EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

06.23.13

IRC Proceedings: June 16th, 2013-June 22nd, 2013

Posted in IRC Logs at 7:09 pm by Dr. Roy Schestowitz

IRC Proceedings: June 16th, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: June 17th, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: June 18th, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: June 19th, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: June 20th, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: June 21st, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: June 22nd, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

Enter the IRC channels now

Links 23/6/2013: Russian-Based OpenMandriva Goes Alpha, Snowden in Russia

Posted in News Roundup at 11:25 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • New and amazing features of Linux

    The Linux operating system has been around since the beginning of the first computers and the first operating systems. Since its first formation in the form of a small operating system running on the command line interface it has been constantly evolving into a much more powerful and robust operating system capable of sustaining heavy workload and performing multiple tasks at once.

  • Uruguay Fights For GNU/Linux

    Uruguay is a small country, only 3 million people. That explains the fluctuations on the graph but the trend and substance is clear. According to Statcounter Uruguayans are using GNU/Linux regularly and in great numbers. That almost certainly means government, business and consumers have ready access.

  • Linux on Film: Dredd (2012)

    One of the elements that made the original RoboCop (1987) so good was seeing Alex Murphy deal out some major butt-kicking in spite of the losing battle he was facing against the city, politicians and his makers. And Dredd (2012) serves this very experience ala carte. I don’t think the reboot of Robocop can come close to the sheer audacity of Dredd. Dredd is a straightforward no-nonsense cop-thriller set in the future. Judge Dredd is presented as he should be – a dedicated, incorruptible cop with a powerful firearm.

  • When it comes to a new networking OS, Linux is the Linux of networking

    How is networking like farming? JR Rivers, the co-founder and CEO of Cumulus Networks, which launched earlier today, tried to use our evolution from a hunter-gatherer society to today’s food acquisition environment to explain how technological advances that speed up distribution and make distribution or product manufacturing cheaper change societies.

  • Why Every GNU/Linux User Should Support Tesla Motors
  • Desktop

    • Could Google Deliver a Chrome OS-based Tiny Stick PC?

      While the Raspberry Pi has grabbed many headlines as a tiny, ultra-inexpensive, pocketable computer that runs various open source operating systems, it’s actually only one of many tiny LInux computers being touted as part of a new “Linux punk ethic.” As we’ve noted, there are various pocket-size Android devices selling online for under $100 (see the photo).

  • Audiocasts/Shows

  • Kernel Space

    • Hardware, Past, Present, and Future.

      Here’s some thoughts about some hardware I was going to use, hardware I use daily, and hardware I’ll probably use someday in the future.

    • The People Who Support Linux: 19-Year-Old Aims to be a Kernel Developer
    • Linux Foundation sees broadening role for developers

      Linux developers were once just that, developers. But their role is changing says the Linux Foundation, which is expanding its training options to help them.

      The foundation, an industry supported non-profit, has added two courses to its program, OpenStack Cloud Architecture and Deployment and Linux Enterprise Automation.

    • Linux-3.9.7

      I don’t need to have the latest and greatest from the bleeding edge of FLOSS but I do like the polish being put on the Linux kernel…

    • Graphics Stack

      • NVIDIA Driver Soon Likely To Support EGL, Mir

        With NVIDIA entering the GPU IP licensing business, the need to support EGL by their binary display driver — and with that the Ubuntu Mir display server and Wayland — has become more pressing.

        While there hasn’t been any official communication out of NVIDIA yet, it’s likely that their binary display driver will soon be bearing EGL support to complement their GLX windowing system support. The EGL interface is for sitting between OpenGL and the windowing system. EGL is used by Google’s Android operating system for mobile devices. Beyond that, both the Mir Display Server and Wayland/Weston are using EGL rather than the GLX windowing system API.

      • Oracle To Work On Mesa Driver For VirtualBox
    • Benchmarks

      • Ubuntu 13.10 Performance On Intel Core i7 “Haswell”

        The many Intel Haswell Linux benchmarks delivered on Phoronix this month have been from updated Ubuntu 13.04 configurations. However, if you’re curious about what the performance is like when upgrading to an Ubuntu 13.10 “Saucy Salamander” daily development snapshot, here are some benchmarks.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • Getting started on KDEPIM

        Or so they say. We developers are used to high-resolution screens but many users use netbooks with 1024×600 screens (the horror!). Unfortunately, KMail configuration dialog did not fit in such a small rectangle, so I massaged the various configuration pages to reduce the minimum necessary size for the dialog. The minimum size for the dialog is now 780×567 pixels on my machine (you may get different results depending on widget style and fonts).

    • GNOME Desktop/GTK

      • Gnome Shell 3.9.3 Release

        We are less than 100 days away from the official GS 3.10 release and another little step towards another amazing major release has been made yesterday with the release of 3.9.3. This new version brings some tweaks and fixes, while also porting to new technologies like the bluez 5.

      • Every Detail Matters is Open for Business

        Everyone’s favourite UX polish extravaganza is back for another round. For the next months we will be targeting a host of bugs that will add polish and finesse to the GNOME 3 user experience.

        This is the third time that I’ve run Every Detail Matters. Over the last two rounds, the initiative has gone from strength to strength. A total of 82 bugs have been fixed so far, and the GNOME 3 user experience has been massively improved as a result of everyone’s contributions.

  • Distributions

    • Fedora vs OpenSuse vs Gentoo vs Ubuntu vs OSX vs Windows

      Lets start with the honest truth right out of the blocks, there isn’t a best OS, there isn’t a worst OS, there is only preference and the right tool for the job you want it to do.

      [...]

      We are bound by our choices, find it hard to change them unless we have a reason to, but can do if the pain level is righ. There is no such thing as the perfect OS, only the right tool for us and the job we want them to perform. We find excuses, reasons to justify out choices however most to the time they are just that, sometimes they are based on experience, most of the time on FUD. Forcing an OS on someone is never going to work, and suggesting one might seem like a great idea, but usually ends in disaster.

    • Pisi Linux Beta: A Real-life Test

      I waited eagerly for the beta release of Pisi Linux. As soon as it was out, I downloaded it and installed it into a partition my ZaReason’s Alto 4330 had.

      The installation took about 25 minutes. Once it was over, I noticed a few bugs. For example, Pisi’s Grub 2 installed into the MBR, not into the partition I chose. Well, that’s not a show stopper to me. Besides, Pisi’s Grub is very well designed. Anyway, I booted my brand new Linux kitten to see what it looked like and what it was capable of.

      Those who used old-school Pardus will feel familiar with Pisi. Kaptan greets you and lets you choose your first-time settings. Yes, it was great to see Kaptan again!

    • AntiX 13.1 Will Resurrect Your Old Computer

      AntiX, a fast, lightweight and easy-to-install Linux Live CD distribution based on Debian Testing and MEPIS, for Intel-AMD x86 compatible systems, is now at version 13.1.

    • New Releases

    • Screenshots

    • PCLinuxOS/Mageia/Mandrake/Mandriva Family

    • Gentoo Family

    • Red Hat Family

      • Red Hat CEO: Expect Better Economy in 2013

        Red Hat (RHT), the largest provider of open-source software, noted that the IT spending environment isn’t as strong as everyone would like it to be. However, it’s not getting worse, either.

        In an interview with TheStreet, CEO Jim Whitehurst noted that it’s a “tough IT environment” right now, but nothing has fundamentally changed for Red Hat. “It’s a little bit of a slower IT environment right now, and projects are a little slower. Nothing has fundamentally changed about the business, though.”

      • Red Hat OpenStack: No Revenues This Year, But…

        Red Hat OpenStack will generate zero revenues, billings and bookings this year. Does that make the open source cloud platform a failure? Absolutely not. Here’s why Red Hat (RHT) partners need to pay attention.

      • Fedora

        • A Week With Fedora: End Of The Line

          So I’ve been working with Fedora for over a week now, and I have to say that it’s been fun. I haven’t hit any major issues that are deal breakers for me. I’ve fully personalised Fedora’s Gnome Shell desktop environment, and I’m really happy. However, I think it’s time to go back to Ubuntu,and here’s why…

    • Debian Family

      • Derivatives

        • Canonical/Ubuntu

          • Ubuntu community donation plans detailed

            Ubuntu Community Council member Elizabeth Krumbach and Community Manager Jono Bacon have detailed Canonical’s plans to distribute community-oriented donations from the donations page on the Ubuntu web site. After Canonical implemented a page asking for donations from users who download the Linux distribution, the company faced criticism for not making it sufficiently clear exactly how the money collected under the “community participation”, “better coordination with Debian and upstreams” and “better support for flavours” sliders would be used. Bacon promised to deliver a plan to make the process more transparent and accountability more clear and this plan has now been delivered and has been approved by the Community Council.

          • Ubuntu 13.04 Raring Ringtail review – best Linux OS shows why Unity interface was made

            With the Unity design aesthetic allied to a speedy and robust engine, Ubuntu 13.04 Raring Ringtail may just be the one Linux OS to rule them all. Read our Ubuntu 13.04 Raring Ringtail review to find out why.

          • Canonical denies move towards open core

            Canonical, the company behind the Ubuntu GNU/Linux distribution, has reiterated its decision not to create a firm based on open core products.

          • First steps with a brand new Ubuntu virtual machine
          • Mir’s GPLv3 License Is Now Raising Concerns

            Taking a break from blogging about UEFI and Secure Boot, Linux kernel developer Matthew Garrett is now writing about how Canonical’s choice of license for their Mir Display Server is a bit scary. It’s not the GPLv3 license alone that’s raising eyebrows, but the GPLv3 combined with the Ubuntu Contributor’s License Agreement that is unfortunate in the mobile space.

            Basically, Matthew explains how Canonical is trying to push Ubuntu (in the form of Ubuntu Phone/Touch) into markets generally hostile towards the GPLv3 licensem since the license requires users be able to replace the GPLv3 code. Android and other open-source mobile platforms tend to be under a more liberal license that keeps open-source enthusiasts happy along with mobile phone vendors.

  • Devices/Embedded

    • Tiny ARM CPU module targets embedded Linux apps

      DAVE announced an SODIMM-style computer-on-module based on a Texas Instruments Sitara AM335x ARM Cortex-A8 system-on-chip, complete with dual CAN interfaces, Linux support, and two evaluation baseboard options. The Diva computer module is also available from U.S.-based Smart Embedded Systems, with turnkey support including Linux drivers and firmware for the processor’s programmable real-time unit (PRU).

    • Phones

      • Android

        • Android smartwatch is loaded with wireless

          A Chinese startup called “Geak” (seriousy!) has developed an Android 4.1 smartwatch with built in WiFi, Bluetooth 4.0, NFC, and GPS wireless communications. The China-targeted Geak Watch runs on a 1GHz MIPS architecture SoC equipped with 512MB RAM and 4GB flash, and features a 1.55-inch 240 x 240-pixel touchscreen and IPX3 water resistance.

        • Boxfish Hatches a Hot Idea for Searchable TV

Free Software/Open Source

  • Download Hosts Withdrawing

    With news this week that GitHub is banning storage of any file over 100Mb and discouraging files larger than 50Mb, their retreat from offering download services is complete. It’s not a surprising trend; dealing with downloads is unrewarding and costly. Not only is there a big risk of bad actors using download services to conceal malware downloads for their badware activities, but additionally anyone offering downloads is duty-bound to police them at the behest of the music and movie industries or be treated as a target of their paranoid attacks. Policing for both of these — for malware and for DMCA violations — is a costly exercise.

  • What it Takes to be an Open Source Expert

    OSFY speaks to industry leaders to bring you their thoughts on this hot topic…

  • Is that really the source code for this software?

    I’ve been looking into how easy it is to confirm that a binary package corresponds to a source package. It turns out that it is not easy at all. So I’ve written down my findings in this blog entry.
    I think that the topic of reproducible builds is one that is of fundamental importance to the free software and larger community; the trustworthiness of binaries based on source code is a topic quite neglected. We know about tivoization and the reality that code can be open yet unchangeable. What is not appreciated in sufficient measure is that parties can, quite unchecked, distribute binaries that do not correspond to the alleged source code.

  • State of OpenIndiana

    When Oracle announced it was discontinuing the development of OpenSolaris, there was shock among the free Unix community. OpenSolaris was popular and had a very loyal user-base and good support from developers, internal and community. A fork of OpenSolaris was quickly announced. A fork of the kernel would become what is known as Illumos. And the operating system would become OpenIndiana, which would use the Illumos kernel.

  • GlobalSign Pushes SSL for Open Source
  • Open-Source Off-Road Simulator Called Rigs of Rods Shows the Power of Free Software

    Scroll down and watch the selection of videos…

  • Cyber experts suggest using open source software to protect privacy

    One enterprising netizen has compiled a list of services, from social networks to email clients, and even web browsers, that offer better protection from surveillance. They are listed on a web page called prism-break.org.

    When asked about steps that a digital native can take to protect his privacy and online data, Sunil Abraham, executive director of Bangalore-based non-profit Center for Internet and Society said, “Stop using proprietary software, shift to free/open source software for your operating system and applications on your computer and phone. Android is not sufficiently free; shift to CyanogenMod. Encrypt all sensitive Internet traffic and email using software like TOR and GNU Privacy Guard. Use community based infrastructure such as Open Street Maps and Wikipedia. Opt for alternatives to mainstream services. For example, replace Google Search with DuckDuckGo.”

  • This week in open source news: 3D-printed hands, smart light bulbs, and more
  • 13 Things People Hate about Your Open Source Docs

    Most open source developers like to think about the quality of the software they build, but the quality of the documentation is often forgotten. Nobody talks about how great a project’s docs are, and yet documentation has a direct impact on your project’s success. Without good documentation, people either do not use your project, or they do not enjoy using it. Happy users are the ones who spread the news about your project – which they do only after they understand how it works, which they learn from the software’s documentation.

  • Small Brick Open Source PLC

    The OSPLC SMALL BRICK is an open-source PLC (programmable logic controller) that can be programmed using open source C language programming tools.

    The PLC is a general-purpose controller with a wide variety of applications. It is useful to the engineer, technician, student and hobbyist.

    All the source files for the small brick OSPLC are provided, including schematic diagrams so that you can build this project yourself or modify it.

  • Web Browsers

    • Mozilla

      • Firefox Web browser to move ahead plan to block tracking

        The maker of the popular Firefox browser is moving ahead with plans to block the most common forms of Internet tracking, allowing hundreds of millions of users to eventually limit who watches their movements across the Web, company officials said Wednesday.

        Firefox’s developers made the decision despite intense resistance from advertising groups, which have argued that tracking is essential to delivering well-targeted, lucrative ads that pay for many popular Internet services.

      • Mozilla again postpones Firefox third-party cookie-blocking, this time for months

        Decision to use blocking blacklists and whitelists means another delay in adding auto-blocking to browser

      • Mozilla Joins Forces with Stanford Group on Privacy Scheme

        If you’re like nearly everybody else, you get annoyed by how advertising cookies in your browser seem to know what your interests are and serve up creepy ads that hit a little too close to home. With that problem in mind, Mozilla has been steadily working toward standardizing Do Not Track features in the Firefix browser. The idea is not welcome to everyone, though. The Internet Advertising Bureau (IAB) has accused Mozilla of “undermining American small business” with the move.

  • SaaS/Big Data

    • Netflix open sources its Hadoop manager for AWS

      Netflix runs a lot of Hadoop jobs on the Amazon Web Services cloud computing platform, and on Friday the video-streaming leader open sourced its software to make running those jobs as easy as possible. Called Genie, it’s a RESTful API that makes it easy for developers to launch new MapReduce, Hive and Pig jobs and to monitor longer-running jobs on transient cloud resources.

    • What is OpenStack and what is its role in open source cloud computing?

      In an effort to commoditize the world of open source cloud computing, Red Hat is throwing their weight behind OpenStack in the same way they threw their weight behind Linux over a dozen years ago.

    • City of Chicago Joins Open Cloud Consortium

      Who says you have to be a vendor or a channel partner to get involved in industry associations driving the adoption of cloud computing? If there’s an unwritten rule somewhere, nobody bothered to tell the City of Chicago, which announced this week it had joined the Open Cloud Consortium (OCC).

      The OCC is a not-for-profit organization that manages and operates cloud computing infrastructure to support Big Data for scientific, medical, healthcare and environmental research. That’s quite the huge mandate, and the organization’s membership is made up of a variety of corporations (most in the technology sector in some way), universities, U.S. national laboratories and federal agencies, as well as international partners.

    • Fidelity Likes OpenStack, Despite High-Profile Departures

      In a major missive from Dell Computer recently, the company announced that its public cloud ecosystem and strategy will be centered on partners Joyent, ScaleMatrix and ZeroLag, and will emphasize recent acquisition Enstratius. That represented a very major reversal of its plans to deliver public cloud services based on the open source OpenStack cloud platform. Right on the heels of that news, IBM–which has been firmly in the OpenStack camp–announced that it is spending billions to buy SoftLayer for its cloud computing infrastructure tools and services.These were high level departures from the OpenStack camp, although IBM is still pursuing OpenStack cloud plans by pass-through, since SoftLayer delivers OpenStack services.

  • Databases

    • Comic Relief uses open cloud big data on MongoDB

      Comic Relief has confirmed its use of 10gen’s open source non-relational NoSQL database, MongoDB, to create a computing for this year’s event which raised £75 million.

      The charity enlisted cloud services firm Armakuni to build the platform so that it could handle 10,000 concurrent call centre operators and a peak of 500 donations per second.

  • Oracle/Java/LibreOffice

  • CMS

  • Business

  • BSD

  • FSF/FSFE/GNU/SFLC

    • Free Software alternatives to help you outwit PRISM

      Just because your activities are being monitored by the powers that be does not mean that you should throw up your arms in the air and give up. Yes, complete privacy is almost impossible to achieve in the age of bits and bytes, but there are things you can do to minimize how much of your privacy you give up.

      Mostly, it comes down to the tools you employ to navigate this interconnected universe of ours. The most popular tools are owned by major technology companies, the same outfits that give government agencies free, warrantless access to your data.

    • GNU Parallel 20130622 (‘Snowden’) released

      GNU Parallel 20130622 (‘Snowden’) has been released. It is available for download at: http://ftp.gnu.org/gnu/parallel/

  • Openness/Sharing

    • Open-Source Solution for Temperature Monitoring

      Here’s a nice example of the DIY spirit at work. A former Portland, OR, restaurant owner was looking for a way to better monitor food storage temperatures (which had to be regularly checked and written in a notebook). There didn’t seem to be a good automated system available, so he built his own, using open-source hardware to develop a unit that can monitor temperature, humidity and barometric pressure of a given location, then transmit the data via the Internet and a Wi-Fi network.

    • Open Hardware

      • Open Source Robots Are on the Move This Month

        Open source robots are back in the news. In late May, we reported on the Arduino Robot (shown) — which puts much of the intelligence in the open hardware Arduino kit on wheels and includes an interface for creating custom robots. The Arduino Robot’s Motor Board controls motors, and the Control Board reads sensors and helps to operate. Each of the boards is a full Arduino board using the Arduino IDE. Now, there are robots arriving based on the open platform that you can control with swipes from your smartphone.

  • Programming

    • System Manageability

      The greatest need for improving the manageability of Linux systems is to provide a standard programming interface – an API – for system management functions.

      The API should be a low-level interface that provides the needed control over managed systems. It should also support a higher level abstraction, making it easy for system administrators to use it for routine tasks.

    • Open Source PHP 5.5 Released with Opscode Caching

      One of the biggest open source PHP releases in years is now out and you can count me among those that are excited and eager to deploy and use it.

    • Open Source Foundations in a Post-GitHub World
  • Standards/Consortia

    • Xiph unveils “next-next-generation” video codec

      The Xiph.Org Foundation has taken the wraps off Daala, a “next-next-generation” video codec that has been under development for some time; this was until recently overshadowed by development work on the Opus audio codec at Xiph. However, the developers at the foundation think that the right time has come to open up development of the codec to a wider audience, even though they still classify the software as “pre-pre-alpha”. According to Xiph, a prototype of the codec successfully encoded and decoded a video stream over the internet at the end of May.

Leftovers

  • English is no longer the language of the web
  • Colombia to Seal Agreement with NATO in Brussels

    Defense Minister Juan Carlos Pinzón will travel Sunday to Belgium where he is scheduled to sign Tuesday its first cooperation agreement with the North Atlantic Treaty Organization.

    According to El Tiempo newspaper, the two-page document will be signed by Pinzon and NATO Secretary General Anders Fogh Rasmussen, and will be broadened with a second chapter in the next two months.

  • No Traction For Windows On Arm
  • Windows RT facing pressure from being isolated

    Microsoft’s Windows RT operating system may fall to the same fate as Hewlett-Packard’s (HP) webOS as most brand vendors have already stopped developing related products, leaving Microsoft’s second-generation Surface RT, the only Windows RT-based device in the next-generation tablet competition, according to sources from the upstream supply chain.

  • Science

    • 3-D printed trachea splint saves baby’s life

      A Michigan baby’s life was saved by the insertion of a 3-D printed trachea at two months old.

    • How 3D printing will rebuild reality

      When Star Trek debuted in the mid-60s, everybody geeked out about the food synthesizers. Even my mom, a reluctant but compulsory Trek viewer, recognized the utility of this amazing gadget, particularly with two ravenous boys around the house. My brother and I knew, of course, that the real magic food box was the refrigerator.

    • Bacterial DNA in Human Genomes

      A team of scientists from the University of Maryland School of Medicine has found the strongest evidence yet that bacteria occasionally transfer their genes into human genomes, finding bacterial DNA sequences in about a third of healthy human genomes and in a far greater percentage of cancer cells. The results, published today (20 June) in PLOS Computational Biology, suggest that gene transfer from bacteria to humans is not only possible, but also somehow linked to over-proliferation: either cancer cells are prone to these intrusions or the incoming bacterial genes help to kick-start the transformation from healthy cells into cancerous ones.

  • Health/Nutrition

    • The Frankenfood Conspiracy: Secret summit where slick lobbyists for bio-tech giants seduced Tory Ministers into changing their tune on GM food

      Even by the standards of an industry that claims to be able to end hunger, prevent environmental catastrophe and bring prosperity to the developing world, it must have felt like a breathtakingly audacious move.

      Last summer, the world’s biggest biotech corporations decided the time was right to convince the Government to allow so-called Frankenstein food to be grown in its fields.

    • Breastfeeding figures fall as NHS budget is cut

      The number of new mothers attempting to breastfeed has fallen in England for the first time in almost a decade.

      New figures suggest that 5,700 fewer women initiated breastfeeding with their child in 2012-13 than the year before. It is the first recorded fall since the Department of Health began collecting and releasing the statistics in 2004.

    • U.S. Approves a Label for Meat From Animals Fed a Diet Free of Gene-Modified Products

      The Agriculture Department has approved a label for meat and liquid egg products that includes a claim about the absence of genetically engineered products.

      It is the first time that the department, which regulates meat and poultry processing, has approved a non-G.M.O. label claim, which attests that meat certified by the Non-GMO Project came from animals that never ate feed containing genetically engineered ingredients like corn, soy and alfalfa.

    • The upcoming EU-US and EU-Canada trade deals have serious implications for the NHS

      After the government pushed through its widely opposed privatisation regulations it is time now to focus on the big trade deals and look to the G8 meeting in June. There is a reason the public are being told nothing about them – because they won’t like what they hear.

  • Defence/Police/Secrecy/Aggression

    • LA Times Reports Hastings Was Going Into Hiding Before His Death
    • Authorities, Media Dismiss Michael Hastings Assassination Claims

      Authorities and media outlets have predictably moved to dismiss claims that Rolling Stone journalist Michael Hastings – who complained of being under investigation by the FBI before his death in a fiery car crash on Tuesday – was murdered as a result of foul play, despite the vehicle’s engine being found 100 feet away from the scene of the blaze.

      [...]

      Following his role in bringing down Gen. Stanley A. McChrystal, Hastings was told by a McChrystal staffer, “We’ll hunt you down and kill you if we don’t like what you write.” The Rolling Stone journalist also “had the Central Intelligence Agency in his sights” and was set to release an article exposing the agency, according to L.A. Weekly.

      Despite the fact that investigating whether or not a journalist who had made a number of enemies at the very top of the power structure could have been the target of an assassination is a perfectly legitimate question, news outlets have characterized such inquiry as being insensitive and crass.

    • The U.S. Policy Coup Explained by 4-Star General Wesley Clark

      General Wesley Clark, on the talk circuit in 2007, explained how the U.S. military planned to destroy the governments of seven countries in five years and enumerates them in this YouTube video.

    • Native Americans prepare to defend homelands, walk across America

      Native Americans focused on defending their homelands and upholding the Rights of Nature during June, as they prepared for non-violent resistance to the threats of the tarsands pipeline, uranium mining and coal-fired power plants.

    • Ruins of Maya City Discovered in Remote Jungle
    • From Afghanistan, Thank You Bradley Manning!

      Recognition that 95 million human beings were killed in World War I and II has helped the people of the world understand that the method of war is not cost-effective. An awakened world hoped the United Nations could, as determined in the UN Charter, eventually ‘save succeeding generations from the scourge of war’.

      The scourge of war in Afghanistan continues, with the United Nations reporting that more than 3,000 Afghan civilians have been killed and wounded in the first five months of this year, a fifth of whom were Afghan children. So, ordinary people should seize opportunities to tell the truth about war.

  • Cablegate

  • Environment/Energy/Wildlife

    • Worst Hanford tank may be leaking into soil

      The first ever double-shell tank to have leaked at Hanford may be in far worse condition than anyone imagined. Hanford workers conducting routine maintenance on the tank, known as AY-102, Thursday were shocked to find readings of radioactivity from material outside the tank. Until now leaked nuclear sludge had only been detected in what’s known as the tank’s annulus — the hollow safety space between the tank’s two walls.

    • Goodbye, Miami

      By century’s end, rising sea levels will turn the nation’s urban fantasyland into an American Atlantis. But long before the city is completely underwater, chaos will begin

  • Finance

    • The Last Mystery of the Financial Crisis

      It’s long been suspected that ratings agencies like Moody’s and Standard & Poor’s helped trigger the meltdown. A new trove of embarrassing documents shows how they did it

    • Bank of Spain calls for elimination of the minimum wage

      The Bank of Spain has called for the elimination of the minimum wage, more flexibility in the labour market and other attacks on the working class.

      Its annual report states, “The seriousness of the labour market advises maintaining and intensifying reform momentum through the adoption of additional measures to promote job creation in the short term and facilitate wage flexibility.”

  • PR/AstroTurf/Lobbying

    • The BBC Business Unit and the public interest

      The BBC’s reporting of issues from NHS reform, welfare reform and the looming EU US trade deal can be better understood by looking at the BBC’s Business Unit. A narrow and questionable ‘business perspective’ drives more coverage than viewers may think.

  • Privacy

    • When in doubt, NSA searches information on Americans

      According to newly revealed secret documents, the NSA retains wide discretion over targeting individuals for surveillance – including, potentially, Americans. Civil libertarians say ‘it confirms our worst fears.’

    • Arrest of N.S.A. Leaker Seen as Easier Than Transfer to U.S.

      The request from the United States that Hong Kong detain Edward J. Snowden, who has been accused of stealing government secrets, before it seeks his return to America is likely to set off a tangled and protracted fight, with Mr. Snowden and his legal advisers having multiple tools to delay or thwart his being surrendered to American officials.

    • The other hacking scandal: Suppressed report reveals that law firms, telecoms giants and insurance companies routinely hire criminals to steal rivals’ information

      Some of Britain’s most respected industries routinely employ criminals to hack, blag and steal personal information on business rivals and members of the public, according to a secret report leaked to The Independent.

      The Serious Organised Crime Agency (Soca) knew six years ago that law firms, telecoms giants and insurance were hiring private investigators to break the law and further their commercial interests, the report reveals, yet the agency did next to nothing to disrupt the unlawful trade.

      [...]

      Victims of computer hacking identified by Soca – who suffered eBlaster Trojan attacks which allowed private investigators to monitor their computer usage remotely – include the former British Army intelligence officer Ian Hurst. He was hacked by private investigators working for News of the World journalists who wanted to locate Freddie Scappaticci, a member of the IRA who worked as a double-agent codenamed “Stakeknife”.

    • Sheeple Waking Up To NSA Spying: Privacy Search Engines Booming

      StartPage and Ixquick, two strongly privacy oriented search engines owned by the same company, announced recently that they surpassed three million daily searches for the first time.

      According to information Startpage provided to Infowars, traffic to the Search Engine has grown from 2.8 million daily searches to now approaching 4 million.

    • Does NSA Surveillance Remind You of Anything?
    • GCHQ monitoring described as a ‘catastrophe’ by German politicians

      Britain’s European partners have described reports of Britain’s surveillance of international electronic communications as a catastrophe and will seek urgent clarification from London.

      Sabine Leutheusser-Schnarrenberger, the German justice minister said the report in the Guardian read like the plot of a film.

      “If these accusations are correct, this would be a catastrophe,” Leutheusser-Schnarrenberger said in a statement to Reuters. “The accusations against Great Britain sound like a Hollywood nightmare. The European institutions should seek straight away to clarify the situation.”

      Britain’s Tempora project enables it to intercept and store immense volumes of British and international communications for 30 days.

    • If you think GCHQ spying revelations don’t matter, it’s time to think again

      So is it a Milly Dowler moment? Will the revelation that GCHQ taps every internet communication that enters or leaves the UK mark the moment when ordinary citizens stop and say: “Oh, now I get it.” A moment when people realise that the stuff that nerds and activists had been droning on about might actually affect them?

      My hunch is that it isn’t such a moment. Most people will just shrug their shoulders and get on with life. They will accept the assurances of those in authority and move on. If they do, then they will have missed something important. It is that our democracies have indeed reached a pivotal point. Ever since it first became clear that the internet was going to become the nervous system of the planet, the 64 billion dollar question was whether it would be “captured” by giant corporations or by governments. Now we know the answer: it’s “both”.

    • MI5 feared GCHQ went ‘too far’ over phone and internet monitoring

      Senior figures inside British intelligence have been alarmed by GCHQ’s secret decision to tap into transatlantic cables in order to engage in the bulk interception of phone calls and internet traffic.

      According to one source who has been directly involved in GCHQ operations, concerns were expressed when the project was being discussed internally in 2008: “We felt we were starting to overstep the mark with some of it. People from MI5 were complaining that they were going too far from a civil liberties perspective … We all had reservations about it, because we all thought: ‘If this was used against us, we wouldn’t stand a chance’.”

    • Nancy Pelosi Booed, Heckled Over Edward Snowden, NSA Comments At Netroots Nation 2013
    • Pelosi Faces Questions, Criticism about NSA Surveillance at Netroots Nation

      At the Netroots Nation conference this weekend, Representative Nancy Pelosi (D-CA) was questioned publicly about her stance on NSA spying. While she was quick to defend the program as markedly different from the warrantless wiretapping program established under President Bush, she also noted that more needed to be done to improve transparency around the program.

      Pelosi’s comments were met with skepticism and disapproval from at least some members of the audience. Marc Perkel, a small business owner and technology activist, interrupted Pelosi when she was talking about finding a balance between security and civil liberties. According to Politico, Marc Perkel yelled, “It’s not a balance. It’s not constitutional!…No secret laws!”

    • EXCLUSIVE: US spies on Chinese mobile phone companies, steals SMS data: Edward Snowden
    • GCHQ intercepted foreign politicians’ communications at G20 summits
    • Skynet rising: Google acquires 512-qubit quantum computer; NSA surveillance to be turned over to AI machines
    • EXCLUSIVE: US hacked Pacnet, Asia Pacific fibre-optic network operator, in 2009
    • Facebook Bug Exposed 6 Million Users
    • Facebook Says Technical Flaw Exposed 6 Million Users

      Facebook has inadvertently exposed six million users’ phone numbers and e-mail addresses to unauthorized viewers over the last year, the company said late Friday.

    • Snowden spy row grows as US is accused of hacking China

      Edward Snowden, the former CIA technician who blew the whistle on global surveillance operations, has opened a new front against the US authorities, claiming they hacked into Chinese mobile phone companies to access millions of private text messages.

      His latest claims came as US officials, who have filed criminal charges against him, warned Hong Kong to comply with an extradition request or risk complicating diplomatic relations after some of the territory’s politicians called for Snowden to be protected.

      The latest developments will raise fears that the US’s action may have pushed Snowden into the hands of the Chinese, triggering what could be a tense and prolonged diplomatic and legal wrangle between the world’s two leading superpowers.

    • U.S. seeks Snowden’s extradition, urges Hong Kong to act quickly

      The United States said on Saturday it wants Hong Kong to extradite Edward Snowden and urged it to act quickly, paving the way for what could be a lengthy legal battle to prosecute the former National Security Agency contractor on espionage charges.

    • For Spiegel, Tempora is front page news. Apart from The Guardian the British press stays silent.

      Clearly a crashing ferry that injured no-one, and some high society wedding are more important than a programme which, if proven, would be equivalent to PRISM and conducted by the UK.

      A D-Notice has been issued to the press (see Guido Fawkes here) to not report on the leaks in this case, but when one newspaper is still leaking, surely a point has to come that others should report and debate it too?

    • GCHQ and security services ‘need parliamentary oversight’

      Labour’s Douglas Alexander says widespread surveillance allegations need to be addressed by intelligence agencies

    • House Committee Conducts Lovefest With NSA Chief

      The Kansas City man is Khalid Ouazzani, who, as part of a plea bargain in 2010, admitted that he sent money to Al Qaeda. He was never charged with planning any attacks inside the United States, and the NYSE bombing was described as “nascent plotting,” so it’s hard to know just how serious this was. Still, at least Ouazzani actually did something. The San Diego man merely planned to send money.

    • Web’s Reach Binds N.S.A. and Silicon Valley Leaders

      When Max Kelly, the chief security officer for Facebook, left the social media company in 2010, he did not go to Google, Twitter or a similar Silicon Valley concern. Instead the man who was responsible for protecting the personal information of Facebook’s more than one billion users from outside attacks went to work for another giant institution that manages and analyzes large pools of data: the National Security Agency.

      [...]

      The disclosure of the spy agency’s program called Prism, which is said to collect the e-mails and other Web activity of foreigners using major Internet companies like Google, Yahoo and Facebook, has prompted the companies to deny that the agency has direct access to their computers, even as they acknowledge complying with secret N.S.A. court orders for specific data.

    • Petition To Preemptively Pardon Ed Snowden Reaches Goal Of 100k Signatures

      The Whitehouse petition to pre-emptively pardon NSA whistleblower Edward Snowden for “crimes he may have committed while blowing the whistle” has reached its goal of 100,000 signatures. This means that the U.S. Administration, by its own rules, need to take it seriously enough to craft a response to it. While that response is unlikely to be anything else than “we politely disagree and intend to impolitely hunt this man down”, it is still an important signal of dissent.

    • Communications Surveillance, Protest and Control…

      What is the real reason that certain of the authorities are so keen on universal surveillance of communications data? Is it the fight against terrorism? It doesn’t seem very likely. It’s a supremely ineffective method of dealing with terrorism at best – even the examples quoted by the security services as ‘proof’ that it works have pretty much all been swiftly debunked (see for example here). In practice, it seems, targeted, intelligence-driven, almost ‘traditional’ methods seem to do the job far better. So why do the authorities all around the globe seem to be so enthusiastic about communications surveillance? One word: control

    • Whistleblower Edward Snowden Lands In Moscow
    • Edward Snowden leaves Hong Kong for Moscow
    • Spy-leaker Snowden leaves Hong Kong
    • Edward Snowden leaves Hong Kong on Moscow flight

      US intelligence fugitive Edward Snowden has flown out of Hong Kong, from where the US was seeking his extradition on charges of espionage.

    • Bill Clinton on NSA: Americans need to be on guard for abuses of power by US
    • Liberal activists show irritation with Obama over surveillance
    • Pelosi booed for saying NSA leaker Snowden violated the law

      House Minority Leader Nancy Pelosi (D-Calif.) was booed onstage Saturday when she said former government contractor Edward Snowden broke the law by leaking classified documents on National Security Agency (NSA) surveillance programs.

      Speaking at the NetRoots Nation conference in San Jose, Calif., Pelosi told the audience to reject comparisons between President Barack Obama and his predecessor, President George W. Bush, on their oversight of surveillance programs. The top House Democrat said Obama is poised to reveal “in another few days, a few more proceedings” of the secret Foreign Intelligence Surveillance Court.

    • 5 Fun Facts From the Latest NSA Leak

      After a brief respite, the Guardian newspaper has resumed its publication of leaked NSA documents. The latest round provides a look at the secret rules the government follows for collecting data on U.S. persons.

  • Civil Rights

    • US steps up efforts to break Guantánamo hunger strike

      Shaker Aamer, last British resident held in camp, tells of harsh regime to break strikers’ resistance

    • Autonomy: an idea whose time has come
    • Million Protesters Demonstrate In 100 Brazilian Cities

      More than a million protesters have taken to the streets in Brazil as demonstrations over a range of social issues grow. Demonstrating people flooded into Rio de Janeiro and more than 100 cities. Violence and clashes erupted in many places and an 18-year-youth died when a car drove through a barricade in Sao Paulo state. This is the largest protests in the country in more than two decades.

      Government announcement to lower transport fares and promises of better public services failed to stem the tide of discontent in the country.

    • Candidate Obama Debating President Obama On Civil Liberties vs. Government Surveillance

      We recently had a video showing then Senator Joe Biden, from seven years ago, “debating” the current President Obama on government surveillance. I hadn’t seen this until now, but someone else has put together a much better video showing Presidential candidate Obama in 2008 vs. President Obama in 2013.

Kindly Remind President Obama to Shut Down (Potentially Mass-Arresting) Massive Trolls Like Intellectual Ventures and End Software Patents

Posted in Patents at 12:30 am by Dr. Roy Schestowitz

Obama’s virtual interview from the White House (over Google+/NSA Hangout)

Obama at Hangout

Summary: On opportunities of reaching President Obama or other White House staff one should calibrate the debate over patents to benefit the public, not large corporations (which want small/conventional trolls marginalised and nothing else changed)

The White House said it would look into patent trolls [1, 2, 3, 4], tackling one strand of the issues incurred by software patents. The investigation is commencing now:

Patent trolls have hit Main Street this year and anger about their demands has bubbled up to Washington.

Today, the Federal Trade Commission (FTC) is expected to announce that it will open an investigation into “patent trolls,” a derogatory term for companies that engage in no business activities aside from suing over patents. The investigation will be announced at a conference by FTC chairwoman Edith Ramirez, according to a report this morning in The New York Times. The investigation into trolls, which the FTC calls “patent assertion entities” or PAEs, will complement other anti-troll government actions this year, like President Obama’s report on patent issues and the five anti-patent-troll bills introduced so far in Congress this year.

This was also covered in British sites:

THE UNITED STATES Federal Trade Commission (FTC) will look into ridiculous but disruptive software patents and the shadowy entities that hold them.

The FTC was asked to look at patent trolls by several members of Congress. A letter signed by 19 Congress members and addressed to FTC chair Edith Ramirez said that patent trolls are useless, get in the way, slow down innovation and extract money from more deserving firms.

“As Members of Congress, we are closely following the troubling practices carried out by patent assertion entities, commonly known as patent trolls throughout the country. We are most concerned about practices that target end users who are the downstream users of technology,” the letter read.

What is needed is a reform nullifying software patents, but for the time being we need to highlight for the White House the biggest scams in existence. This should be handled as a criminal thing, using existing laws like RICO Act, it’s not merely about changing policy to marginalise classic patent trolls. They should consider Microsoft’s “natahanm” (Nathan Myhrvold), Bill Gates’ close friend, whom he financially helped to get the pyramid scheme called Intellectual Ventures started. This pyramid scheme and racketeering operation is now suing Android/Linux, with CNET correctly pointing out that it is not the first time. Josh Lowensohn says: “The controversial Bellevue, Wash.-based company that’s made headlines for accumulating a massive trove of software and design patents, sued Motorola Mobility in the U.S. District Court for the Southern District of Florida on Wednesday.”

“So it’s what we call exponential, we are at about 40,000 software patents being granted each year which is a lot considering that just about 10 years ago, it was about 10,000 patents and even in 1990, it was just 5,000 software patents a year…”
      –Deborah Nicholson
Software and design patents. That’s right. See the pattern yet? Therein lie many of the real issues. It’s about scope, too.

Meanwhile, since we’re on the subject of scope, the numbers we saw before were echoed in this new OIN interview. Deborah Nicholson says: “So it’s what we call exponential, we are at about 40,000 software patents being granted each year which is a lot considering that just about 10 years ago, it was about 10,000 patents and even in 1990, it was just 5,000 software patents a year, so it’s a very scary kind off-the-chart number.”

The OIN is not doing what’s right; it continuously says it wants to improve patent “quality” or stop “bad” software patents. Some of the OIN’s biggest backers, notably IBM, are proponents of software patents.

The latest atrocious ruling by CAFC did nothing to remove software patents; quite the contrary. And the EFF called for this ruling to be escalated to SCOTUS. The EFF has been very strange when it comes to this subject; it’s as though it’s fractured and divided within. Some members of the EFF advocate the OIN approach, whereas some want to get rid of software patents as a whole. Julie Samuels, whom we wrote about before [1, 2, 3, 4, 5, 6], has been on the side of fighting “bad” patents, not software patents, and she also targets patent trolls rather than patent scope. Gérald Sédrati-Dinet (April) wrote this message to her the other day:

…why the hell do you and EFF want to improve patent quality? we – software users and devs – just don’t need patents!

Going back to Intellectual Ventures, some suggest targeting the “bad” players (e.g. trolls) or “bad” patents, not the core issue (patents). The thing about Intellectual Ventures is, what it does qualifies as a crime; it’s racketeering. It’s not “bad”, it’s criminal. Notice the comment in this article which says:

So the FTC says it plans on cracking down on patent trolls, and IV responds by attempting to shake down several companies using patents that are blatantly bogus and should never have been granted in the first place, all originally held by other companies…

Either they aren’t following the news, or they are damn sure that the FTC would never actually come after them, because I just cannot imagine how else they could have done something so blatantly designed to draw the attention of the FTC as a perfect first case when going after patent trolling operations.

Like Acacia, there are many proxies that require immense investigation endeavours. The proxies can help impede prosecution of Intellectual Ventures.

As Troll Tracker put it the other day:

Intellectual Ventures? You really should make it a little harder to pick on you.

It has become too easy to know that this ‘firm’ is hardly different from the Mafia, but lousy pseudo-news sites like ZDNet won't tell you that. Sometimes, rogue interests in the media (e.g. Gates Foundation funding) spoil the broth and manufacture consent for despicable operations of profiteering.

06.22.13

In the Age of Software Patents Nullification, CAFC Strikes Again, Promoting Those Patents

Posted in Law, Patents at 11:28 am by Dr. Roy Schestowitz

Strike three. Time to strike against the ‘legal’ system?

London strike
London strike

Summary: Silly judgment from the source of many of today’s software patents is harming what looked like progress

In the land of software patents the lawyers seem concerned that patents on software are being invalidated and one firm (patent lawyers in the US) says “The PTAB decision [invalidating software patents] was issued nine months after the PGR petition was filed and was, therefore, relatively expedient, especially compared to the district court litigation that preceded it. Versata had sued SAP in federal district court in 2007, Versata prevailed at trial, and SAP appealed to the United States Court of Appeals for the Federal Circuit in 2011. The Federal Circuit upheld the jury’s infringement verdict—and its more than $300 million damages award—with respect to the same patent just last month. Versata Software, Inc. v. SAP America, Inc., Nos. 2012-1029, -1049, slip op. at 2 (Fed. Cir. May 1, 2013).”

They try to belittle the importance of this decision. They are also missing the point that in much of the world this decision would not required the court to even get involved. Meanwhile, reveals the EFF, CAFC is up to no good again, validating software patents:

The tortured history of Ultramercial v. Hulu continues, with a new ruling from the Federal Circuit upholding one of our favorite, most absurd patents: one that claims a process for doing no more than viewing ads online before accessing copyrighted content. How could that be patentable, you might ask. To which we might answer, good question.

[...]

First, in Mayo v. Prometheus, the Supreme Court invalidated a patent covering a medical diagnostic test. There, the Court held that a method cannot be patented where it adds “nothing specific to the laws of nature other than what is well-understood, routine, conventional activity, previously engaged in by those in the field.” More recently, in AMP v. Myriad, the Supreme Court stuck with this theme, holding that Myriad could not patent genes that occur in nature and stating that “Myriad did not create anything. To be sure, it found an important and useful gene, but separating that gene from its surrounding genetic material is not an act of invention.”

This CAFC decision is very serious an event and one pundit said about it that:

Opponents of software patents suffered a setback as the Federal Circuit today said a patent for displaying content before a video should not be considered an abstract idea.

Read about CAFC in our previous posts. We really need to set up a Wiki index about CAFC pretty soon.

Microsoft Was Lying About Skype, It’s More or Less an NSA Honeypot

Posted in Microsoft at 11:19 am by Dr. Roy Schestowitz

National Skype Agency

National Security Agency

Summary: Microsoft is very much in bed with the NSA (and by extension DHS and CIA) and there is more evidence to show this now

Skype is a good pal of the NSA and they have been almost twins ever since Microsoft bought it, under mysterious financial circumstances that we covered at the time of the acquisition. We wrote about it a long time ago, naming the NSA agenda too (almost exactly one year ago).

Skype is a spy. Deal with it. I don’t use Skype myself, but the network effect makes it hard for many to quit the addiction. The network effect is what makes it so powerful a spying apparatus.

According to this report from The Guardian:

Skype, the web-based communications company, reportedly set up a secret programme to make it easier for US surveillance agencies to access customers’ information.

The programme, called Project Chess and first revealed by the New York Times on Thursday, was said to have been established before Skype was bought by Microsoft in 2011. Microsoft’s links with US security are under intense scrutiny following the Guardian’s revelation of Prism, a surveillance program run by the National Security Agency (NSA), that claimed “direct” access to its servers and those of rivals including Apple, Facebook and Google.

Project Chess was set up to explore the legal and technical issues involved in making Skype’s communications more readily available to law enforcement and security officials, according to the Times. Only a handful of executives were aware of the plan. The company did not immediately return a call for comment.

Last year Skype denied reports that it had changed its software following the Microsoft acquisition in order to allow law enforcement easier access to communications. “Nothing could be more contrary to the Skype philosophy,” Mark Gillett, vice president of Microsoft’s Skype division, said in a blog post.

According to the Prism documents, Skype had been co-operating with the NSA’s scheme since February 2011, eight months before the software giant took it over. The document gives little detail on the technical nature of that cooperation. Microsoft declined to comment.

Interesting. Now we have more facts verified. We should call out Skype like we call out Windows. It has a back door, at the server side and probably several at the client side too. Bruce Schneier, a security guru, says:

Reread that Skype denial from last July, knowing that at the time the company knew that they were giving the NSA access to customer communications. Notice how it is precisely worded to be technically accurate, yet leave the reader with the wrong conclusion. This is where we are with all the tech companies right now; we can’t trust their denials, just as we can’t trust the NSA — or the FBI — when it denies programs, capabilities, or practices.

He is being too polite. He should just say that Microsoft deceived and lied. A lot of companies choose their words very carefully these days.

Speaking of spying with microphone and camera at the edge points, Xbox spying is getting even worse and there is a Web site dedicated to the subject. It says: “Tell Microsoft: I won’t buy an XBOX ONE because I don’t want the NSA in my living room.” Check out their posts, preceded by:

Always on and listening. Infrared camera. Facial and voice recognition. Heart monitor. In your living room.

Is Microsoft’s XBOX ONE the future of the NSA’s PRISM program?

Microsoft was first to join PRISM (see the slides leaked by Snowden/Greenwald), essentially colluding with the NSA, so we should assume that the NSA can effortlessly access all this data. We know that the special relationship Microsoft has with the NSA enables even espionage in non-US counties and Stuxnet is a good example of the outcome.

John Dvorak Complains About Microsoft AstroTurfing Intended to Shape Vista 8 Perceptions

Posted in Marketing, Microsoft, Vista 8 at 11:05 am by Dr. Roy Schestowitz

Rigging debates

Children

Summary: Comment AstroTurf alleged by an industry veteran who has observed and studied this phenomenon for decades

A long time ago, about half a decade into the past, Mr. Dvorak wrote about so-called “Munchkins” and we cited/quoted him on it. He saw these tactics going back to the days of OS/2 and "Barkto". Now that Reddit-planted Xbox AstroTurfing comes to light we should point out a Dvorak article from the end of 2012, around the time of the release of Vista 8 John Dvorak suspected Microsoft was “planting” comments in support of Vista 8:

While following the recent hirings and firings at Microsoft, the presence of Microsoft Munchkins is more obvious than ever to me. I cannot prove their existence, however, unless someone finally steps forward and admits everything. If you are one, please do so!

Munchkins are commenters who I believe work directly for Microsoft or for its public relations agency. They scour the comment boards and rebuke with high authority all criticisms of specific Microsoft products. The reality of these people was well-documented during the Windows versus OS/2 days and I can only suspect that the practice continues to this day.

Once in a while, one of these characters shows up on my blog with a long and seemingly thoughtful post about some Microsoft product. The piece manages to condemn everyone who is critical of something Microsoft did. When you go back into the admin section of the blog where you can look at all postings by that person, the IP address, and other details, you always find that this person has not been on the blog before, and has never posted any prior comments. I can assure that anyone who is long-winded in the comment section posts a lot of comments.

Microsoft and crime are almost synonymous, so it would not be shocking if many or most pro-Vista 8 comments were indirectly funded by the company of crimes as ‘norm’.

Thanks to the reader who showed us the article above; somehow we missed it (we are no longer watching Microsoft closely).

Links 22/6/2013: Linux Caixa Mágica 20, Syria Proxy War Brewing

Posted in News Roundup at 8:24 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • 23 Pictures That Prove Society Is Doomed
  • Health/Nutrition

    • Follow the money: Monsanto and the World Food Prize

      Although genetic engineering has been widely adopted in a few major crops—mainly soybeans, corn, cotton and canola—only two general types of engineered genes, for resistance to herbicides and for killing certain insects, have been widely commercially successful after 30 years of trying.

      These have provided some benefits, such as a reduction of chemical insecticide use on some of these crops, and some relatively small yield increases. Most of the yield increases for small farmers are from cotton, a low value crop, which is unlikely to pull these farmers out of poverty.

      At the same time, in the countries that have used these technologies the longest, big problems are emerging. Weeds resistant to the herbicide used on Monsanto’s crops have reached epidemic proportions in the U.S., reportedly infesting about 60 million acres and increasing rapidly. This has increased herbicide use by hundreds of millions of pounds above where it probably would have been had these crops not existed.

      And now insects resistant to Bt are emerging around the world. I was at the University of Illinois recently, where I heard a respected corn entomologist bemoaning the intention of corn farmers toreturn to the use of chemical insecticides to control rootworms that have developed resistance to Monsanto’s Bt gene for controlling that important pest.

    • Genetically engineered sugar beets destroyed in southern Oregon
    • Chipotle Is The First U.S. Fast Food Chain To Identify Products With GMO Ingredients

      Sure, you probably know the basic ingredients in your fast food lunch — chicken or beef, lettuce and tomato, whathaveyou — after all, you’re the one who ordered it. But if you, like many consumers, care whether or not those ingredients include genetically modified organisms (GMOs), the ingredient list usually is no help. Chipotle announced that it will now mark those ingredients on its website for discerning consumers.

  • Defence/Police/Secrecy/Aggression

    • What Cop T-Shirts Tell Us About Police Culture

      Earlier this week, an anonymous public defender sent Gothamist this photo of an NYPD warrant squad officer wearing a t-shirt with a pretty disturbing quote from Ernest Hemingway

    • Noam Chomsky: Obama Is ‘Running Biggest Terrorist Operation That Exists’

      June 21, 2013 “Information Clearing House – Continuing his streak of fiercely criticizing President Obama’s foreign policy and civil liberties record, pre-eminent left-wing scholar Noam Chomsky told GRITtv that this administration is “dedicated to increasing terrorism” throughout the world via its own “terrorist” drone strikes in foreign lands.

    • CIA secretly providing training for Syrian rebels
    • CIA Training Syria Rebels: Report
    • REPORT: The CIA Has Been Secretly Training Syrian Rebels For Months
    • CIA and the US military operatives train rebels in Turkey and Jordan – report

      The CIA and US special operational troops and have been secretly training Syrian rebels at bases in Jordan and Turkey since November 2012. Up to 100 from all over Syria have gone through courses in the last month alone, according to US media reports.

    • CIA secretly providing training for Syrian rebels: Report

      The CIA and US special operations forces have been training Syrian rebels for months, since long before President Barack Obama announced plans to arm the opposition, the Los Angeles Times has reported.

    • US Leaves 700 troops in Jordan as CIA Trained Militants Fighting in Syria

      US President Barack Obama said the United States left around 700 combat-ready troops in Jordan after a training exercise in the country.

    • US special forces and CIA training Syrian rebels – Report

      The CIA and US special forces have been secretly training Syrian rebels since last year at bases in Jordan and Turkey, the Los Angeles Times reported Friday.

    • Unwinding “Unwitting”

      For around fifteen years, this arrangement “worked.” Those who knew about it accepted it—sometimes queasily, more often eagerly. It made them feel important, adventurous, grown up. It meant that they weren’t just playing in a student-government sandbox. Anyway, promoting liberal-democratic ideas among Third World students, opposing Communist and Soviet influence, and helping anti-apartheid student groups in South Africa did not present problems of conscience. Moreover, while the C.I.A. money was earmarked for overseas activities, it freed up funds derived from other sources to be used for the N.S.A.’s domestic purposes, which included campaigning for academic freedom, demanding the abolition of the House Un-American Activities Committee, and supporting the civil-rights movement. (For example, the N.S.A. helped found the Student Nonviolent Coordinating Committee and provided it with crucial political and financial assistance.) For these reasons, it’s too simple, and not truly correct, to dismiss the N.S.A. as nothing but a C.I.A. front. It was better than that. But it was deeply compromised. The secrecy and deception inherent in the arrangement amounted to a kind of moral corruption.

    • Iran: Sixty Years After The 1953 CIA Coup That Toppled Democracy

      The election of a moderate new president in Iran, Hassan Rouhani, who has promised to enact reforms, including the release of political prisoners, comes almost exactly 60 years after a cataclysmic episode that continues to define geopolitical relations in the Middle East and profoundly influence the image of the United States in the region.

    • CIA head paid a visit to Moscow secretly – sources

      CIA Director John Brennan paid an unannounced visit to Moscow on Wednesday and Thursday, sources told Interfax on Friday.

      Russian Foreign Intelligence Service declined to confirm or deny that Brennan had been to Moscow, but senior Kremlin aide Yury Ushakov told reporters in mid-May that “a contact with the director of CIA is being planned.”

    • Libertarians Claim James Gandolfini Killed By CIA

      In the wake of The Sopranos star James Gandolfini’s sudden death,libertarians everywhere are saying the actor was assassinated by the Central Intelligence Agency.

    • CIA deputy director, Cuyahoga Falls native retires
  • Cablegate

    • Edward Snowden Asylum: Olafur Vignir Sigurvinsson Readies Private Plane To Iceland

      An Icelandic businessman linked to WikiLeaks said he has readied a private plane to take Edward Snowden, the former National Security Agency contractor who exposed secret U.S. surveillance programmes, to Iceland if the government grants him asylum.

      “We have made everything ready at our end now we only have to wait for confirmation from the (Icelandic) Interior Ministry,” Olafur Vignir Sigurvinsson told Reuters. He is a director of DataCell, a company which processed payments for WikiLeaks.

    • Julian Assange Emerges As Central Figure In Bradley Manning Trial

      Bradley Manning is at the defense table. Casting a long shadow over his trial, however, is the figure of someone else the government would apparently like to put on trial: Julian Assange.

      On Tuesday, government prosecutors sparred with defense lawyers for Manning, the Army private first class who has admitted to leaking a massive cache of documents to the transparency organization that Assange founded. At issue was whether the judge should accept as evidence two WikiLeaks tweets and a crowdsourced document called “The Most Wanted Leaks of 2009.”

    • In WikiLeaks Probe, Feds Used a Secret Search Warrant to Get Volunteer’s Gmail

      The Justice Department used a secret search warrant to obtain the entire contents of a Gmail account used by a former WikiLeaks volunteer in Iceland, according to court records released to the volunteer this week.

      The search warrant was issued under seal on October 14, 2011 by the Alexandria, Virginia federal judge overseeing the WikiLeaks grand jury investigation there. The warrant ordered Google to turn over “the contents of all e-mails associated with the account, including stored or preserved copies of e-mails sent to and from the account, draft e-mails, deleted e-mails [...] the source and destination addresses associated with each e-mail, the date and time at which each e-mail was sent, and the size and length of each e-mail.” The warrant also ordered Google not to disclose the search to anyone.

  • Environment/Energy/Wildlife

    • Houston to buy half its power from renewable sources

      The city of Houston has agreed to purchase half its electricity from renewable sources.

      That will make Houston the largest municipal purchaser of renewable energy in the nation, according to the city, which cited estimates from the Environmental Protection Agency.

      “Houston is already known as the energy capital of the world, but we are committed to becoming the alternative energy capital of the world as well,” Mayor Annise Parker said in a written statement Thursday.

    • Billionaire U.S. activist kicks off campaign to turn Obama against Keystone

      Billionaire anti-Keystone XL activist Tom Steyer wants to rally legions of digital-savvy Obama supporters to persuade the President that Canadian oil sands crude poses a threat to the United States.

      The wealthy Californian upped the ante Thursday in the high-stakes political showdown over Keystone XL by launching a social media campaign aimed at re-awakening the fervent hordes of mostly, young Obama supporters.

    • During Record Drought, Frackers Outcompete Farmers for Water Supplies

      The impacts of 2013′s severe drought are apparent across the nation in forests, on farms and on once snowy peaks. Meanwhile, the oil and gas industry is demanding unprecedented amounts of water for hydraulic fracturing, better known as fracking.

  • Finance

    • No admission of guilt. No denial. No justice.

      Financial adviser Chauncey Mayfield allegedly stole $3.1 million from the pension funds of Detroit police officers and firefighters so he could buy shopping centers in California, according to the Securities and Exchange Commission.

      Did he do it? Who knows? Mayfield and several of his associates settled the case last week without admitting or denying guilt. All they had to do to make the SEC go away was agree to give the money back.

    • Ex-Enron CEO Jeff Skilling to leave prison early

      U.S. District Judge Sim Lake of the Southern District of Texas announced at a hearing in Houston today that Skilling will serve 14 years. His original conviction called for him to serve 24 years in connection with the collapse of the once high-flying energy trading firm. Under the agreement with federal prosecutors, Skilling could be released as early as 2017.

    • Bless the Borrowers

      Robert Kuttner’s title refers, first, to the “medieval institution” that was the fate of improvident souls in England who could not repay their debts, including Daniel Defoe. In 1692, Defoe was committed to King’s Bench Prison in London, where he began to agitate for a change in the legal system. Forcing debtors to rot, Defoe not disinterestedly pointed out, was injurious to both parties, since “after a debtor was confined in prison both he and the creditor lost through his prolonged distress.” Society responded, eventually, with bankruptcy laws, but it is very much Kuttner’s point in “Debtors’ Prison” that we — America and Europe in the age of the financial crisis — have yet to absorb the principal lesson of Defoe’s “bitter experience.”

  • Privacy

    • The Dragnet at the Edge of Forever

      Amidst the havoc surrounding the earth-shattering revelations being made about the massive catch-all surveillance being conducted by the US government against virtually everybody with an Internet connection, a set of relatively unremarkable letters arrived in our GMail inboxes on Tuesday evening, containing a series of attachments.

      These attachments were scanned court orders, sealed and later unsealed, issued to Google by the United States District Court for the eastern district of Virginia. These orders demanded that Google hand over to the United States (yes, they were that specific), various information relating to accounts we hold with Google, including whom we communicated with, when, from where, and for how long.

      The court orders were almost certainly related to the Grand Jury investigation of the unauthorized public disclosure of information showing considerable misconduct, including a number of probable cases of war crimes, by US military forces in Iraq and Afghanistan during their wars in these countries, a list of people being held without trial or legal recourse in Guantanamo Bay, and a trove of diplomatic cables detailing the ways the US government have conducted themselves – both good and bad – over many years.

    • Mastering the internet: how GCHQ set out to spy on the world wide web

      Project Tempora – the evolution of a secret programme to capture vast amounts of web and phone data

    • GCHQ taps fibre-optic cables for secret access to world’s communications

      Exclusive: British spy agency collects and stores vast quantities of global email messages, Facebook posts, internet histories and calls, and shares them with NSA, latest documents from Edward Snowden reveal

    • NSA: If Your Data Is Encrypted, You Might Be Evil, So We’ll Keep It Until We’re Sure

      There’s been plenty of commentary concerning the latest NSA leak concerning its FISA court-approved “rules” for when it can keep data, and when it needs to delete it. As many of you pointed out in the comments to that piece — and many others are now exploring — the rules seem to clearly say that if your data is encrypted, the NSA can keep it. Specifically, the minimization procedures say that the NSA has to destroy the communication it receives once it’s determined as domestic unless they can demonstrate a few facts about it.

    • U.S. charges Snowden with espionage
    • Ex-Contractor Is Charged in Leaks on N.S.A. Surveillance

      Edward J. Snowden, the former National Security Agency contractor whose leak of agency documents has set off a national debate over the proper limits of government surveillance, has been charged with violating the Espionage Act and stealing government property for disclosing classified information to The Guardian and The Washington Post, the Justice Department said on Friday.

    • Latest NSA Leak Shows How Obama Misled Public on Surveillance of Americans

      Last week, President Obama claimed in an interview that the National Security Agency could not listen to Americans’ phone calls or read their emails. But newly revealed secret government documents—the latest in the series of high-profile leaks about classified surveillance—outline how the NSA can sweep up and store Americans’ communications.

      The documents, published by the Guardian late Thursday, are signed by Attorney General Eric Holder and stamped with the date July 29, 2009. They were submitted to the secret Foreign Intelligence Surveillance Court and outline the so-called “minimization procedures” the NSA is supposed to follow to limit any “incidental” spying it does on the communications of Americans or permanent U.S. residents. The disclosure sheds light on highly significant surveillance procedures the government has until now managed to keep beyond public scrutiny.

    • Wired/John Hodgman animated series about NSA spooks

      Wired’s kicked off a new animated webcomedy starring John Hodgman as a crusty old NSA agent and Nicole Winters as his young protege. It’s pretty promising stuff!

    • Reassured by NSA’s Internal Procedures? Don’t Be. They Still Don’t Tell the Whole Story.

      Yesterday, the Guardian released two previously-classified documents describing the internal “minimization” and “targeting” procedures used by the NSA to conduct surveillance under Section 702. These procedures are approved by the Foreign Intelligence Surveillance Court (FISC) on an annual basis and are supposed to serve as the bulwark between the NSA’s vast surveillance capabilities and the private communications of Americans. As we noted earlier today, the procedures, themselves, aren’t reassuring: far too much discretion is retained by NSA analysts, the procedures frequently resolve doubt in favor of collection, and information is obtained that could otherwise never be obtained without a warrant.

    • The NSA Can Hold Onto Americans’ Communications for Years, Leaked Docs Say
    • Evil in a Haystack
    • WikiLeaks plane ‘ready’ to bring Snowden to Iceland
    • U.K. Spy Agency Secretly Taps Over 200 Fiber-Optic Cables, Shares Data With the NSA

      The British spy agency GCHQ has secretly tapped more than 200 fiber-optic cables carrying phone and internet traffic and has been sharing data with the U.S. National Security Agency, according to a news report.

    • Facebook Accidentally Exposed Contact Info for Six Million Users

      According to a post on Facebook’s security blog, a bug in the company’s friend recommendation system exposed the contact information of some six million users to others. The bug has been present for about a year, but the company only found out about it in the last 24 hours. The affected users will be notified by email. The company says there’s no evidence the bug was exploited maliciously.

    • Ellsberg Says: Put A Stop To Indiscriminate Spying On Americans

      To Daniel Ellsberg, the well-known whistleblower and lifelong advocate for freedom who leaked the “Pentagon Papers” 40 years ago, “there has not been in American history a more important leak than Edward Snowden’s release of NSA material.”

    • Timeline of NSA Domestic Spying
    • Russ Tice, Bush-Era Whistleblower, Claims NSA Ordered Wiretap Of Barack Obama In 2004

      Russ Tice, a former intelligence analyst who in 2005 blew the whistle on what he alleged was massive unconstitutional domestic spying across multiple agencies, claimed Wednesday that the NSA had ordered wiretaps on phones connected to then-Senate candidate Barack Obama in 2004.

      Speaking on “The Boiling Frogs Show,” Tice claimed the intelligence community had ordered surveillance on a wide range of groups and individuals, including high-ranking military officials, lawmakers and diplomats.

    • Mastering the Internet and GCHQ

      Nick Pickles, director of Big Brother Watch, said: “This appears to be dangerously close to, if not exactly, the centralised database of all our internet communications, including some content, that successive Governments have ruled out and Parliament has never legislated for.

      “Britain has a clear legal process in place to govern the interception of the content of communications and blanket interception is not a part of that system. If GCHQ have been intercepting huge numbers of innocent people’s communications as part of a massive sweeping exercise then I struggle to see how that squares with a process that requires a warrant for each individual intercept. This question must be urgently be addressed in Parliament.

      “The fact GCHQ staff have been discussing how light the UK’s oversight regime is compared to the US highlights why we need a wholesale review of surveillance law, including the fact that there is absolutely no judicial process within the current system and the people making these decisions are able to hide in the shadows rather than face public scrutiny.”

    • EE Dragging its Feet on Mobile Data Transparency

      Mobile company EE has been quite open in explaining the sale of data analytics based on their customers data in partnership with Ipsos MORI. But we are concerned that they think the storm is over and can return to business as usual. We may need your support to make them listen.

      EE has already met with ORG to explain how their data services work, how they aggregate data and what general legal framework they operate. For this, we commend EE on their openness and hope that it continues.

    • Police State Canada: Communications Security Establishment Canada (CSEC) Runs Massive Domestic Spying Program

      Communications Security Establishment Canada (CSEC), the NSA’s Canadian counterpart and longstanding partner, has been scrutinizing the metadata of Canadians’ electronic communications since at least 2005.

      Moreover, the NSA routinely provides Canada’s security agencies with intelligence on Canadians and CSEC reciprocates by providing U.S. intelligence officials with information about people living in the U.S. This arrangement allows both agencies to circumvent legal bans on warrantless surveillance of their own citizenry’s communications.

      It was “common” for NSA “to pass on information about Canadians,” Wayne Easter, Canada’s Solicitor-General in 2002-3, told the Toronto Star this week. As Solicitor-General, Easter was responsible for overseeing the operations of the Canadian Security Intelligence Service (CSIS) and the Royal Canadian Mounted Police (RCMP).

    • Google told to delete Street View payload data or face UK prosecution

      Information commissioner’s office says it will launch contempt of court proceedings if data is not deleted within 35 days

    • In Depth Review: New NSA Documents Expose How Americans Can Be Spied on Without A Warrant

      The Guardian published a new batch of secret leaked FISA court and NSA documents yesterday, which detail the particulars of how government has been accessing Americans’ emails without a warrant, in violation of the Constitution. The documents lay bare fundamental problems with the ineffectual attempts to place meaningful limitations on the NSA’s massive surveillance program.

      Essentially, the new documents, dated July 2009 and approved in August 2010, detail how the NSA deals with the huge streams of information it receives during the collection program that gathers the content of email and telephone calls, allowing it to keep vast quantities of content it could never get with a warrant. They may not be the current procedures – more on that in another blog post shortly.

    • Spying on the World From Domestic Soil

      The world is still reeling from the series of revelations about NSA and FBI surveillance. Over the past two weeks the emerging details paint a picture of pervasive, crossborder spying programs of unprecedented reach and scope: the U.S. has now admitted using domestic networks to spy on Internet users both domestically and worldwide. The people now know that foreign intelligence can spy on their communications if they travel through U.S. networks or are stored in U.S. servers.

    • Edward Snowden is a true patriot

      A million people marched in London to stop Blair going to war.

    • US Surveillance: Doubts Over FBI And NSA Claims

      Terrorism analysts and specialist journalists say claims of thwarted terror plots from phone and data mining do not stand up.

    • Government-tech ties: Ex-Facebook exec moved to NSA, Amazon’s CIA deal, more

      • Where did Facebook chief security officer Max Kelly go after he left the social network in 2010? To the NSA, according to the New York Times, which says it’s the first to report that tidbit. Also previously unreported, says the NYT, is that Internet-call provider Skype developed a program to make it easier to cooperate with law enforcement and the government.

  • Civil Rights

  • Intellectual Monopolies

    • Copyrights

      • Opening Pandora’s Box

        I first placed music online in 1996, a WAV file recorded through a microphone to promote the sale of an album I had under license on my indie BeanBag label featuring Georgie Fame and Van Morrison. I cheered for other music industry executives like Larry Rosen of GRP Records when he launched Music Boulevard online around 1997. I licensed songs by Jesse Colin Young (founder of The Youngbloods) to music publishing expert Bob Kohn’s eMusic.com for a cash advance against future royalties that had us partying like it was 1999.

        But by the year 2000, any hope of that engagement between legal music and the Internet leading to a new future was pretty much dashed by an online startup corporation named Napster that provided free music downloads. Though a Federal court would find Napster guilty in 2001 of providing illegal copying similar to a counterfeiting operation, the business model known as “DMCA ‘Safe Harbor’ corporations” was launched.

06.21.13

Links 21/6/2013: antiX 13.1, More NSA/FBI Revelations

Posted in News Roundup at 11:24 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • Michael Hastings, Bridge-Burning Journalist (1980-2013)

    Hastings, a reporter for Rolling Stone and BuzzFeed who died in a car crash in L.A. yesterday at the age of 33, didn’t see it as his job to maintain “good media/military relations,” or to decide what is “necessary to report.” To the contrary–he told CounterSpin (1/27/12) that one of his golden rules for reporting was, “What does everybody know who’s on the inside, but no one’s willing to say or write.”

    Hastings never forgot that journalists’ loyalties are supposed to be with the public and not to the government officials whose actions they cover–and that approach distinguished him not only from Burns but from most of his colleagues.

  • Google Finally Admits That Its Infamous Brainteasers Were Completely Useless for Hiring

    Google has admitted that the headscratching questions it once used to quiz job applicants (How many piano tuners are there in the entire world? Why are manhole covers round?) were utterly useless as a predictor of who will be a good employee.

  • Science

  • Hardware

  • Health/Nutrition

    • House Rejects Farm Bill as Food Stamp Cuts Prove Divisive

      The surprise defeat of the farm bill in the House on Thursday underscored the ideological divide between the more conservative, antispending Republican lawmakers and their leadership, who failed to garner sufficient votes from their caucus as well as from Democrats.

      [...]

      The failure was a stinging defeat for Speaker John A. Boehner of Ohio, who continues to have trouble marshaling the Republican support he needs to pass major legislation. Without the solid backing of his party, Mr. Boehner has to rely on some Democratic support, which deserted him Thursday.

  • Security

    • NetTraveler using PRISM phishing lures

      Recent email found by blogger Brandon Dixon indicates that the latest spear-phishing campaigns from the group behind NetTraveler are using the PRISM controversy to lure victims into reading the booby-trapped email. The mail, which tells the tale of the disclosure of PRISM and other NSA programmes, offers a 2.5MB file – “Monitored List1.doc” – and implies that this contains a list of those monitored by the NSA. The file, of course, actually contains malware that exploits an older vulnerability CVE-2012-0158 to infect the computer.

  • Defence/Police/Secrecy/Aggression

    • The Lies of Empire: Don’t Believe a Word They Say
    • Syria Is Becoming Obama’s Iraq

      In perfect Bush-like fashion, President Obama has invented a bogus pretense for military intervention in yet another Middle East country. The president’s claim that the Syrian government has used chemical weapons — and thus crossed Obama’s imaginary “red line” — will likely fool very few Americans, who already distrust their president after the massive NSA spying scandal.

    • The FBI’s Nearly Unbelievable Record of “Justified” Shootings

      We’re still waiting for the FBI to finish its internal investigation into exactly what happened in an Orlando apartment last month, when an FBI agent shot and killed Ibragim Todashev, a Chechan man who knew Boston bombing suspect Tamerlan Tsarnaev. Since the shooting, unnamed officials have painted a number of different pictures of the scene in the room in the moments before the agent opened fire. Among them, that Todashev was unarmed, that he was brandishing a knife, and that he was carrying a pipe or maybe a broomstick.

    • Iraq Says Proxy War Over Syria Threatens Its Neutrality

      Iraq is being buffeted by both sides in the civil war raging across its border in Syria and Baghdad’s official policy of neutrality is at risk as the conflict spirals into a region-wide proxy war, its foreign minister said.

    • Michael Hastings researching Jill Kelley case before death

      During the weeks before he was killed in a car crash in Los Angeles, reporter Michael Hastings was researching a story about a privacy lawsuit brought by Florida socialite Jill Kelley against the Department of Defense and the FBI.

      Hastings, 33, was scheduled to meet with a representative of Kelley next week in Los Angeles to discuss the case, according to a person close to Kelley. Hastings wrote for Rolling Stone and the website BuzzFeed.

      Kelley alleges that military officials and the FBI leaked her name to the media to discredit her after she reported receiving a stream of emails that were traced to Paula Broadwell, a biographer of former CIA director David H. Petraeus, according to a lawsuit filed in Federal District Court in Washington, D.C., on June 3.

    • If You Were Bradley Manning, What Would You Do?

      Some Bradley Manning supporters have put together a very compelling campaign, called I Am Bradley Manning, asking the government to drop the “aiding the enemy” charge against Bradley Manning and noting the chilling effects it has on whistleblowers. The key part of the campaign is a five minute video of various well-known people talking about Bradley Manning and asking what would you do if you were in his shoes, and saw that your government was lying to the public, and doing things that you believed went against the very values and principles you were supposed to be fighting for.

    • The US Uses Vulnerability Data for Offensive Purposes

      No word on whether these companies would delay a patch if asked nicely — or if there’s any way the government can require them to. Anyone feel safer because of this?

    • Former TWA 800 investigators claim crash details were covered up

      It was a central fuel tank explosion that sent TWA Flight 800 plummeting into the Atlantic Ocean in a 1996 crash that remains one of the country’s most devastating airline accidents.

    • Clear Evidence That Corporate America Wants the Govt. to Treat Protesters as ‘Terrorists’

      Corporations are trying to use the PATRIOT Act in ways that have nothing to do with Osama Bin Laden because the PATRIOT Act gives transnational corporations the power to snuff out the activism of all those who oppose them.

      Terrorism, as it is commonly considered, is the use of violence against civilians to achieve any number of political ends: the destruction of the federal government, the overturning of Roe V. Wade, the restoration of a Caliphate. If you try to kill people – or succeed in killing people for a political purpose – you’re a terrorist. If you blow up the Alfred P. Murrow Federal Building and kill 168 civilians, like Timothy McVeigh, you’ve committed an act of terrorism.

      Seems pretty self-explanatory – right? Not according to TransCanada Corp., the Canadian owned energy conglomerate that is the backer of the Keystone XL pipeline extension. A new set of documents obtained by the group Bold Nebraska shows that this foreign corporation is encouraging American law enforcement agencies to treat anti-pipeline protestors like terrorists. Yes, terrorists.

      The documents, which Bold Nebraska got a hold of through a FOIA request, were part of a briefing given to Nebraska law enforcement agents about the “emerging threat” of groups like Tar Sands Blockade and Rainforest Action.

    • Government Privatization Paves the Way for Crony Corruption

      It’s dangerous business when private contractors recruit top government employees and then effectively lease them back to the government.

    • Your Government on War

      That was President John F. Kennedy speaking to the 1963 graduating class of American University —announcing that the human race was ready to move beyond war. This was the speech in which he revealed that talks on a Nuclear Test-Ban Treaty with the Soviet Union had begun, and that the U.S. was unilaterally suspending atmospheric nuclear testing.

    • Why Won’t the FBI Tell the Public About its Drone Program?

      Today we’re publishing—for the first time—the FBI’s drone licenses and supporting records for the last several years. Unfortunately, to say that the FBI has been less than forthcoming with these records would be a gross understatement.

      Just yesterday, Wired broke the story that the FBI has been using drones to surveil Americans. Wired noted that, during an FBI oversight hearing before the Senate Judiciary Committee, FBI Director Robert Mueller let slip that the FBI flies surveillance drones on American soil. Mueller tried to reassure the senators that FBI’s drone program “is very narrowly focused on particularized cases and particularized leads.” However, there’s no way to check the Director on these statements, given the Bureau’s extreme lack of transparency about its program.

    • NYT Pays Tribute to Hastings by Attacking Him After Death

      When a journalist dies, how can you tell if they’ve had a career that’s upheld the proudest journalistic traditions of challenging the powerful and fearlessly exposing the truth?

      The New York Times will attempt to piss on that career in the journalist’s obituary.

    • Michael Hastings’ Wife Obliterates New York Times For Dismissive Obituary

      In the 24 hours since the tragic death of journalist and author Michael Hastings was first reported on Tuesday, those who knew him, worked with him, and covered his work have offered numerous remembrances of the man best known for his Polk Award-winning Rolling Stone piece, “The Runaway General.”

      That article, which presented a dim view of the U.S. strategy in the Afghanistan war and exposed a military command structure working to actively undermine its civilian leadership, also contained several accounts of less-than-professional behavior and comments by Gen. Stanley McChrystal, the International Security Assistance Force commander, the disclosure of which led to McChrystal tendering his resignation in June 2010.

      But it’s an obituary in The New York Times that has sounded a discordant note amid the rest of the encomiums. And now Hastings’ widow, Elise Jordan, is firing back at Times brass.

    • Bill O’Reilly Thinks Drones Don’t Kill Civilians (VIDEO)

      Bill O’Reilly probably lost it during his sow O’Reilly Factor on Wednesday when he wondered why far-left loons who opposed drones and Gitmo detention are ‘so crazy.’

      Well, it appears it’s the other way round since O’Reilly did a really pathetic impression of a German reporter who quite rightly questioned Obama’s drone warfare policy in Berlin that day.

  • Cablegate

  • Environment/Energy/Wildlife

  • Finance

    • Do Unpaid Internships Lead to Jobs? Not for College Students

      The common defense of the unpaid internship is that, even if the role doesn’t exactly pay, it will pay off eventually in the form of a job. Turns out, the data suggests that defense is wrong, at least when it comes to college students.

      For three years, the National Association of Colleges and Employers has asked graduating seniors if they’ve received a job offer and if they’ve ever had either a paid or unpaid internship. And for three years, it’s reached the same conclusion: Unpaid internships don’t seem to give college kids much of a leg up when it comes time to look for employment.

    • Decline and fall: how American society unravelled

      Americans were no less greedy, ignorant, selfish and violent then than they are today, and no more generous, fair-minded and idealistic.

    • Global markets fall as end to US stimulus beckons

      Global markets have fallen sharply after the Federal Reserve signalled it may begin to scale back its stimulus of the US economy later this year.

      On Wall Street, the Dow Jones dropped 354 points, or 2.3%, to close at 14,758, while the S&P 500 had its worst day since November 2011, shedding 2.5%.

    • Disunited Kingdom: Crisis Leaves Britain Deeply Fractured

      The economic crisis has caused the United Kingdom to drift apart, creating ever-widening rifts between rich and poor, native and immigrant, English and Scot. With the anti-Europe UKIP party on the rise, Great Britain stands at a crossroads.

    • U.S. wages fall amid overseas pressure

      Competition from China and other low-wage rivals, coupled with fallout from the 2007-09 financial crisis, has put American wages under such unprecedented strain that they have shifted into reverse — not merely stagnating, but falling.

      “Water finds its equilibrium, its own level,” said Jeff Joerres, chief executive of Milwaukee-based global staffing giant ManpowerGroup Inc., who refers to this accelerating leveling of wages as “global labor arbitrage.”

      Read more: http://www.post-gazette.com/stories/business/news/us-wages-fall-amid-overseas-pressure-692123/#ixzz2WpuIFBiI

    • JP Morgan’s man in the White House: Barack Obama’s legacy of ashes

      At one time, it seems decades ago now, the general thinking in the USA was that President Barack Obama would jolt the American political system into actually doing something beneficial for its citizens rather than spying on them, building F-35 aircraft, upgrading nuclear weapons, spending trillions of dollars (US) on national security, cutting unemployment benefits/food stamps, fomenting war with Iran, Syria, China and Russia; and dragging out the war in Afghanistan.

    • Why Cities Should Use Public Banks Instead of Big Banks

      Of all the public entities that have fallen victim to the big bank-induced economic downturn, cities have the most compelling stories of being burned. If “all politics is local,” this is even more true for economics, at least where people’s ordinary lives are concerned. City budgets contain the life blood of communities. School districts, contracts with utility companies, waste services, and street repairs all filter locally. City social services are often the first line of response for people in need. City councils also fund soup kitchens, domestic violence shelters, and animal shelters.

  • Privacy

    • Rand Paul: The Youth and I Agree That the NSA Stinks

      The libertarian senator picked up on the dip in support for the POTUS among younger Americans

      [...]

      Rand Paul is claiming that the youth of America have his back in his battle against Big Brother, reports Politico.

    • NSA snooping program ‘just one element of vast secrecy regime’

      The NSA warrantless spying program is only a part of a “vast” American secrecy regime that has developed and expanded since 9/11, former NSA senior official and a whistleblower Thomas Drake has told RT.

      Thomas Drake, who worked for the American National Security Agency (NSA) from 2001 to 2008, says he was at the place “from the very beginning” of the development of the mass surveillance program, PRISM, that grants the government access to Internet users’ emails, search results, video chats and other data.

    • Secret Sqrrl: NSA “spin-off” company releases data mining tool

      Recent revelations of the National Security Agency’s (NSA) data mining capabilities have come to the forefront recently, making “big data” a new subject of interest and concern for many people.

      So what better time than now to launch a data analytics tool based on the very technology that the NSA uses to perform its real-time analysis of massive amounts of data being pulled in from sources like the PRISM program?

    • What If The NSA Tracked Your Emotions?

      Last week, in Your Computer Is Watching You: AOL Rolls Out Emotion Tracking, I described how YouEye and other firms could use the webcam built into your computer to measure your emotional reactions to videos. There’s nothing nefarious about this program – the participants in the video testing explicitly opt-in to be part of the process. But, with the recent revelations about NSA vacuuming up phone and computer data, one wonders what might be possible with clever engineers and an unlimited budget…

    • Here’s how to ask the NSA for your records (but don’t hold your breath)

      After the PRISM leak, you probably want to know exactly what the NSA has on file about you. And here’s some good news amid all the are-we-living-in-a-surveillance-state hand-wringing: Civil rights advocate Jonathan Corbett put together a website called My NSA Records that wants to help you understand what your records looks like.

    • NSA whistleblower to tech firms, Obama: ‘Grow a pair!’

      Edward Snowden, the 29-year-old fugitive who revealed the NSA’s PRISM system, has told the technology companies involved in surveillance to stand up for users’ rights and demand a change in the current law.

      “If for example Facebook, Google, Microsoft, and Apple refused to provide this cooperation with the Intelligence Community, what do you think the government would do? Shut them down?” he said, during a question and answer session hosted by The Guardian

    • The Terror Con, Booz Allen Hamilton and the NSA

      Booz Allen, whose top personnel served in key positions at the NSA and vice versa after the inconvenient collapse of the Cold War, has been attempting to substitute terrorist for communist as the enemy of choice. A difficult switch indeed for the military-industrial complex about which Dwight Eisenhower, the general-turned-president, had so eloquently warned us.

    • If your name is Ahmed or Fatima, you live in fear of NSA surveillance

      Muslim and Arab Americans have been targets of intrusive monitoring programs even when they ‘have nothing to hide’

    • NSA whistleblower Edward Snowden warns ‘truth would emerge’ even if US govt murders him

      Answering the questions about him being a potential Chinese spy, Snowden said that by calling him a traitor, the US government has destroyed any possibility of a fair trial.

    • President Obama compares NSA to airport security
    • Does the NSA Really Need “Direct Access”?

      So, making the assumption that the NSA can eavesdrop on our Internet traffic already, does it really need access to Apple and Google’s server farms? After all, there’s nothing irreproducible about their systems—the rise of cloud computing technologies in recent years means that these companies’ servers are virtual constructs in any case, running on fungible hardware. With enough storage space and computing power, it is certainly technically possible to imagine shadow servers, emulating the relevant functions of a number of companies’ online services, and synchronized with data from Internet backbone taps at telcos. It might not be a perfect copy of what’s on the real servers, but such a system would still allow extensive historical searches in many cases. With such a system, “direct access” versus “intercepting traffic in transit” becomes a distinction without a difference.

    • Rieder: Why is NSA leaker Snowden demonized?
    • NSA PRISM, Edward Snowden, Who Are The Real Traitors?

      “I’m neither traitor nor hero. I’m an American.” – Edward Snowden

      [...]

      There are weeks that change the course of human history. There are weeks when people must choose sides. There are weeks that expose the real American traitors. There is no middle ground in this debate. You are either on the side of freedom, liberty, truth, transparency and the U.S. Constitution or you are on the side of mindless obedience, oppression, deception, corruption and tyranny. A courageous young Millennial named Edward Snowden has risked his life and his future to expose the illegal, surreptitious surveillance programs being conducted by the United States government in clear violation of the 4th Amendment to the U.S. Constitution. The NSA, with the full knowledge of Barack Obama and Congress, has been covertly collecting phone and internet records on millions of Americans with the full cooperation of Verizon and other mega media/data corporations. Our owners have been using the U.S. Constitution to wipe their asses. The 4th Amendment to the U.S. Constitution is so unambiguous that any intelligent politician, bright journalist or fifth grader in Miss Sabatini’s history class could interpret its meaning and intention. Our founding fathers believed in truth, clarity and simplicity. The traitorous sociopaths in control of our government today believe in obfuscation, ambiguity and complexity.

    • NSA surveillance played little role in foiling terror plots, experts say

      Michael Dowling, a Denver-based attorney who acted as Zazi’s defence counsel, said the full picture remained unclear as Zazi pleaded guilty before all details of the investigation were made public. But the lawyer said he was sceptical that mass data sweeps could explain what led law enforcement to Zazi.

      “The government says that it does not monitor content of these communications in its data collection. So I find it hard to believe that this would have uncovered Zazi’s contacts with a known terrorist in Pakistan,” Dowling said.

      Further scepticism has been expressed by David Davis, a former British foreign office minister who described the citing of the Zazi case as an example of the merits of data-mining as “misleading” and “an illusion”. Davis pointed out that Operation Pathway was prematurely aborted in April 2009 after Bob Quick, then the UK’s most senior counter-terrorism police officer, was pictured walking into Downing Street with top secret documents containing details of the operation in full view of cameras.

    • What Bothers me About NSA Data Collection: A Reply to Thomas Friedman

      One of the most articulate commentators to come to the defense of the NSA is Thomas Friedman. His recent column in the New York Times epitomizes what bothers me most about this whole affair—the readiness of people who claim to be defenders of an open society to make excuses for people and policies that undermine it.

      Friedman argues that although what the NSA is doing is distasteful, we should put up with it because it might stop some future terrorist attack, which in turn, would prompt even more intrusive violations of our freedoms.

    • Russia promises legal action over NSA surveillance scandal

      Russia will not ignore the actions of the US authorities who had admitted leaks of personal data of Russian citizens to which the US security services had access, the Foreign Ministry’s plenipotentiary for human rights, Konstantin Dolgov, said at a special meeting initiated by the Upper House of the Russian parliament.

    • US lawmakers call for review of Patriot Act after NSA surveillance revelations
    • Fisa court oversight: a look inside a secret and empty process

      Obama and other NSA defenders insist there are robust limitations on surveillance but the documents show otherwise

    • Glenn Greenwald: As Obama Makes “False” Surveillance Claims, Snowden Risks Life to Spark NSA Debate

      Glenn Greenwald, the Guardian journalist who broke the NSA surveillance story earlier this month, joins us one day after both President Obama and whistleblower Edward Snowden gave extensive interviews on the surveillance programs Snowden exposed and Obama is now forced to defend. Speaking to PBS, Obama distinguished his surveillance efforts from those of the Bush administration and reaffirmed his insistence that no Americans’ phone calls or emails are being directly monitored without court orders. Greenwald calls Obama’s statements “outright false” for omitting the warrantless spying on phone calls between Americans and callers outside the United States. “It is true that the NSA can’t deliberately target U.S. citizens for [warrantless] surveillance, but it is also the case they are frequently engaged in surveillance of exactly that kind of invasive technique involving U.S. persons,” Greenwald says. After moderating Snowden’s online Q&A with Guardian readers, Greenwald says of the whistleblower: “I think what you see here is a person who was very disturbed by this massive surveillance apparatus built in the U.S. that spies not only on American citizens, but the world, with very little checks, very little oversight. He’s making clear his intention was to inform citizens even at the expense of his own liberty or even life.”

    • Edward Snowden stands by leak allegations

      The former intelligence contractor who leaked documents on US surveillance programmes has defended himself in an online chat, the Guardian reports.

    • NSA spying flap extends to contents of U.S. phone calls

      National Security Agency discloses in secret Capitol Hill briefing that thousands of analysts can listen to domestic phone calls. That authorization appears to extend to e-mail and text messages too.

    • Secret to Prism program: Even bigger data seizure

      “You have to assume everything is being collected,” said Bruce Schneier, who has been studying and writing about cryptography and computer security for two decades.

    • U.S. surveillance architecture includes collection of revealing Internet, phone metadata

      The other two types of collection, which operate on a much smaller scale, are aimed at content. One of them intercepts telephone calls and routes the spoken words to a system called ­NUCLEON.

    • The influence of spies has become too much. It’s time politicians said no

      What are secret courts? Why do we need them? To protect Britain’s special relationship with the United States, we are officially told; to protect the credibility and integrity of our intelligence services. Never mind that for decades we have handled security-sensitive cases by clearing the court whenever necessary, and allowing our secret servants to withhold their names and testify from behind screens, real or virtual: now, all of a sudden, the credibility and integrity of our intelligence services are at stake, and need urgent and draconian protection.

    • Connecting the Dots on PRISM, Phone Surveillance, and the NSA’s Massive Spy Center

      …massive operation to secretly keep track of everyone’s phone calls on a daily basis…

    • James Bamford on NSA Secrets, Keith Alexander’s Influence & Massive Growth of Surveillance, Cyberwar
    • NSA Leaker Edward Snowden Has a Higher Approval Rating Than Congress

      Polls conducted in the days since Glenn Greenwald and The Guardian pulled back the curtain on the NSA’s surveillance program have found that a majority of Americans are fine with said program so long as it targets suspected terrorists, but are less fine with being targeted themselves; and that they’re skeptical of the claim that leaking information about the NSA’s spying program will jeopardize the government’s ability to keep America safe.

    • Sweden’s data protection Authority bans Google cloud services over privacy concerns

      In a landmark ruling, Sweden’s data protection authority (the Swedish Data Inspection Board) this week issued a decision that prohibits the nation’s public sector bodies from using the cloud service Google Apps.

    • Texas Law Now Can’t Snoop in Email Without Warrant

      It’s a step closer to protecting your electronic privacy… in Texas.

    • WikiLeaks Says It Is Working to Negotiate Asylum in Iceland for Snowden

      WikiLeaks activists in Iceland are discussing with government officials there the possibility of asylum for Edward J. Snowden, the former National Security Agency contractor who disclosed hundreds of classified documents on N.S.A. surveillance, Julian Assange, the founder of the antisecrecy group, said Wednesday.

    • ‘Anonymous’ search engine sees rocketing growth after NSA revelations

      An alternative search engine DuckDuckGo has enjoyed a record surge in traffic as NSA scandals spark fears and frighten away Internet users from the more popular Google or Yahoo!.

      Over the previous week DuckDuckGo, a private search engine, which claims not to collect users’ searches or create any personal user profile, has increased its traffic by 26 per cent and passed 3.1 million of direct queries.

    • PRISM – Where do we go from here?

      To make matters worse, DuckDuckGo are not audited by any external body, so we only have their word that they are not an NSA honeypot setup to monitor people that deliberately avoid Google on privacy grounds (exactly the type of people the NSA are interested in) and we only have their word that their privacy policy is upheld – frankly Gabriel, that is not good enough.

      For the above reasons, I once again turn my old friends at Ixquick. If you are looking for a private search engine, you cannot do better than Ixquick and Startpage at this time – they have been audited and certified by Europrise, they are not based in the US and therefore not under the jurisdiction of FISC and I know them personally and know that they stand by their word. They haven’t paid me to say this, so no, this isn’t some profit making scheme by me, but the facts are as they stand – it is literally impossible to trust that your data is private and secure if you use a company that has any legal ties to the United States. That means Cloud, Email, Blogs, ECommerce, Hosting, Image Galleries, Microblogs, Voice over IP, Instant Messaging, Social Networking – yes absolutely -everything- which makes up our digital society. If you still don’t quite understand what that means, GMail, Hotmail, Skype, Facebook, Twitter, Dropbox, Crashplan, Blogger, Google Search, Bing, Yahoo Mail etc. are all inherently insecure as a direct result of the Foreign Intelligence Surveillance Act, the PATRIOT Act, the National Security Agency and PRISM – and that is before we even start to discuss CALEA and whether or not your broadband router has a built in back door…

    • Revealed: the top secret rules that allow NSA to use US data without a warrant

      Fisa court submissions show broad scope of procedures governing NSA’s surveillance of Americans’ communication

    • India sets up nationwide snooping programme to tap your emails, phones
    • Uncle Sam and Corporate Tech: Domestic Partners Raising Digital Big Brother

      “National security” agencies and major tech sectors have teamed up to make Big Brother a reality. “Of the estimated $80 billion the government will spend on intelligence this year, most is spent on private contractors,” the New York Times noted. The synergy is great for war-crazed snoops in Washington and profit-crazed moguls in Silicon Valley, but poisonous for civil liberties and democracy.

    • PRISM: EU citizens’ data must be properly protected against US surveillance

      The US PRISM internet surveillance case highlights the urgent need to pass legislation to protect EU citizens’ personal data, most MEPs agreed in Wednesday’s Civil Liberties Committee debate with Justice Commissioner Viviane Reding. MEPs also called for safeguards for personal data transferred outside the EU.

    • 3 Former NSA Employees Praise Edward Snowden, Corroborate Key Claims

      USA Today has published an extraordinary interview with three former NSA employees who praise Edward Snowden’s leaks, corroborate some of his claims, and warn about unlawful government acts.

    • Use of Tor and e-mail crypto could increase chances that NSA keeps your data

      When it comes to surveillance rules, some US people are more equal than others.

    • How Today’s NSA Is Much, Much Worse Than Stasi Or Orwell’s “1984”

      There are still people warning us of sleepwalking into a Stasi or “1984” society. They missed the boat by a long shot: we are already far, far past the point of Stasi or “1984”. The apparatus that governments have built to trace, track, and record citizens is the stuff of nightmares.

    • Why NSA surveillance is a threat to British doctors and lawyers

      So now the penny drops, and we all know why GCHQ has long refused to allow government departments to store information classified at “Restricted” or above in US cloud computing services. But what about the private sector? Well, Edward Snowden’s revelations are now causing something of a crisis in the IT industry as its international customers start thinking through the implications. In the past week I’ve heard of big firms reconsidering plans to spend hundreds of millions on services that would have been hosted in the US, as they start to realise that US agencies might snoop on their data and use it to tip off their competitors. US service firms now fear this will harm their growth, and it’s not just Microsoft and Google; many other companies such as Amazon, Salesforce and Rackspace could lose out.

    • In Germany, Merkel has blunt words for Obama on right to privacy

      President Obama, the former college lecturer on constitutional law, got a lecture on privacy rights Wednesday from German Chancellor Angela Merkel and faced tough questions from the German press about his perceived failure to be less warlike after winning the Nobel Peace Prize.

      Mrs. Merkel raised the subject of National Security Agency surveillance of the Internet in a private meeting with Mr. Obama in Berlin, where she emphasized the need for “proportionality.”

    • Bush-Era NSA Whistleblower Makes Most Explosive Allegations Yet About True Extent of Gov’t Surveillance

      Russ Tice, a former intelligence analyst and Bush-era NSA whistleblower, claimed Wednesday that the intelligence community has ordered surveillance on a wide range of groups and individuals, including high-ranking military officials, lawmakers and diplomats.

      He also made another stunning allegation. He says the NSA had ordered wiretaps on phones connected to then-Senate candidate Barack Obama back in 2004.

      “They went after–and I know this because I had my hands literally on the paperwork for these sort of things–they went after high-ranking military officers; they went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees and some of the–and judicial,” Tice told Peter B. Collins on Boiling Frog Post News.

    • Leaked NSA Doc Says It Can Collect And Keep Your Encrypted Data As Long As It Takes To Crack It

      If you use privacy tools, according to the apparent logic of the National Security Agency, it doesn’t much matter if you’re a foreigner or an American: Your communications are subject to an extra dose of surveillance.

      Since 29-year-old systems administrator Edward Snowden began leaking secret documentation of the NSA’s broad surveillance programs, the agency has reassured Americans that it doesn’t indiscriminately collect their data without a warrant, and that what it does collect is deleted after five years. But according to a document signed by U.S. Attorney General Eric Holder and published Thursday by the Guardian, it seems the NSA is allowed to make ambiguous exceptions for a laundry list of data it gathers from Internet and phone companies. One of those exceptions applies specifically to encrypted information, allowing it to gather the data regardless of its U.S. or foreign origin and to hold it for as long as it takes to crack the data’s privacy protections.

    • Bush-Cheney began illegal NSA spying before 9/11, says telcom CEO

      Contradicting a statement by ex-vice president Dick Cheney on Sunday that warrantless domestic surveillance might have prevented 9/11, 2007 court records indicate that the Bush-Cheney administration began such surveillance at least 7 months prior to 9/11.

      The Bush administration bypassed the law requiring such actions to be authorized by FISA court warrants, the body set up in the Seventies to oversee Executive Branch spying powers after abuses by Richard Nixon. Former QWest CEO John Nacchios said that at a meeting with the NSA on February 27, 2001, he and other QWest officials declined to participate. AT&T, Verizon and Bellsouth all agreed to shunt customer communications records to an NSA database.

    • The Terror Con: How Keeping Americans Terrified Is Making Corporations Big Bucks

      For defense contractors, the government officials who write them mega checks, and the hawks in the media who cheer them on, the name of the game is threat inflation. And no one has been better at it than the folks at Booz Allen Hamilton, the inventors of the new boondoggle called cyber warfare.

    • US House bill would force Obama to declassify Fisa court decisions

      Two US congressmen introduced a bill on Thursday compelling the Obama administration to declassify the secret legal justifications for the wide-ranging surveillance programs run by the National Security Agency.

      The disclosure bill, a complement to one pushed in the Senate last week, is the latest in a series of legislative attempts to rein in the NSA’s collection and analysis of Americans’ phone records and, potentially, Internet usage.

    • Latest Guardian Scoop: When the NSA Can Use U.S. Data Without a Warrant
    • Revealed: the top secret rules that allow NSA to use US data without a warrant
    • Break free of PRISM with the EFFs PRISM Break site

      Avoid Prism and the NSA with the Electronic Frontier Foundation’s guide to maintaining your privacy – comprised of free and open source software

    • Linux Format 173 On Sale Today – Escape Google!
    • Google-a-go-go
    • France sets Google deadline for privacy changes

      The French data protection authority, CNIL, has today announced that Data Protection Authorities from France, Germany, Italy, the Netherlands, Spain and the United Kingdom have respectively launched enforcement actions against Google.

    • Apple co-founder says he admires Edward Snowden as much as Pentagon Papers leaker Daniel Ellsberg

      The Apple co-founder Steve Wozniak has backed NSA whistleblower Edward Snowden and admitted he feels “a little bit guilty” that new technologies had introduced new ways for governments to monitor people.

      “I felt about Edward Snowden the same way I felt about Daniel Ellsberg, who changed my life, who taught me a lot,” he said.

      Speaking to Piers Morgan on CNN he said he was not the kind of person to “just take sides in the world – ‘I’m always against anything government, any three letter agency,’ or ‘I’m for them’.”

    • How to fight PRISM

      Thursday 6 June, the day the PRISM story broke, was a good day to be a cryptographer. The sudden prospect of mass, unwarranted surveillance delivered an electric shock to thousands who were now looking for ways to protect their privacy online. At Cryptocat, we saw nearly 5,000 new individuals starting to use our free encrypted chat software. Other privacy and encryption services saw a rise of as much as 3,000 per cent in new users. – See more at: http://newint.org/blog/2013/06/21/prism-surveillance-nsa-software/#sthash.bP6q2IQe.dpuf

    • Lou Reed: NSA scandal is ‘very disturbing’

      Music veteran also says MP3s ‘sound like shit’ and journalists are ‘very problematic’ in first appearance since liver transplant

    • Lou Reed’s shock at Edward Snowden’s NSA revelations – video
    • Britain’s response to the NSA story? Back off and shut up
    • NSA revelations prompt questions about Australian intelligence agencies

      The independent senator Nick Xenophon is pressing for answers about whether Australian parliamentarians are being watched by intelligence agencies in the wake of revelations in the Guardian about the US Prism programme.

    • NSA Prism programme a game changer on web privacy, says Sir Martin Sorrell

      The founder of the world’s biggest marketing services company, Sir Martin Sorrell, has said he believes revelations about the National Security Agency’s Prism internet surveillance programme are a “game changer” that will spark a fundamental rethink of web privacy by web users.

    • Sir Martin Sorrell: The NSA’s Prism programme surprised even me – video
    • How NSA Spies on US Citizens Revealed in New Leaks

      Leaked documents have revealed how the United States’ National Security Agency (NSA) is able to gather and use information on US citizens.

    • NSA surveillance: don’t underestimate the extraordinary power of metadata
    • New NSA Warrantless Tactics Reveal Little Room For Presumption Of Innocence

      The Guardian released new details about the National Security Agency’s spying practices, which reveals how analysts can store vast sums of data without a warrant. Specifically, if the NSA “inadvertently” stumbles upon anything related to a potential crime, it can store the data for later investigations.

      Quite reasonably, the Supreme Court has declared that law enforcement can charge citizens with a crime if it’s being conducted in “plain sight“–e.g. if cops see pot sitting in the passenger seat of a car during a traffic stop. That is, the presumption of innocence doesn’t apply to if police inadvertent witness a crime. Unfortunately, the scope of the presumption of innocence gets tinier as the government’s eyes get bigger.

    • Secret rules let NSA keep U.S. data without warrant

      The National Security Agency may keep Americans’ emails and phone calls if they’re “believed to contain significant foreign intelligence,” secret papers show.

      The world’s largest spy agency may also keep U.S. citizens and legal residents’ domestic communications if NSA analysts believe the communications could suggest evidence of a crime, the documents published Friday by British newspaper The Guardian and The Washington Post indicated.

    • Provisions under which NSA can collect, retain data on U.S. residents revealed

      Two secret documents describing the procedures the National Security Agency (NSA) is required to follow when spying on foreign terror suspects reveal the provisions that allow the agency to collect, retain and use information on U.S residents without a warrant, The Guardian newspaper reported today.

    • ‘Indefinite Surveillance’ Under the 2014 NDAA?

      The National Defense Authorization Act recently approved by the House would build on powers currently available to government to allow unrestricted access to all personal data collected “during combat operations from countries, organizations, or individuals, now or once hostile to the United States,” political analyst Stephen Benavides reports at Truthout.

      The data are known officially as “captured records” and include any kind of personal file belonging to parties deemed to be in conflict with the United States. Of course, the war on terror’s expanding battlefield means those records do not have to be collected outside of the United States.

    • Indefinite Surveillance: Say Hello to the National Defense Authorization Act of 2014

      Passed in 1978, the Foreign Intelligence Surveillance Act (FISA) set the groundwork for surveillance, collection, and analysis of intelligence gathered from foreign powers and agents of foreign powers, up to and including any individual residing within the U.S., who were suspected of involvement in potential terrorist activity. On October 26, 2001, a little over a month after 9/11, President George W. Bush signed the USA Patriot Act into law. Two provisions, Sec. 206, permitting government to obtain secret court orders allowing roving wiretaps without requiring identification of the person, organization, or facility to be surveyed, and Sec. 215 authorizing government to access and obtain “any tangible thing” relevant to a terrorist investigation, transformed foreign intelligence into domestic intelligence.

    • 2014 NDAA Passes the House, With Many Amendments
  • Civil Rights

    • FBI Admits It Surveils U.S. With Drones
    • Brazil protests expand to over one million people
    • Brazil erupts in protest: more than a million on the streets

      The streets of central Rio de Janeiro and dozens of other cities echoed with percussion grenades and swirled with teargas last night as ranks of riot police scattered the biggest demonstrations Brazil has seen for more than two decades.

      As a minority of protesters threw rocks, torched cars and pulled down lamp-posts, the police fired volleys of pepper spray and rubber bullets into the crowd and up onto overpasses where car drivers and bus passengers were stuck in traffic jams. At least 40 people were injured in the city and many more elsewhere.

      A vast crowd – estimated by the authorities at 300,000 and more than a million by participants – filled Rio’s streets, one of a wave of huge nationwide marches against corruption, police brutality, poor public services and excess spending on the World Cup.

    • Brazil’s president meets protests with an anti-Erdogan response

      Protests have popped up across the globe in recent years, but government response has varied. Rousseff’s approach contrasted with the adversarial position of Turkey’s Erdogan, for example.

    • Judges order California to immediately release prisoners

      For decades, California’s political leaders have tried every imaginable approach to dealing with its overcrowded prisons – sending inmates out of state, fighting the federal courts all the way to the U.S. Supreme Court, promising more prison beds and insisting that it has done plenty to cut inmate populations and improve health care.

    • Guantánamo force-feeding does not trouble prison doctors

      Calls for the doctors who force-feed hunger-striking prisoners at Guantánamo Bay to refuse to perform the practice on ethical grounds have got nowhere, a spokesman for the prison said on Thursday.

  • Internet/Net Neutrality

    • Verizon accused of intentionally slowing Netflix video streaming

      In a user forum on Verizon’s website, a couple users claim their Netflix instant streaming quality has been on the decline. Some claim to continue to experience problems even after contacting Verizon’s customer service agents and working with them to resolve it.

  • Intellectual Monopolies

    • Canadian Government Maps Plan for Future Intellectual Property Reform

      The House of Commons may have adjourned for the summer, but just hours before breaking, the government filed its response to the Standing Committee on Industry, Science and Technology’s report on the Intellectual Property Regime in Canada. That may sound dry, but the document provides a clear indication of what the government has planned for the coming years on IP reform.

      So what’s in store? Leaving aside an assortment of promised studies on international best practices, improving patent quality, and improving research and development, the government response includes five notable plans (or non-plans).

    • Copyrights

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts