08.17.14
Posted in GNU/Linux, Google, Microsoft, Patents at 5:45 am by Dr. Roy Schestowitz
Summary: Roundup of news about patent aggression by Microsoft and some of its proxies
A NEW article by Steven J. Vaughan-Nichols talks about patents. “Patent trolls under attack, but not dead yet” is the article’s headline. It does not necessarily speak about small trolls but also a corporation, Microsoft, which created several patent trolls, armed several patent trolls (to harass Microsoft’s competition), and is engaging in racketeering against successful producing companies, just like all patent trolls do. One glaring error in the article from Vaughan-Nichols is this bunch of numbers which are not substantiated (no link, citation, or even a source). He says: “It’s not just the trolls seeking to make a fast buck from honest companies that are abusing the broken American patent system. Microsoft has used its “Android” patents to profit from Android OEMs since 2010. Indeed, Microsoft’s most profitable mobile operating system, to the tune of approximately $3.4 billion, was Android, not Windows Phone 8.”
Where does this number come from? This may be completely bogus.
“Now,” he adds, “thanks to China, we finally know what’s in Microsoft’s Android patent portfolio. And it appears that Samsung, at least, is saying, “Wait a minute!” about paying Microsoft for these patents.
“Slowly, way too slowly, the Supreme Court is starting to rein in patent abuse. In Nautilus v. Biosig, the Court ruled that for a patent to be valid, its creators had to describe its essential elements of their invention clearly enough that an expert in in the field could understand it with “reasonable certainty.”
“Yes, that’s right, before this decision, even if an expert couldn’t figure out how the heck a patent was supposed to work, you could still patent an idea.”
Vaughan-Nichols then mentions other landmark cases and the apparent gradual-but-undeniable demise of software patents.
But where does that leave us? Even if Microsoft did not engage in all this FUD and extortion, it would still be able to do it by proxy. Vaughan-Nichols mentions SCO at the start of the article; Microsoft still uses such a strategy. In order to eliminate the threat as a whole we need to eliminate the patents.
Well, in prior years we showed how Microsoft had armed Vringo with patents which it then used against Google. According to this news, after wasting much time and money, Google is found innocent of infringement: “Google Inc. (GOOG:US) won its bid to overturn a $30.5 million patent-infringement verdict, a reversal that sent shares of Vringo Inc. (VRNG:US) down 72 percent.
“The U.S. Court of Appeals for the Federal Circuit in Washington determined that the Vringo patents in the case were invalid, according to an opinion on the court’s website toda”
Here is how a patent trolls expert put it:
Vringo’s win over Google was one of the biggest and most public jury wins for a “patent troll” in recent years. It won $30 million from a jury verdict in 2012, far less than the half-billion-dollar verdict it was seeking.
But last year, the judge overseeing the case revived Vringo’s hopes, ordering Google to pay a running royalty amounting to 1.36 percent of US AdWords sales. Those additional payments could have been more than $200 million annually, pushing Vringo investors toward the billion-dollar payday they were pining for.
These articles should outline more clearly Microsoft’s role in the lawsuit. This was, as alleged by numerous sources (not just us), somewhat of a proxy war by Microsoft. It’s reminiscent of the SCO case, which Microsoft helped fund.
Then there are the trolls who funded and armed by Bill Gates. One of these, Monsanto, is mentioned in this article about counter-action:
Today, just three companies – Monsanto, DuPont and Syngenta – account for about half of all commercial seed sales. More and more, agricultural patents are used to increase the control these and similar companies wield over access to the seeds with which farmers feed the world and – especially in the Global South – themselves and their families.
Bill Gates has profited by monopolising seeds. He lobbied for the seeds monopolies while investing in them (for profit). His good friend Nathan, the world’s biggest patent trolls (who was bankrolled by Gates), has also done this for profit along with Gates, especially when it comes to the energy sector. They are profiting by lobbying politicians to adopt energy methodologies from which they would profit. There is new right now about Intellectual Ventures (Gates-backed) hoarding patents on wind power:
Analysis: Patent trolls target wind power
One of the biggest “patent trolls” is moving into American wind technology for the first time. Intellectual Ventures (IV) of Bellevue, Washington has quietly applied for at least five high-quality and widely applicable patents for reducing noise and birds strikes at utility-scale wind projects.
A response has been posted about this in TechDirt:
Wind Power Monthly (I had no idea such a thing existed) has an article about how Intellectual Ventures is apparently targeting its patent trollery towards wind power, having filed a bunch of patents on very broad and basic concepts related to wind power. Of course, IV is trying to hide its involvement here by using one of its many shell companies. For reasons that are beyond me, Wind Power Monthly declines to name the shell companies. It’s not clear why it does this — even withholding the name after it got IV to confirm that it’s an IV shell. There seems to be no journalistic reason for withholding the name, but Wind Power Monthly still does it.
The Microsoft-funded CCIA is meanwhile focusing a lot of its efforts going after trolls, urging the government to launch subpoenas. The CCIA’s Levy writes: “We’re also looking forward to seeing what the FTC learns about patent privateering. The study could be our first real chance to expose the tactics of companies who have been quietly using patent trolls to do their dirty work.
“There’s no time to waste. Patent trolls won’t stop on their own, and we need all the ammunition we can get.
“Launch subpoenas!”
Several years ago there was pressure on the FTC. It seemed too reluctant to do anything about patent trolls such as Intellectual Ventures, which had heavily lobbied the government along with Bill Gates. Hopefully things are about to change.
The bottom line is, the resolution lies within patent scope. But it’s also important to comprehend how Microsoft attacks Linux by proxy, not just in secrecy by means of extortion. █
Permalink
Send this to a friend
08.16.14
Posted in News Roundup, Site News at 11:42 am by Dr. Roy Schestowitz
Contents
-
-
Today Recently in Linux news, Jack Wallen asks, “Will Linux ever be able to give consumers what they want?” Mark Gibbs relates his experience installing Ubuntu on an older netbook. Linux.com has a complete beginner’s guide to Linux and Rob Zwetsloot looks at four popular download managers. And finally, Reiser4 has made a comeback and systemd is wreaking havoc again for some.
-
Microsoft Linux
-
Kernel Space
-
Graphics Stack
-
Mesa developers continue making headway in supporting more of the Khronos OpenGL 4.x specifications… OpenGL 4.0~4.2 is hopefully not too far out, at least for the Intel Linux driver.
-
Applications
-
These 3 months was an awesome experience for me. Working with my mentor David King was a hell lot of learning experience. Also, the experience at GNOME Foundation was great.
-
-
-
Instructionals/Technical
-
Games
-
With a little hunting, you can find some fantastic games on Fedora if you look. Recently, I unearthed OpenTTD and have been having a great time playing it!
I haven’t been playing games regularly for a few years now – specifically since I moved completely off Windows. Back then I used to dual boot my laptop to play popular games like Counterstrike and AOE with my friends. Since I destroyed my Windows partition, not only have I gotten busier, I’ve also been too lazy to find good games on Linux.
-
Nordic Games are the new owners of the Darksiders franchise and the publisher decided to release both games in the series, Darksiders and Darksiders 2, on the Linux platform.
-
-
Linux is about to get a pretty deep and serious city builder courtesy of Paradox and Colossal Order named Cities Skylines. Check out the trailer and be amazed.
-
-
PCLinuxOS/Mageia/Mandrake/Mandriva Family
-
Today in Linux news Mageia 5 Alpha 2 was released “for the brave.” Jack Germain has a review of OpenMandriva Lx 2014. Sanctum 2 is out for Linux and GamingOnLinux posted new Unreal Tournament footage. And finally today, Dedoimedo.com has a review of PC-BSD’s new desktop Lumina.
-
Debian Family
-
-
Derivatives
-
This new version includes:
EFL (enlightenment libraries) are updated to the beta version 1.11
Darktable and librecad applications included by default
Nightingale is now available from the repositories
Right-clicking on a PDF in the File Manager will now give you the option to shrink it
Interactive git shortcuts for the Shell
-
Canonical/Ubuntu
-
Canonical has won Cisco Systems’ (CSCO) stamp of approval for deploying Hadoop as a service on Ubuntu OpenStack, the open source, Linux-based cloud server platform. Now, enterprises can access detailed documentation provided by Cisco for configuring Hadoop and other Big Data software on Ubuntu.
-
-
-
Phones
-
Turning your Raspberry Pi into a mobile phone is a lot simpler than you’d think, albeit a little chunky. Linux User talks to Dave Hunt about one of his many pet projects.
-
According to IDC, the total combined market share of Android and iOS swelled to 96.4 percent during the second quarter, up from 92.6 percent a year ago. That left just 2.5 percent of the market to Windows Phone, down from 3.4 percent in a year’s time.
-
How times have changed from the days when Microsoft was feared by all within the technology industry. Over the years it has tried desperately to recreate its desktop monopoly in the mobile market, only to to be stopped at every turn by Android and iOS. PC World reports that Android and iOS both increased market share in the second quarter while Microsoft’s Windows Phone has declined.
-
Dented Linux mobile OS Sailfish has taken a new route to market as Three in Hong Kong prepares to start selling the smartphone-that-could-have-been from Jolla.
The Linux-based OS has had a tortuous history. The open source OS, based on the MeeGo operating system, was first developed, and then dropped, by Nokia. Since then it has been picked up by a crew of ex-Nokians and seen limited distribution.
-
-
Ballnux
-
Samsung is acquiring home automation firm SmartThings, setting up the potential integration with Tizen inside an upcoming Linux version of the SmartThings hub.
As TechCrunch predicted a month ago, Samsung announced an agreement to acquire SmartThings. In July, TechCrunch pegged the sale at $200 million, which if true would be a steal compared to the $3.2 billion Google paid for home automation vendor Nest Labs — and that was before Nest acquired Dropcam. In any case, Samsung is not revealing the cost.
-
Android
-
On a global basis, Android devices far outsell those that use other operating systems. But it’s been a much different story in government, where Apple has become a preferred mobile device supplier in many cases and where Blackberry still has a strong presence.
-
After a series of torture tests, I have decided the Brigadier is like the Terminator of smartphones. It looks durable and virtually indestructible. But what’s a smartphone if you can’t use it? I put it through one final test to see if it could still make calls.
The Brigadier is heavy — weighing in at 6.6 ounces. It runs on Android 4.4 KitKat — however it remained unclear what the future holds for operating system updates.
It doesn’t stand out from other smartphones in terms of user experience, however if you’re looking for a crazy tough smartphone, this may be it.
-
The excitement after Android 4.4 KitKat’s release barely died down when Google announced its most ambitious release ever: Android L. Packed with brand-new features and a massive UI overhaul, this is Android at its very best.
If you are dying to know what comes with this latest installment, read on as we discuss some of the best features in it.
-
This can be hard for developers new to a project, because “many would-be devs are intimidated by the perception of an existing ‘in-crowd’ dev group, even though it may not really be true,” ActiveState vice president Bernard Golden told me. Developer Tony Li echoes this, suggesting, “There is often a intimidation factor when thinking about submitting code to the maintainers (even though it is not on purpose).”
-
SaaS/Big Data
-
It’s certainly not news. We’ve talked before about how learning OpenStack is a great way to kickstart an IT career. But just how valuable is it? And if you want to make the transition from doing traditional IT infrastructure administration to becoming a cloud architect, how do you get there?
-
For a while there, working with Big Data–sorting and sifting large data sets with new tools in pursuit of surfacing meaningful angles on stored information–meant leveraging the open source Hadoop platform in on-premise fashion. Typically, enterprises deployed Hadoop in-house as a platform tool.
-
-
“I often stand in front of audiences filled with people who use storage servers. I ask them if they still name their servers. Inevitably, two-thirds of the people raise their hands. Their servers have names. … It is definitely a mindset. … You are not yet building quality applications. All of the innovation in the world is not going to solve that from an infrastructure perspective.”
-
Balkan claims he is working to create independent technologies that protect our fundamental freedoms & democracy.
Trust in the cloud forms the cornerstone of the Summit agenda with topics covered including:
• the surveillance state,
• the encryption economy,
• honest business models and,
• keeping trust amongst customers.
-
Oracle/Java/LibreOffice
-
FSF/FSFE/GNU/SFLC
-
There’s been a lot of AMD APU tests this week on Phoronix with having the newest Kaveri APUs. Our latest APU adventure is seeing how well the GCC performance compares between GCC 4.9 and GCC 4.10, what’s expected to become GCC 5.0.
-
Public Services/Government
-
The team set out its preference for open source in a blog published on 29 July. When asked by FutureGov whether open source is harder to use than proprietary software, Eric Mill, Software Engineer at 18F responded: “Not at all. It’s typically just the opposite, especially with larger open source projects.”
-
Openness/Sharing
-
Science
-
Oh, yes, creation of human organs no longer requires divine oration, just a walk to the laboratory.
-
Security
-
Defence/Police/Secrecy/Aggression
-
Sam Castro, spokesperson for the Melbourne Palestine Activist Group, claims drones produced in the factory are being used in the current conflict in Gaza.
She said: “By importing and exporting arms to Israel and facilitating the development of Israeli military technology, governments are effectively sending a clear message of approval for Israel’s military aggression, including its war crimes and possible crimes against humanity.”
-
The U.S. decision to arm Iraqi Kurds shows a dangerous and deplorable disregard for the lessons of history. The move is understandably tempting, given the threat Islamist extremists pose to civilians and the integrity of the Iraqi state, especially when the redeployment of U.S. troops is all but off the table.
-
Fresh airstrikes have been launched by US drones against Isis forces close to a village where there were reports that dozens of civilians had been massacred.
-
-
There have been other disquieting trends too in recent times. Osama bin Laden was, of course, a Saudi and 15 of the 19 9/11 hijackers were Saudis. We have it on testimony by ex-CIA director James Woolsey that Saudi Wahabism is “the soil in which Al Qaeda and its sister terrorist organisations are flourishing”.
-
On 12th June 2011 Ahmed Wali Karzai (AWK), a key ally of the North Atlantic Treaty Organisation’s mission in Afghanistan was assassinated. His fate was sealed by his own security chief of many years Mohmad Sardar, who shot him at point-blank range in his own home. Recent years in the conflict have seen a rise in such attacks by inside men, usually members of the Afghan National Army and police forces. It is rarer that that such a high level figure is killed at the behest of the Taliban in this way, since these attacks are usually carried out to create fear in the ranks of these forces. It is rarer still that the victim is none other than the President’s half brother. As if to add insult to injury, the Taliban detonated a suicide bomb at AWK’s funeral.
-
The president’s authorization was confined to protecting American personnel and preventing the genocide of the Yazidis religious group. But it also suggested increased military involvement if the Iraqi government replaced Prime Minister Nouri Al-Maliki, a Shiite widely seen as responsible for implementing sectarian policies that have severely alienated Sunni Iraqis. Al-Maliki resigned this week in favor of another Shiite, and Americans can expect to see an escalation of the airstrikes.
-
The men included Green Berets from the 10th Special Forces Group headquartered at Fort Carson, Colo., and an unidentified Navy crew who are training together for a classified mission somewhere in Africa.
-
NATO claimed that its intervention in Libya was a historic success. But three years later, Libya is in complete chaos. Some 1700 militias have a combined total of 250,000 men under arms. Another external intervention seems necessary to stabilize the country. But the US and NATO must never be involved
-
-
If you vote and you live in the USA, you should try to become educated about the multiple recent and ongoing misdeeds of the Clintons in Haiti.
So far, they’ve managed to hide their hands cleverly using the puppets (Martelly, Duvalier, Lamothe…) they have imposed upon the people of Haiti.
-
Since 2006, due to the traitors’ regime, Nepalese society is suffering due to inflation, shortage, insecurity and indefinite pain. The leaders of Nepal only listen to foreign powers and do what they are told. That is why Nepal is facing such dire consequences. Anarchy prevailed in the country after Hindu status and royal institution were removed forcibly. The leaders of NC and UML are hostage to indecision. Most of the intellectuals of the country can be bought for money. Maoist leader Mohan Vaidya led group have not abandoned Leninism that is 88 years old date expired formula. A man unable to swim will drown. We must show commitment for progress of Nepal. To save our nation we must get rid of prejudice and support constitutional monarchy and Hindu and Buddhist status of the country.
-
-
By analyzing CIA documents from earlier days, we can understand the programs of the Agency and its government cousins.
Given the fact that the CIA’s umbrella research program, MKULTRA, went completely dark in 1962, and given the technological advances that have been made in the intervening years, we can draw inferences about present-day covert ops.
-
One of these claims was that the United States was behind the 2011 Egyptian revolution which overthrew Hosni Mubarak. The other, however, was that the Egyptian intelligence agencies and Interior Ministry received information regarding a developing terrorist operation against the United States in September, 2001 and that the Egyptians warned the United States twice ahead of time. According to El-Adly, these warnings were completely ignored.
-
A new book, to be released Sept. 2, discloses a previously unknown connection between Presidents Richard Nixon, Gerald Ford, John F. Kennedy and the CIA. In fact, author Roger Stone, a former Nixon aide, asserts that Nixon “knew the CIA was involved in JFK’s assassination” and was so pesky in his attempts to get them to disclose all their records that the CIA contemplated the assassination of Nixon as well. Nixon believed CIA involved in Kennedy assassination
-
Cuba celebrated Castro’s 88th birthday yesterday and he famously survived 638 assassination attempts – the Americans tried so many ways that they had to get creative. Here are his top 10 assassination attempts
-
The most recent leaks about Cuba reveal the hiring of young Costa Ricans, Peruvians, and Venezuelans whose goals were to recruit possible dissidents in Cuban universities. These activists would later play the role of organizers of a “velvet” revolution. The AP has released the names of their top agents. When this project is linked to the mission of USAID contractor Alan Gross, currently serving a prison sentence in Cuba, and the so-called Zunzuneo, and Piramideo —Twitter-like social networks to unite thousands of Cuban people to carry out destabilization actions— it takes shape a very-well orchestrated plan to boost up a future rebellion in Cuba.
-
Tripura Chief Minister Manik Sarkar has alleged that Pakistani intelligence agency ISI and America’s CIA are in constant touch with anti-India militants, a section of whom are still using Bangladesh to operate.
-
Transparency Reporting
-
The United States and other countries in the Americas and Asia are involved in secretly negotiating a Free Trade Agreement called the Trans-Pacific Partnership, much of the news about the deal comes from leaks as none of the details are publicly published. In the latest leak, activists reveal Certification which allows the US to withhold the the final steps that are necessary to bring a trade and investment treaty into force until the other party has changed it’s relevant laws to meet US expectations.
-
Finance
-
The Wall Street Journal (WSJ) gets respect from the mainstream because it speaks for the money interests.
-
Censorship
-
How far can government go in forcing people to reveal their identities, or protecting people from being forced to reveal their identities? The issues of anonymity, free speech, and privacy are once again central topics of debate, made so by the refusal of the police department in Ferguson, Missouri to reveal the identity of the police officer who fatally shot Michael Brown, an unarmed African-American teenager Saturday night, based on fears for the officer’s safety. The decision to keep his identity secret has been a factor in the violent protests in the St. Louis suburb.
-
You may have heard of the DA-Notice. This is a formal request, from the government of the day to the editors of newspapers such as this, to kill a story on the grounds of national security. The DA-Notice system is voluntary, and it works because it is not deployed as a method of censorship. Tiny numbers of DA-Notices are issued. Tiny numbers of stories are killed. But, in our internet age, in which communication is supposed to be easier, and freer, than ever before, that is changing, and not for the better. Welcome to the world of the G-notice.
-
When it comes to social media, and the Internet in general, censorship is a sensitive topic. You probably didn’t read the small print when you signed up to Facebook or Twitter but all your favourite sites have rules, and with so many users posting so much content daily it can be difficult to police them – especially without pissing people off. Free speech is pretty popular after all.
-
-
The EU’s so-called “right to be forgotten” laws have not gone far enough to protect citizens’ privacy, according to Dan Geer, one of the world’s best-known security experts.
-
Upon exiting the room he was immediately surrounded by four to six armed police officers in uniform, two of whom identified themselves as members of the Huntsville Police Department.
-
Bulgarian journalists covering the financial beat can breathe freely as the most controversial parts of the so-called “bank censorship” amendment to the criminal code have been removed by the legal committee of the national assembly.
-
The British government established the War Office Press Bureau 100 years ago this month to censor reports from the British Army before they were issued to the press. Colonel Ernest Swinton, the first man to be appointed the Army’s official journalist, wrote later: “The principle which guided me in my work was above all to avoid helping the enemy… I essayed to tell as much of the truth as was compatible with safety, to guard against depression and pessimism, and to check unjustified optimism which might lead to a relaxation of effort.”
-
Prime Minister Recep Tayyip Erdoğan, who is preparing to assume the office of president on Aug. 28 following his election to the state’s top post on Aug. 10, has left a legacy on journalism which is filled with confrontation and rebuke of journalists, attempts at censorship, prosecution and even deportation of critical journalists.
-
Privacy
-
-
Hillary Clinton’s phone was hacked during her time as US Secretary of State, German media reports. Allegations are set to question US-German relations just months after Merkel hacking scandal.
-
-
Morgan Marquis-Boire, a celebrated hacker turned security researcher, just published a lengthy and rather scary paper on so-called “network injection appliances”. The NSA-calibre hacking tool is sold by companies like Hacking Team and FinFisher for as little as $US1 million and can crack into your hard drive any time unencrypted data is exchanged with a server. YouTube videos, by the way, are not encrypted.
-
-
Former National Security Agency director Michael Hayden says a picture of him with NSA whistleblower Edward Snowden in the September issue of Wired magazine wasn’t a memorable experience because he doesn’t remember taking the photo.
-
Researchers just found yet another reason to be paranoid: Even if hackers or the NSA are locked out of your cellphone’s microphone, camera and data, they might still be able to snoop on you through the tiny chip that tracks the device’s orientation. Gyroscopes in modern phones, unlike the spinning gyroscopes of old, work by a method that also allows it to detect vibrations in the air at certain frequencies — including some that overlap with the human voice. And worse still, Android apps don’t have to alert the user that they’re accessing the gyro, meaning practically any game or website could be listening in on you (neither do iPhone apps, but the technique doesn’t work as well on iOS).
-
-
When Congress returns from its August recess, surveillance reform will be high on the agenda. In May, the House passed the USA Freedom Act, a measure aimed at ending bulk collection of Americans’ phone records under the Patriot Act. And in July, a much stronger version of the bill was introduced in the Senate.
-
Documents leaked to the press over the past year by former NSA contractor Edward Snowden reveal that the US government is sweeping up vast amounts of private data and communications, including confidential information related to ongoing legal matters and privileged communications between attorneys and their clients.
-
-
Data breach disclosure is a legal necessity in the US and will soon be in the EU too, what with the EU General Data Protection Regulation (still awaiting legislative approval) stipulating that breaches must be reported within 72 hours of the initial incident.
This is – by and large – being actively encouraged in an era of escalating data breaches and post-NSA transparency. Simply hiding the bad news can no longer be tolerated and has too many business repercussions (legal fines, brand damage) anyway.
-
Such a mindset no doubt serves the interests of an entrepreneur like Pierre Omidyar, a billionaire who plans to generate income by peddling security products. Products that will address the very scandals that his new media venture unearths.4 Isn’t that convenient? To be able to present a problem with one hand and then proffer a solution with the other? Problem-Reaction-Solution; also known as the Hegelian dialectic. By the way this tactic has also been employed, to the hilt, by a Pentagon carpetbagger named Keith Alexander.5
-
In 2003-2004, deploying wireless networks was hot. Government IT executives were eager to offer wireless Internet access in conference rooms, but I was against it. Armed with white papers from three-letter agencies in D.C. and scary headlines describing “war driving” with breaches, I declared, “No wireless!”
-
The lead counsel for the alleged mastermind of the Sept. 11, 2001, attacks claimed Thursday that an FBI investigation of the defense attorneys has “sown chaos” in the proceedings, as another week of pretrial hearings drew to a close.
-
The FBI unintentionally spied on the communications data of some Americans who were not targets of investigations because of typographical errors, according to a government watchdog.
-
When the National Security Agency wanted to block the public release of former contractor Edward Snowden’s emails, it found an unlikely ally: His privacy.
The government cited a federal law protecting privacy rights to deny journalist Matthew Keys’ request for Snowden’s messages. Experts said Snowden is far from an exception. From Osama bin Laden to former House Majority Leader Tom DeLay, “privacy” claims are the government’s latest excuse to keep its secrets secret.
“For an agency whose core mission is the violation of our privacy, privacy is an especially Orwellian rationale for the NSA to invoke in justifying its non-compliance” with the Freedom of Information Act, said Ryan Shapiro, an MIT graduate student who frequently files public records requests with the NSA and other agencies. “That it’s Edward Snowden’s privacy the NSA now claims to defend only heightens the irony.”
-
Tapped in May 2014 by James Clapper, director of the Office of National Intelligence, Evanina is now immersed in coordinating multi-agency efforts to mitigate the risk of foreign infiltration, assess damage from intelligence leaks and tighten the security clearance process.
-
In a nutshell, I argued that the bill contained some problematic language that could actually allow more access to data by NSA; Rottman agreed that scrutiny was warranted but suggested the situation was not so bad — and certainly better than the status quo; Wheeler suggested the ACLU was too optimistic and pointed to other parts of the bill as potentially open to abuse.
-
The draft, authored by Tor’s Jacob Appelbaum and others, aims to standardize a technique called TCP Stealth, for keeping servers safe from mass port-scanning tools like GCHQ’s HACIENDA.
-
-
Deutsche Post offers the messenger, also available for Android phones, in eight languages and is targeting the global market, according to Mr. Edenhofer.
-
In an effort to woo buyers in China, Apple has inked a deal to store Chinese customer data in Chinese servers for the first time.
-
-
The security world got itself worked up in late July about an attack on the Tor network. The exploit, which ran from January to July, enabled the attackers to identify users looking for hidden services on Tor. Hidden services are typically web sites operated anonymously using Tor.
-
In this case, however, it turns out that the Syrian government was not to blame. Rather, the NSA caused the disruption by destroying a key router connecting the country to international networks.
According to Snowden, the NSA’s aim was to spy on all Syrians. In the course of attempting to hack into the router for surveillance purposes, the NSA broke the equipment; rather than violating privacy, the NSA directly violated international law and policy on freedom of expression. Syrians lost the ability to communicate during a time when users at risk most needed access to accurate information, open media, and social networks.
-
Civil Rights
-
Omar Abrego, a 37-year-old father of three, was driving home in an Amtrak truck in his work uniform on Aug. 2 when he was pulled over by officers right in front of his house in the 6900 block of South Main Street (map), which is just four blocks from where Ford was shot and killed by Los Angeles Police Department officers nine days later.
Two sergeants from the Newton Division, which was also involved in the Ford shooting, pulled over Abrego because he was allegedly driving erratically, speeding and had almost hit a pedestrian, according to LAPD officials. When they attempted to pull him over, he kept going.
-
It would be a great thing if politicians were more critical of the obvious trend towards militarization of police forces. And there’s no doubt that some voices have been more critical of overzealous police practices than one might expect. But is it actually a widespread trend?
-
As a result of Freedom of Information Act lawsuits filed by the American Civil Liberties Union and the New York Times, President Barack Obama’s administration has released the first memo authored by federal appeals court judge and former Office of Legal Counsel lawyer David Barron to justify the killing of US citizen and terrorism suspect Anwar al-Awlaki.
The Justice Department memo is dated February 19, 2010, a few months after Umar Farouk Abdulmutallab attempted to bomb a Detroit-bound plane on December 25, 2009. This memo was later superseded by a second memo that addressed issues the administration had overlooked, according to the Times.
-
Everything it seems. Over the course of 15 mission flown between August 4, 1944 and January 1, 1945 Operation Aphrodite managed to kill four American crewmen, including Lt. Joseph P. Kennedy, Jr.—eldest son of the politically powerful Kennedy family and older brother to the future-35th president—while failing to damage any of their intended targets and, in most cases failing to even reach their target. Most were shot down, ran out of fuel, or just randomly fell out of the sky in a fiery ball of wreckage.
-
This is a short call from informing the mainstream media that the country has been living under pseudo martial law for decades.
-
-
The fatal shooting of an unarmed black teenager and the ensuing protests in Ferguson, Missouri has rocked America. Even the mainstream media with its aversion to the truth has been forced to address the militarization of the police in America – albeit years too late.
This is a short call from informing the mainstream media that the country has been living under pseudo martial law for decades.
On April 13, 2013, the ACLU (Shasta Chapter) invited me to be their keynote speaker to talk about government secrecy, drones, and the militarization of America. The Ferguson shooting and its coverage it the media prompted me to highlight some of the points made during that talk as they relate to today’s events.
-
To many observers in Oakland, the scenes in Ferguson of militarized police officers and clouds of tear gas are reminiscent of local clashes, including skirmishes between police and Occupy protesters and the protests that followed the 2009 BART police killing of Oscar Grant.
-
As journalist Benjamin Carlson points out, “In today’s Mayberry, Andy Griffith and Barney Fife could be using grenade launchers and a tank to keep the peace.”
This is largely owing to the increasing arsenal of weapons available to police units, the changing image of the police within communities, and the growing idea that the police can and should use any means necessary to maintain order.
To our detriment, local police – clad in jackboots, helmets and shields and wielding batons, pepper-spray, stun guns, and assault rifles – have increasingly come to resemble occupying forces in our communities. “Today,” notes Paul Craig Roberts, former Assistant Secretary of the Treasury, “17,000 local police forces are equipped with such military equipment as Blackhawk helicopters, machine guns, grenade launchers, battering rams, explosives, chemical sprays, body armor, night vision, rappelling gear and armored vehicles. Some have tanks. ”
Unfortunately, whatever the threat to so-called security – whether it’s rumored weapons of mass destruction, school shootings, or alleged acts of terrorism – it doesn’t take much for the American people to march in lockstep with the government’s dictates, even if it means submitting to martial law, having their homes searched, and being stripped of one’s constitutional rights at a moment’s notice.
-
Last April at a Senate hearing, National Security Agency Director James Clapper was asked by Sen. Ron Wyden whether the NSA was spying on the American people. He said no, but he admitted later that it was a lie.
This lie is a felony offense.
-
By the beginning of the 1990s, that kind of opinionated, black-power-inspired hip-hop had morphed into gangster rap. Of course, it was easier for media and government to represent the likes of Tupac as a danger to society, indoctrinating America’s youth, black and white, with violent fantasies, flaunting the thug life as something to aspire to.
-
A diplomat was once defined as someone whose job is to lie for his country. That’s apparently what makes them different from intelligence officers, whose function is to lie to their country.
-
When the executive summary of the Senate Select Committee on Intelligence’s (SSCI) report on the CIA’s torture program is finally released, it is likely to discredit a story that defenders of “enhanced interrogation” have been telling for years. The narrative first appeared in the Office of Legal Counsel (OLC) memos that authorized the CIA program. President Bush repeated it in his September 2006 speech acknowledging the existence of CIA prisons, and in 2008 when he vetoed a bill outlawing waterboarding. Slightly different versions appear in Bush’s memoirs, and defenses of the CIA program by George Tenet, Michael Hayden, Michael Mukasey, Jose Rodriguez, John Yoo, Dick Cheney, and others.
-
-
-
-
-
-
-
-
Press freedom organizations submitted a petition with more than 100,000 signatures to the US Department of Justice Thursday in support of New York Times reporter James Risen.
The petition demanded that the government stop all legal action against Risen, who has been involved in a six-year battle for press freedom, McClatchy DC reported Friday.
-
-
-
-
-
-
Contrary to the claims of Debra Saunders in “DiFi’s tortured logic on interrogations” (Insight, Aug. 12), it is not illogical to think that torture is ineffective. It is instead, the consensus of interrogation experts at the FBI and British Intelligence, and has been for decades. The issue is not that torture victims don’t talk, but rather that they will say anything they think will make the pain stop, regardless of its accuracy.
-
-
A telecom company and tens of thousands of supporters are calling on President Obama to fire CIA Director John Brennan over a report that showed his agency hacked into Senate computers.
-
As a person of faith and as an American, the United States committing torture in my name and the subsequent CIA actions around torture are especially disturbing. It is against the very core of who I am as a Catholic and as a human being and is the antithesis as to who we are as a nation.
-
Five Muslim Americans have filed a lawsuit in federal court accusing the U.S. government of unjustly placing them on the terrorist watchlist. One plaintiff in the suit, Yaseen Kadura, says a federal official tried to pressure him into becoming a government informant in Libya, using removal from the no-fly list as an incentive. The Intercept news site revealed last month the Obama administration has expanded the watchlist system by approving broad guidelines over who can be targeted. Hundreds of thousands of watchlisted individuals are recognized as having no ties to terrorist groups.
-
President Obama has now acknowledged America’s use of torture. “We tortured some folks. We did some things that were contrary to our values.” Obama went on to try and place the use of torture in context. Recalling the desperation of law enforcement to prevent further attacks post-9/11, Obama said, “It’s important for us not to feel too sanctimonious in retrospect about the tough job those folks had.”
Although I am glad Obama acknowledged the fact of torture and did not try to call it a phony euphemism, I am disappointed in his response. Torture is a crime. It is not a public relations embarrassment that needs to be managed.
-
US civil rights and religious groups have voiced their concerns over federal agencies of anti-Muslim training material, demanding an urgent audit of federal law enforcement training material.
“The use of anti-Muslim trainers and materials is not only highly offensive, disparaging the faith of millions of Americans, but leads to biased policing that targets individuals and communities based on religion, not evidence of wrongdoing,” a letter signed by 75 groups, including the Council on American-Islamic Relations, Auburn Seminary and the NAACP, reads, Religion News Services reported on Thursday, August 14.
-
Ten years ago, the infamous photos from Abu Ghraib thrust the issue of torture onto the front page. While some tried to employ the few-bad-apples defense, it was clear then and it is even clearer now that the horror at Abu Ghraib grew out of problems at the top. Torture by U.S. military personnel and intelligence officers was, at its core, a failure of leadership.
-
Is NYSIC suggesting that it is extreme and threatening to encourage our officials to honor their oath and refuse to obey unconstitutional orders?
Permalink
Send this to a friend
08.15.14
Posted in News Roundup at 11:28 am by Dr. Roy Schestowitz
Contents
-
Officials from Camp Shelby Joint Forces Training Center announced Wednesday that the base will host a Linux Professional Institute certification training academy, making it the first-ever military installation to offer the program.
According to a press release sent out from Camp Shelby, Linux — a computer operating system that uses open source software development and distribution model — runs almost 97 percent of supercomputers in the world, including those for scientific research, military, defense intelligence and major corporations.
-
Desktop
-
Linux has progressed quite a bit in recent years to where it has become a better and better alternative for Windows users. If you’re simply tired of Windows, don’t want to pay for new Windows releases, or you’re still running Windows XP, it’s always a good time to take a good look at whether Linux can work for you.
If you’re still a bit unsure, here are six secrets that Windows users may not know about Linux. Knowing these these six secrets should make you more comfortable trying Linux out. Interested? Let’s get started.
-
-
Finally, Linux needs to take a page from the good ol’ Book Of Jobs and figure out how to convince the consumer that what they truly need is Linux. In their businesses and in their homes — everyone can benefit from using Linux. Honestly, how can the open-source community not pull that off? Linux already has the perfect built-in buzzwords: Stability, reliability, security, cloud, free — plus Linux is already in the hands of an overwhelming amount of users (they just don’t know it). It’s now time to let them know. If you use Android or Chromebooks, you use (in one form or another) Linux.
-
Server
-
When building a public or private cloud, there plenty of options. You can build a cloud stack on almost any operating system, but some Linux-based OSes are ideal for the cloud. It is therefore, no surprise that many cloud systems rely on Linux to power their backends.
-
Audiocasts/Shows
-
Fossetcon is an acronym for Free and Open Source Software Expo and Technology Conference. Fossetcon will be September 11-13th, 2014 in the Rosen Plaza Hotel in Orlando, FL.
-
Kernel Space
-
While the Linux 3.16 kernel is now stable, a few days ago the Reiser4 file-system was finally ported to Linux 3.15.
Edward Shishkin released Reiser4 for the Linux 3.15.1 kernel last weekend. Besides being ported to the kernel interface changes for Linux 3.15, there’s also two bug-fixes for the out-of-tree file-system. Most of the Reiser4 activity these days continues to just be porting to new kernel versions and bug-fixing. Edward is down to being one of the only main developers left and there’s expected to be no effort to mainline the controversial file-system without the support of a major Linux ISV/IHV.
-
A recent announcement was made stating that the Reiser4 file system, successor to the ReiserFS, was ported to the 3.15 Linux kernel. Following the 2006 conviction and incarceration of the mastermind that original conceived this project (Hans Reiser), a few dedicated developers continued supporting this file system despite the odds stacked against them. In the last decade, the Linux kernel has seen newer file systems, most of which are integrated into the mainline kernel tree (i.e. btrfs, ext4, etc.). Reiser4 was rejected for inclusion some time back, and most of its developers moved on (one or more of which are currently working on btrfs).
-
Chris Mason at Facebook sent in his Btrfs file-system updates today for the Linux 3.17 merge window but it looks like the pull request is being rejected by Linus Torvalds and held off until Linux 3.18.
-
Kernel maintainer Greg Kroah-Hartman announced the availability of the first update on top of 3.16.y Linux kernel branch. This is a stable kernel release and the latest version of the kernel as of now given the fact that Linus Torvalds has not opened the merge window for the first release candidate (RC1) of the 3.17 branch yet.
-
Ashwin Chaugule of Linaro has announced his experimental kernel implementation of Collaborative Processor Performance Controls (CPPC) that is part of the ACPI 5.1 specification.
-
Premier European Open Source Conferences and Co-Located Events Showcase Growth of Linux and Open Source Principles Across Technology Disciplines
-
Graphics Stack
-
With this week’s Catalyst vs. RadeonSI Gallium3D driver comparison for the A10-7800 Kaveri APU with Radeon R7 Graphics, the default driver settings were used since after all it’s what most Linux gamers and desktop users will utilize when running either driver. However, for those wanting to tune their open-source driver to get a bit higher number, enabling HyperZ is still an easy win.
-
-
-
Earlier this week Intel pushed their BPTC texture compression support into mainline Mesa and now following in those foot steps are the R600g and RadeonSI driver enablement.
-
Besides looking at how the raw performance was impacted by using the different scaling governors, the AC system power consumption was monitored and the performance-per-Watt also measured using the Phoronix Test Suite as was the CPU frequency states. This testing is very straight forward so let’s get right to the results.
-
Applications
-
Improve and better manage your web downloads for mirroring, mass grabs or just better control over your files
-
Xen Orchestra, the increasingly used web user-interface to the Xen Server and XAPI, is now out with its version 3.5 release while Xen Orchestra 4.0 is entering the developers’ sights.
-
Rygel, a home media solution (UPnP AV MediaServer) that allows users to easily share audio, video, and pictures to other devices, is now at version 0.22.3.
With Rygel, users will be able to browse the media collection from the TV or PS3 on a PC running GNOME, and they will have the possibility to play any of said media.
-
Proprietary
-
Instructionals/Technical
-
Games
-
Leszek Godlewski, the developer that presented this week at GDC Europe on advanced Linux game programming, just shared that Darksiders 2 will be coming to Linux.
-
Valve just pushed down a big Steam client update that has a number of Linux improvements along with other general improvements.
Non-platform-specific changes for the Steam Linux client includes updates to the desktop user interface styles, a major updated to the embedded web browser, and various fixes. The embedded browser update betters the performance and reliability along with having other security and functionality updates. There’s also an assortment of other Big Picture mode enhancements and fixes.
-
Linux
Updated Steam Runtime with support for newer compilers
Added support for entering custom network settings in Big Picture
Fixed audio being lost when alt-tabbing
Fixed crash when doing a voice chat if you did not have a network connection
Fixed launching SteamVR games
-
Earlier this week I wrote about The Witcher 2 Linux port being updated with performance improvements and now just a few days later is yet another beta with the performance continuing to be optimized in order to rectify the sour launch of Witcher 2 on Linux.
-
Going on for a while now has been work by Mesa developers on a new GLX extension to help out game developers by supplying hard to determine information in a standardized manner about the Linux graphics drivers and the underlying hardware renderer capabilities. That work is addressed by the GLX_MESA_query_renderer extension which to now has just been supported by the Intel Linux driver but soon will be supported by other Mesa drivers.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
The reason for this is that I’m going to finally meet at least two guys whom I consider friends by now (Jens Reuterberg and Andrew Lake) in person for the first time ever!
-
The last day of KDE’s Randa Sprint 2014 is almost over and boy am I exhausted.
-
-
In the first few days at Randa as a coding task between meetings I took on porting one of the larger core applications to Qt5 + KF5. Having applications on Qt5 is not only important for when we make the wayland move as they can run natively but it also ups the motivation to add new features into Frameworks and move technology forwards.
I decided to take on Gwenview because the maintainer, Aurélien, is on a break from KDE and requested somebody took over the task. When I started in KDE Aurélien was one of the coders I most looked up to, so I wanted to pay back and make sure his work lived on.
-
What follows is a summary by Cristian Oneț about his work on KMyMoney during the Randa Sprint. A big thanks to all those who made this happen.
-
GNOME Desktop/GTK
-
Tracker, a semantic data storage for desktop and mobile devices, which uses W3C standards for RDF ontologies and Nepomuk with SPARQL to query and update the data, has just reached version 1.1.2.
-
We are moving our production GNOME desktop to new physical hardware. After some discussions and reviewing work loads, we decided for now to stay with GNOME 2. The older server was cloned and was finally moved to the new hardware. The server is 100% solid state drives with 80 hyperthreaded cores. This increased capacity was needed for the next project:
-
-
4MLinux Server Edition, a special distribution based on Busybox, Dropbear, OpenSSH, and PuTTY, is now at version 9.1 Beta.
-
This is part 3 in a series aimed at making it easier for people to choose the right Linux distribution for them.
In the first part of the series I listed a number of the best desktop environments and the Linux distributions that use them.
In the second part I listed the 5 Linux distributions I would recommend for modern hardware based on their ease of use.
-
Screenshots
-
PCLinuxOS/Mageia/Mandrake/Mandriva Family
-
I am familiar with the KDE desktop. Before I gravitated to the Cinnamon desktop, I was an avid KDE fan. To my surprise, OpenMandriva’s implementation of KDE was much different than I had expected. KDE can be all over the place — or utterly stark. Setting up desktop animation options can be frustrating and time consuming. The KDE desktop default settings are balanced and sensible.
-
Red Hat Family
-
Fedora
-
Linux New Media has published a special edition magazine called Free From XP, which features a DVD with Fedora 20 Desktop Edition and the LXDE Spin, and includes articles from Fedora contributors about getting started with our favorite distro.
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
After a few extremely frustrating hours trying to install Ubuntu 14.04.1 LTS, the latest version of the Ubuntu operating system for desktop PCs and laptops, on an older netbook style laptop (one with only USB ports) I finally succeeded.
There was one crucial piece of information missing which, if I’d had it, would have made the whole process take perhaps half an hour. But I didn’t have that piece of information and, as a result, there was a lot of tearing out of hair and profane utterances …
-
-
A number of OpenJDK 6 vulnerabilities have been identified and repaired in the Ubuntu 12.04 LTS and Ubuntu 10.04 LTS operating systems by Canonical developers.
-
-
A startup called Savioke has unveiled a Linux- and ROS-based SaviOne hospitality robot, currently being tested at a California hotel for room service duty.
Savioke’s “SaviOne” stands three feet tall, weighs less than 100 pounds, and can roll along at a typical human walking pace of 4 mph. The touchscreen-equipped robot lacks arms or legs, but can operate a smart elevator on its own via a wireless signal.
-
A non-profit company is developing an open source, 64-bit “lowRISC” SoC that will enable fully open hardware, “from the CPU core to the development board.”
-
Phones
-
There used to be a time when GNU/Linux was kept under mysterious 1% market share. Today mobile Linux Android owns over 85% of the market share leaving the once market leading iOS behind. But its not a tragedy for iOS that it’s market share has shrunk, the real tragedy is for Microsoft whose Windows Phone market share has gone down to mere 2.5%; just 1.5% ahead of what Linux used to have on desktops.
-
Android
-
HTC’s been making Android skins and apps for a long time, but now the company wants its home-grown software to conquer more devices — even those made by other manufacturers. According to Recode, the Taiwanese phonemaker has started developing apps for Android phones in general, courtesy of a new business unit called HTC Creative Labs. The Creative Labs team’s first product is called Zoe (originally available on the One M7), which has the power to stitch together up to 16 videos or images. You merely need to select a theme along with the images/videos, as well as a soundtrack, and it can automatically create a highlight reel.
-
This morning reports are coming in Motorola have issued invites to their official launch event entitled Moto Launch Experience. It is highly expected the Moto 360′s official release will be announced at the event which will be held in Chicago on September 4th.
-
Open source has been very good to Google’s Android operating system. Unlike previous mobile operating systems like iOS (available only to Apple) or Windows (available for a fee and on Microsoft’s terms), Android was free to use (or, as venture capitalist Bill Gurley pointed out in 2011, sometimes under generous subsidies).
-
The ubiquity and convenience of smartphones has been a real boon for getting information on the go. I love being able to jump on a Wi-Fi hotspot, catch up on my mail, check my banking balance or read the latest tech news—all without having to bring along or boot up a laptop. Now that mobile development is mainstream, most of this access is done via specialized apps, instead of via a Web browser.
-
The world’s largest PC maker, Lenovo, now sells more smartphones than PCs. In an earnings report issued today, Lenovo revealed the swing to smartphones thanks to sales more than doubling between April and June. Lenovo sold 15.8 million smartphones in the recent quarter, compared to 14.5 million PC sales. Lenovo says its rise in smartphone sales can be attributed to the market shifting from premium handsets to the mainstream, and increasing demand from emerging markets.
-
-
Fragmentation has been a big problem for Android for a long time, and it’s caused quite a bit of frustration among users who have been unable to update their devices to the latest version of Android. Google is aware of this, and back in July Dazeinfo looked at how Android L might affect problems with fragmentation (including wearables).
-
As the market for Android/Linux smartphones matures, they get bigger and more powerful.
-
LINUX USERS will be left out in the cold following Microsoft’s announcement that it will retire older versions of Skype for Android.
-
Classroom is, of course, a free and open platform that will improve over time, and Google has the opportunity to add many of its open source tools to the Classroom ecosystem.
-
Those working with Docker containers can now try out the Flocker open-source, data-focused Docker management framework from ClusterHQ.
-
ClusterHQ’s Flocker leverages the ZFS file system to tackle the container storage challenge.
-
Adoption of open source software in the enterprise continues to grow, with research suggesting the two largest factors fueling this growth are security and quality. Surprising, perhaps, given revelations of the much-publicised Heartbleed vulnerability discovered in a widely used open source cryptography library earlier this year.
-
When a WhoaVerse user deletes their account, all voting history is deleted from the database. Any comments that the user has made and their author tag get overwritten with the keyword “deleted,” as well as all of their text and link submissions.
-
Web Browsers
-
Chrome
-
The Beta branch of Google Chrome, a browser built on the Blink layout engine that aims to be minimalistic and versatile at the same time, is now at version 37.0.2062.76 and it’s moving fast towards becoming the next Stable release.
-
SaaS/Big Data
-
While we’re eventually going to see a lot of consolidation on the OpenStack scene, for now, the number of competitors remains large. Witness SUSE’s newest OpenStack distribution, SUSE Cloud 4, which is out now and targeted at building Infrastructure-as-a-Service private clouds.
-
Business
-
Semi-Open Source
-
Like anything related to Web development these days, there are a number of options available for including map features to your applications. What you decide to use often comes down to personal preferences – one of my requirements is simplicity and Leaflet does not disappoint. As its documentation states, it works across all major desktop and mobile platforms. Leaflet utilizes HTML5, CSS3 and JavaScript for modern platforms while remaining accessible and usable on older platforms.
-
FSF/FSFE/GNU/SFLC
-
Standards/Consortia
-
Those still using Intel Sandy Bridge hardware on Linux will be ecstatic to learn this morning that geometry shaders support has been implemented in Mesa by a new patch-set for this older Intel hardware and thereby allowing OpenGL 3.2 support to be exposed for this “Gen6″ hardware.
-
Security
-
Grothoff and his students at TUM have developed the “TCP Stealth” defense software, which can inhibit the identification of systems through both Hacienda and similar cyberattack software and, as a result, the undirected and massive takeover of computers worldwide, as Grothoff explains. “TCP Stealth” is free software that has as its prerequisites particular system requirements and computer expertise, for example, use of the GNU/Linux operating system. In order to make broader usage possible in the future, the software will need further development.
-
-
Hundreds of thousands of hashed corporate passwords have been cracked within minutes by penetration testers using graphics processing units.
The 626,718 passwords were harvested during penetration tests over the last two years conducted across corporate America by Trustwave infosec geeks.
-
Defence/Police/Secrecy/Aggression
-
Fifteen months after its completion, the Pentagon inspector general on Wednesday released a report that found the former head of the Defense Advanced Research Projects Agency violated ethics laws by endorsing a product she developed while in the private sector.
Regina Dugan, now an executive with Google, ran DARPA from July 2009 to March 2012. Prior to that she founded and served as president and CEO of RedXDefense, which received DARPA funding.
-
The Department of Justice must release a previously classified index of withheld records related to the government’s targeted-killing programs, the 2nd Circuit ruled.
-
Victoria police said officers were deployed to monitor about 20 protesters in total, with the seven people on the roof arrested and then released with a court summons for trespass.
-
Anti-war activists stormed a factory in Port Melbourne this morning to protest against the Australian government’s support for Israeli’s war in Gaza. They raided the manufacturing compound which, they said, supplies arms and drones for Israel.
-
This isn’t a war between Israel and Hamas. I am a secular university professor who remembers the time before Israel hermetically locked all the entrances and exits to Gaza. The 398 children that have been killed were not Hamas fighters, the three UN schools that Israel bombed were not Hamas facilities. This isn’t even a war against the population of Gaza, for the majority of those living in Gaza are refugees displaced by Israel in 1948. This isn’t even against the Palestinian people, this is a war against humanity itself.
-
The fighting is barely over in the latest Gaza war, with a five-day cease-fire taking hold on Thursday, but attention has already shifted to the legal battlefield as Israel gears up to defend itself against international allegations of possible war crimes in the monthlong conflict.
-
Environment/Energy/Wildlife
-
A game of chicken is shaping up over the Obama administration’s decision to let the oil industry collect fresh data on energy supplies off the Atlantic Coast.
The Interior Department, over the protests of environmentalists, said in July that it would allow the oil industry to use seismic air cannons to search for oil and gas underneath federal waters in the Atlantic.
-
Several big industry groups have come out with guns blazing against the Environmental Protection Agency’s draft plan to slash carbon emissions from the nation’s coal-fired power plants.
But some companies see opportunity in the regulation at the center of the White House climate-change agenda. Case in point: Opower, the software and data company that works with utilities to help customers save energy.
-
Finance
-
When the term “culture of poverty” was first used by the anthropologist Oscar Lewis in 1959, it was seized upon as “evidence” that poverty is not caused primarily by an absence of material resources. This was never Lewis’s intention. In a 1966 essay for Scientific American, he wrote: “A culture of poverty is not just a matter of deprivation or disorganisation – a term signifying the absence of something. It is a culture in the traditional anthropological sense in that it provides human beings with a design for living, a ready-made set of solutions for human problems, and so serves a significant adaptive function.”
This was wilfully misinterpreted by those who believed poverty could not be abated by throwing money at it (that sole remedy for all other social ills); it was absorbed into an ancient moral critique of the poor; identified in modern industrial society with chaotic, disorganised lives, absence of parental ambition for children, aversion to hard labour and a tendency to addiction.
-
Apple shareholders have joined forces and filed a class-action lawsuit, suing Steve Jobs’ estate over claims that Apple eroded its own value by striking an illegal recruitment agreement with its rivals.
The case has been filed by R. Andre Klein, an Apple shareholder, on behalf of all the other shareholders in the Cupertino-based company.
-
Privacy
-
James Clapper’s office (ODNI) has released a large batch of declassified documents, most of which deal with the NSA’s discontinued Section 402 program. What this program did was re-read pen register/trap and trace (PR/TT) statutes to cover internet metadata, including sender/receiver information contained in email and instant messages. (Not to be confused with the Section 702 program, which is still active and harvests internet communications.)
-
As we’ve been covering for the past few months, there seems to be an emboldened set of magistrate judges willing to push back against broad electronic search requests by the government. While it would be nice to see a stronger pushback originate somewhere closer to the top, it is (or was, it seems…) refreshing to see those on the lower rungs defend citizens’ rights by rejecting what can only be termed “general warrants,” the very thing that prompted the Fourth Amendment in the first place.
-
Magistrate Judge John Facciola had denied the warrant application, which sought the information from Apple Inc., the suspect’s email provider, on grounds that it was too broad and would allow the Justice Department access to heaps of irrelevant, private information. The details of the underlying investigation remain secret, though public court records show it involves potential kickbacks and a defense contractor.
-
New York Governor Andrew Cuomo’s office continues to do everything it can to prevent its emails from being accessed by FOIL (Freedom of Information Law) requests.
-
New York Gov. Andrew M. Cuomo’s administration — which the governor pledged would be the most transparent in state history — has quietly adopted policies that allow it to purge the emails of tens of thousands of state employees, cutting off a key avenue for understanding and investigating state government.
-
According to Pew Research Center, which analyzed recently released data in a 2013 wiretap report from the Administrative Office of U.S. Courts, Nevada had 38 wiretaps authorized for every 500,000 people — the most-wiretapped state by a large margin. Colorado and New York follow with around 12 each. The most wiretaps requested in Nevada were in the home of Las Vegas, Clark County, which only has a population of around 2 million.
-
Google Glass Alastair StevensonGovernment departments and regulatory bodies have been espousing the benefits of cloud computing for years now, and for good reason. The benefits of cloud computing are huge and have the potential not only to streamline most businesses’ existing work processes, but fundamentally to change the way we do commerce.
-
Then I came across another story in Wired that Stanford University researchers and Israel’s defense research group Rafael plan to present a technique at a conference next week for using a smartphone’s gyroscope to eavesdrop on nearby conversations in a room. In case you don’t know the gyroscope are sensors that tell the phone whether its in horizontal or vertical position.
-
The Inspector-General of Intelligence and Security has said it will need additional resources to oversee new powers planned for Australian intelligence agencies to access computers and networks during investigations.
-
Edward Snowden says dishonest comments to Congress by the US intelligence chief were the final straw that prompted him to flee the country and reveal a trove of national security documents.
-
Twitter vows to “improve our policies” after Robin Williams’ daughter is bullied off the network. “Internet trolls bullied Robin Williams’s daughter off of Twitter and Instagram just days after her father’s death,” the Switch’s Hayley Tsukayama reports. Now Twitter has vowed to take abuse on its service more seriously — but Zelda Williams is far from the only person who has faced serious levels of vitriol on the platform.
-
-
Edward Snowden, the former National Security Agency contractor who exposed mass cybersurveillance by American and British spy agencies, says the US government fears the most damaging leaks are yet to come.
-
It was about a month ago that Booz Allen Hamilton Inc. CEO Ralph Shrader talked to me about Edward Snowden. And this week we found out what Edward Snowden had to say about Booz Allen.
-
NSA has done more to undermine US banking, commercial communications and computer products than any foreign power could ever have dreamed of, Robert Steele, former CIA case officer and co-founder of the US Marine Corps Intelligence Activity, told RT.
-
They say good things come in small packages. In this case, the good thing is a healthy layer of Internet privacy protection. The package is a TP-Link pocket router flashed with open source firmware from the PORTAL project.
The project itself isn’t new — the code has been available on GitHub for more than a year. What’s different now is that Cloudflare’s Ryan Lackey and Lookout Security’s Marc Rogers went on stage at DefCon to announce plans to make PORTAL more accessible. They want to make it much, much easier for “ordinary” Internet users to take a page from the OPSEC handbook.
-
The terms of the debate over NSA reform between Dickinson College professor H.L. Pohlman and the ACLU’s Gabe Rottman are too limited. Pohlman claims the version of the USA Freedom Act sponsored by Sen. Patrick Leahy (D-Vt.) still permits the government to collect call-detail records prospectively (he suggests, but does not specifically say, that it permits the government to do so in bulk). Rottman claims that new language limiting the specific selection terms used in queries and mandating minimization procedures would limit that.
Both men miss the one thing in Leahy’s bill that should limit bulk call-detail records: prohibitions on using the name of an electronic communications service provider as a specific selection term (unless that provider is the target of an investigation). Thus, whereas now the government uses “Verizon” as a selection term, it shouldn’t be able to do this going forward. The government will surely still be able to collect more limited sets of call-detail records — targeting, for example, everyone within 2 degrees of Julian Assange as part of a counterintelligence investigation — and even do so prospectively. That’s bulky collection, but not bulk.
-
-
Cisco Systems CEO John Chambers defended his plan to cut 6,000 jobs, calling it a necessary response to a changing market for networking gear and shifting demands in markets around the world.
In an interview with Re/code following the company’s quarterly earnings report Wednesday, Chambers said he expects Cisco’s total head count to be about the same at this time next year as it is now — about 74,000 — despite the cuts. And though the cuts will be painful for those who lose their jobs, they’re necessary, he says, if Cisco is to exploit new, faster-growing markets like cloud computing, security and software while keepings its costs about where they are now.
-
The Center for Digital Democracy (CDD), a U.S. group campaigning for digital consumer rights, has asked the Federal Trade Commission to investigate 30 companies for non-compliance with the Safe Harbor agreement between the U.S. and the European Union. The companies include Salesforce.com, AOL and Adobe, as well as a bunch of data brokers like Acxiom and Datalogix.
-
Would you want Dr. Dick Pic and those like him having access to all your private personal information?
-
A growing number of smartphone apps are tracking your location — even when they’re not being used. Foursquare released a revamped app last Wednesday that joins a list of those tracking location persistently, including Facebook Inc. (NASDAQ:FB), Google, and a number of shopping apps that access location data all the time, even when they’re off.
Apps use location information to enhance their service to users. Foursquare, for example, sends helpful tips based on where you happen to be. REI’s app sends deals when you happen to be near a store. The tracking is opt-in, but that doesn’t mean the data is safe. The Target breach is one example of how a large-scale corporation could be susceptible to outside security threats. Meanwhile, tech companies like Google Inc. (NASDAQ:GOOGL) and Facebook are sometimes forced to hand information over to government agencies like the NSA.
-
American tech companies could end up losing tens of billions of dollars in foreign sales stemming from the NSA spying scandal. Then there’s the potential revenue hit from Russia, which is pushing to reduce its reliance on some of the same companies amid heightened tensions with the U.S.
-
U.S. technology companies have dominated the global cloud computing scene, particularly cloud giants like Amazon Web Services and Google. But China’s cloud computing market is slowly building momentum, and Chinese tech giants are making headway into a market that they have the power to significantly change.
-
A senior cryptographer has sparked debate after calling time on PGP – the gold standard for email and document encryption.
Matthew Green is an assistant research professor who lectures in computer science and cryptography at Johns Hopkins University in Maryland, US. This week, on his personal blog, he argued that it’s “time for PGP to die”, describing it as “downright unpleasant”.
-
Which is why the release in the U.S. of newly declassified court documents are so interesting. It’s a decision by Judge John Bates of the Foreign Intelligence Surveillance Court, a closed-door court that has no Canadian equivalent for approving electronic surveillance for any communications involving a U.S. resident and foreign powers.
The decision “offers a scathing assessment of the NSA (National Security Agency) ability to manage its own top-secret electronic surveillance of Internet metadata—a program the NSA scrapped after a 2011 review found it wasn’t fulfilling its mission,” the Wall Street Journal reported.
-
Tor May Have Been Compromised, Linux Based OS’s Like Tails Offer The Best Supplement
-
Deleting Facebook, Twitter accounts leaves old conversations in their place
-
The NSA program dubbed MonsterMind is dangerous in that it would enable automated retaliation against machines that launch cyber attacks with no human intervention, meaning that such counterattacks could hit innocent parties.
MonsterMind came to light through a Wired magazine interview with former NSA sysadmin Edward Snowden, who stole and publicly released thousands of NSA documents.
-
More than 30 big US tech firms are breaking international agreed-upon US-EU Safe Harbor commitments to safeguard Europeans’ data, according to a complaint filed with the US Federal Trade Commission (FTC) on Thursday.
-
In these days of NSA spying, net neutrality, and internet companies messing with streaming services, a virtual private network, or a VPN, has become an integral part of many people’s internet experience. Though VPNs are becoming more mainstream, there are still people who do not know what a VPN is, or how one is used or what they do.
-
Edward Snowden–endorsed cloud storage provider SpiderOak has added an additional safeguard to ensure that its users’ data doesn’t fall into the hands of law enforcement without their knowledge, in the form of a “warrant canary.”
-
-
Civil Rights
-
The local community of Ferguson, Missouri, may not look like a war zone, but the Pentagon has helped the police treat it like one.
According to Michelle McCaskill, media relations chief at the Defense Logistics Agency, the Ferguson Police Department is part of a federal program called 1033, in which the Department of Defense distributes hundreds of millions of dollars of surplus military equipment to civilian police forces across the U.S.
-
-
Fox News hosts baselessly accused Obama of inflaming racial tensions and stoking discord by speaking out on the issue.
-
-
By most accounts, Ferguson, Missouri is wracked by chaos, while many have taken to calling it a police state. At the very least, things are more than a little tense right now, after police shot an killed Mike Brown, an unarmed, 18-year-old black man. Resulting protests have been quashed by force and journalists arrested, with all-important live feeds shut down by the police. Know what would help the country get a handle on what’s going on? A drone.
-
“I just wanted to know if I was going to be gassed again like I was on Monday night,” Sen. Maria Chappelle-Nadal said to Jackson at a press conference. “I was peaceful and I am your state senator.”
-
Camera-shy cops were reminded that they can’t legally take action to stop someone from filming them, unless that person is interfering with police operations. The memo states that blocking or obstructing cameras, or ordering a person to stop filming, ‘violates the First Amendment.’
-
The general consensus here: if this is militarization, it’s the shittiest, least-trained, least professional military in the world, using weapons far beyond what they need, or what the military would use when doing crowd control.
-
Whoever, except in cases and undercircumstances expressly authorized by the Constitution or Act of Congress, willfully uses any part of the Army or Air Force as a posse comitatus or otherwise to execute the laws shall be fined under this title or im-prisoned not more than two years, or both. Title 18, U.S. Code, Section 1385
-
Michael Brown’s shooting was one thing. The protests are another. But military might does not belong on Main Street
-
-
The surprise, then, has been the extent to which some media seem to be taking the outcry seriously, talking about the militarization of police–brought home by the rough treatment given to reporters covering the story–and the criminalization of black people.
-
The news out of Ferguson, Missouri, has been grim and outrageous. After the killing of unarmed teenager Michael Brown, US television viewers have watched a heavily armed and militarized local police force attack and threaten protesters and arrest journalists. As NBC Nightly News anchor Brian Williams (8/12/14) put it, Ferguson “looked like a police state, using the same tactical getup and the same weaponry we’ve come to expect in urban warfare in Iraq and Afghanistan.”
-
Ingraham’s disdain extended to the protestors, whom she grotesquely equated to a “lynch mob.”
-
Taylor D. August, of the Dept. of Education’s Office for Civil Rights, is also a FOIA Denial Officer. Considering the government’s general antipathy towards transparency, you’d think several agencies would have a full-time request denier on staff. But while many agencies spend more time stonewalling and denying requests, only the Dept. of Education actually has designated employees on hand solely to reject requests.
-
It seems inevitable that NYPD officers will be wearing body cameras in the near future. As part of the remedies ordered by Judge Scheindlin in her stop-and-frisk decision, a trial program for body cameras is due to roll out, along with additional oversight.
-
Sri Lanka has been only one of Navi Pillay’s many battlefields during her six years in office; she has briefed the UN Security Council more times than all her predecessors combined. But it is perhaps the one that has evoked most strongly her courage and determination. She has also incurred volcanic fury from both sides in the Gaza wars and been described by the Syrian ambassador to the UN as “a lunatic”. The US has never agreed to her requests to look into what she calls “the many issues that trouble us” in that country, in particular drone strikes and targeted killings, while somehow the Chinese could never find a suitable date for her to pay a visit.
-
Lots of people when they think of journalism have in mind the mum-and-pop variety — car crashes and the latest gossip, local politics, sports, all the little details about “the time the doorknob broke,” to trot out an old Bob Dylan lyric. A step up from this layer of short and punchy news bits is that more ‘literate’ class of journalism traditionally associated with the New York Times and Washington Post, the so-called newspapers of record, which publish only the most polished, scrupulous pieces by the most ethical journalists. Or so the story goes.
-
The Obama administration’s espionage case against alleged CIA whistleblower Jeffrey Sterling is expected to come to trial soon, six years after he was indicted. In addition to Sterling, also on trial will be a central pillar of our democratic society: press freedom.
-
-
Internet/Net Neutrality
-
Google has had to reinforce its fragile undersea cables with Kevlar – the same material used in bulletproof vests – in order to protect against shark attacks
-
What Crawford is describing is parallel conduct, which is when companies that would otherwise compete create a monopoly-like setting without having to merge or coordinate operations. Parallel conduct in the broadband industry is not hypothetical. In 2011, Comcast and Time-Warner Cable sold parts of the wireless spectrum they owned in exchange for an agreement that Verizon would stop expanding its fiber optic network. Essentially, Comcast and Time-Warner Cable paid Verizon to stop offering new high-speed broadband service. (As part of the deal, Comcast and Time-Warner Cable also further divided up the United States geographically, foreshadowing the merger between the two companies.)
-
DRM
-
Amazon is under fire from George Orwell’s estate for referencing the Nineteen Eighty-Four author in its legal battle with publishers.
The web bazaar, while mired in a war of words with Hachette over book prices, invoked Orwell’s name and cited comments made by the author at the dawn of paperback books.
According to Amazon, Orwell had suggested in the 1940s that publishers should collude in order to suppress the sale of the less expensive paperbacks. This, Amazon said, was a sentiment now repeated by Hachette – which is accused of unfairly inflating e-book prices.
-
Intellectual Monopolies
-
Copyrights
-
Julia Reda, Member of the European Parliament for the Pirate Party, will be visiting Peter Sunde in prison later today. According to Reda the Pirate Bay founder’s imprisonment is a failure of a justice system that lost touch with digital culture. “The tactic of draconian deterrence against file sharing has failed,” she says.
-
Switzerland is in the process of revising its copyright laws, and you might expect that by now it has been “persuaded” by the US to change its mind about allowing people to download files freely and share them in this way, but to its credit, that doesn’t seem to be the case (pdf).
Permalink
Send this to a friend
08.14.14
Posted in News Roundup at 11:30 am by Dr. Roy Schestowitz
Contents
-
Linux. It’s been around since the mid ‘90s, and has since reached a user-base that spans industries and continents.
-
Server
-
Linux virtualization startup CoreOS now offers an alternative to the private repositories offered by Docker Inc.
-
-
-
Government IT managers interested in experimenting with Docker, but wary of its complexity, have a new resource with Panamax, a Docker management platform.
Created by CenturyLink Labs, Panamax gives developers a single management platform to easily create, share and deploy any Docker-containerized application, the company said in its announcement.
-
-
Kernel Space
-
Taking place next week is the Linux Kernel Summit in Chicago alongside the 2014 LinuxCon North America. We’ll be providing live coverage next week while one of the early kernel summit sessions already being discussed online is a goal of trying to further the Linux solution to the year 2038 problem.
-
-
It turns out that this developer is a female student in India. She is learning by contributing to the Linux kernel! Look out world! She aims to succeed.
-
Linux kernel 3.16 was released only a little over a week ago, so it stands to reason that an update was bound to appear sooner or later. Linus Torvalds also skipped the release of the first RC for Linux kernel 3.17 RC1, so this build is actually now the most advanced out there.
-
IBM says the channel is in dire need of more professionals with mainframe server administration expertise, and just in time for the new school year, it is promoting a partnership with the Linux Foundation, Marist College and Syracuse University to deliver those skills through a new series of MOOCs on open source operating systems.
-
Applications
-
-
-
-
-
-
Instructionals/Technical
-
Games
-
Time to get excited again Linux gamers! Dead Island has some hints that it will be coming to Linux! Yes it’s another Zombie game, but it’s a bit different. It has a big focus on melee combat and it can be quite brutal.
-
-
Some fantastic news today folks as Reinhard Pollice from Nordic Games has let it slip that Darksiders 2 will join Darksiders in gaining a Linux version!
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
It’s more than year of my encounter with source code of some real life application.(Thanks to KDE) I had never before seen such huge source code. The guidelines on techbase were so comprehensive that I didn’t even realize that I had started fixing imperative bugs. The best part was that KDE had all types of applications, under various categories like multimedia, education, games etc. So I could try my hand on many different applications and recognize my interest. I enjoyed hacking source code of Kstars the most. And I compiled the code with the help of instruction on techbase and KDE’s cool developers at IRC, who are always eager to help. I used to get fascinated on running those awesome application on my plasma desktop. I used to wonder how they work. The secret was revealed then. I sent mail in KDE developer’s mailing list that I want to contribute and how do I start even though answer was there on techbase. And reply came that I can search though bugs related to application of my interest on bugzilla and try to fix it. I did it. It was really so easy.
-
All plugins from the old activity manager are ported to the new version.
This means that one of the most requested features is coming back – you will be able to set custom keyboard shortcuts for individual activities as soon as Plasma 5.1 comes out.
-
-
We all know that the ‘D’ in KDE originally stood for “desktop..
-
-
-
-
The first update for Plasma 5 has arrived. 5.0.1, adds a month’s worth of new translations and fixes from KDE’s contributors. The bugfixes are typically small but important such as fixing text which couldn’t be translated, using the correct icons and fixing overlapping files with KDELibs 4 software.
-
KMix is now ported to KDE Frameworks 5. After a one day long porting effort, the basic functionality of KMix is available: Main Window, Systray, Volume Key Shortcuts, Sound Menu, volume save and restore. More sophisticated parts require more efforts and are currently missing, like the On-Screen-Display (OSD), which requires a port to Plasma 2.
-
-
Slackware Family
-
What relation does Christopher’s rant have to Slackware? After all, it’s Debian that got the flak, and in the comments section people indicate they intend to switch to Gentoo… forgetting that Slackware is a good systemd-free alternative (but hey! this automatic dependency resolution thingie that makes life so comfortable in Gentoo is not part of Slackware either).
Last week I asked the SDDM developers to reconsider their decision no longer to support ConsoleKit because Slackware does not have systemd or logind and thus we need to keep using ConsoleKit. The answer could be expected: “answer is no because ConsoleKit is deprecated and is not maintained anymore” and therefore I had to patch it in myself.
-
Red Hat Family
-
Ansible, a Durham-based IT automation startup with Red Hat (NYSE: RHT) roots, is doubling down on Bull City.
That’s according to CEO Saïd Ziouani, who tells me the 30-employee shop will cross the 100 mark next year.
“Our goal is to continue to grow aggressively in the Durham area,” he says, adding that all facets of the business can happen from Durham.
-
Oracle Linux is now generally available today. According to the company, the release builds on its approach to providing support for emerging technologies, such as OpenStack, while delivering new Linux innovations, tools, and features.
“Oracle Linux continues to provide the most flexible options for customers and partners, allowing them to easily innovate, collaborate, and create enterprise-grade solutions,” said Wim Coekaerts, senior vice president of Linux and Virtualization Engineering, Oracle. “With Oracle Linux 7, users have more freedom to choose the technologies and solutions that best meet their business objectives. Oracle Linux allows users to benefit from an open approach for emerging technologies, like OpenStack, and allows them to meet the performance and reliability requirements of the modern data center.”
-
Fedora
-
-
-
Fedora 21 won’t even see its alpha release until September now, it’s been delayed by a month compared to when it originally shipped, and there’s no guarantee that this is even the last delay to be seen by this long-awaited release.
-
Debian Family
-
Debian has yet to issue an announcement concerning these beta images for the Debian Installer for Jessie, but a sharp-eyed Phoronix reader pointed them out to us this evening, which can be found via Debian.org. Images are available in the plethora of architectures supported by Debian.
-
Derivatives
-
Canonical/Ubuntu
-
Canonical is pushing hard to expand Ubuntu into new consumer markets. In the past year, we’ve seen shiny prototypes of Ubuntu-based mobile phones and tablets, and the company hasn’t given up on its 2012 vision of getting Ubuntu onto TVs either. What’s more, serious work is underway on converging all of these roles into a single chameleonic OS, something even Microsoft hasn’t tried to tackle.
-
-
MYIR announced a sandwich-style single board computer that runs Linux on a Freescale i.MX28x SoC and features -40 to 85°C operation and a CAN bus interface.
MYIR specializes in low-power ARM single board computers (SBCs) and computer-on-modules (COMs), with the latter including the MYC-SAM9X5-V2 (using Atmel’s ARM9-based AT91SAM9X5) and MYC-AM335X (using TI’s Cortex-A8 based Sitara AM335x). With the new MYC-IMX28X COM and associated MYD-IMX28X development board, the company is mining the Freescale i.MX28x, a 454MHz, ARM9 system-on-chip that has been used in many embedded Linux boards, most recently including Technologic’s TS-7400-V2.
-
Phones
-
Ballnux
-
So what’s the verdict? If you’re chasing screen real estate and resolution above all else then the LG G3 is certainly going to catch your eye. A larger screen without much extra bulk is an impressive achievement, although there are few situations where you can put all those pixels to good use. The combination of the removable battery, microSD slot and wireless charging will also seal the deal for some Android fans. LG’s G3 sits somewhere between the elegant HTC M8 and the brash Samsung Galaxy S5, perhaps offering the best of both worlds.
-
Android 4.4.4 (KitKat) runs the device, which comes with 2 GB RAM, 32 GB internal memory and a 1,860-mAh battery. It also has real-time high-dynamic-range imaging, as well as an ultra-power-saving mode, private mode, the S Health app, and connectivity with the latest Samsung Gear Fit, Gear Live and Gear 2 wearables.
The Galaxy Alpha will be available in early September; depending on the market, color choices will include charcoal black, dazzling white, frosted gold, sleek silver and scuba blue. Pricing has not yet been disclosed.
-
Samsung have today officially unveiled the newest addition to their Galaxy smartphone range. The Galaxy Alpha has been expected for some time with details filtering through news agencies at a steady stream. However today was the first time we have actually had the images and details released by Samsung.
-
The rivalry between Apple and Samsung in the mobile phone arena has been bitter and hard fought, with each side battling the other in court as well as in the smartphone market itself. Now Samsung has released the Galaxy Alpha phone and some think it bears a suspicious resemblance to Apple’s iPhone.
-
Android
-
A couple of weeks ago we reported rumors were circulating that Motorola was building the next Nexus (6). Now we can add a little more speculation to the Nexus rumor mill for your enjoyment.
There has been wide speculation that a device ‘Codename Shamu’ is the Nexus 6 although this has not been confirmed by either Google or Motorola. However Shamu suddenly appeared on the GFX Benchmark Database fuelling suggesting that the Nexus is getting nearer and nearer.
-
-
-
-
I am constantly looking for ways to make my life easier whether it’s keeping track of my kid’s school activity schedule or not loosing my grocery list. For this, I often look for open source solutions. Why? Because most of the time the open source solution is simple and doesn’t have unnecessary bells and whistles that I don’t need, and even if I need those extra bells and whistles, I know that someone else out there also needs it and most likely has coded it already.
-
Librarians Registration Council of Nigeria (LRCN) in collaboration with the National Information Technology Development Agency (NITDA) has organized a skill gap workshop in information and communication technologies for librarians.
According to the organizers, the joint workshop with special focus on application of Free and Open Source Software (FOSS) in library operations was aimed at equipping librarians with skills to measure up new challenges in the ICT sector and be able to deploy and apply the knowledge to improve the lot of all information seekers.
-
-
Umbrella Company Employees specialising in IT contracting would do well to acquire skills in open source technology, according to a poll of 300 IT professionals by CWJobs.co.uk.
Nearly half (48%) of the respondents believe that more open source jobs and contracts are available today than a year ago, and 71% are confident that it will be widely required in the future. Currently, however, 62% of those surveyed believe that businesses are missing out on open source’s potential.
-
At the time Kurt Bieg, CEO of Simple Machine, explained their reasoning in doing so: “we believe ownership is becoming obsolete, this is our way of inspiring young and old people to read, learn, and ultimately manipulate code that came from a studio known for taking chances and innovating puzzle games.”
-
Collaboration is at the heart of the open source movement, and when the biggest names in the technology sphere join forces, massive steps forward can be made. The world certainly witnessed this in July this year, when Red Hat worked together with none other than Google on a high-profile project.
-
In the end, the move to an open source architecture makes iovation a more nimble, scalable, and better performing service provider. The upgrade is ultimately an investment in the company’s future and a commitment to providing world class services to customers.
-
Web Browsers
-
SaaS/Big Data
-
Oracle/Java/LibreOffice
-
When Oracle acquired Sun Microsystems back in 2010 the company said it would continue to invest and push Sun’s SPARC silicon forward. Four years later and Oracle continues to deliver on that promise with a continued march of SPARC silicon innovation.
-
Business
-
As of March, only a third of 1,589 urban co-operative banks that have been told by the central bank to migrate to a core banking system have done so. The rest of the market is up for grabs.
“Open source-based products, which could bring down the total cost of ownership, have become a credible alternative for decision makers,” said Aniruddha Paul, CIO of ING Vysya.
The bank which has over 500 branches in the country started upgrading its core banking platform last year and completed the project in February.
-
-
Project Releases
-
Things have been rolling along here at the ManageIQ community, and we’re proud to announce that the first release candidate is now ready. The first release for ManageIQ is called “Anand”, named after world champion chess player Viswanathan Anand.
-
Public Services/Government
-
Just because a trust has taken an open source approach, it does not mean you have to take all that work, control, ownership immediately – you can take as much as time as you want to develop those abilities. Also, with a community interest company in place to support the management of the code, there will be a structure in place for clinicians to really have some input into the way the system is developed, whilst maintaining the integrity of the code for better patient experience and outcomes.
-
Yesterday the National Democratic Institute launched a suite of web-based applications created for their partner organizations, mostly pro-democracy groups and political parties around the world. These “DemTools,” which are ready-to-use but can also be customized, will give organizations in developing countries some of the capabilities that political activists and parties in the United States have had for years. Moreover, since the National Democratic Institute (NDI) is making the promise to host partner organization’s applications in the cloud essentially forever, they hope these applications will help usher in a period of more sustainable tech.
-
The federal government is the single largest purchaser of code in the world. So why is this code—taxpayer-funded and integral to the day-to-day working of our democracy—so often hidden from public view? There are two sides to answering that question: Why does the government so often build on closed platforms, and once built, why isn’t the code released to the public?
-
Licensing
-
The case is complicated and likely will undergo much procedural maneuvering before the court will get to the substance of the case. However, a key question that the courts will likely look at is whether a violation of GPLv2 gives a plaintiff a right to a contractual remedy or a claim for copyright infringement.
-
I’ve been writing about free software for nearly 20 years, and about Microsoft for over 30 years. Observing the latter deal with the former has been fascinating. At first, the US software giant simply dismissed free software as unworthy even of its attention, but by the early years of this millennium, that was clearly no longer a viable position.
-
Standards/Consortia
-
The Khronos Group who oversee OpenGL development have announced not only OpenGL 4.5, but they are also encouraging others to come forward to join them in building the next generation of OpenGL.
It’s been a turbulent time for graphics API development with AMD announcing Mantle, and even Apple bringing their own API to the table called Metal. We have then had lots of back and forth between developers putting up blog posts discussing the good and bad for OpenGL itself. Now we are here for the future of OpenGL and it’s all good news.
-
The Khronos Group released OpenROAD today at SIGGRAPH 2014 showing off all of their cross-platform, industry-standard APIs.
OpenROAD is an animated video featuring all of the royalty-free APIs out of Khronos working together in an “open ecosystem”. There’s OpenCL, OpenCL, OpenSL ES, OpenMAX, OpenVX, WebGL, and WebCL.
-
Sarah Palin was incoherent and some are alleging that she was possibly drunk on her TV channel as she babbled nonsensically in a response to Elizabeth Warren. Palin made little sense as she trailed off numerous times and looked rather bleary-eyed at the camera. The clip has gone viral on Facebook, and people have been sending around memes with the text from the clip, which is as follows:
We believe — wait, I thought fast food joints — hrm. Don’t you guys think that they are of the devil or something? Liberals, you want to send those evil employees who would dare work at a fast food joint that you just don’t believe in — thought you wanted to send them to purgatory or something until they all go vegan! Wages and picket lines, I dunno, they’re not often discussed in purgatory, are they? I don’t know. Why are you even worried about fast food wages uh…
-
Science
-
If there were some simple things you could do that would make you smarter, you’d do them, right? Unfortunately, it’s difficult to guarantee that a particular activity will actually cause you to be smarter. If you’ll settle for a nice correlation, though, there are plenty of things to try!
-
Security
-
Once upon a time, we used to think in terms of one hardware server equals one server operating system. Then, along came KVM, Hyper-V, VMware, and all the rest of the virtual machine (VM) hypervisors and more recently Docker with its containers. Now the idea of a single server operating system on a solo box is downright quaint.
-
No week is busier in the calendar year for information security professionals than the week of the Black Hat and Defcon security conferences. Black Hat USA this year ran from Aug. 5 to 7 at Las Vegas’ Mandalay Bay, which is a venue change from Caesars Palacewhere the event has been held for the previous decade. Among the big topics of conversation at Black Hat 2014 was a keynote presentation by respected digital security expert Dan Geer who advocated that the U.S. government buy up all the security vulnerabilities in order to corner the market. Another big topic discussed at Black Hat is the issue of automotive security. Security researchers Chris Valasek and Charlie Miller detailed their concerns and also outlined a new technology approach that could be used to limit risks. The issue of government surveillance was once again a hot-button topic at Black Hat as well as at Defcon. The Defcon conference ran from Aug. 7 to 10 at the Rio hotel in Las Vegas. At Black Hat, Alex Stamos, Yahoo’s new chief information security officer (CISO), detailed his plans for improving user privacy, including an effort to provide end-to-end encryption for Yahoo mail users. Flip through these slides for a look at some of the sights from the two conferences.
-
Dan Geer is world-renowned cyber security researcher. He’s Chief Information Security Officer at In-Q-Tel, a non-profit venture capital firm. Hid company invests in technology to support the CIA. He’s knows his shit. And he uses a pager instead of a smartphone.
-
Defence/Police/Secrecy/Aggression
-
The battle against autonomous, robotic killing machines just got its first robotics company partner, as Canada-based Clearpath Robotics pledged its support to the international campaign calling for a ban on fully autonomous weaponized robots.
-
Environment/Energy/Wildlife
-
Fossil sources of energy will begin to experience sharp decline in 35 years’ time, a professor in land policy at the Michigan State University, United States, John Hannah, has disclosed.
-
Finance
-
The Consumer Financial Protection Bureau is warning the public that bitcoin and other virtual currencies are a risky “Wild West” in the financial markets.
-
It’s that impossible there that’s at issue. And I’m afraid that it is possible for wealth in Sweden to be more unequally held than wealth in the UK, even while income inequality is smaller. We know this to be true for we can go and look up the wealth gini for Sweden as we can do for the UK. They’re listed here (a secondary source but good enough for us here). With the gini a higher number means more unequal: Sweden 0.742, UK 0.697. Wealth is distributed more unequally in Sweden than in the UK.
-
Like many states, Rhode Island has been placing growing slices of its pension funds into higher-risk investments, entrusting the money to Wall Street financial managers who capture hefty fees. Yet the state has rebuffed requests to disclose the details of the management contracts.
-
-
PR/AstroTurf/Lobbying
-
-
For many years, we’ve talked about the very questionable practice by the USTR to set up “Industry Trade Advisory Committees” (ITACs), who had full access to the various documents concerning the trade agreements that were being negotiated. Obviously, for big companies, being one of the very small group of people on the inside, helping to shape trade agreements, is enormously powerful — especially since industries long ago learned that you can “launder” policy changes that Congress doesn’t want to make via the international trade agreement process, thereby putting pressure on Congress to act. It’s why we’ve pointed out that it seems rather unfair that the RIAA has direct access to the TPP agreement, but Senate staffers (including experts on international trade) have been refused access.
-
Privacy
-
Democracy Now! this morning (8/13/14) talking about his new piece in the Intercept (8/12/14) critical of an NPR report (Morning Edition, 8/1/14) describing “tangible evidence” of a “direct connection” between Edward Snowden’s revelations of unchecked National Security Agency spying and increased Al-Qaeda efforts to protect its communications via cryptography.
Greenwald called the report, by NPR reporter Dina Temple-Raston, “a pure and indisputable case of journalistic malpractice and deceit.” It’s hard to say he doesn’t have a point.
-
-
-
-
If your irony detector seems to be malfunctioning, this video of Los Angeles police officers confronting some activists flying a drone over a LAPD parking lot should reset it. At the very least, it should at least indicate whether the batteries need to be changed, as any powered irony detector should have the needle buried within minutes.
-
Los Angeles authorities are weighing whether they may legally block hobbyists from flying camera-equipped drones over police stations.
The inquiry was prompted Friday after the LAPD confronted a Southern California man outside its Hollywood station. The cops told him he was trespassing for using a drone to capture footage of the station’s parking lot, and ordered him to stop. The incident is posted to YouTube.
-
Long time NSA watcher James Bamford spent a bunch of time with Ed Snowden in Moscow recently, leading to an absolutely fascinating story in Wired. There’s lots of interesting stuff in there, but this seems particularly interesting.
-
Edward Snowden claims the United States is deploying “MonsterMind,” an immense cybersecurity program that might breach the rights of U.S. citizens.
-
…makes it easier for people who don’t have technical training to buy software…
-
Facing rising competition, Cisco has announced another round of layoffs – 6,000 – in financial results that beat analyst expectations but were still flat.
Presenting the company’s latest quarter results, CEO John Chambers announced the latest round of layoffs, but was at least able to give a sliver of good news, with revenue dipping 0.5 per cent in the quarter to US$12.4 billion, while Wall Street had expected the number to be $US12.1 billion.
-
-
Recently declassified documents show that the NSA’s system of almost limitless collection of data through the PRISM and Boundless Informant programmes was highly criticised by the court responsible for approving its surveillance methods.
The 117-page decision by Judge John Bates of the Foreign Intelligence Surveillance Court (pictured) slammed the NSA for its “systemic over-collection” of metadata from online communications. One of the programmes that was the most heavily criticised was subsequently scrapped by the NSA after a 2011 review deemed it to be failing its mission.
-
Shocking revelations this morning in a new interview with NSA whistleblower Edward Snowden, which revealed a bungled attempt by the NSA to install malware on a key Syrian router bricked it and blacked out internet to most of the country.
-
-
Why one of the nation’s most important issues isn’t driving one of its most important races
-
The case of John Schindler is a curious one. A former NSA analyst and, until recently, a professor at the US Naval War College, he resigned on Tuesday following a college investigation into whether a widely circulated picture of his penis was actually his.
-
-
-
After months of virtual appearances at TED conferences and SXSW, former NSA contractor Edward Snowden finally sat down for a print media profile. The honor went to Wired’s Jim Bamford, who met with Snowden three times over the course of several weeks in Moscow.
-
Edward Snowden has just been granted three more years of asylum in Russia, and the former NSA contractor-turned-whistle-blower is understandably choosy about whom he meets with in person. In June, he gave top NSA expert James Bamford a good deal of his time for an in-depth Wired story, and Bamford didn’t waste it.
-
-
-
Spying by the National Security Agency and increasing demands by the feds for client data continues costing U.S. IT giants billions in lost revenue while also damaging reputations of the American company’s themselves.
-
-
Michael Dearing has been around the Silicon Valley tech scene for some time, as an executive at eBay, an associate professor at Stanford and a successful angel investor and founder of the Harrison Metal micro-venture firm.
Despite that, he managed to keep a relatively low profile until learning last year that the U.S. government has been using Silicon Valley technology for spying.
-
-
In an exclusive interview with Wired.com, Snowden said that NSA’s earlier announced number of 1.7 million secret documents allegedly leaked by him was an overestimated figure
-
After President Obama delivered a speech in January endorsing changes to surveillance policies, including an end to the National Security Agency’s bulk collection of Americans’ domestic calling records, John Napier Tye was disillusioned.
-
-
-
Civil Rights
-
-
As Jamilah King explains, Michael Brown’s death at the hands of police officers isn’t an isolated incident in Ferguson, Missouri—where black residents face disproportionate stops, searches and arrests. The community has come out into the streets in protest to Brown’s killing, but it seems authorities don’t yet have a basic understanding about the outrage residents are feeling.
-
-
Fox News host Martha MacCallum hyped fears that the New Black Panther Party is pushing racial violence following an FBI report that one member of the group was on the ground in Ferguson, Missouri following the tragic shooting death of an unarmed black teenager.
-
We’ve been debating internally whether or not to cover the mess that is currently going on in Ferguson, Missouri. There has been plenty of attention paid to the protests and the failures by police there — and we frequently cover problems with police, as well as the militarization of police, which was absolutely on display in Ferguson (if you’ve been under a rock, police killed an unarmed teenager there last week, leading to protests over the past few days — and the police have been handling the situation… poorly, to say the least). However, the situation was changing so rapidly, it wasn’t entirely clear what to cover. The pictures from Ferguson of a very militarized police force were disturbing, and we’ve been thinking about writing something on that (and we may still). However, this evening, things got even more ridiculous, as not only did the SWAT team show up, but it then arrested two of the reporters who had been covering the events: Wesley Lowery of the Washington Post and Ryan Reilly of the Huffington Post. Both had been vital in getting out the story of what was happening on the street.
-
-
A New York Times reporter facing jail for refusing to reveal his source for leaks about the CIA was awarded the Newspaper Guild’s press freedom prize yesterday.
James Risen won the Herbert Block Freedom Award for having “risked his own freedom to protect the principles that are essential for a truly free press,” said a statement from the Newspaper Guild.
-
CIA spying on the Senate is the constitutional equivalent of the Watergate break-in. In both cases, the executive branch attacked the very foundations of our system of checks and balances.
-
-
We’ve written numerous times about how one of the major problems of the Espionage Act, which the Obama Administration has used more than twice as many times as all previous administrations combined, is terrible in part because there is no whistleblowing defense. In fact, any and all evidence of the public interest in revealing the information is inadmissible as evidence. Instead, the Act just focuses on whether or not information was released. For hopefully obvious reasons, this has tremendous (and dangerous) implications for free speech and whistleblowing (something President Obama claims to strongly support).
-
-
Internet/Net Neutrality
-
Okay, so we debunked this silly argument back in 2006 (and again in 2008), but it appears to be back again now that the net neutrality battle is heating up: it’s the idea that because we have CDNs, the internet has never been neutral (for those who don’t know, a CDN is a Content Delivery Network — a system, like Akamai, that allows internet companies to distribute their content geographically, so that download speeds are slightly shorter across the network, since physical distance is not as far). But that’s based on a bogus definition of “net neutrality” that only telco shills or very confused people make. The simplest way of explaining this is as follows: CDNs make the surfing experience better for everyone, by better distributing content to speed delivery to everyone. The efforts by big broadband to break net neutrality is to set up a tollbooth so that they get to pick winners and losers. In short: CDNs benefit end users. Breaking net neutrality only benefits the big broadband gatekeepers. This is about the power of big broadband to pick winners and losers.
[...]
Again, (yes, I’m on repeat here), CDNs are about improving access for everyone. As others have pointed out, a CDN doesn’t degrade other traffic. It improves the overall experience by moving content closer to the edges of the network. The efforts by Comcast, Verizon and AT&T are entirely different. They’re looking to reallocate traffic to burden some players in favor of those who pay. That’s picking winners and losers. The impact is wholly different. A CDN benefits everyone. The gatekeeper broadband providers are looking to hinder some sites in order to favor those who pay.
-
The New York Times Editorial Board comes out in support of using Title II authority to enact stronger net neutrality rules. T-Mobile and Sprint are asking the FCC to reconsider its rules for the upcoming spectrum auction. Edward Snowden claimed a cyberdefense system dubbed “MotherMind” is in the works at the NSA, and accused the agency of inadvertently causing an Internet blackout in Syria in 2012.
-
It seems unlikely to expect FCC boss Tom Wheeler to say much that really matters concerning the key issues the FCC is facing until the final decisions are made (and, if history is any indication, even when those decisions are made, the statements will be bland nothingness), but it’s still worth noting that he recently responded to two very different letters from members of Congress. The first was a letter from a number of Senators coming out strongly in support of reclassifying internet access under Title II, basically defining it as a common carrier service, and creating real rules that prevent broadband providers from picking winners and losers. Wheeler’s response could be summed up as “Yeah, we’re considering it.” But that’s about it.
-
Between trying to negotiate disputed charges with increased levels of internet service, releases of customer retention employee handbooks that are hella damning, and the release of a recording with a customer retention rep that alarmed even the most cynical of us, Comcast hasn’t had an easy go of it lately. Two things have become pretty clear as these stories have rolled out to the public. First, thou shalt always record your conversations with Comcast reps (local/stupid two-party consent laws apply) or thou shalt be forever filled with regret. Second, Comcast really needs to change the way its customer service reps handle calls.
-
DRM
Permalink
Send this to a friend
Posted in Deception, Microsoft at 6:00 am by Dr. Roy Schestowitz
“They’ll get sort of addicted, and then we’ll somehow figure out how to collect sometime in the next decade.”
–Bill Gates speaking about China
Summary: A new look at how Microsoft-friendly media takes negative Microsoft news and turns that news into some kind of scandals where Microsoft is the victim
Following the well-overdue Microsoft raid which targeted Microsoft for its abuses (allegedly back doors, but perhaps also racketeering, tax evasion, conspiracy against users and bribes to officials) there was yet another raid. Microsoft is laying off many people in China (they are protesting as some used to work for Nokia) and as Pedro Hernandez put it:
With a new round of raids that have ensnared Microsoft partner Accenture, the Chinese government takes a closer look into the software giant’s dealings in the country.
Chinese government officials returned to Microsoft this week in an antitrust probe that has spread to the company’s partner Accenture, a technology services and consulting firm.
On July 28, China’s State Administration for Industry and Commerce (SAIC) announced that the agency’s anti-monopoly investigators had seized computers, documents, emails and files from Microsoft’s offices in Beijing, Shanghai, Guangzhou and Chengdu. The SAIC is looking into allegations of anti-competitive behavior by Microsoft.
Accenture is a disgusting company that we wrote about before. It acts as somewhat of a Microsoft proxy and it is a patent shark.
Well, the Microsoft media is trying to distract from it either by smearing China or changing the subject. This is typical and we have noted this before.
Microsoft is undeniably facing some serious problems and this includes losses in many areas, not just bans of Windows and Office (the online version) in the biggest market. According to this analysis, Microsoft is losing billions in tablets:
Even the most diehard of Microsoft fans will admit its old Surface RT tablet was an unmitigated disaster. From lackluster sales to massive inventory write-offs, former Microsoft CEO Steve Ballmer’s efforts to make a splash in mobile devices and services didn’t exactly start off with a bang. And catching tablet sales leader Apple with the Surface RT? Not even close.
Apple is not the leader, Android (collectively) is. Watch the Microsoft booster Lance Whitney trying to incite against Android by citing the frivolous complaint from Microsoft and its proxies (like Nokia). The Microsoft booster writes:
Still finishing up its antitrust probe of Google’s search practices, the EU is now looking into allegations regarding the company’s control over Android apps, reports The Wall Street Journal.
The author is poor on disclosures. He is still reliant on Microsoft as by his own admission (must click to view) he wrote for “Microsoft TechNet, and other technology sites. His first book, “Windows 8 Five Minutes at a Time,” was published by Wiley & Sons in November 2012.”
Being CBS (parent of ZDNet), this bias is typical. It is very pro-NSA, pro-CIA, and pro-Microsoft (top NSA partner). Many writers there came from Microsoft and continue to serve Microsoft, often by smearing Microsoft’s rivals. Vista 8 boosting is quite common from the man above and his colleagues who came from Microsoft do this too.
Here in Reuters is some “naked PC” propaganda (“naked PC” is a propaganda term from Microsoft and its allies) trying to shift public opinion against China, pretending it is indebted to Microsoft. Towards the end it dares to admit that alternatives to Microsoft do exist in China: [via]
The result is that up to 60 percent of PCs shipped in the emerging markets of Asia, says IDC research manager Handoko Andi, have no Windows operating system pre-installed – so-called ‘naked PCs’, which usually instead carry some free, open source operating system like Linux. That compares with about 25 percent in the region’s developed markets like Japan and Australia.
Reuters is at least writing “so-called ‘naked PCs’”, implying that the term itself is dubious. It’s intended to make PCs without Microsoft software tightly bundled onto them seem socially inadequate, inherently incomplete, and gross/rude. It is actually very trivial to install one’s GNU/Linux distribution of choice. It’s a lot easier than doing that with Windows these days.
“Reuters is at least writing “so-called ‘naked PCs’”, implying that the term itself is dubious.”Microsoft fails not only when it comes to software sales but also hardware (made in China, which Microsoft is heavily reliant on). Based on some new Xbox numbers, “Microsoft’s Xbox One Is Failing” with hundreds of millions in losses incurred by lacklustre sales. As one author put it: “Microsoft has reported that its next-gen console, the Xbox One, has lost the company over $400 / €298 million, since it was released in November last year.”
This will only lead to yet more layoffs (maybe Xbox manufacturers in China), but cover-up from Microsoft- and Gates-leaning media calls it “Perfectly Fine”.
That’s yielded a collection of startled headlines about how Microsoft has dropped the ball with their new console by losing $400M already.
Then comes the usual spin. This is a pattern we see a lot of; Microsoft-friendly media would bend backwards to put a positives spin on something which is inarguably bad.
Microsoft had lost billions on Xbox 360 before it chose to make yet another Xbox incarnation. The money continues to go down the drain; Windows and Office (the main cash cows) won’t be able to make up for it for much longer.
Microsoft depends on China in many ways. China does not depend on Microsoft unless China continues to fall into Bill Gates’ trap by using Windows. █
Permalink
Send this to a friend
Posted in Deception, Free/Libre Software, Microsoft at 5:34 am by Dr. Roy Schestowitz
Microsoft embedded in the press
Summary: Some new examples of Microsoft boosters rewriting history, characterising Microsoft as a FOSS champion, and generally weak/shallow reporting on Microsoft’s audio/video surveillance software
Microsoft is in serious trouble and it is aware of this (just ask Microsoft employees). It is seeking an identity change and a longtime Microsoft booster, Todd Bishop, releases his latest spamvertisement with which to openwash Microsoft. He is not alone though. Microsoft’s booster and business partner Tony Bradley (pictured above) runs a similar spamvertisement with the goal of openwashing Microsoft. Watch the propaganda banner at the top. Bradley must be afraid that Microsoft’s death would doom his personal business. That’s why he keeps attacking real FOSS and trying to portray Microsoft as a FOSS company.
Another leading booster of Microsoft (who receives gifts from Microsoft), Ed Bott, releases some more of his spamvertisements to pretend Nadella will change much. It’s quite common to see Nadella’s image used for openwashing, based on nothing of substance. The management at the back room is still the same; this is just reputation laundering. ZDNet plays a role in it, but given its strong connection to Microsoft people — including Microsoft staff as ‘journalists’ — none of it should be shocking. These are not journalists but marketing people with a platform that calls itself ‘news’. There is another new example that a reader told us about. It was published by AOL some days ago and our reader called it “spam and possible revisionism.”
“It’s quite common to see Nadella’s image used for openwashing, based on nothing of substance.”He explained that “MSIE wasn’t released until later to fight Netscape. NCSA Mosaic what the browser in use in 1994.”
The last example we have does not mention surveillance aspects of Skype (as confirmed by Snowden’s leaks about Microsoft) and does not mention FOSS or surveillance-free alternatives. It is this article about forced Skype ‘upgrades’ with new back doors (or bug doors). The article says: “The downside of this for Microsoft/Skype is that they can’t get people to use all their new services – or see their new ads – if there are so many older versions.
“Similarly, they can’t move to new technical architectures that may provide better service when they have to also support a long history of past releases. (For example, their move away from the peer-to-peer architecture that was their original highlight to more of a centralized “cloud” architecture to provide better support for mobile clients.)”
Interestingly, as pointed out here, Microsoft is essentially deserting Vista Phone 7 useds [sic.], which leads to heckling. To quote: “We are permanently retiring all Skype apps for Windows Phone 7. As a result, within the next few weeks, you’ll no longer be able to sign in and use Skype on any Windows Phone 7 device” (repeating the original source).
You know Microsoft is in serious trouble when it abandons even its own clients. It’s not as though many use Vista Phone 7. It was an utter failure. █
Permalink
Send this to a friend
08.13.14
Posted in News Roundup at 5:44 pm by Dr. Roy Schestowitz
Contents
-
One way or another you’re actually using Linux every day. Linux is the dominant platform on web servers, including the one you’re on right now, and it is also the core of the Android operating system that you’re tapping away at all the time if you own an Android smartphone or tablet. Besides that it’s also running everything from top supercomputers to small specialized devices, like that ADSL router you’re probably connected through to the internet.
-
-
Frankly, I’d be quite happy if there were no more Windows versus Linux flame wars online. But if they are tapering off then I don’t think it’s because Linux is winning and Windows is losing. I think it might be because many of the flame warriors have moved onto mobile and are deep into the Android versus iOS wars instead of Linux versus Windows.
-
Windows and Linux communities used to virtually battle each other regarding the superiority of one platform or the other, but that is no longer happening, at least not at the same scale. One of the reasons for that might be that Linux is actually gaining ground.
-
Desktop
-
We’ve pointed out before how Chromebooks are some of the best selling laptops on Amazon, and though these cloud-based systems aren’t as capable as their Windows-based counterparts, they’ve having no trouble finding an audience, particularly in education circles. In fact, market research firm Gartner forecasts 5.2 million Chromebook sales by the end of the year, which would translate into a 79 percent jump compared to 2013.
-
Server
-
IT infrastructure has long been an enterprise commodity – relatively cheap and abundant. But hardware is no less important in solving today’s IT challenges, from big data and the cloud, to mobile, social and security, says Doug Balog, the general manager for IBM Power Systems.
-
IBM Research Division has published a paper comparing the performance of container and virtual machine environments, using Docker and KVM, highlighting the cost of using Docker with NAT or AUFS, and questioning the practice of running containers inside of virtual machines.
-
Kernel Space
-
The x86 APIC subsystem within the Linux kernel is beginning the process of a major overhaul with the Linux 3.17 kernel.
The Advanced Programmable Interrupt Controller (APIC) support is being overhauled to support physical IOAPIC hot-plugging. Within the Linux 3.17 kernel this feature isn’t present but the prepatory work is moving forward after a first attempt at the hot-plug support was rejected on technical grounds. In prepping for the APIC hot-plug support, obsolete driver abstractions were removed and other changes made for this merge window.
Those concerned about the Linux APIC code can find out more about the forthcoming changes via this lengthy mailing list message.
-
-
Graphics Stack
-
NVIDIA’s Mark Kilgard presented at SIGGRAPH 2014 in Vancouver to cover the changes found in the just-released OpenGL 4.5 specification. He also went over some of NVIDIA’s Linux driver changes.
-
Benchmarks
-
AMD Kaveri APUs feature a configurable TDP whereby users can opt to run their A-Series APUs with a lower power consumption and operating temperature but at the cost of slightly reduced performance.
-
Following yesterday’s RadeonSI Gallium3D vs. Catalyst comparison using the new AMD A10-7800 Kaveri APU with Radeon R7 Graphics, I then upgraded to the latest Git code for the Linux 3.17 kernel to look for performance changes.
-
Applications
-
FrostWire 5.7.5, a BitTorrent client (formerly a Gnutella client) that’s the result of a collaborative effort of hundreds of open source and freelance developers, has been released and integrates a major upgrade.
-
Instructionals/Technical
-
Games
-
The makers of The Witcher 2: Assassins of Kings Enhanced Edition from CD Project Red have made the game available on Steam for Linux, but they used a Wine-like wrapper to do the job. A native port is now in the works and that means more people will be able to play it.
-
-
Besides SIGGRAPH going on right now in Vancouver, Canada, over in Cologne, Germany right now is GDC Europe.
GDC Europe ran from August 11 and ends today in the wonderful German city of Kölsch beer and carnival. Leszek Godlewski of Nordic Games talked about advanced Linux game porting at one of the sessions during GDC Europe. Godlewski has made a name for himself with Linux game porting and is responsible for Linux game titles like Painkiller: Hell & Damnation. Leszek has talked in the past about lessons in porting games to Linux, a developer’s perspective on Linux game porting, etc.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
There are lots of stories to report today starting with the top five lies Linux-haters tend to spread. Next up is Gary Newell with the top five easiest modern distributions to use. We’ve got five tips for Vim users and how to deal with missing ifconfig. Paul Adams’ been blogging the story of KDEPIM and Dead Island may be coming to Linux. OpenSource.com and Linux.com are all about education these days and Red Hat released a beta of upcoming RHEL 6.6.
-
When inviting to the Randa 2014 meeting, Mario had the idea to write a book about KDE Frameworks. Valorie picked up this idea and kicked off a small team to tackle the task. So in the middle of August, Valorie, Rohan, Mirko and me gathered in a small room under the roof of the Randa house and started to ponder how to accomplish writing a book in the week of the meeting. Three days later and with the help of many others, Valorie showed around the first version of the book on her Kindle at breakfast. Mission accomplished.
-
KDE Frameworks 5 is the result of two years of hard work porting, tidying, modularizing and refactoring KDELibs4 into a new addition to the Qt 5 platform. In January, Alex Fiestas announced The KDE Barcelona Hub—an office where anyone is welcome to come and work on KDE projects. It was just what the Frameworks team needed to finish off the code so it could be released to the world. Read on for some of what happened.
-
Here in the KDE office in Barcelona some people spend their time on purely upstream KDE projects and some of us are primarily interested in making distros work which mean our users can get all the stuff we make. I’ve been asked why we don’t just automate the packaging and go and do more productive things. One view of making on a distro like Kubuntu is that its just a way to package up the hard work done by others to take all the credit. I don’t deny that, but there’s quite a lot to the packaging of all that hard work, for a start there’s a lot of it these days.
-
-
It is the Randa-Sprint week again. If you never heard about this, then imagine a lot of KDE developers, meeting somewhere in the mid of the Swiss Alps, in a deep valley with a rather slow internet connection. These people are coming from all over the world and are here for exactly one week, to work, to discuss, and to create the future of KDE. To name only a few of the current meeting’s topics, there are people working on a KDE SDK, porting to KF5, writing the KF5 book (aka putting documentation to the KF5), reaching out for new platforms, and many more exciting things are happening here. If you want to know more about all the goods that the Randa meeting brings, you should probably have an eye on the planetkde.org posts for the next days.
-
GNOME Desktop/GTK
-
Evolution 3.12.5, a complete solution that provides integrated mail, address book, and calendaring functionality to users of the GNOME desktop environment, is available for download.
-
As mentioned in the previous report GNOME Books Library exposes WebKit WebView and the functionality needed for the interaction with epub.js. There are some new features. The library implements navigation bar and page controlling (total number of pages, status of the current page) as well as table of contents (links to the book chapters).
-
-
The final version of Zorin OS 9 Business, an Ubuntu-based operating system aimed at Windows users who are switching over to Linux, has been released and is available for purchase.
-
Black Lab Linux 6.0 Preview 2, a distribution based on Ubuntu 14.04 LTS, has been released and is now ready for testing.
-
Slackware Family
-
Today is my son’s 16th birthday, and I do have a gift for all of you, not just for him. I present to you a first preview for Slackware, of the KDE Frameworks 5.1.0 libraries, combined with Plasma 5.0.1, the next-generation desktop workspace from KDE.
I wrote about this in my previous post, but now you can experience it first-hand: Plasma 5.0 improves support for high-DPI displays and comes with a “converged shell”, i.e. one Plasma codebase for different target devices like desktop computers, laptops, tablet, phones etc. Plasma 5 uses a new fully hardware-accelerated OpenGL(ES) graphics stack. Plasma 5 is built using Qt 5 and Frameworks 5.
And with the Breeze themed artwork and its own Oxygen font, this desktop looks clean and modern.
-
Red Hat Family
-
-
Although Red Hat already released RHEL 7, RHEL 6.x users can still benefit from new platform features.
Red Hat came out today with a beta release of its Red Hat Enterprise Linux 6.6 (RHEL 6.6) platform. The new beta follows Red Hat’s June release of RHEL 7 and inherits a few of its features.
-
-
-
Fedora
-
As we slowly meander our way towards the pointy end of the Fedora 21 release, with Alpha speeding up in the rear view mirror, the Fedora ARM team are starting to discuss the best way to deal with the blossoming amount of ARMv7 devices that can and do run out of the box on Fedora.
With our 3.16 kernel containing device tree blobs for 200+ devices, the Fedora 3.17 rawhide kernel already containing 230+, it’s truly impossible to actively test and support all of those devices. So much like previous releases we’ll be focusing on testing a group of “primary devices” with the remainder being considered as secondary. This doesn’t mean they won’t work, it just means they’re not necessarily a testing focus of the regular contributors or they might not be readily available to purchase.
-
Alpha Change Deadline slips one more week due to requested glibc/GCC mass rebuild [1]. Alpha Change Deadline is now 2014-08-19.
-
Overall the Flock was awesome. The quality of all technical presentations/workshops was really high. It’s amazing how many things currently going on at the Fedora community, not just related to our Operation System (the distribution) but also innovative things that we develop or lead that in the long run benefit the whole Free Software community. As always I had the chance to meet, talk and collaborate in person with many Fedorians and that’s always motivating for my contribution to the project.
-
Vulnerabilities in software happen. When they get fixed it’s up to the packager to make those fixes available to the systems using the software. Duplicating much of the response efforts that Red Hat Product Security performs for Red Hat products, the Fedora Security Team (FST) has recently been created to assist packagers get vulnerability fixes downstream in a timely manner.
-
The Fedora ARM team has been doing a great job at testing and seeing a wide-range of ARM development boards and other consumer devices will work with the upcoming Fedora 21 release.
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
Canonical has published details in a security notice about a pyCADF vulnerability in Ubuntu 14.04 LTS (Trusty Tahr) that has been identified and corrected.
-
We are pleased to announce that our build infrastructure has been upgraded to Ubuntu Trusty. This means that your builds will run in an updated and more stable environment. We worked hard during the past couple of months to make this upgrade as smooth as possible.
-
-
-
The Raspberry Pi is a small, low-cost computer designed to promote an interest in computing and programming – but it doesn’t have to be straight-laced computing. In fact, in this article we’ll be showing you how you can use it to turn a Bigtrak into a robot. That’s educational, right?
The Bigtrak is a toy that takes in a list of straightforward commands (Go forwards, turn left, turn right) and then executes them. To make things more interesting we’re going to remove the existing circuitry and replace it with a Raspberry Pi, using a small motor driver to safely control the motors in the Bigtrak, which we’ll then set up to be controlled via a PlayStation 3 DualShock controller.
Everything required on the software side comes pre- installed on the latest Raspbian OS images, so all we need to translate changes from the controller to the motors is a small Python script that uses the Pygame and RPI.GPIO modules.
-
NI’s new 4-slot CompactRIO control system combines a dual-core Atom E3825 with a Kintex-7 FPGA, and features industrial temperatures and NI Real-Time Linux.
-
Phones
-
I’ve had a long, quiet time on this blog over the past few years while I’ve been frantically helping Jolla to launch their self-named product: the Jolla. I’ve enjoyed (almost) every day I’ve been there: they really are a great bunch of people and the work has been plentiful and challenging.
-
Android
-
All the way back in 2011, before Android marched to the top of the mobile platform wars, developers were voicing concerns about the fragmentation of the platform. In a post back then, I noted this quote from a study that Appcelerator and IDC did: “The Appcelerator-IDC Q2 2011 Mobile Developer Survey Report, taken April 11-13, shows that interest in Android has recently plateaued as concerns around fragmentation and disappointing results from early tablet sales have caused developers to pull back from their previous steadily increasing enthusiasm for Google’s mobile operating system.”
-
Back in 2011, Nvidia announced to the world that they had acquired a license for the latest ARM instruction set, the ARM v8. But the most exciting part of the deal was that the new ARM instruction set is 64-bit. After making 32-bit mobile CPUs, Nvidia was set to take their Tegra K1 platform to the next level with a 64-bit mobile CPU. At the Hot Chips conference this year, Nvidia revealed their little project that they have been quietly working in for all these year. The Tegra K1 ARM v8 64-bit chip from Nvidia is ready for a release later next year. The new chip is codenamed Project Denver.
-
-
Research carried out by CWJobs.co.uk found that 62 per cent of IT professionals think that businesses are already missing out on the opportunities that open source technology presents. This is laid bare further by the fact that of the 300 IT professionals surveyed, 48 per cent think that there are already more jobs in open source than a year ago.
-
Research from CWJobs has found that almost half (48 per cent) of IT professionals believe there are more jobs in open source than there were a year ago. Moreover, the survey of over 300 IT professionals found 62 per cent of the opinion that businesses were missing out on the opportunities generated by open source. The survey also found 71 per cent of respondents believe open source will be required more widely in future, with the biggest growth expected to be in advertising and media, telecoms and financial services.
-
-
In a very short amount of time, Docker–an open source tool for managing applications in containers–has become all the rage, and now CenturyLink has announced that it is releasing its Docker management tool Panamax to the open source community. Panamax is targeted to give developers one management platform to create, share and deploy Docker-containerized applications.
-
While it’s clear that Docker and container-based architecture is rapidly becoming a popular development and deployment paradigm, there are still a number of areas where containers still struggle compared to traditional bare-metal or virtualized solutions.
One of these areas is data-centric applications. While virtual machines have developed a number of tools for snapshotting, migrating, resizing, and other management tasks, the management side of Docker containers and their related volumes isn’t necessarily at the same level of maturity. Yet. There are still some unanswered questions about how best to build a containerized application capable of dealing with machine failure, scalability, and other issues without introducing unnecessary complexity. These challenges are particularly difficult when applied to databases associated with containers.
-
Web Browsers
-
Chrome
-
The Development branch of Google Chrome, a browser built on the Blink layout engine that aims to be minimalistic and versatile at the same time, is now at version 38.0.2121.3 and is available for all platforms.
-
As a rule of thumb Google typically offer updates to its services and products on Wednesdays. However google+ was given a surprise update today with a neat albeit a debatable limited update.
-
Education
-
Ellis, whose students have contributed to Caribou, an on-screen keyboard that’s part of the GNOME desktop, explained that seasoned students often prefer to submit patches to projects, while beginner-level students are more content to interview existing contributors, explore collaboration technologies like Git or IRC, and embark on what Ellis calls open source “field trips”—toe-dipping excursions into various communities…
-
My first serious introduction to open source software came with my first summer work-study job. I was working on my undergraduate degree in computer science, and applied to my local library to work in the children’s area. But the library’s network admin, Cindy Murdock, snapped me up as soon as she saw “shell scripting” on my resume. From there I began to learn about all the ways open source software can be used in libraries.
My library began using it with BSD-based routers in our small, rural libraries. At the time, dial-up was the only option for Internet access there. By the time I arrived, the library was already using open source software for routers, web servers, and content filters. From there we began branching out into other software. We set up a digital repository using Greenstone, and we were looking for an open source intergrated library system (ILS). We streamlined our people-counting system with a setup including wireless sensors that report to a server. I was able to write a more advanced reporting system using its API, which I also released.
-
FSF/FSFE/GNU/SFLC
-
The X200 model supported in particular right now is the 7458CY9, which is an older X200 variant. This X200 model has a 2.4GHz Core 2 Duo processor with 4GB of RAM and 160GB HDD. The X200S and X200T are also listed as being supported.
-
Programming
-
When somebody asks about their missing pet feature in KDE or ownCloud software, I always trow in a request for help in the answer. Software development is hard work and these features don’t appear out of nowhere. There are only so many hours in a day to work on the a million things we all agree are important. There are many ways to help out and speed things up a little. In this blog I’d like to highlight testing because I see developers spend a lot of time testing their own software – and that is not as good as it sounds.
-
Twitter is defending itself after reports this morning suggested that the company admitted up to 8.5%, or 23 million, of its active users are automated bots.
-
-
Security
-
FOOTBALL TEAM Manchester United has banned its fans from using iPads and other tablets and devices of similar size at its home stadium.
The team, which has previously backed Apple gadgetry, is barring the technology for security reasons, according to a report at The Verge.
The report is an update on Manchester United’s hospitality packages, where it says what is allowed and where.
[...]
“In line with UK airports we are reacting to the latest security intelligence. These actions are designed to ensure the continued safety and security of all spectators,” said Manchester United’s information pages.
-
-
-
-
Defence/Police/Secrecy/Aggression
-
Developments in Libya continue to underline sharply the foreign affairs catastrophe in which the United States under President Barack Obama participated, with the country’s former colonial masters France, Italy and the United Kingdom, in engineering regime change there in 2011.
-
John Schindler was a prof at the College; he slammed Snowden as a traitor and compared Greenwald to Hitler, and was generally dismissive about concerns about network surveillance; he also sent pictures of his dick to a woman who wasn’t his wife. He also co-wrote the report that stated that Sadam Hussein had WMDs, and helped send America to war.
-
-
Airliners are occasionally shot down (collateral damage) by modern air defense systems. Like children run over cross the street, it’s an ugly fact of modern life. These extreme (but fortunately rare) events reveal much about the behavior of governments — and about us. Governments lie; they do so because we believe them (no matter how much we pretend no to).
-
-
James Risen is out of chances. It’s time for the government to stop harassing a journalist for doing his job
-
-
-
Judge David Gideon’s words refer not to the use of drones, but the activities of anti-drone activists. He has uttered this phrase from the bench repeatedly in recent months as activists have appeared before him, and the words must have been echoing through his mind as he sentenced Mary Anne Grady Flores, a 58-year-old grandmother from Ithaca, New York, to one year in prison on July 10. Her crime? Participating in a nonviolent anti-drone protest at an upstate New York military base after being ordered by the local courts to stay away from the site. The base is used to train drone pilots and technicians, and to control drone surveillance and strikes in Afghanistan and elsewhere.
-
Judge David Gideon’s words refer not to the use of drones, but the activities of anti-drone activists. He has uttered this phrase from the bench repeatedly in recent months as activists have appeared before him, and the words must have been echoing through his mind as he sentenced Mary Anne Grady Flores, a 58-year-old grandmother from Ithaca, New York, to one year in prison on July 10. Her crime? Participating in a nonviolent anti-drone protest at an upstate New York military base after being ordered by the local courts to stay away from the site. The base is used to train drone pilots and technicians, and to control drone surveillance and strikes in Afghanistan and elsewhere.
-
The current clear preference of the American public to avoid new entangling military encounters naturally gives rise to the charge that President Barack Obama is merely bowing to that public opinion rather than exerting leadership.
-
“Normally speaking, the Defense Department deals with governments, and the CIA deals with non-state actors,” explains Stephen Biddle, a professor of political science and international affairs at The George Washington University.
[...]
“As far as we can tell, yes, the CIA is now committed to provide weapons and ammunition directly to the peshmerga,” Biddle says. That has been widely reported, but a CIA spokesman declined Marketplace’s request for comment.
-
1. It’s not a rescue mission. The U.S. personnel could be evacuated without the 500-pound bombs. The persecuted minorities could be supplied, moved, or their enemy dissuaded, or all three, without the 500-pound bombs or the hundreds of “advisors” (trained and armed to kill, and never instructed in how to give advice — Have you ever tried taking urgent advice from 430 people?). The boy who cried rescue mission should not be allowed to get away with it after the documented deception in Libya where a fictional threat to civilians was used to launch an all-out aggressive attack that has left that nation in ruins. Not to mention the false claims about Syrian chemical weapons and the false claim that missiles were the only option left for Syria — the latter claims being exposed when the former weren’t believed, the missiles didn’t launch, and less violent but perfectly obvious alternative courses of action were recognized. If the U.S. government were driven by a desire to rescue the innocent, why would it be arming Israel, Egypt, Jordan, Bahrain? The U.S. government destroyed the nation of Iraq between 2003 and 2011, with results including the near elimination of various minority groups. If preventing genocide were a dominant U.S. interest, it could have halted its participation in and aggravation of that war at any time, a war in which 97% of the dead were on one side, just as in Gaza this month — the distinction between war and genocide being one of perspective, not proportions. Or, of course, the U.S. could have left well alone. Ever since President Carter declared that the U.S. would kill for Iraqi oil, each of his successors has believed that course of action justified, and each has made matters significantly worse.
-
An Iraqi helicopter delivering aid to stranded Yazidis crashed Tuesday killing the pilot and injuring some of the passengers including a New York Times reporter. The Yazidis are a religious minority trapped by ISIS – the Islamic militants advancing through Northern Iraq.
-
Rahed Taysir al’Hom was buried in the sandy soil of the cemetery of Jabaliya, the rough Gaza neighbourhood where he had grown up, at 1pm on the third day of the ceasefire.
His funeral was quick, attended by a hundred or so mourners, and accompanied by a quick sermon from a white-turbaned cleric, a sobbing father and some shots fired from a Kalashnikov by a skinny teenager.
-
“Her father was killed in Helmand amidst fighting between the Taliban and the Afghan/U.S.-NATO forces,” said a relative about Gul Jumma, who looked down, shy and full of angst, sensing a future that’s not promising.
Gul Jumma, together with the Afghan Peace Volunteers, expressed their opposition to wars in this video. Gul Jumma (in photo above, at right) holds up the sign for Ukraine, indicating “No to wars in Ukraine.” She understands what it is like to be caught in the crossfire, as happened to her father when he was killed in battle.
-
The human rights groups in Yemen repeatedly accused the United States of breaking international law and perhaps committing war crimes by killing civilians in missile and drone strikes that were intended to hit militants.
-
A senior strategic analyst has called for the Federal Government to rethink the Pine Gap communications facility, saying some of its work now is “ethically unacceptable”.
-
The joint US-Australian defence base at Pine Gap is accused of helping direct American drone strikes leading to Australia’s leading intelligence expert to call its work ‘ethically unacceptable’.
-
-
-
“All the implications so far in the public record are that ISIS [IS] is a covert US intelligence operation,” Boyle told RIA Novosti Tuesday. “Head of ISIS Abu Bakr Baghdadi spent five years in an American detention facility, and also three of the four military commanders were also in detention by the US forces. So, my guess is that ISIS is indeed a covert US military intervention to set precedent for US escalation in Iraq.”
-
U.S. military forces continued to engage ISIL terrorists in Iraq today, successfully conducting an airstrike on an ISIL armed truck west of the village of Sinjar. NBC News has confirmed that at approximately 12:20 p.m. EST, the U.S. remotely piloted an aircraft that struck and destroyed an ISIL armed vehicle west of Sinjar. All aircraft exited the strike area safely.
-
The CIA’s infamous program to crush the resistance to U.S. occupation of South Vietnam is largely remembered as a gigantic campaign of assassination that claimed tens of thousands of lives. However, the Phoenix Program is best understood as an extension of U.S. propaganda.
-
Mubarak’s interior minister claims he warned American intelligence twice about 9/11 attacks
-
NSA whistleblower Edward Snowden is certain that the United States’ secret services spy on him in Russia where his temporary asylum was extended for three years starting August 1, Snowden said in an interview with WIRED online magazine.
“They’ve [NSA, CIA] got a team of guys whose job is just to hack me,” Snowden said. “I don’t think they’ve geolocated me, but they almost certainly monitor who I’m talking to online. Even if they don’t know what you’re saying, because it’s encrypted, they can still get a lot from who you’re talking to and when you’re talking to them.”
-
Edward Snowden has revealed this week that if it had not been for an impending election of Barack Obama in 2008 as President of the United States, he might have leaked NSA documents earlier. He speaks up this week on how he began to consider whistle-blowing in 2007, during “the Bush period, when the war on terror had gotten really dark.”
-
The American people when polled recently overwhelmingly said they didn’t want any new war in Iraq.
To that acknowledgement, “dear leader” Barack Obama authorized air strikes last Thursday in Iraq but endlessly repeated, “No ground forces will be sent”.
-
Environment/Energy/Wildlife
-
Plans to crack down on endocrine disruptors and illegal timber being imported into the EU, were buried by the outgoing President of the European Commission, José Manuel Barroso, and his secretary-general Catherine Day, according to a senior EU source.
-
Why then are we unable to stop using fossil fuels? Our inability to deal with the problem of fuel invites a perverse question; does fossil fuel know that we don’t need it? This is a version of a joke told by Slavoj Zizek. Briefly, a man believes that he is a piece of grain who is under constant threat that he will be eaten by a chicken. He goes to a psychologist and he is cured of this delusion. Time passes, and one day he returns to the analyst and tells him, “There is a chicken outside of my house! I am afraid he will eat me!” The analyst says, “But you are cured of your delusion; you know that you are a man, not a piece of grain.” The man replies, “Yes, I know. But does the chicken know?”
-
The Supreme Court says money is speech. With the chance of losing the biggest tax break of the new century to Ballot Proposition 1, oil giants ConocoPhillips, BP, and ExxonMobil are making it seem more like money is screech.
The Supreme Court also says corporations are “persons” so, under the First Amendment to the Constitution, oil money is “protected” speech.
-
Erbil is also home to many major American oil wells.
-
Finance
-
John Oliver continues to do the work of real journalists, blowing the lid of the complicated and corrupt world of payday lenders in Sunday’s “Last Week Tonight.”
-
Since 2008, one particular federal government agency has aggressively investigated leaks to the media, examining some one million emails sent by nearly 300 members of its staff, interviewing some 100 of its own employees and trolling the phone records of scores more. It’s not the CIA, the Department of Justice or the National Security Agency.
-
Like it or not, in such a setting we cannot afford to deepen our rift with Russia. Our airstrikes on Iraq, necessary as they are, have also furnished an ideal pretext for Russian President Vladimir Putin to initiate some type of militarized intervention in eastern Ukraine that he can argue falls under the banner of “peacekeeping” and “protection.” Case in point: Western politicians are openly wondering if the 260-truck convoy that set out from the Moscow region Tuesday is possibly carrying something other than what Russians profess is only “humanitarian aid” for the besieged city of Luhansk – and whether the trucks will actually stop, as claimed, at the Ukrainian border and hand control of the mission over to the International Red Cross.
-
PR/AstroTurf/Lobbying
-
-
A slew of election law experts and Wisconsin’s elections board have filed briefs with the Seventh Circuit Court of Appeals sharply critiquing federal Judge Rudolph Randa’s decision halting Wisconsin’s criminal campaign finance probe, describing the ruling as “erroneous,” and as “completely unmoored” from U.S. Supreme Court precedent.
On May 6, Judge Randa — a George Bush appointee who is on the board of advisors to the Milwaukee Federalist Society — halted the “John Doe” investigation into alleged illegal coordination between Wisconsin Governor Scott Walker’s campaign and outside political groups like Wisconsin Club for Growth (WiCFG) during the 2011-2012 recall elections. WiCFG spent $9.1 million during the recalls on electoral “issue ads” that stopped short of expressly telling viewers how to vote, and funneled millions more to other groups that also ran issue ads.
-
Censorship
-
New data obtained through a Freedom of Information request reveals that the UK’s ‘piracy police’ are hijacking the ads of 74 suspected pirate sites. The police are refusing to reveal the domain names as that would “raise the profile of these sites.” Fearing cyber-attacks, the names of participating advertising agencies are also being withheld.
-
They say never to read the comments. But I do. Every day. I read every comment—the good, the bad, the so ugly it needs to be deleted—because it’s my job. I’m a community management consultant. And, believe it or not, my favorite commenters are anonymous.
-
Privacy
-
Detectives have been reviewing Bravo’s phone for clues, and found his request to Siri, made on Sept. 20, 2012, when the two men were captured by a surveillance camera outside a Gainesville Best Buy store.
Gainesville Police Department detective Matt Goeckel said the flashlight on Bravo’s phone had also been used on nine occasions that night, for a total of 48 minutes, and its location points don’t match where Bravo said he was.
-
-
Well I mean who hasn’t a bricked a router and taken out an entire country’s Internet at least once while trying to update the firmware? The NSA’s “blame Israel” trick is new to me, though.
-
-
-
Former NSA contractor also says the U.S. was working on an automated cyberattack response system in WIRED interview
-
Edward Snowden has popped up again, this time nuzzling an American flag on the cover of Wired. In the accompanying story by James Bamford, Snowden again shares the reasons he decided to steal and leak documents from the N.S.A., and reveals a few new tidbits.
-
It would appear that Edward Snowden is still far from finished with his National Security Agency revelations.
In his latest revelation, Snowden tells WIRED magazine that the NSA has a secret, autonomous program called “Monstermind” that can respond to cyberattacks from other countries without human intervention.
-
In the high desert near Bluffdale, Utah, there lurks a creature made entirely of zeroes and ones. Called “MonsterMind”, the project is an automated cyber weapon, perched atop the data flows into the National Security Agency’s Mission Data Repository. According to recent revelations from former government contractor and NSA leaker Edward Snowden, Monstermind is both tremendously powerful and easily fooled. Here’s the skinny on the biggest revelation from Wired’s recent profile of Snowden.
-
Edward Snowden says dishonest comments to Congress by the US intelligence chief were the final straw that prompted him to flee the country and reveal a trove of national security documents.
-
-
-
It was billed as a “Cybersecurity Summit,” but it was actually a convenient platform for exasperated lawmakers to vent their frustrations at being part of a hopelessly gridlocked Congress. And make no mistake about it, they are really frustrated.
At a gathering yesterday of political and corporate leaders in Palo Alto, California hosted by Hewlett-Packard and organized by the Silicon Valley Leadership Group, two U.S. Senators and two members of the House left little doubt that the chances of action on bills to address cybersecurity, or anything else for that matter, were just about zero. “We’re not doing a whole lot in this Congress right now,” admitted Senator Saxby Chambliss (R-Georgia).
-
-
If the NSA still doesn’t know the full extent of the greatest leak of secrets in its history, it’s not because of Edward Snowden’s attempts to cover his tracks. On the contrary, the NSA’s most prolific whistleblower now claims he purposefully left a trail of digital bread crumbs designed to lead the agency directly to the files he’d copied.
-
National Security Agency whistleblower Edward Snowden has called into question the competence of the investigation into the aftermath of his disclosures, which was overseen by the NSA’s new deputy director, Rick Ledgett.
-
A now-defunct National Security Agency (NSA) bulk collection program that collected information about online communications exceeded its authority, collected too much, and shared that information too freely, recently declassified court documents show.
-
Declassified documents from America’s Foreign Intelligence Surveillance Court (FISC) shows that even the NSA didn’t know the limits of what it was supposed to collect, and overstepped its authorisations for years.
The documents were released to the Electronic Privacy Information Centre in response to an FOI request, and record FISC judges’ disquiet about the program. Seeking a renewal for the NSA’s use of “pen register and trap and trace (PR/TT)” devices in US networks to collect subscriber metadata, the papers note that “the government acknowledges that NSA exceeded the scope of authorised acquisition continuously during the more than [REDACATED] years of acquisition under these orders”.
-
Newly declassified court documents show one of the National Security Agency’s key surveillance programs was plagued by years of “systemic overcollection” of private Internet communications.
-
Former NSA chief Gen. Keith Alexander defended the NSA’s bulk collection to John Oliver by saying that all his former employers did was collect metadata. He defined that as “two phone numbers, date, time and duration of [the] call.” The agency’s rules for collecting our electronic communications were similarly stringent, with the government only permitted to store the “to” and “from” fields, as well as the time any private message was sent. Unfortunately, newly-declassified documents have shown that the agency had difficulty just collecting those pieces of information, and instead stored the full texts of e-mails and other messages sent online. According to the report, the NSA had “exceeded the scope of authorized acquisition continuously during the more than [REDACTED] years of acquisition.”
-
A federal judge in California sided mostly with the United States government this week in a decision handed down concerning classified documents pertaining to the National Security Agency’s secret surveillance programs.
-
-
-
The battle over who has the most secure smart phone has racheted up in the past year with the revelations by former NSA contractor Edward Snowden of the capabilities of some Western electronic spy agencies.
-
A developing U.S. cyber security program would not only hunt down and halt potential computer attacks but also strike back without staff oversight, according to former U.S. National Security Agency contractor, Edward Snowden.
In an interview with WIRED magazine made public Wednesday, Snowden said the program – MonsterMind – could hurt countries caught in the middle as hackers could disguise the origin of their attacks by routing them through computers in other nations.
“These attacks can be spoofed,” Snowden told the magazine. “You could have someone sitting in China, for example, making it appear that one of these attacks is originating in Russia. And then we end up shooting back at a Russian hospital. What happens next?”
-
James Bamford of Wired has published an in-depth interview with National Security Agency leaker Edward Snowden after “spending three solid days over several weeks” with the 31-year-old American in Moscow.
-
Former NSA contractor Edward Snowden has said that the development of a US counterattack for cyberterrorism that could not prove beneficial for the global community forced him to leak secrets of the US government.
-
EDWARD SNOWDEN HAS claimed that the NSA was working on a new cyberwarfare system that could mount a cyber attack without any human clearance.
-
Each year, as part of the Top 100, CRN selects one individual whose actions have had the biggest impact on the channel and the technology industry at large, most often as a positive force of change. That individual usually is hard at work within the channel ecosystem—a vendor executive, a solution provider, a technology innovator.
-
Author and journalist James Bamford recently gained unprecedented access to NSA leaker Edward Snowden, whose temporary asylum in Russia was just extended for three more years. The result is a thorough, exclusive interview published in the September issue of Wired.
According to Bamford, a gaunt-looking Snowden is taking great pains to evade his NSA and CIA pursuers. He limits his contact with outsiders, avoids American-trafficked areas in Russia, and switches computers and email accounts constantly. During their meetings, Bamford wasn’t allowed to bring his iPhone because he was warned that “a cell phone can easily be turned into an NSA microphone” even when it is turned off. Despite such vigilance, Snowden believes it’s only a matter of time before he is caught. “I’m going to slip up and they’re going to hack me. It’s going to happen,” he says.
-
Glenn Greenwald’s The Intercept published leaked GCHQ mobile phone OPSEC guidance from 2010 alongside excerpts from a comparable jihadist handbook from 2003 to argue that terrorist groups were focused on mobile phone spying risks years before the Snowden leaks began last year.
-
-
It’s been just over a year since the first reports from Edward Snowden’s cache of National Security Agency documents hit the news. As more information on the NSA’s practices has come to light, though, one thing seems to be growing increasingly clear: the NSA has more than one leaker.
-
SENATOR Mark Udall, engaged in a break-neck reelection bid against Republican Congressman Cory Gardner, has every reason to tout his critical record on the NSA and privacy at the same pitch that his campaign emphasizes Gardner’s record on personhood. But in a race that’s become decidedly negative on both sides, one of the nation’s most important issues isn’t driving one of its most important races.
-
Edward Snowden says dishonest comments to Congress by the US chief of national intelligence pushed him over the edge and prompted him to leak a trove of national security documents.
-
James Bamford, the national security journalist and author who himself had once been threatened with prosecution over his writings about the National Security Agency’s (NSA) activities decades ago, has gone to Russia to sit down with Edward Snowden.
-
-
-
-
“I love my country. I feel like a patriot,” Edward Snowden tells Wired in a wide-ranging and lengthy interview for the September issue, which features an already-controversial cover image of the NSA whistleblower wrapped in an American flag, notes Today.
-
-
-
-
-
-
-
-
-
-
-
-
…17 distinct U.S. intelligence agencies…
-
Good encryption software is not easy to make. but it’s essential for keeping files, emails, Web traffic and financial and personal information safe on the Internet.
At the DEF CON 22 hacker conference here last week, security expert Kenneth White presented an update on the Open Crypto Audit Project, an effort by White and cryptographer Matthew Green to examine open-source cryptography software, check it for security issues and improve it for the Internet community.
-
NSA whistleblower Edward Snowden is featured on the cover of the September issue of Wired magazine.
-
Readers are seeing a new side of Edward Snowden, this time on the cover of Wired magazine’s September issue, where the National Security Agency leaker cradles an American flag.
In the story, Snowden describes to reporter James Bamford an NSA program called MonsterMind, designed to prevent foreign cyberattacks and automatically fire back at the source of those attacks, without any human action. He argues the program could also be the biggest invasion of privacy known.
-
Dark Mail is an anti-surveillance email service born after it was brought to light that government agencies like the NSA were snooping on citizens’ emails.
-
Edward Snowden has made us painfully aware of the government’s sweeping surveillance programs over the last year. But a new program, currently being developed at the NSA, suggests that surveillance may fuel the government’s cyber defense capabilities, too.
-
With surveillance tools becoming easier for civilians to purchase, the Federal Communications Commission is establishing a task force to combat criminals and foreign spies who access phone networks.
-
Whistleblower Edward Snowden says the United States routinely handed over unvetted intelligence on Arab-Americans to Israel while he worked for the National Security Agency.
In an magazineinterview with Wired magazine, he is quoted as saying he was shocked to learn that emails and details of phone calls of Americans with Arab and Palestinian backgrounds were passed over to Israeli intelligence.
“I think that’s amazing,” he says in the September edition of the magazine, which features Snowden on the cover, clutching an American flag. “It’s one of the biggest abuses we’ve seen.”
-
Zimmermann is a co-founder of the encrypted communication company Silent Circle. At the security conference Defcon this weekend he spoke about government surveillance, and gave some context for times when humans have grappled with similar questions. For example, in the 1990s, Zimmermann opposed government proposals to plant backdoors in encryption techniques like PGP as standard practice. And according to the Register, in his Defcon speech, Zimmermann even likened surveillance to slavery and absolute monarchy as an extreme practice that society can transcend.
-
Australia’s security chief is “not quite sure” why data retention is an issue, while the former head of the CIA says “we kill people based on metadata”. So what is the truth behind data retention, and why does it matter?
-
-
Former security contractor Edward Snowden, who was granted asylum in Russia, revealed a classified legal order compelling Verizon Communications Inc to turn over the phone records of millions of customers to the National Security Agency.
-
-
Last year’s NSA revelations sparked a great deal of interest in secure messaging apps, from Threema to Telegram to TextSecure, particularly in German-speaking countries where people and businesses are highly sensitive about surveillance. Now you can add another one to the list – and this one comes from the German postal service itself.
-
The rapid erosion of US-German relations continues to prompt much attention and consternation on both sides of the Atlantic. The new era urged by presidential candidate Barack Obama in Berlin in 2008— one based on “allies who will listen to one another, learn from one another and, most of all, trust each other”— has conspicuously failed to materialize. With the enthralled crowds that had gathered at the Victory Column now a distant memory, recent German public opinion polls reflect a widespread disillusionment; only 29% regard the United States as a trustworthy partner, while 57% feel their country should be more independent of their longtime ally in matters of foreign policy.
-
Civil Rights
-
Attorney General Eric Holder said he believes the shooting in Ferguson (Mo.) “deserves fulsome review.”
[...]I have advised readers in the past to take deep breaths about the skunking of words. “Enormity” now means hugeness. “Bemused” now means slightly amused. Get over it.
So it is with this self-awareness that I stamp my feet about the creeping loss of fulsome. We simply don’t need a new $20 synonym for “full,” whereas a crisp two-syllable word meaning unpleasantly excessive, why that we do need.
-
Have progressives made a mistake of lumping all conservatives together and fueling their political energies into hating them? Or are there what Ralph Nader calls “anti-corporatist conservatives,” who loathe undeclared, endless wars as much as progressives? And should progressives seek alliances with these anti-corporatist conservatives to oppose unnecessary wars, corporate welfare, NSA violations of our privacy, and many other issues where there is what Nader calls “convergence?”
-
As I’ve often reported, the list of the agency’s wrongdoings is long, continuous and deeply documented in such books as “Legacy of Ashes: The History of the CIA” by Tim Weiner, and “Globalizing Torture: CIA Secret Detention And Extraordinary Rendition” by Amrit Singh and published by The Open Society Foundations.
-
The CIA’s activities in Africa go and in hand with the huge U.S. military offensive on the continent. The agency “has maintained a continuing presence on the African continent into the 21st Century, engaging in various nefarious activities, including supporting foes of the Gadhafi government in Libya.”
-
-
CIA spying on the Senate is the constitutional equivalent of the Watergate break-in. In both cases, the executive branch attacked the very foundations of our system of checks and balances.
-
-
-
A coalition of 20 transparency and ethics watchdog groups are fed up with CIA Director John Brennan’s leadership and are calling on President Obama to ask him to step down.
The group, which includes the Project on Government Oversight, the Sunlight Foundation and Citizens for Responsibility and Ethics in Washington, among many others, on Tuesday accused the CIA of abusing its power and obstructing the Senate Intelligence Committee’s investigation into agency’s use of torture in the years following the Sept. 11 attacks.
-
He is a former clandestine officer who’s gone into Lone Star politics. That would be conservative Will Hurd, who has joined the list of “national security” candidates who’ve caught the notice of John Bolton. Indeed, Mr. Hurd is challenging Democrat Rep. Pete Gallego in the 23rd District of Texas, which includes much of the Mexican-American border, in a pivotal area where voter support is much coveted by the GOP.
-
-
Last week I wrote about the baby steps that the European Commission is taking to bring more transparency to the Trade in Services Agreement (TISA) currently being negotiated. One of the things that the Commission is unlikely to publish – because the US won’t let it – is the negotiating text. Fortunately, we live in the age of whistleblowers and leakers, and one of them kindly supplied Wikileaks with a copy of the Financial Services Annex of TISA back in June…
-
The prison, which could have been built in the British territory of Diego Garcia, would have hosted up to 500 detainees, and like the Cuban prison, would have been allowed to operate outside the normal parameters of international law.
-
For years there have been rumours and reports of a CIA “black site” on Diego Garcia but two British officers who served on the island after the September 11 attacks have cast doubt on some of the more outlandish claims
-
As Democrats fight for information about the CIA’s secret kidnap and torture programme to be published in a landmark report, The Telegraph has learnt details of America’s requests to use British territory of Diego Garcia in network of secret prison sites
-
G4S, the UK government outsourcer that supports Israeli security functions in the West Bank, will now supply ‘custodial services’ to Guantánamo Bay Naval Base, writes Clare Sambrook. Shocked? You shouldn’t be. G4S is impervious to public criticism and defies international law with impunity.
-
The Senate’s report on torture by the Central Intelligence Agency is expected to shed further light on the complicity of health professionals in the systematic torture and ill treatment of detainees. Much of this information is already public and documented in reports by Physicians for Human Rights and others.
-
-
-
The state Treasury Department has released three tax liens posted against the U.S. Central Intelligence Agency for failing to pay almost $21,000 in withholding tax for its Michigan employees.
A Treasury spokesman said state law prohibits him from discussing details of the tax delinquency – or even confirming the CIA paid its debt.
-
Internet/Net Neutrality
-
It’s not just you. Many Internet providers have been having trouble as they run into long expected (but not adequately prepared for) routing table problems.
-
Verizon’s throttling. Usually companies deny it until they get caught, but Verizon has come right out and said it will throttle certain users. Oh sure, they said only unlimited bandwidth users only. They also cooperated with the NSA after umpteen promises of protection our privacy. Quite frankly, I don’t trust you.
-
Wal-Mart, the US company whose employees are so poor that they live off food stamps while the owners are among the richest in the country, is now offering a new phone plan for $12 that allows users to access only Facebook. They are being offered by Virgin and initially you’re offered 20 minutes and 20 texts, then for $5 each on top you can add Facebook, Twitter, Pinterest and Instagram.
This plan effectively takes away net neutrality for it’s users as they can only access white-listed services and if more carriers see this they may decide to implement something like this themselves.
-
DRM
-
California is one step away from requiring cellphones to come with “kill switches.”
The state Senate voted 27-8 on Monday to pass the newest version of a bill requiring cellphones sold within the state to allow users to make their phones inoperable if stolen, according to a report from CNET.
Permalink
Send this to a friend
Posted in Microsoft at 4:10 am by Dr. Roy Schestowitz
Shortly after the CIA got caught remotely taking screenshots of Senate desktops in the process of preparing a report on torture
Summary: Forced ‘upgrades’ of Skype give useds [sic.] of Skype more than they asked for
I have caught Skype in the most egregious example of spying I have seen from any software except stealthily delivered Trojans.
Last evening, I had a c2c conversation with a friend. After we disconnected, she texted me that she could see my computer desktop, and told me what I was doing on my computer.
I did not even realize that Skype had the capability to see my desktop – and the fact that it not only sees, but is shipping it over the Internet…
“The system is overall heavily secured, and while I knew there was a risk to Skype, I had no idea the danger was so great – and many people with whom I correspond use it, so I do too.”This goes beyond any reasonable limits into what can only be described as willfully criminal activity.
This was the new version 4.3 of Skype running on Mageia 4 64 bit. The system is overall heavily secured, and while I knew there was a risk to Skype, I had no idea the danger was so great – and many people with whom I correspond use it, so I do too.
I have uninstalled it. Until such time as I can convince those people with whom I must communicate to use another platform, I must use it. So I have deployed a virtual machine just for Skype. It can spy on that; the machine will be empty but for it.
I am, however, trying to get the word out. It may be that MSFT won’t care, but a good old fashioned shitstorm might be beneficial. █
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »