08.25.15
Posted in Microsoft, Vista 10, Windows at 3:26 pm by Dr. Roy Schestowitz
Summary: Confirmatory evidence that Vista 10 is failing in the market about a month after its much-hyped (paid coverage) release
MUCH as we expected even well before Vista 10 came out, the market is overwhelmingly apathetic, regardless of the price. It’s just not interested in Vista 10.
“Microsoft has been on a tear with Windows 10 updates,” Ryan wrote in our #techrights
IRC channel (he used to be a Microsoft MVP and he follows Microsoft very closely). “It hasn’t even been a month and they’ve apparently already patched so many bugs it’s like an entire service pack has happened.”
“Vista 10 adoption is pathetic, especially when one considers the cost of an ‘upgrade’.”Vista 10 is clearly a failure (technically speaking and also in terms of sales), so Microsoft now wants to attract GNU/Linux users into its arms (to suffocate them with lock-in). It has gotten so bad that Microsoft (through Yahoo) is entering old versions of Ubuntu for surveillance purposes. If Canonical is pressured by Mozilla to make Firefox link to Microsoft (through Yahoo as a proxy/middleman), then users should move to IceWeasel or IceCat, if not drop Ubuntu altogether. There have also been several articles recently about how Microsoft was trying to sneak its surveillance and propaganda engine into Android.
At IDG, a Microsoft booster (strong professional ties to Microsoft) comes out with “False dichotomy,” to quote iopkh. “The real answer is move to GNU/Linux.”
“One common concern right now is privacy, not just the heap of serious bugs.”Vista 10 adoption is pathetic, especially when one considers the cost of an ‘upgrade’. This week it’s said that “Windows 10 now has 5.95 per cent of the desktop operating systems market, according to the folks at StatCounter.”
That’s hardly a gain since a week ago. “Windows 10′s growth has slowed, according to StatCounter Global Stats,” which means that it will possibly plateau at around 10%, despite so many people being ‘eligible’ for a ‘free’ ‘upgrade’.
One common concern right now is privacy, not just the heap of serious bugs. One has to wonder if Microsoft’s secret (proprietary) code in Vista 10 implements any callback functions for option buttons that relate to privacy. It is worth pursuing these questions. Did Microsoft add privacy ‘controls’ for a false sense of control or is this a bug? Is this just being disguised as a bug but is actually intentional? A lot of people were surprised that Microsoft does not obey privacy preferences from users; maybe they forgot it’s a company of cheaters and liars, not to mention bribes. Watch what Microsoft is still up to in Munich. █
Permalink
Send this to a friend
Posted in Patents at 2:53 pm by Dr. Roy Schestowitz
The Microsoft Mafia shows extreme hypocrisy
Summary: Possibly the world’s biggest patent abuser and monopolist, which also creates many patent trolls (including by far the biggest one), takes on a far smaller abuser in Court
“I owned the domain name http://nokiaplanp.com ,” wrote the President of the FFII this week, “p for patents, and now Nokia is turning in a patent troll” (we wrote about this before). Microsoft not only turned Nokia into a troll, but also used Nokia’s patents to feed other trolls, MOSAID for example (not to mention that Microsoft is behind the world’s biggest patent troll). Based on some of the latest reports from Finland [1, 2], Microsoft pushes Nokia further towards the cliff of patent trolling, turning the former mobile giant (bigger than any of its kind ever!) into nothing but a pile of patents. Reuters wrote that “initially announced in July, [additional cuts] are part of Microsoft’s plan to cut 7,800 jobs globally, most from the phone hardware business that it bought from Nokia last year.”
Microsoft layoffs are a Microsoft thing, not a Nokia thing, for reasons we explained before, so reject the Microsoft spin, but either way, Microsoft killed Nokia and quickly turned it into nothing but a parasite that taxes Microsoft’s competition, including Apple.
Now that InterDigital gives Microsoft a taste of its own medicine “Microsoft sues InterDigital for ‘monopoly power’ over mobile patents” (patents of InterDigital were covered here before [1, 2, 3, 4). Putting aside the obscenity of Microsoft suing for “monopoly power”, who’s really the troll and the patent abuser here? The hypocrisy is so fascinating. To quote one of the earliest articles about this (we found it last week), “Microsoft files antitrust suit against InterDigital in patent feud”:
InterDigital has violated U.S. antitrust law by failing to keep its promise to fairly license its technology considered essential to mobile phone communications, Microsoft said in a lawsuit on Thursday.
The complaint against InterDigital, filed in federal court in Wilmington, Delaware, deepens a long-standing fight over patent licensing between the two companies.
It comes as the U.S. International Trade Commission is set to rule this month on whether Microsoft smartphones should be banned from being imported into the United States for infringing two of InterDigital’s patents.
For Microsoft to accuse InterDigital of abuses with patents, monopoly abuse (and use antitrust laws to tackle these abuses) is a bit like President Putin accusing President Obama of freedom of speech violations. Let that sink in for a moment. █
Permalink
Send this to a friend
Posted in Europe, GNU/Linux, Microsoft, Windows at 2:20 pm by Dr. Roy Schestowitz
Summary: Microsoft and its minions refuse to leave Munich alone, even though the vast majority in Munich are perfectly happy with Free/libre software
A story that we covered here on Monday has received quite some attention, far more than we anticipated. It’s basically about a letter composed by two technically-incompetent people, which means it’s full of factual errors and serves more as Microsoft endorsement and scare tactics against GNU/Linux, ODF, and Free software. It’s about Munich, where two officials got a lot more press than they deserved (even in English-speaking media [1, 2, 3]). As one article put it, “proprietary software companies are known for their public affairs (lobby) large budgets.” The article recalls “90 percent discount from then Microsoft CEO Steve ‘I’ve had the time of my life’ Ballmer to keep Windows” (a form of bribery in a sense).
“The article recalls “90 percent discount from then Microsoft CEO Steve ‘I’ve had the time of my life’ Ballmer to keep Windows” (a form of bribery in a sense).”Continuing the trend and the line which we went along the other day, in this article from the Monday Glyn Moody said that Russian “Members of parliament [are] worried about personal and classified data being sent to the US.”
The British media covered this as well, saying that “Russian lawyers have filed a complaint calling for an outright ban – or at least tight restrictions – over the sale of Windows 10 in Russia.”
Well, they’re right and Munich would be ever so dumb to abandon software Freedom, having already paid a lot to escape the lock-in/exit barrier, whereupon it chooses to be spied on by a hostile country which targets Germany (political espionage). Moving to Windows would mean Vista 10 or later (our contacts at Microsoft says that future version will have even more spying).
Munich is going to stay with Free software, as before, but the Microsoft camp keeps trying to maintain the mythology of failure there. The negative press gives many officials the wrong impressions and scares them, discouraging any other nation-wide moves to GNU/Linux. That’s what it’s all about. █
Permalink
Send this to a friend
Posted in News Roundup at 1:03 pm by Dr. Roy Schestowitz
Contents
-
I enjoy using Linux on the desktop. Not because of software politics or because I despise other operating systems. I simply like Linux because it just works.
It’s been my experience that not everyone is cut out for the Linux lifestyle. In this article, I’ll help you run through the pros and cons of making the switch to Linux so you can determine if switching is right for you.
-
What can’t Linux do? Nowadays you hear Linux powering just about any device imaginable — all the way from dime-sized computers via the Raspberry Pi all the way to most of the top 100 supercomputers in the world. We interact with it daily, whether it be on our personal computers, Android devices, Steam boxes (gaming), flight entertainment systems, web servers that power behemoths such as Google, Facebook, and Wikipedia, or more.
-
Desktop
-
NO operating system is perfect and Linux is no exception.
In contrast to Windows and Mac OS X, however, Linux gives you a lot of choices—some might say, too many choices. DistroWatch.com lists more than 200 active distributions (or flavors) of Linux—and what’s more, each of these distributions allows you to customize the desktop environment.
-
I know of no other OS that is, as modular, or allows you this much control, over the ability…
-
I wasn’t initially accepted as an intern via the application process. But the 2 IT staff saw me helping a teacher with his laptop, and reconsidered my application on the spot.
My high school was, and still is, a strong partner with Microsoft.
-
Server
-
The Top 10 Linux server operating system distros ranked by ease of use, cost, available support and data center reliability.
We’ve researched, crunched the numbers and put dozens of Linux distros through their paces to compile our latest list of the top ten Linux server distributions (aka “Linux server distros”) — some of which you may not be aware.
-
Logic Supply’s Atom N2800 based “CC150″ industrial IoT gateway is loaded with a version of the Linux-based IoT Server software from Candi Controls.
The CC150 Internet of Things Gateway with Candi IoT Server is designed for “managing and controlling energy and operational data in commercial buildings and industrial sites with Internet of Things devices,” says Logic Supply. The hardware vendor teamed up with Candi, whose Linux-based IoT gateway software of the same name stands for Cloud-Assisted Network Device Integration. The preconfigured server enables connections to hundreds of IoT devices,” says Logic Supply
-
Then again, I always have a good time at Linux conferences. Whether they be the more community-driven events like the Southern California Linux Expo and LinuxFest Northwest or the more company-run expos like SUSECon and LinuxCon, these moments give me an opportunity to, quite simply, be around Linux nerds. Lots and lots of Linux nerds. These are my people.
-
IBM has made improvements to a set of services available through its cloud platform Bluemix, with the aim of enabling developers to integrate Java-based resources into their cloud-based applications.
With the new IBM Cloud tools, developers will be able to broaden the capabilities of their applications by utilising additional security and flexibility, providing users with a more robust cloud experience.
-
IBM is partnering with the National College of Ireland as part of its Academic Initiative for Cloud programme which will train new developers.
NCI is one of more than 200 colleges and universities globally that are developing new curricula using IBM’s Bluemix development platform.
-
-
-
Kernel Space
-
A study carried out by two security researchers revealed that the internal system used by Linux systems to produce random numbers, which are later utilized to encrypt data, is much weaker than previously thought.
-
If all goes well, the Linux 4.2 kernel will be officially released before the day is through. If you haven’t been keeping up with the flow of Phoronix articles over recent weeks, here’s a look at some of the highlights for Linux 4.2.
-
So rc8 isn’t a big rc, and most of it is actually some last-minute reverts for stuff that just wasn’t quite ready. Mostly drivers, with some networking, an x86 fix, and a smattering of perf tooling fixes. The shortlog gives an overview of the details.
-
Dear all, today is August 25, 2015, and the time has come for us, Linux users, to party in celebration of the 24th anniversary of the Linux project, announced by none other than its creator, Linus Torvalds, on the sunny day of Sunday, August 25, 1991.
-
A total of 63 patches were contributed upsteam by Collabora engineers as part of our current projects.
In the ARM multi_v7_defconfig we have the addition of support for Exynos Chromebooks, all options that had a tristate Kconfig option were added as module. After this change it was found that a few drivers weren’t working properly when built as module, so this was fixed. This work was done by Javier Martinez.
-
Many people have read that post by Linus Torvalds in the comp.os.minix newsgroup on Usenet, or at least heard about it. Many more are aware of how that (free) operating system ended up taking over vast swathes of the computing world, and becoming both “big” and “professional.” But what about before that famous moment? What were the key events that led to Linus creating that first public release of Linux?
-
-
-
-
-
Why complicate container management with a new platform when systemd can help you deploy and manage containers today?
-
The Linux Foundation is putting together a consortium that could have a big impact on cloud connectivity and storage. It is organizing a joint effort involving 13 tech companies to promote open source software and standards for cloud object storage technologies. Companies supporting the just launched Kinetic Open Storage Project include Cisco, Cleversafe, Dell, Huawei, NetApp, Red Hat, Seagate, Toshiba and Western Digital.
-
This weekend I finished the penultimate feature for the LVFS. Before today, when uploading firmware there was up to a 24h delay before the new firmware would appear in the metadata. This was because there was a cronjob on my home server downloading files every night from the LVFS site, running appstream-builder on them locally and then uploading the metadata back to the site. Not awesome at all.
-
Former Googler Kent Overstreet has announced that a long-term project to craft a new Linux file system is at a point where he’d like other developers to pitch in.
-
-
-
Graphics Stack
-
The developers of the open-source Mesa 3D Graphics Library that is currently used by default in numerous, if not all GNU/Linux operating systems, have announced the release of the fifth maintenance version of Mesa 10.6.
-
-
In the earlier days of Wayland, Intel was known for contributing a lot of resources toward this next-generation display technology to unseat the X.Org Server, but these days their contributions have been minimal.
While Wayland 1.9 is coming next month, Intel’s Open-Source Technology Center hasn’t had much of a hand in the development of this new version along with the Weston 1.9 compositor. Wayland’s releases continue to be managed by Bryce Harrington over at Samsung’s open-source group.
-
Benchmarks
-
Earlier this week I began my Intel Skylake Linux benchmarking by posting some initial results from the HD Graphics 530, the new Intel “Gen9″ graphics. While more Intel Linux HD Graphics 530 results are on the way, completed for this weekend are the initial CPU benchmark results comparing the Core i5 6600K to various other Intel Haswell/Broadwell processors as well as some AMD APUs and CPUs.
-
Applications
-
Shotcut is an free, open-source video editor app based on the MLT Multimedia Framework which works flawlessly on major operating system (Linux, Mac OSX and Microsoft Windows). Dan Dennedy as main developer shotcut video editor was started shotcut project in 2011, it is amature and stable application; both professionals and armatures use this to fulfill their video editing needs.
-
A pure maintenance release 0.1.3 of the RcppDE package arrived on CRAN yesterday. RcppDE is a “port” of DEoptim, a popular package for derivative-free optimisation using differential optimization, to C++. By using RcppArmadillo, the code becomes a lot shorter and more legible.
-
Proprietary
-
Opera Software, through Tomasz Procków, has informed all users of the Opera web browser that version 33 of the cross-platform software is now in development with lots of new features and numerous bugfixes.
-
Redbooth, a company that sells software with task management, videoconferencing, and messaging features, is announcing today that it has built a new native desktop client for Windows, Mac, and Linux. Until now people were only able to use Redbooth in a web browser, or on iOS and Android.
Redbooth is beginning a four-week beta program for the new desktop client. The company will roll it out for all of its customers later.
The company chose to develop desktop apps to meet the needs of some of its large enterprise customers.
-
Instructionals/Technical
-
Games
-
Shadowrun: Hong Kong, the third stand-alone game in the new Shadowrun series developed by Harebrained Schemes has been released on Steam, GOG, and Humble Bundle, and a Linux version is also available.
-
In 2014 and 2015, Linux became home to a list of popular commercial titles such as the popular Borderlands, Witcher, Dead Island, and Counter Strike series of games. While this is exciting news, what of the gamer on a budget? Commercial titles are good, but even better are free-to-play alternatives made by developers who know what players like.
-
The Ubuntu Touch platform needs a lot of apps to attract more users, but it also needs games. There aren’t a lot of complex, 3D titles available, and now TuxRacer is one of them.
-
Some users are reporting that Dying Light for the Linux platform no longer starts after the latest patch has been released.
Dying Light is one of the newest triple A games that landed on Linux in the past few months. The performance wasn’t great, and many users complained about the fact that it didn’t seem like a quality port. The developers pushed a few patches out the door, and the quality of the game for Linux users increased tremendously, even if it’s still not up to par with Windows.
-
Feral Interactive is a studio that specialized in porting games for the Linux and Mac OS X platforms, and they have already launched a number of titles. The developers are now making an extra effort to make their games work better on AMD hardware.
-
Desktop Environments/WMs
-
The developers of the Enlightenment open-source desktop environment used in numerous GNU/Linux operating systems have announced the release and immediate availability of the ninth maintenance version of Enlightenment DR 0.19.
-
-
K Desktop Environment/KDE SC/Qt
-
Tuesday, 25 August 2015. Today KDE releases a feature release of the new version of Plasma 5.
This release of Plasma brings many nice touches for our users such as much improved high DPI support, KRunner auto-completion and many new beautiful Breeze icons. It also lays the ground for the future with a tech preview of Wayland session available. We’re shipping a few new components such as an Audio Volume Plasma Widget, monitor calibration tool and the User Manager tool comes out beta.
-
Kdenlive, one of the rare free-as-in-speech video editors, started its life more than 12 years ago using KDE3 libraries. At that time, it was mostly the effort of a single person—coding, fixing bugs, publishing releases, managing the website. There was no real connection with the KDE Community. Good contributions came in from other people, but no team was built, a risky situation. In 2013, the main developer, Jean-Baptiste Mardelle, was not able to work on the project, so it was on hold for several months and had some technical problems. We tracked him down like a “Giant Spy” to get the project running until his return! That taught us a lesson. When Mario Fux presented the KDE Manifesto, it was the exact answer to our problem.
-
-
Reviews
-
Zorin OS Zorin OS is a GNU/Linux distribution that attempts to mimic the appearance of the Microsoft Windows operating system. I gave it a go roughly about a year and eight months ago (Zorin OS 8 Core) and my general impression was that it succeed in doing so, meaning that it was quite appealing in the eyes of a Microsoft Windows user.
-
So this time around, the grade is going to be much lower. About 6.5/10. SUSE, please, you’re better than that.
-
Jacque Montague Raymer is currently in Hong Kong (lucky him) and has just informed Softpedia about the new features implemented in the upcoming Beta build of his MakuluLinux Aero 10 distribution, which uses the Cinnamon desktop environment with a theme that resembles the look of Windows Vista.
-
New Releases
-
The Solus operating systems is on track for an October 1 release, but its makers do need help from the community. A fundraiser has been put forth by the Solus team, and anyone can contribute.
-
The OpenELEC team is proud to announce the fourth beta of OpenELEC 6.0 (v5.95.4)
The most visible change is Kodi 15.1 (Isengard). Beginning with Kodi 15.0 most audio encoder, audio decoder, PVR and visualisation addons are no longer pre-bundled into OpenELEC but can be downloaded from the Kodi addon repo if required. PVR backends such as VDR and TVHeadend will install needed dependencies automatically. For further information on Kodi 15.1 please read http://kodi.tv/kodi-15-1-isengard-maintenance-release/.
-
The Mageia Control Centre is a good tool for managing your software installations, your hardware and internet connections.
There haven’t been any crashes since I started using Mageia. The only real issue I had was the lack of sound whilst watching MP4 videos which I can’t give an answer to because it suddenly started working again. (Cue the people saying “you had the volume turned down, didn’t you?”.
So with everything that has been written can I now recommend Mageia to the readers of this blog? Absolutely.
-
Screenshots/Screencasts
-
Gentoo Family
-
The Docker container format makes it easier than ever to run application images on a Linux host, but what if you the application you want to run is an operating system? That’s what Sabayon Linux is now enabling with Docker based images for its upcoming releases. Sabayon is a desktop-friendly version of Gentoo Linux.
-
Arch Family
-
We are happy to announce our tenth update for Manjaro 0.8.13.
With this we updated most of our kernels, KDE frameworks to 5.13.0, mesa to 10.6.5, virtualbox to 5.0.2, fixed some issues with our steam client and renewed our KDE theme Maia. This new look will be included in our Manjaro 2015.09 release. Some work went into consolekit and the development branch of Calamares.
-
Red Hat Family
-
Red Hat was ranked at 26 on the list, which recognizes a total of 100 companies from around the world. It is the third time Red Hat has been honored by Forbes.
-
Legendary investor Warren Buffett advises to be fearful when others are greedy, and be greedy when others are fearful. One way we can try to measure the level of fear in a given stock is through a technical analysis indicator called the Relative Strength Index, or RSI, which measures momentum on a scale of zero to 100. A stock is considered to be oversold if the RSI reading falls below 30.
-
-
-
Fedora
-
The Fedora Project announced the release of Fedora 22. To celebrate the release a Fedora 22 a release party was organized at HackerEarth, Bangalore on August 01, 2015 with the help of rtnpro and lalatendu.
-
Fedora is one of my favourite systems, because provides to me the best tools ever…
-
Debian Family
-
During Jacob Applebaum’s talk at DebConf15, he noted that Debian should TLS-enable all services, especially the mirrors.
His reasoning was that when a high-value target downloads a security update for package foo, an adversary knows that they are still using a vulnerable version of foo and try to attack before the security update has been installed.
-
Debconf is a great opportunity to meet people in real life, to express and share ideas in a different way, and to work on all sort of stuff.
-
-
Regardless, my contributions to Debian were never noteworthy so it’s also not that big of a deal. I just need to close cycles myself and move forward, and the ten year anniversary looked like a significant mark for that.
-
Even though Debian has moved to systemd as default a long while ago now, I’ve stayed with sysv as I have somewhat custom setups (self-built trimmed down kernels, separate /usr not pre-mounted by initrd, etc.).
-
-
Derivatives
-
Valve is working on SteamOS version based on Debian 8, and it’s making good progress with it. The operating system is still considered a Beta, and it’s not ready for prime time, especially since developers are still making important upgrades.
-
Canonical/Ubuntu
-
Wubi was a tool made by Canonical that acted as an Ubuntu installed for Windows XP, Windows Vista and Windows 7, allowing users to install Ubuntu alongside those OSes. It’s been deprecated for two years, but it somehow “mysteriously” survived on the installation media until now.
-
We wrote just a few days ago about a Ubuntu 16.04 Stupendously Hot Charmander concept and a lot of people liked it. Because it’s the work of someone from the community, it’s unlikely that it will be become more than just that, a concept, but it seems to have taken a life of its own.
-
Ubuntu will have a dedicated PPA for video drivers, for now only for the Nvidia ones, and third-party developers are already praising the devs for this decision.
-
LibreOffice 5.0 was released a week ago, and one of the things mentioned in the announcement was the fact that it’s a cornerstone of the mobile clients for Ubuntu Touch and Android. A developer wanted to clarify what that actually meant.
-
Canonical’s Kyle Fazzari wrote an interesting article on his blog informing about the latest work done by him and his team of Ubuntu developers at Canonical for the Ubuntu Core operating system.
-
-
The new OTA update for Ubuntu Touch is almost here, but developers still need to work in order to fix all the problems. Some issues have been recently discovered, and the launch has been pushed back for few days, but it looks like we might get it this week.
-
Dustin Kirkland, from Canonical’s Ubuntu Product and Strategy team, told me in a long interview at LinuxCon, “We are really steamrolling towards a GA release of Ubuntu on z Systems. Users of z Series systems are the types that buy hardware for 5 and 10 years and that lines up very well with our LTS of Ubuntu.” He also said they need to do some work on tool chain to ensure they have components like gclib libraries on all of the compilers, including other bits such as Perl, PHP, Ruby, Python, etc., which are needed to build the Ubuntu universe. Users will start seeing that work coming out later this year and alpha/beta builds of Ubuntu in early 2016.
-
According to the latest statistics from The Cloud Market, Ubuntu now accounts for 59% of all images on the Amazon EC2 platform. Windows has 8%, and the other distributions of Linux split the remaining 33%.
Ubuntu’s popularity is due to the operating system’s regular updates, easily accessible images, and availability of enterprise-grade support. And, of course, the lack of license fees.
-
Desktop apps stores are dead, and their mobile-oriented equivalents are the future. That’s the message from Canonical, which has quietly made clear that it intends to jettison the Software Center in Ubuntu Linux to focus on mobile apps for Snappy Ubuntu Core.
-
Canonical’s Nathan Haines has informed us all about the launch of a new event for members of the Ubuntu Linux community, where they can contribute with photographic and illustrative wallpapers, as well as other multimedia content in order to celebrate the release of Ubuntu 15.10 (Wily Werewolf) operating system.
-
Today we have the great pleasure of introducing you to a brand-new project developed during the Ubuntu ShenZhen hackathon by Joseph Wang. It is called MrRobot, just like the TV show we taked about in a couple of articles right here on Softpedia.
-
On August 24, Canonical’s Łukasz Zemczak has sent in his daily report informing us all about the latest work done by the Ubuntu Touch developers in prepration for the major OTA-6 software update for the mobile operating system.
-
We’ve seen them all, Ubuntu running on virtually anything, Ubuntu powering all sorts of devices, from mobile phones to embedded and industrial PCs. Today, we want to show you Ubuntu MATE 15.04 running on Banana Pi BPI-M1.
-
We wrote a couple of weeks ago about the poor state of the Ubuntu Software Center, but it looks like other publications took this little too far. No, Canonical is not killing the Ubuntu Software Center, it’s just evolving.
-
Canonical just announced that a number of Thunderbird vulnerabilities have been closed in Ubuntu 15.04, Ubuntu 14.04 LTS, and Ubuntu 12.04, which also updates the version of the browser to 38.2.0.
-
-
After being introduced earlier this year in European countries, the first Ubuntu phones are now been announced in India. A Spanish manufacturer, BQ has unveiled its Aquaris E4.5 and Aquaris E5 HD smartphones in India with the price tag of Rs. 11,999 and Rs. 13,499, respectively. The firm has reported that these handsets will be available in Black and White color variants, exclusively at e-commerce retailer, Snapdeal by the end of the month.
-
Flavours and Variants
-
Apparently, the creator and lead developer of the Linux Mint project, Clement Lefebvre, already works on the next major release of the acclaimed Cinnamon open-source desktop environment.
-
-
The Logic Supply hardware company, known for selling all sorts of industrial and embedded computers powered by GNU/Linux operating systems like Ubuntu, announced the general availability of a fanless Internet of Things (IoT) gateway.
-
Intel showed off a 147 x 140mm “5×5″ SBC form-factor slotted between NUC and Mini-ITX, designed for socketable, LGA-based Intel Celeron and Core processors.
Spurred on by the success of its reference design for 102 x 102mm (4.0 x 4.0-inch) NUC (Next Unit of Computing) mini-PCs, many of which run Linux, Intel showed off a “5×5″ mainboard form-factor at last week’s Intel Developer Forum. Billed as being the “smallest socketed board standard,” 5×5 measures 147 x 140mm (5.79 x 5.51 inches), or 29 percent less than the 170 x 170 (6.7 x 6.7-inch) Mini-ITX.
-
Phones
-
Android
-
Google just launched its Android One initiative in Africa, a move that should help stave off competition and give the company even more mobile control in the region.
-
-
-
-
-
-
-
Google’s Street View allows you to see panoramic views of streets from your mobile device, allowing you to “take a walk” along a street so that you can check out a neighborhood. The latest version of Google Maps for Android, which happens to be version 9.13.0, includes a link to a Street View for your destination. All you need to do is click on the thumbnail at the lower left of the screen to get there. The thumbnail will appear when you search for an address inside the app, or with a long press to the map.
-
Google finally has a name for the next generation in Android OS, and it’s Marshmallow. While the update itself made its debut at Google’s I/O conference back in May, as reported by The Verge, it was then known as Android M. The new name follows Google’s pattern of naming individual releases after sweets alphabetically, something it has done for year
-
Dell entered the Android tablet market late last year by releasing the Venue 8 7000, a device with an understated though appealing form that contains good specs and an interesting camera technology.
-
An Android-powered slider may not be the only phone BlackBerry has pegged for Google’s mobile OS. Following the leaks of a device codenamed “Venice” that’s said to be offered in both Android and BB10 versions, a video of the recently announced Passport Silver Edition surfaced. The square QWERTY handset isn’t running BlackBerry’s software, though, it’s sportin’ Lollipop. In the video from Dudu Rocha Tec., a prototype version of the new Passport is equipped with what appears to be stock Android. It’ll be interesting to see if this phone also packs in some of BB10′s notable features like Venice is rumored to do. BlackBerry hasn’t tipped its hand on Android devices just yet, so we’ll have to wait and see if another model of the silver Passport will be the second model that’ll tempt those who prefer Google’s mobile software. BlackBerry is already working with Mountain View on a more secure enterprise version of Android, and a number of reports indicate that the company is planning it’s own Lollipop (or Marshmellow) phones in the near future.
-
BlackBerry’s anticipated ‘Venice’ Android slider smartphone has been in the news for weeks now. While the Canadian company is yet to make the handset official, there’s no shortage of leaks about the it.
-
Despite there being nearly 400,000 possible combinations of codes, an analysis by Martle Løge of the Norwegian University of Science and Technology of 4,000 of them found that they largely bore huge similarities.
-
-
-
-
-
-
-
-
-
-
-
-
There is good news on this front, however, as upcoming Android devices won’t be infused with as much bloatware as you’ve grown accustomed to.
-
Nokia may technically be non-existent in the mobile market right now as far as new devices are concerned. However, the Finnish manufacturer may already be looking for potential partner companies to help it make a comeback next year.
Based on the buyout deal between Microsoft and Nokia last year, Nokia may not be able to manufacture any mobile devices during that time as part of a non-compete agreement.
-
When Google introduced Android Pay back at Google IO 2015 this year at the end of May, it displayed that Google would be taking the mobile payments solutions seriously, but at the time they didn’t give a hard date for a launch of the service. Alongside that, since there has been no confirmed launch date for Android Pay by Google, it means there is no confirmed date for when users can expect to see the app available to download to their devices. A new rumor circulating the internet over this weekend claims that Android Pay will be launching on August 26th, that’s this Wednesday.
-
In the announcement, Huawei also boasted that the Honor 7i had a fingerprint sensor. However, unlike smartphones from other brands, the Honor handset’s sensor is neither located in front or at the back, but on its side.
In the report, the sensor can be easily reached by the thumb and can be used to take camera shots on the go. Like other fingerprint scanners, this sensor also enables the user to unlock the phone from sleep. Hopefully, there are more features and functions for this fingerprint sensor.
-
Here’s my suggestion… at least on a user level. If you want to use Smart lock to be able to gain quick and easy access to certain aspects of your device (such as the phone), but keep a modicum of security on other aspects (such as email, messages, etc), employ an app locker app (such as AppLock) to lock down the applications that require security.
-
With BlackBerry reportedly planning to release its first Android phone in November, the number of leaks surrounding the company’s rumored Venice slider are starting to come in at a furious pace.
-
New details about the BlackBerry’s upcoming Venice smartphone have cropped up via the credible tipster Evan Blass of @evleaks fame. According to one of his latest tweets, the BlackBerry Venice will be using BlackBerry 10 as the Android skin.
-
A new leak shows an image of the BlackBerry Passport Silver Edition running the Android 5.1 Lollipop operating system. This handset will reportedly be called the “BlackBerry Passport 2.”
-
Still (still?) looking for the Android tablet that fits your lifestyle? Maybe LG will capture your imagination, / wallet with a G Pad sequel that cranks up the processor speed (now a quad-core Snapdragon 800) while pairing it with a battery that’s actually smaller (7,400mAh) than its name-based predecessor. It’s now got a sharper 10.1-inch 1,920 x 1,200 display and while there’s an LTE option, there’s only a single color choice: Brilliant bronze. We’ll ignore those with third-place connotations from the outset, but it otherwise sounds like pretty inoffensive Android tablet.
-
This Android-based OS is quite probably being developed by Micromax’s Bengaluru team, and 75 people (mostly designers) acquired from Nokia‘s R&D department. Micromax’s co-founder has also mentioned that the developers will have the option to port their apps to the new OS, and that they’ll release far more details about the operating system in the coming months, though he did not provide any specific dates regarding unfortunately. He did, however, say that the first smartphones sporting this new OS will be available by the end of the financial year.
-
Android is known for offering users a greater degree of customizability and control than any other mobile operating system, but there are still limitations to what you can do with an Android phone right out of the box. To push beyond those limits, you need to root your device, which means you gain admin rights to it. This somewhat complicated process could void your warranty or, if something goes wrong, break your handset. Are the benefits of having administrative control of your phone worth the risks? Android enthusiasts would give you an unequivocal “yes,” but we’ve gathered a list of pros and cons to help you decide for yourself.
-
Can’t get enough of smartwatches? Well, a whole new batch is on its way.
-
Android Pay will give millions of people a new way to buy goods and services using their phones.
It was thought the payment system would launch alongside Google’s Marshmallow operating system, expected in October, but a leaked document suggests it could launch as soon as tomorrow.
However, other details in the document have since been proved to be inaccurate so it is unclear how reliable the leak is.
-
It took a while for Eric S. Raymond, one of the founding fathers of the open source movement, to prioritize the end user. But now that he has, he wants you to know how easy it can be.
-
Ubuntu grabbed a large portion of the headlines today with Canonical’s decision to abandon its paid software for desktops to concentrate on mobile devices. The Everyday Linux User reviewed Mageia 5 and Distrowatch.com has added “Release Model” to their database search options. Elsewhere, Danny Stieben said Linux is so great because it’s Open Source and Munich is consdiering switching back to Linux on some machines because folks said there were no text editors, Skype support, or office suites installed. All this and more in today’ Linux news round-up.
-
So if you have a musical bent, try composing an open source folk song. It’s fine to be silly, too. Surprise us with what you make. Share your story and your song(s) right here on Opensource.com
-
-
To be clearer, this term decoupling arises time & time again in relation to the cloud computing model of service-based processing and storage power.
-
In a nutshell, collaborative writing is writing done by more than one person. There are benefits and risks of collaborative working. Some of the benefits include a more integrated / co-ordinated approach, better use of existing resources, and a stronger, united voice. For me, the greatest advantage is one of the most transparent. That’s when I need to take colleagues’ views. Sending files back and forth between colleagues is inefficient, causes unnecessary delays and leaves people (i.e. me) unhappy with the whole notion of collaboration. With good collaborative software, I can share notes, data and files, and use comments to share thoughts in real-time or asynchronously. Working together on documents, images, video, presentations, and tasks is made less of a chore.
-
Earlier this month, mobile backend-as-a-service provider Parse open sourced its iOS, OS X, and Android SDKs, and will be open sourcing additional SDKs in the future.
Parse, which was acquired by Facebook in 2013, says that its SDKs are used by more than 800 million active app-device pairs per month. By open sourcing those SDKs, Parse believes it can help developers facing challenges similar to those it faced. Specifically, according to Parse, “We’ve had to figure out a way to make a public-facing API easy to understand and use, but continue shipping features fast without breaking any existing functionality. To solve this, we structured our public API as a facade for internal code and functionality that could be consistently changing.”
-
I have been recently reminded that while it may be hard enough to discuss the role and importance of communities for Free and Open Source Software, it is equally important to understand the complexities and the challenges that a Free and Open Source Software foundation has to meet.
-
Web Browsers
-
Mozilla
-
Mozilla announced major upcoming changes to Firefox add-ons on the official Add-ons Blog today. These changes affect add-on developers and Firefox users alike, and will have a major effect on add-on compatibility and permissions.
-
Information security man Clint Ruoho has detailed server-side vulnerabilities in the popular Pocket add-on bundled with Firefox that may have allowed user reading lists to be populated with malicious links.
The since-patched holes were disclosed July 25 and fixed August 17 after a series of botched patches, and gave attackers access to the process running as root on Amazon servers.
Ruho says the bookmarking app functioned as an internal network proxy and subsequent poor design choices meant he could glean information on users including IP address data and the URLs customers saved for later reading. Adding redirects meant he gained access to the etc/passwd file.
-
SaaS/Big Data
-
It was just last October that I put up a post noting that Mirantis, which has steadily remained a nimble player in the OpenStack cloud computing arena, had nailed down a massive $100 million Series B funding round led by Insight Venture Partners. The financing was billed then as the largest Series B open source investment in history.
-
-
The OpenStack open-source cloud-computing platform stands to gain more enterprise features thanks to a major financial and engineering deal between Intel and Mirantis.
-
Oracle/Java/LibreOffice
-
The latest LibreOffice 5.0 is out for some time and it looks like the feature parity with Microsoft Office 2013 is now a lot better. The official wiki from The Document Foundation that shows off the differences and similarities between the two office suites has been updated, and it paints a pretty accurate picture of the progress that’s being made.
-
Today’s release of LibreOffice-from-Collabora 4.4 combines Collabora’s latest compatibility, deployment management, and document integrity features with a host of improvements from the LibreOffice community. Redesigned toolbars, menus, rulers, and dialogues make these powerful additions more attractive and efficient to use.
-
Business
-
Semi-Open Source
-
Dan Hill, product lead at Airbnb, wrote the company’s pricing algorithm after the British-based rival startup he cofounded, Crashpadder, was acquired by Airbnb, the short-term rental giant, a few years ago.
-
BSD
-
OpenBSD, through Dave Wreski, announced the immediate availability for download of the first point release of the OpenSSH 7 and Portable OpenSSH 7 open-source SSH (Secure Shell) protocol 2.0 implementations.
-
Project Releases
-
Public Services/Government
-
Poland’s Agency for Restructuring and Modernisation of Agriculture (ARMA) wants to modernise its animal identification and tracking system. The new solution is required to use Zabbix, an open source solution for IT security monitoring.
-
Openness/Sharing
-
-
On September 4-5, the Port of Rotterdam is to hold the third edition of what has now become its annual World Port Hackaton. Hackers, programmers, stakeholders and enthusiasts are invited to attend the two-day event and join the teams. Together they will work on concepts and prototypes that deploy new technologies and (open) data, aiming to strengthen the safety, sustainability and competitiveness of the port.
-
Open Hardware
-
Fully upgradable virtual reality headset, the Open-Source Virtual Reality (OSVR) Hacker Development Kit is now powered by Xilinx FPGAs. Buyers of this kit are provided with modules based platform, positioning and head tracking device, a display, and double lens optics.
-
Programming
-
Ransomware are a pain for PC and laptop owners because they encrypt PCs/Laptop in return for a ransom which if not paid may permanently lock away users important folders like your images, word and excel files etc. However upto now the malware for Ransomware was only available on Dark Web, but that will change now thanks to a Turkish security researcher, Utku Sen.
-
-
-
Faster PHP is approaching. PHP 7.0.0, which has been promoted as a much quicker upgrade to the server-side scripting language, has just gone into a release candidate stage, bringing its general availability even closer to fruition.
-
I’m writing a replacement for libthread_db. It’s called Infinity.
-
That’s from a great little article by Chromatic about modern Perl in the latest issue of PragPub. The article goes in to discuss a number of other strengths of Perl, such as its strong community dedication to testing across numerous architectures, services for understanding package dependencies (that sound like they go beyond anything presently available for Ruby), and legendary standards of documentation.
-
Standards/Consortia
-
The government has launched a consultation on how best to proceed with several open standards proposals that will support inter-connected systems and more cost efficient digital transformation across Whitehall.
-
Open policy making, Open Data and international cooperation are three pillars that UK Minister for the Cabinet Office Matt Hancock wants to be included in the 2015 UK Action Plan, according to a speech given by the minister to mark the launch of a new Open Government Partnership (OGP) action plan (Transcript is accessible on the gov.uk website).
-
Adobe’s Flash, hated the world over for slowing down computers, containing more holes in security than swiss cheese and stubbornly being the video carrier of choice until recently, is dying.
Video players are migrating to other systems, even if Microsoft’s Silverlight isn’t much better. HTML5-based video and animations are becoming mainstream, and uploaders and other more advanced web-based features can now be replaced with code that doesn’t rely on Flash.
-
Back when Steve Jobs launched the first salvo in the war against Adobe Flash, declaring in no uncertain terms that the iPhone would never support the ubiquitous Web media framework, the anti-Apple crowd was much amused. No one is laughing now — least of all the many IT vendors that have built their management interfaces in Flash, for whom the death of Flash poses huge challenges.
At the time, Jobs seemed to be climbing out on a limb. But eventually, everyone came to see how painful it was to support Flash on mobile devices, and how much better HTML5 was at delivering the same basic functionality. Developers began skipping over Flash and going with alternative technologies so that they could support mobile and desktop clients with the same codebase.
-
Jeff Lawson is a walking, talking example of the rise of the developer.
Today, he’s the CEO of API economy darling Twilio, a cloud platform that offers API-accessible telecom services to marquee customers like Home Depot and Uber. But 20 years ago, he was another computer science student who saw the power of the Internet and wanted to try his hand at building Web applications.
-
Hardware
-
I often get teased for taking so much tech hardware with me on trips—right up until the Wi-Fi at the hotel, conference center or rented house fails. I’m currently on vacation with my family and some of our friends from Florida, and our rental home has a faulty Wi-Fi router. Thankfully, I have a bag full of goodies for just this occasion.
-
Health/Nutrition
-
Local doctors are in the eye of a storm swirling for the past three years over whether corn that’s been genetically modified to resist pesticides is a source of prosperity, as companies claim, or of birth defects and illnesses
-
Security
-
One of the best kept secrets at this week’s LinuxCon was the presence of Linus Torvalds. I’ve never not seen Linus at any of the LinuxCons I’ve attended since 2009, whether in Europe or North America, but no matter who you asked, the answer was, “He’s not here.” This morning, though, a little bird sang that the surprise guest for the upcoming keynote was none other than Torvalds.
-
During the LinuxCon and CloudOpen events that took place last week in Seattle, North America, Linux Foundation’s Core Infrastructure Initiative announced that they were developing a new free Badge Program and that they wanted to know the open source community’s opinion on the matter.
-
Some days it seems like the Internet is about as secure as an over-filled diaper. There’s always crap leaking from seamy businesses, such as Ashley Madison; the Federal government, OPM and IRS; and even security companies like LastPass. One of the weakest security links is the connection between you and unsecured web sites. Now almost a year since it was proposed, Let’s Encrypt is almost ready to enable any Internet site to protect its visitors with free Transport Layer Security (TLS) certificates.
-
-
-
Imagine it’s 1995, and you’re about to put your company’s office on the Internet. Your security has been solid in the past—you’ve banned people from bringing floppies to work with games, you’ve installed virus scanners, and you run file server backups every night. So, you set up the Internet router and give everyone TCP/IP addresses. It’s not like you’re NASA or the Pentagon or something, so what could go wrong?
That, in essence, is the security posture of many modern automobiles—a network of sensors and controllers that have been tuned to perform flawlessly under normal use, with little more than a firewall (or in some cases, not even that) protecting it from attack once connected to the big, bad Internet world. This month at three separate security conferences, five sets of researchers presented proof-of-concept attacks on vehicles from multiple manufacturers plus an add-on device that spies on drivers for insurance companies, taking advantage of always-on cellular connectivity and other wireless vehicle communications to defeat security measures, gain access to vehicles, and—in three cases—gain access to the car’s internal network in a way that could take remote control of the vehicle in frightening ways.
-
In addition to unforgettable life experiences and personal growth, one thing I got out of DEF CON 23 was a copy of POC||GTFO 0×08 from Travis Goodspeed. The coolest article I’ve read so far in it is “Deniable Backdoors Using Compiler Bugs,” in which the authors abused a pre-existing bug in CLANG to create a backdoored version of sudo that allowed any user to gain root access. This is very sneaky, because nobody could prove that their patch to sudo was a backdoor by examining the source code; instead, the privilege escalation backdoor is inserted at compile-time by certain (buggy) versions of CLANG.
That got me thinking about whether you could use the same backdoor technique on javascript. JS runs pretty much everywhere these days (browsers, servers, arduinos and robots, maybe even cars someday) but it’s an interpreted language, not compiled. However, it’s quite common to minify and optimize JS to reduce file size and improve performance. Perhaps that gives us enough room to insert a backdoor by abusing a JS minifier.
-
Defence/Police/Secrecy/Aggression
-
Two light planes have crashed at an airshow in Switzerland, killing one of the pilots.
Swiss police said they were two of three C-42b aircraft from Germany, flying in formation. They crashed after they touched in mid-air on Sunday morning.
-
For some writers, imperial freedom floats all boats (and not just the capitalists’). They thank hegemonic powers for liberalism itself, asserting that imperial naval (or air) power deployed overseas leaves domestic liberalism unharmed. By contrast, standing armies are said to threaten domestic liberty. Yet embracing imperial means, we might expect very thin liberalism indeed; with Machiavelli’s “republic for increase” walking the earth, we might at least speak frankly of “free trade imperialism.”
-
French Interior Minister Bernard Cazeneuve said on Saturday there had been “several shots” before the Moroccan was subdued by the passengers, who included three Americans.
-
North and South Korea reached agreement early on Tuesday to end a standoff involving an exchange of artillery fire that had pushed the divided peninsula into a state of heightened military tension.
Under the accord reached after midnight on Tuesday morning after more than two days of talks, North Korea expressed regret over the recent wounding of South Korean soldiers in a landmine incident and Seoul agreed to halt anti-Pyongyang propaganda broadcasts, both sides said.
-
Environment/Energy/Wildlife
-
Prof. Wolff joins RT News to discuss Soros coal investmens. Billionaire philanthropist George Soros has invested more than $2 million in US coal giants Peabody Energy and Arch Coal despite having once called the coal industry the “lethal bullet” of climate change.
-
It’s a well-worn truth of our current, globally warming times that the glaciers are melting, but Greenland’s Jakobshavn Isbrae glacier is putting the rest to shame. The glacier, already one of the world’s fastest-melting, just lost what may have been its biggest chunk of ice to date.
-
-
Finance
-
Earlier today, as AAPL stock was plummeting and had lost a whopping $75 billion in market cap, dropping as low as $92/share, CNBC’s Jim Cramer pulled a rabit out of a hat, or in this case a previously undisclosed email out of his inbox.
-
-
A demonstration in Helsinki opposing the current government’s proposed cuts to social services drew thousands of people on Saturday. Although the Helsinki Police say the event proceeded peacefully, they detained nine people that were blocking roads and refused to make way for traffic even after the march had reached its final destination.
-
Prof. Wolff discusses with Jerry Robinson the dark side of capitalism on Follow The Money Daily podcast.
-
This global public consultation, initiated by the German government, started in April 2015. It aims at creating a national dialogue on the quality of life in Germany. “The German government aims to identify yardsticks that can be used to pinpoint the many different facets of the quality of life”, according to a statement on the government website. Now members of the government are directly participating in the debate.
-
Chinese market suffer worst day in eight years and Russia’s rouble falls to all time low in chaotic trading which has seen more than €5 trillion off global stocks in two weeks
-
The Chinese market slumped 8.45 per cent on Monday trading as a terrifying selloff raised fears that Black Monday could spread to European and US markets.
The Shanghai Composite index, China’s most important index of shares, dropped 8.45 per cent, erasing gains made this year, while the tech-focussed Shenzhen Composite also slid 7.6 per cent.
Bank and energy stocks were worst hit, but the falling price of commodities such as oil and gas has also weighed on markets.
-
The FTSE fell below 6,000 for first time since 1 January 2013 as the meltdown in China accelerated with the Shanghai composite crumbling by 8.5%.
-
-
PR/AstroTurf/Lobbying
-
The Oscar-winning director of Crash, who left the church in 2009, has criticised journalists for failing to address the Mission: Impossible star’s beliefs
-
The stock market closed a wild Monday with the Dow Jones industrial average down over 500 points, setting off fresh fears about the health of the global economy.
The Wall Street drama quickly spread to the 2016 campaign trail and Washington, as flashbacks to the 2008 financial crisis drew responses from the political world.
Renewed concern about the strength of China’s economy kicked off a brutal opening, as the Dow opened down more than 1,000 points in the first minutes of trading. While the index largely erased those gains later in the day, it still ended Monday down 588 points, adding to large losses suffered the two days prior.
-
Labour leadership candidates quizzed on BBC 5 live, Andy Burnham accused of making sexist remark and Yvette Cooper attacks Jeremy Corbyn
-
Censorship
-
Twitter has shut down a network of sites dedicated to archiving deleted tweets from politicians around the world. The sites — collectively known as Politwoops — were overseen by the Open State Foundation (OSF), which reported that Twitter suspended their API access on Friday, August 21st. Twitter reportedly told the OSF that its decision was the result of “thoughtful internal deliberation and close consideration of a number of factors,” and that the social media site didn’t distinguish between politicians and regular users.
-
On Friday night, August 21, Open State Foundation was informed by Twitter that it suspended API access to Diplotwoops and all remaining Politwoops sites in 30 countries. After Twitter suspended API access for the US version of Politwoops for displaying deleted tweets of US lawmakers on May 15, Open State Foundation was still running Politwoops in 30 countries, including the European parliament.
-
Malaysia’s new Communications and Multimedia Minister has proposed amending the country’s Internet laws to force news websites to register with the government. Human rights groups have been quick to denounce the proposal as a threat to free speech.
-
Hey, remember when this designer made a whole bunch of amazing internet-themed World War II propaganda parodies? Well, one of those just cropped up in the actual military, albeit not for the first time. In an online bulletin earlier this month, the US Air Forces Central Command repurposed the iconic “loose lips sink ships” slogan to warn service members about the potential dangers of social media. As you might have guessed from the photo above, it’s now “loose tweets destroy fleets.”
-
-
Privacy
-
Amazon has decided to stop accepting Adobe Flash ads starting next month. The move, which goes into effect on September 1, affects not just the company’s website, but its whole advertising platform.
-
The crime itself was ordinary: Someone smashed the back window of a parked car one evening and ran off with a cellphone. What was unusual was how the police hunted the thief.
Detectives did it by secretly using one of the government’s most powerful phone surveillance tools — capable of intercepting data from hundreds of people’s cellphones at a time — to track the phone, and with it their suspect, to the doorway of a public housing complex. They used it to search for a car thief, too. And a woman who made a string of harassing phone calls.
In one case after another, USA TODAY found police in Baltimore and other cities used the phone tracker, commonly known as a stingray, to locate the perpetrators of routine street crimes and frequently concealed that fact from the suspects, their lawyers and even judges. In the process, they quietly transformed a form of surveillance billed as a tool to hunt terrorists and kidnappers into a staple of everyday policing.
-
A BRACE OF LAW FIRMS ARE BEHIND A class action lawsuit against Ashley Madison because it did not do enough to protect personal and private information.
The class action case, from two Canadian law firms, argues that the hookup stations failed users by not protecting their information and for not deleting it after a fee had been paid to ensure its deletion. It seeks $578m.
According to the New York Post the lawyers want some satisfaction for a cluster of punters who are currently wearing outraged expressions and regretting joining a site that does what it does in the way that it does it.
-
It’s already clear that, despite handling very sensitive data, Ashley Madison did not have the best security. Hackers managed to obtain everything from source code to customer data to internal documents, and the attackers behind the breach, who call themselves the Impact Team, made a mockery of the company’s defenses in an interview.
-
Civil Rights
-
-
-
In early March, Russian prosecutors launched spot inspections of nongovernmental organizations (NGOs) across the country. Hundreds of groups have already been targeted, from human rights NGOs to environmental groups to health-care associations. Formally, prosecutors are checking compliance with a new law forcing organizations that receive foreign funding and are deemed to engage in “political activity” to register as “foreign agents” — a derogatory term that critics say aims to stigmatize NGOs. Russian authorities say the legislation, which entered into force in November 2012, aims at increasing the transparency and accountability of NGOs. But the audits have drawn international condemnation and raised fears of an unprecedented crackdown on civil society. The number of NGOs subjected to such inspections is difficult to assess due to the absence of an official registry. Most are still waiting for the inspection findings. RFE/RL is closely monitoring developments and will regularly update this chart and map.
-
Black’s interest in the air traffic controller is not insignificant: testimony by “Carlos the Spanish air traffic operator” is one of the earliest versions of the MH17 catastrophe touted by RT and other Kremlin-aligned media, which were immediately exposed as fake. There’s no evidence that WikiSpooks is Kremlin-funded or in any way aligned, but its motivation is explicitly expressed in their mission statement: any fact promoted by the “official narrative” via the “commercially-controlled media” is inherently false and must be disputed. Hence, to WikiSpooks and other similar websites, the position that Russia or Russia-backed rebels shot down MH17 is false simply because it is endorsed by the American government and must be confronted, even if it leads to a jumble of contradictory versions of the same event, based on spurious evidence.
-
…big companies offered paid holidays, guaranteed pensions related to your final salary, sickness benefit and recognised trade unions. Above all, they offered the chance of a career and personal progression…
-
Lisa Simeone posts at TSA News Blog on some of what’s been revealed through the docs released in the request by Sai, “an intrepid, indefatigable young man.” As Simeone writes, “He has been forced to tangle with the TSA more than once, when the agency’s workers have bullied, harassed, and illegally detained him.” Chasing illegal movie downloaders proves an unprofitable exercise
-
Internet/Net Neutrality
-
Google joined hands with Facebook to try and prevent the Internet and Mobile Association of India, which represents some of the largest Internet companies in India, from taking a stand that counters Zero Rating. According to emails exchanged between IAMAI’s Government Relations committee members, of which MediaNama has copies, Vineeta Dixit, a member of Google’s Public Policy and and Government Relations team, strongly pushed for the removal of any mention of Zero Rating from the IAMAI’s submission, as a response to the Department of Telecom’s report on Net Neutrality. Please note that Google hasn’t responded to our queries, despite multiple reminders.
-
Intellectual Monopolies
-
Copyrights
-
Danish police have arrested two men alleged to be the operators of sites related to the open-source program Popcorn Time, which adds a user-friendly front-end to a BitTorrent client to make the whole process of finding, downloading, and viewing video torrents extremely simple. The two domains, Popcorntime.dk and Popcorn-time.dk, have now been shut down, but copies on the Wayback Machine show that both were merely information sites, and neither offered material that infringed on copyrights, nor any version of the Popcorn Time software itself. Both sites warned users about potential copyright infringement issues.
The men are accused of “distributing knowledge and guides on how to obtain illegal content online,” as TorrentFreak reports, and have apparently pleaded guilty. Moreover, distributing information is considered such a serious violation of Danish copyright law that “they could face punishment under section 299b of the penal code—offenses which carry a maximum prison term of six years.” That seems an extraordinarily harsh and disproportionate upper limit for merely explaining how to use a program, just because copyright is involved in some way.
A similar case has already been heard in the UK, where it was found that sites offering downloads of the Popcorn Time software contributed to the copyright infringement that results from its use. In April of this year, the English High Court ordered a number of sites to be blocked for this reason. However, in that case the sites enabled the program to be downloaded directly, whereas in Denmark, the accused simply offered basic information about how the software worked and could be used, together with links to other sites where the program could be obtained.
-
Millions of users lost access to their personal files when Megaupload was raided, and after nearly four years their files are still stashed away in a Virginia warehouse. The company that owns the servers wants to get rid of them, so former Megaupload user Kyle Goodwin has once again asked the court if he can have his files back.
-
It has been a bad week for companies wanting to build businesses around make money from illegal movie downloaders. Last Friday saw an Australian judge refuse Voltage Pictures the rigth to send downloaders of Dallas Buyers Club a letter demanding an undisclosed payment. Justice Nye Perram decided that Voltage and its lawyers, were engaging in “speculative invoicing”, a practice that is a form of legal blackmail: “pay us a large enough sum so that we don’t take you to court where you will possibly face an even larger but unspecified fine”.
-
Discussions about copyright reform in Australia are now entering their fourth year, and the longer they go on, the worse the proposals become. That’s in part because there has been a change of government in the interim, and the present Attorney-General, George Brandis, has made it clear he’s firmly on the side of copyright companies, and indifferent to the Australian public’s concerns or needs in a digital world.
-
Anti-piracy campaigns come in all shapes and sizes and usually aim to prod the public into action. To capture the imagination they are often provocative, but just how far is too far? A new campaign for Virgin Radio is currently testing those boundaries to an extent rarely – if ever – seen before.
Permalink
Send this to a friend
08.24.15
Posted in GNU/Linux, Security, Vista 10, Windows at 6:53 am by Dr. Roy Schestowitz
Strapping NSA back doors onto Munich oughtn’t be an option
Summary: A look at a strange suggestion, signed by Sabine Pfeiler (above) and Otto Seidl, who suggest going back to Microsoft which is basically a spyware company now
THE enormous long-term cost of Microsoft Windows, deferred and inevitably incurred due to blackmail and espionage (possibly more expensive then dealing with script kiddies/crackers alone), was detailed in the previous post. No nation other than the US (not even other Five Eyes nations) should procure proprietary software from the United States. Britain has just repeated this error [1] and some Microsoft fans in Germany apparently want to revert back to making this error, having already undone this error (dumping proprietary software, including Microsoft, in Munich).
We wish to start with some rather exciting news. Thankfully enough, Russia is now following China’s footsteps and may ban Vista 10 (China also banned Office in government, not just Vista 8, recognising that it’s a collective Trojan horse from the NSA). Last year or the year before that Russia had already taken first steps towards banning Windows by banning x86 in government (Wintel) and days ago it went further. Citing Russian media, Linux Veda writes: “The vice speaker of Russia’s State Duma, Nikolai Levichev, has written to Prime Minister Dmitry Medvedev asking for the Russian government to ban the use of Windows 10 amongst Russian civil servants. Levichev is concerned that Microsoft may allow US agencies to access data collected from Russian officials.”
Based on countless leaks from the NSA (many mention Russia by name), the above is undoubtedly being done. To think otherwise would be willful ignorance. Germany too is a target (political and industrial espionage), as recently demonstrated by Wikileaks, not just Snowden’s leaks and subsequent unattributed leaks.
It then leads us to our main topic, which is bogus stories from Microsoft propaganda sites, distorting the stories that were originally published in Germany about a week ago. We have a misleading headline about just two people, making them sound like the whole city of Munich. These people are Sabine Pfeiler and Otto Seidl.
Microsoft propaganda sites will latch onto anything and anyone, as they have been doing for years, never leaving Munich alone because it has become an embarrassment to Microsoft and a winning example/trophy for GNU/Linux on the desktop. What Microsoft does in Munich right now is definitely not sitting on its hands and accepting defeat. There is lobbying that is difficult for outsiders to see, but evidence occasionally comes out, as we have shown here over the years (we wrote dozens of articles about this). Partner companies, not just moles or lobbyists, are involved in this. Munich is constantly under attack.
A European reader of ours helped us understand what is happening in Munich right now. “Two ‘softers,” he said, is what it boils down to. “Annoying that they get any press at all. [...] it does look like only two ‘softers and not two independent people. More can be done to bring up the games that Microsoft continues to play against competitors, especially FOSS. Too many are falling for that “another chance” tactic, one that’s been used every few years for decades.”
We tried to find out more, for instance anything suspicious in the professional background of the troublemakers. Microsoft recently blackmailed members of the British Parliament, as it had previously done in Norway and other places (if you do what we say, we’ll do this thing for your area, but if you don’t, we’ll punish you). There are plenty of bribes and blackmail examples; Microsoft is full of those.
Our reader tracked down the original PDF. It is signed by these two people:
Sabine Pfeiler, Stadtrat
Otto Seidl, Stadtrat
“Your German is certainly better than mine,” said the reader, “but there are probably these two. They’re both in office through 2020. The main argument that the laptops have no programs for text editing, Skype, Office etc does not hold water. LibreOffice and even nasty ol’ unsafe Skype are available for GNU/Linux on x86, though the latter has not been approved by the IT dept there. But the Tech Republic article does say they are using Intel processors and that LibreOffice is on them.
“Seidl had in 2014 defended LiMux against mayor Dieter Reiter and Josef Schmid. However, I think that something is fishy, but cannot find anything with just a cursory search.”
“Microsoft just remotely modifies Vista 10 and won’t explain how, why, and when.”Vista 10 is an unacceptable risk, especially for government, and German has been more strict than most nations about digital control over its computing (even UEFI 'secure boot' is verboten). Vista 10 can add back doors, bug doors, delete files, add files etc. and it won’t even tell the user. We covered this the other day, noting that RMS (Richard Stallman) was right all along. This is why Microsoft will consider doing almost anything (even blackmail and bribes) to get its way here, enabling the Trojan horse to slip inside the whole of Germany. The NSA would certainly like for this to happen.
According to Manish Singh, “[i]f you’re having trouble deciphering what exactly Microsoft is bundling in Windows 10 updates, it is not your fault. Moreover, it is about to get worse. Microsoft has confirmed that it might choose to not offer a detailed changelog with new Windows 10 updates.”
Microsoft just remotely modifies Vista 10 and won’t explain how, why, and when. It is virtually as though one’s own computer is rented or leased. Even the British media took note. Simon Sharwood spoke to Microsoft and then reported that “Microsoft has explained its policy about how much information it will offer on the content of Cumulative Updates to Windows 10.”
Remember that for most users it will be impossible to even deny automatic updates. Microsoft Peter, not only Microsoft sceptics, reminds us right now that Microsoft has no plans to tell us what’s in Windows patches. Vista 10 already has back doors (and worse, it turns networks into botnets), but the point is, additional ones can be added at any time, silently. What would happen at times of war? Germany simply mustn’t consider going back to Windows and more cities should now follow Munich’s lead, maybe adopting much of the same Free software that Munich developed over the years.
Have politicians actually been following what’s happening right now? BND collusion with the NSA makes it simpler to blackmail German politicians, this we know for sure… █
Related/contextual items from the news:
-
The UK’s Crown Commercial Service (CCS) yesterday revealed that it would be teaming up with software giant Oracle, in a three-year partnership which will see the two collaborate to deliver services to public sector bodies including the National Health Service (NHS).
Just weeks after the government announced that it would be cutting back on its use of Oracle software, the new deal instead extends the existing agreement signed in 2012 and aims to bring new cost-saving solutions. The CCS has promised the that the signing of the Oracle memorandum of understanding (MoU) will “deliver additional savings for the taxpayer.”
Permalink
Send this to a friend
Posted in Microsoft, Security, Windows at 6:00 am by Dr. Roy Schestowitz
“Our products just aren’t engineered for security.”
–Brian Valentine, Microsoft executive
Summary: Another news overview, detailing high-profile examples of high-cost Windows deployments (including the cost of litigation and settlement)
THE “IRS hack [is] far larger than first thought,” according to this new report. It’s no secret that the IRS is a Microsoft Windows shop (which was warned about security breaches as far back as 6 years ago), so it makes one wonder if Windows was to blame here, as in the OPM breach, the Sony breach, and most recently the Ashley Madison breach (not to mention Stuxnet in Iran). Based on our information, all these high-profile breaches one way or another involve Microsoft reliance. The corporate media failed to call out Windows, but a little bit of research often helps boil it down to Microsoft’s NSA-accessible (through back doors) platforms.
“The parent company can now be sued into bankruptcy. It’s the (hidden) high cost of Windows.”Below is a new story which shows how Argentina targets [1] a large number of dissidents for surveillance using a fake “confidential document [that] was intended to infect a Windows computer.” GNU/Linux users needn’t worry about such things. Then of course there is the latest high-profile breach, the one affecting tens of millions of members of Ashley Madison (including almost ten thousand members of the military, including high-ranked ones), some of whom are suing [2] (what’s the price of a failed marriage or blackmail?). The parent company can now be sued into bankruptcy. It’s the (hidden) high cost of Windows. According to [3], “Security Was An Afterthought” at Ashley Madison. Well, that’s quite evident. Ashley Madison is hardly even hiding it (DMCA rampage is not a substitute) and it has been made ever more obvious by the fact that they were using Microsoft Windows.
Microsoft and security are mutually exclusive, unlike Microsoft and insecurity. No secure application can be mounted on top of a base with back doors. It ought to be crystal clear after Snowden’s many revelations. █
Related/contextual items from the news:
-
Alberto Nisman, the Argentine prosecutor known for doggedly investigating a 1994 Buenos Aires bombing, was targeted by invasive spy software downloaded onto his cellular phone shortly before his mysterious death. The software masqueraded as a confidential document and was intended to infect a Windows computer.
-
A BRACE OF LAW FIRMS ARE BEHIND A class action lawsuit against Ashley Madison because it did not do enough to protect personal and private information.
The class action case, from two Canadian law firms, argues that the hookup stations failed users by not protecting their information and for not deleting it after a fee had been paid to ensure its deletion. It seeks $578m.
According to the New York Post the lawyers want some satisfaction for a cluster of punters who are currently wearing outraged expressions and regretting joining a site that does what it does in the way that it does it.
-
It’s already clear that, despite handling very sensitive data, Ashley Madison did not have the best security. Hackers managed to obtain everything from source code to customer data to internal documents, and the attackers behind the breach, who call themselves the Impact Team, made a mockery of the company’s defenses in an interview.
Permalink
Send this to a friend
08.23.15
Posted in News Roundup at 3:28 pm by Dr. Roy Schestowitz
Contents
-
In the early 2000’s I had repurposed an older PC by installing an early version of Red Hat Enterprise Linux and enabling it as a file server, hosting both NFS and SMB. The computer ran well and gave me almost zero issues once it was fully configured. It ran 24/7 and unless we experienced power outages, it was never turned off. It is important to highlight that the system, upon boot, would only load in runlevel 3. In Red Hat speak, this equates to CLI only with networking support; that is, no GUI.
-
Server
-
Earlier this year, IBM launched the new z13 mainframe, its first in nearly three years. Bolstered by strong sales, the company is putting more of a focus on mainframes, partnering with Linux in a new strategy.
-
Kernel Space
-
With Linux 4.2 hopefully being released this weekend, here’s a look at some of the features that are currently out on the horizon for likely merging into the Linux 4.3 kernel.
-
A five year old file system built by Kent Overstreet, formerly of Google, is near feature complete with all critical components in place. Bcachefs boasts the performance and reliability of the widespread ext4 and xfs as well as the feature list similar to that of btrfs and zfs. Notable features include checksumming, compression, multiple devices, caching and eventually snapshots and other “nifty” features.
-
Bcache was first announced by ex-Google engineer Kent Overstreet a little over five years ago. Now the Linux kernel block layer cache is being used as the basis for a new open source filesystem. The focus is on speed, but it is also hoped that the file system could be used for servers and storage arrays because of its reliability.
-
-
-
The annual Linuxcon North America conference was once again highlighted by none other than Linux creator Linux Torvalds. Torvalds was not on the original scheduled for the event, rather he filled a slot originally identified as ‘surprise guest.”
Rather than the typical Linux kernel panel keynote where Torvalds has typically participated, Torvalds did a one on one question and answer ten minute session with Linux Foundation Executive Director Jim Zemlin. It’s a format that seemed to suit Torvalds well, though the questions ranged from the mildly technical to the personal.
-
The Linux Vendor Firmware Service (LVFS) continues maturing for making it easy for Linux users to update their system firmware/BIOS from the Linux desktop.
-
Graphics Stack
-
-
-
-
-
-
-
-
-
-
-
Just days after the big libdrm 2.4.63 release that brought initial AMDGPU DRM support, version 2.4.64 of Mesa’s DRM library is now available.
-
Benchmarks
-
In this article are more AMD vs. NVIDIA GPU tests on Ubuntu Linux for this game with slightly more demanding settings plus looking at the CPU and GPU utilization.
-
Given the current state of the AMD Catalyst Linux driver, there exists games on Linux that will run with this closed-source Radeon driver but where the performance of a EVGA GeForce GTX 950 FTW that retails for $180 USD can exceed the performance of a AMD Radeon R9 Fury that sells for more than $550 USD. Here’s some of those cases where — given the current state of Catalyst on Linux — the OpenGL performance is so far down the gutter.
-
-
These games were left out since when setting up the test system for the assortment of AMD/NVIDIA graphics card tests, it turns out recent Team Fortress 2 and Counter-Strike: Global Offensive updates broke support for the pre-existing time demo tests. With the demos we’ve been using in all of the CS:GO/TF2 benchmarks for the past year or so, a recent update changed/removed some shaders and caused issues for these demos. Thus the tests failed to run.
-
-
Complementing the benchmarks from yesterday are some more results today with Bcachefs compared to EXT4, Btrfs, XFS, and F2FS with testing being done from the same Intel M.2 SSD as yesterday’s testing and using the same 4.1-based Bcachefs-dev kernel.
-
Applications
-
-
Instructionals/Technical
-
Wine or Emulation
-
Games
-
ET:Legacy is not available only for Linux gamers but also on OS X and Windows too. More details on this eight-month update to the open-source Enemy Territory can be found via ETLegacy.com.
-
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
-
-
-
So, after the Tangent Normal Brush was merged, Krita didn’t have any new releases because it was decided to do some major bugfixing. Which in turn means I haven’t had any bugreports yet.
-
The next part of my summer was spent in understanding KDE terminology, how KDE software works, how to make KDE software work (pun intended), and understanding PackageKit by pinging a lot of people on IRC. After making a compilation of KDE documentation for myself and playing around with Frameworks 5 and Qt, I started working on making an application that would install a given package via PackageKit. This involved understanding the PackageKit API and also PackageKit-Qt, a Qt Wrapper for PackageKit. Building this application took more time than was estimated, but at the end of this exercise, I was pretty much well versed on using PackageKit and building a Frameworks application. This application has been put on KDE’s git repositories and would be helpful to anyone who’d want to do this exercise in the future.
-
-
-
-
Last year I went to Akademy with two notebooks and sharpies and asked people to draw or write about one thing they think would make KDE better. This year I did the same again. The question was: “What’s the one thing KDE should do to have more impact?” Here are some of the great results:
-
-
-
Continuing the series about KDE Incubator let’s hear how KXStitch went through the process. KXStitch was incubated early and quickly.
-
-
Gentoo Family
-
Google’s OnHub is a WiFi router that also has home automation support for their Nest products as well as support for devices using the Zigbee, ZWave, and Thread protocols. OnHub is designed to be easy to setup via a mobile app, its firmware is self-updating, and is optimized for today’s (largely streaming) web needs.
-
Arch Family
-
While digging the Internet, we’ve found a new community spin of the ever-growing Manjaro Linux operating system, built around Solus Project’s simple, modern, and intuitive Budgie desktop environment.
-
-
Slackware Family
-
But the real interesting stuff is not just those sheer number of updated packages – it’s the new 4.1.6 Linux kernel, the gcc 4.9.3 compiler suite, glibc 2.22 C libraries, mesa 10.6.4, a new libepoxy package which was required to get glamor 1.0.0 into the xorg-server… exciting times for the adventurous who are running slackware-current!
-
Red Hat Family
-
“We’re building a platform … so that people can consume on demand, as they need it, what they’re looking for,” said Chris Wright, chief technologist for Red Hat, Inc. Wright, along with Dave Ward, CTO of engineering and chief architect at Cisco Systems, Inc., joined theCUBE, SiliconANGLE Media’s production team, at OpenStack Summit Vancouver 2015 discuss the current Red Hat/Cisco partnership that aims to bring open source to the next level, making it a carrier-grade technology.
-
One of the S&P 500’s big losers for Friday August 21 was Red Hat Inc. (RHT). The company’s stock fell 3.54% to $72.47 on volume of 1.27 million shares.
-
Fedora
-
Rawhide, the name of Fedora’s development version and repository, may be restructured and improved as part of an initiative following discussions last week at the distribution’s Flock conference.
-
-
Debian Family
-
Derivatives
-
The Q4OS Team sent an email to Softpedia HQ a few minutes ago informing us about the availability of the Q4OS 1.2.8 ‘Live’ operating system, a release that introduces a revamped Setup utility and fixes several annoying issues reported by users.
-
As I’m writing this, DebConf 15 is coming to an end. I spend most of my time improving the situation of the Haskell Packages in Debian, by improving the tooling and upgrading our packages to match Stackage 3.0 and build against GHC 7.10. But that is mostly of special interest (see this mail for a partial summary), so I’d like to use this post to advertise a very small and simple package I just uploaded to Debian:
-
Canonical/Ubuntu
-
The Ubuntu Software Center is withering away.
Canonical has silently discontinued the paid app store without informing developers, Ubuntu flavors are dropping it, and free software enthusiasts aren’t happy with it. It’s still fine for installing free software from Ubuntu’s software repositories—but it can be slow and clunky even for that.
-
It’s been a while since we’ve heard from Black Lab Software’s Linux kernel enablement kit for Black Lab Linux and Ubuntu-based operating systems, but today we have been informed by Roberto J. Dohnert that the kernel 4.1.6 Update Kit has been released.
-
Most likely, Canonical has forgot to replace Yahoo with Google as the default search engine, the Firefox browser for other platforms using Yahoo.
-
-
-
Phones
-
Android
-
-
Like the last device, Blackphone 2 will come with Silent OS, an Android-based ROM which has features like Spaces to help separate work life and personal life securely where no data is shared between the two. The ROM also features Security Center which allows configuration of spaces, management of apps in each space and fine tuning of permissions that apps have.
-
-
-
-
-
Expected to arrive in late 2015, the latest update to Android promises great new features and enhancements. Here are the top reasons to get excited about the new Android.
-
Web Browsers
-
Mozilla
-
-
Most modern web browsers let you surf in incognito or private mode, which ensures websites you visit aren’t saved in your browser history. But that doesn’t offer true anonimity—as Google Chrome warns: “Going incognito doesn’t hide your browsing from your employer, your internet service provider, or the websites you visit.”
Mozilla’s trying to change that with a truly private browsing mode for Firefox. According to PC World, this new feature “is designed to block outside parties like ad networks or analytics companies from tracking users through cookies and browser fingerprinting.” This feature is still in the pre-beta phase. While it’s available in the latest developer editions of Firefox, this feature will likely show up in a general release of the browser sometime in the near future.
-
-
-
-
BSD
-
François Tigeot, the developer that’s been prolific in porting the DRM/KMS code from Linux to DragonFlyBSD, now has the Radeon DRM code matching that of the Linux 3.17 kernel.
-
-
-
FSF/FSFE/GNU/SFLC
-
-
At the GNU Tools Cauldron 2015 in Prague, the developers have announced that they are thinking of switching to Git as the default version control system. A mailing list has been created and the developers have started asking questions.
-
Programming
-
Today the Go project is proud to release Go 1.5, the sixth major stable release of Go.
-
-
-
-
-
The Met Office has lost its BBC weather forecasting contract, it has confirmed.
The UK’s weather service has provided the data used for BBC forecasts since the corporation’s first radio weather bulletin on 14 November 1922.
The BBC said it was legally required to secure the best value for money for licence fee payers and would tender the contract to outside competition.
-
Sometimes it is hard to find words even to describe, let alone to explain, the Obama administration’s consistently gauche, blundering, even self-damaging policy decisions and actions toward China.
-
From government hacks to industrial theft, Chinese intelligence operations are making more headlines now than ever before.
-
The Obama administration has delivered a warning to Beijing about the presence of Chinese government agents operating secretly in the United States to pressure prominent expatriates — some wanted in China on charges of corruption — to return home immediately, according to American officials.
-
-
Svetlana Alliluyeva, Josef’s Stalin’s daughter, led a remarkable, if extremely ruptured, life. Her mother, Nadezhda, died in 1932 when Svetlana was 6, likely through suicide. Her father, the brutal dictator, had no compunction about sending Svetlana’s close relatives to the gulag. Her half-brother, Yakov, died in a German prisoner-of-war camp in 1943. Her other brother, Vasili, died an alcoholic. She married four times and died as Lana Peters in 2011, at age 85. In 1967, when Svetlana defected to the United States, she left her two children behind in Russia. Her story is vividly told by Rosemary Sullivan — who has also written biographies of Margaret Atwood and Gwendolyn MacEwen — in Stalin’s Daughter: The Extraordinary and Tumultuous Life of Svetlana Alliluyeva. Our conversation has been edited for length.
-
Fiorina is “wrong on the social issues as well as a lot of technology issues” and is “culturally not aligned with the ethos in the Valley,” on top of the fact that “there are also a lot of people who have negative impressions of her” from HP, said Jim Ross, a Democratic consultant in the tech hub of San Francisco.
-
Health/Nutrition
-
Former pediatric neurosurgeon Dr. Ben Carson said Sunday that the fight to abolish slavery influenced his views on abortion.
Carson was asked about a 1992 ad on abortion on CNN’s “State of the Union.” Carson had originally taken a pro-life position on a Maryland abortion referendum, but then appeared in an ad taking back his previous statement and merely asking voters to be educated on the issue before voting.
Carson said that 20 years ago, “I personally was against abortion, but I was not for causing anybody else to do anything.”
“I’ve changed, because I’ve learned a lot of things,” said Carson. “I began to think about if abolitionists … had said ‘I don’t believe in slavery, but anybody else can do it if they want to,’ where would we be today? So that changed my opinion.”
-
Defence/Police/Secrecy/Aggression
-
Now, Los Angeles-based artist Jonathan Fletcher Moore has taken that data and created an interactive installation titled Artificial Killing Machine that visualizes the attacks in real time.
-
-
The increase in drone flights will give the military more intelligence access as well as increase its firepower, which is needed to take on hot spots around the world, a senior defense official told The Wall Street Journal about the upcoming plan.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
“Legal, ethical, and wise”: these are the three adjectives that the Obama administration has used again and again to describe its program of conducting targeted killings by drone strikes. John Brennan, then the White House’s counterterrorism advisor, used the phrase to justify the drone program in a speech at the Wilson Center in April 2012. Almost a year later, Press Secretary Jay Carney invoked the same phrase in defense of the leaked Department of Justice White Paper on the permissible targeted killing of a U.S. citizen and senior Al Qaeda in the Arabian Peninsula operative who posed an imminent threat.
-
The U.S. military wants to boost its drone presence by 50 percent in four years, and it’s hiring help. General Atomics, maker of the ubiquitous Predator and Reaper drones, began flying intelligence missions for the Defense Department this month.
-
-
Generals and other top military staff who ran the US “Drone Wars” in the Middle East now work for the top drone firms, with lucrative positions at private contractors holding big contracts to help run the remotely controlled killing machines.
Supposedly “targeted killings” by drones have led to international concern, as victims of “surgical strikes” carried out by the unmanned weapons include wedding parties in Yemen, friendly-fire killings of Afghan soldiers, and nearly 200 children in Pakistan.
So, wreaking mass death from above is a negative, but on the positive side they have also led to big contracts for defense firms. A Bureau of Investigative Journalism report identified a bunch of large companies that have major contracts for analyzing data and providing other support work that drones need to operate.
-
There is, of course, some debate about the morality of drone warfare. Is it ethical to deliberately kill people without trial? Where is the warrior code, the moral hazard, for those who attack with impunity from thousands of kilometres away? What happens when mistakes are bloodily made? How does one define a terrorist? Which side are we on again? Why?
-
The U.S. contends that it’s going after Al-Qaeda and Taliban fighters, but since the CIA-led drone program is officially secret, little is known about how drone attacks are conducted or targets are chosen. According to a 2014 study by Forensic Architecture, a research project in London, and the U.K.-based Bureau of Investigative Journalism, an independent initiative, this secrecy has contributed to lax bombing practices. To date, the bureau has found that 423 to 965 civilians have been killed in the bombings — 170 to 207 of them children. Most of the victims remain unnamed and unidentified.
-
“The primary [inspiration] was this interactive piece about drone strikes,” Udayasankar tells Co.Design. “Less than 2% of fatalities were high-profile targets. I was fascinated by the fallibility of technology itself and the collateral damage that it facilitates, and, moreover, how we do not take the time to talk about it.”
-
“Bycatch” is a term used by fishermen to describe the extraneous marine life that unintentionally gets caught in their nets. It’s also the name of a card game that deals with a very different sort of collateral damage: the civilians killed by drone strikes.
-
Islamist militants demanded the U.S. government pay ransom for the return of the bodies of two hostages accidentally killed in a U.S. drone strike in Pakistan last January, The Wall Street Journal reports.
-
Operation Aphrodite was a top-secret attempt by the Army and Navy to turn old airplanes into suicide drones during World War II. B-17s and B-24s that were past their service life would be packed with several tons of Torpex, an explosive with twice the power of TNT, and then piloted into heavily-fortified targets.
-
Troops from at least 10 countries, including Russia and Kazakhstan, will join an unprecedented military parade in Beijing next month to commemorate China’s victory over Japan during the World War-II, Chinese officials said.
China is inviting foreign troops to participate in a military parade for the first time. It will also be a milestone for President Xi Jinping, who took over as Communist Party leader and military chief in late 2012.
The parade on September 3 will involve about 12,000 Chinese troops and 200 aircraft, Qi Rui, deputy director of the government office organising the parade, told reporters in Beijing on Friday.
-
Critics of drone strikes point out that innocent civilians sometimes die in the attacks. And, there was a friendly fire incident in 2011 involving a Predator missile strike triggered from Creech that left a U.S. sailor and a Marine dead in Afghanistan.
-
America actually is relatively safe. Aside from a few cases such as the tragic Chattanooga shootings, Americans killed by terrorists most often are murdered outside of our country, in war zones. However, if we don’t start focusing on the economic instability in vulnerable countries from which most terrorism originates, it is only a matter of time before we see more attacks in our country.
-
The Israeli military staged a large-scale drill last week to prepare for a potential ground operation into Syria in the event of an attack by Islamist rebels or the Lebanese Shiite militant group Hezbollah, according to local media reports.
The rising number of Islamist fighters, many aligned to the Al-Qaeda-affiliated Jabhat al-Nusra, arriving near the Israeli border area in the Syrian part of the Golan Heights has placed the Israel Defense Forces (IDF) on high alert, Israeli television station Channel 2 reported.
-
-
As part of a new deal, Israel will supply Jordan with strategic and tactical unmanned aerial vehicles (UAVs) in order to help combat the Islamic State, according to a local media report.
-
-
Allan is on the 63rd day of his hunger-strike in protest of his detention by Israel without charge.
At least six Palestinians were detained late Sunday and on Monday by the Israeli authorities from the West Bank districts of Hebron and Bethlehem, according to local and security sources.
A Palestinian man who attacked an Israeli soldier with a knife was shot dead Saturday by Israeli soldiers in the north of the occupied West Bank, said the Palestine Red Crescent Society (PRCS) and the Israeli police.
-
Israeli airstrikes on the Syrian-controlled portion of the Golan Heights have killed at least five unarmed civilians, according to Syrian state media, in what Israel says was retaliation for rocket fire into its territory. Israel says those killed were Palestinian militants from the Islamic Jihad militant group.
-
-
Israel’s air force has carried out a drone strike in southern Syria – killing five people – while a soldier was killed and seven wounded in an air raid, Syrian state TV has reported.
-
-
A new Israeli attack with a drone, killed at least five in al-Koum shanty town, in the Syrian province of Quneitra, at about 67 kilometers southwest of this capital.
The missile launched from the drone exploded at 10.35 (local time) this Friday, just 50 meters from a popular market, also causing serious material damage.
-
An Israeli air strike on the Syrian Golan Heights killed at least four Palestinian militants responsible for Thursday’s rocket fire on an Israeli village, an Israeli defense official said on Friday.
-
A Syrian army rocket attack on the rebel-held city of Douma reportedly killed at least 50 civilians.
-
The US drone strategy frequently undermines the sovereignty of other countries which can damage its own national security, Upstate Drone Action activist Ed Kinane told Sputnik.
-
The US might carry out air strikes again in Libya, but it won’t improve the conditions on the ground, says Abayomi Azikiwe, editor of the Pan-African News Wire. The US would rather allow Egypt and the UAE to carry out certain aspects of this foreign policy in Libya, he adds.
-
As if in complete defiance of the extensive contention at home and abroad, the Pentagon announced plans this week to dramatically ramp up global drone operations over the next four years.
Daily drone flights will increase by 50% during this time, and will include lethal air strikes and surveillance missions to deal with the increase in global hot spots and crises, according to an unnamed (and unverified) senior defense official, as reported by The Wall Street Journal.
“We’ve seen a steady signal from all our geographic combatant commanders to have more of this capability,” said Defense Department spokesperson, Navy Captain Jeff Davis to reporters at the Pentagon.
-
On today’s BradCast, we are joined by retired, 27-year CIA analyst turned peace activist Ray McGovern, who personal delivered the CIA’s Presidential Daily Briefings to several Presidents, including Ronald Reagan and George H.W. Bush. His organization,Veteran Intelligence Professionals for Sanity (VIPS) — which includes several high-ranking former intelligence professionals and whistleblowers — have called, once again, on the U.S. to release any evidence to support their claims that Russia was behind the downing of MH17.
-
During a recent interview, I was asked to express my conclusions about the July 17, 2014 shoot-down of Malaysia Airlines Flight 17 over Ukraine, prompting me to take another hard look at Official Washington’s dubious claims – pointing the finger of blame at eastern Ukrainian rebels and Moscow – based on shaky evidence regarding who was responsible for this terrible tragedy.
-
-
A U.S. government report implicating Russia in the July 2014 crash of Malaysia Airlines Flight 17 was created by political writers rather than intelligence analysts, a former CIA analyst-turned-political activist told Russia’s Sputnik News. Sputnik is wholly owned by the Russian government, which reportedly backs Ukrainian separatists accused of firing a missile at the plane as it flew near the Russia-Ukraine border.
“What [U.S. Secretary of State John Kerry] offered was a ‘government assessment,’ which means it was written in the White House, which means it was a political document written by political hacks, and that the intelligence analysts would not sign on to it,” Ray McGovern, a CIA analyst from 1963 to 1990, told Sputnik. McGovern was previously known for implying that President George W. Bush could have prevented the Sept. 11, 2001, terror attacks in New York City and Arlington County, Virginia.
-
Former CIA Director Michael Hayden, an influential and vocal critic of the Obama administration’s nuclear agreement with Iran, said Wednesday that Congress actually should consider approving the accord — but only after tacking on a number of conditions designed to pressure Iran not to cheat on the deal, including an authorization for military action.
-
-
-
When the foreign secretary visits Tehran on Sunday to reopen the British embassy after a closure of nearly four years, he will doubtless talk of new beginnings. Now Iran has signed a deal limiting its nuclear programme, the way is clear for new business contracts, new opportunities, a new chapter. That approach may appeal to the British businesspeople on the trip, licking their lips at the prospect of selling oilfield equipment or financial services, but Iranians do not discard history so easily.
-
-
Nearly every major western country has recently sent trade missions to Iran in anticipation of sanctions being lifted. Representatives included major international oil companies, banks, and manufacturers. Their enormous influence and immense wealth will weigh heavily in resolving the issue.
-
We would do well to remember that Iran didn’t start this crisis. The crisis didn’t start with Iranians overthrowing the Shah and taking of American hostages in 1979. It started when the U.S. CIA overthrew the democratically elected Iranian government of Mohammed Mosaddegh in 1953 and installed a brutal dictator (the Shah) in his place.
-
-
-
Throughout the world there is great relief and optimism about the nuclear deal reached in Vienna between Iran and the P5+1 nations, the five veto-holding members of the U.N. Security Council and Germany. Most of the world apparently shares the assessment of the U.S. Arms Control Association that “the Joint Comprehensive Plan of Action establishes a strong and effective formula for blocking all of the pathways by which Iran could acquire material for nuclear weapons for more than a generation and a verification system to promptly detect and deter possible efforts by Iran to covertly pursue nuclear weapons that will last indefinitely.”
-
President Barack Obama’s nuclear agreement with Iran gained momentum in Congress on Friday as a key Jewish Democrat from New York bucked home-state opposition to support the deal.
-
-
This week’s 62th anniversary of the coup upending Mohammad Mossadegh comes with interest as strong as ever in Iran’s best-known prime minister. But while historians and journalists see the coup of 19 August 1953 as a pivotal event for Iran, they agree on little else (including the transliteration of his name into Latin letters).
-
Britain will reopen its embassy in Iran this weekend nearly four years after protesters ransacked the elegant ambassadorial residence and burned the British flag.
-
Iran’s official IRNA news agency says the military has shot down a reconnaissance drone in western Iran near the border with Iraq.
IRNA quoted Col. Farzad Fereidouni, a local air defense system commander, in a report Saturday as saying the unmanned aircraft was shot down in recent days after it “confronted” the air defense missile system. He didn’t say which country the drone belonged to, or give specifics on the timing.
-
Iran is remembering the anniversary of the 1953 coup against the government of then democratically-elected Prime Minister Mohammad Mosaddeq.
-
Mohammad Mossadegh (pictured) became Prime Minister of Iran in 1951 and was hugely popular for taking a stand against the Anglo-Iranian Oil Company, a British-owned oil company that had made huge profits while paying Iran only 16% of its profits and often far less. His nationalization efforts led the British government to begin planning to remove him from power. In October 1952, Mosaddegh declared Britain an enemy and cut all diplomatic relations. Britain looked towards the United States for help. However, the U.S. had opposed British policies; Secretary of State Dean Acheson said the British had “a rule-or-ruin policy in Iran.”
-
•Quit sending arms to anyone in the region
•Quit telling Iranian people what to do
•Offer to help, but not militarily
•Start lifting sanctions slowly, unilaterally
•Wait for reciprocity and repeat (Rapoport’s tested game theory)
-
In a letter to three U.S. senators that recently came to light, CIA director John Brennan outlined how his intelligence agency deals with abusive partners, referring – it would appear – primarily to foreign security forces. But even more striking than the approach he outlines is his brutally honest admission that the CIA sometimes partners with human rights abusers.
The agency’s covert nature leaves its laws, rules and regulations opaque. However, it has long been known that the CIA is not subject to human rights vetting requirements when it comes to partnering with foreign security forces, as the State and Defense departments are, under what is commonly known as the Leahy Law, named for Vermont Democratic Sen. Patrick Leahy. Congress first approved the law in 1997, when it was revealed that Colombian army units were receiving U.S. funds while massacring civilians. The Leahy Law restricts the State Department and Pentagon from using U.S. taxpayer dollars to assist, train or equip any foreign military or police unit that is credibly believed to have engaged in gross violations of human rights – such as extrajudicial killings, torture, rape and forced disappearances.
On moral grounds alone there can be little objection to this restriction. But it also makes sense for national security. While Brennan may not acknowledge it, abusive security forces combatting domestic insurgencies typically exacerbate long-standing grievances and provide armed opposition and terrorist groups with a very powerful recruiting tool.
-
North Korea’s main ally is China, which provides fuel and food aid, while it maintains a close relationship with Russia.
However positive ties with the US and South Korea are non-existent.
The promotion of Kim Jong-un has leader following the death of his father Kim Jong-Il in 2011 has done little to improve that.
-
The former prime minister of Iraq, Nuri al-Maliki, who a domestic investigation has found responsible for Mosul’s conquest by Islamic State in June, 2014, has slammed the panel’s findings on the humiliating fall of the key northern city as having “no value.”
-
A new memoir by a former senior State Department analyst provides stunning details on how decades of support for Islamist militants linked to Osama bin Laden brought about the emergence of the ‘Islamic State’ (ISIS).
The book establishes a crucial context for recent admissions by Michael T. Flynn, the retired head of the Pentagon’s Defense Intelligence Agency (DIA), confirming that White House officials made a “willful decision” to support al-Qaeda affiliated jihadists in Syria — despite being warned by the DIA that doing so would likely create an ‘ISIS’-like entity in the region.
J. Michael Springmann, a retired career US diplomat whose last government post was in the State Department’s Bureau of Intelligence and Research, reveals in his new book that US covert operations in alliance with Middle East states funding anti-Western terrorist groups are nothing new. Such operations, he shows, have been carried out for various short-sighted reasons since the Cold War and after.
-
Whoever the new Labour leader is, they’ll have a lot on their plate and one of the first big issues is likely to be Syria. The on-going civil war is only getting worse, and defence secretary Michael Fallon has already announced that a vote on military intervention will take place later in the year.
In one sense, the question of whether the UK military should be taking part in bombing is a moot one, because it already is. A freedom of information request from Reprieve found UK military personnel have already engaged in air strikes as part of US operations. The admission showed the public and parliament had been misled. MPs voted against bombing Syria in 2013.
-
So said American Defense Secretary Ash Carter in testimony before an incredulous Senate Armed Services Committee on July 7, explaining that the $500 million American project, announced over a year ago, to train and arm a new Syrian rebel army to bring the Islamic State to its knees and force a political settlement on the Syrian regime simultaneously has, to date, trained just 60 fighters.
-
Division 30 was the first contingent of Syrian rebels deployed under a $500 million “train and equip” plan authorized last year by Congress. It’s an overt program, run by U.S. Special Forces, separate from a parallel covert program run by the CIA. The idea is to generate over 5,000 trained fighters a year who could help clear Islamic State extremists in Syria and then hold the ground.
-
In this regard, Obama is following the position that was expressed by his friend Brzezinski who has expressed it many times, such as, in 1998, reprinted later under the heading, “How Jimmy Carter and I Started the Mujahideen.”
-
In a recent article, Robert Fisk, senior Middle East correspondent for the Independent, compared Turkey to Pakistan in the 1980s, and said that the recent air bombardment was no surprising given that all powers in the region have betrayed the Kurds. We spoke to Fisk both about the details of the matters he touches on in his article, and whether power balances have changed in the Middle East. Fisk says that Turkey has become a market place and when seen from this perspective there are more important issues at stake besides whether or not Turkey will enter the war in Syria. “I believe that Syria has started penetrating Turkey. Suruç is an example of this. From this view, the Syrian War but not the Syrians have occupied Turkey. It is not the reverse.”
-
On July 24th, highlighting the first Turkish air strikes against the Islamic State and news of an agreement to let the U.S. Air Force use two Turkish air bases against that movement, the New York Times reported that unnamed “American officials welcomed the [Turkish] decision… calling it a ‘game changer.’” And they weren’t wrong. Almost immediately, the game changed. Turkish President Recep Erdogan promptly sent planes hurtling off not against Islamic State militants but the PKK, that country’s Kurdish rebels with whom his government had previously had a tenuous ceasefire. In the process, he created a whole new set of problems for Washington, including making life more difficult for Kurdish rebel troops in Syria connected to the PKK that the Obama administration was backing in the fight against the Islamic State. Erdogan’s acts also ensured that chaos and conflict would spread to new areas of the Middle East. So game-changer indeed!
-
Reports from the PKK-aligned Kurdistan National Congress indicate an internal war by the Turkish state against the Kurds in the country’s east, approaching levels of violence not seen in 20 years. Several villages in Diyarbakir province are said to be under heavy shelling by the Turkish army. Many of these villages are reported to be currently burning, with many injured, and an unknown number killed. After hours of shelling, Turkish soldiers reportedly entered the village of Kocakoy, Lice-Hani district, putting homes to the torch—sometimes with families still inside, resulting in further loss of life. Troops then proceeded to force an evacuation of the villages. It is not said where the survivors fled to. A similar attack is reported from Şapatan (Turkish: Altınsu) village in Şemdinli district, Hakkari province, where the blaze has spread to surrounding forest areas. (KNC, KNC, Aug. 18)
-
None of this is news. Turkey’s not even among the top ten spenders, as far as foreign lobbies go. (That honor usually goes to Canada, although apparently in 2013 it went to the UAE.)
But here’s the thing that chaps my hide. I’m fine with selling our politicians to foreign governments. We’re running a $43.8 billion trade deficit, after all. We can’t afford to be fussy.
But aren’t you insulted that we’re selling them so cheaply? We’re the United States of America. Shouldn’t Porter Goss be worth more than a measly 32,000 bucks a month? We borrow more than that every minute, so why should we sell him for less than 32,000 dollars a second? What kind of superpower do these people take us for?
And if we’ve already established that, and we’re just haggling over the price, we need to get serious about dollars and cents. Because that’s peanuts, and it’s not going to pay the bills.
-
‘Manageable chaos’ is a myopic idea that has torn the Middle-East apart. To understand why, we need to go back a hundred years in the past. In 1916, Britain and France signed the Sykes-Picot Agreement in secret. Then, in the middle of the First World War, they decided the Ottoman Empire needed to go. Sultan Mehmed VI in Istanbul controlled crucial shipping lanes and the oil riches of the Persian Gulf. So, while T.E Lawrence duped the Arab sheikhs with promises of a “Greater Syria,” the European powers divided the Levant as it suited them.
The problem was not that outsiders drew the borders. The problem was these borders were indifferent to the people who lived within them. The clean lines carved through the Middle-East ignored sectarian, tribal or ethnic geographies. Many Shia majority areas ended up under Sunni control, and vice-versa. Thirty-million Kurds also ended up homeless. These progeny of the mighty Median Kings of Asia Minor became minorities in Turkey, Syria, Iraq and Iran.
-
A member of the U.S.-trained Syrian rebel forces says he expects to fight forces loyal to President Bashar Assad, even though they pledged only to combat the Islamic State in Iraq and Syria (ISIS) in order to participate the Pentagon program.
-
-
The United Nations Security Council today condemned “in the strongest term” the storming and seizure of the United Arab Emirates embassy in Sana’a, Yemen, by the Houthis on the 17 August 2015.
-
A Saudi-led military offensive against Houthi rebels in Yemen has scored major gains this month, including recapturing the strategic port of Aden and the country’s largest air base, after the Pentagon more than doubled the number of American advisors to provide enhanced intelligence for airstrikes.
-
A commercial ship docked in Aden on Friday, the first to reach the former southern capital since Yemen’s devastating war came to the port city in March.
The Venus, operated by United Arab Shipping Co, carried a cargo of 350 containers of products ordered by businesses in Aden, said port deputy director Aref al-Shaabi.
-
Al Qaeda militants took control of a western district of Yemen’s main port city of Aden on Saturday night, residents said, in another sign that the group is drawing strength from five months of civil war.
-
-
-
Iranian-allied fighters controlling much of Yemen said on Friday air strikes led by Saudi Arabia killed 43 people in the central city of Taiz.
Taiz has become the latest focus of fighting for supporters of President Abd-Rabbu Mansour Hadi, who was driven into exile in Saudi Arabia by the Houthi fighters. Medical sources said Houthi attacks on the city killed 13 people, including seven children.
-
Nonetheless, we have just about bankrupted ourselves trying.
We have employed our military abroad more than 70 times since 1945, and also engaged in innumerable instances of not-so-covert CIA interference in the affairs of other sovereign nations.
The latter include instances of overthrowing democratically elected governments we considered too leftist.
And the truth is that in none of these instances have we had any long-lasting success in achieving our goals. We have, instead, uselessly wasted an enormous amount of treasure and human lives while creating more and more enemies all over the globe. We have created these enemies because almost all of our high-handed meddling has had unforeseen and unfortunate, often tragic, consequences.
We now have about 1,000 military bases abroad (the exact figure depends on the number of smaller bases included), well over 300,000 U.S. military personnel deployed abroad, 1.6 million Americans working in defense industries, and the good Lord knows how many working for the CIA and other surveillance/intelligence government agencies and private contractors.
-
When President Barack Obama took office, he promised to overhaul the nation’s process for interrogating terror suspects. His solution: the High-Value Detainee Interrogation Group, or HIG, a small interagency outfit that would use non-coercive methods and the latest psychological research to interrogate America’s most-wanted terrorists — all behind a veil of secrecy.
-
After a suspected militant was captured last year to face charges for the deadly 2012 attacks on Americans in Benghazi, Libya, he was brought to the U.S. aboard a Navy transport ship on a 13-day trip that his lawyers say could have taken 13 hours by plane.
Ahmed Abu Khattala faced days of questioning aboard the USS New York from separate teams of American interrogators, part of a two-step process designed to obtain both national security intelligence and evidence usable in a criminal prosecution.
-
Russian Foreign Minister Sergey Lavrov, when asked about the implications of the sale, was said to have scoffed at the threat of U.S. sanctions and said they cause no worry for Moscow.
-
Chinese authorities warned that cyanide levels in the waters around the Tianjin Port explosion site had risen to as much as 277 times acceptable levels although they declared that the city’s drinking water was safe.
-
High levels of dangerous chemicals remain at the site of last week’s deadly chemical warehouse blasts in the northern Chinese city of Tianjin — hundreds of times higher than is safe at one spot — officials said Thursday, signaling that a cleanup has a significant way to go.
Water tests show high levels of sodium cyanide, an extremely toxic chemical that can kill humans rapidly, at eight locations at the blast site, Ministry of Environmental Protection official Tian Weiyong said.
-
At least seven people are dead after a vintage military aircraft crashed Saturday on a busy road in southeastern England, police said.
The Hawker Hunter jet was taking part in an air show at an airport near Shoreham in Sussex.
-
NOTHING gets US Republican Party politicians fired up like Iran.
In the first televised debate for candidates competing to lead the Republicans in the 2016 presidential election, Scott Walker promised that he’d tear up the Iran nuclear deal on day one of his presidency. Carly Fiorina blamed the country for “most of the evil that is going on in the Middle East.” Mike Huckabee vowed to topple the “terrorist Iranian regime and defeat the evil forces of radical Islam.”
Oddly, when the candidates complain about the “evil forces of radical Islam” or trouble in the Middle East, they never seem to mention Saudi Arabia.
Iran’s no democratic paradise. But on many counts, Washington’s Saudi allies are even worse. The Saudi royals crush dissent with an iron fist, spread extremist ideology, and invade their neighbors with impunity.
Domestically, the Saudi regime oppresses women, religious minorities, and millions of foreign workers. And it brutally represses criticism from human rights activists, prompting condemnation from both Amnesty International and Human Rights Watch.
Saudi blogger Raif Badawi, for example, was sentenced to 10 years in prison and 1,000 lashes just for writing a blog the government considered critical of its rule. Hundreds of political prisoners languish in prison — including Badawi’s lawyer, who was sentenced to 15 years for his role as a human rights attorney. New legislation effectively equates criticism of the government and other peaceful activities with terrorism.
-
OSCE monitoring mission in Ukraine deputy head Alexander Hug said at the Aug. 19 briefing in Donetsk that the rebels had threatened to kill OSCE observers if they would come again to Bezimenne, Novoazovsk rayon, UNIAN reports.
-
When are Americans going to demand our leaders protect us against drones? Our politicians did nothing on gun control. Now they will look the other way on drones.
Drones should not be produced or manufactured. Take away permits and the right to manufacture them. The U.S. Armed Forces should be the only ones to purchase drones. If I can’t put a 10-by-10 addition on my home without bureaucratic regulations, why is it permitted to manufacture drones?
-
Officials in a Florida city have approved the request of a businessman to serve alcohol in a restaurant he plans to open in a building with an indoor shooting range.
CNN affiliate WFTV reported that Daytona Beach city commissioners have signed off on Ron Perkinson’s proposed facility, which Perkinson hopes to open by late November. The facility will be located near Daytona International Speedway just off Interstate 95.
-
Ferguson police are searching for clues about the killing of a 9-year-old girl who was shot when someone fired into a home where she was doing homework on her mother’s bad.
No arrests have been made in Tuesday night’s fatal shooting of Jamyla Bolden and police don’t yet know if the home was targeted or the shots were random, Ferguson Sgt. Dominica Fuller said Thursday. Jamyla’s 34-year-old mother was struck in the leg and treated at a hospital.
-
On Thursday, July 30, 50 Black and Latino students wearing mock bullet proof vests with stickers that stated #StudentsAintBulletProof #End1033, from the Strategy Center’s Fight for the Soul of the Cities, once again asked the Los Angeles Unified School District to give us a list of the weapons they received from the Department of Defense 1033 Program, to return 61 M-16 assault rifles we believe are still in their possession, and to apologize for being in the program in the first place. Students said, after three public comment testimonies, four long letters (September 2014, November 2014, May 2015, July 2015), over 3,500 petitions, appeals, and every other method of persuasion “Why is the LAUSD trying to kill us?” This campaign is part of the Strategy Center’s No Cars in LA and the U.S., No Tanks in LA and the U.S.
-
Transparency Reporting
-
In truth, Hillary Clinton’s current controversy over keeping sensitive, classified information on home computers had its basis in which her husband, former president Bill Clinton pardoned former CIA director John Deutch who likewise kept classified material on unsecured, private computers.
-
-
-
-
Hillary Clinton, in her memoir “Living History,” recounts her struggle to defend her privacy while residing in the White House. Some of her stories have a gothic tone. After Bill Clinton’s first inauguration, Harry and Linda Thomason, friends from Hollywood, found a jocular note under a pillow in the Lincoln Bedroom. It was from Rush Limbaugh, the conservative radio host. How did the note get there? “I don’t believe in ghosts, but we did sometimes feel that the White House was haunted by more temporal entities,” Clinton writes.
[...]
Now, however, the F.B.I. is involved. This is because an inspector general for U.S. intelligence agencies, and another for the State Department, reviewed a sample of Clinton’s e-mails and identified classified information in some of them. By near-automatic protocol, that finding was referred to the Justice Department. One of the F.B.I.’s tasks in the weeks ahead will be to look into whether, amid all the e-mailing to and from Secretary Clinton, any crime may have been committed, by anyone. There is no indication that Clinton is the target of a criminal inquiry.
-
And, if it turns out that Clinton was indeed informed of this potential security risk, by the info security chief directly or via a trusted Clinton adviser, and that she rejected the advice and directly refused to also use a department email for major security emails, then that Washington problem will have just grown to a new level.
-
As the investigation into former Secretary of State Hillary Clinton’s use of a private email server to conduct official government business heats up, the Washington Times reports that a double-standard exists in the Obama White House for those who leak or “mishandle” classified information: Benign punishment, or none at all, for the president’s inner circle and a heavy hand for everyone else.
While the Obama administration has “investigated and prosecuted more security leakers and people who mishandled secrets than any other in history” — six people have been imprisoned — high-ranking officials who have committed similar, or more egregious, offenses have received slaps on the wrist.
Retired Army Gen. David Petraeus, the former CIA director, commander of U.S. troops in Iraq and a top Obama national security adviser, received a plea deal to a misdemeanor charge of mishandling classified information for top secret information he provided to his biographer, who was also his mistress. He reportedly lied to FBI agents during the investigation.
-
-
-
-
-
Environment/Energy/Wildlife
-
“The seagulls are a protected species and therefore it is illegal to remove nests and eggs or to kill these birds”.
Drones would alleviate the need for people to move physically close to nests to coat the eggs and could rapidly increase the number of eggs sterilised.
-
-
FOR YEARS they have been the focus of anger along the Yorkshire coastline – squawking menacingly as the swoop to pinch visitors’ fish and chips.
-
The distressed seagull is pictured flapping its wings and struggling as Mr Arkle wraps his hands around its neck.
His graphic posts suggest he carried out the act of cruelty because seagulls stopped him sleeping.The distressed seagull is pictured flapping its wings and struggling as Mr Arkle wraps his hands around its neck.
His graphic posts suggest he carried out the act of cruelty because seagulls stopped him sleeping.
-
LASER beams, special paint and even hooded tops are among a raft of new measures put forward to defend Seaton against nuisance seagulls.
The animal rights group PETA has written to councils across Devon and Cornwall offering them advice on how to deal with the gull problem in a “humane” way.
The call for action comes in the wake of increasing concern that members of the public are targeting gulls in vigilante attacks.
-
In the country’s bid to fight against poachers, Mexico is using a new weapon in its war against sea turtle poachers. Drones.
Mexico has one of the highest sea turtle populations in the world, with an estimated 1.1 million nests in 2014.
-
Rising also called for the extradition of Palmer in Zimbabwe and for UPS and FedEx to stop the transportation of trophy animals.
-
Japan has begun to feel the first impacts of Typhoon Goni, with at least one death attributed to high waves as the storm moves towards the mainland. According to NHK, Japan’s national broadcasting corporation, a 66-year-old man drowned after falling from a fishing boat off of Miyazaki Prefecture on the southern island of Kyushu.
-
The Obama administration has granted Royal Dutch Shell final approval to resume drilling for oil and gas in the Arctic Ocean for the first time since 2012 despite widespread protests from environmental groups.
-
Finance
-
Wall Street is pulling out the big guns.
JPMorgan Chase named Raymond Odierno, a retired four-star general and the former chief of staff for the US Army, to advise CEO Jamie Dimon on cybersecurity and international risks.
Odierno, a Rockaway, NJ, native, spent 39 years in the military and more time in Iraq than any other general.
-
With dozens of campuses destroyed, the government has launched an investigation into shady-seeming land grabs by real estate investors.
-
He started off by noting that the general public likes to avoid discussing bitcoin. Although he believes there are various “informed concepts” about bitcoin, he does think “bitcoin by itself is flawed.” This may draw the ire of many diehard bitcoiners on the Internet.
-
We all want peace, don’t we? Peaceful relationships and communities, an absence of violence and conflict, a world at peace.
This is surely everyone’s heartfelt desire. Without peace nothing can be achieved, none of the subtler essential needs of our time, such as feeding everyone and providing good quality health care and education to all – let alone the urgent need to save our planet, beautify the cities and develop sustainable alternative energy sources.
-
-
-
-
-
-
Former Conservative MP Louise Mensch has faced widespread ridicule after accusing Jeremy Corbyn supporters of anti-Semitism – over Twitter searches that turned out be her own.
Ms Mensch posted a series of screenshots showing what she said were autocompleted twitter searches alongside the name of Mr Corbyn’s fellow Labour leadership contender, Liz Kendall.
-
Former Tory MP Louise Mensch has come under fire after an embarrassing Twitter gaffe saw her appearing to accuse Jeremy Corbyn supporters of being anti-Semitic.
-
PR/AstroTurf/Lobbying
-
In the early 1980s suspicions that the Maltese group Front Freedom Fighters was being funded by anti-Communist entities close to the CIA were covertly communicated to the British Foreign Office, recently declassified documents reveal.
-
-
-
Turkish media reports say Turkey has started to construct a 45 kilometer- (28 mile-) long concrete wall along a key stretch of its border with Syria.
-
Thousands of articles have been published worldwide in recent weeks exposing Turkey’s strategic trickery — using the pretext of fighting ISIS to carry out a genocidal bombing campaign against the Kurds who have courageously countered ISIS in Syria and Iraq.
The Wall Street Journal reported on August 12 that a senior US military official accused Turkey of deceiving the American government by allowing its use of Incirlik airbase to attack ISIS, as a cover for President Erdogan’s war on Kurdish fighters (PKK) in northern Iraq. So far, Turkey has carried out 300 air strikes against the PKK, and only three against ISIS! Erdogan’s intent in punishing the Kurds is to gain the sympathy of Turkish voters in the next parliamentary elections, enabling his party to win an outright majority and establish an autocratic presidential theocracy.
-
The history of the American Central Intelligence Agency (CIA)—its coups, assassinations, “extraordinary rendition” kidnappings, use of torture, “black sites,” drone executions, dirty wars and sponsorship of dictatorial regimes [1]—not only underscores the bloody and reactionary role of American imperialism, but most especially the ruling elite’s mortal fear of the working class internationally.
-
Here is another clue: ‘We’ll know our disinformation programme is complete when everything the American public believes is false,” CIA Director, 1981. It seems he got his wish.
Two weeks before the outbreak of WWII, a solemn British Prime Minister Neville Chamberlain remarked, “History will judge the Press to have been the principle cause of war.”
Nevile Henderson, the British Ambassador to Berlin echoed the premier’s words. France’s President Lebrun and Foreign Minister warned the Press ‘not to abuse their so-called Press freedom.’ In September 1941, U.S Senator Clark: ‘Half a dozen men controlling the film industry clamour for war.’
-
Earlier this month I briefly wrote about how the incessant stream of attacks on Jeremy Corbyn from all parts of the media, represented more than meets the eye. That it is a continuation of an undemocratic and sinister policy of subversion and undermining of any popular left wing movement or leader, that poses a threat to the capitalist system and military-industrial-complex.
-
Fox & Friends joined The Daily Caller in an effort to make alleged terrorists Anwar al-Awlaki and Yaser Hamdi the face of birthright citizenship, falsely claiming the men were born in the U.S. to “illegal parents” and able to pursue terrorist activities without retaliation because their citizenship protected them.
-
Socialism has had a rough few decades, but it’s enjoying a rare success. Bernie Sanders, who calls himself a socialist, is running for president, drawing big crowds and leading Hillary Clinton in one poll in New Hampshire. All this leads some people to a damning conclusion: Democrats love Sanders because Democrats are socialists.
-
…Charlotte Wiedemann considers how press freedom and the media are tethered to Western geopolitics
-
Jean-Marie Le Pen, who founded the party in 1972, was serving as honorary president when he was suspended in May for saying he saw the Holocaust as a “detail of history.” He challenged the suspension in court, and in July a judge overturned it, saying proper procedure had not been followed.
-
Censorship
-
British artist and anti-surveillance activist James Bridle is illuminating Germany with artwork exploring the darkest state secrets, cover-ups and information blackouts.
-
Privacy
-
Amongst tech circles in the US Obama and his administration are generally viewed positively. His image amongst this group got a huge boost a few years ago when his administration came out against the Cybersecurity Information Sharing and Protection Act (CISPA) because, amongst other things, it lacked sufficient limitations on the sharing of personally identifiable information between private entities.
-
Impact Team, the now-infamous group of anonymous hackers behind the alleged theft of data from infidelity dating site Ashley Madison, explained in an interview with Motherboard that it staged this attack because it didn’t like how Avid Life Media, the site’s parent company, treated users.
“Avid Life Media is like a drug dealer abusing addicts,” says Impact Team.
So far, this week has seen Impact Team release three major data dumps of Ashley Madison data, on Tuesday, Thursday, and Friday. In the interview, Impact Team says that it started collecting the data “a long time ago,” and Motherboard points out that it once claimed to have been at this for years.
-
-
-
Last week’s revelations of the lengths Amazon goes to monitor staff come amid growing evidence that thousands of other companies are using technology to check on workers
-
CIA director William Colby’s openness about more odious U.S. intelligence practices did not go over well with Henry Kissinger.
Speaking on the phone with McGeorge Bundy, the National Security Advisor to Presidents John F. Kennedy and Lyndon B. Johnson, Kissinger referred to Colby as a “psychopath.”
-
Caspar Bowden made a career out of warning against government encroachment on individuals’ online privacy. His work, however, was not fully recognised until 2013 — the year that his contemporary, the former Central Intelligence Agency (CIA) employee Edward Snowden, leaked thousands of documents originating from the US National Security Agency (NSA).
-
Alberto Nisman, the Argentine prosecutor known for doggedly investigating a 1994 Buenos Aires bombing, was targeted by invasive spy software downloaded onto his cellular phone shortly before his mysterious death. The software masqueraded as a confidential document and was intended to infect a Windows computer.
-
-
In the database, there were 6,788 accounts connected to emails at army.mil; at navy.mil, 1,665; usmc.mil, 809; af.mil, 657; and mail.mil, 206. And there were a few other domains with national security implications: dhs.gov, 45; whitehouse.gov, 44; and fbi.gov, 5. (Here’s a list of all the individual .mil domains, and here are lists of the navy.mil and af.mil domains.)
-
-
Opinion: Cheaters ousted, hearts broken, and a lesson learnt about individual privacy.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Germany is charging one of its own intelligence agents with treason for covertly passing secret information to both the CIA and Russian agents.
Charges against the 32-year-old former agent with the BND intelligence service — who is being identified only as Markus R., due to German privacy law — come more than a year after his arrest last July, which at the time marked a new low in U.S.-German relations.
-
-
Germany has charged a spy who allegedly acted as a double agent for the US and Russia with treason, breach of official secrecy and taking bribes.
The 32-year-old, identified only as Markus R due to privacy rules, is accused of offering his services to the CIA in early 2008 while working for Germany’s foreign intelligence agency, the BND. Documents he gave the US spy agency would have revealed details of the BND’s work and personnel abroad, officials said.
-
Civil Rights
-
In early December 2014, Senate Intelligence Committee Chair Dianne Feinstein, D-Calif., released a summary of her staff’s five-year investigation of the CIA’s interrogation programs following 9/11.
Best known as the “Torture Report,” the document revealed searing details of ghastly abuses ranging from “rectal feedings” to “near drowning” on the waterboard.
-
-
Below are some of the key findings of the Hoffman report, an independent review of the American Psychological Association’s ethics guidelines and allegations made against APA. The report concludes that APA failed to challenge and legitimized the “enhanced interrogation” techniques authorized used against terror suspects during the Bush administration. Gerald Koocher, DePaul’s current Dean of the College of Science and Health, served as president-elect of APA in 2005 and president in 2006, the time of these allegations.
-
The APA got into this mess by holding tightly to a deeply flawed assumption: that psychology should embrace every opportunity to expand its sphere of influence.
-
Throughout the Cold War, and doubtless right down to the present, professional people with skills relevant to “national security” have been secretly recruited to work for the Central Intelligence Agency and the Department of Defense. Universities are among those particularly targeted. Scholars and campus research centers have received CIA and DoD funding for conferences and publications, for collecting intelligence while abroad, and even for spying, all under cloak of secrecy.
[...]
The latest revelation concerning those who “consort with the devil” concerns psychologists in the American Psychological Association. In utter disregard for professional ethics, a number of prominent psychologists worked closely with the CIA’s and the Pentagon’s torture programs in Afghanistan. They not only condoned but personally profited from torture, all in the name of supporting the US war effort. It was a case of first-class collusion, abuse of authority, and conflict of interest—and it went largely unnoticed until recently.
-
The resolution proper begins by adopting the international law definition of torture in the UN Convention Against Torture, which is at variance with US law. The resolution also acknowledges that some 3,400 psychologists work for the Department of Defense (mostly at VA hospitals) and commits the APA to supporting the ethical behavior of these psychologists in these and similar “organizational settings.” And the resolution commits the APA to notifying the President, Congress, and other officials of the core of its mandate:
-
Koocher, in a statement on his website, said he and former APA President Ronald Levant insisted that they “never have supported the use of cruel, degrading or inhumane treatment of prisoners or detainees.”
But the report, which was drafted at the APA’s request by former City of Chicago Inspector General David Hoffman and his colleagues at the firm Sidley Austin, saw the APA’s actions differently. The report concluded that the APA tried to curry favor with the U.S. Department of Defense, with which it had strong ties and is one of the largest employers of psychologists, by issuing loose ethical guidelines for psychologists involved in interrogations. These guidelines did not constrain the interrogations beyond the rules the government had already set for itself and allowed psychologists to remain involved.
-
-
David Hoffman, former assistant US attorney, conducted a review of the APA’s extensive involvement and wrote in his subsequent report, ‘The evidence supports the conclusion that APA officials colluded the DoD officials to, at the least, adopt and maintain APA ethics policies that were not more restrictive than the guidelines that key DoD officials wanted’.
Hoffman also stated that the ‘APA chose its ethics policy based on its goals of helping the DoD, managing PR, and maximising the growth of the profession’.
Prior to Hoffman’s investigation, the APA dismissed and denied allegations of their complicity. The report, however, brought the credibility of the association into question, and earlier this month a ban was approved. In an effort to salvage their reputation, they prohibited any involvement by psychologists in national security interrogations – including noncoercive interrogations under the Obama administration.
-
Some years ago, the psychologist Albert Bandura listed eight mental tricks people play to disengage their consciences so they can perform the acts of violence they would normally abhor.
[...]
Moral Justification, Euphemistic Labeling, Advantageous Comparison, Displacement of Responsibility, Diffusion of Responsibility, Disregard or Distortion of Consequences, Dehumanization, Attribution of Blame
-
A number of other psychologists have been, and continue to be, used in CIA black sites and Guantanamo Bay, despite petitions to remove said psychologists.
-
Not only did those who combed through six million pages of internal CIA documents expose the brutal tactics used by operatives, which included locking detainees in coffin-shaped box for hours or hanging them on a pole for days, they found the practices – which were eventually deemed by the US Supreme Court as outside the Geneva Convention for human rights – didn’t actually lead to the vital information they claimed.
[...]
“I walked out of Zero Dark Thirty, candidly,” Dianne Feinstein, the former chairperson of the State Intelligence Committee told the Frontline program. “We were having a showing and I got into it 15 to 20 minutes and I left, I couldn’t handle it because it’s so false.”
-
Over a 34 year career with the CIA, Rizzo made sweeping legal calls on virtually every major issue facing the spy agency, from rules governing waterboarding, “enhanced interrogation” and drones to answering for the Iran Contra scandal.
-
The CIA’s torture-era leadership won’t repent. Even after the Senate Select Committee on Intelligence released its report saying in no uncertain terms that the CIA had tortured its prisoners, that torture was official U.S. government policy, and that torture never elicited any actionable intelligence that saved American lives, Bush-era CIA Directors George Tenet, Porter Goss, Michael Hayden, and several of their underlings announced plans to release a book justifying torture.
They intend to repeat a lie over and over again in this book: that torture worked. They hope that the American people are either so gullible or so stupid that they’ll believe it. It’s up to the rest of us to ensure that our government swears off committing this crime against humanity.
I know that these former intelligence leaders are lying because I worked with them at the CIA. When I blew the whistle on the CIA’s torture program in 2007, they came down on me like a ton of bricks.
It’s not necessarily news that these former CIA heavyweights believe in torture, even if they refuse to call it what it is. Many television news outlets still run clips of George Tenet’s 2007 appearance on CBS’s “60 Minutes” in which he repeats “We do not torture! We do not torture!” as though he were unhinged and living in a dream world.
-
Since the 1990s there have been increasingly open (public) complaints from users about poor quality work from the U.S. Department of Defense intelligence agencies. This all began in the late 1940s when the CIA was established to coordinate all of the U.S.’s intelligence gathering activities. At that point there began a low level war between the CIA and the Department of Defense.
-
-
PEN Center USA, one of two American branches of the international human rights organization, will honor the investigative journalism non-profit ProPublica and the former CIA officer John Kiriakou, who became an inadvertent whistleblower, on November 16 in a ceremony hosted by Aisha Tyler. Though more award winners are yet to be named, these two choices illustrate the wide range of pressures that news organizations currently face.
-
Last Thursday, Jeb Bush declared to an Iowa audience that he wouldn’t rule out resuming torture practices by the United States government. “I don’t know,” he hedged. “I’m just saying if I’m going to be president of the United States, you take this threat [Islamic State group] seriously.”
Two Thursdays ago, during Fox’s highly watched GOP debate, Megyn Kelly asked presidential candidate Ben Carson whether he would bring back waterboarding. A retired neurosurgeon, Carson replied in the subjunctive, coyly saying that if he were to reinstate torture methods, he wouldn’t broadcast this and “tell everybody what we’re going to do.” As a doctor (think: first do no harm), Carson must have seen countless patients in pain over his career. Even for him to say he might torture is alarming. More appalling is that his polls have since surged, and as of this week, Carson has been statistically named the winner of the Fox debate.
A few days before this debate, Donald Trump told ABC that he thinks “waterboarding doesn’t sound very severe.” This statement would shock us had Trump not already demonstrated his poor understanding of what torture entails, as evidenced by his disparaging remarks about John McCain’s status as a war hero.
-
-
In 1967, in a campaign that helped change racial politics in the United States, Carl Stokes was elected to the first of two terms as Cleveland mayor. The next year, Louis Stokes, a lawyer who had brought several cases to the U.S. Supreme Court, won the congressional seat that he would hold until his retirement in 1998.
-
A Travis County official declared the United States and Texas lag far behind other countries and states in voting.
On Aug. 5, 2015, Democrat Bruce Elfant, the Travis County tax assessor-collector, was interviewed by Dick Ellis of the KOKE-FM Austin Radio Network about the 50th anniversary of President Lyndon B. Johnson signing the Voting Rights Act.
Johnson, Elfant said, “would be very disappointed by the number of Americans who choose to use that right. The United States is about 100th in voter turnout among the industrialized nations and Texas is near the bottom in terms of voter registration and voter turnout,” he said.
-
I am reading “Guantanamo Diary,” the appalling story of Mohamedou Ould Slahi, who has been unjustly imprisoned at the Guantanamo Bay Naval Base for 12 years.
How was Slahi ever arrested in the first place? Likely because he was an early member of Al-Qaida during the days we conveniently forget, when the CIA channeled funds to the Afghan mujahideen to fight the Soviet occupation of Afghanistan. In other words, Mr. Slahi effectively fought as an ally of the U.S. in 1991-92, after which he left Afghanistan and broke off all relations with Al Qaida.
-
The Justice Department has requested a federal appeals court revisit and reverse its decision to revive a lawsuit against former Justice Department officials, who allegedly violated the rights of Arab or Muslim immigrants when they were detained in the immediate months after the terrorist attacks.
Attorneys for the Justice Department argue, regardless of whether immigrants had their rights violated, former Attorney General John Ashcroft, former FBI Director Robert Mueller, and former Commissioner of the Immigration and Naturalization Service (INS) James W. Ziglar adopted reasonable policies “in an effort to protect the nation during a turbulent time.” The former officials should not be liable for rights violations.
-
“Carter was the least violent of American presidents but he did things which I think would certainly fall under Nuremberg provisions,” said Noam Chomsky. Much like Nobel Peace-prize winner Barack Obama 30 years later, Carter was an advocate of human rights in the abstract, but of repression and imposition of power through violence in practice.
Like the current occupant of the White House, Jimmy Carter entered office with a promise to respect human rights, but failed miserably when given the opportunity to do so.
-
…Department of Justice highlighted its attempts at forcing testimony from New York Times reporter James Risen.
-
Recently Jeb Bush said he had a solution to defeat ISIS. He blamed troubles in the Middle East on presidents Bill Clinton and Barack Obama.
He didn’t say anything about his father or brother. These men were presidents and took us to war in the Middle East.
-
Mr. Bush — or Jeb if you don’t mind — I was greatly disturbed to hear that if you became president you won’t rule out the resumption of the use of torture arguing that brutal questioning methods might be justifiable and necessary in some circumstances. Torture is never justifiable.
President Obama banned CIA torture by executive order in January 2009. I urge you to reconsider your statement concerning torture and agree to leave President Obama’s executive order in place. I don’t want a president who would use tortur
-
Army Pvt. Chelsea Manning, the heroic WikiLeaks whistleblower and transgender activist currently jailed in the U.S. Penitentiary at Leavenworth, is now being threatened with “indefinite solitary confinement.”
While on active duty in Iraq as an intelligence analyst, Manning released 700,000 classified and sensitive military and diplomatic documents. They revealed details about modern imperialist wars never before made public. This included the infamous “Collateral Murder” tape of a U.S. “Apache” attack helicopter firing on civilians in Baghdad in 2007, killing 11 adults, including two Reuters journalists. Two children were seriously hurt. Manning also exposed previously hidden facts about the torture of U.S. detainees at the U.S. Guantánamo Bay Detention Camp.
A U.S. military judge sentenced Manning to 35 years on charges of “aiding the enemy” — a treasonable offense under the 1917 U.S. Espionage Act. Awaiting trial, she suffered torturous conditions, first held in a cage inside a tent in the Kuwaiti desert, threatened by guards with being “disappeared” to Guantánamo. Then Manning was held in solitary confinement in the Marine Corps Brig at Quantico, Va., where she was under 24-hour guard and subjected to cruel and inhumane treatment.
-
Two interesting stories appeared in the same edition of my local newspaper last week.
The first involves an awkward problem that Republican presidential candidate Jeb Bush faces: His brother, former president George W. Bush.
Many Republicans have managed to hold their noses when they consider George W. Bush’s administration, especially his unprovoked and ill-advised invasion of Iraq. Jeb Bush has stumbled over this issue several times, looking for ways to put the best face on a huge foreign policy error.
He has admitted that “mistakes were made” and relied on the dubious proposition that “taking out Saddam Hussein turned out to be a pretty good deal.” But this simplistic notion – Saddam Hussein is easy to demonize – depends on the electorate’s failure to notice the chaos that the Iraq War unleashed.
-
Top Muslim clerics gathered in Egypt on Monday to address extremist religious edicts in the face of an unprecedented threat from Islamic State group jihadists who have declared a “caliphate”.
-
The Army created the Human Terrain System — at the height of the counterinsurgency craze that dominated American strategic thinking in Iraq and Afghanistan late in the last decade, with much fanfare — to solve this problem. Cultural training and deep, nuanced understanding of Afghan politics and history were in short supply in the Army; without them, good intelligence was hard to come by, and effective policy making was nearly impossible. Human Terrain Teams, as Human Terrain System units were known, were supposed to include people with social-science backgrounds, language skills and an understanding of Afghan or Iraqi culture, as well as veterans and reservists who would help bind the civilians to their assigned military units.
-
A ship with 1,308 refugees has left the Greek island of Kos bound for the port city of Thessaloniki, to process the asylum-seekers, the press office of the Greek Ministry of Shipping and the Aegean told Sputnik.
-
A 90-mile walk to protest drones and racial profiling is scheduled to begin from the Dane County Jail on Tuesday and go through Baraboo on its way to Volk Field, organizers say.
The “Let It Shine!” walk will take place over the course of a week, ending Aug. 25 in the village of Camp Douglas. Volk Field is home to a shadow drone training program and has been the site of numerous protests, including one in 2014 in which a Diocese of Madison priest was arrested for distributing fliers critical of the military’s use of drones.
-
Throughout the 15-minute conversation, Clinton disagreed with the three activists from Black Lives Matter who had planned to publicly press the 2016 candidate on issues on mass incarceration at an event earlier this month in Keene, New Hampshire.
Permalink
Send this to a friend
08.22.15
Posted in News Roundup at 1:49 pm by Dr. Roy Schestowitz
Contents
-
Headlines pretty much returned to normal today as LinuxCon concluded last night, but a few stories still trickled in. Elsewhere, Christine Hall pondered the future of new Bodhi desktop Moksha and Jack Wallen discussed the LibreOffice 5.0 interface. And finally, adventures in Antergos dominated my day.
-
Desktop
-
-
-
-
-
-
-
-
As school districts across the country increasingly invest in technology for their students, the volume of personal computers in the classroom is surging.
-
It looks like Chromebooks are becoming the popular choice for the education sector, with a new report indicating that sales for Windows-based devices and Apple devices in the school sector are beginning to fall behind.
-
If you’ve never installed Linux before and are just about dipping into the realm of free and open source software, go ahead and first read this primer to get acquainted. This done, it’s time to roll up those sleeves and jump right in: we’ll show you here how to install Linux on either a hard disk or straight to a USB drive where you needn’t disturb your current configuration–Linux is flexible that way.
For the purpose of this hands on, I’ve selected Linux Mint as our distribution of choice. Linux Mint is based on two other popular Linux distributions–Debian and Ubuntu–both of which are mature operating systems in their own right, and well-known for an extensive feature set and solid stability.
-
“I’d like to give Linux a try, but I’m not sure how.”
I’ve heard that statement so many times over the years. During that period, my pat response has changed from something akin to “It’s worth the effort” to “It’s incredibly easy.” Linux is, actually, the single most easy operating system to “try out.” How is that possible? Two words… live booting.
-
There hasn’t been a lot of good news on the stats-front this quarter but things are heating up in Finland. The spikes in utilization are back.
-
Server
-
As Red Hat homes in on VMware, investing development resources in container-related efforts will pay off far more than propping up OpenStack
-
CoreOS is moving forward with its development of the Rocket (rkt) container technology, thanks to some help from Intel. The latest rkt 0.8 release became generally available on Aug. 19, integrating Intel’s Clear Containers technology, providing hardware-assisted container isolation and security.
In a video interview with eWEEK, Brandon Philips, CTO of CoreOS, details the latest development in rkt security and why Docker will still be a key part of CoreOS for some time.
-
Open source software is set to dominate the enterprise server market, says IBM.
-
Kernel Space
-
While the Linux 4.2 kernel hasn’t been officially released yet, Greg Kroah-Hartman sent in early his pull requests for the various subsystems he maintains for the Linux 4.3 merge window.
The pull requests sent in by Greg KH on Thursday include the Linux 4.3 merge window updates for the driver core, TTY/serial, USB driver, char/misc, and the staging area. These pull requests don’t offer any really shocking changes but mostly routine work on improvements / additions / bug-fixes. The staging area once again is heavy with various fixes and clean-ups but there’s also a new driver subsystem.
-
An ex-Google engineer is developing a new file system for Linux, with the hopes that it can offer a speedier and more advanced way of storing data on servers.
After a number of years of development, the Bcache File System (Bcachefs) “is more or less feature complete — nothing critical should be missing,” wrote project head Kent Overstreet, in an e-mail to the Linux Kernel Mailing List late Thursday.
-
-
-
The AllSeen Alliance, a cross-industry collaboration to advance the Internet of Everything through an open source software project, continues to gain momentum. This week, the organization announced six new members have joined the initiative including Fortune 50 company Lowe’s, and technical support services provider, Radialpoint.
-
Kent Overstreet, one of the maintainers of the bcache filesystem (also known as bcachefs), had the great pleasure of announcing the general availability of the project, which aims to be a general purpose POSIX file system.
-
Graphics Stack
-
-
-
Besides Rob Clark being busy implementing GLES/GL 3 in Freedreno Gallium3D, over in kernel-space he has a slew of new improvements to land in its MSM DRM driver for Linux 4.3.
-
Benchmarks
-
My benchmarking entertainment this weekend, besides getting to benchmark with a sledgehammer, was testing out Btrfs RAID 0/1/5/6/10 arrays across a set of four USB 3.0 flash drives.
-
-
-
Applications
-
David King announced the release of the first Beta build for the upcoming Cheese 3.18 open-source webcam viewer software for the anticipated GNOME 3.18 desktop environment.
-
-
-
The Dattobd driver was open-sourced earlier this month by Datto Inc. The Datto Block Driver is for taking block-level snapshots and incremental backups.
The Datto block driver was published earlier this month under the GNU GPLv2 license. This driver is designed just for taking snapshots and incremental backups at the block level. Datto Inc is a data protection/backup company
-
Google has begun committing open-source code to the libvpx repository for supporting their next-generation VP10 video format.
-
Andi Kleen of Intel announced today the release of Simple-PT, a simple Processor Trace implementation for Linux.
-
Instructionals/Technical
-
-
-
-
-
-
The objective of the Great Command-Line Challenge was to create a single command-line program to count the number of emails from each IP address that attempted to access my hosts using SSH.
-
-
-
-
-
-
-
Disabling PulseAudio often leads to more problems than it solves. A more effective solution is to tell PulseAudio to ignore a specific device using udev rules. udev is a device manager for Linux, and you can give udev instructions to apply custom configuration for specific devices.
-
Wine or Emulation
-
Wine developers have just announced that a new version of the application has been released and is now available for download. This is the version that shows signs of DirectX 11 support, so it’s going to be an interesting one.
-
-
Games
-
For the first time in a long time, Linux gamers have a reason to smile. Gaming on the open-source operating system has long meant dabbling in Wine and arcane workarounds, but ever since Valve launched Steam for Linux a year-and-a-half ago the number of native Linux games has positively exploded.
-
After a little miscommunication it turns out Celestian Tales: Old North did release as originally planned day-1 on Linux, and I managed to give it a go and write down some thoughts for you.
-
In a very unsurprising move, new slides out of SIGGRAPH 2015 from Valve talk about Source 2 and Vulkan. The game featured is of course Dota 2 Reborn. Since it’s Valve’s most popular game, and their first game to use Source 2 it was to be expected.
-
The Journey Down is a series of point-and-click adventure games developed by a studio named SkyGoblin. The original plan was to have three chapters for this game, but it looks like SkyGoblin will need your help to make the third chapter a reality.
-
-
-
-
-
The latest installment in the cyberpunk RPG franchise has launched and is a day-1 release for Linux.
-
Feral Interactive sure do know their stuff with their porting, so it’s time we took a proper look at Shadow of Mordor on Linux.
-
-
Big Journey to Home, a 2D adventure game developed and published on Steam by The Light Sword Team, has been released on the Linux platform as well.
-
-
Yesterday marked the release of DiRT Showdown for Linux as ported over by Virtual Programming using their eON technology. With being able to use it as an automated, reproducible benchmark, I spent most of the day and into the night working on some initial AMD Radeon vs. NVIDIA GeForce graphics card benchmarks using this DiRT game that’s finally available to Linux/SteamOS gamers, three years after it was released for Windows. This initial comparison is a 14-way Linux gaming graphics card comparison.
-
-
-
-
Vendetta Online is a space MMORPG (massively multiplayer online role-playing game) developed and published by Guild Software Inc. and its makers are preparing for some important improvements to the economy system.
-
The space shooters are making a comeback, but the Linux platform doesn’t seem to be of interest yet. The developers from ROCKFISH Games are now trying to release Everspace, a new single-player space shooter built on the Unreal Engine 4, and a Linux version is planned.
-
Desktop Environments/WMs
-
Sway is an open-source tiling window manager that supports Wayland and is fully-compatible with the i3 configuration files.
-
K Desktop Environment/KDE SC/Qt
-
-
-
I already made Marble to recognize the current dpi resolution of the screen and to respond to it’s change(e. g. when printing). Next step will be to supply Marble with icons and bitmaps for different dpi resolutions (ldpi, mdpi, hdpi at least). I look forward to work on this in the next months, and if we achive a bigger progress, I’ll let you know in a next blogpost.
-
Lately I have been asked a lot about using Vulkan in KWin: in fact almost every blog post in the last few months has questions about it and that seems to me there is something to write about it.
-
KDE developer Martin Gräßlin explained today that he has no plans on making use of Vulkan within KDE’s compositor / window manager.
-
Proceeding with the next story about the KDE Incubator with the story of GCompris.
GCompris is a high quality educational software suite comprising of numerous activities for children aged 2 to 10. It started in 2000 using the GTK+ toolkit and was part of the Gnome project. In order to address users willing to run GCompris on their tablets, a full rewrite has been initiated in 2014 using Qt Quick.
GCompris had the chance to be accepted by KDE and followed the incubation stage for about a year. It has now been accepted as an official KDE project in its extragear section.
-
On X11 the (OpenGL) compositor renders into a single buffer through the overlay window. This is needed to get features like translucency, shadows, wobbled windows or a desktop cube as Xorg itself doesn’t have any support for such features. The disadvantage of this approach is that we basically always have to perform a “copy” of what needs to be rendered. Consider VLC is playing a fullscreen video the compositor needs to take VLC’s video pixmap and render it onto the overlay window. The compositor needs to run, evaluate the scene and then render the one window.
-
-
-
GNOME Desktop/GTK
-
GUADEC is now over, we had a great time in Gothenburg (special thanks to the local organizers!) and got home in time to polish patches and merge branches, to publish the first beta of this cycle, GNOME 3.17.90.
-
As part of the forthcoming GNOME 3.18 desktop environment release, the GNOME developers pushed the second milestone towards the 1.6 branch of the Tracker open-source semantic data storage tool for desktop and mobile devices.
-
-
In preparation for the GNOME 3.18 Beta 1 desktop environment, the GNOME developers have released the first Beta build of the powerful, next-generation GNOME Shell user interface used by default since the release of GNOME 3.
-
-
The GNOME developers are hard at work these days preparing for the first Beta build of the anticipated GNOME 3.18 desktop environment, due for release on September 23, 2015.
-
The GNOME development team has announced that the first Beta update GNOME 3.18 is now out and ready for testing. There is still a long way to go until the stable version is released, but the project is now in software freeze.
-
-
The GNOME 3.18 beta is now available ahead of the planned GNOME 3.18.0 release in late September.
-
Polari now indicates the status of each connection next to the connection’s name in the sidebar. If Polari encounters an error, an error icon is displayed. Clicking on the connection in the sidebar, will show a popover with error details and an action which can possibly solve it.
-
Yes, Nautilus now is able to display Other Locations view, and finally it caught up with Gtk+ file chooser! It’s already on master, so anyone can test it with jhbuild. Also, Nautilus 3.17.90 already includes it, so Fedora Rawhide users (and any other bleeding edge distro) will be able to test.
-
-
Reviews
-
From the most consumer focused distros like Ubuntu, Fedora, Mint or elementary OS to the more obscure, minimal and enterprise focused ones such as Slackware, Arch Linux or RHEL, I thought I’ve seen them all. Couldn’t have been any further from the truth. Linux eco-system is very diverse. There’s one for everyone. Let’s discuss the weird and wacky world of niche Linux distros that represents the true diversity of open platforms.
-
Linux Mint 17.2 Rafaela is a highly polished, refined, practical, effortless distro. It’s a genuine joy to use. Everything works as expected, and best of all, out of the box, by default. The new release brings in an avalanche of small, soft but most effective improvements, including system settings, themes, and software management.
On the bad sides, there are some tiny quirks. Having to leave your bubble of fun and wander around the Internet in search after some new icons or decorations lessens the impact of having a closed and tight ecosystem that can sustain itself. The Realtek bug is also rather annoying and maybe even alarming, and I do not know how to explain the power to brightness applet transformation. But it only happened once.
Overall though, the impression is very similar to Xubuntu Vivid. Slightly more restrained, because I’ve learned to accept the fact Mint is a top notch player, whereas Xubuntu used to be a black swan underdog and now it’s a majestic phoenix sweeping over the forests of distrolandia, and there’s more of a dramatic effect there. But then, tiny tiny glitches, the family woes, and a whole lot of goodness, elegance, great software, and not a single crash. My 10/10 wizard stick is out again, and it’s trickling faerie dust. 9.99999/10. Not perfect, because perfection means zero flaws. But you should be testing this one, right now. See you around.
-
New Releases
-
Point Linux is an ideal choice for users who do not want to spend a lot of time fussing with configurations and playing around with eye candy and desktop doodads. I have used it to introduce newcomers to computing in general, and to introduce avid Windows users to the Linux OS. Point Linux produced smiles and frustration-free experiences for them — and me.
-
We reported a while ago the great team of developers behind the BackTrack Linux successor, Kali Linux, have released Docker images that allow users to run the most popular and powerful penetration testing distro on any platform.
-
-
As you may know, Antergos is an Arch Linux-based, rolling release Linux system.
Recently, the developers have announced that the Cnchi installer has received important improvements, helping the regular users to install the system.
-
-
Screenshots/Screencasts
-
Ballnux/SUSE
-
SUSE, through Meike Chabowski, had the great pleasure of announcing the release and general availability of SUSE Manager, a piece of software that eases things for Linux users, making complex tasks simple, for IBM z Systems.
-
Red Hat Family
-
The developers of the Baruwa Enterprise Edition commercial operating system, which is also known as BaruwaOS, were proud to announce the release and immediate availability for download of BaruwaOS 6.7.
-
Entrepreneurs looking for $25,000 to help kick-start a business as well as joining the Citrix-Red Hat Innovators Program are running out of time to apply.
-
Red Hat has announced the general availability of Red Hat Satellite 6.1, Red Hat’s systems management solution for managing Red Hat infrastructure. New additions to the platform bring upgraded security enhancements, enhanced discovery and container management capabilities across physical, virtual and cloud environments.
-
Wall street sell-side analysts have given shares of Red Hat, Inc. (NYSE:RHT) as price target of $83.48. This is the one year target predicted by brokerage firms polled by Thomson Reuters. The same equity research firms are predicting earnings of $0.46 per share next quarter and $1.83 for the current year.
-
-
Fedora
-
The top story today seems to be the announcement from ex-Googlite Kent Overstreet of a new COW filesystem for Linux. In other news, Major Hayden explained why Ethernet devices have such weird names in Fedora and Manuel Jose covered the strangest Linux distributions. Elsewhere, Christine Hall posted her review of Bodhi 3.1.0 and Dedoimedo loved Mint 17.2. A review of LibreOffice 5 rounds out the day.
-
Imagine hypothetically that Red Hat, a (mortal) company, were to fail. The community or another company could continue working on Fedora’s source code and get it (or a downstream distro) certified.
-
Cool, right? That’s what I’ve been working on this whole week since Flock. All the bits are now basically in place such that, each night, openQA will run on the Branched and Rawhide nightly composes when they’re done, and when openQA is done, the compose reports will be mailed out.
-
Debian Family
-
I tried to start to write this blog entry like I usually do: Type along what goes through my mind and see where I’m heading. This won’t work out right now for various reasons, mostly because there is so much going on that I don’t have the time to finish that in a reasonable time and I want to publish this today still. So please excuse me for being way more brief than I usually am, and hopefully I’ll find the time to expand some things when asked or come back to that later.
[...]
And I have to repeat myself, this is the place I feel home amongst my extended family, even though I it still is sometimes for me to get to speak up in certain groups. I though believe it’s more an issue of certain individuals taking up a lot of space in discussions without giving (more shy) people in the round the space to also join in. I guess it might be the time that we need a session on dominant talking patterns for next year and how to work against them. I absolutely enjoyed such a session during last year’s FemCamp in Vienna which set the tone for the rest of the conference, and it was simply great.
-
-
Derivatives
-
Canonical/Ubuntu
-
On August 20, Canonical’s Łukasz Zemczak sent in his daily report informing Ubuntu Touch users and developer alike about the latest work done by the Ubuntu Touch devs for Canonical’s mobile operating system in preparation for the OTA-6 software update.
-
Canonical has just upgraded the Firefox packages in Ubuntu 15.04, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS operating systems after a regression has been identified. From the looks of it, the default search engine was set to Yahoo.
-
Canonical has published details in a security notice about a few of OpenSSH vulnerabilities that have been found and fixed in Ubuntu 15.04, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS operating systems.
-
Particularly if watching any videos from the web browser with an Ubuntu Phone or using WiFi, your phone’s battery can drain quite quickly while the device gets rather warm.
One of the newest discussions on the Ubuntu Phone mailing list is about overheating. The Ubuntu Phone user that started the thread warned, “my Nexus 4 (most recent stable version) gave me a burn that almost blistered after 15 minutes of YouTube (wifi), and went from 29% battery to 2% in that time.”
-
Ubuntu has always been about developers. It has been about enabling the free software platform from where it is collaboratively built to be available at no cost to developers in the world, so they are limited only by their imagination—not by money, not by geography.
-
Nekhelesh Ramananthan has posted some interesting information on his blog about the latest work done for the default Clock app of Canonical’s Ubuntu Touch mobile operating system.
-
The indicator displays both international and domestic live cricket scores in the AppIndicator menu and allows you to set any match as the label (so the live score shows up directly on the panel).
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
As you may know, we have previously written that Canonical has created a Film Scope to facilitate the users to watch movie trailers, discover film choices and read movie reviews.
-
Flavours and Variants
-
The Bodhi development folks have been busy bees since lead developer Jeff Hoogland returned to retake his place beneath the Bodhi tree. First, there was the release of version 3.0.0 back in February. Then, a couple of weeks ago came the release of 3.1.0. Although this might be supposed to be a “minor” point grade release, it’s a “big deal” according to the distro’s website. Why? Because it introduces a new desktop called Moksha.
-
-
The emPC-A/RPI follows in a long line of emPC-branded industrial computers dating back to the Xenomai Linux supported emPC-M from 2008 when Germany-based Janztec went by the name Janz Automationssysteme AG. Janztec continues to sell products in the U.S. via Saelig, which is shipping the emPC-A/RPI for $309. The price goes to $364 if you add a microSD card loaded with Raspbian Linux for the computer’s quad-core, 900MHz Raspberry Pi 2 Model B mainboard.
-
Lawn watering systems are notorious for sending money down the drain. When Robert Booth was looking to get started on a robotics project, it’s no surprise that a sprinkler system was at the top of his list. Booth will be presenting his “Strawberry Pi” system at Texas Linux Fest this year. We talked to him about it.
-
RaspBSD has been released, being the first FreeBSD-based operating system for the Raspberry Pi ARM singleboard computer. For now, it is available only for the models B and B+, but the developers will also include support for the BeagleBone Black and the Banana Pi too.
-
A Kickstarter campaign is seeking funds for developing “Mycroft,” an open source, Snappy Core Linux- and Raspberry Pi 2-based alternative to Amazon’s Echo.
The ambitious Mycroft Kickstarter campaign is now halfway to its $99,000 funding goal for developing what it calls “the world’s first open source, open hardware home A.I. platform.” Like Amazon’s groundbreaking Echo, the Mycroft device will be a speech-recognizing wireless hub that implements a combination of Internet access, media streaming, and home automation functions.
-
Mycroft utilizes many open source hardware and software components for its artificial intelligence platform. At the heart of the device is Raspberry Pi 2, the powerful credit-card sized computer.
-
Aaeon has launched a rugged, Android- and Linux-ready “ACP-1104″ panel PC with a 10.1-inch WXGA touchscreen, a quad-core Celeron, and dual GbE ports.
-
JEHE’s Linux-ready “Giada MG-5200SL” Thin Mini-ITX SBC targets Ultra-HD resolution signage with a dual-core 5th Gen. Core CPU, SATA, mSATA, and mini-PCIe.
-
Phones
-
Android
-
-
-
-
-
-
-
-
The photos and short video clips were posted by blogger Evan Blass, aka Evleaks, who got them from an unnamed source. They allegedly show a device to be released later this year as the BlackBerry Venice.
-
-
-
-
-
-
-
-
-
-
-
-
How big is too big for a tablet? While most of the industry has converged around two sizes (one about 7 inches from corner to corner, the other roughly 10 inches across), Samsung apparently wants to push the boundaries. According to a report from SamMobile, the company is currently working on an Android tablet with an 18.4-inch display. The device is reportedly codenamed “Tahoe,” and although there are no details about when it might be unveiled, SamMobile claims it runs Android 5.1 Lollipop and features a TFT LCD display with a 1920 x 1080 resolution, a 1.6 GHz processor, 2GB of RAM, 32GB of internal storage, and rear and front cameras — 8 megapixels and 2.1 megapixels, respectively.
-
LeapFrog has revealed its latest child-focused tablet, and its first to run on Android. The 7-inch Epic tablet is said to combine the parental control and kid-safe environment of previous LeapFrog tablets, with a selection of Android games and apps that children love. The Android-powered Epic tablet has also been designed to offer a customized experience which can grow with the child.
-
-
The year is 2015 and we still don’t have a perfect smartphone. I’d argue that there isn’t even a phone that is all that close to being perfect. I’m not saying that all of today’s phones are bad, because most are very, very good and you will probably be satisfied with whatever you choose. But every single one of them includes a big “but.” Hear me out.
-
If you never use Google Play Games, Google Play Books, Google+ or Google Newsstand, than good news: none of them will be installed on your next Android phone. The suite of apps used to be mandatory for any manufacturer that wanted to sell a device with essential apps like Google Play and Gmail, but new partner guidelines have taken them off of the required pre-install list. Put simply, this means there will be just a little more free space on the next Android smartphone you buy. And if you do use those apps? They’re still available — you’ll just have to download them from the Google Play store to use them.
-
Did you follow along last week’s Android customization post to figure out the details of screen pinning in Android Lollipop? I know, you likely already knew what it was all about. This week we’re diving into YouTube – specifically, using your Android phone to remotely control YouTube. This includes the Chromecast, sure, but also an old, little known and often forgotten feature of the streaming service, YouTube TV.
-
The Qt Company, through Eike Ziller, had the great pleasure of announcing earlier today, August 20, the release and immediate availability for download of the final version of Qt Creator 3.5.0.
-
As a company, OnePlus’ most distinctive quality has always been its aggressive marketing strategy. Despite only selling about a million phones so far, the company’s slow drip of launch info and any-press-is-good-press mentality keeps it in the news almost as much as companies that sell 100x more units. OnePlus has made a name for itself by aggressively targeting enthusiasts with a “flagship” level device priced at less-than-flagship prices. Its software strategy fully embraces the modding community.
The OnePlus One, like several of Google’s Nexus phones before it, did a great job of being cheap without feeling cheap. Google has a ton of money to burn with a pricing scheme like that, but things appear different for OnePlus. It seems like reality has kicked in with the company’s second phone, and you can really feel the cost cutting issues with the OnePlus 2.
-
Google has announced that its next mobile operating system update will be called Andorid 6.0 Marshmallow.
As is tradition, Google will release new Nexus devices with the latest OS preloaded, first. These are expected to arrive in the forms of new Nexus 5 and Nexus 6 replacements, currently expected from LG and Huawei respectively.
-
-
-
-
-
-
-
Sub-notebooks/Tablets
-
Jolla has opened pre-orders on Jolla Tablets starting at $300. The 7.9-inch 2048 x 1536 tablet runs the Linux-based Sailfish OS 2.0 on a quad-core Atom.
The Jolla Tablet has been a long time coming for Indiegogo backers, but the participants will finally receive their tablets in September, says Finland-based Jolla. Now anyone can order the tablets, with shipments due to start in late October. Quantities are said to be limited.
-
-
-
-
-
The open source community has been at the forefront of this new trend, creating software and hardware designs that enable nearly anyone to experiment with IoT devices and applications. And the number of open source projects dedicated to IoT has been growing rapidly. Last year, we put together a list of 35 open source IoT projects, and this year, we’ve extended it to 51 tools.
-
Web Browsers
-
Mozilla
-
Today we are announcing some major upcoming changes to Firefox add-ons. Our add-on ecosystem has evolved through incremental, organic growth over the years, but there are some modernizations to Firefox that require some foundational changes to support:
Taking advantage of new technologies like Electrolysis and Servo
Protecting users from spyware and adware
Shortening the time it takes to review add-ons
-
Back in July, Mozilla disclosed plans to modernize its Firefox browser. Today, the organization made those plans more concrete, with a tentative timeline for introducing long-desired improvements such as the creation of a process per tab—and with it, a timeline for the end of support for traditional Firefox add-ons.
-
SaaS/Big Data
-
There are a lot of open source projects out there, and keeping track of them all is next to impossible. Here are five important ones in the Big Data space that you may not know about.
-
MapR Technologies gives enterprises another alternative channel for its Hadoop distribution with placement in the AWS Marketplace.
-
Among the offerings is Discovery Peak, analytics software that is underpinning a cloud platform created to facilitate collaborative cancer research.
-
LibreOffice
-
Jack Wallen believes the latest release from LibreOffice might be the best yet… even with an aging UI. Do you think this flagship office suite is ready for the masses?
-
It’s free! It’s open! But does LibreOffice deliver on its promise of a powerful office suite for normal users?
-
Prominent GNOME and Fedora developer Christian Schaller has published an open letter to the Apache Software Foundation and Apache OpenOffice teams asking them to redirect OpenOffice.org to the LibreOffice web-site.
-
Business
-
Semi-Open Source
-
In case there were any doubt, it’s becoming clearer every day that it’s no joke: That old, staid telecom giant known as AT&T (NYSE: T) is actually turning its engineering ship around in a big, big way, and it’s not your grandfather’s or grandmother’s network anymore.
-
-
“Clouds” don’t just free IT from having to buy, provision and manage hardware, they can be used as an “elastic” infrastructure, where apps can request resources as needed. Apps that can do this are, unsurprisingly, called “cloud-native apps.”
-
-
Facebook has open-sourced its library for automatically generating Hack code. Hack is a more scalable version of PHP, developed at Facebook.
-
Dropbox acquired Hackpad in April 2014. About a year later the team behind Hackpad informed users that the code would become available under an open-source license “in the next few weeks.” When that didn’t happen right away, some people got frustrated and took to GitHub to vent.
-
BSD
-
The latest version of the desktop-focused PC-BSD operating system is now available.
PC-BSD 10.2 is, of course, based off the brand new FreeBSD 10.2 that was released last week.
-
While not a GNU/Linux distribution, PC-BSD is an important piece of software for the open-source ecosystem, a BSD operating system tweaked and optimized for desktop computers, based on FreeBSD.
-
Two important events of the OpenBSD 5.8 release cycle happened today:
On the Orders page, pre-orders for the new release have been enabled
On the Lyrics page, the OpenBSD 5.8 release song has been published, with links to OGG and MP3 formats available.
-
Project Releases
-
For users of Kodi 15 “Isengard”, it’s now time to upgrade to the 15.1 maintenance release.
-
Public Services/Government
-
Recently, the Sunlight Foundation, the Congressional Data Coalition and the OpenGovFoundation announced that constituents of the U.S. House of Representatives can now choose open source software over proprietary software to better suit their technology requirements and projects.
-
Openness/Sharing
-
-
Intel hopes to take an employee’s painful personal healthcare journey, combine this knowledge with its advanced scale computing and partnerships with medical leaders, and transform treatment for the 1 million Americans who get cancer each year by leveraging big data to make personalized medicine a reality.
-
Intel Corp. and Oregon Health & Science University’s Collaborative Cancer Cloud cleared a major hurdle and will scale to two other major cancer centers in the first quarter of 2016.
-
-
-
Open Hardware
-
Adarsh Simon is an aspiring product designer with a keen eye for detail, and he also enjoys hacking electronics. Now his interests have led him to research additive manufacturing techniques, and that research has resulted in the BOLT MINI, an all-metal, open source 3D printer.
-
Focal Camera have begun bringing their open source modular camera prototyping system to the consumer, allowing any budding designers to try their hand at creating their very own SLRS, stereo and panoramic cameras with a system that while a little daunting, allows users to get to grips with the technology behind their photographs and create a functioning device that is entirely of their own device.
-
Programming
-
-
Code hosting website, GitHub, has published a graph which shows just how popular different programming languages are on the site since its launch in 2008. The results revealed some interesting trends and how different languages have picked up momentum in recent years.
-
Since 2009, Google has been overseeing the community-led development of Go – a programming language aimed at helping web developers build apps at Google’s scale and Google’s speed.
-
GitHub is the web’s number-one place for developers all over the world to swap and share code.
-
IncrediBuild uses a ‘Docker-like’ proprietary distributed container technology to enable fast processing of development tasks in parallel, allowing developers to turn their computer into a virtual supercomputer by harnessing idle cores from remote machines across the network and in the cloud, increasing performance, speeding build time, and improving developer productivity.
-
On Sunday’s “Last Week Tonight,” John Oliver took on the fraudulent behind-the-scenes (and occasionally, not so behind-the-scenes) practices of America’s mega-televangelist ministries — specifically, those that have exploited people’s faith for monetary gain with the promise that “donations will result in wealth coming back to you.” It’s called “The Prosperity Gospel,” and is built on the idea that every donation a congregant gives its pastor is a “seed” that will one day be harvested. “Wealth is a sign of God’s favor,” after all.
-
Hardware
-
Everyone likes buying stuff with a bunch of built-in restrictions, right? The things we “own” often remain the property of the manufacturers, at least in part. That’s the trade-off we never asked for — one pushed on us by everyone from movie studios to makers of high-end cat litter boxes and coffee brewers. DRM prevents backup copies. Proprietary packets brick functions until manufacturer-approved refills are in place.
-
Security
-
Amid this week’s LinuxCon in Seattle, SecurityWeek reported that the Core Infrastructure Initiative (CII), which funds open source projects, will give the badge to those that meet a set of standard criteria. This includes an established bug reporting process, an automated test suite, vulnerability response processes and patching processes. A self-assessment will determine whether the project owners merit the badge.
-
HTTPS protects both website owners and users from interference by network operators. It provides three protections: data authentication, integrity, and confidentiality. HTTPS makes sure that the website you loaded was sent by the real owner of that website, that nothing was injected or censored on the website, and that no one else is able to read the contents of the data being transmitted. We are seeing more and more evidence of manipulation of websites to inject things that the website owners and users didn’t intend. Additionally, browsers are starting to deprecate HTTP as non-secure, so in the coming years non-HTTPS websites will start throwing warnings by both Chrome and Firefox.
-
The new embargo target allows vendors to test the automatic update functionality using a secret vendor-specific URL set in /etc/fwupd.conf without releasing it to the general public until the hardware has been announced.
-
-
Defence/Police/Secrecy/Aggression
-
The specter of war in American foreign policy discourse has thus produced a rather troubling framework: Advocates of diplomacy with Iran cite war as the inevitable alternative, while critics of diplomacy cite war as its inevitable outcome. No matter which side you choose, it seems, you are choosing war.
-
Jeremy Corbyn will apologise on behalf of Labour for the Iraq War if he wins the leadership next month.
The left-wing frontrunner said Labour must finally say sorry for the “deception” which took Britain to war in 2003.
-
So many North Korean officials have reportedly been put to death this year that it’s hard to keep track of them. In most cases, we lack even names.
-
No casualties were immediately reported from the exchange of fire that took place across one of the world’s most heavily armed borders on Thursday. But tensions remained high on Friday, as Mr. Kim ordered his front-line units to be prepared to attack South Korean loudspeakers along the border unless they stopped blaring propaganda broadcasts by Saturday evening.
-
People have taken to Twitter to mock the bearded MP and Labour leadership favourite, after he vowed to apologise for the Iraq war
-
While the “pro-Israel community” is not further defined–it’s a broad category, given that 70 percent of Americans describe themselves as having a favorable view of Israel (Gallup, 2/8-11/15)–the implication is that the Jewish constituents of these congressmembers are overwhelmingly opposed to the Iran deal. But such a generalization about Jewish American opinion is contradicted by polls.
One survey, by the LA Jewish Journal (7/23/15), found 49 percent of US Jews favoring the agreement, with 31 percent opposed. Another poll, conducted for J Street (7/28/15), a progressive pro-Israel organization that supports the deal, found a similar margin, with 60 percent of Jewish Americans pro and 40 percent con.
-
Israeli leaders planned to attack military targets in Iran in recent years, but they were held back due to the opinions of other government leaders and military leaders, according to an audio recording leaked to an Israeli television broadcaster.
-
Ehud Barak, the former defense minister, said that a plan to launch an attack against Iran was sabotaged by the hesitancy of fellow cabinet ministers Yuval Steinitz and the man who would replace him at the Kirya Defense Ministry compound, Moshe Ya’alon.
The bombshell revelations were made in a tape recording obtained by Channel 2. The clip was aired on its flagship Friday news magazine.
Barak said that the attack plans against Iran were drawn up and approved by him and Prime Minister Benjamin Netanyahu sometime between 2009 and 2010.
-
In new book, former defense minister says he, Netanyahu and Lieberman sought to strike Tehran’s nuclear facilities between 2010-2012, but that attempts were blocked by former IDF chief Ashkenazi and ministers Ya’alon, Steinitz.
-
Likud MK Yoav Kish on Saturday lambasted former defense minister Ehud Barak for making recordings in which he details Prime Minister Benjamin Netanyahu’s unsuccessful attempts to win approval for a military strike on Iran’s nuclear facilities.
-
-
-
-
-
-
-
-
Transparency Reporting
-
October 23 1945, John Edgar Hoover: “RUMORS HITLER MAY BE IN ARGENTINA […] transmitted primarily for your info
-
-
-
Environment/Energy/Wildlife
-
Report recognises that electricity market reform was necessary, but urges strong commitment to regain investor confidence
-
The last two weeks have seen record increases in gas prices thanks to an unexpected major outage at BP’s Whiting, Indiana refinery, but in a new development, sources are now saying that BP has made temporary repairs to its refinery while parts for a permanent fix are fabricated.
-
Unlike other predators, humans kill adults and predators, skewing populations.
-
Finance
-
-
-
With each city Democratic presidential candidate Bernie Sanders visits, the number of supporters he draws to his rallies keeps growing. Since June 1, Sanders has spoken to 100,000 people across seven events.
In Phoenix, Arizona, on July 18, he drew 11,000 people, setting a new record for 2016 presidential candidates. His record continued in Seattle with 15,000 supporters, and then in Portland with 28,000 supporters. In Los Angeles on August 10, Sanders drew about 27,500 supporters, according to the Sanders campaign.
-
-
Democratic presidential hopeful Bernie Sanders recently convened a panel of economists in Washington to discuss the debt crisis in Greece and throughout the world. In his opening statement, Sanders talked about the debt crisis in Greece as well as in Puerto Rico. “It is time for creditors to sit down with the governments of Greece and Puerto Rico and work out a debt repayment plan that is fair to both sides,” Sanders said. “The people of Greece and the children of Puerto Rico deserve nothing less.”
-
-
PR/AstroTurf/Lobbying
-
The two big surprises of the 2016 presidential race so far are Bernie Sanders and Donald Trump. Two dark horse candidates opposed by party insiders, each began a substantial surge in campaign polls around the beginning of July. In Real Clear Politics‘ average of polls, Sanders has gone from 12.7 percent to 25.0 percent since July 1, while Trump has gone from 6 percent to 22 percent.
Yet corporate media show a fascination with just one of these characters. Is it the self-described socialist senator from Vermont, who has focused his campaign on combating the US’s rising inequality? Or is it the billionaire real-estate developer who blames America’s economic troubles on foreigners and calls for massive deportations?
-
Mensch was unbowed by the criticism and continued to post examples of abuse she said had come from Corbyn supporters. She did not respond to a request for comment.
-
Users of the micro-blogging site were quick to point out the mistake, mocking the former MP for her monstrous faux-pas.
While anti-Semitism is rife on social media, and Mensch and others has raised concerns regarding Corbyn’s alleged links to high-profile anti-Semites, the gaffe itself was widely appreciated.
-
Censorship
-
After promising a strong response to piracy for several years, Indonesia has finally taken action against The Pirate Bay. Along with fellow torrent index IsoHunt.to, the site is among almost two dozen others now ordered by the Ministry of Communications to be blocked at the ISP level.
-
Google has been ordered by the Information Commissioner’s office to remove nine links to current news stories about older reports which themselves were removed from search results under the ‘right to be forgotten’ ruling.
The search engine had previously removed links relating to a 10 year-old criminal offence by an individual after requests made under the right to be forgotten ruling. Removal of those links from Google’s search results for the claimant’s name spurred new news posts detailing the removals, which were then indexed by Google’s search engine.
Google refused to remove links to these later news posts, which included details of the original criminal offence, despite them forming part of search results for the claimant’s name, arguing that they are an essential part of a recent news story and in the public interest.
-
The UK’s Information Commissioner’s Office (ICO) has ordered Google to remove links from its search results that point to news stories reporting on earlier removals of links from its search results. The nine further results that must be removed point to Web pages with details about the links relating to a criminal offence that were removed by Google following a request from the individual concerned. The Web pages involved in the latest ICO order repeated details of the original criminal offence, which were then included in the results displayed when searching for the complainant’s name on Google.
-
A planned ‘Draw Mohamed’ exhibition has been cancelled in London after counter-terrorism police warned that people could be killed if it went ahead.
Organiser Anne Marie Waters, Sharia Watch director and former UKIP candidate, revealed that security services had reason to believe the event might be attacked, with a “very real possibility that people could be hurt or killed – before, during and after”.
Organisers asked more than 200 galleries to host the exhibition but their requests were almost universally refused, with even the gallery that eventually agreed later pulling out.
-
Since its launch two years ago, the City of London Police Intellectual Property Crime Unit (PIPCU) has requested domain name registrars to suspend 317 pirate sites. A lot of requests were denied, but police say they don’t know how many. The numbers were made available in response to a Freedom of Information request by TF, which also reveals more interesting details.
-
It’s amazing the kind of trouble that Carl Malamud ends up in thanks to people not understanding copyright law. The latest is that he was alerted to the fact that YouTube had taken down a video that he had uploaded, due to a copyright claim from WGBH, a public television station in Boston. The video had nothing to do with WGBH at all. It’s called “Energy — The American Experience” and was created by the US Dept. of Energy in 1974 and is quite clearly in the public domain as a government creation (and in case you’re doubting it, the federal government itself lists the video as “cleared for TV.”
-
‘A powerful declaration of the primacy of freedom of expression, not always the most fashionable view at a liberal arts festival.’ It’s lines like this that prove we live in strange times. This caught my eye in a review of character comic Sarah Franken’s new Fringe show Who Keeps Making All These People?, a searing satire of the Islamic State, political correctness and the gutlessness of modern Western culture. I wonder if the reviewer recognised the irony.
-
If the strangeness of opening a burlesque club in China had not occurred to Amelia Kallman and Norman Gosney as a Buddhist cleansing ceremony took place in their future venue, it certainly did when they found themselves submitting Frank Sinatra lyrics to be vetted by the local cultural department.
-
As Tianjin residents struggle to find answers, China has imposed heavy restrictions on independent media trying to cover the deadly explosions that rocked the port city. DW spoke to China expert Isabel Hilton.
-
It has now been more than a week since the explosions in Tianjin occurred. Discussions on online social networks such as Weibo (China’s version of Twitter) show Chinese netizens are angry. The incident has been Weibo’s top trending topic for a week, with combined posts gaining more than 3 billion views.
-
The Film and Publication Board (FPB) will not publish public comment on its Draft Online Regulation Policy, which has been heavily criticised as Internet censorship legislation.
This after the Right2Know Campaign called for records of the FPB’s public hearings and written submissions to do with the controversial draft policy to be made public.
“We believe the record of public comment will confirm that the majority of South Africans want a free Internet,” says R2K in a statement.
-
As predicted, President Recep Tayyip Erdoğan had absolutely no intention of abiding by the results of the June 7, 2015 when, for the first time in more than 12 years, his Justice and Development lost its majority in parliament. Joining a coalition means compromising with opposition parties rather than continuing his own tyranny of the plurality.
Hence, Erdoğan has called snap-elections for November 1. Erdoğan is no gambler, however, and he will not trust his fate to the voters determining their party pick on an even playing field.
-
A black curtain has been preventing the public from receiving news since certain media outlets’ websites have had all access to their sites from within Turkey blocked since July 25, just as the cease-fire between Turkey and the terrorist Kurdistan Workers’ Party (PKK) ended and the country enters a war against radical terrorist group the Islamic State in Iraq and the Levant (ISIL).
-
Demanding an end to “censorship by the bullet” in Mexico, more than 500 international writers and intellectuals called on President Enrique Peña Nieto to do more to prevent the murder of journalists in a country they say has “no safe haven for the profession”.
-
It’s hard to know which is worse: the deadly conditions that threaten critical journalists in Mexico or the government’s feeble response to recent deadly attacks. The intolerable situation has produced a letter from 500 global writers and thinkers to Mexico’s president urging him to address his country’s terrible record on protecting news professionals. Among the signers: novelists Salman Rushdie, Junot Diaz, Margaret Atwood and news figures Christiane Amanpour and Tom Brokaw.
-
American Web users’ access to Internet content may soon be limited, thanks to a recent decision by French regulators. France’s National Commission on Informatics and Liberties (known by its French acronym CNIL) ordered Google to apply the European Union’s bizarre “right-to-be-forgotten” rules on a global basis in a June ruling. The search engine announced at the end of July that it would refuse to comply. If it is nevertheless forced to do so, the result could be unprecedented censorship of Internet content, as well as a dangerous expansion of foreign Web restrictions on Americans.
-
Since his election in May 2014, Prime Minister Narendra Modi has trumpeted India’s open society and vibrant democracy when he speaks to foreign heads of state and business leaders. But, at home, his government is seeking to restrict freedom of expression, including recent attempts to limit access to the Internet and the freedom of Indian television networks to report the news.
-
Videos made in the UK by artists signed to major labels will be classified before release, in measures meant to protect children from unsuitable online content
-
-
Does Mark Latham’s parting of ways with the Australian Financial Review amount to censorship? Has political correctness gone mad? Are commentators not allowed to be provocative? Should we not tolerate a wide array of views – popular or not? Do ‘frightbat’ feminists on Twitter have too much power?
-
Second, parents should insist on workable procedures for students to report instances of bigotry (and also for allegations that faculty members are failing in their duty to evaluate student work based on its quality, rather than a divergent political view).
Third, they should ask the regents to ensure that each campus has a plan so that when a significant instance of bigotry occurs, there are clear and immediate communications from the chancellor, campus police and campus administrators.
Fourth, parents should ask the regents to stress a core principle without which the university cannot function: that attempts to outlaw or chill speech are more dangerous than hateful speech itself. Unless the speech is illegal, such as threats against a person or a group coupled with a clear call for immediate unlawful action, it must be answered with other speech that argues why what was advocated or articulated was not only wrong, but also bigoted. This, not censorship or “trigger warnings,” will tell the students that people of goodwill are speaking out with and for them.
-
Bloggers need to exercise ethical self-censorship, one of the organizers of NeForum for Bloggers 2015, LiveJournal head marketing officer Ivan Kalyuzhny told reporters.
-
The “right to be forgotten” has always been a double whammy of a disaster: an awful policy based on terrible ideas. Under the right, implemented in 2014 by the European Court of Justice, private citizens can petition search engines to hide results that pertain to their pasts. As a policy, the right to be forgotten is bad because companies like Google have legitimate free speech interests in presenting their results as they see fit. As an idea, it’s bad because it bars search engines from publishing truthful information about matters of public concern—a troubling precedent which, taken to its logical end, could lead to serious censorship.
-
On Thursday, a UK court ordered Google to remove links to some stories about the right to be forgotten.
-
When ISPs and social media platforms are held legally responsible for all content passing through them, we all lose out.
-
-
The Ecuadorean authorities have imposed “preventive censorship” on all media coverage of Cotopaxi, a volcano 50 km south of the capital that became active again on 14 August after 73 years of inactivity. The government’s communiqués are now the only permitted source of information on the subject.
-
The new language of campus censorship cuts out the middleman and claims that merely hearing wrong, unpleasant or offensive ideas is so dangerous to the mental health of the listener that people need to be protected from the experience.
-
Look at a move back in 2014 with proposed legislation that would give more powers to a government regulatory body to say what they want taken offline – all in the name of ‘protecting children.’
-
The National Union of Somali Journalists (NUSOJ) backs the protest of journalists working in central Somalia due to increasing pressure, intimidations and censorship by armed religious group.
-
-
The atomic bombing of Hiroshima and Nagasaki 70 years ago, is one of the most studied events in modern history. And yet significant aspects of that bombing are still not well known.
I recently published a social history of US censorship in the aftermath of the bombings, which this piece is based on. The material was drawn from a dozen different manuscript collections in archives around the US.
I found that military and civilian officials in the US sought to contain information about the effects of radiation from the blasts, which helps explain the persistent gaps in the public’s understanding of radiation from the bombings.
-
The recent show-cause notice by the government to three television channels on Yakub Memon’s hanging, and its temporary ban on 857 porn sites, have rekindled apprehensions about overt and covert censorship, and of the kind of coercive constraints on free and fearless expression that is a fundamental right guaranteed to every Indian.
-
Computer scientists have developed a novel method for providing concrete proof to internet users that their information did not cross through certain undesired geographic areas.
The new system, called “Alibi Routing”, offers advantages over existing systems as it is immediately deployable and does not require knowledge of the internet’s routing hardware or policies.
Recent events such as censorship of internet traffic, suspicious “boomerang routing” where data leaves a region only to come back again, and monitoring of users’ data have alerted the researchers.
-
Censorship, lying by omission and lying by commission will doom the planet.
-
Chiming in with the outraged individual who wrote to the Fringe, Gideon Falter, chairman of the Campaign Against Antisemitism, said in a statement that Chabloz’s presence should be ‘of grave concern’ to Fringe organisers and urged Scottish premier Nicola Sturgeon to step up and enforce her pledged ‘zero-tolerance’ policy on anti-Semitism.
Related categories
Free speech
But as dodgy, detestable and potentially anti-Semitic as Chabloz may be, the ease with which people are trying to run her out of the festival, and, potentially, out of the country, is a complete disgrace. In a free society, we must all be free to speak, discuss and salute however we like.
-
Currently a controversy is brewing over at Github, which can be described as “the facebook of programmers”. That’s one heck of an elevator pitch, and made Github the darling of VC-funders and happy users alike. It’s a web-based Git repository hosting service, where you can upload your projects and if anyone takes a liking to your repo they can fork it and work on it too.
Git in this context is a free software distributed under the terms of the GNU General Public License, and every Git working directory is a full-fledged repository with complete history and full version-tracking capabilities. A fork is a copy of a repository. Forking a repository allows you to freely experiment with changes without affecting the original project, and the original project doesn’t affect yours. Just making that clear so that Adria Richards doesn’t come around in case I make any forking-jokes.
-
Privacy
-
-
-
Jeb Bush, one of the leading Republican presidential candidates, told a national security forum that Washington, DC needs a stronger link to Silicon Valley.
“There’s a place to find common ground between personal civil liberties and NSA doing its job,” Bush said Tuesday, according to the Associated Press. “I think the balance has actually gone the wrong way.”
Further Reading
Watchdog report offers harshest critique of NSA metadata program to date
Group fights gov’t claim that “essentially all telephone records are relevant.”
The former Florida governor’s statement puts him not only at odds with rival Republican candidates like Rand Paul, but also against a number of government committees and federal judges.
“If you create encryption, it makes it harder for the American government to do its job—while protecting civil liberties—to make sure that evildoers aren’t in our midst,” Bush said in South Carolina at an event sponsored by Americans for Peace, Prosperity, and Security, according to The Intercept.
-
-
Republican presidential candidate Jeb Bush said Tuesday that encryption makes it harder for law enforcement to track down “evildoers” — and called for a “much better, more cooperative relationship” with Apple, Google, and other tech companies that are building uncrackable private communication apps into their new products.
-
People are the worst. An unknown number of assholes are threatening to expose Ashley Madison users, presumably ruining their marriages. The hacking victims must pay the extortionists “exactly 1.0000001 Bitcoins” or the spouse gets notified.
-
In the last 48 hours we went under the ‘psychological’ threshold of 1000 Exit Relays in the consensus.
Right now, Thu Aug 20 23:57:02 UTC 2015, we have:
6234 Running relays
954 Exit relays
-
How much of your public cloud do you need to log? According to enterprise managers, everything. And why not? They have access to virtually unlimited processing and storage resources, so they turn on all logs.
Logging comes in different flavors. You can log the use of storage systems, such as Amazon Web Services’ S3, log the use of databases, log the use of server instances, log the network, log security, and log governance.
-
New terms and conditions popping up on Spotify users screens give the music-streaming company sweeping new rights.
-
Updated privacy policy also reveals who Spotify is sharing personal data with, including advertisers, generating social media backlash
-
…youth board member Matthew Brown explores mass surveillance in the UK.
-
Specifically, a quantum computer using something called Shor’s algorithm can efficiently factor numbers, breaking RSA. A variant can break Diffie-Hellman and other discrete log–based cryptosystems, including those that use elliptic curves. This could potentially render all modern public-key algorithms insecure. Before you panic, note that the largest number to date that has been factored by a quantum computer is 143. (That computation also accidentally “factored much larger numbers such as 3599, 11663, and 56153, without the awareness of the authors of that work,” which shows how weird this all is.) So while a practical quantum computer is still science fiction, it’s not stupid science fiction.
-
New disclosures about the National Security Agency’s partnership with AT&T could reignite constitutional challenges to the spy agency’s efforts to wiretap the Internet.
-
-
Sonic CEO Dane Jasper responds to revelations of NSA and AT&T’s coziness
-
Yesterday, U.N. spokeswoman Vannina Maestracci said that the world diplomatic organization would discuss the spying issue with AT&T “over the coming months.” Also, the U.N. said that in the next few months, it will start accepting bids for new communications contracts.
-
-
-
The combined spying capabilities of the U.S. government and some private companies threaten civil liberties, according to a formal employee of AT&T.
On Saturday, The New York Times published a story confirming that U.S. telecom giant AT&T had helped the country’s National Security Agency (NSA) spy on vast swaths of Internet traffic.
“This threatens civil liberties, as individuals have little power against such combinations. It’s intimidating,” former AT&T technician and whistleblower Mark Klein told Russian news agency Sputnik.
-
The convergence of power against the ordinary citizen, here via the interpenetration of government and the telecommunications industry, a collapsing of the public and private spheres of authority (it doesn’t matter which of the two seizes the initiative, for what amounts to the privatization of repression under the aegis of the State), eviscerates/invalidates the existence of a democratic social order. The American Imperium wears no clothes, a condition at least a century in the making. The present, however, is perhaps worse than ever, from the standpoint of freedom of thought and expression, as witness, in passing, the clear rightward shift of the political spectrum in which both major parties field candidates stopping just this side of outright fascism.
-
-
The United Nations has said it expects member states to respect its right to privacy and is assessing how to respond to a report that telecommunications company AT&T Inc helped the US National Security Agency spy on the world body’s communications.
The company gave technical assistance to the NSA in carrying out a secret court order allowing wiretapping of all internet communications at the headquarters of the United Nations, an AT&T customer, the New York Times reported on Saturday.
-
The former mayor of Salt Lake City is suing former President George W. Bush, former Vice President Dick Cheney and the National Security Agency for spying on the city during the 2002 Winter Olympic Games.
-
-
-
“This is the first time anyone knows of that a surveillance cone has been placed over a specific geographical area in the United States,” Anderson told The Register. “What was so alarming was that they were reading the contents of the text messages and emails.”
-
-
-
-
-
-
-
-
The government seems to have lost interest in finding anyone to hang for Snowden’s all-access tour of the NSA’s internal servers — access that greatly aided in his absconding with a number of documents revealing the surprising extent of the agency’s surveillance programs. It certainly still wants to hang Snowden — literally, if some legislators get their way.
It has, however, decided to nail one handy scapegoat to the wall. This would be the contractor who allowed Snowden to get in the door in the first place. The Register’s Shaun Nichols reports that the DOJ is fining US Investigative Services (USIS) $30 million for generally being completely terrible at the one thing it’s supposed to be doing: vetting applicants for sensitive government jobs.
-
Snowden-inspired crypto-email service Lavaboom has apparently gone titsup, according to several net sources.
Rumours that the German encrypted mail service was no more surfaced through an ex contractor Piotr on the blog of rival ProtonMail, before getting picked up and discussed on Reddit.
-
Last week, however, during a hearing in US District Court in Washington, DC, a government attorney revealed for the first time that it found three emails Snowden said he sent to the NSA’s Oversight and Compliance office, one of the offices that would have handled his complaints.
However, those emails did not raise any questions or concerns about NSA surveillance, according to Justice Department attorney Steve Bressler.
“They concerned him doing his job of providing tech support to them, not raising concerns about NSA programs,” Bressler told US District Court Judge Ketanji Brown Jackson.
The court hearing was held in response to an ongoing Freedom of Information Act (FOIA) lawsuit against the NSA that VICE News filed a year ago in which we sought all of the emails Snowden said he sent to agency officials that “raised concerns” about NSA surveillance.
-
Because intelligence officials often claim that these programs are directed only at foreigners abroad (as though mass surveillance of the rest of the world is justified), many Americans believe that they aren’t vulnerable to the NSA’s dragnet spying. But the reality is far different.
-
In an interview with Nexgov about the report, ODNI’s director of science and technology David Honey spoke openly about working with techcompanies like Uber—to better emulate the way they track and predict customer (and driver) actions. “If we can leverage those kinds of tools,” Honey told Nexgov, “maybe we gotta adapt them a little bit, but that certainly beats having to go and pay for those things from scratch.”
One portion of the report, a flow chart titled “Enhanced Processing and Management of Data From Disparate Sources,” lists every logistical and analytical problem intelligence agencies hope the private sector can help them with. They range from the completely understandable (“geospatial analytics,” “data structures for optimized searching”) to the somewhat ludicrous (“photonic computing,” “immersive virtual world user experience”).
-
Translated, this means that bureaucrats decided they wanted to snoop into phone calls and went ahead and did so without getting a warrant from a court.
-
After the US security agency NSA identified a massive hacking attack from Chinese sources, other G8 countries have followed their lead. Australia is tightening its telecommunications policies, and it is shutting out Chinese telecommunications giant Huawei.
-
Civil Rights
-
Ted Nugent called a black man a “mongrelboy” during an exchange on Facebook in just the latest example of the National Rifle Association board member’s use of the social media platform as a launch pad for racial attacks.
-
It’s not just Donald Trump and Scott Walker that have declared children born on American soil should no longer be considered citizens: the American Legislative Exchange Council, or “ALEC,” made the same claim in 2008.
-
A coalition of environmental and human rights organisations from the UK, Romania and Canada have called on prime minister David Cameron to intervene in an international case which is pitting a Canadian mining company against the government of Romania. The group argues that under new trade agreements like TTIP (the Transatlantic Trade and Investment Partnership) such cases will radically expand, targeting the British and other European governments.
-
The presumed illegality of filming police is a law enforcement mental disorder. Far too many officers believe they have the right to perform their public service unobserved. Officers continue to take cameras from bystanders who happen to catch them behaving badly. Abby Phillip at the Washington Post details another apparent act of police misconduct that resulted in more misconduct as officers attempted to shut the recording down.
-
Just after 4 p.m. Thursday, a woman stood a few feet away from several Miami Police Department patrol cars with her cellphone camera recording. After a few seconds, an officer entered the frame, escorting a handcuffed young black man to the back of a police car.
Suddenly, the officer put his head inside the car door and appeared to punch the suspect.
“Oh!” a woman exclaimed on the recording, reacting to what was unfolding before her. The woman, who the Associated Press identified as Shenitria Blocker, moved closer, and the officer climbed into the back seat of the car. Moments later, the camera shook and the video ended.
-
-
-
-
The National Rifle Association’s magazine America’s 1st Freedom attacks Democratic presidential candidate Martin O’Malley on its first cover focused on the 2016 presidential race. The issue’s feature article outlandishly accuses the former Maryland governor of offering “hope and change to convicted killers and criminals,” but the organization’s overheated rhetoric is based on unfounded attacks on O’Malley’s record.
-
It will soon be the 10-year anniversary of Hurricane Katrina, a devastating event that killed at least 1,800 people across the Gulf Coast region and displaced as many as half a million, followed by rebuilding efforts that were bungling and divisive.
-
Sky has reported that UK police are using body worn cameras from the company Evidence.com, which automatically uploads the footage online. This company is a subsidiary of TASER, makers of the well known electric shock devices. Their piece says that questions have been raised about the safety and security of the footage, with shadow Labour minister for policing, Jack Dromey, asking for reassurances from the Home Secretary.
-
The noisy garbage trucks that lumber down San Jose streets every week could soon pick up more than just trash — they might also scan your license plate and all your neighbors’ tags, too, in a proposed city-wide sweep for stolen vehicles that has civil libertarians crying foul.
-
What remains – I guess I would be a horrible performer at Amazon, and I am proud of it.
-
The page does not mention that Khalid Sheikh Mohammed, the 9/11 terrorist attack architect, lied to CIA officers about a Montana recruitment plot while being water-boarded.
-
The revelations of U.S. spying on Japan have been an unpleasant surprise for the Japanese public.
-
In 1967, amid civil rights and anti-Vietnam War protests, U.S. Army Gen. William P. Yarborough, Assistant Chief of Staff for Intelligence, initiated unprecedented extensive domestic surveillance involving Army Intelligence and the CIA as well as the NSA.
-
Internet/Net Neutrality
-
Google joined hands with Facebook to try and prevent the Internet and Mobile Association of India, which represents some of the largest Internet companies in India, from taking a stand that counters Zero Rating. According to emails exchanged between IAMAI’s Government Relations committee members, of which MediaNama has copies, Vineeta Dixit, a member of Google’s Public Policy and and Government Relations team, strongly pushed for the removal of any mention of Zero Rating from the IAMAI’s submission, as a response to the Department of Telecom’s report on Net Neutrality. Please note that Google hasn’t responded to our queries, despite multiple reminders.
-
Last week, I came across two separate speeches that were given recently about the future of the internet — both with very different takes and points, but both that really struck a chord with me. And the two seem to fit together nicely, so I’m combining both of them into one post. The first speech is Jennifer Granick’s recent keynote at the Black Hat conference in Las Vegas. You can see the video here or read a modified version of the speech entitled, “The End of the Internet Dream.”
-
Intellectual Monopolies
-
Copyrights
-
Three years ago now, EFF’s client Kyle Goodwin, a sports videographer, asked the court to allow him to retrieve the files he stored in an account on the cloud storage site Megaupload. When the government seized Megaupload’s assets and servers in January 2012, Mr. Goodwin lost access to video files containing months of his professional work. Today, EFF filed a brief on behalf of Mr. Goodwin asking, once again, for the return of the files.
We originally asked the court for help back in 2012. The U.S. District Court for the Eastern District of Virginia took briefing, and even held a hearing. Unfortunately, since that time not much has happened. The U.S. government has continued pursuing a criminal case and a civil forfeiture case against Megaupload and its owners, but the data stored by millions of Megaupload customers, including material like Mr. Goodwin’s sports videos that had nothing to do with the alleged copyright infringement that Megaupload is accused of, languished in a warehouse on hundreds of servers owned by Carpathia Hosting, Megaupload’s former contractor.
-
A Minnesota court has ordered Paul Hansmeier, one of two lawyers considered the creators of the Prenda Law copyright-trolling scheme, to pay sanctions in a case where he and his colleague John Steele were accused of trying to collude with a defendant.
An order published Monday by a Minnesota appeals court describes how Hansmeier tried to dodge a $64,000 judicial sanction in the Guava LLC v. Spencer Merkel case by moving money out of his Alpha Law Firm then dissolving it. A district court previously found that Hansmeier’s actions and inconsistent explanations warranted a piercing of the “corporate veil,” and that court ruled that Hansmeier should be held personally responsible for the debt. Now, an appeals court has agreed (PDF) with that conclusion.
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »