met with popular revulsion from the inherently decent British people.

      Well, I was wrong. Racism pays, at least in England. After their Conference the Tories are up to 43%. The Tories and UKIP combined are up to 54%. I am afraid it is intellectually dishonest to avoid the grim truth. At present, you cannot be too racist for popular English taste. The underlying theme of the Labour Party conference was Blairite calls for Labour to join in the mood of xenophobia. Of the existence of that mood there can now be no doubt.

    • I am Warming to Nicola

      The BBC spin on Nicola Sturgeon’s speech was that actually it was a move further back from Indyref2. It can be interpreted that way. In effect she was saying that leaving the EU is perhaps not a “material change” triggering Indyref2, only hard Brexit would be a “material change”. On this reading, as given by Brian Taylor of the BBC, the publishing of a draft Indyref bill is simply a sop to placate the SNP troops in the hall.

      But I am satisfied that Nicola has in fact deliberately set conditions for Scotland to remain in the Union which she knows Theresa May will under no circumstances meet. Barring continued full access for Scotland to the single market, which simply cannot happen if England leaves it, then she insists that not only must the powers held by Brussels come to Scotland (eg fisheries) but that Scotland must control its own immigration policy and run its own foreign relations.

  • AstroTurf/Lobbying/Politics

    • Leaked Podesta emails address Obama polling in 2008, executive privilege

      Emails leaked from Clinton campaign chairman John Podesta’s private email account Friday by WikiLeaks addressed using executive privilege to keep the emails between Hillary Clinton and President Obama from being released, a 2008 survey testing reaction to then-Sen. Obama’s Muslim father and use of cocaine, and a suggestion from former Michigan Gov. Jennifer Granholme on how to take Clinton out of the “bubble.”

    • Roaming Charges: a Wikileak is a Terrible Thing to Waste

      + I’ve spent the week greedily consuming the treats offered up by Wikileaks’s excavation of John Podesta’s inbox. Each day presents juicy new revelations of the venality of the Clinton campaign. In total, the Podesta files provide the most intimate and unadulterated look at how politics really works in late-capitalist America since the release of the Nixon tapes.

      + There’s a big difference, though. With Nixon, the stakes seemed greater, the banter more Machiavellian, the plots and counter-plots darker and more cynical.

      + The Podesta email tranches show the inner mechanics of a much more mundane, petty and banal political machine. Instead of shaping a campaign around an ideological movement, the Clinton operation resembles the packaging of a political mutual fund, a balanced, low-risk portfolio of financial interests, captive NGOs and dependent demographic sectors.

      + The red meat in the emails can be found in the disclosures of the internal rivalries, self-aggrandizement and sycophancy of hired guns and consultants, especially as they gravitate toward Podesta, whose chilly presence looms behind the scenes like the ghost of Thomas Cromwell.

    • Latest Wikileaks Releases Boost Case for DNC Class Action Lawsuit

      Shortly after the Democratic Primaries, attorneys Jared Beck and Elizabeth Beck, Harvard and Yale Law School graduates, filed a class action lawsuit against the Democratic National Committee and disgraced former DNC chair, Debbie Wasserman Schultz, for the millions of Bernie Sanders supporters they allegedly suppressed and silenced. The latest Wikileaks releases of Clinton campaign chair John Podesta’s emails has revealed further evidence that the scales were heavily tipped in favor of Hillary Clinton by both the DNC and the mainstream media.

      “The latest documents provided by Wikileaks confirm and add considerable detail to what prior leaks have disclosed: that the DNC was actively working to undermine Bernie Sanders’ campaign while colluding with the Hillary Clinton campaign behind the scenes,” Jared Beck told the Observer. “This is further evidence in support of our lawsuit, which seeks to hold the DNC and Debbie Wasserman Schultz accountable under the law for their failure to ensure a fair and neutral presidential nominating process.”

      The latest leaks include evidence current DNC interim chair Donna Brazile forwarded the Clinton campaign information about the Sanders campaign while she served as DNC vice chair and was obligated to remain neutral per the DNC Charter. Brazile also tipped off the Clinton campaign to a planned question on the death penalty the day before a Democratic town hall on CNN. “As soon as the nomination is wrapped up, I will be your biggest surrogate,” Brazile wrote to Podesta in a January 2016 email.

    • From liberal beacon to a prop for Trump: what has happened to WikiLeaks?

      How did WikiLeaks go from darling of the liberal left and scourge of American imperialism to apparent tool of Donald Trump’s divisive, incendiary presidential campaign?

      Thursday brought another WikiLeaks dump of nearly 2,000 emails hacked from the Hillary Clinton campaign, allegedly by Russians. As usual, they were inside-the-beltway gossip rather than game-changing: the campaign tried to push back the Illinois primary, believing it would make life harder for moderate Republicans.

      That has not stopped Trump trying to make hay from the leaked emails and deflect attention from allegations of sexual harassment against him. “Very little pick-up by the dishonest media of incredible information provided by WikiLeaks,” he tweeted on Wednesday. “So dishonest! Rigged system!”

    • Want to Know Julian Assange’s Endgame? He Told You a Decade Ago

      Amid a seemingly incessant deluge of leaks and hacks, Washington, DC staffers have learned to imagine how even the most benign email would look a week later on the homepage of a secret-spilling outfit like WikiLeaks or DCLeaks. In many cases, they’ve stopped emailing altogether, deleted accounts, and reconsidered dumbphones. Julian Assange—or at least, a ten-years-younger and more innocent Assange—would say he’s already won.

      After another week of Clinton-related emails roiling this election, the political world has been left to scrub their inboxes, watch their private correspondences be picked over in public, and psychoanalyze WikiLeaks’ inscrutable founder. Once they’re done sterilizing their online lives, they might want to turn to an essay Assange wrote ten years ago, laying out the endgame of his leaking strategy long before he became one of the most controversial figures on the Internet.

    • WikiLeaks Sources Face Serious Charges Following CIA, FBI, DHS Hacks

      Two North Carolina men were arrested in September for their alleged roles in a hacking group responsible for breaching the email accounts of CIA Director John Brennan, Homeland Security Secretary Jeh Johnson and Director of National Intelligence James Clapper — and providing the contents to WikiLeaks.

    • David Crosby: America is no longer a democracy

      At three o’clock in the morning on the day we talk, David Crosby woke from a sound sleep and wrote a song. He’ll be the first one to tell you that wasn’t the case years ago when he was touring huge venues with Crosby, Stills and Nash and CSNY in between bouts of his public struggles with drugs, alcohol and prison (he was jailed for five months in 1986 for on weapons and drugs charges).

      But with Lighthouse, a new album due this month, Crosby continues the hot streak he started in 2014 with Croz, his first solo album in 20 years. As a founding member of the Byrds and Crosby, Stills and Nash – and one of the finest voices of his generation – Crosby could well be sitting on his laurels. But the stunning material on Lighthouse, which is focused squarely on his vocals and guitar, suggest he is more creatively engaged than he has been since his much younger days.

    • Warnings of conspiracy stoke anger among Trump faithful

      In an arena normally reserved for ice hockey, the Donald Trump crowd was on edge.

      Some wore shirts with slogans like “[Expletive] Your Feelings” or, in reference to the female Democratic nominee, “Trump that Bitch.” Others had buckets of popcorn, ready for the show. When the media entourage entered, thousands erupted in boos.

      Anger and hostility were the most overwhelming sentiments at a Trump rally in Cincinnati last week, a deep sense of frustration, an us-versus-them mentality, and a belief that they are part of an unstoppable and underestimated movement. Unlike many in the country, however, these hard-core Trump followers do not believe the real estate mogul’s misfortunes are of his own making.

    • Transcripts of Clinton’s Wall Street talks released in new Wikileaks dump

      U.S. Democratic presidential candidate Hillary Clinton’s full remarks to several Wall Street audiences appeared to become public on Saturday when the controversial transparency group Wikileaks dumped its latest batch of hacked emails.

      The documents showed comments by Clinton during question-and-answer sessions with Goldman Sachs Chief Executive Lloyd Blankfein and Tim O’Neill, the bank’s head of investment management, at three separate events in 2013 in Arizona, New York and South Carolina.

      Some excerpts of Clinton’s speeches had already been released. For more than a week, Wikileaks has published in stages what it says are hacked emails from the account of John Podesta, Clinton’s campaign chairman.

      Clinton’s campaign has declined to verify the emails. Goldman Sachs did not immediately provide any comment on Saturday.

    • Donald Trump’s Son & Campaign Manager Both Tweet Obviously Fake Story

      It’s no secret that there’s been a huge number of totally fake news websites popping up in the past few years. Apparently, it’s a fun and profitable venture. While some of the fake news sites come up with generic names, like National Report, Hot Global, The Valley Report and Associated Media Coverage, some of the most successful fake news sites just make use of the big well-known broadcaster websites… and just get a .co domain: using nbc.com.co or abcnews.com.co. Some of the hoax stories are really well done — and, yes, even we’ve been fooled, though in our defense, the fake story we fell for… was so believable it became true just months later. But, of course, we’re just a bunch of random bloggers, not a Presidential campaign.

      The Trump campaign, on the other hand, should know better. Amusingly, of course, this week we’ve talked about the Trump campaign’s willingness to fall for hoaxes, but they seemed to take it up a notch this week. I first noticed it when I saw Trump’s campaign manager, Kellyanne Conway tweet an obviously fake story, claiming that an anti-Trump protestor was really paid by the Clinton campaign.

    • How One Young Black Man Supporting Trump Massively Skews The LA Times Presidential Poll

      Let’s jump right into this, because this post is going to be a bit on the wonky side. It’s presidential silly season, as we have said before, and this iteration of it is particularly bad, like a dumpster fire that suddenly has a thousand gallons of gasoline dropped onto it from a crop-duster flown by a blind zombie. Which, of course, makes it quite fascinating to watch for those of us with an independent persuasion. Chiefly interesting for myself is watching how the polls shift and change with each landmark on this sad, sad journey. It makes poll aggregating groups, such as the excellent Project FiveThirtyEight, quite useful in getting a ten-thousand foot view as to how the public is reacting to the news of the day.

      But sites like that obviously rely on individual polls in order to generate their aggregate outlooks, which makes understanding, at least at a high level, just how these political polls get their results interesting as well. And, if you watch these things like I do, you have probably been curious about one particular poll, the U.S.C. Dornsife/Los Angeles Times Daybreak poll, commonly shortened to the USC/LAT poll, which has consistently put out results on the Presidential race that differ significantly from other major polls. That difference has generally amounted to wider support for Donald Trump in the race, with specific differences in support for Trump among certain demographics. To the credit of those that run the poll, they have been exceptionally transparent about how they generate their numbers, which led the New York Times to dig in and try to figure out the reason for the skewed results. It seems an answer was found and it’s gloriously absurd.

    • Speaker Paul Ryan Tries to Change the Topic

      One day after Donald Trump spoke to a crowd of 20,000 in Cincinnati, Speaker Paul Ryan spoke to a group of about 100 undergraduates, 50 reporters and a phalanx of cameras on the “Failures of Liberal Progressivism” in a heavily controlled and scripted event in Madison on Friday.

      The students were members of the College Republicans of UW-Madison, a student group led by Gov. Scott Walker’s son Alex Walker.

      Acknowledging that the election has taken “a dark turn,” Ryan quickly pivoted to his hallmark message of fiscal austerity and his Better.GOP site, a website and policy plan first unveiled in June.

      [...]

      The invitation-only speaking engagement and managed “Q&A” at the Madison Masonic Center Foundation followed a tumultuous week for Ryan which began last Friday with the release of an Access Hollywood audio tape in which Trump brags about his ability to grope women. When you’re a star, “they let you do anything,” said Trump.

      The following day, Ryan rescinded Trump’s invitation to his annual “Fall Fest” in his congressional district. But Ryan was booed and heckled by some of Trump’s grassroots supporters and even called a “traitor,” according to news accounts. On Monday, Ryan said in a conference call with House Republicans that he will no longer defend Trump, nor campaign for him, over the objections of some.

    • Trump, Victim Shaming, Coincidences and Some Questions About the New York Times

      Did none of the many, many Republican primary candidates do any opposition research about Trump during the months and months of the primary season? Given the apparent accessibility of Trump sexual assault material, how was none of this found by Trump’s earlier opponents, who were certainly digging for dirt? A Ted Cruz or a Marco Rubio could have knocked Trump out of the race in April with half this information.

      Similar question; did no media investigate Trump’s background during his 18 months of candidacy?

      Coincidences happen, just not as often as we’d like to believe. Was any of the timing of any of this indeed coincidental, given much of this information was never reported for decades but is now front paged a few weeks before the election? I am well-aware of the reasons a woman might choose not to report an attack for many years. I am sometimes a bit more skeptical when after 30 years, during which Trump was in the media spotlight, and then another 18 months of Trump as a leading candidate, the accusations emerge only weeks before the election, timed nearly to the day with bookended presidential debates.

      And the big one.

      What process did the New York Times pursue before it decided to print the stories of the two initial Trump accusers? How did the Times vett their stories? If I were to walk into the Times’ newsroom today and report that either Trump or Hillary had inappropriately touched me in 1979, what process would unfold at the Times before my statement was published?

      I’m not being a smartass. I am not “victim shaming.” I do not believe asking these questions, especially the procedural questions about how the Times conducted its journalism, amounts to victim shaming. This is politics. No one is saying they are suing Trump, or engaged in a criminal case against him. It is at this point pure politics.

    • Russia, Terror and Taxes Dominate Debates; Climate, Poverty, Abortion Barely Mentioned

      A review of topics mentioned and questions asked in the first three presidential/vice-presidential debates shows a significant emphasis on Russia, terrorism and taxes—pushing aside most other issues, including climate change, abortion, education, campaign finance and LGBTQ rights.

      The total mentions of Russia and Putin—the number of times the words were said by either candidates or moderators—was 137. For ISIS and “terrorism” combined, it was 101. “Taxes” were mentioned 171 times—94 times in the context of tax policy, 77 times in regard to Donald Trump’s unwillingness to release his tax returns.

      In contrast, “climate change” (or “global warming”)—widely recognized as the biggest existential threat facing humanity—has only been mentioned three times. All three mentions were by Hillary Clinton, made in passing.

      “Poverty” (and “the poor”), “drugs,” “abortion” (with “right to choose” and “pro-life”) and “environment” have each been mentioned less than 10 times. LGBTQ issues (“LGBT,” “gay,” “trans,” “marriage equality”) were brought up in passing three times—once for the sole purpose of criticizing Russia. “Campaign finance” and/or Citizens United was brought up once by Clinton.

      The NSA (along with “privacy” and “surveillance”) and Native Americans have not been mentioned onstage once.

      In the first three debates, Russia and Putin have been mentioned more than the TPP, trade, race, guns, Social Security, the Supreme Court, education, student debt, poverty, drugs, abortion, climate change, LGBTQ issues and the environment combined, with 137 vs. 132 mentions.

    • Engage In Sex, Not War

      During the sexual scandals of Bill Clinton—the “bimbo eruptions” as Hillary called them—the Democrats and progressive opinion ruled out a person’s sex life as a political factor. Now suddenly nothing more than juvenile locker room banter without the actual sex has become the determinant of political unfitness.

      Where did the 11-year old recording of locker room talk between Donald Trump and Billy Bush come from? Who recorded it and kept it for 11 years for what purpose? Why was it released the day prior to the second debate between Trump and Hillary? Was the recording an illegal violation of privacy? What became of the woman who recorded Monica Lewinsky’s confession to her of sex with Bill Clinton? Wasn’t she prosecuted for wiretaping or some such offense? Why was Billy Bush, the relative of two US presidents, suspended from his TV show because of a private conversation with Trump?

    • The Donald Lives!

      The press had to cover it. Then the women marched into the auditorium at Washington University to watch Hillary Clinton defend her behavior toward them after their encounters with Bill.

      As the moderators and Hillary Clinton scrambled to refocus on Trump’s comments of a decade ago, Trump brought it back to Bill’s criminal misconduct against women, his lying about it, and Hillary’s aiding and abetting of the First Predator.

    • After the Republic

      Electing either Hillary Clinton or Donald Trump cannot change that trajectory.

      [...]

      Because it is difficult to imagine a Trump presidency even thinking about something so monumental as replacing an entire ruling elite, much less leading his constituency to accomplishing it, electing Trump is unlikely to result in a forceful turn away from the country’s current direction. Continuing pretty much on the current trajectory under the same class will further fuel revolutionary sentiments in the land all by itself. Inevitable disappointment with Trump is sure to add to them.

    • Blaming Millennials for Their Elders’ Trump Attraction

      Mahken, Stern and Boot all argue that declining civic education standards—a popular target of neoliberal criticism—gave rise to the ignorant population that bred Trump. There’s one basic problem with this premise: It doesn’t make any sense.

      If Trump’s support were tethered to declining education standards, the younger someone is (e.g. the more recently they were educated), the more likely they would be to vote Trump. But Trump’s voters trend overwhelmingly older: He’s most popular with voters 65 and over, least popular with those under 30

      The two most recent examples of this argument, by Stern and Boot, are textbook think piece sophistry: They begin with a superficially appealing premise designed to flatter the reader (people are dumber, therefore Trump; but not you, you’re smart) and throw out some data points, pivot to a conclusion that doesn’t follow and hope no one notices. While Boot doesn’t use the word Millennial, it’s the logical implication of what’s he’s advancing. (His examples supporting his claim that people are getting more stupid are all relatively recent.)

    • Dear Clinton Team: We Noticed You Might Need Some Email Security Tips

      There is probably no one more acutely aware of the importance of good cybersecurity right now than Hillary Clinton’s campaign chairman John Podesta, whose emails have been laid bare by WikiLeaks, are being mined for news by journalists (including at The Intercept), and are available for anyone with internet access to read.

      So as a public service to Podesta and everyone else on Clinton’s staff, here are some email security tips that could have saved you from getting hacked, and might help you in the future.

    • White House Brief: Things to Know about Jill Stein

      This isn’t Stein’s first foray into presidential politics. She ran on the Green Party line in 2012, failing to crack 500,000 votes or generate any significant spotlight. She thinks this time could be different, thanks to Sanders. Stein wasted no time swooping in on his political revolution, campaigning in Philadelphia during the Democratic National Convention and rallying throngs of angry Sanders’ supporters outside of the convention hall when the Vermont senator conceded the nod to Hillary Clinton.

      Stein’s running on a platform of erasing all existing student debt, mobilizing what she calls a wartime effort to switch the United States to 100 percent renewable energy by 2030 and disengaging from foreign wars that she says the United States has no business being in. She’s offering a dark view of the future, saying both Republicans and Democrats are leading the country into imminent disaster.

  • Censorship/Free Speech

    • CPJ calls on Thailand to not censor news during royal transition

      The Committee to Protect Journalists calls on Thailand’s military government to lift a blanket censorship order on television news broadcasters imposed in the wake of King Bhumibol Adulyadej’s death yesterday.

      According to local news reports, all television news channels including foreign broadcasters were blocked and replaced with Royal Household Bureau footage eulogizing the Thai king. Local media were also barred from using Facebook live indefinitely, according to reports. Bhumibol, the world’s longest-serving monarch at the time of his death, reigned for 70 consecutive years.

    • Thai TV flicks back to colour, subdued, after king’s death

      Thai television flicked back to colour today – but with orders to keep it subdued – as the government lifted a black-and-white rule imposed out of respect for the country’s late king.

      All channels, including international satellite networks, have been replaced with prepared state media programmes praising revered King Bhumibol Adulyadej’s death, who died Thursday after a 70-year reign.

    • 12 unspoken censorship rules for Bollywood, if it still wants to make movies

      The following are the unspoken censorship rules that Bollywood must follow if it still wants to make movies.

      1. Even if the Government of India issues visas to Pakistan talent you will not make films with them. You must understand that the government of India is not bothered about how our jawans are dying in the border fire but you, as a proud Indian, should be.

      2. Even if the Central Board of Film Certification clears your film, it can still be censored by political parties. The CBFC does not have people of any merit. They can only determine the length of the kiss in a film. It is our political parties who really know how to protect the value, culture and integrity of India.

    • Kashmir, Dylan, censorship hog limelight

      Sleepy Kasauli town reverberated with the sights and sounds of authors, intellectuals and actors as the three-day Khushwant Singh Literature Festival-2016 got underway on Friday.

      Apart from a number of panel discussions, the day also saw Himachal Pradesh chief minister Virbhadra Singh declaring the Khushwant Singh trail open.

      One of the highlights of the day was the panel consisting of former Jammu and Kashmir chief minister Omar Abdullah, author and journalist Rahul Pandita and author and historian Dilip Simeon talking about the crisis in Kashmir with the topic being “Kashmir: Cry the Beloved Country.”

  • Privacy/Surveillance

    • Police Around the Country Regularly Abuse Law Enforcement Databases

      For more than a year, EFF has been investigating how police in California misuse the state’s law enforcement database with little oversight from officials. An investigation published by the Associated Press today shows that abuse of law enforcement systems is a nationwide problem.

      The AP’s investigation analyzed records from all 50 states and three dozen of the country’s largest cities. The reporters found that officers have routinely used law enforcement and driver databases to stalk ex-partners, dig up dirt on their neighbors, and even spy on celebrities and journalists.

    • [Old] Why the Warrant to Hack in the Playpen Case Was an Unconstitutional General Warrant

      Warrants are often considered the basic building block of the Fourth Amendment. Whenever the government seeks to engage in a search or seizure, it must first get a warrant, unless a narrow exception applies. In a previous post, we explained the significance of the Fourth Amendment “events”—several searches and seizures—that occurred each time the government employed its malware against visitors to Playpen.

      But simply calling something a warrant doesn’t make it a constitutionally valid warrant. In fact, the “immediate evils” that motivated the drafters of the Bill of Rights were “general warrants,” also known as “writs of assistance,” which gave British officials broad discretion to search nearly everyone and everything for evidence of customs violations. In the words of colonial lawyer James Otis, general warrants “annihilate” the “freedom of one’s house” and place “the liberty of every man in the hands of every petty officer.”

    • What Yahoo’s NSA Surveillance Means for Email Privacy

      This is a terrible precedent and ushers in a new era of global mass surveillance. It means that US tech companies that serve billions of users around the world can now be forced to act as extensions of the US surveillance apparatus. The problem extends well beyond Yahoo. As was reported earlier, Yahoo did not fight the secret directive because Yahoo CEO Marissa Mayer and the Yahoo legal team did not believe that they could successfully resist the directive.

      We believe that Yahoo’s assessment is correct. If it was possible to fight the directive, Yahoo certainly would have done so since they previously fought against secret FISA court orders in 2008. It does not make sense that US surveillance agencies would serve Yahoo Mail with such an order but ignore Gmail, the world’s largest email provider, or Outlook. There is no doubt that the secret surveillance software is also present in Gmail and Outlook, or at least there is nothing preventing Gmail and Outlook from being forced to comply with a similar directive in the future. From a legal perspective, there is nothing that makes Yahoo particularly vulnerable, or Google particularly invulnerable.

    • CIA threatens cyber attacks against Russia

      The CIA was recently reported to have issued the threat of cyber attacks against the Russian leadership, in retaliation for alleged and unsubstantiated claims that Russia is trying to influence the American elections.

    • Five EFF Tools to Help You Protect Yourself Online

      Do you get creeped out when an ad eerily related to your recent Internet activity seems to follow you around the web? Do you ever wonder why you sometimes see a green lock with “https” in your address bar, and other times just plain “http”? EFF’s team of technologists and computer scientists can help. We engineer solutions to these problems of sneaky tracking, inconsistent encryption, and more. Our projects are released under free and open source licenses like the GNU General Public License or Creative Commons licenses, and we make them freely available to as many users as possible. Where users face threats to their free expression, privacy, and security online, EFF’s technology projects are there to defend them.

    • How a Facial Recognition Mismatch Can Ruin Your Life

      It was just after sundown when a man knocked on Steve Talley’s door in south Denver. The man claimed to have hit Talley’s silver Jeep Cherokee and asked him to assess the damage. So Talley, wearing boxers and a tank top, went outside to take a look.

      Seconds later, he was knocked to the pavement outside his house. Flash bang grenades detonated, temporarily blinding and deafening him. Three men dressed in black jackets, goggles, and helmets repeatedly hit him with batons and the butts of their guns. He remembers one of the men telling him, “So you like to fuck with my brothers in blue!” while another stood on his face and cracked two of his teeth. “You’ve got the wrong guy,” he remembers shouting. “You guys are crazy.”

    • Hillary Clinton’s Encryption Proposal Was “Impossible,” Said Top Adviser

      Hillary Clinton’s advisers recognized that her policy position on encryption was problematic, with one writing that it was tantamount to insisting that there was “‘some way’ to do the impossible.”

      Instead, according to campaign emails released by Wikileaks, they suggested that the campaign signal its willingness to use “malware” or “super code breaking by the NSA” to get around encryption.

      In the wake of the Paris attacks in November, Clinton called for “Silicon Valley not to view government as its adversary,” and called for “our best minds in the private sector to work with our best minds in the public sector to develop solutions that will both keep us safe and protect our privacy.”

      When asked during a debate in December whether she would legally compel companies to build a backdoor into their products to give law enforcement access to unencrypted communications, Clinton responded “I would not want to go to that point.”

      But she then called for a “Manhattan-like project” to develop secure communication while allowing the government to read messages.

      Cryptography experts overwhelmingly agree that backdoors inevitably undermine the security of strong encryption, making the two essentially incompatible.

    • Researchers Ask Court To Unseal Documents Related To Technical Assistance Requests And Electronic Surveillance Warrants

      This has the makings of a movement along the lines of the highly-unofficial “Magistrates Revolt.” More efforts are being made more frequently to push federal courts out of their default secrecy mode. The government prefers to do a lot of its work under the cover of judicial darkness, asking for dockets and documents to be sealed in a large percentage of its criminal cases.

      Just in the last month, we’ve seen the ACLU petition the court to unseal dockets related to the FBI’s takedown of Freedom Hosting using a Tor exploit and Judge Beryl Howell grant FOIA enthusiast Jason Leopold’s request to have a large number of 2012 pen register cases unsealed.

      Now, we have researchers Jennifer Granick and Riana Pfefferkorn petitioning [PDF] the Northern District of California court to unseal documents related to “technical assistance” cases — like the one involving the DOJ’s attempted use of an All Writs Order to force Apple to crack open a phone for it.

    • ‘NITE Team 4′ Announced, Seeks Crowd Funding – Screens & Trailer

      You play as a new recruit in the covert hacking cell, Network Intelligence & Technical Evaluation (NITE) Team 4. Engaged in cyberwarfare with black hat groups and hostile states, you will be in a struggle to penetrate highly secure targets. Your job is to use the STINGER hacking system to infiltrate hardened computer networks and coordinate strike teams on the ground to carry out missions that feature real espionage tradecraft terminology taken straight from leaked NSA documents.

    • New Story-Driven, TSW Inspired Sim Game Announced

      Alice & Smith have announced a new story-driven military hacking simulation game based on The Secret World. Called NITE Team 4, the game is based on both strategy and RPG elements with an emphasis and base on NSA top secret documents in the real world. A Kickstarter project has started and is already fully funded.

    • Military hacking RPG NITE Team 4 blends real NSA documents with gamified espionage

      In a world where hacking groups are a powerful tool in clandestine political warfare, we sure don’t exploit that rich fictional seam much in games. NITE Team 4, a currently funded Kickstarter title, looks to breach into that world and create an RPG out of what lies within.

    • Appeal Court Revives Lawyer’s Lawsuit Against The NSA’s Email Dragnet

      Another lawsuit against the NSA has been revived. Previously dismissed by a district court for lack of standing, attorney Elliott Schuchardt’s suit against the NSA for its domestic surveillance has been remanded back to the court that tossed it.

      Like several other surveillance lawsuits, Schuchardt’s springs from the Snowden leaks. Unlike some of the others, it doesn’t focus on the NSA’s phone metadata collection — the subject of the first Snowden leak. Instead, his challenges the constitutionality of the NSA’s Section 702 collection. With this program, the NSA apparently collects not just metadata on electronic communications, but also the content.

    • Even NSA BFF Verizon Thinks Warrantless Location Data Collection May Have Gone Too Far

      You’d be hard pressed to find companies more bone-grafted to the nation’s intelligence gathering apparatus than AT&T and Verizon. So much so that it’s often difficult to determine where the government ends, and where the telecom duopoly begins. From Mark Klein highlighting how AT&T was giving the NSA live access to every shred of data that touched the AT&T network, to Snowden’s revelation of Verizon’s handover of customer metadata, these are companies that were not only eager to tap dance around privacy and surveillance law, but actively mocked companies that actually stood up for consumer privacy.

      That’s why it’s notable to see one of Verizon’s top lawyers, Craig Silliman, penning an op-ed over at Bloomberg implying that location data hoovering has jumped the shark. Silliman details the problems arising in the age of location data collection, and specifically how four recent district courts have ruled that law enforcement can get location data without a warrant. These rulings relied on the “third-party doctrine,” or the argument that consumers lose privacy protections to this information if they’re willing to share it with a third party — aka Verizon.

    • Top German court rejects lawmakers’ request for NSA targets [Ed: same as below]
    • Top German court rejects lawmakers’ request for NSA targets

      Germany’s top court has rejected German lawmakers’ demands for access to a secret list of U.S. eavesdropping targets.

      Parliament’s intelligence oversight panel, known as the G 10 committee, had asked the Constitutional Court to force the German government to hand over the list. It contains “selectors” — such as phone numbers and email addresses — that the U.S. National Security Agency wants allies to monitor.

      Following ex-NSA contractor Edward Snowden’s leaks in 2013, German media reported that the targets included officials and companies in Germany and other European countries.

    • Salesforce CEO has “walked away” from deal with beleaguered Twitter

      In the wake of Salesforce’s CEO publicly saying Friday that his company would not buy Twitter, the popular social network’s stock price has dropped more than six percent as of this writing.

      “In this case we’ve walked away. It wasn’t the right fit for us,” Salesforce CEO Marc Benioff told the Financial Times.

      For months, rumors have swirled that numerous tech giants, ranging from Apple to Google, would snap up the San Francisco startup, which has lost nearly $2 billion from 2011 through 2015.

      Twitter has had a hard time attracting new users, which, in turn, has resulted in flat or slow growth.

    • After being outed for massive hack and installing an NSA “rootkit,” Yahoo cancels earnings call

      What do you do if your ailing internet giant has been outed for losing, and then keeping silent about, 500 million user accounts, then letting American spy agencies install a rootkit on its mail service, possibly scuttling its impending, hail-mary acquisition by a risk-averse, old economy phone company? Just cancel your investor call and with it, any chance of awkward, on-the-record questions.

    • DOJ: Microsoft Email Ruling Leaves Evidence Out of Authorities’ Hands

      In July, a court ruled that Microsoft did not have to provide the Department of Justice with the emails of a criminal suspect stored in Ireland. The case reportedly revolves around Gary Davis, who is charged with being a staff member of the dark web marketplace Silk Road.

      That ruling was seen as a victory for privacy and civil liberties campaigners. But the DOJ is not giving up. On Thursday, government attorneys filed a petition asking for the case to be reheard.

      The July ruling, “is significantly limiting an essential investigative tool used thousands of times a year, harming important criminal investigations around the country, and causing confusion and chaos among providers as they struggle to determine how to comply,” the DOJ writes in its petition, filed in the US Court of Appeals for the Second Circuit and sent to Motherboard by DOJ spokesperson Peter Carr.

    • Verizon reportedly wants $1 billion discount on Yahoo

      Verizon may not have bailed out of its deal to purchase Yahoo for $4.8 billion, but amid a growing case of bad news at the search engine company, the telecommunications giant is reportedly pushing to reduce the acquisition price by $1 billion.

      According to the New York Post, AOL chief Tim Armstrong, who runs the Verizon subsidiary that would be the umbrella company for Yahoo, is “getting cold feet.” Sources tell the publication that he’s “pretty upset about the lack of disclosure and he’s saying can we get out of this or can we reduce the price?”

      Yahoo is currently embroiled in two scandals, one of which involves hackers illegally accessing 500 million account. Members of the U.S. Congress have called upon the Securities and Exchange Commission to investigate Yahoo’s disclosures in light of the hacking. The other issue involves Yahoo’s apparent compliance with U.S. intelligence agencies in secretly scanning customer emails, especially years after the Snowden revelations.

  • Civil Rights/Policing

    • Amy Goodman Is Facing Prison for Reporting on the Dakota Access Pipeline. That Should Scare Us All.

      This Monday afternoon, as the sun hits its peak over Mandan, North Dakota, the award-winning journalist, and host of Democracy Now!, Amy Goodman will walk into the Morton County–Mandan Combined Law Enforcement and Corrections Center and turn herself in to the local authorities. Her crime: good, unflinching journalism.

    • Why Is North Dakota Arresting Journalists For Doing Journalism?

      Two years ago, we wrote about the ridiculousness of police arresting reporters for reporting in Ferguson, Missouri, even though courts had told police to knock it off. Even more ridiculous is that those reporters were eventually charged, leading to a ridiculous settlement earlier this year.

      And yet… arresting journalists for doing journalism continues to be a thing. As you probably know, there have been a bunch of protests in North Dakota lately concerning the Dakota Access Pipeline. Back in September, after covering the protests and having some of her videos of an attack on the protestors go viral, famed Democracy Now reporter Amy Goodman found out an arrest warrant had been issued for her. It’s pretty clear that this arrest warrant was solely because of the coverage reflecting poorly on officials.

      On Thursday, Goodman said that she’ll surrender to authorities next week. As Democracy Now points out, the criminal complaint against her is so transparently unconstitutional and so transparently about intimidating reporters, that it actually notes that “Amy Goodman can be seen on the video identifying herself and interviewing protesters about their involvement in the protest.” Right. That’s called journalism. Goodman was basically arrested for doing journalism that the powers-that-be dislike.

    • Outrageous! Felony Charges Given to Journalist Filming Anti-Pipeline Protest

      Many of you may have read my post on EcoWatch this morning, and already know that Deia Schlosberg, the producer of my new climate change documentary, How to Let Go of the World and Love All the Things Climate Can’t Change, was arrested Tuesday in Walhalla, North Dakota, for filming a protest against a pipeline bringing Canadian tar sands oil into the U.S.

    • The New Federal Safety Guidelines For Self-Driving Cars Are Too Vague… And States Are Already Making Them Mandatory

      The National Highway Traffic Safety Administration earned plaudits from across the tech sphere for its recently released safety guidelines for self-driving cars.

      With the NHTSA looking to offer guidance to this emerging industry, the agency issued a set of rules that largely just asks manufacturers to report on how they were following the guidelines. The 15-point checklist is vague in quite a few details, but that isn’t necessarily a tremendous problem so long as the standards remain voluntary, which they purport to be. To many, this approach struck a good overall balance between oversight and flexibility.

      Regulatory ambiguity can, however, turn out to be a real nightmare with standards that are mandatory. Vague rules can leave even the best-intentioned firms at a loss as to how to proceed. Given how much of a premium consumer confidence will be in a market as revolutionary and potentially transformative as autonomous vehicles, it’s crucial that manufacturers comply with whatever standards the federal government promulgates.

    • My Secret Evidence to Parliament’s Intelligence and Security Committee

      I have been considering my appearance before the Committee.

      As you will know, there has been very substantial doubt in the human rights community about the good faith of your committee’s inquiry. I have been prepared to give the benefit of the doubt and offer to cooperate.

      However if the committee really are genuine, they should wish me to be able to prepare and give the best evidence that I am able to do. There is no doubt that something went very wrong in terms of the UK government’s collusion with overseas torture programmes. The Feinstein report made plain that the CIA was very wrong in what it did, and your committee know very well that the CIA was sharing with SIS the intelligence obtained by torture. The British government has settled with large payments cases where the British government was involved more actively.

    • Structural Racism and Human-Rights

      In the first half-hour, author and professor Carol Anderson rejoins the Project Censored Show to discuss structural racism in the US, especially in the context of the presidential campaign. In the second half of the program, human-rights activists Hector Aristizabal and Isabel Garcia speak about conditions on the US-Mexico border, and how multiple US administrations have enforced border policies that bring death to many immigrants. They also discuss the Border Convergence taking place October 7 – 10.

    • A Missed Chance to Put Discriminatory Policing on Campaign Agenda

      But only a few—like Eugene Robinson at the Washington Post (10/7/16), Steven Holmes at CNN (10/7/16)—reminded us of Trump’s full-page screed in the New York Times, calling uncryptically for the young men to be executed and demanding an end to “our continuous pandering to the criminal population.” Trump’s CNN statement indicates that he would still support executing people whom the courts have found innocent. But no one withdrew their support or demanded an apology, and the comments were pushed off the page just hours later by the unearthing of tape of Trump joking about sexual assault.

      Those abhorrent remarks deserve the attention; but as The Intercept‘s Liliana Segura (10/11/16) noted, Trump’s comments on the Central Park Five also have wider repercussion. The ugly truth, she writes, is that his attitude is all too common in district attorneys’ offices. Prosecutors routinely defend the convictions of innocent people even after exoneration, and often block efforts to test for such evidence as DNA in the first place. When convictions are overturned, DAs often refuse to drop charges, dragging out the legal fight and forcing people found innocent to live under constant threat of re-imprisonment.

      Governors play a role—like Mike Pence, who recently refused to grant pardon to a man in Indiana, exonerated with DNA evidence after 10 years in prison. (Pence’s office said he refused to consider granting a pardon “out of respect for the judicial process.”)

      Hillary Clinton has shown more concern about wrongful convictions, but, Segura notes, she still supports the death penalty. And while in theory one might support executions while opposing killing innocent people, reality—preeminently, the exoneration of more than 150 death row prisoners to date — shows these positions are irreconcilable.

    • UK Torture Secrets Will Remain Secret

      The Foreign and Commonwealth Office has agreed that I shall be able to review Top Secret and other classified documents which contain the evidence of UK complicity in torture and my attempts to stop it, before giving evidence to the Intelligence and Security Committee of Parliament. But under conditions which make plain the determination that the dirtiest of secrets will remain firmly shut away. Given that parliament actually defers to the FCO over what can and cannot be done, the entire pointlessness of the Intelligence and Security Committee Inquiry is starkly revealed.

      Gareth Peirce as my counsel is not to be allowed in to any of my evidence where anything secret is being discussed – which is 100% of it. I think that really says everything about the “Inquiry” that you need to know.

    • For Black Men, Running Is a Reasonable Reaction to Police Harassment and Racial Profiling, Concludes Massachusetts’ Supreme Court

      The justices found that it’s reasonable for Black men to run from police because of the indignity of stop and frisk.

      In 2004, University of Virginia football player Marquis Weeks returned a kickoff 100 yards for a touchdown. After the game he described how he did it: “That was just instinct,” Weeks said with a laugh. “Kind of like running from the cops, I guess you could say.”

      It’s funny until it isn’t. The “instinct” exists for a reason. Black and brown people have been running from people with badges for generations, going all the way back to the days of the slave catchers, who were predecessors of modern-day police.

      Despite his obvious speed, the Massachusetts Supreme Judicial Court caught up with Mr. Weeks this month. The court found that the facts of the case, including that the young Black male suspect tried to avoid the police, did not justify a stop and search of the young man.

    • Report: Every 25 Seconds, Cops Arrest Someone for Drug Possession

      The war on drugs may have failed, but it certainly hasn’t ended: Every 25 seconds in the U.S., someone is arrested for drug possession.

      Arrests for the possession and personal use of drugs are boosting the ranks of the incarcerated at astonishing rates — with 137,000 people behind bars for drugs on any given day, and 1.25 million every year. Possession of even tiny quantities of illicit drugs is criminalized in every state, a felony in most, and the No. 1 cause of all arrests nationwide. And while marijuana is now legal in a handful of states and decriminalized in others, in 2015 police nationwide made over 547,000 arrests for simple marijuana possession — more than for all categories of violent crime combined. These arrests are feeding people into a criminal justice system that’s rife with inefficiencies, abuse, and racism, and compounding drug users’ substance abuse with the lifelong impact of a criminal record.

      The staggering numbers, detailed in a report released today by Human Rights Watch and the American Civil Liberties Union, shed new light on the colossal impact of the criminalization of drug use, as well as on the discriminatory impact of its enforcement. These laws have done nothing to stem the public health problem of drug addiction and in the process have destroyed countless lives and cost incalculable amounts of public resources in arrests, prosecution, and incarceration, the report charges.

      Nearly half a century after it was first launched by President Nixon, the war on drugs has been widely recognized to have been a failure, yet little of substance has been done to reverse its course and the catastrophic damage it continues to inflict. In fact, while piecemeal approaches to fixing some of its symptoms — like sentencing reform, marijuana reclassification, and some discussion of police abuse — have by now been embraced within mainstream politics, the drug war’s founding policy, the criminalization of the personal use and possession of drugs, has rarely been questioned.

    • Drawing Representative Districts

      FOR MORE THAN HALF A CENTURY, “one person, one vote” has been essential to American representative democracy. Key to preserving equal representation is redistricting, occurring most broadly every 10 years. The decennial census records population changes, which states must reflect in legislative districts to make the democratic process fair.

      But in many states this is a highly partisan process that is not always fair or in voters’ interests, says Laughlin McDonald, ACLU special counsel, who has fought voter suppression for decades. “Somewhere down the line they may consider the interest of the voters, but that’s not really what drives the process,” he says.

      Without Section 5 of the Voting Rights Act, states are now free, without federal oversight, to make election-related changes that could adversely affect racial and language minorities.

    • It Is Time to Get Real About School Policinga

      Interactions between young people and police don’t occur just on the streets of America — they’re happening in our nation’s K-12 schools, too. Increasingly police have become “embedded” in schools, in many cases working there full-time. Many are considered school staff and have daily authority over students, even in situations that have traditionally been seen as everyday disciplinary matters.

  • Internet Policy/Net Neutrality

    • The World Trade Organization Sets its Eyes on the Internet

      This week, EFF has been at the World Trade Organization (WTO)’s annual Public Forum. Best known to the general public as the locus of anti-globalization protests at its 1999 Ministerial Conference, it’s ironic that the WTO is today the most open and transparent of trade negotiation bodies—an honor it holds mainly because of how closed and opaque the trade negotiations conducted outside the WTO are, such as the Trans-Pacific Partnership (TPP), or on its margins, the Trade in Services Agreement (TISA).

      This year’s Public Forum, although notionally focusing on inclusive trade, has featured unprecedented interest in digital trade, with dozens of sessions dealing with this topic. Just a few of them, including the workshop “Boundaries and Best Practices for Inclusive Digital Trade” organized by EFF, have been summarized by the Geneva Internet Platform (you can also read slides from some of our workshop’s presentations below).

  • DRM

    • Amazon launches new ‘Music Unlimited’ service, starting at $4/month for use on just one Echo [Ed: DRM. Avoid.]

      Would you pay a few extra bucks a month to turn your smart home speaker into an intelligent, unlimited jukebox? Amazon is betting people will.

      The company on Wednesday is launching a new subscription music service, Amazon Music Unlimited, that starts at $3.99 a month for a library of tens of millions of songs. That’s less than half the cost of Apple Music, Spotify Premium and other competing music services.

    • Studio Ghibli’s first TV series getting English dub courtesy of Amazon

      Famed animation studio Studio Ghibli launched its first TV series, Ronja the Robber’s Daughter, in 2014, and fans’ wait for an official Western version is now coming to an end, thanks to Amazon.

      After the series’ 26-episode run wrapped, the studio began shopping an English-language version to various international channels and distributors. That shopping apparently concluded this week, as Amazon confirmed via a Friday press release that Ronja’s dub will debut exclusively on Amazon Video in the US, UK, Germany, Austria, and Japan. The news didn’t include a release date, but it did confirm one familiar voice joining the Ronja cast: Gillian Anderson, whose voice previously appeared in famed Ghibli film Princess Mononoke.

    • …And Here Come The Device-Restricted Music Subscriptions

      And so we enter a world with yet another means of fragmenting digital music services and making them way, way less appealing. At least they were decent enough to drop the price — but now that the floodgates are open, it’s entirely possible such heavily limited subscriptions will eventually become the new baseline, and truly open subscriptions that can be played anywhere (one of the biggest advantages of digital music) will morph into an expensive luxury. The key difference between this and our speculation about Apple limited output devices is that the restriction happens further upstream, with the subscription only being piped to one specific device — and if that device is an Echo Dot, there’s even still an analog jack so it can be plugged into just about anything else. But the next step — a subscription on a general purpose device like a phone with music that is artificially limited to only be output through certain devices, thanks to the DRM capabilities of digital-only connectors — feels slightly and worryingly closer to reality. And what will this accomplish? Nothing more than ensuring legal digital music continues to suck in unnecessary ways.

      The grand, omnipresent and incorrect assumption about music piracy is that it’s primarily motivated by price, and the desire to get content without paying. It’s not and it never has been: it’s motivated by restrictions, and the desire to easily access a wide variety of content how, when and where you choose. It’s about music being free, but not free as in beer.

      And so, naturally, the legacy music industry has sought out almost every opportunity to add restrictions and limitations to their digital offerings. Disruptive innovators like Spotify and Pandora fight an ongoing uphill battle to secure the necessary rights to offer something more open and appealing, and the massive digital retailers — Apple, Google and Amazon — drift around in between: aware and capable of the type of technological innovation necessary to make digital music services appealing, and armed with the money and clout to secure better licensing deals from rightsholders, but also prone (to varying degrees) to following in those rightsholders’ restrictive footsteps in order to fulfill their own dreams of total control and a captive audience. Amazon isn’t banking on people who are out searching for a digital music service deciding to go with the absurdly limited $4 option — it’s targeting existing Echo customers who might see it as a cheap add-on for some extra music around the house. It wants to upgrade those Echo users into Prime subscribers if they aren’t already (for even more music, since the services are weirdly fragmented from each other), and eventually turn new Echo-only music subscribers into fully dedicated Amazon Music customers. Instead of making it really, really easy to sign up for a music subscription that gives you everything you want on every device you own, it’s ensuring there are plenty of different ways for people to pay up for a tiny slice of that experience.

  • Intellectual Monopolies

    • Copyrights

      • Lawmakers Warned That 10 Year Sentences Could Apply to File-Sharers

        The UK is currently forming new legislation that will harmonize sentences for offline and online piracy. While the theoretical 10-year maximum sentence is supposed to target only large-scale pirates, this week MPs were warned that wording in the Digital Economy Bill is not tight enough to exclude file-sharers.

      • Company Offers “Fraudulent” and Deceptive Copyright Registrations

        A ring of misleading websites is charging people to pay for copyright registrations in the UK, Australia and elsewhere, even though it’s a free and automatic right. In India, where there’s also an official registration office, the authorities are taking legal action to stop the “fraudulent” operation.

        [...]

        Interestingly the Indian Copyright Office has now become the center of a rights dispute itself. As it turns out, the website copyright.in is offering ‘unofficial’ copyright registrations to Indians as well.

        The website in question offer users “anteriority proof for their copyrights” in 164 countries, charging roughly $10 for a copyright registration.

      • AllMyVideos.net to Shut Down, No Longer Profitable

        Video-hosting service AllMyVideos.net has announced that it will shut down its website next weekend. The operator says that it’s no longer profitable to host videos due to a lack of revenue and encourages users to back up their files before it’s too late.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

Further Recent Posts

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts