EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

10.16.14

Vista 10 is Still Vapourware, But We Already Know It Will Increase Surveillance on Its Users and Contain Malicious Back Doors

Posted in Free/Libre Software, FUD, Microsoft, Vista 10 at 12:55 am by Dr. Roy Schestowitz

“In the face of strong competition, Evangelism’s focus may shift immediately to the next version of the same technology, however. Indeed, Phase 1 (Evangelism Starts) for version x+1 may start as soon as this Final Release of version X.”

Microsoft, internal document [PDF]

Summary: The villainous company which makes insecure-by-design operating systems will continue to do so, but in the mean time the corporate press covers only bugs in FOSS, not back doors in proprietary software

After the vapourware tactics of Vista (for 5 years!) as well as the terrible (worse than Vista) Vista 8 and Vista 7 we already know Microsoft’s dirty tactics too well. Microsoft admitted to using these tactics when it falls behind the competition. Now that Microsoft faces embarrassment from the majority of the population, which is women, it sure needs a good distraction from negative publicity that started with infiltration.

Vista 9, vapourware for a year and a half now, already looks like garbage and at this stage it remains vapourware. Microsoft already jumps ahead to the next imaginary generation of vapourware, which will go further in providing the NSA with back doors and remote surveillance features. China was right to ban present generations of Microsoft Windows because it becomes more spyware-filled all the time and it is also known that the NSA engages in espionage against China. Here is a new article about how Windows servers and other Windows devices got hijacked in Hong Kong. It is suicidal to use Windows unless one is a partner of Microsoft and South Korea too has just suffered severely for depending on Windows. Pogson says: “I expect Korea will have to redo everything and get it right this time. Let’s hope they demand GNU/Linux be used for on-line/financial transactions and to protect data but failing that let’s hope they make GNU/Linux optional and the people can decide. There’s something refreshing about a whole country aroused about insecurity with that other OS on the check-list of things to fix.”

Korea and China are both planning to move away from Microsoft. This is well overdue.

According to several new reports, despite the NSA leaks that embarrassed Microsoft (and caused some nations to abandon Microsoft), Microsoft will increase spying in future versions of Windows and even previews spy on the users. As one author put it: “Back in 2012 with the release of Ubuntu 12.10 the EFF, Richard Stallman and countless other privacy advocates led vocal campaigns against Canonical for including Amazon results in the dash, the issue was that Amazon would know everything you were typing into the dash. Now however Microsoft are targeting early users of their Windows 10 Operating System in a much more egregious way.”

Here is more about Windows: “For the more liberal minded regarding privacy who are reading, thinking this is just for the purposes of improving the product then you should also know that Microsoft state they will share this data with third parties and also that they will use your data to send your advertisements about their new products and updates. The third parties that Microsoft mention also include law enforcement. They say “we may access, disclose and preserve information about you when we have a good faith belief that doing so is necessary to: 1. comply with applicable law or respond to a valid legal process from competent authorities, including from law enforcement or other government agencies; 2. protect our customers, for example to prevent spam or attempts to defraud Microsoft’s customers, or to help prevent the loss of life or serious injury of anyone; 3. operate and maintain the security of out products and services, including to prevent or stop and attack on our computer systems or networks; or 4. protect the rights or property of Microsoft, including enforcing the terms governing the use of the services – however, if we receive information indicating that someone is using our products or services to traffic in stolen intellectual or physical property of Microsoft, we will not inspect a customer’s private content ourselves, but we may refer the matter to law enforcement…”

Windows is a massive security risk and one that no nation should take. Not even the US; all back doors are bound to be used by cyber criminals who are not associated with any government (or with a friendly government) at one point or another.

We are still seeing Microsoft-affiliated media calling for more severe criticism of GNU Bash, but how about Windows shell vulnerabilities like this new one?

A class of coding vulnerabilities could allow attackers to fool Windows system administrators into running malicious code because of a simple omission: quotation marks.

The attack relies on scripts or batch files that use the command-line interface, or “shell,” on a Windows system but contain a simple coding error—allowing untrusted input to be run as a command. In the current incarnation of the exploit, an attacker appends a valid command onto the end of the name of a directory using the ampersand character. A script with the coding error then reads the input and executes the command with administrator rights.

Microsoft booster Andrew Binstock continues to trash-talk FOSS security ,but why is he not commenting on back doors in Microsoft software? Lies by omission. Bloomberg also publishes poorly-researched articles while it misuses the word “hacker” to confuse readers. How about back doors in proprietary software? Will Coverity ever cover this, or will it keep its focus on flaws in FOSS for writers like Richard Adhikari to single out FOSS as the problem? To quote Adhikari’s new article:

Open source developers apparently don’t adhere to best practices such as using static analysis and conducting regular security audits, found Coverity’s Spotlight report, released Wednesday.

The Coverity Scan service, which is available at no charge to open source projects, helped devs find and fix about 50,000 quality and security defects in code last year.

Microsoft’s circle of partners would rather debate and hype up FOSS bugs using codenames/brands that are all of a sudden being assigned for bugs (for increased press coverage), but discussions about back doors are out of scope.

Here we have Europol advocating back doors. The Europol boss says: “I hate to talk about backdoors but there has to be a possibility for law enforcement” (i.e. back doors).

Once upon a time (even 1.5 years ago) people who spoke about back doors were called paranoid and nutty. It is Free software advocates who have the last laugh now because they were right all along.

It should be known by now that back doors are being used for ransom and blackmail, even murder. Even Europol recognises this.

Windows should generally be avoided by everyone. No server should ever run Windows because it’s dangerous for everyone. Only fools would host a site using a back-doored operating system, which in turn puts its visitors at risk.

“Only fools would host a site using a back-doored operating system, which in turn puts its visitors at risk.”It is now being reported that NATO was silly enough to use Windows and it paid the price, potentially resulting in loss of life. The article “Microsoft Windows Zero-Day Vulnerability “CVE-2014-4114″ Used to Hack NATO” should note that NSA is told about this before Microsoft even issues a patch.

In summary, do not use Windows. It is not secure and this is part of the design. Microsoft has no intention of correcting this. In terms of security and privacy, Windows continues to get only worse over time.

10.15.14

Links 15/10/2014: KDE Plasma 5.1 is Out, GOG Reaches 100-Title Mark

Posted in News Roundup at 5:13 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • 7 free tools every network needs

    From device discovery to visibility into systems, networks, and traffic flows, these free open source monitoring tools have you covered

  • Free Bassel Khartabil

    Apparently, working for a free and open Internet also caught the attention of the Syrian government, which sadly wasn’t as enamored with Bassel’s work as was Foreign Policy magazine. On March 15, 2012, Bassel was detained in a wave of arrests in the Mazzeh district of Damascus, Syria.

  • Proud Sponsors of the 2014 New Zealand Open Source Awards

    Catalyst are once again delighted to be the main organisers and Platinum sponsors of the awards. Don Christie, Director of Catalyst and the chair of the NZOSA judging panel states “As New Zealand’s and Australasia’s leading open source company Catalyst and our clients benefit hugely from the generosity of spirit that is represented by the open source software community. These awards are an acknowledgement of that spirit and one small way in which we can recognise and promote the open source software community in general.”

  • Women in Open Source award open for nominations
  • Five open source alternatives to popular web apps

    Remember when Sun Microsystems proclaimed that “the network is the computer”? Many people guffawed at that proclamation. What was once a clever slogan is now a reality thanks to the proliferation of web-based applications.

    Chances are you use more than a couple of web apps in your daily life—email, storage, office applications, and more. What’s great about web apps is that you can use them anywhere and with any computer or mobile device. On the other hand, with most of those apps you’re locked in a closed ecosystem. Or worse, you may be handing over the rights to your content and your files when you agree to the terms of service. But it doesn’t have to be that way.

  • Open source startup targeting DevOps-defined networking

    A software startup debuted this week proposing software-defined networking to Docker, the open source software for creating Linux application virtualization containers.

    SocketPlane was founded by former Cisco, Red Hat, HP, OpenDaylight and Dell officials. In the open source world, their names are well known: Madhu Venugopal, John Willis, Brent Salisbury and Dave Tucker.

  • SDN News: Flexible NEC Pricing, HP Cloud, Industry Predictions and More

    The above are just a sampling of this week’s SDN and NFV news, attesting to the industry interest in the emerging technologies, interest that was further evidenced by yesterday’s announcement from Dell’Oro Group that SDN datacenter sales will grow more than 65 percent this year. “With architectures ratified and production deployments under way, network security appliances and Ethernet switches will continue to comprise the majority of SDN’s impact, with SDN gaining a foothold outside of the major cloud providers,” the research firm said while hawking a for-sale report.

  • Setting the SDN Agenda

    So what are going to be the hot topics of debate this week? I’ve been here a day, sitting in on the Open Networking Foundation (ONF) workshop and chatting to a number of companies with a vested interest in SDN’s future success, and there are a number of debates likely to rage all week:

  • Events

    • Why Open Source is Replacing Open Standards

      “Companies are now as the norm using open source to shed comunity R&D, to do collective innovation, particularly at the infrastructure layer, for almost every aspect of technology, not just Linux – SDN, IOT, network functions virtualisation, cloud computing, etc. What you have seen as a result is this proliferation of organisations who facilitate that development, on a very large professional scale. That’s a permanent fixture of how the tech sector operates. We launch a new one of these about every 3 months. Next year we’ll have many many more of these type of projects.”

    • Open Networking Foundation Foresees Open-Source Software as Route to Network Standards in 2015
  • Web Browsers

    • Mozilla

      • Firefox 33 Has Been Officially Released. How To Install Firefox 33 On The Most Popular Linux Systems

        Also worth mentining, Firefox 33 comes with optimizations for session respore, JavaScript and HTML5 enhancements, search suggestions on either the Firefox Start (about:home) and new tab (about:newtab) pages, a new CSP (Content Security Policy) backend, support for connecting to HTTP proxy over HTTPS and new features for developers.

      • Firefox 33 gets released with Openh264

        Today Firefox 33 has been released, among it’s main features is OpenH264, an open source, Cisco provided solution for viewing H.264 content over webRTC. OpenH264 is a free H.264 codec plugin that Firefox downloads directly from Cisco. Cisco published the code to Github making it open source. Mozilla and Cisco have set up a process where the binary is verified to be built from the source on Github so that users trust the integrity of the binary that is shipped with the browser.

      • Firefox 33 Officially Released

        Mozilla has just released Firefox 33, the next iteration of the famous Internet browser. As it was to be expected, users will find an assortment of features and various changes that really make the update worthwhile.

      • Mozilla Releases Firefox 33.0 for Android, Linux, Mac, and Windows

        Mozilla has updated its Firefox browser for both mobile (Android) and desktop (Linux, Mac, Windows) platforms, bringing it to version 33.0. The update adds some new features to revamp the video streaming and viewing experience for users, apart from assorted bug fixes and performance improvements.

      • Send videos from Firefox for Android straight to your TV

        We make Firefox for Android to give you greater flexibility and control of your online life. We want you to be able to view your favorite Web content quickly and easily, no matter where you are. That’s why we’re giving you the option to send supported videos straight from the Web pages you visit in Firefox for Android to streaming-enabled TVs via connected devices like Roku and Chromecast.

      • Play Awesome Indie Games Directly in Firefox Including the Award-Winning FTL

        Today, we’re announcing a promotion with Humble Bundle, one of the real innovators in game distribution, that brings eight hugely popular Indie games including the award-winning FTL directly to Firefox users. This promotion only runs for two weeks, so jump straight into the action here!

      • Mozilla and Humble Bundle Launch Game Collection Than Runs in the Browser

        In a surprising move today, Mozilla and Humble Bundle have partnered up to provide a new collection of games, but with a twist. With the help of some new technologies, it’s now possible to play some of the new games just in the browser.

      • Play Cool Games in Firefox, and Name Your Price for Them
  • SaaS/Big Data

  • CMS

  • Healthcare

    • Liberia: The Impact of Open Source Software in the Fight Against Ebola in Liberia

      Over the years there have been several discussions and literature over the impact of open source software (OSS) on economic development. Countries, international organizations including the United Nations, the USAID, the British DFID, have all touted the benefits of open source software on economic development, especially on developing countries. Yet, in Liberia, the discourse has not been as ubiquitous and widely embraced as it has been in other countries or in the literature. While open source software has made some progress in permeating the Liberian society over the years (Mozilla Firefox, Apache Webserver, PHP, Java, MySQL), its impact has not been felt as much as it has been in recent times.

  • BSD

  • FSF/FSFE/GNU/SFLC

    • For Ada Lovelace Day, highlighting FSF sysadmin Lisa Maginnis

      Today is Ada Lovelace Day, when we share stories of women in technology and their achievements.

      The holiday is named after a 19th-century English mathematician who is considered by many to be the first programmer. Though generations passed before her contribution was fully acknowledged, she was a pioneer both as a scientist and as a challenger of rigid gender roles. For this Ada Lovelace Day, we’re profiling Lisa Maginnis, who is the FSF’s senior systems administrator.

      As the leader of the technical team, Lisa is responsible for choosing, configuring, and maintaining the FSF’s office computers and servers. She uses extensive knowledge of hardware, networking, and electrical engineering to maintain a complex array of all-free software. An alert system sends text messages to her OpenMoko if servers have problems, and she’s no stranger to urgent after-hours trips to the office to get something back online.

    • New Autoconf Archive mirror at available github.com

      There is now a brand-new mirror of the GNU Autoconf Archive’s Git repository available at https://github.com/peti/autoconf-archive that those who enjoy this sort of thing can use to submit patches to the Archive by means of a Pull Request instead of going through Savannah’s patch tracker.

    • OpenACC 2.0 With NVIDIA PTX/CUDA Support Is Closer For GCC

      For the past year Code Sourcery / Mentor Graphics has been working with NVIDIA to bring OpenACC 2.0 support to GCC and to allow for this heterogeneous parallel programming API to be taken advantage of with NVIDIA GPUs from GCC. This work is closer to finally being realized for allowing OpenACC programs to be compiled with GCC and target NVIDIA GPUs on Linux.

  • Public Services/Government

  • Openness/Sharing

    • Open Source Biotech: Fund Anti-Cancer Research and Make Drugs Cheaper at the Same Time

      This is a very cool crowdfunding campaign – you can help create a new cancer drug and at the same make it much cheaper. How? The researchers will not patent the drugs. Like polio vaccine, which was never patented, therefore it was widely available. Check out the website and the video. I loved it and made a donation of $50, because I find projects like this can change the existing paradigm in healthcare when the existing drugs are just deadly expensive. I encourage you to support the project and share it with your friends.

  • Programming

    • undertaker 1.6
    • Apple Might Be Divesting Its Stake In LLVM

      Some weeks ago on Twitter a follower had mentioned a rumor that Apple was forcing its compiler developers to focus less on general LLVM work and to basically spend their time on Apple’s new Swift project. While there’s been a general slowdown of direct Apple contributions to LLVM, there’s the latest sign today they might be divesting their interest somewhat in direct management of this open-source compiler infrastructure.

Leftovers

  • Polly Toynbee, Counter-Revolutionary

    I have never been a great fan of Russell Brand’s media persona, and for a revolutionary to be shacked up with Jemima Khan’s millions is perhaps some kind of extended exercise in post-modern irony as performance art. But Brand’s perception that the neo-con political parties are all the same is absolutely correct, and his is almost the only voice the media will broadcast saying it. When I have been saying precisely the same thing for a decade it is not news. News, apparently, lies not in what is said, but whether or not it is a celebrity who says it.

  • The Digital Ripple Effect

    We must acknowledge that with any evolution in communications technology, there are those seeking to corrupt, misuse and exploit channels for sinister purposes and nowhere is this more prevalent than the Web. Privacy, cyber terrorism, online security and data theft are wedged firmly into the social consciousness of many Europeans and their complexity can further deter those who lack even a basic understanding of the issues. But like any societal ill, there is a treatment.

    [...]

    The company behind the FireFox browser – whose guiding principles are the promotion of openness, innovation & opportunity on the Web – run a Webmaker programme, which provides tools, events and teaching guides designed to train the informed Web creators of tomorrow. However, a more powerful byproduct of this is the building of an online/offline community, based around the processes that increase participation, accountability and crucially, trust.

  • Health/Nutrition

  • Security

  • Defence/Police/Secrecy/Aggression

    • NRA’s Ted Nugent Calls For The “Evil Carcasses” Of Obama And Other Democrats In Gun Groups Pitch

      Ted Nugent called for “freedom” or the “evil carcasses” of President Obama and other progressive politicians in a Facebook post where he told followers to support the National Rifle Association and discredited gun advocate John Lott’s Crime Prevention Research Center.

    • Somerset woman guilty on 2 of 3 federal charges for NSA drone protest

      A Somerset woman and two co-defendants were acquitted on one charge but convicted on two others, albeit with reduced penalties, related to a recent drone targeting protest outside the National Security Agency office at Ft. Meade, Maryland.

      Manijeh Saba of Franklin Township, and Ellen Barfield and Marilyn Carlisle, both of Baltimore, spoke openly in court for nearly three hours, showing photographic evidence of NSA drone targeting, naming names and mourning children killed by drones, and asserting their First Amendment rights and Nuremberg justifications.

    • Local peace activist jailed

      A local peace activist is spending 90 days in a Syracuse-area jail for protesting the country’s use of drone warfare.

      Jack Gilroy of Endwell was one of 31 people arrested during an act of civil disobedience outside of the Hancock Airbase near Syracuse in April of last year.

    • Expert: Military intervention not the answer for Middle East violence

      Foreign military intervention heightens problems in the Middle East, internationally recognized expert Rami Khouri said.

    • Killing for Peace

      Since 9-11-01, the United States, by any objective assessment a globe-girdling military empire, has been sucked into an ongoing global civil war between brutal extremists (often fighting among themselves) and those, including us, they perceive as their mortal enemies. We are rightfully outraged by cruel beheadings videotaped for Internet distribution. The beheaders and suicide bombers are equally outraged by our extensive military presence in their ancestral homelands and drone attacks upon weddings.

      Meanwhile, though the government of our mighty empire can read our emails and tap our telephones, the worldwide nonviolent movement to bring about positive change somehow flies completely under its supposedly all-seeing radar screens. The peoples of the earth are overwhelmingly against war, and they want their fair share of the earth’s resources and the possibilities of democratic governance.

    • The Madness of Endless War

      Our media narrows discourse and fans the flames by only allowing U.S. citizens to see through the narrow lens of exceptionalism, polarization and violence. Fear mongers, legion in our culture, insist that adherents of ISIS are hardly human. But we should keep their humanity in our hearts even as we abhor their acts, just as we ought to abhor our own descent into torture and extra-judicial killings. People do not do what those ISIS fighters do without having been rendered desperate and callous by some painful sense of injustice. As Auden wrote, “Those to whom evil is done/do evil in return.” The question for us is how we can best respond to evil without rationalizing our own evil behavior.

    • Killer drones, killer robots

      War is becoming faceless. Warfare in general is becoming increasingly automated. There is a race to develop weapons that can be used without human intervention. Killer drones and robots are such weapons.

    • Fighting extremism with extremism

      In his speech last month to the United Nations, President Obama summoned foreign leaders to join his “campaign against extremism.” While his clarion call was spurred by beheadings by the terrorist group the Islamic State, Mr. Obama has repeatedly invoked the “extremist” threat since taking office in 2009. However, the president’s own record makes it tricky for him to pirouette as the World Savior of Moderation.

      [...]

      Although Mr. Obama campaigned in 2008 criticizing the bellicosity of his predecessor, he has bombed seven nations since taking office. Mr. Obama justified pummeling Libya in 2011 so that that nation would not become “a new safe haven for extremists” — but there are far more violent terrorists there now than before the United States intervened. Mr. Obama has written himself a blank check to expand bombing in Iraq and Syria owing to extremist perils — even though the U.S. government previously covertly armed some of the same extremists it is now trying to destroy. The notion that the U.S. government is entitled to bomb foreign lands based solely on the president’s decree — regardless of congressional opposition — would have been considered extremist nonsense by earlier generations of Americans.

    • U.S. drones kill 8 in Pakistan’s tribal region as strikes surge

      At least 110 people have been killed in 16 American drone strikes in Pakistan so far this year, according to the Washington-based think tank New America Foundation, which has documented at least 2,174 deaths as a result of U.S. drone strikes in Pakistan since 2004. It includes at least at least 258 civilians, but the actual figure is thought to be higher.

    • Drone supporters, opponents gather outside air base on Saturday

      Members of local VFW 917 gathered once again to support the 107th Airlift Wing drone program at the Niagara Falls Air Reserve Station on Saturday.

      “It’s not just getting the program,”said Les Carpenter, retired Air Force. “When you get it, you have to support it.”

      He was joined by Army veterans Sgt. Major Vince Canosa, Bill McKewon, and Post Chaplain Eugene Ashley.

      “We come out once a month and then for beer and bologna sandwiches at the VFW,” Carpenter said.

      The members held signs at the station entrance: ISIS beheads with knives, we behead with tomahawks (in reference to the ballistic missile), Predators vs. Aliens, coming soon to a border near you, and KILL FOR PEACE.

    • America’s counter-terrorism lie: Waging war with secret rules, hypocrisy and worse

      Our latest bombings in the Middle East remind us of a scary truth: Here’s what the “war on terror” is really about

    • International Human Rights: -Dispelling the Myths

      There is now a growing international movement for developing an international convention on drones and similar technology.It is time that based on the evidence available we move the international system to start putting the brakes.

    • Pakistan says NATO helicopters violated its airspace

      Two gunship helicopters belonging to the NATO-led international coalition forces have violated the airspace of Pakistan, according to security officials.

      The officials quoted by local media agencies have said that the helicopters remained in the Pakistani territory for at least ten minutes.

    • Pakistan says NATO helicopters violated its airsprace
    • Pakistan, U.S. appear once again to be cooperating on drone strikes

      A series of CIA drone strikes launched last week against Taliban insurgents in Pakistan’s northwest tribal areas provide the clearest demonstration yet that the U.S. intelligence agency and Pakistani security forces are once again cooperating on defeating the insurgents.

    • Niger Is key to West Africa’s future security

      Following the lead of Ethiopia, Chad, and Djibouti, Niger has recently permitted the US and France to operate drones from an air base in its capitol, Niamey. The US military will also be establishing a second drone base in the northern desert city of Agadez, not far from the Algerian border. A major security partner of the US, Algeria’s security forces have already had success in scaling up surveillance and patrol along their border with Niger.

    • Obama’s War and the Limits of Reason

      In recent weeks, Obama has “reluctantly,” for the 7th time since taking office, begun bombing a predominantly Muslim country (Afghanistan, Pakistan, Yemen, Somalia, Libya, Iraq, and now Syria), testing, once again, the “limits of reason.” This begs the question: How far beyond such limits is our political-military elite willing to reach to initiate militarism in our name?

    • In the last days of ‘Operation Protective Edge’ Israel focused on its final goal — the destruction of Gaza’s professional class

      The spectacle of disproportionate force wielded against exclusively civilian targets in the heart of Gaza City had only begun.

  • Finance

  • PR/AstroTurf/Lobbying

    • CBS News Sacrifices All Journalistic Integrity To Be Pure PR For CBS PrimeTime TV?

      We’ve written a few times now about Walter O’Brien, the claimed inspiration for the CBS primetime TV show Scorpion. As our reporting has shown, a very large number of the claims about O’Brien’s life simply don’t check out when you look into the details, and in many cases appear to be flat out false. As we’ve said repeatedly — though people keep bringing this up — we don’t care at all about Hollywood folks exaggerating a “based on a true story” claim. What concerns us is (1) the journalistic integrity of those engaged in promoting the false claims about Walter O’Brien for the sake of a TV show and (2) the fact that O’Brien has been using this to promote his own business, which may lead people to giving money to him under questionable pretenses. Each time I write about him, more people who have known him in the past come out of the woodwork to repeat the same claims: nice enough guy, but always massively exaggerating nearly everything.

    • WSJ Vilifies Efforts To Increase Corporate Political Transparency As “Partisan Agitprop”

      The Wall Street Journal is dismissing efforts to convince corporations to be more transparent about their political contributions as “partisan agitprop,” despite the fact that the conservative justices of the Supreme Court reaffirmed the need for such transparency in 2010′s Citizens United decision.

    • Randa Redux: Federal Judge OK’s Dark Money Coordination in WI

      Wisconsin candidates can now coordinate with “dark money” nonprofits that accept secret, unlimited donations and run sham “issue ads,” under a ruling from the same federal judge who blocked the criminal coordination investigation into Wisconsin Governor Scott Walker earlier this year.

    • ISIS in Texas?! ABC Fails an Easy Factcheck

      The thing about factchecking is that the person making a claim actually has to have evidence that what they’re saying is true; if they can’t produce any, then there’s not much left to say. Honestly believing that something false is true, or a spokesperson insisting that a lawmaker stands by a claim, doesn’t actually matter. But ABC manages to cloud up an issue that should be crystal clear.

    • “Kill the Messenger’’ is the kind of movie that gives newspaper editors bad dreams

      The three most influential papers in the country at the time — the Los Angeles Times, The New York Times and the Washington Post — apparently were embarrassed by critics who accused them of missing the story and reacted by devoting resources to essentially knock it down.

  • Censorship

    • How Australia’s New ‘Anti-Terror’ Censorship Law Could Cover Up Botched Intelligence Operations

      As we reported a few weeks ago, Australia has passed a dreadful “anti-terror” law that not only allows the authorities to monitor the entire Internet in that country with a single warrant, but also threatens 10 years of jail time for anyone who “recklessly” discloses information that relates to a “special intelligence operation.” But what exactly will that mean in practice? Elizabeth Oshea, writing in the Overland journal, has put together a great article fleshing things out.

    • The new ASIO laws: some examples to consider

      The parliament has passed legislation that permits the Attorney General to authorise certain activities of ASIO and affiliates as ‘special intelligence operations’. We can only assume that ASIO will seek such authorisation when its operatives plan to break the criminal or civil law – the whole point of authorising an operation as a special intelligence operation is that participants will be immune from the consequences of their unlawfulness. It will also be a criminal act to disclose information about these operations.

  • Privacy

    • Silk Road Judge Won’t Examine FBI’s Warrantless Server Hacking; Dismisses Suppression Motion On ‘Privacy Interest’ Technicality

      Judge Katherine Forrest has shot down Ross Ulbricht’s defense team’s motion to suppress evidence it claims was acquired illegally by the FBI. The FBI asserted in its response to the motion that Ulbricht had expressed no privacy interest in the alleged Silk Road servers located in Iceland. The FBI further claimed that it needed no legal permission (i.e., a warrant) to hack foreign servers during criminal investigations.

    • TTIP’s threat to our privacy and culture

      TTIP (the Transatlantic Trade and Investment Partnership) is a trade agreement currently being negotiated behind closed doors between the United States and the European Union. The agreement is supposed to “increase trade and investment” but there are significant concerns around its potential negative impact on democracy, the rule of law, innovation, culture and privacy.

    • Press coverage from Don’t Spy On Us event
    • Anonabox bundles OpenWrt with Tor for anonymous Web browsing
    • Anonabox Promises Total Online Anonymity That’s Easy, Open Source, and Cheap

      Nobody likes giving up their privacy. But as much as we complain about it, relatively few of us are willing to put time, money, or effort into consistently protecting our privacy online. And it’s not like it’s that hard, relatively speaking: the Tor Project offers excellent, free software that lets you browse the Internet in complete anonymity, if you use it properly. With Tor, data you send over the Internet are encrypted and stripped of any identifying information (namely, your IP address) before reaching their destination. It’s one of the most reliable methods that you can use to protect your identity online. However, it does take some amount of experience to use, along with a conscious decision to choose security over convenience. If that sounds like too much work (and it sure sounds like a lot of work, doesn’t it?), the Anonabox could be exactly what you need.

    • Tiny $51 Tor router runs OpenWRT Linux

      A Kickstarter project called “Anonabox” offers a tiny Tor router for anonymous Internet use, running OpenWRT Linux on a MediaTek MT7620n WiFi chipset.

      The Anonabox is a “completely open source and open hardware” networking device that provides anonymous Internet access and encryption, says Chico, Calif.-based project leader August Germar on the Anonabox Kickstarter page. The device has already blasted past Germar’s $7,500 funding goal, which was intended to “help us move out of our garage, into full production.” With the $340,000 the Anonabox has garnered so far, Germar should be able to afford some nicer digs, indeed.

    • Edward Snowden’s girlfriend living with him in Moscow, film reveals

      She was still in Hawaii when news broke from Hong Kong that he was the whistleblower. Days earlier, authorities, suspicious about his prolonged absence from work, had visited their home.

      On her blog, subtitled, ‘Adventures of a world-travelling, pole-dancing superhero,’ she wrote that she felt “sick, exhausted and carrying the weight of the world”. Shortly afterwards, she took the blog down.

      The two appear to have been together since at least 2009, living part of the time near Baltimore before moving to Hawaii in 2012.

    • Silk Road Judge Won’t Examine FBI’s Warrantless Server Hacking; Dismisses Suppression Motion On ‘Privacy Interest’ Technicality
    • NSA Finally Releases Keith Alexander’s Financial Disclosure Documents; National Security Remains Uncompromised

      The CIA and Office of the Director of National Intelligence both complied. Keith Alexander, via the NSA’s refusal to turn over the documents, is the lone holdout.

    • Edward Snowden: It was worth it

      NSA leaker Edward Snowden on Saturday defended his disclosure of reams of classified information and said his actions were worth fleeing his seemingly idyllic life in Hawaii and ending up in hiding in Russia, where he was joined by his girlfriend in July.

    • After allegations that the service was hacked, Dropbox blames unrelated services

      News that Dropbox credentials had been obtained and leaked by an unknown attacker spread on Reddit yesterday, just days after Edward Snowden advised people to ditch Dropbox, Google and Facebook. Dropbox quickly reacted to the the allegations that it had lost the data and said that 3rd parties were responsible for losing the users data, unrelated to Dropbox.

    • Grooming Students for A Lifetime of Surveillance

      The same technologists who protest against the NSA’s metadata collection programs are the ones profiting the most from the widespread surveillance of students.

    • Privacy International files criminal complaint on behalf of Bahraini activists targeted by spyware FinFisher

      Privacy International today has made a criminal complaint to the National Cyber Crime Unit of the National Crime Agency, urging the immediate investigation of the unlawful surveillance of three Bahraini activists living in the UK by Bahraini authorities using the intrusive malware FinFisher supplied by British company Gamma.

    • Privacy International Files Criminal Complaint Against FinFisher Spyware Company

      Techdirt has been reporting on the disturbing rise in the use of malware by governments around the world to spy on citizens. One name that keeps cropping up in this context is the FinFisher suite of spyware products from the British company Gamma. Its code was discovered masquerading as a Malay-language version of Mozilla Firefox, and is now at the center of a complaint filed in the UK…

  • Civil Rights

    • Vladimir Putin is no saint, but G20 is a club full of sinners

      Among its least savoury members is a feudal state that regularly murders people. Saudi Arabia beheads individuals for the crime of sorcery, among other things. Don’t try to hold a church service there unless it’s of the approved variety – the Saudis officially go in for a medieval, hard-line interpretation of Islam. It’s the country that won’t even let women drive cars. Adultery? Compared with Saudi Arabia, Russia is a bastion of democracy, a beacon of equality, a paragon of human rights.

    • Being Malala

      Recipients of humanitarian awards often invite controversy. In Pakistan, religious and political identities are valued more than the contributions of such recipients. Malala Yousafzai may have the Nobel Peace Prize, but she remains the target of criticism from Pakistani conservatives and also many ‘progressives’.

    • Sanctifying Malala: The Nobel Prize and Moral Alibis

      Those getting it will always be marred by the contradictions any peace prize suggests. The greatest of all remains the fact that the dynamite guru – Alfred Nobel himself – did as much for the cause of war as he decided his profits would supposedly do for peace. Peace was a sentimental afterthought. Many winners of the prize have since kept this legacy alive: that of war maker turned peace maker; a fair share of hypocrisy, with a good share of feigned sincerity.

    • Missing Malala’s Message of Peace: Drones Fuel Terrorism

      On October 10, Pakistani teenager Malala Yousafzai–who received worldwide attention after being attacked by the Taliban for her advocacy for girls’ education–was awarded the Nobel Peace Prize, along with Indian activist Kailash Satyarthi. Yousafzai’s work on educational equity is well-known. But less well-known is what she said to Barack Obama about how his wars were undermining the fight against terrorism.

    • Nobel for Malala and Kailash

      Malala has not restricted her struggle to sending girls to school. She has stood up for children killed in drone attacks and has expressed her determination to get the prime ministers of India and Pakistan to sit together in dialogue. When meeting with President Obama, she spoke against war and militarization. Perhaps if the Nobel committee had awarded Malala for her anti-war spirit, it would have delivered a strong message to the war-torn world in keeping with the spirit of Sir Alfred Nobel.

    • The (Socialist) Malala Yousafzai the US Media Doesn’t Quote

      Now that Malala Yousafzai has won her hard-earned and well-deserved Nobel Peace Prize, she and her amazing, tragic story is back in the spotlight. Per usual, nevertheless, the corporate media has taken this positive development and exploited it, in the service of US imperialism.

    • The Malala you won’t hear about

      Ben Norton describes how U.S. news outlets have selectively reported only the aspects of Nobel Peace Prize winner Malala Yousafzai they want you to see.

    • This Year’s Nobel Peace Prize Winners Are Radicals

      It has been suggested that the recipients of this year’s Nobel Peace Prize are “safe choices” because they advocate for the rights of children and for the fair and respectful treatment of girls and women. Advocacy for an end to child labor, for universal education, for strong trade unions, for economic justice and social democracy, and for an end to war and violence should not be controversial.

    • Nabila Rehman: The Other Girl Who Deserves a Nobel Prize

      Is the global world in oblivion when it comes to Nabila because her story puts a face to what we often call ‘war victims’? Are we too insensitive to see the consequences of war and refuse to acknowledge the fact that these civilians are not even given the basic right to live, forget everything else. “When I hear that they are going after people who have done wrong to America, then what have I done wrong to them? What did my grandmother do wrong to them? I didn’t do anything wrong,” said Nabeela in her testimony. Well, no one has bothered to answer that question.

    • The other Pakistani girl: Malala got the Nobel peace prize; here’s why Nabila won’t

      Last week, the Nobel Peace Prize committee announced two winners: Pakistan’s Malala Yousafzai and India’s Kailash Satyarthi for their struggle for the rights of children. While for most Indians K Satyarthi’s name was a bit of a mystery, Malala was already a widely known international figure, her personal story documented on magazine covers around the world.

    • A tale of two Pakistani girls: Malala Yousafzai and Nabila Rehman

      We all know about Pakistan’s braveheart Malala Yousafzai — the girl who defied Taliban and stood up for education and rights of girls in war ridden Pakistan. Recently, Malala received Nobel Peace Prize for her bravery alongwith Kailash Satyarthi and her ‘AWorldAtSchool’ campaign has received record number of petitions. But, do we know about Nabila Rehman — the girl who lost her grandmother due to a drone attack while her sisters were injured. Her only question to US senators being, ‘What was our fault’ which was largely ignored by most of the politicians.

    • We can learn more from Malala Yousafzai’s youthful wisdom than Obama’s messages

      A year ago, Malala met President Obama, who is himself a Nobel Peace Prize winner from 2009, and in another act of boldness, she told him that his drone policy was fueling terrorism.

      “Instead of soldiers, send books. Instead of sending weapons, send pens,” she said.

    • Again the Peace Prize Not for Peace

      The Nobel Peace Prize is required by Alfred Nobel’s will, which created it, to go to “the person who shall have done the most or the best work for fraternity between nations, for the abolition or reduction of standing armies and for the holding and promotion of peace congresses.” The Nobel Committee insists on awarding the prize to either a leading maker of war or a person who has done some good work in an area other than peace.

    • Somalia: The security situation remains fragile

      Al-Shabaab militants, who only two years ago controlled a broad swathe of Somalia, have been retreating from more than 20,000 advancing AMISOM troops as well as Somali government soldiers, whom the German army is helping to train. In early September a US drone killed al-Shabab leader Ahmed Abdi Godane.

    • Montreal spends $110,000 on private lawyers to fight challenge to anti-protest bylaw

      As the city of Montreal tightens its belt-buckle and is cutting budgets, two Montrealers who are challenging the city’s regulations around demonstrations are questioning the amount of resources the city is putting in to defend the bylaws.

      “It seems like there is room for austerity measures around everything except repression,” said Julien Villeneuve, better-known as Anarchopanda, in an interview.

    • NYPD Officer Takes Cash From Man During Stop-And-Frisk; Pepper Sprays Him When He Asks To Have It Returned

      Apparently it’s OK to take money from uncharged individuals during stop-and-frisks as long as it’s: a) not very much money, and b) it’s vouchered at the station.

      What went unaddressed was the officer’s use of pepper spray to shut up both Joye and his sister, who were both asking for the return of the money taken by Montemarano.

    • Video Shows Cop Stealing Man’s Money, Then Pepper Spraying Him

      An NYPD officer stands accused of stealing more than $1,000 in cash from a Brooklyn man during a police stop.

      In a video obtained by the New York Times, an unnamed officer forces 35-year-old Lamard Joye against a fence surrounding a Coney Island basketball court and removes what appears to be a handful of cash from Joye’s pocket at the six-second mark.

    • Secret Courts – A silent start

      There are 2 major issues with the existence of secret courts. Firstly, it removes one of the fundamental tenets of the right to a fair trial – that the trial be conducted in public. As recently as 2011 in a landmark hearing (Al Rawi) the Supreme Court of the UK upheld the principle of open justice. The removal of this openness means that the accused can either never hear evidence which helps to convict them, removing them of the ability to accurately refute that evidence; or alternatively it means that they too are restricted from talking about certain aspects of the trial in public meaning that even if found to be innocent, they have restrictions placed on their freedom of speech.

  • Internet/Net Neutrality

  • Intellectual Monopolies

    • Street Demonstrations In 21 European Countries Held To Protest Against TAFTA/TTIP; Another ACTA Revolt Brewing?

      Last month, the European Commission refused to accept a request to allow an official EU-wide petition called a European Citizens’ Initiative (ECI) to take place. This was a curiously maladroit move by the Commission: it would have been easy to allow the petition against TAFTA/TTIP and CETA to proceed, thank the organizers once it was completed, file it away somewhere and then ignore it. Instead, by refusing to allow it to take place, the European Commission has highlighted in a dramatic manner the deeply undemocratic way in which so-called trade agreements are conducted.

    • Copyrights

      • Teen Pirates Pay For Movies More Often Than Non-Pirates

        A new study carried out in Australia has found that most 12-17 year-old teens are not online pirates, with around 74% abstaining from the habit. However, those that do consume illegally tend to buy, rent and visit the movies more often than their non-pirating counterparts.

      • Police Drop Charges Against Industrial-Scale ‘Pirate’

        A raid and subsequent arrest hailed by the Police Intellectual Property Crime Unit as one of their most significant yet has taken an unexpected twist. After being accused of masterminding an “industrial scale” sports streaming operation, a UK man has had all of the charges against him dropped.

      • City Of London Police Drove 200 Miles To Arrest And Jail ‘Industrial’ Level Pirate… Only To Have Case Fall Apart And All Charges Dropped

        We’ve certainly questioned the efforts by the City of London Police to set themselves up as the legacy entertainment industry’s private police force. Over the past year or so, the police operation (which, yes, represents just one square mile of London, but a square mile with lots of big important businesses), has demonstrated that it will be extremely aggressive, not in fighting criminal wrongdoing, but in protecting the private business interests of some legacy companies, often with little to no legal basis. It also appears that the City of London’s famed Police Intellectual Property Crime Unit (PIPCU) is not particularly technology savvy, and seems to just accept what big record labels, movie studios and the like tell it.

      • European Court Of Justice To Consider Legal Ramifications Of Offering Open WiFi

        Lawyer Martin Husovec has a post detailing an important case that has been referred to the EU Court of Justice, which could have a tremendous impact on legal liability for those who offer open WiFi in the European Union.

10.14.14

With .NET Foundation Affiliation Xamarin is Another Step Closer to Being Absorbed by Microsoft

Posted in Microsoft, Mono at 5:59 pm by Dr. Roy Schestowitz

A vow till death

Wedding vows

Summary: Xamarin is not even trying to pretend that separation exists between Microsoft and its work; yet another collaboration is announced

MICROSOFT’S OFFICIAL partner Xamarin, the Mono company founded by Microsoft MVP Miguel de Icaza with people of Microsoft background, funding from Microsoft-linked sources, Microsoft-copyrighted code with Microsoft licences and Microsoft APIs (all groomed all along by Microsoft and its media moles) is in some headlines again. It all started this morning when my wife told me about “that Microsoft guy” publishing a blog post. It’s Miguel de Icaza who wrote:

We are launching the official .NET Foundation forums to engage with the larger .NET community and to start the flow of ideas on the future of .NET, the community of users of .NET, and the community of contributors to the .NET ecosystem.

Michael Larabel later covered this:

Miguel de Icaza of GNOME/Mono fame who is heading Xamarin to push .NET software for multiple platforms using Mono, passed along some .NET Foundation news. In particular, the .NET Foundation Forums have been established for allowing the .NET community to collaborate and “start the flow of ideas on the future of .NET”, according to Miguel. Those forums are part of DotNetFoundation.org.

“Mono may be fine for Microsoft; it’s an utter disaster and a dangerous trap for everyone else.”This is just more openwashing of .NET and Miguel de Icaza, as always, helps it. Mono is not just promotion of proprietary software; it is promotion of Microsoft APIs, Microsoft patents, generally poor technology, and a Microsoft Trojan horse in the technical world. Based on some new figures just released by Unity3D (which turns out to be secretly spyware), very few GNU/Linux users are foolish enough to install Mono (and Unity3D). They measure that at 0.1% of the whole!

Mono may be fine for Microsoft; it’s an utter disaster and a dangerous trap for everyone else. A quick smell test of the capital (money) and where it comes from (Microsoft-linked VC or Microsoft-funded Novell) should serve as a clue; only Microsoft benefits.

The EPO’s Protection Triangle of Battistelli, Kongstad, and Topić: Part VI

Posted in Europe, Patents at 4:29 pm by Dr. Roy Schestowitz

Summary: Jesper Kongstad, Benoît Battistelli, and Zeljko Topić are uncomfortably close personally and professionally, so suspicions arise that nepotism and protectionism play a negative role that negatively affects the European public

THE scandals at the EPO are numerous and longstanding. Oversight is minimal if not inexistent and there is lots to be worried about. In this part of the series we wish to focus on Mr Jesper Kongstad. He is not quite what it seems on the surface. As we are going to show in later parts (weeks ahead), Kongstad became a target of interest in an ongoing investigation from the outside (Battistelli has already eliminated inside overnight).

“Oversight is minimal if not inexistent and there is lots to be worried about.”The Kongstad situation will today be mentioned in brief. It will be covered without yet mentioning that investigation (intentionally unnamed) as there are some ongoing developments that would be better off covered when it’s all finished and concluded. There is no longer a problem in mentioning the Kongstad situation as the information about earlier links to the Croatian SIPO is publicly accessible. Kongstad’s close links to Battistelli have also been mentioned on the IPKat blog which said three months ago: “Back in 2010, when Benoît Battistelli was first appointed as President of the European Patent Office (EPO), there was a certain lack of transparency in the election process. As a blog post by IAM Magazine reported at the time, mischievous rumours quickly emerged from the EPO staff union newsletter (PDF link) to fill the vacuum of information regarding the circumstances of Mr Battistelli’s appointment.

“Battistelli’s original contract was negotiated in secret with Mr Jesper Kongstad, the then Acting (and now actual) Chairman of the Administrative Council. It was rumoured, intriguingly, that the contract specified that Mr B’s place of employment was the Parisian suburb of Saint Germain-en-Laye (the town of which he was deputy major, the spiritual home of football team Paris Saint-Germain and the birthplace of Louis XIV, the Sun-King), and that it contained an annex granting him full pension rights at the end of his five-year contract. While Merpel, whose nine lives invariably make any sort of pension annuity unaffordable since the pension must last so much longer than expected, can see the attraction of having full pension rights after a relatively short employment stint, she wonders what advantage or reason could lie behind deeming Mr Battistelli’s place of employment to be 700 km west of where his office is actually located, if there is any substance behind that improbable rumour. The union newsletter, SUEPO Informs, also reported that Mr Kongstad refused to show the final contract negotiated with Mr Battistelli to the Administrative Council (‘AC’), despite repeated requests by its apparently quite powerless members.”

The EPO’s staff representatives have initiated contact with investigators by now. This was mentioned very briefly in the print version of the article published in “Die Welt” on the 24th of August (entitled “Stress at the Munich Kremlin”). We covered this before, so it’s not completely secret that outside investigators may be starting to show an interest in the EPO’s mysterious conduct (or misconduct).

Our sources have more to say about this. Their research indicates that the EPO President Benoît Battistelli, formerly the Director of the French INPI, and the Chairman of the Administrative Council, Jesper Kongstad, who is the current Director of the Danish Patent and Trademark Office, have long-standing professional connections with Topić. This gives rise to the suspicion that Battistelli and Kongstad are putting professional and/or personal loyalties before the public interest in this matter and are colluding to prevent any independent investigation of Topić’s appointment.

The 2009 annual report of the Croatian State Intellectual Property Office records details of a study visit of senior Croatian officials of the authorities for the enforcement of intellectual property rights to the partner Danish institutions in Copenhagen and a return visit by Danish officials to the partner Croatian institutions in Zagreb. It also includes this mention of a “twinning project” between the Danish Patent and Trademark Office and the Croatia SIPO which took place in the context of a European Union Assistance Project [PDF].

The Web site of the Danish PTO confirms the existence of the Croatia twinning project. The Danish PTO website also provides evidence of co-operation between the Danish PTO and the Croatian SIPO going back as far as 2004.

A further spicy detail in this saga is the fact that Topić’s former deputy at the Croatian SIPO, Ms. Romana Matanovac Vučković, has been working as a consultant on an EU-funded project co-administered by the Danish PTO.

According to her personal Web site: “Since 2013, she has been cooperating with Pohl Consulting & Associates GmbH from Berlin and the Danish Patent and Trademark Office as a consultant in the project of legal assistance in the field of intellectual property at Kosovo, also funded by the European Union.”

The EU Kosovo project has a budget of ca. 1 million Euros [1, 2]. Ms. Matanovac Vučković was previously a deputy Director of the Croatian SIPO under Topić (ca. 2005-2008). During that period, she was also Croatia’s “alternate representative” to the EPO’s Administrative Council as confirmed by the following extract from the EPO Official Journal 2008: “During her time at the Croatian SIPO, Ms. Matanovac Vučković acted as head of an official body under the SIPO’s remit which was called the “Council of Experts on Remunerations for Copyright and Related Rights”. This appointment was controversial in Croatia and it was alleged to be unlawful due to a “conflict of interest” because Ms. Matanovac Vučković had previous worked for the Croatian Composers’ Society (HDS) and the private company “Emporion” which was involved in managing musical royalty payments. According to informed sources, her previous employment should have disqualified her from an appointment to the Council of Experts. It was claimed in the Croatian press that Ms. Matanovac Vučković only secured the position due to her connections with the Croatian President Ivo Josipović.”

Sources (in Croatian) can be found here and the English translation was published by us last week.

More information is to follow next week, reinforcing the allegation that the EPO’s abuse goes all the way to the very top.

Corporate Media Confirms the Demise of Software Patents in the United States; Will India and Europe Follow?

Posted in America, Asia, Europe, Patents at 3:47 pm by Dr. Roy Schestowitz

Gavel

Summary: It has become increasingly official that software patents are being weakened in the United States’ USPTO as well as the courts; will software leaders such as India and Europe stop trying to imitate the old USPTO?

YESTERDAY we wrote about the measurably huge decline in the number of patent lawsuits in the US. There is some more good news in the form of figures.

Andrea Peterson, writing for the Bezos-owned Washington Post, says that “Software patent approval rates sink in months following Supreme Court case”. The patent lawyers, understandably, are stressed about this. They spent so much time attacking the decision or trying to characterise it as anything but a game changer. We gave dozens of examples at the middle of this year. Here again are a couple of patent lawyers using a straw man: “it is doubtful that all software, computer-implemented and business method inventions will be affected by Alice. For example, software inventions that improve the functioning of a computer, or improve other technical fields, may still be eligible for patent protection. Still, while the full effect of Alice is yet to be determined, entities seeking to patent inventions directed to software, computer implementations, and business methods, need to ensure that inventions are sufficiently innovative and directed to concrete ideas.”

“The patent lawyers, understandably, are stressed about this.”Mike Masnick already caught the news from the morning and wrote: “The impact of the Supreme Court’s ruling in Alice v. CLS Bank continues to reverberate around the industry. We’ve already noted that courts have been rapidly invalidating a bunch of patents, and that related lawsuits appear to be dropping rapidly as well. And, now, a new analysis from a (pro-patent) law firm suggests that the US Patent Office is rejecting a lot more software patents as well.”

Software superpower India does not have software patents, but after meeting executives from Microsoft (which has enormous influence over the Indian government), Amazon, Facebook and other patent aggressors it looks like things may change. According to this article about Modi’s trip to the US:

The US-India Joint Statement signed during Modi’s visit to the US has opened the doors for two Indian laws that have been passed by the Indian Parliament. One is on patents – the Indian Patents Act – that contain some measures to keep drug prices low for the people, which the US and its pharmaceutical industries have been trying to change for the last decade. The second is on nuclear liability, again anathema to the US nuclear industry.

Here is a little something about privacy too: “The Modi visit is also important for what he did not raise with the US government. There was no mention of the NSA spying in India, which included the BJP as well. There were six political entities in the world that the NSA spied upon officially, and one of them was the BJP. India is also one of the 33 countries that have signed a 3rd Party agreement with NSA giving it access to our telecommunications and Internet infrastructure. That means India not only allowed NSA to spy on any entity or any person in India but also provided them the physical access required for such spying. Modi not only did not utter one word of protest against such spying against his own party, but also made clear his intention to continue such relationship under Defence and Homeland Security clauses of the Joint Statement.”

It is sad to say this, but India seems to be assimilating to the US system when it comes to patents and also when it comes to militarisation and surveillance.

As we showed before, the corrupt EPO is bringing Europe closer into alignment with the corporations-run USPTO while the USPTO itself is moving away from software patents these days. We covered this aspect of the situation several weeks ago.

Our next post will focus on some more scandals from the EPO.

Links 14/10/2014: CAINE 6, New RHEL, Dronecode

Posted in News Roundup at 12:50 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • OpenDaylight Helium gets out of the gate

    OpenDaylight is an open source SDN controller. In its short lifetime, OpenDaylight has gained support from a diverse set of companies and individuals who are eager to see an open source controller serve the networking needs of traditional IT, cloud infrastructure platforms, traditional virtualization management, and fleets of containers. Cisco released the initial code in 2013 and the project now includes 41 paying members.

  • OPNFV Project Begins Planning Open Source NFV Solutions

    The Open Platform for Network Functions Virtualization (OPNFV), the collaborative partnership for advancing open source software-defined networking and data centers that the Linux Foundation announced last month, is now officially live. Here’s what it’s up to so far, and what it hopes to becomes over the coming months and years.

  • 11 open source security tools catching fire on GitHub

    The famous tenet “all bugs are shallow” is a cornerstone of open source development. Known as Linus’s Law, the idea that open code leads to more effective bug detection in one’s projects is often the first thing IT pros think of when it comes to the security upside of the open source model.

  • Jono Bacon: Open Source is Where Society Innovates

    Throughout history, social and technological progress has been the result of people working together for change. Today community is just as important and instrumental as ever – enabled by the internet and social media, said Jono Bacon, senior director of community at XPRIZE and former Ubuntu community manager, in his keynote Tuesday at LinuxCon and CloudOpen Europe in Dusseldorf.

  • Amazon Getting More Involved With Open Source

    Amazon is not resting on their laurels though. They have rapidly adopted Docker into several AWS offerings, and are constantly improving the platform.

  • Amazon Web Services Aims for More Open Source Involvement

    In 2006, Amazon was an e-commerce site building out its own IT infrastructure in order to sell more books. Now, AWS and EC2 are well-known acronyms to system administrators and developers across the globe looking to the public cloud to build and deploy web-scale applications. But how exactly did a book seller become a large cloud vendor?

  • Events

  • Web Browsers

    • Mozilla

      • Zen Web to Join Firefox OS Phone Players in India

        Mozilla seems to be staying very focused on the low end of the smartphone market with its Firefox OS platform, despite the high-end evolution of iOS and Android. Recently, Firefox OS phones have been arriving in India, priced well under $50, and promising to put phones in the hands of users who have never had them before.

      • Zen Web to Join Firefox OS Phone Players in India

        Now, Zen Mobile has announced it will arrive in the Firefox OS market in India with a low cost mobile phone available later this month.

      • Now, Zen Mobile to launch low cost Firefox smartphone in October

        Just few weeks into the unveiling of the first Firefox OS device in the the Indian market, Mozilla announced further partnerships with popular mobile device brands and app partners in India to launch new smartphones and content services.

      • Firefox 33 Brings OpenH264 Support

        Most notable about the Firefox 33 web browser update is that it integrates OpenH264 sandboxed support via Cisco’s H.264 open-source support.

  • SaaS/Big Data

    • Hadoop, Trove to Take Center Stage in the OpenStack Arena

      Slowly but surely, database-as-a-service functionality has been emerging as an important component of the evolution of the OpenStack cloud computing platform. When the OpenStack Icehouse version arrived in April, the Trove database-as-a-service project was one of the under-the-hood offerings. And now, the OpenStack Juno version is slated to arrive on Oct. 16, featuring a significatnly improved version of Trove.

    • EMC Snaps Up OpenStack Startup Cloudscaling
  • Oracle/Java/LibreOffice

  • BSD

  • FSF/FSFE/GNU/SFLC

    • JIT Support Is Closer To Landing For GCC

      Since last year there’s been an initiative for an embeddable GCC JIT compiler and ambitions to mainline the JIT support with LLVM long having been promoted for its Just-In-Time compilation abilities. Now with new patches, GCC JIT is a step closer to being mainlined.

  • Public Services/Government

    • Where new European Commission leaders stand on open source

      Many policy makers at senior levels—particularly those without experience in ICT—are not expected to have a firm grasp of issues surrounding open source and open standards. Nonetheless, Ansip displayed facility on these issues during his hearing, calling for software produced by the EC to be made open source. When he was initially asked about “free software,” he responded by talking about “open source.” Although a minor point, it provides indication that he is not new to these issues.

    • Nearly all of Romania’s universities use Moodle

      The vast majority (85 percent) of Romania’s 105 universities are now using Moodle, an open source e-learning platform, reports the country’s Moodle community manager, Herman Cosmin. “They appreciate its world-wide community and the involvement of the national community.”

  • Openness/Sharing

    • Open Access/Content

      • Lulu CEO on the invention of the self-publishing business

        Lulu.com helped define modern publish-on-demand services. In my mind, they did define them; I remember printing my first photobook and sending it to Lulu to be sent back, spiral-bound. I was amazed. I had essentially put together a small markup language (DSL, or Domain Specific Language, even), processed it through a Scheme script, and spit out LaTeX that produced reasonably pretty pages that could be converted to PDF and submitted for publication. I think I bought two copies.

    • Open Hardware

  • Programming

    • Vagrant

      How many times you have been hit by unit tests failing because of environment differences between you and other team members? How easy is it to build your project and have it ready for development? Vagrant provides a method for creating repeatable development environments across a range of operating systems for solving these problems. It is a thin layer that sits on top of existing technologies that allows people working on a project to reproduce development environments with a single command: vagrant up.

    • Undertaker 1.6 Works For Linux Kernel Static Pre-Processor Code Analysis

      Undertaker is a project centered around static code analysis for code with C preprocessor directives. Undertaker is based on the VAMOS and CADOS research projects and is able to analyze the preprocessor directives of the Linux kernel.

    • Self-documentation of code

      The inadequacy or lack of documentation of software is a recurring issue. This applies just as often to proprietary software as it does to free software. Documentation of code has two main purposes: to make the code readable for other programmers, and to make the code useable. Good documentation of free software is vital for users, and contributing to the documentation (or translation to a minority language) of a free software project is a good way to get involved for those who don’t know where to start, or how to program, and want to know how it’s done. The problem is a shortage of recruits.

Leftovers

  • Psst: border mostly secure

    For the past 10 years, Congress has tried to pass a comprehensive immigration reform bill. And for 10 years, Congress has failed.

    One of the biggest obstacles to passing a law has been the insistence that the U.S.-Mexico border must be secure before any bill can be considered.

    While this demand has remained constant, the border has become more and more secure over the years, undermining the argument. Data released by the Department of Homeland Security confirm the Southern border is more secure than it has been in decades.

  • Health/Nutrition

    • Pakistan worried by surge in polio
    • Polio becomes ‘public health emergency’ in Pakistan as number of cases soars

      As world health officials struggle to respond to the Ebola epidemic, Pakistan has passed a grim milestone in its efforts to combat another major global health crisis: the fight against polio.

    • Polio on Rise in Northern Pakistan Following Taliban Ban on Polio Vaccinations

      In 2012, the Pakistani Taliban and other militant groups banned polio vaccinations in the North Waziristan region; vaccinations are believed by some radicals to be cover for the sterilization of Muslim children, while paranoia may also have been provoked by the phony hepatitis vaccination campaign the CIA used to gain access to Osama bin Laden’s compound before he was killed. (The doctor who helped the CIA organize the campaign is serving 23 years in prison on separate charges believed to be pretexts to punish him for aiding the U.S.)

    • Bomb kills two polio vaccinators in Mohmand Agency

      Nobody claimed responsibility for the bombing, but militants have been aggressively targeting immunisation workers across Pakistan. The militants allege polio vaccination is a cover for espionage or Western-conspiracy to sterilise Muslims. Those conspiracy theories gained further traction after the CIA recruited a local doctor to start a vaccination programme during the hunt for Osama Bin Laden which dismayed many aid and health workers.

    • Bomb blast kills two polio vaccinators

      Those conspiracy theories gained further traction after the CIA recruited a local doctor to start a vaccination programme during the hunt for Osama Bin Laden which dismayed many aid and health workers.

    • Pakistan Battling Not Only Polio, but Misinformation

      Pakistan is losing ground in the battle against polio, with the country suffering its worst outbreaks in more than a decade.

      Efforts to erase polio are hampered by suspicions that health workers are spies, following the CIA’s use of a vaccination team to track Osama bin Laden. That legacy led to two polio workers being killed Wednesday.

      Since December of 2012, militants have killed several dozen health workers involved with the Pakistan vaccination program and the police officers escorting them.

    • Polio Spreads in Pakistan

      As Ebola rages on in West Africa, Pakistan is dealing with a terrible outbreak of polio. More than 200 people have contracted the disease this year, the worst infection rate in more than a decade, The Washington Post reported this week (October 7).

      “We want to limit the virus outside of our boundaries and want to work to control it in our boundaries, but it’s certainly a very challenging situation ahead,” Ayesha Raza Farooq, the polio eradication coordinator for Pakistan’s government, told the Post.

    • Millions Missing From DEA Money-Laundering Operation

      At least $20 million went missing from money seizures by law enforcers, critical evidence was destroyed by a federal agency, a key informant was outed by a US prosecutor — contributing to her being kidnapped and nearly killed — and at the end of the day not a single narco-trafficker was prosecuted in this four-year-long DEA undercover operation gone awry.

  • Security

    • Security advisories for Monday
    • VeraCrypt a Worthy TrueCrypt Alternative

      If you’re reluctant to continue using TrueCrypt now that the open source encryption project has been abandoned, and you don’t want to wait for the CipherShed fork to mature, one alternative that’s well worth investigating is VeraCrypt.

      VeraCrypt is also a fork of the original TrueCrypt code, and it was launched in June 2013. IT security consultant Mounir Idrassi, who is based in France, runs the project and is its main contributor.

    • DEFCON Router Hacking Contest Reveals 15 Major Vulnerabilities

      It’s clear from the fact that the list spans many different manufacturers that the problem is not unique to any one company. It affects nearly all router makers, and a huge percentage of Internet users. And if these brand names are not familiar, that doesn’t mean you’re safe: the Actiontec Q1000, for example, is provided by Verizon Communications to its customers.

    • Too many secrets, not enough service

      The Secret Service these days is performing about as well as the Iraqi security forces have been against the Islamic State. On both fronts, the White House is saying that this time it will work better. But nothing has really changed.

    • Rep. Cummings: Many African-Americans Fear Obama Security Decreased Due To Race
  • Defence/Police/Secrecy/Aggression

    • Propaganda War on Islamic State Militants

      Washington uses ISIS/ISIL/Islamic state (IS), Nusra Front, Al Qaeda and likeminded groups strategically as enemies and allies. At times, simultaneously.

      In the 1980s, CIA-recruited mujahideen fighters battled Afghanistan’s Soviet occupiers.

      Ronald Reagan called them “the moral equivalent of our founding fathers.” They’re today’s Taliban despite distinct differences between them. Longstanding US support enhanced radical Islamic strength. Extremist groups were natural Cold War allies.

    • Cubana Flight 455: Remembering the Victims of US-Supported Terrorism

      October 6th, is the 38th anniversary of the first act of terrorism against civilian aviation in the western hemisphere – the unparalleled Cubana air disaster on the coastline of Barbados on October 6, 1976 – the Barbados crime. Cubana flight 455 was hit by two C-4 explosives bombs just after the aircraft took off from the then Seawell Airport (now the Grantley Adams International Airport) in Barbados at an altitude of 18,000 feet.

    • Cuba Mourns Anniversary of Terrorist Bombing of Cubana Flight 455
    • ​Hasta siempre, Comandante! Che Guevara’s ideas flourish decades on
    • Che Guevara: The Rorschach Revolutionary
    • Branfman revealed U.S. bombing of Laos

      Fred Branfman, the first person to draw public attention to a previously unknown U.S. bombing campaign inside Laos during the Vietnam War and who later became a leading anti-war activist in Washington, has died at a medical facility in Budapest, where he had lived for several years. He was 72.

    • Larry Berman and the “Perfect Spy” (Part 1)

      At first he did not want me to write the book. He did not want anyone to write the book. Many people who knew him during the war are famous journalists like Stanley Karnow and others. They offered An $500,000 to write his memoirs. And An kept saying “No, because if I tell the secrets, too many people would be hurt”.

    • Anything that flies on anything that moves

      In transmitting President Richard Nixon’s orders for a “massive” bombing of Cambodia in 1969, Henry Kissinger said, “Anything that flies on everything that moves”. As Barack Obama ignites his seventh war against the Muslim world since he was awarded the Nobel Peace Prize, the orchestrated hysteria and lies make one almost nostalgic for Kissinger’s murderous honesty.

    • From Pol Pot to ISIS

      The Americans dropped the equivalent of five Hiroshimas on rural Cambodia during 1969-73. They levelled village after village, returning to bomb the rubble and corpses. The craters left monstrous necklaces of carnage, still visible from the air. The terror was unimaginable. A former Khmer Rouge official described how the survivors “froze up and they would wander around mute for three or four days. Terrified and half-crazy, the people were ready to believe what they were told … That was what made it so easy for the Khmer Rouge to win the people over.”

    • Australia’s new secret police

      When Greg James QC recently launched Frank Walker’s book Maralinga on British nuclear tests in Australia, the former NSW Supreme Court judge said the Australian Security Intelligence Organisation was involved in an associated program to collect the bones of dead children without the parents’ permission.

      Jones later explained that he obtained this previously unpublished information, although not precise details, while representing military veterans exposed to radiation from the tests in 50s and 60s. However, the book provides a powerful reminder of the harm that can be done by using national security to conceal indefensible behaviour.

      Walker sets out how 22,000 bones, mostly of babies and young children, were removed from corpses as part of a secret program to examine the effects of the radiation, which the tests spread across large parts of Australia. The program, that began in 1957 and lasted 21 years, was kept secret until 2001.

    • Leon Panetta reveals nuke plan for South Korea

      The U.S. government discussed a plan with the Lee Myung-bak administration to use nuclear weapons if North Korea invaded the South, a former U.S. defense secretary and CIA director has disclosed.

    • Pittsburgh protests new round of wars

      On October 4, Pittsburgh anti-war forces braved bitter cold rain and hail to stand against a new round of wars in the Middle East. Over 50 demonstrators gathered at Schenley Plaza on University of Pittsburgh’s campus for a rally organized by ANSWER Coalition, the Anti-War Committee of the Thomas Merton Center, and many other local peace groups. Protesters connected the wars abroad to the cuts in social services at home by chanting “Money for jobs and education, not for wars and occupation!”

    • Report recommends controversial American-Iranian policy changes

      The Iran Project is a non-governmental organization seeking to dissolve American-Iranian differences.

    • Request for release of info in ’96 TWA crash denied

      The First US Circuit Court of Appeals on Monday upheld a District Court finding that the CIA was permitted to keep the material secret, under exemptions in the FOIA law.

    • Rushing to War in the Wrong Places

      Andrew Bacevich has done a tally of the number of countries in the Islamic world that, since 1980, the United States has invaded, bombed or occupied, and in which members of the American military have either killed or been killed. Syria has become the 14th such country. Several of the countries have been the scene of U.S. military operations more than once.

    • Historic museum vote exposes rift among Bay of Pigs veterans

      For nearly 30 years, the renovated Little Havana duplex off Calle Ocho has been home to artifacts and images from the failed CIA-backed attempt in 1961 by Cuban exiles to overthrow the communist regime of Fidel Castro. It has hosted international politicians, movie stars and grade school students and held memorials for the dozens who died during the Bay of Pigs invasion.

    • Stop the U.S. blockade of Cuba now!
    • The real reason it’s nearly impossible to end the Cuba embargo

      “I think we should—we should advocate for the end of the embargo” on Cuba, Hillary Clinton said in an interview this summer at the Council on Foreign Relations. “My husband tried,” she declared, “and remember, there were [behind-the-scenes] talks going on.” The way the pre-candidate for president recounts this history, Fidel Castro sabotaged that process because “the embargo is Castro’s best friend,” providing him “with an excuse for everything.” Her husband’s efforts, she said, were answered with the February 1996 shoot-down of two US civilian planes by the Cuban air force, “ensuring there would be a reaction in the Congress that would make it very difficult for any president to lift the embargo alone.”

      The history of this dramatic episode is far more complicated than Hillary Clinton portrays it. But she is correct about one thing: Should she become president, it will be far harder for her to lift the 50-year-old trade embargo against Cuba than it would have been when her husband first assumed the office. The person most responsible for that, however, is Bill Clinton.

    • Biden continues to apologize; first Turkey, now UAE

      Vice President Joe Biden apologized to the United Arab Emirates Sunday for charging that the oil-rich ally had been supporting al Qaida and other jihadi groups in Syria’s internal war, his second apology in as many days to a key participant in the U.S.-led coalition against Islamic State extremists.

    • VP Biden Apologizes for Telling Truth About Turkey, Saudi and ISIS
    • US Vice President Joe Biden Apologizes After Calling Sunni Allies ‘Largest Problem in Syria’

      US Vice President Joe Biden has once again got himself in hot water, this time with key Sunni allies, after blaming them for indirectly facilitating the growth of the Islamic State militants in Syria.

    • Biden’s Admission: US Allies Armed ISIS
    • During Month of Gaffes, Vice President Biden Says Something Brilliant

      Mr. Biden’s remark also reveals the arrogance of American foreign policy. By always looking for the next Jefferson or Madison we refuse to recognize that other countries may have other models or paths to follow, and that the American experience is not universal — a belief that may spring from good intentions and a generosity of spirit, but also reflects an unwillingness to accept real differences between people and countries. It is the political equivalent of believing that everybody everywhere can speak English if you just speak it loudly and slowly enough.

    • Who ‘Lost’ Iraq? The Panetta Fantasy

      A growing number of high officials in American foreign policy engage in two all-consuming pastimes. One is the relentless pursuit of power, status and acclaim. The other is striving mightily, upon leaving office, to doctor the historical record so as to airbrush their misdeeds while striking a pose of statesmanlike wisdom and skill. The unforeseen rise of IS is provoking an outbreak of the latter.

    • Netanyahu Calls US Rebuke Over Jewish Settlements ‘Un-American;’ Praises Obama for Airstrikes Against ISIS

      Israeli Prime Minister Benjamin Netanyahu said in a television interview that a recent White House rebuke of Israeli settlement construction in the West Bank and East Jerusalem is “against American values,” but he praised President Obama’s decision to attack ISIS in Iraq and Syria.

    • ‘US-trained ISIS militants used to reorganize Middle East’

      WE: It’s brought them to the point of war between Shia and Sunni. That certainly was not the case before 2003. There was an uneasy truce – but it was a truce. In Syria, you had Shia and Sunni living side by side, Alawites and so forth. Same in Turkey and in Iraq. And now? Look at what General Petraeus did in Iraq to create this holy war between Shia and Sunni there – with his strategic Hamlet-kind of insurgency, trainings, secret police, and what not. And now we are reaping the result. ISIS has been trained by US Special Forces in Georgia. They’ve recruited Chechens as soldiers, they trained them in secret NATO bases inside Turkey and Jordan. For the last year and a half, they have been developing what we now call ISIS (IS, ISIL or DASH) or whatever moniker you want to give it. It’s all made in Langley, Virginia (the CIA’s seat) and [by] the affiliates of Langley inside the Pentagon.

    • Opinion: Rebel effort in Syria still splintered

      The squabbling factions that make up the Syrian “moderate opposition” should get their act together. But so should the foreign nations — such as the United States, Turkey, Qatar, Saudi Arabia and Jordan — that have been funding the chaotic melange of fighters inside Syria. These foreign machinations helped open the door for the terrorist Islamic State to threaten the region…

    • The Anglo-American Empire’s War of Conquest. The War on the Islamic State (ISIL) is a Lie
    • Three reasons Obama is relieved to have UK support against Isil

      With the RAF now flying combat missions over Iraq, President Obama’s national security team is breathing a little easier. After all, even as UK participation in the coalition became likely, Parliament’s August 2013 rejection of air strikes against Assad has lingered in Washington memory. The prevailing fear was that Britain could no longer be relied upon.

    • Parliament approves motion to send 600 Canadian soldiers, CF-18 jets to Iraq War against ISIS

      Harper has maintained that ground soldiers will not be deployed to the battle in an effort to limit Canadian casualties. However, the mission could be expanded to fight ISIL militants in Syria, although federal opposition parties have demanded for a new vote over any expansion of the combat mission into the neighbouring country.

  • Transparency Reporting

  • Environment/Energy/Wildlife

    • How much leverage do donors really have on climate change?

      Kim himself will be participating in a panel focused on ways to boost renewable energy and in particular the role of the aid community in limiting greenhouse gas emissions.

      But how much influence do top development donors actually have in the fight against global warming? Very little, according to Jairam Ramesh, India’s chief negotiator at the 2009 climate change conference in Copenhagen.

  • Finance

    • Los Angeles Minimum Wage Raise Process Begins

      There was confusion on Tuesday at the Los Angeles City Council meeting. Supporters of the minimum wage raise expected council members to vote on the motion to raise the minimum wage.

    • Russia and China team up to destroy the petro dollar

      Actions of the West in Eastern Europe and ongoing pressure on Russia may eventually intensify the movement to combat the petrodollar. The biggest danger to the oil currency is likely to be related to China and its plans to increase the role of the yuan in the world.

      Russia and China currently discuss the creation of a system of inter-bank transactions, which would be an analogue to the international system of bank transfers – SWIFT. This was announced by First Deputy Prime Minister Igor Shuvalov after talks in Beijing.

      “Yes, this idea was discussed and supported,” he said, when asked about the possible creation of an analogue to SWIFT in bank transactions between China and Russia.

      SWIFT is an international interbank information transfer and payment system. The system is also known as SWIFT-BIC (Bank Identifier Codes), BIC code, SWIFT ID or SWIFT code. The system was founded in 1973; 239 banks from 15 countries acted as co-founders.

  • PR/AstroTurf/Lobbying

    • Neo-Con Speed Dating

      The TV debates for the Westminster election will offer you a dazzling range of neo-con policies from right wing to very right wing. Conservative, Labour, Liberal or UKIP, any flavour of corporate neo-con control that you like. It is a kind of weird speed dating circle between Cameron, Clegg, Miliband and Farage.

    • CBS Evening News Offers False “He Said, She Said” Equivalence In Voter ID Report

      These types of strict voter ID laws are popular among Republican lawmakers, despite the fact that they are redundant and there is no evidence of widespread, in-person voter fraud — the type of fraud voter ID laws are designed to prevent. Nevertheless, on the October 10 edition of CBS Evening News, correspondent Chip Reid’s segment on the recent legal decisions affecting Texas and Wisconsin’s voter ID laws failed to report this simple truth about voter suppression:

    • War on Witches: Reagan Judge Denounces Myth of Voter Fraud

      Voter ID is “a mere fig leaf for efforts to disenfranchise voters likely to vote for the political party that does not control the state government,” federal appellate Judge Richard Posner wrote in a scorching dissent published October 10.

    • ‘Panetta Is Trying to Rewrite History’

      Just as they did with Robert Gates, White House officials are trying to avoid too much of a public spat with Leon Panetta, the latest former high-level administration insider to criticize the president, in the not unreasonable hope that the less they say, the quicker the story will go away.

      But as they seethe quietly over what they consider the Pentagon chief’s disloyalty, administration officials are also bashing him in private, distributing a long raft of statements that he made as Obama’s CIA director and later as defense secretary that sometimes appear to contradict or undermine Panetta’s claims that he argued strenuously to keep U.S. troops in Iraq after 2011 and urged a military intervention in Syria.

    • Jim Newton leaves Times

      As editor at large, he brought his experience and knowledge to the paper’s editorial board. He is also co-author of “Worthy Fights,” the new book by Leon Panetta, former defense secretary and CIA chief.

    • Non-Denial Denials: The Most Ludicrous and the Most Heinous

      Some non-denial denials come incredibly close to flat-out lies, and that one sure did. It relied on a legalistic definition of “sexual relations” that Clinton later explained did not cover repeatedly receiving oral sex from Lewinsky, because, for his part, he had no “intent to arouse or gratify” her.

    • Leading German Journalist Admits CIA ‘Bribed’ Him and Other Leaders of the Western ‘Press’

      Now that he has abandoned not just the anti-Islamic but the anti-Russian elements of traditional German culture, he no longer is welcomed among the conservative Germans who had helped him to build, and then, for decades, to advance, his successful long career as a ‘journalist,’ but which he now calls “propagandist.”

  • Privacy

    • Unity3D Games “Phone Home” With Details Of Your Hardware & Software

      A tweet sent out by the Unity engine folks earlier about their stats page mentions that all Unity games automatically send your data to them on the first launch. This is interesting and worrying.

    • National ID system described as threat to privacy

      A proposed national ID system pending approval in the House of Representatives will threaten the privacy of ordinary citizens, a party-list lawmaker warned on Wednesday.

    • With This Tiny Box, You Can Anonymize Everything You Do Online

      No tool in existence protects your anonymity on the Web better than the software Tor, which encrypts Internet traffic and bounces it through random computers around the world. But for guarding anything other than Web browsing, Tor has required a mixture of finicky technical setup and software tweaks. Now routing all your traffic through Tor may be as simple as putting a portable hardware condom on your ethernet cable.

  • Civil Rights

    • What’s Driving the Hong Kong Protests

      As a progressive, Chinese-fluent journalist who has spent years working in China and especially Hong Kong, and who has spent decades exposing the secret workings of US agencies and their network of fake NGOs in support of US empire, as well as their anti-democratic activities here in the US, I can understand why people might be suspicious, but I want to explain that Hong Kong is not Ukraine or even Venezuela or Brazil.

      [...]

      I give this history to make it clear that there is a multigenerational history of struggling for and defending individual rights and of fighting for democratic rights in Hong Kong. Hong Kong people are not new to this stuff, and as an educated population with access to a world of information in their open media and wide open internet, they are not a population that is readily susceptible to the kind of manipulation and subversion practiced typically by the likes of the NED.

    • Sunflower protests about values, not fear of China: official

      Taiwan’s student-led protest against a trade-in-services agreement with China earlier this year was held to preserve values cherished in Taiwan, not out of fear of China, a Taiwanese official stated in a response to an op-ed in the United States said Tuesday.

    • Taiwan’s protests about values, not fear of China: official
    • Washington’s Ukrainian Puppet Regime Seeks NATO and EU Membership

      Despite the heightened state of tension between Russia and the West on the international stage, the Prime Minister of Ukraine – Arseny Yatsenyuk – recently called for Ukraine to join the North Atlantic Treaty Organisation (NATO). If Ukraine was to join the alliance in the near future it would signify a further escalation in a situation that is already beginning to spiral out of control, as it would directly threaten Russia’s strategic security.

    • Guantanamo judge: No need to order MRI of accused USS Cole bomber’s brain

      CIA agents waterboarded al Nashiri and subjected him to a mock execution before his arrival at Guantanamo in 2006. He subsequently got a military medical diagnosis of post traumatic stress disorder. A consultant who examined al Nashiri said the scan was necessary in order to determine how to provide him with proper health treatment at the prison.

    • Judge: Hearing to determine admissibility of terror suspect Anas al-Liby’s statements

      A federal judge on Wednesday ordered a hearing on whether to suppress statements by a Libyan terror suspect who claims he was shell-shocked from being tasered and kidnapped by Delta Force operatives and subjected to a harsh shipboard CIA interrogation.

    • Suspected Bomb Plotter Challenges CIA Detention
    • Activist from Buvajda blackmailed by authorities

      The Uzbek authorities are threatening Negmatjon Siddikov’s imprisoned son Sadyr should the activist refuse to disassociate himself with Elena Urlaeva, the head of the Human Rights Alliance of Uzbekistan (PAU).

    • ‘Who the f**k authorized this?’ Obama’s chief of staff cursed Panetta over CIA torture probe

      Former CIA Director Leon Panetta says that he was cursed at by President Barack Obama’s former chief of staff after he agreed to cooperate with the Senate’s investigation into his agency’s torture tactics in the wake of 9/11.

      In passages taken from his new book and published online by the Intercept, Panetta explains the event that triggered the outburst, which flowed from the former chief of staff Rahm Emanuel, a man notorious for his profanity-laced tirades.

    • Panetta Says Rahm Emanuel Cussed Him Out for Cooperating With Torture Inquiry
    • Rosenberg letters at BU exhibition

      “I am well aware that we face many long days and difficult obstacles have to be overcome before we can really see victory,” Ethel Rosenberg wrote while behind bars in 1952, “but I’m still confident that we’ll win our freedom.” Of course, she and husband Julius , convicted in 1951 of conspiracy to commit espionage, did not win their freedom, and a year later they were executed in the electric chair.

    • US Counterterrorism Communications Center Running Public Diplomacy, Not Infowar

      The US State Department’s Center for Strategic Counterterrorism Communications (CSCC) is conducting public diplomacy, not information warfare against the Islamic State (IS) and other terrorist organizations by contesting the space of digital communication and challenging extremist propaganda, the CSCC coordinator told RIA Novosti on Tuesday.

      “It is 100 percent overt public diplomacy as the US government has been doing over decades. Everything we do is overt,” Alberto Fernandez told RIA Novosti when asked if he considered the CSCC mission to be information warfare. Speaking of the CSCC efforts to counter terrorist and extremist messaging on the internet, he continued, “That’s why we’re seeking to contest the space, to unnerve the adversary, to change the conversation.”

    • DEMOCRACY’S POROUS BORDERS: ESPIONAGE, SMUGGLING AND THE MAKING OF JAPAN’S TRANSWAR REGIME

      The world of espionage and undercover operations is the realm where the state – the maker of laws – deliberately breaks its own laws in the interest of self-preservation. In this sense, it forms part of the realm that Carl Schmitt, and more recently Giorgio Agamben, have termed “the state of exception”, and that Susan Buck-Morss calls the “wild zone of power” — the zone where power is above the law. This realm has become a greater and more important part of almost all political systems over the past half century. In an age of information, the possession and guarding of secrets is more than ever crucial to political power; and in a globalized age, the complexity of multilayered cross-border interactions impels the state to develop ever-more extensive information gathering systems, to guard against multiple challenges to its authority emerging from wide range of directions.

    • Asset seizures fuel police spending

      Police agencies have used hundreds of millions of dollars taken from Americans under federal civil forfeiture law in recent years to buy guns, armored cars and electronic surveillance gear. They have also spent money on luxury vehicles, travel and a clown named Sparkles.

    • “It breaks my heart”: How a SWAT team upended my baby’s life — and got away with it

      A SWAT team blew a hole in my 2-year-old’s chest — and just got off scot-free. But here’s why it gets even worse

  • DRM

  • Intellectual Monopolies

    • Copyrights

      • “Megaupload’s Imaginary Copyright Crimes Should be Dismissed”

        The U.S. Government is trying to get their hands on the assets of Kim Dotcom and his fellow defendants through a civil lawsuit, claiming that they are the proceeds of crime. Megaupload’s legal team is striking back against these allegations and informs the court that the Government’s case is built on nonexistent crimes.

10.13.14

Microsoft’s Disdain for Women Steals the Show at a Women’s Event

Posted in Deception, Microsoft at 2:26 pm by Dr. Roy Schestowitz

Satya Ballmer
Satya Ballmer

Summary: Steve Ballmer’s successor, Satya Nadella, is still too tactless to lie to the audience, having been given –through subversive means — a platform at a conference that should have shunned Microsoft, a famously misogynistic company

Several days ago we warned that Microsoft was hijacking the Grace Hopper conference and thankfully enough Microsoft just continues to show its hatred towards women, not the opposite. Still, Microsoft became the news. Everything else received little or no coverage. This in itself derailed the event.

Microsoft totally stole the show last week. The show was not about Microsoft, but a publicity stunt and some bribes typically distort events in Microsoft’s favour.

“Microsoft hijacked a conference about women in tech last week and this made it the topic of the whole coverage…”Microsoft booster Stephen Withers reminds us how companies bribe journalists, for example, as he ends his article with this: “Disclosure: The writer traveled to the Progress Exchange conference as the guest of the company.”

This is how Microsoft bribes journalists, giving them flights and other perks in exchange for event coverage and Microsoft propaganda in the international media. It is fake journalism that is actually PR, not journalism. See how this abusive company where managers don’t get along (high tensions between Gates and Ballmer) is characterised in the press as one big happy family. Total lie. Unchallenged.

Now let’s get back to the point. Microsoft hijacked a conference about women in tech last week and this made it the topic of the whole coverage as seen here. “First,” says The Register, “we discovered that things had gotten so bad between former Microsoft bosses Bill Gates and Steve Ballmer that they don’t even speak to each other anymore.” Then comes lots of Microsoft woman-washing (trying to associate Microsoft with women).

“Microsoft was able to hijack media coverage of yet another conference,” told us a reader. “Microsoft participation is toxic.” Here are some more examples of how Microsoft hijacked coverage of this event. There remains a stigma that women cannot succeed in FOSS and that one cannot enter into the community unless “a white male” (this is from a Microsoft-friendly site).

Nadella — let’s face it — is not a real Microsoft CEO, for reasons that we covered before. He is a Microsoft front end. The company is still controlled and run by serial criminals. Ballmer and Gates put a Ramji in charge of that mole strategy against FOSS for similar reasons; these people are a PR facet that hides their employer’s insidious activities (bribes, racketeering, et cetera).

Nadella has not done well in his speech. He actually offended women, even though it was not his intention. Nadella is not yet a good liar like Ballmer and Gates, but he did make the headlines (unlike Grace Hopper) , ending up in the middle a PR gaffe. Now he’s in a rush to apologise.

“What Bill and Satya did not want covered,” says our reader, is the angle that is so embarrassing and Sarah Gray explained to a lot of readers at Salon (Microsoft has already tired to change her article).

SCOTUS May Soon Put an End to the ‘Copyrights on APIs’ Question While Proprietary Giants Continue to Harass Android/Linux in Every Way Conceivable

Posted in Google, Oracle, Patents at 1:56 pm by Dr. Roy Schestowitz

Summary: Google takes its fight over API freedom to the Supreme Court in the Unites States and it also takes that longstanding patent harassment from the Microsoft- and Apple-backed troll (Rockstar) out of East Texas

“Google makes a series of compelling points in its petition,” writes Simon Phipps in relation to Google’s defence against Oracle (SCOracle, continuing the tradition of SCO’s copyrights misrepresentation). Google has found some material errors in interpretation of laws/cases, citing the corrupt CAFC with its utterly ridiculous ruling that we covered at the time. “These points alone seem strong to me,” says Phipps, “[b]ut Google also says CAFC has made a serious error that ignores the precedent of earlier SCOTUS decisions and violates the distinction between copyright and patent as monopolies.

“On the first point, Google refers back to the SCOTUS Lotus v Borland case in 1996. Google points out that “methods of operation embodied in computer programs are not entitled to copyright protection,” then asserts that the Java class APIs are a method of operating the Java class implementations. Since Android’s implementations of the Java APIs are Google’s original work, the company claims copyright does not apply.”

Oracle in the mean time is grabbing some talent from Google and it is not yet clear if there will be a SCOTUS case (the request for appeal may be denied). It is clear that CAFC does not understand software APIs or maybe it is just too corrupt (which becomes an accepted view these day), so this appeal has merit. As Pogson explained: “Copyright should not apply to other’s works. If you write software to work with some API, no other authour should be able to forbid that or to tax that. Yet, that’s what Oracle wants to do and they found a lower court that agreed with that despite that being an illegal extension of copyright to others’ work. Stranger still, Java is FLOSS…”

Here is some of the earliest coverage:

The legal fracas started when Google copied certain elements—names, declaration, and header lines—of the Java APIs in Android, and Oracle sued. A San Francisco federal judge largely sided with Google in 2012, saying that the code in question could not be copyrighted. But the federal appeals court reversed, and ruled that the “declaring code and the structure, sequence, and organization of the API packages are entitled to copyright protection.

This goes beyond patents and into copyrights on ideas/words. Oracle should not be allowed to win this as the is not just about Android but about software development in general.

Do remember that Oracle is in a pact with Microsoft and Apple when it comes to patents. They share control over CPTN, which is made out of Novell’s patents. There is a similar arrangement around Rockstar, which also involves Apple and Microsoft (Apple, Microsoft, Ericsson, RIM and Sony is the complete list). Joe Mullin says that Rockstar too is still harassing Google (Android) and Google has just managed to take the lawsuit of of the capital of trolls, East Texas:

It’s been nearly one year since Rockstar Consortium, a patent holding company owned in part by Microsoft and Apple, launched a major patent assault against Google. Now, the issue of where the case will be heard has finally been resolved—in Google’s favor.

Google took the case to the nation’s top patent court to get it out of East Texas and back to its home state, California. The matter of venue isn’t a mere sideline skirmish. East Texas courts are generally considered tough on patent defendants, with few cases resolving on summary judgment, stringent discovery rules, and last-minute scheduling decisions. Google’s Texas case was scheduled to be heard in front of US District Judge Rodney Gilstrap, who hears far more patent cases than any other district court judge in the nation.

The war against Android is a big deal for those of us who care about Free software and GNU/Linux. Let’s not lose sight of the fight against this kind of abuse. Public apathy helps crooked judges and abusive companies like Oracle, Microsoft, and Apple.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

Further Recent Posts

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts