EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

01.07.15

Links 7/1/2015: Android Dominant in CES, OSVR in the Press

Posted in News Roundup at 12:23 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • ​CES 2015: Dell refreshes high-end XPS business laptop line

      If you’re a serious road warrior, and not a Chromebook Pixel fan like I am, you have two real choices: the Lenovo ThinkPad line and the Dell XPS line. Now, Dell has two new SPX versions and they’re looking sweet.

    • Michal Papis, Open Source Developer

      Michal has a very tweaked KDE setup. He discusses his use of Alt+Tab to switch between applications, rather than using virtual desktops, and I’m very glad he does. I too use Alt+Tab compulsively. I’ve experimented with virtual desktops, but Alt+Tab always does the job for me. I’ve always felt guilty that I didn’t do more with virtual desktops but Michal has given me the courage to officially give up on them. And for that, I’ll forever be grateful.

    • North Korea’s Red Star Linux OS: Made in Apple’s Image?

      Most of the recent headlines involving North Korea and computers have centered on whether the former was behind attacks against Sony. Here’s another fact about technology in North Korea that has been subject to less attention: The country has its own, home-grown Linux distribution, called Red Star OS, which happens to look a lot like Apple’s OS X.

  • Kernel Space

    • Linux Foundation AllSeen Alliance Expands Internet of Things Efforts

      The AllSeen Alliance today announced new initiatives and momentum in its bid to help advance standards for the emerging landscape that is the Internet of Things (IoT).

      The AllSeen Alliance is a multi-stakeholder effort that is operated as a Linux Foundation Collaboration project. The Linux Foundation first announced the AllSeen Alliance effort in December 2013, with the AllJoyn code contribution from Qualcomm serving as the basis. AllJoyn is a framework for enabling secure and seamless connectivity, as well as access, for IoT devices.

      Now the AllSeen Alliance is expanding the framework with the AllJoyn Gateway Agent that expands the footprint of IoT features beyond a user’s local environment, all the way out to the cloud.

    • A Look Inside A Live Linux Kernel

      As web designer, student and open source advocate Shaun Gillies points out, successful industry leaders or project managers in the open source community “frequently employ” peer review techniques as a criteria for quality control in their development cycle.

    • Linux Kernel 3.19 RC3 Is Small and Uneventful and Linus Is Happy About That

      The third RC for the Linux Kernel 3.19 branch has been announced by Linus Torvalds and it’s now available for download and testing. The development cycle continues without interruption and everything is on track.

    • Graphics Stack

      • X.Org Server 1.17 Should Ship Soon, X.Org Server 1.18 Likely To Be A Quicker Cycle

        Keith Packard of Intel has provided a status update concerning the soon-to-be-out X.Org Server 1.17 and its successor, X.Org Server 1.18.

        Continuing to serve as the de facto xserver release manager, Keith Packard wrote on Sunday that he feels the release of 1.17 is “quite close” but is just waiting to make sure everyone is happy with it before the code ships. For months the 1.17 release has planned to ship around the new year.

      • The Intel Haswell OpenGL Performance Boosting Patch Is Published

        Back in November I wrote about a Major Performance Breakthrough Discovered For Intel’s Mesa Driver due to testing done by LunarG and uncovered with the help of Intel. That performance-boosting patch has been queued up for drm-intel-next thus meaning it will be present with the next major kernel cycle — the Linux 3.20 kernel.

    • Benchmarks

      • Test Driving The New Intel Haswell Linux Performance Patch

        For this quick on-the-spot comparison I ran some benchmarks of Linux 3.19-rc3 compared to the drm-intel nightly kernel state that is Linux 3.19 plus the Intel DRM kernel driver work under development that will ultimately be merged for Linux 3.20. This latest drm-intel code contains the anticipated Haswell specific performance patch.

  • Applications

  • Desktop Environments/WMs

    • Fluxbox 1.3.6 Released After Two-Year Wait

      After nearly two years since the previous release, the Fluxbox team has released Fluxbox 1.3.6 (codenamed “It’s about time”) to start off the new year.

      For new Linux users, Fluxbox is a long-standing X window manager derived from Blackbox. Fluxbox is lightweight and very fast yet offers a lot of functionality.

    • GNOME Desktop/GTK

      • GNOME 3.16 To Have Foursquare Integration, Check-In On GNOME Maps

        Thanks to Damián Nohales’ work last summer on Foursquare support in GNOME via Google Summer of Code 2014, GNOME 3.16 has basic support for this location sharing service now focused on local search.

      • SQLite, VACUUM, and auto_vacuum

        The week before Christmas I hunkered down and took on a nagging issue in Geary I’m almost embarrassed to discuss. The long and short of it is, prior to this commit, Geary never deleted emails from its internal SQLite database, even if they were deleted on the server. It was a classic problem of garbage collection and reference counting. (If you’re interested in the problem and why Geary didn’t simply delete an email when it was not visible in a mail folder, the original ticket is a good place to start.)

      • GNOME MultiWriter and Large Hubs

        Today I released the first version of GNOME MultiWriter, and built it for Rawhide and F21. It’s good enough for a first release, although there are still a few things left to do. The most important now is probably the self-profiling mode so that we know the best number of parallel threads to use for the read and the write. I want this to Just Work without any user interaction, but I’ll have to wait for my shipment of USB drives to arrive before I can add that functionality.

      • GNOME MultiWriter Is an Awesome New App That Writes ISO Files to Multiple Devices

        The GNOME stack is getting all kind of interesting apps and now a new one is in the making, called the GNOME MultiWriter. This app is capable of writing an ISO to multiple devices at once and it’s doing it with a simple and clear interface.

  • Distributions

    • New Releases

      • Alpine Linux 3.1.1 released

        The Alpine Linux project is pleased to announce the immediate availability of version 3.1.1 of its Alpine Linux operating system.

        This is a bugfix release of the v3.1 musl based branch. This release is based on the 3.14.27 kernel which has some critical security fixes.

    • Screenshots

    • PCLinuxOS/Mageia/Mandriva Family

      • “That Other OS”

        PCLinuxOS even does a minimal installation more or less the way I like with most software installation after the first boot but they are not going the way I intend to move sooner rather than later, to ARM. I guess Debian has spoiled me for any other distro. It’s just hard to beat someone with that kind of depth and experience.

    • Arch Family

    • Red Hat Family

      • Red Hat Foresees Sprawling Cloud, Container Specs in 2015

        Meanwhile, as OpenStack and Linux container technologies begin to “collide” in 2015, greater consolidation in areas like workload orchestration (Heat, Kubernetes, Mesos and Yarn) is expected to accelerate. Mark Coggin, Red Hat’s senior director for platform product marketing, said containerization of OpenStack services would help address “the installation complexities of OpenStack, and also facilitate the building of more complex solutions like high availability and fail-over, workload clustering and load balancing, high performance storage infrastructure and application autoscaling.”

      • Ceph for Cinder in TripleO

        A wrap up on the status of TripleO’s Cinder HA spec. First, a link to the cinder-ha blueprint, where you can find even more links, to the actual spec (under review) and the code changes (again, still under review). Intent of the blueprint is for the TripleO deployments to keep Cinder volumes available and Cinder operational in case of failures of any node.

      • Time has come to support some important projects!

        If you read this blog entry it is very likely that you are a direct beneficiary of open source and free software. Like myself you probably have been able to get hold of, use and tinker with software that in the old world of closed source dominance would all together have cost you maybe ten thousand dollars or more. So with the spirit of the Yuletide season fresh in mind it is time to open your wallet and support some important open source fundraising campaigns.

      • Fedora

        • Fedora 19 “Schrödinger’s Cat” Reaches EOL and Is Now Definitely Dead

          Fedora 19 “Schrödinger’s Cat” was initially released back in July 2013 and it was alive for a year and a half. Now, the distribution has reached end of file and it’s no longer supported by its developers.

        • Fedora 19 End of Life
        • Fedora 19 Reaches End Of Life State

          If you’re still running Fedora 19 for some reason, you better think about upgrading to Fedora 20/21 as F19 has now reached its end of life.

        • NetworkManager 1.0 released!

          A decade ago seems like a long time in open source. In those days, networking was not easy to configure in Linux systems like Fedora. Networking stacks didn’t play well with each other, and some used frequently today didn’t even exist then. Configuring a laptop for good mobility across networks was difficult, or sometimes impossible.

    • Debian Family

      • Bootstrapping arm64 in Debian

        arm64 is officially a release architecture for Jessie, aka Debian version 8. That’s taken a lot of manual porting and development effort over the last couple of years, and it’s also taken a lot of CPU time – there are ~21,000 source packages in Debian Jessie! As is often the case for a brand new architecture like arm64 (or AArch64, to use ARM’s own terminology), hardware can be really difficult to get hold of. In time this will cease to be an issue as hardware becomes more commoditised, but in Debian we really struggled to get hold of equipment for a very long time during the early part of the port.

      • 64-bit ARM Support Is Moving Along In Debian

        With the upcoming release of Debian 8.0 “Jessie”, AArch64/ARM64 will become an official release architecture.

      • Kodi from Debian

        As of today Kodi from Debian uses the FFmpeg packages instead of the Libav ones which have been used by XBMC from Debian. The reason for the switch was upstream’s decision of dropping the Libav compatibility code and FFmpeg becoming available again packaged in Debian (thanks to Andreas Cadhalpun). It is worth noting that while upstream Kodi 14.0 downloads and builds FFmpeg 2.4.4 by default, Debian ships FFmpeg 2.5.1 already and FFmpeg under Kodi will be updated independently from Kodi thanks to the packaging mechanism.

      • Use Module::Build::Tiny as Debian policy compliant
      • Derivatives

        • Canonical/Ubuntu

          • Ubuntu Make Adds Google Go Support, Game Category

            Ubuntu Make, formerly known as the Ubuntu Developer Tools Center, is up to version 0.4 and it adds Go language support.

            Ubuntu Make is one of the newer Ubuntu Linux projects for making it easier for developers to quickly and easily setup development environments on the popular distribution. Ubuntu Make 0.4 was released today and it introduces Google Go support along with bringing a new game category. Ubuntu developers can run umake go to deploy the latest version of Google golang along with setting up the proper build environment.

          • Builder Update

            I’ve been really busy during the start of the Builder fundraising campaign trying to round up funds. We still have some larger donations planned that I hope to see land in the not to distant future. We are one week of four complete and have raised nearly 60% of the requested funds!

            This means that I haven’t got to write as much code the last week as I would have liked, but our contributors have picked up the slack.

            For a New Years gift, I put together some tools for those of you that work with HTML. The auto indentation engine now supports HTML, so you wont need to fuss about with alignments anymore. Just hit enter after your opening element and you’ll be properly indented. I also added the basis for what will be the HTML autocompletion engine. It’s not very complete yet, but if someone wants to own it, I’d be happy to hand it off. Longer term, I’d prefer to see it work of the document’s DTD.

  • Devices/Embedded

    • WeMo can now light your smart home from the inside and out

      Following Sunday’s expansion of the WeMo ecosystem with a bevy of sensors, Belkin’s home automation brand is today announcing an expanded lineup of smart lighting devices from Osram Sylvania and TCP (Technical Consumer Products).

    • All of Samsung’s 2015 Smart TVs will be powered by Tizen

      Samsung’s new SUHD TVs announced at CES today will be powered by it’s new Tizen OS.

    • [Developer] Samsung Tizen TV SDK 1.2

      With the launch of the Samsung Tizen TV, we also see the release of the updated Samsung Tizen TV SDK 1.2. This SDK has the tools you need to start developing applications for the Tizen TV Platform. The tools include an Integrated Development Environment (IDE) for HTML5, JavaScript, CSS code editing, a light-weight TV Simulator for testing webapps, and a TV Emulator. You also get templates for TV applications

    • Linux Representing at CES

      Linux at CES tops our news coverage for today. In other news OpenSource.com says installing Linux from Scratch can help users learn “the building blocks” of Linux and Softpedia.com says users “are going crazy” for circle icons. Elsewhere Jack Germain spoke to The Document Foundation and Open Source Business Alliance about reaching the goal of universal open document standards.

    • CES 2015: Microchip Technology shows off 30 demos

      Microchip Technology Inc. of Chandler announced Tuesday at CES 2015 that it has joined the Linux Foundation and Automotive Grade Linux to develop software for the connected car.

    • [Video] Samsung Gear S Apps

      This is an Interesting little 1 minute video that I found on the web. It takes you through the advantages of having a Tizen based Samsung Gear S or leaving your Smartphone at home. You have fitness capabilities as well as an App store that you can download applications that are suitable to you and your lifestyle.

    • Tizen TV is Launched with Samsung SUHD Models JS8500, JS9000 and JS9500

      It is with a huge smile that I say Samsung launched their SUHD Lineup of Tizen TVs at the packed Samsung Press Conference at CES 2015. The TVs hold the promise of a superior picture which has 64 times more color expression and will be 2.5 times brighter than conventional TVs. The TV will be running the Tizen OS, which will be optimised for the TV User Interface (UI) making it more responsive compared to previous UIs.

    • CES 2015: Linksys WRT1200AC Router Is a Beast with 512 MB and Official OpenWRT Support

      Linksys has just announced its new WRT1200AC 2×2 Dual Band Wireless AC Router at CES 2015. It might sound like just another router, but this is interesting because it also comes with OpenWrt support by default.

    • Phones

Free Software/Open Source

Leftovers

  • Apple Slapped With Another Lawsuit
  • Security

  • Defence/Police/Secrecy/Aggression

    • The greatest trick Obama ever pulled was convincing the world America isn’t still at war

      The holiday headlines blared without a hint of distrust: “End of War” and “Mission Ends” and “U.S. formally ends the war in Afghanistan”, as the US government and Nato celebrated the alleged end of the longest war in American history. Great news! Except, that is, when you read past the first paragraph: “the fighting is as intense as it has ever been since the U.S.-led invasion in 2001,” according to the Wall Street Journal. And about 10,000 troops will remain there for the foreseeable future (more than we had a year after the Afghan war started). Oh, and they’ll continue to engage in combat regularly. But other than that, yeah, the war is definitely over.

    • Open source intelligence (OSINT) iBrabo tracks Syrian tweet location of ISIS suspect

      Reports in the Independent newspaper and elsewhere suggest that the open source intelligence research group iBrabo has helped with information capture technology in the quest to pin down a suspected ISIS militant.

      A New Zealand born individual, Mark John Taylor (who uses the names Mohammad Daniel or Abu Abdul Rahman) is said to have now suspended his Twitter account after inadvertently tweeting his location while in Syria.

    • 12 Dead in Attack on Paris Newspaper; France Goes on Alert

      Masked gunmen shouting “Allahu akbar!” stormed the Paris offices of a satirical newspaper Wednesday, killing 12 people before escaping. It was France’s deadliest terror attack in at least two decades.

      French President Francois Hollande called the attack on the Charlie Hebdo weekly, which has frequently drawn condemnation from Muslims, “a terrorist attack without a doubt” and said several other attacks have been thwarted in France “in recent weeks.”

    • France says ready to strike Libya militants

      France said Monday its troops south of Libya are ready to strike extremists crossing the border, but the speaker of Libya’s internationally recognized parliament rejected any Western military intervention in his country.

      French President Francois Hollande urged the United Nations to take action to stem growing violence in the North African country and the transit of arms from Libya to militant groups around the Sahel region.

  • Environment/Energy/Wildlife

    • Fracking in Ohio confirmed as cause of rare earthquake strong enough to be felt

      A new study links the March 2014 earthquakes in Poland Township, Ohio, to hydraulic fracturing that activated a previously unknown fault. The induced seismic sequence included a rare felt earthquake of magnitude 3.0, according to new research.

    • As Oil Drops Below $50, Can There Be Too Much of a Good Thing?

      Cheaper oil is still creating more winners than losers. Far more people live in oil-importing countries than live in oil-exporting countries. The U.S., for one, remains a net importer. The well-publicized travails of U.S. shale oil producers are small compared with the gains by American consumers and businesses that are paying less for gasoline, diesel, jet fuel, petrochemicals, and the like. With fuel prices down, people are driving more miles and buying more cars and trucks.

  • Finance

    • USA Today Makes Sure Rich Don’t Get Blamed for Middle-Class Stagnation

      The “Nation’s Newspaper” boasts that most of its “editorials are coupled with an opposing view–a unique USA Today feature.” So you’re getting both sides, is the implication–when in fact what you’re more likely to get is perception management, as the Gannett-owned paper makes clear which opinions are to be taking seriously and which are beyond the pale.

      [...]

      That’s a good point, as far as it goes. Where doesn’t it go? For one thing, it doesn’t point out that this is not a problem that started in 1999, but at least 25 years earlier: US median household income has grown only 7 percent since 1973, even as per capita GDP has roughly doubled.

      And where has all that income gone? That phrase “for the non-wealthy” conceals it: While most people have seen little or no income growth over the past four decades, the rich have enjoyed a long-term boom. The top 1 percent of households, for example, have seen their real after-tax income rise by 200 percent since 1979.

    • The Coming War on Pensions

      On the Senate’s last day in session in December, it approved the government’s $1.1 trillion budget for coming fiscal year.

      Few people realize how radical the new U.S. budget law was. Budget laws are supposed to decide simply what to fund and what to cut. A budget is not supposed to make new law, or to rewrite the law. But that is what happened, and it was radical.

      Wall Street’s representatives in Congress – the Democratic leadership as well as Republicans – took the opportunity to create an artificial crisis. The press called this “holding the government hostage.” The House – backed by the Senate – said that it would shut the government down at some future date if two basic laws were not changed.

    • Nobel Laureate Stiglitz Blocked From SEC Panel After Faulting High-Speed Traders

      Joseph Stiglitz, the Nobel laureate economist who called for a tax on high-frequency trading, has been blocked from a government panel that will advise regulators on issues facing U.S. equity markets, according to people familiar with the matter.

      Stiglitz’s rejection shows the partisan infighting that has bogged down Securities and Exchange Commission Chair Mary Jo White’s plan to set up a panel of experts to advise the agency on topics ranging from rapid-fire stock trading to dark pools.

    • Inequality and the American Child

      Children, it has long been recognized, are a special group. They do not choose their parents, let alone the broader conditions into which they are born. They do not have the same abilities as adults to protect or care for themselves. That is why the League of Nations approved the Geneva Declaration on the Rights of the Child in 1924, and why the international community adopted the Convention on the Rights of the Child in 1989.

    • Authoritarianism, Class Warfare and the Advance of Neoliberal Austerity Policies

      Right-wing calls for austerity suggest more than a market-driven desire to punish the poor, working class and middle class by distributing wealth upwards to the 1%. They also point to a politics of disposability in which the social provisions, public spheres and institutions that nourish democratic values and social relations are being dismantled, including public and higher education. Neoliberal austerity policies embody an ideology that produces both zones of abandonment and forms of social and civil death while also infusing society with a culture of increasing hardship. It also makes clear that the weapons of class warfare do not reside only in oppressive modes of state terrorism such as the militarization of the police, but also in policies that inflict misery, immiseration and suffering on the vast majority of the population.

  • PR/AstroTurf/Lobbying

    • Inside Putin’s Information War

      There were more than 20 of us sitting around the long conference table: tanned broadcasters in white silk shirts, politics professors with sweaty beards and heavy breath, ad execs in trainers—and me. There were no women. Everyone was smoking. There was so much smoke it made my skin itch.

    • O’Reilly Hosts Former KKK Leader David Duke To Defend GOP Rep. For Speaking To White Supremacist Group

      Bill O’Reilly interviewed former Ku Klux Klan leader David Duke about GOP Rep. Steve Scalise’s address to a white supremacist group in a segment Duke turned into a bizarre defense of his reputation.

      Scalise, who has a leadership position in the GOP as the House Majority Whip, has apologized for speaking to a white supremacist conference in 2002. Conservative media are divided on whether Scalise is a victim of the media, or made a mistake serious enough for him to resign his leadership post.

    • Web Journalist Who Broke Scalise Scandal: “I Knew It Was A Bombshell”

      “It was reassuring to me that this story became national and became international. It just demonstrates that America has very little patience for any politician that would associate with white nationalists and would speak in front of their conference,” he said. “What I was really blown away by was the respect the mainstream media afforded me … I thought that was really, for me as an independent journalist, it was really reassuring.”

  • Censorship

    • With Power of Social Media Growing, Police Now Monitoring and Criminalizing Online Speech

      The following day, Ahmed was arrested and “charged with a racially aggravated public order offense.” The police spokesman explained that “he didn’t make his point very well and that is why he has landed himself in bother.” The state proceeded to prosecute him, and in October of that year, he was convicted “of sending a grossly offensive communication,” fined and sentenced to 240 hours of community service.

    • Writers in “free” countries are chilled by government surveillance, study finds

      So says PEN America, which today released the results of a survey conducted in the fall of 2014, asking writers worldwide how their freedom of expression has been impacted by NSA surveillance. Perhaps most significantly, the survey results show that writers in countries designated “free” by the organization Freedom House are at least as worried—and in some cases, more worried—about government surveillance than writers in “non-free” countries. 75% of respondents from “free” countries told PEN they were “very” or “somewhat” concerned about government surveillance.

    • Writers Say They Feel Censored by Surveillance

      A survey of writers around the world by the PEN American Center has found that a significant majority said they were deeply concerned with government surveillance, with many reporting that they have avoided, or have considered avoiding, controversial topics in their work or in personal communications as a result.

    • Intel closes its Russian developer forums to escape Kremlin censorship

      Intel, the latest American tech firm to fall into the Kremlin’s crosshairs, closed the site and redirected users to its sites hosted outside of Russia, along with third-party forums hosting Intel discussions. The news follows a December decision by the Russian government to block GitHub after developers posted politicized code on the site.

  • Privacy

    • Let’s Encrypt (the Entire Web): 2014 in Review

      Last month we were very pleased to announce our work with Mozilla, the University of Michigan, Cisco, Akamai and IdentTust on Let’s Encrypt, a totally free and automated certificate authority that will be launching in summer 2015. In order to let mainstream browsers seamlessly connect securely to your web site, you need a digital certificate. Next year, we’ll provide you with that certificate at no charge, and, if you choose, our software will install it on your server in less than a minute. We’ve been pursuing the ideas that turned into Let’s Encrypt for three years, so it was a great pleasure to be able to share what we’ve been working on with the world.

    • The NSA’s Funny Numbers, Again

      While it appears NSA managed to give IOB (completely redacted) numbers for the files involved, it appears PCLOB never got a clear count of how many were involved. It’s not clear that NSA ever admitted this data may have gotten mixed in with Stellar Wind data. No one seems to care that this was a double violation, because techs are supposed to destroy data when they’re done with it.

      Though, if you ask me, you should wait to figure out why so many records were lying around a tech server before you destroy them all. But I’m kind of touchy that way.

      One thing I realize is consistent between the internal audit and the IOB report. The NSA, probably the owner of the most powerful computing power in the world, consistently uses the term “glitch” to describe software that doesn’t do what it is designed to to keep people out of data they’re not supposed to have access to.

    • The Government Spent a Lot of Time in Court Defending NSA Spying Last Year: 2014 in Review

      EFF continued litigation in our mass spying cases Jewel v. NSA for several spying methods and First Unitarian Church of Los Angeles v. NSA for the mass telephone records collection. We also joined the legal team in Smith v. Obama when the case went to the Ninth Circuit on appeal, and joined Klayman v. Obama and ACLU v. Clapper as amici. Finally, we sued the Department of Justice for failing to respond to multiple Freedom of Information Act requests.

    • Protesters: The FBI is probably spying on your phone, and no, they didn’t get a warrant for that

      The FBI assures lawmakers that they obtain warrants to use controversial cell-site simulators, otherwise known as stingrays—except when they don’t, which is pretty much always, according to information obtained by Senators Leahy and Grassley.

    • Months later, key details about StingRay non-disclosures yet to be disclosed

      It’s been months since we learned of the seemingly compulsory non-disclosure agreement that the FBI hands police eager to use cell phone tracking equipment. But we still know precious little about which departments nationwide aren’t allowed to tell us what about their StingRays.

    • Writers in ‘Free’ Countries Now Share Surveillance Concerns With ‘Not-Free’ Brethren

      Writers living in liberal democracies are now nearly as worried about the government watching them as their colleagues in countries that have long histories of internal spying, according to an international survey conducted by PEN, a literary and human rights organization.

      Brave writers have historically stood up to even the gravest threats from authoritarian regimes. Conversely, there have always been some who willingly censor themselves.

    • FBI says search warrants not needed to use “stingrays” in public places

      The Federal Bureau of Investigation is taking the position that court warrants are not required when deploying cell-site simulators in public places. Nicknamed “stingrays,” the devices are decoy cell towers that capture locations and identities of mobile phone users and can intercept calls and texts.

      The FBI made its position known during private briefings with staff members of Senate Judiciary Committee Chairman Patrick Leahy (D-Vt.) and Sen. Chuck Grassley (R-Iowa). In response, the two lawmakers wrote Attorney General Eric Holder and Homeland Security chief Jeh Johnson, maintaining they were “concerned about whether the FBI and other law enforcement agencies have adequately considered the privacy interests” of Americans.

    • How Britain Exported Next-Generation Surveillance

      IT WAS A COOL, QUIET MONDAY EVENING in northeast England when the computer first told them about Peter Chapman. The clock read a little after five, and two officers from Cleveland police were cruising in their patrol car. A screen lit up next to them: the on-board computer was flashing an alert from the local police network. The message told them the target was a blue Ford Mondeo and gave them its registration number.

      It was only a few minutes before they came across the car and pulled it over with a sounding of their siren. Inside was Chapman, a 33-year-old convict wanted for questioning in connection with a string of offences, including arson and theft. The officers verified his identity and took him to a station just a few miles away.

      At 5:07 p.m. on October 26, 2009, just 20 minutes before he was arrested, Chapman had driven past an Automatic Number Plate Recognition (ANPR) camera stationed next to the road. As his car passed, the camera recorded its registration number, together with the time and location, and sent the information to Cleveland Police’s internal computer network, where it was checked against a hotlist downloaded from Britain’s central police database.

    • Total online privacy

      Protect your privacy and your personal information from advertisers, doxxers and anyone you may feel threatened by

    • Privacy Not Included

      So, to help you navigate your way round this privacy jungle, we have created a simple 10 step guide to the little things you can do to help you stay safe and private. After all there’s no need to spoil a beautiful tech friendship before it’s even begun.

    • New Threat to Openness in the EU: Trade Secrets Directive

      Putting all that together, and it’s hard not to see these moves as part of a concerted, global action to make the protection of trade secrets much stronger, and to create new “rights” for companies, which can be used against openness in all its forms. That’s worrying, and swims against the prevailing historical current for more, not less, openness. We must resist it wherever it appears, lest it starts to roll back some of the hard-won gains of recent years – not just for areas like open data and open science, but even for open source itself.

    • Global Moves To Give Corporations Yet More Legal Weapons By Strengthening Laws Protecting Trade Secrets

      Techdirt often discusses the problems with intellectual monopolies such as copyrights, patents and trademarks. These grant powers to exclude others from using something — creative works, inventions, words and phrases. Increasingly, they create dense thickets of obligatory permissions that make it hard or even impossible for others to build on pre-existing work. That may serve the purposes of the monopolist, but is frequently to the detriment of society. Despite the fact that the enforcement options available to holders of such intellectual monopolies have been repeatedly and disproportionately strengthened in recent years, it seems that too much is never enough: there is now a move to boost another kind of monopoly right, that of trade secrets.

    • EFF: Law enforcement ‘desperately’ trying to hide use of surveillance cell towers

      Law enforcement organizations around the country are desperate to keep the public unaware of the use of Stringrays, a surveillance technology that secretly monitors cell phones, even as courts and lawmakers are starting to fight back.

      That’s the conclusion of the Electronic Frontier Foundation (EFF), which tallied up a year’s worth of public records requests by American media organizations, as well as court and legislative actions, related to the government’s use of the technology, also known as IMSI catchers.

    • Of Course 23andMe’s Plan Has Been to Sell Your Genetic Data All Along

      Today, 23andMe announced what Forbes reports is only the first of ten deals with big biotech companies: Genentech will pay up to $60 million for access to 23andMe’s data to study Parkinson’s. You think 23andMe was about selling fun DNA spit tests for $99 a pop? Nope, it’s been about selling your data all along.

      Since 23andMe started in 2006, it’s convinced 800,000 customers to hand over their DNA, one vial of spit at a time. Personal DNA reports are the consumer-facing side of the business, and that’s the one we’re most familiar with. It all seems friendly and fun with a candy-colored logo and quirky reports that include the genetic variant for asparagus pee.

    • Court Asked Why There’s No Expectation Of Privacy In Cell Location Data, But An Expectation Of Privacy In The Cellphone Itself

      The government continues to argue that the Third Party Doctrine trumps the Fourth Amendment. Almost any “business record” created intentionally or inadvertently can be had by the government without a warrant. Even if the citizen in question has no ability to control what’s collected by third parties (without forgoing the service entirely) or is completely unaware that it’s happening, the government claims records of this type have no expectation of privacy.

  • Civil Rights

    • White Man Publishes Book! USA Today Mistakes This for News

      A collection of short stories published by entertainment lawyer Kevin Morris makes the front page of USA Today’s Money section (1/4/15). Why? The startling thing about the book, according to USA Today media writer Michael Wolff, is that it deals with “one of the least-popular media subjects, middle-aged white men.”

      Yes, “White Men Have Stories to Tell, Too,” as the headline of Wolff’s column declares.

      You might think that if you wrote about media for a living, you would notice that publishers mostly publish, and newspapers mostly review, books written by white men.

    • Senator Dianne Feinstein Proposes Legislation to Make Torture Extra Illegal

      There are already laws on the books in the US that prohibit the use of torture. But after the Senate Intelligence Committee released a summary last month of its 6,700-page torture report that revealed the CIA subjected some detainees it captured after 9/11 to “rectal rehydration” and “ice water baths,” the outgoing Democratic chairwoman of the committee said she will introduce legislation and call for a series of executive actions to ensure the US government never does it again.

    • Feinstein, after release of CIA report, urges measures to ban ‘abusive’ interrogations

      The top Democrat on the Senate Intelligence Committee said she will seek to make “abusive” interrogation measures illegal and ban the CIA from holding prisoners under a series of measures shaped by the findings of a report released last month on the agency’s treatment of detainees after the Sept. 11, 2001, terrorist attacks.

    • The Path to Closing Guantánamo

      The reasons for closing Guantánamo are more compelling than ever. As a high-ranking security official from one of our staunchest allies on counterterrorism (not from Europe) once told me, “The greatest single action the United States can take to fight terrorism is to close Guantánamo.” I have seen firsthand the way in which Guantánamo frays and damages vitally important security relationships with countries around the world. The eye-popping cost — around $3 million per detainee last year, compared with roughly $75,000 at a “supermax” prison in the United States — drains vital resources.

    • Let’s All Do Something Useful Today: Write to Manning and Kiriakou

      Prison sucks. Being in prison because you blew the whistle on our government sucks harder. Getting a letter makes it suck less.

      So if you want to do something good today, write a short letter to one of these guys. It need not be anything more than good wishes, or just introducing yourself as a supporter (if you can’t say anything nice, go post your bile somewhere else).

    • From Drone Strikes to Black Sites, How U.S. Foreign Policy Runs Under a Cloak of Secrecy

      At least nine Pakistanis were killed Sunday in a U.S. drone strike in North Waziristan, the first reported drone strike of 2015. News accounts of the strike are based on unnamed Pakistani government and security officials. The Obama administration has said nothing so far. For years, the United States did not even publicly acknowledge the existence of the drone strikes. The drone program is just one example of the national security state’s reliance on secret operations. The recent Senate Intelligence Committee report revealed another example: the shadowy network of overseas CIA black sites where the United States held and tortured prisoners. The report also noted the CIA shrouded itself in a cloak of secrecy keeping policymakers largely in the dark about the brutality of its detainee interrogations. The agency reportedly deceived the White House, the National Security Council, the Justice Department and Congress about the efficacy of its controversial interrogation techniques. We are joined by a guest who has closely followed the debate over national security and secrecy: Scott Horton, a human rights attorney and contributing editor at Harper’s Magazine, whose new book is “Lords of Secrecy: The National Security Elite and America’s Stealth Foreign Policy.”

    • In Defense of a CIA Whistleblower

      The trial of former CIA officer Jeffrey Sterling, set to begin in mid-January, is shaping up as a major battle in the U.S. government’s siege against whistleblowing. With its use of the Espionage Act to intimidate and prosecute people for leaks in “national security” realms, the Obama administration is determined to keep hiding important facts that the public has a vital right to know.

      After fleeting coverage of Sterling’s indictment four years ago, news media have done little to illuminate his case – while occasionally reporting on the refusal of New York Times reporter James Risen to testify about whether Sterling was a source for his 2006 book State of War.

    • NYT Reporter Questioned at Hearing in CIA Leak Case

      It is not entirely clear how Risen’s stance affects the government’s case. The government possesses email and phone records that show extensive contact between Sterling and Risen. U.S. District Judge Leonie Brinkema has previously suggested the government could rely on those records to establish what it needs without compelling Risen’s testimony.

    • Times Reporter Says He Won’t Testify as CIA Leak Trial Looms

      According to government lawyers, Holder authorized prosecutors to seek Risen’s testimony on three topics: that he has an unbreakable confidentiality agreement with his source for the ninth chapter of his book, that he wrote the chapter and two newspaper articles based on information from the source and that he previously had a non-confidential reporter-source relationship with Sterling.

    • Defiant on Witness Stand, Times Reporter Says Little

      After losing a seven-year legal battle, James Risen, a reporter for The New York Times, reluctantly took the witness stand in federal court here on Monday, but refused to answer any questions that could help the Justice Department identify his confidential sources.

      Mr. Risen said he would not say anything to help prosecutors bolster their case against Jeffrey A. Sterling, a former C.I.A. officer who is set to go on trial soon on charges of providing classified information to Mr. Risen for his 2006 book, “State of War.”

      [...]

      Judge Brinkema did not indicate how she would respond to such a request, and she said little during Mr. Risen’s testimony. She stepped in, however, when Mr. Risen posed questions of Mr. MacMahon and later Mr. Trump.

      “It doesn’t work that way,” Judge Brinkema said. “You can’t ask him questions. That’s the reporter in you.”

      Mr. Sterling’s trial is scheduled to begin next Monday. Prosecutors gave no indication in court whether, in light of Mr. Risen’s testimony Monday, they planned to call him as a witness.

    • NYT’s James Risen pushes back in hearing on leaks

      The Obama administration’s plan to defuse a First Amendment showdown with a New York Times reporter over his confidential sources was nearly derailed at a court hearing Monday when the journalist rebuffed a series of questions concerning his reporting.

      But he eventually agreed to answer some of the queries, allowing the at-times tense session to get back on track and avoiding for now a major confrontation over press freedom.

    • During Pretrial Hearing, Journalist James Risen Refuses to Help US Government with Leak Case

      New York Times journalist James Risen testified in a federal courtroom in Alexandria, Virginia, during a pretrial hearing in a leak case against former CIA officer Jeffrey Sterling. The hearing was held so US District Court Judge Leonie Brinkema could determine what questions Risen would have to answer at trial as a subpoenaed witness.

      The former CIA officer is alleged to have given information to Risen on a classified program that the government claims was “intended to impede Iran’s efforts to acquire or develop nuclear weapons,” which Risen later published in his book, State of War. He is charged with committing ten felonies, seven of which fall under the Espionage Act. A trial is currently scheduled to begin in the middle of this month.

    • Risen Testifies at Sterling Pre-Trial Hearing

      James Risen sat alone in the far corner of the expansive hallway outside the courtroom. It was a fitting beginning for a day in which he seemed alone, even apart from his lawyers.

      [...]

      However, Risen had made clear before — and repeated today — that he would not reveal who his confidential source or sources were, and in the end no one actually asked that question.

    • Special Prostitution Courts and the Myth of ‘Rescuing’ Sex Workers

      Police took special advantage of sex workers with addiction issues. “If you’re one of those girls who’s begging, crying, and doesn’t want to go to jail,” Love told me, some officers will offer freedom in exchange for sex. But it’s always, said Love, “a deal with the Devil.” Afterward, cops will keep shaking you down—for information, easy arrests, or more sex.

      What would otherwise be called rape at gunpoint is, because the victims are sex workers, given the euphemism “sexual favors.”

    • Antonin Scalia: Torture’s Not Torture Unless He Says It Is

      Perhaps, as Justice Scalia told a Swiss university audience earlier this month, it is indeed “very facile” for Americans to declare that “torture is terrible.” The justice posited to his listeners a classic ticking-time-bomb scenario—this one involving “a person that you know for sure knows the location of a nuclear bomb that has been planted in Los Angeles and will kill millions of people”—and asked, “You think it’s clear that you cannot use extreme measures to get that information out of that person?” Now, I didn’t see that episode of 24, but I have read my Bill of Rights, and I’m far more inclined to align myself here with James Madison than with Jack Bauer—or with Antonin Scalia.

    • Exclusive: CIA says its inspector general is resigning at end of month

      The agency said in a statement that Buckley, who has served as the agency’s internal watchdog for more than four years, was leaving the agency to “pursue an opportunity in the private sector.”

    • No Impunity for Torturers [Updated]

      In a post called “The Torture Report is Only the First Step,” Harold Koh observed on Friday that the Senate Intelligence Committee’s account of the CIA’s interrogation and detention program should be “more than enough to reopen investigations at the Justice Department to see whether prosecutions are warranted.” Ken Roth, who leads Human Rights Watch, made the same point in a piece published by the Washington Post over the weekend.

    • Shifting Politics on the Death Penalty

      In January 1992, Bill Clinton, then the governor of Arkansas, left the presidential campaign trail to fly home for the execution of a man named Ricky Ray Rector. Mr. Clinton’s decision not to grant clemency to Mr. Rector, who had been sentenced to death for killing a police officer, was widely seen as an attempt to fend off the familiar charge that Democrats were soft on crime.

      On Dec. 31, Gov. Martin O’Malley of Maryland, whose name has been mentioned among potential 2016 Democratic presidential candidates, commuted the sentences of the last four inmates on the state’s death row.

      Maryland abolished the death penalty in 2013, but only for new sentences. In resentencing the condemned men to life without parole, Mr. O’Malley said that leaving their death sentences in place would “not serve the public good of the people of Maryland — present or future.”

    • Has the US Constitution Been Lost to Military Rule?

      Furthermore, according to Delahunty and Yoo, terrorists operate within the continental United States and “conceal themselves within the domestic society and economy,” which makes it difficult to identify them. By this logic, everyone is now “suspect.” Furthermore, they wrote, 9/11 created a situation “in which the battlefield has occurred, and may occur, at dispersed locations and intervals within the American homeland itself. As a result, efforts to fight terrorism may require not only the usual wartime regulations of domestic affairs, but also military actions that have normally occurred abroad.”

    • It’s time to abolish the CIA

      The CIA should be abolished.

      After a trial run of 67 years, the agency has proven a sorcerer’s apprentice. The director and his subordinates have became insufferably arrogant Platonic Guardians hiding behind secrecy in the belief that the rest of us are too stupid or naive to judge what risks to accept to preserve liberty and the rule of law. The CIA has made Americans less safe.

      Its incorrigible anti-democratic ethos was epitomized by legendary chief of counterintelligence James J. Angleton. He voiced contempt for the Church Committee’s investigation of chronic agency abuses, i.e., the “Family Jewels.” As reported in The New York Times, Angleton likened the CIA to a medieval city occupied by an invading army, i.e., the Congress of the United States. To the same effect, Director William J. Casey told Church Committee investigator Loch K. Johnson that the congressional role was to “stay the [expletive] out of my business.”

    • BAE Releases Social Media, Open Source Analysis Tool to Stop Data Leaks
    • Unarmed Montana Man Told to Raise Hands Before Officer Fired

      An unarmed man killed by a Montana police officer during a traffic stop was told repeatedly to raise his hands before the officer shot him three times, according to video footage shown Tuesday during an inquest into the shooting.

    • Let’s abolish West Point: Military academies serve no one, squander millions of tax dollars

      Many pundits have suggested that the Republicans’ midterm gains were fueled by discontent not merely with the president or with the (improving) state of the economy, but with government in general and the need to fund its programs with taxes. Indeed, the Republican Party of recent decades, inspired by Ronald Reagan’s exhortation to “starve the [government] beast,” has been anti-tax and anti-government. Government programs, as many of their thinkers note, primarily exist to perpetuate their own existence. At the very least, they have to justify that existence.

  • DRM

    • Kindle sales have ‘disappeared’, says UK’s largest book retailer

      Waterstones has admitted that sales of Amazon’s Kindle e-book reader had “disappeared” after seeing higher demand for physical books.

      The UK’s largest book retailing chain, which teamed up with Amazon in 2012 to sell the Kindle in its stores, saw sales of physical books rise 5pc in December, at the expense of the popular e-reader.

      Kindle sales had “disappeared to all intents and purposes”, Waterstones said.

  • Intellectual Monopolies

    • Cornish pasty ‘threatened by EU-US trade deal’

      German agriculture minister warns that laws protecting regional foods – such as Germany’s Black Forest Ham – may be at risk under a transatlantic trade agreement

    • Copyrights

      • Arrr: The only Pirate in European Parliament to weigh in on copyright

        As speculation and arguments mount over proposed EU copyright legislation, the Pirate Party MEP will publish her report on the matter on 19 January.

        Julia Reda, currently the only Pirate in the European Parliament, has been made “rapporteur” on the implementation of the previous directive on the so-called 2001 Infosoc Directive.

        Collecting societies, publishers and artists have likened this to putting the wolf in charge of the sheep. If we accept the analogy, it’s probably a lot like asking the wolf’s opinion on how the shepherd has been doing and then taking that into account when telling the shepherd what to do next.

      • Pirate Party: ‘We are literally rewriting EU copyright law’

        Pirate Party MEP Julia Reda is leading the revision of the EU’s Copyright Directive — a significant milestone for the self-described internet-freedom movement.

      • All Of These Works Should Be In The Public Domain, But Aren’t

        Every year for the past few years, the good folks at Duke’s Center for the Study of the Public Domain have put up a list of works that should have gone into the public domain on January 1st had Congress not massively expanded the law. Each year, it’s a depressing look at what works should be in the public domain. As a reminder, when these works were created, the creators knew the terms under which they were created and knew that they would have gone into the public domain by now — and they found that to be more than enough incentive to create those works. Given that, it makes absolutely no sense that these works are not in the public domain. The latest list has many, many examples of classic works that should be in the public domain.

01.06.15

Links 6/1/2015: Linux 3.19 RC3, Plasma 5.2 Beta Imminent

Posted in News Roundup at 6:43 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Linux Users Are Going Crazy About Circle Icons, Might Become a Regular Thing

    Linux systems are evolving all the time and the users are always looking for ways to enhance their experience. Right now, the trend indicates that more and more desktops are being adorned with circle icons.

  • Developer Issues Bogus Takedowns Against Cup Of Linux YouTube Channel In Retaliation For Being Banned For Abusive Behavior

    The backstory: the Cup of Linux YouTube channel handles all things Linux, including coverage of distributions and how-to guides for new users. One Linux developer, Antoni Norman, is the main force behind the Pinguy OS Linux/Ubuntu hybrid. Over the years, he’s been a valuable contributor to the Linux community, including the one centered around Cup of Linux. Also, over the years, Shawn Patrick Ryan (“Spatry”) has covered Pinguy OS releases in a number of YouTube videos. So far, so good.

  • Desktop

    • Idea – A Novice Approach To Linux On The Laptop

      So if you have a slow XP computer. You can turn off the internet to Windows for safety and run your attachable Linux device on your laptop.

      Here you have a safe way to upgrade your laptop system and an easy way to run Linux on your laptop. Just attach a USB stick.

  • Kernel Space

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • KDE Plasma 5.2 Beta Is Being Tagged This Week

        The beta for the upcoming Plasma 5.2 desktop shell is being tagged on Thursday.

        Plasma 5.2 Beta is being tagged on Thursday so this is the last chance for merging any features or artwork ahead of this quarterly update to Plasma 5. As long as the tagging is done on Thursday, KDE Plasma 5.2 Beta (v5.195) should be officially released on 13 January. The plan is to then tag the official 5.2.0 release on 22 January and to officially release Plasma 5.2 on 27 January, per the Plasma 5 schedule.

      • A Guide for Krita Users

        One of our long-standing contributors, Timothée Giet, is working on some new training material as part of his work teaching Krita at Activ Design!

      • Plasma 5.2 Beta Coming

        The Plamsa 5.2 beta will be tagged on Thursday this week. If you have any pending features or changes that are going to affect artwork or strings that should be in the release please make sure they get merged ASAP.

      • [Krita] Cumulative Undo/Redo :More than one stroke at a time

        The last feature I did for Krita was to implement a Cumulative Undo/Redo feature. Since its been almost 3 months since my last contribution to Krita — I thought this was the one of the very first things I had to do from a rather clogged pipeline.

      • [Krita] Project Activity in Bug Reports

        Sven Langkamp recently mentiond that Krita had crept up to second place in the list of projects with most new bugs opened in bugzilla in a year. So I decided play around a litte, while Krita is building.

        Bugzilla has a nice little report that can show the top X projects with open bugs for certain periods. Krita never is in the default top 20, because other KDE projects always have more open bugs. But let’s take the top 100 of KDE projects with open bugs sort the data a bit and then make top 10 lists from the other columns.

    • GNOvktop/GTK

      • Linus Torvalds Says GNOME Terminal on Fedora 21 Is Using “Emo” Mode

        Linus Torvalds is not one to shy away from saying what he thinks and he apparently doesn’t have a too good opinion on what the terminal app looks like by default in the latest Fedora 21.

      • GNOME gets Foursquare integration

        If you were reading my GSoC 2014 reports, you surely remember that I was working on integrating GNOME Maps with social networks, so you can share the place you are in Facebook and Foursquare (and Twitter if you enable an option in Maps!). This surely is not going to be an everyday feature, but I learned a lot during its development (and during the whole GSoC).

  • Distributions

    • ZevenOS 6.0 “Goodbye Edition” Is the Last One for a Long Time

      ZevenOS, a Linux operating system with software optimized for slower computers and with elements of BeOS based on Xubuntu, has just reached version 6.0.

    • Hel-lo Makulu and Goodbye Zeven

      Today in Linux news, ZevenOS has decided to rest on Ubuntu’s laurels. Jamie Watson says Makulu 7 Xfce is the most beautiful distro he’s ever seen and Dedoimedo says Elementary 0.3 is “purrty.” The Korora project released version 21 Beta and Derrik Diener highlights the top five Arch derivatives. And finally today, we have a year-end Linux recap and another Linus quote is ruffling feathers.

    • Linux in 2015: Distros on Tap

      2014 was a unique year for Linux in that Red Hat, SUSE and Ubuntu all had Enterprise (or Long Term Support/LTS releases as Ubuntu refers to them) releases. There will be no major enterprise Linux platform milestones in 2015, but there will be plenty of updates for enterprise and community Linux.

    • Big Year for Enterprise Linux Distros Includes Major Updates

      Particularly strong for enterprise Linux, 2014 offered a rare confluence of release timing calendars. The three major enterprise Linux vendors delivered milestone updates in 2014. On April 17, Ubuntu 14.04, code-named Trusty Tahr, was released as a long-term support (LTS) version of Ubuntu. (Ubuntu issues new LTS releases every two years; each LTS has up to five years of support.) Red Hat Enterprise Linux 7 (RHEL) came out June 10, marking the first major RHEL update for Red Hat since 2010. Red Hat supports its enterprise releases for 10 years. On Oct. 27, SUSE Linux Enterprise 12 was released, marking the first major update to SUSE’s flagship enterprise Linux platform since 2009. Big enterprise Linux releases were not the only updates during the year, Red Hat’s Fedora community Linux distribution delivered Fedora 21 Dec. 9, providing server-, cloud- and workstation-focused editions. Ubuntu 14.10, code-named the Utopic Unicorn, which debuted Oct. 23, provides new big data capabilities. Also out in 2014, Tails (The Amnesic Incognito Live System) 1.0 Linux distribution provides a new privacy-focused OS choice. In this slide show, eWEEK looks back at key Linux events of 2014.

    • The building blocks of a distribution with Linux from Scratch

      There is a very, very large number of Linux distributions. Each distribution is built using the same basic building blocks but the end results are always different. The choices made by the distribution developers turn the building blocks into finished structures designed to meet a variety of needs—desktop, server, or some other specialized usage.

    • NixOS and Stateless Deployment

      If I had my way, I would never deploy or administer a linux server that isn’t running NixOS.

      I’m not exactly a prolific sysadmin – in my time, I’ve set up and administered servers numbering in the low tens. And yet every single time, it’s awful.

    • Reviews

      • elementary OS 0.3 Freya beta review

        This happens to be one of them distros what mystifies me, good and bad. On one hand, it seems to be very popular, if you look at the Distrowatch rank listing, or consult my best distro of the year vote readers’ choice section, where a rather handsome portion of the audience chose elementary as their favorite spin. It’s only officially at version 0.2, the last stable release was unleashed unto the nerdy crowds some 16 months back, and the latest beta is still only at version 0.3, and taking its time.

        Neither the first nor the second dot oh something release managed to impress me. The desktop environment was pretty and cool, but the overall composition was quite buggy. And this brings me to the other hand of the argument. I kind of want to review it again, despite all of the above. Testing 0.3 Freya, beta. Here we go.

    • New Releases

    • Screenshots

    • PCLinuxOS/Mageia/Mandriva Family

      • PCLinuxOS 2014.12 MATE screenshot tour

        PCLinuxOS 2014.12 has been released, so it’s time for another screenshot tour. I toyed with the idea of doing a full review on Desktop Linux Reviews, but the next release of PCLinuxOS should have some major changes so I’m holding off until that is available to review. In the meantime, you can get a good look at PCLinuxOS 2014.12 MATE in the screenshots below.

    • Arch Family

      • Manjaro 0.8.11 Gets Its Fourth Update Pack and All the Latest Kernels

        Manjaro 0.8.11 was made available only a month ago and its makers have already released four upgrade packs. Even if this seems like they have a lot to fix, that’s not actually true. In fact, these packs bring some important upgrades for a number of important components, like the Linux kernel for example.

      • Top 5 Arch Linux Derivatives

        Arch Linux is very unique. Unlike most Linux distributions, it does not have an official live disc. When you boot it up, you’ll be greeted with a terminal. For some people this is fine. In fact, they prefer it. Arch gives you the freedom to sit down and make a Linux install yourself, one that you’ve made with your own two hands. It’s a good time, and that’s great, if you like that sort of thing.

    • Red Hat Family

      • Red Hat’s OpenStack Tech Leadership Discusses Cloud Direction

        Red Hat has multiple products within its Infrastructure division, including the CloudForms management solution and the OpenShift Platform-as-a-Service product. McLoughlin noted that OpenStack is a key part of a broader portfolio but still stands on its own as well.

        “You can build a cloud with the individual projects, but if you build a cloud with the entire portfolio, you get a whole lot more value out of it,” McLoughlin said.

        In terms of the continued development and expansion of OpenStack services, there are a number of new capabilities that are underway, including the Manila shared filed system service. Work is also ongoing for the Zaqar messaging service.

    • Debian Family

      • Derivatives

        • Canonical/Ubuntu

          • Google Cloud offers streamlined Ubuntu for Docker use
          • Ubuntu Touch Is 2014′s Most Important Linux Distro

            2014 has been a very interesting year with a ton of major releases, but one in particular really stands out, Ubuntu Touch. It’s not yet available in stores and it’s not “really” ready, but it’s the one that registered the most progress.

          • NVIDIA CEO Using Ubuntu for Presentations at CES 2015 – Video

            The CES 2015 conference is in full swing and most of the bigger companies have already made their announcements, including NVIDIA. Some of their presentations have been done using an Ubuntu system, as you can see in the video below.

          • Ubuntu Make 0.4 Released With Go Support, New Game Category

            Ubuntu Make, formerly known as Ubuntu Developer Tools Center, has been updated to version 0.4, bringing Go support as well as a new game category.

            For those not familiar with Ubuntu Make, this is a command line tool created by Canonical, which allows developers to install various development tools / IDEs. Initially, the tool targeted Android developers, making it easy to install Android Studio in Ubuntu. Later, Ubuntu Make also got support for Pycharm, Eclipse and intellij IDEA.

          • Flavours and Variants

            • Pearl Linux 1.5 Is a Pear OS Clone and Now It Has a 64-bit Version

              Pearl Linux was released a couple of months ago as a natural successor of the much more famous Pear OS, which disappeared mysteriously. Now, the 64-bit edition has been released as well.

            • elementary OS 0.3 Freya beta review

              This happens to be one of them distros what mystifies me, good and bad. On one hand, it seems to be very popular, if you look at the Distrowatch rank listing, or consult my best distro of the year vote readers’ choice section, where a rather handsome portion of the audience chose elementary as their favorite spin. It’s only officially at version 0.2, the last stable release was unleashed unto the nerdy crowds some 16 months back, and the latest beta is still only at version 0.3, and taking its time.

              Neither the first nor the second dot oh something release managed to impress me. The desktop environment was pretty and cool, but the overall composition was quite buggy. And this brings me to the other hand of the argument. I kind of want to review it again, despite all of the above. Testing 0.3 Freya, beta. Here we go.

  • Devices/Embedded

Free Software/Open Source

  • A World of Possibilities for Open Source

    Ten years ago we started with the (immodest?) goal of bringing open source to enterprise software. Today, there are even greater opportunities for open source — not just in software, but as a fundamental force for positive change in the world.

  • Unlock the code, release the future

    Open Source is a key framework to enable the prolonged development and delivery of ARTIST tools to help companies transition to modern platforms, like the cloud. We support businesses on this journey from the start, in assessment and reducing risk, to implementation and reducing cost. ARTIST tools are developed following open standards and in many cases reusing existing open source components. Therefore, all project results are delivered under an open source license, with the exception of a few consultancy tools whose source code is not provided, but which are nonetheless free to use. Links to the source code, licensing information, supporting documentation and demonstration videos are included for each entry.

  • Web Browsers

    • Chrome

      • Why Google Chrome Switched To The Clang Compiler On Linux

        The two main reasons for switching over to Clang as the default Linux compiler for Chrome came down to many Chromium developers already were using Clang on Linux and they wanted to use modern C++ features in Chromium. Google found it easier on Linux systems to switch to Clang for tapping newer C++ features rather than upgrading GCC on their systems from GCC 4.6 to GCC 4.8~4.9.

    • Mozilla

  • SaaS/Big Data

    • Citrix, Apache and Others Still Committed to CloudStack

      In case you were wondering about recent reports of the demise of CloudStack, the folks at Citrix are remaining adamant that the cloud computing platform is healthy and in use at lots of notable organizations. In fact, at the recent CloudStack Collaboration Conference in Budapest, Autodesk, China Telecom, Dell, Walt Disney, and Huawei were all reported among active users of the platform.

  • Databases

  • Funding

    • Blue Box Gets $4 Million in Private Cloud Funding, Mystery Investor

      Blue Box, which offers private cloud services based on OpenStack to big companies including Viacom has just announced a new round of $4 million in funding on top of the $10 million the company raised late last year. And, as Silicon Angle notes, some of the funding comes from an unnamed telco: “The latest $4 million leg saw an unnamed US telco come aboard as the second strategic investor in the startup, triggering speculation about which carrier would throw its weight behind an OpenStack hosting provider.”

    • Mystery telco leads $14M round for OpenStack hosting provider Blue Box

      Private cloud hosting provider Blue Box Inc. has completed its second financing round three months after securing the first infusion to bump its net funding past the $33 million mark. The latest $4 million leg saw an unnamed US telco come aboard as the second strategic investor in the startup, triggering speculation about which carrier would throw its weight behind an OpenStack hosting provider.

  • FSF/FSFE/GNU/SFLC

  • Public Services/Government

    • Quebec government writes 3 open source licences

      The government of the Canadian province of Quebec is finalising three open source licences to make it easier for provincial public administrations to share software solutions. The licences should be available in the coming weeks.

  • Licensing

    • An open source mantra: Avoid “no derivatives”

      Bill Fitzgerald runs FunnyMonkey to help educators and students improve accessibility to educational materials. He is an educator, open source developer, and entrepreneur, and I was able to speak with him recently about his work and why it matters. And most importantly, how open source methodology makes all the difference.

      Bill grew up in Connecticut and attended Boston College where he completed undergraduate studies before enrolling at the University of San Francisco where he earned a masters degree in writing. He then taught English and history at public and private schools. And he’s been both a school administrator and a technology director. What you can tell from talking to Bill is that he loves education.

  • Openness/Sharing

  • Standards/Consortia

    • C++ Filesystem Technical Specification Approved

      ISO TS 18822 is based on the Boost file-system library for offering common functions to perform on file-systems. There’s various functions relating to the reading and manipulation of paths, files, and directories.

Leftovers

  • Health/Nutrition

    • GOP Congress’ First Priority: Yanking Health Insurance From 1.5 Million Americans

      One of the first things House Republicans plan to do after Congress reconvenes Tuesday is vote on a bill that would gut Obamacare—and could deprive up to 1.5 million Americans of their employer-sponsored health insurance. After the GOP-controlled House passes the bill, the newly Republican Senate is likely to pass the measure too. What’s more, President Barack Obama may be forced to sign this legislation if it is attached to a must-pass budget bill later this year.

  • Security

  • Finance

  • Privacy

    • Facebook splashes out on voice recognition company Wit.ai

      THE SOCIAL NETWORK Facebook has invested in another company, adding a voice recognition software outfit called Wit.ai to its roster.

      No financial details have been revealed, but there is a good chunk of gushing, glowing comment from Wit.ai.

      We learn that Wit.ai does a good thing, has a number of happy users, and expects to carry on doing what it is doing even when under the wing of Facebook CEO Mark Zuckerberg.

    • The Tale of the Privacy Pink Panther

      Last Friday, on my way home from 31c3, a funny thing happened on my way through Charles de Gaulle airport in Paris: I was required by a security agent to not only power up, but also type in my password to unlock my laptop in order to board my flight.

      One tweet, and about 12 hours of no Wi-Fi later, I landed to find that a lot of people interested in privacy and security had questions about the details of my adventure, so here it is.

      First of all, HackerOne employees don’t ever have access to our customers’ vulnerability reports, therefore there are no exploits stored on my devices, so no customer data was at risk. For more about how we protect vulnerability data, see our own bounty and security page.

  • Civil Rights

    • How Low Income New Yorkers Are Benefiting From The NYPD’s Work Stoppage

      In response to growing tensions between the New York Police Department and the city, police unions encouraged officers last week to not make arrests “unless absolutely necessary,” resulting in a 66 percent drop from the same period last year. While the protests have drawn scrutiny for “squandering the department’s credibility” and leaving the city’s streets virtually unattended, they have also had the unintended effect of benefitting New York’s low income residents who are usually the target of the city’s tough-on-crime practices.

    • Who Should Investigate Police Abuse?

      To date, one serious proposal for reform has emerged. On December 8th, Eric Schneiderman, the Attorney General of New York, proposed that Governor Andrew Cuomo name him, Schneiderman, as an independent special prosecutor to investigate and, if appropriate, prosecute police officers in any situation where they cause the death of a civilian. As Schneiderman noted in his letter to the governor, the proposal seeks to address a real problem. When local district attorneys investigate local police officers, there is an inherent conflict of interest. In virtually all usual circumstances, police and prosecutors are partners, working together to build cases against defendants. This is especially true in a place like Staten Island, where the elected district attorney, Dan Donovan, both works closely with the police and answers to many of them as his constituents. As Schneinderman noted, on the rare occasions when prosecutors investigate the police, even when all parties act with the best of intentions, “the question is whether there is public confidence that justice has been served, especially in cases where homicide or other serious charges against the accused officer are not pursued or are dismissed prior to a jury trial.” Cases, in other words, like those of the officers who killed Brown and Garner. (Cuomo has hedged in response to Schneiderman’s idea, saying that he wants to weigh a full package of reforms.)

      [...]

      Schneiderman’s idea has considerable appeal; his judgment in the Eric Garner case would surely have had more credibility than the one rendered by Donovan. Still, special prosecutors are not necessarily good or bad. Like the locals they replace, they are only as good as the cases they bring, or refrain from bringing. That, ultimately, will rest on the good judgment of the individuals involved, and no one has yet figured out a way of putting the right person in place all the time.

    • Summing Up White Supremacist Ties as ‘Saying Nice Things About an Old Man’

      In December 1998, Lott denied any personal knowledge of the CCC, falsely claiming through a spokesperson that his links to the group amounted to a single speech made over a decade before he’d entered the Senate. In 1992, Sen. Lott praised the CCC as keynote speaker at its national convention; in 1997, he met with top CCC leaders in his Senate office; his column appeared throughout the 1990s in the group’s newsletter, which once published a cheerful photo of Lott and CCC members who were also his close relatives. Lott was also the guest of honor at a 1982 banquet hosted by a Mississippi chapter of the old white Citizens Councils (Extra!, 3-4/99).

  • Internet/Net Neutrality

    • Internet Freedom Expected to Further Decline in 2015

      According to a study from Freedom House, the decline of internet freedom kicked into high-gear in 2014 and is expected to suffer further this year because of opinions derived from 65 nations who have access to the World Wide Web.

    • Republicans will push hard to derail net neutrality in Congress

      The Federal Communications Commission is planning to vote on new network neutrality rules in February, and one of the viable options on the table is re-classifying broadband internet as a type of public utility, like telephone companies. President Obama openly supports that plan, and congressional Republicans are signaling that they will do everything in their power to thwart the FCC if it goes this route, The Wall Street Journal reports.

    • More Than the Internet: Net Neutrality Vote Will Determine Whether Americans Are Citizens First or Consumers First

      The debate on the upcoming net neutrality vote should first address the overarching issue it creates: are we, as Americans, consumers first or citizens first? What are our true values and priorities?

      The Federal Communications Commission is set to vote on rules to regulate internet traffic in February. At stake is whether the internet (or, as George W Bush called it, “the internets”) should become a multi-tiered system in which the highest payers get preferential treatment, or whether all users should be treated equally.

      Preferential treatment for the highest bidders would mean priority lanes for faster transmissions and slower lanes for others.

      Yes, we can argue about whether equal access will spur more innovation or whether preferential access for the highest bidders will deliver more and better content, and thus spark innovations of its own.

  • Intellectual Monopolies

    • A Europe Of Treaties?

      If we want a Europe where treaties like ACTA and TPP are the democratic norm, scrap the European parliament. If we want all the change that happens to be done in whatever the post-tobacco equivalent of smoke-filled rooms is, scrap the European Parliament. And, for the benefit of the raving right in the UK, if you want the UK’s primary trading market to be controlled invisibly via undocumented and unaccountable negotiations between the political lackeys of plutocrats, vote for the UK to “leave” the EU.

    • Copyrights

      • Google Asked to Remove 345 Million “Pirate” Links in 2014

        Copyright holders asked Google to remove more than 345,000,000 allegedly infringing links from its search engine in 2014. The staggering number is an increase of 75% compared to the year before. While Google has taken some steps to downrank pirate sites, the rate at which takedown notices are sent continues to rise.

01.05.15

Links 5/1/2015: Acer Chromebook 15, GNOME Internet Radio Locator (GIRL)

Posted in News Roundup at 4:52 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Desktop

  • Kernel Space

  • Applications

  • Desktop Environments/WMs

  • Distributions

    • Reviews

      • Hands-on with Makulu Linux Xfce 7.0: The most beautiful Linux distro I have ever seen

        The latest release of Makulu Linux has two major things going for it: first, it is based on Ubuntu 14.04 LTS, rather than Debian, and second, it uses the Xfce desktop. Makulu seems to be doing a tour or rotation of desktops so perhaps having Xfce shouldn’t be a surprise, anyway.

        The Release Announcement / Release Notes give some interesting insight into the background and development of this release, as well as the major features of this release. As always with Makulu Linux, aesthetics was a major focus, and it includes loads of beautiful wallpapers, themes, icons and fonts. The other major focus was speed, thus the choice of Xfce for the desktop, and Firefox rather than Chrome, the synapse launcher rather than slingscold, and the inclusion or omission of various other packages.

    • New Releases

      • Xmas, New Year, Pentoo Release, Shmoocon 11

        Well, it’s that fabulous time of year again. The time where we all have a few days in a row off work so we can concentrate on the things we really care about, like spending time with family. But after about an hour we all get pretty tired of that and get to work on Pentoo :-)

        [...]

        In addition to all the boot loader changes and the standard updates, we have switched metasploit live to using ruby 2.1. This change was not only important because ruby 1.9 support is ending soon, but because it was a near 600% increase in speed. Remember waiting 30+ seconds for msfconsole to load? Well, those days are gone.

    • Screenshots

    • Red Hat Family

      • Fedora

        • Korora Takes Fedora 21 and Improves It

          Korora, an unofficial Fedora Remix distribution with tweaks and extras to make the system work out of the box and that aims to provide an improved user experience, has been upgraded to version 21 Beta.

    • Debian Family

      • Derivatives

        • Canonical/Ubuntu

          • Flavours and Variants

            • An Everyday Linux User Review Of Xubuntu 14.10

              It has been just over a year since I last reviewed Xubuntu, so this review is well overdue.

              Xubuntu has been one of my favourite distributions for a long time and for a number of very good reasons.

              Xubuntu comes with the XFCE desktop environment which means that it is lightweight and highly customisable.

              What I also like about Xubuntu over some of the other XFCE based distributions is that it doesn’t overload you with applications. You get just enough to cover the bases but it is then up to you to install what is important for your needs.

  • Devices/Embedded

    • Nvidia wants to power the self-driving car of the future (and every display inside that car)

      Drive CX, the display one, is powered by Nvidia’s Maxwell architecture and supports “every major OS in the world” — which for the world of cars includes QNX, Linux, and Android. Basically, it’s a small computer inside your car capable of processing 16.6 megapixels across multiple screens. In Huang’s automotive vision, everything can be a display. Smart mirrors? Check. Displays in the car’s pillars? Check. Head rests? Of course — put a screen on it!

    • Phones

      • Tizen

        • Samsung ready to do Tizen Smart TV battle at CES 2015 – “Most Seductive TV of all time. PERIOD“

          If you look at Samsung’s marketing, they are definitely ready to do battle at CES next week over their Smart TVs or should I proudly say Tizen Smart TVs. The are introducing their new S’UHD TVs (S for Samsung?) as the “Most Seductive TV of all time. PERIOD“. This is a bold statement to make indeed as we know that there are some highly seductive TVs already from the world of LG and Sony, to name a couple.

      • Android

        • Intel buys $25 million stake in Google Glass rival Vuzix

          By buying a stake in Vuzix, however, Intel is also getting involved in the enterprise side of wearables — an area where functionality trumps stylishness. Vuzix’s flagship M100 smart glasses may have been fairly rudimentary when we tried them out last year, but that hasn’t stopped the company securing a deal with Lenovo to sell the devices to industrial and commercial markets in China. Vuzix says it’s also targeting the medical, retail, and materials management sectors, claiming that companies can use the M100’s internet-connected display to give workers “unprecedented access to information, data collection and more.” Google is trying to crack the same markets with its Glass at Work scheme, developing the software that will help Glass connect to real workplace scenarios.

        • Chinese iPad Clone Runs Both Android and Windows 8.1

          Nokia recently unveiled a snazzy new Android tablet that looked suspiciously like the iPad mini. Now, Chinese company Onda has done one better with a dual-booting iPad Air knockoff that offers high-end specs at competitive price.

        • Top 10 Best Android Smartphones Buyers Guide: January 2015 Edition

          2014 has drawn to a close, or just about, but 2015 has yet to get going. In fact, as of writing, nobody has announced their next latest and greatest. We’re still waiting for Mobile World Congress, which won’t be until a little later in the year to see what Sony, Samsung and HTC have to offer. Right now though, we have a list of smartphones that many of you might have picked up towards the end of 2014, perhaps in Black Friday sales, perhaps through upgrades. Either way, here’s our pick of the best Android smartphones for January 2015.

        • CES 2015 Preview: Android Smartphones, Tablets, Wearables and More!

          CES 2015 is just about here. It’s the first big trade show of the new year. While the actual show floor opens up on Tuesday January 6th, we’ll start seeing announcements flooding in as early as tomorrow. Yep, companies are always looking to get their products announced ahead of their competitors, and every year it happens earlier and earlier. We will be at CES this year, we’re sending Nick to cover the entire thing by himself. And no that’s not a punishment.

        • Pizza Compass Is The One Android (And Android Wear) App That Every College Student Needs

          It’s entirely possible to find the nearest pizza restaurant using Google Maps. Or Yelp. Or even just searching in the browser of your choice. But why would you go to all that trouble when something like Pizza Compass exists? It’s both a compass that uses pizza as its needle, and a compass that points you to pizza. It’s deep, man. So deep it’s overflowing with pepperoni and onions like a Chicago pie. I really wish I hadn’t eaten before I started writing this post.

        • Parrot’s New In-Dash System Gives Any Dumb Car Apple or Android Brains

          While Apple CarPlay and Android Auto promise to make your car’s in-dash system infinitely more bearable in the not so distant future, you’re still stuck in the unfortunate position of having to choose between one or the other. Not so Parrot’s whimsically named RNB6, which lets you go both ways. Oh, and it has a dash cam built right in.

        • Nexus Users Can Fix Android 5.0 Bugs Before Other Updates Arrive

          In November 2014, Google rolled out Android 5.0 Lollipop to Nexus users but it created several bugs. The bug fix updates Android 5.0.1 and Android 5.0.2 Lollipop resolved some issues but there are still errors that remain that can be addressed manually.

        • Android 5.0.2 Lollipop Update Breakdown

          At the end of the last year, Google released an Android 5.0.2 Lollipop update to Nexus 7 2012 users. That update delivers some crucial fixes though the Android 5.0.2 Lollipop update situation is still extremely murky. Here, we breakdown what we know about the situation and take a look at what Nexus users in general need to know about the most current version of Android 5.0 Lollipop.

        • Android Authority this week
        • HTC One M8 updated to Android 5.0.1 Lollipop with SkyDragon Google Play Edition ROM [How to]

          XDA developer, HolyAngel has released an update to his SkyDragon Google Play Edition ROM to version 4.2.1, which is based on stock Android 5.0.1 update, base firmware 3.11.1700.2 and updated to kernel version 3.0.4.

        • Galaxy S5 Android 5.0 Lollipop Update Making Progress

          The Samsung Galaxy S5 Android 5.0 Lollipop update continues to make significant progress and the highly anticipated update is now available in two brand new regions ahead of the U.S. Galaxy S5 Android 5.0 Lollipop release that appears set to begin sometime this month.

        • Open Source Photography: NDFilter Android App

          Getting exposure right when using ND filters can be tricky, unless you enlist the help of NDFilter. This open source app for Android makes it possible to calculate the correct shutter speed for the given ND filter with consummate ease.

Free Software/Open Source

  • When ‘Release Early, Release Often’ Is a Problem

    Large projects such as Linux and GIMP demand constant development, to keep up with the ever changing face of technology if for no other reason. If the decision were made tomorrow to pause development on Linux for a few years and just fix bugs and work on security issues, in rapid time Linux would begin to lose its dominance in the enterprise. After two years sans development, the operating system would already be well down the road to obsolescence and almost hopelessly behind. The same would be true of GIMP, even as it continues to gain ground on Photoshop.

  • 5 open source projects to join in 2015

    You’ve been using open source software for a while, and now you want to give back to the community. Even with solid advice, you’re probably finding that it’s difficult to sift through all of the projects out there to find one that’s right for you.

    To help, I’ve put together a list of five open source projects that you should consider joining in 2015. Many of them may not be the highest profile projects out there, but they do offer some interesting challenges. And helping them is a great way to give back to the community.

  • Super Mario 64 Remake Developer Showcase Video; Open Source Modern Update Of N64 Classic Title Moves Forward

    Studios today are remaking everything, slapping on a new coat of paint and reselling you the same experience – but better – for largely the original price. Resident Evil has had how many remakes already? But, for some fans, the studios aren’t focusing on the correct titles and they remake the game themselves.

  • Broadwell Support Continues Stepping Along In Coreboot

    Google’s Duncan Laurie converted “WTM2″ motherboard in Coreboot to having Broadwell SoC support. WTM2 is short for Whitetip Mountain 2 and is Intel’s codename for one of their consumer reference board (CRB) designs, which is what’s sampled and tested by Intel’s partners such as Google.

  • Docker to Gain New Ground in 2015, After Taking Center Stage in 2014

    Prior to 2014, Docker was not well-known, but that all changed over the course of the year. The open-source Docker container virtualization project got its start in March 2013, and in 2014 hit its full stride, achieving its 1.0 release milestone and the embrace of many of the world’s leading IT vendors.

  • 3 REASONS WHY OPEN SOURCE MEANS BETTER SECURITY

    By leveraging open source software and establishing best practices to protect this data at an ongoing rate, these agencies can take a cue from the private sector and enjoy a sense of trust in the way they store and collaborate on private data.

  • The power of open source in 2015

    Today, it is almost impossible to name a major player in IT that has not embraced open source. Only a few short years ago, many would have argued we would never see that day. Many of us remember the now infamous “Halloween Documents,” the classic quote from former Microsoft CEO Steve Ballmer describing Linux as a “cancer,” and comments made by former Microsoft CEO Bill Gates, saying, “So certainly we think of [Linux] as a competitor in the student and hobbyist market. But I really do not think in the commercial market, we’ll see it [compete with Windows] in any significant way.”

  • Creating and Using Barcodes with Free Software

    Producing the barcode itself is trivial in Inkscape — the leading Free/Open Source Software vector drawing application — ever since the extension became part of the standard distribution, with version 0.46. The current version supports several kinds of barcodes, including the UPC and EAN types.

  • Web Browsers

    • Mozilla

      • Why does the world still need the Mozilla Foundation?

        With its Firefox browser rapidly losing share, and its financial ties to Google finished, the Mozilla Foundation finds itself facing the most pivotal moment in its history since its founding more than a decade ago.

        “We’re utterly confident in our stability and viability going forward,” Mozilla chairwoman Mitchell Baker said in a recent interview with Stephen Shankland of Cnet.

        But just because the foundation can continue, does that mean it should?

        I think there is still an essential role on the web for a non-profit organization that can develop services that may not generate big profits, but where it would be valuable to have a more neutral player.

        But at the same time, at this moment, it’s difficult to say what Mozilla is doing that is so essential to the world.

  • SaaS/Big Data

    • OpenStack moves forward into 2015

      Interested in keeping track of what’s happening in the open source cloud? Opensource.com is your source for what’s happening right now in OpenStack, the open source cloud infrastructure project.

    • Tesora Trove DBaaS Certified for Mirantis OpenStack Cloud Platform

      At a steady clip, database-as-a-service functionality has been emerging as an important component of the evolution of the OpenStack cloud computing platform. When the OpenStack Icehouse version arrived in April of last year, the Trove database-as-a-service project was one of the under-the-hood offerings. And since then, OpenStack releases have featured significatnly improved versions of Trove.

    • Red Hat Marks a Strong 2014, Sharpens Focus on OpenStack

      As 2014 ended, there were many eloquent summaries of the state of open source and the state of cloud computing, but one of the most focused ones came from Red Hat CEO Jim Whitehurst. In an online post that was fresh on the heels of a knockout financial quarter for Red Hat, Whitehurst lauded the fact that open source technology is now pervasive, and provided glimpses of how his company is gaining momentum with its cloud efforts.

      “Today, it is almost impossible to name a major player in IT that has not embraced open source,” Whitehurst said. “Only a few short years ago, many would have argued we would never see that day.”

  • Databases

    • NoSQL pioneer to inject your database with ACID

      The firm already has a prototype that’s in the hands of early customers with plans to go public in 2015, The Register has learned.

      The move follows delivery of an ACID-compliant graph database for use with FoundationDB’s existing NoSQL engine.

      The document database, like FoundationDB’s graph store, would run on top of the company’s recently upgraded key-value store engine. If it is successful, FoundationDB could succeed in throwing up another bridge between the once-separate worlds of NoSQL and relational databases.

  • BSD

    • LLVM & Clang Had A Killer 2014 With Lots Of Improvements

      The LLVM project had a great 2014 with a ton of new developers and contributions to the compiler infrastructure and its Clang C/C++ compiler front-end.

      In 2014 there were the releases of LLVM 3.4 in January of last year, LLVM 3.5 mid-year, and now LLVM 3.6 is being readied for release in the weeks ahead.

  • FSF/FSFE/GNU/SFLC

    • GNU Chess release 6.2.0

      I am glad to announce the release of version 6.2.0 of GNU Chess. GNU Chess is a chess-playing program. It can be used to play chess against the computer on a terminal or, more commonly, as a chess engine for graphical chess frontends.

    • Nano-Archimedes Is The Latest GNU Project, Making More Scientific Software Open-Source

      Before getting too excited over this latest GNU project, it will likely only be relevant to a few Phoronix readers as it’s a highly scientific. The GNU Nano-Archimedes project page describes the software, “GNU nano-archimedes is a Technology Computer Aided Design tool (TCAD) for the simulation of various technology relevant situtations involving the dynamics of electrons such as the transport in nanometer scale semiconductor devices (nanodevices) and time-dependent many-body problems coming from, for example, quantum chemistry and/or atomic physics. It is based on the Wigner equation, a convenient formulation of quantum mechanics in terms of a phase-space (completely equivalent to the Schroedinger equation), and the density functional theory (DFT). It is also able to deal with time-dependent ab-initio many-body simulations.”

    • One Of The GNU Games Has Its First 2015 Release Out

      If you’re not into all of the modern, resource-intensive Linux games or just prefer something more skillful, GNU Chess has been updated for some terminal gaming action.

  • Openness/Sharing

Leftovers

  • Hardware

    • Many More AMD FreeSync Monitors Are On The Way

      A number of new monitors that support AMD FreeSync are being shown off this week at CES. FreeSync is AMD’s method of matching the monitor’s variable refresh rate to that of the graphics card that is similar to the now VESA-approved DisplayPort Adaptive-Sync.

  • Security

    • OP still under attack, Danske Bank also down

      OP Pohjola customers outside Finland are still facing difficulties logging in to the company’s online banking platform, as a cyber attack stretched into a sixth day. Danske Bank’s services were also down on Monday, but it was unclear whether or not that was due to a denial of service attack.

    • Hacks (Both Types)

      That North Korea was responsible for the Sony hack is the most improbable bit of US propaganda of 2014. There is ample forensic evidence that the hack was an inside job, while the evidence that it was North Korea is … secret. Not one of my myriad contacts who are present or retired security service officers believe it. But geek stuff aside, there are many adjectives that apply to the North Korean regime, most of them unpleasant. Sophisticated is not one of them.

  • Transparency Reporting

    • ​Assange stakeout has cost UK taxpayers £9mn

      Policing the Ecuadorian embassy in London for over two years in order to prevent a possible Julian Assange escape has already cost the British taxpayers over £9 million, and the bill keeps growing.

      The estimated direct cost of policing outside the Knightsbridge building for WikiLeaks founder that took asylum there in June 2012 runs to £11,000 per day.

  • Environment/Energy/Wildlife

    • Sir David Attenborough: Humans may be an endangered species

      Of all the problems Sir David Attenborough has witnessed throughout the natural world, he sees none so pressing as the one facing our own species, which he believes could die out if we don’t tackle booming populations.

      Himself a patron of Population Matters, a UK charity advocating sustainable human populations, Attenborough believes more women around the world urgently need to be given political control of their bodies.

      “It’s desperately difficult, the dangers are apparent to anybody,” he told The Independent.

      “We can’t go on increasing at the rate human beings are increasing forever because the Earth is finite and you can’t put infinity into something that is finite.

    • All Forms of Life Are Sacred

      The battle for the rights of animals is not only about animals. It is about us. Once we desanctify animals we desanctify all life. And once life is desanctified the industrial machines of death, and the drone-like bureaucrats, sadists and profiteers who operate them, carry out human carnage as easily as animal carnage. There is a direct link between our industrial slaughterhouses for animals and our industrial weapons used on the battlefields in the Middle East.

  • Finance

    • Seven years ago, Wall Street was the villain. Now it gets to call the shots

      The recent passage by Congress of new legislation favourable to loosening controls on risky Wall Street trading is just the most recent example of the consolidation of plutocratic power in Washington. The new rules, written largely by Citibank lobbyists and embraced by the Obama administration, allow large banks to continue using depositors’ money for high-risk investments, the very pattern that helped create the 2008 financial crisis.

      This move was supported largely by the establishment in each party. Opposition came from two very different groups: the Tea Party Republicans, who largely represent the views of Main Street businesses, and a residue of old-line progressive social democrats, led by Massachusetts Senator Elizabeth Warren.

  • PR/AstroTurf/Lobbying

    • Three Ways Conservative Media Misinform About Birth Control

      Conservative media personalities have long ignored the public’s overwhelming support for wider access to birth control, instead pushing long debunked myths that birth control is cheap and easy to access, is only about preventing pregnancies, and can cause abortion.

    • Selma, Ferguson, and the Right-Wing Backlash

      “Selma,” the new biopic of Dr. Martin Luther King Jr., offers a snapshot into the civil rights leader’s time in Selma, Alabama, as he led a march through hostile territory to pressure President Lyndon B. Johnson into promoting the Voting Rights Act.

    • The Gruesome U.S. Beheadings Fox News Ignored

      On New Year’s Eve, Christian Jose Gomez allegedly attacked his mother with an ax. Angry that she had been “nagging” him about moving some boxes up to the attic, Gomez beheaded Maria Suarez-Cassagne in the family’s garage and tried to stuff her headless body into a garbage can, according to investigators. When he couldn’t do that, he fled the home on his bike and was soon captured by local deputies in Oldsmar, Florida. Gomez calmly confessed to the crime and said he’d been planning it for days.

  • Privacy

    • Hackers can’t solve Surveillance

      Médecins Sans Frontières (MSF), also known as Doctors without Borders, is an organization that saves lives in war-torn and underdeveloped regions, providing health care and training in over 70 different countries. MSF saves lives. Yet, nobody thinks that doctors can “solve” healthcare. It’s widely understood that healthcare is a social issue, and universal health care can not be achieved by either the voluntary work of Doctors or by way of donations and charity alone.

    • Why EFF’s “Let’s Encrypt” Initiative Is More Important Than It Seems

      Late 2014, the Electronic Frontier Foundation announced a small software utility called “Let’s Encrypt”, aimed at website administrators. It reduces the time and skill required to encrypt a website from three hours and much Googling to twenty seconds and one command. That initiative is more important than just being another random utility.

  • Civil Rights

    • For whistleblower vet, winning is a long-elusive quest

      Still reeling from combat injuries, Mike Helms opened the letter from the Pentagon, afraid of more bad news.

      Military doctors had already told him he couldn’t get treatment for a head injury he’d sustained in a blast in Iraq. After the intelligence officer complained to Congress, he was fired.

      But reading the notice, Helms realized it was the best outcome he could have hoped for: Investigators had concluded the military had illegally retaliated against him for blowing the whistle.

    • Belgian rapist and murderer to be put to death by lethal injection

      A rapist and murderer is to be put to death in Belgium this week, despite Europe’s ban on the death penalty, after a court granted him the right to euthanasia.

      Frank Van Den Bleeken, 52, is not physically ill but claims his “psychological suffering” is unbearable and that he would prefer to die than spend more of his life behind bars.

    • Confessions of a former TSA officer

      Airport security is a farce. And yes, we laughed at your nude body scans.

    • The most sinister court in Britain strikes yet again

      The shadowy Court of Protection’s treatment of a 72-year-old grandmother is a national scandal, says Christopher Booker

  • DRM

    • Netflix accused of shutting out VPNs and being a copyright ‘yes’ man

      TELLY ON DEMAND OUTFIT Netflix has been accused of jumping when the copyright cartels say ‘jump’ and of blocking overseas users from watching international content via a virtual private network (VPN).

      Torrentfreak is first with the news about the Netflix action, reporting that the subscription streamer is acting because the industry that feeds it, the entertainment business, wants total control over who sees and views its content and where.

      We asked Netflix to comment and it told us that it has not recently made any new efforts in the direction of VPNs.

  • Intellectual Monopolies

    • At America’s court of last resort, a handful of lawyers now dominates the docket

      The marble façade of the U.S. Supreme Court building proclaims a high ideal: “Equal Justice Under Law.”

      But inside, an elite cadre of lawyers has emerged as first among equals, giving their clients a disproportionate chance to influence the law of the land.

      A Reuters examination of nine years of cases shows that 66 of the 17,000 lawyers who petitioned the Supreme Court succeeded at getting their clients’ appeals heard at a remarkable rate. Their appeals were at least six times more likely to be accepted by the court than were all others filed by private lawyers during that period.

      The lawyers are the most influential members of one of the most powerful specialties in America: the business of practicing before the Supreme Court. None of these lawyers is a household name. But many are familiar to the nine justices. That’s because about half worked for justices past or present, and some socialize with them.

    • Copyrights

01.04.15

Links 4/1/2015: Meizu M1 Note, Samsung Ahead of Apple in Customer Satisfaction

Posted in News Roundup at 3:24 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • CES: Acer introduces first 15.6″ display Chromebook

      “The Acer Chromebook 15 is a true powerhouse, it provides fast mobile performance and a large display to help customers accomplish more every day,” said Jerry Kao, president of Acer Notebook Business Group in a statement. “Acer has been a leader in the Chromebook market, from providing the latest in technology and trailblazing battery life to designing new form factors. We’re driving the category forward again with the world’s first 15.6-inch display Chromebook, the Acer Chromebook 15.”

    • Atom PC – Future PC

      It’s got enough computing power, graphics power and memory to be useful for all the kinds of tasks folks use a smartphone or tablet but it’s definitely a desktop-PC form factor. It has the instant supply of Android apps and the usability of a GNU/Linux desktop all in one package.

  • Kernel Space

    • Graphics Stack

      • The VIA OpenChrome DRM Still Might Be Kicking In 2015

        There hasn’t been much to report on in months for the OpenChrome DRM driver as there simply hasn’t been any new public patches to comment on. While it sort of looked like this VIA DRM Linux driver was dead, it seems work is possibly getting resurrected on this open-source driver.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • Kate5 on Mac

        Given that the KF5 based Kate works OK on Windows, I would like to get the Mac version up and running, too.

        As virtualization of MacOS X is kind of “forbidden” and not that nicely usable anyway, as no nice accelerating drivers are available for the standard vm solutions, I just went out into the world and bought some Retina MacBook.

    • GNOME Desktop/GTK

  • Distributions

    • North Korea Linux 3.0 Blatantly Rips Off Mac OS X, but It’s Really Not Bad – Gallery

      North Korea Linux 3.0 is the best and latest from the state of North Korea. The ISO images of this elusive operating system have been made available and everyone can get to test it. Knowing Korean is a plus, but you can get the idea even without it.

    • Screenshots

    • Debian Family

      • Derivatives

        • Canonical/Ubuntu

          • Meizu M1 Note with 5.5 Inch Display to Launch with Ubuntu – Rumor

            We have yet to see any actual Ubuntu phones in the wild, but more rumors are popping up all over the place. This time it’s about the impending launch of the upcoming Meizu M1 Note with an Ubuntu system.

          • Robot, Is Being Programmed with Ubuntu

            Japan is the leader in the industry of humanoid robotics, although other countries have made significant progress. One of the best and easily recognizable humanoid robots that comes from Japan is Honda’s Asimo and it looks like the engineers are using Ubuntu for some of their tasks.

          • Ubuntu GNU/Linux Becoming Like That Other OS

            It’s the same old thing. An operating system gains reasonable popularity and it becomes godlike. It must not be criticized or the critic is declared mentally incompetent. That’s just wrong. If users become dependent on an OS and the developers of the OS go off on some tangent the users don’t like, that’s the developers’ problem, not the users. I long ago dropped Ubuntu because it didn’t work for me, breaking configurations with updates. I once had all my terminal servers drop out because the display manager would not run. My configurations were ignored. I went to Debian where users get much more respect. The policy that one package should not mess with the configuration of another protects users’ investments in their systems. Ubuntu thought it was fine that ~100 seats should be disabled when I installed a new set of icons, for Pity’s sake. For that, they overruled /etc/gdm.conf…

          • Flavours and Variants

  • Devices/Embedded

    • Phones

      • Android

        • Run Google’s Kit Kat Android on Your PC as a Linux Distro – Gallery

          Android-x86 is a port of the Android operating system for the x86 platform. The developers have just released a new update for it and version 4.4-r2 is now out and ready for download.

        • Top 10 Best Android Wear Apps and Faces Monthly – January 2015 Edition

          To get the New Year started, we’ve put together our regular pick of the Top 10 Android Wear apps from the past month. These could be good choices for your new smartwatch, or just something to get your brain moving before you have to go back to work. A lot of these new apps this month are watch faces, after all that’s what the latest Android Wear update to Android 5.0 was all about, and there are some great new additions available. As well as watch faces, apps many of us use on a daily basis have been upgraded with great Android Wear support and it’s a good time to be an Android Wear user.

        • Flappy Bird’s Android Wear App Challenges Apple Watch

          Just as Flappy Bird signalled the lopsided nature of the software market during the early months of 2014, its arrival on your Android Wear powered smartwatch points to the strengths of Google’s approach to wearables, and how it will contrast with Apple’s strategy.

          [...]

          Google’s vision of Android Wear is relatively clear. It is a second screen to your main Android device (be it a smartphone, phablet, or ultraportable), it will give you rich notifications you can act on from your wrist, and it will present you with relevant and timely information.

        • Samsung pulls ahead of Apple in consumer satisfaction

          Customers in 2014 who bought a Samsung smartphone are more satisfied than those who purchased an Apple device, according to a new report from the American Consumer Satisfaction Index.

        • Xiaomi is the world’s most valuable technology startup, worth $46 billion

          As we briefly mentioned a little earlier, Xiaomi has just officially rounded-off its latest round of fundraising, where the company generated $1.1 billion with of additional investment. This gives Xiaomi a valuation worth $46 billion, matching original estimates and making the Chinese manufacturer the most valuable technology startup around.

        • Man returns stolen Android tablet when he can’t work it

          Yes, I am sober. Please let me explain. A man from Sunderland in northern England stole an Android tablet from a charity store, according to court documents. Christopher Hooson apparently saw it in the window of the Jonny Kennedy store in Whitley Bay and thought: “I’ll have that.”

          There was one small problem. When he brought it home he didn’t know how to get it to work. It’s unclear why this was so. What is clearer is that, eight days later, Hooson took it back to the charity store and showed his deep good-heartedness. He tried to donate the tablet back to the store.

          This move was unwise. Even charity stores have CCTV. And so Hooson, age 33, ended up in court to defend himself.

        • The Interview download includes Android hacker attack

          Several weeks ago Sony Pictures was hacked by a group that claimed to have done so that The Interview would not be released. Once it was clear that the film WAS still going to be released as normal, they issued further threat that anyone who saw the film would be in danger of physical attack. Most recently there’s been a hack embedded within a torrent – that’s an illegal download, in this case, and it’s hitting Android users in South Korea specifically.

        • New Android-Powered Nokia C1 Renders Leak Along With Phone’s Alleged Spec Sheet

          Nokia, what’s left of it that is, surprised everyone by announcing an Android-powered Nokia N1 tablet back in November. Why was this surprising? Well, I believe you all know by now that Nokia’s Devices and Services department was acquired by Microsoft, which left this Finnish company in ruins basically. The vast majority of the company is now Microsoft-owned, but what’s left of it is trying to make their mark out in the market. Nokia is technically not allowed to manufacture devices until 2016, as per their contract with Microsoft, but they found a way to avoid that rule. Nokia N1 wasn’t manufactured by Nokia, Foxconn did that for them.

        • Last year’s most surprising hit Android phone may get Lollipop soon

          Android handset makers launched a wide variety of smartphones last year and a surprising number of flagship devices managed to stand out of the crowd. But one handset in particular really stood out from the pack because it literally came out of nowhere to generate buzz that was unprecedented for a small, unestablished company.

        • Android Circuit: Galaxy Note 4 Versus Galaxy S5, Android’s Lack Of Profit, Gingerbread Lives Again

          Taking a look back at the week’s news across the Android world, this week’s Android Circuit highlights a number of stories including the Galaxy S5 vs the Galaxy Note 4, the Note 4 LTE, Xiamoi’s 2015 strategy and financials, where is the profit in Android and can Samsung find it, is the Moto G the smartphone of the year, and is Android 2.3 Gingerbread a good OS in 2015?

Free Software/Open Source

  • Web Browsers

    • Mozilla

      • Why does Google Say Mozilla Thunderbird is Less Secure?

        Sometimes when you are looking for an answer to one thing, you end up finding something else rather surprising. Case in point, Google’s statement that Mozilla Thunderbird is less secure, but why do they say that? Today’s SuperUser Q&A post has the answer to a confused reader’s question.

  • Programming

    • Next-Generation PHP 7.0 Is Running Well But Will It Catch Up To HHVM?

      It’s been a while since I’ve last tried out the Git code for the next-generation PHP (phpng) that’s going to be known as PHP 7.0 when released likely later this year.

      The next major release of PHP is to be called PHP7 in order to avoid confusion with the now-defunct PHP6 unicode initiative. PHP 7.0 is likely to be released by the end of 2015 per the PHP7 timeline. If the release candidates begin on time starting in June, we could be looking at the official PHP 7.0 release around October of this year. However, it’s largely dependent upon the state of affairs at that point with the quality of the code.

Leftovers

  • Science

    • An asteroid striking Earth is a possibility, but we’re more likely to destroy ourselves

      Our solar system is littered with billions of pieces of debris, from the size of large boulders to objects hundreds of miles across. We know that from time to time these hit Earth. A Russian scientist has calculated that a mountain-sized asteroid — which crosses paths with the Earth every three years — could one day hit us with an explosion 1,000 times greater than the surprise 2013 impact of a bus-sized meteor in Russia.

      This is not the only doomsday scenario faced by our planet. Humanity may have already created its nemesis, according to Prof. Stephen Hawking. The Cambridge University physicist claimed that new developments in the field of artificial intelligence mean that, within a few decades, computers thousands of times more powerful than in existence today may decide to usurp their creators and end humanity’s 100,000-year dominance of Earth.

  • Health/Nutrition

  • Security

    • The Biggest Security Threats We’ll Face in 2015

      As the clock strikes midnight on the new year, so begins the countdown to a new round of security threats and breaches that doubtless will unfold in 2015. But this year will be a little different. In the past, when we’ve talked about threat predictions, we’ve focused either on the criminal hackers out to steal credit card data and banking passwords or on the activist hackers out for the lulz (and maybe to teach corporate victims a lesson).

      But these days, no threat predictions are complete if they don’t address the looming threats posed by nation-state attacks, like the ones exposed by Edward Snowden. It’s been said repeatedly that when a spy agency like the NSA undermines a system to gain access for its own use, it makes that system more vulnerable to attack by others. So we begin this list with that in mind.

    • The Most Dangerous People on the Internet Right Now

      If only the internet had its own version of Lost in Space’s robot to herald every lurking hazard or menace with an unequivocal warning. Unfortunately Robot B-9 isn’t available. So in his absence we’ve compiled a list of candidates we consider to be this year’s most dangerous. We’ve taken a broad view of danger, though—it’s not just about who is potentially a danger to public safety, but also about entities who might be considered a danger simply because they rock the status quo.

    • Countdown to Zero Day: launching Stuxnet on Iran

      As you turn the last page of Kim Zetter’s new book about the worm and virus that sabotaged Iran’s nuclear program, don’t be surprised if you find yourself starting to mull over a career change.

  • Defence/Police/Secrecy/Aggression

    • Barack Obama must decide whether he will let the neocons keep pulling his strings

      Heading into the last quarter of his presidency, Barack Obama must decide whether he will let the neocons keep pulling his strings or finally break loose and pursue a realistic foreign policy seeking practical solutions to world problems, including the crisis with Russia over Ukraine, says ex-CIA analyst Ray McGovern.

    • Ukrainian Nazis Pay Private Military Company Academi (formerly Blackwater) for Training, Russian Report

      The Russian Government’s Tass ‘news’ agency is alleging that “The US private military company Academi (formerly known as Blackwater) … has confirmed to the Kiev authorities its readiness to start training an experimental battalion of 550 men as of January at the request of Ukraine’s General Staff,” according to an unnamed source, which source is probably one of the few remaining anti-nazi bureaucrats still remaining in the Ukrainian Government. The reported price of this Blackwater (a.k.a. “Xe,” a.k.a. “Academi”) training contract is $3.5 million.

    • Leaked Documents Show the US Used Drone Strikes to Target Afghan Drug Lords

      The latest documents leaked by NSA whistleblower Edward Snowden reveal that US drone strikes in Afghanistan weren’t limited to just al Qaeda and Taliban leaders — they also targeted drug dealers accused of supporting the insurgency.

      The papers, obtained by German news magazine Der Spiegel, include a “kill list” that once contained as many as 750 names, including many mid- and lower-level members of the Taliban involved in drug trafficking.

    • The real politics behind the US war on IS

      In fact, it is all about domestic political and bureaucratic interests.

    • Der Spiegel Reveals Loose Standards Needed for Drone Assassination

      The German magazine Der Spiegel has published a revealing exposé about the loose standards by which the the Obama administration assassinated people, including many non-combatants, in Afghanistan. The December 28 story documented a quick-to-assassinate tendency which took the form of readiness to loosely classify anyone in the drug trade as a legitimate assassination target, as well as a readiness to accept large numbers of civilian casualties.

      The Obama administration accelerated the 2008 decision by the Bush administration to extend the war on terror to the drug war. “In the opinion of American commanders like Bantz John Craddock,” Der Spiegel reported, “there was no need to prove that drug money was being funneled to the Taliban to declare farmers, couriers and dealers as legitimate targets of NATO strikes.” The result was that many people who made the assassination list — hundreds of people at any time — were often several layers removed from actual Taliban terrorists, and may even have been unaware they were financing the Taliban.

    • Bush’s Enduring Theories of Martial Law

      The failure to hold anyone accountable for torture derives from extraordinary post-9/11 legal theories that made the President all-powerful during “wartime” and established what amounted to martial law in the United States, a condition that continues to this day, writes retired JAG Major Todd E. Pierce.

    • US Adding Names to Foreign Fighter Watchlist ‘Like a Ticking Odometer’

      Quoted in an article by the Washington Post‘s Greg Miller on Tuesday, an unnamed former U.S. intelligence official described how the NCTC—citing the threat of Europeans who may have travelled to foreign battlefields, particularly in Syria and Iraq—is actively placing thousands of people into the database nearly constantly, sometimes with (and often without) the full knowledge of European governments or their intelligence agencies. According to the report, the database already contains more than 15,000 names.

    • Afghan ‘kill list’ leak: NATO risked civilian lives by targeting low-level Taliban fighters

      Besides targeting top Taliban leaders, NATO forces in Afghanistan included low-ranking fighters and drug dealers on their list of “legitimate” targets, risking civilian lives in a wider airstrike campaign, Der Spiegel reported, citing Snowden archives.

    • Leaked ‘kill list’ shows NATO killed Afghan children, civilians in pursuit of low-level Taliban fighters

      Drawing information from top secret documents spirited away by former NSA analyst Edward Snowden, Der Spiegel reports that the “kill list” used by NATO forces in Afghanistan included low-ranking members of the Taliban along with drug dealers suspected of supporting them.

    • New Snowden Docs Reveal Wider Net of NATO ‘Kill List’ Targets

      The reporting also explains how the wide net of those targeted for assassination covered those deemed to be narcotics traffickers.

    • Pakistan Taliban: US drone ‘kills militants’ in tribal region
    • Suspected U.S. Drone Strike Kills Nine in Pakistan’s North Waziristan

      A suspected U.S. drone strike killed at least nine suspected militants in Pakistan on Sunday, government and security officials told NBC News. Pakistani government and security officials said the drone fired two missiles and struck a militant compound in the Shawal valley of the restive region of North Waziristan.

    • U.S. Drone Strike Said to Kill Militants in Pakistan

      At least six foreign militants are believed to have been killed in an American drone strike in the North Waziristan tribal region on Sunday morning, a Pakistani security official said.

      The Pakistani official said a drone fired two missiles into a compound in the Dattakhel subdistrict at 6.40 a.m. The area is close to the border with Afghanistan and to Miram Shah, the main town in North Waziristan and the site of the region’s administrative headquarters.

    • President Obama’s Hawaii vacation: Day 15

      Obama headed out to the beach to join his daughter Malia and friends at Bellows Air Force Station on a mostly sunny day. A dozen onlookers watched as the motorcade left the Kailua neighborhood, some holding signs that read “Drones Kill” and “Stop NSA Snooping.” A rainbow stretched over the mountains as the president made his way to the beach and its sparkling turquoise waters.

    • Obama: How Many Kids Did You Kill Today?

      In the 1960s, Lyndon Johnson was heckled this way. Anti-war activists targeted his Southeast Asian war they wanted ended.

      Obama way outdid his predecessors. With two years left to go. Bombing 7 countries in 6 years. More on this below.

      Plus subversion in unknown numbers of others. From its empire of bases. Its global embassies infested with CIA agents.

    • Chickenhawk Response No. 8: The Economic Realities (and Unrealities) of a Trillion-Dollar Budget

      I’ve spent most of the past two days reading through the ~ 1,200 emailed or paper-mailed responses I’ve gotten, most from past or current military people and most supportive overall if differing in degree. Obviously I can’t quote from (or unfortunately even acknowledge) all of them, but I’ll excerpt some as feasible in coming days. Again, I’ll assume that I am free to quote from incoming messages unless specified otherwise, but I won’t use real names unless you say so in advance.

      Today’s theme: business aspects of what I call the chickenhawk economy.

    • You Can’t Run From This Course-correcting Bullet

      The U.S. Army has manufactured a bullet that can change direction mid-flight, according to a story reported in the Independent (U.K.).

    • Stay away from the Sentinelese. Either you’ll kill them or they’ll kill you

      The Sentinelese, a tiny island tribe in the Indian Ocean, have a tried-and-true foreign policy.

      [...]

      The Sentinelese have been derided as “savages” and “primitives” for failing to join the outside world. But their habit of killing intruders is nonetheless wise.

      Modern history is filled with sad sagas of indigenous peoples eradicated or decimated by diseases borne by European visitors. As in 17th-century America, epidemics can rapidly depopulate the land and leave it vulnerable to takeover.

    • Drones and questions of command for Obama

      There was a disturbing revelation contained in recent a New York Times’ front-page report. President Obama has empowered the CIA by “allowing its director, not the White House, to make the final decisions about targeted drone strikes” on foreign soil. These strikes number in the hundreds from Afghanistan to Yemen to Somalia.

    • Looking Backward, Looking Forward: 2014-2015

      Major events and policies in 2014 which have had a profoundly negative effect on the prospects for peace and social justice are equally numerous.

      (1) The US and EU installation of a puppet regime in the Western Ukraine (Kiev) and its conversion into an economic vassal state of the European Union and NATO outpost on Russia’s border is a major blow against democracy and boost to Ukrainian neo-fascist political leaders. The militarization of the Ukraine, as an adversary of Russia, threatens a global nuclear war.

    • Pakistan Fumes At Being Portrayed As Hellhole By US TV Show Homeland

      Pakistan has problems with the way it has been depicted as a military-dominated, terrorist-infested hellhole in the American television drama Homeland and has reportedly conveyed its unhappiness to the show’s producers.

    • Readers React: Why political gridlock isn’t always a bad thing

      To illustrate his point, Diamond blames the coup against Chile’s democratically elected Salvador Allende partly on Allende’s refusal to compromise, making no mention of the CIA’s role in bringing dictator Augusto Pinochet to power.

    • Strikes to Continue in Afghanistan Despite Mission End: Former Official

      Former CIA official claims that US drone strikes targeting the Taliban and other insurgent groups will continue despite the official end of NATO combat operations in Afghanistan.

    • The incredible US “peace plan” for Syria

      The Syrian people have won two successive wars in four years. Yet the country does not yet know peace. Not only are Washington “liberal hawks” doing everything in their power to prolong the crisis, but they have devised a plan to prepare a third war. Thierry Meyssan reveals here how they intend to use to their advantage the peace conference planned to be held in Moscow in late January 2015.

  • Transparency Reporting

  • Finance

    • Why a consumer society can’t fix the climate

      Policy makers throughout the industrialized world generally assume that humankind can solve serious global problems by adopting better technologies and regulations—without questioning the viability of consumer-capitalist societies. This faith is mistaken. The big problems, particularly climate change, are so serious that they cannot be solved without unprecedented and extremely radical change, including abandoning the obsession with economic growth, market systems, and high living standards.

    • Russia’s Putin praises Crimea’s ‘return home’ in New Year address

      Next year, the Russian economy is projected to fall by around 4.5 percent if the average price of oil remains near $60 per barrel, according to the central bank.

    • What are U.S. Objectives in Weakening Russia’s Economy?

      Larry Wilkerson and Paul Jay discuss the “tactical strength and strategic weakness” of Putin in Ukraine and whether the West is trying to turn Russia into another “Greece”

  • PR/AstroTurf/Lobbying

    • Marketing Madness

      If they really wanted to be freedom’s heroes, US filmgoers would be lining up at theaters that are showing the movie “Kill the Messenger,” an excellent drama based on a real story. It exposes how the CIA used its contacts and perhaps even paid agents who work inside the largest and supposedly “free and independent” corporate media organizations, to spread lies and destroy the reputation of Gary Webb, a two-time Pulitzer Prize-winning journalist who had exposed an incredibly cynical and criminal program by the CIA in the 1980s to facilitate the massive import into the US of cocaine from Latin America in order to raise money from the drug cartels which it used to fund arms for the Contra army fighting to overthrow the Sandinista government in Nicaragua.

    • The Interview to be air-dropped into North Korea using balloons

      Balloons have been used before to take propaganda and other items into North Korea.

    • Liam Neeson: Taken Has Put Americans Off Travelling To Europe

      The 62-year-old actor stars as retired CIA agent Bryan Mills in the action franchise and admits fans have written to him saying they’re frightened of travelling abroad due to the storylines in which his wife and daughter are kidnapped.

    • Mike Huckabee’s Worst Media Moments

      Fox News and Mike Huckabee are finally parting ways as the now former host explores a second presidential run. After serving as the governor of Arkansas and losing a 2008 presidential primary bid, Huckabee was hired by the network. His media career was rife with controversial comments and outright falsehoods.

    • Mike Huckabee Sold Out His Fans To A Quack Doctor, Conspiracy Theorists, And Financial Fraudsters

      Mike Huckabee, who is parting ways with Fox News, has profited from renting his Fox-promoted MikeHuckabee.com email list to a wide range of shady characters, including a medical quack claiming Alzheimer’s disease cures; a for-sale stock pundit that was fired from Fox; a financial firm that was fined by the government for engaging in “deliberate fraud”; and a survival food company that profits off of readers’ fears of being “herded into FEMA camps.”

      Huckabee has previously denied responsibility for his shady sponsored emails, telling Media Matters: “You are supposed to read the disclosure and the disclaimer that is a part of the messages. You know, we are simply the conduit to send messages, these are sponsored and I can’t always vouch for the veracity.”

    • The Interview reinforces a negative view of US journalists

      The Interview is a dangerous movie. The first victim was Sony, which had electronic files hacked in an intrusion that revealed shocking details: like the fact that one of its executives wanted to cast a black actor as James Bond, and that many people at Sony can’t spell. But another more serious group of victims haven’t yet been mentioned: journalists who work in dangerous parts of the world.

      The film, which was released over the Christmas holiday, depicts two goofy journalists, played by Seth Rogen and James Franco, who score an interview with North Korean leader Kim Jong-un, and who are recruited by the CIA to kill him. Rogen’s character, the producer of a television interview program, was supposedly educated at my alma mater, Columbia School of Journalism, but seemed to have no qualms about crossing what I recall was one of the most indelibly-inked lines of journalism ethics: don’t do the bidding of the CIA.

    • 5 Absurd Right-Wing Moments
    • 2014 in review: The year according to Fox News

      The way the news is covered by Fox in the US can seem incomprehensible to the rest of the world – not to mention many Americans.

    • Benign Intent: Tools of Corporate Media Propaganda

      In a healthy society governed by democratic principles and the rule of law, news media would be analogous to a powerful telescope, a roving, scrutinizing eye from which little or nothing can hide. Corrupt societies — ones that require the vast majority of the population to be passive, obedient, misinformed, ignorant, distracted and consumptive — require instead a media that acts as a kind of prism, a distorting lens that presents a perversion of reality.

      The scale of this distortion varies greatly around the world, with some — mostly independent — media (sometimes lone journalists) laudably aiming to shine a torch as best they can on state and corporate power. At the other extreme, dictatorships like North Korea use state media to portray a false reality to help control their people, who nonetheless are surely aware that their freedoms are strictly limited.

      Western corporate-owned media, however, is unique and quite remarkable in that while it depicts a reality as laughably false as that shown to the North Koreans, its readers/viewers — more accurately its consumers — are overwhelmingly unaware that they are being fed a pack of lies, that the picture given to them is — in key areas that concern corporate power and Western control of world resources — diametrically opposite to reality.

  • Censorship

    • Government red-faced after memos warning staff not to breach Official Secrets Act are leaked to the media
    • Government wants crackdown on violation of Official Secrets Act

      The government wants a crackdown on violation of Official Secrets Act through leakage of sensitive information in the media but its own communication seeking to curb the practice has come out in public domain.

      Aaj Tak has accessed a series of government notes highlighting concerns over the leakage of information to the media expressed by top security bosses. In a letter to Cabinet Secretary Ajit Kumar Seth on October 13, 2013, National Security Advisor (NSA) Ajit Doval pointed out that a news channel had broadcast a report on India’s nuclear submarine INS Arihant.

    • Ajit Doval, The NSA, Asks Ministries To Plug Classified Documents Leakage

      National Security Adviser Ajit Doval has asked ministries to take necessary steps to prevent leakage of classified information to the media and fix responsibility in case the leakage takes place.

    • NSA red-faced after memos warning staff not to breach of secrecy laws are leaked to media

      In a letter to Cabinet Secretary Ajit Kumar Seth on October 13, 2013, National Security Advisor (NSA) Ajit Doval pointed out that Aaj Tak channel had broadcast a report on India’s nuclear submarine INS Arihant.

    • Cuban dissidents arrested before free-speech demonstration in Havana

      Cuban police have detained at least three leading dissidents ahead of a planned free-speech demonstration in the Plaza de la Revolución.

      The arrests of Antonio Rodiles, Eliezer Avila and Reinaldo Escobar look set to be the biggest test yet of diplomatic relations with the US since they were restored earlier this month after 53 years of tension.

    • Putin just imprisoned an innocent man to silence his opposition-leader brother

      This morning, under the glare of worldwide media attention, a Russian court sentenced Oleg Navalny, an apolitical former postal worker, to three and half years in prison on embezzlement charges that are widely and correctly considered to be fictitious.

      Russia’s slide into authoritarianism has been so gradual, and accompanied by so many distractions such as Vladimir Putin’s invasion of Ukraine and his ban on American adoptions (not to mention his cartoonish image abroad), that many Americans have missed it. Yes, Russia does some bad things, particularly to gays, the common perception goes, but it’s still not quite a dictatorship.

    • The Bitter Education of Alexey Navalny

      It was the radicals—Russians call them the demshiza, formed from the roots of the words for “democratic” and “schizophrenic”—who insisted on talking about the fact that Putin had established a virtual state monopoly on media, jailed his opponents, most likely sent his cronies to London to poison a former secret agent, and enabled the murders of many more critics, cancelled elections, waged war on his own people in Chechnya and Dagestan, and annexed parts of Georgia and Ukraine. All along, Putin and his friends stole from state coffers and from their enemies on a scale that overwhelms the imagination. They were never just “crooks and thieves.” Navalny knows that now.

  • Privacy

    • Nico Sell: ‘To me, the NSA and Edward Snowden are just the tip of the iceberg’

      The founder of secure messaging app Wickr on privacy, why she always wears dark glasses in public and why girls make great hackers

    • Offshoring Data Won’t Protect It From The NSA

      The United States is the physical hub of the global Internet. Data from around the globe crosses gateways and servers in the United States. This basic fact, obscured by hazy visions of a borderless Internet cloud, is part of what accounts for global dismay at the revelations of extensive spying by the National Security Agency.

    • Storing data offshore won’t protect it from NSA, expert says
    • The NSA’s Ongoing Efforts to Hide Its Lawbreaking

      Every quarter, the National Security Agency generates a report on its own lawbreaking and policy violations. The reports are classified and sent to the President’s Intelligence Oversight Board. It’s unclear what happens once they get there.

      Those reports are now online dating back to late 2001.

      The NSA has posted redacted versions of the documents to its website. “These materials show, over a sustained period of time, the depth and rigor of NSA’s commitment to compliance,” the agency’s self-congratulatory introduction declares. “By emphasizing accountability across all levels of the enterprise, and transparently reporting errors and violations to outside oversight authorities, NSA protects privacy and civil liberties while safeguarding the nation and our allies.”

      These NSA characterizations are not credible.

    • Missouri Bill Bans Use of Local Resources for NSA Surveillance

      A bill filed late last month in Missouri would step into the breach left by a federal government unwilling to restrain the unconstitutional surveillance of Americans.

    • US Made Spyware Found on Merkel Aide’s USB Drive

      Reports out of Berlin today say that a top aide of German Chancellor Angela Merkel was targeted by advanced malware commonly used by the NSA and Britain’s counterpart, the GCHQ.

    • Cyber attack on Angela Merkel aide: Report

      The German chancellor’s office has fallen victim to a hacking attack, according to a German newspaper. The Regin malware in question has been linked to British and US spy agencies.

    • NSA spooks count on holiday distractions to hide misbehavior
    • Apple Says Has Never Worked With NSA On IPhone Backdoors

      Apple responded on Tuesday to Germany’s Der Spiegel reports that the National Security Agency had developed a system to hack into and monitor iPhones called “Dropout Jeep,” saying it never worked with the U.S. spy agency and was unaware of efforts to target its smartphones. Der Spiegel referred to it as a “trojan,” or malware that helps hackers get into protected systems. The report, which surfaced on Sunday, did not suggest that Apple had cooperated with the U.S. spying agency on so-called backdoors.

    • NSA Abused Power by Spying on Wives, Girlfriends

      The National Security Agency (NSA) was forced to admit on Christmas Eve how it wrongly spied on Americans in a list it released as a result of a lawsuit filed by the American Civil Liberties Union (ACLU).

    • The Patriot Act Is Cannibalizing America’s Economic Edge

      The majority opinion prioritized protectionism—the idea that phone-record collection could stop threats like ISIS from endangering U.S. citizens—over economic growth. Such myopic attachment to the tools of defense, without consideration of their big-picture relevance, puts the $5.7 trillion U.S. IT industry in danger of losing its competitive advantage.

      Risking the second-largest industry in the country will pose serious long-term consequences—not only to the economy, but, by association—to national security itself.

      It’s time for legislators to ask themselves which laws matter most.

    • NSA Abuses Never End

      The NSA has posted redacted versions of the documents to its website. “These materials show, over a sustained period of time, the depth and rigor of NSA’s commitment to compliance,” the agency’s self-congratulatory introduction declares. “By emphasizing accountability across all levels of the enterprise, and transparently reporting errors and violations to outside oversight authorities, NSA protects privacy and civil liberties while safeguarding the nation and our allies.”

      These NSA characterizations are not credible.

      Even the uninformed observer will be suspicious of the spy agency’s account upon learning that far from voluntarily releasing redacted versions of these documents, it was forced to do so by Freedom of Information Act requests filed by the ACLU. The NSA fought to continue suppressing these documents from the public, even though the redacted versions in no way harm U.S. national security. A court ordered the documents released.”

    • Kim Dotcom is back!
    • MegaChat Poised to Compete With Skype

      Kim Dotcom, an individual who has become known as an outspoken encryption enthusiast, and the man who attempted to stop the recent hacks against both Sony and Microsoft’s online services via the notorious hacker group Lizard Squad, has announced he intended to bring about a rival against Skype. Dotcom intends to release MegaChat, a fully-encrypted video call and chat platform for users tired of Skype on all of their devices. The service is said to support key features of most well known messaging platforms already, but with the promise of no back doors where the United States government can access chat logs from those using the service, reports Slash Gear.

    • Kim Dotcom serves up a Encrypted Chat service, Mega Chat ‘coming soon’
    • MegaChat encrypted Skype rival imminent says Kim Dotcom

      Outspoken encryption enthusiast Kim Dotcom has promised the imminent arrival of his Skype rival, Mega’s fully-encrypted video call and chat platform, which will be positioned as a pipeline for free-speech. The service, currently referred to as MegaChat, will support all the key features of existing popular messaging clients, only with the added promise of no backdoors being provided to the US government, Dotcom claims, pointing out that it’s already in fact been used in public by high-profile leakers Julian Assange and Edward Snowden. News of the app comes as fresh revelations from Snowden’s NSA documents finger several services as being targeted by the spy agency.

    • Kim Dotcom vows to KILL SKYPE with encrypted MegaChat

      Megaupload maestro Kim Dotcom says he will soon unveil an encrypted video calling and chat service that he claims will mark “the end of NSA mass surveillance.”

      In a series of tweets, Dotcom said the service, to be called MegaChat, will also doom Skype, the current king of online calling, which is thought to have been cooperating with US government snoops since at least 2011.

      “No US based online service provider can be trusted with your data,” the rotund refugee proclaimed. “Skype has no choice. They must provide the US Government with backdoors.”

    • Edward Snowden’s legal defence fund accepts bitcoin donations

      Whistleblower Edward Snowden is accepting donations in bitcoin to pay for his legal defence.

      Courage Foundation, which manages the former National Security Agency (NSA) contractor’s legal defence fund, launched a website, edwardsnowden.com, where people can donate to support Snowden via a number of means.

      The website accepts payments via paypal, credit cards, bank transfer and cheques in addition to bitcoins.

    • Big Brother Spying Program Is Stripping Away Privacy [Video]
    • When it comes to surveillance, there is everything to play for

      The UK passed “emergency” legislation, referred to as the Drip Act, expanding mass surveillance powers in the wake of European court judgments. In the US, modest reforms to domestic mass surveillance failed to pass Congress. Ireland retrospectively made legal UK mass surveillance efforts related to the country, while even Germany – one of the most outspoken nations on surveillance – has challenged Der Spiegel’s reporting of the tapping of Angela Merkel’s phone.

      [...]

      The technological backdrop is similarly mixed: in the immediate wake of Snowden, a flurry of new companies promising privacy arose, but there’s not yet a definitive app, while incumbents such as Tor have revealed several attacks and security breaches (since fixed). Conversely, though, major players are starting to regard privacy as a selling point: Google and others are encrypting ever more of their traffic, and even enhancing privacy controls over which information the search and social giants store.

    • Senate letter exposes FBI domestic warrantless cellphone data mining

      In a letter addressed to Attorney General Eric Holder and Secretary of Homeland Security Jeh Johnson this week, leading US Senators requested information about the use of “StingRay” and “dirt box” devices and other cell phone surveillance and data mining systems by the Federal Bureau of Investigation (FBI) and other US government agencies.

    • The year of surveillance is finally over

      Whether it was the NSA, your cell phone company or some place where you bought pants a few months ago, it seemed everyone was after your data in some way in 2014. Here are some of the stories that shed light on the new ways you’re being tracked — and also some methods to keep your information safe from prying eyes of all sorts.

    • Why we should be worried about relinquishing our privacy to a secret state

      Ben Wizner is a director of the American Civil Liberties Union (ACLU) Speech, Privacy & Technology Project — which is dedicated to protecting and expanding individuals’ right to privacy, as well as increasing the control that one has over their personal information, ensuring that civil liberties are enhanced, rather than compromised, by new advances in science and technology.

      Winzer has litigated numerous cases involving post-9/11 civil liberty abuses. These include challenges to airport security policies, government watchlists, extraordinary rendition, and torture. He has testified before US Congress, and also traveled several times to Guantánamo Bay, where he has met people who have been held against their will in secret prisons and tortured by the CIA.

      In July 2013, one month after the revelations about the NSA’s practices came to light, Winzer became Edward Snowden’s attorney. He was put in contact with him directly through the journalist Glenn Greenwald. I spoke to Wizner, focusing specifically on the issue of maintaining democratic accountability as technology advances.

    • The Real Constitutional Crisis Is Hidden

      It’s the Bush-Obama record of surveillance and lack of accountability—and not executive action on immigration—that ought to concern citizens.

    • Debate Over U.S. Government Surveillance Faces a Deadline

      Civil-liberties advocates and many lawmakers want stricter protocols for gathering information—in particular, limits on the mass collection of phone records by the National Security Agency—while opponents of such measures cite security threats that they maintain warrant the continuation of the bulk accumulation of personal data.

    • Anti-terror plan to spy on toddlers ‘is heavy-handed’

      Nursery staff and childminders are given ‘duty’ to report toddlers they suspect of being at risk of becoming terrorists under new Home Office measures

  • Civil Rights

    • Melville House Publishes Senate CIA Torture Report as Book

      Dennis Johnson, one of the founders of Melville House Publishing, called the CIA Torture Report “probably the most important government document of our generation, even one of the most significant in the history of our democracy” and announced the publishing of the report as an e-book and a paperbook.

    • CIA Torture Report Sells Out in a Day

      Melville House revealed plans to sell the CIA’s recently release torture report earlier this month, and it turned out to be a good idea.

    • Ferguson and CIA torture painful for Canadians

      Canadians know, by following their own and the US media, that race relations remain ugly in the United States despite gratifying progress and that the CIA tries to topple foreign governments, kill foreign leaders and tortures people to achieve its policy goals, for example in Guantanamo Bay.

    • Making torture legal

      The CIA, the executive hand of the president, has been involved, deeply, in every crime known to man — for decades!

    • Briton ‘lived’ Guantanamo torture

      The 47-year-old, who has been cleared for release from the detention camp since 2009, said he had not read the 6,000-page report but had been the victim of one of the measures outlined in it – “rectal rehydration”.

    • If Obama won’t bring U.S. torturers to justice, why not compensate torture victims for life?

      President Barack Obama has made it clear since taking office that no one will be punished for torture.

      As I have repeatedly written before, that’s reprehensible. But what about compensating torture victims?

      According to the recent report issued by the U.S. Senate Intelligence committee, torture under the Bush administration was more brutal and widespread than previously understood.

    • My Turn: Always and everywhere, torture is wrong

      As the child of an emigrant family that escaped from a Hungary ruled by a communist government, I heard many stories of relatives and friends enduring extreme cruelties and torture by that government. Perhaps this was the reason I joined Amnesty International 40 years ago.

      The organization is dedicated to helping the victims of human rights abuses and supporting the abolition of torture worldwide. After my family became American citizens, I never imagined that my new adopted country would engage in torture and abuse of prisoners. But in the 1970s, the investigations by Sen. Frank Church revealed that the CIA was not only attempting to assassinate some leaders of South American and Central American countries but that they were also assisting in torturing prisoners in those countries and training the torturers.

    • ​80% whistleblower retaliation claims ignored in biased, ‘Trojan horse’ system

      The number of whistleblowers being retaliated against is increasing every year as former federal workers warn it’s almost impossible to raise grievances through official avenues within the government, a new report reveals.

      Among the employees and contractors working for the United States military and the American intelligence community, more than 8,700 have filed claims since 2001 in which they allege having faced reprisal for raising objections about supposed instances of waste, fraud or abuse, McClatchy reported on Tuesday.

      According to the report, an analysis of whistleblower retaliation claims made with the Pentagon suggests the number of workers who say they suffered for speaking out has been “increasing virtually every year” since September 11, 2001.

    • Judge Okays Condé Nast Payout of $5.85 Million to Former Interns

      Onetime interns will each get payouts of up to about $1,900 for their time with the publisher

      Condé Nast appears likely to pay $5.85 million to thousands of former interns who have accused the magazine publisher of underpaying them for their work.

    • Terrorism “Insurance” Expires

      The April 2013 issue of The Atlantic recounts the U.S. Senate testimony of a young man named Farea al-Muslimi, a Yemini. He attended English classes in Yemen before going to high school in Rosamond, California, then college in Beirut— all funded through U.S. State Department scholarships. One day a drone strike hit his remote home village of Wessab. Seven of his siblings died from injuries they sustained. During his testimony to the Senate, he said he has met dozens of civilians who were injured during drone strikes and other air attacks in Yemen. “The killing of innocent civilians by U.S. missiles in Yemen is helping to destabilize my country and create an environment from which AQAP benefits. [Drone strikes] are the face of America to many Yemenis.” (He was quoted using the acronym for al-Qaeda in the Arabian Peninsula.)

    • Is it not time to dismantle the CIA?

      It’s not as if we weren’t warned about the CIA. Some 50 years before the Senate Intelligence Committee issued its 500-page report on torture, former President Harry Truman published an opinion piece in the Washington Post asserting that the CIA was out of control and calling for it to be broken up.

    • CIA should pledge to a ban on recruiting journalists

      According to a recent series of investigative reports, oil-rich Azerbaijan — wedged between Russia and Iran — is ruled by a virtual kleptocracy. It is illegal for Azerbaijan government officials to own businesses, but the law does not apply to their families. So while President Ilham Aliyev’s control of the nation’s oil industry remains cloaked in layers of deceptive legality, the facts about his two daughters’ hefty stake in the mining, financial services, construction, and other industries have become public knowledge.

      These facts were unearthed by a brave journalist named Khadija Ismayilova. On Dec. 5, Ismayilova was jailed; on Dec. 26, the Baku office of her employer, the US-funded Azeri language service of Radio Free Europe/Radio Liberty (RFE/RL), was raided and ransacked.

      For months, the ruling party has been accusing Ismayilova of spying for the CIA. But she has not been formally charged with espionage, and weeks of interrogations and searches by the legal authorities have not produced a shred of evidence to justify such a charge. Yet sadly, America has a history of providing a pretext to authoritarians and other adversaries to discredit independent journalists in this manner. This needs to end.

      When RFE/RL was originally established in 1949, its purpose was to break the information monopoly of Communist regimes in Eastern Europe and the Soviet Union — and its funding came covertly from the CIA. In 1967 this covert funding was exposed (by investigative journalists), and in 1971 it was terminated. In 1972, Congress voted to fund RFE/RL openly as an independent media company under the supervision of the Board for International Broadcasting, a new entity created to serve as a firewall between RFE/RL and the government.

    • How To Read the Senate Report on CIA Torture

      Despite its rich fund of hard-won detail, the Senate report has, at best, produced a neutral outcome, a draw in this political contest over impunity. Over the past forty years, there have been a half-dozen similar scandals over torture that have followed a familiar cycle – revelation, momentary sensation, vigorous rebuttal, and then oblivion. Unless we inscribe the lessons from this Senate report deeply into the country’s collective memory, then some future crisis might prompt another recourse to torture that will do even more damage to this country’s moral leadership.

    • The ‘Espionage Den’: American ghosts in Tehran

      After the hostage crisis, the Revolutionary Guard used it as a training centre, eventually opening a museum, variously called the Espionage Den or Den of Spies. Provocative murals and posters on peeling walls are updated regularly to reflect US invasions since then (Afghanistan and Iraq). One startling frieze is a parody of Michelangelo’s “Creation of Adam” showing Uncle Sam handing dollars to a greedy banker. The perimeter walls feature a number of anti-American murals commissioned by the government of Iran, notably a Statue of Liberty with the slogan “Death to America!”

    • The UN Anti-Nazi Resolution, the Prague Declaration and the History of “US Accommodation with Nazism”

      On October 27, 2014, the front page of The New York Times reported: “In Cold War, U.S. spy Agencies used 1,000 nazis.” What the headline fails to say is that the U.S. employed and protected men whom they knew were among the most barbaric nazi war criminals. “When the Justice Department was preparing in 1994 to prosecute a senior Nazi collaborator in Boston, named Aleksandre Lileikis, the CIA tried to intervene. The agency’s own files linked Mr. Lileikis to the machine-gun massacres of 60,000 Jews in Lithuania.

    • LETTER: Pro-torture column really way off base

      Mr. Justin Smith’s over-long pro-torture piece in Sunday’s Daily News Journal (Dec. 21) was way off base.

      Characterizing water-boarding as “minor dunkings” is an error of the first order. CIA water-boarding is way worse than anything done in training for U.S. service personnel in Survival, Evasion, Resistance, and Escape classes, where the exercise is carefully regulated and controlled.

      CIA water-boarding has no such controls, is real and not practice, and in its excesses approaches and crosses over into the water torture for which we condemned war criminals after World War II.

    • Over 100 deaths by abuse in Egyptian prisons in 2014: Report

      An end of year report by the El Nadeem Center for Rehabilitation of Victims of Violence has documented an apparent spike in torture and abuse across Egyptian prisons in 2014, recording at least 100 deaths in custody.

    • All those who OK’d torture should be held accountable

      As chief of the CIA’s Directorate of Operations, Rodriguez ordered the destruction of 90 videotapes showing interrogations of Abu Zubaydah. Those tapes might have settled two questions: Were prisoners “tortured” and did “enhanced” interrogation techniques really provide “actionable” intelligence”? Why were the tapes destroyed, if the CIA is telling the truth?

      More disturbing is Joseph Reisert’s column (“Blatantly partisan tenor ensures CIA report serves no good purpose,” Dec. 12). You might expect a “professor of American constitutional law” to focus on the legal issues raised by the CIA report. Surely Reisert knows that torture is illegal under both American and international law.

      Japanese soldiers were charged with war crimes for waterboarding American POWs during World War II. “Just following orders” was not a defense.

    • Turned Backs, The Mayor and the Police

      The funeral of Officer Ramos on Saturday, Dec. 27, turned into a Fascist spectacle as many in the ranks of the police turned their backs on NYC Mayor de Blasio—a Fascist spectacle because, already heavily militarized, already implicated in wanton killings of blacks nationwide, the police, many coming from far and wide, used the funeral to demonstrate their demand for acting with impunity and their contempt for authority to reign them in. The funeral symbolized the police as enemies of the rule of law, unable and unwilling to bear scrutiny for lawless acts of an ongoing nature but brought to national attention through a sudden condensation of events over the last several weeks. We stand in fear of our own public servants, just as we do toward the CIA on the international plane, a militarization of American life which internalizes, collectively, the repression America as a nation presents to and imposes on the world and internally demands of itself lest its global/domestic Power be questioned.

    • Failures of torture well documented

      Michael Nutkiewicz’s recent letter to the Journal (Dec. 20) about the futility and danger of torture was spot-on correct. I spent 25 years in the Federal Bureau of Investigation and retired in 2009 as the Special Agent in Charge (SAC) of the FBI for New Mexico. Prior to that I was SAC for the FBI in Alaska for four years. My heart does not ache, and I face no moral dilemma, for those chosen to undergo enhanced interrogation techniques (EIT). My issue with EIT and torture in general is that it just doesn’t work and is, in fact, counterproductive. Mr. Nutkiewicz correctly notes studies have shown valuable intelligence overwhelmingly being collected through simple and direct interrogation techniques.

    • Hector Avalos: A torturing faith?

      According to Hayden, the CIA’s program is “built on the particular psychological profile of the people we have and expect to get — al-Qaeda operatives. Perceiving themselves true believers in a religious war, detainees believe they are morally bound to resist until Allah has sent them a burden too great for them to withstand. At that point — and that point varies by detainee — their cooperation in their own heart and soul becomes blameless and they enter into this cooperative relationship with our debriefers.”

      So what sorts of sufferings might you inflict on these Muslim detainees to persuade them to cooperate, and yet remain sinless in their religion?

      Aside from waterboarding, which brings victims to near drowning, “interrogators used ‘rough takedowns,’ described as taking a naked detainee outside of his cell, placing a hood over his head, and dragging him up and down a long corridor while slapping and punching him.”

      Another was “the technique known as ‘hanging,’ involving handcuffing one or both wrists to an overhead horizontal bar… one detainee was apparently left hanging for 22 hours each day for two consecutive days to ‘break’ his resistance.”

      Then there was “forced rectal feeding,” which the CIA said was “medically necessary” for those refusing to eat. For example, a detainee named Majid Khan, was “subjected to involuntary rectal feeding and rectal hydration, which included two bottles of Ensure. Later that same day, Majid Khan’s ‘lunch tray,’ consisting of hummus, pasta with sauce, nuts, and raisins, was ‘pureed’ and rectally infused.”

    • Commentary: A long overdue nod to Latin self-determination

      Fidel Castro would survive 11 U.S. presidents, at least eight CIA plots to assassinate him and a few premature obituaries, and live to see world’s most powerful country finally give in and recognize—in principle at least—Cuba’s right to national self-determination.

    • Can The Cuban Revolution Withstand The Normalization Of Relations With US?

      On Dec. 17, the United States and Cuba carried out an unprecedented — but not unforeseen — prisoner swap: USAID subcontractor Alan Gross and an unidentified U.S. intelligence asset were released by Cuban authorities in exchange for the three remaining members of the “Cuban 5” being held in the U.S.

      [...]

      The Cuban 5, on the other hand, were imprisoned for attempting to safeguard the small island nation from terrorist activities that intensified following the 1976 bombing of a Cuban passenger plane by former CIA agents Luis Posada Carriles and Orlando Bosch. In 1998, they were charged with a number of crimes in the U.S., including conspiracy to commit espionage, conspiracy to commit murder, and acting as agents of a foreign government.

    • Torture Reports: Brazil and the United States Release Reports Documenting Systematic Human Rights Abuses

      One day after the U.S. Senate Select Committee on Intelligence released its Executive Summary of the CIA’s detention and interrogation program exposing a policy of torture applied in the War on Terror, Brazilian President Dilma Rousseff unveiled her country’s investigatory National Truth Commission Report, identifying human rights atrocities committed in Brazil between 1946 and 1988.

    • Al-Qaeda terrorist suspect dies days before his trial in New York

      Nazih Abdul-Hamed al-Ruqai was diagnosed with advanced liver cancer after U.S. commandos and FBI agents captured him in 2013, outside of his home in a suburb of Tripoli, Libya.

    • Perspectives: Torture, stop defending the indefensible

      For instance, of the 119 detainees tortured by CIA agents and contractors, 26 individuals were mistakenly held. This means that completely innocent people were detained and tortured for months. Not all of them survived their captivity.

    • Torture Doesn’t Save Lives, It Costs Them

      In 1995, I swore an oath to support and defend our Constitution — a document proclaiming basic human rights and prohibiting the U.S. government from inflicting “cruel and unusual punishment.” After taking this oath, I became a military intelligence officer and, four years after that, a counterintelligence officer with interrogation training.

    • Was revenge the hidden rationale for torture?

      The widespread rhetoric of evil and fear surrounding terrorism suspects has created a large risk that individuals who are detained for interrogation will automatically be seen as inherently bad. For example, in a “Meet the Press” interview the Sunday after the torture report was made public, former Vice President Dick Cheney described the CIA’s targets as way: Unlawful combatants who committed unlawful acts of war against Americans.

      My research has serious implications: Public support for the use of severe interrogation may well have less to do with a quest for information than with a subconscious human instinct for vengeance, even though that is not the expressed purpose of interrogation.

    • Brain-Washing the American Way

      2013’s “Zero Dark Thirty,” about the capture and murder of Osama bin Laden, made the false point that torture works.

      Both Sony films depict and promote State Department and C.I.A. narratives, and were vetted and approved by those government agencies—yet, the truth of each narrative is questionable, at best, and their effect on audience understanding of history is frightening.

    • Police increasingly use
      torture, says Kontras

      Based on the CIA torture report recently disclosed, the bombshell report revealed that the American government had approved the torture of prisoners, some of whom were wrongfully imprisoned and held without due process or even public acknowledgment. An earlier report found that some detainees were held indefinitely at least in part because the CIA about the circumstances of their detention.

      When we allow fear and uncertainty to drive our policy, the consequences can haunt us forever. In the saddest news of all, of the world’s nations helped run the program.

      The Senate report makes it clear that “enhanced interrogation techniques” is simply a euphemism.

      Interrogators also staged executions and made threats to hurt detainee’s children or rape and murder their mothers, a common form of psychological torture that has been a mainstay of totalitarian regimes for centuries.

  • Internet/Net Neutrality

    • Who’s the true enemy of internet freedom – China, Russia, or the US?

      Recent reports that China has imposed further restrictions on Gmail, Google’s flagship email service, should not really come as much of a surprise. While Chinese users have been unable to access Gmail’s site for several years now, they were still able to use much of its functionality, thanks to third-party services such as Outlook or Apple Mail.

      This loophole has now been closed (albeit temporarily – some of the new restrictions seem to have been mysteriously lifted already), which means determined Chinese users have had to turn to more advanced circumvention tools. Those unable or unwilling to perform any such acrobatics can simply switch to a service run by a domestic Chinese company – which is precisely what the Chinese government wants them to do.

01.03.15

Links 3/1/2015: Korora 21 (Darla) Beta

Posted in News Roundup at 8:01 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • North Korea Linux 3.0 (Red Star OS) screenshot tour

    The desktop version North Korea Linux 3.0 is finally available for download and install, thanks to the same guy who initially brought us the server version of North Korea Linux. The ISO download has been popping up all over the place on torrent sites, and I’ve got a full screenshot tour of this odd but interesting Linux distribution. I suggest downloading it via Kick Ass Torrents.

  • Download the desktop version of North Korea Linux 3.0

    Martyn Williams at North Korea Tech reports on the public release of Red Star 3.0:

    The latest version of North Korea’s home-grown desktop operating system, Red Star Linux 3.0, was uploaded to BitTorrent on Monday. We first got a look at the operating system almost a year ago when screenshots were posted online.

  • Kernel Space

    • Graphics Stack

      • X.Org Server Saw More Code In 2014 Than 2013, But Its Heydays Are Over

        The X.Org Server had more code churn in 2014 than it did in 2013, but its pace has certainly slowed down compared to years prior. But at the same time for those thinking X.Org Server development is going the way of the dinosaur due to Mir and Wayland, you’re sadly mistaken too.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • SoK comes to an end

        The KHangMan was initially a KXmlGuiWindow, but the new UI did not need a few things like the menubars and such, for which it was changed to a QMainWindow.The Messages.sh script was initially placed in src/desktop/ , but since those 3 folders (desktop, harmattan, plasma-active) were about to go, it was moved from there to simply src/ , and it was modified to translate the qml files also. After all these changes the code needed some heavy cleanup, because a lot of functionalities already implemented in the QML code were also defined in the cpp code. Some of the other cleanup tasks were removing commented out statements, removing unnecessary variables, optimizing the code by removing some unncecessary statements, and so on.

    • GNOME Desktop/GTK

      • OpenPGP Smartcards and GNOME

        The combination of GnuPG and a OpenPGP smartcard (such as the YubiKey NEO) has been implemented and working well for around a decade. I recall starting to use it when I received a FSFE Fellowship card long time ago. Sadly there has been some regressions when using them under GNOME recently. I reinstalled my laptop with Debian Jessie (beta2) recently, and now took the time to work through the issue and write down a workaround.

  • Distributions

    • Arch Family

      • ArchBang New Release 2015

        Updated packages, Network Manager (nm-applet) for network connections, Firefox web browser and of course Gparted for all you power users

    • Red Hat Family

      • Red Hat Now Covered by Analysts at Cantor Fitzgerald (NYSE:RHT)

        Several other analysts have also recently commented on the stock. Analysts at BMO Capital Markets raised their price target on shares of Red Hat to $77.00 in a research note on Tuesday. Separately, analysts at Piper Jaffray initiated coverage on shares of Red Hat in a research note on Tuesday. They set an overweight rating on the stock. Finally, analysts at William Blair reiterated an outperform rating on shares of Red Hat in a research note on Monday, December 22nd. Five research analysts have rated the stock with a hold rating and nineteen have issued a buy rating to the stock. Red Hat presently has a consensus rating of Buy and a consensus target price of $72.78.

      • Fedora

        • F21 Release Party in Brno

          I finally found time to write a blogpost about our F21 release party in Brno office of Red Hat. It took place on the release date – December 9th. It was, as always, well attended. It’s hard to estimate the total number of attendees, but it was definitely over 100. Unfortunately, F21 DVDs had not arrived yet, but we still had other swag for people to take: Fedora product stickers, Fedora logo stickers, case badges, badges, pins, flyers,…

        • Installing The AMD Catalyst Driver On Fedora 21

          Installing the AMD Catalyst (fglrx) driver on the latest Fedora release can sometimes be a challenge due to Fedora catering towards the open-source graphics drivers.

          With Fedora being on the bleeding-edge and not caring much about proprietary software support while the open-source graphics drivers continue to evolve, sometimes it can be a bit of a headache installing the AMD Catalyst/fglrx driver on the newest Fedora release, but generally it’s possible.

        • Korora 21 (Darla) Beta – Now Available

          The Korora Project is very pleased to announce that the first beta release of version 21 (codename “Darla”) is now available for download.

          Although this is a beta release of Korora, it is derived from Fedora 211 stable and should be ready for every day use. We are keen however, to hear any issues people encounter so that we can improve it for the final release. Feel free to bombard us on social media or log a report in our support system, Engage.

        • Korora 21 Now In Beta With Cinnamon 2.4 & More

          The first beta release of the Fedora-based Korora Linux distribution is now available that’s powered by last month’s Fedora 21.

    • Debian Family

      • Release Critical Bug report for Week 01
      • Weirdness with hplip package in Debian wheezy
      • Derivatives

        • Canonical/Ubuntu

          • Nokia Lumia 1020 Ubuntu OS Features Leaked

            There is a fresh leak being spread throughout the mobile device world from Team Ubuntu (via GizmoChina) that appears to reveal the Nokia Lumia 1020 smartphone running a full version of Ubuntu OS Linux. This type of leak is hard to confirm one-hundred percent, but a series of images within the source website show the mobile device running the operating system effectively. The images appear to reveal the smartphone running the full version of the Ubuntu OS desktop operating system. Anyone who has used the Ubuntu Linux operating system previously should recognize the setup on the phone, as it featured a basic wallpaper with tiles commonly used for features and shortcuts set to the left hand side.

          • Meizu M1 Note to go open-source in 2015: Smartphone expected to feature Ubuntu Touch, to be launched at CES 2015

            Chinese smartphone brand Meizu, which not too long ago grabbed eyeballs of technology enthusiasts across the world by announcing its decision to convert its high-end smartphone, the MX4 to open-source, is now in the news again.

            This time it is because the China-based company’s first Canonical Ubuntu-powered smartphone, the M1 Note running the Ubuntu Flyme operating platform is pegged for official launch during the upcoming Consumer Electronics Show (CES 2015) in Las Vegas.

  • Devices/Embedded

    • LG tips new 4K TVs running WebOS 2.0

      Following up on its well-received first batch of WebOS based smart TVs, LG has announced a new line of 4K ULTRA HD TVs that run an updated 2.0 version of the Linux-based OS.

      Following up on its well-received first batch of WebOS based smart TVs, LG just announced a new line of 4K ULTRA HD TVs that run an updated 2.0 version of the Linux-based OS. WebOS 2.0 offers up to 60 percent faster boot time, as well as an easier interface and easier connectivity to external devices. In addition, users can now customize their menus on the Launcher Bar.

    • Phones

      • So the Smartphone ‘Bloodbath’ Annual Preview for Year 2015 – This is so boring

        So yes, readers, it was an exhilirating ride. But it is now over. The bloodbath is gone. Samsung won the hardware war clearly. Android won the OS war, decisively. There are no dark horses left. We just learned a week ago that even the so-called ‘third ecosystem’ haha, Windows Phone, has actually failed to activate one third of all the Lumia Nokia smartphones shipped using that OS. So Windows is in reality a far worse disaster than has even been reported, and the Nokia collapse was the worst corporate management catastrophy ever witnessed. Well, we know all that, Elop the worst CEO of all time and all that. what we now will see in the coming years is more price wars that will cause unforseen profit warnings, more mergers and acquisitions like Microsoft buying Nokia’s handset business and Lenovo buying the Motorola business from Google. We may well see former greats like HTC and Blackberry being sold and buyers from Asia most likely China but could be India or elsewhere in Asia. Japan’s seven handset makers have gone through their own consolidation through mergers and acquisitions already shrinking from 7 manufacturers to 4. The South Korean market is in similar state now with Pantech being on the block.

      • Tizen

      • Android

Free Software/Open Source

  • Open source carries software-defined storage forward

    In my small home-office, I have hard drives, flash drives, and solid-state drives, which use FAT32, NTFS, exFAT, Btrfs, Ext3, and Ext4 file systems, and are connected to the computers with CIFS, NFS, HTTPS, ssh, and ftp over the Internet and Gigabit Ethernet with a variety of authentication systems based on Lightweight Directory Access Protocol (LDAP) and Active Directory (AD). And, this, mind you, is a simple, small-business network.

    Is it any wonder then that companies, far, far larger then my little operation, want to abstract their storage concerns away with software-defined storage (SDS)? I think not!

  • Coreboot Ported To Another Lenovo ThinkPad

    While Coreboot is most commonly used by Google Chromebooks, an increasing number of Lenovo ThinkPad laptops are becoming compatible with Coreboot for initializing and booting the system with open-source software.

  • Open Source App Allows Easier Image Sharing in Google Hangouts
  • Web Browsers

    • Chrome

      • Google’s Chromebooks can now run Linux using a Chrome extension

        Google’s Chromebooks can now run Linux, François Beaufort, former frequent Chrome hacker who was hired by Google in 2013, revealed on a Google+ post. To run Linux, users will essentially have to enable developer mode, and use a Chrome extension named Crouton Chrome.

        Chromebook computers run on Google’s ChromeOS, which isn’t as full-fledged as Windows, OS X, or most Linux distributions for that matter. Google, however, has added several handy features to the operating system in the last couple of months. Chromebooks now support offline video playback and also lets users run a handful of Android applications.

    • Mozilla

      • Hats Off to Mozilla

        Firefox turned ten years old last November and celebrated the occasion with a new version (33.1) that featured a much-welcomed developer edition. It also featured a “forget” button that lets you backspace through time, blowing away history, cookies and open tabs: one more privacy tool for the shed.

        Those were two among many new moves by Mozilla, Firefox’s parent, all siding with individuals leaning against two prevailing winds that have blown across the on-line world for at least a decade.

  • BSD

    • BSD Community is Too Insular

      First of all let me say I really like BSD. I enjoy studying it’s history which extends back to 1978 when it was a mere add-on to Bell Labs Unix version 6. The longest uptime I’ve ever had on a computer was with OpenBSD. It’s a fine piece of work.

      On the other hand when I look at the BSD community I see a less than friendly environment. It is rather like a gated community where you need to be invited in. Often when one goes to BSD forums one gets some mysterious error message and no access. IRC channels related to BSD are also invite only.

    • The Good & Bad Of ZFS + HAMMER File-Systems On BSD

      Among the pros of ZFS are it’s self-healing, writable clones, fully journaling system using ZFS snapshots, compression, and portable storage. Among the viewed HAMMER positives are the focus on data integrity, great SQL database performance, lower RAM requirements, supports pseudo file-systems, fully open-source with a BSD license, etc. Of course, with each also comes various cons.

  • FSF/FSFE/GNU/SFLC

    • A small update to our “User Liberation” video

      So we’ve now chucked this particular easter egg, and written this post to document the decision. Doing this reminded me of the relative impermanence of all digital media. DRM-pushing companies like Amazon and Apple who distribute videos and ebooks have the same capability, to go back and edit works after they are published. In many cases, they can even do it remotely, replacing works that you think of as living on a device in your home. Will they tell you about it when they do?

      Thank you to Urchin Studios for making the edits and for their amazing work on the project! It really demonstrates the power of free software and free formats, and debunks the myth that professional designers and animators must use proprietary software to be top notch.

    • Happy GNU year 2015!
  • Project Releases

    • Release 0.11 of ctioga2

      The possibilities of the new styling system are particularly interesting, and I’m working on ways to make it more powerful, and providing series of default style files that anyone could use as they want. Among other future changes, I want to improve the position of ticks, especially when using non-linear axes, and add functions to draw vector fields (though this still needs some thinking). Enjoy, and a happy new year to everyone !

  • Openness/Sharing

  • Programming

    • Pulp in the New Year

      Pulp has used web.py as its web framework for a long time, but unfortunately that project has gone dormant. Since Pulp only uses a small set of web.py’s features (essentially using it as a thin WSGI adapter), replacing it is a reasonably straight-forward task. This gave us an opportunity to re-evaluate what we want out of a web framework and consider several compelling options.

    • My $2375 Amazon EC2 Mistake

      When I woke up the next morning, I had four emails from Amazon AWS and a missed phone call from Amazon AWS. Something about 140 servers running on my AWS account. What? How? I only had S3 keys on my GitHub and they where gone within 5 minutes!

      Turns out through the S3 API you can actually spin up EC2 instances, and my key had been spotted by a bot that continually searches GitHub for API keys. Amazon AWS customer support informed me this happens a lot recently, hackers have created an algorithm that searches GitHub 24 hours per day for API keys. Once it finds one it spins up max instances of EC2 servers to farm itself bitcoins.

      Boom! A $2375 bill in the morning. Just for trying to learn rails.

      Lucky for me, I explained my situation to Amazon customer support – and they knew I wasn’t bitcoin mining all night. Amazon was kind enough to drop the charges this time!

    • New tool to track use of open source Web code

      Prior to Libscore, developers contributed to front-end open source projects, hoping their work would be used at-large, but without having any concrete visibility.

Leftovers

  • Prince Andrew and ‘naked pool parties’ at his paedophile friend’s house

    Juan Alessi, who spent 11 years working for Epstein, also told the Daily Mail how the Prince enjoyed daily massages by young women during his visits.

    He said Andrew emerged ‘smiling’ after the rub-downs which, he believes, were paid for by Epstein.

  • Science

    • Are two thirds of cancers really due to bad luck?

      A paper published in Science has been widely reported in the media today. According to media reports, such as this one, the paper showed that two thirds of cancers are simply due to bad luck, and only one third are due to environmental, lifestyle, or genetic risk factors.

      The paper shows no such thing, of course.

      It’s actually quite an interesting paper, and I’d encourage you to read it in full (though sadly it’s paywalled, so you may or may not be able to). But it did not show that two thirds of cancers are due to bad luck.

  • Health/Nutrition

    • Drug firms sway vets on antibiotics in food animals

      In 2016, a new U.S. Food and Drug Administration policy will give veterinarians a key role in combating a surge in antibiotic-resistant “superbugs” that infect humans. For the first time, the agency will require veterinarians, not farmers, to decide whenever antibiotics used by people are given to animals.

  • Security

    • DNSSEC

      Many registrars don’t support DNSSEC, if you use such a registrar (as I do) then you need to transfer your zone before you can productively use DNSSEC. Without the DS entries being signed by a registrar and included in the TLD no-one will recognise your signatures on zone data.

    • Friday’s security updates
    • OpenBSD Moves to 5.7-beta

      As always, your testing is needed to ensure that any bugs are found and squashed early!

  • Transparency Reporting

  • Environment/Energy/Wildlife

    • How Fox News Covered Pope Francis’ Action On Climate Change

      Fox News reported on Pope Francis’ upcoming action on climate change by promoting climate change denial and suggesting that the pope is aligning with “extremists who favor widespread population control and wealth redistribution.”

    • UK’s leading fund manager picks his stocks for 2015

      Britain’s leading fund manager, Neil Woodford, has warned that falling oil prices could prompt a rout in the global bond market as shale companies default on vast debts built up during the US fracking boom.

    • Every Time You Fly, You Trash The Planet — And There’s No Easy Fix

      When the latest international Climate Conference wrapped up in Lima, Peru, last month, delegates boarded their flights home without much official discussion of how the planes that shuttled them to the meeting had altered the climate.

      Aircraft currently contribute about 2.5 percent of global carbon dioxide emissions. That might not seem like much, but if the aviation industry were a country, it would be one of the world’s top 10 emitters of CO2. And its emissions are projected to grow between two and four times by 2050 without policy interventions.

  • Finance

    • TTIP Update XLVI

      There are *already* more than €30 billion worth of ISDS claims against EU nations

      [...]

      This is the key problem with ISDS: it places the rights of corporations above the rights of nations – indeed, in this case, above the rights of the EU to determine laws within its borders. ISDS cannot be “fixed”, as the European Commission would have us believe, because it was designed with exactly this purpose in mind: it was introduced as a way of protecting investments in countries where the local rule of law could not be depended upon. Since that is manifestly not the case in the EU or US, it serves no purpose other than to undermine the strong legal systems there. The only solution is therefore to drop ISDS from TTIP, CETA and all future agreements.

  • PR/AstroTurf/Lobbying

    • Koch-Funded News Outlet Defends Dark-Money Organizations

      Conservative news outlet Watchdog.org released a six-part series defending dark-money organizations — politically focused groups that conceal the identities of their donors — but failed to disclose its own funding from the Koch brothers and other conservative dark-money players.

  • Privacy

  • Civil Rights

    • Fox News’ Attack On Driver’s Licenses For Undocumented Californians Is Full Of Falsehoods

      Fox News falsely claimed that California’s new program to issue driver’s licenses to undocumented immigrants amounted to “back door to citizenship” that would increase identity theft. But the program requires a stringent background check and shares the support of law enforcement and public officials who point to studies that show the program will lead to increased safety and transparency for citizens.

    • Who Goes to Jail? Matt Taibbi on “The Divide: American Injustice in the Age of the Wealth Gap”

      In part two of our holiday special, we feature our April 2014 interview with Matt Taibbi about his book, “The Divide: American Injustice in the Age of the Wealth Gap.” The book asks why the vast majority of white-collar criminals have avoided prison since the financial crisis began, while an unequal justice system imprisons the poor and people of color on a mass scale. “It is much more grotesque to consider the non-enforcement of white-collar criminals when you do consider how incredibly aggressive law enforcement is with regard to everybody else,” Taibbi says.

    • The lost detainees and the CIA’s dungeons

      The executive summary of the Senate Select Committee on Intelligence (SSCI) report on CIA torture was finally published on 9 December 2014, and it proved shocking, despite being highly-redacted and missing 9,400 documents “withheld by the White House”.

  • Internet/Net Neutrality

  • DRM

    • Netflix Cracks Down on VPN and Proxy “Pirates”

      Netflix is starting to block subscribers who access its service using VPN services and other tools that bypass geolocation restrictions. The changes, which may also affect legitimate users, have been requested by the movie studios who want full control over what people can see in their respective countries.

  • Intellectual Monopolies

    • Copyrights

      • Canadian ISPs and VPNs Now Have to Alert Pirating Customers

        Starting today Canadian Internet providers are required to forward copyright infringement notices to their subscribers. This notification scheme provides a safe harbor for ISPs but is also expected to result in a surge in piracy settlement schemes. The new law further causes trouble for VPN providers, who are now required to log customers for at least six months.

01.02.15

Links 2/1/2015: AMD Catalyst Benchmarks, Krita Receives Artist Choice Award

Posted in News Roundup at 4:51 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • January 2015 Issue of Linux Journal: Security

    The Security issue of Linux Journal always makes me feel a little guilty. It turns out that although I have a fairly wide set of technology skills, I’m not the person you want in charge of securing your network or your systems. By default, Linux is designed with a moderate amount of security in mind. For that, I am incredibly grateful. If you struggle with maintaining security in your environment, this issue hopefully will encourage and educate as opposed to making you feel guilty. My goal this year is to learn and be encouraged by the Security issue, not just feel bad.

  • January 2015 Video Preview
  • Guilt by association: Linux Australia members slam others over Williams’ nomination

    At least two members of Linux Australia have criticised the attitude of members who have raised questions about an iTWire staff member who attempted to contest the organisation’s elections.

    Both Noel Butler and Russell Coker took a diametrically opposite position to that of others following the nomination for treasurer by David M. Williams, a columnist for iTWire in the past and an infrequent contributor for the last two or three years.

  • A FOSS Wish List for 2015
  • FOSS’ Shining Moments of 2014

    Well we’re into the last few days of 2014 here in the Linux blogosphere, and fortunately the tequila supplies down at the Broken Windows Lounge continue to hold strong.

    The weather outside may be frightful, but the refreshments — like the software — remain nothing short of delightful.

    It didn’t take long for bloggers to slip into a sentimental mood as they reminisced about the waning year, and a heartening post from Jim Zemlin over at Linux.com only helped things along.

    “2014 was a tipping point where companies decided there was too much software to write for any one company to do it by themselves,” Zemlin wrote. “They are shedding commodity software R&D by investing in ‘external R&D’ with open source.

  • “Average” Users

    Users of GNU/Linux don’t even need to read the GPL to be legal and can probably forget about malware and possibly even firewalls in their homes. They can leave that to the router if at all. The average user doesn’t have to install much software at all as most desktop distros include a web browser that people want to use, multimedia software and an office productivity suite like LibreOffice.

  • Kernel Space

    • Graphics Stack

      • Significant Performance Improvements For RadeonSI LLVM With New Patches

        Tom has landed some measurable RadeonSI LLVM performance improvements to his LLVM branch that provided important code generation features for Southern Islands GPUs and newer (Radeon HD 7000 series and newer). The important code generation features now implemented in his branched AMDGPU LLVM back-end are machine scheduling and sub-reg liveness support. With the current machine scheduler, the schedule model is not yet completed and could be improved further, according to Tom, but the results are already positive.

      • AMD Catalyst Linux OpenGL Driver Now Faster Than Catalyst Windows Driver In Some Tests

        Earlier this week I showed benchmarks of AMD’s incredible year for their open-source Linux driver and how the open-source Radeon Gallium3D driver moved closer to performance parity with Catalyst. One of the lingering questions though is how does the Catalyst 14.12 Omega Linux driver from December compare to the latest Catalyst Windows driver? Here’s some benchmarks looking at the latest open and closed-source drivers on Linux compared to the latest Catalyst Windows release.

        It’s been a while since last delivering a Windows vs. Linux Catalyst comparison at Phoronix, but found the time to be right for going along with our year-end recaps and performance reviews. Earlier this week I also posted the Intel Windows vs. Linux OpenGL performance comparison. The same Core i7 4790K Haswell system was used with this AMD Linux vs. Windows benchmarking. As shared in that Intel article, Windows 8 was being very unstable on this particular system so for all of the testing I had to revert to running Windows 7 rather than Windows 8.1.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • digiKam Recipes 4.3.1 Released

        I ring in the new year with a digiKam Recipes update. This version features two new recipes: Remove Keywords from Photos and Add Web Interface to digiKam with digiKamWebUi. In addition to that, the updated and expanded Deal with Bugs in digiKam recipe now explains how to generate backtraces.

      • Retiring Plasma NN 0.9.0.x
      • Krita Receives Artist Choice Award from ImagineFX

        Make sure to check out the January 2015 issue of ImagineFX where Krita receives the Artist Choice award! That’s appreciation with a vengeance! ImagineFX is the #1 resource for concept artists and illustrators in the entertainment industry. It is a great resource if you are looking to level up your art skills.

    • GNOME Desktop/GTK

      • GNOME Software, GNOME’s App Store, Is Drawing Some Fresh Criticism

        Shouldn’t the GNOME Software “app store” include non-GUI (CLI) packages? That’s one of the questions being asked yet again by users.

        Starting in December and continuing into January are various Fedora development threads of users questioning various GNOME motives with their GNOME Software program. In particular, right now, the GNOME Software application center doesn’t like CLI-only packages for installation but only those with a GUI. Additionally, GNOME Software is limited in showing packages for non-GNOME desktop environments unless certain parameters are set.

      • Introducing GNOME MultiWriter

        I spent last night writing a GNOME application to duplicate a ton of USB devices. I looked at mdcp, Clonezilla and also just writing something loopy in bash, but I need something simple my dad could use for a couple of hours a week without help.

      • GNOME MultiWriter: Easy Duplication Of Many USB Devices

        Richard Hughes’ latest announcement isn’t of another open-source hardware project but rather a new GNOME software application.

  • Distributions

    • Happy New Year & Browser and OS stats for 2014

      LQ ISO recently surpassed 55,000,000 Linux downloads

    • New Releases

      • 4MRescueKit

        4MRescueKit provides its users with software for antivirus protection, data backup, disk partitioning, and data recovery. It is distributed in the form of a multiboot CD, which includes four (extremely small) operating systems. Each of the systems tries to follow the UNIX philosophy (Small is beautiful. Make each program do one thing well).

    • Ballnux/SUSE

    • Red Hat Family

      • Red Hat Work On Improving Glibc Math Performance

        Siddhesh pushed into glibc-2.18 upstream performance improvements of about eight times for the slowest path of the pow function inside glibc. Other functions received significant performance improvements too thanks to improving the multi-precision code-path.

      • Improving math performance in glibc

        Mathematical function implementations usually have to trade off between speed of computation and the accuracy of the result. This is especially true for transcendentals (i.e. the exponential and trigonometric functions), where results often have to be computed to a fairly large precision to get last bit accuracy in a result that is to be stored in an IEEE-754 double variable.

      • Fedora

        • Resolving my slow booting in Fedora 21
        • Let’s Plan Events in EMEA!

          At EMEA FAD in Leverkusen, we started planning events and activities in EMEA for the fiscal year 2016 (starts on March 1, 2015). Right after that, I asked others, who couldn’t attend the FAD, to provide their input. Today, I put it all together on a new wiki page that should help us organize events where we want to promote Fedora in the next year.

    • Debian Family

      • My Debian Activities in December 2014
      • UEFI Debian installer work for Jessie, part 3

        If you have appropriate (U)EFI hardware, please try this image and let me know how you get on, via the debian-cd and debian-boot mailing lists.

      • Derivatives

        • Canonical/Ubuntu

          • Ubuntu-Powered Meizu Smartphone Might Launch This Month

            Much like Xiaomi, Meizu has had a great 2014. The company has launched several great devices which are very affordable at the same time, which let this China-based smartphone manufacturer to sell tons of units. The company has launched not one, but two flagship handsets this year, the Meizu MX4 (September) and MX4 Pro (November). The latest handset this company has launched is the M1 Note handset, or the Blue Note, as it’s called in China. This device was launched quite recently actually and surprised many people by what it has to offer. This is a rather powerful mid-high end handset which costs only 1,999 Yuan (16GB version) in China, which is about $322.

  • Devices/Embedded

    • Phones

      • Tizen

      • Android

        • Amazon now has 33 paid Android apps available for free

          If the 40 free applications that Amazon gave away last week wasn’t enough to satiate your hunger for new apps, the company is back today with even more goodies for your Android device.

          Amazon is now offering 33 paid Android apps for free as part of its latest Free App of the Day Bundle. There are games and utilities packed inside of the bundle, including big names like Monopoly, République, Thomas Was Alone, Lyne, and Angry Birds Star Wars.

        • OnePlus One gets official Android 5.0 Lollipop alpha ROM

          OnePlus has been quietly developing its own Android 5.0 Lollipop based ROM for the OnePlus One. Following the controversy with Cyanogen licensing in India, the company had announced that it will be providing an early build to customers, which will replace the Cyanogen OS on their devices.

        • 16 Essential Apps For Your New Android And iPhone 6

          So you’ve unwrapped, unboxed and cuddled your new smartphone to death. Candy Crush? Check. Instagram? Check. Staring at the screen wide-eyed and full of excitement but have no idea what to do next? Check.

        • How To Migrate From iPhone iOS to Android Without Losing Your Files
        • Verizon Announces Android 4.4.4 KitKat Update is Now Available for Samsung Galaxy Tab 4 10.1

          Android 4.4.4 KitKat update is now available for Verizon’s Samsung Galaxy Tab 4.10.1.

          Samsung Galaxy Tab 4 10.1 owners can now enjoy the perks that comes with the new update. Verizon shared the improvements that come along with the firmware.

          The tablet has now a self activation support and ICC ID information added to Settings. The bugs such as VPN and Chrome cast connectivity issues are fixed. There are also pre loaded applications and services such as Find My Mobile, Kids Mode Widget, Email Widget and My Verizon (10.0.710).

        • One important area where top Android phones crush the iPhone 6

          The iPhone 6 is a spectacular smartphone. I reviewed the iPhone 6 earlier this year and while there are a few things that could certainly be improved, I said that the phone was clearly one of the best smartphones in the world. And it still is. From handset design and build quality to performance and the supporting third-party app ecosystem, the iPhone 6 is a class leader in almost every key area.

Free Software/Open Source

  • Broadwell Support Marching Along For Coreboot

    For months now there’s been Coreboot developers working on Intel Broadwell support (primarily from Google and focused on future Chromebook support). With the start of the new year and hopefully seeing more Broadwell hardware on the market soon, that support is coming along in Coreboot.

  • Events

    • Typoday 2014 At Pune

      This blog was pending on me from long time. I got a chance to attend typoday.in 2014 conference At Symbiosis International University, Viman Nagar, Pune in February. This was the my second conference specifically on typography domain after National workshop on calligraphy and typography in 2007.

  • SaaS/Big Data

    • A year in the life of OpenStack

      What a year for OpenStack! With two shiny new releases, two excellent summits on opposite sides of the Atlantic, countless new features, and an ever-growing community of users and developers, it truly has been a year of progress for OpenStack.

    • Big Data Becomes a Market Force, Ushering in Change

      As reported here earlier, a new KPGM study on cloud computing trends at enterprises shows that executives are very focused on extracting business metrics from their cloud computing and data analytics platforms. That suggests that we’re going to continue to see the cloud and the Big Data trend evolve together this year.

    • How Open Source Can Fix 2015′s Data Entropy

      This will not be a good year for those that believe in human progress. At least, not if enterprise software is any indication.

  • Databases

    • MemSQL adds open-source connector to external data sources

      MemSQL Inc. has returned to the limelight four months after its landmark funding round with the release of an open-source connector for its namesake database that simplifies the process of importing data from external sources. The launch is the latest milestone in the startup’s efforts to remove the barriers that keep information siloed in the enterprise.

      The ability to act on real-time events without any logistical delays is useful in applications ranging from ad optimization to signal intelligence processing. The real-time analytics capability is one of the reasons MemSQL received a capital infusion from the Central Intelligence Agency’s investment arm as part of its September round.

    • MongoDB Set to Gain Additional Momentum in 2015

      With more than 10,000 downloads of MongoDB now occurring daily, many organizations are using MongoDB to consolidate a raft of proprietary document repositories using an inexpensive open source platform that scales significantly higher than its counterparts.

  • BSD

    • FreeBSD Ports 2015Q1 To Bring Many Changes

      The Ports package management system in FreeBSD has seen 6024 commits from 160 individuals in the past quarter. Among the updates for users to find with the FreeBSD Ports 2015Q1 state compared to the last quarterly snapshot is pkg 1.4.3, new keywords and USES, a dependency on LLVM Clang 3.4, Firefox 34, Chrome 39, Python 2.7.9, Ruby 2.0.0.598, GCC 4.8.3, GNOME 3.14, Cinnamon 2.4.5, and X.Org 1.14.

    • Deciso Launches OPNsense, a New Open Source Firewall Initiative

      OPNsense combines the best of open source and closed source firewalls. It brings the rich feature set of commercial offerings with the benefits of open and verifiable sources combined with a simple BSD license. This makes OPNsense the platform of choice for users, developers and commercial partners.

      Companies that want to use OPNsense to create a branded version, extend its features, or even create a fork and build upon the same codebase are allowed to do so under the 2-clause BSD license.

  • Project Releases

    • man-pages-3.76 is released

      I’ve released man-pages-3.76. We’ve just passed 12k commits in the project, and this release, my 158th, marks the completion of my tenth year as maintainer of the man-pages project.

  • Openness/Sharing

Leftovers

  • Sarah Palin posted a photo of her son stepping on their dog for New Year’s

    Palin’s son, Trig, was just trying to help wash the dishes. The dog was lying in front of the sink, so he did what a lot of other kids would probably do. Palin saw a sort of “overcoming all obstacles” message in this and decided to share.

  • Tram delays Manchester’s New Year fireworks
  • Tram delays New Year’s Eve fireworks spectacular

    New Year fireworks in Manchester were delayed by an excruciating four minutes after a tram got in the way of the display.

    Videos show an excited crowd counting down to midnight only for the sky above Picadilly to remain dark.

    “Five, four, three, two one: Let’s have the fireworks!” announces the show’s host – but none follow.

  • New Year’s Eve London fireworks: BBC loses 1.4m viewers in 12 months
  • New year fireworks add sparkle to 12 million viewers’ nights

    More than 12 million viewers watched Big Ben ring in the new year amid a spectacular fireworks display on BBC1 – but it failed to hit the highs of last year’s celebrations.

    The 15-minute New Year’s Eve Fireworks programme had an average of 12.3 million viewers (63%) from 11.55pm, down from 13.7 million viewers (67.5%) for the same broadcast in 2013.

  • Science

    • 7 things Back to the Future predicted for 2015

      In the cult film Back to the Future 2, Doc Brown and Marty McFly land in 2015, a futuristic land of flying cars and hovercrafts. As the New Year dawns, which of their predictions were hits – and misses?

  • Security

    • North Korea/Sony Story Shows How Eagerly U.S. Media Still Regurgitate Government Claims

      The identity of the Sony hackers is still unknown. President Obama, in a December 19 press conference, announced: “We can confirm that North Korea engaged in this attack.” He then vowed: “We will respond. . . . We cannot have a society in which some dictator some place can start imposing censorship here in the United States.”

      The U.S. Government’s campaign to blame North Korea actually began two days earlier, when The New York Times – as usual – corruptly granted anonymity to “senior administration officials” to disseminate their inflammatory claims with no accountability. These hidden “American officials” used the Paper of Record to announce that they “have concluded that North Korea was ‘centrally involved’ in the hacking of Sony Pictures computers.” With virtually no skepticism about the official accusation, reporters David Sanger and Nicole Perlroth deemed the incident a “cyberterrorism attack” and devoted the bulk of the article to examining the retaliatory actions the government could take against the North Koreans.

    • Doxing as an Attack

      Doxing is not new; the term dates back to 2001 and the hacker group Anonymous. But it can be incredibly offensive. In 2013, several women were doxed by male gamers trying to intimidate them into keeping silent about sexism in computer games.

      Companies can be doxed, too. In 2011, Anonymous doxed the technology firm HBGary Federal. In the past few weeks we’ve witnessed the ongoing doxing of Sony.

  • Defence/Police/Secrecy/Aggression

    • JFK and the Cuban Embargo

      Already, we’re hearing that President Obama is a traitor, that he is surrendering America to Fidel Castro and the communists, and betraying the Cuban people and the cause of freedom and democracy for wanting to lift the 54-year-old Cold War-era U.S. embargo against Cuba.

      That is precisely the way that the national-security establishment felt about Kennedy and actually much worse.
      Already, we’re hearing that President Obama is a traitor, that he is surrendering America to Fidel Castro and the communists, and betraying the Cuban people and the cause of freedom and democracy for wanting to lift the 54-year-old Cold War-era U.S. embargo against Cuba.

      That is precisely the way that the national-security establishment felt about Kennedy and actually much worse.

      It began with the CIA’s plan to invade Cuba at the Bay of Pigs in 1961, an invasion that would be carried out by Cuban exiles but secretly funded and directed by the CIA in order to provide U.S. officials with “plausible deniability” with respect to their role in the operation.

      What did that mean? It meant that the CIA would lie to the American people and the world about the U.S, government’s role in the operation. And it would also mean that under the CIA’s plan, the newly elected president would immediately become the nation’s liar-in-chief, a secret that the CIA would obviously have over his head for the rest of his time in office.

      Keep in mind that the CIA plan was concocted before Kennedy got into office. Once Kennedy was sworn in, the CIA presented him with the plan. Kennedy was dumb to go along with it, a point that he later acknowledged. But the fact is that he fell hook, line, and sinker for the CIA’s assurances to him that the invasion would be a smashing success, that the Cuban people would rally against Castro, and that no air U.S. support would be needed.
      It began with the CIA’s plan to invade Cuba at the Bay of Pigs in 1961, an invasion that would be carried out by Cuban exiles but secretly funded and directed by the CIA in order to provide U.S. officials with “plausible deniability” with respect to their role in the operation.

      What did that mean? It meant that the CIA would lie to the American people and the world about the U.S, government’s role in the operation. And it would also mean that under the CIA’s plan, the newly elected president would immediately become the nation’s liar-in-chief, a secret that the CIA would obviously have over his head for the rest of his time in office.

      Keep in mind that the CIA plan was concocted before Kennedy got into office. Once Kennedy was sworn in, the CIA presented him with the plan. Kennedy was dumb to go along with it, a point that he later acknowledged. But the fact is that he fell hook, line, and sinker for the CIA’s assurances to him that the invasion would be a smashing success, that the Cuban people would rally against Castro, and that no air U.S. support would be needed.

    • Austrian filmmaker uncovers apparent secret Nazi nuclear complex

      Documentary filmmaker discoveres 1944 CIA report that revealed the existence of underground atomic weapon program in the area of St. Georgen an der Gusen, according to local media.

    • Secret Nazi nuclear bunker discovered in Austria by filmmaker
    • Nazi nuclear bunker discovered in Austria

      A network of underground tunnels and bunkers used by the Nazis to develop an atomic bomb has been discovered in Austria by a filmmaker.

    • Secret Nazi nuclear weapons testing bunker unearthed in Austria

      An underground weapons bunker built by Nazis to test nuclear and chemical weapons has been unearthed in Austria.

    • Nazis’ vast, secret WMD facility uncovered in Austria

      A huge, secret, underground Nazi weapons factory, believed to have been built for the development and planned manufacture of nuclear weapons and other WMDs, has been uncovered in Austria.

    • Vast secret Nazi ‘terror weapons’ site uncovered in Austria

      A SECRET underground complex built by the Nazis towards the end of World War II that may have been used for the development of weapons of mass destruction, including a nuclear bomb, has been uncovered in Austria.

    • Secret WWII WMD factory found — Was Hitler testing nuclear bomb?

      St. Georgen an der Gusen is a small market town in Upper Austria. Quiet and picturesque, it’s hard to imagine that during WWII, it was selected to be the business center for the SS in exploiting slave labor. Now another secret have been unearthed.

    • Secret Nazi Nuclear Complex Used to Try to Build Atomic Bomb Discovered in Austria

      A Nazi nuclear bunker was discovered in Austria under a large weapons factory.

      The complex, which features a network of tunnels and bunkers used by the Nazis to try to to build an atomic bomb, was discovered in Austria by filmmaker Andreas Sulzer.

    • Filmmaker Finds Nazi Atomic Bomb Research Bunker

      A filmmaker has found a secret network of underground bunkers used by the Nazis to develop an atomic bomb.

      Located in the hills surrounding the Austrian town of St. Georgen an der Gusen, the vast site covers an area of up to 75 acres. It is believed that it could be connected to the nearby Bergkristall factory, an underground facility where Nazi scientists and engineers developed the Messerschmitt ME 262, the world’s first jet powered fighter plane.

    • Secret Underground Nazi WMD Factory Found: Report

      Suspiciously high radiation levels around the Austrian town of St. Georgen an der Gusen had long fueled theories that there was a buried bunker nearby where Nazis had tested nuclear weapons during WWII. Those suspicions came one step closer to being confirmed last week after the opening of a 75-acre underground complex was dug out from below the earth and granite used to seal off the entrance, the Times of Israel reports. The excavation team was led by Austrian filmmaker Andreas Sulzer, who says the site was “likely the biggest secret weapons production facility of the Third Reich”—a facility that probably relied on forced labor from the nearby Mauthausen-Gusen concentration camp and may have even been the testing location for a nuclear bomb, the Daily Mirror reports.

    • Filmmaker says he uncovered Nazis’ ‘biggest secret weapons facility’ underground near concentration camp

      An Austrian filmmaker believes he has discovered a huge Nazi “secret weapons facility” in an underground complex near the remains of the Mathausen-Gusen concentration camp in Austria, where thousands of Jews were killed.

    • Secret Nazi Nuclear Plant Discovered in Austria

      Austrian documentary filmmaker Andreas Sulzer found the 75-acre complex just outside the small town of St. Georgen an der Gusen, near Linz. This site is not far from the Bergkristall factory, where the Messerschmitt Me 262 — the first operational jet-powered fighter — was invented.

      Sulzer noticed that an Austrian physicist who was recruited by the Nazis had mentioned about the subterranean site in his diary.

      It was built by slave labourers who lived in the nearby Mauthausen-Gusen concentration camp.

      The exact location of this Nazi factory was determined with the help of intelligence reports and radiation tests that revealed that the radioactivity levels at the site were higher than normal.

    • ‘Biggest secret Nazi weapons factory of the Third Reich’ discovered underground near sleepy Austrian town

      The 75-acre facility, located near the town of St Georgen an der Gusen, is believed to have been used to create and test weapons of mass destruction and was deemed so important to the Nazis that the head of the SS and Hitler’s right hand man Heinrich Himmler, even oversaw its development.

    • Underground lab where Nazis worked on secret nuclear bomb is uncovered

      An underground Nazi labyrinth where slaves laboured on high-tech weapons including a secret nuclear missile programme has been uncovered in Austria.

      The 75-acre facility near the town of St Georgen an der Gusen is described as the ‘biggest secret weapons facility of the Third Reich,’ after it was unearthed by documentary maker Andreas Sulzer.

    • Secret Nazi ‘weapons of mass destruction factory’ discovered underground in Austria
    • Hitler’s secret ‘nuke plant’

      A labyrinth of secret underground tunnels believed to have been used by the Nazis to develop a nuclear bomb has been uncovered.

      [...]

      Excavations began on the site after researchers detected heightened levels of radiation in the area – supporting claims that the Nazis were developing nuclear weapons.

    • Vast, secret Nazi nuclear testing facility unearthed in Austria

      Huge web of tunnels covering area of 75 acres reinforces claims Nazis were working on developing WMDs

    • Researchers Discover Suspected Secret Nazi Nuclear Development Site

      The facility, which spans an area up to 75 acres, is thought to be an extension of the underground Bergkristall factory, where the world’s first operational jet fighter was produced. According to the Sunday Times, the Nazis took pains to hide the research facility, even as Bergkristall was inspected after the war.

    • Mission Ends in Afghanistan, but Sacrifices Are Not Over for U.S. Soldiers

      On Wednesday, as 2014 came to a close, the United States and allied forces formally turned over combat operations in Afghanistan to Afghans, officially ending the longest war in America’s history, and starting a new struggle for recognition among many military families who say they already feel forgotten.

    • New U.S. Stealth Jet Can’t Fire Its Gun Until 2019

      America’s $400 billion Joint Strike Fighter, or F-35, is slated to join fighter squadrons next year—but missing software will render its 25mm cannon useless.

    • The Tragedy of the American Military

      The American public and its political leadership will do anything for the military except take it seriously. The result is a chickenhawk nation in which careless spending and strategic folly combine to lure America into endless wars it can’t win.

    • Did You Know We Won the Afghan War This Weekend?

      Now, there is no journalism without fact-checking, so let’s dig in on the president’s statement. Afghanistan no longer is under threat from the Taliban, and all terrorism has been taken care of. Instead of an economy based on corruption, smuggling and opium production, Afghanistan is a thriving consumer society. Women walk the streets in mini-skirts, and elections happen without incident. An American can stroll among Kabul’s cafes and quaint bazaars with his head held high and his safety guaranteed by grateful Afghans. America and its allies’ investment of over 3,400 lives and four trillion dollars has paid off. Also, all the dead Afghans, whatever.

      Oh, wait, none of that is true.

  • Transparency Reporting

    • Supreme Court, in Big Leap, Plans to Put Filings Online

      The Supreme Court will soon join other federal courts in making briefs and other filings available electronically, Chief Justice John G. Roberts Jr. announced Wednesday.

      The changes will come “as soon as 2016,” the chief justice wrote in his annual year-end report on the state of the federal judiciary.

    • Exclusive: Julian Assange on “When Google Met WikiLeaks” While He was Under House Arrest

      In a holiday special, we feature an exclusive Democracy Now! interview with WikiLeaks founder Julian Assange. In July, Amy Goodman spoke to Assange after he had just entered his third year inside Ecuador’s embassy in London, where he has political asylum. He faces investigations in both Sweden and the United States. In the United States, a secret grand jury is investigating WikiLeaks for its role in publishing a trove of leaked documents about the Iraq and Afghanistan wars, as well as State Department cables. In Sweden, he is wanted for questioning on allegations of sexual misconduct, though no charges have been filed. During his interview, Assange talked about his new book, which at that time had not yet been released, titled, “When Google Met Wikileaks.” The book was later published in September.

  • Finance

    • Police suspect fraud took most of Mt. Gox’s missing bitcoins

      Nearly all of the roughly US$370 million in bitcoin that disappeared in the February 2014 collapse of Mt. Gox probably vanished due to fraudulent transactions, with only 1 percent taken by hackers, according to a report in Japan’s Yomiuri Shimbun newspaper, citing sources close to a Tokyo police probe.

    • Finns Party, SDP say poor can’t take more austerity

      Finnish politicians reacted to President Sauli Niinistö’s appeal for leadership on structural reforms with their own suggestions of what might be cut from the government’s budget. The SDP and the Finns Party say there is no room to cut spending that goes to support low-income Finns.

  • PR/AstroTurf/Lobbying

    • NBC’s Chuck Todd explains why journalists so rarely ‘bark’ at politicians

      An open secret in Washington, D.C., journalism was unexpectedly shared with frustrated voters across the country on Sunday’s edition of NBC’s “Meet the Press.”

      Anyone who’s ever watched an elected official from either major political party be interviewed by a serious journalist has probably angrily asked aloud, “Why don’t they ask him about XYZ?!” Or, “Why did they let him get away with that answer?!”

      One of the most obvious and serious reasons is time constraint. Reporters, whether on TV or print, are almost always only allowed a small window of time to ask elected officials a set of questions.

      But one of the other lesser known reasons is access. Competition in political journalism is fierce and having access to big names in D.C. is everything. If a congressman thinks he’s treated unfairly or too aggressively by a reporter, he may simply choose to give his time to someone he thinks is more fair (i.e., more “friendly”).

    • The Shadow Lawmakers

      While the public believes the people they elect to Congress create legislation and policies, their role is increasingly theatrical.

  • Censorship

    • Three Al Jazeera Journalists Remain in Jail After Egyptian Court Orders a Retrial

      Egypt’s highest appeals court on Thursday ordered a retrial for three imprisoned journalists from Al Jazeera’s English-language service, implicitly acknowledging critical procedural flaws in a case that rights advocates have described, from the men’s arrests to their convictions, as a sham.

      But the decision offered no guarantees that the journalists, who have been imprisoned for more than a year and now face a potentially lengthy second trial, would be freed anytime soon.

    • India bans Open Source Sites

      The Indian government has blocked a clutch of Open Saucy websites including Github because they were carrying “anti-India” content from the head-lopping terror group ISIS.

    • India Illustrates The Risks Of Censorship Laws

      Next time you see your government proposing internet censorship laws of any kind, remember this incident where the Indian government crippled their own software industry so they could be seen to be doing something about terrorism. Their department of telecommunications has blocked 32 web sites — including archive.org and Github — as if to illustrate why it’s bad to allow anyone the power to block web sites arbitrarily (ETI claims it’s 60+). They’ve blocked entire slices of multi-purpose web infrastructure because one of their functionaries found something about ISIS somewhere on it, according to TechCrunch.

  • Privacy

    • UK wants hot tech grads to do spy work before building startups

      The British government is considering a program that would see the most promising tech graduates spend some time working for the GCHQ signals intelligence agency, the U.K.’s equivalent to the NSA, before they move into the private sector.

      As per a Thursday article in The Independent, confirmed to me by the Cabinet Office on Friday, the scheme would give the U.K. a rough equivalent to the system in Israel, where many tech entrepreneurs have come out of Unit 8200 of the Israel Defence Force. Unit 8200 is also a signals intelligence operation, and the cybersecurity firm Palo Alto Networks is a notable spinout.

    • What We Learned About NSA Spying in 2014—And What We’re Fighting to Expose in 2015: 2014 in Review

      In fact, some of the most significant information about the NSA’s surveillance programs still remain secret. Despite one of the most significant leaks in American history and despite a promise to declassify as much information as possible about the programs, nearly two years later the government still refuses to provide the public with the information it needs. For example, government officials still have not answered a simple, yet vitally important, question: what type of information does the NSA collect about millions, or hundreds of millions, of Americans (or the citizens of any other country, for that matter)? And the government still refuses to release some of the most significant decisions of the Foreign Intelligence Surveillance Court—the secret court tasked with monitoring the government’s surveillance programs.

    • The IOB Reports on the Internet Dragnet Violations: “Nothing to Report”

      I’ve been working through the NSA’s reports to the Intelligence Oversight Board. Given that we know so much about the phone and Internet dragnets, I have been particularly interested in how they got reported to the IOB.

      By and large, though, they didn’t. Even though we know there were significant earlier violations (some of the phone dragnet violations appear in this timeline; there was an Internet violation under the first order and at least one more of unknown date), I believe neither gets any mention until the Q1 2009 report. These are on the government’s fiscal year calendar, which goes from October to September, so this report covers the last quarter of 2008. The Q1 2009 reports explains a few (though not the most serious) 2008-related phone dragnet problems and then reveals the discovery of the alert list, which technically happened in Q2 2009.

    • NSA Obfuscated to Congress about Back Door Searches in 2009

      The NSA got a lot of criticism for releasing its IOB reports on December 23, just as everyone was preparing for vacation. But there were three reports that — at least when I accessed the interface — weren’t originally posted: Q3 and Q4 2009 and Q3 2010 — all conveniently important dates for the Internet dragnet (I’ll have more on what they didn’t disclose soon).

    • Leahy & Grassley Press Administration on Use of Cell Phone Tracking Program Print Share

      Senate Judiciary Committee Chairman Patrick Leahy (D-Vt.) and Ranking Member Chuck Grassley (R-Iowa) pressed top Obama administration officials on the use of cell-site simulators, which can unknowingly sweep up the cell phone signals of innocent Americans.

    • How ABC Investigative Reports Turn into NSA Briefings to the SSCI

      First, this is ABC News, one of the outlets notorious for laundering intelligence claims; indeed, it is possible this is a limited hangout, an attempt to preempt one of the most alarming revelations in Bamford’s book. While the report doesn’t say it explicitly, it implies the claims of whistleblowers Kinne and Faulk prove Hayden to have lied in his CIA Director confirmation hearing, in response to the softball thrown by Hatch. In any case, the briefing about this disclosure appears to have gone exclusively to SSCI (with follow-up briefings to both intelligence oversight committees afterwards), the committee that got the apparently false testimony (and not for the last time, from Michael Hayden!). But by briefing the Committee, it also gave Jello Jay an opportunity — and probably, explicit permission — to sound all stern about a practice the Committee likely knew about.

    • Email Encryption Grew Tremendously, but Still Needs Work: 2014 in Review

      What if there were one thing we could do today to make it harder for the NSA and other intelligence agencies to eavesdrop on millions of people’s email communications, without users having to change their habits at all?

      There is. It’s called STARTTLS for email, a standard for encrypting email communications. 2014 saw more and more email providers implementing it.

    • Stingrays Go Mainstream: 2014 in Review

      We’ve long worried about the government’s use of IMSI catchers or cell site simulators. Commonly known as a “Stingray” after a specific device manufactured by the Harris Corporation, IMSI catchers masquerade as a legitimate cell phone tower, tricking phones nearby to connect to the device in order to track a phone’s location in real time. We’re not just worried about how invasive these devices can be but also that the government has been less than forthright with judges about how and when they use IMSI catchers.

      This year the public learned just how desperately law enforcement wanted to keep details about Stingrays secret thanks to a flurry of public records act requests by news organizations across the country. The results are shocking.

    • FISA “Physical Searches” of Raw Traffic Feeds, Hiding in Plain Sight?

      I’m still trudging through NSA’s reports to the Intelligence Oversight Board, which were document dumped just before Christmas. In this post, I want to examine why NSA is redacting one FISA authority, starting with this section of the Q1 2011 report.

    • French Government Quietly Enacts Controversial Surveillance Law On Christmas Eve

      Techdirt has noted that the NSA chose to release embarrassing details of its illegal surveillance of Americans on Christmas Eve. By an interesting coincidence, the French government picked the same date to enact a hugely controversial new surveillance law, which had been passed back in 2013, and will now enter into operation almost immediately, at the start of 2015. One of its most troubling aspects is the vagueness of its terms. As reported by Le Point, here’s what can be collected (original in French)…

  • Civil Rights

    • United States of Emergency
    • Prince Andrew named in lawsuit over underage sex allegations
    • Prince Andrew denies allegations in underage sex lawsuit filed in U.S.
    • Prince Andrew sex case claim: Duke of York is named in underage ‘sex slave’ lawsuit over claims of forced sexual relations
    • Palace denies Prince Andrew ‘underage sex’ claim
    • Police Chief Accuses Secret Service Of Misconduct

      Nashville’s police chief is raising stunning new allegations regarding the U.S. Secret Service, saying local agents once asked his officers to fake a warrant.

      Even more disturbing, Chief Steve Anderson said he complained to top Secret Service officials in Washington, and they did not seem to care.

    • And the Winner of the ‘War On Terror’ Financed Dream Home 2014 Giveaway Is…

      Oceanfront views, 24-hour doorman, heated pool, and perhaps best of all, a “private tunnel to the beach.” This $3 million Palm Beach, Florida penthouse could be yours, but unfortunately it isn’t because this prize has already been claimed by a former high-level U.S. official who helped pave the way for the over decade-long “war on terror,” which has been a near complete catastrophe.

      Iraq is aflame, the Islamic State is on the rampage, the situation in Afghanistan worsens by the day, and thousands of Americans—and many more Iraqis and Afghans—have died during the post-9/11 conflicts. Meanwhile, the combined cost of the “war on terror” comes to an estimated $1.6 trillion.

      But if the American people got screwed on the deal, a lot of former senior government officials who played important roles in this debacle have done quite well for themselves. It’s New Year’s Eve and I need to write a final sendoff to 2014, so I thought I’d take a look at the fortunes (literally) of some of these figures: Former CIA director George Tenet and former FBI director Louis Freeh (I’ll cover former Department of Homeland Security chief Tom Ridge in a New Year’s post).

      Consider Tenet. As head of the CIA, he missed multiple signs of a major Al Qadea attack directed against the United States, called the case against Saddam building Weapons of Mass Destruction a “slam dunk,” and approved the Bush administration’s torturing of terror suspects.

      In any fair world Tenet would be tried for criminal incompetence. Instead, he got the Presidential Medal of Freedom and after resigning in 2004 (at which point his agency salary was south of $200,000), he received a $4 million advance to write a memoir. In it, he confessed to “a black, black time” a few months after 9/11 when he was sitting at home in his favorite Adirondack chair thinking about the tragedy that killed 3,000 Americans on his watch and asked, “Why me?”

    • Disclose the full torture report, Senator Udall

      Colorado’s U.S. Sen. Mark Udall can perform yeoman’s service in upholding the rule of law and government accountability before his term concludes on Saturday.

      Protected by the Constitution’s Speech or Debate Clause, the senator can publicly disclose the already redacted 6,700-page “Study of the Central Intelligence Agency’s Detention and Interrogation Program.”

    • These Charts Show How Ronald Reagan Actually Expanded the Federal Government

      One of the many, many problems Jeb Bush faces in his quest for the Oval Office is his break from Republican orthodoxy on president Ronald Reagan’s legacy. In 2012, Bush told a group of reporters that, in today’s GOP, Reagan “would be criticized for doing the things that he did”— namely, working with Democrats to pass legislation. He added that Reagan would struggle to secure the GOP nomination today.

    • Web Freedom Is Seen as a Growing Global Issue

      Government censorship of the Internet is a cat-and-mouse game. And despite more aggressive tactics in recent months, the cats have been largely frustrated while the mice wriggle away.

      But this year, the challenges for Silicon Valley will mount, with Russia and Turkey in particular trying to tighten controls on foreign-based Internet companies. Major American companies like Facebook, Twitter and Google are increasingly being put in the tricky position of figuring out which laws and orders to comply with around the world — and which to ignore or contest.

    • Demonstrators March Against Police Brutality In Oakland and San Francisco On New Year’s Eve

      A number of downtown Oakland transit lines were detoured due to a protest against police brutality that took place in the area on Wednesday evening.

      Protesters met at Frank Ogawa Plaza in Oakland around 9 p.m. for the New Year’s Eve march.

      Reports on Twitter suggested somewhere around 100 to 200 people were marching, accompanied by a large police presence.

    • Letter: Grand jury results damage justice

      The grand jury decisions not to indict police officers Darren Wilson and Daniel Panteleo in the killings of Michael Brown and Eric Garner can be seen as another example of the racist and criminal history of United States justice.

    • Anti-brutality activists aim to ‘evict’ St. Louis police from headquarters

      Scores of protesters at the helm of the ongoing nationwide movement against police violence stormed the St. Louis Metropolitan Police Department Wednesday, aiming to “evict” officers they accused of “perpetrating police brutality on our citizenry.”

      Five of the roughly 25 demonstrators who linked arms in the lobby of the police department were arrested in the headquarters, the St. Louis Police Department told Al Jazeera. Police pepper-sprayed and forced other protesters off the premises.

    • Fox affiliate fires reporter and cameraman who deceptively edited video of police brutality protesters

      Fox 45 fired the reporter and cameraman involved with a story that claimed protesters against police brutality were shouting “to kill a cop,” the Baltimore City Paper reports.

    • Congressmen admit to not reading NDAA before voting for it: ‘I trust the leadership’

      US House members admitted they had not read the entire $585 billion, 1,648-page National Defense Authorization Act, which predominantly specifies budgeting for the Defense Department, before it was voted on Thursday in Congress.

    • Mike Lee Thwarted In Bid To Strip Government’s Ability To Detain Americans Indefinitely

      Sen. Mike Lee (R-Utah) mounted a largely symbolic bid Friday to end the White House’s authority to indefinitely detain Americans without trial.

      The conservative Republican senator offered an amendment to the National Defense Authorization Act that was immediately blocked.

      “The bottom line is that there is simply not enough time left before we adjourn to debate even a single amendment, and surely not a single amendment of this complexity,” said Sen. Carl Levin (D-Mich.), chairman of the Senate Armed Services Committee, who objected to Lee’s request to debate his amendment. Levin added that he had previously supported a similar measure.

    • Levin Is Leaving Congress Disappointed the NDAA Doesn’t Do More
    • US Congress Gives Native American Lands to Mining Company

      The National Defense Authorization Act (NDAA) sanctioned giving federal lands belonging to indigenous Americans to Resolution Copper, a subsidiary of the British Australian multinational, Rio Tinto.

    • The International Criminal Court on shaky ground

      A DOZEN years after its creation, the International Criminal Court is foundering. So far it has brought just 21 cases in eight countries, all of them in Africa. Only two have resulted in convictions — of relatively obscure Congolese rebel leaders. Though 139 countries signed the founding treaty, the United States, Russia, China, India, Israel and every Arab nation but Jordan have declined to join. The most horrific crimes against humanity perpetrated in the world in the past decade — in North Korea, Syria and Sri Lanka, among other places — remain outside the ICC’s reach.

      [...]

      Pending such opportunities, the court may be tempted to pursue more quixotic initiatives. This month chief prosecutor Fatou Bensouda reported that she was “assessing available information” on “enhanced interrogation techniques” by U.S. forces in Afghanistan, which is an ICC member. This month’s Senate Intelligence Committee report on cases of torture may increase the impetus behind that probe. But the alleged crimes committed by U.S. personnel, though shocking, are not grave enough to meet the ICC’s high bar for prosecution — and it would be politically foolish for the court to pursue U.S. targets.

  • Internet/Net Neutrality

    • Marriott plans to block personal wifi hotspots

      The hotel chain and some others have a petition before the FCC to amend or clarify the rules that cover interference for unlicensed spectrum bands. They hope to gain the right to use network-management tools to quash Wi-Fi networks on their premises that they don’t approve of. In its view, this is necessary to ensure customer security and to protect children.

    • Google Fiber, Net Neutrality & More…

      Reclassifying ISPs as common carriers is seen by many as the easiest way to bring back Net Neutrality.

  • DRM

    • Watch Netflix video in your chromium browser – this time for real

      Apparently, having a functional Widevine CDM support will allow you to watch Youtube Movies as well, but since I already pay for Netflix I did not want to test these Youtube rentals. Another test which failed was my attempt to watch television on horizon.tv, the content streaming network of my provider (UPC/Liberty Global). Even with a UserAgent spoofer and all browser cookies removed, that site still detected that I was visiting using a Chrome/Chromium browser and kept presenting an annoying popup to force me to switch to a different browser because Chrome does not support Silverlight anymore (on Mac OSX and Windows 64-bit at least, remember their NPAPI depreciation). No way around that, even though I was fairly sure that Horizon TV also used Widevine for Digital Rights Management (DRM) in the past. Guess I still have to use Firefox with Pipelight for that, then.

  • Intellectual Monopolies

    • Copyrights

      • Rental Car Stereos Infringe Copyright, Music Rights Group Says

        STIM disagrees. The collection society says that previous cases involving hoteliers have ended with licenses being obtained which enable hotel guests to listen to music while on the premises. Furthermore, other car rental companies in Sweden have already agreed to pay a per-stereo levy so Fleetmanager should also pay, STIM argues.

        This is not the first music-related copyright case to hit the car sector this year. In July, the Alliance of Artists and Recording Companies launched a class action lawsuit against Ford and General Motors over the CD-ripping capability of their cars. In November the group followed up with fresh legal action against Chrysler and technology partner Mitsubishi.

01.01.15

Links 1/1/2015: Kodak on Android, Tizen on All Samsung TVs

Posted in News Roundup at 9:09 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Desktop

  • Applications

  • Desktop Environments/WMs

    • Ben Jennings on UN climate change talks – cartoon

      All leaders must rise to the challenge for December 2015, warns outgoing EU climate chief

    • Bonus: More from the deepest depths of Debian
    • Bonus: 2014 in review
    • K Desktop Environment/KDE SC/Qt

      • Yet another way to make your app support StatusNotifierItem
      • Round 2

        Well the first two laps of my first SoK is over and now I finally enter into the final lap. In the first month I had finished with the design of the site but it was just plain and simple HTML/CSS and as we all know that is not enough. So the next question that arises is – what do we need ? And the answer to that will be a framework.

      • [SoK] Cantor Python backend status update

        There were not many commits from my side to the Cantor project during the last month, but most of stuffs that are related to porting the Python 2 backend to Python 3 have been done.

      • MUP, a Markup Previewer

        MUP is a markup previewer. It supports multiple markup formats. You can use it to read markup text, but it is also useful when writing markup text to check how your work looks, thanks to its refresh-as-you-save feature.

      • What’s going on with measures in Marble

        Here in the Marble world, we are working hard on expanding the current functionality with new features. Today I would like to show you some stuff we’ve recently introduced as part of the Measure tool. The measure tool is basically a multifunctional georuler, that allows to perform a variety of measurements. For instance, now you can easily measure distances on trivial paths or areas of complicated polygon shapes.

    • GNOME Desktop/GTK

      • Builder, an IDE of our GNOME

        Bastian Hougaard and Jakub Steiner put together a wonderful video for the campain. Thanks guys!

        I’ve funded the last 4 months of development to give you and idea of what you are funding and reduce your risk. I also wanted to prove to you that I’m capable of taking on this project. I hope you agree and are willing to keep me going.

  • Distributions

    • New Releases

    • Screenshots

    • Red Hat Family

      • Fedora

        • Us Versus Them

          On some levels this makes sense. Red Hat is the single largest entity in Fedora and many (if not most) of the movers and shakers in Fedora are Red Hat employees. A quick glance at the Fedora 21 System Wide Changes shows many more Red Hat employees than not. Is it any wonder that individual contributors can feel a bit like a sailboat in the way of an aircraft carrier?

        • A good year for Ansible users

          Today I’d like to take a look at where Ansible is, a year later, using last year’s report as a benchmark. I think it’s fair to say that we’ve done pretty well for our users in 2014.

    • Debian Family

      • Status on Jessie (December 2014)

        The next timed change of the freeze policy will apply per January 5th. After that date, we will only accept RC bugs fixes. Which means it is final chance for translation updates.

      • Derivatives

        • Canonical/Ubuntu

          • These Are the Essential Apps for Tweaking Ubuntu and Unity

            Ubuntu can be easily tweaked and it’s not all that difficult to make some visual changes to it. People think that Unity is not all that flexible, but that’s definitely not the case and users need just two apps to make all the changes they want.

  • Devices/Embedded

    • Phones

      • Tizen

        • Samsung to use Tizen across ALL of its TV starting 2015

          The HOT News of the day is that Samsung have decided to start shipping Tizen on ALL of their upcoming Smart TVs starting 2015. According to industry sources, Samsung have taken this bold move following a meeting that took place on 29 December, and decided to only use Tizen across its complete upcoming TV line in an effort to boost its own Tizen TV ecosystem.

      • Android

        • Kodak focuses on Android-powered smartphone cameras

          After a lengthy corporate restructuring, the indomitable Kodak is applying its brand and expertise to a new market: smartphones. The imaging company announced its intention to launch a range of Android smartphones aimed at transitioning technophobes in partnership with mobile device manufacturer Bullitt Group.

        • The best Android phones of 2014

          This last year has been a big one for Android. Displays have started moving beyond 1080p, devices keep getting bigger, and Android 5.0 brings the most fundamental change the platform has seen in a very long time. Some of the phones that were released in 2014 were huge successes, and other fell short of expectations, but which one was the best? That depends on how you frame the question, so let’s split it up a few different ways and find out.

        • How Android beat iOS in 2014, and vice versa

          In most areas, Google is already beating Apple, or at least catching up to it. Yet Apple still has a stranglehold in specific areas, ones that aren’t easy to break, including the enterprise as well as the hearts of independent developers and startups.

        • Here’s what finally pushed a longtime Android fan to switch to an iPhone 6 Plus

          Earlier this week, we brought you the story of Jason Kallelis of Writing About Tech, a longtime Android fan who had grown so frustrated with Android’s user experience recently that he felt tempted to switch to the iPhone 6 Plus. Well, it’s just one day later and Kallelis has already decided to take the plunge and has bought himself Apple’s giant new phablet as an experiment to see if he likes it better.

        • Nexus 7 Android L 5.0.2 Update Released For Wi-Fi Edition, Fixing Memory Leak on Android Lollipop 5.0 and 5.0.1

          Android 5.0.2 has rolled out for Nexus 7 users, and the latest incremental update aims to fix a few lingering bugs that were still crawling around the Android 5.0 Lollipop operating system after launch.

        • Nexus Android 5.0 Lollipop Problem Fix Confirmed

          Google’s new Android 5.0 Lollipop operating system delivered tons of new features to Nexus smartphone and tablet users. However, it also delivered a number of Android 5.0 Lollipop issues to owners of the Nexus 4, Nexus 5, Nexus 6, Nexus 9, Nexus 10, and Nexus 7, Lollipop problems that Google’s been trying to iron out over the last month and a half.

        • Android 2.3 Gingerbread—Four years later, the OS just won’t die

          December was the fourth anniversary for Android 2.3 Gingerbread—an eternity for smartphones—yet the OS stubbornly refuses to die. The OS that originally shipped in 2010 is still clinging on to 9.1 percent of active devices, and in developing markets it still ships on new devices. Android 2.3 has even outlasted newer versions of Android, like 3.0 Honeycomb (0 percent) and 4.0 Ice Cream Sandwich (7.8 percent).

        • HTC One M9 rumors: ‘Hima’ boasts Android 5.0 Lollipop with Sense 7 UI?

          Another reliable tipster confirmed that the HTC One M9 “Hima” will be released in March boasting the latest Android 5.0 Lollipop OS overlaced with the HTC Sense 7 user interface.

        • OnePlus Release Official Alpha Version Of Their Stock Android 5.0 Lollipop ROM – Download Included

          The news of a OnePlus ROM was not new news, as it had been reported months ago that the company was working on its own version of close-to-stock android. More recently, the company announced a competition in their forum asking members to suggest a name for their ROM. Well, if you have been waiting to see what OnePlus could bring to the ROM table then it looks like the wait is over. OnePlus today have released the first version of their very own ROM. At the moment, the ROM name has still not been decided (or at least made known) and instead is simply going by ‘Android Lollipop Alpha’. As the name suggests, this ROM is based on Android 5.0 (Lollipop) and is now available to download and install. However, before you all click download, you do need to know that this is a very early build. Quite often builds are referred to as “early” or “alpha”, but this is seriously early and OnePlus has therefore released this as a ‘community preview’ version (similar to what we saw from Google with the L preview a few months ago). OnePlus make this point in their blog post stating “It’s so early, in fact, that this build contains no extras beyond the stock features of AOSP Lollipop”. So you’ve been warned. You should expect things not to work, bugs and other nasties associated with early and alpha ROM builds.

        • OnePlus One Android 5.0 Lollipop Alpha Build Now Available
        • Android 5.0 Lollipop Update: Samsung May Send Out New Google Software To Galaxy S5 And Others In January

          Samsung Electronics Co. may be ringing in the New Year with a fresh new system update for its devices. The manufacturer reportedly plans to begin sending out the Android 5.0 Lollipop update to its devices in January, according to a Reddit user claiming to be a Samsung employee.

        • Amazon now has 33 paid Android apps available for free

          If the 40 free applications that Amazon gave away last week wasn’t enough to satiate your hunger for new apps, the company is back today with even more goodies for your Android device.

          Amazon is now offering 33 paid Android apps for free as part of its latest Free App of the Day Bundle. There are games and utilities packed inside of the bundle, including big names like Monopoly, République, Thomas Was Alone, Lyne, and Angry Birds Star Wars.

        • Google’s Efforts Could Soon Lead To Unlocking Android Riches In Google Play

          Android is the most used mobile operating system in the history of the world. Google’s mobile OS shipped on 84% of all global smartphones in Q3 2014, a level that has grown consistently over the last several years. In contrast, Apple’s iOS has lost quarterly share in a growing market, showing up in 11.7% of all smartphone shipments in the third quarter.

        • HTC One M7 Lollipop Update: Android 5.0.2 Available Via LiquidSmooth ROM

          While Google has yet to release the Android Lollipop for the HTC One M7, users of the smartphone can try out the latest version by installing the Android 5.0.2 Lollipop update on their phones thanks to LiqiudSmooth ROM.

        • Build a Wi-Fi Webcam from an Old Android Phone

          Instructables user depotdevoid took his old Droid Razr Maxx and decided to turn it into an always-on, internet-connected webcam he could monitor at any time. If you want to do the same, you’ll need a few things to make this project work. A copy of IP Webcam (Free, $4 Pro) from Google Play, and a soldering iron (if you don’t want to just use USB power—depotdevoid’s Maxx has a broken USB charging port) to add external power, and a mount for your phone are all it really takes. He uses his to watch his 3D printer when he’s not in his garage workshop, but you can use it to keep an eye on package deliveries, watch your pets during the day, or just see the view from your home window.

        • OnePlus vs Micromax: Dream of Google-less Android now further away

          An obscure court case in India appears to have dented hopes of the mobile industry weaning itself off Google dependency – and has raised questions about the goals of Cyanogen and its backer, a Silicon Valley VC firm with close ties to Google.

          In the cosy world of Menlo Park VC firms, Andreessen Horowitz (or “A16Z”) is as close to Google as anyone. Together, they teamed up to create the “Glass Collective”, while its head, Netscape founder Andreessen, appear to go to battle in Google’s wars against media companies, as Michael Wolff reminded us this week.

        • Samsung Galaxy S4 and Note 2 to receive Android 5.0 Lollipop OS update
        • Lollipop’s memory leak bug confirmed, will finally be fixed in future Android release

          Although it can be exciting living on the bleeding edge of tech, sometimes being first to a software update can prove to be more harmful than good. Just ask Nexus (or even iPhone) owners who’ve, over the years, learned the hard way that initial updates — especially when it comes to major Android versions — can often times be riddled with bugs and other general weirdness. It’s this very reason it appears there was such a long delay in the rollout of Android 5.0 Lollipop for the Nexus 5.

        • Checking up on 2014’s crowdfunded Linux and Android devices

          What became of the crowdfunded projects we covered in 2014? Two earned more than $2 million each, about a third went unfunded, and half had shipping delays.

          Ten years ago if somebody were to tell you you’d soon be able to collect thousands and even millions of dollars for your product idea simply by posting a summary and some pictures on a web page, you might have been inclined to check their meds. Then Kickstarter launched in 2009, and small-scale investing changed forever.

        • Best Android Smartphones 2014: Your Favorite Devices And The Features That Made You Love Them

          While it may seem to most consumers that all smartphones are pretty much the same — and for Apple users, they are — Android phone manufacturers brought a diverse array of hardware to the market in 2014. The theme of the year was standout features, including large (and even curved) displays, water-resistant designs and powerful cameras. Manufacturers competed fiercely to win the favor of consumers, and many handsets stood out for very specific reasons. Below is a rundown of the best Android devices of 2014 and their best features.

        • Android KitKat x86 Updated With Linux 3.18, Better Suspend/Resume

          Android 4.4 “KitKat” has been ported to Intel/AMD x86 processors for a while in stable form while kicking off the New Year is the second stable release of Android-x86 4.4

          Android-x86 4.4-r2 is the second stable update to KitKat for Intel/AMD processors. This update has various x86-specific improvements targeted for tablets and netbooks.

        • Nokia N1 Android Tablet Release Date in China Set for January

          Nokia has confirmed the launch date of its first Nokia-branded Android tablet, the N1, which will first hit the Chinese market on Jan. 7, 2015.

    • Sub-notebooks/Tablets

      • News: OLPC releases a farm version.

        The One Laptop Per Child project, still going strong in 2015, provides a new version of the nearly indestructable XO laptop which is specifically geared toward children in farming communities.

        The XO Tablet is an Android tablet designed for children 3-12 years old that brings OLPC’s expertise to both the educational . It features a 7-inch screen and over 150 applications.

Free Software/Open Source

  • 2015: Open Source Has Won, But It Isn’t Finished

    At the beginning of a new year, it’s traditional to look back over the last 12 months. But as far as this column is concerned, it’s easy to summarise what happened then: open source has won. Let’s take it from the top:

    Supercomputers. Linux is so dominant on the Top 500 Supercomputers lists it is almost embarrassing. The November 2014 figures show that 485 of the top 500 systems were running some form of Linux; Windows runs on just one. Things are even more impressive if you look at the numbers of cores involved. Here, Linux is to be found on 22,851,693 of them, while Windows is on just 30,720; what that means is that not only does Linux dominate, it is particularly strong on the bigger systems.

    Cloud computing. The Linux Foundation produced an interesting report last year, which looked at the use of Linux in the cloud by large companies. It found that 75% of them use Linux as their primary platform there, against just 23% that use Windows. It’s hard to translate that into market share, since the mix between cloud and non-cloud needs to be factored in; however, given the current popularity of cloud computing, it’s safe to say that the use of Linux is high and increasing. Indeed, the same survey found Linux deployments in the cloud have increased from 65% to 79%, while those for Windows have fallen from 45% to 36%. Of course, some may not regard the Linux Foundation as totaly disinterested here, but even allowing for that, and for statistical uncertainties, it’s pretty clear which direction things are moving in.

  • Is Open Source Collaboration the Key to Better Communication?

    Is open source collaboration the key to communication? No silver bullet exists that provides organizations with everything they desire in a single solution. With that said, commercial open source collaboration solutions help companies future proof their investment and give them what is needed to fit their unique requirements. So, if what you are seeking is better security and privacy, improved flexibility and greater control over your collaboration solution, then you should consider open source.

  • Events

    • 2015: the Year of Open Source with Chinese Characteristics?

      The rise of China is hardly a secret – by some metrics, the Chinese economy is already the largest in the world. But in recent months, it has become clear that Chinese technology companies are also about to have a major impact on the rest of the planet – and that includes the world of open source.

  • Web Browsers

    • Mozilla

      • Firefox private browsing directly

        I use the private mode of firefox quite often, for example when I want to test an application while being authenticated in one windown and not authenticated in another window.

  • SaaS/Big Data

    • 2014 and 2015

      In just a few hours 2014 ends. This is a great opportunity to look back at what happened this year in the ownCloud world and in my personal life. This was an absolutely crazy 12-month so this blog post is now way longer that I planed. A huge thanks you to everyone in the ownCloud community. It´s a blast to work together with so many clever and friendly people from all over the world.

  • Project Releases

    • GWorkspace 0.9.3

      New Year’s Eve Edition: GWorkspace 0.9.3 released!

    • rfoaas 0.0.5

      A new version of rfoaas is now on CRAN. The rfoaas package provides an interface for R to the most excellent FOAAS service–which provides a modern, scalable and RESTful web service for the frequent need to tell someone to eff off.

  • Openness/Sharing

  • Programming

    • Perl ‘issues’

      I just watched a CCC talk in which the speaker claims Perl is horribly broken. Watching it was fairly annoying however, since I had to restrain myself from throwing things at the screen.

  • Standards/Consortia

    • ODF Plugfest showcases innovations on document collaboration

      The ODF Plugfest that took place in London on 8 and 9 December showcased innovative ways to work with electronic documents. The most striking idea is the borrowing of techniques commonly used in software development, promising many news ways to create and collaborate on documents.

      At the two-day workshop in London, the Berlin-based ODF expert Svante Schubert proposed to borrow techniques commonly used in software development, to manage revisions from many different sources. He suggests to exchange only the changes made in a text, instead of the much more cumbersome sending back and forth of an entire document. “Using files for collaborating on documents is a relic from the era of floppy discs”, developer Schubert says. “It forces a recipient to read the entire document and try to understand what has been changed by others.”

Leftovers

  • Japan: ‘Solo weddings’ for single women

    A travel agency in one of Japan’s most beautiful cities, Kyoto, has started organising bridal ceremonies for single women.

  • Why Singles Should Say ‘I Don’t’ to The Self-Marriage Movement
  • Security

    • Lizard Kids: A Long Trail of Fail

      The Lizard Squad, a band of young hooligans that recently became Internet famous for launching crippling distributed denial-of-service (DDoS) attacks against the largest online gaming networks, is now advertising own Lizard-branded DDoS-for-hire service. Read on for a decidedly different take on this offering than what’s being portrayed in the mainstream media.

    • FBI Waking Up To The Fact That Companies With Itchy Trigger Fingers Want To Hack Back Hacking Attacks

      It’s no secret that some in the computer security world like the idea of being able to “hack back” against online attacks. The simplest form of this idea is that if you’re a company under a denial-of-service attack, should you be able to “hack” a computer that is coordinating those attacks to stop them? More than two years ago, an LA Times article noted that some cybersecurity startups were marketing such services. Related to this, when the terrible CISPA legislation was being debated, one concern was that it would legalize such “hack backs” because, among other things, CISPA would grant immunity to companies “for decisions made based on cyber threat information.” Some interpreted that to mean that companies would have immunity if they decided to hack back against an attacker.

    • Security advisories for Wednesday
    • Security advisories for Monday
    • Tuesday’s security updates
    • Want to have your server pwned? Easy: Run PHP

      More than 78 per cent of all PHP installations are running with at least one known security vulnerability, a researcher has found.

      Google developer advocate Anthony Ferrara reached this unpleasant conclusion by correlating statistics from web survey site W3Techs with lists of known vulnerabilities in various versions of PHP.

  • Defence/Police/Secrecy/Aggression

    • Oliver Stone: Ukraine’s revolution was CIA ‘plot’

      US director Oliver Stone has called Ukraine’s Euromaidan revolution that ousted president Viktor Yanukovych a CIA “coup” and claimed that the West played a role in fostering anti-government protests in the country.

      The filmmaker, who is not new to conspiracy theories around world events, posted the bizarre theory on Facebook after a four-hour interview with Yanukovych, whom he called “legitimate president of Ukraine until he suddenly wasn’t on February 22 of this year”.

    • Oliver Stone Says Ukraine’s Revolution Was Actually A CIA Plot

      Acclaimed film director Oliver Stone on Tuesday claimed that the overthrow of Ukrainian president Viktor Yanukovych earlier this year was the result of an American plot.

      Stone, who is known for his left-wing politics, made the claim via a post on his Facebook page. In it, he revealed that he’d spoken to the ousted ruler for “4 hours in Moscow for new English language documentary produced by Ukrainians.” Stone did not provide many details on the documentary but said it “seems clear that the so-called ‘shooters’ who killed 14 police men, wounded some 85, and killed 45 protesting civilians, were outside third party agitators.”

    • ‘CIA fingerprints’ all over Kiev massacre – Oliver Stone

      The armed coup in Kiev is painfully similar to CIA operations to oust unwanted foreign leaders in Iran, Chile and Venezuela, said US filmmaker Oliver Stone after interviewing Ukraine’s ousted president for a documentary.

    • Oliver Stone Meets Toppled Ukrainian President Yanukovych, Accuses CIA of Sparking Coup
    • Mashable: Oliver Stone says CIA was behind Ukraine revolution in bizarre Facebook rant
    • Ukraine Massacre has CIA Fingerprints Says Oliver Stone
    • Oliver Stone: U.S. Behind Ukraine Revolt, Has ‘CIA Fingerprints on It’
    • Famous US Director Oliver Stone to Shoot a Documentary on 2014 Ukraine Coup

      Hollywood film producer Oliver Stone has said he wants to make a four-hour documentary telling the “dirty story” of the overthrow of former Ukrainian President Viktor Yanukovych in what he believes was a “coup” organized with the help of the United States’ Central Intelligence Agency.

    • Ukraine Wants Action, But U.S. Sends Hashtags Instead

      As Russian troops amass along the Ukraine border and take over military facilities in the Crimea region, the United States has distanced itself from any boots-on-the-ground intervention.

      The U.S. won’t send troops or weapons, but it will send hashtags.

      While Congress approved an aid package for Ukraine and sanctions against Russia this week, the State Department pushed a Twitter campaign under the hashtag #UnitedForUkraine, which calls on people to share their support for the country.

      President Obama had great success using social media during his campaigning days, but does that same mindset work for foreign affairs?

      “I don’t know what effect this is supposed to have,” said former State Department diplomat James Lewis. “It’s a hashtag. What’s it going to do? For this situation, it’s not a useful tool.”

      To get the momentum going on the hashtag, top officials posted their own photos. Among the most notable was the State Department’s chief spokesperson Jen Psaki, who was once in the running for the Obama’s press secretary.

    • Idaho woman shot dead by two-year-old son was nuclear scientist

      The woman who was accidentally shot dead by her two-year-old son in an Idaho Walmart is described by those who knew her as a gun lover, a motivated academic and a successful nuclear research scientist.

      “She was a beautiful, young, loving mother who was taken much too soon,” Veronica Rutledge’s father-in-law, Terry Rutledge, told the Spokesman-Review. “She was out on what was supposed to be a fun-filled day with her son and nieces.”

      Rutledge was shot at about 10.20am on Tuesday, in the electronics department of the Hayden, Idaho, Walmart. Kootenai County sheriffs said her son, sitting in the front of a shopping cart, reached into Rutledge’s purse, found her weapon and shot his mother.

      “I mean, this is a pretty tragic incident right now that we’re dealing with,” Kootenai lieutenant Stu Miller told reporters on Tuesday. “When you have young children, small people, holiday season – it’s not a pleasant experience.”

      While shopping with her son and nieces in the store, Rutledge carried a loaded small-caliber handgun zippered in a pocket in her purse. The purse was a Christmas gift from her husband, Colt Rutledge, one designed specifically for concealed carry, the Washington Post reported.

    • Killer Drones Are a Lethal Extension of American Exceptionalism

      In his 2009 acceptance speech for the Nobel Peace Prize, President Barack Obama declared, “Where force is necessary, we have a moral and strategic interest in binding ourselves to certain rules of conduct. And even as we confront a vicious adversary that abides by no rules, I believe the United States of America must remain a standard bearer in the conduct of war.” By the time Obama accepted the award, one year into his presidency, he had ordered more drone strikes than George W. Bush had authorized during his two presidential terms.

      The Bush administration detained and tortured suspected terrorists. The Obama administration has chosen to illegally assassinate them, often with the use of drones. The continued indefinite detention of men at Guantánamo belies Obama’s pledge two days after his first inauguration to close the prison camp there. However, Obama has added only one detainee to the Guantánamo roster. “This government has decided that instead of detaining members of al-Qaida [at Guantánamo] they are going to kill them,” according to John Bellinger, who formulated the Bush administration’s drone policy.

    • Congress AWOL on predator drone killings

      Evidence in the public domain suggests that predator drone strikes are doing more harm than good.

      That is not surprising. The Senate Intelligence Committee report released recently similarly showed that post-9/11 torture did not work on al Qaeda detainees and facilitated international terrorist recruitment.

      Yet Congress has been derelict in failing to conduct comprehensive oversight hearings to appraise the predator drone program. They would probably provoke legislation to terminate the professedly targeted killings because they create more terrorists or terrorist sympathizers than they eliminate.

    • Opinion: The dirty side of ‘clean’ warfare

      The German public has reacted with surprise to headlines that the Bundeswehr passed on so-called “kill lists” of Afghan “terrorists” to the US. Admitting the truth can be painful at times, says Kersten Knipp.

    • Noor was ‘on NATO kill list’: Spiegel
    • Merkel pressured over targeted killings in Afghanistan

      German weekly Der Spiegel published secret NATO documents revealing a list of around 750 suspected Taliban officials, some of whom were killed without charge or trial.

      Opposition parties demanded an explanation from Chancellor Angela Merkel Tuesday after a German newspaper published secret documents suggesting Germany had provided intelligence for targeted killings of Taliban members in Afghanistan.

    • Merkel pressured over targeted killings in Afghanistan
    • Renaming Afghan War, renaming murder

      The U.S.-led NATO war on Afghanistan has lasted so long they’ve decided to rename it, declare the old war over, and announce a brand new war they’re just sure you’re going to love.

      The war thus far has lasted as long as U.S. participation in World War II plus U.S. participation in World War I, plus the Korean War, plus the Spanish American War, plus the full length of the U.S. war on the Philippines, combined with the whole duration of the Mexican American War.

    • Social Control in America, Police Enforcement of “Minor Crimes”

      In the United States in 2014, you may be arrested for selling loose cigarettes, jumping turnstiles, dancing on the subways, and having small amounts of marijuana, but not for assassination, torture, anal rape, illegal surveillance, or invading, occupying and bombing sovereign countries.

    • “Distancing Acts:” Private Mercenaries and the War on Terror in American Foreign Policy

      At the time, Weiss was one of at least 48,000 corporate soldiers working in Iraq for more than 170 private military companies (PMCs), with another 30,000 to 100,000 serving in Afghanistan at any given point during the war along with thousands more who performed menial tasks like cooking and cleaning for marginal pay.2 Though the Pentagon claims not to keep records on mercenary fatalities, over 1,000 mercenaries are estimated to have been killed in Iraq and another 2,500 in Afghanistan, including eight who worked for the CIA, with thousands more wounded.3 A 1989 UN treaty, which the U.S. did not sign, prohibits the recruitment, training, use and financing of mercenaries, or combatants motivated to take part in hostilities by private gain, with PMCs claiming exclusion on the grounds that they play a combat support role.4 This essay details the role of PMCs in America’s long Iraq War in light of a century-long history of U.S. use of mercenary and clandestine forces throughout the world. It shows the multiple ways of mercenary war as a means of concealing military intervention from public view. The Bush administration carried these practices to extreme levels, particularly in financing organizations which profit from war and hence are dedicated to its perpetuation.

    • It’s Not the Koran, It’s Us

      The corporate media chorus willfully ignores that U.S. actions, not Islam, fuel jihadism.

    • Ukraine’s Year of Precarious Triumph [Revisionism]
    • 153 killed by drone strikes in Pakistan in 2014

      At least 153 people have been killed in 25 U.S. drone strikes in Pakistan’s restless tribal belt in 2014, according to figures from a Pakistan-based think tank.

    • Peace Activist Kathy Kelly Heads to Prison for Protesting U.S. Drone War

      Peace activist Kathy Kelly is about to begin a three-month prison sentence for protesting the U.S. drone war at a military base in Missouri earlier this year. Kelly, along with another activist, was arrested after offering bread and an indictment against drone warfare. Kelly is the co-coordinator of Voices for Creative Nonviolence, a campaign to end U.S. military and economic warfare.

    • Gaza’s children struggle to overcome nightmares of war

      Muntasser survived an Israeli strike on Gaza this summer which killed his young brother and three cousins. Five months and a suicide attempt later the Palestinian boy remains haunted by the memory.

      Just a week into the deadly 50-day July-August war, two Israeli missiles slammed into a beach in Gaza City where Muntasser Bakr, 11, was playing football with relatives.

    • The latest blockbuster from CIA Pictures: The Interview

      Co-directors Seth Rogen (who also plays a leading role) and Evan Goldberg and screenwriter Dan Sterling have created a work that consists largely of a series of unconnected vulgar jokes and gags strung over a plot that glorifies state murder. One of the sharper characterizations of the film is to be found in the emails from Sony executives, who panned The Interview as “desperately unfunny and repetitive.” The studio officials termed the film “another misfire” by Rogen and [actor James] Franco, in which “Franco proves once again that irritation is his strong suit.”

    • Stranger than Fiction: The Interview and U.S. Regime-Change Policy Toward North Korea

      Representations of North Korea as a buffoon, a menace, or both on the American big screen are at least as old and arguably as tired as the George W. Bush-era phrase, “the axis of evil.” Along with the figure of the Muslim “terrorist,” hackneyed Hollywood constructions of the “ronery” or diabolical Dr. Evil-like North Korean leader bent on world domination, the sinister race-bending North Korean spy, the robotic North Korean commando, and other post-Cold War Red/Yellow Peril bogeymen have functioned as go-to enemies for the commercial film industry’s geopolitical and racist fantasies. Explaining why the North Korean leader was the default choice for the villain in his 2014 regime-change comedy, The Interview, Seth Rogen has stated, “It’s not that controversial to label [North Korea] as bad. It’s as bad as it could be.”1 Indeed, one-dimensional caricatures of North Korea flourish in the Western media in no small part because “[w]acky dictators sell.”2 Yet when it comes to Hollywood’s North Korean regime-change narratives, the line between fact and fiction, not to mention the distinction between freedom of expression and government propaganda, is revealingly thin. Whether in Hollywood or Washington, the only permissible narrative for North Korea is what Donald Macintyre, former Seoul bureau chief for Time magazine, has called “the demonization script.”3 Not only have the dream machines of the entertainment industry long played an instrumental role within American theaters of war, but also, U.S. officials and political commentators often marshal the language of entertainment—for example, the description of U.S.-South Korea combined military exercises as “war games” and the Obama administration’s references to the Pentagon’s “playbook” with regard to North Korea—when describing U.S. military maneuvers on and around the Korean peninsula.

    • CIA releases statement on the 5 year anniversary of the murder of seven CIA agents in Afghanistan

      The suicide bomber had been recruited as a CIA informant and taken to Afghanistan to infiltrate the upper ranks of al-Qaeda. For months, he provided the Agency with independently verifiable intelligence on the terrorist network, and he promised to lead the CIA to the group’s most senior members. Instead, the asset was an al-Qaeda double agent…”

    • Ecuador: CIA justifies Reyes ‘targeting’ in 2008

      According to a secret study released by the WikiLeaks group on Dec. 18, the US Central Intelligence Agency (CIA) considers the killing of Revolutionary Armed Forces of Colombia (FARC) second-in-command Raúl Reyes by Colombian forces in Ecuadorian territory on Mar. 1, 2008 an example of ways that assassinations of rebel leaders “can play a useful role.” In addition to the Reyes case, the paper reviews the use of “high-value targeting (HVT)”—the killing or capture of top leaders—in fighting rebels in Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland and Sri Lanka. HTV can have “negative effects,” the study concludes, but the practice can “contribute to successful counterinsurgency outcomes” if used strategically. The July 9, 2009 study, marked “secret” and “NOFORN” (“no foreign nationals”), is entitled “Making High-Value Targeting Operations an Effective Counterinsurgency Tool”; it apparently forms part of a “Best Practices in Counterinsurgency” series.

      Reyes, the FARC’s chief spokesperson and negotiator, was killed when the Colombian military launched a nighttime air raid and then an incursion against a rebel encampment in Ecuador’s northeastern Sucumbíos province about three kilometers from the Colombian border. Some 19 FARC members were killed in the operation, as were four Mexican students who had been visiting the encampment while in Ecuador to attend a leftist conference. Although the Colombian government and the media treated the attack as a simple raid against a group of rebels, the CIA study refers to it as part of a number of “successful HVT strikes against top insurgent leaders in early 2008, in conjunction with earlier strikes against second and third-tier leaders and finance and logistics specialists.” Reyes’ death “is likely to have seriously damaged FARC discipline and morale, even among its leadership, according to a CIA field commentary.” As an example of the operation’s success, the CIA noted that “[p]ublic support for the Colombian government solidified in the wake of the killing…with President Alvaro Uribe’s approval rating increasing from the mid-70% range to as high as 84%.”

  • Finance

    • Police dismantle soup kitchen for London homeless, evict activists

      Social justice activists determined to feed the homeless have faced eviction for the second time following their attempts to open a soup kitchen in Westminster, in the heart of London. They were forcibly ousted by police Tuesday night.

      Following their eviction from a listed Victorian building near Trafalgar Square they had been occupying in the run-up to Christmas, the group decided to set up a soup kitchen outside.

      Since December 25, they had been distributing food, coffee and tea outside the vacant offices to people sleeping rough on the streets of London.

    • American Democracy Under Threat for 250 Years

      But these old works do invite us to live questions that they lived, which many of us had complacently forgotten, and which Pikettymania was an effort to remember. These are the inescapable questions of a world where the economy, including global ecology, does not take care of itself, and where it may come into conflict with democracy. They are questions for a world where we need to get clearer on what we mean by democracy, and what we lose when we neglect or betray it.

    • French ‘rock-star’ economist Thomas Piketty refuses country’s highest honor

      France’s star economist Thomas Piketty, who shot to fame and topped best-seller lists in 2014 with his controversial book on wealth and inequality, has declined the country’s highest award, the Legion d’Honneur, local media said on Thursday.

      “I refuse this nomination because I don’t think it’s up to a government to say who is honorable,” Piketty told AFP news agency. “They would do better to focus on reviving growth in France and Europe.”

  • PR/AstroTurf/Lobbying

    • Brands pay Twitter to falsely appear in your following list

      A Twitter advertising technique is perturbing people. Promoted brands like MasterCard and IFC are appearing in the list of accounts some users follow, even if they don’t actually follow them.

      Sources familiar with the company’s advertising strategy tell me this has been occurring since early 2013, but the public has only just now cottoned onto it thanks to actor William Shatner (of Star Trek fame). Shatner brought attention to it after he saw that “MasterCard” appeared in his following list despite the fact that he didn’t follow it. He did a little investigation and discovered that the same promoted account appeared on Dwayne Johnson’s follower list, looking a little out of place given “The Rock” only followed one other account.

    • Murdoch, Scaife and CIA Propaganda

      The rapid expansion of America’s right-wing media began in the 1980s as the Reagan administration coordinated foreign policy initiatives with conservative media executives, including Rupert Murdoch, and then cleared away regulatory hurdles, reports Robert Parry.

  • Censorship

    • Air Canada Blocks Access To Any Google Hosted RSS Feed (Including Techdirt) For No Good Reason

      The block here is clearly not directed at Techdirt, but rather at Google’s Feedproxy service — which was formerly Feedburner, a company Google bought years ago. Many, many, many sites that have RSS feeds use Google’s service as it makes it much easier to manage your RSS feed and to do some basic analytics on it.

      In this case, it appears that Air Canada has (for reasons unknown) wasted good money on a company called “Datavalet” which offers “Guest Access Management” for companies who offer WiFi access to customers. Datavalet proudly highlights Air Canada and famed Canadian donut chain Tim Hortons among its customers.

    • China Echoes America’s NSA in Fresh Crackdown on Gmail

      Some users were also able to access Gmail via cell phone clients on Google’s Android, the top mobile operating system in China.

  • Privacy

    • The Android Apps That Collect the Most Data on You

      Apps often need permission to access other stuff on your phone to work. What is less obvious is the breadth of information collected, and why it gets scooped up. Vocativ put together a list of common permissions from popular Android apps, calling it a “barometer of what app makers think they can get away with.”

    • How Facebook Killed Our Class Reunion

      I remember being excited senior year of high school when thinking about our future class reunion. My excitement stemmed from a movie I had watched. In the movie, the star was the ugly duckling growing up. When he arrived at his class reunion, he was a rich hunk with a gorgeous bride. I couldn’t wait to be “that guy”. I also couldn’t wait for all of the “popular kids” to show up at this future class reunion fat and strung out. It was going to be GREAT.

      As it turns out, I was entirely wrong. NOBODY showed up at our class reunion. Because we never had one. And I blame Facebook. The social media giant has helped us all become closer apart.

    • Tor de farce: NSA fails to decrypt anonymised network

      A new round of NSA documents snatched by master blabbermouth Edward Snowden appeared online late on Sunday, revealing spooks’ internet security pet hates.

      The latest dump of PDFs published by Der Spiegel appeared to show what the Five Eyes surveillance buddies – the USA, the UK, Australia, Canada and New Zealand – see as obstacles posed by internet security protocols.

    • Snowden files reveal NSA had ‘major problems’ tracking Tor dark web users and cracking encryption

      Although it’s now well known that US spy agency NSA and its British cousin GCHQ were able to monitor, collect, and analyse our digital communications, a new report reveals which encrypted programmes gave the spy agencies a headache.

    • Leaked NSA Documents Reveal The Best Way To Stay Anonymous Online

      It’s not easy to truly be anonymous online. Sure, there are plenty of chat apps and secret-sharing sites that claim to offer you privacy, but it’s tricky to know whether US intelligence agencies have a backdoor in them or not.

      The best way to stay anonymous online has been to use Tor, a special kind of web browser developed to help US government employees hide their tracks online.

    • Leaked NSA Documents Reveal How To Hide From The NSA

      If you want a truly anonymous life, then maybe it’s time you learned about Tor, CSpace and ZRTP.

      These three technologies could help people hide their activities from the National Security Agency, according to NSA documents newly obtained from the archive of former contractor Edward Snowden by the German magazine Der Spiegel.

    • Latest Snowden Revelations Expose Scope Of NSA Interceptions

      But perhaps more significantly, the revelations culled from the trove of documents leaked by Edward Snowden show the forms of encryption the NSA struggled to break (at least at the time of the documents in 2012). That list includes PGP, Tor, CSpace, OTR and ZRTP.

      [...]

      Another alarming statistic from the article is the number of https connections, the type of secure connections used by sites like Facebook, that the agency intercepts. One document showed that by late 2012, the NSA was cracking 10 million such connections a day.

    • EFF: What we learned about NSA spying in 2014 and what we’re fighting to expose in 2015

      After a banner year for shedding light on the NSA’s secret surveillance programs in 2013, the pace of disclosures in 2014 — both from whistleblowers and through Freedom of Information Act (FOIA) lawsuits — slowed significantly.

    • Google tells WikiLeaks about emails it handed to NSA two years ago

      Google delivered a boob of a Christmas present to WikiLeaks by informing the organisation that it turned over an email account to the National Security Agency [NSA] following a request over two years ago.

      A Twitter post by WikiLeaks stated that Google contacted the group on Christmas Eve to inform them the Gmail mailboxes and account metadata of an employee were handed over to law enforcement authorities after a US federal warrant had been issued, Ars Technica reports.

    • If the Supreme Court tackles the NSA in 2015, it’ll be one of these five cases

      Roughly a year and a half since the first Snowden disclosures, there’s already been a judicial order to shut down the National Security Agency’s bulk metadata collection program.

      The lawsuit filed by Larry Klayman, a veteran conservative activist, would essentially put a stop to unchecked NSA surveillance. And at the start of 2015, he remains the only plaintiff whose case has won when fighting for privacy against the newly understood government monitoring. However, it’s currently a victory in name only—the judicial order in Klayman was stayed pending the government’s appeal.

    • This privacy-protecting app cocktail is the NSA’s worst nightmare

      The agency has identified one anonymity method that’s impossible to crack. By combining several services including Tor, VPNs, CSpace and ZRTP, Internet users would give the NSA a “catastrophic” headache, as their communications would be virtually impossible to intercept.

      This cocktail leads to a “near-total loss/lack of insight to target communications, presence,” as the NSA explains.

    • NSA has VPNs in Vulcan death grip—no, really, that’s what they call it

      The National Security Agency’s Office of Target Pursuit (OTP) maintains a team of engineers dedicated to cracking the encrypted traffic of virtual private networks (VPNs) and has developed tools that could potentially uncloak the traffic in the majority of VPNs used to secure traffic passing over the Internet today, according to documents published this week by the German news magazine Der Speigel. A slide deck from a presentation by a member of OTP’s VPN Exploitation Team, dated September 13, 2010, details the process the NSA used at that time to attack VPNs—including tools with names drawn from Star Trek and other bits of popular culture.

    • NSA’s Vulcan Death Grip on VPNs
    • What’s in the files the NSA dribbled out after its Xmas dump?

      Patrick writes, “The NSA dumped its IOB reports on Christmas Eve, except that it was short 15 files, I pointed that out, next dump was silent but an additional 12 files, I pointed out the three missing files, and as of today, the three extra files were added, but the extra 3 files have a different naming convention.”

    • NSA IOB Dump Finally Complete!

      The “Christmas Eve” NSA file dump that you will see reported at: NSA Waited Until Christmas Eve To Release Details Of Its Illegal Surveillance On Americans, What you need to know about the NSA document dump, and, U.S. Spy Agency Reports Improper Surveillance of Americans, repeated by various other sources, which never mentioned the dump being incomplete, is now complete.

      I reported in Merry Christmas From the NSA! Missing Files about 15 missing files, which by my report of: NSA IOB Report Dump – Still Missing Files had become 3 missing files and when I checked today, the NSA file dump is complete, all being silent corrections to the file dump.

    • The NSA’s Ongoing Efforts to Hide Its Lawbreaking

      Every quarter, the National Security Agency generates a report on its own lawbreaking and policy violations. The reports are classified and sent to the President’s Intelligence Oversight Board. It’s unclear what happens once they get there.

    • A New Year’s resolution for Obama: Dismantle the NSA

      Here’s a perfect New Year’s resolution: Let’s abolish the National Security Agency and prosecute its agents for spying on us. It’s perfect because it’s the right thing to do — and because it’s a promise that’s probably impossible to keep.

      On Christmas Eve, the NSA, complying with a Freedom of Information Act request from the American Civil Liberties Union, released documents showing that intelligence agents used the incredible resources of the NSA to spy on their wives, husbands, and girlfriends.

    • New Documents Reveal What the NSA Can’t Crack Yet
    • Tor, TrueCrypt, Tails topped the NSA’s ‘most wanted’ list in 2012

      Three out of three? That could be the score for the U.S. National Security Agency’s cryptographic “most wanted” list of 2012.

      In January 2012, it saw Internet traffic anonymizing tool Tor (The Onion Router), Linux distribution Tails (The Amnesic Incognito Live System) and disk encryption system TrueCrypt as the biggest threats to its ability to intercept Internet traffic and interpret other information it acquires.

      Since then, flaws have been found in Tor and the FBI has unmasked Tor users and a vulnerability was found in Tails allowing attackers to determine users’ IP addresses.

      And while a source-code audit gave TrueCrypt a relatively clean bill of health in April, TrueCrypt’s anonymous developers inexplicably abandoned the software a few weeks later, warning it was insecure.

    • Tor, TrueCrypt, Tails topped the NSA’s ‘most wanted’ in 2012, per newly revealed Snowden leaks
    • New Snowden Documents Reveal That The NSA Can’t Hack Everyone
    • New NSA leaks: does crypto still work?

      Some of the new leaks imply that the NSA is able to compromise core cryptographic Internet protocols like TLS and IPSEC. This is scary news indeed: if the underlying mathematics of crypto are compromised, then in some important sense, all bets are off. But as Green shows, the NSA does not appear to be attacking the math: instead, it has infiltrated and subverted big companies in order to steal their cryptographic certificates, which means that the companies can’t be trusted, but the math can be (probably).

    • Infiltrate the NSA

      The story of John Ashcroft and James Comey’s hospital-bed heroics has by now been told many times. On March 10, 2004, President Bush’s White House counsel, Alberto Gonzales, and chief of staff, Andrew Card, went to the intensive care unit of George Washington University Hospital to try to persuade the ill attorney general, Ashcroft, to sign off on continuing massive collection of Americans’ Internet “metadata,” a program started in October 2001. Comey, then the deputy attorney general, had refused to reauthorize the program; its most recent authorization was scheduled to expire the next day. Comey got to his boss first, and Ashcroft refused to sign. Though pushed hard by Gonzales and Card, and also by Vice President Dick Cheney and his counsel, David Addington, Comey and several of his Department of Justice colleagues stood their ground and declined to ratify this domestic metadata collection based on the president’s bare say-so.

    • NSA spying in Vienna detailed at Chaos meet

      Austrian journalist Erich Möchel delivered a presentation in Hamburg at the annual meeting of the Chaos Computer Club on Monday December 29, detailing the various locations where the US NSA has been actively collecting and processing electronic intelligence in Vienna.

    • Despite Backlash, German Govt Still Working With NSA

      The Edward Snowden leaks and the revelation of wholesale NSA surveillance of the entire planet hit a lot of people hard, but particularly in Germany, where the public knows all too well the dangers of a surveillance state. The backlash was huge, and the German government promised major changes to their relationship with the US spies.

    • Backlash in Berlin over NSA spying recedes as threat from Islamic State rises

      In a crescendo of anger over American espionage, Germany expelled the CIA’s top operative, launched an investigation of the vast U.S. surveillance programs exposed by Edward Snowden and extracted an apology from President Barack Obama for the years that U.S. spies had reportedly spent monitoring German Chancellor Angela Merkel’s cellphone.

    • Online privacy and the Edward Snowden documentary

      Laura Poitras’ new documentary about mega-leaker Edward Snowden, “Citizenfour,” makes no pretense at being evenhanded. It’s a polemic against the National Security Agency’s effort to spy on people in the United States and around the world – innocent, guilty, or simply suspect – all in the name of national security.

    • Topeka man, 89, files suit against Edward Snowden, documentary producers

      When Horace Edwards saw a recent showing of the documentary “Citizenfour,” which chronicles former National Security Agency contractor Edward Snowden’s leak of classified documents, he was aghast.

    • Secret report cited in NSA surveillance lawsuit, gov’t silent on its existence

      Civil rights and federal attorneys sparred at a hearing over a case involving domestic dragnet surveillance by the federal government. The plaintiffs argued the searches are illegal, while the government said opponents don’t have enough evidence to know.

      The hearing, requested by the Electronic Frontier Foundation (EFF) for a partial summary judgment, concerns the class action lawsuit, Jewel v. NSA, which was filed six years ago. It claims the National Security Agency (NSA) acquired AT&T customers’ e-mail and other data using surveillance devices attached to the company’s network.

    • Snowden reveals how to go ‘level 5′, give the NSA fits

      Civil rights and federal attorneys sparred at a hearing over a case involving domestic dragnet surveillance by the federal government. The plaintiffs argued the searches are illegal, while the government said opponents don’t have enough evidence to know.

      The hearing, requested by the Electronic Frontier Foundation (EFF) for a partial summary judgment, concerns the class action lawsuit, Jewel v. NSA, which was filed six years ago. It claims the National Security Agency (NSA) acquired AT&T customers’ e-mail and other data using surveillance devices attached to the company’s network.

    • Prying Eyes: Inside the NSA’s War on Internet Security

      When Christmas approaches, the spies of the Five Eyes intelligence services can look forward to a break from the arduous daily work of spying. In addition to their usual job — attempting to crack encryption all around the world — they play a game called the “Kryptos Kristmas Kwiz,” which involves solving challenging numerical and alphabetical puzzles. The proud winners of the competition are awarded “Kryptos” mugs.

  • Civil Rights

    • The law will protect any member of Congress who releases the full torture report. Someone needs to step up

      In 1971, I entered the full text of the top-secret Pentagon Papers – a history of how the US became mired in the swamp of the Vietnam War – into the Congressional Record, even as the Federal Bureau of Investigation was hunting for Daniel Ellsburg (who gave the papers to the New York Times) and President Richard Nixon and his Justice Department were filing injunctions against newspapers to prevent their publication. Subsequent case law affirmed that members of Congress may reveal any government “secret” to the public without fear of prosecution because of the “Speech and Debate” clause of the constitution, from which members derive their duty to inform the people about the actions of their government.

    • Off-Duty Cop Wrestles, Slams Woman Into Car After Fender-Bender

      After video of a man wrestling a woman and throwing her against a car came to light Tuesday, the San Jose Police Department issued a warrant – for the woman’s arrest.

      Of course the man “being assaulted” was none other than an off-duty San Jose Cop in plainclothes. The officer reportedly approached the woman – without identifying himself as a police officer – after a fender bender between their cars.

    • The Dissenter’s Top Films of 2014

      Steve Rogers, who is Captain America (Chris Evans), awakens from decades of suspended animation, to find himself in the present day when the global war on terrorism is being waged. He works for SHIELD, a powerful paramilitary spy agency that now has military drones called “hellicarriers,” which allow for assassination. As Rogers says, “I thought the punishment usually came after the crime.” Part of the reason why the agency has turned to assassination is because the agency was infiltrated, and Captain America spends the movie dealing with this.

    • Police: Man was locking, not stealing from cars

      It seemed an unlikely excuse from a man suspected of breaking into cars at an auto yard. But police say it appears a Norwalk man was being truthful when he insisted he was just checking the vehicles to make sure they were locked.

      Employees at Coating’s Auto Body caught 20-year-old Alexander Louis Friday and held him for police.

    • An Open Letter to People Who Think the Police Accountability Movement is Built on Hate

      This is a message to Allen Clifton, co-founder of Forward Progressives, and anyone else who labels the police accountability movement dangerous and hateful. Us “anti-government activists” as you called us, protesters, cop watchers, cop blockers, members of the civil rights movement; we are not hate groups as you recently proclaimed, despite being thoroughly told you are wrong in the comment section of your own article. You join the ranks of other “journalists” like Bill O’Reilly who recently attacked Cop Block and others who film the police.

    • The CIA Phoenix Program: US Government is No Stranger to Torture

      From 1967 to 1971, the Central Intelligence Agency ran a secret government operation called Phoenix. (4) At the time, the program was classified and, due to the unpopularity of the Vietnam War, it received wide public scrutiny. In fact, many war protesters called it an illegal assassination program. (5)

      The Phoenix Program’s official stated purpose was to gather intelligence on the communist Viet Cong and share that information with South Vietnamese military and government leaders. The program has been heralded a success due to its ability to “gain detailed knowledge about the Viet Cong and to disrupt that organization”. (5) So what does “disrupt” mean, exactly?

      To many detractors, it means exactly what it sounds like: assassination. In fact, the program is known to have resulted in about 20,000 deaths. (4)

      One of those is a South Vietnamese interpreter by the name of Thai Khac Chuyen. (6) Chuyen was accused of being a double agent and killed by six Special Forces soldiers in 1969, but those soldiers were never held accountable for their actions because U.S. political leaders didn’t want key witnesses to testify. Therefore, a trial for the soldiers could not be staged. This event led to Daniel Ellsberg copying key documents and releasing them to the press.

      Rightly or wrongly, the U.S. developed a reputation for murder on the battlefield, an irony not lost on political conservatives who have criticized journalists for losing the Vietnam War merely by reporting on ugly incidents like Chuyen’s assassination, and his treatment prior, and the My Lai Massacre. (7)

    • Report Implicates U.S. In Brazilian Dictatorship’s Torture Practices

      The scope of CIA torture revealed in this week’s Senate Intelligence Committee report has come as a shock to many, but America’s involvement with torture predates the terrorist attacks on 9/11. This week Brazil published its very own torture report as part of an investigation into the crimes perpetrated during the country’s 21 year-long U.S. backed military dictatorship. It confirms what historians have been writing about for years: that torture and other human rights abuses were systemic within the regime, and that the military received extensive training by the U.S. and the U.K. on torture and other repressive techniques.

    • CIA Torture’s Immeasurable Damage to U.S. Global Leadership

      Last month’s revelations about CIA torture have hurt U.S. credibility worldwide. The Senate Intelligence Committee’s report on CIA Interrogation concluded the program “created tensions with U.S. partners and allies…complicating bilateral intelligence relationships.” It said the program caused “immeasurable damage to the United States’ public standing, as well as to the United States’ longstanding global leadership on human rights in general….”

    • Udall Urged to Disclose Full Torture Report

      Sen. Mark Udall has called for the full release of the Senate Intelligence Committee’s report on torture. However, as a still-sitting member of Congress, he has a constitutional protection to read most of the still-secret report on the Senate floor — and a group of intelligence veterans urges him to do just that.

    • The Secret CIA Document That Could Unravel Case For Torture

      As the public grapples with the gruesome realities put forth in the Senate Intelligence Committee’s damning report on the CIA’s torture program, the agency has dug in to defend itself. The CIA claims the torture tactics it used in the years following 9/11 were legal and saved American lives. And despite what the Senate study alleges, the agency insists it never lied about the torture program.

    • Outgoing senator urged to release full CIA torture report

      Calls for Sen. Mark Udall (D-Colorado) to reveal the entire, unredacted CIA torture report have increased, with a group of former intelligence analysts issuing a memo that urges the outgoing legislator to read the report on the Senate floor.

    • Britain’s murky role in CIA torture

      Not long ago, in a bid to find out how effective the CIA really was at counterterrorism, U.S. President Barack Obama released a rabbit into a forest and challenged the agency to find it. The CIA spent months planting informers in the forest, interviewing forest creatures, and examining all the forest intelligence. Nothing. Finally the agency went into the forest and dragged out a soaking wet, badly beaten brown bear screaming: “Okay, okay! I’m a rabbit, I’m a rabbit!”

      [...]

      For years, the British government denied that its territory had been used for so-called “rendition” flights, in which terror suspects were illegally transported across the globe by the CIA to countries where they could be tortured. It also denied that British intelligence agencies had any involvement or knowledge of the CIA’s brutal program. The denials were supported by an ISC investigation in 2007 that gave the intelligence agencies and government a clean bill of health. The ISC reiterated its findings in 2010. – See more at: http://www.dailystar.com.lb/Opinion/Commentary/2014/Dec-30/282569-britains-murky-role-in-cia-torture.ashx#sthash.I6TN3xGP.dpuf

    • Our New Politics of Torture

      New York Review contributor Mark Danner has been writing about the use of torture by the US government since the first years after September 11. Following the release this month of the Senate’s report on the CIA torture program, Hugh Eakin spoke to Danner about some of the most startling findings of the investigation and what it reveals about the continued political debate surrounding the program.

    • The CIA’s Torture Program Breeds Hate

      Norman Pollack: The antecedent question, not did the CIA deceive these administrations about the efficacy of EITs, but, as the Senate Report claims, were the administrations even aware of the programs? The Senate Report is seeking to give Obama deniability—i.e., that he was kept in the dark—lest he be held accountable for war crimes. I am in no position to judge whether EITs yielded relevant information. But on solidification of security, no; if anything, torture has turned much of the world against America, and has created the basis for the rise of militant groups and the desire for retribution.

    • Nothing ‘awesome’ about CIA torture – Ramzy Baroud

      But CIA torture being a “stain” on an otherwise flawless record doesn’t suffice either. In fact, in some way, this logic is the heart of the problem, since it blocks any attempt at honest reading of whatever “values” Washington stands for, and tries to achieve, using “soft diplomacy” of “rectal feeding.”

      What is equally worrying to what the report has contained is the existing mindset in the US, among the ruling class and the media.

      This reality can be best summarised in the words of a Fox News show co-host, Andrea Tantaros: “The United States of America is awesome, we are awesome,” she exclaimed.

      “The reason they want to have this discussion is not to show how awesome we are. This administration wants to have this discussion to show us how we’re not awesome.”

      With such overriding thoughtless mindset, there is little evidence to show that such “awesomeness” will cease any time soon, even if at the expense of many innocent people. – December 27, 2014.

    • ​Gitmo command ordered inmates chained to ceiling, degraded, tortured – ex-FBI specialist

      The recent CIA torture report revealed the agency’s inhumane practices of interrogation during the War on Terror. However, some people claim the information gathered through torture proved valuable and saved lives – but is that so? Is information gathered this way even reliable? Will the CIA stop its practices now the truth is out? And what about the inmates of Guantanamo Bay? What has been done to them? To find answers to these questions and many more, we speak to former FBI criminal profiler Jim Clemente on Sophie&Co today.

    • View from abroad: US loses moral high ground after CIA report

      When the US Senate report on the CIA’s torture campaign was released recently, the State Department sent out a warning to US missions abroad to beware of a possible backlash. In the event, beyond indignant newspaper editorials, the international reaction has been somewhat muted.

    • There is no debate about torture

      The Senate Intelligence Committee’s scathing torture report not only described the brutality of the CIA’s interrogation methods, but also demonstrated their ineffectiveness. Led by ex-Vice President Dick Cheney, former Bush administration officials have rushed to the airwaves to defend the CIA.

      “I would do it again in a minute,” Cheney said on NBC’s Meet the Press, claiming that Enhanced Interrogation Techniques (EITs) produced “actionable intelligence that kept us safe from attacks”.

    • He was tortured for three years. Now he’s fighting against it — and denouncing the CIA

      Nearly four decades later, Perico Rodriguez recalls his torture. He fought to breathe. Prison guards had blindfolded him and chained him to a bunk-bed. They tied his hands behind his back and shoved his face into a bucket of water.

      The technique was known as El Submarino, a cousin of waterboarding used during Argentina’s “Dirty War”. His lungs, he said, never recovered.

    • Ministers STILL won’t tell truth about torture: Foreign Office refuses to give details of UK meetings with team behind CIA dossier

      Ministers faced fresh accusations of a cover-up last night after refusing to reveal crucial details of British meetings with US politicians investigating CIA torture.

      Home Secretary Theresa May was one of several British politicians and envoys who paid 24 visits to senior members of the Senate Intelligence Committee as it investigated barbaric techniques used on terror suspects.

      The disclosure has fuelled claims that the Government desperately lobbied to keep allegations of Britain’s complicity in torture out of the committee’s damning report

    • Letter: CIA and torture

      Mr. Olszewski states that millions of Americans who died protecting our freedom would have no problem with a little physical and psychological torture.

      I would like to know who or how many of these Americans who died elected him to act as their spokesman regarding their mindsets about torture.

      For your edification, Mr. Olszewski, these fun and games the CIA played resulted in a detainee meeting his death by drowning from hypothermia while being waterboarded. A second detainee died from hypothermia while being handcuffed to his cell wall without any clothing in freezing temperatures.

      We hanged German leaders who were responsible for torturing people, after they were found guilty of these crimes at the Nuremberg trials.

    • Numbers Game: What CIA Torture Report Has Shown (Other Than Torture)

      ‘American people have a right – indeed, a responsibility – to know what was done in their name; how these practices did or did not serve our interests; and how they comported with our most important values,” says John McCain. But he seems to be alone among pro-torture, CIA-supporting politicians.

      Indeed, McCain’s views on the subject seem highly unpopular in the Republican Party. Reactions pretty much sum up to various forms of denial, fear mongering and finger-pointing. ‘This release could endanger the lives of Americans overseas, jeopardize U.S. relations with foreign partners, potentially incite violence, create political problems for our allies, and be used as a recruitment tool for our enemies,’ say Republican Senators Marco Rubio and Jim Risch. One might argue that most of the world suspected the CIA of torture anyways, not to mention a level of anti-American notions in certain parts of the world that have been stable for a long time, but who cares, let’s panic.

    • The Prosecution of the CIA Whistleblower Who Revealed Waterboarding to the World

      CIA Torture Program Whistleblower John Kiriakou was sentenced to 30 months in prison while those he exposed still remain free.

    • Human rights act stops CIA abuses, says former Attorney General
    • Senior Tory defends Human Rights Act as a bastion against abuses like those exposed in the CIA torture report

      Former attorney general Dominic Grieve has said “egregious” behaviour like the CIA torture techniques would not occur in Britain because of the European Convention on Human Rights.

      His intervention comes amid a bitter dispute within the Conservative party over the leadership’s plan to stop British laws being overruled by European judges.

      Mr Grieve has criticised his party’s proposals for a new Bill of Rights which proponents said would give UK courts and Parliament the final say over Europe.

    • European Convention on Human Rights ‘stops egregious acts’
    • CONVENTION ‘STOPS EGREGIOUS ACTS’
    • Employees who expose wrongdoing pay a price

      When Ilana Greenstein blew the whistle on mismanagement at the CIA, she tried to follow all the proper procedures.

      First, she told her supervisors that she believed the agency had bungled its spying operations in Baghdad. Then, she wrote a letter to the director of the agency.

    • CIA whistleblower being treated like ‘traitor’

      A former CIA case officer has gone public with claims of retaliation against her from the bureau after she tried to report her concerns over the misconduct of colleagues in the intelligence service.

      “I don’t believe in breaking the law, I don’t believe in leaks, I don’t believe in divulging classified information,” stated Ilana Greenstein in a video interview released by McClatchy DC, a Washington-based journalistic bureau on Tuesday. “What I believe in is a good internal system, where people who have concerns can voice those concerns without recrimination.”

    • New developments concerning report on CIA torture

      Colonel Lawrence Wilkerson, who was chief of staff to Secretary of State Colin Powell from 2002 to 2005, accused the CIA of having operated this torture-based conditioning program to fabricated the evidence that provided the rationale for going to war against Iraq [2].

    • Ireland seeks clarification from US on Shannon flights

      Foreign Affairs Minister Charlie Flanagan is seeking clarification from the US government on whether evidence was uncovered in a recent US Senate intelligence committee report of Shannon Airport being used by the CIA for extraordinary rendition.

    • Ireland seeks clarification from US over Shannon

      The Minister for Foreign Affairs and Trade has confirmed he is seeking clarification from the US Government whether any evidence of Shannon Airport being used by the CIA for extraordinary rendition was uncovered in a recent U.S. Senate Intelligence Committee report.

      Minister Charlie Flanagan had been asked by Dublin South West Sinn Féin TD Seán Crowe whether he was aware of the report and revelations about CIA torture of detainees.

    • CIA rendition flights and Shannon

      Simon Carswell’s article on Shannon Airport and renditions (“Bush assured Irish State Shannon not used for rendition flights”, December 22nd) provides an important insight into the concerns that two former Irish ministers had in relation to the CIA’s torture and renditions programme.

      Dermot Ahern was minister for foreign affairs and Michael McDowell was minister for justice when a report by Dick Marty for the parliamentary assembly of the Council of Europe identified Ireland and Shannon as a stopover point for rendition flights. Nonetheless the government failed to take decisive action, apart, it would seem, from asking the US government if it was taking prisoners through Shannon. The US government’s response to such questions can hardly have been a surprise to the ministers.

    • U.S. policy hypocrisy evident in CIA torture

      We practiced tortures that we have prosecuted after real war and condemned when used by other countries that could as legitimately claim “national security” as we did. So, it’s not a question of Congress not clearly prohibiting torture, it’s we as a nation allowing our representatives to turn a blind eye to it.

  • Intellectual Monopolies

    • Copyrights

      • What Could Have Entered the Public Domain on January 1, 2015?

        Current US law extends copyright for 70 years after the date of the author’s death, and corporate “works-for-hire” are copyrighted for 95 years after publication. But prior to the 1976 Copyright Act (which became effective in 1978), the maximum copyright term was 56 years—an initial term of 28 years, renewable for another 28 years. Under those laws, works published in 1958 would enter the public domain on January 1, 2015, where they would be “free as the air to common use.” Under current copyright law, we’ll have to wait until 2054.1 And no published works will enter our public domain until 2019. The laws in other countries are different—thousands of works are entering the public domain in Canada and the EU on January 1.

12.31.14

Links 31/12/2014: GNU/Linux in Xiaomi Laptops, Chromebooks Runs GNU/Linux in Browser

Posted in News Roundup at 10:09 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Scarlett Johansson’s Lucy Prefers Debian with Xfce – Video

    Linux systems have been spotted in all sorts of interesting places, but they don’t usually make their ways into the movies. Well, from the looks of it, a Linux system has been used in Luc Besson’s Lucy.

  • 2015: If wishes were penguins, everyone would fly

    It’s the end of yet another year. I’m not going to go on record to say that 2015 will finally, finally, finally be the year of Linux! It may, but it may not. What I will go on the record for is to say what my personal Linux and open-source wishes for Linux are in the coming year. They aren’t many, and they aren’t tilting at any given windmill … they just are.

    I’ve already made my “predictions” for Linux in my post “2015 will be the year Linux takes over the enterprise (and other predictions)”. This time, however, I want to take a look at what might be necessary for some of those predictions to actually come true.

  • Desktop Linux and Open Source in 2014: Looking Back

    Clichéd though they may be, year-in-review pieces about desktop Linux—by which I mean Linux distributions designed for end users working on desktops, PCs and, perhaps, large-form mobile devices—are a tradition here at The VAR Guy (and, before that, at our late, great sister-site, WorksWithU, a blog dedicated to Ubuntu Linux). But at the end of 2014, there’s not much to say about desktop Linux other than that it’s now so mature, and open source momentum so focused on other niches, that the Linux desktop has seen little major action over the past 12 months.

  • Purism Librem 15

    While the Librem 15 doesn’t necessarily match my personal tastes for laptop hardware due to the overall size and the mouse in particular, the mission of the company definitely does. Up until this point there were few options for laptops that ran purely Free Software, much less any that had modern hardware and a modern look and feel. I believe Purism genuinely wants to create a quality laptop that will appeal both to the Free Software community as well as privacy advocates and the Librem 15 is a nice start. In this era of pervasive surveillance, rootkits bundled with corporate software, threats of hardware backdoors by nation states, and the overall increasing sophistication of attacks, I think Purism is on to something here. As more people value transparency as a means toward security, a computer that can provide the source code for every driver, application, and firmware it uses becomes more valuable.

  • Xiaomi Said to Launch a Linux Notebook

    Xiaomi is quickly becoming a major player in the tech gadget space. It’s already a huge smartphone maker in China, though has started to spread its wings into other arenas as well. Next up may be a new laptop, at least according to some specs that were recently provided by GizmoChina. As you’ll note from the image above, this looks like a MacBook Air – but don’t let that fool you just yet.

    GizmoChina says that the Xiaomi notebook, powered by Linux, may cost under $500, though the specs suggest it may cost a bit more than that. The site says Xiaomi’s notebook will pack an Intel Core i7 Haswell processor, a 15-inch 1920 x 1080-pixel display and a solid 16GB of RAM. There’s no news on what sort of storage this will pack, though if it’s as thin as the picture suggests, it may have a solid state hard drive as well.

  • Desktop

  • Server

    • Docker Reigned in 2014, But Competition is Coming

      Container technology was without a doubt one of the biggest stories of 2014, and if you mention the container arena to most people, Docker is what they think of. As impressive as Docker is, as recently as June of last year, OStatic highlighted some of its instabilities.

  • Kernel Space

    • The Lead Developers Of systemd

      Fedora contributor Tomasz Torcz has taken a fresh look at what individuals and companies are the largest contributors to systemd.

    • Who wrote systemd?

      When it comes to systemd middleware, Lennart Poettering often takes the blame and has sole authorship attributed. But there are many more developers (git shows 593 authors in total) – missing their portion of berating, thus unappreciated and unhappy. Over the Winter Holidays I’ve run LWN’s “who wrote” scripts to gather more insight into systemd’s developer base.

    • Systemd Development Skyrocketed This Year

      Rising above all of the systemd controversies and in-fighting this year, systemd developers remained committed and did a heck of a job at adding code to the project.

      As some complementary development statistics for systemd focused on 2014 to yesterday’s lead developers of systemd article, I ran GitStats this morning on the latest end-of-year systemd mainline Git repository. The numbers speak for themselves and systemd grew significantly this year.

    • Graphics Stack

    • Benchmarks

      • Nouveau vs. NVIDIA GeForce Linux Performance At The End Of 2014

        Testing for this article was done using the same Core i7 4790K Haswell system as used by the other recent Linux graphics tests. Ubuntu 14.10 x86_64 was running on the system with the Unity 7.3.1 desktop and X.Org Server 1.16.0. The open-source Nouveau driver consisted of the Linux 3.18.0 kernel, Mesa 10.5.0-devel, and xf86-video-nouveau DDX Git. The proprietary NVIDIA Linux driver used was the latest NVIDIA 346.22 beta driver release from earlier this month.

      • Intel Haswell Linux OpenGL Driver Catching Up To The Intel Windows Driver

        Past Intel Windows vs. Linux graphics driver benchmarks have shown that for Haswell the OpenGL performance on Linux generally comes up short of the proprietary Windows driver. Fortunately, the Intel open-source Linux driver improved a lot this year and is now more competitive to the Windows driver.

        My latest end-of-year testing was comparing the Intel Linux graphics performance over the past year to Microsoft Windows with the latest proprietary driver (v10.18.10.3960).

  • Applications

  • Desktop Environments/WMs

    • Despite Rumors, Xfce Alive & Kicking

      Rumors: They exist, for better or worse, and there’s not much you can do about them. In addition, rumors are the starting blocks for the old Churchill adage that “a lie gets halfway around the world before the truth has a chance to get its pants on.”

      Three times this month, Xfce came up in conversation — online, of course, and in the realm of social media and in forum discussions — and the context in which each conversation came up had the desktop on the brink of closure, with one unwitting person saying that Xfce was dead.

    • GNOME Desktop/GTK

      • Does Using GNOME On Wayland Save Power?

        One of the commonly asked questions is whether using Wayland will be more power efficient or save power compared to running the same software under an X.Org Server environment. Here’s a simple test of GNOME on Wayland in Fedora 21 while monitoring a laptop’s battery use.

        After yesterday’s Fedora 21 Gaming Benchmarks: X.Org vs. XWayland To End 2014 I ran a simple comparison just looking at the system power consumption while engaging with the GNOME 3.14.2 desktop environment under X.Org Server 1.16 and when running under Wayland.

      • GNOME 2014 Highlights

        Early in the spring Karen Sandler announced her departure* as the Executive Director of the foundation.

        The GNOME Asia Summit, an event with a strong community building focus, was this year hosted in Beijing, China. In the end of July the GNOME community gathered for GUADEC in the beautiful city of Strasbourg, France for a week of talks, discussions and hacking.

      • The GNOME Progress & Events That Defined 2014

        The GNOME project had a rather splendid year with significant progress made in porting GNOME’s components to Wayland, adding many features to the GTK+ tool-kit, enabling OpenGL support in GTK+, and improvements to the many GNOME applications.

  • Distributions

    • OpenELEC lightweight Linux adds Kodi 14 support

      Version 5.0 of the RPi-compatible, Kodi/XBMC-oriented OpenELEC Linux distro for media players upgrades to Kodi 14, adds i.MX6 support, and drops AppleTV.

    • OpenELEC 5.0 released
    • New Releases

      • Back-up Your Linux OS with Clonezilla Live

        Clonezilla Live, a Linux distribution based on DRBL, Partclone, and udpcast that allows users to do bare metal backup and recovery, is now at version 2.3.2-2. Users should be able to download it and test it.

      • Chapter 21. Release 14.12 (“Caterpillar”, 2014/12/30)

        In addition to numerous new and upgraded packages, this release has the following highlights:

        Systemd has been updated to version 217, which has numerous improvements.

        Nix has been updated to 1.8.

        NixOS is now based on Glibc 2.20.

        KDE has been updated to 4.14.

        The default Linux kernel has been updated to 3.14.

      • NixOS 14.12 Released To End Out 2014

        NixOS 14.12 stable is codenamed “Caterpillar” and includes Nix 1.8 for package management and a wide collection of package updates. The release announcement by Domen Kožar details, “11972 commits were pushed by 310 contributors since the last release (14.04).”

      • Linux Deepin 2014.2 Makes It Out Just In Time For The New Year

        Deepin Linux with its original desktop environment claims to have been downloaded tens of millions of times and in use in more than 40 countries around the globe. Deepin 2014.2 delivers new themes, drag-and-drop reordering support for the Dock icons, launcher improvements, improved multi-screen support, network improvements, system notification improvements, tablet support, and other updates focused around its HTML5-based desktop.

      • deepin 2014.2正式版发布——自由·独特·前卫
    • Screenshots

    • Red Hat Family

    • Debian Family

      • Debian Project News – December 29th, 2014

        Debian Project News – December 29th, 2014

      • Derivatives

        • Canonical/Ubuntu

          • Ubuntu Used to Analyse Data from Famous Comet-Hunting Rosetta Space Probe

            Rosetta is the space probe that was sent to meet the Churyumov–Gerasimenko comet and that carried the Philae lander, which eventually made a touchdown on the comet itself. It looks like the guys who are analyzing the data sent by the probe are also using Ubuntu.

          • Ubuntu operating system worth trying as it wins 3 consecutive awards from W3tech
          • Ubuntu Terminal Reboot Is Probably One of the Coolest Terminals You’ve Seen

            Developers have reinvented the terminal numerous times and there are a ton of various apps out there that do the same thing. Now, an “Ubuntu terminal reboot” has surfaced and it’s glorious.

          • $100 Bay Trail PC-on-a-stick can run Ubuntu (and Windows)

            The MeegoPad T01 is a tiny PC-on-a-stick with an Intel Atom Bay Trail processor, 2GB of RAM, and Windows 8.1 software. It sells for around $100 and up.

            Just plug the stick into the HDMI port of a display, connect a power source, and you’ve got a desktop computer (with the processing power of a cheap Windows tablet).

            But what if you’d rather run Ubuntu? Yep. You can do that.

          • Upstart MJ Technology To Launch ‘Ubuntu Edge’-Like Tablet Early 2015

            Last year, Canonical tried to crowdfund its own smartphone that would run the company’s “Ubuntu Touch” operating system. The smartphone was called “Ubuntu Edge” and would come with a unique design, 4 GB of RAM, a quad-core processor, sapphire screen and 128 GB of storage.

            The campaign ultimately failed, reaching less than half of its ambitious goal of $32 million. Since then, we haven’t actually seen a commercially available device running Ubuntu Touch.

            A new start-up called MJ Technology promises to build a tablet that will look like the Ubuntu Edge smartphone Canonical wanted to build, and it will run Ubuntu.

          • Shuttleworth Explains Why Open Source is More Secure than Closed Source [VIDEO]

            In 2014, open source technology came under a heavy barrage of criticism as a result of high-profile security vulnerabilities. Mark Shuttleworth, the founder of Ubuntu Linux and its lead commercial sponsor Ubuntu, has a very different view and remains a stalwart defender of the open source model for software development and security.

            In a video interview with Datamation, Shuttleworth details his view on open-source security as Ubuntu Linux celebrates its 10th anniversary.

            In 2014, the Heartbleed vulnerability in the open source OpenSSL cryptographic library had wide ranging impact. OpenSSL is widely deployed on servers, VPNs and even mobile devices and it took some time for vendors and users to get systems and devices patched.

            “We have a big responsibility to proactively make sure that the system is as robust in the face of inevitable flaws as it can be,” Shuttleworth said.

          • 12 Months, 12 Highlights: This was Ubuntu in 2014
          • Windows Phone Replaced with Ubuntu 14.04 LTS on Lumia 1020

            Windows phone (Lumia 1020) is probably the last place where you would expect to see Ubuntu, but a user has posted images with Ubuntu running on this device and they seem to be legit.

            The first thing that users might think is that someone ported Ubuntu Touch for the Lumia 1020 device and that would not be an impossible task. It would be difficult but not impossible. It would also be a difficult to install a custom ROM, but that’s also not impossible. The interesting thing is that the images show an Ubuntu system running and not the Touch version.

          • Flavours and Variants

            • Pear OS Is Making a Comeback – Rumor

              Pear OS was a Linux distribution based on Ubuntu that imitated the Mac OS X desktop environment with great accuracy. It disappeared rather mysteriously roughly a year ago, and no one has heard anything of it ever since. Now, an image has been ported on a remote and obscure part of the Internet that shows that Pear OS might be making a comeback.

            • Pear Returning, In the Movies, and More Highlights

              Today in Linux news Softpedia.com is reporting that Pear OS is making signs of a comeback. In other news, Debian is spotted in a new movie and Phil Shapiro shares a cheap laptop story. We have 2014 highlights on Ubuntu, GNOME, and FOSS in general as well as Jack Wallen’s wishes for the new year.

  • Devices/Embedded

    • Micro-UAV controller features open, modifiable design

      The AeroCore 2 is an update to the original AeroCore controller introduced last Spring. Like most hacker-oriented UAV autopilots, both AeroCore models run Nuttx RTOS for real-time control tasks, along with Linux for higher level functions.

    • Raspberry Pi: Raspbian and NOOBS releases

      What better way to spend the holidays, and prepare for the New Year, than with a new release of Raspbian (Debian GNU/Linux specifically for the Raspberry Pi), and a new NOOBS package?

      For those who don’t have a Raspberry Pi (or more than one) already, or might have just gotten one for Christmas, the foundation has posted a Got a new Pi article. I also wrote a number of Hands-On with Raspberry Pi posts last Christmas, which include a lot more detail and lots of screen shots.

      The new Raspbian release (2014-12-24) and a new NOOBS package (1.3.11) are available for download in the usual ZIP format on the Raspberry Pi downloads page. The NOOBS image also includes Pidora, Arch Linux, openELEC, RaspBMC and RiscOS.

    • Ringing in 2015 with 40 Linux-friendly hacker SBCs

      2014 brought us plenty of new open-spec, community-backed SBCs — from $35 bargains, to octa-core powerhouses — and all with Linux or Android support.

    • Phones

    • Sub-notebooks/Tablets

      • UK retailers in TABLET PRICE SLASH BONANZA

        You can buy tablets for under £30, but for just over that (including shipping) you can get a 7” Quad Core device, and Amazon is now chock-a-block with cheap tablets. Even retail outlets, with brand name tablets, will do you a massive discount.

      • The Year Of The Small Cheap Tablet In UK

        The more competitive the market for personal computing, the more innovative will be OEMs and retailers. I expect many more will ship GNU/Linux just to be different or to offer something new. 2015 could be the last year retail shelves exclude GNU/Linux anywhere. The monopoly is truly dead.

Free Software/Open Source

  • Apache Markes Year’s End By Graduating Two Big Data Projects

    As this year draws to a close, it’s worth taking note of two important projects from the Apache Software Foundation (ASF) that have graduated to top-tier project status, ensuring them development resources and more. Apache MetaModel went from the Apache Incubator to become a Top Level Project. It provides a model for interacting with data based on metadata, and developers can use it to go beyond just physical data layers to work with most any forms of data.

    Meanwhile, we’ve also covered the news of Apache Drill graduating to Top Level Project status. Drill is billed as the world’s first schema-free SQL query engine that delivers real-time insights by removing the constraint of building and maintaining schemas before data can be analyzed.

  • 2014’s Five Biggest Stories Affecting FOSS
  • Funding

    • Anonabox Gets Kicked from Kickstarter, Shows Up on Indiegogo with Updated Specs

      The online community tore the project apart and discovered that the makers of Anonabox were disingenuous when they were saying that it was something original, custom built. As it turned out, it was actually a repurposed Chinese device with a slightly better memory. Also, the operating system used was OpenWRT, which is basically Linux distro for routers and other such devices. Most, if not all of the information provided on Kickstarter was a lie. Eventually, the Kickstarter project was suspended and no one got hurt, financially.

  • FSF/FSFE/GNU/SFLC

  • Public Services/Government

    • Deputy CTO UK: ODF is a ‘big change’

      The UK government’s 400 IT departments are preparing their organisations for the use of the Open Document Format (ODF) as the default for its editable documents. The process should avoid making civil servants and other end-users bear the brunt of the switch, says Magnus Falk, deputy chief technology officer (CTO) of the UK government. “To unlock our digital documents, we’re leading a digital transformation.”

    • Spanish region Galicia publishes training materials for Linux and LibreOffice

      Amtega, Galicia’s agency for technological modernisation, has published its training materials for Linux and LibreOffice under an open license. They can be used by training centres, organisations and individuals to prepare for the office productivity CODIX certification provided by the CeMIT network.

    • 5100+ signatures for open formats in the French educational system

      More than 5100 people have signed the call to promote open formats and interoperability in the French educational system, a campaign initiated in November by April, France’s free software advocacy group. Their call for interoperability in the education system (Appel pour l’intéropérabilité dans l’Education Nationale) is supported by 100 teachers, as well as employees and school trade unions.

  • Openness/Sharing

    • Open Data

      • Open data partnership between city and county of Durham, NC

        Open data has found the most innovation at the local government level. While not taking away from te efforts of data.gov and the state initiatives, local data has more impact on the day to day lives of civil society. A wealth of city and county public data exists, but accessing it can sometimes be time consuming. Now, thanks to a new local government partnership, open data in Durham is just months away from becoming a reality.

    • Open Hardware

      • Turn on your computer from anywhere with an Arduino Server

        Unless you live off-the-grid and have abundant free electricity, leaving your rig on while you go away on trips is hardly economic. So if you’re like [Josh Forwood] and you happen to use a remote desktop client all the time while on the road, you might be interested in this little hack he threw together. It’s a remote Power-On-PC from anywhere device.

        It’s actually incredibly simple. Just one Arduino. He’s piggybacking off of the excellent Teleduino software by [Nathan] who actually gave him a hand manipulating it for his purpose. The Arduino runs as a low-power server which allows [Josh] to access it via a secure website login. From there, he can send a WOL packet to his various computers to wake them up.

  • Programming

    • PHP Install Statistics

      …over 78% of all PHP installs have at least one known security vulnerability.

    • Performance Analysis With Performance Co-Pilot, iPython and Pandas

      One of many reasons to love Performance Co-Pilot, is the fact that it is a fully fledged framework to do performance analysis. It makes it extremely simple to extend and to build anything on top of it. In this post we shall explore how simple it is to analyze your performance data using iPython and pandas.

    • New Language from MIT Streamlines Building SQL-Backed Web Applications

      There are countless developers and administrators who are creating and deploying online applications backed by SQL databases.

      The problem is that creating and deploying them is not the easiest nut to crack due to the complexity of marrying HTML, JavaScript and other tools and components.

      That’s exactly the problem that Adam Chlipala, an Assistant Professor of Electrical Engineering and Computer Science at MIT, is trying to solve with Ur/Web, a domain-specific functional programming language for modern Web applications. The language encapsulates many key components needed for robust applications into just one language, and can help ensure the security of the applications.

Leftovers

  • Fury as AirAsia families shown live footage of floating bodies being recovered from missing plane

    Media stations have been criticised for showing split-screen footage of distraught families as they were watched live footage of bodies from missing AirAsia flight QZ8501 being recovered from the water.

    TV One, an Indonesian news channel, screened images from rescue crews as they encountered the debris and bodies found earlier today in the Java Sea, off the coast on Borneo, on a split screen interposed with live reaction from the families of passengers.

  • London New Year’s Eve fireworks made ticket-only for first time

    Metropolitan police urge everyone not among 100,000 who paid for reservation to stay at home and watch on TV

  • Security

    • Is SSH Insecure?

      Fact is, we don’t yet know enough details about all possible attack surfaces against SSH available to the agencies and we badly need more information to know what infrastructure components remain save and reliable for our day to day work. However we do have an idea about the weak spots that should be avoided.

    • More Data on Attributing the Sony Attack

      This is nonsense. North Korea has had extensive offensive cyber capabilities for years. And it has extensive support from China.

      Even so, lots of security experts don’t believe that it’s North Korea.

    • Lizard Squad in the FBI blizzard

      This crew is taking credit for the Sony and Xbox hack and the Feds are already taking the low-hanging fruit. It is not really a surprise that these hacks are so prolific most hacker crews want to get their name out there but to do so means, well that it is out there.

      Colour me surprised that a member of the Lizard Squad hacking group, whos handle alias is “ryanc” aka Ryan caught the attention of the FBI aka Federal Bureau of Investigation after speaking with the media about the Christmas-day attacks on Xbox Live and the PlayStation Network (PSN).

    • New evidence Sony hack was ‘inside’ job, not North Korea

      US cybersecurity experts say they have solid evidence that a former employee helped hack Sony Pictures Entertainment’s computer system — and that it was not masterminded by North Korean cyberterrorists.

      One leading cybersecurity firm, Norse Corp., said Monday it has narrowed its list of suspects to a group of six people — including at least one Sony veteran with the necessary technical background to carry out the attack, according to reports.

      The investigation of the Sony hacking by the private companies stands in stark contrast to the finding of the FBI, which said Dec. 19 its probe traced the hacking — which ended up foiling the planned wide release of the Hollywood studio’s “The Interview” — to North Korea.

      Kurt Stammberger, senior vice president at Norse, said he used Sony’s leaked human-resources documents and cross-referenced the data with communications on hacker chat rooms and its own network of Web sensors to determine it was not North Korea behind the hack.

    • Who Was Behind the Cyberattack on Sony?

      The cyberattack on Sony Pictures unleashed a torrent of alarmist media reports, evoking the image of North Korean perfidy. Within a month, the FBI issued a statement declaring the North Korean government “responsible for these actions.” Amid the media frenzy, several senators and congresspersons called for tough action. Arizona Senator John McCain blustered, “It’s a new form of warfare that we’re involved in, and we need to react and react vigorously.” President Barack Obama announced his administration planned to review the possibility of placing North Korea on the list of states sponsoring terrorism, a move that would further tighten the already harsh sanctions on North Korea. “They caused a lot of damage, and we will respond,” Obama warned darkly. “We will respond proportionally, and we’ll respond in a place and time and manner that we choose.”

    • Top 10 Security Incidents and Vulnerabilities of 2014

      This past year has been one of the busiest ones on record for IT security professionals, with a seemingly endless stream of high-profile exploits and software vulnerabilities. At the end of 2013, Target revealed what turned out to be the first of many retail breaches over the next 12 months. Retailers large and small were in the news over the course of 2014, with breaches at Home Depot, Staples, Dairy Queen and even the nonprofit Goodwill Industries. Retailers weren’t the only ones under attack in 2014, however; the open-source software development movement was under scrutiny due to several high-profile security incidents. The OpenSSL Heartbleed vulnerability that was first disclosed in April had a wide-reaching impact and consequences that took months to unravel. Heartbleed also ushered in a new era of naming and branding vulnerabilities that extended throughout 2014. The Shellshock bug in the open-source BASH shell was another high-impact vulnerability disclosed in 2014 that left IT professionals scrambling. Not all high-impact flaws were the cause of panic though. The open-source Xen hypervisor that powers much of the world’s public cloud infrastructure was patched before any public exploits emerged. In this slide show, eWEEK takes a look back at the top 10 security incidents and vulnerabilities of 2014.

    • Low-risk ‘worm’ removed at hacked South Korea nuclear operator

      South Korean authorities have found evidence that a low-risk computer “worm” had been removed from devices connected to some nuclear plant control systems, but no harmful virus was found in reactor controls threatened by a hacker.

      Korea Hydro & Nuclear Power Co Ltd said it would beef up cyber security by hiring more IT security experts and forming an oversight committee, as it came in for fresh criticism from lawmakers following recent hacks against its headquarters.

  • Defence/Police/Secrecy/Aggression

    • Obama’s Lists: A Dubious History of Targeted Killings in Afghanistan

      Combat operations in Afghanistan may be coming to an end, but a look at secret NATO documents reveals that the US and the UK were far less scrupulous in choosing targets for killing than previously believed. Drug dealers were also on the lists.

    • Afghanistan’s New Millionaires

      “Do you want to listen to Taliban cassette?” Matiullah Matie asks as he steers his white Toyota Corolla along a narrow road surrounded by cornfields and mud huts. He keeps the tapes in the car for long drives, Matie explains, just in case he picks up a hitchhiker who looks like a Talib. “They think I am such a pious mujahid man,” the round, bearded businessman laughs. “They don’t know I am screwing them all.”

    • Boy, 2, Accidentally Shoots and Kills Mom at Idaho Walmart
  • Transparency Reporting

    • WikiLeaks Says Iceland’s Gov’t Unlikely to Push Information Freedom Reform

      WikiLeaks spokesperson said that Iceland’s initiative to become the Switzerland of Bits is unlikely to move an inch further under the country’s current conservative government.

    • Intelligence, defense whistleblowers remain mired in broken system

      When Ilana Greenstein blew the whistle on mismanagement at the CIA, she tried to follow all the proper procedures.

      First, she told her supervisors that she believed the agency had bungled its spying operations in Baghdad. Then, she wrote a letter to the director of the agency.

      But the reaction from the intelligence agency she trusted was to suspend her clearance and order her to turn over her personal computers. The CIA then tried to get the Justice Department to open a criminal investigation of her.

      Meanwhile, the agency’s inspector general, which is supposed to investigate whistleblower retaliation, never responded to her complaint about the treatment.

  • Environment/Energy/Wildlife

    • The 11 Dumbest Things Conservative Media Said About Climate Change in 2014

      This year saw landmark reports on climate change, detailing the ever-increasing scientific certainty that human activities are driving catastrophic climate change and that action needs to be taken to prevent the worst effects. Yet despite the fact that more Americans than ever support action on climate change, conservative media went to ridiculous lengths to cast doubt on the scientific consensus behind global warming, citing everything from free market economics to witchcraft, touting conspiracy theories and predictions of an “ice age,” and even fulfilling Godwin’s law.

  • Finance

    • Despite a Tumultuous 2014, Bitcoin Still Has Value

      Bitcoin had a difficult year in which its value declined by two-thirds, but there is still much reason for optimism in 2015.

    • Why China is about to give Silicon Valley serious competition

      Here’s a news story you probably didn’t see: “Creative enterprises hub to be established in Qianhai.” You didn’t see it because it ran in the Shenzhen Standard, an English-language newspaper in China’s Guangdong province, slightly north of Hong Kong. The local government is investing $750 million to build a giant hub for design and other creative enterprises.

  • Censorship

    • India blocks 32 websites, including GitHub, Internet Archive, Pastebin, Vimeo

      Internet users in India are starting to lose to access websites including GitHub, Internet Archive, Pastebin, and Vimeo under an order from India’s DoT (Department of Telecom).

      It appears an order to block the sites issued on December 17 is taking effect — albeit unevenly.

      Today, Centre for Internet and Society (Bangalore, India) Policy Director Pranesh Prakash posted a copy of the notice listing the 32 blocked URLs.

    • Indian Government Orders 32 Web Sites Blocked, Including GitHub, Archive.Org, Pastebin, DailyMotion And Vimeo

      It’s not clear why these sites have been blocked in this way, but Prakash, who is Policy Director at the Centre for Internet and Society in Bangalore, India, believes it may be because of a court order in a copyright case. He also points out that this is not the first time this has happened. However, the key nature of many of the sites affected, and the fact that entire sites, rather than just some of their pages, were blocked, is bound to lead to calls for this blunt instrument to be refined before it is used again.

    • Government blocks over 60 websites including github & sourceforge on anti-terror advisory

      Over 60 websites and links, including popular online tools like Github and Sourceforge used by thousands of programmers have been blocked in India, triggering angry protests by Internet users.

  • Privacy

    • arc4random vs timing attacks

      Here at 31C3, Sebastian Schinzel just gave a presentation based on Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks. The particular attack that caught my eye was the failure to generate a fake PMS before checking for bad padding, not after. Doing it afterwards exposes a timing difference of up to a few microseconds which can be measured over the network.

    • How The NSA Works Hard To Break Encryption Any Way It Can

      And, sure, it is a “threat” to the way in which the NSA snoops on everything, but for the vast majority of users, it’s a way to protect their privacy from snooping eyes. The report does reveal that certain encryption standards appear to still cause problems for the NSA, including PGP (which you already use for email, right?), OTR (used in some secure chat systems) and VoIP cryptography system ZRTP. Phil Zimmermann, who helped develop both PGP and ZRTP should be pretty damn proud of his achievements here.

    • When The FISA Court Rejects A Surveillance Request, The FBI Just Issues A National Security Letter Instead

      We’ve talked quite a bit about National Security Letters (NSLs) and how the FBI/DOJ regularly abused them to get just about any information the government wanted with no oversight. As a form of an administrative subpoena — with a built in gag-order — NSLs are a great tool for the government to abuse the 4th Amendment. Recipients can’t talk about them, and no court has to review/approve them. Yet they certainly look scary to most recipients who don’t dare fight an NSL. That’s part of the reason why at least one court found them unconstitutional.

      At the same time, we’ve also been talking plenty about Section 215 of the PATRIOT Act, which allows the DOJ/FBI (often working for the NSA) to go to the FISA Court and get rubberstamped court orders demanding certain “business records.” As Ed Snowden revealed, these records requests can be as broad as basically “all details on all calls.” But, since the FISA Court reviewed it, people insist it’s legal. And, of course, the FISA Court has the reputation as a rubberstamp for a reason — it almost never turns down a request.

    • E-mail is too important to die, workers say

      THERE is no shortage of tech companies trying to replace e-mail in the workplace by offering new collaboration tools.

      Workers, though, just want their e-mail.

      In a new survey, 61% of US adult workers who use the internet ranked e-mail as “very important” for doing their jobs, according to Pew Research Center.

    • NSA: Tell no-one [31c3] by James Bamford
  • Civil Rights

    • Russians Are Organizing Against Putin Using FireChat Messaging App

      Anti-government protesters in Russia followed along on Twitter as opposition leader Alexey Navalny live-tweeted his house-arrest violation today. But the real action was on FireChat, where Navalny and his supporters organized protests and exchanged unfiltered communication.

    • CPS Threatens Dad: Let Your Kids Play Outside and We’ll Take Them Away

      I received an update from the Maryland mom of two who was contacted by Montgomery Country Child Welfare Service in November after she let her kids, ages 6 and 10, play at the park two blocks from home by themselves. She was cited for allowing a child under age 8 “to be locked or confined in a dwelling, building, enclosure, or motor vehicle while the person charged is absent.”

      The CPS worker decided “confined in a dwelling” was the same thing as “outside in a park.”

  • Internet/Net Neutrality

    • Yet Another Horrible Comcast Customer Service Experience Goes Viral

      Comcast’s customer service troubles are well documented, with bad customer service experiences going viral every few months, requiring Comcast CEO Brian Roberts to trot out of his corner office to promise to do better. Just a few months ago, Comcast also excitedly hired a new “Senior VP of Customer Experience,” named Neil Smit Charlie Herrin. I hope Herrin wasn’t taking an extended vacation for the holidays, because just in time for New Year’s, yet another horrific customer experience situation has gone viral via Reddit.

  • Intellectual Monopolies

    • Copyrights

      • Correcting copywrongs [31c3]
      • How Copyright Makes Culture Disappear

        A few years ago, we wrote about some research by Paul Heald that did an astounding job visually demonstrating how much copyright law today harms the dissemination of content.

      • Is piracy really just an access and convenience problem?

        I agree partly with what Fung said in his column. He’s absolutely right about convenience and access being big problems for consumers.

        [...]

        I’ll give you a good example of this. For the longest time the popular hard rock band AC/DC refused to put its music up on iTunes and other digital outlets. The band members and their management retained a 1980s mind-set and wanted people to go to Walmart to buy CDs. Talk about being trapped in the past!

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts