Weekdays are interesting. Those are the days we find out whether folks are just playing with GNU/Linux at home or putting it to work. Finland has seen huge spikes in usage, all on weekdays.
Roberto J. Dohnert announced the immediate availability of the Linux Kernel 4.0 Update Kit for his Black Lab Linux computer operating system, allowing users to update to the newly released Linux 4.0 kernel.
Systemd has eliminated shutdownd, one of the oldest components of this controversial init system, but its removal isn't because systemd is going on a diet.
In trying to reduce/eliminate visible tearing on the screen, the xf86-video-ati driver is preparing to introduce a new TearFree X.Org option.
For those not too busy discussing and digging through the new open-source AMDGPU kernel driver that was published yesterday, out today are some new patches for AMDKFD, the HSA Linux kernel driver.
While the xf86-video-intel X.Org DDX driver has yet to reach version 3.0 even though the 3.0 development series is going on two years old, Intel open-source developers are continuing to spend time on the universal xf86-video-modesetting driver.
Webmin is an open source web based system configuration application for Linux system administration. With the help of this tool we can manage internal system configuration such as setting up user accounts, disk quotas, services configuration like Apache, DNS, PHP or MySQL, file sharing and much more. Webmin applications is based on Perl module and it uses TCP port 10000 with OpenSSL library for communicating via browser.
On April 23, the Qt Creator development team, through Eike Ziller, had the pleasure of announcing the immediate availability for download of Qt Creator 3.4.0, a release that introduces a number of new features and improvements meant to boost the usability of the software.
Qt Creator 3.4.0, one of my preferred development tools, has been released. This version is focused on increasing the support for C++ including some new refactoring features. Has been added a new refactoring action that moves all function definitions out of a class declaration and auto-completion for signals and slots in Qt 5 style connects.
Will Fight for Food: Super Actual Sellout: Game of the Hour wins my award for most annoying name of a game ever.
Survivor Squad: Gauntlets has recently added Linux support to their Early Access title. Honestly, I didn't think much of it looking at screenshots, but you really do need to watch a gameplay video to understand it, and it looks fun.
I really do love the idea behind this game, and making sure to remember to keep checking everywhere looks like mad fun. Looks like it can get quite difficult too.
It is in Early Access, but the developers stated that the full release is only just around the corner!
Will these joke simulator games ever end? Who honestly is going to buy Tea Party Simulator 2015? Goat Simulator was funny, but this...
Dungeons 2 is another game to come to Linux thanks to Kalypso Media Digital, and it's very much like the old Dungeon Keeper games.
Reviewers are giving it the thumbs up so far, so it looks like it could be a good one. It looks like it has a few performance issues, and silly bugs, but it's a brand new release so that's to be expected.
With the release of Ubuntu 15.04 coming this week I've been busy running some fresh comparison benchmarks between the "Vivd Vervet" and former versions of Ubuntu Linux. For Intel HD Graphics users, in this article are two quick results showing how the performance of Counter-Strike: Global Offensive and Team Fortress 2 has improved on the open-source Intel Linux graphics driver over the past six months between Ubuntu 14.10 and 15.04.
It was just last month I wrote about there being more than 1,000 games on Steam for Linux/SteamOS. Recently, Steam crossed the 1,100 games milestone; over one hundred additions in just over one month!
While we sadly don't hear too much these days from Unigine on the Linux gaming front, their high-end 3D graphics engine remains Linux-compatible and they seem to be doing well off in the area of simulations and more. Unigine 2.0 has been out in preview form since last year and coming out today is the second beta.
Besides gardening lately (more on that next time) lately I've been looking into what needs and used to use KSpeech/KTTS/Jovie. As QtSpeech will replace the functionality Jovie provided I thought I'd look at what needs doing to get stuff using QtSpeech.
Last year I really wanted to attend conf.kde.in but couldn’t because my train tickets were not confirmed by the time it started. So, I had made up my mind right then, that I will definitely attend it the next year by all means. So, this year I applied and was accepted as a speaker too. But tragedy struck again, when some college issues clashed with the date of my flight, so I had to reschedule it once, and then one more time due to one more clash, after which I could finally reach Amritapuri in the evening of Day 1 of conference when it was already over. So, yes I was sad as I had missed the first day, but that also meant that I should make the best of the second day for sure.
This year’s conf.kde.in – KDE India’s annual conference on KDE/Qt technologies, was hosted in Amrita University’s Amritapuri campus and it still feels kinda surreal indeed. Thankfully, it all unfolded well enough. It was the first time a KDE conference was being hosted in Southern India or at least in Kerala to the best of my knowledge. I think one of the main reasons for this to happen was my experience with the previous edition of the same conference, which was held in Gandhinagar, Gujarat. Back then, I had just started to contribute to KDE and was very keen on attending the conference. However, it’d take me at least 5 days to travel back and forth and attend the conference – something which seemed improbable, if not possible given the schedule of classes any engineering student would have. It was also back then that I’d met Pradeepto Bhattacharya, Founder of KDE-India and had an informal chat and it motivated me to try contributing to KDE. He also wanted to see me attend the conference in Gujarat. However, I was unable to, despite wanting to.
Several years ago we started porting Calligra to Windows. Supported by NLNet. Some time later, Intel also supported KO to create two Windows versions of Krita, one for tablets, one for convertible ultrabooks and later still, a new version of Calligra Words, Stage and Sheets for convertible ultrabooks. Meanwhile, the Krita Foundation has been publishing Krita on Windows and OSX for some time now. That's a fair amount of experience in puslishing software originally written on Linux on other platforms.
With the release of Plasma 5.3 only days away, it's time to start talking about some of the new features users of Plasma Desktop will get their hands on in the new version.
A couple of days ago I spoke about the new release of the Kde Applications 15.04 which represents a great and important step towards the completion of the passage from the old Kde 4 to the new Plasma 5 environment.
While GNOME 3.16 was just released last month, changes coming ahead for GNOME 3.18 and particularly GTK+ 3.18 are quite exciting.
I don't know why DistroWatch seemed to have missed it, but Mageia 5 RC is available for download.
After a rather long wait that was making me nervous and silence in both the Mageia and OpenMandriva camps*, OpenMandriva announced the new alpha release, code named "Einsteinium."
Three days ago, there was a massive update to Slackware’s development tree. More than 50% of all packages in Slackware have either been rebuilt, upgraded or added new.
During the evening of 24th March, I’ve decided to join Fedora Project’s QA Team.
There's a new sheriff in town. And her name is Jessie. We're happy to announce the release of Debian 8.0, codenamed Jessie.
Want to install it? Choose your favourite installation media among Blu-ray Discs, DVDs, CDs and USB sticks. Then read the installation manual. For cloud users Debian also offers pre-built OpenStack images ready to use.
Already a happy Debian user and you only want to upgrade? You are just an apt-get dist-upgrade away from Jessie! Find how, reading the installation guide and the release notes.
Do you want to celebrate the release? Share the banner from this blog in your blog or your website!
After almost 24 months of constant development the Debian project is proud to present its new stable version 8 (code name "Jessie"), which will be supported for the next 5 years thanks to the combined work of the Debian Security team and of the Debian Long Term Support team.
"Jessie" ships with a new default init system, systemd. The systemd suite provides many exciting features such as faster boot times, cgroups for services, and the possibility of isolating part of the services. The sysvinit init system is still available in "Jessie".
A short post about what is #newinjessie, Debian's new 8.0 Jessie release. See Mika's debian-devel post for more information.
The Debian Project had the great pleasure of announcing today, April 26, that the Debian GNU/Linux 8 (Jessie) computer operating system has been made available for download on mirrors worldwide.
Whilst the rest of Debian was very busy actually making the Jessie release, I was trying to prepare the ground to test the armhf installer images.
The Parsix GNU/Linux team announced on April 25 the immediate availability for download and testing of the third development release of the upcoming Parsix GNU/Linux 7.5 computer operating system.
Ubuntu 15.04 debuted this week marking the first milestone update for Ubuntu in 2015. Ubuntu 15.04 is 'just a regular release and as such will only be supported for nine months.
Ubuntu 15.04 was just released, and there are some early reviews of Canonical's latest desktop distribution. So far the buzz seems somewhat mixed, and that's not surprising since Ubuntu 15.04 is a relatively low-key release without lots of flashy, new features.
While much of the media attention as of late when it comes to Ubuntu Linux has been about their mobile endeavors, they are continuing to innovate on other fronts as well and with this week's release of Ubuntu 15.04 is the initial work on LXD for those interested in containers.
Ubuntu 15.04 was just released and Canonical isn't wasting any time with starting to share their plans for Ubuntu 15.10 due out in October. This next release will feature a build that switches away from Debian packages (.deb) to using Snappy Personal.
Intel Haswell Linux users are greeted by relatively modest performance changes with Ubuntu 15.04 while those using AMD Radeon graphics cards on the open-source R600 and RadeonSI Gallium3D drivers have much more to look forward to when upgrading to this week's release of Ubuntu 15.04. Here's some Ubuntu 14.10 vs. Ubuntu 15.04 OpenGL benchmarks for a range of AMD Radeon graphics cards.
The 23rd of April 2015 was the date when Canonical released the set of their new operating systems: Ubuntu 15.04 family. It includes Ubuntu itself, Ubuntu MATE and GNOME editions, Kubuntu, Xubuntu, Lubuntu and so on.
Gateworks’s latest Ventana SBC runs Linux, OpenWRT, and Android on an i.MX6 SoC, and offers A/V, serial, and mini-PCIe I/O, plus wide temperature operation.
The Ventana GW5220 is nearly identical to the Ventana GW5200 SBC announced in 2013, “but only supports PCIe signaling on one mIni-PCIe slot and adds SPI support,” says Gateworks. Like the other Ventana SBCs, including the recent, higher-end Ventana GW5520, the new GW5220 supports -40 to 85€°C temperatures, and runs OpenWrt, OpenEmbedded/Yocto, or Android on a Freescale i.MX6 SoC. Like the GW5200, it supports the dual-core i.MX6 Dual version at 800MHz, and measures 100 x 70mm.
Google takes a lot of stick from Apple and others over malware on the Android platform, but the company thinks the OS is now so secure that users don't need antivirus software.
Speaking at the RSA Conference in San Francisco this week, Adrian Ludwig, lead engineer for Android security, explained that Google is now scanning for malware so often and has become so adept at spotting malware that less than 1 per cent of Android devices has a malware problem.
The modern smartphone is a wonder of modern technology, and in combination with the carrier network can allow you to make calls from the densest urban jungle to Mount Everest. But despite the amazing global coverage of the carrier networks, sometimes it just isn't enough.
In Android this week we had reports of the return of the Nokia phone, Samsung is sneaking into Japan, and a serious bug in Android Wi-Fi was discovered.
Google updated its design spec recently. The material spec, which Google says is a living document (as evidenced by its ongoing updates), gained further guidance on floating action buttons, dialogs, updates on typography, and a lot more.
When Google bought Waze back in 2013, we assumed the plan was to integrate all that crowdsourced traffic data into Google Maps. It turns out that may just be phase one of a broader effort to put Waze at the center of your life through direct integration with Android Auto.
Google released Android 5.0 Lollipop last year with plenty of new features for Nexus devices, but non-Nexus users were left with a series of bugs. Will these kinks be worked out with the latest Android OS update?
The 5.1.1 Lollipop update, says Tech Times, has been released first for the Nexus player. Those who own Nexus player who would like to update their software can download it (with build number LMV47V) it here. Or they could just wait for the OTA to arrive.
Developers like to tinker and to explore tech boundaries, surely that must the reason that XDA developer biktor_gj has ported Android Wear to the Samsung Gear 2? This is a work in progress at this stage as it only boots into the OS with little functionality at the moment and no download currently available.
Whether you’re a novice Web developer or seasoned CIO, at some point you will require technical support with either a new IT development, task or project. What type of support will you want? With open source software, the flexibility and choice is yours.
Deep Information Sciences has launched Deep Engine, a plug-and-play storage engine that brings scale and performance to MySQL databases, without the need for recoding or redeploying applications that use MySQL as a data source. What's more, Deep Engine is installed as a simple 10M-byte plug-in, which can run alongside other storage engines or replace them entirely. Deep Engine brings hybrid transactional and analytical processing (HTAP) capabilities to MySQL, making it suitable for big data and other data-intensive projects that require billions of rows of information in both structured and unstructured record formats. Substantial performance improvements and exponentially greater levels of scale are offered, thanks to compression technology, as well as machine learning routines that leverage intelligent heuristics to better organize queries and storage elements. Taken altogether, Deep Engine can potentially delay or prevent the need to transition to more expensive server and database platforms to handle big data or other data-intensive projects.
The Document Foundation announced today the immediate availability for download of the LibreOffice 4.3.7 open source office suite for GNU/Linux, Mac OS X, and Microsoft Windows operating systems.
Since 2012, the Open Knowledge Foundation (OKF) has published a handbook to help people understand the public Open Data concept and promote the re-use of data and new data projects. Titled the Open Data Handbook, and focused more precisely on Open Government data, this booklet explains “how open data can create value and can have a positive impact in many different areas”, according to the handbook’s introduction.
Is there any connection between how governments manage their Open Data policies and the political and social context in which they work? This question is the central thesis of a paper titled “Opportunities and Differences of Open Government Data Policies in Europe”, which was published in the Athens Journal of Social Sciences in July 2014.
A pair of Georgia Tech computer science students have created a Random Startup Website Generator that spits out a different jargon-laden startup website every time you click on the URL.
Critics have had half a century to pick apart and predict the end of Moore’s Law, which marked its Big Five Zero birthday this week.
It’s unlikely that Gordon Earle Moore, the former electrical engineer who authored the eponymous law for a 1965 article, and who two-years later co-founded Intel, has any doubts over its value.
Chris Roberts has been in the news a lot this week, for all the wrong reasons. Roberts was banned from United Airlines after tweeting on a flight about his theoretical ability to hack into a plane's WiFi system. FBI agents detained him for an interview after his flight, and there is now a federal advisory alerting airline staff to look for passengers trying to hack into airplane WiFi.
Experts with the SANS Institute convened at RSA Conference for their annual threats panel, this time dishing on the six most dangerous new attack techniques. Led by SANS Director John Pescatore, the panel featured Ed Skoudis, SANS faculty fellow and CEO of CounterHack Challenges, Johannes Ullrich, dean of research for SANS, and Michael Assante, SANS project lead for Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA) security. Each offered up thoughts on how they've seen threats evolving and which techniques they expect to gain steam over the next year.
Full on neo-con philosophy underpinned Miliband’s “speech” to the Royal Institute of International Affairs yesterday. Miliband acknowledged that our bombing of Libya back to the stone age was the root cause of the boat people crisis.
Rt Rev David Walker, bishop of Manchester, says it is ‘unworthy’ for politicians to label displaced migrants as criminals, and country should take in ‘fair share’
It was an image that came to symbolise desperation and valour: the desperation of those who will take on the sea – and the men who ferry human cargo across it – to flee the ills that cannot keep them in their own countries. And the valour of those on Europe’s southern shores who rush to save them when tragedy strikes.
Last week on the island of Rhodes, war, repression, dictatorship in distant Eritrea were far from the mind of army sergeant Antonis Deligiorgis. The world inhabited by Wegasi Nebiat, a 24-year-old Eritrean in the cabin of a yacht sailing towards the isle, was still far away.
American drone-strike strategy in the Middle East is counterproductive because killing civilians, even if it’s accidentally, breeds more al-Qaeda or other radical militants, defense analyst Ivan Eland told RT.
The U.S. government's use of drone strikes came under mounting pressure on Friday, as Pakistan joined a chorus of criticism over the policy following the accidental killings of two al Qaeda hostages.
The White House said it was conducting "a thorough independent review to understand fully what happened and how we can prevent this type of tragic incident in the future" after it emerged that U.S. aid worker Warren Weinstein and Italian national Giovanni Lo Porto were killed by a CIA drone strike near the Pakistan-Afghanistan border.
This morning, the White House disclosed that a January 2015 drone strike, conducted in Pakistan by the CIA with the intention of taking out an al Qaeda compound, resulted in the deaths of two al Qaeda hostages who were not known to have been in the line of fire at the time of the attack. "The killing of American development expert Warren Weinstein and Italian aid worker Giovanni Lo Porto is the first known instance in which the U.S. has accidentally killed a hostage in a drone strike," Wall Street Journal's Adam Entous reported Thursday.
The Obama administration said Thursday that two American Qaeda operatives killed in Pakistan in January had not been “specifically targeted,” and officials added that the Central Intelligence Agency had no idea the two men were hiding in compounds under surveillance by armed drones when orders were given to carry out the strikes.
Barack Obama has insisted the US was not “cavalier” in its assessment of the risks to civilians as the accidental deaths of two hostages in a drone strike against al-Qaida overshadowed a planned pep talk for intelligence chiefs.
A U.S. drone killed an American and an Italian held hostage in a January attack on an al Qaeda compound in Pakistan, sparking new questions about the use of the controversial and still-evolving weapon.
The intelligence that underpinned the drone strike turned out to have been tragically incomplete, U.S. officials and lawmakers said Thursday. As a result, American development expert Warren Weinstein and Italian aid worker Giovanni Lo Porto lost their lives after years as captives of the militants.
The White House was forced to concede on Thursday that it killed two innocent hostages – one American, one Italian – in a drone strike that targeted an al-Qaida compound despite officials not knowing precisely who was in the vicinity.
But now the White House can’t deny it
Barack Obama inherited two ugly, intractable wars in Iraq and Afghanistan when he became president and set to work to end them. But a third, more covert war he made his own, escalating drone strikes in Pakistan and expanding them to Yemen and Somalia.
The drone’s vaunted capability for pinpoint killing appealed to a president intrigued by a new technology and determined to try to keep the United States out of new quagmires. Aides said Mr. Obama liked the idea of picking off dangerous terrorists a few at a time, without endangering American lives or risking the yearslong bloodshed of conventional war.
For those who took seriously President Obama’s stated goals of restoring accountability and legal legitimacy to U.S. counterterrorism operations, the 2013 speech at the National Defense University was one of the most significant watersheds of his presidency. In retrospect, though, it was one of the biggest disappointments.
You would have thought yesterday, upon hearing President Obama’s admission that a U.S. drone strike in Pakistan killed an American held hostage by al-Qaida, would rank among the most serious (and legitimate) scandals of his presidency. A disaster of this nature was bound to happen, given the White House’s loose standards for green-lighting drone strikes.
Yet the reaction was fairly ho-hum. Media coverage of the event and statements from members of Congress, allies and critics of the president alike, were basically, Well isn’t that sad. Also: It’s al-Qaida’s fault. Is al-Qaida in control of the United States’ drones? There are some pretty good hackers out there, but they haven’t mastered that capability yet.
About once a month, staff members of the congressional intelligence committees drive across the Potomac River to C.I.A. headquarters in Langley, Va., and watch videos of people being blown up.
Senate Armed Services Chairman John McCain (R-Ariz.) said it would be “crazy” to curtail drone usage because of the two deaths, though he urged significant review of this particular incident.
The White House on Thursday broke its silence after four months and admitted to have accidentally killed its elderly national Dr Warren Weinstein and Italian citizen Giovanni Lo Porto in January this year in the tribal areas straddling the Pak-Afghan border in pursuit of senior al-Qaeda leaders.
President Obama has chosen to operate his drone war in such unprecedented, absurd and arguably illegal secrecy that even in a rare burst of compelled transparency yesterday, neither he nor his press secretary could actually bring themselves to say the word “drone.”
This is one of the ugly realities of the war on terror. By using drones to kill members and leaders of some of the most evil organizations the world has ever known, innocent bystanders, children and woman are blown to bits along with the targeted foe. And I wish I had an answer, or even an alternative to this carnage. Do nothing and let these terrorists operate unmolested? Is it any of our business? Allies ask for our help; sometimes we’re bound by treaties. Should we send in our special forces and take these monsters out one at a time, surgically? Do we have that many SEALS and Green Berets? For every soulless, bloodthirsty terrorist we kill with a drone strike, we create hundreds more. And another issue, when do drones show up in the terrorist arsenal? More than one American drone has been shot down and captured by terrorist organizations. What happens when one of those Muslim countries with the technological capability steals our technology and manufactures their own drones on a large scale and send them to attack our friends such as Israel. What I know for sure is World War III is getting off to a fine start and so far there’s no end in sight. As in all wars I’ve lived through, I have more questions than answers, and I wish I could solve the problems, but I’m just an observer. I have one more question; is all this killing of innocents worth it? Oh, and one more question. How do we know when it’s over?
There is an eerie Orwellian cost to the Obama administration’s refusal to use the term “War on Terror” to describe its ... war on terror. In his briefing after the White House’s admission that two hostages – one American, one Italian – were killed in a U.S. “operation,” press secretary Josh Earnest struggled mightily to avoid the word “war” to describe exactly what the U.S.is up to. Finally he gave in and stated that under the Authorization for Use of Military Force Against Terrorists, the nation is “at war” with al Qaeda.
Why do the words matter? Because the inevitability of civilian casualties, even in the most justified of wars, is accepted both in international law and in the ethics of war. Civilian casualties are never good. They are a tragedy, a terrible cost that must be avoided whenever possible. But in wars, they happen.
Dominic Sansone is a cast and industrial-fabrication sculptor concerned about militarized and cultural violence.
American Drone strikes that inadvertently kill civilians are breeding distrust and even hatred for the United States in Afghanistan, according to Nasir Shansab, a former Afghan industrialist forced to flee his country.
"They believe that civilians are suffering more by drone attacks than real fighters do," he said during an appearance Friday on Newsmax TV's "America's Forum."
A year ago today, Hussein Ahmed Saleh Abu Bakr, a labourer, was travelling to work in Al-Bayda, central Yemen, with 11 colleagues including family members when a drone struck the car. When the attack was over, Hussein emerged from where he had taken cover to look for the other passengers and found his father, 65, slumped in the road with shrapnel injuries to his head and chest. The bodies of the other passengers were scattered around the area, with some injuries so severe, Hussein was only able to identify them from their clothing. Four of the passengers were killed: Sanad Nasser Hussein Al-Khushm, Abdullah Nasser Abu Bakr Al-Khushm, Yasser Ali Abed Rabbo Al-Azzani and Ahmed Saleh Abu Bakr.
The botched drone strike resulting in the death of two foreign hostages has once again brought the controversial nature of this tactic to the forefront. It is very sad that the death of two US men in a drone attack made headlines but other civilian deaths were swept under the carpet by describing them as collateral damage. The US does not realize the cost of these drone strikes and the resultant civilian causalities. These drone attacks are fueling the fire of radicalism in the Muslim world. Washington on and off expresses concern over the growing anti-America sentiments in the Muslim world but fails to identify the factors that lead to such a situation.
Drone strikes, by their nature, are bound to kill innocent civilians. It is all too easy to ignore this ugly fact — and the dubious morality of the whole enterprise — until the unfortunate victims happen to be Westerners.
They’re called lethal autonomous weapons, or LAWs, and their military mission would be to seek out, identify and kill a human target independent of human control. Human decision would not be in the loop, and the only button a military commander would push would be the “on” button. In military terms, it’s called “fire and forget.”
Now, it's hard to separate deaths due to disease and starvation, from the direct effects of warfare, with warfare creating refugee crises and destroying farms and so forth. It's also true that the financial resources to address human needs could be found in another place other than war, namely in the pockets of the greediest 400 people in the United States. Their hoarding of wealth, even those of them not principally funded by the war machine, can certainly be blamed as well when a child starves to death anywhere on earth. But blame is not a finite quantity. You can blame plutocracy or militarism, and niether one exculpates the other. Military spending could end starvation for the price of a small rounding error and is therefore culpable.
Announcing her latest campaign for the presidency, Hillary Clinton declared she was entering the race to be the champion for "everyday Americans." As a lawmaker and diplomat, however, Clinton has long championed military campaigns that have killed scores of "everyday" people abroad, from Iraq to Yemen. As commander-in-chief, there's no reason to believe she'd be any less a hawk than she was as the senator who backed George W. Bush's war in Iraq, or the Secretary of State who encouraged Barack Obama to escalate the war in Afghanistan. If her nomination is as sure a thing as people say, then antiwar organizing needs to start right away.
When Sen. Rand Paul (R-Ky.) declared his candidacy for the presidency, I will admit to having a certain excitement. In part, this feeling is based on the opportunity he offered to literally blanket myself in the Constitution. Another is the opportunity to read a political comic book — but the real reason is that he clearly embraces his willingness to be a voice of concern about American use of drones. In other words, Paul's campaign offers the most likely possibility that discussion and debate around the U.S. counterterrorism, military and diplomatic use of drones will reemerge. Despite the fact that the drone debate has quieted dramatically in the recent past, there are several reasons why the American populace needs to reengage with this important policy space prior to choosing our next president.
Democracies do not go to war with each other – or so it has been argued since 1795. But what if politics is, as Michel Foucault once claimed, the continuation of war by other means? And what if the boundaries between “violence” and “legitimate force” are blurred as they are in the German word Gewalt? That might enable us to imagine a “peaceful war” involving several aspects of the modern state, including elections. Whenever states engage in a “bloodless military confrontation” over elections, they are actually waging electoral warfare (EW). Indeed, the ‘existence’ of EW also suggests that international relations possess an electoral dimension that must be acknowledged and analyzed without prejudice.
After a speech I gave this past weekend, a young woman asked me whether a failure by the United States to properly surround and intimidate China might result in instability. I explained why I thought the opposite was true. Imagine if China had military bases along the Canadian and Mexican borders with the United States and ships in Bermuda and the Bahamas, Nova Scotia and Vancouver. Would you feel stabilized? Or might you feel something else?
The Saudi Arabia-led Sunni coalition versus the Iran-backed Shiite Houthi rebels in Yemen. The United Arab Emirates (UAE) versus ISIS in Syria. Qatar arming Islamist militias in Libya and rebels in Syria to battle government forces. It’s all good in the eyes of American merchants of war.
The raging conflicts in the Middle East have involved all kinds of U.S. weaponry built by and sold by defense contractors. They’ve made millions of dollars off weapons sales to the oil-rich Persian Gulf states, and they’re likely to make even more as these governments seek to replenish or upgrade their arsenals.
Saudi Arabia’s attacks on Yemeni rebels were made possible by F-15 fighter jets purchased from Boeing, while the UAE air force has hit ISIS in Syria using F-16s made by Lockheed Martin. The UAE also wants General Atomics’ Predator drones “to run spying missions in their neighborhood,” according to The New York Times.
The cover of Saturday’s New York Times featured the article discussed below with an updated headline, “Despite Errors, Drones Decimate Weakened Al Qaeda,” which adds in its sub-headline that the al Qaeda “leadership is ‘in tatters.’”
Also published on Saturday was the opinion of the editorial board that “it was important to see candor and remorse from President Obama in his apology” for the strikes that killed hostages. The editorial board, however, called for more than just an apology, urging the administration to release more information about how many civilians have been killed in Obama’s drone-based counterterrorism campaign.
"It's right that the White House has come clean and admitted its tragic mistake in killing these hostages, and our hearts go out to their families.
"It's worth remembering, however, that Dr. Weinstein and Mr Lo Porto are far from the first innocents to die by our drones, and in no other case has the US apologized for its mistake.
The reaction came a day after President Obama announced that two innocent hostages had been killed in a US counter-terrorism operation using lethal drones to target an al-Qaeda compound in Pakistan in January.
The Foreign Office expressed on Friday shock at the death of two western hostages in a US drone attack in tribal areas in January and recalled its criticism of the US drone war for causing collateral damage.
Why the sudden transparency about the American and Italian civilian victims but not the many non-Western civilians killed in US operations?
Obama's foreign policy has come under fire as it was revealed that the US dropped 1,600 bombs in Syria and Iraq last month alone at a cost of $8.5m (€£5.6m) a day, according to the Times newspaper.
US Senate Intelligence Committee Vice Chairman Dianne Feinstein said that an annual report on the number of deaths, both combatant and civilian, from US airstrikes should be public.
The United States should review counterterrorism procedures and develop an annual report on the number of terrorist and civilian deaths as a result of drone strikes, US Senate Intelligence Committee Vice Chairman Dianne Feinstein stated on Thursday.
“To the greatest extent possible, more information on US counterterrorism operations should be made public,” Feinstein said. “I believe this should include an annual report on the number of deaths — both combatant and civilian — from US strikes.”
About 2,000 oil spills a year take place in Finland, the large majority of which only leak small amounts of oil into the environment. Even so, cleanup of Finland's waterways and shores after oil leaks can take weeks, months or even years.
I work 70 hours a week doing two jobs but cannot make ends meet. Presidential hopefuls must make profitable federal contractors pay living wages
The US government's covert role in the brutal overthrow of President Salvador Allende — Chile's 9/11 — is angering Chileans once again.
Earlier this week, the national journalists association kicked out a prominent media mogul, Agustin Edwards. He is the 87-year-old owner and columnist of El Mercurio, a leading newspaper of record, and his family’s media group owns dozens more papers, magazines and other media companies.
How is it that people act and vote in contradiction to their self-interest so often and even with such passion?
People who run 'pirate' sites out of Russia have been given a final warning by the government. Amendments to local copyright law that come into force May 1 not only protect more content than ever before, but also contain provisions to permanently block sites that continually make unauthorized content available.
With debate gearing up over the coming expiration of the Patriot Act surveillance law, the Obama administration on Saturday unveiled a six-year-old report examining the once-secret programme to collect information on Americans’ calls and emails.
The Office of the Director of National Intelligence (ODNI) publicly released the redacted report following a Freedom of Information Act lawsuit by the New York Times. The basics of the National Security Agency (NSA) programme already had been declassified, but the lengthy report includes some new details about the secrecy surrounding it.
Congress is hellbent on passing a cybersecurity bill that can stop the wave of hacker breaches hitting American corporations. And they’re not letting the protests of a few dozen privacy and civil liberties organizations get in their way.
"Let me be clear: I understand the importance of what doors bring to privacy. But, imagine the problems if, well after humanity moved out of caves, the warrant authority of the government to investigate crime had only extended to dwellings without doors."
Bullshit. The DHS, along with other law enforcement agencies -- is seeking is the path of least resistance. It can get warrants to search encrypted devices. It just may not be able to immediately crack them open and feast on the innards. It may also get court orders to compel decryption. This is far less assured and risks dragging the Fifth Amendment down to the Fourth's level, but it's still an option.
When I first met my shrink, I wasn’t so sure about him. He’s handsome, fit, not much taller than me, reticent. I couldn’t tell if his reticence was disapproval and judgment or if he was just doing his job: staying quiet, staying neutral. I’m new to therapy, and, frankly, had wanted a woman therapist, but here I was with this silent, unreadable man and I didn’t know how to feel comfy about it.
So I Googled him. I found his Facebook page, saw that he might be a band geek (like me), that he seems generally empathetic and that he has a cute dog that sometimes wears clothes.
That’s how I got comfortable.
A couple of weeks ago, Anna Fels wrote for the New York Times about patients Googling their therapists. Written from the perspective of a Googled therapist, the piece cautions against the ways in which knowing about your doctor’s personal life can affect the experience of therapy. She also acknowledged it happens in the other direction, too: ER nurses, for instance, are Googling their patients to find out if they’re criminals, or if they’re famous, or just if they’re anything interesting at all.
Whatever you think about the morality of using mass surveillance to catch evildoers, the technology only works if people can use it -- just ask the CIA. The New York Times has obtained a declassified report revealing that that the agency was largely kept in the dark about the President's Surveillance Program (aka Stellarwind), which allows for bulk data collection, until at least 2009. Only the highest-ranking officials could use PSP as a general rule, and those few agents that did have access often didn't know enough to use it properly, faced "competing priorities" or had other tools at their disposal. To boot, there wasn't documentation showing how effective the program was in fighting terrorism.
A newly-released document from the Central Intelligence Agency’s (CIA) own internal watchdog found that the government’s controversial warrantless surveillance and bulk data collection program was so secretive that the agency was unable to make “full use” of its capabilities even several years after the September 11 attacks. Initially, only top-level CIA officials were cleared on its use, rather than rank-and-file "CIA analysts and targeting officers.”
In an interview at the BoxDEV developer event in San Francisco today, Google executive chairman Eric Schmidt said end-to-end encryption for services like Google's is the solution to mass online government surveillance.
"What do you think of the state of cyber security in the USA today?" Box CEO Aaron Levie asked Schmidt during an onstage talk at BoxDEV on Wednesday.
Google (GOOGL) Chairman Eric Schmidt boasted on Wednesday about how improving the encryption of Google's products has successfully shut out warrantless surveillance by the NSA and other law enforcement. Schmidt talked about the encryption advances, and how former NSA contractor Edward Snowden's leaks prompted them, at BoxDev, a yearly developers conference for Box.
Modifications made on behalf of the National Security Agency have paved the way for the return of a major piece of surveillance reform legislation, the Guardian has learned.
Former National Security Agency Director Keith Alexander has asked the U.S. intelligence agency to review patent filings by his company to make sure that they do not reveal any secrets or misappropriate any government work.
Mike Rogers, former chairman of the House intelligence committee, says the NSA needs to preserve its wide powers in case of an attack on US homeland
The secrecy surrounding the National Security Agency’s post-9/11 warrantless surveillance and bulk data collection program hampered its effectiveness, and many members of the intelligence community later struggled to identify any specific terrorist attacks it thwarted, a newly declassified document shows.
"Someone hacked into the Department of Defense [DoD] network," he said.
Former Attorney General Alberto Gonzales downplayed a dispute between the White House and Justice Department over the program's legality, previously classified documents say.
Germany's intelligence service, the Bundesnachrichtendienst (BND), has been helping the NSA spy on European politicians and companies for years, according to the German news magazine Der Spiegel. The NSA has been sending lists of "selectors"—identifying telephone numbers, e-mail and IP addresses—to the BND, which then provides related information that it holds in its surveillance databases. According to the German newspaper Die Zeit, the NSA sent selector lists several times a day, and altogether 800,000 selectors have been requested.
Germany was in an uproar when news broke that the National Security Agency (NSA) had been monitoring Chancellor Angela Merkel’s phone calls and communications. Now it turns out that German intelligence agency BND (Bundesnachrichtendienst) was passing select information — including phone numbers and IP addresses — to the NSA on politicians and defense contractors in Europe, reports Der Spiegel.
The German intelligence agency has found itself in the middle of another scandal following the 2014 revelations that the NSA had tapped the German chancellor’s cellphone.
Security researchers have developed a method for detecting NSA Quantum Insert-style hacks.
Fox-IT has published free open-source tools to detect duplicate sequence numbers of HTTP packets, with different data sizes, that are the hallmarks of Quantum Insert.
The utilities developed by Fox-IT are capable of exposing fiddling with HTTP packets but are no by no means perfect and might themselves be circumvented, as a blog post by Fox-IT explains.
Among all of the NSA hacking operations exposed by whistleblower Edward Snowden over the last two years, one in particular has stood out for its sophistication and stealthiness. Known as Quantum Insert, the man-on-the-side hacking technique has been used to great effect since 2005 by the NSA and its partner spy agency, Britain’s GCHQ, to hack into high-value, hard-to-reach systems and implant malware.
Apple hasn't patched admin privilege backdoor in 10.10.3, it's claimed
A former NSA staffer says that the OS X 10.10.3 update which Apple claims fixed a significant security vulnerability has failed to do so, reports Forbes. Patrick Wardle, who now heads up research at security firm Synack, demonstrated the vulnerability in a video (without revealing exactly how it was done) to allow Apple time to issue a further fix.
Jeb Bush, a likely presidential contender, said Tuesday that President Obama’s greatest accomplishment was keeping in place controversial spying programs at the National Security Agency.
“I would say the best part of the Obama administration would be his continuance of the protections of the homeland using the big metadata programs,” Bush said in an interview on the Michael Medved radio show.
One of the most glaring myths propagated by Washington — especially the two parties’ media loyalists — is that bipartisanship is basically impossible, that the two parties agree on so little, that they are constantly at each other’s throats over everything. As is so often the case for Washington partisan propaganda, the reality is exactly the opposite: from trade deals to Wall Street bailouts to a massive National Security and Penal State, the two parties are in full agreement on the bulk of the most significant D.C. policies (which is why the leading candidates of the two parties (from America’s two ruling royal families) will have the same funding base). But because policies that command the agreement of the two parties’ establishments are largely ignored by the D.C. press in favor of the issues where they have some disagreements, the illusion is created that they agree on nothing.
Sen. Rand Paul (R-Ky.) says the National Security Agency’s domestic spying program is “one of the worst parts of the Obama administration,” a jab not only at the current president but also fellow Republican Jeb Bush.
As Congress considers whether to extend the life of a program that sweeps up American phone records, privacy advocates and civil liberties groups say too much about government surveillance remains secret for the public to fully evaluate its reach or effectiveness.
Germans by and large are wary of surveillance in all its forms, and nowhere is that more apparent than at the Big Brother Awards, which awards “prizes” to organizations and individuals around the world making especially egregious use of Germans’ private personal data.
Germans by and large are wary of surveillance in all its forms, and nowhere is that more apparent than at the Big Brother Awards, which awards “prizes” to organizations and individuals around the world making especially egregious use of Germans’ private personal data.
A Senate skirmish over National Security Agency (NSA) reform has stalled the upper chamber’s plan to move a major cyber bill.
The House on Wednesday passed major legislation intended to improve the nation's defenses against cyberattacks, Congress's first significant step toward attempting to limit the kind of debilitating hacks that brought Sony Pictures to its knees five months ago.
After promising so much the highly anticipated encrypted chat project Hemlis has come to an end. The software was left with too many obstacles to overcome, not least the absence of former Pirate Bay spokesman Peter Sunde who was arrested and taken away to serve his jail sentence for copyright infringement last summer.
The National Security Agency (NSA) collaborated with New Zealand on a plan to digitally monitor Chinese diplomats, according to documents obtained by former NSA contractor Edward Snowden.
The operation centered on breaking into a data link between two Chinese diplomatic offices in Auckland, New Zealand’s largest city.
While it is unclear whether the break-in ever took place, Snowden’s documents reveal that the NSA and New Zealand were “formally coordinating” on the plan in 2013.
In Germany, a country considering broad new regulations to prevent citizens’ data from being passed through U.S.-based servers, a new consortium is promising a home automation platform that will keep its customers’ data within European borders.
Ultimate privacy Apps : Top three Apps to prevent NSA and cyber criminals snooping on you
The US Government has been busy on the encryption front in both positive and negative ways. On the positive front, there is a major effort underway to move all government websites to HTTPS; I’ll discuss that in a future post. But on the problematic and negative side of the ledger, we once again turn to the NSA.
Over the last four months, hackers traced back to the Chinese regime have been trying to breach the computers of NSA historian Matthew Aid. He recently detected two attempted breaches, one on April 2 and another on April 11, which he documented Monday on his blog.
The Chinese Foreign Ministry said Monday that they were "seriously concerned" by reports that New Zealand spies collaborated with the US National Security Agency to spy on Chinese diplomats.
In a speech at cybersecurity conference RSA, U.S. Secretary of Homeland Security Jeh Johnson outlined the government’s discomfort with increasing implementation of encryption by technology companies, and what impact the shift might have on national security.
Humanitarian imperialism as applied to what the Pentagon loves to define as MENA (Middle East-Northern Africa) has led, according to Amnesty International, "to the largest refugee disaster since the Second World War."
We urge you to end mass surveillance of Americans. Among us are civil liberties organizations from across the political spectrum that speak for millions of people, businesses, whistleblowers, and experts. The impending expiration of three USA PATRIOT Act provisions on June 1 is a golden opportunity to end mass surveillance and enact additional reforms.
After Michael Slager gunned down Walter Scott in a North Charleston park, a deafening chorus of voices has emerged, insisting that “the system worked.” And they are right. The system did work, just not in the way that they mean.
The system didn’t only begin to work when the video of the shooting emerged days later: it went into motion immediately. The system began to work when Slager cuffed a dying man and then ran (ran!) back to grab his alibi, the Taser he would then plant near Scott’s failing body (as some have noticed, Slager did so in an eminently practiced way).
The British-Yemeni journalist Abubakr Al-Shamahi put it succinctly: “It makes me angry that non-Western civilian victims of drone strikes are not given the same recognition by the US administration.” The independent journalist Naheed Mustafa said she was “hugely irritated by the ‘drone strikes have killed good Westerners so now we know there are issues with drones’ stories.” The Washington Post’s Eugene Robinson this morning observed: “It is all too easy to ignore … the dubious morality of the whole enterprise — until the unfortunate victims happen to be Westerners. Only then does ‘collateral damage’ become big news and an occasion for public sorrow.”
New Zealand Prime Minister John Key apologized on Wednesday for pulling the ponytail of a waitress who accused him of bullying, media reported.
The unnamed waitress in an Auckland cafe said on a blog site that Key had pulled her hair over several months and initially she thought he was being "playful and jolly." However, she said Key kept pulling her hair when he visited the cafe over a six-month period and she became increasingly annoyed.
Marleny Olivo scrawled a note on the fruit and hurled it at the head of the passing Nicolás Maduro – and has now been promised a place to live
General David Petraeus – the former head of US forces in Iraq and Afghanistan and briefly the head of the CIA – has been sentenced to two years' probation and fined $100,000 after admitting leaking America's secrets to his lover.
Married Petraeus, 62, handed over military logs containing classified material to his official biographer, and mistress, Paula Broadwell. He also lied to FBI agents during their investigating into the case, and faced charges that could have put him behind bars for up to five years.
David Petraeus, a retired US four-star general and former CIA director, has been put on probation and fined for leaking material to his mistress.
Lawyers for Jeffrey Sterling, convicted earlier this year of leaking classified information to New York Times reporter James Risen, urged today that Sterling “not receive a different form of justice” than David Petraeus, the former general and CIA director who has pleaded guilty to a misdemeanor for leaking classified information to his biographer.
The US based Ford Foundation is not new to controversies. Many call it a front for the American external spying agency CIA. There have been thousands of articles and research papers on Ford Foundation's CIA links. Even in India, the Ford Foundation is accused of funding the NGOs and movements which actually work against India's socio, political and economic interests.
On Thursday, the U.S. Defense Secretary Ashton Carter admitted that Russian hackers had infiltrated into Pentagon’s computer network earlier this year. It was the latest high-profile hack of the U.S. government networks by Russian hackers. Over the past few months, Washington has also accused China of hacking the U.S. satellite network, weather systems, and the U.S. Postal Service network.
President of the Parliamentary Assembly of the Council of Europe (PACE), Anne Brasseur, welcomed in a press release on Friday the admission of former Romanian President Ion Iliescu of his knowledge of a secret CIA (United States Central Intelligence Agency) prison in Romania.
Ion Iliescu said, in an interview granted to Der Spiegel, that he approved “in principle” over 2002-2003, a request made by the USA to set up a CIA center in Romania, but he did not know it was a unit meant for detention. Details of the project were established by Ioan Talpes, the head of the presidential Administration, Der Spiegel writes.
In the long debate over torture, there remains only one instance when a CIA interrogator ever faced trial for torture – and he was convicted. That CIA contractor, David Passaro, is now speaking out in a new Retro Report documentary.
A bizarre twist came during the fourth day of testimony in the civil contempt trial against Maricopa County Sheriff Joe Arpaio and four of his top deputies.
Speaking on the stand and taking questions from the judge, MCSO chief deputy Jerry Sheridan said the department was working with a man named Dennis Montgomery who was identified as a former employee of the Central Intelligence Agency.
Montgomery was a confidential informant, or CI for the sheriff's office. While living in Seattle, he purportedly gave information to MCSO about a CIA operation that was secretly gathering personal information on United States citizens, according to Sheridan.
The controversy over alleged Russian "aggression" in Ukraine is already raining on the Kremlin parade with which Russia will mark the 70th anniversary of the Allies' victory over Adolf Hitler and the Nazis on May 9. U.S. President Barack Obama set the tone by turning down the Kremlin's invitation to take part in the celebration, and allies in Western Europe have been equally uncouth in saying No.
Today is the forty eighth anniversary of the military coup.
“The Internet is not a CIA creation,” Tim Berners-Lee, a London-born computer scientist who invented the Web in 1989 – the year that the Berlin Wall collapsed – told media when asked about Putin’s CIA comment.
Berners-Lee said the Internet was invented with the help of U.S. state funding, but was spread by academics.
“It was the academic community who wired up their universities so it was put together by smart, well-meaning people who thought it was a good idea,” he said.
Berners-Lee has previously scolded the United States and Britain for undermining the Internet’s foundations with their surveillance program. He has also called on China to tear down the “great firewall” that limits its people’s access to the Internet.
The already bitter fight between the White House and the progressive base over trade policy has turned ugly after President Obama said his critics on the left “don’t know what they’re talking about” and compared their arguments to conspiracy theories about “death panels.”
Progressives trade critics are up in arms over the comments, made Thursday night to a gathering of Organizing for Action, the grassroots group that spun off of Obama’s presidential campaign, at the Ritz Carlton hotel in Washington, D.C.
BitTorrent Inc., the company behind the popular uTorrent file-sharing client, has laid off close to a third of its U.S. workforce. Speaking with TorrentFreak a source close to the company says that up to 45 workers had their contracts terminated Thursday, "gutting" the company's advertising team and pushing more work to its offices in Minsk, Belarus.