EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

08.12.15

Links 12/8/2015: Docker 1.8, Kali Linux 2.0

Posted in News Roundup at 3:01 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • HashPlex Exclusive Interview: Lightning Hub Open Source Release

    HashPlex is a company that specializes in hosting miner services, allowing home miners access to industry standard electricity rates in order to stay competitive. While their main focus is indeed the mining aspect of Bitcoin, the people over at HashPlex understand the importance of the Bitcoin network, which is especially seen by the debut of their new open source lightning hub. I talked to Bernard Rihn, CEO and founder, as well as Jasper Hugunin, their leading Lightning Dev, over at HashPlex regarding the Lightning Network and Hubs.

  • Pixar open sources Finding Nemo… (digital content software)
  • Pixar will open-source the code for a key movie-making tool
  • Web Browsers

  • SaaS/Big Data

    • Microservices 101: What To Know, What To Do

      One of the organizations working on platform infrastructures to support — create, test, deploy and manage — microservices architectures is the Cloud Foundry Foundation. Started in 2015, as an independent not-for-profit 501(c)6 Linux Foundation Collaborative Project, the Foundry currently consists of more than 185 incubating or active projects and is currently being used in hundreds of production environments, including many in the Global 2000. It’s in use at two of the top U.S. telco carriers, two of the world’s top three insurance companies — like AllState, Chase, JP Morgan, SwissCom and Verizon – and at least six Global 500 manufacturing companies, including GE.

  • Oracle/Java/LibreOffice

    • Oracle’s security chief posted a crazy ranting tirade. Then Oracle deleted it.
    • No, You Really Can’t

      Writing mysteries is a lot more fun than the other type of writing I’ve been doing. Recently, I have seen a large-ish uptick in customers reverse engineering our code to attempt to find security vulnerabilities in it. [Insert big sigh here.] This is why I’ve been writing a lot of letters to customers that start with “hi, howzit, aloha” but end with “please comply with your license agreement and stop reverse engineering our code, already.”

      [...]

      But you know, if Oracle’s strongly-worded letters are written in Davidson’s style, I think I’d quite enjoy the entertainment value.

    • No, You Really Can’t (Mary Ann Davidson Blog)
    • Oracle security chief to customers: Stop checking our code for vulnerabilities [Updated]

      Perhaps thinking that all the security researchers in the world were busy recovering from Black Hat and DEF CON and would be somehow more pliant to her earnest message, Mary Ann Davidson wrote a stern message to customers entitled “No, You Really Can’t” (here in Google’s Web cache; it’s also been reproduced on SecLists.org in the event that Oracle gets Google to remove the cached copy). Her message: stop scanning Oracle’s code for vulnerabilities or we will come after you. “I’ve been writing a lot of letters to customers that start with ‘hi, howzit, aloha’,” Davidson wrote, “but end with ‘please comply with your license agreement and stop reverse engineering our code, already.’”

    • Oracle pulls CSO’s BONKERS anti-bug bounty and infosec rant

      While other IT industry heavyweights have embraced bug bounties and working with security researchers more generally, Oracle has set its face in the opposite direction in a blog post likening reverse engineering to cheating on your spouse.

      Mary Ann Davidson, Oracle’s chief security officer (CSO), expressed corporate dislike from the software giant for both reverse engineers and bug bounties in a long blog post on Monday. The post was pulled on Tuesday lunchtime, but its contents remain available via the Internet Archive here.

    • Oracle to ‘sinner’ customers: Reverse engineering is a sin and we know best

      Opinion: Stop sending vulnerability reports already. Oracle’s chief security officer wants to go back to writing murder mysteries.

  • BSD

    • OpenSSH 7.0

      OpenSSH 7.0 has just been released. It will be available from the
      mirrors listed at http://www.openssh.com/ shortly.

      OpenSSH is a 100% complete SSH protocol 2.0 implementation and
      includes sftp client and server support. OpenSSH also includes
      transitional support for the legacy SSH 1.3 and 1.5 protocols
      that may be enabled at compile-time.

    • OpenSSH 7.0 Released
  • Public Services/Government

    • Freiburg hospital pilots open source research kit

      The University Hospital of the German city of Freiburg is using open source software for its ‘Cruciate Ligament Rupture Study’, aiming to involve users of smartphones and tablet PCs to share data that will help to improve treatments. The main application is built using ResearchKit, a toolbox for developing medical research software applications.

    • Adullact shares solution to access France’s e-ID services

      Adullact, the platform for French civil servants working on free software, in June unveiled i-CLEFS, a solution that builds on France’s e-ID to help municipalities offer eGovernment services.

    • German Interior Ministry seeks open source expertise

      Germany’s Minister of the Interior is looking for help with its partly Linux-based IT infrastructure. In July, the Bundesministerium des Innern (BMI) published a request for tender, seeking expertise in SUSE Linux Enterprise Server and prowess in the IT security monitoring using Nagios.

    • Sweden’s Halland region extends KOHA library system

      The Regionbibliotek Halland (Halland regional library) in the eponymous region in Sweden is developing features for KOHA, the open source library management system, to meet the needs of Sweden’s public libraries. Halland’s regional library switched to using KOHA earlier this year.

  • Openness/Sharing

    • Simple, Cheap Nitrate Tester is Open Source

      Too much of a good thing can be a bad thing, and nitrate pollution due to agricultural fertilizer runoff is a major problem for both lakes and coastal waters. Assessing nitrate levels commercially is an expensive process that uses proprietary instruments and toxic reagents such as cadmium. But [Joshua Pearce] has recently developed an open-source photometer for nitrate field measurement that uses an enzyme from spinach and costs a mere $65USD to build.

    • Open source curriculum at Idea Fab Labs

      Recently I’ve begun volunteering at Idea Fab Labs here in Santa Cruz, with two specific goals — expanding the space to include free/open source software ethos and hacking, and helping all these awesome makers with questions and reality around the open source way.

Leftovers

  • The Top Questions Facing Alphabet, the New Google Conglomerate
  • Why Google is restructuring, why the name Alphabet and how it affects you
  • Google to restructure into new holding company called Alphabet
  • Google and Alphabet: What does this all mean?
  • Google shares leap as investors welcome new era of transparency
  • Eileen Burbidge: Why I got fired by Skype
  • Science

  • Security

    • Researchers reveal electronic car lock hack after 2-year injunction by Volkswagen

      In 2012, researchers at Radboud University in the Netherlands discovered a security flaw in a common automotive security chip used in theft prevention by Volkswagen, Audi, Fiat, Honda, and Volvo vehicles. But after they disclosed their results to the auto manufacturers—a full nine months before they planned to publish them—the automakers sued to keep them quiet.

    • How texting a Corvette could stop it in its tracks

      As if recent research on car hacking wasn’t frightening enough, a new study shows yet another danger to increasingly networked vehicles.

      This time around, academics with the University of California analyzed small, third-party devices that are sometimes plugged into a car’s dashboard, known as telematic control units (TCUs).

      Insurance companies issue the devices to monitor driving metrics in order to meter polices. Other uses include fleet management, automatic crash reporting and tracking stolen vehicles.

    • BlackBerry can’t catch a break: Now it’s fending off Jeep hacking claims

      BlackBerry has denied rumors that its software might have played a role in the infamous “Jeep hack,” saying it’s “unequivocally” not true.

      In July, security researchers revealed that certain cars built by Fiat Chrysler were vulnerable to potentially life-threatening remote attacks, thanks to a flaw in the automaker’s uConnect in-vehicle infotainment system.

      The underlying operating system that powers uConnect is QNX Neutrino, a real-time OS that’s made by a BlackBerry subsidiary. On Friday, investment website Seeking Alpha published an editorial questioning whether some kind of flaw in QNX might be implicated in the Jeep hack.

    • Intel left a fascinating security flaw in its chips for 16 years – here’s how to exploit it

      A design flaw in Intel’s processors can be exploited to install malware beneath operating systems and antivirus – making it tough to detect and remove.

      “It’s a forgotten patch to a forgotten problem, but opens up an incredible vulnerability,” said Christopher Domas, a security researcher with the Battelle Memorial Institute, who revealed the hardware bug at the Black Hat conference in Vegas last week.

    • Security updates for Tuesday
    • Security advisories for Wednesday
    • Tokenless Keystone

      One time paswords (OTPs) in conjunction with Basic Auth or some other way to curry the data to the server provides an interesting alternative. In theory, the user could pass the OTP along at the start of the request, the Horizon server would be responsible for timestamping it, and the password could then be used for the duration. This seems impractical, as we are essentially generating a new bearer token. For all-in-one deployments they would work as well as Basic-Auth.

  • Defence/Police/Secrecy/Aggression

    • Four Demonstrably False Claims About The Iran Deal That Are Showing Up On The Opinion Pages

      Conservative opposition to the internationally-negotiated deal to limit Iran’s ability to obtain a nuclear weapon has been the subject of numerous editorials and op-eds in U.S. newspapers that have pushed false information about the agreement and warned that it compromises U.S. and Israeli security, despite widespread praise from nuclear arms control experts who say the deal is “excellent compared to where we are today.”

    • The U.S.-Russia “phony war”: How Washington warmongers could bring us from stalemate to catastrophe

      The Ukraine crisis and the attendant confrontation with Russia assume a “phony war” feel these days. As in the perversely calm months between the German invasion of Poland in September 1939 and the Blitzkrieg into the Low Countries the following spring, nothing much seems to be happening.

      No one took comfort then—a fog of anxiety suffused everything—and no one should now. One almost prefers it when Washington politicians and other temporarily important people are out there grandstanding and warmongering. At least part of what is occurring is visible, even as the whole never is. Now one sees almost nothing, and we get an idea of what the historians mean when they describe the queasiness abroad during the phony war period.

      A formidable file of political, diplomatic and military reports has accumulated by drips and drops of late, and it strongly suggests one of two things: Either we are on the near side of open conflict between two great powers, accidental or purposeful and probably but not necessarily on Ukrainian soil, or we are in for a re-rendering of the Cold War that will endure as long as the original.

      One cannot look forward to either, the former being dangerous and the latter dreary. But it has to be one or the other, barring the unlikely possibility that Washington is forced to accept a settlement that federalizes Ukraine, as Europe and Moscow assert is sensible.

      It is hard to say when this thought came to me, but it has to be since Secretary of State Kerry’s May meeting in Sochi with President Putin and Sergei Lavrov, his foreign minister. That session seemed to mark a dramatic turn toward sense at the time and won much applause, including here. But things have deteriorated ever since.

      [...]

      A few days ago came news that American soldiers are to begin training the Ukrainian army this autumn. Given the Pentagon has been training the Ukrainian national guard since April, it is not too much to say Americans have assumed de facto control of the Ukrainian defense apparatus. And no wonder, given the well-known problems of corruption and incompetence in Ukraine’s military and a lack of will among troops when ordered to shoot their own countrymen.

      This is the new micro picture. In the course of a few months, Pentagon and State have re-upped their effort to encourage the Poroshenko government to resolve its crisis with rebellious citizens in the east of Ukraine on the battlefield—foursquare in opposition to Franco-German efforts to fashion a negotiated settlement in concert with Moscow. Washington thus fights two fronts in the Ukraine crisis, a point not to be missed.

    • How Google Is Helping In The Fight Against ISIS

      These Google Earth exchanges began when Y.P.G. fighters sent their coordinates to the U.S. military so they could receive supplies, according to Callimachi’s account. That then evolved into airstrike coordination, which has allowed the group to force ISIS out of multiple Syrian locations including Kobani, Tal Abyad, and Hasaka.

    • Is Lockheed Martin too big to fail?

      Lockheed has made itself dominant on Capitol Hill – with defense jobs in virtually every state.

  • Transparency Reporting

    • Julian Assange: Sex assault claims may never be investigated due to Swedish statute of limitations

      Three of the four allegations of sexual assault against Wikileaks founder Julian Assange may never be investigated as the time limit required to do so will expire in seven days.

      Mr Assange, whose Wikileaks website published thousands of US military and diplomatic documents in 2010, has been living in the Ecuadorian embassy in London since 2012.

    • ‘Top Secret’ emails found as Clinton probe expands to key aides

      As pressure builds on Hillary Clinton to explain her official use of personal email while serving as secretary of state, she faced new complications Tuesday. It was disclosed her top aides are being drawn into a burgeoning federal inquiry and that two emails on her private account have been classified as “Top Secret.”

      The inspector general for the Intelligence Community notified senior members of Congress that two of four classified emails discovered on the server Clinton maintained at her New York home contained material deemed to be in one of the highest security classifications – more sensitive than previously known.

  • Environment/Energy/Wildlife

    • Op-ed: How Can Engineers Heed Pope Francis’ Challenge on Climate Change?

      The engineering deans of Catholic colleges and universities have been meeting annually for the past three years to discuss issues, challenges and trends unique to engineering education in Catholic institutions. As a group of STEM leaders across the country, we use our collective voice to publicly address matters that impact engineering education, or matters in which engineering education may have an impact. As such, our 22-member group feels called to respond to Pope Francis’ “Laudato Si’” encyclical on the environment and human ecology.

  • Finance

    • Google’s Alphabet restructure could get boost from Delaware tax loophole

      Google’s Street View cameras have photographed locations across the world, allowing armchair tourists a view of anything from the Tower of London to Tiananmen Square. But one address is notable by its absence. The office building at 2711 Centerville Road in Wilmington, Delaware, a small town just south of Philadelphia, has not been captured by the Street View cameras. And yet this is the official address of Google Inc, the holding company of one of the world’s most successful software groups.

    • Fox Hypes Cherry-Picked Data To Attack Seattle Minimum Wage

      Fox News is hyping a report from the conservative American Enterprise Institute (AEI) blaming a marginal decline in restaurant employment in the Seattle-Tacoma-Bellevue metropolitan area on Seattle’s recently-increased minimum wage. The think tank and right-wing media outlet both overstated the significance of a roughly 1 percent change in restaurant employment and focused on apparent job losses in one month while ignoring job gains the following month.

    • A $480 Million Mystery: The Saga of Mt. Gox

      It is now over a week since Mark Karpelès was arrested in Japan and one-time Mt. Gox quasi-interim CEO Ashley Barr-alias-Adam Turner held a searing reddit AMA session . The Mt. Gox debacle is taking on some nuance, and the revelations about Karpelès’ bizarre personality might make a halfway decent movie some day, a sort of Wolf of Shibuya with an infusion of 4chanian absurdity: anime, cats, lattes, craven flouting of fiduciary duties and the occasional samurai LARP (Live Action Role Play) .

  • Politics/PR/AstroTurf/Lobbying

  • Censorship

    • Google, Facebook and Twitter Protest Hollywood’s ‘SOPA Resurrection’

      A broad coalition of global tech firms including Google, Facebook, Twitter, Tumblr and Yahoo are protesting a broad injunction that would require search engines, ISPs and hosting companies to stop linking to or offering services to MovieTube. The preliminary injunction requested by the MPAA resurrects parts of the controversial SOPA bill, the tech giants warn.

  • Privacy

    • The Bot That Cried Wolf: Battery tracking poses no real privacy threat

      Am I suggesting that manufactured privacy issues are obscuring real ones? Absolutely. For proof, one needs look no further than last week’s battery brouhaha from a report that noted that websites can track people based on their batteries, skirting opt-in privacy rules that allow battery strength reports to be shared without site visitor permission. For those who bother to read the full report, its details do a wonderful job of establishing that if a site manager wants to invade someone’s privacy, that manager could do far better than peeking at energy levels.

    • The Many Things Wrong With the Anti-Encryption Op-Ed in the New York Times

      Manhattan District Attorney Cyrus Vance Jr. and his counterparts in Paris, London, and Madrid took to the New York Times op-ed page Tuesday morning to pose a flawed argument against default encryption of mobile phones, a service being commercialized and implemented gradually by Apple and Google.

      The op-ed misstated the extent of the obstacles to law enforcement, understating the many other ways officials bearing warrants can still collect the information they need or want—even when confronted with an encrypted, password protected device.

      The authors failed to acknowledge the value to normal people of protecting their private data from thieves, hackers and government dragnets.

    • Twitter Sees 52% Spike In Government And Copyright Info Requests

      The company released its latest transparency report, which now also includes trademark notices and email privacy practices.

  • Civil Rights

    • Armored Vehicle Request Documents Show Local Law Enforcement Still Looking To Bring The (Drug) War To Your Doorstep

      Molly Redden and Mother Jones have acquired a stash of armored vehicle request documents from police departments all over the nation. The requests are tied to the Department of Defense’s 1033 program, in which military hand-me-downs are given to basically any law enforcement agency that asks for them, whether or not these agencies actually need them.

    • Oath Keepers return to Ferguson, fueling racial tension

      Four white civilians carrying military-style rifles and sidearms walked a riot-torn street in Ferguson, Missouri, early Tuesday, saying they were there to protect a representative from an anti-government website, but their actions drew swift criticism from protesters in the mostly black neighborhood and from St. Louis County Police Chief Jon Belmar, who called their presence “unncessary and inflammatory.”

      The appearance of the four men drew stares in the neighborhood, which was rocked by violence again Sunday night as protesters marked the police killing of Michael Brown, an unarmed black teen whose death one year ago reignited a debate on race relations.

      The men identified themselves as members of Oath Keepers, which describes itself as an association of current and former U.S. soldiers and police who aim to protect the U.S. Constitution. The group reports having about 35,000 members nationwide and says there are African-Americans among its ranks.

    • Florida Cop Smashes Disabled Vet’s Cell Phone For Legally Parking in Handicap Space

      Florida man Isiah James served his country for 10 years. He survived two trips to Iraq and one to Afganistan.

      Riviera Beach cop G. Wilson took less than 10 minutes to decide that the Army veteran Isiah James didn’t deserve a handicapped sticker.

      Isiah’s $800 iPhone 6+ didn’t survive a trip to the Walgreens.

      James had family in town on vacation, and father doesn’t drive, so he took father to the store. On his way home, the two man stopped at a Walgreen’s liquor store.

    • US Says ‘No’ To EU Plan For New Corporate Sovereignty Courts: So What Happens Now With TAFTA/TTIP?

      Back in May, we wrote about the European Commission’s attempt to put lipstick on the corporate sovereignty pig. Its attempt to “reform” the investor-state dispute settlement (ISDS) system was largely driven by the massive rejection of the whole approach by respondents to the Commission’s consultation on the subject last year. Of the 150,000 people who took the trouble to respond, 145,000 said they did not want corporate sovereignty provisions of any kind. Even the European Commission could not spin that as a mandate for business as usual, and so it came up with what it called a “path for reform” (pdf). By promising to solve the all-too evident “problems” of corporate sovereignty by coming up with something it claimed was better, its evident plan was to include this re-branded ISDS as part of the TAFTA/TTIP negotiations with the US.

  • Intellectual Monopolies

    • Copyrights

      • Team Prenda Smacked Around Again, Ordered To Pay Another $94,000

        It appears that the courts are now just piling on when it comes to Prenda Law. In the case of Lightspeed v. Anthony Smith, the court that was one of the first to call out team Prenda for “flat-out lies” and then blasted their weak attempt to plead poverty — leading, instead, to holding Team Prenda in contempt — has struck again. Having lost badly on appeal, the district court slammed the lawyers again, arguing that Team Prenda lied to the court and obstructed the discovery process concerning where they hid their money. It ordered sanctions of $65,263 and asked Smith’s lawyers at Booth Sweet to submit their costs to be added on to the total. Those costs came out to $94,343.51 — and Prenda lawyers John Steele and Paul Duffy complained that the number was unfair.

08.11.15

Patents Roundup: EPO, Alicestorm, Facebook, ‘Trade’ Agreements, and Google Publicity Stunts

Posted in America, Europe, Google, Patents at 10:33 am by Dr. Roy Schestowitz

Protectionism regime has gone metaphysical

Victorian arcade
Victorian arcade in Manchester

Summary: Today’s roundup of patent news, focusing exclusively on software patents and patent scope, not the scapegoat which is patent trolls

THE patent landscape keeps changing (it’s dynamic just like every law, never static), and the more it’s subjected to public scrutiny, the more likely it is to serve the public’s interests, as opposed to corporate interests (the interests of the tiny minority which is extremely affluent). Today we break down our post into several sections as follows.

Patents Scope in the European Patent Office (EPO)

It has been quite some time since we last wrote about the EPO, but it turns out that the Board of Appeal which Battistelli and his goons try to silently crush (or at least make more subservient) is debating patent scope and doing the right thing sometimes. “The application was refused on appeal for lack of inventive step and lack of clarity,” says IP Kat.

Alicestorm Continues to Eliminate Software Patents

“Let’s hope that Alicestorm will discourage companies, or even patent trolls (JDate has begun acting like one), from blackmailing companies using software patents.”Alicestorm is a term coined to demonstrate just how profound an impact the case of Alice Corp. v. CLS Bank has had on patent scope. “US Pat 6,625,582, Converting future retirement,” wrote Patent Buddy, has just been “Killed by 101/Alice @ CAFC” [with analytics at the Patent Buddy Web site].

Chalk up another defeat for software patents (in CAFC even, despite its notorious patent maximalism).

We recently delved into the bullying (using patents) by the JDate 'meat market'. The company, as it turns out, pursues patents on software, despite lots of prior art and obvious triviality, and then uses these patents to bully competitors, even though a court (after a very expensive legal process) would likely invalidate such patents. It’s like SLAPP-type abuse by JDate. As this very long new article puts it, there is nothing novel here. “Does it change anything if it’s on a computer or the Internet?”

Addressing this question, the author says: “This is the question that has been vexing patent types for some time, but patent experts feel that the Supreme Court finally answered the question last year with the unanimous Supreme Court Decision of Alice Corp. v. CLS Bank Int’l.

“In that case, CLS Bank had software to serve as an intermediary in financial transactions, holding funds in escrow, work that financial intermediaries have been doing as long as humans have traded with money. The Alice Corporation didn’t do any work of that kind and had never created any actual software, but it had a patent describing how it could work using a computer.

“In his opinion on behalf the court, Justice Clarence Thomas wrote, “The relevant question is whether the claims here do more than simply instruct the practitioner to implement the abstract idea of intermediated settlement on a generic computer. They do not.””

Let’s hope that Alicestorm will discourage companies, or even patent trolls (JDate has begun acting like one), from blackmailing companies using software patents.

Facebook’s Surveillance Software Patents

“Facebook Patents Technology That Could Allow Banks And Businesses to Discriminate Based on Social Connections,” according to this article from AOL. A lot of the fury is directed at Facebook’s privacy violations (as if that’s news), but what about the company’s efforts to patent software — patents which the company sometimes bullies with?

What we find scandalous here is that Facebook patents software, but AOL looks at it from another angle. To quote: “Facebook, the website everyone and their sister, brother, cousin, uncle, and friends you didn’t even know you had is a member of just secured a patent on Tuesday that could help filter spam and offensive content and improve searches. Isn’t that great? Less spam and no more nude pics, Obama monkey memes, and tea-billy racist outbursts, but there’s more. A lot more and it’s not good. The technology could also allow lenders to use a borrower’s social network to determine whether he or she is a good credit risk. Let that sink in.

“Got that? Your Facebook friends and their spending habits, credit rating, behavior – hell, maybe even their character, could determine whether or not you get a loan and presumably how much interest is going to be applied to that loan.

Credit where due: “The patent was uncovered by Mikhail Avady, founder of SmartUp, a legal technology company in Atlanta. Fortune, CNN, TNW News, and VB all say they reached out to Facebook for comment, but none have heard back, according to the articles.”

In case it’s not obvious, we discourage the use of Facebook for anything at all. Facebook servers need to be blocked at operating system/router level, permanently. Facebook is an attack on the Web and nobody truly needs Facebook. It’s Facebook that needs people, not the other way around.

‘Trade’ Agreements for Patent Loopholes

We recently wrote about how so-called 'trade' agreements were exploited by software patents proponents in New Zealand. Now we learn that patent ‘reform’ in the US (not really the required reform) is closely connected to other issues such as the so-called ‘trade’ agreements, notably TPP. To quote the Washington Examiner: “The House of Representatives has delayed voting on the Innovation Act, a bill designed to curb patent trolling, until after the August recess. But patent abuse still finds itself part of the legislative discussion, in this case with the Trans-Pacific Partnership (TPP).”

“Only in secret, when few of each country’s richest people collude, can such deals be tolerated.”To quote the key part: “The concern centers on sovereign patent funds (SPFs), government-funded organizations that acquire and leverage patents in pursuit of national economic objectives. Ideally, they should act as one-stop clearinghouses where a person or entity can acquire a bundle of interrelated patent licenses instead of negotiating with every individual patent holder. Given that the average smartphone incorporates as many as 250,000 patents, patent pools provide a function in streamlining access to IP rights.”

Patents are a tool of protectionism, perpetuating injustice and social/financial disparity. Why would any country other than patent glorifiers sign these unacceptable ‘trade’ agreements? Only in secret, when few of each country’s richest people collude, can such deals be tolerated. These people are all traitors to their country, especially to their people.

Google’s ‘Good’ Software Patents

Here we go again. The IEEE, steward of leading international journals that I used to do peer reviews for back in my twenties, is doing some shameless Google PR. The “our [software] patents are good patents” nonsense received coverage from Spectrum. It’s that same tactic that IBM once used as part of its PR strategy, portraying itself as a big friend of GNU/Linux. It is still out there. After setting up OIN (headed by an IBM lawyer) we learned that it was an entity so useless against patent trolls that one may wonder whose interests it really serves. Google is now trying to do the same thing. Google keeps saying it will “help startups” (similar to “think about the children!”) by freeing up its patents, even though (as some sites have pointed out by now, even in the corporate media) this helps in no way against patent trolls, since they basically have no actual products to sue over.

Now that a Google-backed company is finding itself as a victim of patent trolls (new article from corporate media), where is Google to help? Where it Alphabet? Nothing.

“We quickly attracted attention,” said the company. “We were living the American Dream. Until a patent troll — a company whose only business is suing legitimate businesses to force expensive settlements — hit us with a frivolous lawsuit.”

So where is Google with its ‘good’ patents that are intended to help startups? Oh, that’s right, there’s no solution there for patent trolls. This alone (situations such as this) helps justify a patent reform — like those delayed until Congress returns to normal sessions after the summer’s vacation.

Spyware-Centric Microsoft Hopes to Corner or Round up GNU/Linux Users for More Surveillance, Domination Over Use

Posted in GNU/Linux, Microsoft, Vista 10, Windows at 9:21 am by Dr. Roy Schestowitz

“These procedures allegedly included helping the NSA to bypass encryption on the Outlook.com email client; providing the FBI and the NSA with easier access to SkyDrive, Microsoft’s cloud storage service, and helping the NSA to boost their capability threefold to intercept video calls made via Skype.”

Source: Edward Snowden claims Microsoft collaborated with NSA and FBI to allow access to user data

Summary: Microsoft’s unprecedented assault on privacy now targets rivals of Microsoft, not just people used by Microsoft

THERE is something worth noting amid all that Microsoft-manufactured hype about its NSA-centric spyware. There is this ‘article’ which looks like a Microsoft advertisement from UBM, encouraging GNU/Linux users to choose Microsoft as their host. How inane. As we pointed out yesterday, Microsoft wants to expand surveillance beyond Vista 10 (even to predecessors) and do the same to GNU/Linux by becoming a host of GNU/Linux instances. And let’s not put aside all the spyware Microsoft tries to put in Android (even if by patent extortion and/or entryism). It is definitely something to avoid by all means. Windows, in this age of many devices (‘smart’ phones, tablets, boards and “IoT” hype), is gradually slipping away to minority market share. Linux is becoming the dominant platform (kernel at least), not Windows. Looking at tuxmachines.org statistics, in the first week after Vista 10′s release Vista 10 share was at 0.0471%. A week later: 0.092%. Based on the past 2 days’ tuxmachines.org statistics, Vista 10 might finally break a barrier and reach 0.1% by week’s end! That’s hardly a success story, especially considering the lowered cost of Windows (Microsoft does this due to pressure from GNU/Linux).

“What we wrote a year ago about Vista 10 becoming a monstrous surveillance machine (despite Snowden’s revelations) turned out to be correct.”Microsoft gives ‘free’ spyware (Vista 10) to Raspberry Pi 2, after Raspberry Pi was targeted by Microsoft along with other such projects that typically choose GNU/Linux and BSD. Microsoft already eavesdrops (audio/video) on many GNU/Linux users through Skype, but it wants more. The abusive monopoly is hungry for personal, sensitive details. In this age of rising snitchocracy, intercepted secrets are an asset. Ask GCHQ why it intercepted videos (which is still retains) of millions of people, including over 100,000 people masturbating in front of their webcam (codename “Optic Nerve”).

Judging by this new post titled “Windows 10 phones home when you search your start menu, even with Bing disabled”, Vista 10 is malicious spyware even if you disable everything that is associated with spying. What we wrote a year ago about Vista 10 becoming a monstrous surveillance machine (despite Snowden’s revelations) turned out to be correct. Many businesses, as it increasingly becomes more evident (and provable), would blatantly violate agreements with customers if they stay with Microsoft.

Links 11/8/2015: Linux 4.2 RC 6, 4.1.5, 3.14.50, and 3.10.86

Posted in News Roundup at 8:15 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Pixar’s Universal Screen Description software is going open source

    Pixar Animation Studios has announced that its proprietary Universal Screen Description (USD) software will be going open source by Summer 2016, providing computer animation studios with an incredibly powerful tool to manage scenes in large scale projects.

  • Pixar’s Universal Scene Description Going Open Source
  • Facebook Releases Reference App for Marketing API
  • Facebook to Open Source Reference App For Marketing API
  • Pixar Announces Universal Scene Description to be Open-Sourced
  • Pixar to open-source its Universal Scene Description software
  • How To Improve Bus Factor In Your Open Source Project

    In my experience (I was an open source community manager for several years and am deeply embedded in the community of people who do open source outreach), getting people into the funnel for your project as first-time contributors is a reasonably well-solved problem, i.e., we know what works. Showing up at OpenHatch events, making sure the bugs in the bug tracker are well-specified, setting up a “good for first-timers” task tag and/or webpage and keeping it updated, personally inviting people who have reported bugs to help you solve them, etc. If you can invest several months of one-on-one or two-on-one mentorship time, participate in Google Summer of Code and/or Outreachy internship programs. If you want to start with something that’s quantitative and gamified, consider using Google Code-In as a scaffold to help you develop the rest of these practices.

  • Web Browsers

    • Mozilla

      • Firefox 40 released, here’s what you’ll find

        It has been six weeks since the release of Firefox 39 and today Firefox 40 was pushed to the FTP servers and will roll out to users on August 11. Below is a compiled list of everything new you can expect to see in the release.

      • Mozilla Plugs Dangerous Firefox Zero-Day Hole

        Mozilla on Friday released security updates to fix a zero-day flaw in the Firefox browser. An exploit that searches for sensitive files and uploads them to a server — possibly somewhere in Ukraine — has surfaced in an ad on a Russian news site, Mozilla reported last week. The exploit impacts Windows and Linux users. Mac users could be hit by a modified version. The vulnerability stems from the interaction of Firefox’s PDF Viewer and the mechanism that enforces JavaScript context separation — the “same origin” policy, Mozilla said.

  • SaaS/Big Data

  • Databases

    • Debunking Open-Source Database Myths

      Still, the IT industry harbors misconceptions about how open-source software works, its performance, its benefits and its ROI. eWEEK, with input from open-source PostgreSQL database specialist EnterpriseDB, helps debunk some of the most common open-source database myths, including those about its costs and capabilities.

  • Oracle/Java/LibreOffice

    • What It Took Porting LibreOffice To GTK3 & Wayland

      For the past several months Caolán McNamara has been leading the charge for adding GTK3 tool-kit support to LibreOffice. With the new LibreOffice 5.0 that initial GTK3 support is in place that also brings initial Wayland support for this open-source office suite.

  • Business

  • FSF/FSFE/GNU/SFLC

  • Project Releases

    • Kodi 15.1 Isengard – Release Candidate

      Once a ‘final’ version is released some new bugs and/or problems usually appear out of nowhere, and last release was no exception. Even though tens of thousands of users were already testing the 15.0 version before release, as soon as million started using it, some problems we either did not think of or which we did not notice popped up. To counter some of these new issues, we’re bringing you this maintenance release candidate called 15.1 RC1 which has some additional fixes on top of the 15.0 release.

    • Kodi 15.1 Release Candidate Is Now Available
  • Public Services/Government

    • Nantes: “Change management key to switch to free software”

      Change management is the key to successfully replacing proprietary software by free and open source alternatives, says Eric Ficheux, IT project manager working for the administration of Nantes. In 2013, France’s sixth largest city began switching to LibreOffice, replacing a proprietary suite of office productivity tools. “Any organisation considering a similar switch should brush up on change management.”

    • Of Course, LibreOffice Is Easy To Deploy And Use. It’s FLOSS. It’s An Office Suite.

      Yes. Replacing a non-Free office suite with LibreOffice makes sense. It’s FLOSS. You can run, examine, modify and distribute the software under the accompanying licence. There’s no need to budget for licensing. There’s no contract. There’s no dependency on someone out to get you. LibreOffice is a cooperative product of the world, not enslavement/lock-in/a burden indefinitely. It’s easy too. After all, LibreOffice is descended from StarOffice and OpenOffice.org designed from the beginning to be easy to use even for those familiar with M$’s product.

  • Openness/Sharing

    • Projects Emphasize Open-Source Technology and Data for Agriculture

      Around the world, young people are turning to farming and the food sector as viable career options. However, the next generation of food system leaders often lacks access to the latest data and technologies that are vital to the success of farm businesses. Projects such as Open Ag Toolkit (OpenATK), a new platform for managing agricultural tasks, and FarmBot, an open-source community for small-scale precision farming, are working to democratize innovations in agriculture by improving data transfer and small-scale technologies through open-source models.

    • Amyris teams with Genome Compiler for open source testing program
    • Open Hardware

      • Watch those VOCs! Open Source Air Quality Monitor

        Capable of monitoring Volatile Organic Compounds (VOCs), basic particulate matter, carbon dioxide, temperature and humidity, it takes care of the basic metrics to measure the air quality of a room.

  • Programming

    • the future is here

      That’s right, boys and girls, a compiler with a bigger resident size than Firefox. Three times bigger.

Leftovers

  • Science

    • We need YOU to help close the IT gender gap

      According to the U.S. Department of Labor, only 26% of people employed in computer and mathematical occupations are women. While that figure may be staggering, I don’t believe the way to fix it is by simply hiring more women. A meritocracy requires that the most qualified candidates are selected for positions in every industry, regardless of gender. But we can level the IT industry’s playing field by educating young women and girls about potential career possibilities.

  • Health/Nutrition

    • Why TPP Threatens To Undermine One Of The Fundamental Principles Of Science

      Last week, we wrote that among the final obstacles to completing the TPP agreement was the issue of enhanced protection for drugs. More specifically, the fight is over an important new class of medicines called “biologics,” which are produced from living organisms, and tend to be more complex and expensive to devise. The Conversation has a good feature looking at this issue in more detail.

      [...]

      As that makes clear, data exclusivity is a kind of super-patent in that it can’t be challenged or revoked: if a drug company has run clinical trials to establish the safety of its new drug, it has an absolute and irrevocable monopoly on the use of that data — for five years in the case of Australia, Chile, Singapore and New Zealand. This is obviously an incredibly powerful form of monopoly, so perhaps it’s no surprise that US pharmaceutical companies want TPP to require signatories to grant an even longer period — 12 years of data exclusivity — for biologics.

      That’s useful for them, because even after drug patents have expired, and generic manufacturers can theoretically offer the same products without paying licensing fees, there remains the barrier of clinical testing. If the generic manufacturers can’t point to the original clinical trials as proof that the drug is safe, they will need to carry out their own, which will take time and cost money. In practice, they are more likely to wait until the period of data exclusivity is over, effectively extending the original manufacturer’s monopoly beyond that provided by patents alone.

  • Security

  • Defence/Police/Secrecy/Aggression

  • Transparency Reporting

    • Swedish plan to question Assange at Ecuador embassy in UK stalled

      Swedish prosecutors’ plan to question WikiLeaks founder Julian Assange at Ecuador’s embassy in London has stalled as Ecuador has demanded Sweden give him asylum as a condition of the meeting, a Swedish official said on Friday.

      “You can’t give anyone asylum at another country’s embassy, that’s against international law,” Cecilia Riddselius at the Justice Department said. “If he wants asylum he has to come to Sweden.”

    • Call to share private sector partnerships on open governance

      The Private Sector Council was established in 2013 to engage businesses and entrepreneurs in promoting open governance, economic growth, and local innovations. The Council forms a group external to the OGP and coordinates private sector participation in OGP.

  • Finance

  • PR/AstroTurf/Lobbying

  • Privacy

    • NIC refuses to reveal identity of those who altered Jawaharlal Nehru Wikipedia page

      The National Informatics Centre, software solution provider of the government, has withheld information on who altered the Wikipedia page of former Prime Minister Jawaharlal Nehru and posted scandalous information about him on the grounds it may have “security implications”.

    • Councils have lost or misused private data thousands of times, says watchdog

      Call for greater penalties as examples include child protection files left on train, worker using CCTV to watch a wedding and another digging into benefit claims

    • What Happens When a Failed Writer Becomes a Loyal Spy?

      He was fully aware of his statement’s implications.

      “I found myself wishing that my life would be constantly and completely monitored,” he continued. “It might seem odd that a self-professed libertarian would wish an Orwellian dystopia on himself, but here was my rationale: If people knew a few things about me, I might seem suspicious. But if people knew everything about me, they’d see they had nothing to fear. This is the attitude I have brought to SIGINT work since then.”

      When intelligence officials justify surveillance, they tend to use the stilted language of national security, and we typically hear only from senior officials who stick to their platitudes. It is rare for mid-level experts — the ones conducting the actual surveillance — to frankly explain what they do and why. And in this case, the candid confessions come from the NSA’s own surveillance philosopher. The columns answer a sociological curiosity: How does working at an intelligence agency turn a privacy hawk into a prophet of eavesdropping?

  • Civil Rights

    • Cops filmed behaving badly say pot shop’s camera illegally recorded raid

      Did you hear the one about the cops not wanting to use a store’s surveillance tape to help solve a crime?

      Who could blame these Santa Ana cops? Video shows them smashing surveillance cameras, badmouthing a woman in a wheelchair, and perhaps even munching on marijuana-infused products after they stormed a medical marijuana shop in Southern California, which was being investigated for allegedly operating unlawfully in the city.

      Three of the unidentified cops are demanding that a judge block the police department from using the tapes against them as the department investigates the officers’ conduct during the May raid. The cops at the center of the investigation say the Sky High Medical Marijuana Dispensary illegally recorded them because the officers believed they had disabled all the store’s cameras and therefore had an expectation of privacy “that their conversations were no longer being recorded,” according to the cops’ Aug. 5 lawsuit. (PDF) The suit says the tapes were also “edited” and cannot be relied upon.

    • Zachary Hammond death: Shooting of unarmed white teenager by police officer sparks debate over ‘lack of outrage’ in America

      The death of an unarmed white teenager who was shot by a white police officer in South Carolina has sparked a debate as to why the incident has not generated the same outrage as the deaths of other unarmed black Americans.

      Zachary Hammond, 19, was on a date with Tori Morton, 23, when he was shot twice in the back by a police officer last month.

    • Documents Reveal the Fearmongering Local Cops Use to Score Military Gear From the Pentagon

      Mother Jones obtained more than 450 police department requests for armored tactical vehicles from the Pentagon. Did your police force request one? Browse all of them here.

      One year ago this week, hundreds of camouflaged officers in Ferguson, Missouri bore down on residents protesting the police shooting of an unarmed black teenager named Michael Brown.

    • U. alumnus removed from director position at American Psychological Association following US government torture scandal

      A University alumnus was removed from his position as ethics director of the American Psychological Association last month after an independent review alleged that he collaborated with the Department of Defense to enable torture.

    • Germany drops treason inquiry into Netzpolitik journalists

      German prosecutors have dropped a much-criticised treason investigation into two journalists who reported on secret plans to expand online surveillance in the country.

      Prosecutors notified Netzpolitik.org in July that its founder, Markus Beckedahl, and fellow journalist Andre Meister were under investigation, triggering widespread criticism from free-speech advocates. The website specialises in coverage of online privacy and digital culture.

    • U.S. ‘supermax’ prison: ‘Alcatraz of the Rockies’ is seen as ‘inhuman and degrading’

      U.S. prosecutors want Ali Charaf Damache in the worst way.

      An Irish resident originally from Algiers, Damache, 50, is accused of using online chat rooms to recruit American women into a would-be terrorist cell operating in this country and Europe.

      One man and two women, including Damache’s wife, have already been convicted in U.S. courts of providing material support to terrorists. And Damache was captured by Irish authorities in 2010 in Dublin on a separate charge of making a telephone death threat and held without bail.

    • Issue of where to move Guantanamo detainees threatens closure plan

      A renewed push by the White House to close the prison at Guantanamo Bay, Cuba, has been bogged down by an internal disagreement over its most controversial provision — where to house detainees who will be brought to the United States for trial or indefinite detention, according to U.S. officials.

    • Pentagon to release Gitmo closure plan after August recess

      The Defense Department expects to present a plan to close Guantanamo Bay to lawmakers after the August recess, a spokesman said on Monday.

    • Pentagon under fire for guidelines that liken war reporters to ‘belligerents’

      Defenders of press freedom have accused the Pentagon of endangering journalists with new legal guidelines that liken war correspondents to spies and say they can be treated as “unprivileged belligerents” in some circumstances.

  • Internet/Net Neutrality

    • How You Buy Cellphones Is About to Change Forever

      This misconception owes to mobile carriers’ longstanding practice of offering discounts on phones for customers who agree to a two-year contract. For years, the deal was generally this: You go to a company like Verizon or AT&T, you sign some paperwork locking yourself into 24 months of wireless service, and Verizon or AT&T gives you a shiny new phone at a subsidized price—or even free, if you opt for less than the very best hardware.

    • Netscape changed the internet—and the world—when it went public 20 years ago

      Rosanne Siino finds it amusing when students interrupt one of her lectures at Stanford University to ask: “So, what is Netscape?”

      “Wow, how long has it been?” Siino, one of the first hires at Netscape, recalls telling a student. “Boy, you have no idea how much the world changed just before you were born.”

      It was 20 years ago today that Netscape went public, setting off what we now know as the first dot-com boom.

    • The ‘Netscape Moment,’ 20 years on

      We’re in the runup to the 20th anniversary of the “Netscape Moment” of 1995, the day when a California startup’s eye-popping market debut illuminated the World Wide Web for millions of people otherwise only vaguely familiar with its potential and promise.

  • Intellectual Monopolies

    • Copyrights

      • Prince Warns Young Artists: Record Contracts Are ‘Slavery’

        “Jay Z spent $100 million of his own money to build his own service. We have to show support for artists who are trying to own things for themselves,” singer says of joining Tidal

        Two days after Prince announced that he would release his new album HitNRun exclusively to Tidal, the singer revealed the reason he is sidestepping a record label and offering the LP directly through Jay Z’s streaming service. “Record contracts are just like — I’m gonna say the word – slavery,” Prince said. “I would tell any young artist… don’t sign.”

      • MPAA Recruits Software Programmer to Combat Piracy

        In its ongoing war against online piracy, the MPAA is currently hoping to recruit a software developer. The Hollywood group is looking for savvy candidates who can help develop data gathering tools for enforcement purposes and to monitor, investigate and report on copyright infringement.

      • Pornhub Uploaders Targeted By Copyright Troll

        Several users of popular porn streaming site Pornhub have received settlement demands for thousands of dollars after uploading videos to the site without obtaining permission. How the users are being tracked down by the copyright troll involved remains somewhat of a mystery, but several theories persist.

      • Tolkien Lawyers Target “Hobbit House” With Copyright Threats

        Hollywood studio Warner Bros. and the Tolkien Estate are cracking down on a British couple building a “Hobbit house” campsite. The pair are being forced to change the project’s name and remove all Hobbit references from their Kickstarter campaign. According to Tolkien’s lawyers even words that rhyme with Hobbit are not permitted.

08.10.15

Microsoft is Turning All of Windows (Not Just Vista 10) Into Malware, Turning Networks Into Botnets, Harvesting Sensitive Data Everywhere

Posted in GNU/Linux, Microsoft, Vista 10, Windows at 3:35 pm by Dr. Roy Schestowitz

Officially becoming a malware company, expanding beyond patent racketeering and political blackmail

A grave
The Microsoft apologists insist that privacy is dead, giving Microsoft the carte blanche

Summary: The villainous side of Microsoft comes out more bluntly, as any regard for privacy is dismissed as irrelevant, private networks are becoming Microsoft’s playground, Windows silently but remotely gains more malicious antifeatures (with the hallmark of espionage), and the same rogue operations are extended to Android and GNU/Linux (if Microsoft can gain a foothold there)

THE TERM “Vista 10″ has been catching on (many people use it now) and the wiki page for Vista 10 has had nearly 3,000 page views since Vista 10 was released (that’s when the page was first set up). Since then we have seen GNU/Linux-centric authors writing about Vista 10 (there are two examples today [1, 2]), but we don’t see what the big deal is. Here in Techrights, having accumulated data over the past 8 days, only 0.7% of visitors used Vista 10 (we checked the back end, which strictly retains logs for no longer than 4 weeks) and some other Web-wide surveys put it at around 3%, contradicting popular lies about adoption rates of this seemingly gratis ‘upgrade’. Vista 10 is a huge disappointment for Microsoft, but the company will never publicly admit it (we know what people from the inside, i.e. Microsoft employees, think because we confidentially hear from some). There is a massive budget dedicated to manufacturing bogus (sometimes pre-prepared or ghostwritten by agencies) ‘reviews’ and praises of Vista 10. It’s peaking right now, so it may take some time for the ‘hangover’ (real users’ feedback) to truly show up and dominate the Web. It was the same when Vista 8 was released, never to be widely adopted at all, just loathed (the boss got fired, too).

“There is a massive budget dedicated to manufacturing bogus (sometimes pre-prepared or ghostwritten by agencies) ‘reviews’ and praises of Vista 10.”Today’s article is not a rant about Vista 10 but a survey of recent revelations and key articles, as opposed to puff pieces (there are plenty of those because the release is relatively recent, meaning that the marketing budget has not been exhausted just yet). As we are going to show, Microsoft is seemingly coordinating a response to criticism, almost as if it sends talking points or memos to ‘buddies’ in order to confuse the public and berate critics.

Microsoft Abuse

Several authors (Linux-centric people on the Web) told me that they get abused for criticising Vista 10 and I too received many personal insults, none of which address anything that I wrote but instead are an attack on character. These come from people whom I never heard from or heard about. Remember that Microsoft recently got caught paying for abusive AstroTurfing of this kind (planting comments). Showing the ‘smoking guns’ is hard unless whistleblowers come out (as some recently did, acknowledging that Microsoft pays them to game Reddit).

Microsoft Crowd Says Privacy is Dead

We kindly ask readers to inform us if they see the following rather terrible ‘damage control’ from Microsoft. Here is Microsoft’s response to allegations over privacy violations. It goes along the lines of, “if they ask, we give. Erk. In the post-Snowden era, that’s going to put a few noses out of joint.”

Microsoft has done absolutely nothing to deny that it seriously violates privacy. That is far too well documented to deny. What we have found, however, is diversion tactics. Here is a Microsoft/MSN-connected site (also “Microsoft apologists,” according to iophk) responding with shameless spin, claiming “The inevitable death of privacy” (Microsoft apologists and employees use the same kind of excuse habitually).

Microsoft Peter reads from the same memo, apparently, as his best defence was his ludicrous headline “Windows 10’s privacy policy is the new normal”. Well, maybe if you pretend that BSD and GNU/Linux don’t exist!

“We have strong reasons to suspect there’s behind-the-scenes coordination here.”Notice the pattern and spot the party line. Microsoft is basically heralding the death of privacy as if this alone will make its own attacks on privacy any more acceptable. We ask readers to post a comment if they see more of this and share information about where it comes from. We have strong reasons to suspect there’s behind-the-scenes coordination here. We saw that back in the Vista days.

Security Not Guarded, Only Mocked, Stampeded

The other day The Register asked: “Are you a Windows 10 converts responsible for young computer users? Be on your guard. Child-friendly Family Features from Windows 7 and 8 won’t be recognised or accepted in the new operating system.”

It’s hardly a surprise. Based on feedback we see on the Web, many people complain about anything-but-smooth an ‘upgrade’ process.

As we pointed out the other day, installing Vista 10 turns one's PC into part of a botnet (Windows Update, which cannot be blocked). The Microsoft-operated botnet is clearly out of control, or out of the scope of what’s legal (not that Microsoft believes laws can be enforced against it, ever). It’s also a massive security breach. “Windows 10 commandeers users’ upload bandwidth,” said the headline of this IDG article, composed by a Microsoft critic. “Windows 10 is FORCING ITSELF onto domain happy Windows 7 PCs,” said this article from The Register. Is this even legal? “Windows 7 PCs are being force fed a diet of Windows 10, breaking a promise made by Microsoft,” says the author. “The problem is affecting domain-attached Windows 7 PCs not signed up to Windows Server Update Services (WSUS) for patches and updates, but looking for a Microsoft update instead.

“Based on feedback we see on the Web, many people complain about anything-but-smooth an ‘upgrade’ process.”“The upshot is PCs, ranging from 10s to hundreds at a time, simultaneously chowing down on the 3GB-plus Windows 10 load, killing business networks.

“The problem began showing up on Monday with complaints beginning to notch up online.”

Vista 7 and 8 Silently Turned (Modified) Into Malware

“And now they are adding the tracking and telemetry to Win 7 and 8 in updates,” pointed out one person to me last week, “for those who don’t upgrade https://support.microsoft.com/en-us/kb/3068708” (can this be legally tolerated?)

Clearly enough, whatever Microsoft has made of Vista 10 (and now predecessors too!) is violating privacy or data protection policies in many firms, such as law firms. They need to wipe this malware off their networks to avoid being sued for confidential document leaks. Their keystrokes, for instance, mustn’t be divulged.

“Windows has technically become malware.”“Indeed Microsoft has realized that its income is going downwards,” said one person to me. “And more important, as many other companies, they now know that the data of their “clients” is more valuable than the services and software they provide. So the tendency is clear: they are offering zero price products and services because they don’t want people thinking about expending some $ or €. They just want data, and more data and more data…”

Windows has technically become malware. It already was, but it’s getting worse. It is hard to deny that it is now malicious software, operating well outside the control (and consent) of the user. If people click “OK” to express consent to the new policy, however, their chances of a day in court greatly diminish.

One site has just explained “Why You Must Dump Microsoft NOW”. “As of August 1, 2015,” it says, “Microsoft announced a new privacy policy and a new services agreement. In the words of one network professional, “Basically, they redefined their operating system to be spyware.””

The site recommends GNU/Linux instead, stating: “The version of Linux I like best is Linux Mint. With it, you can run OpenOffice (also called LibreOffice), which does everything essential that MS Office does. Then get Firefox for a browser and Thunderbird for email, and you’re in business.”

“Microsoft does not find it sufficient to spy on Windows users but also tries to do the same in Android and in GNU/Linux (well over a billion users).”Brad of “Goodbye Microsoft” remarked on this article by saying: “In the thirteen-plus years that I’ve been using Linux, I have never signed a user agreement to do so. Nor have I checked “accept” to terms on a web page, nor opened a shrinkwrap package with a you-accept-this license inside. In fact, I couldn’t legally use Linux at all but for the fact that the authors have accepted an agreement, the GNU Public License (GPL), which says that I’m free to use their work.* (With each passing year I become more amazed at the brilliance and the foresight of the creators of the GPL.)”

It’s a Data Harvesting Venture

Microsoft does not find it sufficient to spy on Windows users but also tries to do the same in Android and in GNU/Linux (well over a billion users). Microsoft wants to spy on GNU/Linux servers too (with confidential data of customers or staff) because Scott Hanselman, whom we mentioned here for Microsoft spin (like the 'new' Microsoft uses Microsoft’s channel and “talks to Khalid Mouss about how you can monitor your Linux machines within an Azure infrastructure.” We have already explained why this is extremely dangerous.

To illustrate just how dangerous it is to let Microsoft operate servers, consider the latest excuses for Office 360 spyware at the heart of British politics (where Microsoft blackmails MPs [1, 2]). Bogus excuses are now being given, after Microsoft failed for several days to deliver mail to MPs (the article downplays this duration by a factor of 6). The Register acts as Microsoft’s courier by blindly saying (without any proof) that it’s a case of “Microsoft failing to inform itself about a technical change” (as if changing something in a mail server should take it down for several days, without expectations as such).

“When it comes to privacy, Microsoft is demonstrably far worse than Google.”“The outage occurred on 23 June,” The Register says, “and resulted in a total of 13 hours of downtime, the Parliamentary Digital Service said in response to a Freedom of Information request.”

According to reports in the British media (not much of it covered this blunder — something that people openly complain about in social media), this outage lasted days, not 13 hours. Why is The Register relaying Microsoft’s propaganda and ‘damage control’ without even a challenge?

Either way, does Vista 10 not provide enough evidence that nobody should relay mail through Microsoft (snooping of mail by Microsoft for business reasons has been done before) and definitely mustn’t host a servers (including GNU/Linux) inside Microsoft datacentres? When it comes to privacy, Microsoft is demonstrably far worse than Google.

Finjan, Cisco, JDate and Other Companies Acting Like Patent Trolls; New Threats to Linux

Posted in Apple, Courtroom, EFF, GNU/Linux, Google, Microsoft, Novell, OIN, Oracle, Patents at 7:12 am by Dr. Roy Schestowitz

Patents not on engineering (or physical products) anymore

Wheel in Manchester

Summary: News about patents from all across the Web, placing special emphasis on software patents and how these affect Free software projects, including Linux and Android

THIS week’s patents roundup revolves around practicing companies that act in a way which is almost indistinguishable from patent trolls. As we have said here for several years, the term “patent trolls” can be misleading because many large companies act in the same way but don’t get labeled “trolls”, mostly because of their size. It means that a fight against “patent trolls” often turns out to be a fight over scale, waged by large corporations against smaller ones. Check again who is behind the PATENT Act [1, 2, 3, 4, 5, 6, 7, 8].

Today’s post brings together several stories and themes/strands in order to keep readers abreast of the latest developments.

Open Invention Network

We have spent over 8 years writing about the Open Invention Network (better known as OIN) and why it cannot effectively protect Free software projects. We also exchanged many E-mails with the OIN and some trolls. We saw how toothless the OIN can be in many scenarios and we challenged the OIN over it. I spoke in length with their CEO a few times over the telephone and I still think that it helps legitimise software patents and rarely achieves very much, except promote the interests of large corporations (like those which founded it and still fund it).

Earlier this morning FOSS Force published this very long interview with Deb Nicholson, who had worked for the FSF before she moved to OIN. This interview is very good and Nicholson’s views on patents are fine. We shared them here before.

“My work at OIN involves a lot of research,” Nicholson says. “I read academic papers on litigation trends and try to stay on top of who’s getting sued this week. It also involves a lot of behind the scenes emailing. I have lots of informal conversations with people about how you run a free and open source software project. Sometimes, they don’t realize that lots of other companies are succeeding with FOSS business models and shared community resources. Once they see that it can be done, they often feel more confident.”

Nicholson then speaks about the role of SCOTUS in lowering the risk of software patents.

“The Supreme Court,” she explains, “has given the lower courts the tools to rule against two specific categories of vague and frivolous patents. This is great for companies that have the cash and the time to go to court. For companies that don’t want to fight in court — which is lots of them, because it really is expensive and time-consuming — the letters will keep coming. Plus, there are still plenty of overly broad or obvious patents on the books that may not be affected by the recent rulings. So, things are improving but I wouldn’t say that we’re finished.”

She makes an important point regarding the cost of litigation, but the matter of fact is, USPTO examiners are now tougher on software patents and fewer companies (or shell firms) are eager to assert software patents for fear of losing them. Not only the extorted party (usually developers) is scared of the courts; the plaintiff, e.g. a patent troll, is too. What SCOTUS has done is, in our humble assessment, the best news in nearly a decade. We cannot recall anything bigger or better in terms of magnitude, at least not when it comes to systematically squashing software patents (not one patent at the time as per the EFF’s much-advertised earlier efforts, dubbed “patent busting”).

Finjan

The Finjan-led patent extortion crusade was mentioned here just weeks ago (they are Microsoft-connected) and now, just weeks later, this firm’s troll entity (Finjan Holdings) gets extortion money from a really nasty company, Blue Coat, which some say the EPO hired to spy on people like yours truly and EPO staff. “Finjan Holdings,” as a trolls expert explains, is “a patent-licensing company operating in the cybersecurity space” and it has just “won a hefty $39.5 million jury verdict (PDF) on Tuesday, when a San Jose jury found that Blue Coat Systems infringed five of its patents.”

Keep an eye on Finjan, not just because of its Microsoft connections. Finjan has become a very malicious company. It deserves to go out of business. The sooner, the better.

Cisco

Cisco, now known for its surveillance and back doors (which is even openly discusses when applying for standards), is receiving negative publicly because as its profits run dry (or more meager), it increasingly turns into more of a troll, just like Microsoft and Apple. Is this what Cisco wants to be renowned (or notorious) for? Remember that TrollTracker, a fighter against patent trolls. was a Cisco lawyer, but Cisco is now turning into what it fought. Arista, according to this article, says that Cisco is “Very Much Like a Patent Troll” (that’s the headline) and it’s coming all the way from the top. To quote the article, “Arista’s top lawyer used the company’s earnings call for trash-talk Thursday, saying Cisco is “behaving very much like a patent troll” in its intellectual property lawsuit against Arista.

“Arista Networks Inc. CEO Jayshree Ullal kicked off the badmouthing: “Despite all the overheated rhetoric we’ve been hearing from Cisco blogs about Arista’s brazen copying, we think the only thing brazen about the suit is the extreme length Cisco has gone to,” she said. “Our customers have shown unwavering support.”

“Cisco has basically become another very malicious company, if not for colluding with espionage agencies, then for bulling/attacking rivals using patents.”“Arista Vice President and General Counsel Marc Taxay agreed. “Ironically … it appears to us at any rate that Cisco is behaving very much like a patent troll, which is pretty much what they’ve spent the last decade condemning.” Cisco is claiming patents for widely implemented features and functionality that exist on a broad range of switches today, and some of the patents affect features the patents were never intended to cover, Taxay said.”

The Wall Street Journal, taking note of “expensive legal battle with Cisco”, also expresses concerns about this case. “That may give some investors pause,” the author claims, “especially when Arista remains embroiled in an expensive legal battle with Cisco, which has accused it of infringing on patents.”

Cisco has basically become another very malicious company, if not for colluding with espionage agencies, then for bulling/attacking rivals using patents. Cisco used to be on the defensive, but now it’s on the ofsensive, and not against trolls. For a company that is eager to be seen as a FOSS and GNU/Linux supporter, this surely is a dumb strategy whose gains — if any — are massively outweighed by public image erosion.

JDate

A new article from Timothy B. Lee helps chastise the bully called JDate, which we wrote about very recently. “JDate,” he explains, “recently sued JSwipe, a mobile dating app for Jews that works like Tinder. Most media coverage has focused on mocking JDate for essentially claiming that it has a monopoly on certain uses of the letter J.

“But in some ways, the part of JDate’s lawsuit that really merits mockery is the patent infringement claims. JDate is suing JSwipe for infringing a broad patent that essentially claims the concept of using a computer to match pairs of users who express interest in each other. The lawsuit illustrates the continuing need for patent reform, because the current system makes it too expensive for defendants to challenge dubious patents.”

There are some interesting comments about JDate here. Although this Web site only targets a small niche, we strongly encourage all readers to boycott JDate, or else they’ll continue their shameful bullying, perhaps inspiring other companies to do the same.

The Economist Versus Patents

The Economist, interestingly and surprisingly enough (given its strong pro-business bias), chastises the patents regime in at least two articles this month. One is titled “A question of utility” and says in its summary: “Patents are protected by governments because they are held to promote innovation. But there is plenty of evidence that they do not” (we have covered such evidence for almost a decade).

“The ability to patent,” says the author, “has been extended from physical devices to software and stretches of DNA, not to mention—notably in America—to business processes and financial products.”

Yes, patent scope is a huge part of the problem.

“Time to fix patents” is the second such article from The Economist and it too is an assault on the status quo. “Ideas fuel the economy. Today’s patent systems are a rotten way of rewarding them,” said the summary.

Here is a key part of this article: “Patents are supposed to spread knowledge, by obliging holders to lay out their innovation for all to see; they often fail, because patent-lawyers are masters of obfuscation. Instead, the system has created a parasitic ecology of trolls and defensive patent-holders, who aim to block innovation, or at least to stand in its way unless they can grab a share of the spoils. An early study found that newcomers to the semiconductor business had to buy licences from incumbents for as much as $200m. Patents should spur bursts of innovation; instead, they are used to lock in incumbents’ advantages.”

It is nice to see even The Economist debunking these tiresome myths, many of which still perpetually spread by patent profiteers rather than producing companies. Are we on the cusp of a mindset change?

Patent Propaganda From Lawyers’ Sites

Lawyers’ media, seeking to maximise dependence on patent lawyers, promotes patents on construction in this series that starts with the following paragraph: “In the first of this three part series, clean tech, or green construction, was defined as construction that reduces or minimizes the environmental impact in building construction, operation and use. That article also discussed the importance of building intellectual property walls, and especially with patents, to protect inventions from being incorporated into projects by unlicensed users. Equally important is knowing the patents that may prevent a company from incorporating patented technology for which it has no license. Patent rights can shape an industry; consequently, companies must develop patent strategies. Patents for green construction encompass everything from building materials, to software for optimizing various processes, to green energy systems, amongst others.”

Yes, they even suggest software patents right there.

“The US may not have a world class patent system,” say the patent maximalists of IAM, “but its professionals are second to none” (for taxing by lawyers perhaps). Another site of patent lawyers who lobby for a lot of ludicrous types of patents (including software) pretends that patents take a short time to receive, despite that infamous backlog and these notorious issues which can only be tackled by lowing examination standards, hence granting bogus patents (trivial, and/or with prior art).

“Intellectual property & intangible assets” is the headline of this British article which is so full of nonsense that we don’t know where to start. To quote one part of it: “Newton says the real value in business these days is in knowledge, which is tied up in intellectual property, patents, trademarks and designs.”

That’s nonsense. The term “intellectual property” refers to patents, trademarks, and copyrights, so it cannot be separated as above. Then there are designs, which are already (in most domains) covered by copyrights and if the author wishes to speak about trade secrets, that’s different from all the above and still pertains to knowledge, without having to introduce that vague notion of “intellectual property” and “intangible assets” — both horrible propaganda terms that equate ideas with objects.

“Patent scope has been getting so much worse over time, to the point where abstract concepts like business methods, algorithms, and even basic designs become patents although copyright should definitely suffice.”The article titled “9 Tech Startups Disrupting the Legal Industry” talks about proprietary software that patent lawyers use to keep track of their work. “Experts say the market for legal technology is as much as $400 billion,” the article says, but there is nothing like a citation to support such a figure.

“We hear the same complaints over and over every time Congress tries to improve the patent system,” Matt Levy wrote the other day. “In fact, we’ve been hearing some of them for over 70 years.” Patent scope has been getting so much worse over time, to the point where abstract concepts like business methods, algorithms, and even basic designs become patents although copyright should definitely suffice.

Design Patents and Linux Gadgets

Speaking of design patents, watch what patent maximalists celebrated this weekend: “The text cluster provided here shows that much of Hasbro’s portfolio of 1,772 patents (339 of which are active) are related to toy vehicles, electronic games and ornamental designs, indicating a fair amount of design patents.”

The notion of “design patents” has got to be one of the most loathsome and ridiculous. The article “Apple v. Samsung and a Fight Over the Patents for Designs” was published by Forbes the other day, reminding us of so-called design patents (such as the widely-ridiculed 'rounded corners' patents). Apple is very desperate to stop Android (and by extension Linux), but doing so by bullying with outright bogus patents isn’t the way to compete. CPTN members (i.e. holders of Novell’s patents) Oracle, Apple and Microsoft have been systematically attacking Android using patents and Oracle now takes this further. “Oracle’s lawsuit against Google over Java copyrights probably won’t be back in a courtroom again until next year,” wrote The Register, “but in the meantime, Oracle has asked the court to let it expand the scope of its complaint to include events that have occurred since it was first filed in 2010.”

This forever-legal-limbo scenario helps hurt Android, so we cannot just pretend that software patents are not a problem. More FOSS and GNU/Linux site must learn to address these issues as a matter of priority. Not enough are doing this at the moment and it definitely helps our foes. Many people seem to forget that Microsoft still attacks GNU/Linux using patents (albeit more discreetly than before).

08.09.15

IRC Proceedings: July 26th, 2015 – August 8th, 2015

Posted in IRC Logs at 7:27 pm by Dr. Roy Schestowitz

IRC Proceedings: July 26th, 2015 – August 1st, 2015

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: August 2nd – August 8th, 2015

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

Enter the IRC channels now

Links 9/8/2015: GNOME Search for Executive Director, Many Distro Screenshots, Linux 4.2 RC 6

Posted in News Roundup at 7:25 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • A Look At Daala’s Git Repository, The Lead Developers & Code Count

    While the Daala video coding format backed primarily by Xiph.Org and Mozilla isn’t ready for mainstream use yet, looking at its Git repository does at least reveal some environmental data to discuss.

    While poking around the Daala Git repository this week in looking at the state of affairs, I decided to run GitStats on the code-base for seeing the pace of code entering the mainline code repository, etc. This was mainly done out of pure curiosity and figured the stats would be of interest to other Phoronix readers too. The Daala repository has 277 files made up of 124k lines of code that as of today was done via 1,432 commits and has seen contributions by 47 authors.

  • Web Browsers

  • Oracle/Java/LibreOffice

    • LibreOffice, and the ODF legacy

      Common wisdom has it that sleeping dogs are better kept snoring and I tend to agree. I’m going to do what may seem to be understood as the contrary. I believe it is not the case, as prejudice is something that is hard to fight and tends to stick around dark corners and circles of people with little knowledge of the matter.

  • FSF/FSFE/GNU/SFLC

  • Openness/Sharing

    • LibreOffice 5, Creative Commons writes the White House, and more news

      In this week’s edition of our open source news roundup, we take a look at the release of LibreOffice 5, a personal food computer, Creative Common’s open letter the President Obama, and more.

    • Open Data

      • Open data initiative to give true picture of election process

        The National Democratic Institute is has announced the launch of the Open Election Data Initiative. The goal of the initiative is to ensure that citizen groups have access to election data that can give a true picture of an election process, including how candidates are certified, how and which voters are registered, what happens on election day, whether results are accurate, and how complaints are resolved.

    • Open Access/Content

  • Programming

Leftovers

  • Watch John Oliver Explain Why Washington, DC, Should Be the 51st State

    On Sunday, Last Week Tonight took on the issue of restricted voting rights for Washington D.C. residents, despite the fact they pay federal taxes and have a larger population than some entire states such as Vermont and Wyoming. Even the Dalai Lama once called the situation “quite strange.”

  • Health/Nutrition

  • Security

    • Researchers Hack into a Linux-Powered Self-Aiming Sniper Rifle

      Two researchers, Michael Auger and Runa Sandvik, will present today, at the Black Hack conference in Las Vegas, their recent findings into the world of computerized weapons security.

    • OPM Wins Pwnie for Most Epic Fail at Black Hat Awards Show
    • DefCon ProxyHam Talk Disappears but Technology is No Secret

      Part of the drama at any Black Hat or DefCon security conference in any given year usually revolves around a talk that is cancelled for some mysterious reason, typically over fears that it could reveal something truly disruptive. Such is the case in 2015 at DefCon with a talk called ProxyHam, which was supposed to reveal technology that could enable an attacker to wireless proxy traffic over long distances, hiding their true location.

    • A chat with Black Hat’s unconventional keynote speaker

      In 2010, Black Hat had its first female keynote, Jane Holl Lute, who served at the time as the deputy secretary of the Department of Homeland Security. Lute’s first comment about the nature of cyberspace set the tone for her keynote, which was, in characteristic DHS cybersecurity style, tone-deaf to attendee levels of expertise.

    • Uneasy detente between Def Con hackers and ‘feds’

      That led founder Jeff Moss to call for a “cooling off period” during which “feds” avoided coming near the annual conference in Las Vegas.

    • Design flaw in Intel processors opens door to rootkits, researcher says

      A design flaw in the x86 processor architecture dating back almost two decades could allow attackers to install a rootkit in the low-level firmware of computers, a security researcher said Thursday. Such malware could be undetectable by security products.

    • Why Your Mac Is More Vulnerable to Malware Than You Think

      The attack would enable a hacker to remotely target computers with malware that would both go undetected by security scanners and would afford the attacker a persistent hold on a system, even when it undergoes firmware and operating system updates. Because firmware updates require the assistance of the existing firmware to install, any malware in the firmware could block updates from being installed or write itself to a new update. Zetter reports that the only way to eliminate malware that’s embedded in a computer’s main firmware would be to re-flash the chip that contains the firmware.

    • ‘Zero-day’ stockpiling puts us all at risk

      The recent dump of emails from Hacking Team sheds new light on the extent of government involvement in the international market for zero-days. Rather than disclosing these vulnerabilities to software makers, so that they can be fixed, government agencies buy and then stockpile zero-days.

    • What’s wrong with the web? — authentication
  • Defence/Police/Secrecy/Aggression

    • Outsourcing the Kill Chain: Eleven Drone Contractors Revealed

      Bureau reporters Crofton Black and Abigail Fielding-Smith name eleven companies that have won hundreds of millions of dollars in contracts to plug a shortage in personnel needed to analyze the thousands of hours of streaming video gathered daily from the remotely piloted aircraft that hover over war zones around the world: Advanced Concepts Enterprises, BAE Systems, Booz Allen Hamilton, General Dynamics, Intrepid Solutions, L-3 Communications, MacAulay-Brown, SAIC, Transvoyant, Worldwide Language Resources and Zel Technologies. (see details below)

    • US Drone Strikes Kill Seven in North Waziristan

      According to officials familiar with the situation, US drones fired a pair of missiles against a house in Datta Khel today, destroying the building and killing at least seven people. Two others were wounded.

    • Brian Terrell: US Drone Campaign Needs To Be Acknowledged A Failure – Interview

      The assassination drone campaign on the tribal areas of Pakistan, Somalia, Yemen and Afghanistan has been one of the controversial plans of the US government in the recent years.

      The White House, State Department and Pentagon officials maintain that the drone attacks are aimed at targeting the Al-Qaeda terrorists in these countries and crushing their strongholds; however, figures indicate that the majority of the victims of the Unmanned Aerial Vehicles dispatched to the region are civilians. The Bureau of Investigative Journalism has recently revealed that between 2004 and 2015, there have been 418 drone strikes against Pakistan alone, resulting in the killing of 2,460 to 3,967 people, including at least 423 civilians. That’s while some sources put the number of civilian casualties in Pakistan during the 11-year period at 962.

    • US often does not know who drone attacks kill

      “Signature strikes” are drone attacks based solely on a target’s behaviour with the identity of the target not known. Sometimes such an attack may hit a high value target but at other times they may kill innocent civilians.

    • July Drone Report: Casualties Spike in Afghanistan, Strikes Increase in Somalia

      American drone strikes killed hundreds of people in Afghanistan, Yemen and Somalia in July, according to a report by the Bureau of Investigative Journalism, a London-based nonprofit. The TBIJ produces monthly reports about highly secretive U.S. drone operations around the globe as part of its goal to provide the public “with the knowledge and facts about the way in which important institutions in our society operate, so that they can be fully informed citizens.”

    • US-Backed Corporations Make Huge Profits From Drones Killing Innocents

      Unmanned, remotely-operated drones supplied by private corporations are hugely profitable and attractive to those without conscience in the US government, activist Melinda Pillsbury-Foster told Sputnik.

    • One year on, drone attacks against ISIS increasing

      Drones appear to have an expanding role in the fight against Islamic State, although it’s unclear what impact they are having on the war itself.

      One year after President Barack Obama authorized airstrikes against ISIS targets, those airstrikes by the U.S. and its coalition partners, including Canada, have killed 15,000 ISIS supporters, the coalition claims.

    • UK hopes drones buzz will prompt lift-off

      Arpas says it has about 200 members, mostly small businesses and individuals, who form the country’s enthusiastic cottage industry. However, Britain’s two big aerospace groups, BAE Systems and Rolls-Royce, are also developing drones for commercial purposes.

    • US military launches first Syria drone strike from base in Turkey
    • US drone bombs IS target after taking off from Turkey: Turkish official

      The U.S. military launched its first strike against Islamic State from Incirlik Air Base in southern Turkey, the Pentagon said, reflecting a deepening security relationship between Washington and Ankara in the region.

    • U.S. drone strikes from Turkey
    • Hawke hones his craft as drone launcher in ‘Good Kill’

      Bold, honest and disturbing, “Good Kill,” in its own modest fashion, is one of the most memorable American films I’ve seen thus far in 2015.

    • Defence Minister Simon Coveney accused of involving Ireland in the international arms trade

      Mr Coveney has revealed plans to open the country up as a “testing zone” for “advanced military and weapons guidance systems, including drones, submarine drones and other such high-tech hardware”

    • ‘Iraq airstrikes won’t defeat ISIS, only kill civilians’ – anti-war group

      Peace activists have condemned the British government’s campaign of airstrikes against Islamic State targets in Iraq, insisting continued bombing of the region will fail to defeat the terror group and lead to further civilian fatalities.

    • Air Force Moves Aggressively On Lasers

      All branches of the military really want laser weapons. But they don’t all want them for the same missions. What struck me after a recent conference here was how differently the US Air Force is approaching lasers.

    • Obama: Choice over Iran Nuclear Deal is Between Diplomacy and War
    • To press for Iran nuclear deal, Obama invokes Iraq war

      President Obama lashed out at critics of the Iran nuclear deal on Wednesday, saying many of those who backed the U.S. invasion of Iraq now want to reject the Iran accord and put the Middle East on the path toward another war.

      Obama also said that if Congress rejects the deal, it will undermine America’s standing in global diplomacy, leaving the United States isolated and putting Israel in even greater peril.

      While calling the nuclear accord with Iran “the strongest nonproliferation agreement ever negotiated,” Obama also seemed to turn the vote on the deal into a referendum on the U.S. invasion of Iraq a dozen years ago, a decision he portrayed as the product of a “mind-set characterized by a preference for military action over diplomacy.”

    • Address legitimate injustice first, then see if the ideologues need to be bombed

      The unprecedented power of the internet is staggering. Asked by Nick Dry, prosecuting, why he needed so many rounds of ammunition, Lyburd replied glibly: “I was watching videos on YouTube and the Americans, they have thousands. You can shoot 100 rounds in a few seconds.” Lyburd is aged just nineteen, as young as some of the recruits attracted to Daesh.

      America legislators have for decades allowed so many high school shootings to occur that a teenager on the other side of the Atlantic felt inspired to play copy-cat. Has America just exported its first terrorist ideology?

      The use of social media in the case of Daesh and Lyburd is telling. America’s pervasive gun lobby is led by establishment organisations like the National Rifle Association and enhanced by grass-roots nationalist militia groups. Together, these quasi-political gun ownership clans have populated entire YouTube channels with educational videos; filled Twitter and Instagram feeds with gun pornography; exploited Reddit pages; and even launched online and printed magazines. The US government is involved in spreading gun culture, with the Pentagon gifting hundreds of millions of dollars each year to Hollywood, an asset that Obama has said he believes is part of American foreign policy.

    • Indian forces kill 2 Pakistanis, injure 5 in unprovoked firing
    • Do not kill terrorists, take them alive

      Who were the militants who attacked the Dinanagar police station in Gurdaspur district? What were their aims and ideology? How many of their comrades are waiting for another chance to attack? How much help are they getting from the Pakistani authorities, and what other sources of support and finance do they enjoy?

    • Kenya: Obama in Kenya

      Yet although he bears “our skin”, Obama represents the power of those who seek to dominate us by destroying our self-confidence. Therefore his speeches reinforce a pattern of contempt that his predecessors have purveyed for decades. Thus, although his speech in Nairobi (compared to Accra in 2009) was less of headmaster lecturing his pupils and recognised the transformative changes taking place on our continent due to our initiatives, he still castigated us. His comments on political violence and corruption in Kenya continued the tradition of lecturing to us. Why does America feel obliged to comment on how African nations govern themselves, something he does not do in Western Europe? Who gives Obama and the US the moral right to lecture to Kenyans about their governance?

    • Barack Obama’s hypocrisy in Africa

      On January 20, 2017, Barack Obama will leave the presidency. Black people capable of critical thought will have many reasons to breathe sighs of relief. They will no longer have to submit to condescending lectures directed exclusively at them.

      From the moment he ran for president, Obama has harangued Black people on a wide variety of issues. It doesn’t matter if his audience is made up of church congregants, graduating students, or Kenyan dignitaries. Every Black person unlucky enough to be in his vicinity risks being treated like a deadbeat dad, career criminal or Cousin Pookie, Obama’s own imaginary Willie Horton.

      During his trip to East Africa the president chastened Kenyans about gay rights, domestic violence, genital cutting, forced marriage and equal rights for women. He went on and on with no mention of how well his country lives up to any accepted standards of human rights

    • On the Passing of Abdullah Abdullatif Alkadi and a Postscript on Charlie Hebdo

      An intriguing aspect of Muslim culture is that murders are rarely committed over wealth. While there may be theft in Muslim countries, theft that involves murder is almost unheard of. The idea of killing someone over something as ephemeral as a car or money or a cell phone is a rarity (except perhaps in war-torn countries where all civil society has broken down). Murder in Muslim societies tends to be motivated by political issues but more often by a misguided sense of honor. This was the case earlier this month in France, where clearly deluded and uneducated men from the ghettos of Paris, after rediscovering their faith, felt compelled to take their misperception of Islamic law into their own hands in order to “uphold the honor” of their prophet who, they believed, was being denigrated by the cartoonists at Charlie Hebdo. Without a doubt, such murders are criminal and wrong, but they can be rationally understood within the context of a society that holds the sanctity of prophets, those men of God, above all else.

    • Death of Taliban’s Mullah Omar could boost support for Islamic State
    • Taliban confirms Mullah Omar’s death, succession

      China has expressed its backing for Pakistan and other parties to “push for peace and reconciliation” in the war-torn Afghanistan, days after the second round of peace talks were put off following news of Taliban chief Mullah Omar’s death.

    • Yemen government-in-exile says base once used for U.S. drones retaken

      Clashes persisted around Yemen’s largest air base Tuesday, a day after its declared capture by forces loyal to the country’s exiled President Abdu Rabu Mansour Hadi, military officials said.

    • In victory for activists, drone manufacturers linked to Gaza war cross-examined in Scottish courts

      After a gruelling fourteen day trial, a group of activists known as the Thales Ten,* received their verdict in Glasgow Sheriff Court last week. Five were convicted, and five acquitted, of the crime of breach of the peace.

      The group scaled onto the roof and blockaded entrances to the Thales UK factory on 23rd September, 2014 in response to the war in Gaza. They hung a fifty foot Palestine flag and several banners. One read: ‘Another Scotland is Possible: Stop Arming Israel’. Another made the connection between the French arms company Thales, Israel’s Elbit Systems, and the UK Ministry of Defence.

    • U.S.-led strikes kill 459 civilians in past year in Iraq, Syria, report finds

      U.S.-led airstrikes targeting the Islamic State group in Iraq and Syria have likely killed at least 459 civilians over the past year, a report by an independent monitoring group said Monday.

      The report by Airwars, a project aimed at tracking international airstrikes targeting the terrorists, said it believed 57 specific strikes killed civilians and caused 48 suspected “friendly fire” deaths. It said the strikes have killed more than 15,000 Islamic State terrorists.

    • US led air strikes on Isis ‘likely to have killed hundreds of civilians’ says independent monitoring group

      An independent monitoring group says some bombings carried out by the US-led coalition targeting Isis are likely to have killed hundreds of civilians.

      The report by Airwars, a project aimed at tracking the international airstrikes targeting the Islamic State group, says it counted at least 459 suspected civilian fatalities from airstrikes it believes the coalition carried out in Iraq and Syria over the last year. It says the same strikes also caused at least 48 suspected “friendly fire” deaths.

    • MH370 probe: Wing fragment did come from missing jet, say French experts

      An aircraft wing fragment washed ashore on the Indian Ocean island of Reunion came from Malaysia Airlines Flight 370, which disappeared more than a year ago with 239 people aboard, experts say.

    • U.S. As Corrupt As Russia, Says Former NSA Exec

      Americans believe that Russia is a corrupt country where everyone from the president to regional governors to government officials are flourishing on bribes. Russia has developed corruption into a “fine art,” says a book titled “Putin’s Kleptocracy: Who Owns Russia?” written by the University of Miami professor Karen Dawisha.

    • NSA-Japan Spy Scandal, the Passport Revocation Act, ‘Russian Body Bags’

      Finally, we wrap it all up by commenting on the US ‘Institute for Peace’ chairman who said that the Pentagon should arm Kiev in order to create more – quote – “body bags of Russian soldiers”.

    • NSA Pays Utah $1M to Secure Roads to Enormous Super-Secret Data Center

      The National Security Agency paid the state of Utah more than $1 million over 14 months for state troopers to guard the entrance to the agency’s data center near Salt Lake City, according to Utah Highway Patrol records.

    • Records: NSA paid Utah over $1M to police data center roads
    • Officials blame Russia for Pentagon Joint Chiefs of Staff email hack

      US officials have laid the blame for an attack against the Pentagon’s Joint Chiefs of Staff unclassified email system firmly on Russia’s doorstep.

      Explaining how the second attack against the Pentagon this year had led to severe restrictions being placed on the network, officials said the work of around 4,000 military and civilian personnel had been disrupted (interestingly, The Register reports that staff were told the service disruption was an expected side effect of a planned system upgrade).

      The latest attack, believed to have occurred on or around 25 July, had originally passed without any fingers being pointed, as evidenced by Pentagon spokeswoman Lieutenant Colonel Valerie Henderson’s statement to Reuters…

    • Army Entertainment Liaison Office: Watch More TV! The Freedom Of Our Nation Depends On Your Contribution!

      Generally speaking, the US Army Entertainment Liaison office believes most of what crosses its desk furthers the Army’s interests. There are lots and lots of supportive assessments contained in the document, with the most common being “Supports Building Resilience” — a phrase that covers everything from military-friendly documentaries to American Idol. Another popular assessment is “Supports Modernizing the Force,” something the Liaison Office has applied to blockbuster franchises like The Avengers.

    • Fight the hysteria about the hack of OPM’s files. It’s probably not a big threat.

      We’re told the OPM hack will have horrific consequences for America. Just as we have been told so many times since WWII, almost always falsely. I expect this too will prove to be a wet firecracker. Here are the reasons why, obvious things few journalists have told you. {1st of 2 posts today.}

    • Former top CIA official arrested at BWI for allegedly trying to bring gun through security
    • Ex-CIA official arrested for allegedly trying to bring gun through BWI security

      A.B. “Buzzy” Krongard, a former top CIA official and longtime Baltimore business leader, was arrested at BWI Thurgood Marshall Airport on Thursday for allegedly attempting to bring a loaded handgun onto an airplane.

    • Ex-CIA official arrested at airport for allegedly trying to bring gun through security
    • Buzzy Krongard Arrested, Attempted To Bring Loaded Gun Through BWI Security
    • 2 arrested at Maryland airports for gun possession
    • CIA Executive Director: CIA Committed Torture [same person as above]

      Former CIA Executive Director Buzzy Krongard told BBC on Monday that the CIA did engage in torture…

    • Ex-CIA boss admits to BBC Panorama that it tortured

      The CIA tortured terror suspects in its programme of “enhanced interrogation”, the agency’s former executive director, Buzzy Krongard, has admitted to the BBC’s Panorama programme.

    • Former senior CIA official says waterboarding was ‘torture’

      A former top CIA official has reportedly become the most senior agency figure to say he is “comfortable” with using the word “torture” to describe so-called enhanced interrogation techniques deployed against al-Qaeda suspects in the wake of the September 2001 terrorist attacks.

    • Exclusive: “CIA death squads” – the one thing that could stop Jeremy Corbyn, according to Ken Livingstone

      Outside Camden Town Hall last night, a queue stretched round three sides of the building and along Euston Road. As people began to slowly file into the vast hall, it soon became clear that there was not enough space for the crowd to all fit inside. Teenagers actually began to scale the walls and huddle around windows to look inside.

      The spectacle? The 66-year-old Labour leadership candidate Jeremy Corbyn.

      As the crowd swelled at the door, former mayor of London and speaker at the rally, Ken Livingstone arrived.

      On his way into the venue, LondonLovesBusiness caught a few words with Livingstone about Corbyn’s campaign, and discovered that even with the tantalising prospect of a left-wing leader taking power, Livingstone’s sense of humour remains intact.

    • Edward Snowden: U.S. Government Snubs Pardon Plea for CIA Whistleblower Edward Snowden

      Lisa Monaco, the President’s Advisor on Homeland Security and Counterterrorism, said that Snowden’s move to disclose confidential data has had a grave impact on the security of the state.

    • John Kiriakou: Read this First! Before You Blow the Whistle, Here’s What No One Ever Tells You

      At sentencing, my judge gave me 30 months in prison and three years of probation, and she took away my federal pension. I left for prison believing that was the totality of my punishment. I was wrong.

      One of the first things that happened upon my conviction was that the company with which I had my homeowner’s and auto insurance canceled my policies. They don’t do business with felons, they said. That same week, my credit card company canceled my card and demanded the immediate payment of the balance.

      Then, shortly before my departure for prison, the agency that my wife and I used to hire child care providers also jumped on the bandwagon. They dropped us as clients and left us without anybody to help her care for our three young children while I was away.

    • Obama’s Syria policy is a mess

      Last year, President Obama asked for $500 million to arm and train the Syrian rebels. This year alone, the effort is supposed to train 3,000 soldiers to fight ISIS.

    • Obama’s failed plan to train the Syrian rebels, in one brutal timeline

      President Obama’s big plan to train friendly Syrian rebels has had a really rough few days. The first 60 American-trained Syrian rebels, part of a group called Division 30, finally went onto the battlefield and almost immediately got attacked by al-Qaeda and suffered a humiliating defeat. According to the Guardian, al-Qaeda fighters killed five US-trained rebels, wounded 18, and kidnapped seven, including the unit’s commander. Half of the American-trained fighters were put out of commission within weeks of hitting the ground.

    • United States to Scale Confrontation with Syria

      The US government threatens to further escalation against the government of Syria, according to The Wall Street Journal.

      The newspaper says that, although military officials minimize the chances of direct confrontation with the forces of the Syrian Arab Army, the fact that President Barack Obama authorized the use of the Air Force to defend US-trained groups, leaves open that possibility.

    • Washington Stunned by Attack on US Mercenaries in Syria

      The attack came early Friday against a Syrian militia known as Division 30, which has been the central focus of a $500 million program initiated by the Obama administration and administered by the Pentagon to arm and train a US-controlled proxy force, ostensibly for fighting against the Islamic State of Iraq and Syria (ISIS) inside Syria.

      Launching the attack was the Al-Nusra Front, the Syrian affiliate of Al Qaeda and the most powerful of the Islamist militias that have been fielded in the Western, Saudi, Turkish and Qatari-backed war for regime change to oust the government of Syria’s President Bashar al-Assad.

    • SAS dress as ISIS fighters in undercover war on jihadis

      The unorthodox tactic, which is seeing SAS units dressed in black and flying ISIS flags, has been likened to the methods used by the Long Range Desert Group against Rommel’s forces during the Second World War.

      More than 120 members belonging to the elite regiment are currently in the war-torn country on operation Shader, tasked with destroying IS equipment and munitions which insurgents constantly move to avoid Coalition air strikes.

    • How US Allies Aid Al Qaeda in Syria

      The dirty secret about the Obama administration’s “regime change” strategy in Syria is that it amounts to a de facto alliance with Al Qaeda’s Nusra Front which is driving toward a possible victory with direct and indirect aid from Saudi Arabia, Turkey and Israel, as Daniel Lazare explains.

    • U.S. caution or incoherence in Syria?

      The U.S. military is training locals to fight IS but not Assad, while the CIA is training Syrian rebels to fight Assad.

    • Book review: Kill Chain by Andrew Cockburn

      AT a CIA awards dinner in Washington in 2011 Robert M Gates, a former director of the agency whose term as US Secretary of Defence straddled the Bush and Obama administrations, spoke on the future of the war on terror. Factories were working day and night, he told the audience, to turn out the newest, most vital front line weapons. “So from now on,” he said, “the watchword is: drones, baby, drones!”

    • We’re a year into the unofficial war against Isis with nothing to show for it

      This Saturday marks one full year since the US military began its still-undeclared war against Islamic State that the government officials openly acknowledge will last indefinitely. What do we have to show for it? So far, billions of dollars have been spent, thousands of bombs have been dropped, hundreds of civilians have been killed and Isis is no weaker than it was last August, when the airstrikes began.

    • Pentagon Doesn’t Know Who It Kills with ‘Signature’ Drone Strikes

      In June, when a CIA drone strike killed an al-Qaeda leader who the agency did not know was among a group of militants, the United States showed that it continues to fire drone missiles at targets whose identities are a mystery.

    • Exiled Chagossians could be allowed to return home under limited resettlement

      The Chagos Islands, one of the UK’s most remote overseas territories, could be opened up to tourism under plans allowing exiled islanders to return home, according to a Foreign Office report.

      The consultation process on resettlement of the British Indian Ocean Territory (BIOT), launched this week, proposes allowing 1,500 Chagossians to live on the archipelago.

      Britain forced the inhabitants off the islands in the early 1970s to make room for a US airbase that was built on the largest island, Diego Garcia. In exchange for the clearance, London received £5m off the cost of developing a joint US/UK missile programme.

    • Valerie Plame: The Spy Who Came in to the Code

      Since her cover was famously blown, former covert CIA operative Valerie Plame is more openly protecting the country’s digital assets. In May, the author and anti-nuclear activist joined the advisory board of Global Data Sentinel, developer of a cybersecurity platform designed to encrypt and protect across domains, networks, and devices.

    • Valerie Plame attacks Donald Trump on Iran nuke deal
    • Plame Wilson: Trump campaign sought support so she could get back at Rove
    • ‘You can’t make this stuff up’: Plame Wilson says Trump wanted her support

      Former CIA operative Valerie Plame Wilson says the Donald Trump campaign reached out to her for support.

    • Missing In Action

      Over the past decade, a string of war movies emerged in the wake of 9/11: The Hurt Locker, Syriana, The Messenger, Green Zone, Lone Survivor, and American Sniper, to name just a few. Some have performed better than others at the box office, and many have received critical acclaim. Almost none has included portrayals of women in combat.

    • Are counterterrorism bills really working in the Western world?

      Last week we looked at the British counter-extremism bill, backed by Home Secretary Theresa May. The heated debate about this bill centers on whether it will curtail rights such as freedom of speech and whether it will target Muslims, creating an environment in which mistrust can only grow.

    • Letter: ‘Historic diplomatic achievement’

      The Iran deal reached in Vienna is truly a historic diplomatic achievement.

    • There’s good reason they should hate us

      Much adieu lately about how we can trust the Iranian nuclear agreement when they hate Americans.

      Do the Iranians hate us? If they don’t they should.

      Much of Iranian hatred is based on our CIA involvement in deposing their democratically elected prime minister in 1953 and supporting the brutal dictator (“the Shah”) who gave the U.S. and Britain unlimited access to oil.

      In the year 2000 the New York Times obtained a copy of the CIA’s secret history of the Iranian coup, revealing the inner workings of a plot that set the stage for the Islamic revolution in 1979, and for a generation of anti-American hatred in one of the Middle East’s most powerful countries.

    • US Special Forces Would Benefit From Recruiting More Arab Americans

      US Special Forces would gain an advantage and broaden its skill base by enlisting more Arab Americans, former Central Intelligence Agency (CIA) officer Larry Johnson told Sputnik on Friday.

    • A forgotten conflict that is very much alive

      The murder of the Pakistani human rights activist Sabeen Mehmud in central Karachi earlier this year triggered a huge media echo. Mehmud was famous the world over for her work, primarily in the fields of women’s rights and Internet activism. Despite the intense media coverage, not much attention was paid to the fact that during the final months of her life, the activist had focused specifically on the conflict in the south-western Pakistani province of Balochistan. Just a few hours before her murder, Mahmud and her organisation “The Second Floor” had arranged a debate on the human rights situation in Balochistan.

      [...]

      Balochistan has been the scene of several major rebellions in recent decades, all of which were brutally put down by the government in Islamabad. Although the region has a wealth of natural resources, the people are among the poorest in Pakistan. They barely have access to stable infrastructure, power or clean drinking water. Some 88 per cent of Balochs live below the poverty line. Although natural resources are being exploited, the authorities are failing to make adequate investments in other sectors. Only the security sector is flourishing.

    • Report: Hundreds of Civilians Killed by U.S.-Led Bombing of ISIS in Iraq and Syria

      A new report from a group of journalists and researchers says that hundreds of civilians have died during airstrikes by the U.S. and other nations fighting the Islamic State, a marked contrast to the Pentagon’s official admission of just two civilian deaths.

    • Book review: The Noodle Maker of Kalimpong is gripping

      His account of the Tibetan struggle is a welcome contribution to the growing body of Tibetan resistance literature and on the CIA’s involvement.

      Some of the background to the events he recounts has never been told before. The only other Tibetan to tell the whole story is the late Lhamo Tsering in his exhaustive work, Resistance, and his son Tenzing Sonam in his compelling documentary, The Shadow Circus: the CIA in Tibet. Apart from these, this aspect of Tibet’s struggle for survival has been mainly hogged by CIA operatives or by American writers drawn to the subject. Gyalo Thondup’s perspective on the cloak-and-dagger game Tibet briefly played with the CIA will remain the authoritative Tibetan account of this episode of the Tibetan struggle.

    • Arguing Against Evil

      For liberal hawks and neoconservatives, the idea of the Congress for Cultural Freedom is an appealing fantasy. It evokes the time at the beginning of the Cold War when intellectuals played a serious role in politics because the world seemed not just caught up in a battle of armies but in a battle of ideas. Beginning in 1950, it brought together a diverse array of thinkers who, under the rubric of anti-totalitarianism, agreed that the freedom to think and write was inviolable. Its raison d’etre was anti-Communism; it sought to reduce the influence of Communist and fellow-traveling intellectuals, first concentrating on Western Europe but later expanding all around the world. In the words of one of its historians, “It was America’s principal attempt to win over the world’s intellectuals to the liberal democratic cause.” In seeking to influence left-wing intellectuals, it steered away from conservative thinkers. In Europe and elsewhere it featured social democrats, Christian Democrats, and even dissident Marxists. In the United States, its most active boosters were liberals, like Arthur Schlesinger Jr. and Daniel Bell, and former Marxists moving in neoconservative directions, such as Sidney Hook. The CCF defended pluralism, democracy, and even socialism, so long as it was anti-Communist. (Even late in life, both Bell and Hook still thought of themselves as socialists, at least on economic questions.) It had a sophisticated publishing operation, amplifying voices critical of Communism. It arranged, for example, for the publication of the Yugoslavian ex-Communist Milovan Djilas’s The New Class, which argued that the Soviet Union was not in fact a classless society but one in which class privilege accrued based on proximity to the state bureaucracy. The CCF also operated a stable of high-quality literary and political magazines, among them Encounter in London, Der Monat in Germany, Jiyu in Japan, and Mundo Nuevo in Latin America.

    • Still Uninvestigated After 50 Years: Did the U.S. Help Incite the 1965 Indonesia Massacre?

      It is now fifty years since the so-called “G30S” or “Gestapu” (Gerakan September Tigahpuluh) event of September 30, 1965 in Indonesia, when six members of the Indonesian army general staff were brutally murdered.

    • Indonesian Genocide

      In light of these findings, it seems hypocritical for the US to constantly wag its finger at other nations for their human rights shortcomings when past US government have engaged in such horrific mass killings.

    • Iran’s Longstanding US-Inflicted Nightmare

      It began in August 1953 – replacing democratically elected Mohammad Mossadeq (Iran’s most popular politician at the time) with a generation of brutal US-installed Mohammad Reza Shah Pahlavi dictatorship.

      A 2013 declassified CIA document (marking the coup’s 60th anniversary) publicly acknowledged the agency’s involvement (Operation TPAJAX) – what’s been well-known for decades.

    • The crazy story of how Russia snuck a vast nuclear arsenal onto America’s doorstep

      Most stories about the Cuban Missile Crisis start with Oct. 16, 1962, when the president and his advisors were briefed on the missile sites on the island. A few start with Oct. 13, when the U-2 flight that photographed the sites took off. U-2 overflights would collect more information during the crisis along with other reconnaissance plans. After collecting all the information, U.S. intelligence agencies believed the Russians had smuggled nearly 10,000 troops onto the island.

    • Lessons from Tonkin and Libya: We Need a President Who Won’t Trick Us Into War

      Fifty-one years ago, an American president deceived the public about the true purpose of a U.S. military mission, ushering in a decade of foreign policy disasters. Unfortunately, this method of abusing democracy has continued, on a bipartisan basis, to the present day, when it is casting a shadow over U.S. policy in Syria.

      In August 1964, President Lyndon B. Johnson and his advisers deliberately misled Congress and the American people about the mission of two U.S. destroyers that were allegedly attacked off the coast of communist North Vietnam and their connection to U.S.-directed raids on nearby offshore islands. Their lie paved the way for U.S. bombing of North Vietnam and congressional passage of the administration’s Tonkin Gulf Resolution: a broadly worded measure that would soon facilitate Johnson’s escalation of the Vietnam War. A policy that began with an act of deceit about a U.S. military mission had awful and ill-considered consequences for Americans, Vietnamese and other southeast Asians, U.S. relations with the Soviet Union and China, and America’s global reputation. Many historians are convinced that a diplomatic settlement could have avoided most of this damage.

    • August 4, 1964: The Gulf of Tonkin ‘Incident’ Sparks American Escalation in Vietnam

      Fifty-one years ago today, the United States Navy reported that its ships had been attacked some miles off the shore of North Vietnam. Provocatively, the US ships were patrolling in areas where South Vietnam was conducting active operations against the North, prompting the latter, quite understandably, to perceive the Americans as participants in the hostilities. Torpedo boats approached within a few nautical miles of the USS Maddox, which responded with warning shots. The subsequent firefight killed four North Vietnamese sailors, destroyed several of their boats, and lightly wounded an American ship and a plane. Two days later, American ships again reported that they were under attack and for hours fiercely maneuvered and fired at North Vietnamese boats, two of which they claimed to have sunk. As it turned out, the American ships had only been picking up radar signals from their own equipment, chasing phantoms as Don Quixote had combated windmills. Regardless, President Lyndon Johnson seized on the incident as a pretext for bombing North Vietnam and drastically escalating American involvement in the war. The Gulf of Tonkin Resolution authorizing such action passed on August 7, 1964, with only two senators objecting: Wayne Morse of Oregon, a frequent Nation contributor, and Ernest Gruening of Alaska, managing editor of this publication in the early 1920s. In an editorial appearing in the first issue after the incident and the resolution, The Nation’s editors wrote, “The excessive retaliatory action the President saw fit to order brings us closer to the brink of World War III.” In the same issue, a former State Department official named John Gange wrote an essay titled “Misadventure in Vietnam: The Mix of Fact and Myth.”

    • Anti-Russian propaganda destroys Western journalism [says Kremlin propaganda]
    • Russia, Italy Can Restore Pre-Sanction Level of Relations – Farmers Union

      Dino Scanavino, the head of the Italian Confederation of Farmers (CIA), said that existing business relations between Italy and Russia are generally favorable, as Russian entrepreneurs are actively assisting their Italian colleagues in recovering losses.

  • Transparency Reporting

    • Snowden 2.0: Japanese Journalist Has Been Living in Moscow Airport for Two Months

      Japanese journalist Tetsuya Abo is pulling a Snowden – he’s been living in the transit section of Moscow’s Sheremetyevo airport for over two months now. The 36-year-old said in an interview that his stay is politically motivated – he does not want to go back home, and is requesting Russian citizenship instead.

    • Ling Jihua’s brother could become China’s Snowden: Duowei
    • China demands US repatriate businessman Ling Wangcheng
    • Former military contractor sentenced for stealing classified files [for doing what Petraeus did]

      A judge for the US District Court for the Southern District of Florida [official website] on Monday sentenced Christopher R. Glenn 120 months in jail and three years of supervised release for willful retention of classified national defense information [DOJ press release] under the Espionage Act [text].

    • FBI may pillory Hillary with email spillery grillery

      The FBI is investigating presidential candidate Hillary Clinton’s decision to use a private email account while presiding over the State Department.

      The Washington Post has reported that the FBI is digging into Clinton’s operation of a personal email server as part of her work as the US Secretary of State between 2009 and 2012.

    • To intelligence community, Clinton’s private email scheme is inconceivable

      Sounds like free association triggered by some of the stories making the rounds on the 24/7 news networks.

      There was the announcement that Israeli spy Jonathan Pollard will be paroled after serving the 30 years mandated by his “life” sentence in 1985. This is the same Jonathan Pollard who caused George Tenet to threaten to resign as CIA director when the idea of a pardon or commutation was suggested during the Clinton administration.

    • Keeping top secrets

      Here’s why Hillary Clinton may have broken the law

    • What everyone with a Top Secret security clearance knows – or should know

      The key issue in play with Clinton is that it is a violation of national security to maintain classified information on an unclassified system.

      Classified, secure, computer systems use a variety of electronic (often generically called TEMPESTed) measures coupled with physical security (special locks, shielded conduits for cabling, armed guards) that differentiate them from an unclassified system. Some of the protections are themselves classified, and unavailable in the private sector. Such standards of protection are highly unlikely to be fulfilled outside a specially designed government facility.

    • DOJ Inaction Against Hillary Proves of Selective Prosecution in the United States

      In April of this year, former CIA Director David Petraeus, one of the most accomplished military generals in our nation’s history, was prosecuted and sentenced to two years of probation plus a $100,000 fine for giving his biographer classified material while they were working on the book. What was lost in the shuffle is that his biographer was a Reserve Army Intelligence Officer, who herself possessed a Top Secret clearance, and that no classified materials were ever published or provided to anyone who didn’t have clearance.

      Mr. Petraeus’ plea agreement carried a possible sentence of up to a year in prison, and in court papers, prosecutors recommended two years of probation and a $40,000 fine.

      U.S. District Judge David Kessler, however, increased the fine, in his words to, “reflect the seriousness of the offense.”

    • Army, CIA Satisfied Nazi Spy Information Request

      The Army and CIA satisfied their obligations under the FOIA by releasing thousands of pages about a Nazi general turned U.S. spy, the D.C. Circuit ruled.

    • Is the Intelligence Community Inspector General Trying To Give Contractors Whistleblower Protections?

      Last week, McClatchy’s Marisa Taylor reported on two cases showing the new appeals process for whistleblower retaliation claims ordered by President Obama is now operational; in the cases of Army whistleblower Michael Helms and CIA whistleblower John Reidy, the Intelligence Community Inspector General, Charles McCullough, has bounced the appeals back to the agencies in question for re-review.

      That McCullough has chosen to bounce these two appeals back to the agencies is notable enough, because his commitment to whistleblower issues has never been apparent. Instead, McCullough has spent his time as IG conducting leak investigations. And last year, a complaint email sent to Daniel Meyer, who oversees whistleblower issues for the intelligence community, somehow got shared with the subject of the complaint. So McCullough’s record on these issues is less than stellar.

      But McCullough’s move is particularly interesting when you consider the details of the appeal of the second complainant, John Reidy.

    • German government fires prosecutor over treason charge against Internet blog
    • German justice minister fires chief prosecutor in treason row
    • Top German prosecutor fired after treason probe involvement

      Harald Range, Germany’s top prosecutor, was dismissed from his duties on Tuesday by Justice Minister Heiko Maas [official website] after Range accused the German government of obstructing his investigation against two German journalists. Range was interested in an investigation against the two journalists from the website Netzpolitik.org, which had reported on the expansion of surveillance of online communication within Germany’s domestic spy agency. Range received information from an independent expert explaining that the information the journalists received from an unknown source was legitimate and also a “state secret.” In an effort to prevent anymore embarrassment to the German government, Range, who is 67, was dismissed [Deutsche Welle report], despite his intentions to retire next year and be succeeded by Munich federal prosecutor Peter Frank. The treason probe became public news last week following a criminal complaint filed by the spy agency which also targeted the unknown source who dispersed the leaked documents.

    • Germany scores against the surveillance state

      It all went very fast. On Tuesday morning August 4, Germany’s chief federal prosecutor, Harald Range, was ordered by Justice Minister Heiko Maas to withdraw an independent expert from the investigation of two journalists from Netzpolitik. The investigator had concluded that leaked documents quoted by the news website amounted to a disclosure of a state secret, one of the required criteria to pursue a treason case. The prosecutor protested: “To meddle with an internal review on the basis that the results might be inopportune is an intolerable interference with the independence of the judiciary .” A few hours later on Tuesday evening Maas asked for the prosecutor to be granted early retirement. In plain words, Harald Range was sacked.

    • Lawmakers and bloggers named in German treason case

      Germany’s domestic spy agency named not just bloggers but also lawmakers in a criminal complaint that sparked a controversial treason probe, news weekly Der Spiegel said Friday.

    • How a treason case in Germany set off a political firestorm

      German Chancellor Angela Merkel’s well-deserved holiday from the euro-zone crisis was disturbed this week by a domestic scandal involving a debate over freedom of the press vs. the protection of classified information, as German Justice Minister Heiko Maas requested the dismissal of federal prosecutor Harald Range for his investigation of two journalists for treason. Maas said Merkel agreed with his decision.

    • Pressure Mounts for German Intel Agency Chief to Resign Over Treason Probe

      There are growing calls for the head of Germany’s domestic intelligence agency, Hans-Georg Maassen, to resign over the Netzpolitik affair, which has already claimed the scalp of the Federal Prosecutor Harald Range.

  • Environment/Energy/Wildlife

    • Idaho Huntress Defends Posting Photos with Giraffe (and Other Animals) She Killed on African Safari

      Minnesota dentist Walter Palmer went into hiding after he became the subject of international scorn for killing Cecil the lion in Zimbabwe. But another American is proudly advertising the game she has shot while on African safari – and thumbing her nose at her critics.

      “To me it’s not just killing an animal, it’s the hunt,” Sabrina Corgatelli, of Idaho, told the Today show on Monday.

      Corgatelli has been sharing photos on her Facebook page of her recent legal hunt in South Africa. On July 31 she reposted a picture of a massive giraffe she had killed.

    • In Zimbabwe, Cecil tells only part of the story

      When news of Cecil’s death first came out, many in Zimbabwe had never heard of the lion, said Fungai Machirori, a Zimbabwe-based journalist and social commentator.

    • Professional hunters in Zimbabwe court over killing of lions

      Two professional hunters have appeared in a Zimbabwean court, each accused in separate cases of helping Americans kill lions.

  • Finance

    • Contingent Faculty: Where Money Might Go in Higher Education

      Fifty years ago, more than 75% of college faculty members were full-time and had tenure or were on track to get it. Today, only a third are part of that elite group. Many of those doing the teaching at American universities are poorly paid, have no job security and limited benefits. Some have PhD’s but still qualify for government assistance to buy food.

    • Higher Education Debt Should Be Deductible, Rand Paul Says

      “You can’t just offer free education, but I think tying it to work and making it deductible is a good idea,” Sen. Rand Paul says at Republican presidential forum at St. Anselm College in Manchester, N.H.

    • Pornhub taught us to expect free porn — now, can it make us pay?

      Imagine, if you will, that there’s a restaurant that offers diners a free, unlimited buffet. For years they’ve encouraged their patrons to come in and gorge themselves at will, subtly implying that anyone who pays for food is an idiot. There’ve been rumors that this restaurant’s been able to keep the buffet going by stealing food from competing restaurants, but most patrons don’t care — and as the restaurant drives out its competition, or buys them out, eventually the objections die down.

    • George Osborne will miss £1tn export target warns British Chambers of Commerce

      The UK is the 11th largest exporter in the world, behind the likes of the US, China and Germany, according to the CIA World Factbook. And, according to the BBC, the country is also the second biggest exporter of services behind the US. But the business body has urged Cameron and Osborne to “open up markets” for firms and encouraged British businesses to up the skills of their workforce.

    • Donald Trump: “I pay as little as possible” in taxes
    • Explaining Donald Trump’s Rise With Economic Misinformation

      Everyone has heard about Donald Trump’s soaring poll numbers as the current leader in the race for the Republican presidential nomination. Many have also heard the explanation that he appeals to those who feel left behind by the economy. Unfortunately, the way the media often tell this story has little to do with reality.

      [...]

      Both parts of this are seriously misleading. First, it is not just non-college grads who have struggled since the turn of the century. Most college grads have seen little or no wage gains since then. The second part is wrong also, since wages for non-college grads had also been stagnant since 1980, so for them the experience of the last 15 years has not been “a marked departure from prior decades.”

    • Funny Money: CIA Counterfeiting in Poland

      Communism was relegated to the dustbin of history for many reasons, foremost among them were its warped economic policies. In places like Poland during the 1960s, foreigners with access to hard currency could easily game the system and do pretty well. David Fischer recounts how Polish-American retirees lived like kings in Krakow, the way the embassy had to pay “bail” for one American with what turned out to be counterfeit zlotys made by the CIA, and how Western diplomats were able to travel abroad very cheaply.

    • Neocolonialism: How it is conquering our country today.

      It is important to note that forces of neo-colonialism are ably conquering our country today.

    • Nazi-Fighter Grynberg Girds for Swiss Last Stand Against Big Oil

      U.S. courts have been good to Jack Grynberg, netting him hundreds of millions of dollars in disputes with some of the world’s largest oil and gas producers since 1984.

      Despite that fortune, the 83-year-old oilman says he’s fed up with America’s legal system and has taken his biggest suit yet — a battle over profits from Kazakhstan’s most valuable oil fields — to Switzerland.

  • PR/AstroTurf/Lobbying

    • Video Games, Predictive Programming, and the 21st Century Skinner Box

      The game focuses upon two branching military campaigns: One by the Marine Corps in an unnamed Middle Eastern country (situated on the in-game map directly atop modern Syria) run by a cartoonish dictator generically referred to as none other than “Al-Asad,” the other by a British SAS team combating “ultranationalist Russians” who are supporting this thinly veiled tin-pot Arabic dictator. After a patriotic romp through Central Asia, “Al-Asad” predictably (predicatively?) uses “Weapons of Mass Destruction” on his own people, leading to a climactic final battle at a Russian nuclear site in a bid to avoid World War III.

    • AUDIO: ‘Left, Right & Center’: Republican Media Stunts, NSA Data Dump and Cecil the Lion
    • Chris Christie’s Revealing, Easy to Spot Lie About His 9/11 Credentials

      A majority of Americans in opinion surveys say they disapprove of the NSA’s collection programs. A Pew Research poll this May found a full 74 percent of respondents did not believe privacy should be sacrificed for safety. But Paul is one of only a few Republican candidates (Texas Sen. Ted Cruz is another) who has fought against the NSA program, and hawkish Republican candidates like Christie see attacking Paul on that as an effective way to build support among the Republican base, illustrating how out of touch that base can be on some of the important issues of the day.

    • Chris Christie So Obsessed With Increasing Surveillance He Pretends He Was A Fed On 9/11 Even Though He Wasn’t
    • Christie Lied about 9/11 to Try to Shut Down Paul’s Opposition to Dragnet Spying

      Never mind that most US Attorneys don’t, themselves, go before the FISC to present cases (usually it is people from the National Security Division, though it was OIPR when Christie was US Attorney), never mind that the name of the court is the “Foreign Intelligence Surveillance Court.

      The real doozie here is Chris Christie’s claim that he “was appointed U.S. attorney by President Bush on September 10th, 2001.”

      [...]

      Update: In an absolutely hysterical attempt to rebut the clear fact that he was not nominated when he said he was, Christie’s people said he was informed he would be on September 10 at 4:30 (as I suggested was likely). But the rest of the explanation makes it clear they hadn’t even done a background check yet!

    • The GOP Debates Showed How Fox News Enforces Republican Orthodoxy

      At Thursday night’s GOP debates in Cleveland, moderators Bret Baier, Bill Hemmer, Megyn Kelly, Martha MacCallum and Chris Wallace peppered the party’s 17 presidential candidates with tough questions. But several of those questions had one key thing in common: They hit candidates for deviating from Republican orthodoxy.

    • Jeb Bush launches online store with hipster

      The “My Dad” tee, offered for $25, is emblazoned with the quote, “My dad is the greatest man I’ve ever known, and if you don’t think so, we can step outside,” obviously referring to Bush’s father, former President George H.W. Bush. Bush referenced the shirt in one of the more colorful moments coming from a New Hampshire forum earlier this week.

    • Sen. Graham moved up in Air Force Reserve ranks despite light duties

      Of all the candidates vying to become the nation’s next commander in chief, none has spent as much time in the military as Sen. Lindsey O. Graham. The South Carolina Republican retired from the Air Force this summer after a 33-year career, including two decades as a reservist while serving in Congress.

    • Politically Unapologetic: What about Bernie Sanders?

      Before his rally on May 26th, his overall poll rating average in the Democratic race was at 10.6%. It now hovers around 20-25%, which is causing concern for the Clinton camp since her unfavorable rating is rising. The coming weeks will really tell if Sanders can catch Clinton, given that Joe Biden doesn’t jump into the race last minute.

  • Censorship

    • Singapore teen blogger launches another attack

      A teenage Singaporean blogger recently jailed after publishing an online video that criticised the late Lee Kuan Yew and was deemed to have been obscene and insulting to religious feelings, has launched another tirade, condemning the lack of freedom of speech in the city-state.

    • Amos Yee, Singapore’s Teen Dissident, Is Back With a Crude, Hilarious Video

      The moptopped Singaporean blogger Amos Yee is out of prison after having served 53 days in jail for posting a video criticizing the late Singaporean leader Lee Kuan Yew. And if Singaporean authorities thought a prison term might quiet the precocious teen, they were sorely mistaken: Yee is out with a new, obscene, and often hilarious video answering his critics and attacking Singapore’s lack of civil liberties.

    • Are Americans falling in love with censorship?

      Classifying books according to their suitability for different age ranges would be “ill-advised”, “unworkable” and would “raise serious concerns about censorship”, American free-speech campaigners have said, in the wake of a poll claiming that more than seven in 10 US adults believe a rating system similar to that used for films should be applied to books.

    • The little-known history of secrecy and censorship in wake of atomic bombings

      The atomic bombing of Hiroshima and Nagasaki 70 years ago, is one of the most studied events in modern history. And yet significant aspects of that bombing are still not well known.

    • The Fallout Over University Of Illinois Censorship Of War On Gaza Continues

      The chancellor of the University of Illinois at Urbana-Champaign (UIUC), who was involved in firing Professor Steven Salaita over tweets he sent about Israel’s 2014 assault on Gaza, has announced her resignation yesterday. The announcement comes as a federal judge refused to dismiss Salaita’s lawsuit against the university for violating his free speech.

    • That’s Not Funny!

      Three comics sat around a café table in the chilly atrium of the Minneapolis Convention Center, talking about how to create the cleanest possible set. “Don’t do what’s in your gut,” Zoltan Kaszas said. “Better safe than sorry,” Chinedu Unaka offered. Feraz Ozel mused about the first time he’d ever done stand-up: three minutes on giving his girlfriend herpes and banging his grandma. That was out.

    • Truth hurts: censorship in the media

      In September 1945, less than a month after Japan’s surrender ending World War II and ushering in the U.S.-led Occupation, Gen. Douglas MacArthur, supreme commander for the Allied powers, began cracking down on alleged Japanese war criminals. Over the next three months, hundreds of politicians, military men, bureaucrats and industrialists would be issued arrest warrants for their role in leading Japan to, and through, the war.

      Among those who found themselves under suspicion as Class-A, -B, or -C war criminals were senior members of the press. One of the most notorious was Matsutaro Shoriki, owner of the Yomiuri Shimbun newspaper.

      “He was one of the most important journalists who actively propagated the Axis cause before the war and energetically supported it through the war,” read a secret report on Shoriki compiled by Occupation officials when he was arrested on Dec. 12,, 1945.

    • Bangladesh must act against impunity

      Index on Censorship deplores the killing of blogger Niloy Chakrabarti in Dhaka, Bangladesh, and calls on the authorities to investigate the murder and ensure that those responsible are found and brought to justice.

      “We strongly condemn Niloy Chakrabarti’s brutal murder,” said Index’s senior advocacy officer Melody Patry. “We fear the death toll will increase if the authorities fail to take action to find and punish those responsible. Freedom of expression is in danger and Bangladesh must do more to protect writers online and offline.”

      Chakrabarti, who wrote under the pen name Niloy Neel, is the fourth secular blogger to be murdered since the start of the year. A member of Bangladesh’s Science and Rationalist Association, he was attacked in his home in Dhaka.

    • Memoir focuses on late librarian’s work on censorship in occupied Japan

      Subjected to censorship by the Allied Forces for four years starting in the fall of 1945, the materials bear censorship markings ranging from check-in and examination dates to deletions, suppression and other changes.

    • Govt blocks 857 porn websites, sparks debate on Internet censorship
    • India’s Porn Ban Reversal Is Essentially Bullshit
    • India orders clampdown on internet porn, sparks censorship debate
    • Isis play Homegrown sparks censorship debate after NYT cancels it for ‘quality reasons’
    • NYT radicalisation play axed amid cries of censorship
    • Man sentenced to 30 years of jail for insulting the Thai monarchy on Facebook
    • On your mind: Realpolitik defines US/Thai relationship

      Webster’s dictionary defines realpolitik as a system of politics based on a country’s situation and its needs, rather than on ideas about what is morally right and wrong. No doubt, US government officials would deny that realpolitik defines American policies, but it is hard to see any clear moral imperative with regard to that country’s relationship with Thailand.

      The moral face the US shines on Thailand, urging for example, that the Thais take steps to end human trafficking and restore democratic rule, is two-faced.

    • Google challenges France over ‘right to be forgotten’
    • Cameron’s censorship silences debate

      British Prime Minister David Cameron is a calculated hypocrite on the question of Muslim radicalisation. In July, in the wake of the attack on British and other tourists in Tunisia, he announced a counterstrategy to stop the spread of extremist movements such as the Islamic State.

      His four-pronged strategy includes delegitimising the ideology that underpinned these movements – especially those that argue for an Islamic caliphate – and emboldening the Muslim community to counter extremism from within. For Cameron: “The adherents of this ideology are overpowering other voices within Muslim debate, especially those who are trying to challenge it.”

      Yet, in a self-defeating move, his government has prevented one of the most prominent voices countering radicalisation of the Islamic State variety from entering Britain: Na’eem Jeenah, a South African.

    • Why the Rise of Decentralized Media is the End of Censorship

      In the buzzing world of altcoins, blockchains, and crypto-startups, if you aren’t decentralized these days, you’re probably still considered a bit of a dinosaur. But in the world of electronic publishing, legacy opinion remains, that media should be submitted to a central authority, subjected to editorial policies and stored on servers in ever larger data-centres.

    • How users of ‘Chinese Twitter’ Sina Weibo are beating state censorship

      If you were scrolling through Twitter and saw a post saying “someone is playing hide-and-seek again. These people can grass-mud horse,” you might be more than a little mystified.

      But if, say, you were Chinese, didn’t think much of your government, and knew something about fooling its stringent online censors, you may well understand the coded message.

    • Now playing in Israel: film censorship

      Right-wing politicians from the culture minister down are getting screenings canceled. The fear is that filmmakers will start censoring themselves.

    • A Quiz for the West’s Great Free Speech Advocates and Supporters of Anjem Choudary’s Arrest

      As we all know ever since the inspiring parade in Paris following the Charlie Hebdo attack, “free speech” is a cherished and sacred right in the West even for the most provocative and controversial views (of course, if “free speech” does not allow expression of the most provocative and controversial views, then, by definition, it does not exist). But yesterday in the U.K., the British-born Muslim extremist Anjem Choudary, who has a long history of spouting noxious views, was arrested on charges of “inviting support” for ISIS based on statements he made in “individual lectures which were subsequently published online.”

  • Privacy

    • Appeals court rules warrant required for cellphone tracking

      A federal appeals court in Virginia has ruled that police must obtain a search warrant to obtain records about cellphone locations in criminal investigations.

      The American Civil Liberties Union said Wednesday’s decision by the 4th U.S. Circuit Court of Appeals conflicts with two other federal appeals court rulings and increases the possibility that the U.S. Supreme Court will take up the issue.

    • When Your Records Are Not Yours

      This dubious “third-party doctrine,” enunciated before the Internet existed and mobile phones became ubiquitous, was crucial to the outcome of a case decided by the U.S. Court of Appeals for the 11th Circuit in May. The court said an armed robber named Quartavius Davis had no constitutional grounds to object when the FBI linked him to crime scenes with cellphone location data that it obtained without a warrant.

    • Commentary: Christie wasn’t ‘Born to Run’

      Going back to Christie’s big moment during the debate, it’s completely predictable he’d be in favor of continuing the government’s bulk collection of phone data. After all, he’s a former prosecutor and professed 9/11 hugger (which garnered an amusing eye roll from Paul). I find myself more on Paul’s side of the argument, but the public surprisingly backs renewal of the government’s program of data mining. Plus, I wanted to draw a cartoon about Christie, not the NSA, which I’ve offered my opinion on many, many times.

    • Rand Paul And Chris Christie Spar Over NSA Surveillance

      Last night, Fox News hosted one of the most ridiculous, deeply entertaining GOP Presidential debates I’ve ever had the pleasure of playing a drinking game to. In the midst of the Moscow Mules, Lagunitas and amazing Trump-isms came a pretty heated (and unexpected) shouting match between former Gov. Chris Christie and Sen. Rand Paul regarding the spying capabilities of the NSA.

    • WATCH: Chris Christie vs. Rand Paul on NSA Surveillance

      New Jersey Governor Chris Christie, a former federal prosecutor, and Kentucky Senator Rand Paul, a Libertarian who has fought against widespread government surveillance of American citizens, sparred over how to best protect the United States from terrorists.

    • This Group May Stop the NSA From Tapping the Internet’s Backbone

      It’s taken seven years of legal wrangling, but one group of pro-privacy activists are hoping an appeals court will finally declare a critical part of the National Security Agency’s spying apparatus unconstitutional.

      The Electronic Frontier Foundation (EFF) has been challenging the NSA’s bulk data collection program in court since 2008, largely running on whisteblower testimony from Mark Klein, a former AT&T technician who alleges the NSA inserted technology into the internet company’s infrastructure that allowed it to collect and analyze the data.

    • EFF Finally Gets To Ask Appeals Court To Look At 4th Amendment Question Over NSA’s Backbone Sniffing

      It’s taken many years, but one of the EFF’s longstanding cases against the NSA has finally reached an important milestone: exploring the 4th Amendment question raised by the NSA tapping the internet backbone. This is part of the Jewel v. NSA case that has been going on for years. Back in February (after a lot of procedural back and forth on other issues), the district court rejected the 4th Amendment argument, basically toeing the government’s “but… but… national security!” line. Not surprisingly, the EFF disagreed with the court and appealed to the 9th Circuit appeals court.

    • A New Milestone: Appeals Court to Consider NSA’s Mass Seizures and Searches on the Internet Backbone

      One of the most outrageous ways that the government has violated our Fourth Amendment rights against general seizures and searches has been through its system of tapping into the fiber optic cables of America’s telecommunications companies. The result is a digital dragnet—a technological mass surveillance system that subjects millions of ordinary Americans to the seizure and searching of their online correspondence, conversations, web searches, reading and other activities as they travel across the Internet. This tapping isn’t just about metadata—it includes full content searches of Americans’ communications, at the very least any international communications involving a website or a person who is abroad.

    • How communication surveillance eats away fundamental human rights

      There are several intelligence agencies around the world, many of them headquartered in the US, which make use of the vastly developed technology of the digital age to spy on millions of people, who are not even considered terrorism suspects. The most (in)famous agency as such would be the NSA (National Security Agency), which uses a pretty smart foundation of ‘legal’ activities to justify its actions.

      The issue is that NSA activities are anything but legal. They manage to claim that they operate within the frame of law because of the FISC (Foreign Intelligence Security Court), which interprets the actual law into what would be considered legal for NSA’s actions. In other words, when the NSA goes searching for information about whomever it wants, there is usually no warrant, as the person is usually not even a suspect.

    • The NSA Playset: 5 Better Tools To Defend Systems

      The NSA ANT Catalog is a 50-page classified document listing technology available to the NSA Tailored Access Operations by the ANT division to aid in cyber surveillance. Most documents are described as already operational and available to U.S. nationals and members of the Five Eyes Alliance – Australia, Canada, New Zealand, the United Kingdom and the United States. The document was first revealed in an article by security researchers in the German newspaper Der Spiegel, which released the catalog to the public on December 30, 2013.

    • NSA-grade encryption for mobile over untrusted networks

      The only term being thrown around government more than “2016 elections” these days is “cybersecurity,” particularly following a rash of damaging and high-profile data breaches. With that focus on protecting information top of mind in agencies, USMobile officials hope to find a ready market for their commercial app, which lets government workers use their personal smartphones for top-secret communications.

    • Security Sense: Encryption is a necessity that cannot feasibly be compromised

      It’s always fascinating to watch how security concepts are communicated to the general public and by “fascinating”, I mean it’s sometimes horrifying. There is no more poignant an example than that of encryption and I found the piece from CNN a few days ago on how encryption is a growing threat to security to be the absolute epitome of disinformation. It would be understandable if the general public walked away from reading and watching this piece with the distinct impression that encryption was the root of all evil. Why? Apparently “because terrorism”.

    • NSA’S EPIC Fail: Spy Agency Pays Lawyers That Sue It

      The NSA and FBI are major contributors to EPIC — the Electronic Privacy Information Center. But their “donations” aren’t exactly voluntary.

      A hefty chunk of EPIC’s legal budget is taken from the pockets of the very agencies it sues, each time a federal judge agrees that the government was wrong to keep the information secret.

    • Chris Christie actually wants to expand the NSA’s spying powers

      Sen. Rand Paul and New Jersey Gov. Chris Christie traded barbs Thursday night over the National Security Agency’s bulk collection of U.S. phone records. In the heat of the Republican presidential debate, Christie got the last word in — but who actually came out of the exchange on top?

    • NSA and GCHQ have been spying on you for 50 years

      Starting in 1966, the project leapt into life when the NSA fronted the money for the GCHQ to build a station in Bude, Cornwall, capable of intercepting satellite communications from Intelsat, the first commercial communications satellite network.

    • Snowden leaks confirm existence of ECHELON

      NSA documents obtained by whistleblower Edward Snowden confirm the existence of ECHELON, a secret surveillance network spying on satellite communications. Set up by the US and the UK in the 1960s, ECHELON was the precursor of today’s global dragnet.

    • Uncovering ECHELON: The Top-Secret NSA/GCHQ Program That Has Been Watching You Your Entire Life

      If history is written by the victors, government surveillance agencies will have an awfully long list of sources to cite.

      Domestic digital surveillance has often seemed to be a threat endured mostly by the social media generation, but details have continued to emerge that remind us of decades of sophisticated, automated spying from the NSA and others.

      Before the government was peering through our webcams, tracking our steps through GPS, feeling every keystroke we typed and listening and watching as we built up complex datasets of our entire personhood online, there was still rudimentary data to be collected. Over the last fifty years, Project ECHELON has given the UK and United States (as well as other members of the Five Eyes) the capacity to track enemies and allies alike within and outside their states. The scope has evolved in that time period from keyword lifts in intercepted faxes to its current all-encompassing data harvesting.

    • Investigative journalism is vital for democracy as state surveillance increases

      For those inclined to think that the series of surveillance scandals and leaks over the past two years are unlikely to have much of an impact, it is worth recalling that, up until a little over 30 years ago, the British government denied the very existence of a spying organisation called GCHQ. As investigative journalist Duncan Campbell described in the Intercept yesterday, in a compelling account of a life spent chasing Britain’s spies out of the shadows, in the 70s and 80s even talking about GCHQ, let alone investigating and reporting on it, could get you followed, arrested and jailed.

    • How UK journalist revealed mass GCHQ snooping decades before Snowden

      It took more than 25 years for Duncan Campbell to finally publish confirmation of the Echelon project, completing a story he began breaking in 1988.

      The scoop, released on The Register and The Intercept this week, capped off some 40 years of investigative journalism on British and American spy agencies, Campbell having begun his career by revealing the existence of Government Communications Headquarters (GCHQ).

    • Global spy system ECHELON confirmed at last – by leaked Snowden files
    • USA Monitors 90 Percent of Global Communications

      The National Security Agency (NSA) espionage program Echelon remains active, which controls 90 percent of global communications, revealed today the intercept digital site.
      In an article in the Internet portal, the British journalist Duncan Campbell made the history of this monitoring system, also known as Project P415, and sets filtered by former contractor NSA Edward Snowden, now a refugee in Russia elements.

      The materials confirm that the mechanism was created in 1966, shortly after the first communication satellites began operating in earth orbit.

      Overall network received the codename Frosting and consisted of two subprograms: Transient directed against communications satellite of the Soviet Union, and Echelon, which focused on electronic signals Western powers.

    • Global Five Eyes Spy System ‘Bigger Than Ever’

      In an exclusive interview with Sputnik, the respected UK investigative reporter Duncan Campbell has said a western-led mass surveillance system developed in the 1960s is “bigger than ever, much more powerful and a critical component” of mass surveillance.

    • UK ECHELON journalist: “Snowden proved spies need accountability”

      Legendary investigative journalist Duncan Campbell describes his life of being kidnapped by the London Metropolitan Police’s Special Branch, being surveiled and harassed by UK spies and ministers, and reveals the identity of the whistleblower who leaked the details of ECHELON to him.

      Campbell’s article is accompanied by never-released Snowden docs that demonstrate the full scope of ECHELON surveillance, and traces the lineage of journalists and whistleblowers who took huge personal risks to reveal corruption, criminal wrongdoing, and secrecy among spies and their masters in government.

    • Biden calls Abe to apologize after WikiLeaks details alleged NSA spying on Tokyo

      U.S. Vice President Joe Biden apologized to Prime Minister Shinzo Abe on Wednesday for “causing trouble,” after documents released last week detailed alleged spying by the U.S. National Security Agency on the government in Tokyo, a top Japanese official said.

      Chief Cabinet Secretary Yoshihide Suga said the phone conversation between Biden and Abe came about at Washington’s request.

      Suga declined to comment on whether Biden admitted the U.S. had spied on Japanese officials and companies over a period that started in 2006, as alleged in documents released last week by anti-secrecy group WiliLeaks.

    • NSA Spying on Japan: The Fallout

      Last Friday, the WikiLeaks website unveiled evidence that the U.S. National Security Agency is conducting espionage operations in Japan. On July 31, WikiLeaks published “Target Tokyo,” a list of 35 Top Secret NSA targets in Japan and five NSA reports on intercepts relating to U.S.-Japan relations, trade negotiations, and sensitive climate strategy.

    • Stealing valuables and saying sorry

      WikiLeaks also released a statement issued by Julian Assange, where he said that the documents showed clearly the vulnerability of the Japanese government as officials had been worrying in private about how much or how little inside information they would let Washington know.

    • Tokyo Expects US Explanations on NSA Spying on Japanese Government

      Tokyo is waiting for the United States to clarify situation with the revelations concerning the US National Security Agency (NSA) spying on the Japanese government and businesses, Japan’s Chief Cabinet Secretary Yoshihide Suga told journalists.

    • Backgrounder: Japan’s deafening silence over NSA spying

      The Japanese government has remained relatively silent since the WikiLeaks website published documents Friday showing the U.S. National Security Agency (NSA) has spied on the Japanese government and Japanese companies.

      The documents, dated from 2007 to 2009, include five NSA reports — four of which are marked top-secret — that provide intelligence on Japanese positions on international trade and climate change.

      WikiLeaks also posted an NSA list of 35 Japanese targets for telephone intercepts including the Japanese Cabinet Office, the Bank of Japan, the country’s finance and trade ministries, and major Japanese trading companies.

    • Japan’s Prime Minister Demands US Vice President Investigate NSA Spying

      Japanese Prime Minister Shinzo Abe asked US Vice President Joe Biden to investigate allegations that the United States spied on top Japanese government and corporate officials, a Japanese government spokesman said on Wednesday.

    • Japan NSA Backlash to Raise Asian Demands on Pacific Trade Pact

      The latest WikiLeaks revelations documenting close National Security Agency (NSA) spying on Japan will provoke countries the United States is courting for the Trans Pacific Partnership (TPP) free trade agreement to increase their demands, experts told Sputnik.

    • NSA conducted commercial espionage against Japanese government and businesses

      New leaked documents published by Wikileaks show that the US spy agency conducted surveillance operations against Japan’s top government officials, prioritizing finance and trade ministers, as well as the Japanese central bank and two private-sector energy companies.

      There’s no conceivable connection between this long-term surveillance — which included wiretaps — and national security.

    • Japan PM calls for probe into WikiLeaks claims of US spying

      Japanese leader Shinzo Abe told US Vice President Joe Biden he would have “serious concerns” if WikiLeaks claims Washington spied on Japanese politicians were true, and called for an investigation, a top official said Wednesday.

      Tokyo’s Cabinet spokesperson Yoshihide Suga said Biden had apologised to the Japanese prime minister in a telephone call for “causing troubles”, without confirming the spying claims.

    • Japan’s Shinzo Abe warns Joe Biden over WikiLeaks spy claims

      Prime Minister Shinzo Abe has told US Vice-President Joe Biden he will have “serious concerns” if WikiLeaks claims that Washington spied on Japanese politicians are true, calling for an investigation.

    • US Spying Scandal Might Seriously Undermine Trust In Abe’s Government

      Commenting on the recent WikiLeaks revelations concerning US National Security Agency spying on the Japanese government, a Japanese politician told Sputnik that it might seriously undermine trust in the current government of Prime Minister Shinzo Abe and damage Japanese-American relations; however, another political analyst has a different opinion.

    • Japan PM wants probe into WikiLeaks claims

      Prime Minister Shinzo Abe has told US Vice President Joe Biden he will have ‘serious concerns’ if WikiLeaks claims Washington spied on Japanese politicians are true, calling for an investigation.

      Tokyo’s Cabinet spokesman Yoshihide Suga said Biden had apologised to the Japanese leader in a telephone call for ‘causing troubles’, without confirming the spying claims.

      WikiLeaks said on Friday it had intercepts revealing years-long spying by the US National Security Agency (NSA) on Japanese officials and major companies.

    • U.S. VP speaks with Japanese PM after website exposed spying

      The Wikileaks website on Friday posted U.S. National Security Agency (NSA) reports and a list of 35 Japanese targets for telephone intercepts, including the Japanese Cabinet Office, the Bank of Japan, the country’s finance and trade ministries, and major Japanese trading companies.

      According to the website, the eavesdropping dated back to 2007, a year after Abe’s first term began, and one report from telephone intercepts of senior Japanese officials could have been shared with Australia, Canada, Britain and New Zealand — the U.S. intelligence partners.

    • NSA spying allegations should not shake trust in Japan-U.S. alliance
    • Japan Premier Urges Biden To Probe Reported US Spying

      Japanese Prime Minister Shinzo Abe called on US Vice President Joe Biden on Wednesday to investigate allegations by WikiLeaks that Washington spied on the Japanese government and companies, Tokyo said.

    • Germany Could Create NSA-Like Mass Surveillance Program

      According to a legal fellow at Electronic Frontier Foundation, the German authorities seem to have plans for a mass surveillance program that parallels the NSA program.

    • NSA Announces New GC, Cites Big Law Experience

      On Monday, the National Security Agency tapped retired Milbank partner Glenn Gerstell as its new General Counsel.

    • Glenn Gerstell Named NSA General Counsel; Michael Rogers Comments
    • NSA lawyer with cyber cred, former FBI CIO moves and more

      Zalmai Azmi has taken the reins as president and chief operating officer of the IT consulting firm IMTAS, the firm announced Aug. 1.

      A native of Afghanistan who served as the FBI’s CIO from 2004 to 2008 and led the bureau through an IT transformation, Azmi said he is “pleased and excited” to be taking the new role at IMTAS. Azmi has previously served as CEO of Nexus Solutions, a senior vice president at CACI and CIO for the Executive Office for United States Attorneys.

    • NSA Ordered to Look Harder for Records

      A federal judge dismissed most, but not all, of the National Security Agency’s requests to dismiss a reporter’s FOIA request on federal surveillance of judges.

      Jason Leopold, formerly with Al-Jazeera America and now with Vice News, filed two FOIA requests for NSA and FBI “surveillance of federal and state judges.”

      The NSA and the Department of Justice’s Office of Legal Counsel responded that they had no such records.

      They sought summary judgment and dismissal. Leopold claims they failed to conduct adequate searches.

    • Watchdog Demands Rules on FBI Media Spying

      The Department of Justice refuses to reveal its unpublished rules for spying on journalists, and the Freedom of the Press Foundation demands a look at them, in Federal Court.

    • Web’s random numbers are too weak, researchers warn

      The process of generating a good random number begins with the server translating mouse movements, keyboard presses and other things a machine does into a data stream of ones and zeros. This data is gathered in a “pool” that is regularly called on for many security functions.

    • South Korea pushes policy for public sector to use local servers and storage

      South Korea is moving to implement a policy that will have the public sector give preferential treament to local storage and server vendors over foreign counterparts starting next year to boost the market.

    • A License to Kill Innovation: Why A.B. 1326—California’s Bitcoin License—is Bad for Business, Innovation, and Privacy

      A.B. 1326 (Dababneh) is a bill that would require “virtual currency businesses” to apply for and obtain a license in order to offer services in California, and it includes significant fees and administrative hurdles. Unfortunately, the bill’s language is so vague that it’s unclear what companies are, in fact, “virtual currency businesses.” So in spite of carve-outs for smaller companies and for software developers who don’t exercise control over the currency, the proposal threatens the future of virtual currency experimentation and innovation in the state.

    • Privacy Badger graduates to v1.0, protects users from spying ads

      Have you ever faced the following dilemma? Your favourite website is equipped to detect whether you’re using an ad blocker, obviously you have one installed, and then you get a pop up or toolbar appear asking “Would you please add us to your ad blocker’s whitelist? Ads help keep this site running.”, obviously at this point you feel a bit bad and go ahead to disable the ads on that site. The issue you have now is that you just let an ad provider plant a cookie on your computer that will track you around the internet reporting what you’re interests are.

    • EFF Releases Privacy Badger To Try To Stop Online Tracking
    • US Government OPM Cyber Breach Much Worse Than Reported

      When the OPM breach was first discovered, the number of people said to be affected was four million. This figure quickly rose to 22 million, though the Solutionary report states this is probably a very misleading figure. The issue is that the records accessed were not only those of government employees, but also included personal data about family members and even friends, and so the number of people affected is likely to be closer to 132 million, and even this could be conservative. However the authors of the report state it will probably never be known just how big the breach was, but it is likely to have been “the biggest loss of private information ever.”

    • Office of Personnel Management and CFPB violating American’s privacy
    • Fourth Circuit adopts mosaic theory, holds that obtaining “extended” cell-site records requires a warrant

      The new case creates multiple circuit splits, which may lead to Supreme Court review. Specifically, the decision creates a clear circuit split with the Fifth and Eleventh Circuits on whether acquiring cell-site records is a search. It also creates an additional clear circuit split with the Eleventh Circuit on whether, if cell-site records are protected, a warrant is required. Finally, it also appears to deepen an existing split between the Fifth and Third Circuits on whether the Stored Communications Act allows the government to choose whether to obtain an intermediate court order or a warrant for cell-site records.

    • Is the Google Balloon experiment to spy on Sri Lanka & violate our personal freedoms?

      It was recently announced that Sri Lanka had been chosen to launch the Google balloon-based internet services under a project titled ‘Google Loon Project’. Anything being rolled out for the first time and free should raise concern. Why ‘experiment’ on Sri Lanka moreover why Sri Lanka or does it align to Kerry’s success in regime change in Sri Lanka and pax Americana goal? It is not so much as the idea to provide internet coverage to the whole of Sri Lanka (though users will still have to pay to their local service provider) but the ability that the owners of the balloon have over a sovereign country and whether local laws or even international can cover the range of spying/surveillance that can be done! Associated with the project and representing the US intelligence community is Dr. Bhavani Thuraisingham Executive Director of Cyber Security Research and Education Institute which is sponsored by George Soros’s Raytheon. The most important unanswered question is why was such a project kept secret from the Sri Lankan public, why were associated stakeholders not involved to report on the pros & cons and moreover why was the fundamental rights of privacy of the people violated. None of us wish to have the entire country under a blanket of US surveillance and it is wrong to have enforced such a project overlooking the national security concerns and the privacy of the people of Sri Lanka. Even the business community will undoubtedly have reservations. Will the world’s 1.8billion internet users like to have their privacy invaded too?

    • North Korea: I was ‘monitored’ while I studied there

      Alessandro Ford picked a gap year involving the world’s most secretive and repressed country.

    • Manuel Contreras, head of Chile’s spy agency under Pinochet, dies aged 86

      Contreras, who headed agency that kidnapped, tortured and killed thousands, died while serving 500 year sentence for crimes against humanity

    • Hated and feared former Pinochet-era Chilean spy chief dies at age 86
    • Gen. Manuel Contreras, leader of Chile’s feared spy agency, dies at 86
    • Manuel Contreras, Chilean Spy Chief, Dies at 86

      Gen. Manuel Contreras, Chile’s intelligence chief during the military dictatorship of Gen. Augusto Pinochet, died on Friday in the military hospital in Santiago while serving 526 years of multiple prison terms for human rights violations. He was 86.

    • Augsto Pinochet dies at the age of 86
    • Manuel Contreras, Chile’s feared ex-spy chief, dies at 86
    • Chile’s feared secret police chief dies at age 86
    • Tor users: Do not expect anonymity and end-to-end security

      The Tor network is similar to a door lock: It works well, until a determined individual wants to get in. Get details on what Tor is and what it is not.

    • The judge committed fouls, too

      All espionages are a fact of life in today’s world, but none is morally acceptable, much less superior, to others.

    • Seeing a history of all your movements is now easier for you, but harder for the feds

      When you meet a new someone who makes your heart flutter and the feeling is mutual, and the two of you have spent significant parts of your life in the same city at the same time, there is usually a conversation within the first few weeks of the relationship trying to figure out why you didn’t meet sooner. You talk about the places you hung out and usually realize that you frequented the same coffee shop or bar or music venue, and you wonder if you were ever there at the same time. Were your phones to offer up their full history of where they’ve been, you could line up your personal tracking maps and find out the exact moment you might have encountered one another earlier in life.

    • Quoted: Carly Fiorina wants Apple, Google to ‘tear down cyberwalls’
    • Carly Fiorina calls on Apple, Google to provide greater access for FBI
    • Jonathan Pollard & Edward Snowden: How the US Hates Tattletales

      It seems clear that Edward Snowden and Julian Assange can look forward to extended vacations once their feet touch US soil. Like Pollard, Snowden’s charges fall under the US Espionage Act where defendants are not allowed to raise a defense. But unlike Mr. Pollard, Edward Snowden and Julian Assange has the internet and social media at their disposal to gain US and possibly worldwide sympathy. US Administration officials would probably not risk a drop in approval ratings and throw Snowden and Assange in Pollard’s vacated cell, or would they?

    • US Government Spies on EU Companies to Control European Industries

      Data collection is only a small part of the NSA’s intelligence tasks. The main goal of the US’ intelligence agencies is to control politicians and managers in Europe, former head of the Austrian Federal Office for the Protection of the Constitution, Gerd Polli, said in an interview with DWN.

    • Next-gen secure email using internet’s own DNS – your help needed

      A group of researchers from the US government and dot-com operator VeriSign are working on a new system for secure email: using domain names.

      Highlighting the problems and security holes associated with current mail systems, the team from the National Institute of Standards and Technology (NIST), a subset of the US Department of Commerce, argues that by using a new set of security protocols built around the domain name system, it is possible to provide a much higher level of security in electronic messages.

    • Chicago and Los Angeles have used ‘dirt box’ surveillance for a decade

      The Los Angeles and Chicago police departments have acquired “dirt boxes” – military surveillance technology that can intercept data, calls and text messages from hundreds of cellphones simultaneously, as well as jam transmissions from a device, according to documents obtained by Reveal.

    • BlackLivesMatter Activists: Targets of US Surveilence

      The Obama administration’s spy agencies have been keeping track of the movements, communications and activities of the new crop of Black activists. Although not surprising, the recent reports should give rise to “new strategies and tactics to exchange information among groups, and new modalities to circumvent infiltration and, ultimately, government sting operations.”

    • Edward Snowden: White House Rejects Pardon Plea
    • Views of the News: NSA seeks vast cyber deterrent

      U.S security officials recently stressed a need for a massive cyberweapon to provide a deterrent against ongoing and future cyber attacks by foreign powers.

      Admiral Michael Rogers—National Security Agency (NSA) director and head of U.S. Cyber Command—said it will require such a counterstrike capability to deter enemy hackers trying to penetrate our security data systems.

      Rogers cited the nuclear deterrence strategy of the Cold War missile race as relevant for defense against recent attacks on U.S. government and business databases.

    • China’s Cyberspying Is ‘on a Scale No One Imagined’–if You Pretend NSA Doesn’t Exist

      But how can that be? China is accused of obtaining personal information about 20 million Americans, federal employees and contractors, and that’s a big deal. But the US’s NSA, according to documents leaked by whistleblower Edward Snowden, processes 20 billion phone calls and internet messages every day. The NSA’s unofficial motto for years has been “Collect It All.”

      The article notes that the US has its own “intelligence operations inside China”—but pretends these are purely defensive, referring to “the placement of thousands of implants in Chinese computer networks to warn of impending attacks.”

  • Civil Rights

    • Major psychological association bans cooperation with CIA following torture scandal

      The American Psychological Association made a nearly unanimous decision today to bar psychologists from participating in national security interrogations, The New York Times reports. The decision was a response to an independent report that came out last month, detailing how top APA officials and psychiatrists participated in the CIA’s torture program during the Bush administration.

    • Everyone Agrees the Senate’s Cyber Bill is Terrible. So Why Is It Moving?

      What do numerous privacy groups, civil liberties organizations, open government advocates, free market proponents, technologists, and the Department of Homeland Security have in common? Deep concern about the Cybersecurity Information Sharing Act, or “CISA,” a bill expected to come to a vote this week in the Senate.

    • No Immunity For Cops Who Sent A SWAT Team To A 68-Year-Old Woman’s House For Threats Delivered Over Open WiFi Connection

      Earlier this year, we covered the story of Louise Milan, a 68-year-old grandmother whose house was raided by a SWAT team (accompanied by a news crew) searching for someone who had made alleged threats against police officers over the internet. Part of the probable cause submitted for the warrant was Milan’s IP address. But the police made no attempt to verify whether any resident of Milan’s house made the threats and ignored the fact that the IP address was linked to an open WiFi connection.

    • Despite Recent Court Rulings, Getting Behind The Wheel Is Pretty Much Kissing Your 4th Amendment Protections Goodbye

      There’s been more good news than bad concerning the Fourth Amendment recently. In addition to the Supreme Court’s ruling that searches of cellphones incident to arrest now require a warrant, various circuit court decisions on cell site location info and the surreptitious use of GPS tracking devices may see the nation’s top court addressing these contentious issues in the near future. (The latter still needs to be addressed more fully than the Supreme Court’s 2012 punt on the issue.)

    • Spy Software Gets a Second Life on Wall Street

      A wave of companies with ties to the intelligence community is winning over the world of finance, with banks and hedge funds putting the firms’ terrorist-tracking tools to work rooting out employee misconduct before it leads to fines or worse.

    • Here’s the CIA’s Letter to Congress Saying the Agency Was Quitting the Torture Business

      Three months after President Barack Obama was sworn into office, then-CIA Director Leon Panetta sent a letter to congressional oversight committees informing them that the agency was changing its torture policies.

      But the CIA would still play a significant role in the interrogation of terrorism suspects, according to a top-secret letter Panetta wrote [pdf below] that was recently declassified by the CIA and obtained exclusively by VICE News in response to a Freedom of Information Act (FOIA) request.

      Panetta’s letter was sent to lawmakers just days after the Senate Intelligence Committee voted to begin an investigation into the efficacy of the CIA’s detention and interrogation program. It also followed an executive order Obama signed as one of his first acts as president outlawing the use of so-called “enhanced interrogation techniques” and shuttering the CIA’s network of black site prisons where detainees were held.

    • Eight top ex-CIA officials rebut ‘torture report’ with their own book

      In a bid to bring the “rest of the story” to the nation about the CIA’s detention and interrogation of al Qaeda terrorists, eight former top CIA officials, including three directors, are publishing a rebuttal to the sensational Senate Democratic “torture report.”

    • Eight top ex-CIA officials launch bid to rebut ‘torture report’
    • Former CIA Officials Launch Smear Campaign Against Senate Torture Report

      In an attempt to unveil what was really behind the scenes of the Al Qaeda terrorist interrogations conducted by the CIA, eight former high-ranking CIA officials, including three former directors, are ready to publish a response to last year’s incendiary US Senate “torture report”, according to the Washington Examiner.

    • CIA Torture Practices ‘Nothing New’ – Former Official

      Former US State Department official William Blum does not consider the recent statements about torture used by CIA under a program of “enhanced interrogation” as “sensational.”

    • New Effort to Rebut Torture Report Undermined as Former Official Admits the Obvious

      Former top CIA officials planning a major public-relations campaign to rebut the Senate torture report’s damning revelations have found themselves undermined by one of their own.

      Eight former top officials wrangled by Bill Harlow — the former CIA flak who brought us the CIASavedLives.com website after the Senate report was issued last December — are publishing a book in the coming weeks titled Rebuttal: The CIA Responds to the Senate Intelligence Committee’s Study of Its Detention and Interrogation Program.

    • Former CIA Official Admits Use of Torture during Bush Era

      A former top CIA official acknowledged that the US intelligence agency tortured terror suspects after the September 11, 2001 terrorist attacks under a program called “enhanced interrogation.”

    • Intelligence professionals continue rebutting torture allegations

      The book by the former CIA officers likely will be met with denunciations from Feinstein and others who accuse the U.S. of torturing Islamic terrorists. When former CIA Deputy Director Michael Morell published, “The Great War of Our Time,” earlier in 2015, Feinstein responded to his defense of CIA treatment of terrorists by issuing both a press release and a 54-page “fact check” sheet through her official senatorial website. Feinstein condemned the book through both statements and reiterated her accusation that Americans were guilty of torture.

    • Gitmo is a “Rights-Free Zone”: Dissident Psychologists Speak Out on APA Role in CIA-Pentagon Torture

      We broadcast from Toronto, Canada, site of the annual convention of the largest group of psychologists in the world, the American Psychological Association. Ahead of a vote on a resolution to bar psychologists from participating in national security interrogations, the Psychologists for Social Responsibility hosted a town hall meeting. We feature highlights.

    • APA bans member psychologists from taking part in ‘national security interrogations’
    • US Psychologists’ Association Bans Members from Colluding in US Torture

      In what may seem like a no brainer, the American Psychological Association has voted to ban any member from participating in government torture programs. The decision follows a report which details the organization’s role in justifying “enhanced interrogation.”

    • Psychology Association Votes to Bar Members From Participating in Interrogations

      The American Psychological Association (APA) voted nearly unanimously on Friday in favor of a resolution prohibiting its members from participating in national security interrogations. Retired Col. Larry James, the former top Army intelligence psychologist at Guantanamo, had the only dissenting vote, Democracy Now reports.

    • Psychologists vote not to participate in US torture

      The American Psychological Association (APA) voted overwhelmingly on Friday to prohibit members from participating in interrogations conducted by United States intelligence agencies at locations deemed illegal under international law.

    • American Psychological Association Bans Members From Participating In Interrogations

      Following revelations earlier this year that American Psychological Association (APA) officials actively colluded with the CIA’s enhanced interrogation program, the group voted nearly unanimously Friday to prohibit psychologists from participating in future national security interrogations.

    • Psychologists Approve Ban on Role in National Security Interrogations
    • Psychologists ban interrogation role [same piece]
    • James Risen: In Sharp Break from Past, APA Set to Vote on Barring Psychologists from Interrogations
    • Psychology group votes to ban members from taking part in interrogations
    • First Step for Reform: APA Votes to Bar Psychologists From Colluding in Torture
    • How the American Psychological Association lost its way
    • The Brutal Toll of Psychologists’ Role in Torture
    • When Psychology Is Used For Torture
    • Send in the psychologists to study the psychologists: Salutin

      The American Psychological Association is holding its annual convention this weekend in Toronto. It’s a huge organization, about 100,000 members — academics, researchers, practitioners. This is the seventh time in 37 years that they’re meeting here, a frequency or repetition compulsion that may be worthy of research and, possibly, therapy. Canadians belong to it, the way the Blue Jays belong to the American League. We’re in it but not always of it.

    • Breaking: APA Votes to Bar Psychologists from Nat’l Security Interrogations After Torture Scandal

      By a nearly unanimous vote, the American Psychological Association’s Council of Representatives voted today in Toronto to adopt a new policy barring psychologists from participating in national security interrogations. Retired Col. Larry James, the former top Army intelligence psychologist at Guantánamo, cast the sole dissenting vote.

    • The American Psychological Association Comes Out Belatedly Against ‘Enhanced Interrogation’

      Torture is just torture when you get rid of the pseudo-science.

    • American psychologists promise not to collude in torture

      In 2005 the top brass in the American Psychological Association changed its code of ethics.

    • CIA Torture Prisons Were Probably Worse Than You Can Imagine

      The Romanian prison was code named “Bright Light” and was part of a secret network of prisons operated by the U.S.

    • Tyler S. Drumheller | CIA officer, 63

      But he was best known publicly for his role in exposing the extent to which a key part of the administration’s case for war with Iraq had been built on the claims of an Iraqi defector and serial fabricator with the code name Curveball.

    • Tyler Drumheller, 63, CIA career of 26 years

      But he was best known publicly for his role in exposing the extent to which a key part of the administration’s case for war with Iraq had been built on the claims of an Iraqi defector and serial fabricator with the fitting code name “Curveball.”

      In contrast to Hollywood’s depiction of spies as impossibly elegant and acrobatic, Drumheller was a bulky, rumpled figure who often seemed oblivious to the tufts of dog hair on his clothes.

    • CIA Figure in Hillary Clinton Email Scandal Dies at 63
    • Author of Benghazi memos sent to Clinton dies after cancer battle

      Specifically, he vocally criticized the agency’s trust in an Iraqi defector code-named Curveball, who gave faulty intelligence that Saddam Hussein had developed laboratories for biological weapons. The assertions played a major role in the George W. Bush administration’s public case for invading Iraq in 2003.

      Drumheller also criticized the Bush administration’s claims that Iraq was buying yellowcake uranium from Niger, which it used as evidence to support the claim that Hussein was developing weapons of mass destruction.

    • CIA interrogation tactics can be used at home [not about torture]
    • Obama: The Courage to Say ‘We Were Wrong’

      Most of Obama’s letter contained information we already know. One of his first acts in office was to sign an Executive Order ending the CIA’s illegal detention and interrogation program. He is working to close Guantanamo, an unenviable task that raises as many questions as it solves but still must be done.

    • As the child of Latvian immigrants, I know that torture is un-American and should be banned: Ivars Balkits (Opinion)

      Nothing is more un-American than the support of torture by our government. That is the axiom I grew up with as a first-generation American born to Latvian emigres. In the final days of World War II, my parents, now deceased, fled the totalitarian Latvian Soviet Socialist Republic because they feared they would be tortured or murdered by the NKVD, as the Soviet internal police were known, if not summarily deported to Gulag labor camps.

    • CIA: OK, So Maybe We Work With Bad Guys

      The CIA is willing to overlook some of its shadier partners’ human rights records if they can still get the goods, according to agency Director John Brennan.

      In a letter sent to a trio of lawmakers and provided to The Huffington Post, Brennan expanded on the agency’s controversial relationships with less-than-desirable characters, offering an unusually candid glimpse into the spies’ liaison partnerships.

      The letter, a response to Sens. Ron Wyden (D-Ore.) Martin Heinrich (D-N.M.) and Mazie Hirono (D-Hawaii), sought to clarify public remarks made by Brennan earlier this year. The unclassified response was dated Thursday.

    • White House criticized for not filling watchdog post at CIA

      More than six months after the CIA inspector general resigned, President Obama has yet to nominate a replacement, prompting mounting concerns on Capitol Hill that the delay may be affecting sensitive internal investigations — including a probe into an errant drone strike in Pakistan that killed American hostage Warren Weinstein, sources told Yahoo News.

    • Sept. 11 Defendants in Limbo Thwart Obama’s Guantanamo Ambitions
    • The true story of an ex-cop’s war on lie detectors

      Doug Williams used to give polygraph exams. Now he’s going to prison for teaching people how to beat them

      There was something odd, Doug Williams recalls, about the clean-cut young man who came to see him on Feb. 21, 2013. When Brian Luley had called two weeks earlier, he’d introduced himself as a deputy sheriff in Virginia applying for a job with U.S. Customs and Border Protection. To get the job, Luley needed to pass a polygraph test, and there were “a couple of reasons” he thought that might be a problem.

    • OPINION: What justice for the people of Chad?

      On 20 July 2015, the trial of former Chadian President Hissène Habré began in Senegal. The trial reflects many of the tensions afflicting international justice. Habré, who is charged with crimes against humanity, torture, and war crimes, relating to the death of an alleged 40,000 people between 1982 and 1990, denounced the court as a colonial project before being forcibly removed from the courtroom. The trial was subsequently postponed until 7 September, for Habré’s defence counsel to review court files.

    • Donald Trump: “Waterboarding doesn’t sound very severe”

      Donald Trump opened the door to torturing terrorism suspects if he’s elected president, telling ABC News Sunday that waterboarding “doesn’t sound very severe” given the barbarism of ISIS.

    • More than 80% of the thousands held at the Chicago police’s ‘black site’ were black

      About 8.5% of those held at the site were white. According to the 2010 census, Chicago’s population is 32% non-Hispanic white, 33% black, and 29% Hispanic (of which 13.5% identify as racially white) .

    • A Letter From Africa to #BlackLivesMatter

      When you say Black Lives Matter do you mean just Black American lives? What about the tens of thousands of black lives in Cuba that have been lost due to the covert war and the economic embargo still being waged against Cuba by the US government?

      Or what about the black lives that were lost when the UN over saw the starvation deaths of 250,000 “black” Somalis during the worst drought and famine in 60 years from 2010-2012, deaths that were predicted when UNICEF, headed by former senior foreign policy advisor to Barack Obama, Anthony Lake, budgeted less than 10 cents a day to feed the Somali refugees under their care?

      Do Black Lives Matter when the CIA and their capos in the human trafficking mafia in East Africa sends hundreds of Eritrean migrants to their deaths in rickety boats on the Mediterranean Sea (the Eritrean government continues to demand that the UN convene hearings so the reams of evidence they have on the CIA’s role in these crimes can be exposed to international scrutiny)?

      Do these Black lives matter just as much as Black American lives?

  • Internet/Net Neutrality

  • Intellectual Monopolies

    • Names

      • Anti-Piracy Group Hits Indie Creators For Using the Word ‘Pixels’

        An anti-piracy firm working for Columbia Pictures has hit Vimeo with a wave of bogus copyright takedowns just because people used the word ‘Pixels’ in their video titles. Several indie productions are affected, including an art-focused NGO, an award-winning short movie and a royalty free stock footage company.

      • No Air for Jordan: Michael Jordan Loses Fight over Marks in China

        The dispute began in 2012 when Michael Jordan took the sports brand Qiaodan Sports to court, alleging the misuse of his name and several other marks, such as the number 23 (used by him during his tenure in the NBA) and the Jumpman logo (derived from a photoshoot with Nike, incorporating Mr Jordan’s often unique and flamboyant dunk poses) that is associated with his own Air Jordan brand. At first instance his claim was denied, and Mr Jordan subsequently appealed that decision to the High People’s Court.

    • Copyrights

      • BitTorrent to RIAA: You’re ‘barking up the wrong tree’

        The Recording Industry Association of America (RIAA) sent a letter to BitTorrent last week asking the company to help stop copyrighted infringement of its members’ content. Brad Buckles, RIAA’s executive vice president of anti-piracy, asked BitTorrent CEO Eric Klinker to “live up to” comments made by former chief content officer Matt Mason.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

Further Recent Posts

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts