07.26.16
Posted in America, Microsoft, Patents at 5:23 pm by Dr. Roy Schestowitz
Microsoft has swallowed everything it could from within Yahoo!
“Bartz says search engine Bing unlikely to make significant mark”
–MarketWatch (June 2009)
Summary: A look at what happens to companies whose value is a house of software patents rather than code and a broad base of users/customers
QUINN (Watchtroll), who does not know how software works, is actually one of the most vocal proponents of software patents out there. He can also be quite rude when he doesn't get his way. Watch how Watchtroll bemoans being rejected over a bogus software patent application, then calling the process “bogus” (blaming/hating the game, not the player). Benjamin Henrion politely asked him: “Which part of abstract you don’t understand?”
As we have been showing here since 2014, Alice is having a profound effect on software patenting in the US and this new blog post looks into how Alice eliminates software patents (or does not). As one might expect, the legal profession only focuses on the rare cases where software patents somehow survive scrutiny (they hope to replicate the outcome).
“There is so much at stake here (billions if not a trillion dollars across all companies).”Curiously enough — albeit not too shockingly — since Monday morning we have been seeing a lot of articles about the sale of Yahoo! (there were rumours about it over the weekend). Journalists are rewriting the recent history of Yahoo! and omitting the role of Microsoft in killing Yahoo. A few months ago people noted that Alice would significantly reduce the value of Yahoo, but what about the damage caused by Microsoft, reducing the bidding price for the company by almost 90%? This new article titled “Yahoo, Verizon Deal Clears Way for Patent Sale” says that “Yahoo’s sale of its core internet business to Verizon on Monday opens the door for the company’s next major step — the sale of more than 3,000 granted and pending patents covering e-commerce, search and other components of the modern web.”
It also noted that Alice “resulted in many software patents being thrown out. Many top tech firms also already have cross-licensing deals with Yahoo, so a firm purchasing the patents would face barriers to monetizing them.”
One has to wonder how much of their value companies like IBM and Microsoft lost after Alice. There is so much at stake here (billions if not a trillion dollars across all companies). The bubble has burst. █
Permalink
Send this to a friend
Posted in Europe, Patents at 4:57 pm by Dr. Roy Schestowitz
Summary: The EPO does the usual right-wing thing (exploiting disaster/emergency for domestic crackdowns), but some bemoan the omission of the explosion at Ansbach (also in Germany)
IT was so obvious that the EPO would mention the attack on Monday. We predicted this over the weekend, having seen Battistelli (personally) milking just about every major incident outside of Germany (especially in France and in one case Belgium, then the US).
“Let us now wait and see whether Mr. Battistelli will express heartfelt sympathy to” Munich, one person wrote, alluding specifically “to the people of the host nation of the EPO headquarters.”
“How very Republican of him.”The “news” item (yes, they filed this under news) came a bit later than usual and it came from the EPO this time, for a change (it did not mention Battistelli, perhaps for the first time ever). It said (warning: epo.org
links can be tracked by HTTP_REFERER
) not so much and later on this was mentioned in Twitter.
One person says that “Battistelli has belatedly expressed his solidarity with the citizens of Munich.”
“But what about the people of Ansbach? Are they second-class citizens? Does he not care about them?”
Another person writes: “It is well known, several people, perhaps more, have been summoned to the president and told, “You are either for me, or you are against me.” It cannot be accepted, that a civil service career should serve a personality cult, and that threats to career and eventually pensions used as the weapons to enforce that cult. The crash when it comes will be big, unfortunately for those of us who are still trying to apply the EPC, which is in fact our only master.”
Battistelli, as we noted before, is trying to unify the staff around a common cause which is war on terror (“You’re either with us, or against us”). How very Republican of him. Watch what happens in Turkey this month. █
Permalink
Send this to a friend
Posted in Deception, Europe, Patents at 4:32 pm by Dr. Roy Schestowitz
Summary: Flogging the dead UPC horse at times of great uncertainty (enough to bring the UPC to a standstill)
THE EPO lies not only to journalists but also to staff, as we showed here numerous times before. “The European patent microcosm tries to convince itself that its Unitary Patent castle is not collapsing,” wrote someone who was bullied by the EPO some years ago because he had criticised the UPC (Battistelli's EPO is very legally aggressive towards UPC critics). He links to the latest nonsense from the EPO — nonsense which we rebutted earlier this month.
“What we have here is lobbying and meddling by patent lawyers and other who stand to profit from more litigation in more places.”The Kluwer Patent Blog, one of the biggest pushers of the UPC for a number of years now, still pretends that IP Federation somehow speaks for British businesses, but people should know better. To quote the latest regarding IP Federation: “The IP Federation in the UK is even more adamant. In a position paper published this week, it states that certainty regarding the future should be a prerequisite for further steps by the UK government and parliament: ‘We support the Unitary Patent), and the Unified Patent Court with the UK participating on the current terms, including the location of the branch of the Central Division in London. Without a guarantee of continued UK participation post-Brexit, the UK should not ratify the UPC at present. We consider that ratifying the UPC to bring it into effect and subsequently being forced to leave the system would bring an unacceptable amount of uncertainty to industry across the UK and EU.’”
What we have here is lobbying and meddling by patent lawyers and other who stand to profit from more litigation in more places. Team UPC (people from the inside) is still at it in spite of Brexit, but what will they say when it all fizzles and goes away? Over the past few weeks we saw very little coverage about the UPC (virtually none). It seems like it’s dying or at least put on the ice. █
Permalink
Send this to a friend
Posted in America, Europe, Patents at 4:14 pm by Dr. Roy Schestowitz
Without patent quality, convergence is reached near registration/filing rather than proper examination (but with a hefty price tag)

I left my bank when it bragged about giving a mortgage to nine out of ten applicants
Summary: The Government Accountability Office in the United States produces reports which can serve as a timely warning sign to the European Patent Office, where patent quality is rapidly declining in order to meet ‘production’ goals
THE USPTO has been scrutinised here for a number of years primarily because of patent quality (or lack thereof). Few people can honestly say that it’s hard to get granted a patent at the USPTO (there are like 10 million of them and one single company like IBM can gain 7,355 patents in just one year). Recent figures suggest that eventually 92% of applications are “successful”, so what kind of quality control is that? Engineers at Sun once joked about how silly an application can be accepted and even competed over this as applicants (to see who gets the stupidest patent claims through the examiners). A lot of granted patents are simply dubious, but small companies would not be able to afford challenging them in court (or it would be a lot more expensive than simply settling).
“When the Government Accountability Office (GAO) asks for improvement in patent quality it also alludes to patent scope and software patents explicitly.”Matt Levy, who habitually complains about patent trolls and even about software patents (in his more recent articles), has just mentioned the US Government Accountability Office's rant about US patent quality (which we first wrote about last week). He says [1, 2] that “[e]ven if you’re not a patent lawyer, you’ve probably noticed that patents have been in the news more. The growing problem of patent trolls, companies who make their money by suing other companies for patent infringement, has been the primary reason. Patent trolls now account for nearly two-thirds of all patent infringement lawsuits, draining billions of dollars away from productive companies.”
According to this article (behind paywall) a “US High Court Restores Treble Damages For Patent Infringement,” which means that things are not necessarily improving.
When the Government Accountability Office (GAO) asks for improvement in patent quality it also alludes to patent scope and software patents explicitly. Benjamin Henrion said that “improving quality does not mean much for the average programmer, just more spam.” Well, in practice, raising the bar may mean that few software patents would be authorised at all (both at the courts and the patent office). That’s definitely a step forward. IBM’s Manny Schecter, a longtime proponent of software patents, was yammering that: “Backlog easy to measure, quality not, but…”
Backlog depends on the number of examiners or the lenience of examination. There are some correlations there and under David Kappos, who had joined from IBM, the USPTO tackled backlog by just granting lots of things faster (basically the same error Battistelli and his goons make at the EPO).
Here is a good article about the GAO report. It says: “The Patent and Trademark Office, at a time of rising lawsuits charging patent infringements, needs to improve quality and better monitor examiners’ work, a watchdog found.
“This is not a sign of innovation. Quite the contrary.”“In a pair of reports and staff survey released on Wednesday, the Government Accountability Office said that patent examiners report being pressed for time as they process patent applications without a consistent and clear definition of quality.
““District court filings of new patent infringement lawsuits increased from about 2,000 in 2007 to more than 5,000 in 2015, while the number of defendants named in these lawsuits increased from 5,000 to 8,000 over the same period,” GAO wrote in one report addressing quality in intellectual property protections.”
This is not a sign of innovation. Quite the contrary. A patent trolls expert (he conducted academic studies on the subject), Professor James Bessen, said: “The GAO finds Patent Office issues 1000s of “unclear & overly broad” patents, causing excessive litigation” (“Stop issuing Software Patents & there wouldn’t be a backlog” was one response to this).
“Most disputes concern new computer technology and software,” according to another new article about the GAO study/reports. Just like in the EPO, the US office is “focusing too much on the timeliness of reviews, customer service and “process or production goals” rather than quality.”
It’s added that “[e]xaminers are rated largely on their production, auditors said, and they are given different times” and “GAO recommended that the agency define what is a good patent, update its performance goals for reviewers” (the same should be done at the EPO). █
Permalink
Send this to a friend
Posted in GNU/Linux, Google, Microsoft, Patents at 3:26 pm by Dr. Roy Schestowitz
Summary: Highlighting just two of the many entities that Microsoft (and partners) use in order to induce additional costs on Free (as in freedom) software
AN article from exactly 5 years ago spoke about Intellectual Ventures, Microsoft’s largest patent troll. To quote the outline from BoingBoing: “NPR’s Planet Money looks at Intellectual Ventures, the patent-exploitation firm started by former Microsoft CTO Nathan Myhrvold. Intellectual Ventures presents itself as a firm that goes to bat for inventors, buying up their patents with the intention of getting big guys who abuse them to pay up. But the reality discovered by Planet Money is very different: Intellectual Ventures doesn’t put up very many compelling reference customers for their “protecting and enriching inventors” mandate, but there are examples of patents being sold on again to out-and-out trolls who make nothing but lawsuits, using shaky patents to attack big and small firms and extract rent from them. It appears there’s even a town in Texas where empty office buildings house the “headquarters” of shell companies who buy poor-quality patents from distressed companies and get big judgements from a sympathetic local court. Overall, Planet Money paints a picture of software patent aggregators like IV as parasitic bullies who use their enormous patent portfolios to intimidate other firms into paying fees that end up being incorporated into the prices that you and I pay when we buy goods and services.”
Well, Intellectual Ventures is still being treated so favourably by IAM, which receives money from patent trolls and sets up events for them. Today it said that “a slowdown in buying activity at Intellectual Ventures (IV) has been highlighted as having had a substantial impact on Transpacific’s income.”
Layoffs at Intellectual Ventures have been mentioned over the past couple of years, but as Intellectual Ventures is not Microsoft’s only weapon we can look further into another new IAM article which says: “Recently published research has shed new light on the strategies employed by the world’s three leading sovereign patent funds (SPFs) – while discussion about the creation of similar entities in other countries appears to be picking up.”
Towards the end it says that “$4.5 billion eventually paid for it by the Rockstar consortium,” which is a Microsoft-connected patent troll we wrote about in past years. This is the troll which already targets Android/Linux with lawsuits [1, 2, 3, 4], just as Intellectual Ventures did (albeit less directly). █
Permalink
Send this to a friend
Posted in News Roundup at 2:34 pm by Dr. Roy Schestowitz

Contents
-
Desktop
-
With nine days to go, Microsoft really, really wants you to claim your free upgrade to Windows 10. Come to think of it, Microsoft has really, really wanted you to upgrade your Windows 7 or 8.1 PC to Windows 10 for more than a year, and backed it with the GWX subsystem — first installed by KB 3035583 in March 2015, 15 months ago.
-
Server
-
Docker is growing by leaps and bounds, and along with it, its ecosystem. Being light, the predominant container deployment involves running just a single app or service inside each container. Most software products and services are made up of at least several such apps/services. We all want all our apps/services to be highly available and fault tolerant. Thus, Docker containers in an organization quickly start popping up like mushrooms after the rain. They multiply faster than rabbits.While, in the beginning, we play with them like cute little pets, as their numbers quickly grow we realize we are dealing with a herd of cattle, implying we’ve become cowboys. Managing a herd with your two hands, a horse, and a lasso will only get you so far. You won’t be able to ride after each and every calf that wonders in the wrong direction. To get back to containers from this zoological analogy—operating so many moving pieces at scale is impossible without orchestration—this is why we’ve seen the rise of Docker Swarm, Kubernetes, Mesos, CoreOS, RancherOS, and so on.
-
A massive transformation is underway in the way we manage IT infrastructure. More companies are looking for improved agility and flexibility. They are moving from traditional server stacks to cloudy infrastructure to support a new array of applications and services that must be delivered at breakneck pace in order to remain competitive.
-
Yet Bob does not believe the devops hammer should be used on anything that looks remotely like a nail. Accounting systems, supply chain management systems, warehouse management systems, and so on do not benefit from the constant modification enabled by devops. Those are bound by precise, interlocking processes along with granular permissions and regulations. Here, continuous change invites disaster of the type that ITIL-huggers and OCM (organizational change management) proponents fear most.
-
Kernel Space
-
-
-
-
Linux Kernel 4.7 was released this week with a total of 36 contributions from five Collabora engineers. It includes the first contributions from Helen as Collaboran and the first ever contributions on the kernel from Robert Foss. Here are some of the highlights of the work Collabora have done on Linux Kernel 4.7.
Enric added support for the Analogix anx78xx DRM Bridge and fixed two SD Card related issues on OMAP igep00x0: fix remove/insert detection and enable support to read the write-protect pin.
Gustavo de-staged the sync_file framework (Android Sync framework) that will be used to add explicit fencing support to the graphics pipeline and started a work to clean up usage of legacy vblank helpers.
-
For users who are running some form of Linux, this should come as welcome news–the final version of the Linux Kernel 4.7 is now finally released. Linux founder Linus Torvalds said of the announcement, “Despite it being two weeks since rc7, the final patch wasn’t all that big, and much of it is trivial one- and few-liners. There’s a couple of network drivers that got a bit more loving.”
-
-
Graphics Stack
-
Applications
-
I think my initial fascination with Linux was based on rebuilding all my old, broken computers laying around my office/garage. I was having a ton of fun, pulling components out of old computers, installing various distros and seeing what worked/didn’t work. And then there was the 3D desktop cube, which was pretty awesome! Pretty soon I had built my kids their own computer, with “safe” web-browsing, education games, etc. It was many months of playing around with Linux before I learned about Python and started slowly getting more into the programming side of things.
-
OpenVZ, a long-standing Linux virtualization technology and similar to LXC and Solaris Containers, is out with their major 7.0 release.
OpenVZ 7.0 has focused on merging the OpenVZ and Virtuozzo code-bases along with replacing their own hypervisor with that of Linux’s KVM. Under OpenVZ 7.0, it has become a complete Linux distribution based upon VzLinux.
-
I’m pleased to announce the release of OpenVZ 7.0. The new release focuses on merging OpenVZ and Virtuozzo source codebase, replacing our own hypervisor with KVM.
-
Git-cinnabar is a git remote helper to interact with mercurial repositories. It allows to clone, pull and push from/to mercurial remote repositories, using git.
-
In the preceding post, I explained the use cases for the FreeIPA lightweight sub-CAs feature, how to manage CAs and use them to issue certificates, and current limitations. In this post I detail some of the internals of how the feature works, including how signing keys are distributed to replicas, and how sub-CA certificate renewal works. I conclude with a brief retrospective on delivering the feature.
-
Last year FreeIPA 4.2 brought us some great new certificate management features, including custom certificate profiles and user certificates. The upcoming FreeIPA 4.4 release builds upon this groundwork and introduces lightweight sub-CAs, a feature that lets admins to mint new CAs under the main FreeIPA CA and allows certificates for different purposes to be issued in different certificate domains. In this post I will review the use cases and demonstrate the process of creating, managing and issuing certificates from sub-CAs. (A follow-up post will detail some of the mechanisms that operate behind the scenes to make the feature work.)
-
The second Armadillo release of the 7.* series came out a few weeks ago: version 7.200.2. And RcppArmadillo version 0.7.200.2.0 is now on CRAN and uploaded to Debian. This followed the usual thorough reverse-dependecy checking of by now over 240 packages using it.
For once, I let it simmer a little preparing only a package update via the GitHub repo without preparing a CRAN upload to lower the update frequency a little. Seeing that Conrad has started to release 7.300.0 tarballs, the time for a (final) 7.200.2 upload was now right.
Just like the previous, it now requires a recent enough compiler. As g++ is so common, we explicitly test for version 4.6 or newer. So if you happen to be on an older RHEL or CentOS release, you may need to get yourself a more modern compiler. R on Windows is now at 4.9.3 which is decent (yet stable) choice; the 4.8 series of g++ will also do. For reference, the current LTS of Ubuntu is at 5.4.0, and we have g++ 6.1 available in Debian testing.
-
Instructionals/Technical
-
Games
-
The Stardew Valley developer tweeted out a password for a beta, but after discussing it with them on their forum I was able to show them that we can’t actually access it yet.
While what I was telling them may not have been entirely correct (SteamDB is confusing), the main point I made was correct. Normal keys are not able to access the beta yet, but beta/developer keys can, as it’s not currently set for Linux/Mac as a platform for us.
-
Human: Fall Flat is an open-ended physics puzzler with an optional local co-op mode, developed by No Brakes Games, and available now on Steam for Linux.
-
Controlling a party of adventurers, exploring dungeons and fighting weird magical creatures is an RPG tradition as old as the genre. Expect all that and more in this modern iteration of the classical dungeon crawler.
-
Desktop Environments/WMs
-
In case you ever wanted to have a Node.js window manager, there’s now one that works for X11 environments that works on Chrome OS, Debian, and friends.
-
K Desktop Environment/KDE SC/Qt
-
Now that the third and last maintenance update of the KDE Applications 16.04 software suite has debuted, it’s time for us to take the Beta build of the next major KDE Applications release for a test drive.
-
After working for several weeks on our WikiRating:Google Summer of Code project Davide, Alessandro and I have slowly reached up to the level where we can now visualize the entire project in its final stages.
-
GNOME Desktop/GTK
-
-
More than a week ago I blogged about the new GUI made with GtkBuilder and Glade [1]. Now, I will talk about what has changed since then with the GUI and also the new functionality that has been added to it.
I will start with the new “transition” page which I’ve added for the key download phase. Before going more in depth, I have to say that the app knows at each moment in what state it is, which really helps in adding more functionality.
-
-
Chakra GNU/Linux developer Neofytos Kolokotronis today, July 25, 2016, announced the release of the latest KDE and Qt technologies, along with new software versions in the main repositories of the Linux kernel-based operating system.
-
Reviews
-
Point Linux released their newest version, 3.2, in June 2016. Their goal is, “To combine the power of Debian GNU/Linux with the productivity of MATE, the GNOME 2 desktop environment fork. Point Linux provides an easy-to-set-up-and-use distribution for users looking for a fast, stable and predictable desktop.”
Point Linux aims to use MATE as their primary desktop environment, but also offers Xfce as an option. The Point Linux website is simple and professional. The download page is full of fresh and very nice options that allow the user to download the exact distro they require to fit their needs. Some of the options include 32- or 64-bit, torrent or direct download, and the location of the download server. I found using the website was effortless and the options available cut down on the download time (by giving the option to torrent or the location of the server) and lowered the install time by giving the consumer options before retrieving the whole file.
The MATE desktop environment (DE) is available in the standard Debian installation media, but the full Debian installer image is 4.7GB, overwhelmingly large, and has too many DE options to make the disc any smaller. This is the small void that Point Linux fills. They provide the MATE desktop environment (or Xfce) and a significantly smaller live OS / installation media. Even when selecting the full featured desktop from the options on their website, the Point Linux installer is only 1.00GB. The “Desktop with core components” option lowers this installation media size further to 772MB.
-
PCLinuxOS/Mageia/Mandriva Family
-
Kate Lebedeff from the OpenMandriva project informed Softpedia about the availability of the first Release Candidate (RC) development build of the upcoming OpenMandriva Lx 3.0 operating system.
-
OpenSUSE/SUSE
-
During the last weeks, the openSUSE board and others expressed their concern about the current state of some openSUSE infrastructure: especially the reaction times to change something in the setup were mentioned multiple times. Looks like we lost some administrators and/or contact points at SUSE who helped out in the past to eliminate problems or work together with the community.
As result, there was a meeting held during the openSUSE Conference 2016, including some SUSE employees and openSUSE community members to discuss the current situation and search for some possible solutions. The discussion was very fruitful and we’d like to share some of the results here to inform everyone and actively ask for help. If you want to join us, the openSUSE heroes, do not hesitate to contact us and join an incredible team!
-
Slackware Family
-
Slackware is the oldest surviving Linux distribution and has been maintained since its birth by Patrick Volkerding. Slackware has a well deserved reputation for being stable, consistent and conservative. Slackware is released when it is ready, rather than on a set schedule, and fans of the distribution praise its no-frills and no-fuss design. Slackware adheres to a “keep it simple” philosophy similar to Arch Linux, in that the operating system does not do a lot of hand holding or automatic configuration. The user is expected to know what they are doing and the operating system generally stays out of the way. The latest release of Slackware, version 14.2, mostly offers software updates and accompanying hardware support. A few new features offer improved plug-n-play support for removable devices and this release of Slackware ships with the PulseAudio software. PulseAudio has been commonly found in the audio stack of most Linux distributions for several years, but that is a signature of Slackware: adding new features when they are needed, not when they become available. In this case PulseAudio was required as a dependency for another package.
Slackware 14.2 is available in 32-bit and 64-bit builds for the x86 architecture. There is also an ARM build. While the main edition of Slackware is available as an installation disc only, there is a live edition of Slackware where we can explore a Slackware-powered desktop environment without installing the distribution. The live edition can be found on the Alien Base website. Both the live edition and the main installation media are approximately 2.6GB in size. For the purposes of this review I will be focusing on the main, installation-only edition.
Booting from the install media brings us to a text screen where we are invited to type in any required kernel parameters. We can press the Enter key to take the default settings or wait two minutes for the media to continue booting. A text prompt then offers to let us load an alternative keyboard layout or use the default “US” layout. We are then brought to a text console where a brief blurb offers us tips for setting up disk partitions and swap space. The helpful text says we can create partitions and then run the system installer by typing “setup”.
-
Red Hat Family
-
Finance
-
Fedora
-
I am still searching for an explanation, but Google searches are not turning up much that is useful. In the end it is curiosity more than something that is actually impacting me as I am able to start working long before systemd-analyze is capable of giving me results and certainly it is not taking 1 minute and 30 seconds for the computer to boot. In fact, when I timed the boot it only took 18.5 seconds for me to get to the desktop.
-
Fedora Program Manager Jan Kurik announced that the Fedora 22 Linux operating system officially reached end of life on July 19, 2016, urging users to upgrade to either the Fedora 23 or Fedora 24.
Of course, this is not the first time we inform our readers about the end of life (EOL) support for the Fedora 22 GNU/Linux distribution, but just in case you haven’t noticed our previous story, and you’re still using Fedora 22 on your personal computers or servers, it’s time to upgrade to a newer release immediately.
-
-
Ana Mativi, Rino (@Villadalmine), Itamar Jp, Ezequiel (QliXed) Brizuela, Bruno R. Zanuzzo, Eduardo Echeverria, Junior Wolnei e Daniel Lara. I personally knew only two of those people so it’s nice to see new faces behind the nicknames.
-
Just over one week until flock ( https://flocktofedora.org ), Fedora’s main yearly conference. This time it’s in Kraków, Poland. This of course means a long time traveling for myself and other North American Fedorans, but it’s always well worth it.
-
Linux Day is a global celebration of Linux. According to the event site, there is currently 9 teams in 5 countries. One of these teams is from my country, Panama. The responsible of doing this is Jose Reyes, our newest Panamanian Fedora Ambassador.
-
Last week I finished up the prototype for the release widget fully and started coding the calendar widget monthly view and weekly view. So far the implementation consists of the main view and weekly view (link). I am hoping to finish this by Monday evening and concentrate on prototyping the empty state widget.
-
In May of this year the docs team, with the help of some great folks from Red Hat and the CentOS project held a Documentation FAD. During that event we discussed a lot of important topics including the docs team’s publishing toolchain, and the barrier to entry that is docbook.
-
Cinnamon is a desktop environment that is widely promoted by the Linux Mint team. Linux Mint Cinnamon is their flagship distribution. In its turn, Linux Mint is a leader in the world of Linux distributions, especially for the newbie-oriented part of it. Unfortunately, the recent release of Linux Mint 18 made things worse, and many Linux bloggers wrote about this.
There was a comment on my recent post about Linux Mint 18 Cinnamon that asked me to look into the Korora distribution.
-
-
Jesse Smith reviewed Slackware 14.2 in today’s Distrowatch Weekly, saying it was stable as always if a bit dated topping Monday’s Linux news. Elsewhere, The Everyday Linux User listed his top five distributions for the “everyday Linux user” and DarkDuck test drove Korora 23 Live. Christine Hall gave Mint 18 a solid meh and OpenBSD kicked Linux to the curb.
-
After a long wait, the Korora 24 GNU/Linux distribution has been released, based, as its version number suggests, on many of the technologies included in the popular Fedora 24 operating system.
-
Dale started using Linux around 1999 when he became disconcerted with his Windows 95 computer and a young clerk in an office supply store told him about Linux. “I started reading some of the magazines, most notably Maximum Linux and eventually got to know their senior editor, Woody Hughes and Show Me the Code columnist Mae Ling Mak,” said Raby. His first distribution was Mandrake 6.5 which came in a box with a boot floppy.
Raby manages a small gun shop in Green Bay, Wisconsin. He is also an author with four published books: The Post-Apocalyptic Blacksmith, 777 Bon Mots for Gunslighers and Other Real Men, The Wives of Jacob I, and In the Beginning.
-
Today, July 25, 2016, systemd creator Lennart Poettering has proudly announced the release and general availability of the systemd 231 init system for major GNU/Linux OSes.
Bringing lots of fixes and numerous additions, systemd 231 is now the most advanced version of the modern and controversial init system that has been adopted in the last few years by more and more Linux kernel-based operating systems, including Fedora, Ubuntu, Arch Linux, openSUSE, Red Hat Enterprise Linux, and many others.
-
-
-
For a while now, we, Fedora QA, have been busy with building Taskotron core features and didn’t have much resources for additions to the tasks that Taskotron runs. That changed a few weeks back when we started running task-dockerautotest, task-abicheck and task-rpmgrill tasks in our dev environment. Since we have been happy with the results of having run those tasks, we deployed them to the production instance as well last week. Please note that the results of those tasks are informative only. Lets introduce the tasks briefly:
-
Debian Family
-
I have a long overdue blog entry about what happened in recent times. People that follow my tweets did catch some things. Most noteworthy there was the Trans*Inter*Congress in Munich at the start of May. It was an absolute blast. I met so many nice and great people, talked and experienced so many great things there that I’m still having a great motivational push from it every time I think back. It was also the time when I realized that I in fact do have body dysphoria even though I thought I’m fine with my body in general: Being tall is a huge issue for me. Realizing that I have a huge issue (yes, pun intended) with my length was quite relieving, even though it doesn’t make it go away. It’s something that makes passing and transitioning for me harder. I’m well aware that there are tall women, and that there are dedicated shops for lengthy women, but that’s not the only thing that I have trouble with. What bothers me most is what people read into tall people: that they are always someone they can lean on for comfort, that tall people are always considered to be self confident and standing up for themselves (another pun, I know … my bad).
-
This particular week has been tiresome as I did catch a cold ;). I did come back from Cape Town where debconf taking place. My arrival at Montreal was in the middle of the week, so this week is not plenty of news…
-
I became interested in running Debian on NVIDIA’s Tegra platform recently. NVIDIA is doing a great job getting support for Tegra upstream (u-boot, kernel, X.org and other projects). As part of ensuring good Debian support for Tegra, I wanted to install Debian on a Jetson TK1, a development board from NVIDIA based on the Tegra K1 chip (Tegra 124), a 32-bit ARM chip.
-
-
Derivatives
-
Canonical/Ubuntu
-
When I sat down to interview Jane Silber, CEO of Canonical, I don’t think it was lost on either of us that our ability to chat freely even though I was in my office in the middle of the U.S. and she was in her office in London, England had everything to do with cloud computing, an area in which her company does brisk business.
Silber has been running Canonical (maker of Ubuntu, among a great many other software products) in one form or another for well over a decade at this point, first as COO and now CEO. She answers questions thoughtfully, with carefully chosen words; even though I’m sure I’m not the first journalist to ask her some of the below questions (maybe not even the first one this week), she had no canned responses, and she never veered off course to discuss her own agenda. There were no preset talking points; simply, I asked questions, and she answered them.
-
Flavours and Variants
-
As we reported last week, Canonical published the first point release of its long-term supported Ubuntu 16.04 LTS (Xenial Xerus) operating system, offering users new installation mediums with all the updates made available since April 21, 2016.
-
-
-
Phones
-
Tizen
-
Samsung originally released their first Tizen smartphone, the Samsung Z1, in India last year and with that move have signalled the importance of the Indian sub-continent to their future Tizen plans. Now, the korean tech giant is looking at setting up a Tizen Academy in the Telangana state in India. Samsung Electronics this month have signed an agreement with the Telangana Academy of Skill and Training (TASK). As part of the deal App developers from the Telangana state will receive special mentoring on the Tizen Operating System (OS).
-
Android
-
-
Twitter may finally have found the feature that gets people excited about its service again: night mode. Twitter is launching a night mode feature on Android today that switches most of the interface from white to a really deep blue. It looks nice, and I have no doubt that a lot of people will use it, because everyone seems to love a good night mode.
-
-
-
-
-
-
-
-
-
-
-
-
-
The second half of 2016 took off with some exciting launches from notable manufacturers like Motorola, HTC, Xiaomi and others. With so many smartphones being launched on a near-daily basis by brands both big and small, it gets quite difficult to keep track of them.
-
-
-
-
-
-
-
-
-
-
-
Twitter leaker Evan Blass is apparently in possession of a ROM dump from one of the upcoming 2017 Nexus phones. The smaller of the two rumored devices, internally known as Sailfish or the HTC S1, has just had its build.prop file shared on Twitter, uncovering a couple of device specs including display resolution and the chipset to be used.
-
-
-
-
-
-
-
-
-
-
-
-
The smartwatch market may not be the next big thing as many hoped it would be, but that isn’t stopping countless smaller companies from trying to take a piece of the pie. The latest effort comes from a Chinese company called Mobvoi and is an Android-based smartwatch complete with its own proprietary software and voice assistant. The Ticwatch 2 is launching through a Kickstarter campaign today and is expected to hit retail availability in the US and Europe this fall. The starting price for backers is under $100.
-
Remix OS has been putting Android 5.1 on PCs for only half a year, but now users can upgrade their devices to Android Marshmallow. The update also makes the OS compatible with additional NVIDIA and AMD GPUs, which adds support for more than a dozen x86 PCs and laptops. It can be installed on most Intel-based PCs and Macs, although Android and most of its apps will probably always work best on ARM.
-
-
The FCC is worried. You and they spend all this time and energy getting your radio certified, and then some bozo hacks in, changes how the radio works, and puts you out of spec.
And so, back in early 2015, the FCC issued some guidelines or questions regarding WiFi devices – particularly home routers – in an effort to ensure that your radio isn’t hackable.
The result has been that some router makers have simply locked down the platform so that it’s no longer possible to do after-market modifications, and this has caused an outcry by after-market modifiers. The reason why it’s an issue is that these open-source developers have used the platform for adding apps or other software that, presumably, have nothing to do with the radio.
In an attempt to find the magic middle way, the prpl organization, headed by Imagination Technologies (IMG) and featuring the MIPS architecture, recently put out a proof of concept that they say gives both assurance to the FCC and freedom to open-source developers.
Questions from the FCC
-
Communications startup Wire has open-sourced the full codebase for its Wire app, so it’s easier for developers to build their own encrypted messaging clients.
Wire open-sourced the rest of the client base that wasn’t initially publicly available, including components related to the user interface, the web and native clients, and some internal developer tools. The company always planned to open-source the codebase, but didn’t start out that way initially “because we were still working on other features,” Alan Duric, co-founder and CTO of Wire, wrote in a Medium post.
-
Events
-
Web Browsers
-
Mozilla
-
As mentioned in today’s This Week in Servo newsletter, their Q3 roadmap plans have been published.
Among the work to be tackled by Mozilla developers working on the next-generation Servo layout engine this quarter includes finishing the development of WebRender, experiments around WebRender 2, Stylo as the sryle system in Gecko integration work, and continuing with the Servo nightly builds support. There’s also work around Promise API, Autolander migration, Android work, auto-updating, JavaScript error reporting, Web Font loading, performance improvements, correcting more layout bugs, etc. You can see the current road-map via this GitHub page.
-
In late 2014, many observers were flummoxed to see that Yahoo and Mozilla had announced a “strategic five-year partnership” agreement which would make Yahoo the primary search option for Firefox. Mozilla was up for renewal negotiations for its deal with Google, which had historically subsidized more than 90 percent of Mozilla’s revenues, to the tune of more than $300 million per year at times. In return, for lots of money, Google got primary search placement in the Firefox browser over the years.
Last week, though, Verizon,announced its intention to purchase Yahoo for $4.8 billion. What are the implications for Mozilla and its deal? Here are the details.
-
SaaS/Back End
-
Members of the OpenStack Foundation have been voting on upcoming release names and the results are now in.
-
-
Today’s interview is with David Egts, chief technologist, North America Public Sector at Red Hat. Red Hat has been around for twenty-five years and has hit over two billion on annual revenue. Topics range from open source to partnering with Microsoft to the up and coming DevNationFederal.
In the federal government circles, Red Had made a big splash years ago by working with NASA to have incredibly fast systems. Red Hat has expanded so much in the past decade that the conversation with Egts didn’t even get to NASA.
-
Pseudo-Open Source (Openwashing)
-
BSD
-
Electric Sheep Fencing LLC, through Chris Buechler, proudly announced on July 25, 2016, the immediate availability for download of the second maintenance update aimed at the pfSense 2.3 series of the FreeBSD-based open-source firewall distribution.
-
Theo de Raadt (deraadt@) has updated the (in-progress) OpenBSD 6.0 release page to indicate that release will occur earlier than is usual…
-
Openness/Sharing/Collaboration
-
Open Data
-
Last month, the Austrian State Secretary Muna Duzdar handed out the ‘Oscars of the Open Data Community’. The awards were part of the ‘open4data.at challenge 2016′ organised earlier this year. The annual challenge aims to bring open data and ideas together in innovative and creative solutions.
-
After the two earthquakes that caused multiple casualties and widespread damage in the Italian region of Emilia-Romagna in 2012, multiple programmes were launched to reconstruct the affected areas. To make these efforts more transparent, a team from the Gran Sasso Science Institute last week presented an Open Data platform that will provide all information on who is responsible, which company is doing what, and how the money is being spent.
The ‘Open Data Ricostruzione’ initiative was presented last week at the Italian Festival of Participation. The platform will bring together all the numbers, figures and information on the reconstruction, and allow visitors to visualise, filter, track and map the available data. All information will be made available as open data, in the original database format as well as JSON.
-
Open Access/Content
-
Much of the Internet runs Linux and open source software, yet in most of our schools—whether PK-12 or higher education—Linux and open source software are given short shrift.
Linux has made serious inroads on hand-held devices, the desktop, and the Internet of things (IoT) that use platforms such as Raspberry Pi, Galileo, and Arduino. Despite this astounding growth, a relatively small number of secondary and post-secondary schools offer technology training that prepares students for increasingly in-demand technical skills. The growth of the maker movement and the concurrent interest in STEM skills, which include coding and ethical hacking, may provide a much-needed impetus to change this trend.
-
Open Hardware/Modding
-
Soon there will be four years since I started working on AArch64 architecture. Lot of software things changed during that time. Lot in a hardware too. But machines availability still sucks badly.
In 2012 all we had was software model. It was slow, terribly slow. Common joke was AArch64 developers standing in a queue for 10GHz x86-64 cpus. So I was generating working binaries by using cross compilation. But many distributions only do native builds. In models. Imagine Qt4 building for 3-4 days…
In 2013 I got access to first server hardware. With first silicon version of CPU. Highly unstable, we could use just one core etc. GCC was crashing like hell but we managed to get stable build results from it. Qt4 was building in few hours now.
-
Last year I had open source instruction set RISC-V running Linux emulated in qemu. However to really get into the architecture, and restore my very rusty FPGA skills, wouldn’t it be fun to have RISC-V working in real hardware.
The world of RISC-V is pretty confusing for outsiders. There are a bunch of affiliated companies, researchers who are producing actual silicon (nothing you can buy of course), and the affiliated(?) lowRISC project which is trying to produce a fully open source chip. I’m starting with lowRISC since they have three iterations of a design that you can install on reasonably cheap FPGA development boards like the one above. (I’m going to try to install “Untether 0.2” which is the second iteration of their FPGA design.)
-
-
-
-
-
Hardware
-
The future was closer than ever with the hip-sounding Sony U-matic, which came on the market in 1971. It could fast-forward and rewind! Then the Philips VCR, made available to consumers in 1972, changed the game with its first model, the N1500, that incorporated all the best qualities of recorders that came before it. There were basic controls — the play, pause, fast-forward, and rewind buttons — plus a clock with a timer, so you could record shows when you weren’t even home.
-
Health/Nutrition
-
With all the protests, plagiarism allegations, and literal smoke that swirled around the Republican National Convention, it’s easy to forget about the drier parts—like approving the 2016 GOP platform. But you should probably read it, because more than any word salad Duck Dynasty dude or Scott Baio might have to offer, the Republican platform indicates the GOP grownup’s actual priorities. Same deal with the Democratic platform, passed on the first day of the Democratic National Convention.
One of the Republican platform’s buzziest stances is that pornography “has become a public health crisis that is destroying the lives of millions.” Not that porn can’t be sleazy and problematic. But a crisis of public health? Like, say, Zika? Or opioid addiction? Or, you know, cancer?
-
As the list of countries adopting legislation making the packaging of tobacco products a lot less sexy is growing, the long-awaited decision of a World Trade Organization panel on Australia’s decision to enforce such legislation might not be coming before the end of the year. Meanwhile, one of the countries complaining about Australia’s legislation has left the fight.
-
As the fund to help the world’s most suffering prepares for a conference hosted by Prime Minister Justin Trudeau and the government of Canada in September to raise US$13 billion for its 2017-2019 period, the prospect of failing to meet the target is unsettling for the civil society and the health community.
-
That is the amount of money the U.S. spent over a 10-year period from 2004 through 2013 promoting abstinence before marriage as a way of preventing HIV in 14 countries in sub-Saharan Africa. Unfortunately, according to the most comprehensive independent study conducted to date of the effort, the money was more or less wasted. A rigorous comparison of national data from countries that received abstinence funding under the U.S. President’s Emergency Plan for AIDS Relief (PEPFAR) with those that got none of the funding showed no difference in the age of first sexual experience or in the number of sexual partners or teenage pregnancies—all aspects of behaviors that have been linked to a higher risk of becoming infected with HIV.
-
The callous attitude of Indian men that ‘she can always abort’ in cases of an unwanted pregnancy caused by failure to use a condom needs to be tackled at the root.
-
Security
-
-
The European Commission announced on Wednesday that its IT engineers would provide a free security audit for the Apache HTTP Server and KeePass projects.
The EC selected the two projects following a public survey that took place between June 17 and July 8 and that received 3,282 answers.
The survey and security audit are part of the EU-FOSSA (EU-Free and Open Source Software Auditing) project, a test pilot program that received funding of €1 million until the end of the year.
-
While Microsoft would prefer you use its Edge browser on Windows 10 as part of its ecosystem, the most popular Windows browser is Google’s Chrome. But there is a downside to Chrome – spying and battery life.
It all started when Microsoft recently announced that its Edge browser used less battery power than Google Chrome, Mozilla Firefox or Opera on Windows 10 devices. It also measured telemetry – what the Windows 10 device was doing when using different browsers.
What it found was that the other browsers had a significantly higher central processing unit (CPU), and graphics processing unit (GPU) overhead when viewing the same Web pages. It also proved that using Edge resulted in 36-53% more battery life when performing the same tasks as the others.
Let’s not get into semantics about which search engine — Google or Bing — is better; this was about simple Web browsing, opening new tabs and watching videos. But it started a discussion as to why CPU and GPU usage was far higher. And it relates to spying and ad serving.
-
In December of 1967 the Silver Bridge collapsed into the Ohio River, killing 46 people. The cause was determined to be a single 2.5 millimeter defect in a single steel bar—some credit the Mothman for the disaster, but to most it was an avoidable engineering failure and a rebuttal to the design philosophy of substituting high-strength non-redundant building materials for lower-strength albeit layered and redundant materials. A partial failure is much better than a complete failure.
[...]
In 1996, Kocher co-authored the SSL v3.0 protocol, which would become the basis for the TLS standard. TLS is the difference between HTTP and HTTPS and is responsible for much of the security that allows for the modern internet. He argues that, barring some abrupt and unexpected advance in quantum computing or something yet unforeseen, TLS will continue to safeguard the web and do a very good job of it. What he’s worried about is hardware: untested linkages in digital bridges.
-
A new report commissioned by the Department of Homeland Security forecasts that autonomous artificially intelligent robots are just five to 10 years away from hitting the mainstream—but there’s a catch.
The new breed of smart robots will be eminently hackable. To the point that they might be re-programmed to kill you.
The study, published in April, attempted to assess which emerging technology trends are most likely to go mainstream, while simultaneously posing serious “cybersecurity” problems.
The good news is that the near future is going to see some rapid, revolutionary changes that could dramatically enhance our lives. The bad news is that the technologies pitched to “become successful and transformative” in the next decade or so are extremely vulnerable to all sorts of back-door, front-door, and side-door compromises.
-
At issue is a fairly technical proposed standard called DMARC. Short for “domain-based messaging authentication reporting and conformance,” DMARC tries to solve a problem that has plagued email since its inception: It’s surprisingly difficult for email providers and end users alike to tell whether a given email is real – i.e. that it really was sent by the person or organization identified in the “from:” portion of the missive.
-
The US National Institute of Standards and Technology (NIST) has released the latest draft version of the Digital Authentication Guideline that contains language hinting at a future ban on SMS-based Two-Factor Authentication (2FA).
The Digital Authentication Guideline (DAG) is a set of rules used by software makers to build secure services, and by governments and private agencies to assess the security of their services and software.
NIST experts are constantly updating the guideline, in an effort to keep pace with the rapid change in the IT sector.
-
Details about 1.6 million users on the Clash of Kings online forum have been hacked, claims a breach notification site.
The user data from the popular mobile game’s discussion forum were allegedly targeted by a hacker on 14 July.
Tech site ZDNet has reported the leaked data includes email addresses, IP addresses and usernames.
-
-
-
A bounty-hunter has gone public with a complete howler made by Vine, the six-second-video-loop app Twitter acquired in 2012.
According to this post by @avicoder (Vjex at GitHub), Vine’s source code was for a while available on what was supposed to be a private Docker registry.
While docker.vineapp.com, hosted at Amazon, wasn’t meant to be available, @avicoder found he was able to download images with a simple pull request.
-
America’s National Institute for Standards and Technology has advised abandonment of SMS-based two-factor authentication.
That’s the gist of the latest draft of its Digital Authentication Guideline, here. Down in section 5.1.3.2, the document says out-of-band verification using SMS is deprecated and won’t appear in future releases of NIST’s guidance.
-
Defence/Aggression
-
New York has obtained a confidential document from the Malaysian police investigation into the disappearance of Malaysia Airlines Flight 370 that shows that the plane’s captain, Zaharie Ahmad Shah, conducted a simulated flight deep into the remote southern Indian Ocean less than a month before the plane vanished under uncannily similar circumstances. The revelation, which Malaysia withheld from a lengthy public report on the investigation, is the strongest evidence yet that Zaharie made off with the plane in a premeditated act of mass murder-suicide.
-
A former employee of a center for the disabled in a Tokyo suburb broke into the building and killed 19 people with a knife early Tuesday, local officials said.
The suspect, Satoshi Uematsu, 26, went on a rampage around 2:20 a.m. in Sagamihara, a town an hour west of Tokyo, according to the authorities in Kanagawa Prefecture. Twenty-five people were reported wounded, all but one of them seriously.
Just half an hour after the attack, Mr. Uematsu turned himself in at a nearby police station and was charged with attempted murder. Additional charges were expected. The attack was the worst mass killing in Japan in decades. The country has one of the lowest crime rates in the world.
-
As terrorism struck again in Nice and Germany and… Donald Trump outlined his policy against Islamic State: as president, he will seek a full declaration of war from Congress, the first such formal invocation since Pearl Harbor.
Trump was short on specifics but very clear he would take the strategies of the post-9/11 era into a presidency. Clinton, for her part, intends on “intensifying the current air campaign [and] stepping up support for local forces on the ground.” Their French counterpart, President Francois Hollande, declared “We will continue striking those who attack us on our own soil.”
-
In Syria’s civil war, it’s dangerous to even treat the wounded. Since the beginning of the civil war, the Syrian government has killed hundreds of medical personnel, and dozens of doctors have been assassinated by ISIS. The few doctors who dare to treat the casualties have been forced to work in secret.
In his piece for the New Yorker, journalist Ben Taub profiles some of the underground community of health providers, documenting how they’re keeping clinics open and preserving medical knowledge, despite the risk of violence from both President Bashar al-Assad’s regime and ISIS.
-
The sales pitch is titled “Arming For Deterrence.” The Kremlin is unpredictable, say the arms salesmen, and could at any moment decide to attack Poland. However the Russian regime “respects a show of force” and would back down if Poland has a sufficient inventory of US weapons.
The sales pitch encourages Poland to take many aggressive and dangerous steps toward Russia, such as targeting Russia cities and facilities including RT. But before provoking the Bear like this, Poland needs “to join the tactical nuclear capability scheme within NATO, so enabling its F-16s to be carriers of tactical nuclear ordnance.”
-
A senior French police officer has claimed that the interior ministry “harassed” her into altering a security report from the deadly terrorist attack in Nice.
Sandra Bertin, the officer in charge of Nice’s CCTV control room, told the Journal du Dimanche newspaper on Sunday that an unnamed interior ministry official contacted her after the attack and pressured her into altering her report for the night of the incident.
On July 14, a truck driver plowed through a Bastille Day crowd in Nice, killing 84 people and wounding 200 others.
Bertin claims that she was “harassed for an hour” by the official who wanted her to detail the presence of local and national police at the fireworks event where the carnage took place.
-
The anti-Russian propaganda across the U.S. political/media system is so pervasive that even members of Congress know little about the events that launched a new Cold War, as Elizabeth Murray learned and David Swanson reported.
-
To understand why the United States fails so miserably in efforts to achieve an Israeli/Palestinian peace, all you need to do is take a look at the mix of bad policy and bad politics found in the Israel/Palestine sections of platforms of both the Republican and Democratic parties.
-
The Chilcot Inquiry, set up to look into the British role in the war in Iraq, reported on July 6, and although it was overshadowed by the political fallout from the Brexit vote to leave the European Union, received a largely favorable reception from the media and commentators. It is unclear why those commentators judged it to be “hard-hitting” because in terms of its conclusions all it did was tell us what we already knew.
Then British Prime Minister Tony Blair pursued a war that was arguably illegal has had disastrous consequences, not least for the 179 British servicemen and women killed and their loved ones, but also for Iraq, its people and the fight against terrorism.
I was staggered by the rush to say the report was hard hitting. It wasn’t. It simply laid out the facts in a narrative format and let the reader decide. Those facts were of course damning but I struggle to find anything in the report that a well informed reader of British newspapers wouldn’t already know.
It was a very workmanlike narrative of what happened taken from secret documents and witness testimony and therefore providing far more detail than had been previously available but it was not anything like a proper inquiry in the real sense. It was more like a neutral court report than the solid analysis which was required, and what we actually got from the curiously much derided Butler report.
-
When American firms dominate a global market worth more than $70 billion a year, you’d expect to hear about it. Not so with the global arms trade. It’s good for one or two stories a year in the mainstream media, usually when the annual statistics on the state of the business come out.
It’s not that no one writes about aspects of the arms trade. There are occasional pieces that, for example, take note of the impact of U.S. weapons transfers, including cluster bombs, to Saudi Arabia, or of the disastrous dispensation of weaponry to U.S. allies in Syria, or of foreign sales of the costly, controversial F-35 combat aircraft. And once in a while, if a foreign leader meets with the president, U.S. arms sales to his or her country might generate an article or two. But the sheer size of the American arms trade, the politics that drive it, the companies that profit from it, and its devastating global impacts are rarely discussed, much less analyzed in any depth.
-
Transparency/Investigative Reporting
-
Last week, we (like many others) reported on the news that Turkey was blocking access to Wikileaks, after the site released approximately 300,000 emails, supposedly from the Turkish government. We’ve long been defenders of Wikileaks as a media organization, and its right to publish various leaks that it gets. However, Zeynep Tufekci, who has long been a vocal critic of the Turkish government (and deeply engaged in issues involving the internet as a platform for speech) is noting that the leak wasn’t quite what Wikileaks claimed it was — and, in fact appears to have revealed a ton of private info on Turkish citizens.
-
Just days after a bloody coup attempt shook Turkey, WikiLeaks dumped some 300,000 emails they chose to call “Erdogan emails.” In response, Turkey’s internet governance body swiftly blocked access to WikiLeaks.
For many, blocking WikiLeaks was confirmation that the emails were damaging to Turkish President Recep Tayyip Erdogan and the government, revealing corruption or other wrongdoing. There was a stream of articles about “censorship.” Even U.S. National Security Agency whistle-blower Edward Snowden tweeted the news of the WikiLeaks block with the comment: “How to authenticate a leak.”
But Snowden couldn’t have been more wrong about an act that was irresponsible, of no public interest and of potential danger to millions of ordinary, innocent people, especially millions of women in Turkey.
-
Environment/Energy/Wildlife/Nature
-
At the top of the world a climate disaster is unfolding that will impact the lives of more than 1 billion people.
Deep in the Himalayas sits a remote research station that is tracking an alarming trend in climate change, with implications that could disrupt the lives of more than 1 billion people and pitch the most populated region of the world into chaos.
The station lies in the heart of a region called the Third Pole, an area that contains the largest area of frozen water outside of the North Pole and South Pole.
Despite its relative anonymity, the Third Pole is vitally important; it is the source of Asia’s 10 largest rivers including the Yellow, the Yangzi, the Mekong, the Irrawaddy and the Ganges — and their fertile deltas.
-
The miners use so much mercury to process the gold that the government declared a health emergency in much of the Madre de Dios region in May. Tests in 97 villages found that more than 40 percent of the people had absorbed dangerous levels of the heavy metal. Mercury poisoning affects people in many ways, from chronic headaches to kidney damage, but it is most harmful to children, who are likely to suffer permanent brain damage.
-
With a heat wave pushing the heat index well above 100° F (38 °C) through much of the US, most of us are happy to stay indoors and crank the air conditioning. And if you think it’s hot here, try 124 °F in India. Globally, 2016 is poised to be another record-breaking year for average temperatures. This means more air conditioning. Much more.
In a paper published in the Proceedings of the National Academy of Science (PNAS), Paul Gertler and I examine the enormous global potential for air conditioning. As incomes rise around the world and global temperatures go up, people are buying air conditioners at alarming rates. In China, for example, sales of air conditioners have nearly doubled over the last five years. Each year now more than 60 million air conditioners are sold in China, more than eight times as many as are sold annually in the United States.
-
After nine years of delay, the U.S. Environmental Protection Agency today officially acknowledged in a so-called “endangerment finding” that planet-warming pollution from airplanes disrupts the climate and endangers human welfare. But the agency failed to move forward on rules to actually reduce aircraft emissions.
“EPA officials finally acknowledged airplane pollution’s obvious climate threat, but they’re still not actually cutting the airline industry’s skyrocketing emissions,” said Vera Pardee, senior counsel at the Center for Biological Diversity. “After nearly a decade of denial and delay, we need fast, effective EPA action. The Obama administration must quickly devise ambitious aircraft pollution rules that dramatically reduce this high-flying hazard to our climate.”
-
Armed with a speaker system and a bucket full of peanuts, wildlife ecologist Liana Zanette hiked into the Wytham Woods with just one mission: to terrorize some woodland creatures with recordings of the BBC.
For five nights, she broadcast snippets of BBC documentaries and news programs — as well as clips from the Canadian radio show “Quirks and Quarks” and the audiobook of “The Wind in the Willows” — to a forest full of unsuspecting English badgers. She and her colleagues then monitored the animals’ response to the sounds in order to measure how much they feared humans.
“Oh, I don’t want to be dissing public radio and television,” Zanette hurriedly insisted when I asked whether she thought the BBC was frightening. She laughed, “I had all these clips on hand because it’s what I love to listen to.”
Zanette, a professor at Western University in Ontario, has spent much of her career studying “the landscape of fear,” how animals’ anxiety about getting eaten by predators shapes their behavior and in turn, shapes the ecosystem in which they live. She’s used a similar methodology — playing predator sounds through a speaker system, then watching to see how animals respond — at least a dozen times before. Then, last year, she read a study in Science claiming that humans had become a “superpredator,” killing mesocarnivores like badgers four times as much as non-human predators do.
-
Nineteen now-pending pipeline projects, if constructed, would let enough natural gas flow out of the Appalachian basin to cause the entire US to blow through its climate pledges, ushering the world into more than 2 degrees Celsius of global warming, a newly released report by Oil Change International concludes.
Even if the Environmental Protection Agency’s recently-announced methane rules manage to slash leaks from new natural gas infrastructure as planned, building those pipelines would be catastrophic for the climate, the researchers warn.
“All together, these 19 pending pipeline projects would enable 116 trillion cubic feet of additional gas production by 2050,” the report, entitled A Bridge Too Far: How Appalachian Basin Gas Pipeline Expansion Will Undermine U.S. Climate Goals, says. “The currently planned gas production expansion in Appalachia would make meeting U.S. climate goals impossible, even if the [Obama] Administration’s newly proposed methane rules are successful in reducing methane leakage by 45 percent.”
-
This is a year of politics. That means everyone has opinions about where the world should be headed and how we should get there.
No matter how weird this political season has been, however, there remains a key difference between opinions and facts. That difference comes into the starkest relief when people must face their own inconsistencies in reconciling the two domains.
And nowhere is the gap between opinions and facts more apparent than the subject of climate change. As a recent action by the American Association for the Advancement of Science (AAAS) demonstrates, for climate deniers there is a chasm between what is said and what is done.
-
Finance
-
Payments from a £3bn European development fund were suspended indefinitely by the UK Government, just days after the vote to leave the EU, The Independent can reveal.
In a move that exposes the almost immediate impact of Brexit on the UK economy, businesses say they have been told they will not now receive money that was due to be paid out under the European Regional Development Fund (ERDF).
-
Entrepreneurs and corrupt officials across Africa have used shell companies to hide profits from the sale of natural resources and the bribes paid to gain access to them, according to records leaked from a Panamanian law firm.
Owners of the hidden companies include, from Nigeria alone, three oil ministers, several senior employees of the national oil company and two former state governors who were convicted of laundering ill-gotten money from the oil industry, new reports about Africa based on the Panama Papers show. The owners of diamond mines in Sierra Leone and safari companies in Kenya and Zimbabwe also created shell companies.
Some of the assets cycled through the shell companies were used to buy yachts, private jets, Manhattan penthouses and luxury homes in Beverly Hills, Calif., the law firm documents show.
Articles posted on Monday by the International Consortium of Investigative Journalists, and reports being published this week by news media organizations in 17 African countries, underscore the critical role that secret shell companies can play in facilitating tax evasion, bribery and other crimes. In Africa, offshore finance often underlies the exploitation of mineral wealth, with the benefits bypassing the public and going largely to wealthy executives and the government officials they pay off.
-
Britain could borrow nearly 65 billion pounds more than planned in the next couple of years as new Chancellor Philip Hammond seeks to ‘reset’ government budget policy to ease the shock of last month’s vote to leave the European Union.
Ratings agencies and economists widely expect borrowing to rise materially next year for the first time since 2010, as Hammond has to call time – temporarily – on the austerity which dominated his predecessor George Osborne’s six years in office.
After taking office two weeks ago, Hammond said the darker post-Brexit outlook meant policies the Conservative government had pursued since 2010 needed to change – and economists are now starting to put numbers on what this might mean.
Hammond told reporters on Sunday the scale of any stimulus would hinge on how rapidly the economy was slowing by the time of the Autumn Statement, the half-yearly budget update that usually comes in late November or early December.
-
From a distance, Vicenza does not look like a city engulfed in turmoil. On the elegant Corso Andrea Palladio, named after the Renaissance architect whose work defines this city, a finely dressed woman clutches a Chanel handbag during her evening passeggiata. Locals sit back and enjoy their Campari spritz cocktails in the July heat. A black Maserati rolls slowly down the street.
-
A former Italian premier who wrote the European Union divorce clause that Britain is poised to trigger said on Thursday that Brussels should offer no concessions to London in looming negotiations to quit the trading bloc.
“When it comes to the economy they have to lose,” said Giuliano Amato, explaining that only then might the British reconsider abandoning the world’s largest single market.
Britain voted in a referendum on June 23 to leave the EU. To do so, London will have to invoke Article 50 of the Lisbon Treaty, which starts a two-year countdown to a formal exit from the 28-nation bloc.
“I wrote Article 50, so I know it well,” Amato told a conference in Rome, saying he had inserted it specifically to prevent the British from complaining that there was no clear cut, official way for them to bail out of the Union.
“My intention was that it should be a classic safety valve that was there, but never used. It is like having a fire extinguisher that should never have to be used. Instead, the fire happened.”
-
In yet another sign the financial world is being turned on its head, one of the UK’s biggest banks has warned customers that it may saddle them with negative interest rates. That is, depositors would be charged for putting their money in the bank.
Royal Bank of Scotland, one of Britain’s largest banks, and Natwest, one of its subsidiaries, sent letters to 1.3 million business customers warning them of the change, citing low interest rates. The letter announcing the changes said: “Global interest rates remain at very low levels and in some markets are currently negative. Dependent on future market conditions, this could result in us charging interest on credit balances.”
Some central banks already charge commercial lenders for their deposits, and interbank lending markets have also featured negative interest rates. A third of government bonds globally now have yields below zero, meaning investors won’t get all their money back if they hold the securities to maturity.
-
By picking Tim Kaine, Hillary Clinton has revealed her true preferences and shown that her move to the left on policy issues during the primaries was simply a tactical move to defeat Bernie Sanders. It’s not what you say, it’s what you do.
Clinton can talk about caring about the U.S. public, but this choice cuts through the rhetoric. The two politicians to whom she gave serious consideration to choosing as her running mates were Kaine and Secretary of Agriculture Tom Vilsack. What both men share in common is, like the Clintons, being leaders of the Democratic Leadership Council (DLC). The DLC was, on economic and foreign policy issues, a servile creature of Wall Street – funded by Wall Street.
-
As the Democratic National Convention begins in Philadelphia, tension is rising between supporters of Hillary Clinton and Bernie Sanders. The Democratic National Committee chair, Florida Congressmember Debbie Wasserman Schultz, resigned Sunday following WikiLeaks’ release of nearly 20,000 emails revealing how the Democratic Party favored Hillary Clinton and worked behind the scenes to discredit and her rival, Senator Bernie Sanders. When Sanders speaks tonight at the Democratic convention, he is expected to praise the Democrats for agreeing to what he describes as the most progressive platform in Democratic Party history. But he lost a major battle with the platform when the Democratic National Committee defeated an amendment brought by his delegates to abolish superdelegates. We speak with Zaid Jilani of The Intercept, who reported on how the “DNC Votes to Keep Superdelegates, But Sets Some Conditions.”
-
The UK pension deficit hit a record level of £935 billion following UK’s vote to leave the EU, likely hitting pro-Brexit voters the hardest.
Support for the UK to leave the EU bloc grew with each age category, peaking at 60 per cent among those aged 65 and over, according to a survey of 12,356 referendum voters by Lord Ashcroft.
Ironically, the same voters are reliant on defined benefit pension to deliver their retirement income.
-
Many people are responsible for the financial disaster of 2008, and the economic hardship that has continued to unravel since. We still have not seen one criminal prosecution among the CEOs who were – and many still are – at the frontlines where everything started to crumble. Those people are hiding behind corporate protection, always blaming the next in line behind them, never accepting responsibility, and very often putting the blame on the very people they have ruined with their fraudulent dealings.
-
AstroTurf/Lobbying/Politics
-
-
Actress Susan Sarandon was feeling the Bern during the Democratic primary-and on Monday blasted the Democratic National Committee for its bias against Bernie Sanders, saying the DNC email leak is proof Sanders supporters’ concerns about a rigged system weren’t “paranoia.”
“I mean, it’s not surprising. It’s great that everyone finally understands that this wasn’t some kind of paranoia,” she said in an interview with Democracy Now. “But every little thing, from not allowing Bernie’s table with his information into the dinners in some of the states I went to and what I saw at caucuses, and I know what happened in New York, where all of that information, the wall went down, and then 137,000 people were just disappeared out of Brooklyn, and I know other people that went and were registered as–I mean, it was clear in California what happened, in Puerto Rico what happened.”
She added that Sanders supporters are disappointed in the results of the primary, but that it’s important that Sanders gets to speak directly to those people from the convention stage Monday night.
-
The founder of WikiLeaks told NBC News on Monday there is no evidence Russia was behind the hacking of the Democratic National Committee’s email server.
Julian Assange told “Nightly News” correspondent Richard Engel the issue is not who stole the information, but what is in the emails.
“Well, there is no proof of that whatsoever. We have not disclosed our source, and of course, this is a diversion that’s being pushed by the Hillary Clinton campaign. That’s a meta-story. The real story is what these emails contain and they show collusion,” Assange said in the pre-taped interview that aired Monday night.
Assange pointed to the effect of the scandal. He said even though the emails were leaked three days ago, DNC Chairwoman Debbie Wasserman Schultz has already resigned for her role in “subverting” the nomination process to ensure Hillary Clinton beat Sen. Bernie Sanders.
-
As is sadly the case with most political stories these days, whether or not you care about the so-called “DNC leak” probably depends on which candidate you supported in the primaries.
-
Randy Quaid hasn’t acted in years, but he’s still making movies. The difference is that the 65-year-old who played roles in such films as National Lampoon’s Vacation and Independence Day is now making them for social media instead of the multiplex.
On Monday, Quaid posted a series of clips that featured him, with his signature Santa Claus-like beard, screaming directly at the camera about the email leak plaguing the Democratic Party, which kicked off its convention in Philadelphia on Monday. While the vids are certainly entertaining, we’re not sure whether we should laugh or cry. What happened to Cousin Eddie?
-
-
The former director of Faith Outreach for the Democratic Party “absolutely” condemns an alleged plot by a Democratic operative to undermine Bernie Sanders by questioning his religion.
“I can certainly say from first-hand experience that I was part of a campaign where it was a solemn vow in no way, shape or form to use faith as a wedge issue,” Rev. Dr. Derrick Harkins, who also served as an adviser to President Obama, told the Washington Examiner.
His remarks, which came as he spoke Monday on a “Faith Council” panel hosted as part of the Democratic National Convention in Philadelphia, were made in reference to his role campaigning in 2012 against former Massachusetts Gov. Mitt Romney.
-
-
Commonly asked questions and answers about WikiLeaks’ #DNCLeaks as the Democratic National Convention kicks off.
-
Facebook Chief Security Officer says the company has fixed the error, after receiving heavy criticism from WikiLeaks.
This isn’t the first time Facebook has accidentally blocked high profile news events on the platform. Earlier this month, Facebook briefly removed video showing Philando Castile dying, covered in blood, moments after being shot by a police officer. Prior to that, the company admitted to removing a meme circulating about convicted Stanford rapist Brock Turner.
-
WikiLeaks made waves on Friday by releasing a huge trove of internal emails from the Democratic National Committee (DNC).
The hacked emails included what appears to be evidence of a concerted effort by DNC Chairwoman Debbie Wasserman Schultz and other party officials to thwart the presidential campaign of Sen. Bernie Sanders (I-Vt.) during the primary season. Wasserman Schultz resigned Sunday and will serve as an honorary chair on presumptive Democratic presidential nominee Hillary Clinton’s campaign instead.
According to CNN, U.S. officials briefed on the investigation into the compromised DNC emails now suspect Russian hackers are part of a bigger effort targeting political organizations and Washington, D.C., think tanks.
On ABC’s “This Week,” Clinton’s campaign manager, Robby Mook, said the emails were leaked right before the Democratic National Convention “by the Russians for the purpose of helping Donald Trump,” citing “experts.” Mook could not offer any evidence for the claim.
-
So Baby DonDon was reading all these stories about how Russia hacked the email system of the Democratic National Committee and this led to the ouster of DNC chair Debbie Wasserman Schultz. And I got nervous.
-
WikiLeaks founder Julian Assange says “there is no proof whatsoever” that Russian intelligence is behind the thousands of hacked emails from the Democratic National Committee that WikiLeaks released.
“The real story is what these emails contain and they show collusion,” Assange said during an interview with NBC News that will air Monday night on “NBC Nightly News with Lester Holt.”
While three cybersecurity experts told NBC that the DNC emails were hacked by Russian intelligence, Assange stressed that Wikileaks has not disclosed the source of the leak.
-
Following the end of the Republican National Convention, Donald Trump has received a surge in his popularity. He’s now leading Hillary Clinton 44 to 39 percent in a four-way match-up, according to the most recent CNN poll. Libertarian presidential candidate Gary Johnson received 9 percent, and Green Party candidate Dr. Jill Stein received 3 percent. But for WikiLeaks founder Julian Assange, the threat of a Donald Trump presidency doesn’t inspire him to back Hillary Clinton. When asked, Assange said: “You’re asking me, do I prefer cholera or gonorrhea?”
-
In the rush for big donations to pay for this week’s Democratic convention, a party staffer reached out to Tennessee donor Roy Cockrum in May with a special offer: the chance to attend a roundtable discussion with President Obama.
Cockrum, already a major Democratic contributor, was in. He gave an additional $33,400. And eight days later, he was assigned a place across the table from Obama at the Jefferson Hotel in downtown Washington, according to a seating chart sent to the White House.
-
On May 18, CNN.com published a pro-Hillary Clinton op-ed by Maria Cardona, a CNN political commentator. Titled “Why Sanders must take the high road,” the piece was published in the aftermath of an out-of-control Nevada Democratic state party convention.
-
Before WikiLeaks struck, Hillary Clinton already had work to do at this week’s Democratic National Convention to unify her party.
Now that task has become a lot more difficult. The weekend release by WikiLeaks of more than 19,000 hacked emails from Democratic National Committee staffers has provided embarrassing evidence of DNC favoritism toward Mrs. Clinton during the primaries – a bias long suspected by Bernie Sanders, the runner-up for the Democratic presidential nomination.
The scandal led to the forced resignation Sunday of DNC chair Debbie Wasserman Schultz, who will step down after the convention.
-
If the Russian government is behind the theft and release of embarrassing emails from the Democratic Party, as U.S. officials have suggested, it may reflect less a love of Donald Trump or enmity for Hillary Clinton than a desire to discredit the U.S. political system.
A U.S. official who is taking part in the investigation said that intelligence collected on the hacking of Democratic National Committee emails released by Wikileaks on Friday “indicates beyond a reasonable doubt that it originated in Russia.”
-
In an internal DNC memo published by WikiLeaks, one party staffer complained to colleagues that one of the party’s gay donors was just too high maintenance for her to handle.
The leaked memo, which is titled “Close out memo” and dated April 22, 2016, was authored by DNC staffer Julia Lahl, who recaps much of the work done with the party’s LGBT Leadership Council. The memo contains information on dozens of donors — not all of which is positive.
-
Perhaps these passwords had been changed, but if they were anything remotely close to the above, they were no good.
-
At the start of the Democratic National Convention on Monday when chair Marcia Fudge mentioned Hillary Clinton’s name, the crowd promptly booed.
-
A leaked email from a Democratic National Committee (DNC) staffer ridiculed reports from experts that the DNC and Republican National Convention had glaring cybersecurity issues.
DNC staffer Eric Walker called a Buzzfeed article detailing the security weaknesses of the DNC “The dumbest thing I’ve ever read.” The email is dated May 5, 2016, just over two months before the Wikileak release of over 20,000 DNC emails.
-
Sending terrified gasps through the audience as she pulled back a thick velvet curtain onstage to reveal the formidable politician, Massachusetts senator Elizabeth Warren assured the thousands of progressive onlookers at the Democratic National Convention Monday night that the docile Hillary Clinton standing before them meant them no harm. “Ladies and gentlemen, there is no need to fear this candidate, for despite her menacing reputation, she will not attack you or your progressive movement,” said Warren, who then wowed those in attendance by signaling for the compliant Clinton to repeat a series of talking points about regulating financial institutions in an effort to prove that the presumptive Democratic nominee could easily be trained and was not roused into a horrible frenzy by the presence of radical reforms. “Despite the tales you may have heard, she is nothing but a tame, pragmatic Democrat. The terror she stirs inside you belies her true gentle nature. I assure you she is no threat to the policies you hold most dear.” At press time, Clinton had broken free from her iron restraints, ripped off both of Warren’s arms, and tossed the senator’s body into the crowd.
-
Leaked emails show the Democratic National Committee scrambled this spring to conceal the details of a joint fundraising arrangement with Hillary Clinton that funneled money through state Democratic parties.
During the three-month period when the DNC was working to spin the situation, state parties kept less than one half of one percent of the $82 million raised through the arrangement — validating concerns raised by campaign finance watchdogs, state party allies and Bernie Sanders supporters.
The arrangement, called the Hillary Victory Fund, allowed the Clinton campaign to seek contributions of hundreds of thousands of dollars to attend extravagant fundraisers including a dinner at George Clooney’s house and a concert at Radio City Music Hall featuring Katy Perry and Elton John. That’s resulted in criticism for Clinton, who has made opposition to big money in politics a key plank in her campaign platform.
-
Last October, a leading Democratic donor named Shefali Razdan Duggal emailed a sweetly worded but insistent list of demands to a staff member at the Democratic National Committee.
Ms. Duggal wanted a reminder of how much she had raised for President Obama and the Democrats (the answer: $679,650) and whether it qualified her for the premium package of hotel rooms and V.I.P. invitations at the party’s convention in Philadelphia. She asked whether she could have an extra ticket to Vice President Joseph R. Biden’s holiday party, so she could bring her children. But most on her mind, it seemed, was getting access to an exclusive November gathering at the White House.
“Not assuming I am invited…just mentioning/asking, if in case, I am invited :),” wrote Ms. Duggal, who was appointed by Mr. Obama to oversee the United States Holocaust Memorial Museum and is married to a San Francisco financial executive. “Might you have an intel?”
-
Late Friday, WikiLeaks published 20,000 internal e-mails from the Democratic National Committee acquired in a hacking attack last month. The dumped messages, including some that had a derisive tone toward primary candidate Bernie Sanders, roiled the Democratic Party on the eve of its convention and led to the resignation yesterday of DNC chief Debbie Wasserman Schultz.
The DNC hack was discovered on June 14, and soon after, some evidence of a Russian connection was found. Now, the belief that the hack was sponsored by the Russian government on some level has been explicitly endorsed by Hillary Clinton’s campaign. Yesterday on CNN’s “State of the Union,” Clinton’s campaign manager, Robby Mook, said Russian hackers are explicitly trying to get Clinton’s opponent, Donald Trump, elected in November.
“I don’t think it’s coincidental that these e-mails were released on the eve of our convention here, and I think that’s disturbing,” Mook told program host Jake Tapper. The leak took place just after the Republican Party changed its platform “to make it more pro-Russian,” Mook added.
-
Barack Obama will be the last President of the Democratic party. Hillary Clinton with her choice for Tim Kaine as VP has declared war to the Progressive side of her own party. Donald Trump could benefit from this situation by using a “divide and conquer” strategy. Clinton just made a Trump presidency more likely, because she choose to divide her party instead of trying to unite blue. Progressives are wise enough not to let Trump exploit this situation. Progressives are also wise enough to hold Clinton accountable for her decisions at the right time.
It is up to Progressives to first defeat Trump, and then Clinton. This means with all the pain in their hearts Progressives will have to vote for Clinton. And not forget this declaration of war of Clinton, but wait with fighting Centrist Democrats until 2017. In a militant non-violent way; in the good tradition of Martin Luther King Jr.
-
But the truth is that there is no public evidence whatsoever tying Russia to the hack. Attribution for cyberoperations of this sort is very tricky and tends to take some time.
-
By now you’ve probably heard about the trove of emails to and from the Democratic National Committee that were released last week by WikiLeaks, an organization that publishes leaked documents to expose what it says is corruption and malfeasance by governments, as well as corporations.
So what if any links do these emails reveal between the DNC and teachers’ unions in particular?
-
In the last few months, Facebook Live has certainly become “a thing.” Launched just recently, it was suddenly everywhere — from the pure (but very viral) joy of Candace Payne and her Chewbacca mask to the live streaming of the tragic aftermath of Philando Castile being shot by a police officer in Minnesota. Of course, it appears that part of the reason why Facebook Live is getting so much usage isn’t necessarily that it’s a better product than its competitors, but rather that Facebook has been generously throwing around cash to all sorts of people and companies to get them to use the platform.
-
Just hours after the breaking news regarding the DNC’s hacked e-mail servers, it has been announced that chairwoman Debbie Wasserman Schultz has been removed from the position of party chair and will now be revoked from participating at the convention.
-
-
-
-
-
Wikileaks over the last few days dumped tens of thousands of emails hacked from the Democratic National Committee (DNC) server.
The disclosures of dirty tricks directed against Bernie Sanders contained in those emails are startling, and only add to the whirlpool of corruption and sleaze surrounding Hillary Clinton and the wheezing corpse of the democratic process.
-
As Hillary Clinton puts together what she hopes will be a winning coalition in November, many progressives remain wary — but she has the war-hawks firmly behind her.
“I would say all Republican foreign policy professionals are anti-Trump,” leading neoconservative Robert Kagan told a group gathered around him, groupie-style, at a “foreign policy professionals for Hillary” fundraiser I attended last week. “I would say that a majority of people in my circle will vote for Hillary.”
As the co-founder of the neoconservative think tank Project for the New American Century, Kagan played a leading role in pushing for America’s unilateral invasion of Iraq, and insisted for years afterwards that it had turned out great.
-
A group of Bernie Sanders delegates to the Democratic National Convention announced their discontent with the selection of Tim Kaine as the vice presidential nominee on Monday and signaled they might protest that decision on the convention floor.
Calling themselves the Independent Bernie Delegates Network, the group includes 1,250 Sanders delegates — about two-thirds of the total Sanders delegate count — who have been organized by RootsAction.org and Progressive Democrats of America. The group is holding snap straw polls among its members to help inform options for its actions at the convention.
In a survey of the delegates taken 10 days ago, just 3 percent said that Tim Kaine was an “acceptable” vice presidential choice for presumptive nominee Hillary Clinton, with 9 percent saying they were undecided, and 88 percent said the choice would not be acceptable.
-
For many Bernie Sanders supporters, the move to the Green Party’s Jill Stein was easily laid out. On Monday afternoon, hours before their candidate took the Democratic convention stage to reiterate his support for Hillary Clinton to the boos of some of his own delegates, a young man with a loudspeaker directed protesters to a park down the road from the Wells Fargo Center.
“The real revolution is down the street, to your left,” he told them, as others handed out “Jill 2016” posters to people still wearing their “Bernie 2016” shirts.
As several hundred people sat on a grass field waiting for Stein, the vibe was as much Coachella as it was leftist political rally. The crowd — as with Sanders rallies, largely white — lit up joints and hung out under trees, as speakers called attendees comrades, shouted out indigenous movements in Central America and the boycott movement in Palestine, and spoke in Spanish about Jill being “the only revolutionary.”
Stein, who took the stage in a sleeveless top and green scarf, introduced by Cornel West and hailed by a roaring crowd chanting “Jill not Hill,” welcomed Sanders supporters to her party, calling the move a “marriage made in heaven.”
-
Now, again, I’m not saying the Russians didn’t do this hack, nor am I dismissing the idea that they’d prefer Trump to Hillary. By far the most interesting piece of this is the way those with the documents — both the hackers and Wikileaks — held documents until a really awkward time for some awkward disclosures, with what may be worse to come.
But discussions that want to make the case should explain several things: Which of the two agencies alleged to have hacked DNC are behind the operation — or are they both, even though they weren’t, at least according to eh report that everyone is relying on without question, apparently cooperating? How certain can they be that the GRU is Guccifer, and if Guccifer is supposed to be a false flag why was it so incompetently done? What explains Guccifer’s sort of bizarre strategy along the way, encompassing both Wikileaks (an obvious one) and The Hill?
Again, I absolutely don’t put this kind of thing beyond Putin. Russia has used hacking to influence outcomes of elections and authority in various countries in the past and the only thing new here is that 1) we wouldn’t already be playing the other side and 2) we’re big and can fight back. But the story, thus far, is more complex than being laid out.
-
The first night of the Democratic National Convention featured rousing tributes to Hillary Clinton, blistering critiques of Donald Trump – and a chorus of boos from Bernie Sanders delegates at invocations to vote for Clinton, even when it came from Sanders himself.
Many commentators wondered why the Sanders delegates persisted in their protest, weeks after their nominee had conceded the election to presumptive nominee Hillary Clinton.
The answer may rest in a step that Sanders himself took.
In the lead-up to the convention, the Sanders campaign worked with both the Clinton campaign and the Democratic National Committee to help write the party’s platform. Those meetings featured debates between the Sanders and Clinton teams, and while there was progress on many issues, there were many more where Team Sanders suffered defeats – including opposition to the Trans-Pacific Partnership and Israel’s occupation of the Palestinians, banning fracking, and enacting a carbon tax.
-
If the Democratic nominee were chosen by those who showed up in the streets of Philadelphia to protest the convention, there would be one uncontested winner. “The people want Bernie,” read a sign at a rally Sunday that drew the same enamored crowds that turned out for the Vermont senator along the primary trail. The sign summed up the general sentiment of the crowd, as the rally grew into the thousands and began marching from City Hall in 93-degree weather. As the DNC kicked off, downtown Philadelphia was all about Bernie.
Hillary Clinton’s name and image showed up mostly in signs and chants saying “Never Hillary,” “Warlord,” and “Hell no, DNC, we won’t vote for Hillary.” Last week’s DNC email leaks and the ensuing party scandal spilled into the streets, leaving Bernie supporters bitter and upset, and prompting calls for a “DemExit” from the party. Using the same slogans seen at the Republican convention in Cleveland, some Bernie supporters sported “Hillary for Prison” shirts.
-
Sanders backers got some of the concessions they wanted from the Democratic National Committee. This year, 700 superdelegates, who are not bound by state voters, helped give Clinton a decisive edge over Sanders in the primary campaign. In the 2020 election, that number will be reduced to 250. The DNC also agreed to appoint a commission to study the possibility of opening up the party’s primaries to Republican and independent voters, another one of Sanders’s complaints.
-
WikiLeaks founder and editor-in-chief Julian Assange joins us from London about their release of nearly 20,000 emails revealing how the Democratic Party favored Hillary Clinton and worked behind the scenes to discredit and defeat Bernie Sanders. This comes as the Democratic National Convention is opening today in Philadelphia, Pennsylvania, amid massive party turmoil. The DNC chair, Florida Congressmember Debbie Wasserman Schultz, has resigned following the leak. The emails also reveal a close relationship between mainstream media outlets and the DNC.
-
As my colleague Glenn Greenwald told WNYC on Monday, while there may never be conclusive evidence that the Democratic National Committee was hacked by Russian intelligence operatives to extract the trove of embarrassing emails published by WikiLeaks, it would hardly be shocking if that was what happened.
-
-
It could have seemed like a singular act of defiance to abolish super PACs in one Florida town. Members of the City Council in St. Petersburg approved 6-1 today a motion to consider an ordinance that would limit the amount donors can give to groups that support or oppose candidates in local elections.
The ordinance, if passed later this year, would directly affect only elections in St. Petersburg. But it’s part of a far-reaching legal strategy to reduce the influence of money in politics by abolishing super PACs—groups that can take unlimited amounts of money from donors to spend in political campaigns—at the national level.
“This is a serious issue in our country and it has a corrosive effect on our elections and in our democratic process,” said Darden Rice, vice chair of the City Council. “But we are going to have to tackle it on all levels—from our city halls all the way up to the Supreme Court.”
-
Censorship/Free Speech
-
Facebook admitted Sunday that it blocked links to WikiLeaks’ trove of emails that were hacked from the Democratic National Committee (DNC).
WikiLeaks took to Twitter Saturday night informing followers that Facebook was censoring content and offered people an alternative way to post links to Facebook from WikiLeaks.
-
Censorship is censorship. If you block someone from speaking freely or delete people’s content from the Internet you do censor them.
But there are different sorts of censorship.
One is when the government silences opposition, controversial voices or whatever. That is, in general terms, a violation of freedom of speech and our civil rights. That should not be accepted in a democratic society.
Another form of censorship is when Twitter censors Milo Yiannopolous, when Google censor artist Dennis Cooper or when Facebook is accused of downgrading news depending on political affiliations.
These are private companies and they choose to whom they want to provide their services. This is clearly stated in these companies voluminous terms and conditions.
-
Facebook has acknowledged it blocked links to WikiLeaks’ DNC email dump, though (again) hasn’t explained why.
-
The court is not impressed. The case against Google is rejected in large part because Section 230 of the CDA clearly protects Google. And this was true even though O’Kroley also asked the court to throw out CDA 230 “as a simple matter of logic.” That’s not how all this works. The other defendants got out even easier, seeing as O’Kroley apparently never served them. In fact, the court finds most of O’Kroley’s legal arguments to be a waste of time, including trying to add Georgetown University as a defendant after a law school class said it planned to teach this case.
-
China’s top online companies have been ordered by the country’s Internet regulator to stop producing original news reporting.
The Cyberspace Administration of China’s latest order represents another online clampdown in the People’s Republic.
The companies affected include Sina, which describes itself as “an online media company serving China and the global Chinese communities,” the portal Sohu, and NetEase, a major player in the online gaming world.
This latest edict, according to Bloomberg, follows a similar order given last week to Asia’s largest Internet company, China-based Tencent, which had a turnover of $15 billion last year, and is best known for its hugely-popular WeChat messaging app.
-
Censorship is always a topic fraught with danger, because everyone’s standard of what is and isn’t right is different.
-
-
I am hesitant to write this. Not hesitant because I have any doubts that the actions of Cinema Libre Studios and Andrew Wakefield’s team are wrong. No, hesitant because it has all the hallmarks of people trolling for attention and free publicity. I do not like giving people like Andrew Wakefield or Cinema Libre Studio attention.
-
A US film studio has threatened to sue an Irish autism-rights advocate if she continues to speak out against its controversial anti-vaccine documentary, Vaxxed: From Cover-Up to Catastrophe, writes Eoin English.
West Cork-based mother, Fiona O’Leary, who wants to block the film’s release in Ireland and Britain, said she was outraged to receive a legal letter from California-based Cinema Libre Studios over the weekend.
-
China is currently in the process of finalizing a new internet security law that will strengthen online censorship and further tighten information control within the country. At the same time, there has been a rise in pre-publication censorship by new media platforms in China, which has helped promote the practice of self-censorship among users. CNN’s James Griffiths recently reported fears that China might eventually perfect its Great Firewall and create a censorship system that is impervious to circumvention tools; others like Google’s Eric Schmidt or World Wide Web creator Tim Berners-Lee, on the other hand, have predicted that mass censorship will become either technically infeasible or economically unviable.
-
-
-
-
-
-
-
Privacy/Surveillance
-
If you’re a long-standing reader of Techdirt, you know we’ve well documented the shitshow that is the “internet of things.” It’s a sector where countless companies were so excited to develop, market and sell new “smart” appliances, they couldn’t be bothered to embrace even the most rudimentary security and privacy standards once these devices were brought online. The result is an endless stream of stories about refrigerators, TVs, thermostats or other “smart” devices that are busy hemorrhaging personal data, inadvertently advertising that sometimes the smart option — is actually the dumb one.
This systemic incompetence has now fused with a cultural disdain for more modern consumer privacy protections. The end result has been an obvious uptick in concern about how much data is now being collected by even childrens’ toys like Barbie dolls, something that last year’s Vtech hack illustrated isn’t just empty fear mongering. Convincing parents who already find technology alienating has proven to be difficult, as is attempting to craft intelligent regulation that protects kids’ playtime babbling from being aggressively monetized, without hindering emerging sector innovation and profits.
To that end, the Family Online Safety Institute and the Future of Privacy Forum held a presentation last week (you can find the full video here) where analysts and experts argued, among other things, that privacy policies need to be significantly simplified and modernized for an era where a child’s doll can profoundly impact the privacy of countless people. It has been, needless to say, an uphill climb.
-
The trust of the Tor anonymity network is in many cases only as strong as the individual volunteers whose computers form its building blocks. On Friday, researchers said they found at least 110 such machines actively snooping on Dark Web sites that use Tor to mask their operators’ identities.
All of the 110 malicious relays were designated as hidden services directories, which store information that end users need to reach the “.onion” addresses that rely on Tor for anonymity. Over a 72-day period that started on February 12, computer scientists at Northeastern University tracked the rogue machines using honeypot .onion addresses they dubbed “honions.” The honions operated like normal hidden services, but their addresses were kept confidential. By tracking the traffic sent to the honions, the researchers were able to identify directories that were behaving in a manner that’s well outside of Tor rules.
-
Nowadays even mainstream media is full with privacy related concerns. Ever since the Snowden leaks, people are aware that they are watched by different governmental agencies in the US and around the world. We give up our privacy for cheap / free on-line services, like Gmail. Facebook knows more about us than our own parents. Pokemon Go is a location-based game, therefore its creators know the location of about a hundred million players around the world. Lenovo has installed privacy-threatening bloatware to Windows machines using the BIOS.
[...]
The use of open hardware can help to avoid ugly surprises, for example in case of Lenovo. There are many definitions of open hardware. The simplest definition is that it does not require a binary blob loaded under Linux to run. I find this definition a bit too broad, however, such hardware is still difficult to find. Many x86 PC hardware belongs to this category.
Hardware can be open by having all information to rebuild the same hardware or to perform some modifications to the design on our own available. For example, Novena has all of its design sources online. It can also be open on the firmware side, like u-boot on most ARM developer boards.
While most open hardware efforts involve underpowered older parts, there are some notable exceptions. The Librem 2-in-1 tablets from Purism are blob-free and have a privacy-oriented Linux-based operating system. Raptor Engineering with its POWER-8-based Talos Secure Workstation goes even further with its schematics and firmware being fully open and auditable. In addition to this, its performance beats anything running on an x86 CPU.
-
Previously secret official documents, containing new revelations about the Government’s mass surveillance regime, have today been disclosed as a result of litigation brought by Privacy International against the Intelligence Agencies (MI5, MI6, GCHQ). These documents shed further light on the secretive bulk data collection regime operating under section 94 of the Telecommunications Act 1984 and the Bulk Personal Data-set regime.
-
A 91-year-old civil liberties campaigner, John Catt, is taking his fight to have police surveillance records of his peaceful participation in protests deleted to the European Court of Human Rights (ECHR).
Catt is classified by UK police as a “domestic extremist,” even though he has no criminal record. His name was added to a secret national database run by the UK’s National Public Order Intelligence Unit. It contains details of his attendance at over 80 lawful demonstrations with his daughter, including their appearance and slogans on their T-shirts.
-
In a period spanning 72 days, two researchers from Northeastern University have discovered at least 110 “misbehaving” and potentially malicious hidden services directories (HSDirs) on the Tor anonymity network.
-
Computer science professor Anil Jain spends most of his time researching and improving biometric systems, like fingerprint scanners and facial recognition software. Last month, however, law enforcement agents approached the Michigan State University academic with an unusual request: to create a 3D-printed replica of a dead man’s finger.
Police needed the prosthetic digit to try and unlock a murder victim’s smartphone, protected by a fingerprint scanner instead of a password.
“The authorities think that unlocking the phone could give them the identity of the murderer,” Jain said. “We are doing our social duty to assist in a criminal investigation.”
Law enforcement agents had seen a YouTube demonstration of a technique developed by Jain’s lab which could transform fingerprint scans into fake fingertips that could fool the sensors on smartphones.
-
A second federal judge has ruled that a suspect can be compelled to unlock their iPhone using their fingerprint in order to give investigators access to data which can be used as evidence against them. The first time this ever happened in a federal case was back in May, following a District Court ruling in 2014.
-
Two Canadian youngsters distracted by playing Pokémon Go accidentally crossed the border into the U.S. and had to be apprehended in Montana by federal agents, officials said Friday.
The U.S. Customs and Border Protection said agents found the pair of juveniles illegally entering the U.S. last Thursday by foot. The two were “unaware of their surroundings” while playing the popular game on their cellphones.
“Both juveniles were so captivated by their Pokémon Go games that they lost track of where they were,” U.S. Customs and Border Protection spokesman Michael Rappold said in a statement.
-
Just what kind of email retentions powers does Yahoo have? According to a policy guide from the company, Yahoo cannot recover emails that have been deleted from a user’s account—simple as that. If the email is in a user’s account, it’s fair game, and Yahoo can even give law enforcement the IP address of whatever computer is being used to send said email.
Or, at least, that’s what Yahoo has said. A magistrate judge from the Northern District of California has ordered Yahoo to produce documents, as well as a witness for deposition, related to the company’s ability to recover seemingly deleted emails in a UK drug case.
As Motherboard reports, a UK defendant was convicted—and is currently serving an extra 20-year prison sentence—as part of a conspiracy to import drugs into the United Kingdom. He’s currently appealing the conviction, in part because the means by which Yahoo recovered the emails in question allegedly violate British law.
-
Technology companies may face stricter licensing requirements to export products that could be used to violate human rights, as part of a change to EU rules.
The European Commission is set to propose controversial measures in September that may force firms to go through lengthy approval processes when they export technologies including location tracking devices, biometrics and surveillance equipment.
A draft proposal, obtained by EurActiv.com, would require export controls for cyber-surveillance technologies under a revised EU law that covers so-called dual-use goods that can either be used as weapons or for civil purposes.
Technology firms are worried the change will make it harder to export a broad range of common products like smartphones because they can track users’ locations.
“You can’t make suspects out of the whole branch for items that are harmless. It will overwhelm the licensing authorities,” one industry source said.
-
A Wall Street Journal reporter was detained by federal agents at the Los Angeles airport who demanded to confiscate her two cell phones — and was surprised to find that border agents have the authority to do that.
-
Civil Rights/Policing
-
The human rights group said it has “credible evidence” that around 10,000 Turkish soldiers face the severe punishments for their part of the failed military coup against president Erdogan.
Victims are being held in makeshift cells, such as stables and sports halls, and are being tortured and held in stress positions for 48 hours, the group said.
-
-
Martin and her producer, Mike Prysner, got into an Uber transport to try to get to the location and were dropped off by the Uber driver at the DNC site where only those with credentials are allowed.
The police stopped them and told them to leave the area. As they were complying and leaving the area, another police officer grabbed Martin, tore her dress and arrested her for “disorderly conduct.”
-
U.S. Representatives John Conyers, Jr. (D-MI), Marcy Kaptur (D-OH), Keith Ellison (D-MN) and more than thirty other members of the House of Representatives sent a letter today to Secretary of State John Kerry, urging him to refrain from gestures that could be interpreted as supportive of Brazil’s interim government and to instead “express strong concern” regarding the impeachment process targeting Brazilian President Dilma Rousseff and to “call for the protection of constitutional democracy and the rule of law in Brazil.” The letter is the first Congressional letter expressing concern over Brazil’s democracy in more than two decades.
The letter notes that the legal basis for the ongoing impeachment of Brazil’s first female elected president has been widely contested and that there is compelling evidence showing that key promoters of the impeachment campaign are seeking to remove Rousseff in order to contain the investigation of corruption cases and impose a far-right policy agenda that was rejected by Brazilian voters in the country’s most recent elections.
-
The Bureau sent Freedom of Information Requests to every police force in England and Wales, asking them to provide complete outcome data for all hate crimes recorded in 2014/15 and, separately, 2015/16.
Forty police forces responded to our request. Because of discrepancies in their recording systems, particularly among smaller forces, we weren’t able to perform detailed comparisons of each of them. However, we are able to map changes in recorded hate crime at a regional level.
There are significant regional difference, but the vast majority have seen increases in recorded hate crime. West Yorkshire, which has a large Muslim population, has seen the greatest rise, with recorded hate crimes up 69% from the previous year. Out of the 40 respondents, six forces have seen a fall. To see how your region compares, hover your mouse over the map and click for the data.
The data obtained by the Bureau revealed that the chances of police or prosecutors taking action against hate crime offenders have plummeted over the last year. Victims of hate crime now have only a one in four chance of seeing a perpetrator charged, cautioned or dealt with in some other way by the police – down from one in three in the previous year.
-
In the immediate aftermath of the Turkish military’s attempted coup on July 15, the international community responded with relief. While many people within Turkey and outside of it are no fans of president Recep Tayyip Erdogan’s authoritarian regime, the bloodshed and chaos that would have resulted from a government overthrow seemed like the worse of two options.
But a little more than a week after the failed coup, it’s clear that the Turkish president is taking advantage of it in an attempt to gain absolute power in Turkey, enacting draconian measures and targeting any person or institution who might act as a voice of dissent. As Turkey moves toward dictatorial rule, here’s what the international community needs to know.
-
An English-speaking teacher says the Miami-Dade County School Board discriminated against her by not hiring her for a job. The position? Teaching an hour of Spanish per day.
Tracy Rosner, a third-grade teacher at Coral Reef Elementary, filed a federal lawsuit in the Southern District of Florida last week claiming employment discrimination on the basis of her race — which is white.
Miami-Dade School Board attorneys have not filed a formal response in court and did not return calls for comment Thursday. We’ll update this post if they provide one.
-
-
-
We, the undersigned, condemn the actions taken by the Turkish government in violation of human rights and the rule of law. The principle of independence and impartiality of the judiciary—together with freedom of the media—is at the foundation of the rule of law and democracy. The political independence and the academic freedom of the educational profession is essential for free societies.
-
The Egyptian news site the Arab Observer Network reports that the visit to Israel of a former Saudi military intelligence officer, Gen. Anwar Eshki, came as a body blow to the Arab in the street. He conducted several meetings with Israeli officials last week, along with a “high level” Saudi delegation.
Saudi Arabia and Israel, the old hegemons in the Middle East, are increasingly coordinating to confront a rising Iran.
Eshki met with Dore Gold, the general director of the Israeli foreign ministry, as well as Israeli members of parliament. On his agenda was restarting the Israel-Palestine peace process on the basis of the 2002 Saudi/ Arab League plan, which calls for a two-state solution on the basis of 1967 borders.
-
The Dallas police decision to use a robot-delivered bomb to kill the cornered shooter blamed for murdering five police officers raises troubling legal, technological and public-safety questions, writes Marjorie Cohn.
-
PREA is the Prison Rape Elimination Act, sweeping federal legislation targeting the nation’s prisons and jails. Passed in 2003, the law was aimed in part at places like this — facilities for youth who present a danger to others or themselves. But while PREA has proven hard to implement, that’s not why I was there that day. Less than a year after Shelby County Sheriff Bill Oldham took over the detention center that sits directly above juvenile court, officials were running dangerously afoul of a different federal intervention — one designed specifically for Shelby County.
-
Part of the frenzied discussion about the possibility that Russia hacked the DNC includes claims that the US would never do something so dastardly.
Except that the Foreign Government Section 702 Certificate makes it clear the NSA is authorized to spy on foreign based political organizations even within the US (and would have far more liberty under EO 12333). Among the parties specifically authorized for targeting in 2010 was Pakistan’s People Party, the incumbent party in a nominal ally.
-
Zionism’s range of influence is shrinking. One can see this progression worldwide. At a popular level the Israelis have lost control of the historical storyline of Israel-Palestine. They may teach their own citizens their version of the story, the one wherein the Jews have a divine and/or historical right to all of Palestine’s territory. But beyond their fellow Zionists and the loony Christian Right, no one else believes this story. Significantly, an increasing number of Jews no longer accept it either.
None of this means that the Zionists are not still influential. Yet their influence no longer has a broad popular base. It is now largely restricted to Western government circles. Of course, that is still impressive, and such lobby power does a lot of damage in the West through the corruption of elites and the perversion of state policies. We are seeing examples of this in the many stories of American police officers being trained by Israelis while (coincidently?) episodes of police brutality in the U.S. multiply.
-
If Donald Trump’s “Law and Order” convention is any indication, Republicans in Congress could soon try to amend federal law to equate violence against police officers to assaults fueled by bigotry.
The Blue Lives Matter Act of 2016, which was introduced to the House in April, gained two co-sponsors in the two weeks prior to the Republican Convention. The bill would amend Chapter 13 of Title 10 of the US Code to “make an attack on a police officer a hate crime.”
Trump’s convention focused heavily on the idea that crime is out of control, in part, because police are on the receiving end of unfair criticism.
“I have a message to every last person threatening the peace on our streets and the safety of our police,” Trump said during his speech on Thursday. “When I take the oath of office next year, I will restore law and order our country.”
-
Internet Policy/Net Neutrality
-
In June, the European Commission approved Italy’s high-speed broadband plan to deliver fast Internet access to 7300 of the country’s 8000 municipalities. The EUR 4 billion plan will build a country-wide network infrastructure, improving Internet access for citizens, businesses, and public administrations – including schools and hospitals.
-
Poland’s Ministry of Digitisation is studying how it can best help the country’s small and medium-sized enterprises (SMEs) that wish to offer broadband Internet access. Recently, the ministry met with banking organisations and SME telecom trade groups, to discuss options for financing infrastructure upgrades, including possibilities for European co-financing.
-
Intellectual Monopolies
-
Every time this case has come up (and it’s been bouncing around the courts for a while now), I’ve been meaning to write about it, but am only just getting around to it now that organizations are filing amici briefs with the Supreme Court. The case is Star Athletica v. Varsity Brands, and it sounds kind of stupid: the issue is that both companies make cheerleading uniforms, and Varsity Brands accused Star of copying its uniform designs. Star argued that as a “useful article” a cheerleading uniform is not subject to copyright protection, and it won at the district court level. The 6th Circuit, however, reversed that ruling about a year ago, saying that while the uniform design may not be copyrightable, elements within the design (stripes, zigzags, chevrons, etc.) could be.
This is problematic for a variety of reasons. Clothing and fashion have never been considered covered by copyright for many good reasons, and it’s actually helped create a more innovative, more competitive, thriving market for fashion. There’s a reason why copyright is not allowed on “useful articles,” and it’s worked. We shouldn’t suddenly be changing those rules now.
The Supreme Court has agreed to hear the case, and various amici have begun filing their briefs. You can also see Star Athletica’s own filing as well, which focuses (as it should) on the narrow technical question regarding “separability” and whether or not you can “separate” the design that’s being claimed for copyright from the article itself. That is, you could argue that a square painting done on a T-shirt could be “separable” from the T-shirt and thus get a copyright, while the T-shirt itself could not. Here, however, we’re talking about basic elements of a cheerleading uniform such as stripes and color patterns that help identify it as a cheerleading uniform.
-
Copyrights
-
After the demise of KickassTorrents, internet pirates are looking for alternatives.
-
Some KickassTorrents employees have grouped to form a KickassTorrents community website that has become a home to the loyal users. Named Katcr.co, this website doesn’t offer any torrent links. Many original staffers and team members are present on the website that are acting as moderators and admins of the forum.
-
You may recall that almost three years ago, the BitTorrent search engine IsoHunt agreed to shut down and to “pay” Hollywood studios $110 million. The number was a joke, because IsoHunt and its creator didn’t have $110 million. It’s just that the legacy copyright players always like to end these lawsuits with a giant headline grabbing number, while they’ve quietly agreed to accept very little, if any, actual money (and whatever money they do receive is not then distributed to any artists). The Sony email hack a few years back revealed that the industry does this frequently in closing out its lawsuits against search engines. IsoHunt was more or less forced into that settlement after the MPAA misled the court about IsoHunt’s actions. But the court bought it, and the IsoHunt court rulings have created some really unfortunate precedents. It’s the case that the legacy players always point to, because it’s the only case to find that a search engine platform has “red flag knowledge” of copyright infringement without having specific knowledge of infringing files.
The case against Hollywood, however, wasn’t the only case IsoHunt was fighting. It also was fighting the recording industry up in Canada in a case that began with IsoHunt filing for declaratory judgment that it didn’t infringe in Canada, all the way back in 2008. The Canadian Recording Industry Association (CRIA), then sued back — but did everything it could to keep the case out of the news because it was also fighting for new copyright laws in Canada… and part of its argument was that the existing Canadian copyright laws were inadequate to go after IsoHunt and similar sites.
-
20th Century Fox has accused Kim Dotcom of breaching a freeze on his assets imposed following his arrest in 2012. According to claims made by the studio in the New Zealand High Court, Dotcom took a US$154,000 loan from his lawyers on behalf of a trust for his children.
-
Earlier this week KickassTorrents was taken down following a criminal investigation into the site’s alleged owner. Since then, millions of frequent users have taken refuge elsewhere. The Pirate Bay and ExtraTorrent are among the major beneficiaries, with the latter reporting an instant traffic spike of more than 300%.
Permalink
Send this to a friend
07.25.16
Posted in News Roundup at 6:58 pm by Dr. Roy Schestowitz

Contents
-
Now just to clear the air. I personally don’t run Windows in a virtual machine or dual-boot. However, there are some games I play using WINE. If you’re stuck trying to pull yourself away from legacy Windows applications take heart, there is hope. One of the options above may provide you with a means of using Linux for most daily tasks while still having access to any Windows applications you can’t live without.
What say you? Do you find yourself dual-booting or using WINE? Perhaps you didn’t know that it’s possible to run an unregistered copy of Windows 10 without any show-stopping restrictions? Hit the Comments and share your experience with Windows applications as a Linux user.
-
Desktop
-
The history of the Gnome and KDE desktops go a long way back and their competition, for the lack of a better term, is almost as famous in some circles as the religious divide between Emacs and Vi. But is that competition stil relevant in 2016? Are there notable differences between Gnome and KDE that would position each other on a specific segment of users? Having both desktops running on my systems (workstation + laptop) but using really only one of them at all times, I wanted to find out by myself.
My workstation and laptop both run ArchLinux, which means I tend to run the latest stable versions of pretty much any desktop software. I will thus be considering the latest stable versions from Gnome and KDE in this post. Historically, the two environments stem from different technical platforms: Gnome relies on the GTK framework while KDE, or more exactly the Plasma desktop environment, relies on Qt. For a long time, that is until well into the development of the Gnome 3.x platform, the major difference was not just technical, it was one of style and experience. KDE used to offer a desktop experience that was built along the lines of Windows, with a start center on the bottom left, a customizable side bar, and desktop widgets. Gnome had its two bars on the top and bottom of the screen, and was seemingly used as the basis for the first design of Mac OS X, with the top bar offering features that were later found in the Apple operating system.
-
MAYBE it’s how intrusive Windows 10 can be. Or maybe you’re just fed up with working under the constant threat of viruses and other malicious software. Or perhaps, you’re tired of paying thousands of pesos for applications and equally weary of breaking the law by installing pirated versions of the software. Indeed, there are many reasons to dump Windows in favor of the free and open-source Linux operating system. Here’s what Windows users who are contemplating the move should keep in mind.
-
It’s no secret that Chrome OS has not been the same striking success for Google that the Android OS has been. And yet, Chromebooks–portable computers running the platform–have not only found their niche, but they are also introducing a new generation to cloud computing. Chromebooks are firmly entrenched in the education market, where many young users have become used to the convention of storing apps and data in the cloud.
Now, according to new research from Gartner, Chromebooks are ready to hit new milestones. Analysts there report that Chromebook shipment growth will be in the double digits this year. At the same time, though, Chromebooks have not become fixtures in the enterprise, replacing Windows PCs.
-
Server
-
System administrators play a crucial role in businesses today. They are the individuals responsible for the configuration, support and maintenance of company computer systems and servers. For this reason, they are a popular hiring request, with defense and media companies alike looking for these professionals on Dice.
Yet, despite the ongoing demand, finding and recruiting system administrators may be more of a challenge. Data from the U.S. Bureau of Labor Statistics (BLS) found that the quarterly unemployment rate for system administrators was 0.6%, well below the national quarterly average (4.9%) and the quarterly average for all tech professionals (2.1%). Employers thus need to focus more of their recruitment strategies on poaching this talent from competitors.
-
A few years later, sysarmy, the local IT community, was born as the “Support for those who give support.” And in that spirit, for this 8th AdminFest edition, we want to do exactly that: support those who help others in our Q&A platform, sysarmy.com/help. Each 500 points a participant earns, he/she gets a free drink in return!
-
John Willis takes a brief look at the history of how Devops principles and operating systems have converged. He spends most of the time forward looking at what and how unikernels will converge with Devops tools, processes and culture. He ends with a demo of how containers, unikernels and Devops ideas can work together in the future.
-
Whether you’re still using Subversion (SVN), or have moved to a distributed system like Git, revision control has found its place in modern operations infrastructures. If you listen to talks at conferences and see what new companies are doing, it can be easy to assume that everyone is now using revision control, and using it effectively. Unfortunately that’s not the case. I routinely interact with organizations who either don’t track changes in their infrastructure at all, or are not doing so in an effective manner.
If you’re looking for a way to convince your boss to spend the time to set it up, or are simply looking for some tips to improve how use it, the following are five tips for using revision control in operations.
-
Kernel Space
-
So, after a slight delay due to my travels, I’m back, and 4.7 is out.
Despite it being two weeks since rc7, the final patch wasn’t all that
big, and much of it is trivial one- and few-liners. There’s a couple
of network drivers that got a bit more loving. Appended is the
shortlog since rc7 for people who care: it’s fairly spread out, with
networking and some intel Kabylake GPU fixes being the most noticeable
ones. But there’s random small noise spread all over.
-
-
Today, July 24, 2016, after a week of holiday fun, Linus Torvalds has had the great pleasure of announcing the release of Linux kernel 4.7 for all GNU/Linux operating systems.
The Linux 4.7 kernel has been in development for the past two months, but that shouldn’t surprise anyone who is either reading our website on a regular basis or keeping pace with the Linux kernel development cycle, which was very normal for this branch. A total of seven Release Candidate (RC) testing builds were released since May 29, 2016, which introduced numerous new features and improvements.
-
If all goes according to plan, the Linux 4.7 kernel will be released before the day is through.
-
Last October I looked at The Size Of The Different Open-Source Linux DRM/Mesa Graphics Drivers, but with it being nearly one year since then and Linux 4.7 due out today, I decided to run some fresh L.O.C. measurements on the popular DRM/KMS drivers to see their current sizes.
This lines-of-code counting was mostly done out of a curiosity factor. In this article I’m just looking at the in-kernel DRM code and not the Mesa drivers, DDX drivers, LLVM back-ends, or anything else in user-space related to the open-source graphics drivers.
-
-
Yet another Linux kernel security feature coming to the mainline kernel that appears readied for the Linux 4.8 merge window is hardened usercopy.
Hardened usercopy was originally based upon GrSecurity’s PAX_USERCOPY feature but reworked into a whole new form, according to developer Kees Cook at Google. This hardened usercopy is to be exposed as the CONFIG_HARDENED_USERCOPY option within the kernel.
-
Alexandre Oliva from the GNU Linux-libre project happily announced the release and general availability for download of the GNU Linux-libre 4.7 kernel for those who want 100% freedom when using a GNU/Linux operating system.
The release of GNU Linux-libre kernel 4.7 comes a few hours after Linus Torvalds’ announcement for the new Linux 4.7 kernel branch, on which GNU Linux-libre 4.7-gnu is based, and, as usual, it contains deblobbing changes for various of the included drivers, including Radeon, Intel i915 CSR, Intel Skylake audio, HFI1 InfiniBand, Realtek rtl8xxxu Wi-Fi, iwlwifi, mwifiex, Broadcom brcmfmac, and Atheros ath10k.
-
-
-
-
-
-
-
-
-
-
-
-
-
Graphics Stack
-
The latest work landing in Mesa Git has been for H.264 VA-API video encoding.
Earlier this month I wrote about the work being done by AMD engineers on H.264 VA-API video encoding inside Gallium3D. Of course, with the code being worked on by AMD, the primary focus has been for their RadeonSI Galloum3D driver with GPUs that have their VCE video encode engine. However, this could end up benefiting other Gallium3D drivers too.
-
Applications
-
Oracle announced the release of the first maintenance update to the VirtualBox 5.1 series of the open-source and cross-platform virtualization software for all supported computer operating systems.
-
Each Linux distribution has a default terminal emulator for interacting with system through commands. But the default terminal app might not be perfect for you. There are so many terminal apps that will provide you more functionalities to perform more tasks simultaneously to sky-rocket speed of your work. Such useful terminal emulators include Terminator, a multi-windows supported free terminal emulator for your Linux system.
-
-
If you could magically, instantly, create any sort of app for the Linux desktop right now, what would it be?
-
Proprietary
-
Instructionals/Technical
-
Games
-
The Battle for Wesnoth is probably one of the all time great open source games. It’s been around for a long time, it’s well polished and now it’s looking to get on Steam.
-
Kalypso Media really are getting Linux friendly aren’t they! Vikings – Wolves of Midgard has been announced as a new action RPG that will launch in early 2017.
-
One of the latest fun projects making use of Khronos’ Vulkan API is a port for Quake 1.
If you have some time to kill this week, vkQuake is a port of Quake 1 to the Vulkan API for graphics rendering. The Quake 1 code is derived from QuakeSpasm, a popular open-source Quake project.
-
-
-
Auto-Staccato is a new action rhythm game coming to Linux and it’s trying to get on Steam.
-
-
Three new Linux Distributions join the ranks:
- PCLinuxOS
- Netrunner
- ZorinOS
-
Feral Interactive announced recently that they managed to successfully port the popular, award-winning Life Is Strange game to GNU/Linux and Mac OS X operating systems.
Life Is Strange is an episodic graphic adventure game published by Square Enix and developed by Dontnod Entertainment. The story follows the life of Max Caulfield as a photography senior that discovers a time traveling method to save her friend Chloe Price. The player will be able to rewind time, which will affect the past, present and future.
-
Desktop Environments/WMs
-
GNOME Desktop/GTK
-
The GNOME 3.21.4 desktop environment was released last week, which means that many of the default applications and components were updated with bug fixes and various enhancements.
-
-
Solus Project founder and architect Ikey Doherty announced on July 24, 2016, that the static release schedule for their Solus operating system is officially and completely dropped.
-
Why 5? Why not 10?
The more distributions that I list, the more confusion that I will introduce to potentially new users. If I had to recommend 1 it would be Linux Mint but we are all different so I have tried to add a bit of variety.
The list includes 2 main stream behemoths, a rolling release distribution, a lightweight distribution and a cool modern distribution. I think that covers most bases.
Thankyou for reading.
-
New Releases
-
Zbigniew Konojacki informs Softpedia about the availability of the public Beta release f his upcoming 4MLinux 19.0 GNU/Linux distribution, which comes one week after the release of the 4MLinux 19.0 Core edition.
As reported by us in the second week of July, the Beta release of 4MLinux 19.0 Core, which the developer uses as the base for all the distributions and distrolettes that are being distributed as part of the 4MLinux family, including 4MParted, 4MRescueKit, BakAndImgCD, 4MRecover, and Antivirus Live CD, the operating system uses the GNU Compiler Collection (GCC) 6.1.0.
-
OpenSUSE/SUSE
-
The development cycle of the openSUSE Leap 42.2 operating system continues, and today we would like to inform our readers about the availability of the third and last Alpha build in the series.
-
Starting from version 1.21.0 you’ll experience an improved graphical user interface, where show and compare views are connected. With this you can navigate between viewing different descriptions as well as comparing them, so working with multiple system descriptions is much faster and offers greater usability.
When you start the graphical user interface you will get a list of all available system descriptions, where you can choose one to view more details. The following screen shot shows this list. You can use the search mask to filter them for certain terms. Simply click on the description you would like to see and it will get you to the details view. Run the command `machinery list –html` to get to the list view.
-
We are happy to announce that Azure image type has been enabled for SUSE Linux Enterprise 12 SP1 appliances. From now on you can build and upload SLE12 SP1 based appliances in the Microsoft Azure Cloud.
-
Red Hat Family
-
Finance
-
Fedora
-
Modularity is an exciting, new initiative aimed at resolving the issue of diverging (and occasionally conflicting) lifecycles of different “components” within Fedora. A great example of a diverging and conflicting lifecycle is the Ruby on Rails (RoR) lifecycle, whereby Fedora stipulates that itself can only have one version of RoR at any point in time – but that doesn’t mean Fedora’s version of RoR won’t conflict with another version of RoR used in an application. Therefore, we want to avoid having “components”, like RoR, conflict with other existing components within Fedora.
-
Fedora Program Manager Jan Kurik announced that the Fedora 22 Linux operating system has officially reached end of its life on July 19, 2016, urging users to upgrade to either the Fedora 23 or Fedora 24 releases.
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
Canonical just released Ubuntu 16.04.1, the first point release in the Ubuntu 16.04 “Xenial Xerus” series. All the changes made to Ubuntu 16.04 have been combined into a new installer image, which you can now download.
-
It doesn’t what sort of portable device you use, from laptop, to tablet, to phone: you know how crucial it is to monitor battery life.
-
Flavours and Variants
-
The guys over elementary OS have released a second Beta version of the highly anticipated elementary OS 0.4 “Loki” operating system, fixing numerous of the issues reported by users since the first Beta.
This time, the announcement was made by Daniel ‘DanRabbit’ Foré, who reports that more than 70 bugs reported by public beta testers since last month’s Beta release have been squashed, and that many of the fixes are in fact configuration changes, which means that they won’t be available to those running the first Beta build, so they’ll have to make a fresh install.
-
As part of the Ubuntu 16.04.1 LTS (Xenial Xerus) announcement, Martin Wimpress informs us about the release of the Ubuntu MATE 16.04.1 LTS operating systems for users of Ubuntu MATE 16.04 LTS.
Ubuntu MATE 16.04.1 LTS is not a major release, and if your Ubuntu MATE 16.04 LTS (Xenial Xerus) installation is up to date, you already have the latest software updates and security patches that have been injected in the new installation mediums generated mainly for those who want to reinstall or deploy the OS on new systems.
-
The first point release of the Xubuntu 16.04 LTS computer operating system has been officially published as part of the Ubuntu 16.04.1 LTS (Xenial Xerus) announcement earlier in the week.
-
Now that I’ve had about a week to play around in Mint 18, I find a lot to like and have no major complaints. While Cinnamon probably isn’t destined to become my desktop of choice, I don’t dislike it and find it, hands down, the best of the GNOME based desktops I’ve tried so far. Anybody looking for a powerful, all purpose distro that’s designed to work smoothly and which can be mastered with ease would be hard pressed to find anything better.
-
-
Artila’s “Matrix-700” control computer runs Linux on a Cortex-A5 SoC, and offers 8GB eMMC, plus three USB, four RS-232/485, GbE, and Fast Ethernet ports.
The Matrix-700 is the first Cortex-A5 based model in Artila’s family of traditionally ARM9-driven Matrix industrial computers. The device is designed for non-stop operation in remote locations, such as device networking and remote monitoring.
-
Rabid Prototypes is crowdfunding a $20 “Neutrino 2.0” version of its earlier, tiny Arduino Zero clone. Rev 2.0 adds RX/TX pins and several other tweaks.
Like last year’s Neutrino clone of the Arduino Zero, Rabid Prototypes chose Kickstarter to launch Neutrino 2.0. The latest campaign has four days to cover the last $700 or so of its $5K goal.
-
The StackSavings Web Editor has recently been launched as an open source project. The aim of the project is to be a Web Editor for the Internet of Things.
-
It would have been easier if we already had an open source platform we could build on. Although we did manage to build it quickly without disrupting our main projects, other companies might find it easier to adopt an existing platform rather than allocate extra time towards building an in-house productivity management application. For that reason, we’ve made Fluxday an open source project.
-
Black Duck’s latest open source survey shows that a majority of companies are now using open source. So what’s stopping the rest? Here’s a look at the reasons why businesses might choose not to use open source, or avoid partnering with companies that do.
-
-
Virtuozzo announced on Monday general availability of Virtuozzo 7. With this new version, the platform ushers in a new level of portability, reliability, and performance, especially for customers in large data center environments where vendor flexibility, as well as low latency, is critical.
-
Wire is one in a growing number of messaging services that promise to keep their users’ correspondence private. In this case, the service offers encrypted text, voice, and video calls. And now it’s open source.
-
Encrypted text, voice and audio calling service Wire has gone open-source, releasing the code for everything devs need to build their own apps that interface with the service.
-
For the past year, we’ve taken note of the many projects that the Apache Software Foundation has been elevating to Top-Level Status. The organization incubates more than 350 open source projects and initiatives, and has squarely turned its focus to Big Data and developer-focused tools in recent months. As Apache moves Big Data projects to Top-Level Status, they gain valuable community support and more.
Continuing the trend, the foundation has announced that Apache Kudu has graduated from the Apache Incubator to become a Top-Level Project (TLP). Kudu is an open source columnar storage engine built for the Apache Hadoop ecosystem designed to enable flexible, high-performance analytic pipelines.
“Under the Apache Incubator, the Kudu community has grown to more than 45 developers and hundreds of users,” said Todd Lipcon, Vice President of Apache Kudu and Software Engineer at Cloudera. “We are excited to be recognized for our strong Open Source community and are looking forward to our upcoming 1.0 release.”
-
Events
-
Thank you very much to OpenSym for having the GNU Health project, and looking forward to meet with the GNU Health and other Free communities in Berlin !
Following is the abstract of the presentation Luis Falcon will be giving. For more details please visit the OpenSym homepage.
-
-
Web Browsers
-
Mozilla
-
Susan joined Mozilla in 2011 as Head of Strategic Development. During her five years at Mozilla, Susan has worked with the Mozilla team to conceive and execute multiple complex negotiations and concluded hundreds of millions dollar revenue and partnership deals for Mozilla products and services.
-
SaaS/Back End
-
Bundling some of the functionality into the container itself is one approach. However, orchestration may also become subsumed into a PaaS offering or be included as capability offered by a cloud provider. Wikibon’s Brian Gracely described this option as a container management platform in a recent article. This term is useful because it captures a broader stack of services being deployed together as a stack. Along with workload and company size, the choice of container management platforms is also still affected by the cloud(s) being deployed to.
-
-
-
-
Databases
-
The PostgreSQL Global Development Group announces today that the third beta release of PostgreSQL 9.6 is available for download. This release contains previews of all of the features which will be available in the final release of version 9.6, including fixes to many of the issues found in the first and second betas. Users are encouraged to continue testing their applications against 9.6 beta 3.
-
PostgreSQL 9.6 Beta 3 was released on Thursday as this major database update gets closer to its general availability release later this year.
PostgreSQL 9.6 Beta 3 brings a number of fixes to the parallel query support and fixes many other items throughout the PostgreSQL server code. The official 9.6 release isn’t expected until “late 2016.”
-
Pseudo-Open Source (Openwashing)
-
BSD
-
OpenBSD, one of the more prominent variants of the BSD family of Unix-like operating systems, will be released at the beginning of September, according to a note on the official OpenBSD website.
Often touted as an alternative to Linux. OpenBSD is known for the lack of proprietary influence on its software and has garnered a reputation for shipping with better default security than other OSes and for being highly vigilant (some might say strident) about the safety of its users. Many software router/firewall projects are based on OpenBSD because of its security-conscious development process.
-
-
DragonFlyBSD 4.6 is up to the release candidate stage and the official release of this next feature version is coming in just a few days.
The release candidate to DragonFlyBSD 4.6 is now available for testing.
-
Openness/Sharing/Collaboration
-
OpenKnit is an open-source, low cost, digital fabrication tool that affords the user the opportunity to create her/his own bespoke clothing from digital files. Starting from the raw material, the yarn, and straight to its end use, a sweater for example, in about an hour. Designing and producing clothes digitally and wearing them can now happen in the very same place, rewarding the user with the ability to make decisions regarding creativity and responsibility. (homepage) (full instructions for a Wally120 open-source knitting)
-
Open Access/Content
-
Steven Keating had always been interested in data and learning about things, which is why he volunteered to do a research scan when he was a student. The scan revealed an abnormality. In 2014, the abnormality had grown into a massive tumor. Soon he learned that there were many barriers keeping him from accessing his own data. “And that’s what I’ve been sharing, which is this question: How come as a patient we’re last in line for our own data? How come my doctors and my university researchers can see my tumor genome and I can’t?”
-
Health/Nutrition
-
On Sunday, the International Olympic Committee decided not to call for a blanket ban on Russia for the Rio 2016 Summer Olympic Games after reports of doping scandals endangered the country’s chances of competing.
Instead, individual international sports federations will make the call on whether or not Russian athletes can compete in the games — which means they will review them all, one by one. Athletes who have been served suspensions for doping will not be allowed in the games. That includes athletes who already completed their suspensions, according to The Wall Street Journal. The findings must be upheld by the Court of Arbitration for Sport to be final.
-
Security
-
The ArchStrike developers have announced today, July 25, 2016, that their Arch Linux-based operating system designed for ethical hackers now has official installation mediums as ISO images.
-
An Indian security researcher was able to find Vine’s source code in plain sight.
-
Pornhub hosted a bug bounty program a couple of months ago.
-
-
Apache HTTP Server and password manager Keepass are to receive a code audit from the European Commission (EC) after a public vote.
The open source tools were by far the most popular – chosen from a lengthy list of similar open source software platforms including FireFox, Drupal and OpenSSL which are in use at the EC and the European Parliament (EP).
In the coming weeks the audits will look to uncover any security issues in the code and share the findings with software developers.
They represent the next phase in a pilot project between the IT departments of the Commission and the Parliament.
-
The European Police Agency Europol on Monday announced a collaboration with tech giant Intel, security expert Kaspersky Lab and the Netherlands police to tackle the exponential growth of ransomware use by criminals.
Together, the companies and agencies launched an online portal called No More Ransom to help inform the public about the dangers of ransomware and help victims recover their data without having to fork over money to criminals.
Ransomware steals and holds user data hostage, forcing individuals and companies to pay criminals in order to regain control of that data. Kaspersky research shows that the number of ransomware attacks increased more than fivefold between 2014-2015 and 2015-2016, from 131,111 to 718,536.
-
-
Defence/Aggression
-
President Obama is keeping U.S. troops in Afghanistan fighting an unwinnable war for fear of the political consequences if he faces reality and admits defeat, an echo of Vietnam, writes Jonathan Marshall.
-
The shooter at a Munich mall last week who killed 9 and left 27 wounded was an admirer of far right wing Norwegian mass murderer Anders Breivik, and appears to have hated Muslims.
Although David Sonboly was of Iranian heritage, he does not seem to have been a Muslim and appears to have felt no connection to that community.
Iranians are mostly Shiite Muslims who are often victimized by ISIL, so it wasn’t ever very likely that his rampage was inspired by that organization.
The current insistence by politicians and journalists on treating anyone with a drop of Middle Eastern blood as a “Muslim” is frankly racist. After all, millions of people of Christian heritage would now insist that they are not Christians. Why can’t people from Muslim families convert to other things, too? Sonboly appears to have considered himself a Christian or at least a Westerner.
As with many mass killers, the 18-year-old likely had mental problems. But to the extent that he was driven by ideology, it was the that of the Islamophobia Network. Sonboly was part of a far-right anti-Muslim tendency that now haunts Europe .
As many attacks in Europe are carried out by the white far right as by Muslims.
The ambiguities of identity were on display in this case, since Sonboly shouted “I am German!” at the Turkish-Germans he targeted, whom he called ‘Fucking Turks.’ He seems to have blamed practicing Muslims for creating the conditions of prejudice toward people who looked like him in Germany.
-
I wonder, too – how could I not with my future life as a “refugee” in mind? – about the 65 million human beings uprooted from their homes in 2015 alone, largely in places where we Americans have been fighting our wars for this last decade and a half. And it’s hard not to notice how many more have followed in their path this year, including at least 80,000 of the Sunni inhabitants of Iraq’s recently “liberated” and partially destroyed city of Fallujah. In the process, tens of millions of them have remained internal exiles in their own country (or what is left of it), while tens of millions have officially become refugees by crossing borders into Turkey, Lebanon, or Jordan, by taking to the seas in flimsy, overcrowded craft heading for Greece (from Turkey) or Italy (from Libya) moving onward in waves of desperation, hope, and despair, and drowning in alarming numbers. At the end of their journeys, they have sometimes found help and succor, but often enough only hostility and loathing, as if they were the ones who had committed a crime, done something wrong.
-
Racial, gender, and ethnic diversity matters, of course, but political correctness (PC) tied to bourgeois identity politics can be deadly to Left thinkers and activists and to the causes of peace and social justice. Part of what made the deeply conservative Barack Obama attractive to the U.S. corporate and imperial establishment during the long run up to the 2008 presidential election was the American power elite’s reasonable, born-out expectation that Obama’s skin color and status as a First Black President (FBP) would help make progressives, leftists, and serious liberals reluctant to forthrightly protest his coming service to the nation’s unelected and interrelated dictatorships of money, class, empire, and (curiously and stealthily enough) white privilege. Smart power brokers calculated correctly that political correctness around race – and the related fear of being considered racist because one dared to criticize a FBP – would help keep the left in check on Obama’s corporatist, Wall Street-pleasing, and imperial policies.
-
A failed Syrian asylum seeker has blown himself up and injured 12 other people with a backpack bomb near a festival in the south German town of Ansbach.
The state of Bavaria’s interior minister said the 27-year-old man had detonated the device after being refused entry to the music festival.
About 2,500 people were evacuated from the venue after the explosion.
Bavaria has been on edge since a knife rampage on a train claimed by so-called Islamic State last Monday.
The Ansbach blast is reported to have happened at about 22:10 (20:10 GMT) outside the Eugens Weinstube bar in the centre of the town, which has a population of 40,000 and is home to a US military base.
-
The shooting comes the month after a massacre at a nightclub in the Florida city of Orlando, in which a lone gunman killed 49 people in the deadliest mass shooting in U.s. history.
-
Nothing erodes public confidence in the ruling class like political upheaval, violence and economic uncertainty. Yet in Germany these days, that combustible mix is fueling a quiet revival of Angela Merkel’s political fortunes.
The weekend violence in Germany, which began with the deadly rampage by a bloodthirsty teen in Munich and ended with a suicide bombing in a small Bavarian city, marked the latest in a series of events, from the U.K. referendum to an ISIL-inspired hatchet attack on a German commuter train, that have unnerved the Merkel Republic.
-
Environment/Energy/Wildlife/Nature
-
This weekend, we’re bringing the call for clean energy to Philadelphia in a big way, and if you want a ban on fracking, you won’t want to miss this.
-
However, the EU continues to turn a deaf ear to the calls for a total ivory trade ban. On 1 July 2016, the European Commission decided that a global ivory trade ban did “not seem justified” and encouraged the Council to take a position against “a general closure of domestic ivory markets.”
This recommendation comes ahead of the 17th meeting of the Conference of the Parties (CoP17) to the 1976 Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES), which will take place in South Africa from 24 September- 5 October and in which 182 member states of CITES will participate.
-
One by one, the seven council members present voted to uphold the ban on transporting coal. The decision was finalized by a second vote on July 19, leaving the proposed $250 million project in limbo. Without coal as one of the terminal’s possible bulk commodities, proponents warned, it would be at risk of losing critical funding — depriving an economically struggling neighborhood of job opportunities. Critics of the plan, however, worried that transporting millions of tons of coal by rail — even in covered cars — through West Oakland poses a public health and safety risk to local residents, who already experience high levels of air pollution.
-
There’s no such thing as a good place for an oil-train derailment, but this year’s June 3 spill outside Mosier, Oregon, could have been worse if the 16 oil cars had derailed and caught fire even a few hundred feet in either direction. The derailment was just far enough away from populated areas, including a nearby school and mobile home park, that no injuries resulted, and the amount of oil that spilled into the river was limited. If it had happened another mile-and-a-half down the tracks, the damaged tank cars would have tumbled directly into the Columbia river during the peak of the spring Chinook salmon run.
-
With plenty of overlap between them, both climate justice campaigners and supporters of Bernie Sanders held marches and rallies in downtown Philadelphia on Sunday, making their presence and political demands heard a day before the Democratic National Convention officially kicks off.
Under a banner calling for a “Clean Energy Revolution,” the climate march put a focus on key shortcomings when it comes to the Democratic Party’s commitment to addressing an increasingly hot planet.
Mark Schlosberg, national campaign director for Food & Water Watch, which spearheaded the protest with the backing of nearly 900 other local and national organizations, said neither party has shown the necessary urgency when it comes to dealing with the crisis. “Together,” Schlosberg explained in a blog post ahead of the march, “we are sending a clear message to our elected officials: we demand a future powered by clean, renewable energy, not one that depends on dirty, polluting fossil fuels.”
-
Finance
-
Perhaps Britain will find, in the uncertain new world it has chosen to live in, that it cannot implement Boris Johnson’s policy on cake – ‘pro having it and pro eating it’. Easy as a backbencher, or even mayor of London; not so easy as Foreign Secretary
-
Economies have no essential nature. Once this is recognized, many more opportunities for change present themselves.
-
‘What kind of man is it who can count his fortune in billions but does not know what decent behavior is?’ – Frank Field MP, chair of the Work and Pensions Committee
-
Hewlett Packard Enterprise is to bump up the price of its infrastructure gear in Blighty from today, 25 July, blaming the crash in the value of UK sterling currency for the hike.
According to sources close to the matter, the cost of servers will go up between six to seven per cent, and storage and legacy networking by circa 10 per cent.
-
Theresa May will today insist that peace and stability in Northern Ireland is her “highest priority” as she pledges to ensure that border controls will not be erected after Brexit.
The Prime Minister will travel to Belfast today to hold talks with First Minister Arlene Foster and Deputy First Minister Martin McGuinness, to discuss delivering stability in Northern Ireland in the wake of the EU referendum.
-
“What can I do to fix a broken global economy?” It’s a question I’ve been asked a lot these past few months as I’ve crisscrossed the US speaking at TED venues, music concerts, the World Affairs Council, bookstores, on radio and TV shows, and at a variety of other forums.
During this election year it is important to recognize that corporations pretty much run the world. Despite the outcome of the elections, they will continue to do so — at least until we organize and change the rules that have created the dominant neoliberal system.
-
The Think Tank is an organization started in 2014 that is modelling a new approach for addressing poverty. Based in Newark, Ohio, the town where Wills lives, the group is made up of people currently struggling with poverty, or who have struggled in the past. The group’s goal is to have their voices heard by people who make decisions.
-
Despite being without national trade policy for four decades, we can predict a lot about the UK’s future trade deals outside of the EU from the Transatlantic Trade and Investment Partnership (TTIP) and what we know gives great cause for concern.
If and when Brexit is completed, TTIP will not directly apply to a UK outside the single market. But with the US knocking on the door to create a trade deal with the UK we know its interests are the same as expressed in TTIP. All the warning signs from TTIP suggest that under the current government vested interests will be satisfied ahead of the wider public interest.
-
AstroTurf/Lobbying/Politics
-
Does Hillary Clinton understand that the biggest divide in American politics is no longer between the right and the left, but between the anti-establishment and the establishment?
I worry she doesn’t – at least not yet.
A Democratic operative I’ve known since the Bill Clinton administration told me “now that she’s won the nomination, Hillary is moving to the middle. She’s going after moderate swing voters.”
Presumably that’s why she tapped Tim Kaine to be her vice president. Kaine is as vanilla middle as you can get.
In fairness, Hillary is only doing what she knows best. Moving to the putative center is what Bill Clinton did after the Democrats lost the House and Senate in 1994 – signing legislation on welfare reform, crime, trade, and financial deregulation that enabled him to win reelection in 1996 and declare “the era of big government” over.
-
Clinton responds to party chair’s resignation on Sunday by thanking “longtime friend” for her service at DNC and immediately naming her as honorary chair of her own campaign
-
Hillary Clinton is thanking her “longtime friend” Debbie Wasserman Schultz after the Florida congresswoman’s decision to step down as chair of the Democratic National Committee. Clinton says that Wasserman Schultz will serve as honorary chair of her campaign’s 50-state program to help elect Democrats around the country.
-
In the rush for big donations to pay for this week’s Democratic convention, a party staffer reached out to Tennessee donor Roy Cockrum in May with a special offer: the chance to attend a roundtable discussion with President Obama.
Cockrum, already a major Democratic contributor, was in. He gave an additional $33,400. And eight days later, he was assigned a place across the table from Obama at the Jefferson Hotel in downtown Washington, according to a seating chart sent to the White House.
-
Here are 50 excerpts from the 2016 GOP platform.
1. Tax cuts for the rich: “Wherever tax rates penalize thrift or discourage investment, they must be lowered. Wherever current provisions of the code are disincentives for economic growth, they must be changed… We propose to level the international playing field by lowering the corporate tax rate to be on a par with, or below, the rates of other industrial nations.”
2. Deregulate the banks: “The Republican vision for American banking calls for establishing transparent, efficient markets where consumers can obtain loans they need at reasonable rates based on market conditions. Unfortunately, in response to the financial institutions crisis of 2008-2009, the Democratic-controlled Congress enacted the Wall Street Reform and Consumer Protection Act, otherwise known as Dodd-Frank.”
-
“News media could either be our ally or our enemy—we wanted them as an ally,” Laurie Pritchett said in a 1985 interview about his strategy as police chief in Albany, Georgia, during Martin Luther King, Jr.’s desegregation efforts in 1962.
Pritchett famously ordered his officers to enforce the city’s segregation laws nonviolently and arrest as few protesters as possible. He knew that if he had acted as other police departments had—like Bull Connor’s dogs and firehoses in Birmingham (1963) and Jim Clark’s Bloody Sunday in Selma (1965)—news media would show the country how brutally oppressive police were, inspiring greater public support for King’s cause. In short, he beat nonviolent protesters at their own game by exploiting the media.
-
While it’s impossible to know whether systemic pro-Hillary Clinton bias at the DNC was decisive in the 2016 Democratic primary race, we now know beyond any doubt that such a bias not only existed, but was endemic and widespread. DNC officials worked to plant pro-Clinton stories, floated the idea of using Sanders’ secular Judaism against him in the South, and routinely ran PR spin for Clinton, even as the DNC claimed over and over it was neutral in the primary. The evidence in the leaks was so clear that Debbie Wasserman Schultz has resigned her role as DNC chair—after her speaking role at the Democratic National Convention this week was scrapped—while DNC co-chair Donna Brazile, who is replacing Wasserman Schultz in the top role, has apologized to the Sanders camp.
-
Republican presidential nominee Donald Trump didn’t completely rule out the possibility that he would support a Democrat running against David Duke, former Ku Klux Klan grand wizard, who announced he is running as a Republican for U.S. Senate seat in Louisiana.
When asked by Meet The Press’ Chuck Todd whether he would support a Democrat if it meant defeating Duke, Trump waffled, saying, “I guess, depending on who the Democrat, but the answer would be yes.”
-
Every network attack against a company like Sony Entertainment, an organization like the DNC, or a government agency like OPM, comes with a series of questions to be answered, including the obvious ones like when did it begin? What was taken? Who was responsible? Are the attackers out of my network?
Attribution, simply put, purports to answer the question of who is responsible. For example, CrowdStrike investigated the DNC network breach and determined that the Russian government was responsible. FireEye investigated the Sony Entertainment network attack and determined that the North Korean government was responsible.
It’s important to know that the process of attributing an attack by a cybersecurity company has nothing to do with the scientific method. Claims of attribution aren’t testable or repeatable because the hypothesis is never proven right or wrong.
Neither are claims of attribution admissible in any criminal case, so those who make the claim don’t have to abide by any rules of evidence (i.e., hearsay, relevance, admissibility).
The closest analogy for a cybersecurity company’s assignment of attribution is an intelligence estimate, however intelligence analysts who write those estimates are held accountable for their hits and misses. If the miss is big enough (No WMDs in Iraq, missed India’s five nuclear bomb tests in ’98, missed Iraq’s invasion of Kuwait in 1990, etc.), there are consequences, and perhaps a Congressional investigation.
-
On the heels of a law-and-order-obsessed Republican National Convention, Democrats are meeting this week in Philadelphia to do their thing. The protests are already more impressive than anything on the streets of Cleveland.
-
On October 16, 2012, my vice presidential running mate and I were arrested. Our crime? Daring to try to attend a presidential debate.
This year, I hope the American people will demand that Libertarian Gary Johnson and I take our rightful places in the presidential debates. Because Americans not only have a right to vote. We have a right to know who we can vote for.
-
For decades, Republicans were the fiercest of Cold Warriors, fighting the spread of communism and, not incidentally, winning elections by painting Democrats as the party of the frail and feckless.
-
First of all, I think that a lot of coverage decisions are often made subconsciously. Most journalists think that they don’t actually make decisions about what’s newsworthy and what isn’t and their media outlets cover anything that’s newsworthy. And this is plainly not the case; there’s huge numbers of obviously newsworthy stories that are routinely, systemically ignored by large media outlets. And sometimes it’s just a by-product of the news-cycle rhythms, but a lot of times there are clear patterns to it. One major pattern is that the political media in particular views everything through a partisan lens. So if there’s some sort of dispute between the two parties, where the Democrats think one thing and the Republicans think another, that tends to get covered, because that’s viewed as an important political debate. But on the issues where there’s bipartisan consensus, where the two parties essentially agree, which is far more common than disagreeing, those tend to get completely ignored. So you look at U.S. support for Israel, or for Saudi Arabia in a foreign-policy context, or the idea that the U.S. should have the largest military in the world, or that we should continue with our state of mass incarceration, or just the general neoliberal economic policies that both parties believe in and support — those tend to be completely excluded from any kind of media discussion or coverage, because it just doesn’t get onto the radar of what matters. So these kinds of choices get made all the time.
-
Jill Stein believes the American people deserve another choice between “a racist billionaire and a proponent of the billionaire club.”
As the presumptive presidential nominee for the far-Left Green Party, Stein wants Donald Trump to be stopped. But she doesn’t think Hillary Clinton is the best alternative.
“Donald Trump, he is a racist, a xenophobic, anti-woman, just anti-working people and it’s very important that that movement, that right wing extremism needs to be stopped,” Stein said in an interview with ABC News at the Democratic National Convention today.
-
Protesters in Philadelphia have found a new glimpse of hope: Dr. Jill Stein.
Though Stein has been running as the Green Party’s presumptive presidential candidate for 13 months now, here in the City of Brotherly Love she’s had something of a bump in public opinion.
At a protest with a few hundred people today near City Hall, there were several rounds of chants for “Jill Not Hill” and signs lining Stein up with Sanders as the progressive alternative to Clinton.
-
As you almost certainly know by now, on Friday Wikileaks released a bunch of hacked DNC emails just before the Democratic Presidential convention kicked off. While Wikileaks hasn’t quite said where it got the emails, speculation among many quickly pointed to Russian state sponsored hackers. That’s because of the revelation last month of two sets of hackers breaching the DNC’s computer system and swiping (at the very least) opposition research on Donald Trump. Various cybersecurity research firms, starting with CrowdStrike, which was hired by the DNC to investigate, pointed the finger at the Russians.
Of course, whether or not you believe that may depend on how credible you find the big cybersecurity firms like CrowdStrike, FireEye and Mandiant (the big names that always pop up in situations like this). For what it’s worth, these guys have something of a vested interest in playing up the threat of big hacks from nation-state level hackers. For a good analysis of why this finger-pointing may be less than credible, I recommend two articles by Jeffrey Carr, one noting that these firms come from a history of “faith-based attribution” whereby they are never held accountable for being wrong — and another highlighting serious questions about the designation of Russia as being responsible for this particular hack (he notes that some of the research appeared to come pre-arrived at that conclusion, and then ignored any evidence to the contrary).
Still, the claim that the data came from the Russians has become something of a story itself. And, of course, who did the hack and got the info is absolutely a news story. But it’s an entirely separate one from whether or not the leaked emails contain anything useful or newsworthy. And yet, because this is the peak of political silly season, some are freaking out and claiming that anyone reporting on these emails “has been played” by Putin and Russia. Leaving aside the fact that people like to claim that Russia’s behind all sorts of politicians that some don’t like, that should be entirely unrelated to whether or not the story is worth covering.
-
Protip: maybe don’t laugh off accusations that you’re bad at cybersecurity in emails on a network that has already been infiltrated by hackers. That message did not make it through to one Eric Walker, deputy communications director for the Democratic National Committee. As you’ve heard by now, the DNC got hacked and all the emails were posted on Wikileaks. An anonymous user in our comments pointed us to a now revealed email from Walker brushing off a story in BuzzFeed, quoting cybersecurity professionals arguing that both the RNC and the DNC are bad at cybersecurity, mainly because they’re handing out USB keys at their conventions.
-
Third parties are not new to American politics. The Anti-Masonic Party emerged in the 1820s to campaign against the Freemasons, which its members viewed as a corrupt. The Free Soil Party opposed the expansion of slavery in the years before the Civil War. Others throughout history have emerged to champion various causes, like the Know-Nothings, the Progressives, the Prohibition Party, the Reform Party and many others.
-
Martin was covering the DNC protests in Philadelphia for teleSUR.
Abby Martin, host of “Empire Files,” was covering the DNC protests in Philadelphia for teleSUR when she was arrested by police.
Martin was on her way to a “Democracy Spring” event where there were reports of civil disobedience and arrests being made. The police had closed off all streets surrounding the action.
-
Censorship/Free Speech
-
WikiLeaks has accused Facebook of censorship after multiple users reported that they could not post links on the social network following the explosive DNC Leaks.
-
Facebook has reportedly told WikiLeaks that it has unblocked links to the site on Facebook, calling the block “an accident” after it faced widespread accusations of political censorship.
-
-
-
-
-
‘Hate speech is excluded from protection’, CNN anchor Chris Cuomo tweeted last year, echoing a dangerously common misconception. ‘Hate speech isn’t free speech’, people say, assuming they have a right not to hear whatever they consider hateful language and ideas. US government officials sometimes share this view: the mayor of West Hollywood confirmed to Eugene Volokh that she would not issue a special events permit for a Donald Trump rally so long as he trafficked in hate, contrary to the ‘values and ideals’ of the West Hollywood community.
-
This is the tweet that Index on Censorship shared on 14 March 2015 when Nabeel Rajab, the Bahraini human rights campaigner, was challenging a six-month suspended sentence for “denigrating government institutions” for comments about the role of prisons as incubators of extremism. It is also one of the tweets now being used in evidence against Nabeel in a new case the government has brought against him. The latest case charges Nabeel, president of the award-winning Bahrain Center for Human Rights, with “publishing and broadcasting false news that undermines the prestige of the state”.
-
Filmmaker Shashant Shah, who has helmed films like ‘Dasvidaniya’ and ‘Chalo Dilli’ and has now directed a web series ‘Shaadi Boys’ for Viacom18′s digital platform Voot, says he believes in self-censorship. ‘Shaadi Boys’ is about three boys who accidentally get into the shaadi business and make big bucks. Asked whether a filmmaker enjoys complete freedom in terms of censorship with web series, Shah told IANS: “I believe in self-censorship.
-
-
-
-
-
-
Privacy/Surveillance
-
-
Russell Knaggs, the accused drug dealer, apparently utilized a Yahoo email account to hook up suppliers in Colombia with buyers in Europe. To add to the difficulty level, Knaggs did this while serving time for another drug bust. The method used was not all that uncommon. Everyone shared a single email account and composed draft messages. Each party would log into the account, read the draft message left for them, and compose a draft of their own in response. No emails were sent. All drafts were then deleted from both the “Draft” folder and the “Trash.”
-
Revised ePrivacy laws should guarantee confidentiality of communications and encourage encryption, the European Union’s data watchdog has said.
European Data Protection Supervisor (EDPS) Giovanni Buttarelli published his official opinion on the review of the ePrivacy Directive on Monday.
An overhaul to the so-called Cookie Law is currently be worked on by officials at the European Commission, with the completion date expected before the end of the year to bring it into line with the new General Data Protection Regulation (GDPR).
“The EU rules designed to protect privacy in electronic communications need to reflect the world that exists today,” said Buttarelli.
-
The new Prime Minister spent six years as Home Secretary but Theresa May’s legacy at the Home Office is not one to be proud of. She cut front line police services relentlessly and her record on civil liberties was appalling.
Two years ago, at the height of summer, she rushed through legislation that gave GCHQ the power to force companies to hand over their customers’ personal data, including phone records and information about emails and browsing history.
She used the spectre of terrorism to justify the legislation, called the Data Retention and Investigator Powers Act (DRIPA), but it was poorly drafted and deeply flawed. Among other things, it effectively gave the Government the right to monitor mobile phone data and internet browsing history without the approval of a judge. That’s why I took the unusual step of joining forces with my Conservative party adversary David Davis to sue the Government in the High Court.
-
Civil Rights/Policing
-
The Floor might have been a prop for TV, but it was beautiful. Spotlights danced off the red, white and blue bunting, off the tall, triangular signs spelling out the names of the states and the territories, off the delegates themselves, equal and unruly, a republic made flesh. To stand on it gave one a feeling of chaos and joy.
The states were defined by red carpets running between them, and by their costumes. The Guam wore tropical-print shirts. Texas had Lone Star flag shirts and cowboy hats and supersized enamel pins. North Carolina seemed patrician and a slightly aloof in their seersucker suits. West Virginia wore hardhats and pinstripes waving “Trump Digs Coal” signs. Chunks of Colorado displayed a mutinous, die-hard love for Ted Cruz by walking out of the convention on Monday afternoon. The many-footed whip was walking up and down the aisles, handing out Trump/Pence signs, whipping up cheers of “Trump! Trump! Trump!” often settling for “USA! USA! USA!”
-
The charter flight on Titan Airways departed Stansted for Nigeria and Ghana on May 24. It was staffed for the UK Home Office by the private security company Tascor, a subsidiary of Capita, who claim to achieve the “safe and secure escorting and removal of more than 18,000 individuals from the UK each year”.
-
Defense lawyers for the alleged 9/11 plotters said for the first time Sunday that the government destroyed a secret CIA prison with secret permission of the trial judge, and they learned of it only after the fact.
Defense attorneys have been complaining about a mysterious destruction of evidence episode in a cloaked manner since May. Prosecutors have said they did nothing wrong but declined to explain with any specificity. After a closed session Friday, during which the judge apparently agreed some details were no longer classified, the defense lawyers laid out what they knew in a Sunday roundtable.
-
It seems we’re entering another of those stupid seasons humans impose on themselves at fairly regular intervals. I am sketching out here opinions based on information, they may prove right, or may prove wrong, and they’re intended just to challenge and be part of a wider dialogue.
My background is archaeology, so also history and anthropology. It leads me to look at big historical patterns. My theory is that most peoples’ perspective of history is limited to the experience communicated by their parents and grandparents, so 50–100 years. To go beyond that you have to read, study, and learn to untangle the propaganda that is inevitable in all telling of history. In a nutshell, at university I would fail a paper if I didn’t compare at least two, if not three opposing views on a topic. Taking one telling of events as gospel doesn’t wash in the comparative analytical method of research that forms the core of British academia. (I can’t speak for other systems, but they’re definitely not all alike in this way).
-
Intellectual Monopolies
-
The United Nations Development Programme (UNDP) has launched a joint initiative with Impact Hub, an international community of social entrepreneurs. The initiative is a platform named “#Accelerate2030,” aiming at supporting and promoting the most promising impact-driven ventures focusing on the UN Sustainable Developments Goals (SDGs).
-
-
Copyrights
-
This is flat out wrong in most situations. As we’ve pointed out again and again and again and again, in nearly all cases, politicians using music at an event have the proper licenses. They don’t need to get permission from the musicians so long as either the campaign or the venue have ASCAP or BMI blanket licenses, which they almost always do. The whole point of ASCAP/BMI licenses is that you don’t need to get individual permission from the artists or their publishers.
There are instances, occasionally, where politicians ridiculously don’t have such a license, but it’s pretty rare. And there may be a few other narrow exceptions, such as if there’s an implied endorsement by the musicians, but that’s rarely the case.
Unfortunately, the song from John Oliver and friends ignores all of that, even stating directly at one point that for a politician to use music, you first have to call the publisher. That’s wrong. ASCAP and BMI already have taken care of that.
Perhaps this isn’t a huge deal, but one would hope that Oliver would actually get the basic facts right on this too, because every election season this issue comes up and spreading more misinformation about it doesn’t help.
-
So you may have seen reports last week charging CloudFlare and some other tech companies with “aiding” internet malware pushers. The “report,” called “Enabling Malware” was announced in a press release last week from the Digital Citizens Alliance — a group that describes itself as representing consumer interests online:
Digital Citizens is a consumer-oriented coalition focused on educating the public and policy makers on the threats that consumers face on the internet and the importance for internet stakeholders – individuals, government and industry – to make the Web a safer place.
And while the story wasn’t picked up that widely, a few news sources did pick it up and repeated the false claim that DCA is a consumer advocacy group. TorrentFreak, FedScoop and Can-India also picked up the story, and all simply repeated DCA’s claim to represent the interests of “digital citizens.”
But that leaves out the reality: DCA is a group mostly funded by Hollywood, but also with support from the pharmaceutical industry, to systematically attack the internet and internet companies, for failing to censor the internet and block the sites and services that Hollywood and Big Pharma dislike. DCA has been instrumental in pushing false narratives about all the “evil” things online — “counterfeit fire detectors! fake drugs!” — in order to push policy makers to institute new laws to censor the internet. DCA buries this basic fact in its own description, merely noting that it “counts among its supporters… the health, pharmaceutical and creative industries.”
The organization was formed in late 2012, partly as a response to the MPAA’s big loss around SOPA. Recognizing that it needed to change tactics, the MPAA basically helped get DCA off the ground to push scare stories about horrible internet companies enabling “bad things” online, and how new laws and policies had to be created to stop those evil internet companies. Much of this was merely speculation for a while, based on the fact that every DCA report seemed to wrongly blame internet companies for other people using those tools to do bad things online. However, it became explicit thanks to the Sony Hack, which revealed that a key part of the MPAA’s anti-Google plan, dubbed Project Goliath, involved having the DCA pay Mississippi’s former Attorney General Mike Moore (who mentored its current AG, Jim Hood), to lobby Jim Hood to attack Google.
Permalink
Send this to a friend
07.24.16
Posted in Site News at 5:35 pm by Dr. Roy Schestowitz
EPO Martial Law?
Summary: A look at some of the latest moves at the European Patent Office (EPO), following Battistelli’s successful coup d’état which brought the EPO into a perpetual state of emergency that perpetuates Battistelli’s totalitarian powers
THE EPO is in a state of deepening crisis and the other day we mentioned Haar as the likely location for the new site of the Boards of Appeal, following the exile/purge. Shortly thereafter the staff of the Boards of Appeal received the following confirmatory message:
To all members of DG3
Following a decision taken by the Administrative Council in June, the President has instructed PD44 to implement the relocation of the Board of Appeals.
PD44 has visited eleven locations in order to find a building that would best suit the requirements of staff and business partners of the BoA. The principles for the search were:
· Modern building with highly professional accommodation standards
· In the area of the European School
· Very good access to public transport
· Short distance to the city centre and Munich airport
Having considered the above factors, the relocation will take place to Richard-Reitzner-Allee 8 in Haar in the South-East of Munich.
“It is no longer a rumour,” one person told us, as “DG3 was sent an email on Friday.” Another person wrote: “It is no longer simply a rumour that the Boards of Appeal will be sent to Haar. A note was sent to all DG3 staff yesterday late afternoon, informing them that the Boards will move to the office building at Richard-Reitzner-Allee 8 in Haar. The rent contract will be signed after the Budget and Finance Committee approves the plan in October. The goal is to start the move in July 2017. It should be stressed that neither the Boards nor the stakeholders were consulted or even informed beforehand, just like no meaningful consultation took place on any other part of the reform proposal that was submitted to the Administrative Council. Being in DG3 myself, I can say that the current atmosphere is not very positive.”
Around the same time as the Munich shootings (which no doubt Battistelli will exploit to the fullest tomorrow) somebody responded with: “I wonder if any attention has been paid to the security aspects of the proposed new site …”
Quite a few people have mentioned this to us. Another asked, “did you hear the latest about Haar?”
“The building reserved for the BoA is supposed to be in Vaterstetten, which is near Haar (just a bit farther),” told us another person. “If they are really going to move there I would regard it as a total waste of EPO money. A sign of further erdoganization of what was once a respectable European organization fallen prey today to the megalomaniac ambitions of a ruthless president.”
That note about “erdoganization” of the EPO is timely as we have made this kind of comparison for about a year now.
“Interesting article about Erdoğan,” one reader told us about this one from the time of the coup. “Same problem with Battistelli…”
To quote: “You’d be wrong. Instead, the order came down from Erdogan’s thousand room palace that one Binali Yildirim — and only Yildarim — would replace Davutoglu as leader of the AKP and as Turkey’s new prime minister. Yildirim has been part of Erdogan’s inner circle for decades, an absolute loyalist certain to do his bidding. In a display of party discipline that would have made Lenin proud, more than 1,400 AKP delegates thereupon saluted smartly, sang paeans of praise and obedience to their great “chief” Erdogan, and voted unanimously to confirm his chosen candidate.”
“Sounds like the AC,” told us this reader, referring to the Administrative Council that has been reduced into a bunch of Battistelli lapdogs — those who recently helped him send the Boards of Appeal to exile near Haar.
Speaking of Erdoğan, coups and sovereignty/security (in light of Friday’s shootings), there is further militarisation going on at the EPO where the coup plotter is actually Battistelli and his ‘troops’ (so he is, in some sense, on the opposite side of Erdoğan, who was actually elected unlike the Turkish military).
“To better understand why people are treated so badly inside the EPO (and even outside of it, e.g. bloggers who are critics) look closely to what happened in Turkey over the past 10 days or less.”Writing about “who is who [at the] EPO,” one reader told us: “I know we both ***love*** FB. Here an interesting page of one recently-promoted BB’s [Battistelli] pet. Even more interesting [is] one of her “friends”: Perhaps a next director?”
This alludes to Jean-Baptiste Deprecq (photo above is from his account), who is connected to the recently-promoted Nadja Merdaci-Lefèvre.
“This give a lot to think about the saying “you chose your friends not you family”,” added our reader.
To better understand why people are treated so badly inside the EPO (and even outside of it, e.g. bloggers who are critics) look closely to what happened in Turkey over the past 10 days or less. Collective punishment at the hands of a megalomaniac isn’t so extraordinary. One might call it Martial Law. █
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »
Further Recent Posts
- Watchtroll a Fake News Site in Lobbying Mode and Attack Mode Against Those Who Don't Agree (Even PTAB and Judges)
A look at some of the latest spin and the latest shaming courtesy of the patent microcosm, which behaves so poorly that one has to wonder if its objective is to alienate everyone
- The Productivity Commission Warns Against Patent Maximalism, Which is Where China (SIPO) is Heading Along With EPO
In defiance of common sense and everything that public officials or academics keep saying (European, Australian, American), China's SIPO and Europe's EPO want us to believe that when it comes to patents it's "the more, the merrier"
- Technical Failure of the European Patent Office (EPO) a Growing Cause for Concern
The problem associated with Battistelli's strategy of increasing so-called 'production' by granting in haste everything on the shelf is quickly being grasped by patent professionals (outside EPO), not just patent examiners (inside EPO)
- Links 5/1/2017: Inkscape 0.92, GNU Sed 4.3
Links for the day
- Links 4/1/2017: Cutelyst 1.2.0 and Lumina 1.2 Desktop Released
Links for the day
- Financial Giants Will Attempt to Dominate or Control Bitcoin, Blockchain and Other Disruptive Free Software Using Software Patents
Free/Open Source software in the currency and trading world promised to emancipate us from the yoke of banking conglomerates, but a gold rush for software patents threatens to jeopardise any meaningful change or progress
- New Article From Heise Explains Erosion of Patent Quality at the European Patent Office (EPO)
To nobody's surprise, the past half a decade saw accelerating demise in quality of European Patents (EPs) and it is the fault of Battistelli's notorious policies
- Insensitivity at the EPO’s Management – Part V: Suspension of Salary and Unfair Trials
One of the lesser-publicised cases of EPO witch-hunting, wherein a member of staff is denied a salary "without any notification"
- Links 3/1/2017: Microsoft Imposing TPM2 on Linux, ASUS Bringing Out Android Phones
Links for the day
- Links 2/1/2017: Neptune 4.5.3 Release, Netrunner Desktop 17.01 Released
Links for the day
- Teaser: Corruption Indictments Brought Against Vice-President of the European Patent Office (EPO)
New trouble for Željko Topić in Strasbourg, making it yet another EPO Vice-President who is on shaky grounds and paving the way to managerial collapse/avalanche at the EPO
- 365 Days Later, German Justice Minister Heiko Maas Remains Silent and Thus Complicit in EPO Abuses on German Soil
The utter lack of participation, involvement or even intervention by German authorities serve to confirm that the government of Germany is very much complicit in the EPO's abuses, by refusing to do anything to stop them
- Battistelli's Idea of 'Independent' 'External' 'Social' 'Study' is Something to BUY From Notorious Firm PwC
The sham which is the so-called 'social' 'study' as explained by the Central Staff Committee last year, well before the results came out
- Europe Should Listen to SMEs Regarding the UPC, as Battistelli, Team UPC and the Select Committee Lie About It
Another example of UPC promotion from within the EPO (a committee dedicated to UPC promotion), in spite of everything we know about opposition to the UPC from small businesses (not the imaginary ones which Team UPC claims to speak 'on behalf' of)
- Video: French State Secretary for Digital Economy Speaks Out Against Benoît Battistelli at Battistelli's PR Event
Uploaded by SUEPO earlier today was the above video, which shows how last year's party (actually 2015) was spoiled for Battistelli by the French State Secretary for Digital Economy, Axelle Lemaire, echoing the French government's concern about union busting etc. at the EPO (only to be rudely censored by Battistelli's 'media partner')
- When EPO Vice-President, Who Will Resign Soon, Made a Mockery of the EPO
Leaked letter from Willy Minnoye/management to the people who are supposed to oversee EPO management
- No Separation of Powers or Justice at the EPO: Reign of Terror by Battistelli Explained in Letter to the Administrative Council
In violation of international labour laws, Team Battistelli marches on and engages in a union-busting race against the clock, relying on immunity to keep this gravy train rolling before an inevitable crash
- FFPE-EPO is a Zombie (if Not Dead) Yellow Union Whose Only de Facto Purpose Has Been Attacking the EPO's Staff Union
A new year's reminder that the EPO has only one legitimate union, the Staff Union of the EPO (SUEPO), whereas FFPE-EPO serves virtually no purpose other than to attack SUEPO, more so after signing a deal with the devil (Battistelli)
- EPO Select Committee is Wrong About the Unitary Patent (UPC)
The UPC is neither desirable nor practical, especially now that the EPO lowers patent quality; but does the Select Committee understand that?
- Links 1/1/2017: KDE Plasma 5.9 Coming, PelicanHPC 4.1
Links for the day
- 2016: The Year EPO Staff Went on Strike, Possibly “Biggest Ever Strike in the History of the EPO.”
A look back at a key event inside the EPO, which marked somewhat of a breaking point for Team Battistelli
- Open EPO Letter Bemoans Battistelli's Antisocial Autocracy Disguised/Camouflaged Under the Misleading Term “Social Democracy”
Orwellian misuse of terms by the EPO, which keeps using the term "social democracy" whilst actually pushing further and further towards a totalitarian regime led by 'King' Battistelli
- EPO's Central Staff Committee Complains About Battistelli's Bodyguards Fetish and Corruption of the Media
Even the EPO's Central Staff Committee (not SUEPO) understands that Battistelli brings waste and disgrace to the Office
- Translation of French Texts About Battistelli and His Awful Perception of Omnipotence
The paradigm of totalitarian control, inability to admit mistakes and tendency to lie all the time is backfiring on the EPO rather than making it stronger
- 2016 in Review and Plans for 2017
A look back and a quick look at the road ahead, as 2016 comes to an end
- Links 31/12/2016: Firefox 52 Improves Privacy, Tizen Comes to Middle East
Links for the day
- Korea's Challenge of Abusive Patents, China's Race to the Bottom, and the United States' Gradual Improvement
An outline of recent stories about patents, where patent quality is key, reflecting upon the population's interests rather than the interests of few very powerful corporations
- German Justice Minister Heiko Maas, Who Flagrantly Ignores Serious EPO Abuses, Helps Battistelli's Agenda ('Reform') With the UPC
The role played by Heiko Maas in the UPC, which would harm businesses and people all across Europe, is becoming clearer and hence his motivation/desire to keep Team Battistelli in tact, in spite of endless abuses on German soil
- Links 30/12/2016: KDE for FreeBSD, Automotive Grade Linux UCB 3.0
Links for the day
- Software Patents Continue to Collapse, But IBM, Watchtroll and David Kappos Continue to Deny and Antagonise It
The latest facts and figures about software patents, compared to the spinmeisters' creed which they profit from (because they are in the litigation business)