TechrightsSearch results for 'moglen' (page 1 of 13) http://techrights.org Free Software Sentry – watching and reporting maneuvers of those threatened by software freedom Tue, 10 Jan 2017 14:35:36 +0000 en-US hourly 1 http://wordpress.org/?v=3.9.14 Links 12/11/2016: Core Infrastructure Initiative Supports Reproducible Builds, Temer’s Assault on FOSS http://techrights.org/2016/11/12/temer-assault-on-foss/ http://techrights.org/2016/11/12/temer-assault-on-foss/#comments Sat, 12 Nov 2016 16:22:31 +0000 http://techrights.org/?p=96700 This great search was powered by Search Unleashed.
Help to remove this message by getting the site owner to support this software.

… Discuss Software Freedom

Software Freedom Law Center, the pro-bono law firm led by Eben Moglen, Professor of law at Columbia Law School and the world’s foremost authority on Free and Open Source Software law held its annual fall conference at Columbia Law School, New York on Oct. 28. The full-day program featured technical and legal presentations on Blockchain, FinTech, Automotive FOSS and GPL Compliance by industry and community stalwarts.

The Linux Foundation’s Core …

]]>
http://techrights.org/2016/11/12/temer-assault-on-foss/feed/ 0
Links 7/11/2016: NES Classic Linux Computer http://techrights.org/2016/11/07/nes-classic-linux-computer/ http://techrights.org/2016/11/07/nes-classic-linux-computer/#comments Tue, 08 Nov 2016 00:18:44 +0000 http://techrights.org/?p=96639

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Stop searching for projects and start searching for bugs

    GitHub has a powerful search engine where you can customize your search in a variety of ways. The easiest way to search is by issue label.

    A lot of open source projects label their issues to conveniently track them, using labels like beginner, easy, starter, good first bug, low hanging fruit, bitesize, trivial, easy fix, and new contributor.

    You can further narrow down your search based on the programming language you’re comfortable with, by adding language: name to your search query. For example, here are all issues labeled as “beginner” in JavaScript.

  • ‘Open source’ is not ‘free software’

    In the open source universe, using terms such as FLOSS (Free/Libre and Open Source Software) is common and represents a casual conflation of the terms open source and free software, which are often used interchangeably. I would be remiss if I didn’t also admit that I have been guilty of same. I won’t be doing that anymore—or at least I’ll try not to—for a simple reason: Using the terms interchangeably is dangerous to the goals of free software and open media advocates (read “anti-DRM”). To continue this practice is to undermine beliefs that are fundamental to free software and associated movement.

  • RPG Open Source Horse Pulls IBM i Community Plow

    The RPG development community is shrinking. I don’t mean because old programmers are riding into the sunset. I’m talking about collaboration and its ability to guide development that benefits the community by addressing the challenges of next generation applications for IBM midrange shops. Not that a collaborative open source culture is thriving here. But it could and it should. There are efforts to get this under way. And that will figuratively shrink the community.

  • Events

  • Web Browsers

    • Chrome Crushing It In The Browser Wars While Edge Continues To Sputter

      Despite all the effort Microsoft is expending in getting Internet users to try out and stick with its Edge browser, Chrome continues to the popular choice. Even worse for Microsoft, Chrome’s popularity is growing—it now accounts for more than half of all desktop browser usage and has nearly double the market share of Edge and Internet Explorer combined.

      Market research firm Net Applications has Chrome sitting pretty with a 54.99 percent share of the desktop browser market, up from 31.12 percent at this moment a year ago, while Internet Explorer and Edge combine for 28.39 percent and Firefox stuck at around 11 percent. Even more interesting is that when Windows 10 launched to the public at the end of July 2015, Chrome had a 27.82 percent share of the market while Internet Explorer still dominated the landscape with a 54 percent share. Now the script has flipped.

    • Chrome

      • Google’s Chrome Hackers Are About to Upend Your Idea of Web Security

        In a show of hacker team spirit in August of last year, Parisa Tabriz ordered hoodies for the staff she leads at Google, a group devoted to the security of the company’s Chrome browser. The sweatshirts were emblazoned with the words “Department of Chromeland Security,” along with Chrome’s warning to users when they visit insecure websites that leave them open to surveillance or sabotage: a red padlock crossed out with an X.

      • Gopass, a Chrome extension for Pass

        Last week I treated myself to some hardware upgrades for my desktop, which will be my main workstation from now on. After installing Ubuntu Gnome, I was pleasantly surprised to find that most of my favorite applications from OSX have a Linux version.

        One application that does not have a native Linux client is 1Password, my (now ex-) password manager. Luckily, there’s Pass.

  • SaaS/Back End

  • Databases

    • Open-source database PostgreSQL powering GOV.UK portal

      The UK Government Digital Service (GDS) has been running PostgreSQL for one year now to power the GOV.UK portal. This open-source database system hosts the central content store underlying the portal, its Content Management System (CMS), and its internal publishing API.

  • Education

    • Hungary seeks nationwide, open source eLearning tool

      Municipalities in Hungary should be able to use modern, web based eLearning tools to train their staff. To make this possible, Hungary’s State Treasury is looking for a service provider to help them run the open source Moodle eLearning solution.

  • BSD

    • FreeBSD 11.0

      There were definitely some attractive features in FreeBSD 11.0. I especially enjoyed the changes to the system installer. The ability to set up UFS and ZFS through a series of guided steps was a welcome feature. I also really appreciate that the installer will allow us to enable certain security features like PID randomization and hiding the processes of other users. Linux distributions allow the administrator to set these options, but they often require digging through documentation and setting cryptic variables from the command line. FreeBSD makes enabling these features as straight forward as checking a box during the initial installation.

      I also like how pkg has progressed. I think it has become faster in the past year or two and handled dependencies better than it did when the new package manager was introduced. In addition, FreeBSD’s documentation is as good as ever, though I feel it has become more scattered. There were times I would find what I wanted in the Handbook, but other times I had to switch to the wiki or dig through a man page. The information is out there, but it can take some searching to find.

      Other aspects of running FreeBSD were more disappointing. For example, I had hoped to find boot environments working and accessible from the boot menu. However, progress seems to have reversed in this area as switching boot environments prevented the system from loading. There were some other issues, for example I was unable to login from the graphical login screen, but I could access the Lumina desktop by signing into my account from the command line and launching an X session.

      Hardware was a weak point in my experiment. FreeBSD did not work on my desktop machine at all in BIOS mode and failed to boot from installation media in UEFI mode. When running in a VirtualBox environment, the operating system did much better. FreeBSD was able to boot, play sound and run smoothly, but screen resolution was limited, even after VirtualBox modules had been installed and enabled.

      Perhaps my biggest concern though while using FreeBSD 11.0 was that I could not update the base operating system, meaning it would be difficult to keep the system patched against security updates. Even once I had manually created a /boot directory to fix the boot environment creation issue, freebsd-update and freebsd-version continued to fail to detect the running kernel. This leaves the system vulnerable and means our best chance for keeping up with security updates is to manually install them from source code, not an ideal situation.

      All in all, FreeBSD 11.0 does have some interesting new features, but it also has several bugs which make me want to hold off on using the operating system until a point release has been made available to fix the existing issues.

  • FSF/FSFE/GNU/SFLC

  • Public Services/Government

    • The People’s Code – Now on Code.gov

      Over the past few years, we’ve taken unprecedented action to help Americans engage with their Government in new and meaningful ways.

      Using Vote.gov, citizens can now quickly navigate their state’s voter registration process through an easy-to-use site. Veterans can go to Vets.gov to discover, apply for, track and manage their benefits in one, user-friendly place. And for the first time ever, citizens can send a note to President Obama simply by messaging the White House on Facebook.

      By harnessing 21st Century technology and innovation, we’re improving the Federal Government’s ability to provide better citizen-centered services and are making the Federal Government smarter, savvier, and more effective for the American people. At the same time, we’re building many of these new digital tools, such as We the People, the White House Facebook bot, and Data.gov, in the open so that as the Government uses technology to re-imagine and improve the way people interact with it, others can too.

    • People’s Code: The U.S. Government Delivers Numerous Open Source Projects

      When it comes to the U.S. government, most people’s eyes are trained on the Presidential race, and if yours are, you may have missed the substantial work promoting open source software that the government is doing. For example, The Office of Management and Budget recently mandated in a lengthy memo that under the final Federal Source Code policy, federal agencies will have to share internally developed code with each other and release at least 20 percent of their code to the public.

      Now, the government has launched an update of its website, Code.gov, aimed at housing key open source projects.

    • Code.gov is the US government’s open-source software hub
  • Openness/Sharing/Collaboration

    • Open Access/Content

      • Deep Dive: Open Access and Transforming the Future of Research

        EFF works to inform the world about breaking issues in the world of technology policy and civil liberties. And one of our best ways of communicating with our friends and members is through our nearly-weekly newsletter, EFFector. Last week, we sent out a very special EFFector: a deep dive, single-issue edition that got into the nitty-gritty of open access and research. To keep the conversation going, we are publishing it here on the Deeplinks blog as well.

Leftovers

  • Health/Nutrition

    • East African Nations Agree Declaration Promoting Regional Pharma Sector Investment

      The three-day conference brings together key stakeholders from EAC Partner States including Ministries of Health, Finance and Industry, National Medicines Regulatory Agencies (NMRAs), National Procurement Agencies (NMPAs), AU-NEPAD Planning and Coordinating Agency, World Health Organization (WHO), United Nations Conference on Trade and Development (UNCTAD), United Nations Industrial Development Organization (UNIDO) and the private sector (local and international pharmaceutical manufacturers) as well as international development partners and investors among others.

    • Indian Generic Pharma Warns Against Government Caving To US Pressure On Data Exclusivity

      The Indian Drug Technical Advisory Board meeting on 7 November is expected to discuss a measure that could lead to opening the way to a 10-year data exclusivity period for originator pharmaceutical companies in India, according to the Indian Pharmaceutical Alliance. The alliance submitted a letter to the advisory board to warn against consequences on public health of data exclusivity if the Indian government “succumbs to” pressure by the United States.

      In a letter to the Indian Drug Technical Advisory Board dated 27 October, D G Shah, secretary general of the Indian Pharmaceutical Alliance (IPA), explained why data exclusivity, which extends market exclusivity, would delay access to cheaper versions of the medicines.

    • WHO Makes Headway In Hepatitis C Treatment Access Campaign

      A leading cause of liver cancer and cirrhosis, chronic infection by hepatitis C virus (HCV) affects more than 80 million people worldwide, 85% of whom live in low (13%) and middle (72%) income countries. Around 15% of Egypt’s population, for example, is infected – one of the world’s highest prevalence rate – while it is estimated that 12 million people in India have hepatitis C.

      Nearly 700 000 people are killed by hepatitis C yearly, where preventive vaccines are lacking.

      And this occurs at a time when at least 1.2 million people in Japan and three million Americans suffer from hepatitis C, while the infection is a major European public-health challenge (between 0.4% and 3.5% of the population in different EU Member States), as the most common single cause of liver transplantation.

  • Security

    • Free security is the only security that really works

      There are certain things people want and will pay for. There are things they want and won’t. If we look at security it’s pretty clear now that security is one of those things people want, but most won’t pay for. The insane success of Let’s Encrypt is where this thought came from. Certificates aren’t new, they used to even be really cheap (there were free providers, but there was a time cost of jumping through hoops). Let’s Encrypt make the time and actual cost basically zero, now it’s deployed all over. Depending who you ask, they’re one of the biggest CAs around now, and that took them a year? That’s crazy.

    • SQLi, XSS zero-days expose Belkin IoT devices, Android smartphones

      Research director Scott Tenaglia and lead research engineer Joe Tanen detailed the vulnerabilities during their ‘Breaking BHAD: Abusing Belkin Home Automation devices’ talk at the Black Hat Europe conference in London last Friday.

      The zero-day flaws specifically relate to Belkin’s smart home products and accompanying Android mobile application, which is used to wirelessly control the home automation devices.

      The first flaw, a SQL injection vulnerability, enables would-be hackers to inject malicious code into the paired Android WeMo smartphone app, and thus take root control of the connected home automation device.

  • Defence/Aggression

    • Evil Russian Propaganda from the Evil Russian Invaders

      The BBC World Service was founded by the Foreign and Commonwealth Office and funded by them directly for six decades, until a cosmetic change last year. Its specific purpose is to spread British values and the British view of the world abroad. It specifically, on its dozens of different national services, gives an opportunity to dissident voices who cannot get on their mainstream media. The Americans spend hundreds of millions annually on outfits like RFE/RL to do the same. Yet when the Russians do precisely the same thing on a much smaller scale, for example by enabling you to listen to me, this is portrayed as evil propaganda.

      Fortunately we have the Henry Jackson Society to defend you from it. The Henry Jackson Society, supported by Liam Fox, Jim Murphy and pretty well every other right wing enthusiast you can name, is of course a great believer in free markets. And its sense of the market has detected that its old product of a constant stream of Islamophobia is becoming dated, and currently buyers want Russophobia. Whatever your phobia, the Henry Jackson Society will have some to sell you, so here we have their new Manual of Russophobia.

    • Do Wars Make Us Safer? The People Aren’t Feeling It

      A new poll from an unlikely source suggests that the US public and the US media have very little in common when it comes to matters of war and peace.

      This poll was commissioned by that notorious left-wing hotbed of peaceniks, the Charles Koch Institute, along with the Center for the National Interest (previously the Nixon Center, and before that the humorously named Nixon Center for Peace and Freedom). The poll was conducted by Survey Sampling International.

    • Yemen: The man who lost 27 family members in an air strike

      The war in Yemen had been going on for just two months when Abdullah al-Ibbi sat down for a late-night meal with his two wives, their children and grandchildren. It was then, in an instant, that his world shattered.

      The air strike that hit Abdullah’s home killed 27 members of his family. He survived, but only learnt about their deaths six weeks later when he woke up in a hospital bed.

      “If I didn’t fear God, I would have committed suicide at that moment,” he recalls. “I would have jumped off a building… but God gave me patience.”

      The family had lived in the Houthi rebel stronghold of Saada, which has come under intense aerial bombardment by the Saudi-led coalition supporting the exiled President Abdrabbuh Mansour Hadi.

      The air strike hit their home at around midnight, says Abdullah. Rescuers with bulldozers worked until morning to retrieve the bodies buried under the rubble. Seventeen were children – the youngest, Abdullah’s granddaughter, Inas, was one month old.

      Three of his adult sons also made it out alive.

  • Environment/Energy/Wildlife/Nature

    • NOAA 2017 Tide Tables are Available

      NOAA 2017 tide tables are now available. NOAA tide tables have been in production for 150 years and are used by both commercial and recreational mariners for safe navigation. Printed tide tables provide users with tide and tidal current predictions in an easy-to-read format for particular locations. NOAA’s Center for Operational Oceanographic Products and Services produce these tide tables on an annual basis.

    • Rose Aguilar on Standing Rock Reporting, Michelle Chen on Samsung Labor and Environmental Abuses

      This week on CounterSpin: In their feature “What to Know About the Dakota Access Pipeline Protests,” Time magazine told readers that “environmental activists say” the pipeline would contribute to man-made climate change; “they insist that fossil fuels—including the vast reserves in the Bakken Shale—need to be kept in the ground to protect the world from the worst effects of climate change.”

    • Adidas is making a million pairs of its much-anticipated sneakers created from recycled ocean plastic

      For more than a year, Adidas has been teasing the release of a shoe made almost entirely from discarded plastic fished out of the oceans. It revealed its first prototype of the sustainable sneaker, created in collaboration with environmental organization Parley for the Oceans, in June 2015. Finally, in mid-November, the first mass-produced quantity—7,000 pairs, to be exact—will go on sale, and according to Adidas, that’s just the start.

      “We will make one million pairs of shoes using Parley Ocean Plastic in 2017—and our ultimate ambition is to eliminate virgin plastic from our supply chain,” Eric Liedtke, an Adidas executive board member responsible for global brands, said in a Nov. 4 statement.

    • Green Party Candidate In 33rd Senate Race Feels Real Issues Have Been Ignored By Major Parties

      Colin Bennett is no stranger to running as a Green Party candidate in the 33rd Senate District. He ran and lost in 2004, 2006, 2008 and 2014. The only race he missed in the past decade was in 2012, when he ran for Congress.

      Bennett believes that the issue of climate change is too important not to keep trying to find a way to awaken people to the dangers involved, and if that involves running for office, then so be it, he says.

      “Literally, I feel the world is on the precipice of disaster,” said Bennett. “I’m doing everything in my power to turn that around.”

      Bennett, 37, lives in Westbrook, runs a small used bookstore in Deep River called Bennett’s Books, and has other jobs to make ends meet. In the summer, Bennett works for Sail Connecticut Access, a nonprofit operation that gives people with special needs the opportunity to go sailing.

      The campaign across the 33rd Senate District, which stretches down the Connecticut River Valley from Portland to Old Saybrook, has been dominated by disputes between Republicans and Democrats over Donald Trump and Gov. Dannel P. Malloy.

    • French Greens pick MEP Jadot for 2017 presidential race

      French MEP Yannick Jadot will be the Green candidate for French president next year after winning a second-round party primary Monday.

      Jadot won 54 percent of the vote against Michèle Rivasi, who also sits in the Greens/European Free Alliance group in the European Parliament.

      Jadot, a 49-year-old former Greenpeace activist, won the most votes in the primary’s first round in late October with support of 36 percent. Around 13,000 party members and supporters cast their ballot either by mail or online (for French nationals abroad) last week in the second-round of voting.

  • Finance

    • NYT’s Kristof Blames Poverty on Too Many TVs, Not Too Little Money

      Times columnist Nicholas Kristof, who was awarded a Pulitzer Prize in 2006 for giving “voice to the voiceless” on international social justice issues, wrote an op-ed in yesterday’s Times (10/30/16) arguing for increased government action on poverty. His calls for heightened attention to economic deprivation, though, were buried in a larger message that was familiar to longtime Kristof-watchers: that the poor aren’t actually poor because they lack enough money, but because of their own moral failings.

    • CEO’s message a jolt to IT workers facing layoffs

      IT workers in the infrastructure team at Health Care Service Corporation (HCSC) were notified recently of their layoff. They expect to be training replacements from India-based contractor HCL. The layoff affects more than 500 IT workers, according to the insurance firm.

      This familiar IT story began a little differently. A few days before employees were notified in mid-October of their layoff, HCSC CEO Paula Steiner talked about future goals in an internal, company-wide video.

      Steiner’s comments weren’t IT-department-specific, but the takeaway quote by one IT employee was this: “As full-time retiring baby boomers move on to their next chapter, the makeup of our organization will consist more of young and non-traditional workers, such as part-time workers or contractors,” said Steiner in the video.

      What Steiner didn’t say in the employee broadcast is that some of the baby boomers moving “on to the next chapter” are being pushed out the door.

    • What is a blockchain, and why is it growing in popularity?

      Last year, Ripple Labs, creator of the virtual currency XRP, was fined $0.7 million (~£540,000) by the US Financial Crimes Enforcement Network for violating regulations concerning money laundering.

      Some observers cite this as the moment cryptocurrencies shaved off their startup hipster beards, put on a tie, and went mainstream. Being fined by a regulator means that you’re part of the financial services industry at last.

      Given that the first and most famous cryptocurrency, Bitcoin, was launched back in 2009, it has taken the wider industry a relatively long time to warm to it. But now suddenly everyone is talking about Bitcoin’s underlying blockchain technology as a disruptor of potentially massive proportions: Sweden is trialling a new land registry that uses a blockchain, dozens of startups spanning numerous sectors are poking around at possible uses, and importantly policy makers such as the European Parliament have voted in favour of a more hands-off approach towards blockchain tech regulation.

    • Dutch campaigners gather signatures to derail EU-Canada trade deal

      Activists in the Netherlands have gathered almost two-thirds of the signatures needed to lay the groundwork for a referendum on Europe’s free trade deal with Canada, which they say overly favours the interests of multinational companies.

      The Dutch have twice voted down European Union initiatives in referendums, scuppering a proposed EU constitution in 2005 and in April throwing into disarray plans for closer EU relations with Ukraine.

  • AstroTurf/Lobbying/Politics

    • The Art of Spin

      How Hillary Clinton backers deployed faux feminism and privilege politics to divert attention from her destructive policies.

    • Front-Page Election News: More Horserace, More Trump, More Presidency

      Most, but not all campaign stories featured these sorts of empty calories; some dealt with important questions of candidates’ leadership, demeanor and conflicts of interest. One piece (Washington Post, 8/30/16) highlighted Trump’s “us vs. them” strategy, often blaming US problems on minority groups. Another (New York Times, 9/3/16) detailed Clinton’s cozy relationship with and frequent courting of the ultrarich.

      Another 12 percent of front-page election stories were focused on voters. Over half of these stories featured straightforward polling reports, while the others were more detailed looks at voter mood and logic. The New York Times covered voters particularly well; giving voice to their doubts and hopes for the candidates (9/14/16, 9/9/16). The Washington Post (8/22/16) and USA Today (9/13/16) both published some illuminating voter pieces, but many merely regurgitated poll data.

    • Podesta Congratulated on Nevada Fraud

      Nevada was of course one of the most blatant examples of all of the Democratic National Committee rigging the election against Sanders. Firstly the caucuses featured casino owners bussing in coachloads of employees with firm instructions to vote for Hillary. Even with this, Hillary was struggling. Next the Democratic party machine announced to the media on 21 February that Hillary had won, despite it being by no means clear if that were true.

      Finally at the delegate conference, Hillary acolyte and DNC member Roberta Lange in the chair called the state for Clinton on the basis of the most dubious delegate vote imaginable – and denying any recount. What is more, the Clinton camp scored a double whammy by portraying, throughout the controlled corporate media, the precise scenes you see in this video as a violent riot by Sanders supporters. I do ask you to watch this video through and see what you think. It may just change your entire mind on what is really happening in US “democracy”.

    • Clintons Are Under Multiple FBI Investigations as Agents Are Stymied

      Current and former FBI officials have launched a media counter-offensive to engage head to head with the Clinton media machine and to throw off the shackles the Loretta Lynch Justice Department has used to stymie their multiple investigations into the Clinton pay-to-play network.

    • Franken: FBI’s Comey should face Senate hearings

      Sen. Al Franken called Sunday for the Senate Judiciary Committee to hold hearings on FBI Director James Comey’s handling of the investigation into Hillary Clinton’s private server. And the Minnesota senator said he thinks Hillary Clinton can rely on his state’s voters despite a last-minute visit from Donald Trump, though he said he’s always “nervous.”

      “I think that there should be hearings, and I’m certain there will be hearings in the Judiciary Committee on this matter,” the Franken told CNN’s Jake Tapper on “State of the Union.”

      His comments reflected the Democratic frustration with Comey telling lawmakers 11 days before the November 8 election that the FBI was reviewing new emails potentially connected to its investigation into whether Clinton mishandled classified information.

      [...]

      Franken also defended the Clinton Foundation as Tapper pressed him on whether it should be shuttered if Clinton wins the election.

    • Can The Oligarchy Still Steal The Presidential Election?

      At this point, I would think that the Oligarchy would prefer to steal the election for Trump, instead of from him, rather than allow insouciant Americans to destroy America’s reputation by choosing a person under felony investigations for president of the United States.

    • Not all Americans are Barking Nutters

      The journalists of course attempt to say that to vote for Stein is to let Trump in. Stein sticks strongly to the argument that the “Queen of Corruption” and “Warmonger” Clinton is not in fact a real choice from Trump. This is of course absolutely true, Clinton is a dangerous extremist – she just happens to support the extremism of the right wing establishment and its poodle media.

      I have been fascinated by the apoplexy generated in the pretend left by the notion that people ought not to vote for Clinton. The go-to argument is that not to vote for her is in itself an act of misogyny. I wonder if they will argue the same for Marine Le Pen. The second argument is that a corrupt warmonger is better than the racist bigot Trump. The interesting thing is, close examination reveals an almost 100% correlation between those apoplectic at any lack of support for Clinton, and those who supported Tony Blair. The idea that being an ultra-corrupt warmonger is not a big problem is obviously a fixed principle with these people.

    • Defying the Politics of Fear

      Our only chance to overthrow corporate power comes from those who will not surrender to it, who will hold fast to the causes of the oppressed no matter what the price, who are willing to be dismissed and reviled by a bankrupt liberal establishment, who have found within themselves the courage to say no, to refuse to cooperate. The most important issue in this election does not revolve around the personal traits of Hillary Clinton or Donald Trump. It revolves around the destructive dynamic of unfettered and unregulated global capitalism, the crimes of imperialism and the security and surveillance apparatus. These forces are where real power lies. Trump and Clinton will do nothing to restrict them.

      It is up to us to resist. We must refuse to be complicit, even in the act of voting, with the fossil fuel industry’s savaging of our ecosystem, endless wars, oppression of the poor, including the one in five children in this country who is hungry, the evisceration of constitutional rights and civil liberties, the cruel and inhumane system of mass incarceration and the state-sponsored execution of unarmed poor people of color in our marginal communities.

      [...]

      The rise of Donald Trump is the product of the disenchantment, despair and anger caused by neoliberalism and the collapse of institutions that once offered a counterweight to the powerful. Trump gives vent to the legitimate rage and betrayal of the white underclass and working poor. His right-wing populism, which will grow in virulence and sophistication under a Clinton presidency, mirrors the right-wing populism rippling across much of Europe including Poland, Hungary, France and Great Britain. If Clinton wins, Trump becomes the dress rehearsal for fascism.

    • US election poll tracker: Who is ahead – Clinton or Trump?

      Americans will vote on 8 November to choose their next president.

      The numbers have begun to tighten as we approach election day amid crises affecting both Democratic contender Hillary Clinton and her Republican rival Donald Trump.

      Use our tracker to follow the contest and scroll down to find some explanation on what the polls show.

    • WikiLeaks Show Washington Post Writer Asked DNC For Anti-Trump Research

      Washington Post columnist Dana Milbank appears to have asked the Democratic National Committee (DNC) to do the majority of the research for a negative column he wrote about Donald Trump in April 2016.

      Milbank’s column was titled, “The Ten Plagues of Trump,” and featured a list of “outrageous things” said by Trump. One of the “plagues” listed by Milbank, for example, was “Blood” and centered around a quote from Trump about Megyn Kelly: “You could see there was blood coming out of her eyes, blood coming out of her wherever.”

    • WikiLeaks: Chicago mayor used private domain to communicate with officials

      Chicago Mayor Rahm Emanuel used personal email accounts and a personal email domain to communicate with government officials and political figures, according to a published report based on hacked emails posted by WikiLeaks.

      Emanuel’s personal account information turned up among the thousands of emails from John Podesta, Democratic presidential candidate Hillary Clinton’s campaign chairman, the Chicago Tribune reported. Clinton has come under fire for her use of a private email server because doing so potentially jeopardized classified information.

      Emanuel registered his personal email domain, “rahmemail.com,” on May 16, 2011, the day he was sworn into office. The hacked emails also turned up evidence of Emanuel’s personal Gmail account.

    • Chelsea’s husband allegedly used foundation ties to boost hedge fund

      Chelsea Clinton’s husband used his connections to the Clinton family and their charitable foundation to raise money for his hedge fund, according to an allegation by a longtime Clinton aide made public Sunday in hacked documents released by WikiLeaks.

      Marc Mezvinsky extended invitations to a Clinton Foundation poker event to rich Clinton supporters he was courting as investors in his hedge fund, and he also relied on a billionaire foundation donor to raise money for the fund, according to the WikiLeaks documents. They also assert that he had his wife Chelsea Clinton make calls to set up meetings with potential investors who support her family’s political and charitable endeavors.

      The documents — a memo and an email — were written in late 2011 and early 2012, respectively, by ex-Clinton aide Doug Band. They were sent to family confidants including John Podesta, who is now serving as Hillary Clinton’s presidential campaign chairman, and Cheryl Mills, who was Clinton’s State Department chief of staff.

    • Why Historians Must Use Wikileaks To Write The History Of The 2016 Election

      Wikileaks is playing a prominent, if under reported, role, in the 2016 American presidential election. Few understand the importance of Wikileaks in the eventual writing of the history of presidential politics.

      The media write and talk about events as they happen, usually without historical background or context. A good historian writes with retrospection about past events that explain historical outcomes. U.S. Presidential elections leave behind a clutter of accounts of those who were (or claim to have been) eyewitnesses to history – campaign insiders, journalists, pundits, and hangers-on. The best insider accounts pierce some of the veil of campaign rhetoric, PR, talking points, and smoke and mirrors to explain what was really happening behind the scenes.

    • Viggo Mortensen will be voting for Jill Stein on Tuesday, says it’s not a protest vote

      Like most of Hollywood, Viggo Mortensen is solidly anti-Trump in this election, but he’s also no fan of Hillary Clinton.

      Instead the “Lord of the Rings” star — a Bernie Sanders supporter until he dropped out of the race — will be casting his vote for Jill Stein.

      “I don’t want to get to the end of my life and look back and go, ‘You know, I never voted my conscience,’ ” he said at a luncheon for his movie “Captain Fantastic” at the Explorer’s Club.

      “Not really, when it mattered. I don’t want to do that. And I don’t look at it as a protest vote. I’m not voting against something, I’m voting for something. I’m voting my conscience. It’s not a protest, it’s an affirmation.”

    • WikiLeaks: DNC and CNN colluded on questions for Trump, Cruz

      Newly released emails from WikiLeaks suggest that the Democratic National Committee colluded with CNN in devising questions in April to be asked of then-Republican primary candidate Donald Trump in an upcoming interview.

      In an email to DNC colleagues on April 25 with the headline “Trump Questions for CNN,” a DNC official with the email username DillonL@dnc.org asked for ideas for an interview to be conducted by CNN anchor Wolf Blitzer.

      “Wolf Blitzer is interviewing Trump on Tues ahead of his foreign policy address on Wed. … Please send me thoughts by 10:30 AM tomorrow.”

      The sender of the email would seem to be DNC Research Director Lauren Dillon, who was identified in previous reports of DNC emails released by WikiLeaks in July.

    • Chelsea Clinton ‘used Foundation resources to fund her 2010 wedding to Marc Mezvinsky’, according to new Wikileaks emails

      Hillary Clinton’s daughter Chelsea allegedly used resources from the Clinton Foundation for her wedding, a new dump of Wikileaks emails appear to reveal.

      In several emails, Doug Band, a former top aide to president Bill Clinton and a former Clinton Global Initiative board member, complains about Chelsea Clinton (writing ‘cvc’ for Chelsea Victoria Clinton).

      In one email, dated January 1, 2012, Band emails John Podesta, Chairman of the 2016 Hillary Clinton presidential campaign, and says Chelsea Clinton was conducting an internal investigation into CGI and the Clinton Foundation, which posed a conflict of interest.

      It is unclear why Chelsea Clinton was investigating her family’s foundation and its dealings with money.

    • DNC staffers prepared CNN anchors Wolf Blitzer and Jake Tapper for interviews with Trump, new batch of 8,000 WikiLeaks emails reveals

      The Democratic National Committee helped CNN anchors Wolf Blizter and Jake Tapper prepare for interviews with Donald Trump, the latest WikiLeaks email dump has revealed.

      Among the batch of 8,263 emails released on Sunday night, one shows that staff working for the network hosts asked DNC staffers what questions they should put to the Republican candidate.

      They also asked for advice when it came to an appearance from former candidate, Ted Cruz.

      An email dated April 28 entitled ‘Cruz on CNN’ reads ‘CNN is looking for questions. Please send some topical/interesting ones.’

    • Vote Your Conscience, Vote for WikiLeaks and Vote for Dr. Jill Stein

      With Hillary Clinton circumventing yet another FBI investigation, progressives have an alternative to establishment Democrats. If your conscience won’t allow you to side with a person who is advised by Henry Kissinger and neoconservatives like Robert Kagan, then you have a choice on November 8, 2016. You can vote for a future without a media beholden to John Podesta’s dinner parties. You can choose a future without Wolf Blitzer or Donna Brazile colluding with the DNC, and without a Democratic nominee accepting Foundation contributions from countries that fund ISIS. If you envision a world without wars for oil, fracking, the prison industrial complex, and severe breaches in campaign finance laws, then you certainly don’t have to pick Clinton or Donald Trump.

      You can vote for WikiLeaks.

      You can vote for WikiLeaks, and appease your conscience by championing Dr. Jill Stein and the Green Party.

      Every movement has a beginning, and although Jill Stein has been active in politics for years, this year marks a turning point in American history. Julian Assange and WikiLeaks have allowed voters to see the inner workings of the Clinton campaign; countering an American media serving essentially as Hillary Clinton’s public relations machine. Instead of a 2005 hot mic audio of Donald Trump (considered to be Pulitzer Prize winning journalism by the The Washington Post) Assange and WikiLeaks have published enough Podesta emails to highlight the long-term implications of a Clinton presidency.

    • Meme warfare: how the power of mass replication has poisoned the US election

      If you use Facebook, or Twitter, have a Wi-Fi connection, watch television or have been to an office Halloween party, you’ve probably encountered them: internet memes.

      These shareable, sometimes pithy and often puerile units of culture have emerged as the lingua franca of the 2016 election, and have given the American people an entirely new way of articulating their beliefs. Clinton’s top tweet is a meme. Trump’s taco bowl became one. Through memes, Ted Cruz was “unmasked” as the Zodiac killer. Jeb Bush’s limp plea for applause got him Vined into oblivion. Bernie Sanders shared a moment with a bird that blossomed into something out of Walt Disney’s long-lost Marxist phase.

      Memes can be fun, or they can be dumb – but as an emerging medium, they haven’t provoked a lot of debate or analysis. In fact, they seem to defy scrutiny.

      And slowly, before anyone can even take note, memes are ruining democracy.

    • WikiLeaks releases latest batch of emails from Clinton campaign chair

      WikiLeaks has published its 33rd tranche of emails from the hacked account of Hillary Clinton’s campaign chairman, John Podesta.
      Trends

      The whistleblowing organization has now published more than 55,600 emails in a series of daily online releases which it said were building towards the November 8 presidential election.

    • Democrats advised CNN on interview questions for Donald Trump, according to new WikiLeaks release

      The Democratic National Committee (DNC) apparently helped CNN anchors prepare for interviews with Donald Trump, according to the latest WikiLeaks email dump.

      Included in some 8,263 emails released by WikiLeaks is an exchange that shows DNC staff discussing how to advise CNN on what questions to ask Mr Trump in a scheduled interview ahead of his foreign policy address.

      However CNN defended the practice, saying it had sought the Republicans’ opinions about questions to ask Hillary Clinton in order to “ensure a tough and fair interview”.

      Although the interview with Mr Trump was ultimately cancelled, the emails showed numerous questions were submitted by the DNC.

    • Campaign collusion: Is CNBC’s John Harwood too close to the Clinton operation?

      The following question was asked on Sept. 21, 2015, via email, to the chairman of a major presidential campaign, John Podesta: “What should I ask Jeb?”

      At the time, Jeb Bush was still a leading candidate to challenge Hillary Clinton for the White House — and had more money behind him.

      The question didn’t come from a campaign surrogate or an opinion host — it came from the chief Washington correspondent at CNBC, John Harwood. And just to make sure he hit Bush where the Clinton campaign — which still viewed the former Florida governor as its most likely opponent for 2016 — wanted him to most, Harwood went to Clinton’s campaign chief to do all the thinking for him.

      It should be noted that the title “chief Washington correspondent” means Harwood is not an opinion host or a partisan pundit — he’s one who represents the network as objective and nonpartisan. It also means he cannot consult with opposition campaigns for advice — nor can he provide advice back to a campaign, which Harwood has on several occasions via recent WikiLeaks dumps.

    • Husband Of CNN Exec Tipped Clinton Campaign Off To Network’s Polls Prior To Release

      An email released by WikiLeaks on Sunday shows that the husband of CNN vice president and Washington bureau chief Virginia Moseley tipped the Clinton campaign off to a favorable poll just before its release last September.

      “Good CNN poll coming,” Thomas Nides, Moseley’s husband, wrote to Clinton campaign chairman John Podesta in a Sept. 20, 2015 email.

      Nides served as deputy secretary of state under Clinton and is currently vice president at Morgan Stanley. His name has been floated for a possible high-level spot in a Clinton White House.

    • A call to progressives: Help build and own the Green Party

      It hasn’t been an easy election year for progressives. Many were crushed when Bernie Sanders failed to pull off a historic upset of establishment pick Hillary Clinton, then outraged when leaked emails proved what they already knew — that the Democratic Party elite had conspired against Sanders’ political revolution the whole time.

      But with the racist, sexist billionaire buffoon Donald Trump leading the GOP, many progressives have resigned themselves to pulling the lever for Clinton in an attempt to keep Trumpismo at bay. But before you accept yet another election year of “lesser evilism,” allow yourself to consider investing your vote in the Green Party

      In a 2006 interview with the editorial board of the Jewish Press in Brooklyn, then-Senator Hillary Clinton shared her opinion on the recent election in Palestine: “I do not think we should have pushed for an election in the Palestinian territories. I think that was a big mistake,” said Sen. Clinton. “And if we were going to push for an election, then we should have made sure that we did something to determine who was going to win.”

    • Clinton aide says Foundation paid for Chelsea’s wedding, WikiLeaks emails show
    • Don’t Move To Canada If Your Candidate Loses, Read This

      Regardless of who wins this election, around half of the country is going to have to learn to live under the rule of someone they’ve vilified for the entire election cycle. (That’s two and a half years, but with a RealFeel of untold centuries trapped in the Phantom Zone.) In order to help people from both sides, we’ve put together a few tips in case the other side wins.

    • New WikiLeaks email suggests possible ‘collusion’ between CNBC, Clinton campaign

      CNBC host John Harwood in September 2015 asked Hillary Clinton’s campaign chairman, John Podesta, what he should ask then-Republican presidential candidate former Florida Gov. Jeb Bush in an upcoming interview, according to new emails published by WikiLeaks.

      Harwood, who faced harsh criticism for his performance as a debate moderator in the third Republican presidential primary debate in October 2015, sent Podesta an email on Sept. 21, 2015, with the subject line, “What should I ask Jeb…” The body of the email read, “…in Speakeasy interview tomorrow.”

    • Chris Hedges: The End of the Election Will Not Mean the End of Public Anger

      It’s impossible to tell you, because it really will depend on the mood, on the emotions of the voters on election day. That’s all these campaigns are about, because they both essentially are neo-liberal candidates who will do nothing to impede imperial expansion and corporate power. The whole campaign has descended to, you know, not surprisingly, to the level of a reality TV show, with presidential debates featuring women who have accused former President Bill Clinton of sexual assault being brought in by Donald Trump; videos – I’ll go back to the primaries – of the size of people’s genitals. I mean, it’s just appalling, but all of that is emblematic of a political system in deep decay and one that no longer revolves around fundamental issues. We know from the Wikileaks emails, the John Podesta emails that were leaked from Hillary Clinton, that there was a calculated effort on a part of a Clinton campaign to promote these fringe candidates – like Trump, and they particularly wanted Trump, because the difference between Hillary Clinton and a more mainstream Republican candidate, like Jeb Bush, is so marginal. So if you had to ask me, I don’t think Trump will win, but I don’t rule out the possibility that he will win – we have to look at the Brexit polls in Britain…

    • Jill Stein: ‘We Have Crossed the Rubicon in This Election’

      Jill Stein is already looking past tomorrow’s election.

      The Green Party candidate, who is has a polling average of about 2% heading into Election Day, chuckled at the prospect of an outright win Tuesday. She said she’s hoping for 5% in election returns, and beyond that, she’s planning to push for reforms in the presidential debate commission and to help pave the way for future third party candidates with a rank choice voting initiative.

      Stein spoke to TIME on the eve of the election about what she’s seem from voters this year, how women were talked about in the race and why she never takes vacations.

  • Censorship/Free Speech

    • Serbia’s censorship debate

      Is the Serbian government using underhanded censorship methods to control the media narrative or are critics too harsh?

    • FOSS Friendly IBM is Attempting to Destroy OpenLava

      Several years ago Platform Computing (now owned by IBM) released an open source version of LSF (Platform Load Sharing Facility) — their premier software product. LSF is a workload management platform and job scheduler for distributed HPC environments. In recent years that open source product has begun to flourish, and now IBM is using the DMCA in an attempt to erase all progress made on the project since it was first released. I guess if you can’t compete, you call your legal team…

    • Internet Pioneers Slam $750,000 Settlement for the ‘Man Who Invented Email’

      Two early internet pioneers are expressing sadness and disbelief at the fact that Shiva Ayyadurai, a self-described “world-renowned scientist, inventor, lecturer, philanthropist and entrepreneur” who says he invented “email: the electronic mail system as we know it today,” will receive a $750,000 settlement from Gawker Media, the bankrupt publisher that he sued for defamation earlier this year over a series of stories that, his lawsuit claims, “falsely trace the origin of email and call Dr. Ayyadurai a liar.”

      Computer programmer Ray Tomlinson is credited by many experts and historians with developing the technology that we understand today as email. Dave Crocker, who helped write several foundational standards documents about messaging over the internet, told Gizmodo that Ayyadurai’s settlement with Gawker Media represents a victory for a version of the history of email’s development that isn’t supported by evidence. “I grew up being taught that the truth is always a sufficient defense against claims of defamation,” Crocker said upon hearing about the settlement. “Given the extensive documentation about the history of email, I’m sorry to find that that the adage no longer holds true.”

      John Vittal, one of Crocker’s co-authors, seconded his frustration. Vittal is best known in the traditional history of email for being the first person to implement “reply” and “forward” functions. “What’s true is true, and you can’t hide from it, and shouldn’t be able to capitalize on thwarting it,” said Vittal. “To me, it’s a sad day.”

    • Clinton Campaign Also Not A Fan Of Free Speech: Sends Legal Threat Letters Over Trump Ads

      If there’s one thing that the two major Presidential candidates seem to agree on it’s that we have too much free speech and all you First Amendment whiners should quiet down. Just this morning, we wrote about Trump threatening a documentary filmmaker with a cease & desist letter (the latest in a fairly long list of defamation threat letters). And it appears that the Clinton campaign is also ramping up its similar legal threat letter business.

      Last week, it sent cease & desist letters to broadcasters in Florida who were airing Trump ads that used some footage of Michelle Obama back in the 2008 campaign taking something of a swipe at Clinton. And, just today, the campaign supposedly sent out cease & desist letters to broadcasters airing new Trump ads claiming that Clinton is “under investigation by the FBI.”

    • Facebook Blocks Profiles Of Far-Right Polish Groups, Sparks Protests

      Several far-right Polish groups have protested outside Facebook’s office in Warsaw after the social networking site temporarily blocked their profiles.

      About 120 people demonstrated in the Polish capital Saturday afternoon, denouncing what they said was “censorship.”

    • Poland’s far-right groups protest Facebook ‘censorship’ after social accounts removed
    • Far-right Polish groups protest Facebook profile blockages
  • Privacy/Surveillance

    • If The FBI Can’t Stop All These Leaks About An Investigation, Why Would it Be Able To Keep Encryption Backdoor Secret?

      In the last 10 days or so, James Comey sent two letters to Congress — the first one notifying Congress of some new information in an “unrelated” investigation that may pertain to Hillary Clinton’s emails. And then the one from yesterday admitting that there was nothing important in those emails. That was effectively all that Comey said officially. Yet, in between all of that a ton of information leaked from the FBI about the investigation. We learned what it pertained to (the Anthony Weiner investigation), heard estimates of the number of emails involved, heard that the FBI found them weeks ago but only told Comey right before he sent the letter, that the FBI didn’t have a warrant to read the emails — and then that it did, and that a whole bunch of people inside both the FBI and DOJ have opinions on both sides of this whole mess.

      Basically, the FBI (and the DOJ) were leaking information like it was the last chance they’d ever have to leak information and their lives depended on who could leak the most.

    • The USA threatens to unleash cyber warfare against Russia
    • A second Privacy Shield legal challenge increases threat to EU-US data flows

      The Privacy Shield transatlantic data transfer deal is now caught in a pincer action: A week after it emerged that Irish digital rights activists had filed suit to annul the deal come reports that a French campaign group has begun its own legal action.

      French civil liberties campaign group La Quadrature du Net filed suit against the European Commission, the European Union’s executive body, on Oct. 25.

      Although the Court of Justice of the EU has not yet published details of the complaint, Brussels-based news agency Euractiv reported Thursday that La Quadrature’s goal is to annul the Commission’s decision that Privacy Shield provides adequate protection under EU law when the personal information of EU citizens is transferred to the U.S. for processing.

    • China Adopts Cybersecurity Law Despite Foreign Opposition

      The Cyber Security Law was passed by the Standing Committee of the National People’s Congress, China’s top legislature, and will take effect in June, government officials said Monday. Among other things, it requires internet operators to cooperate with investigations involving crime and national security, and imposes mandatory testing and certification of computer equipment. Companies must also give government investigators full access to their data if wrong-doing is suspected.

      China’s grown increasingly aggressive about safeguarding its IT systems in the wake of Edward Snowden’s revelations about U.S. spying, and is intent on policing cyberspace as public discourse shifts to online forums such as Tencent Holdings Ltd.’s WeChat. The fear among foreign companies is that requirements to store data locally and employ only technology deemed “secure” means local firms gain yet another edge over foreign rivals from Microsoft Corp. to Cisco System Inc.

    • A Guy Put Amazon’s ‘Alexa’ In Big Mouth Billy Bass’ Body And People Are Rightly Horrified

      So Big Mouth Billy Bass — you know, that animatronic singing fish that was annoyingly popular at the end of the 1990s — was, frankly, already pretty creepy. But one little modification brought it to new, disturbing heights.

      Brian “Wizard of Terror” Kane posted this lil’ video to Facebook on Oct. 27, which features a Big Mouth Billy Bass configured so that the voice of Alexa — Amazon’s voice assistant similar to Apple’s Siri — emanates from the fish’s mouth.

      The video is simply captioned, “the future” ― and it’s a dystopian vision indeed.

    • How to talk with your loved ones in private

      A few days ago I ran a very biased and informal survey to get an idea about what options are being used to communicate with end to end encryption with friends and family. I explicitly asked people not to list options only used in a work setting. The background is the uneasy feeling I get when using Signal, a feeling shared by others as a blog post from Sander Venima about why he do not recommend Signal anymore (with feedback from the Signal author available from ycombinator). I wanted an overview of the options being used, and hope to include those options in a less biased survey later on. So far I have not taken the time to look into the individual proposed systems. They range from text sharing web pages, via file sharing and email to instant messaging, VOIP and video conferencing. For those considering which system to use, it is also useful to have a look at the EFF Secure messaging scorecard which is slightly out of date but still provide valuable information.

    • Researchers Matched Images on Tattoo Websites to a German Police Database

      For the last year, EFF has been battling to free records from the National Institute of Standards and Technology (NIST) regarding an ethically dubious research program to promote the development of automated tattoo recognition technology. The agency is months delinquent in providing a variety of information, most notably the list of 19 research entities who received a giant set of tattoo images obtained from prisoners in custody. This delay is particularly alarming as NIST is currently recruiting institutional participants for the next stage of its expanded research, scheduled to begin on Dec. 1.

      What we’ve discovered so far about NIST’s approach to tattoo identification raises major concerns for privacy, free speech, the freedom to associate, and the rights of research subjects. We’ve also learned that similar tattoo recognition experiments are being conducted in Germany, a country that is usually sensitive to personal privacy.

    • ‘Our Identity Is Often What’s Triggering Surveillance’

      The civil rights director of the Oregon state Department of Justice has filed a lawsuit against his employer. It seems the department got a new computer program that lets them search social media, and to test it out, they looked for hash tags related to Black Lives Matter and activism against police violence, turning up a tweet by Erious Johnson, which led his colleagues to start compiling a report on him without his knowledge. Johnson’s lawsuit claims racial discrimination and a hostile work environment for engaging in protected activity.

  • Civil Rights/Policing

    • 25 Years After Junk Science Conviction, Texas Finally Admits Sonia Cacy’s Innocence

      Twenty-five years after she was first accused of the arson-murder of her uncle, 68-year-old Sonia Cacy on November 2 was finally exonerated by Texas’ highest criminal court, a move that clears the way for her to seek compensation from the state for her decades-long ordeal.

      Cacy’s conviction for a crime that never happened is a prime example of the devastating consequences of allowing junk science into the courtroom, of the need for continuing education of forensic practitioners, and for the robust review of convictions that may have been tainted by outdated, or imagined, science.

      In fact, arguably, it was Cacy’s case that set in motion a series of events that would eventually culminate in a unique partnership between the Innocence Project of Texas and the Texas state fire marshal, designed to review old arson-related criminal cases in order to ferret out convictions based on unsupportable fire science. “Sonia’s case is a lesson to the entire criminal justice system of how important it is to keep bad science out of court,” said Gary Udashen, president of the IPTX and Cacy’s longtime attorney.

    • Officer fired over feces sandwich

      A San Antonio police officer has been fired after an internal investigation determined he tried to give a homeless man a sandwich with feces inside it.

    • Man shot and killed by off-duty officer after ‘road rage incident’ escalated

      A man was shot and killed by an off-duty Chicago police officer Saturday afternoon in the Mount Greenwood neighborhood. The man was riding as part of a funeral procession, his family says, when what officials are calling a “road rage incident” escalated and he was shot and killed.

      During a short press conference, Chicago Police Superintendent Eddie Johnson described the chaotic scene near 111th and Troy that led to the fatal shooting around 3 p.m. Saturday.

      Johnson said it began as a “road rage incident” between multiple people and a “fire department member.” Then, Johnson said, an off-duty police officer who was in a barbershop across the street saw the fight and headed over, “announcing his office” as he got involved. That’s when “the subject,” identified by his family as 25-year-old Joshua Beal, “displayed a weapon,” according to Johnson.

    • Nigeria frees Muslims accused of murder over blasphemy

      A court in northern Nigeria has freed five Muslim men accused of killing an elderly Christian woman for allegedly blaspheming the Prophet Mohammed.

      The court in the city of Kano discharged the five men on Thursday on the legal advise of the prosecution.

      “The legal advice presented to the court, dated June 24, states that there is no case to answer as the suspects are all innocent and orders the court to discharge all the suspects,” the judge said in his ruling.

    • Fresh attacks on Hindus in Bangladesh, houses torched

      In fresh attacks on Hindus in Bangladesh, unidentified miscreants set ablaze some of their houses and damaged two temples in central Brahmanbarhia district where several places of worship of the minority community were vandalised earlier this week, police said.

    • Luxembourg’s Asselborn: Turkey is using Nazi-era tactics

      Luxembourg’s Foreign Minister Jean Asselborn, in an interview with Deutschlandfunk Monday, compared the Turkish government’s dismissal of civil servants to methods used by the German Nazi regime, and recommended that the European Union impose economic sanctions.

      Since the failed July 15 coup that killed more than 240 people, Turkish President Recep Tayyip Erdoğan has detained, suspended or dismissed more than 110,000 public servants as part of a wider crackdown on his political opponents.

  • Internet Policy/Net Neutrality

    • Despite ESPN Whining, Nielsen Confirms Historic Subscriber Losses For Channel

      Last week, we noted how Disney and ESPN threw a bit of a hissy fit when Nielsen data indicated that ESPN had one of the biggest subscriber losses in company history last month. According to Nielsen’s data, ESPN lost 621,000 homes in a single month, as well as losing 607,000 ESPN2 households and 674,000 ESPNU homes. That’s of course on the heels of losing more than 7 million subscribers over the last three years or so, thanks largely due to the rise of cord cutting, cord trimming (scaling down your TV package) and the rise of some “skinny bundles” that exclude ESPN from the base channel lineup.

      ESPN demanded that Nielsen withdraw its numbers, insisting they represented a “dramatic, unexplainable variation” that didn’t match ESPN’s own numbers. Nielsen obliged, but after conducting an “extensive” review of the numbers found them to be “accurate as originally released.” Of course, this shouldn’t be a surprise; we’ve noted how everybody but ESPN appears to have seen the writing on the wall. But instead of adapting to the changing times, ESPN responded by denying that cord cutting was real, and suing companies like Verizon for trying to bring some flexibility to the traditional cable bundle.

  • Intellectual Monopolies

    • Clinton v. Trump on copyrights and patents: Reading the platform and the tea leaves

      The hot-button issues this election can be counted on one’s fingers—and for most voters, things like copyright and patent policy don’t make the list. Assigned to a wonkish zone far from the Sunday morning talk shows, intellectual property issues aren’t near the heart of our deeply polarized political discourse.

      Of the two major party candidates in 2016, only the Democratic candidate has a platform that even addresses copyright and patent policies. So today, let’s look at what we know about Hillary Clinton’s plan, and make some informed speculation about what could happen to these areas under a Donald Trump presidency.

      Given that the campaign is focused (as always) on a relatively small group of issues, tech policy watchers who spoke to Ars were surprised to see a presidential platform that mentions IP issues at all. Clinton’s briefing paper on technology and innovation addresses both copyright and patent issues directly, and that in itself is something of a surprise. Trump’s website has no such information, so the best clues to his approach lie in his public statements and the people he has surrounded himself with.

    • Copyrights

]]>
http://techrights.org/2016/11/07/nes-classic-linux-computer/feed/ 0
Links 6/11/2016: Vista 10 Plagued With Ads, Linux 4.9 Now in RC4 http://techrights.org/2016/11/06/linux-4-9-now-in-rc4/ http://techrights.org/2016/11/06/linux-4-9-now-in-rc4/#comments Sun, 06 Nov 2016 21:58:37 +0000 http://techrights.org/?p=96602

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Women-Focused Networking Events Can Make a Big Difference, Says Twitter’s Vinu Charanya

    During LinuxCon North America in Toronto, The Linux Foundation organized a women’s networking summit that included more than 100 women from different walks of life. What’s most exciting about this event was that instead of having one speaker, or a panel of speakers delivering speeches, each attendee was allowed to introduce herself, which turned all those 100 attendees into speakers and audiences.

  • Difference Between Freeware and Open Source Software

    The word ‘ware’ means an article of merchandise (among other things, but those aren’t the relevant meanings). The word is often combined with another word to describe the product, like in the word silverware. The fact that the word software has the suffix ‘-ware’, shows that it was intended to be sold. We all know how computer people love puns and other jokes in the technical terminology, so now we have software, hardware, firmware, freeware, shareware, malware, spyware, and the list goes on. But the funny thing is, there are a few of them that are oxymoronic, or self-contradictory, like freeware and shareware.

  • Foreseeing an Open Source Future With FOLIO

    Libraries have always been spaces where members of a community can gather to gain knowledge, whether through books or through events and activities. But where can library staffers go to do their own learning? They need designated spaces too, which is why the Open Library Foundation is so important. This new organization encourages everyone in the library and library services communities to share their ideas for an open source future.

    The Open Library Foundation was created “as an unbiased, independent not-for-profit organization designed to ensure the availability, accessibility and sustainability of open source and open access projects for and by libraries,” according to its About page. It provides the infrastructure that allows librarians, technologists, designers, service providers, and vendors to work together to develop resources for the library community.

  • ToaruOS With Kernel Written From Scratch Is Still In Development

    Two years ago to the day the most-viewed article was about A Hobby Kernel and User-Space, Runs Mesa and GCC. That hobbyist OS written from scratch seemed promising back then but hadn’t heard anything at all since. When deciding to check on the project today I was anticipating that it had died off, but surprisingly, it’s still under development.

    ToaruOS remains under development and has been since late 2011. The most recent Git commits were from 11 days ago according to their GitHub site. For those that don’t remember the article from two years ago, the Toaru kernel provides a Unix-like environment with some similarities to Linux but is written from scratch.

  • Netrounds Joins the Open Source MANO Initiative

    Netrounds has joined the Open Source MANO (OSM) Community, which is focused on delivering an open source management and orchestration (MANO) stack aligned with ETSI NFV.

    OSM was launched on 22 February 2016 and has been created under the umbrella of ETSI. It is an operator-led community collaborating to meet the requirements of production NFV networks. Founding members include Telefónica, BT, Canonical, Intel, Mirantis, RIFT.io, Telekom Austria Group, and Telenor, among others.

    Open Source MANO’s charter consists of working with the OSM community to deliver a production-quality open source. MANO stack. OSM Release ONE was announced on 4 October 2016 and is available with full documentation today. The initial Release 0 of OSM code was already capable of orchestrating complex NFV use cases using vendor-neutral Information Models capable of capturing all of the significant features of an E2E service and the requirements of its individual Virtual Network Function (VNF) components.

  • Equinix VP: New Power Models Make Open Source Necessary

    The 100 Gbps router and transponder device called Voyager, announced last Tuesday, may be recorded in history as the first such device ever to have been created by a social network and a colocation provider. Facebook’s and Equinix’ joint laboratory are data centers SV3 and SV8 in Silicon Valley, in two of Equinix’ prime locations.

    In an exclusive interview with Data Center Knowledge, Dr. Kaladhar Voruganti, Equinix’ vice president for technology innovation and formerly an IBM researcher, told us his company’s participation in Facebook’s Open Compute Project, and its networking offshoot Telecom Infra Project (TIP), is not some little experiment on the side. It’s a campaign necessitated by a perfect storm of conditions: the status of the cloud services market, the architecture of servers, and the laws of physics.

  • Build Strong Real-Time Streaming Apps with Apache Calcite

    The Apache Calcite data management framework contains many pieces of a typical database management system but omits others, such as storage of data and algorithms to process data. In his talk at the upcoming Apache: Big Data conference in Seville, Spain, Atri Sharma, a Software Engineer for Azure Data Lake at Microsoft, will talk about developing applications using Apache Calcite’s advanced query planning capabilities. We spoke with Sharma to learn more about Calcite and how existing applications can take advantage of its functionality.

  • The Community and Software Development

    Central to the development of open source software is the community. This is partly because many open source projects depend on contributions from unpaid volunteers, which makes community ties important. But even large enterprise projects must pay attention to community needs. Large scale projects like Hadoop, OpenStack, Hyperledger, and even Linux, all transcend corporate boundaries, which necessitates communities that span individual corporate cultures.

    It’s not surprising, then, that successful open source enterprises take on experts to help them develop, manage and nurture their communities.

    Jono Bacon is one of the most visible open source community managers. For nearly eight years he was the community manager for Ubuntu. After that he spent time as the senior director of community at XPRIZE and as GitHub’s community director. These days he heads his own consulting firm, with clients that have included IBM, Deutsche Bank, Intel and SAP.

  • Events

    • Aaron Swartz Day and International Hackathon: Scheduled Speakers

      In San Francisco, we have a hackathon going on, with an upstairs, where speakers are going on, and a downstairs, where code and society are being “hacked” on.

    • Keynote: Collaboration Beyond Code by Jilayne Lovejoy, Principal Open Source Counsel, ARM
    • Ten dozen Embedded Linux Conference and IoT Summit videos

      Videos of ten dozen talks and keynotes from last month’s Embedded Linux Conference and IoT Summit in Berlin are now available for free streaming on YouTube.

      The videos span a wide range of topics relating to developing, deploying, and maintaining embedded devices and Internet-of-things gizmos that incorporate various forms of embedded Linux, Android. and other open source software. ELCE 2016 and the colocated IoT Summit featured more than 150 conference sessions, and offered “an extended scope to include user-space developers, the people building applications on embedded Linux,” says the Linux Foundation. The LF promotes the annual event as “the preeminent space for kernel, systems and user space developers to collaborate and learn.”

  • Web Browsers

    • Another 40 million people bolt from Microsoft’s browsers as mass exodus continues [iophk: "can only truly leave the browser by leaving that so-called OS, because it is tied into the system"]

      Microsoft’s browsers hemorrhaged another 40 million users last month, according to analytics vendor Net Applications, pushing the year’s total number of deserters near the one third of a billion mark.

      Net Applications pegged the combined user share of Internet Explorer (IE) and Edge at 28.4% for October, a fall of 2.3 percentage points. The month’s decline was the second-largest ever for Microsoft’s browsers, behind only May’s plummet of 2.7 points.

      Unlike in most previous months, Microsoft’s bane was not Google’s boon, but instead Mozilla’s. Firefox’s user share jumped nearly 2 percentage points, to 11.1%. Atop an almost-as-large increase in September, Mozilla’s Firefox has stepped away from a precipice, and in two months recovered almost all the losses it incurred during the past year.

      IE has shed 20.2 percentage points in 2016, and the fall shows no sign of stopping, or even slowing. In the last six months, four have recorded declines of 2 points or more, twice the number of the six months before that.

    • Microsoft loses about 40 million Internet Explorer users in one month

      Despite continued updates and improvements to its Edge browser, Microsoft can’t seem to hold on to users as they transition from various versions of Internet Explorer. The latest figures suggest that in October alone, Microsoft shed some 40 million users, with the likes of Chrome and Firefox scooping them up.

      Looking at the latest data from NetMarketShare, Chrome is still the undisputed king of the hill, boasting the kind of percentages Microsoft used to enjoy — with a 55 percent market share at the end of October. It found an extra 0.58 percent from the likes of Internet Explorer, which dropped a surprising 2.5 percent — equivalent to about 40 million users, per ComputerWorld.

    • Chrome

      • Chrome/Chromium Now Enabling WebGL 2 By Default On The Desktop

        With the very latest open-source Chromium web-browser development code, WebGL 2.0 support is now being turned on by default for desktop (non-Android) builds.

        With the latest Chromium Git as of yesterday, WebGL 2 is turned on by default for the desktop but isn’t yet ready to be turned on for the Android builds. The WebGL 2 support can be toggled via about:flags.

    • Mozilla

      • Firefox disables loophole that allows sites to track users via battery status

        Mozilla Firefox is dropping a feature that lets websites see how much battery life a visitor has left, following research showing that it could be used to track browsers.

        The feature, called the battery status API, allows websites to request information about the capacity of a visitor’s device, such as whether or not it’s plugged in and charging, how long it will last until it is empty, and the percentage of charge remaining.

        It was intended to allow websites to offer less energy-intensive versions of their sites to visitors with little battery power left: for instance, a mapping site could download less information, or a social network could disable autoplaying video.

  • SaaS/Back End

    • OpenStack Puts Interoperability to the Challenge at OpenStack Summit

      Among the major highlights of the OpenStack Summit last week was the live on-stage interoperability challenge. 16 different vendors participated in the challenge, including AT&T, Canonical, Cisco, DreamHost, Deutsche Telekom, Fujitsu, HPE, Huawei, IBM, Intel, Linaro, Mirantis, OSIC, OVH, Rackspace, Red Hat, SUSE and VMware.

      As part of the on-stage interoperability challenge, participants used Ansible to orchestrate an architecture including network, storage and security groups. Jonathan Bryce, Executive Director of the OpenStack Foundation, said that vendors have been testing different workloads over the last several month in advance of the challenge.

    • Hortonworks’ Q3 Results Reflect Ongoing Welcome for Hadoop

      Hortonworks, which focuses on the open source Big Data platform Hadoop, has steadily been cementing its reputation as a leader in the Hadoop arena. The company’s third quarter results are now reported, and they provide a window on the momentum that Hortonworks now has.

  • Oracle/Java/LibreOffice

    • The November 2016 Month of LibreOffice begins!

      Back in May we had a Month of LibreOffice, crediting contributions to the software across the entire project. It was fantastic, with hundreds of badges and barnstars awarded to developers, translators, bug reporters, and also to people who help with documentation, the Ask.LibreOffice site and social media.

  • CMS

    • The future of Drupal could be cooking in this lab

      Acquia Labs has no illusions of making self-driving cars or shooting things into space like Google X, but the budding applied research arm of enterprise open-source Drupal provider Acquia does have designs on a slew of new applications for what it anticipates will be an increasingly browserless world.

      Preston So, development manager at Acquia Labs and a 9-year veteran of the Drupal community, shared his vision for Acquia’s skunkworks-plus outfit at the company’s annual Engage event for customers held in Boston this week.

    • Newly Redesigned Boston.gov Just Went Open Source

      Boston is open sourcing its municipal website, three months after redesigning Boston.gov.

      Taking the source code public, a move overseen by the city’s Digital Team, will speed the rate at which the site evolves through the addition of new features developed by local software designers, academic institutions and organizations.

    • WordPress attacks Wix, and Wix strikes back
    • The WordPress-Wix Dispute
    • The Price Of GPL [Ed: hatred of the GPL]

      Wix’s CEO, Avishai Abrahami, responded with a round of non-sequiturs that carefully evade the point that his product is built from source code for which they have not paid. One of his engineers equally misses the point, focusing on the circumstances surrounding the violation, rather than taking responsibility for the theft.

      Some will take issue with the use of strong words like “stolen code,” and “theft,” with respect to a GPL violation. But that’s exactly what it is: software has been taken and deployed in Wix’s product, but the price for doing so has not been paid.

      [...]

      Many developers understand, and view the price of GPL as perfectly justified, while others (myself included) find it unacceptable. So what am I supposed to do? Not use any GPL source code at all in any of my proprietary products? Exactly. Because the price of GPL is too much for me, and I don’t steal source code.

  • Pseudo-Open Source (Openwashing)

  • FSF/FSFE/GNU/SFLC

    • Ring Joins The GNU, Aims For Decentralized, Multi-Device Communication

      Ring is now the newest GNU software project. Ring aims to be a universal communication software platform respecting user’s freedoms and privacy. GNU Ring doesn’t rely upon a centralized server and is based upon SFLPhone SIP/IAX2-compatible softphone for communication, far different from Skype.

    • ARM Cortex M23 & M33 Now Supported By GCC

      Landing in the GNU Compiler Collection development code yesterday for next year’s GCC 7 release is support for some new ARM processor targets.

      The Cortex-M23 is now formally supported by the latest development code. Similarly, the Cortex-M33 is now also supported.

  • Licensing/Legal

    • Conservancy Promotes Transparency by Publishing Template Agreements for Linux Compliance Program

      Today at the Linux Plumbers Conference, Software Freedom Conservancy hosts its second feedback session on the GPL Compliance Program for Linux Developers. These sessions, which Conservancy is hosting at relevant events over the next year and summarizing for public review, will seek input and ideas from the Linux community about GPL enforcement, answer questions, and plan strategies to deal with GPL enforcement actions that do not follow Conservancy and FSF’s Principles of Community-Oriented GPL Enforcement.

    • Eben Moglen on GPL Compliance and Building Communities: What Works

      Software Freedom Law Center, the pro-bono law firm led by Eben Moglen, Professor of law at Columbia Law School and the world’s foremost authority on Free and Open Source Software law held its annual fall conference at Columbia Law School, New York on Oct. 28. The full-day program featured technical and legal presentations on Blockchain, FinTech, Automotive FOSS and GPL Compliance by industry and community stalwarts.

      The program culminated in remarks by Moglen that highlighted the roles of engagement and education in building effective, ever-lasting communities. While expressing his gratitude to his colleague, friend and comrade Richard M. Stallman, Moglen emphasized the positive message relayed by Greg Kroah-Hartman and Theodore Ts’o –earlier in the day– for creating win-win solutions and spreading users’ freedom.

    • Freedom In Moderation [Ed: Freedom insistence (in software) equated with “extremism”, worse a term than “purism”]

      I must define some terminology in case readers are unfamiliar. Free software is defined by the Free Software Foundation (FSF) as software that carries four fundamental freedoms: the freedom to run the program for any purpose, the to study and change it, to redistribute unmodified copies, and to redistribute modified copies. The “free” refers not to price but to freedom, and is sometimes called “libre”, from the same Latin root as “liberate”.

      The Free Software Foundation has been campaigning for “users’ freedom” since 1985. They advocate for the release of software under licenses they approve that give users those freedoms. Some of their notable successes include the GNU project, which develops various low-level and mid-level system tools, and their Defective By Design campaign to oppose digital rights management (DRM).

  • Openness/Sharing/Collaboration

    • Open-source plastic recycling machine plans allow anyone to convert waste into new products

      Within just a few generations, plastic has already taken over the world, and while this material enabled a revolution in manufacturing and design, plastic has also managed to become one of the biggest menaces on the planet, thanks to its convenience and ease of production. And although commercial collection and recycling of plastics is getting better and more accessible, in many areas plastics end up in the dump instead of the recycling facility, essentially burying this resource, which could be used to great effect if only the machinery were available to do so.

    • Germany to create an open education portal

      Germany’s Ministry of Education and Research has earmarkes EUR 1.2 million to finance the creation, over the next two years, of a portal to aggregate open educational resources, the ministry announced this week. The OER portal is to support schools and universities, and will be managed by the country’s Bildungsserver (Education Server).

      The OER was announced by the ministry on Wednesday. “This is a major step towards a pedagogically meaningful and copyrighted use of open educational resources in all fields of education”, Cornelia Quennet-Thielen, Secretary of State is quoted as saying.

    • Norway: Communities should share eGovernment services
    • Open Data

      • Spain promotes sharing of public sector information

        The Agencia Española de Protección de Dato (AEPD), Spain’s agency for data protection, is encouraging the country’s public administrations to share their information. In October, the agency published a manual intended for managers at public administrations on how to facilitate information sharing, while keeping sensitive data safe.

    • Open Hardware/Modding

      • My own self balancing Lego Segway

        A while back I received a Gyro sensor for the NXT Mindstorms controller as a birthday present. It had been on my wishlist for a while, because I wanted to build a Segway like balancing lego robot. I had already built a simple balancing robot with the kids, using the light/color sensor included in the NXT kit as the balance sensor, but it was not working very well. It could balance for a while, but was very sensitive to the light condition in the room and the reflective properties of the surface and would fall over after a short while. I wanted something more robust, and had the gyro sensor from HiTechnic I believed would solve it on my wishlist for some years before it suddenly showed up as a gift from my loved ones.

  • Standards/Consortia

    • Our proposal to get the CC logo and icons into Unicode

      We’ve submitted a proposal to get the Creative Commons logo, license, and public domain icons into Unicode (more specifically, the Universal Coded Character Set or UCS). Unicode is the industry standard for encoding characters into text, which means that virtually all text-based editors, or tools with text-based editors, enable those characters and symbols that have been encoded into the standard. Examples of encoded characters range from ancient Greek letters to the current day ©, @, and universal ♲ symbols.

    • HTTP-SS: “A New Faster Internet Protocol”

      A German company is promising a new protocol dubbed “HTTP-SS” that “should be able to double Internet speed, decrease data volume almost by 90% and get rid of the other general issues” compared to HTTP/HTTPS, at least that’s what they claim.

      The HTTP-SS is short for HTTP Single Stream and this protocol aims to be faster, implements the Delta Data Algorithm, allow faster downloads, and other benefits. They claim this is a “revolutionary development” with the usual PR garbage mailed over this weekend.

Leftovers

  • Hardware

    • OpenPOWER Summit Europe 2016 Recap

      I was in Barcelona last week for two big events: the OpenStack Summit and the OpenPOWER Summit. Luckily, the events were separated only by a five minute walk. Many of the slides from the OpenPOWER Summit are already available online.

      One of my favorite talks was from Prof. Mateo Valero, the director of the Barcelona Supercomputer Center (Centro Nacional de Supercomputación). He was a great speaker and he talked a lot about how OpenPOWER has given them a new edge. It’s part of what helps them stay on the forefront of supercomputer technology.

    • Apple temporarily cuts prices on all USB-C cables and accessories

      Apple is offering an olive branch to new MacBook and MacBook Pro buyers annoyed that their old stuff won’t work with their new laptops. The company is discounting most of the USB-C cables, dongles, and accessories it sells in its online and retail stores. The downside? The discounts only last from now until the end of the year, and prices will presumably go back up after that.

      The USB-C to USB adapter goes from $19 to $9; the Thunderbolt 3 to Thunderbolt 2 adapter drops from $49 to $29; the USB-C to Lightning cable goes from $25 to $19 for one-meter cables and from $35 to $29 for two-meter cables; both the HDMI and VGA versions of Apple’s multi-port dongles drop from $69 to $49; and SanDisk’s Extreme Pro SD card reader drops from $49 to $29. All other third-party USB-C cables and peripherals will be discounted by about 25 percent. The only excluded products are Apple’s USB-C power adapters and the USB-C charge cables sold for use with those power adapters.

    • Is a Thinkpad Still Like a Rolls-Royce

      My first Thinkpad was quite underpowered when compared to desktop PCs, it had 32M of RAM and could only be expanded to 96M at a time when desktop PCs could be expanded to 128M easily and 256M with some expense. It had a 800*600 display when my desktop display was 1280*1024 (37% of the pixels). Nowadays laptops usually start at about 8G of RAM (with a small minority that have 4G) and laptop displays start at about 1366*768 resolution (51% of the pixels in a FullHD display). That compares well to desktop systems and also is capable of running most things well. My current Thinkpad is a T420 with 8G of RAM and a 1600*900 display (69% of FullHD), it would be nice to have higher resolution but this works well and it was going cheap when I needed a new laptop.

  • Health/Nutrition

    • Studying marijuana remains a drag

      Whatever happens November 8, marijuana won. It’s hit an all time high in popularity—60 percent of Americans now support legalization. That handily beats both major-party candidates in favorability. Twenty-five states and Washington, DC have already legalized it for medical use. And come election day, nine states will decide whether to loosen laws further (five voting on legalization, four more on medical use).

      The psychoactive plant is no longer the gateway drug of deadbeats and loafers; it’s becoming acceptable socially and politically. And with the public opinion that it’s largely harmless, users have stoked hopes that it can safely and effectively treat a range of medical ailments, from chronic pain and migraines to epilepsy and autism

      Marijuana advocates are delighted by these shifts, of course. But as voters, lawmakers, patients, and doctors look to make informed decisions on legislation and usage, they’re coming up with questions—and some are pretty simple. Are there long term effects? What diseases or symptoms can it really treat? In which patients? And how? What strains and products are best? Is it OK to mix it with prescription meds? What all does marijuana’s 60 or so active cannabinoids do in our brains exactly?

    • Flint Michigan Water Crisis Is Still A Crisis

      If you think the water crisis in Flint Michigan has gone away or has improved and been fixed you are sadly mistaken. Unfortunately, they are still using bottled water and water filters to get “clean” water to cook & drink with according to the Washington Post.

      The residents of Flint Michigan who have suffered tremendously through this crisis are now able to file a lawsuit against the state of Michigan and city officials. A judge in the Michigan Court of Claims ruled that Flint residents have the right to sue for negligent decisions made leading to the contamination of the water supply.

      To read more on that story click TheRoot.com.

      Meanwhile, there is another story coming out of Michigan that involves the worlds largest food supply company Nestle. Apparently, the food company asked for more groundwater (from 150 gallons per min. to 400 gallons per min.) to be pumped from Michigan to supply it’s $36 million Ice Mountain bottling plant expansion project.

      All for the cost of a $200 annual paperwork fee. So basically, because Nestle owns the “private property” they get to pump ALL of that water out for FREE.

    • Is Flint the Tip of the Iceberg?

      The Flint water crisis has aroused public concern over the quality of our nation’s water infrastructure, leaving many to wonder when and where the next tragedy will occur. After temporarily relying on the Flint River while seeking a lower-cost water provider, locals immediately found themselves in murky waters.[1] Even though the state Department of Environmental Quality knew about the river’s highly corrosive properties, the agency failed to treat the water, in violation of federal law.[2] The untreated water caused service lines to leach lead into public waterlines,[3] exposing thousands to toxic levels of polluted water. Despite obvious warning signs, Flint Mayor Dayne Walling attempted the “come on in, the water’s fine” approach, even drinking Flint water on local TV to encourage citizens to follow suit.[4] Ultimately, Flint residents did just that, filing a class action lawsuit against the State of Michigan and others last November.[5]

      Let’s turn the clock back and examine the evolution of federal standards for the lead content of drinking water. Congress promulgated the Safe Drinking Water Act[6] in 1974 in response to the discovery of contamination in public drinking water and the lack of enforceable national standards. The Act prohibits the use of certain non-lead-free (by statutory standards) materials in potable water systems and the introduction of such materials into commerce.[7] The Act was amended in 2011 with the Reduction of Lead in Drinking Water Act.[8] The amendment redefined the term “lead-free,” previously a weighted lead content of 8 percent or less, as a weighted average of not more than 0.25 percent.[9] In addition to congressional efforts to purify public drinking water, the EPA promulgated the Lead and Copper Rule (LCR) in 1991,[10] requiring local water systems to undertake corrective action where lead concentrations exceed federal standards.

    • [Older] EU drops law to limit cancer-linked chemical in food after industry complaint

      The European commission has dropped plans to legally limit a pervasive but naturally occurring chemical found in food, that is linked to cancer, just days after lobbying by industry, the Guardian has learned.

      Campaigners say that leaked documents revealing the legislative retreat show “undue influence” by the food industry over EU law-making and a “permanent scandal”, although the issue is complex.

      Acrylamide is a hazardous substance found in the browned and burned parts of common starchy foods that have been fried, roasted or oven-cooked at temperatures higher than 248C (478F).

      Crisps, potato chips, breakfast cereals and instant coffee all contain high levels of the substance, as do baby foods, biscuits and rusks.

      Scientists are still trying to quantify the health risks posed, but acrylamide has been judged an “extremely hazardous substance” by the US Environmental Protection Agency.

  • Security

    • Security advisories for Friday
    • Netherlands to trial Internet voting [Ed: terrible idea, for many reasons.]

      The Dutch government will this year test the possibilities of voting via the Internet. The test will include citizens abroad: the pilot, by the Ministry of the Interior, will involve the city of The Hague, which manages the registration of citizens abroad.

      The city recently invited citizens to take part in the tests – a simulated election. Participants will be able to vote for fictitious political parties and candidates. The pilot is intended to test security measures, and to check if Internet voting reliable.

    • U.S. boosting cyber defenses, but not police presence, for election

      Federal and state authorities are beefing up cyber defenses against potential electronic attacks on voting systems ahead of U.S. elections on November 8, but taking few new steps to guard against possible civil unrest or violence.

      The threat of computer hacking and the potential for violent clashes is darkening an already rancorous presidential race between Democrat Hillary Clinton and Republican Donald Trump, amid fears that Russia or other actors could spread political misinformation online or perhaps tamper with voting.

    • 10 ways to make sure your remote workers are being safe

      With an ever-expanding mobile workforce, infosec teams are increasingly tasked with extending cybersecurity safeguards beyond the physical and virtual walls of their organizations. With endpoints not only increasing but on the move, the challenge is real. In addition to implementing the appropriate technical defenses, there is an important aspect to protecting corporate data and systems: Asking end-users to get involved.

    • Did the Mirai Botnet Really Take Liberia Offline?

      KrebsOnSecurity received many a missive over the past 24 hours from readers who wanted to know why I’d not written about widespread media reports that Mirai — a malware strain made from hacked “Internet of Things” (IoT) devices such as poorly secured routers and IP cameras — was used to knock the entire country of Liberia offline. The trouble is, as far as I can tell no such nationwide outage actually occurred.

      First, a quick recap on Mirai: This blog was taken offline in September following a record 620 Gpbs attack launched by a Mirai botnet. The source code for Mirai was leaked online at the end of September. Since then, the code has been forked several times, resulting in the emergence of several large Mirai-based botnets. In late October, many of the Internet’s top destinations went offline for the better part of a day when Mirai was used to attack Internet infrastructure firm Dyn.

    • Admins, update your databases to avoid the MySQL bug

      MySQL, MariaDB, and PerconaDB administrators need to check their database versions, as attackers can chain two critical vulnerabilities and completely take over the server hosting the database.

      The two critical vulnerabilities, which can lead to arbitrary code execution, root privilege escalation, and server compromise, affect MySQL and forks like Percona Server, Percona XtraDB Cluster, and MariaDB, according to security researcher Dawid Golunski, who provided details of the vulnerability on LegalHackers. Administrators should install the latest updates as soon as possible, or in cases where the patches cannot be applied, they should disable symbolic link support within the database server configuration by setting symbolic-links=0 in my.cnf.

    • OOPS! MySQL Falls Down…

      While programming, it’s easy to get tunnel-vision or to accept some “tiny” risk that things could go wrong at some point but write the code that way anyway. That’s what happened with MySQL and MariaDB. Creating a database should not create a vulnerability but it does, because a repair operation allows changing permissions of a file with a particular name which a bad guy could substitute with malicious code…

    • Talk Recap: Holistic Security for OpenStack Clouds

      Thanks to everyone who attended my talk at the OpenStack Summit in Barcelona! I really enjoyed sharing some tips with the audience and it was great to meet some attendees in person afterwards.

      If you weren’t able to make it, don’t fret! This post will cover some of the main points of the talk and link to the video and slides.

    • [Older, out of paywall now] Dirty COW and clean commit messages
    • Book Review: PAM Mastery

      Linux, FreeBSD, and Unix-like systems are multi-user and need some way of authenticating individual users. Back in the old days, this was done in different ways. You need to change each Unix application to use different authentication scheme. Also, authentication schemes differed between a variant of Unix systems. Porting was a nightmare. For example to use Windows Server (Active Directory) or LDAP for authentication you need to make changes to an application. Each application had its way of authenticating users. So Open Group lead to the development of PAM for the Unix-like system. Today Linux, FreeBSD, MacOS X and many other Unix-like systems are configured to use a centralized authentication mechanism called Pluggable Authentication Modules (PAM). The book “PAM Mastery” deals with the black magic of PAM.

  • Defence/Aggression

    • [Older] Leaked Hillary Clinton emails show U.S. allies Saudi Arabia and Qatar supported ISIS

      A recently leaked 2014 email from Hillary Clinton acknowledges, citing Western intelligence sources, that the U.S.-backed regimes in Saudi Arabia and Qatar have supported ISIS.

      “We need to use our diplomatic and more traditional intelligence assets to bring pressure on the governments of Qatar and Saudi Arabia, which are providing clandestine financial and logistic support to ISIL and other radical Sunni groups in the region,” the document states.

      This adds to a growing body of evidence that theocratic Gulf monarchies have helped fuel the surge of extremist groups throughout the Middle East.

    • Somali militants intensify attacks, death count doubles: experts

      Islamist rebels have intensified their attacks in Somalia, detonating larger, more sophisticated devices, bringing in more foreign expertise and doubling the death toll from last year, experts said.

      The surge in violence threatens an upcoming presidential vote and the reconstruction of a nation whose population is already leaving in droves, swelling a global migrant crisis, analysts and academics told Reuters.

      The findings, some of them also outlined in a coming U.N. report, reveal the challenge facing Somalia’s Western-backed government as it battles militants who want to overthrow it and impose their harsh version of sharia, or Islamic law.

    • Indonesian President cancels Australia trip after violent protests

      Indonesian President Joko Widodo has postponed his trip to Australia following the violent protest that erupted Friday in Jakarta.
      Widodo informed Prime Minister Malcolm Turnbull of his decision Saturday and instructed his Foreign Minister Retno Marsudi to reschedule his visit, according to a statement released from the palace.

      Violent clashes erupted in Jakarta on Friday as protesters demanding the ouster of the city’s governor, who has been accused of blasphemy against Muslims, clashed with police, CNN Indonesia reported.
      Gov. Basuki Tjahaja Purnama, commonly known as Ahok, is alleged to have insulted Islam by criticizing his opponents’ use of a Quranic verse in a stump speech. Ahok is a member of Indonesia’s Christian minority.

    • Indonesia’s Blasphemy Protest Prompts President to Postpone Australia Visit

      President Joko Widodo postponed a state visit to Australia, citing unrest at home after a rally called by hard-line Muslims drew 200,000 people protesting against the capital’s Christian governor.

  • Transparency/Investigative Reporting

  • Environment/Energy/Wildlife/Nature

    • Clinton Campaign Responds to DAPL Face-Off

      Charlie Galbraith, serving as a Clinton advisor, shared the campaign’s official statement in an e-mail to ICTMN: “We received a letter today from representatives of the tribes protesting the construction of the Dakota Access Pipeline. From the beginning of this campaign, Secretary Clinton has been clear that she thinks all voices should be heard and all views considered in federal infrastructure projects. Now, all of the parties involved—including the federal government, the pipeline company and contractors, the state of North Dakota, and the tribes—need to find a path forward that serves the broadest public interest. As that happens, it’s important that on the ground in North Dakota, everyone respects demonstrators’ rights to protest peacefully, and workers’ rights to do their jobs safely.”

      As ICTMN contributor Sarah Sunshine Manning reported this afternoon from the Treaty Camp, the newest camp set up by the water protectors directly in the pipeline’s path along Highway 1806. The police massed and pressed the protectors south, using piercing sirens, armored cars, and ATVs, while low flying planes and helicopters circled above. “Within minutes,” Manning said, “a large force of police arrived on both sides of the camp and surrounded about 400 to 500 water protectors.”

    • Presidential Race a Choice Between Levels of Climate Catastrophe

      The definition of ‘climate denier’ should include the states and institutions that are not taking necessary steps to avoid dangerous climate change, says professor Chris Williams

    • Trump just proposed ending all federal clean energy development

      In the last week, Republican presidential nominee Donald Trump has repeatedly vowed to zero out all federal spending on clean energy research and development. And the plan he released would also zero out all other spending on anything to do with climate change, including the government’s entire climate science effort.

      You may have missed this bombshell because team Trump did not spell out these cuts overtly. In a campaign where the media has “utterly failed to convey the policy stakes in the election,” as Vox’s Matt Yglesias explained recently, it appears only Bloomberg BNA bothered to follow up with the campaign to get at the truth of Trump’s radical proposal.

      Polling guru Nate Silver of fivethirtyeight.com fame gives Trump a one in three chance of becoming president. So I agree with Yglesias that we ought to seriously look at the implications of Trump’s proposals — especially since if Trump wins, he’s all but certain to have a GOP-controlled Congress to back him.

    • The Election Will Decide if Obama’s Clean Power Plan Lives or Dies

      In February of 2009, during his second month in office, President Barack Obama stepped up to the lectern to deliver his first speech to a joint session of Congress. In it, he lobbied members of the House and Senate to come up with a mandatory cap on carbon emissions, a key tenant of his campaign stump. “I ask this Congress to send me legislation that places a market-based cap on carbon pollution and drives the production of more renewable energy in America. That’s what we need,” he said. Not surprisingly, that didn’t happen.

      Five years later, with Congress wallowing in its own motion-stopping muck, he took a different approach. He used existing federal laws to create climate legislation without needing the consent of Congress. The resulting mandate, known as the Clean Power Plan, requires States to significantly cut their carbon emissions from fossil fuel-fired power plants within the next 14 years. It was a major victory for environmentalists and gave serious credence to the U.S.’s role in the Paris Climate Agreement.

    • Real friends of the Earth vote Green

      In a recent blog, Erich Pica, head of Friends of the Earth, argues against voting for Jill Stein and the Green Party, and tells environmentalists to vote for Hillary Clinton in order to defeat Donald Trump. The call of liberals like Pica to embrace a lesser-of-two-evils strategy is not going to save the planet or humanity.

      Pica admits that Clinton has been bad on key environmental and climate justice issues and recognizes that the Green Party has a much better agenda. Stein’s agenda is in fact much stronger than that of FOE. The Green New Deal, for instance, calls for a transition to 100% clean renewable energy by 2030, a halt to the build-out of fossil fuels, and a full employment program.

  • Finance

    • How A Feeble Joke At A Party Derailed Japan’s Ratification Of TPP At The Last Moment

      Given the government majority, it seems likely that the TPP bill will finally pass at some point in the near future. But the fact that a rather unfunny joke was able to throw a spanner in the works even at this late stage shows that when it comes to trade deals, things aren’t over until they are over, as the recent CETA saga also indicates.

    • And you thought the TPP was secret. The RCEP is even worse

      There’s another massive deal you’ve never heard of. The Trans-Pacific Partnership – negotiated in secret between Australia and 11 other nations over 10 years – appears to be dead.

      It would have allowed US corporations to sue Australian governments in offshore tribunals, as they have long wanted to do, effectively trumping our own High Court. Donald Trump himself opposes it (bless him) as does Hillary Clinton, although she once helped to draw it up.

    • Black Lives Matter declares its opposition to TPP

      In that year, TPP went from a fringe issue to a central election battle, with Bernie Sanders and Donald Trump (and later, Hillary Clinton), all agreeing that it’s not a “trade deal” — it’s a kind of wishlist from multinational corporations that will allow them to subvert environmental, consumer, labor and safety laws to ensure maximum profits — and uniting in their opposition to it.

      Now, add another name to the list of TPP’s strange bedfellows opponents: Black Lives Matter, who have found a signature plank in Donald Trump’s platform that they can endorse wholeheartedly, as improbable as that may sound. It’s pitting the Congressional black caucus against Obama, who sees TPP as his legacy.

    • Democracy needs to know how sausage is made: NO Guggenheim Museum in Helsinki

      Think about the 7 million euros yearly which will be the running price paid by taxes from Helsinki. This means that every one of us who pays taxes in the capital will be paying a membership fee for this museum without having been asked for it. A membership fee of over 30 euros for each one of us every year. On top of that, the museum will charge entrance fees for us, as well as the tourists. By comparison, we have the Amos Anderson [2] museum, which is privately funding its new museum in the city center.

      On top of that comes the construction of the building, which is another 80 million from our taxes (some 200 euros from each one of us for that) and handed over a top land piece just in the heart of Helsinki.

      If approved, I suggest we then have a new optional tax clause for the citizens of Helsinki as we have for religious taxes; we should call it THE STATUS TAX. Whoever wishes to pay for the Guggenheim Museum from their taxes can click on it. If this goes ahead without these providences, I can see the start of a new business model where everyone asks for such a helping hand on the pretext of tourism and prestige! I know I will.
      I suggest that universities apply for such a business model to compensate for the recent budget cuts. For example, the Aalto University with its Alvar Aalto designed buildings, which attracts many tourists to Helsinki, should apply for an equal sum on terms of a fair opportunity clause.

      If Guggenheim wants to open a museum in Helsinki or anywhere else, they should do so at their own costs.

    • Accuracy of employees’ overtime records in question

      After yet another long day at work, Matsuri Takahashi was at the end of her rope.

      “It is already 4 a.m. now, and my body is trembling,” an employee of advertising giant Dentsu Inc. wrote on a social media site. “I am dying. It is too much. I am exhausted.”

      Her words were posted on Oct. 21, 2015, after she spent nearly 19 hours–from 8:56 a.m. the previous day to 3:38 a.m.–at work, according to data kept by a flap barrier gate at the Dentsu head office in Tokyo’s Shiodome district.

    • Corporate culture fixated on ‘Devil’s 10 principles’

      A Supreme Court ruling in 2000 is described as the “bible” on preventing “karoshi,” or death from overwork.

      The decision, concerning the death of a young and overworked male employee at Dentsu Inc., was supposed to have been a wake-up call for the advertising agency on taking care of its workers’ health.

      However, inside sources say the mind-set at Dentsu remains faithful not to the “bible” ruling, but instead to the “Oni-jussoku” (Devil’s 10 principles) set by a former president.

      One of those principles urges employees to reach their goals, even if it kills them.

      The court case stemmed from the suicide of a second-year employee at Dentsu’s radio division in August 1991, when Japan was nearing the end of its asset-inflated “bubble” economy. He was 24.

  • AstroTurf/Lobbying/Politics

    • Clinton and Cybersecurity: Has She Learned From Hacks and Wikileaks Dumps?

      Surrounded by desert marigold and prickly pear at the Ritz-Carlton’s Dove Mountain resort in Arizona’s Sonoran Desert, presidential hopeful Hillary Clinton revealed her greatest fears when facing cyberattacks. “It’s not only what others do to us and what we do to them and how many people are involved in it,” she said, recounting how the U.S State Department was attacked hundreds of times each day while she was secretary of state. “It’s what’s the purpose of it? What is being collected, and how it can be used?”

      It was October 2013, and she was speaking at a private summit of Silicon Valley executives convened by Goldman Sachs, the audience peppered with such high-fliers as Anne Wojcicki, CEO of genomics firm 23andme and former wife of Google co-founder Sergey Brin, and Etsy CEO Chad Dickerson, among other luminaries. Cyberattacks, Clinton told them, whether perpetrated by state-sponsored groups or lone hackers, all tended to be for the same reason: “People were trying to steal information, use it for their own purposes.”

    • #PodestaEmails30: Wikileaks releases the second batch of the day

      Included in WikiLeaks’ 30th release of Podesta Emails was a message sent Sunday, December 20, 2015, by Lisa Jackson. She is vice president of Environment, Policy and Social Initiatives for Apple and reports directly to CEO Tim Cook.

    • Jill Stein: Don’t ‘Throw Your Vote Away’ On Clinton Or Trump

      The Green Party candidate for president is pushing back against those who see her as a spoiler in the race.

      Jill Stein, who is up to 4 percent in the latest CBS News poll, told WBZ NewsRadio 1030 that every vote counts.

      “We encourage people not to throw your vote away on more of a two-party failed political system, but to invest your vote in a real movement for change that our party alone represents,” she said.

    • Stop Hoping For a Hillary Landslide

      Will pro-Hillary progressives go along with a belligerent Clinton White House? It’s a fair question, given how quickly the last decade’s anti-war movement fell nearly silent after Barack Obama’s victory in 2008.

      In an Oct. 25 essay, former U.S. Representative Dennis Kucinich warned readers of The Nation about the influence of a “bipartisan foreign-policy elite [that] recommends the next president show less restraint than President Obama… As this year’s presidential election comes to a conclusion, the Washington ideologues are regurgitating the same bipartisan consensus that has kept America at war since 9/11 and made the world a decidedly more dangerous place.”

      Ms. Clinton’s own record and the endorsements she has received from Bush-Cheney neocons suggest we’ll see a shift from President Obama’s recent caution back to the war-machine polices of the last decade and even the last century. In 2017, that’ll mean a renewed Cold War with Russia with a possible standoff over Syria, deeper U.S. military involvement in Muslim nations in which civilians will suffer most (including more aid for Saudi Arabia’s assault on Yemen), and unconditional support for Israel’s violent suppression of Palestinian human rights.

    • WikiLeaks Founder Assange Refutes Clinton Russia Claims – Feels Sorry For Her

      Julian Assange counters the claims of Hillary Clinton and her media propagandists stating unequivocally that the source of the leaks that WikiLeaks has made a campaign fixture over the last few weeks is not, contrary to her deflective claims, the Russians.

      The Clinton camp picked an impressive, overwhelmingly large and credible sounding number of 17 as the number of agencies that have supported their claims. No evidence has been provided, but we can trust Hillary. She’s not the kind of person to say something if it isn’t true, we all know that. Having 17 intelligence agencies backing up your allegations is the kind of support that would make the claims of Russian interference nearly irrefutable if they are true. “If and true,” here we go again. She could have chosen any number and been equally dishonest, as Mr. Assange explains.

    • Julian Assange: Isis and Clinton Foundation are both funded by Saudi Arabia and Qatar

      Wealthy officials from Qatar and Saudi Arabia who donated money to Hillary Clinton’s charitable foundation also provided financial support to Isis, WikiLeaks founder Julian Assange has claimed.

      In an extended interview at the Ecuadorian embassy in London with documentary maker John Pilger for RT, Mr Assange said the same Saudi and Qatari officials could be seen to be supporting both the Clinton Foundation – founded by Mrs Clinton’s husband Bill – and funding the activities of Isis.

      Mr Pilger asked if Mr Assange believed that “this notorious jihadist group, called Isil or Isis, is created largely with money from people who are giving money to the Clinton Foundation”

    • Majority of voters think Clinton acted illegally, new poll finds

      A majority of voters believe Hillary Clinton has done something illegal, according to a new McClatchy-Marist Poll days before the presidential election.

      A total of 83 percent of likely voters believe that Clinton did something wrong – 51 percent saying she did something illegal and 32 percent saying she something unethical but not illegal. Just 14 percent said she’s done nothing wrong.

      By comparison, 79 percent think Donald Trump did something wrong, though not nearly as many think he did something illegal. Just 26 percent think he’s done something illegal, while 53 percent think he’s dome something unethical but not illegal. Just 17 percent think he’s done nothing wrong.

    • WIKILEAKS: Clinton pal praises Hillary: ‘Eventually she will sound like a human’

      Hillary Clinton is dishonest and robotic, her friend Neera Tanden wrote in an email to Clinton campaign chairman John Podesta in August 2015.

      In the email exchange, published by WikiLeaks on Friday, Tanden wrote that Hillary “often says she absolutely won’t do something and then does it.” It is not clear from the context of the email what specifically Tanden was referring to.

      Tanden, president of the left-wing think tank Center for American Progress, urged Podesta to “stay on her” and “lock her in,” because if he did, “eventually [Hillary] will sound like a human.”

    • WikiLeaks impact: Clinton Foundation accepts it received $1mn gift from Qatar

      The Clinton Foundation has confirmed it accepted a $1 million gift from Qatar while Hillary Clinton was US secretary of state without informing the State Department, even though she had promised to let the agency review new or significantly increased support from foreign governments.

      Qatari officials pledged the money in 2011 to mark the 65th birthday of Bill Clinton, Hillary Clinton’s husband, and sought to meet the former US president in person the following year to present him the check, according to an email from a foundation official to Hillary Clinton’s presidential campaign chairman, John Podesta. The email, among thousands hacked from Podesta’s account, was published last month by WikiLeaks.

      Clinton signed an ethics agreement governing her family’s globe-straddling foundation in order to become secretary of state in 2009. The agreement was designed to increase transparency to avoid appearances that US foreign policy could be swayed by wealthy donors.

    • Clinton’s charity confirms Qatar’s $1 million gift while she was at State Dept

      The Clinton Foundation has confirmed it accepted a $1 million gift from Qatar while Hillary Clinton was U.S. secretary of state without informing the State Department, even though she had promised to let the agency review new or significantly increased support from foreign governments.

      Qatari officials pledged the money in 2011 to mark the 65th birthday of Bill Clinton, Hillary Clinton’s husband, and sought to meet the former U.S. president in person the following year to present him the check, according to an email from a foundation official to Hillary Clinton’s presidential campaign chairman, John Podesta. The email, among thousands hacked from Podesta’s account, was published last month by WikiLeaks.

      Clinton signed an ethics agreement governing her family’s globe-straddling foundation in order to become secretary of state in 2009. The agreement was designed to increase transparency to avoid appearances that U.S. foreign policy could be swayed by wealthy donors.

    • Hillary Deleted Email Showing She Forwarded Classified Information To Her Daughter

      Hillary Clinton deleted a 2009 email in which she forwarded classified information to her daughter, Chelsea.

      The email was released on Friday by the State Department. It is one of thousands of documents recovered by the FBI from Clinton’s private email server.

    • Mid East ‘not all bad’ : Bill Clinton’s speeches revealed in WikiLeaks’ #PodestaEmails31

      WikiLeaks has released more emails from Hillary Clinton’s campaign chair John Podesta, with only four days until the presidential election.

      The latest release contains more than 2500 emails, bringing the total number to over 50,000. WikiLeaks has said it would publish 50,000 emails before election day.

      On Friday, there were two releases of Podesta emails. They revealed further examples of the campaign’s disdain for former Clinton rival Bernie Sanders, and shed light on Bill Clinton’s paid speeches when Clinton was secretary of state. The emails also revealed the campaign’s relationship with Apple and its influential donors.

    • Hillary Clinton Email Investigation: Alleged NYPD Source Reportedly Says Clintons Involved In Sex Slavery, Child Sex Crimes, Child Exploitation And More

      The Hillary Clinton email investigation has rocked this year’s election with its timing, but it’s about to be rocked even more, that is if a report by online news source True Pundit is legitimate.

      The right-wing publication claim the new emails have exposed the Clintons for being involved in such atrocities as child sex crimes, child exploitation, sexual slavery, money laundering, perjury and obstruction of justice to name a few.

    • How Jill Stein Could Force the Enforcement of Election Laws and Save Us All

      CTR has long been criticized for its announcement that it would engage in coordination with the Clinton Campaign. Citing a legal loophole, CTR enraged campaign finance reformers with what they considered to be illegal activity, announcing AstroTurf efforts over social media to assist Hillary Clinton. In June I wrote a piece about this supposed loophole.

      Under the Code of Federal Regulations, activity is coordinated with a candidate, campaign or committee when it satisfies what is known as the three-pronged analysis: Payment, content, and conduct. When that happens, unless exempted, it is treated as an in-kind contribution or coordinated expenditure. We can spare ourselves the nitty gritty of each of these prongs because CTR has openly acknowledged that its activities meet the requirements to be considered coordinated.

    • Jill Stein is polling at four percent. But she says she’s staying in the race

      We met Jill Stein, the Green Candidate for president, outside Hillary Clinton’s campaign headquarters in Brooklyn, a two fingers-up at her opponent.

      A week ago this would have been an interesting interview, but it might have felt a bit peripheral to the main election story. Hillary was comfortably ahead in most polls, and no one was discussing Jill Stein and libertarian Gary Johnson as much.

      Then the Great Tightening happened, and the polls narrowed. And suddenly the number of votes accrued by third party candidates feels very relevant indeed.

      Averages have had Jill at about two percent recently, but the latest New York Times/CBS News poll released this week has her at four percent. That’s more than the gap separating Trump and Clinton in the same poll.

      I asked her if she is willing to instruct her voters to back Hillary in key swing states. She said no.

      “It is a race to the bottom with the greater and lesser evil,” she begins. “I urge people not to throw their vote away on the same political system that has thrown you under the bus. It’s very important to invest your vote in a real movement for change.”

    • Susan Sarandon: ‘DNC is completely corrupt’

      Actress Susan Sarandon on Thursday tore into the Democratic National Committee (DNC), calling it “completely corrupt.”

      “After my experience in the primary, it’s very clear to me the DNC is gone,” she told CNN’s Carol Costello.

      “Every superdelegate is a lobbyist. The way that the system is set up in terms of trying of having superdelegates — you could win a state and not get the delegates. It’s crazy.”

      Sarandon backed Sen. Bernie Sanders (I-Vt.) for the Democratic nomination. She said she still respects Sanders even though he endorsed Hillary Clinton for president.

    • Confused Reporter Doubles Down On Bogus Trump/Russian Server Story With ‘I’m Just Asking Questions’ Non-Apology
    • WikiLeaks Emails: Podesta Threatened To Quit Campaign Last Year

      John Podesta threatened to quit his position as Hillary Clinton’s campaign chairman late last year over an issue involving campaign contributions from his brother, superlobbyist Tony Podesta.

      Podesta appears to have made the threat in order to protect Tony, who is the elder Podesta, from pressure that the campaign’s finance team gave over donations to the Hillary Victory Fund (HVF), a controversial joint fundraising committee coordinated between the Clinton campaign, the Democratic National Committee and 32 state party committees.

    • WikiLeaks: Top Clinton Aides Bemoan Campaign ‘All Tactics,’ No Vision

      A hacked email released Saturday by WikiLeaks provided fresh evidence that top aides were frustrated that Hillary Clinton’s campaign lacked a vision or principles beyond simply acquiring power.

      In the email, sent on Jan. 22, Clinton campaign chairman John Podesta responded glumly to a question from Morgan Stanley executive Tom Nides about how things were going.

    • ‘Rahmemail.com’: Wikileaks shows Emanuel’s use of personal domain

      The mayor also received an email from Podesta on a separate personal Gmail account that was included in the hacked emails posted by WikiLeaks.

    • Clinton Foundation ‘More Like a Political Operation’ Than Charity

      The Clinton Foundation operated “more like a political operation” than a traditional charity, a lawyer warned in a memo marked “confidential” in 2008.

      Bruce Lindsey, chairman of the foundation’s board of directors, sent the memo — an earlier draft of the final report — to Clinton family consiglieri Cheryl Mills in 2011. WikiLeaks released that email Saturday in its latest batch of communications hacked from the Gmail account of John Podesta, Hillary Clinton’s campaign chairman.

    • “The DNC is gone”: Susan Sarandon defends vote for Green Party candidate Jill Stein

      Actress, activist, and former Bern-feeler Susan Sarandon is now going Green in support of Jill Stein.

      Sarandon appeared on CNN Thursday to discuss the Dakota Access Pipeline protests, and the corruption of both Hillary Clinton and Donald Trump. She also condemned the DNC.

      “The DNC is gone and we need a progressive party,” Sarandon said in defense of her support for Jill Stein.

      Sarandon talked to CNN’s Carol Costello as a representative on the side of the Standing Rock Sioux tribe pipeline protesters. She explained that the issue has been largely ignored because neither presidential nominee wants to talk about it.

      “You’re not going to hear anything from her,” Saradon said about Clinton and the pipeline. “Because if you look at who supports their campaign and who’s contributed to Hillary’s campaign, it’s every single one of these corporations and banks.”

    • The Left Is Under No Obligation To Support Hillary Clinton

      But if we want to move beyond the cycle of mobilization and retreat that dominates left electoral activity in the US, we have no choice but to build our own political formations, as difficult as that will be. They will have to do what all parties do—run candidates for office, particularly in states and localities where competition between Democrats and Republicans is low. Considering the many institutional barriers to effective independent politics, they will also have to launch fights to change ballot access laws and other measures aimed at maintaining the two-party duopoly.

      Beyond that, they should also focus on building the intellectual and organizational capacities of their base between elections, and raise people’s expectations of what is possible instead of managing them downward. And perhaps most importantly, they must resist the tendency of unions and other social movement organizations to prioritize short-term interests and goals above all other concerns.

      The Sanders campaign and the mini-revival of protest activity shows us that millions of people are fed up with the political order and want an alternative to it. Instead of accepting and working within the limitations of the system they despise, why not begin the hard work of offering one to them?

    • Ohio judge warns Trump campaign as voter advocates score court wins

      A U.S. judge in Ohio ordered Republican presidential candidate Donald Trump’s campaign on Friday not to intimidate voters as voting-rights advocates scored a string of last-minute victories in several politically competitive states.

      The ruling by U.S. District Court Judge James Gwin creates the possibility of fines or jail time for Trump allies who harass voters, a significant victory for Democrats who had worried the real-estate mogul was encouraging supporters to cause mayhem at the polls on Nov. 8.

      The ruling also deals a blow to a Trump-aligned “exit poll” that seeks to mobilize thousands of supporters.

      The Trump campaign appealed the decision.

    • Data Wars: Trump Bought Battery-Powered Toy Car for Toddlers; Hillary Runs Up-Engined Race Car (and a TEAM to run it). Perhaps the Biggest Lopsided Advantage of 2016

      The two are night-and-day. The Obama system is 4.5 TIMES BETTER. Not 4.5 PERCENT better (in a year when the election was decided by 5%). It was not 45% better. the Obama machine is 4.5 TIMES BETTER. 350% better. Understand. One side has something that is not 100% better or 200% better than your system. Its something that is 350% better than yours. When you spend a million dollars on a TV ad campaign that boosts your voter turnout by 10,000 votes. And the other side uses their system to run a better TV ad campaign – that also costs 1 million dollars, but they get 45,000 votes!!! 4.5 time better! 350% better!.

      That is what Obama built in 2012. That is what was called ‘Narwhal’. That was using the bleeding-edge tech called Big Data. I wrote several blogs about it then and did a total analysis of the two systems compared head-to-head, written for MARKETING people, in other industries than politics, that I published here in early 2015. This is THE DEFINITIVE article about what is Big Data and why its the new era in databases. Why it makes psychographics like used by Romney (and now Trump) obsolete.

    • Southern states have closed down at least 868 polling places for the 2016 election

      Next week, Americans will hold the first presidential election in 50 years without the full protections of the Voting Rights Act.

      It’s a terrifying fact. The Voting Rights Act targeted policies that purposely kept black voters from the polls. But the US Supreme Court struck down part of the law in 2013, limiting the federal government’s oversight of states with long histories of suppressing minority voters.

      As a result, states have passed more voting restrictions over the past several years — including controversial voter ID laws and cutbacks on early voting days and hours.

    • WikiLeaks releases latest batch of emails from Clinton campaign chair

      The whistleblowing site has published more than 50,000 emails in the lead up to the presidential election on Tuesday. Today’s trache contains 2074 new emails.

      Saturday’s release contained transcripts from Bill Clinton’s fundraising speeches, which included the former president attacking UK Labour leader Jeremy Corbyn and discussing the need for a tough leader to “enforce the trigger that will re-impose sanctions” should Iran violate the nuclear deal.

    • Paul Ryan: The choice facing America

      This is how Clinton can so casually classify whole groups of people as “deplorables.” And it is how the Clintons can treat transparency like it’s something for other people, not for them.

    • Clinton directed her maid to print out classified materials

      As secretary of state, Hillary Clinton routinely asked her maid to print out sensitive government e-mails and documents — including ones containing classified information — from her house in Washington, DC, e-mails and FBI memos show. But the housekeeper lacked the security clearance to handle such material.

      In fact, Marina Santos was called on so frequently to receive e-mails that she may hold the secrets to E-mailgate — if only the FBI and Congress would subpoena her and the equipment she used.

      Clinton entrusted far more than the care of her DC residence, known as Whitehaven, to Santos. She expected the Filipino immigrant to handle state secrets, further opening the Democratic presidential nominee to criticism that she played fast and loose with national security.

    • Will the Media Reset After the Election or Are We Stuck With This Tabloid Stuff?

      The venerable New York Times ran a story saying Donald Trump lies about the height of his buildings.

      For no apparent reason, the Times resurrected some information from 1979 saying Trump insisted on counting the basement levels of his signature Trump Tower in the overall count of how many floors the building has. The Times compares this lie to “reports” that Trump adds an inch to his actual body height in his bio materials, and also repeated the gag line that he boasted about how long his penis is (no word on whether it is or is not actually longer than expected.)

      You have to wade down to paragraph 12 to learn other New York developers use the same count-the-basements levels gimmick to be able to advertise their buildings as taller. There is absolutely no news.

  • Censorship/Free Speech

    • Munich court to try Facebook’s Zuckerberg for inciting hatred

      A Munich court has opened a lawsuit against Facebook founder Mark Zuckerberg, German media reported on Friday. News outlet “der Spiegel” wrote on its website, before the main weekly magazine’s Saturday release, that it had obtained court documents charging the social media mogul with incitement to hatred.

      Zuckerberg is reportedly being charged alongside Facebook CEO Sheryl Sandberg, chief Europe lobbyist Richard Allan, and his Berlin counterpart Eva-Maria Kirschsieper.

      According to Spiegel, the complaint comes from the Würzburg-based attorney Chan-jo Jun. In the suit, he accuses Facebook of tolerating appeals for murder, threats of violence, and Holocaust denial, among other things.

      Laws regulating hate speech in Germany are extremely tight, with most Nazi symbolism and racist propaganda strictly forbidden, a legacy of Germany’s role in World War II. Although Facebook is obliged to remove illegal content from its site, it has repeatedly garnered hefty criticism for the time it takes to do so.

    • Israeli Lawmakers Pushing Mandatory, Default ISP Porn Filtering Because That Always Works So Well

      So, because internet porn is easier to access than ice cream, ISPs may be forced to stop allowing ice cream to flow uninterrupted through its lines unless customers of age specifically ask to be “exposed to” ice cream. If customers want porn to burst from every digital orifice connected to their ISP, they would need to opt-in via phone call, letter, or through the ISP’s website.

      Other people, who would just like to have their access to websites less effed up will also have to do the same, considering website filtering/blocking is far from perfect and tends to net a bunch of false positives. Critics of the bill only have to point to all the other times this has happened to provide examples of why this is a bad idea.

      In addition, a list of opt-in users would be created because there’s no way an opt-in “service” doesn’t. I can’t imagine why the government might be interested in the contents of such a list, but the fact that it’s there means it could be obtained without too much paperwork if “needed.” Then there are other outside forces, like malicious hackers, who might find it entertaining to plaster lists of “porn, please!” users all over the internet.

    • Bare-chest activist plans to show up on Md. beaches

      This coming summer, Chelsea Covington plans to hit the beach topless.

      She’s is not an exhibitionist or a nudist. Instead, she believes in normalizing the female body and has traveled throughout the mid-Atlantic, blogging about her interactions with people along the way.

      She has taken photos at the Washington Monument, biked along trails in Philadelphia and visited beaches in New Hampshire, Assateague Island and Ocean City.

      The 27-year-old from Maryland’s Eastern Shore advocates for “topfreedom,” the belief that women have the same rights as men to not be obligated by laws cover their chests.

      Covington believes that this type of gender shaming can be associated with “lifelong health concerns.” She uses the term “bare chested,” because she said topless is a gendered term that wouldn’t be used to describe a man.

    • Turkey blocks WhatsApp, YouTube, Facebook and Twitter all over again

      THE ANTI-FRIENDLY Turkish government has once again blocked local access to commonly used social networks including WhatsApp, Facebook and Twitter.

      We have been here before. President Recep Tayyip Erdogan squats on communications every time anyone starts talking about him, his party, his family, and probably Turkey, in a less than positive way.

      Today it is because some political opposition is getting the spotlight, so the move makes sense if you are someone like Erdogan who shuts down communications at the drop of a hat.

      “The TurkeyBlocks monitoring network has detected restrictions on access to multiple social media services Facebook, Twitter and YouTube throughout Turkey beginning Friday Nov 04 2016 1:20AM local time, ongoing as of Friday noon,” reported Turkey watcher TurkeyBlocks.

    • Turkey Doubles Down on Censorship With Block on VPNs, Tor

      In what’s a significant escalation in its censorship efforts, the Turkish government now wants to block the very same tools that tech-savvy citizens use to get around the government-imposed social media blocks.

      On Friday, the Turkish information technologies and communications authority, or BTK, ordered internet providers in the country to block Tor and several other censorship-circumvention Virtual Private Networks or VPNs, such as VPN Master, Hotspot Shield, Psiphon, Zenmate, TunnelBear, Zero, Vypr, Express, according to multiple local reports.

      Earlier in the day, the government had already blocked Twitter, Facebook and YouTube, and restrictions on messaging apps like WhatsApp and Skype were also reported. The independent monitoring organization TurkeyBlocks also reported throttling and other forms of censorship on Friday, linking the disruptions and blocks to the arrests of pro-Kurdish party leaders.

    • Tired of people circumventing social media blocks, Turkey calls for VPN ban

      As of a few hours ago, there’s a new VPN ban in Turkey. Turkey’s Information and Communication Technologies Authority has issued an order to Turkish Internet service providers (ISPs) telling them to institute a VPN ban. Many Turkish internet users were using VPNs to access social media platforms after Twitter, Facebook, and Youtube were blocked last night amid ongoing military operations and political unrest, according to Turkey Blocks. In addition to attempting to ban connections to VPN services, Turkish ISPs are also blocking access to VPN homepages as well as the Tor project homepage.

    • Turkey blocks access to Twitter, WhatsApp and Facebook

      Ban is reportedly related to 11 arrests of opposition party politicians

      Turkey has blocked Twitter, Facebook, WhatsApp and YouTube, according to censorship monitoring site, Turkey Blocks.

      The group broke the news today around 1am local time, saying the government was throttling these services. This is a method of slowing down websites to the extent that they become difficult to use or unusable.

    • Chinese Police Dub Censorship Circumvention Tools As ‘Terrorist Software’

      The Great Firewall of China is pretty well-known these days, as is the fact that it is by no means impenetrable. The Chinese authorities aren’t exactly happy about that, and we have seen a variety of attempts to stop its citizens from using tools to circumvent the national firewall. These have included Chinese ISPs trying to spot and block the use of VPNs; deploying China’s Great Cannon to take out anti-censorship sites using massive DDoS attacks; forcing developers of circumvention tools to shut down their repositories; and pressuring Content Delivery Networks to remove all illegal circumvention, proxy and VPN services hosted on their servers.

      Despite years of clampdown, anti-censorship tools are still being used widely in China — one estimate is that 1-3% of China’s Internet users do so, which would equate to millions of people. However, Global Voices has a report of police action in the Chinese region of Xinjiang, whose indigenous population is Turkic-speaking and Muslim, that may be the harbinger of even tougher measures against circumvention tools.

    • Scottish film explores censorship in the GDR
    • Deputy Justice Minister slams FB ‘censorship’ of Polish nationalists

      Twitter banner for 5 November protest outside Facebook’s Warsaw HQ reads: Freedom of Speech for Nationalists – Stop Censorship. Photo: Twitter.com/Marsz Niepodległości @StowMarszN

      Deputy Justice Minister Patryk Jaki accused the social media giant of censorship, which he said was “outrageous”.

      Facebook’s reported decision to block the pages comes ahead of Poland’s Independence Day, which falls on 11 November and is typically marked by marches organised by nationalist organizations and others in the country’s capital.

      Tens of thousands annually take to the streets on the day, which has in recent years ended in outbreaks of violence and clashes with police.

      Nationalists are planning a 5 November protest outside the social media site’s Warsaw offices.

    • Nielsen Forced To Pull Report Offline After It Shows ESPN Losing More Subscribers Than Ever

      ESPN has been losing hand over fist as consumers shift to streaming alternatives and new “skinny” TV bundles of smaller channels. The company is estimated to have lost roughly 7 million subscribers in just a few years, and a recent survey found that 56% of consumers would drop ESPN in a heartbeat if it meant saving $8 a month on their cable bill (the estimate of how much ESPN costs each subscriber). The losses are largely thanks to ESPN executives failing to see the cord-cutting threat coming. Apparently it’s difficult to identify shifting viewership trends with your head buried squarely in the sand.

      Fast forward to this week, when viewer-monitoring firm Nielsen released a report stating that ESPN lost more subscribers than ever last quarter. According to the original Nielsen report, ESPN lost 621,000 homes in a single month, as well as losing 607,000 ESPN2 households, and 674,000 ESPNU homes.

    • Adobe Asked Google To Censor Techdirt’s Story On How Adobe’s DRM Got Cracked

      Another day, another example of copyright being a tool for censorship. MarkMonitor is one of the largest companies out there in the “IP protection” business — and they also have a decently long history of filing bogus DMCA notices. And in one of its recent ones… they targeted a Techdirt news story. You see, three years ago, our own Tim Cushing wrote a little story about how Adobe launched its Creative Cloud subscription offering and had the DRM on it cracked within 24 hours. It was a fun (yet all too predictable) story.

    • Govt to block more websites, raising censorship specter

      The government says it will intensify its crackdown on websites accused of spreading hatred based on issues of ethnicity, religion and race (SARA) after receiving more requests to do so, raising the specter of online censorship.

      The move came as religious sentiments over the upcoming Jakarta gubernatorial election escalated and spread online, mainly after Jakarta Governor Basuki “Ahok” Tjahaja Purnama was accused of disrespecting Al-Maidah 51, a verse in the Quran.

      The Communications and Information Ministry claimed that since Oct. 31 it had received more requests to block websites allegedly spreading SARA-based hatred from several authorities, including the National Police, the National Counterterrorism Agency (BNPT) and the State Intelligence Agency (BIN)

    • Mapplethorpe complaint at Westmount library brings censorship into focus

      In 1990, a Robert Mapplethorpe photography exhibit opened at the Contemporary Arts Centre in Cincinnati, Ohio. Both the centre and its director, Dennis Barrie, were charged with obscenity. The public outcry against censorship was remarkable. Later, the charges were dropped.

      In 2016, the Montreal Museum of Fine Arts opens an interesting, if not entirely satisfactory, exhibit of the same Robert Mapplethorpe’s work, this one called Focus: Perfection.

    • Comic artists in Vietnam face the tight grip of censorship

      A young generation of Vietnamese comic artists is struggling to get its work published as local publishers hesitate to give the nod to comics targeting older age groups.

      The third volume of popular Vietnamese comic Meo Moc (Musty Mew) by rising 24-year-old artist Dang Quang Dung was recently recalled by publishers after a one month run in local bookstores.

      The artist attributes the recall to a scene featuring the comic’s feline protagonist on the toilet and the word ‘poop’ appearing later in the volume, both of which were deemed ‘offensive’ by book censors.

    • CENSORED: 100 years of film censorship in New Zealand

      One hundred years ago, film censorship was introduced to New Zealand, making it illegal to show any film without it first being passed by the Censor.

      The 1916 Cinematograph Film Censorship Act was the government’s first attempt to restrict what New Zealanders could watch and hear in audiovisual media.

    • Turkey Doubles Down on Censorship With Block on VPNs, Tor

      In what’s a significant escalation in its censorship efforts, the Turkish government now wants to block the very same tools that tech-savvy citizens use to get around the government-imposed social media blocks.

      On Friday, the Turkish information technologies and communications authority, or BTK, ordered internet providers in the country to block Tor and several other censorship-circumvention Virtual Private Networks or VPNs, such as VPN Master, Hotspot Shield, Psiphon, Zenmate, TunnelBear, Zero, Vypr, Express, according to multiple local reports.

      Earlier in the day, the government had already blocked Twitter, Facebook and YouTube, and restrictions on messaging apps like WhatsApp and Skype were also reported. The independent monitoring organization TurkeyBlocks also reported throttling and other forms of censorship on Friday, linking the disruptions and blocks to the arrests of pro-Kurdish party leaders.

    • Ilya Troyanov: ‘Against censorship, for an open discussion’

      There needs to be an open discussion against simplifying the past, says the award-winning author. Troyanov speaks to DW about the dangers of glorifying Communist dictatorship in Eastern European countries.

    • YouTube blocks a video…on left wing censorship: Site’s algorithm blacklists educational footage

      Last month, YouTube was accused of censorship after it emerged it has been removing the ability for users to make money from their videos if they express politically incorrect or offensive views.

      And the latest video to fall victim to the site’s new censorship rules is, ironically, one on left wing censorship.

      The video, titled ‘The Dark Art of Political Intimidation’, was placed in ‘restricted mode’, making it inaccessible to schools, libraries and those with a YouTube filter.

    • China demands live-streaming censorship
    • China Moves to Regulate Live Streaming
    • Chinese internet authorities to crack down on ‘threatening’ live-streaming
    • China to Censor Online Streaming from December 1st
    • Cyberspace Admin Issues New Live-streaming Rules
    • China to regulate live streaming
    • China rules on live video streaming
    • China Censors Online Video Streaming
    • China Issues New Rule Requiring Licence for People Live-Streaming News, Entertainment Content
    • China formalizes its live-streaming industry rules
    • China to regulate online live streaming services
    • China tightens screws on live-streaming firms
    • China cracks down on growing live streaming industry
    • New Chinese Law to Tighten Grip on Live Streaming Services Online
    • China to Enforce Stricter Regulations on Chinese Live-Streaming Sites
    • China demands live-streaming censorship
    • Open Rights Groups slams porn censorship proposal
    • Hong Kong lawmakers-elect who called for independence threatened China’s security -state TV
    • Hong Kong lawmakers-elect who called for independence threatened China’s security
    • If China Meant to Chill Hong Kong Speech, Booksellers’ Case Did the Job
    • Report: China Censorship Machine Not the Monolith It Appears to Be
    • Researchers reverse-engineer Chinese streaming services to learn how they’re censored
    • Researchers uncover hidden censorship on Chinese live-streaming apps
    • No censorship at UAE book fairs — NMC [Ed: Puff piece from government media, trying to obscure a culture of overt censorship at UAE]
    • DirecTV blackout of Fox News, CNN spurs allegations of censorship plot
    • Demystifying Social Media Censorship — in Arabic, Spanish and English
    • Here’s The Truth: Shiva Ayyadurai Didn’t Invent Email
    • Censorship Kills: Remembering Sattar Behesthi
    • Harsh Censorship Like In Emergency: Editors Guild On Action Against NDTV
    • Editors Guild Slams Ban on NDTV India, Says it Violates Freedom of Media
    • Anger at ‘harsh censorship’ as Indian network silenced
    • Indian editors accuse govt of imposing censorship
  • Privacy/Surveillance

    • Why I won’t recommend Signal anymore

      One of the things I do is cryptography and infosec training for investigative journalists who have a need to keep either their sources and communications confidential so they can more safely do their work in the public interest. Often they work in places which are heavily surveilled, like Europe, or the United States. Ed Snowden’s documents explain a thing or two about how the US intelligence apparatus goes about its day-to-day business. They sometimes also work in places in the world where rubber hose cryptanalysis is more common than in say the U.S. or Europe. Which is why crypto tools alone are not the Alpha and the Omega of (personal) security. This requires careful consideration of what to use when, and in what situation. One of the things I have recommended in the past for various cases is the OpenWhisperSystems’ app called Signal, available for Android and iOS. In this article, I want to explain my reasons why I won’t be recommending Signal in the future.

    • GCHQ wants internet providers to rewrite systems to block hackers [Ed: GCHQ wants more mass “surveillance” because “HACKERS” (they use to say “TERROR”). The latest routers from BT (not the older ones) already block/break VPNs. This was noticed by the media. Nobody knows why?]

      GCHQ is urging internet providers to change long-standing protocols to stop computers from being used to set off large-scale cyber attacks.

      The Government’s cyber-defence arm said it plans to work with networks such as BT and Virgin Media to rewrite internet standards to restrict “spoofing” – a technique that allows hackers to impersonate other computers and manipulate them to carry out anonymous attacks.

    • How to block the ultrasonic signals you didn’t know were tracking you

      Dystopian corporate surveillance threats today come at us from all directions. Companies offer “always-on” devices that listen for our voice commands, and marketers follow us around the web to create personalized user profiles so they can (maybe) show us ads we’ll actually click. Now marketers have been experimenting with combining those web-based and audio approaches to track consumers in another disturbingly science fictional way: with audio signals your phone can hear, but you can’t. And though you probably have no idea that dog whistle marketing is going on, researchers are already offering ways to protect yourself.

      The technology, called ultrasonic cross-device tracking, embeds high-frequency tones that are inaudible to humans in advertisements, web pages, and even physical locations like retail stores. These ultrasound “beacons” emit their audio sequences with speakers, and almost any device microphone—like those accessed by an app on a smartphone or tablet—can detect the signal and start to put together a picture of what ads you’ve seen, what sites you’ve perused, and even where you’ve been. Now that you’re sufficiently concerned, the good news is that at the Black Hat Europe security conference on Thursday, a group based at University of California, Santa Barbara will present an Android patch and a Chrome extension that give consumers more control over the transmission and receipt of ultrasonic pitches on their devices.

    • Why do diplomats use this alien WhatsApp emoji for Vladimir Putin? [iophk: "corporate surveillance"]

      When the world’s nations sit down to talk nowadays, there is a distinct difference to the way diplomacy is done. Influence is no longer defined only by special relationships and old alliances, but which WhatsApp group you are invited into.

      The rise of WhatsApp diplomacy is transforming the negotiating chamber. There are countless groups of allies and virtual huddles, exchanges over policy statements and fine print, and fair amounts of banter and even emojis (Vladimir Putin is referred to by widespread use of a grey alien avatar).

      “You can form small groups of like-minded allies, take photos of annotated documents, ask people what they think without the whole room knowing,” a senior western diplomat said.

      The tool is useful for communicating with allies who might not be sitting close to them, diplomats say, as well as for agreeing negotiating tactics during difficult sessions and for organising break-out huddles in a way that avoids offending those left out.

    • How Bureaucrats and Spies Turned Canada Into a Surveillance State

      This week, Canadians received a shock to the system when a spate of news items revealed how police and spy agencies flout the law and moral conventions to spy on citizens and journalists, in some cases dating back for many years.

      The largest blow to Canada’s often rosy image came on Thursday when a federal court ruling revealed that the Canadian Security Intelligence Service (CSIS) has been operating a secret metadata collection program since 2006, and retained citizens’ identifying information illegally. The question on every Canadian’s mind now is: how, in our supposedly sleepy liberal democracy, did this happen?

      In establishing the domestic spy agency with the CSIS Act, legislators largely left it up to CSIS itself to decide how the law should be interpreted. “It appears that CSIS got their own legal advice that gave them the most favourable spin or interpretation of the law that one could possibly take,” said privacy lawyer David Fraser in an interview. “Really, stretching it almost to the breaking point.”

    • Oliver Stone’s Snowden puts the spotlight back on the NSA

      The US election is imminent. It pits a dangerous demagogue in Donald Trump against an establishment candidate in Hillary Clinton. The list of those victimised by Trump is dwarfed only by his detractors.

      On the campaign trail, Trump has managed to insult women, Hispanics and Muslims just to name a few groups. Yet Clinton hardly arouses the enthusiasm of voters. Many feel she has been co-opted by Wall Street and that she is a foreign policy hawk.

      The Wikileaks revelations confirmed that the leadership of the Democratic National Committee worked against Bernie Sanders in order to secure Clinton the nomination. I am wondering what Oliver Stone makes of it all. But, getting hold of Stone, at several removes, proves to be difficult. You could say he is almost as elusive as the subject of his latest movie – Snowden.

    • Don’t cyber-mess with Britain, warns UK Chancellor

      Britain’s adversaries want to damage its economy and society and their new weapon of choice is the Internet.

      Thirty years ago this sentence would have read like science fiction. Twenty years ago it would have sounded like technobabble. By 10 years ago it would merely have been dismissed as a bit far-fetched.

      And yet this is what Philip Hammond, the UK Chancellor of the Exchequer, suggested yesterday in a speech outlining an ambitious UK cyber-security strategy that has been emerging gradually since 2010.

    • Inside the NSA’s For-Sale Spy Town

      Operations around Sugar Grove have also been tied to the NSA’s controversial ECHELON surveillance program, according to National Security Archive researchers. The top-secret program was created during the Cold War to monitor Soviet and Eastern Bloc communications, but later evolved into a global interception and data harvesting system.

      After being shut down last year, the spy town can now be yours—for a couple of million dollars.

      Once home to some 400 government employees and their families, Sugar Grove Station’s only residents a year after it was decommissioned appear to be spiders and a particularly brazen groundhog. The spying activities have moved on, some of them to a related nearby base that’s still operational.

    • We Can’t Trust Trump With Today’s NSA

      Donald Trump has shown he’ll stop at nothing to humiliate and intimidate his critics. He published Sen. Lindsey Graham’s personal cellphone number so Trump supporters could harass him. He encouraged the Russian government to hack Hillary Clinton (though he later claimed he was joking) and promised to imprison her. He has tweeted false and embarrassing accusations against Sen. Ted Cruz, former Miss Universe Alicia Machado, and many others.

    • ‘UK’s censorship & harassment are no solution’: European journalists’ union speaks up for RT

      The General Secretary of the European Federation of Journalists (EFJ) has chastised the UK government for its treatment of RT, in relation to state-owned British bank NatWest’s decision to close its accounts.

    • GCHQ recruiting for elite cyber force… but past experience not required
    • Big Brotherism, by platform
    • Lost in the splinternet
    • Britain’s cybersecurity policy needs common sense, not just cash
    • Identifying Your Company’s Edward Snowden
    • Here’s what happened at the Edward Snowden talk you couldn’t get into
    • Edward Snowden speaks on privacy and surveillance at McGill University
    • What Snowden Had to Say at the McGill Videoconference
    • McGill University: Progress Report on the Strike by Casual Employees
    • Edward Snowden gives a virtual conference at McGill University
    • Edward Snowden Calls Out Canadian Police for Spying
    • Three New Scandals Show How Pervasive and Dangerous Mass Surveillance is in the West, Vindicating Snowden
    • Edward Snowden Update: NSA Whistleblower Says Security Agencies Use Your Smartphones To Listen In

      Former U.S. National Security Agency contractor and whistleblower Edward Snowden warned that phones can be compromised by security agencies to listen in on the user’s activities even when the device is not programmed to do so.

      Snowden spoke about the surveillance state in an interview with Digits, a series on privacy during the age of the internet. The 33-year-old whistleblower rose to prominence when he leaked classified documents that revealed the NSA spying on U.S. citizens.

      “The TV is a medium that you watch. The internet is a medium that watches you as you watch it,” Snowden reportedly said in the interview. ”Everywhere you go, even when you’re not actively using your phone, it’s still listening.”

    • Police surveillance scandal: Quebec minister calls for new probe

      The police spying crisis has gone from bad to worse, with Public Security Minister Martin Coiteux ordering an administrative investigation into the practises of the Sûreté du Québec dating back to 2013.

      Coiteux made the announcement within hours of the provincial police force revealing it had tracked the calls and movements of six journalists that year after news reports based on leaks revealed Michel Arsenault, then president of Quebec’s largest labour federation, had his phone tapped.

      The controversy began Monday after Montreal media outlet La Presse reported that police had tracked columnist Patrick Lagacé’s cellphone to find out if he was being leaked information from police officers.

    • Hackers Say They’re Revealing More from Trove of NSA Data
    • The US Government and Zero-Day Vulnerabilities: From Pre-Heartbleed to Shadow Brokers
    • What we can (and can’t) learn from the latest shadow brokers dump
  • Civil Rights/Policing

    • Why Non-Immigrant Visas are Unconstitutional (H-1B, L-1, etc.)
    • Chelsea Manning Tried Committing Suicide a Second Time in October

      Chelsea Manning tried to commit suicide last month at the start of a week of solitary confinement at the prison barracks at Fort Leavenworth, Kan., that was imposed on her as punishment for a previous attempt to end her life in July.

      Ms. Manning, the former Army intelligence analyst who is serving a 35-year sentence for leaking archives of secret documents to WikiLeaks, disclosed the attempted suicide, which took place Oct. 4, in a statement she dictated over the phone to a member of her volunteer support network. She asked that it be sent this week to The New York Times, according to members of the network who want to keep their identities private.

      Chase Strangio, an American Civil Liberties Union lawyer representing Ms. Manning, formerly known as Bradley Manning, said, “I can confirm there was a second suicide attempt.”

      “She asked me to confirm that,” he added.

    • ‘There’s So Much Money On The Table’: Hillary Aide Reacts To SCOTUS Ruling

      Democratic presidential nominee Hillary Clinton’s campaign manager Robby Mook was only too pleased after the U.S. Supreme Court struck down aggregate limits on individual donations to political candidates, parties, and political action committees (PACs), according to new emails released by WikiLeaks in connection with its dump of campaign chairman John Podesta’s server.

      “Gotta have the state parties in the joint — so much money on the table,” he wrote to colleagues April 3, 2014, shortly after the Court’s ruling in McCutcheon v. FEC. McCutcheon is the spawn of the controversial Citizens United ruling, which authorized independent political expenditures by corporations or labor unions. Clinton denounces the decision regularly and says she will apply Citizens United as a litmus test against her judicial nominees.

    • Apple Offers Anti-Trump App Allowing Voters To Trade Votes

      At a time rife with speculation that the presidential vote on Tuesday may be rigged or tampered, we find it troubling – not to mention illegal – that Tim Cook has allowed the Apple store to distribute an app called #NeverTrump created by Trimian, whose mission statement is “Red or Blue, we must all unite to defeat Trump this election. Let’s ensure Hillary wins in swing states, and make sure third-party votes count.”

      The app allows potential voters to trade votes, boosting Hillary’s support in swing or battleground states, while 3rd party candidates get more (meaningless) support in blue states.

    • Erik Prince: NYPD Ready to Make Arrests in Anthony Weiner Case

      Blackwater founder and former Navy SEAL Erik Prince told Breitbart News Daily on SiriusXM that according to one of his “well-placed sources” in the New York Police Department, “The NYPD wanted to do a press conference announcing the warrants and the additional arrests they were making” in the Anthony Weiner investigation, but received “huge pushback” from the Justice Department.

    • Support Whistleblowers at the Aaron Swartz Hackathon This Weekend

      This weekend you have the chance to add to Aaron Swartz’s legacy by boosting tools for whistleblowers.

      The 2016 Aaron Swartz International Hackathon—held in honor of the late Internet and political activist—will take place during the day Saturday and Sunday at the Internet Archive in San Francisco. The hackathon will focus on whistleblower submission system SecureDrop, which was created by Swartz and Kevin Poulsen to connect media organizations and anonymous sources and is managed by the Freedom of the Press Foundation.

      This weekend’s events—timed to what would have been his 30th birthday on Nov. 8—will also feature a series of speakers on Saturday night, including SecureDrop’s Conor Schaefer, Fight for the Future Co-founder Tiffiniy Cheng, and EFF Executive Director Cindy Cohn, as well as a special statement from Chelsea Manning.

    • Remember, remember: Liberties are like muscles

      In the spirit of commemoration, I thought we could mark this November the Fifth by taking some time out of our daily lives and consider again where society is going. Where once you had the freedom to object, to think and speak as you saw fit, you now have censors and systems of surveillance coercing your conformity and soliciting your submission. It may not be much, yet, but it is there. How did this happen?

    • Protest Against Corruption, Censorship Leads to Arrests in London

      British police arrested nearly 50 people in London Saturday during a protest they described as “anti-capitalist,” organized by the computer hacking group known as Anonymous.

      A similar demonstration in Washington, said to be “anti-corruption,” resulted in two arrests for defacing or damaging public property.

    • What is the Million Mask March and when is it taking place? Date, map and how to watch

      The marches, which are organised through Facebook groups, call for people to protest against mass government surveillance, internet censorship and ‘corrupt politicians who put capitalism before the people’.

      A post about the marches on the Anonymous website states: “2016 has arguably seen little, to absolutely no improvements, and in fact many situations have worsened tremendously in various regions of the world.

      “It is crucial we stand together now to show our increasing numbers to those who call themselves the ‘elite’ and their political puppets.

      “Join us in November to spread the message to the masses that our worldwide revolution is at hand.

      “Stand with the Anonymous Movement, and together in one voice let us remind our world-dictators that we do not forgive and we do not forgot.

      “They should have expected us.”

    • Thousands join Million Mask March in London amid rigorous police restrictions

      Thousands of protesters have descend on central London for the Million Masked March, despite Scotland Yard imposing strict restrictions on the event.

      Supporters of the hacking collective Anonymous began marching on Trafalgar Square on Saturday with scores of police officers maintaining a tight perimeter.

      The group’s agenda is broadly anti-capitalist and pro-civil liberty, with many of the demonstrators wearing Guy Fawkes masks in an effort to recreate the final scene of cult film V For Vendetta. It is one of many similar marches held worldwide on 5 November.

    • Million Mask March: police curb protests amid fears of violence

      Thousands of masked protesters have gathered in central London for the annual Million Mask March.

      Wearing trademark Guy Fawkes masks, supporters of the hacking collective Anonymous met in Trafalgar Square in Westminster accompanied by scores of police officers.

      Scotland Yard has imposed stringent restrictions on protesters after clashes with police, incidents of criminal damage and attempts to invade official buildings at previous years’ events.

    • Million Mask March ends with dozens arrested in central London

      Thousands of masked protesters descended on central London on Saturday night for the Million Mask March, an annual global anti-capitalism and pro-civil liberties demonstration.

      Wearing characteristic Guy Fawkes masks, supporters of hacking collective Anonymous crowded into Trafalgar Square with scores of police on hand to keep order. The protest passed off without major incident, though by 10.45pm police had made 47 arrests, the majority for drug offences and obstruction of officers.

    • Remember, remember, the Fifth of November

      In the spirit of commemoration, I thought we could mark this November the Fifth by taking some time out of our daily lives and consider again where society is going. Where once you had the freedom to object, to think and speak as you saw fit, you now have censors and systems of surveillance coercing your conformity and soliciting your submission. It may not be much, yet, but it is there. How did this happen?

    • Rolling Stone and journalist found guilty over false Virginia rape story

      Rolling Stone magazine and a journalist have been found guilty of defamation over a false article about a gang rape at the University of Virginia.

      The $7.5m (£6m) lawsuit was brought by Nicole Eramo, an associate dean from the university, who said the article had cast her as the “chief villain”.

      The 2014 article, written by Sabrina Rubin Erdely, included the rape claim of an unidentified female student.

      The magazine retracted the article in April 2015, citing inconsistencies.

      The 9,000-word article, entitled A Rape on Campus, centred on the testimony of a student, referred to as “Jackie”, who claimed to have been gang raped at a party held at the Phi Kappa Psi fraternity’s house in 2012.

    • Pope: “It is inhumane to shut our doors to refugees but prudence is needed to integrate them properly”

      During the press conference on the flight from Malmö to Rome, Francis said “there is a political price to pay when imprudent calculations are made” regarding the numbers a country is able to host, resulting in it being unable to offer housing, schooling and jobs. The Pope also praised oratories and volunteers in Italy, that were born “from the apostolic zeal of parish priests” and he once again rejected the possibility of female priests in the Catholic Church

    • Why travelling to the US from Sweden is about to get easier

      Travelling to the US from Swedish capital Stockholm is about get much easier, with the two countries signing a ‘preclearance’ agreement on Friday that will allow American customs procedures to take place in Sweden’s Arlanda international airport before passengers board their flight.

      The Swedish government said it hopes the increased ease of travel will have positive consequences like for example making Sweden a more attractive place for international companies to base their headquarters in.

    • ERDOGAN THREAT: Give Turkey VISAS BY CHRISTMAS or it will open EU borders to migrants

      Under the current EU agreement, Turkey takes back migrants who have travelled illegally through the country to Greece, but the warning could spark a new wave of migrants trying to use Turkey as a way in to Europe.

      The deal was agreed last year when more than a million people arrived in Europe, most reaching Greek islands by boat and continuing by land to Germany.

      The number of migrants arriving in Greece has fallen dramatically since the agreement, with 2,970 crossing the Aegean from Turkey in October compared with 211,663 in the same month last year.

    • Yet another young woman is seen being publicly caned ‘for standing too close to her boyfriend’ as Indonesia becomes the latest country to embrace radical Islamic law

      ANOTHER young woman has been publicly caned in Indonesia after falling foul of the country’s strict Islamic laws.

      The 20-year-old “criminal” was put through the harrowing ordeal after being caught standing too close to her boyfriend in Banda Aceh – the capital of Aceh province.

    • Fears over violence in Jakarta as hardline Islamists protest governor’s ‘blasphemy’

      Security forces in the Indonesian capital Jakarta are on high alert in preparation for a Friday rally by hardline Islamist groups against the city’s non-Muslim governor.

      Thousands of people are due to move into the capital to protest against Basuki Tjahaja Purnama, an ethnic Chinese and Christian nicknamed ‘Ahok’, who has governed the city since 2014.

      They accuse him of blasphemy after he criticised his opponents for referencing a verse in the Koran that warns against allying with Christians and Jews.

      In September, Ahok suggested those who used the passage against him were “lying”, leading to outrage from some hardliners who interpreted his comments as criticism of the Islamic holy text. He later apologised.

    • Myanmar police to arm, train non-Muslims in conflict-torn region

      Myanmar police will begin arming and training non-Muslim residents in the troubled north of Rakhine State, where officials say militants from the Rohingya Muslim group pose a growing security threat, police and civilian officials said.

      Human rights monitors and a leader of the mostly stateless Rohingya told Reuters the move risked sharpening intercommunal tensions in a region that has just seen its bloodiest month since 2012, when hundreds of people were killed in clashes between Muslims and ethnic Rakhine Buddhists.

      Soldiers have poured into the Maungdaw area along Myanmar’s frontier with Bangladesh, responding to coordinated attacks on three border posts on Oct. 9 in which nine police officers were killed.

      Security forces have locked down the area – shutting out aid workers and independent observers – and conducted sweeps of villages in Maungdaw, where the vast majority are Rohingyas. Official reports say five soldiers and 33 alleged insurgents have been killed.

    • Judge orders closure of low-cost Bridge International schools in Uganda [Ed: Articles about Bill Gates in The Guardian are now literally sponsored by Bill Gates. And this is not corrupt journalism? Classic. It's still a mouthpiece for Gates after he paid them millions.]

      Uganda’s high court has ordered the closure of a chain of low-cost private schools backed by Bill Gates and Mark Zuckerberg, respectively the founders of Microsoft and Facebook.

    • Dakota Access pipeline protests: UN group investigates human rights abuses

      Native American protesters have reported excessive force, unlawful arrests and mistreatment in jail where activists describe being held in cages

    • Speaking from prison, incarcerated reporter maintains innocence

      After having served nearly three months in a federal prison camp in central California, Matthew Keys is making the best of it.

      In August 2016, the 29-year-old journalist began his two-year sentence in Atwater, California, about 120 miles east of San Francisco. Earlier this year, Keys was convicted at trial under the Computer Fraud and Abuse Act (CFAA), the notorious anti-hacking federal law that dates back to the 1980s. An effort to reform that law has languished in Congress.

      Keys told Ars that, even post-conviction, he did not hand over any login information that led to the 40-minute alteration of a Los Angeles Times headline in 2010.

      Hours before Keys’ sentencing hearing in April 2016, Ars received a letter from someone under the pseudonym “Sam Snow,” who claimed that he, and not Keys, was the one who actually handed over the login details. This new claim by Snow will likely have no impact on Keys’ appeal, which is pending at the 9th Circuit US Court of Appeals.

      Ars has been periodically corresponding with Keys by e-mail through CORRLINKS, the monitored e-mail system set up for federal inmates, and the following interview has been edited for clarity. We hope to be able to visit him in person in the coming months.

    • Tunisian PM sacks minister over criticism of Saudi Arabian Islam

      Tunisia’s prime minister sacked the minister of religious affairs on Friday after he accused Saudi Arabia’s Wahhabi brand of Islam of being behind “terrorism and extremism”.

      “Prime Minister Youssef Chahed decided to dismiss Salem Abd El Jalil, minister of religious affairs, from his duties due to the lack of respect for government work and his statements that touched principles of Tunisian diplomacy,” the premier’s office said in a statement.

      Tunisian media on Thursday quoted Abd El Jalil as saying in parliament: “I told the Saudi ambassador in Tunisia that terrorism and extremism historically came from you … You should reform your (religious) school.”

      He could not be immediately reached for comment on Friday.

  • Internet Policy/Net Neutrality

    • How the Soviets invented the internet and why it didn’t work

      Consonant with Glushkov’s greater life-work commitments, the network plans reflected a deliberately decentralised design. This meant that, while Moscow could specify who received which authorisations, any authorised user could contact any other user across the pyramid network – without direct permission from the mother node. Glushkov intimately understood the advantages of leveraging local knowledge in network designs, having spent so much of his career working on related mathematical problems while ferrying between his home and the central capital (he jokingly called the Kiev-Moscow train his ‘second home’).

      The OGAS project appeared to many state officials and economic planners, especially in the late 1960s, to be the next best response to an old conundrum: the Soviets were agreed that communism was the way of the future, but no one since Marx and Engels knew how best to get there. For Glushkov, networked computing might just inch the country toward an age of what the author Francis Spufford later called ‘red plenty’. It was the means by which the sluggish pulp-based lifeblood of the command economy – quotas, plans and wrist-bending compendiums of industry standards – would transform into the nation’s neural firings, moving at the sublime speed of electricity. The project signified no less than the ushering in of ‘electronic socialism’.

      Such ambitions require brilliant, committed people willing to throw off the old ways of thinking. In the 1960s, those people could be found in Kiev – a couple of blocks from where the Strugatsky brothers wrote their science fiction by night and worked as physicists by day. There, on the outskirts of Kiev, Glushkov ran the Institute of Cybernetics for 20 years, beginning in 1962. He filled his institute with ambitious young men and women; the average age of researchers was about 25. Glushkov and his youthful staff dedicated themselves to developing the OGAS and other cybernetic projects in the service of the Soviet state, such as a system of electronic receipts for virtualising hard currency into an online ledger of accounts – this in the early 1960s. Glushkov, who was known to talk down Communist Party ideologues by quoting paragraphs of Marx from memory, described his innovation as a faithful fulfilment of Marxist prophecy of a moneyless socialist future. Unfortunately for Glushkov, the idea of Soviet e-currency stirred up unhelpful anxieties and did not receive committee approval in 1962. Fortunately, his grand economic network project did live to see another day.

    • Senator Wyden Warns That AT&T’s New Merger Poses A Massive Threat To Net Neutrality

      As AT&T fires up its lobbyists and various policy tendrils to sell the company’s $100 billion (including debt) acquisition of Time Warner, the focus of the conversation has very quickly shifted to net neutrality and zero rating. AT&T already exempts its own content from the company’s usage caps, and its DirecTV Now streaming service, launching later this month, is expected to follow suit. Once AT&T acquires Time Warner and its various properties (HBO, CNN), the worry is that this content will also get a leg up by being cap-exempt, creating an unlevel playing field for competing content and streaming services.

    • DOJ Sues DirecTV, Calling It A ‘Ringleader’ of Collusion Over Regional Sports Programming

      Back in 2013, Time Warner Cable (now Charter Communications) struck an $8.35 billion deal with the LA Dodgers to create LA SportsNet, the exclusive home of LA Dodgers games. To recoup that money, Time Warner Cable began demanding exorbitant prices from competing cable providers if they wanted access to the channel. Unsurprisingly, all of Time Warner Cable’s competitors in the region balked at the $5 per subscriber asking price for the channel. As a result, for three years now a massive portion of Los Angeles hasn’t been able to watch their favorite baseball team, since Time Warner Cable’s asking price not only kept competing cable operators from delivering the channel, but prohibited over-the-air broadcasts of the games.

  • Intellectual Monopolies

    • Copyrights

      • Finally Come The Calls In Major Media To Rethink Canada’s ‘Notice And Notice’ Copyright System

        To be fair to our neighbors to the north, Canada really tried. Amidst calls to implement something like the “notice and takedown” system for copyright infringement claims that we have in the States, Canada instead did what Canada does and tried to implement a nicer version of this, called “notice and notice.” The idea was that ISPs and service providers, rather than simply taking down content or banning people from the internet over copyright violations, would instead notify users that their behavior had been reported as infringing. More specifically, it allowed copyright holders to pass along these messages, with ISPs acting as the go-between. The theory was that when internet users — or in many cases family members of those internet users, such as parents — learned that potentially infringing activity was occurring, the notifications would cause the behavior to cease.

        As our own Karl Bode noted in 2014, this theory was backed by the ISPs, who claimed these notices helped curb a majority of piracy. We also noted in that post that the “notice and notice” system appeared to be preferable to our “notice and takedown” system because it appeared to be a less likely avenue for abuse by copyright holders and trolls. Sadly, that was immediately disproven by Rightscorp, with abuse of the system continuing up to the present. When eighty-year-old women are getting settlement shakedown threats from copyright trolls over video games, the aims of educating the public have clearly been subverted.

      • TED Accused of Using the DMCA to Silence Talk Criticism

        TED, a series of popular conferences, has the motto Ideas Worth Spreading. However, when a YouTuber made a video criticising and featuring content from a recent TED talk, the non-profit filed a DMCA notice with YouTube. Speaking with TorrentFreak, TED says that regardless of content, YouTube videos which violate its usage policy will be removed.

      • Anti-Piracy Group Uses ‘Pirated’ Code on its Website

        The Business Software Alliance, a trade group representing Adobe, Apple and Microsoft, is well known for its aggressive anti-piracy campaigns. The organization actively encourages people to snitch on software pirates, luring them with big cash rewards. Amusingly, however, the page where people can report unlicensed software is using ‘unlicensed’ jQuery code.

]]>
http://techrights.org/2016/11/06/linux-4-9-now-in-rc4/feed/ 0
Links 28/10/2016: NetBSD 7.0.2, Linux Mint 18.1 Will be “Serena” http://techrights.org/2016/10/28/linux-mint-18-1-will-be-serena/ http://techrights.org/2016/10/28/linux-mint-18-1-will-be-serena/#comments Fri, 28 Oct 2016 23:41:40 +0000 http://techrights.org/?p=96471

GNOME bluefish

Contents

GNU/Linux

  • Linux Voice / Linux Magazine Merge

    Issue 32 is the last issue of Linux Voice as a stand-alone magazine as we have joined Linux Magazine. This newly merged magazine will bring the best bits of Linux Voice and Linux Magazine together into a single volume. All four of us Linux Voice founders will still be here contributing to the newly merged magazine – you’ll find us in the aptly named Linux Voice section. We’ll continue to write about the things that excite us in the world of open source software and we’ll continue making our popular podcast.

  • Desktop

  • Server

    • Managing OpenStack with Open Source Tools

      Day 2 operations are still dominated by manual and custom individual scripts devised by system administrators. Automation is needed by enterprises. Based on the above analysis, Ansible is a leading open source project with a high number contributions and a diverse community of contributions. Thus Ansible is a well supported and popular open source tool to orchestrate and manage OpenStack.

    • Databricks Weaves Deep Learning into Cloud-Based Spark Platform

      Databricks, a company founded by the creators of the popular open-source Big Data processing engine Apache Spark, is a firm that we’ve been paying close attention to here at OStatic. We’re fans of the company’s online courses on Spark, and we recently caught up with Kavitha Mariappan, who is Vice President of Marketing at the company, for a guest post on open source tools and data science.

      Now, Databricks has announced the addition of deep learning support to its cloud-based Apache Spark platform. The company says this enhancement adds GPU support and integrates popular deep learning libraries to the Databricks’ big data platform, extending its capabilities to enable the rapid development of deep learning models. “Data scientists looking to combine deep learning with big data — whether it’s recognizing handwriting, translating speech between languages, or distinguishing between malignant and benign tumors — can now utilize Databricks for every stage of their workflow, from data wrangling to model tuning,” the company reports, adding “Databricks is the first to integrate these diverse workloads in a fast, secure, and easy-to-use Apache Spark platform in the cloud.”

    • OpenStack Building the Cloud for the Next 50 Years (and Beyond)

      Two OpenStack Foundation executives talk about what has gone wrong, what has gone right and what’s next for the open-source cloud.
      BARCELONA, Spain—When OpenStack got started in 2010, it was a relatively small effort with only two companies involved. Over the last six years, that situation has changed dramatically with OpenStack now powering telecom, retail and scientific cloud computing platforms for some of the largest organizations in the world.

    • The Myth of the Root Cause: How Complex Web Systems Fail

      Complex systems are intrinsically hazardous systems. While most web systems fortunately don’t put our lives at risk, failures can have serious consequences. Thus, we put countermeasures in place — backup systems, monitoring, DDoS protection, playbooks, GameDay exercises, etc. These measures are intended to provide a series of overlapping protections. Most failure trajectories are successfully blocked by these defenses, or by the system operators themselves.

    • How to assess the benefits of SDN in your network

      Software-defined networking has matured from a science experiment into deployable, enterprise-ready technology in the last several years, with vendors from Big Switch Networks and Pica8 to Hewlett Packard Enterprise and VMware offering services for different use cases. Still, Nemertes Research’s 2016 Cloud and Data Center Benchmark survey found a little more than 9% of organizations now deploying SDN in production.

  • Kernel Space

    • Applying the Linus Torvalds “Good Taste” Coding Requirement

      In a recent interview with Linus Torvalds, the creator of Linux, at approximately 14:20 in the interview, he made a quick point about coding with “good taste”. Good taste? The interviewer prodded him for details and Linus came prepared with illustrations.

      He presented a code snippet. But this wasn’t “good taste” code. This snippet was an example of poor taste in order to provide some initial contrast.

    • DTrace for Linux 2016

      With the final major capability for BPF tracing (timed sampling) merging in Linux 4.9-rc1, the Linux kernel now has raw capabilities similar to those provided by DTrace, the advanced tracer from Solaris. As a long time DTrace user and expert, this is an exciting milestone! On Linux, you can now analyze the performance of applications and the kernel using production-safe low-overhead custom tracing, with latency histograms, frequency counts, and more.

    • The initial bus1 patch posting
    • Linux 4.8.5

      I’m announcing the release of the 4.8.5 kernel.

      All users of the 4.8 kernel series must upgrade.

      The updated 4.8.y git tree can be found at:
      git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.8.y
      and can be browsed at the normal kernel.org git web browser:

      http://git.kernel.org/?p=linux/kernel/git/stable/linux-st…

    • Linux 4.4.28
    • BFQ I/O Scheduler Patches Revised, Aiming To Be Extra Scheduler In The Kernel

      FQ developers had hoped to replace CFQ in the mainline Linux kernel with Budget Fair Queueing for a variety of reasons but it hadn’t ended up making it mainline. Now the developers are hoping to introduce BFQ back to mainline as an extra available scheduler.

      Paolo Valente on Wednesday published the latest patches dubbed “BFQ-v0″ for adding it as an extra scheduler. He began by saying, “this new patch series turns back to the initial approach, i.e., it adds BFQ as an extra scheduler, instead of replacing CFQ with BFQ. This patch series also contains all the improvements and bug fixes recommended by Tejun, plus new features of BFQ-v8r5…On average CPUs, the current version of BFQ can handle devices performing at most ~30K IOPS; at most ~50 KIOPS on faster CPUs. These are about the same limits as CFQ. There may be room for noticeable improvements regarding these limits, but, given the overall limitations of blk itself, I thought it was not the case to further delay this new submission.”

    • Graphics Stack

    • Benchmarks

      • Power Consumption & Efficiency Of The Linux Kernel For The Last Three Years

        Earlier this week I published Linux 3.9 through Linux 4.9 kernel benchmarks looking at the raw performance of various subsystems when testing each of the major kernel releases as far back as this Core i7 Haswell system was supported. From that same system, today is a look at testing the kernels going back to Linux 3.11 when Haswell graphics support was first in good shape for this Core i7 4790K box while looking at the raw power consumption and performance-per-Watt for these 19 major kernel releases.

      • The Idle Power Use Of The Past 19 Linux Kernel Releases

        This morning I published the Power Consumption and Efficiency Of The Linux Kernel For The Last Three Years article containing power consumption data for an Intel Haswell system going back to the Linux 3.11 kernel through Linux 4.9 Git. Those were some interesting power consumption numbers under load while here are the idle numbers.

        The idle tests were still running this morning so I opted to post them later since they’re interested in their own right. The same i7-4790K system was used for benchmarking all of these kernels from Linux 3.11 to Linux 4.9 (25 October Git). No other changes were made during the testing process. Each kernel was freshly booted to the Unity desktop and then launched the idle power consumption test for a period of three minutes while monitoring the AC power draw as reported by the WattsUp Power meter. Automating this with the Phoronix Test Suite: MONITOR=sys.power phoronix-test-suite benchmark idle.

      • Phoronix Test Suite 6.8 Milestone 1 Released
  • Applications

  • Desktop Environments/WMs

    • 6 Best Linux Desktop Environments [Part - 2]

      Linux has been developing at a good pace through this last years and with development comes better support for different hardware regarding support for proprietary drivers for video cards, better file systems, more choices in what operating system to use and one of the things that has it importance is distros graphical environment.

    • More Details On Enlightenment’s Ecore_Drm2 Atomic Modesetting

      Back in September the Enlightenment project’s EFL library added atomic mode-setting and nuclear page-flipping support to provide a “perfect rendering” and a “buttery smooth” experience. Earlier this month was then an update on the Ecore_Drm2 state while coming out this week is a Samsung OSG blog post explaining more about the atomic mode-setting details.

    • Ecore_Drm2: How to Use Atomic Modesetting

      In a previous article, I briefly discussed how the Ecore_Drm2 library came into being. This article will expand on that article and provide a brief introduction to the Atomic Modesetting and Nuclear Pageflip features inside the new Ecore_Drm2 library.

    • Papirus Icon Theme Scores Big October Update
    • K Desktop Environment/KDE SC/Qt

      • Qt Creator 4.2 Beta released

        Qt SCXML is a new module in Qt that allows you to create state machines from State Chart XML and embed them into Qt C++ and Qt Quick applications (Overview). It was released as Technical Preview in Qt 5.7 and will be released fully supported with Qt 5.8.

        Qt Creator 4.2 now supplements the module by offering a graphical editor for SCXML (experimental). It features editing states and sub-states, transitions, events, and all kinds of properties. The editor is experimental and the plugin is not loaded by default. Turn it on in Help > About Plugins (Qt Creator > About Plugins on macOS) to try it.

      • Qt Creator 4.2 Beta Released
    • GNOME Desktop/GTK

      • GObject and SVG

        GSVG is a project to provide a GObject API, using Vala. It has almost all, with some complementary, interfaces from W3C SVG 1.1 specification.

        GSVG is LGPL library. It will use GXml as XML engine. SVG 1.1 DOM interfaces relays on W3C DOM, then using GXml is a natural choice.

        SVG is XML and its DOM interfaces, requires to use Object’s properties and be able to add child DOM Elements; then, we need a new set of classes.

  • Distributions

    • Reviews

      • Chapeau Is Exactly What the Linux Desktop Needs

        That is where Chapeau comes in. Chapeau is a cutting-edge Linux distribution, built from Fedora Workstation, using the GNOME desktop environment, and intended to be an incredibly intuitive and easy to use, out-of-the box experience.

        Trust me when I say Chapeau is exactly that.

        Part of the Chapeau marketing states that it is “Fedora without the work.” I could not have said it better. With Chapeau, you get a desktop distribution in which everything works—in every way—out of the box.

    • New Releases

      • Maui 2 “Blue Tang” released

        The Maui team is happy to announce the release of Maui 2 – 64bit version.

        This is our second version of Maui which comes with plenty new features and fixes based on Plasma 5.8.2, KF 5.27 and Qt 5.7.0.
        We also provide the latest LTS Linux Kernel 4.4 together with an updated Ubuntu 16.04 LTS base system.
        Firefox was updated to version 49 and Thunderbird to version 45.

    • PCLinuxOS/Mageia/Mandriva Family

      • New KNOPPIX Release, LibreOffice 5.1.6, Rosa Down

        In Linux news today KNOPPIX 7.7.1 was released to the public based on Debian with GNOME 3.22, KDE 5.7.2, and “Everything 3D.” The Rosa project is experiencing network issues and folks may experience problems trying to connect to their services the next few days. LibreOffice 5.1.6 was announced today by The Document Foundation, the sixth update to the Still branch for stable users, and a new vulnerability was disclosed in GNU Tar.

      • Network shutdown

        From our part we will try our best to make the migrating process as smooth and seamless as possible for our partners.
        Note that the most possible period for unavailability of our resources is this weekend, but there is some probability it may also occur on Friday 10/28/16.
        In the first place, this process is aimed to improve the quality of our services, so please be patient and cooperative.

    • OpenSUSE/SUSE

      • openSUSE Tumbleweed – Review of the Week 2016/43

        The magic number this week is 6: that’s how many snapshots have been published since the last weekly review (1020, 1022, 1023, 1024, 1025 and 1026). Some of them were a bit larger than average (1026 – a big rebuild due to bash 4.4).

      • Identify constraint problems

        Until now it was not possible to easily identify if the constraints are the reaseon for your job to hang in state scheduled and not switching to building. That caused a lot of confusion for it was not clear what the problem is and if the state would change.

    • Red Hat Family

      • ESDS Teams Up With Red Hat On Managed Cloud Hosting Services

        ESDS Software Solution has announced that it has joined hands with Red Hat to bring together the benefits of cloud solutions to legacy applications and enterprise databases. Customers can now avail managed data and cloud hosting services on ESDS eNlight Cloud platform that allows vertical auto scaling of virtual machines. ESDS can now offer needed agility to enterprises that may not otherwise reap the benefits of cloud, given the architecture of their systems.

        eNlight Cloud is a state-of-the-art cloud hosting solution with a built-in ability to automatically scale CPU and RAM on-the fly. Customers can now access the benefits of automatic load sensing and scaling, pay-per-consumption metered billing, root access to enterprise databases and managed OS, database and network services by using Red Hat Enterprise Linux on patented eNlight Cloud. This solution is targeted at customers across several verticals including aviation, banking, manufacturing, oil & gas, shipping and telecommunications.

      • Swisscom, UKCloud Adopt Red Hat OpenStack Platform

        Red Hat announced today that both Swisscom and UKCloud will be leveraging its OpenStack platform as the companies transition toward cloud computing. Swisscom will use the platform to develop its own cloud platform, and UKCloud will provide its customers with the ability to deliver digital services directly to UK citizens.

      • Red Hat named as visionary in Gartner’s 2016 Magic Quadrant

        Red Hat, Inc., the world’s leading provider of open source solutions, on Thursday announced that Gartner, Inc. has positioned Red Hat in the “Visionaries” quadrant of Gartner’s October 2016 Magic Quadrant for Distributed File Systems and Object Storage for Red Hat Ceph Storage and Red Hat Gluster Storage.

      • CentOS 6 Linux Servers Receive Important Kernel Security Patch, Update Now

        We reported a couple of days ago that Johnny Hughes from the CentOS Linux team published an important kernel security advisory for users of the CentOS 7 operating system.

      • Finance

      • Fedora

        • Bodhi 2.3.0 released

          Bodhi 2.3.0 is a feature and bug fix release.

        • Fedora at Ohio Linuxfest 2016

          We arrived at the our hotel around 1PM on Friday. After checking in we headed over to find the new site in the Hyatt Regency Hotel. The first things we noticed was the Columbus Convention Center is doing a major renovation and one of those renovations was they removed the escalators from the food court to the second floor. At first we thought this may be a issue to move the event stuff in but there was an elevator close by. Also no signage for OLF in the Food Court area. After getting off the elevator on the second floor there was a sign pointing around the corner to the Ohio Linuxfest registration table. This year Ohio Linuxfest charged $10 for general attendees (free to students with student ID). We checked in and out our badges (yes insert favorite Blazing Saddles joke here). We walked down to the Vendor Expo hall which this year had a grand total of 28 exhibitors (see website for vendor lists). While the Expo was setup ready for Vendors to move in but the Vendor Expo was not open to the public on Friday.

        • The Bugs So Far Potentially Blocking The Fedora 25 Release

          Adam Williamson of the Fedora QA team has sent out a list of the bugs currently outstanding that could block the Fedora 25 release from happening on its current schedule should they not be fixed in time.

        • Updated Fedora 24 ISO Respins Now Available with Dirty COW-Patched Linux Kernel

          It looks like a new set of updated Live ISO images for the Fedora 24 GNU/Linux operating system were published by Ben Williams, founder of the Fedora Unity Project and a Fedora Ambassador.

          Dubbed F24-20161023, the updated Live ISOs a few days ago and include up-to-date components from the official Fedora 24 Linux software repositories, with which was fully syncronized as of October 23, 2016. Of course, this means that they also include the latest Linux kernel update fully patched against the “Dirty COW” bug.

        • PHP version 5.6.28RC1 and 7.0.13RC1
        • Flock Stories 2016, Episode 1: Redon Skikuli

          Flock Stories by Chris WardIf you were wondering where Flock 2018 might be, today’s guest Redon Skikuli might just have your answer! Redon is not just a Fedora community contributor, he’s a Fedora community creator. I ask Redon what he’s up to these days and why he thinks we should also consider joining future Flocks.

    • Debian Family

  • Devices/Embedded

    • Security-minded µQseven COM taps Allwinner A64

      Theobroma’s µQseven form factor “A64-µQ7”COM runs Linux 4.x on a quad-core -A53 Allwinner A64, and adds a security module.

      Austria-based Theobroma has released its second Allwinner-based computer-on-module using the half-size, 70 x 40mm µQseven form-factor. The A64-µQ7 follows the A31 µQ7, based on the quad-core, Cortex-A7 Allwinner A31. This time around the company has opted for the 64-bit, quad-core Cortex-A53 Allwinner A64.

    • Latest 96Boards SBC ships with GbE/PCIe add-on

      Fujitsu’s 96Boards CE compatible “F-Cue” SBC runs Linux on a quad-core Cortex-A15/A7 Socionext MB86S71 SoC, and offers a PCIe/GbE expansion board.

      The Fujitsu Electronics F-Cue is the latest Linux-driven 96Boards CE form factor SBC, following others like the uCRobotics Bubblegum-96 and Qualcomm DragonBoard 410c. The open-spec board uses the same 85 x 54mm CE spec, featuring standard 40- and 60-pin mezzanine expansion connectors. The board is pricier than most 96Boards entries, selling for $286, plus another for $48 an optional PCIe/GbE expansion board.

    • Rugged Qseven module runs Linux on Apollo Lake

      Seco unveiled a “Q7-B03” Qseven COM with Intel’s new Atom E3900 “Apollo Lake” SoC and optional onboard SATA flash and -40 to 85°C support.

    • 96Boards SBC adds “Giga” expansion and optional GbE card
    • Rugged Bay Trail boardset offers dual GbE and dual mini-PCIe

      The device supports Linux, Windows, Windows Embedded, and VxWorks, and offers five-year availability.

    • Tiny, open spec SBC offers wireless and 8GB eMMC

      FriendlyElec’s $45, 75 x 40mm “NanoPi S2” SBC runs Debian or Android on a quad-core A9 SoC, and offers RPi expansion, WiFi, Bluetooth, and 8GB eMMC.

    • Phones

      • Tizen

        • Video: Introducing Samsung ARTIK Cloud with Samsung Gear S2

          Samsung Electronics have previously announced SAMSUNG ARTIK Cloud™, which is an open data exchange platform designed to connect devices and applications. One of the goals of the SAMSUNG ARTIK Cloud is to provide developers the tools they need to securely connect to Internet of Things (IoT) devices, collect data and react to it accordingly.

          Companies can benefit from using open APIs and tools in order to accelerate their “time to market” and ultimately start monetizing their Investment. SAMSUNG ARTIK Cloud has a tiered pricing model, but the great thing is that you can actually start using it for FREE.

        • Game: Group Play Drag Racing in Tizen Store for Samsung Z1, Z2 and Z3

          Remember the World Cricket Championship 2 game? The most rated cricket game in the Tizen Store by Nextwave Multimedia Pvt. Ltd. Today they have added a new game named “Group Play Drag Racing“. It’s a Racing game against 6 racers, and you have to use your gears to the best of your ability in order to be fast fast fast !

      • Android

        • NVIDIA rolling out Shield Android TV upgrade 3.3 with improved audio, updated Vulkan API, and more
        • Software Upgrade 3.3 Available For NVIDIA SHIELD Android TV
        • PlayStation Vue launches on Android TV
        • Google Assistant channel launches on IFTTT
        • Google Allo Update 2.0 Brings Android 7.0 Nougat Features To The Table: Split-Screen, Quick Reply Support
        • Android 7.0 Nougat OTA download for OnePlus 3, OnePlus 2, OnePlus X happening this December
        • In Tech News: Apple iPhone Quarterly Results Signal Yet Another Year of 15% Flat Market Share

          If you look at the above picture, you really need to come to grips, that there is not, and will never be, a global take-over of the smartphone space by Apple’s iPhone. It has a VERY steady slice of the market. A healthy, profitable and loyal slice, but it is not growing nor is it shrinking. Apple finds one in seven smartphone owners eager to own their devices, and six in seven smartphone buyers will not buy an iPhone, either they don’t want it, or can’t afford it. Deal with this reality. 15%. That is not the world

        • How I Use Android: EvolveSMS and Talon developer Luke Klinker

          Luke Klinker knows his way around app development.

          Klinker started building his Android app empire when he was a student at the University of Iowa. He embraced Google’s Material Design standard and worked with his brother to create clean and intuitive apps that were packed with features and yet easy to use.

        • LG V20 Review: For spec-hungry Android enthusiasts, it’s the best Android phablet you can buy [Video]

          2016 has been a tough year for the Android market. In previous years we couldn’t count on one hand the number of awesome devices, but this year there have only been a few to choose from. The Galaxy S7, specifically the Edge has stood out as a clear winner, despite the praise given to competing devices like the HTC 10. On the other hand, no one really cared about LG this year. The G5 was a flop by every definition.

          Now in late 2016, there still isn’t much to pick from. The Galaxy Note 7 was close to perfection, and then it literally exploded in Samsung’s face. Google’s Pixel aims to fill the void, and redefine what an Android smartphone can and should be. However, if you’re not looking to get a Pixel, the LG V20 is 100% what you should be looking at, especially if you’re aiming for a big phone. Let’s take a closer look.

        • Android 7.0 Nougat: 15 hidden tips and tricks

          WE’VE RAIDED THE release notes in pieces past, but this time around (and with Google’s Pixel XL in tow) we’re running through some of the more useful additions to have found their way into the latest Android build.

          And for those of you who’ve skipped to the end, cats and hamburgers both have their uses…

        • Why Apple-to-Android upgrade comparisons are utterly meaningless

          Android upgrades are a contentious topic. Bring ‘em up in any way, and you’re bound to see some riled up people.

          I should know: I’ve observed and analyzed Android upgrades for years now — all the way back to the now-ancient-seeming Android 2.2 Froyo era, when widespread rollouts for the platform were still an untested concept. And in all of that time, one thing has stayed pretty much the same: By and large, Android manufacturers suck at delivering timely and reliable OS updates.

          But hang on: Not everything about the Android upgrade situation has remained constant over these past several years. In fact, one very significant area has evolved considerably — and it’s an area that’s almost always overlooked as part of the Android upgrade discussion, particularly when iOS comparisons come into the picture.

          As we think about Google’s new Pixel phone and its unique position as the sole current handset guaranteed to get quick and regular Android updates, it’s important to step back and put the situation in perspective — because there really is much more to it than what we see on the surface. And while iPhone-to-Android upgrade comparisons are an inevitable side effect of the discussion (and one I’ve already heard brought up plenty in the context of the Pixel, especially when it comes to its short-seeming two-year window for support), the truth is that upgrades on iOS and Android are drastically different beasts.

        • BlackBerry reveals its LAST ever Android smartphone

          Marking BlackBerry’s third foray into Android devices, the DTEK60 has been designed to take on the likes of Samsung and HTC with a polished look and powerful hardware.

          The device features a 5.5-inch QuadHD display with a resolution of 2,560×1,440-pixels and a pixel density of 538ppi, which BlackBerry says can display up to 16 million colours.

          Inside, there’s a speedy quad-core Snapdragon 820 processor from Qualcomm, backed up by 4GB of RAM and 32GB of storage, which can be boosted up to 2TB via a microSD card.

        • Latest Strategy Analytics data shows Chinese Android manufacturers eating at Apple’s marketshare

          Apple just reported its latest earnings yesterday evening, and now Strategy Analytics is out with its latest report concerning the smartphone industry. The latest data shows the entire smartphone industry saw shipments rise 6 percent year over year to hit 375 million worldwide during Q3 2016.

          Shipment rose from 345.2 million units in Q3 2015 to 375.4 million in Q3 2016, which is the industry’s fastest growth rate for a year. Strategy Analytics attributes much of this growth to new product launches from Apple.

          Individually for Apple, though, the numbers weren’t as bright. The company saw its shipments fall from 48 million to 45.5 million, just as it reported during its earnings call. This fall pushed Apple’s marketshare from 13.6 percent to 12.1 percent, though Apple is holding strong to its #2 spot.

        • Android, Samsung Improve in Third Quarter

          Consumer Intelligence Research Partners (CIRP) released analysis of the results of its research on mobile phone operating systems and brands for the calendar quarter that ended September 30, 2016. This analysis features findings about market share trends in mobile phone operating systems and brands in the US from July-September 2016.

          CIRP research shows that the two major mobile operating systems, Google Android and Apple iOS, controlled about 97% of US customer mobile phone activations in the third quarter (Chart 1). In the September 2016 quarter, Android accounted for 71% of US activations, the same share as the year-ago September 2015 quarter, and up from 63% in the June 2016 quarter. iOS accounted for 26% of activations, about the same as its 27% share in the year-ago September 2015 quarter, but down from its 32% share in the June 2016 quarter.

        • This Android keyboard trick fixes bad autocorrect suggestions
        • 11 things Android phone makers should copy from the Pixe
        • Review: 7 PDF editing tools for iOS and Android
        • Qualcomm acquires NXP Semiconductors for $47 billion
        • Moto M with metal body and Snapdragon 625 leaks

Free Software/Open Source

  • Pitt, partners create open source software for cancer genome data

    Researchers at the University of Pittsburgh, UPMC and the Pittsburgh Supercomputing Center have created software to help investigators more easily navigate genomic cancer data.

    The free, open-source software, profiled Thursday in the journal PLOS ONE, processes data generated by The Cancer Genome Atlas project. Funding for the new software was provided by the Institute of Precision Medicine and the University of Pittsburgh Cancer Institute.

  • Starting a Career as an Open Source Developer

    “Disney, John Deere and Walmart. Any idea what these three companies have in common?”

    The question was asked on Wednesday by Brandon Keepers, GitHub’s head of open source. He was about three minutes into a session he was conducting called “Contributing to Your Career” at the All Things Open conference.

    “All three of these companies are actually software companies,” he answered after taking a moment to tease the audience. “They do other things. They build tractors, protect trademarks and build amusement parks, and sell groceraies and things that you need everyday. But they’ve also become software companies and they’ve become really active in open source — and they’re not alone.”

  • A look at how retail giant Walmart is becoming open source first

    It’s rare that we speak to large, global enterprises that are redesigning their technology stack and culture around an open source first policy. More often than not companies stick to their legacy vendors of choice, or they shift to ‘reliable’ cloud/digital vendors where similar buying rules apply.

    However, that’s exactly what Walmart is doing. Since acquiring performance lifecycle management start-up OneOps four years ago, in order to implement a DevOps approach to its e-commerce environment, the retailer is also prioritising open source over everything else – with it having made a big investment in OpenStack for its infrastructure.

  • Open source no longer scares the enterprise

    Open source breaks the rules on corporate procurement, but developers never play by the rules and now open source has sneaked in through the back door

    A study by Vanson Bourne for Rackspace reports that businesses are making big savings by using open source.

    In the survey of 300 organisations, three out of five respondents cited cost savings as the top benefit, reducing average cost per project by £30,146.

  • Defining MANO: Open Source vs. Standards

    As service providers are working to deploy NFV-based services, they are finding that management and orchestration (MANO) is a pain point. One of the big questions about MANO is how we go from a high-level architecture diagram to interoperable implementations. Do we take the traditional telco path and work through standards bodies? Or do we take a cloud-centric path and focus on open source development projects?

  • Eclipse Kapua IoT Project Gets Code from Eurotech and Red Hat

    The nascent Eclipse Kapua project got a big boost this week from its chief sponsors, open source solutions provider Red Hat and M2M/IoT platform provider Eurotech. The two companies announced their first official code contributions to the recently approved project, through which they are developing a modular, cloud-based platform for managing IoT gateways and smart edge devices. Red Hat and Eurotech collaborated to propose the project last June.

  • APIStrat Boston to highlight link between APIs and open source projects

    This year’s API Strategy and Practice (known as APIStrat)—to be held in Boston on November 2-4—has a strong open source component running throughout the event, and with little wonder. Successful API strategies more often than not either contribute new open source projects, or draw on the rich source of tools already built by the open source community.

    The API mindset has always lent itself to an open source ethos. APIs are all about opening up internal assets, data, and systems in order to connect and collaborate with a wider ecosystem of partners and end users. Amongst leadership businesses that have a strong API strategy, seeing so many contribute and use open source projects is not surprising, and this is reflected throughout this year’s APIStrat program. After all, two of the key specifications formats that are used across the industry to describe APIs—the Open API Initiative and RAML—are both open source projects. Projects like Mashape’s Kong and Tyk’s API Gateway are both open source and gaining greater recognition and uptake.

  • Phil Shapiro: Open Source and Social Justice Advocate

    If you visit the public library in Tacoma Park, Maryland, you might run into Phil Shapiro, who is in charge of their computer lab. Or if you visit Foss Force (you’ve heard of that website, right?) you’ll see his byline here, here, here, and many other places.

    According to my thesaurus, “Phil Shapiro” is a synonym for “prolific.” And then there’s Twitter, where Phil holds forth on many topics, often many times daily.

    For a change, this video is a story that’s not by Phil, but about Phil. How did he get into Linux? How well is Linux accepted by library patrons? How do the Open Source and Social Justice movements complement each other, and how they they work together better? All good questions for Phil, so they’re questions we asked him. And his answers are enlightening — but also light-hearted, because Phil is a light-hearted guy.

  • Events

  • Web Browsers

    • Mozilla

      • Our Role in Protecting the Internet — With Your Help

        Protecting the security of the Internet requires everyone. We talked about this theme in a recent post, and in this post we’ll expand on the role Mozilla plays, and how our work supports and relies on the work of the other participants in the Web.

      • Mozilla Hosts Seventh Annual MozFest in London this weekend

        Now in its seventh year, MozFest is the world’s go-to event for the free and open Internet movement. Part meeting place for like-minded individuals keen to share ideas; part playground for Web enthusiasts, hobbyist netizens and seasoned open source technonauts alike, part hack-a-thon; part living breathing creative brainstorm; part speaker-series; MozFest is a buzzy hive of activity. It attracts thousands of visitors each year (1,800 in 2015) from as many as 50 countries around the world, making it the biggest unconference of its kind.

  • Oracle/Java/LibreOffice

    • LibreOffice 5.1.6 Office Suite Released for Enterprise Deployments with 68 Fixes

      Today, October 27, 2016, we’ve been informed by The Document Foundation about the general availability of the sixth maintenance update to the LibreOffice 5.1 open-source and cross-platform office suite.

      You’re reading that right, LibreOffice 5.1 got a new update not the current stable LibreOffice 5.2 branch, as The Document Foundation is known to maintain at least to versions of its popular office suite, one that is very well tested and can be used for enterprise deployments and another one that offers the latest technologies.

    • LibreOffice 5.1.6 available for download

      The Document Foundation (TDF) announces LibreOffice 5.1.6, the sixth minor release of the LibreOffice 5.1 family launched in January 2016, targeted at individual users and enterprise deployments. Users of previous LibreOffice releases should start planning the update to the new version.

  • BSD

  • FSF/FSFE/GNU/SFLC

    • FSF announces change in general counsel

      On Thursday, October 27, 2016, Eben Moglen stepped down as general counsel to the Free Software Foundation (FSF). Moglen, who in addition to being a professor of law and legal history at Columbia University, is the founder, president, and executive director of the Software Freedom Law Center (SFLC), and a former FSF board member, has generously served as the FSF’s pro bono general counsel for the last 23 years.

    • Licensing resource series: How to choose a license for your own work

      We provide plenty of resources when it comes to picking a license. From our list of licenses to essays on copyleft, if you are looking to figure out what license is right for you there is plenty of information to rely upon. But this month’s resource helps to pull that information together in one place to make selecting a license simple.

      Our guide, “How to choose a license for your work” is one stop browsing for answering many of the questions you may have when it comes to finding the right license. It provides recommendations based on the state of the work, but also based on the type of work that it is. While the Affero GNU General Public License version 3 works great for server software, documentation would probably be better served with a license directed at such, like the GNU Free Documentation License version 1.3. Smaller works can often get away without a strong copyleft, but still need to address patents, and so Apache License version 2.0 might be appropriate. The guide explains the reasoning behind the different recommendation for these and more. It also links to all those other resources mentioned above in case you need to dive in deeper when picking out a license.

    • Friday ‘Frankenstein’ Directory IRC meetup: October 28th starting at 1pm EDT/17:00 UTC
    • Free Software Directory meeting recap for October 21st, 2016
  • Public Services/Government

  • Licensing/Legal

    • Conservancy’s First GPL Enforcement Feedback Session

      As I mentioned in an earlier blog post, I had the privilege of attending Embedded Linux Conference Europe (ELC EU) and the OpenWrt Summit in Berlin, Germany earlier this month. I gave a talk (for which the video is available below) at the OpenWrt Summit. I also had the opportunity to host the first of many conference sessions seeking feedback and input from the Linux developer community about Conservancy’s GPL Compliance Project for Linux Developers.

      ELC EU has no “BoF Board” where you can post informal sessions. So, we scheduled the session by word of mouth over a lunch hour. We nevertheless got an good turnout (given that our session’s main competition was eating food :) of about 15 people.

      Most notably and excitingly, Harald Welte, well-known Netfilter developer and leader of gpl-violations.org, was able to attend. Harald talked about his work with gpl-violations.org enforcing his own copyrights in Linux, and explained why this was important work for users of the violating devices. He also pointed out that some of the companies that were sued during his most active period of gpl-violations.org are now regular upstream contributors.

  • Openness/Sharing/Collaboration

    • Open Chemistry project raises up the next generation of researchers

      In 2007 I took part in Google Summer of Code (GSoC) developing the Avogadro application. As we were developing Avogadro, we founded The Open Chemistry project as an umbrella project to develop related tools for chemistry and materials science. Our goal is to bring high quality open source tools to research communities working in these areas, and to develop other tools to complement the Avogadro molecular editor.

      This year we were very pleased to be selected as a mentoring organization for GSoC; a few of our mentors are Geoff Hutchison, Adam Tenderholt, David Koes, and Karol Langner, who are all long-time contributors in related projects. And, we were lucky to get three slots for student projects. To get started, we lined up a number of mentors from related communities, and developed an ideas page.

  • Programming/Development

    • Getting Groovy with data

      Groovy is an almost perfect complement to Java, providing a compact, highly expressive and compatible scripting environment for my use. Of course, Groovy isn’t totally perfect; as with any programming language, its design is based on a series of trade-offs that need to be understood in order to produce quality results. But for me, Groovy’s advantages far outweigh its disadvantages, making it an indispensable part of my data analysis toolkit. In a series of articles, I’ll explain how and why.

Leftovers

  • Spreadsheets have ruled Earth for too long. Business must embrace the cloud [iophk: “the pie chart has already done untold damage, how much more when coupled with clown computing?”]

    The one certainty in business software and services is that there will always be more acronyms. At the moment, though, there’s more to the sector than just another jargon explosion: we’re moving towards a new way of looking at IT, one that applies best-practice business processes to any company—however small it may be, and however fast it may grow.

    This sounds good, but wading through websites full of perky lists of generic benefits can leave many IT managers still wondering exactly what they’re being sold.

  • Finland ranks in top 3 travel destinations for 2017

    In its annual ranking, independent-travel publisher Lonely Planet names Canada, Colombia and Finland as prime destinations for 2017.

  • 13 IT leaders confess their scary stories and deep, dark fears

    Today’s IT leaders are facing a world of unknowns and underlying fears on a daily basis – from the ransomware that could take down their organizations, to the emergence of new digital disruptors that could render their business obsolete, to the absence of quality IT talent they need to stay ahead of these and other threats. Although scary, it is comforting to know that you are not alone.

    We asked 13 IT leaders to share their stories of unexpected or frightening events in their career, or the threats on the horizon making them nervous for the future of IT. Read on for their tales from the IT crypt.

  • Science

    • Google’s neural networks invent their own encryption

      Computers are keeping secrets. A team from Google Brain, Google’s deep learning project, has shown that machines can learn how to protect their messages from prying eyes.

      Researchers Martín Abadi and David Andersen demonstrate that neural networks, or “neural nets” – computing systems that are loosely based on artificial neurons – can work out how to use a simple encryption technique.

      In their experiment, computers were able to make their own form of encryption using machine learning, without being taught specific cryptographic algorithms. The encryption was very basic, especially compared to our current human-designed systems. Even so, it is still an interesting step for neural nets, which the authors state “are generally not meant to be great at cryptography”.

  • Hardware

    • 2001: An Apple Odyssey

      A lot about Apple has changed since 2001, but one thing that hasn’t are the haters.

      Exactly 15 years ago this week, Apple released the iPod, a device that was met with a famously harsh one-line review from Slashdot founder Rob Malda: “No wireless. Less space than a nomad. Lame.”

      If you’re an Apple fan, you know that quote inside and out, because it was a great example of the haters being wrong and a nice quote to pull out of your hat.

    • The question about ‘grand strategy’ that made Tim Cook unhappy on Apple’s earning call was based on a Harvard professor’s theory that makes uncomfortable reading for Apple

      Last night, Apple CEO Tim Cook gave a terse, unhappy answer to this question from UBS analyst Steven Milunovich: “Does Apple today have a grand strategy for what you want to do?”

      Milunovich asked the question two different ways, and Cook gave only non-answers, one of which was “as usual, we’re not going to talk about what’s ahead.”

      There is a reason Milunovich asked that question. It’s not merely about Cook’s tradition of not giving clues about what Apple will do next. Rather, Milunovich’s question was based on a theory by Harvard Business School Professor Clayton Christensen. The theory makes uncomfortable reading for observers of Apple, and perhaps for insiders too.

  • Security

    • Thursday’s security updates
    • Mirai will be dwarfed by future Android botnet DDoS attacks, Lookout warns

      THE MIRAI BOTNET will seem like nothing compared to the havoc that is caused when hackers turn their attention to hijacking Android smartphones, Lookout’s security research chief has warned.

      Speaking to the INQUIRER, Mike Murray said it would be easy for cyber crooks to take over millions of smartphones, noting how often the Android requires patching.

    • Deal Seeks to Limit Open-Source Bugs

      Seeking to spot potential security vulnerabilities in systems that increasingly rely on open source software, software license optimization vendor Flexera Software has acquired a specialist in identifying potentially vulnerable software components.

      Flexera, Itasca, Ill., said Thursday (Oct. 27) it is acquiring San Francisco-based Palamida Inc. Terms of the transaction were not disclosed.

    • Senator Wants to Classify Insecure Internet of Things Devices As ‘Harmful’

      A massive attack carried out with a zombie army of hacked internet-connected devices caused intermittent outages on Friday, preventing tens of thousands of people from accessing popular sites such as Twitter, Reddit, and Netflix.

      For many security experts, an attack like that one, which leveraged thousands of easy-to-hack Internet of Things such as DVRs and surveillance cameras—weaponized thanks to a mediocre but effective malware known as Mirai—is just a sign of things to come.

      That’s why Sen. Mark Warner (D-Va.) wants the US government to do something about it.

    • Senator Prods Federal Agencies on IoT Mess

      The co-founder of the newly launched Senate Cybersecurity Caucus is pushing federal agencies for possible solutions and responses to the security threat from insecure “Internet of Things” (IoT) devices, such as the network of hacked security cameras and digital video recorders that were reportedly used to help bring about last Friday’s major Internet outages.

      In letters to the Federal Communications Commission (FCC), the Federal Trade Commission (FTC) and the Department of Homeland Security (DHS), Virginia Senator Mark Warner (D) called the proliferation of insecure IoT devices a threat to resiliency of the Internet.

    • European Parliament increases budget for EU-Fossa

      On Wednesday, the European Parliament agreed to a follow-up to the European Commission’s ‘EU Free and Open Source Software Auditing’ project (EU-Fossa). The plan for the next phase is included in the EU 2017 budget that was agreed upon by the European Parliament.

    • European Parliament votes to extend Free Software security audits

      Remember how I raised €1 million to demonstrate security and freedom aren’t opposites? Well here’s what happened next and how we are going to move forward with this.

      In 2014, two major security vulnerabilities, Heartbleed and Shellshock, were discovered. Both concerned Free Software projects that are widely used throughout the Internet, on computers, tablets, and smartphones alike. My colleague Max Andersson from the Swedish Greens and I proposed a so-called “pilot project”, the Free and Open Source Software Audit (FOSSA).

    • Princeton Upskills U on Open Source Security

      During Wednesday’s Upskill U course, lecturer Gary Sockrider, principal security technologist for Arbor Networks , explained the history of DDoS attacks, case studies of recent attacks, and the business impact of these security threats. DDoS attacks not only raise operational expenses, but can also negatively affect an organization’s brand, and result in loss of revenue and customers. (Listen to Security: Tackling DDoS.)

      “Having visibility is key, you can’t stop something you can’t see. Having good visibility across your own network is vital in finding and stopping these attacks,” said Sockrider. “You can leverage common tools and technology that are already available on the network equipment you own today such as flow technologies, looking at SIP logs … Obviously you’ll want to get to some specific intelligent DDoS mitigation in the end.”

    • GNU Tar “Pointy Feather” Vulnerability Disclosed (CVE-2016-6321)

      Last week was the disclosure of the Linux kernel’s Dirty COW vulnerability while the latest high-profile open-source project going public with a new security CVE is GNU’s Tar. Tar CVE-2016-6321 is also called POINTYFEATHER according to the security researchers.

      The GNU Pointy Feather vulnerability comes down to a pathname bypass on the Tar extraction process. Regardless of the path-name(s) specified on the command-line, the attack allows for file and directory overwrite attacks using specially crafted tar archives.

    • Let’s Encrypt and The Ford Foundation Aim To Create a More Inclusive Web

      Let’s Encrypt was awarded a grant from The Ford Foundation as part of its efforts to financially support its growing operations. This is the first grant that has been awarded to the young nonprofit, a Linux Foundation project which provides free, automated and open SSL certificates to more than 13 million fully-qualified domain names (FQDNs).

      The grant will help Let’s Encrypt make several improvements, including increased capacity to issue and manage certificates. It also covers costs of work recently done to add support for Internationalized Domain Name certificates.

      “The people and organizations that Ford Foundation serves often find themselves on the short end of the stick when fighting for change using systems we take for granted, like the Internet,” Michael Brennan, Internet Freedom Program Officer at Ford Foundation, said. “Initiatives like Let’s Encrypt help ensure that all people have the opportunity to leverage the Internet as a force for change.”

    • How security flaws work: SQL injection

      Thirty-one-year-old Laurie Love is currently staring down the possibility of 99 years in prison. After being extradited to the US recently, he stands accused of attacking systems belonging to the US government. The attack was allegedly part of the #OpLastResort hack in 2013, which targeted the US Army, the US Federal Reserve, the FBI, NASA, and the Missile Defense Agency in retaliation over the tragic suicide of Aaron Swartz as the hacktivist infamously awaited trial.

    • How To Build A Strong Security Awareness Program

      At the Security Awareness Summit this August in San Francisco, a video clip was shown that highlights the need to develop holistic security awareness. The segment showed an employee being interviewed as a subject matter expert in his office cubicle. Unfortunately, all his usernames and passwords were on sticky notes behind him, facing the camera and audience for all to see.

      I bring this story up not to pick on this poor chap but to highlight the fact that security awareness is about human behavior, first and foremost. Understand that point and you are well on your way to building a more secure culture and organization.

      My work as director of the Security Awareness Training program at the SANS Institute affords me a view across hundreds of organizations and hundreds of thousands of employees trying to build a more secure workforce and society. As we near the end of this year’s National Cyber Security Awareness Month, here are two tips to incorporate robust security awareness training into your organization and daily work.

  • Defence/Aggression

    • Britain, U.S. sending planes, troops to deter Russia in the east

      Britain said on Wednesday it will send fighter jets to Romania next year and the United States promised troops, tanks and artillery to Poland in NATO’s biggest military build-up on Russia’s borders since the Cold War.

      Germany, Canada and other NATO allies also pledged forces at a defense ministers meeting in Brussels on the same day two Russian warships armed with cruise missiles entered the Baltic Sea between Sweden and Denmark, underscoring East-West tensions.

      In Madrid, the foreign ministry said Russia had withdrawn a request to refuel three warships in Spain’s North African enclave of Ceuta after NATO allies said they could be used to target civilians in Syria.

      The ships were part of an eight-ship carrier battle group – including Russia’s sole aircraft carrier Admiral Kuznetsov – that is expected to join around 10 other Russian vessels already off the Syrian coast, diplomats said.

    • Yazidi women who escaped from Isis win EU human rights prize

      Two Yazidi women who survived sexual enslavement by Islamic State before escaping and becoming “inspirational” advocates for their community in Iraq have won the EU’s prestigious Sakharov human rights prize.

      Nadia Murad and Lamiya Aji Bashar were abducted with other Yazidi women in August 2014 when their home village of Kocho in Sinjar, northern Iraq, was attacked by Isis jihadis. It was one of the darkest episodes Iraq has suffered at the hands of the terrorist group.

      The annual Sakharov prize for freedom of thought, established in 1988, is named after the Soviet physicist and outspoken dissident Andrei Sakharov and is awarded to “individuals who have made an exceptional contribution to the fight for human rights across the globe”. It has previously been awarded to the likes of Aung San Suu Kyi and Nelson Mandela.

      The EU described Murad and Aji Bashar as “public advocates for the Yazidi community in Iraq, a religious minority that has been the subject of a genocidal campaign by IS militants”.

    • Assyrian Woman: ISIS Murdered My Son Because He Refused to Convert

      An Assyrian Christian woman has shared how members of the Islamic State terrorist group brutally murdered her son because he refused to deny his faith in Jesus Christ.

      During an interview with the Southern California-based human rights group Roads of Success, Syrian mother Alice Assaf recalled how ISIS overtook her hometown, the Damascus suburb of Adra al-Ummaliya, in 2014, and immediately began killing Christians.

      “Members of 200 different families were killed right before our eyes,” Assaf said, according to an English translation provided by Roads of Success in a YouTube video. “They shot them. We witnessed the shooting of so many. So I told my children [and thought] it was better for us to die in our own home so that our other family members would know our fate. When we got home, one person said to me, … ‘ISIS is killing Christians.’”

      Assaf shared how militants killed indiscriminately, massacring at least six men and about 250 children – all under four years old – at a nearby bakery.

    • ‘The day I killed my rapist’

      A young Tunisian woman was photographed naked by a friend of her father’s. He then used the images to silence her – until one day she snapped and took a bloody revenge.

  • Transparency/Investigative Reporting

    • The strange tale of a dating site’s attacks on WikiLeaks founder Assange

      For an online dating site, toddandclare.com seems really good at cloak-and-dagger stuff. Disconnected phones. Mystery websites. Actions that ricochet around the globe.

      But the attention grabber is the Houston-based company’s target: Julian Assange, the founder of WikiLeaks, whose steady dumps of leaked emails from Hillary Clinton’s presidential campaign have given supporters of Donald Trump the only cheering news of the last few weeks.

      In some ways, toddandclare.com’s campaign against Assange is as revelatory as the leaked emails themselves, illustrating the powerful, sometimes unseen, forces that oppose WikiLeaks.

      Whoever is behind the dating site has marshaled significant resources to target Assange, enough to gain entry into a United Nations body, operate in countries in Europe, North America and the Caribbean, conduct surveillance on Assange’s lawyer in London, obtain the fax number of Canada’s prime minister and seek to prod a police inquiry in the Bahamas.

      And they’ve done it at a time when WikiLeaks has become a routine target of Democratic politicians who portray Assange as a stooge of Russian President Vladimir Putin and his reported efforts to disrupt the U.S. election.

      One part of toddandclare’s two-pronged campaign put a megaphone to unproven charges that Assange made contact with a young Canadian girl in the Bahamas through the internet with the intention of molesting her. The second part sought to entangle him in a plan to receive $1 million from the Russian government.

    • Hillary, Wikileaks, Russia – theater of absurd goes viral

      Can people STOP referring to Wikileaks as a news organization. They are a foreign agent, supported by Russia, publishing stolen data,” tweeted Michael McFall, who is considered among the most controversial former US ambassador in Russia. During his tenure in Moscow, McFall was surrounded by controversies and continues to air bombastic tweets.

      On the other hand, Wikileaks, which was launched 10 years ago, has turned out to be a unique phenomenon. It is redefining modern media by attempting to expose even media outlets, tabloids, and successful channels alongside their big bosses. The website has been publishing leaked documents to bring truth out in the open.

      The sad state of affairs of our times is that truth has to find its way to the public through questionable ways and instruments. In case of Wikileaks, most of their documents are accessed either via hacking or are supplied by whistleblowers.

      All these years Wikileaks has been revealing a lot of classified information on numerous subjects related to foreign and domestic policies of countries. Wikileaks publisher and journalists have won many awards. In 2015, it was nominated for the UN Mandela Prize and was nominated for six years in a row, from 2010 to 2015, for the Nobel Peace Prize.

    • Aide Said He Was Running ‘Bill Clinton Inc.’ in New WikiLeaks Dump

      A 12-page memo written by a former aide to President Bill Clinton illustrates how he and other advisers raised millions of dollars for the Clinton Foundation and the Clintons after they left the White House, according to a new batch of emails released by WikiLeaks.

      The purported memo from Doug Band details how he and his team locked in lucrative speaking deals for Bill Clinton and how Band leveraged his work at his global consulting firm, Teneo Strategies, to persuade clients to contribute to the Clinton Foundation. Band described his work as running “Bill Clinton Inc.”

      “We also have solicited and obtained, as appropriate, in-kind services for the president and his family – for personal travel, hospitality, vacation and the like,” Band allegedly said in the document.

    • The strange tale of a dating site’s attacks on WikiLeaks founder Assange

      For an online dating site, toddandclare.com seems really good at cloak-and-dagger stuff. Disconnected phones. Mystery websites. Actions that ricochet around the globe.

      But the attention grabber is the Houston-based company’s target: Julian Assange, the founder of WikiLeaks, whose steady dumps of leaked emails from Hillary Clinton’s presidential campaign have given supporters of Donald Trump the only cheering news of the last few weeks.

      In some ways, toddandclare.com’s campaign against Assange is as revelatory as the leaked emails themselves, illustrating the powerful, sometimes unseen, forces that oppose WikiLeaks.

  • Environment/Energy/Wildlife/Nature

    • World wildlife ‘falls by 58% in 40 years’

      The Living Planet assessment, by the Zoological Society of London (ZSL) and WWF, suggests that if the trend continues that decline could reach two-thirds among vertebrates by 2020.

      The figures suggest that animals living in lakes, rivers and wetlands are suffering the biggest losses.

      Human activity, including habitat loss, wildlife trade, pollution and climate change contributed to the declines.

      Dr Mike Barrett. head of science and policy at WWF, said: “It’s pretty clear under ‘business as usual’ we will see continued declines in these wildlife populations. But I think now we’ve reached a point where there isn’t really any excuse to let this carry on.

    • World facing biggest mass extinction since dinosaurs – with two thirds of animals wiped out in 50 years

      The world is facing the biggest extinction since the dinosaurs, with seven in 10 mammals, birds, fish, amphibians and reptiles wiped out in just 50 years, a new report warns.

      The latest Living Planet report by the World Wildlife Fund (WWF) and the Zoological Society of London (ZSL) estimates that by 2020 populations of vertebrates will have fallen by 67 per cent since 1970.

      Extinction rates are now running at 100 times their natural level because of deforestation, hunting, pollution, overfishing and climate change.

    • World on track to lose two-thirds of wild animals by 2020, major report warns

      The number of wild animals living on Earth is set to fall by two-thirds by 2020, according to a new report, part of a mass extinction that is destroying the natural world upon which humanity depends.

      The analysis, the most comprehensive to date, indicates that animal populations plummeted by 58% between 1970 and 2012, with losses on track to reach 67% by 2020. Researchers from WWF and the Zoological Society of London compiled the report from scientific data and found that the destruction of wild habitats, hunting and pollution were to blame.

      The creatures being lost range from mountains to forests to rivers and the seas and include well-known endangered species such as elephants and gorillas and lesser known creatures such as vultures and salamanders.

    • Hectare by hectare, an indigenous man reforested a jungle in Indonesia’s burned-out heartland

      The road from this inland provincial capital in southern Borneo to the delta city of Banjarmasin is littered with degraded forests and peat swamps, hallmarks of a region at the epicenter of last year’s nationwide fire and haze crisis.

      Amid this arid landscape, however, lies an oasis: the peat forest of Jumpun Pambelom, whose name means “life source” in the local Dayak Ngaju language.

      The jungle here is largely the work of a Ngaju man named Januminro. Since 1998, when Indonesia experienced one of the worst episodes of uncontrolled burning in recorded history, the 54-year-old has bought up and reforested degraded land in the area — a hectare here, a few there.

      Today Jumpun Pambelom spans 18 hectares (44 acres) and bustles with with plant and animal life, from rare ulin trees (Eusideroxylon) and towering ramins (Gonystylus) to endangered Bornean orangutans (Pongo pygmaeus) and sun bears (Helarctos malayanus), not to mention plenty of swamp fish and game.

    • Two-Thirds of Wild Animal Populations Could Be in Decline by 2020

      Around the world, more than two-thirds of wildlife populations could be in decline by the year 2020 because of human activity on the planet, says a new report from the World Wildlife Fund (WWF) and the Zoological Society of London, a conservation charity.

      The Living Planet Report, which the WWF puts out every two years, says that populations of vertebrates (including mammals, birds, fish, amphibians and reptiles) dropped by 58 percent between 1970 and 2012. Of course, quantifying biodiversity loss around the planet is no easy task, and there are long-raging debates about how much species loss spells disaster. The picture will get even worse if we don’t take steps now, the WWF says.

      “Within one generation, we’ve seen drastic declines in global wildlife populations,” James Snider, vice-president of science, research and innovation at WWF-Canada, told me. “One of the more troubling facts is that it seems, based on reporting [every two years], that the decline is worsening.” The 2014 report showed a 52 percent decline over the same period, he noted. “Based on that, we expect that by 2020, If no significant action is taken, it could be as much as two-thirds of populations that have declined since the 1970s.”

    • What the elk is that? Animal in SC for 1st time in centuries

      A wild elk has been spotted roaming the woodlands of South Carolina for the first time in more than 200 years.

      News outlets report that wildlife biologists are warning Upstate residents and tourists to stay away from a young bull elk that was seen in several places in Pickens County over the weekend.

      In response to social media posts showing people feeding the animal, North Carolina Wildlife Resources Commission biologist Justin McVey warned the public that the animal can cause serious injuries.

    • Carbon Dioxide in the Atmosphere Has Passed a Worrying Threshold

      The World Meteorological Organization’s greenhouse-gas bulletin shows that 2015 was the first year in which levels of carbon dioxide reached 400 parts per million on average across the globe. Part of what pushed the planet over this threshold was El Niño, which, according to the WMO, “reduced the capacity of ‘sinks’ like forests, vegetation and the oceans to absorb CO2.”

      But even when those sinks regain their ability to absorb carbon dioxide, warns the WMO secretary-general, Petteri Taalas, emissions will still need to be cut. “The El Niño event has disappeared. Climate change has not,” he explained. “Without tackling CO2 emissions, we cannot tackle climate change and keep temperature increases to below 2 °C above the preindustrial era.”

    • Officials say no drinking water impacted by Sunoco pipeline rupture

      The state Department of Environmental Protection and the EPA continue to sample water downstream from a gasoline pipeline break in Lycoming County, and say so far no levels of petroleum have been detected that would risk public health. Terry Maenza, a spokesman for American Water, which serves about 12,000 customers in the area near the accident says their sampling has also found no traces of the contaminant. American Water had shut down its intake valves and asked customers to conserve water on Friday after an estimated 55,000 gallons of gasoline spilled into a tributary of the Loyalsock Creek. The Loyalsock runs into the Susquehanna River. Officials speculate that the flood waters that likely caused the pipeline rupture were so heavy, that the leaked fuel was quickly diluted as it flowed downstream.

      “Everything is back to normal,” said Maenza. He says the company lifted it’s conservation request and resumed operations on Sunday.

      The flood waters have receded and Sunoco has removed the broken section of pipe, which was about 10 feet downstream from a bridge washed out by heavy rains. Sunoco officials say the bridge washed into the exposed pipe, which had been buried 5 feet below the creek.

      “Given the position of the pipe and the location of the bridge before and after the event, it’s clear that the bridge was responsible for the damage to the pipe,” said David R. Chalson, Sunoco Logistics senior vice-president for operations.

    • Clinton campaign declines to support Dakota pipeline protesters

      Hillary Clinton’s silence on the Dakota Access Pipeline has not gone unnoticed.

      On Thursday morning, young water protectors from Oceti Sakowin, the Seven Council Fires, and the Standing Rock Sioux Nation traveled to the Democratic presidential nominee’s campaign headquarters in Brooklyn, New York, demanding that she speak out against the Dakota Access Pipeline (DAPL).

      The Hillary Clinton campaign has thus far remained silent about the 1,172-mile pipeline, which would cross both the Missouri River and the Ogallala Aquifer, threatening sacred indigenous land and water supplies. The group also called for solidarity actions at Clinton campaign offices across the country.

  • Finance

    • Twitter Failing? 5 Signs The Company Is In Trouble

      Twitter Inc. announced its quarterly results Thursday, which showed the company’s growth has slowed for the second consecutive quarter. The social network company has struggled to maintain a positive outlook as it faces competition from apps such as Instagram and Snapchat.

    • Twitter slashes jobs, Vine as it seeks profits

      Twitter appeased Wall Street by restructuring to chart a course to profitability and by showing early signs its business is perking up.

      User growth and revenue climbed more than analysts expected as the struggling social media company announced 350 job cuts, or about 9% of its workforce. It also said it would shutter mobile video app Vine.

      “The current quarter results were ahead of expectations and user figures provided some promising elements as well,” said Pivotal Research Group analyst Brian Wieser, who is maintaining his price target of $26 and a buy recommendation on the stock.

      The effort to right the company comes as potential buyers such as Google, Salesforce and Walt Disney declined to pursue an acquisition. The lack of interest has cranked up pressure on Twitter’s embattled management.

      Jack Dorsey, the Twitter chief executive who returned to the helm last year to reinvigorate growth, declined to comment on the takeover discussions, saying only that Twitter’s board is committed to “maximizing long-term shareholder value.”

    • Twitter to Cut 9% of Workforce as Q3 Earnings Top Expectations

      Twitter will lay off 9% of its employees as the company struggles to achieve profitability, while the social-media company’s third-quarter 2016 revenue and earnings exceeded Wall Street expectations.

      Twitter said the job cuts will focus primarily on reorganizing its sales, partnerships and marketing operations. The company had 3,910 employees as of the end of September, meaning Twitter is pink-slipping about 350 staffers.

      The layoffs come as Twitter showed some slight improvement in financial performance for Q3. The company posted quarterly revenue of $616 million, up 8% year-over-year, and adjusted net income of $92 million, or 13 cents per share. Wall Street expected Twitter to post revenue of $606 million and adjusted EPS of 9 cents. Factoring in stock-based compensation and other items, Twitter’s net loss in the quarter was $103 million, an improvement from a net loss of $132 million in the year-earlier period.

    • [Old] CETA: The Canadian TTIP nobody noticed until it was (almost) too late

      Since Ars wrote about the Transatlantic Trade and Investment Partnership (TTIP) last year, it has gradually moved up the UK’s political agenda, culminating in the recent pledge by Jeremy Corbyn to scrap it if he is elected as prime minister before it is completed, and to fight it if he is not. But while many people are increasingly worried about what might happen with TTIP, there’s another trade agreement, one which has already been signed, which is about to bring in many of the same controversial measures almost unnoticed.

    • Here’s Why Amazon Stock Just Collapsed

      Shares fell over 6% in after-market trading Thursday

      Amazon.com Inc reported a lower-than-expected quarterly profit on Thursday as expenses rose and the company provided a disappointing fourth-quarter revenue forecast.

      Amazon, whose shares were down 6.8 percent in after-hours trading, said its net income rose to $252 million, or 52 cents per share, from $79 million, or 17 cents per share, a year earlier. It was company’s sixth straight profitable quarter.

    • ‘We’re Not Helping Our Kids by Keeping the Deficit Down’ – CounterSpin interview with Dean Baker on the debt boogeyman

      The announcement that one agenda item for the final presidential debate would be “debt and entitlements” was not surprising. “Debt and entitlements,” linked together that way, are always on corporate media’s agenda, but though the terms are tossed around a lot, they’re rarely unpacked or explained. In place of facts, we get fear. The Chicago Tribune said if they could inject one debate question, it would be: “Secretary Clinton, Mr. Trump, you have children. Why aren’t you scared?”

      Well, Americans face many serious challenges. Are runaway national “debt and entitlements” one of them? We’re joined now by Dean Baker, co-director of the Center for Economic and Policy Research, where you’ll find his blog, Beat the Press, and he’s the author of, most recently, Rigged: How Globalization and the Rules of the Modern Economy Were Structured to Make the Rich Richer. Welcome back to CounterSpin, Dean Baker.

    • UN rights expert urges States not to sign the ‘flawed’ CETA treaty and put it to referendum

      The trade deal set to be signed by the European Union and Canada is a corporate-driven, fundamentally flawed treaty which should not be signed or ratified without a referendum in each country concerned, a United Nations human rights expert says.

      Alfred de Zayas, the UN Independent Expert on the promotion of a democratic and equitable international order, deplored the pressures brought on the Belgian regional parliament of Wallonia, which initially said it would not approve the treaty but later said its concerns had been met. “A culture of bullying and intimidation becomes apparent when it comes to trade agreements that currently get priority over human rights,” the expert said.

  • AstroTurf/Lobbying/Politics

    • Jill Stein: The Best Way to Boost the Economy Is by Saving the Planet

      I believe the U.S. economy needs a Green New Deal: an ambitious yet secure economic and environmental program that will revive the economy, turn the tide on climate change, and make wars for oil obsolete—allowing us to cut our bloated, dangerous military budget in half. Building on the concept of Franklin D. Roosevelt’s New Deal, the Green New Deal calls on communities, government, and ordinary people on the scale of World War II to transition our energy system and economy to 100% clean, renewable energy by 2030.

      The author of the best-known series of studies on transitioning to 100% clean energy, Stanford University professor Mark Jacobson, asserts that it is technologically and economically feasible. Bill Nye and others note that we have the technology to make this transition possible—and the science shows that we must. The only missing ingredient is political will.

    • Be A Realist – Vote Jill Stein

      It cracks me up whenever I see pawns of the Democratic Party like Robert Reich try to argue that supporting Hillary Clinton is the “realistic and practical” way to forward the progressive agenda. It always makes me wonder what reality they’re referring to when they call such creative fabrications “realistic.” Does Mr. Reich hail from Narnia, perhaps? Some magical gumdrop fantasy land where everyone walks backward and M. Night Shyamalan’s movies keep getting better and better?

    • ‘Ethical deficit’: New concerns over foundation

      Hillary Clinton’s top aides worried about foreign donations to the Clinton Foundation ahead of 2016, according to a NYT report based on a new Wikileaks release.

    • Memo shows Bill Clinton’s wealth was tied to Clinton Foundation

      In a 2011 memo, an aide to Bill Clinton laid out the messy relationship between the Clinton Foundation and the former president’s personal interests, detailing how some foundation donors also paid Clinton to speak and provide consulting services.

      The memo was released on Wednesday as part of a Wikileaks dump of Hillary Clinton’s campaign chairman John Podesta’s hacked emails.

      Doug Band, a long-time aide to Bill Clinton, wrote the 2011 memo as part of an internal audit at the Clinton Foundation. In trying to explain his role in the Foundation, Band also brought up a series of instances he and his consulting company, Teneo Holdings, helped Bill Clinton secure for-profit contracts.

      The memo, which was being circulated to some in Clinton’s inner circle including Podesta, reinforces Republican criticisms of the blurred lines between the foundation and professional interests of the Clintons and their associates.

      “Independent of our fundraising and decision-making activities on behalf of the Foundation, we have dedicated ourselves to helping the President secure and engage in for-profit activities — including speeches, books, and advisory service engagements,” Band wrote. “In that context, we have in effect served as agents, lawyers, managers and implementers to secure speaking, business and advisory service deals. In support of the President’s for-profit activity, we also have solicited and obtained, as appropriate, in-kind services for the President and his family — for personal travel, hospitality, vacation and the like.”

      At one point, Band even referred to the former president’s money-making enterprises as “Bill Clinton, Inc.”

      Band said and Justin Cooper, another long-time aide, weren’t separately compensated for helping Bill Clinton profit.

    • Wikileaks: Damaging analysis of Sanders’s single payer plan was likely a coordinated Clinton hit

      A search through Wikileaks’s database reveals that a week before a damaging, highly critical analysis of Bernie Sanders’s single payer healthcare plan was released by healthcare expert Kenneth Thorpe, with no disclosure of any affiliation with any campaign, the Clinton campaign was floating Thorpe’s name out as a vehicle to attack the Senator’s Medicare-for-all plan.

      Thorpe’s analysis was reported by Vox on January 28th, in an article titled “Study: Bernie Sanders’s single-payer plan is almost twice as expensive as he says.” A flurry of articles and editorials touting the study followed — for example, Paul Krugman’s January 28th editorial “Single Payer Trouble,” or the New York Time’s report “Left-Leaning Economists Question Cost of Bernie Sanders’s Plans.” These articles all fed the notion that Sanders was a pie-in-the-sky, puppies and rainbow dreamer, with no real grasp on reality.

      Others, however, such as single payer advocates David Himmelstein and Steffie Woolhandler, (“On Kenneth Thorpe’s Analysis of Senator Sanders’s Single-Payer Reform Plan”), claimed convincingly that Thorpe’s analysis rested on highly questionable, or flatly incorrect, assumptions and that it also contradicted previous studies that Thorpe himself had done. Sanders’s campaign, meanwhile, called the analysis “a total hatchet job.”

      As it turns out, a week before Thorpe’s analysis was released, in a January 19th thread discussing the merits of attacking Sanders on healthcare, Jake Sullivan, a top Clinton advisor, floated the idea of using Thorpe to attack Sanders on healthcare…

    • Eric Garner’s Daughter Slams Clinton Campaign Over Emails Confusing Police Brutality And Gun Violence

      Erica Garner, the daughter of Eric Garner, a black man who was killed by a NYPD officer in 2014, is slamming Hillary Clinton’s campaign over leaked emails from the server of John Podesta, the campaign’s chairman.

      “I know we have Erica Garner issues but we don’t want to mention Eric at all? I can see her coming after us for leaving him out of the piece,” wrote Nick Merrill, a spokesman for the campaign, in the email leaked from Podesta’s private server and posted on WikiLeaks.

      The email correspondence was a discussion about whether the death of Garner’s father should be used in a Clinton opinion piece for New York Daily News on gun violence.

      “It was obvious that the two white men that were on the email chain didn’t even know that my dad wasn’t shot,” Garner told The Huffington Post via Twitter direct message. “It was clear that he was just a dead body for them to manipulate for their use. White liberals have been trying to cram racism into the box of gun violence for a while now.”

    • Erica Garner Slams Clinton Campaign, Staffers for ‘Exploiting’ Father’s Death in Wikileaks Emails
    • Why would you want to “use” my dad?’: Eric Garner’s daughter slams Clinton campaign over WikiLeaks emails

      Erica Garner, whose father died in a chokehold by a New York City police officer in 2014, scolded the Clinton campaign in a series of tweets Thursday over hacked internal emails published by WikiLeaks that mentioned her and her father.

      The emails, exchanged between several Clinton staffers, had discussed a draft of a Clinton op-ed on gun violence that was eventually published in the New York Daily News in late March.

    • Neo-McCarthyism masks the US’s real problems

      AMID a tense stand-off in the Middle East between Russia and the United States, it is not surprising that tensions are rising by the day. Rhetoric coming out of the White House and the Kremlin is increasingly antagonistic, which has had damaging implications for the battle between Hillary Clinton and Donald Trump.

      This election can be characterised by the blatant red scare tactics by Clinton and the Democrats, largely aimed at insinuating that Trump, WikiLeaks, and even Green Party presidential candidate Jill Stein are de-facto Kremlin agents.

      It feels like we are in the 1960 election rather than 2016.

      The neo-McCarthyism adopted by the Clinton campaign to deflect any reasonable criticisms one may have of her flawed candidacy is unnecessary and paranoid.

      Not only this, but it draws attention away from the real issues and problems that the US faces as a nation — many of which Clinton and fellow centrists have been the root cause of.

    • Hacker-founded Pirate Party could win Iceland election

      Iceland’s radical Pirate Party, run by a former WikiLeaks worker who wants to be a political “Robin Hood,” could lead the Nordic nation’s next government after Saturday’s election.

      The Pirate Party, started four years ago, is part of a wave of populist groups gaining ground in Europe, from Austria to Italy, amid discontent with political scandals and a stalled economic recovery. Iceland’s economy collapsed after the 2008 financial crisis, and in April the prime minister resigned after being named in the Panama Papers scandal.

      “We stand for enacting changes that have to do with reforming the systems, rather than changing minor things that might easily be changed back,” said Birgitta Jónsdóttir, 49, the party’s leader and self-described “poetician.” “We do not define ourselves as left or right but rather as a party that focuses on the systems. In other words, we consider ourselves hackers.”

      Formed in 2012 to lobby for Internet copyright reform, the Pirate Party has broadened its platform to include advocating for direct democracy, total government transparency, decriminalizing drugs and even offering asylum to National Security Agency leaker Edward Snowden.

    • Iceland’s ‘Pirate’ Jonsdottir: an accidental politician

      The public face of the Icelandic Pirate Party, Birgitta Jonsdottir is a hacker, cyberspace anarchist, poet — and a rather reluctant politician.

      However, she could find herself strutting the corridors of power if the Pirate Party emerges as expected as the strongest group in Saturday’s election in the North Atlantic island nation.

    • The Truth About Donald Trump’s Hair
    • The Greens are a movement party

      The Greens have elected hundreds of people to office at the local level, and Greens win about 34 percent of the time that we run in local elections. So please do not allow Pacifica to repeat a myth that the corporate media creates.

    • National Geographic Rebrands, Drops ‘Channel’ From Its Name

      NatGeo is finally dropping “Channel” from its name. A year after bringing all the other National Geographic entities — the magazine, the National Geographic Society — under the 20th Century Fox corporate umbrella, National Geographic Partners is going to start acting like one big adventurous family, and it’s giving itself a new tagline to boot: “Further.”

      “[‘Channel’] suggests this linear television destinations and increasingly that’s not the way people are consuming us,” explained National Geographic Global Networks CEO Courtney Monroe. “We are one, and we are working more closely together.” Monroe put forth the upcoming NatGeo series “Mars”, premiering Nov. 14, as an example: Yes, it’s a big event series, a hybrid of documentary-style interviews interwoven with a fictional narrative about the mission to colonize the Red Planet. But, she pointed out, it’s also the cover story of the November issue of the National Geographic magazine, as well as the topic of two books — one for kids, and one for adults.

    • WikiLeaks drops another tranche of #PodestaEmails from Clinton campaign chair

      There will be a total of 50,000 emails released in the lead up to November 8, according to WikiLeaks. So far, 35,594 have been published.

    • WikiLeaks Releases 21st Batch of Clinton Campaign Chair Podesta’s Emails

      WikiLeaks uploaded on Friday the 21st batch of emails of the US Democratic Party presidential nominee Hillary Clinton’s campaign chairman, John Podesta.

    • Clinton’s camp feared Joe Biden run, worked hard to kill it

      Biden would have sailed away from Trump much earlier and faster than Hillary Clinton did. But beyond the easy victory she’s likely to win anyway all told, he doesn’t have much to recommend him over her, and lacks many of her — yes, I know! — her scruples.

    • Why 5% for the Green Party is a win for America

      In 1854, a few thousand people gathered in Jackson, Michigan to launch an independent challenge to a national political system dominated by two parties. “Of strange, discordant, and even hostile elements,” a party leader later recalled, “we gathered from the four winds…[with] every external circumstance against us.” This challenge was fueled by the radical abolitionist movement that united white workers and formerly enslaved Africans against the criminal institution of slavery, as a response to the political crisis caused by the Kansas-Nebraska Act.

      In just two years, this insurgent third party — created by movement activists — had gained ground across the Northern states, challenging the Whig Party. In short order this insurgent “third party” had become a major opposition party. By 1858 they had won an influential foothold in Congress, and by 1860, that party leader — Abraham Lincoln — was elected President of the United States.

      It’s painfully obvious that the Republican Party has strayed dramatically from its early radical roots in abolitionism, equality, and peace. But it’s also quite fitting that, in 2016, as that party is declining into dangerous reactionary know-nothingism, the opening for a new party rooted in radical equality, environmental justice, and peace to rise up is bigger than ever. Amid the raging flames of austerity, endless war, impending climate change, and the most polarized election in modern memory, a record 57 percent of Americans are yearning for another choice, and for an independent political party that will truly represent their interests, according to a recent Gallup poll.

      [...]

      Our grassroots, people-powered campaign has achieved incredible gains in this election cycle, despite having had a fraction of the media coverage and an even smaller fraction of the vast resources of the two major parties. With the material benefits that come with 5 percent of the popular vote, we will have unprecedented resources to continue building this movement for progressive change, shoring up power from below, and paving the way for a new, sorely needed politics of integrity and transformation.

    • The Best Ballot Plan Now? ‘Strategic’ Voting for the Stein-Baraka Green Party Ticket

      Donald Trump is campaigning to win 40 percent of the vote for president—and he’s close, with recent polls showing him in the high 30s. But his final performance will not help.

      Trump is focusing on topics that will prevent him from broadening his base, such as the women he accuses of lying about his alleged sexual assaults, and what he calls the rigged election. He is fighting with other Republicans, like Paul Ryan, and with Republican state leaders, most notably in Ohio. His refusal to say he will accept the outcome of the election is creating more conflict with Republicans and raising doubts with voters.

      Outlets predicting the results of the election say Clinton will be the next president, with astoundingly lopsided odds. The Huffington Post gives Trump only a 3.1 percent chance of winning and puts Clinton’s likelihood at 96.8 percent. The New York Times gives Clinton a 93 percent chance.

    • Podesta relative earned six-figure fees lobbying Clinton’s State Dept. during his tenure there
    • Eric Garner’s daughter blasts Clinton campaign after WikiLeaks emails

      The daughter of a New York City man who died after he was put in a police chokehold blasted Hillary Clinton’s campaign Thursday when WikiLeaks revealed email conversations about using her father’s death to protest gun violence.

      “I’m troubled by the revelation that you and this campaign actually discussed ‘using’ Eric Garner … Why would you want to ‘use’ my dad,” tweeted Erica Garner, who endorsed Vermont Sen. Bernie Sanders in the Democratic primary.

    • Goodlatte Statement on the FBI’s Decision to Reopen the Clinton Investigation
    • WikiLeaks Dumps Mean Hillary’s Presidency Would Be Tainted from Day One
    • How Neera Tanden Works

      Emails released by WikiLeaks reveal the maneuverings of a liberal think-tank president and member of Hillary Clinton’s inner circle.

    • Hillary headache: Even Chelsea ripped ‘hustling’ at lucrative family foundation

      Did the Clinton Foundation, for all its good works, serve as a giant slush fund?

      That question has surged to the forefront of the campaign in the wake of another Wikileaks dump, and one of the biggest accusers turns out to be Chelsea Clinton.

      The Chelsea criticism is a bombshell, one that exploded with enough force that it propelled the lead story in both the New York Times and Wall Street Journal and an above-the-fold piece in the Washington Post.

    • State Dept Told ‘Friendly’ AP Reporters About Missing Hillary Emails Before Congress

      Department of State officials told Hillary Clinton campaign staffers they would leak a story about missing Benghazi investigation emails to a “friendly” Associated Press reporter before Congress “has a chance to realize what they have.”

      “Just spoke to State a little more about this,” Clinton’s travelling press secretary Nick Merrill wrote to campaign staffers on June 24, 2015, regarding emails sent between the former secretary of state and her longtime confidant Sidney Blumenthal.

      The Department of State told Merrill they would be tipping off AP reporters that at least 15 emails between Clinton and Blumenthal were missing from 55,000 pages of emails handed over to a House committee investigating the Sept. 11, 2012 attack on a U.S. diplomatic compound in Benghazi, Libya.

    • If Clinton Campaign Believes WikiLeaks Emails Are Forged, Why Don’t They Prove It?

      Top Democrats have repeatedly waved off substantial questions arising from their hacked emails by falsely implying that some of them are forgeries created by Russian hackers.

      The problem with that is that no one has found a single case of anything forged among the information released from hacks of either Clinton campaign or Democratic Party officials.

      The strategy dates all the way back to a conference call with Democratic lawmakers in August. Politico reported that a number of Democratic strategists suggested that Russian hackers — who have been blamed by U.S. intelligence agencies for supplying the emails to Wikileaks and other web sites — could sprinkle false data among the real information.

      Since then, despite the complete lack of evidence to support such a claim, it’s become a common dodge among leading Democrats and the Clinton campaign when asked questions about the substance of the emails.

    • WikiLeaks shows Clinton hid email scandal from her own staff

      Hillary Clinton’s closest aides hid the private email scandal from her campaign team in the months before the official launch of her presidential campaign, emails made public by WikiLeaks show.

      Robby Mook, Clinton’s campaign manager, John Podesta, Clinton’s campaign chair, and Neera Tanden, co-chair of Clinton’s transition team, each expressed shock at the revelations about her private server as they emerged in early March 2015.

      Although Clinton’s team had performed research on her in 2014 as staff prepared for her campaign, Clinton’s inner circle apparently steered Mook and others away from the issue until it was too late.

      When Podesta asked Mook if he had “any idea of the depth of this story,” Mook answered simply, “Nope.”

    • Is there a deeper network behind the ‘Catholic Spring’?

      Washington D.C., Oct 27, 2016 / 12:02 pm (CNA/EWTN News).- A reputed “Catholic Spring” is in the news after hacked emails from John Podesta, now Hillary Clinton’s campaign manager, indicated plans for an effort to sow revolution within the Church.

      But grants to the think tank Podesta founded also suggest links to other efforts targeting religion. The Center for American Progress appears to be part of an influence network that advocates restrictions on religious freedom while promoting dissent within Christianity on sexual morality, especially LGBT issues.

      Podesta co-founded the Center for American Progress in 2003 after serving as White House Chief of Staff in President Bill Clinton’s final term. He served as the center’s CEO until 2011. He became a special adviser to President Barack Obama in 2013, and joined the Hillary Clinton campaign in early 2015.

    • Propaganda Alert! Misleading Article About Jill Stein in the Daily Beast

      A particularly misleading article, titled “Jill Stein’s Ideology Says One Thing — Her Investment Portfolio Says Another,” is being peddled by the Daily Beast, which accuses the Green Party’s presidential candidate, Jill Stein, of being a hypocrite for investing in certain mutual funds which hold assets with energy, tobacco, & pharmaceutical companies. The accusation is, like much of what the Clinton-controlled Daily Beast spews from it’s slimy propaganda-machines, a poorly-constructed pile of journalistic garbage.

      I shall provide a link to the article at the bottom of this page but I’d like to discourage my readers from clicking it because I hate the thought that these jerks will get any amount of ad-money from web-traffic out of my site. I’d also like to note that the Daily Beast is owned by IAC, a media corporation whose board of directors includes — [drumroll, please…] Chealsea Clinton! So — please click sparingly!

    • New Emails in Clinton Case Came From Anthony Weiner’s Electronic Devices

      Federal law enforcement officials said Friday that the new emails uncovered in the closed investigation into Hillary Clinton’s use of a private email server were discovered after the F.B.I. seized electronic devices belonging to Huma Abedin, a top aide to Mrs. Clinton, and her husband, Anthony D. Weiner.

      The F.B.I. is investigating illicit text messages that Mr. Weiner sent to a 15-year-old girl in North Carolina. The bureau told Congress on Friday that it had uncovered new emails related to the Clinton case — one federal official said they numbered in the thousands — potentially reigniting an issue that has weighed on the presidential campaign and offering a lifeline to Donald J. Trump less than two weeks before the election.

      In a letter to Congress, the F.B.I. director, James B. Comey, said that emails had surfaced in an unrelated case, and that they “appear to be pertinent to the investigation.”

      Mr. Comey said the F.B.I. was taking steps to “determine whether they contain classified information, as well as to assess their importance to our investigation.” He said he did not know how long it would take to review the emails, or whether the new information was significant.

    • October surprise: FBI reviewing new emails in Clinton server case

      The FBI on Friday said it is assessing new emails “pertinent” to the investigation into Hillary Clinton’s use of a private email server, a stunning and unexpected move that comes more than a week before the presidential election.

      In a letter sent to lawmakers on Friday, FBI Director James Comey said the bureau has learned of the existence of more emails “that appear to be pertinent to the investigation.” The messages were found “in connection with an unrelated case,” Comey wrote without further explanation.

      Law enforcement officials told The New York Times that the emails were uncovered after the FBI seized devices belonging to longtime Clinton aide Huma Abedin and her husband, Anthony Weiner, who is under investigation for allegedly sending sexually explicit messages to an underage girl.

      After being briefed by his team, Comey “agreed that the FBI should take appropriate investigative steps” to determine whether the emails “contain classified information, as well as to asses their importance to our investigation.”

      Comey said he could not predict how long it would take the bureau to assess whether the new emails are “significant,” meaning the investigation could hang over Clinton’s head through the election.

    • Advocating a ‘Split Ticket,’ WaPo Columnist Parts Ways With Reality

      I’m glad, truly I am, that Samuelson (7/9/97) is no longer writing in regards to climate change, “It’s politically incorrect to question whether this is a serious problem that serious people ought to take seriously.” But if he’s not in denial about climate change, he’s in denial about denialism: Ryan says “I don’t know” whether humans are warming the Earth’s climate, “and I don’t think science does either.” He does know whether the federal government can do anything about climate change, though: “I would argue the federal government, with all its tax and regulatory schemes, can’t.”

      As for McConnell, he says that “for everybody who thinks [the planet is] warming, I can find somebody who thinks it isn’t.” His own position? “I’m not a scientist, I am interested in protecting Kentucky’s economy, I’m interested in having low-cost electricity.”

      These are the people that Samuelson suggests will do something about the climate catastrophe if you make sure they don’t lose control of Congress.

      Finally, a historical note: Setting up his argument, Samuelson notes, “At its peak in 1972, ticket splitters represented 30 percent of voters.” Hmm—why do you suppose that 1972 was the peak of ticket-splitting? While the parties on the presidential level had definitively switched sides on civil rights by 1972, with Democrat George McGovern an ardent advocate and Republican Richard Nixon pursuing his “Southern strategy,” congressional representatives throughout the South were still overwhelmingly Democratic—mostly the same people who had been fighting civil rights for years.

    • Why It All Matters for Hillary

      The arguments of “everybody does it” and “well, it wasn’t illegal” in regards to the email server, the Clinton Foundation, pay-for-play, donor access, dirty tricks against Sanders, the many well-timed coincidences of Trump revelations, and more, are strawman logic.

      Leaving aside the idea that people usually say “everybody does it” and “well, it wasn’t illegal” only when their own candidate gets caught doing something, what was done matters.

    • Anthony Weiner Investigation Leads FBI Back To Clinton Email Server Case

      Newly discovered emails being examined by the FBI in relation to Hillary Clinton’s email server came to light in the course of an unrelated criminal investigation of Anthony Weiner, a source familiar with the matter tells NPR’s Carrie Johnson.

      Weiner is the estranged husband of close Clinton aide Huma Abedin; he has been under scrutiny for sending illicit text messages to an underage girl.

      Earlier Friday FBI Director James Comey notified members of Congress that the FBI had reopened its investigation into the handling of classified information in connection with the Democratic presidential candidate’s use of a private email server while secretary of state.

      In a letter to the leaders of congressional oversight committees, Comey wrote: “In connection with an unrelated case, the FBI has learned of the existence of emails that appear to be pertinent to the investigation. I am writing to inform you that the investigative team briefed me on this yesterday, and I agreed that the FBI should take appropriate investigative steps designed to allow investigators to review these emails to determine whether they contain classified information, as well as to assess their importance to our investigation.”

    • Clinton Campaign Worried About Bill Cosby Clinton Foundation Ties

      Hillary Clinton’s campaign worried that she would face scrutiny over the thousands of dollars the Clinton Foundation accepted from accused rapist Bill Cosby, a newly leaked memo reveals.

      The memo, dated July 16, 2015, also reveals that Hillary was instructed to give a non-answer if pressed over whether the foundation would return Cosby’s donations.

    • Limbaugh: FBI wants focus off WikiLeaks

      Rush Limbaugh says the FBI is starting a new review of Hillary Clinton’s emails to distract voters from WikiLeaks’s revelations about her.

      “[FBI Director James] Comey is just doing this to take everybody’s attention off of the WikiLeaks email dump,” Limbaugh said on his radio broadcast Friday.

      “The cynical view is that Comey is still carrying water for Clinton and is trying to get everybody to stop paying attention on the WikiLeaks dump because it’s starting to have an impact,” he continued.

      “So you announce you’re opening the inquiry, get everybody all hot and bothered and focused on it, and after three or four or five days, you announce it’s a false alarm, nothing to see her, investigation now officially over, and meanwhile, in that five day period, everybody’s forgotten about WikiLeaks.”

      Limbaugh said WikiLeaks emails are exposing the Democratic presidential nominee’s secrets and damaging her White House bid.

    • ‘Bill Clinton, Inc.’ Memo Reveals Tangled Business, Charitable Ties

      A 2011 memo made public Wednesday by Wikileaks revealed new details of how former President Bill Clinton made tens of millions of dollars for himself and his wife, then Secretary of State Hillary Clinton, through an opaque, ethically messy amalgam of philanthropic, business and personal activities.

      The memo was written by Bill Clinton’s longtime aide, Doug Band, and is among tens of thousands of emails apparently stolen from Hillary Clinton’s campaign chief, John Podesta, in what U.S. officials believe is part of a massive Russian-backed attempt to disrupt the U.S. election.

      The Band memo came in response to an investigation undertaken by a law firm, Simpson Thatcher, into the activities of the Clinton Foundation at the behest of its board. The board was concerned that some of the activities undertaken by Band and others on behalf of the President could threaten the Foundation’s IRS status as a charity, according to Band’s memo. Chelsea Clinton had also reported concerns to Podesta and other Clinton advisors that Band and his recently-launched consulting firm, Teneo, were using her father’s name without his knowledge to contact British lawmakers for clients, including Dow Chemical.

  • Censorship/Free Speech

    • Comedy writer has exactly the right response to his kid’s Fahrenheit 451 permission slip

      Daily Show writer Daniel Radosh’s son came home from school with a permission slip that he’d have to sign before the kid could read Ray Bradbury’s novel Fahrenheit 451, which is widely believed to be an anti-censorship book (Bradbury himself insisted that this was wrong, and that the book was actually about the evils of television).

      Fahrenheit 451 has been the frequent subject of parental challenges on the flimsiest of grounds, as when fundamentalist Christian Alton Verne, of Conroe, Texas, demanded to have the book removed from the curriculum because the characters occasionally blaspheme and say “damn” (“If they can’t find a book that uses clean words, they shouldn’t have a book at all”).

      Radosh responded to the permission slip — which mentioned these parental challenges — with a wry note congratulating the teacher for using permission slips to convey the awfulness of heavy-handed attempts to control peoples’ access to information.

    • Copyright conundrum: Tweeting this may cost you

      Be careful if you tweet this story: It might cost you.

      The European Commission created a legal minefield for billions of internet users with a well-intentioned but poorly worded proposed law to help struggling publishers guard against digital attrition by Google and other news aggregators.

      As people read the fine print in plans released last month to strengthen publishers’ rights over their articles, they discovered the Commission may have accidentally exposed tweeters, facebookers and even LinkedIn users to the whims of the world’s most powerful media organizations.

      Under the Commission’s proposal, copyright lawyers could chase down citizens for sharing sentences or snippets of articles on social media.

      “Users would be breaking the law if they use snippets of articles whether it is enforced or not,” said Julia Reda, a Member of the European Parliament. The law is intended to help traditional publishers survive the digital age but, she said, “it applies to everyone, and if we pass this legislation, it will be in the hands of the publishers to decide whether they want to enforce it.”

    • Clinton Campaign Scrambled To Kill NYT Report She Flipped On Gay Marriage, WikiLeaks Shows

      Members of Hillary Clinton’s presidential campaign sought to discredit reports over her shifting stance on same sex marriage, the latest batch of WikiLeaks emails show.

      On April 15, 2015, press secretary Nick Merrill started an email chain with policy spokesman Jesse Lehrich over a New York Times article written by Alan Rappeport titled, “Shifting Position, Clinton Says Gay Marriage Should Be A Constitutional Right.”

    • Milo speech at U-Md. canceled because security fee was too high; supporters call it censorship

      A scheduled speech by conservative writer Milo Yiannopoulos at the University of Maryland was canceled because a student group was unable to raise enough money to cover fees the university required shortly before the event, including more than $2,000 for security.

      The costs led to complaints from students and others that the university was silencing a potentially contentious speech rather than encouraging free and open debate. But a spokeswoman for the school countered that the security fee included the speaker’s request to have officers present, and that university officials had worked to help the students.

    • Colleges Cancel Milo Yiannopoulos Appearances
    • Breitbart editor Milo Yiannopoulos’ U. of Md. appearance canceled due to security costs
  • Privacy/Surveillance

    • Privacy Shield legal spat puts EU-US data flows at risk again

      Europe’s Privacy Shield faces a legal challenge from an Irish civil liberties group.

      Digital Rights Ireland (DRI) has brought a complaint against the Safe Harbour successor that governs the transfer of personal data between the European Union and the US.

    • AT&T is (allegedly) making millions of dollars selling your data to cops
    • Big data grab: Now they want your car’s telemetry

      This isn’t simply a market for one Uber to dominate, suggests McKinsey in its new report, “Monetizing Car Data.” As the report authors conclude, the opportunity to monetize car data could be worth $450 billion to $750 billion within the next 13 years.

    • We’re seeing yet another election cycle where privacy is of no concern to candidates

      Yet another election campaign is passing without privacy and other fundamental rights being discussed. While candidates certainly have different stances, judging on public discourse, they’re not what makes or breaks the election. The conclusion remains that in absence of political importance, technical measures are necessary to maintain privacy at the individual level.

      When I founded the Swedish Pirate Party in 2006, which would go on to win seats in the European Parliament, it was on a key insight: nothing political happens unless it’s positive for a politician’s career. This can either take the form of looking good in media, when they take a rare initiative of their own, or of not being fired, when their job is under threat from challengers.

    • Search Risk – How Google Almost Killed ProtonMail

      In the past two months, many of you have reached out to us to ask about the mysterious tweets we sent to Google in August. At ProtonMail, transparency is a core value, and we try to be as transparent with our community as possible. As many people have continued to point out to us, we need to be more transparent here to avoid continued confusion and speculation. Thus, we are telling the full story today to clarify what happened.

    • Why did ProtonMail vanish from Google search results for months?

      If you’re the maker of a popular, zero access encrypted webmail product and suddenly discover your product is no longer featuring in Google search results for queries such as “secure email” and “encrypted email,” what do you conclude?

      That something is amiss, for sure.

      But the rather more pertinent question is whether your product’s disappearance is accidental or intentional — given that Google also offers a popular webmail product, Gmail, albeit one that does not offer zero access because users “pay” the company with their personal data, which feeds into Alphabet’s user profiling and ad targeting engines.

      So, in other words, Google is not an entirely disinterested bystander when it comes to a rival email product’s success.

    • Encryption no bar to giving govt data, Apple told Democrats

      A senior Apple official reassured the chairman of the Clinton presidential campaign that the tech giant would co-operate with the US government when it came to handing over “meta-data or any of a number of other very useful categories of data”, as “strong encryption does not eliminate Apple’s ability to give law enforcement” such data.

      Lisa Jackson, Apple’s vice-president for environment, policy and social initiatives, sent an email to John Podesta on 20 December 2015, thanking him for “the principled and nuanced stance the Secretary took last night on encryption and the tech sector. Leadership at Apple certainly noticed and I am sure that is true throughout the Valley”.

      Her comments about handing over data to the government are in marked contrast to the strong pro-customer statement on encryption made by Apple chief executive Tim Cook earlier this year when the FBI demanded that Apple hand over data on an Apple iPhone 5C belonging to one of the two people who participated in a terrorist attack in San Bernardino, California.

    • AT&T actually sells leads to DEA and local law enforcement using Project Hemisphere

      AT&T has been running a for-profit mass surveillance program, called Project Hemisphere, since 2007. Everybody already knows about AT&T cooperation with NSA mass surveillance metadata database… This is a separate program that allows law enforcement to access all of AT&T’s data at will, even though the information is never handled by law enforcement, which apparently makes it legal. The Project Hemisphere mass surveillance program was created by AT&T and specifically marketed to law enforcement as an easy-to-use system

      If you’re wondering what information that AT&T could possibly have on you if you’ve never been an AT&T customer, AT&T has compiled all the relevant phone metadata that passed through their hardware that they possibly could since the 1980s. AT&T has a metadata record of everything from Skype calls to text messages to phone calls on LTE, not just the ones that were made to or from AT&T networks; either, but all of them that ever touched an AT&T owned switch. If you’re wondering what percentage of American switches are owned by AT&T, the answer is over 75%.

    • AT&T reportedly spies on its customers for government cash

      AT&T controls a big chunk of America’s cellular infrastructure, and it turns out that it’s been using that power for super-creepy purposes. The Daily Beast is reporting that the telco has essentially turned itself into a spy-for-hire in the pay of the government. According to the piece, the company’s Project Hemisphere is providing warrantless surveillance, thanks to some legal gray areas, that score it millions of dollars from taxpayers.

      The existence of Project Hemisphere has been known since the New York Times reported on it way back in 2013. Back then, it was presented as a minor tool that was only employed in a handful of states for specialized anti-drug operations. If these new revelations are accurate, then Hemisphere’s being used for a wide variety of crimes all across the country ranging from murder all the way through to Medicaid fraud. AT&T’s information is good enough that it can tell investigators where someone was when they made a call, who they were speaking to and, as we know from the EFF, it’s easy to divine intention just from those two pieces of information.

    • Beijing threatens legal action over webcam claims

      The Chinese Ministry of Justice has threatened legal action against “organisations and individuals” making “false claims” about the security of Chinese-made devices.

      It follows a product recall from the Chinese electronics firm Hangzhou after its web cameras were used in a massive web attack last week.

      The attack knocked out sites such as Reddit, Twitter, Paypal and Spotify.

      The Chinese government blamed customers for not changing their passwords.

      Its legal warning was added to an online statement from the company Xiongmai, in which the firm said that it would recall products, mainly webcams, following the attack but denied that its devices made up the majority of the botnet used to launch it.

      The firm later told Reuters that the recall would effect “less than 10,000″ devices.

      It also noted that users not changing their default passwords were contributing to weak security.

      This was reiterated by the Ministry of Justice which said Xiongmai’s products “cannot be manipulated by criminals”, again blaming users who “do not change the initial password”.

    • AI-powered body scanners could soon be inspecting you in public places

      A startup bankrolled by Bill Gates is about to conduct the first public trials of high-speed body scanners powered by artificial intelligence (AI), the Guardian can reveal.

      According to documents filed with the US Federal Communications Commission (FCC), Boston-based Evolv Technology is planning to test its system at Union Station in Washington DC, in Los Angeles’s Union Station metro and at Denver international airport.

      Evolv uses the same millimetre-wave radio frequencies as the controversial, and painfully slow, body scanners now found at many airport security checkpoints. However, the new device can complete its scan in a fraction of second, using computer vision and machine learning to spot guns and bombs.

  • Civil Rights/Policing

    • Fury over Bosnian town built by Middle East investors which has Arabic as its ‘official’ language – and locals can only enter if they work as servants

      Angry locals are protesting about a Bosnian town built by Middle Eastern investors which has Arabic as its ‘official’ language – and where locals can only enter if they work as servants.

      The 160 homes have been constructed in a luxury enclave near Tarcin, five miles west of the Bosnian capital Sarajevo.

      But furious locals say that their only way of accessing the area is through being hired as servants or cleaners – and claim most of the homes contain the wives of wealthy businessmen.

    • Sex Before Marriage: Indonesia Proposed Islamic Law Would Put Sexually Active People In Prison

      Anyone engaging in sex outside of marriage in the world’s third-largest democracy could soon face up to five years in prison. Indonesia’s highest court is deliberating whether to broaden existing law to make all casual sex illegal in the latest bid by conservative Islamists in the country to revise a relatively secular legal code.

      A decision by the Constitutional Court is expected in December or early next year, with indications that the court is leaning toward enacting the tougher legislation. While adultery is currently punishable by up to nine months in prison, if the new law goes through it would make gay sexual relations illegal in Indonesia for the first time. It has already received backlash from human rights organizations.

    • Jaipur: After losing bet, man forces ex-wife to sleep with friend

      A 42-year-old mother-of-two from Jaipur filed a rape complaint after her former husband tricked her into sleeping with his friend. She claimed that her ex-husband drugged her and took her to his friend’s house after losing a bet.

      The man, however, claims it was all for Nikah Halala, a Sharia law that requires the divorced woman to marry and consummate with another man before she can remarry her former husband.

      A Hindustan Times report says he has a fake nikahnama with the stamp of the Jaipur city qazi, which states his ex-wife and the friend were married.

    • The Mayor of London’s “My Side”

      Sadiq Khan, the Mayor of London, addressed the Chicago Council on Global Affairs (CCGA) on September 15. Although his topic was “The Breakdown of Social Integration – The Challenge of Our Age,” some crucial components of that challenge were notably absent from his presentation.

      Even though Mayor Khan said he believes that, “London is the powerhouse” for his country and is “proud that London was the only region in England to vote to remain in the European Union” (some boroughs voted 80% “Remain”), when it came to the United Kingdom as a whole, he said that “my side” lost the referendum.

      That strikes one as an odd way for the mayor of any city to talk. Isn’t he the Mayor of all of London? Aren’t the Londoners who voted for Brexit included on his “side”?

    • Email To Podesta: Germany Imported Its Own Immigrant Crime Wave

      Nobody tells it like it is like they do when they don’t know the world will be tweeting their emails. Here’s a Wikileaked February 2016 email to Hillary Clinton presidential campaign chairman John Podesta.

    • 36-year-old Pennsylvania man gets 18 months for phishing nude celebrity pics

      A 36-year-old Ryan Collins from Pennsylvania was sentenced to 18 months in prison after pleading guilty to hacking the Apple and Google accounts of more than 100 celebrities, including Jennifer Lawrence, Aubrey Plaza, Rihanna, and Avril Lavigne. Collins stole personal information, including nude photos, from the celebrities.

      The photos were famously posted on 4Chan and Reddit in 2014. Collins pleaded guilty to hacking the celebrities’ accounts in May, but he did not plead guilty to posting the images on the Internet. “Investigators have not uncovered any evidence linking Collins to the actual leaks or that Collins shared or uploaded the information he obtained,” the Department of Justice (DOJ) noted.

      According to The Guardian, Collins ran a phishing scheme from November 2012 to September 2014, sending celebrities e-mails that appeared to be from Apple and Google, requesting their user names and passwords.

    • Dakota Access Pipeline protesters arrested and pepper sprayed

      Authorities began arresting people at a Dakota Access Pipeline protest site in Morton County, North Dakota today, according to the Associated Press and the Guardian. Protesters report being pepper sprayed by authorities on a live stream hosted by Cempoalli Twenny on his Facebook page. There have also been reports that authorities are using beanbag guns. Protesters could be heard calling for a medic in the live stream.

  • Internet Policy/Net Neutrality

    • The City That Was Saved by the Internet

      The “Chattanooga Choo Choo” sign over the old terminal station is purely decorative, a throwback. Since the Southern Railroad left town in the early 1970s, the southeastern Tennessee city has been looking for an identity that has nothing to do with a bygone big band song or an abandoned train. It’s finally found one in another huge infrastructure project: The Gig.

      The first thing you see at the Chattanooga airport is a giant sign that says “Welcome to Gig City.” There are advertisements and flyers and billboards for the Gig in the city’s public parks. The city’s largest building is dedicated to the Gig. Years before Google Fiber, Chattanooga was the first city in the United States to have a citywide gigabit-per-second fiber internet network. And the city’s government built it itself.

      At a time when small cities, towns, and rural areas are seeing an exodus of young people to large cities and a precipitous decline in solidly middle class jobs, the Gig has helped Chattanooga thrive and create a new identity for itself.

    • This Guy Has the Fastest Home Internet in the United States

      For reference, the Federal Communications Commission officially classifies “broadband” as 25 Mbps. His connection is 400 times faster than that.

  • DRM

    • Apple’s new MacBook Pro kills off most of the ports you probably need

      Apple just introduced a shiny, super thin new MacBook Pro. But for what was birthed, a lot of widely-held standards had to die.

      Today, Apple removed the MagSafe 2 charging port type, they stripped away the HDMI port, they ripped out the SD card slot, they shuttered the Thunderbolt 2 ports (which you probably used like three times) and they most notably killed the standard USB port. All these ports, which power data transfer and charging for most everything you likely use, have been replaced by four Thunderbolt 3/USB-C ports. Surprisingly the folks at Apple saw it fit to give the headphone jack a stay of execution on the new model.

  • Intellectual Monopolies

    • Copyrights

      • “MPAA and RIAA’s Anti-Piracy Plans Harm The Internet”

        The Internet Infrastructure Coalition is urging the U.S. Government not to blindly follow the RIAA and MPAA’s input regarding online piracy threats. The group, which represents tech firms including Google, Amazon and Verisign, warns that the future of the Internet is at stake.

      • Repeat Infringers Can Be Mere Downloaders, Court Rules

        A 10-year-old copyright case has prompted an interesting opinion from a US appeals court. In determining the nature of a “repeat infringer” (which service providers must terminate to retain safe harbor), the court found these could be people who simply download infringing content for personal use.

      • When the FCC asked about unlocking set-top boxes, the Copyright Office ran to the MPAA

        It’s been more than 20 years since Congress told the FCC that it should do something about the cable and satellite companies’ monopolies over set-top boxes (American households spend more than $200/year to rent these cheap, power-hungry, insecure, badly designed, trailing edge, feature-starved boxes), but it wasn’t until this year that the FCC announced its Unlock the Box order and asked for comments.

        The US Copyright Office is a branch of the US government, and its job is to help regulate the entertainment industry. That industry is one of the principle advocates for keeping the set-top box dumpster fire burning without any changes, because the lack of competition lets them call the shots with the cable/satellite companies (some entertainment companies are also major satellite/cable companies — Comcast/Universal, Time-Warner Cable, etc).

        But newly released internal documents from the Copyright Office reveal that literally the first thing it did when it learned that the FCC was seeking comments on unlocking set-top boxes was to call on the MPAA and its member companies — and shortly thereafter, it released a highly controversial comment stating that movie companies should have the right to dictate the features of these devices and exercise a veto over the them.

]]>
http://techrights.org/2016/10/28/linux-mint-18-1-will-be-serena/feed/ 0
Enfish Case Has Not Salvaged Software Patents in the US, Proponents of Software Patents Admit http://techrights.org/2016/06/14/enfish-reality-check/ http://techrights.org/2016/06/14/enfish-reality-check/#comments Tue, 14 Jun 2016 14:40:51 +0000 http://techrights.org/?p=93526 Much ado about [En]fish…

Fish

Summary: A roundup of news about software patents in the United States and why the media’s narrative (dominated by patent lawyers) clouds a rather grim reality for software patents, even after the Enfish v Microsoft case

THE USPTO continues to grant software patents, but relying on Alice at the US Supreme Court (SCOTUS), reassessments by courts or panels typically invalidate these.

SCOTUS and Halo v Pulse

“The USPTO continues to grant software patents, but relying on Alice at the US Supreme Court (SCOTUS), reassessments by courts or panels typically invalidate these.”Based on this new tweet, SCOTUS now recognises the patent trolls issue and even names it as such. This commentary on trolls ought to take into account the strong correlation between patent trolling and software patents (which trolls typically use). Here is what Patently-O wrote about SCOTUS just now: “The Supreme Court today issued an important unanimous decision in Halo v. Pulse – vacating the Federal Circuit’s rigid limits to enhanced damages in patent cases. The decision rejects the dual objective/subjective test of Seagate as “inconsistent” with the statutory language of 35 U.S.C. §284.”

The problem is, irrespective of damage limitations, patent trolls (which may be the spilling of a company’s patent portfolio acting as satellites) can just attack many thousands of firms or people, taxing each in turn. So loopholes remain in tact and overall it’s pretty ugly.

Court of Appeals for the Federal Circuit (CAFC)

It is worth noting that there’s an ever-growing gap between the judgment of USPTO examination — as per the management’s guidelines — and what US courts actually say, even corrupt courts like the Court of Appeals for the Federal Circuit (CAFC). Remember that it was CAFC which started software patenting in the first place and recently ruled in favour of Enfish, getting software patents proponents/maximalists (such as patent lawyers) all giddy and jubilant as though software patents are back with vengeance (they’re not).

Free Software

“It is worth noting that there’s an ever-growing gap between the judgment of USPTO examination — as per the management’s guidelines — and what US courts actually say, even corrupt courts like the Court of Appeals for the Federal Circuit (CAFC).”Software patents are problematic to software developers, no matter if they develop Free software or proprietary software. It’s probably a bit more of a problem for Free software developers because in order to freely distribute copies of their software they must not be coerced into making patent payments to anyone. “Patents and the open-source community” is a new article from LWN which deals with the topic. It is a very long article about a panel in which Professor “Moglen advised separating the past from the future when discussing tactics. For the future, he said, “we should prevent people from getting patents.” But, in the past, the problem is old patents “rising up and smiting” projects, harming innovation. The work that Choudhary does trying to abolish patents, he said, covered how to protect people in the future—and he fully expects SFLC to continue that work, arguing in front of the Supreme Court about the “design patent” case between Apple and Samsung. Furthermore, he said, “open-source software is an immense repository of prior art. Free software can help by educating people on all that we’ve invented and that you therefore cannot reinvent and patent.””

Samsung and Apple

Speaking of this (above-mentioned) “design patent” case between Apple and Samsung — a case which we last wrote about in the weekendFlorian Müller who dislikes Moglen (he once again told off the SFLC a few days ago) has “all the documents and the key points”. To quote his blog: “There never was any doubt that the question of whether the infringement of a single design patent by a complex, multifunctional product warrants an unapportioned disgorgement of profits would be an extraordinarily important one. Previous rounds of amicus curiae briefs already demonstrated broadbased support. But the level of support the petition has just received at this decisive stage exceeds my expectations.”

Days ago we explained why this is relevant and important to Free software. Previously we also explained why design patents are often similar if not indistinguishable from software patents (UI+callback function/s).

Patent Lawyers Upset

“There never was any doubt that the question of whether the infringement of a single design patent by a complex, multifunctional product warrants an unapportioned disgorgement of profits would be an extraordinarily important one.”
      –Florian Müller
Suffice to say, patent lawyers almost always support claimants (never mind justice or innovation). They want a lot of money to swap hands because it’s their source of revenue, other than/aside from obscenely high hourly charges. “How the United States Patent Office Became the Place Where Patents Go To Die” is an example of a new article which bemoans quality control and it is promoted by the usual suspects. It's not exactly surprising that the bubble is now imploding. Patent quality became a joke and over-evaluation of patents ensued. Opponents of the Alice decision continue to cheer for software patents (“Uber files patent on hyperlocal internet search” in this case), but sadly for them, the boat is leaving and software patents are now weaker (in the US) than they have ever been since their introduction by CAFC. “Recall that Enfish comes from a single CAFC panel,” IBM’s Manny Schecter wrote the other day, “when the CAFC ruled en banc in Alice it was splintered” (as a reminder, Schecter is a proponent of software patents not only in the US).

Reality Check From Software Patents Proponents

“I am thus concerned that Enfish will not be as useful as hoped in overcoming §101 Alice rejections.”
      –IP Watchdog
We were rather amused to find the most pro-software patents site out there publishing “Is Enfish Much Ado About Nothing?” The gist of it is that the Enfish decision hardly changed anything at all. To quote the key part: “I am thus concerned that Enfish will not be as useful as hoped in overcoming §101 Alice rejections. The patents at stake in Enfish appear to have been written with a confident view of the prior art and of the invention. So, if a specification does not confidently emphasize the “invention,” its “benefits over” conventional prior art, and “disparage” the prior art, will examiners and judges continue Step 1 characterizations at “such a high level of abstraction”? Is Enfish merely much ado about nothing?”

Yes, it is. Patent lawyers tried to over-emphasise it in order to change public opinion and influence policy-making people. The patent salespeople, on the other hand (in the same site), hope that this one single case will save software patents, not just at the USPTO but also at the courts. They are not paying attention to any case other than the Enfish v Microsoft case. How convenient…

Software Patents Proponents in Denial

Almost a month later (after the decision) Baker Botts LLP is still cherry-picking cases in an effort — however shallow — to shore up software patents. Banana IP (Banana Republic?) does the same kind of lobbying. We have already covered dozens of examples like these. These helped show how the media, especially lawyers’ media, continues to simply ignore every single case that’s ruled against software patents and lean on the rare exceptions instead. Edward Bray (of Marks & Clerk) is now cross-posting his ‘analysis’ in favour of software patents — an ‘article’ (lobbying/marketing) which we mentioned the other day. It just never stops, does it? Even a month later.

“Is Enfish merely much ado about nothing?”
      –IP Watchdog
The USPTO is doing the same thing, as we noted last month on a couple of occasions. Here is an explanation of how it goes: “Abstract idea – #USPTO memo on how the #CAFC Enfish patentability decision obstructed Alice http://www.uspto.gov/sites/default/files/documents/ieg-may-2016_enfish_memo.pdf … #swpat”

The patent office too is latching onto a single case when it serves to ‘sell’ more patents for more revenue. No separation between examination and policy?

Evidence serves to suggest that no matter what USPTO greed does, the courts continue to crush software patents, even after the Enfish decision. “Patents Directed to Electronic Delivery of Messages Found Ineligible in AZ in GoDaddy v. RPost,” Patent Buddy wrote the other day, linking to http://assets.law360news.com/0805000/805041/2016-06-07%20(doc%20344)%20order%20granting%20godaddy_s%20motion%20summary%20judgment%20and%20vacating%20trial%20dmwest_14483743(1).pdf (Alice is mentioned dozens of times in this decision’s PDF).

Many software patents have just died not only in the courts but also at PTAB, so how can patent lawyers argue with a straight face that a lot has changed? “Fatal Flaws of Subjective Alice/Mayo 101 Test [Are] Now Becoming Evident in Contradictory Findings Across Dist. Courts,” Patent Buddy wrote, but why is that test “subjective”? Because patent attorneys and lawyers don’t like it? Because it threatens their profit/income?

The matter of fact is that some courts get it right (they can see that algorithms are abstract), whereas some are still rather clueless (or bad lawyers for the defendant) if not corruptible, as was the case at CAFC before. Microsoft had a lot to gain from losing that case, as we explained last month.

“LinkedIn will soon be owned by Microsoft, which is itself a leading proponent of software patents.”Here is a case of software patents being used against Facebook, which has been stockpiling patents on software. To quote Patently-O: “Indacon’s U.S. Patent No. 6,834,276 covers an improved database system that adds “custom links” so that instances of a “link term” would point to a particular file in the database. Thus, applying this in LinkedIn, you might find that references to “Dennis Crouch” point to my LinkedIn profile. Of course, the way that Facebook & LinkedIn operate does not create the pointer-link for all occurrences of the term.”

LinkedIn will soon be owned by Microsoft, which is itself a leading proponent of software patents. What will this mean? Remember that the Enfish decision too involved Microsoft and people from Microsoft were pleased with the outcome. Speaking of Microsoft, the company is now hoarding software patents on quantum computing, based on this new listing. “Note that the USPTO also has a search engine for patent applications that are not yet granted,” wrote the author. “I am not listing those here. You can use that search engine yourself if you also want to see “Previews of the Coming Attractions”…”

Microsoft is by far the biggest threat to Free software when it comes to patent aggression.

Patents on Genome

“Indacon’s U.S. Patent No. 6,834,276 covers an improved database system that adds “custom links” so that instances of a “link term” would point to a particular file in the database.”
      –Patently-O
The Alice/Mayo test applies to more than just software. Bristows lawyers (i.e. patent profiteers who promote software patents) show no concerns about patent scope expansions. Based on this article from MIP, they aren’t going to say that patents on human genome are insane. Instead there’s promotion of that. As per the summary: “Genomic technology has rapidly created a multi-billion dollar growth industry. With life sciences companies scrambling in US and European courts for a share of the lucrative market, in-house IP counsel should start preparing for the next wave of IP litigation, explain Dominic Adair and Annsley Merelle Ward” (from Bristows).

Unless the USPTO gets a grip and stops granting patents on everything in nature, the valuation of patents and the confidence in the patent office will further erode, leaving patent lawyers reliant on illusions, lying to their potential customers, and overselling the prospects of patent litigation. How long can this madness last? It’s a bubble.

]]>
http://techrights.org/2016/06/14/enfish-reality-check/feed/ 0
Links 1/6/2016: Wine-Staging 1.9.11, Unreal Engine 4.12 http://techrights.org/2016/06/01/unreal-engine-4-12/ http://techrights.org/2016/06/01/unreal-engine-4-12/#comments Wed, 01 Jun 2016 23:02:31 +0000 http://techrights.org/?p=93097

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Now, draw sketches to search for images, videos!

    Researchers at the University of Basel in Switzerland have developed a system known as vitrivr, which allows a search for images and videos by means of a sketch.

  • Vitrivr is an open source engine that lets you search for videos with a sketch

    The vitrivr system is open source and freely available on GitHub.

  • This open source software dominates the web, but what is Apache?

    The importance of the web shouldn’t be underestimated, it has helped to open up the world, democratise information and is one of the greatest ever inventions.

    While it has had a profound influence on the world, the web is made up of numerous different elements, such as web server software.

    Apache, an open source software that is available for free, is the most widely used web server software and is developed and maintained by the Apache Software Foundation.

  • ownCloud Gets Its’ Own Foundation

    Contrary to the common trend of bringing an open-source project like ownCloud into an established model, like the Linux Foundation’s Collaborative Project approach, where the Cloud Foundry Foundation, the Cloud Native Computing Foundation, node js foundation, OpenDayLight and so many other now live, ownCloud is building its own Foundation.

  • Hyperledger Work on Its Open-Source Footing

    Taking a bootstrapped initiative to a healthy open-source project is difficult. But when there’s only approximately 100 developers in the world that have a deep understanding of the technology, such as blockchain, the difficulty increases dramatically.

  • Events

    • LibrePlanet forever! Watch sessions from 2016 online

      That’s right, you can now watch the keynote conversation with NSA whistleblower Edward Snowden and 32 more sessions from LibrePlanet 2016: Fork the System on the Free Software Foundation’s (FSF) GNU MediaGoblin instance, including:

  • Web Browsers

    • Mozilla

      • Open Source Speech Recognition

        I’m currently working on the Vaani project at Mozilla, and part of my work on that allows me to do some exploration around the topic of speech recognition and speech assistants. After looking at some of the commercial offerings available, I thought that if we were going to do some kind of add-on API, we’d be best off aping the Amazon Alexa skills JS API. Amazon Echo appears to be doing quite well and people have written a number of skills with their API. There isn’t really any alternative right now, but I actually happen to think their API is quite well thought out and concise, and maps well to the sort of data structures you need to do reliable speech recognition.

  • SaaS/Back End

    • Why open source will be critical to the future of SDDC

      OpenStack, the leading solution for Infrastructure-as-a-Service (IaaS), is currently being used by various organizations for their own on-premises private cloud, for hybrid cloud deployments, or for offering public cloud services to their clients. Through Nova, the compute module of OpenStack, various other components can be controlled, such as networking, block and object storage, disk imaging, identity management, key management, DNS, and search, among others. The entire deployment can be managed using the Horizon dashboard software.

      While OpenStack, itself, does not attempt to emulate the API design of popular public cloud providers, compatibility layers are being developed that provide compatibility with Amazon EC2, Amazon S3, and Google Compute Engine.

    • The Rise of Deep Learning in the Tech Industry

      Tech analysts love trending topics. In fact, that’s their job: forecast and analyze trends. Some years ago we had “Big Data”, more recently “Machine Learning”, and now it s the time of “Deep Learning”. So let’s dive in and try to understand what‘s behind it and what impact it can have on our society.

  • Databases

    • The Limitations of NoSQL Database Storage: Why NoSQL’s Not Perfect

      NoSQL databases have emerged as a leading new data storage technology. But they’re not perfect. Here’s a look at the limitations and drawbacks of NoSQL storage.

      To be sure, NoSQL offers a lot of advantages over traditional data storage techniques. But NoSQL is not a uniformly better storage solution.

      SQL-style storage systems, like MySQL, come out ahead in some contexts. In others, there’s not yet any ideal storage platform.

  • Oracle/Java/LibreOffice

    • How to get started with LibreOffice

      If you use your Mac or PC for word processing, creating and editing spreadsheets or putting the finishing touches on a slideshow presentation, you need a suite of office applications that come with all the tools you need to create some impressive documents, and LibreOffice is one of the best options.

      The Microsoft Office suite is near ubiquitous, but even though Mac version of Office 2016 released last year, it’s still relatively expensive.

      While iWork has become free, it lacks some of the features that come with other office suites. LibreOffice, however, is not only completely free, but it’s constantly updated with improvements and new features, and contains a host of tools that you’d expect in an expensive software collection.

  • CMS

    • How to Select the Best Open Source CMS

      In this article, I’m going to get into minute detail with you on all of the major aspects of open source CMS and the things you should consider to make an informed decision. This is my “how to select the best open source CMS” guide.

      When it comes to selecting a CMS, there’s no doubt that the process of doing so is overwhelming (hey, it’s why this site exists!) but it doesn’t have to be.

  • Pseudo-Open Source (Openwashing)

  • FSF/FSFE/GNU/SFLC

    • Gnuisance 4.0, Plasma Features, Augmented Reality

      gNewSense 4.0 was released at the beginning of May and today blogger DarkDuck said it’s still a gnuisance due to the lack of drivers. Elsewhere, LinuxConfig.org looked at the features of KDE Plasma and Linux Laptop leader System 76 CEO Carl Richell used Linux to augment reality. The Linux Setup interviewed Korora contributor Jim Dean and Matt Hartley sent another love-letter to Ubuntu.

    • gNewSense: past 5 years, same nuisance

      The documentation says the distribution name gNewSense came from Gnuisance, the RMS’s GPG key. Is it true? Or the whole system is just a g-nuisance? Let’s check.

  • Public Services/Government

    • North American Cities Slow to Adopt Open Source Software

      The move to open source is inevitable as open source communities of developers continue to work on 1000′s of applications & as more software development companies invest in open source models to allow for greater flexibility & lower end user prices than existing proprietary competitors. Europe has more than a decade head start on North American cities. The quality of available open source software has improved so much in that decade that the transition can be far easier for cities starting now.

    • Cities And FLOSS

      Obviously there are huge savings in licensing fees to be had by cities migrating to FLOSS solutions from the desktop OS to the servers. On the other hand there is time/money/effort required to make changes happen but these are mostly one-time costs. Cities in Europe have been adopting GNU/Linux and FLOSS steadily for more than a decade. It’s about time North American cities did the same.

  • Licensing/Legal

    • Announcing the Open Source License API

      Over the last 19 years, the Open Source
      Initiative (OSI) has been the steward of the Open Source Definition (or
      OSD), establishing a common language when discussing what it means to be an
      Open Source license [1], and a list of licenses which are known to be
      compatible with the OSD.

    • New API helps open-source developers ‘become license-aware’

      The Open Source Initiative (OSI), the steward of the Open Source Definition (OSD), announced today it has created a machine readable publication of OSI approved licenses.

      According to the organization, the API will allow third parties to “become license-aware”, giving businesses everywhere the means to determine if a license is open source or not.

      The Open Source Initiative considers this the next “logical step” and quite important, knowing all the copyright and license legal battles going on nowadays, and how expensive they can be.

      Open Source Lead at GitHub, Brandon Keepers offered, “A canonical, machine-readable source of license metadata is a great step towards enabling developers to build tools around open source licensing and compliance. We can’t wait to see what the community does with it”.

    • Oracle’s Lead Lawyer Against Google Vents That The Ruling ‘Killed’ The GPL

      Except, of course, tons of copyright experts predicted exactly this result (and many more argued that APIs should not be subject to copyright at all). Famed copyright scholar Pam Samuelson has been writing extensively about the case, focusing both on why APIs should not be covered by copyright (and, why basically every other court has agreed) as well as why, even if it is covered, it’s fair use. Hell, she even wrote a response to the Hurst piece, explaining why Hurst was wrong. It’s weird for Hurst to take a position that actually seems at odds with a huge number of copyright experts, and then state that none would take the position that many did.

      [...]

      Once again, this shows a rather unfortunate ignorance of how coding works. It’s not about a desire to “copy freely.” It’s about building amazing and innovative services, and making use of APIs to increase interoperability, which increases value. Copying an API structure is also just much more about making developers comfortable in using new environments. You know, like how Oracle copied SQL from IBM. Because lots of people understood SELECT-FROM-WHERE and it made little sense to create a relational database that didn’t use that structure. It’s not about copying freely. It’s about interoperability.

      And, really, the idea that an Oracle lawyer is “concerned” about the future of the GPL is fairly laughable. Thankfully, many people have weighed in in the comments — including plenty who are quite familiar with the GPL and software development to explain to Hurst why she’s wrong. Somehow, I think she has some fairly strong reasons to ignore those responses.

  • Openness/Sharing/Collaboration

    • Munich Open Government Day, 27 October 2016

      On 27 October, the German City of Munich is organising the fourth edition of its annual Open Government Day. This year’s theme is ‘openness, participation and digitisation — impulses for a modern community’. The day provides an opportunity for discussion and exchange of experiences with Open Government.

    • Open Access/Content

      • New open source science journal launched by Consumer Wellness Center: the Natural Science Journal

        A new science journal that focuses on food and environmental science has just been launched by the non-profit Consumer Wellness Center. Called the “Natural Science Journal,” the new peer-reviewed journal focuses on independent science pursued by laboratories and scientists who have no financial ties to pharmaceutical companies, agribusiness giants or government funding sources.

      • Open access should be the norm for EU by 2020, say research ministers

        EU research ministers have published a commitment to make “open access to scientific publications as the option by default by 2020.” The decision was taken during a meeting of the Competitiveness Council, which is made up of ministers from the EU’s member states. In addition, ministers agreed “to the best possible reuse of research data as a way to accelerate the transition towards an open science system.”

        The formal “conclusions” of the meeting define open access to publications as “free availability on the public Internet, permitting any users to read, download, copy, distribute, print, search, or link to the full texts of these articles, crawl them for indexing, pass them as data to software, or use them for any other lawful purpose, without financial, legal, or technical barriers.” This is taken from the key Budapest Open Access Initiative that helped to define open access back in 2002—an indication of how slow progress has been so far.

      • Harvard and MIT teamed up for this open-source online education platform

        It’s often said that the internet makes it possible for anyone to get educated on any subject. But just as in offline modes of education, the many models of online teaching and learning are far from perfect, with plenty of room for improvement and innovation.

    • Open Hardware/Modding

      • The story of Ultimaker: 3D printers with open source DNA

        For those who have been immersed in a capitalist society, open source thinking can seem counterintuitive. For the last three decades wealth has been determined through ownership and property rights. Businesses have been valued and financed based on the patents they own and the applications of their intellectual property. But open source, a term originating from software code being open for other developers to use, has started to change the prevailing capitalist mentality. Innovation is essential to their survival, and companies are seeing open source thinking, like sharing and collaborating, as a methods towards that goal.

  • Programming/Development

    • PHP 5.3 Through PHP 7.1-dev Tests Along With HHVM On Ubuntu 16.04

      With preparing for the upcoming release of Phoronix Test Suite 6.4-Hasvik I’ve been running through my validation tests on all supported versions of PHP going back to PHP 5.3 as well as HHVM. As part of that testing, I’ve been running my self-hosted tests of the major PHP release series once again up through PHP 7.1-dev. Here are those results if you are curious about some fresh PHP CLI benchmarks.

      The results in this article are of PHP 5.3 through PHP 7.0.7 and PHP 7.1-dev (as of this morning in php-src Git) plus Facebook’s HHVM PHP implementation via the Ubuntu 16.04 package repository. I also tested PHP 7.0.4 as currently packaged in Ubuntu 16.04 compared to my freshly built 5.3.29 / 5.4.45 / 5.5.36 / 5.6.22 / 7.0.7 / 7.1.0-dev that are basically stock builds with ensuring ZIP / XML / JSON / PCNTL support is enabled. (Basically, part of what I do for each quarterly Phoronix Test Suite release to ensure compatibility and a good out-of-the-box experience going back still to PHP 5.3.)

    • HPE targets DevOps and agile with new application lifecycle management software

      The platform makes use of common toolsets and frameworks, such as Jenkins, GIT, and Gherkin, while also providing insights to developers and application testers. This could potentially help enterprises deliver those applications more quickly, without having to cut corners in the vetting process.

    • US computer-science classes churn out cut-n-paste slackers – and yes, that’s a bad thing

      Computer science (CS) students in the US aren’t being taught properly, and their classes are too limited in scope, says one IT think-tank.

      The Information Technology and Innovation Foundation (ITIF) says that its most recent study [PDF] of curriculum in the US has found that not enough schools are offering computer science classes, and those that do aren’t going in-depth enough.

      As a result, the ITIF says, many universities are failing to produce the diverse, well-trained graduates that companies seek to hire.

      “There is the possibility that interest in the field could again wane like it did in 2003 following the burst of the tech bubble,” ITIF warns.

      “To maintain the field’s current momentum, the perception of computer science needs to shift from its being considered a fringe, elective offering or a skills-based course designed to teach basic computer literacy or coding alone.”

      The report found that at the high school level, dedicated computer science classes are mostly limited to affluent schools, and when the courses are taught, girls and minority students are rarely enrolled.

    • LLVM Looks At Moving From SVN To Git Via GitHub

      While there have been Git mirrors available of LLVM and its sub-projects (including Clang) for some time, this open-source compiler infrastructure project has relied upon SVN as its cental development repository. The LLVM project is now looking at finally transitioning to Git for development and quite likely utilizing GitHub for hosting.

      GitHub anyone? was spawned today on the LLVM developer mailing list about shifting their development practices from SVN to Git. In particular, utilizing GitHub for hosting and potentially using other GitHub services for managing bug reports, pull requests, etc.

    • “Stop Designing Languages. Write Libraries Instead.”

      I had a friend tell me recently that all programming languages seem very similar to each other. They all have variables, and arrays, a few loop constructs, functions, and some arithmetic constructs. Sure, some languages have fancier features like first-class functions or coroutines, but he doesn’t consider himself an expert programmer anyway and doesn’t use those features.

      What really makes a programming language productive for him, he says, are the libraries it comes with. For example, he got into programming by using the popular Ruby on Rails web framework. There is no way that he could have written a full database-driven web stack by himself, nor is he interested in doing so. But thanks to Ruby on Rails, he doesn’t have to! So he said that he has no particular opinion about the Ruby programming language, but he absolutely loves Rails. The vast majority of programmers are non-experts, like himself, and the largest gains in productivity for non-experts come from having a wide spectrum of easy-to-use libraries. Subtle language features like first-class functions, and object systems, are lost on them because they don’t really use them anyway. Computer scientists should really be spending their time developing new libraries rather than inventing new programming languages.

    • Open Source Is the Secret Sauce of DevOps
    • The Symbiotic Relationship of DevOps and Open Source

      DevOps depends heavily on open source software, and–to a lesser extent–open source projects leverage DevOps as well.

  • Standards/Consortia

    • European Commission Eyes Update Of EU Standards-Setting Policy

      As standardisation increasingly takes place at the global level, Europe needs a speedier, more streamlined way to set the technical specifications that define requirements for products, production processes, services and test methods, the European Commission said today. As part of its single market strategy, the EC announced plans for a joint initiative on standardisation (JIS), guidance to boost the development of European standards, and an annual reporting system among EU institutions on how the standardisation policy is working and contributing to competitiveness, jobs and growth.

    • HSA 1.1 Brings Multi-Vendor Support & More

      The HSA Foundation today announced version 1.1 of the Heterogeneous System Architecture.

      Heterogeneous System Architecture 1.1 most notably brings multi-vendor architecture support for allowing IP blocks from different vendors to “communicate, interoperate and collectively compose an HSA system.”

Leftovers

  • Brexit referendum folly

    The consequences of the Brexit referendum are bad for both Europe and Britain, regardless of the result.

  • Science

    • Organic Farmers Are Not Anti-Science but Genetic Engineers Often Are

      At one of the public brainstorming sessions for the New York Organic Action Plan, an organic farmer made an impassioned plea for support for “independent science” and told us that with 8.5 billion mouths to feed by 2050, we will need genetic engineering to prevent starvation.

      I would like to examine these words carefully to decipher what they mean, how those words are used by this farmer and by others, and suggest how the movement for locally grown organic food in this country should respond.

  • Microsoft

    • Windows 10 Surface Book: Microsoft Keeps ‘Sleep of Death’ bug

      It seems like Microsoft will not be fixing the ‘Sleep of Death’ bug, even though most of the Surface Book users face the problem.

      During the recent quarterly earnings report, Microsoft pointed out that the Surface line is getting popularity in the market. Microsoft also said that it has turned out to be the growth leader in its More Personal Computing line of business.

      At the event, the company said that the device has brought 61 percent growth.

    • How The World Of IT Has Turned

      Now Samsung is telling owners not to install “10” because drivers don’t work. Samsung should suggest Debian GNU/Linux instead.

  • Health/Nutrition

    • WHO-Led Study: Hepatitis C Treatment Unaffordable Globally, Threatens Health Systems

      According to a new study by experts at the World Health Organization, prices of hepatitis C treatments are unaffordable globally and put a major strain on national health systems. Hepatitis C can cause liver cirrhosis and cancer, and with an estimated 80 million people affected in the world, if untreated, the sickness could lead to 700,000 deaths per year worldwide, the study said, suggesting that governments and industry stakeholders should develop and implement fair pricing frameworks.

    • The Unique Risks of GM Crops: Science Trumps PR, Fraud and Smear Campaigns

      The purpose of this piece is to draw readers’ attention to an important chapter from a document by Aruna Rodrigues that discusses the unique risks associated with GM crops. Contrary to what supporters of GM often claim, it shows that criticisms of this technology are based on credible concerns, sound logic and solid science.

      However, some background information and context might first be useful to indicate that, while critics rely on science, the pro-GMO lobby is mired in duplicity and engages in the debasement of science.

    • New and Old Vaccines Still Out of Reach for Many

      While long-awaited new vaccines for malaria and dengue may finally be within reach, many of the world’s existing vaccines have remained unreachable for many of the people who need them most.

      The recent outbreak of yellow fever in Angola shows how deadly infectious diseases can return when gaps in vaccination programs grow.

    • Big Pharma Hobbling Federal Efforts to Rein In Dangerous Opioids

      Even as a new study suggests opioid painkillers may in fact make chronic pain worse, Big Pharma continues to work against efforts to stem the national opioid crisis, according to reporting at The Intercept on Tuesday.

      The study published Monday in the Proceedings of the National Academy of Sciences (PNAS) showed that addictive opioids like morphine appear to paradoxically cause an increase in chronic pain in lab rats.

      Led by Colorado University-Boulder professors Peter Grace and Linda Watkins, the study showed that “just a few days of morphine treatment caused chronic pain that went on for several months by exacerbating the release of pain signals from specific immune cells in the spinal cord,” according to a news release. The results suggest that the recent escalation of opioid prescriptions in humans may be a contributor to chronic pain, as Grace noted.

    • Big Pharma in the Crosshairs: Senator Seeks Fed Investigation of OxyContin Long-Term Pain Relief Claims

      A U.S. senator has called for a federal investigation of Purdue Pharma, the manufacturer of OxyContin, in the wake of reports that the money-making pain reliever wears off early in many patients, leaving them exposed to pain and increased risk of addiction.

    • ‘GMO Crops Are Tools of a Chemical Agriculture System’

      Anti-Monsanto rallies in 400 cities in 48 countries around the world failed to draw much US media attention, despite hundreds of thousands of people, from Dhaka to Paris to Cape Town, literally yelling out their opposition to the biotech giant’s products and practices, and the disturbing impact of their increasing control over the food supply.

    • Industry Influence Clouds New GMO Report

      New National Research Council study trumpets the safety of GMOs, but how much confidence can we have in these findings given the many conflicts of interest involved?

    • Nonprofit Hospital Stops Suing So Many Poor Patients: Will Others Follow?

      A story by ProPublica and NPR and a Senate investigation prompt a Missouri nonprofit hospital to change its policies and forgive thousands of patients’ debts. But without similar scrutiny, it’s unclear if other hospitals that sue the poor will change.

  • Security

    • Doing a ‘full scan’ of the Internet right now

      I’m scanning at only 125kpps from 4 source IP addresses, or roughly 30kpps from each source address. This is so that I’ll get below many thresholds for IDSs, which trigger when they see fast scans from a single address. The issue isn’t to avoid detection, but to avoid generating work for people who get unnecessarily paranoid about the noise they see in their IDS logs.

    • A Hacker Is Selling Dangerous Windows Exploit, Making All Versions Of OS Hackable

      A hacker is selling a dangerous zero day vulnerability on a Russian cybercrime website. This exploit is said to be affecting more than 1.5 billion Windows users as it works on all version of Windows. The hacker wishes to sell the complete source code and demo of the exploit to any person who pays him $90,000 in bitcoin.

    • Microsoft warns of self-propagating ransomware

      The new ransomware, which Microsoft has dubbed Ransom:Win32/ZCryptor.A, is distributed through spam emails. It can also infect a machine running Windows through a malware installer or fake installers like a Flash player setup file.

      The ransomware would run at boot and drop a file autorun.inf in removable drives, a zycrypt.lnk in the start-up folder and a copy of itself as {Drive}:\system.exe and %APPDATA%\zcrypt.exe.

      It would then change the file attributes to hide itself from the user in file explorer.

    • Allwinner Leaves Root Exploit in Linux Kernel, Putting ARM Devices at Risk

      Running a Bitcoin node on your ARM single board computer? Fan of cheap Chinese tablets and smartphones? Maybe you contributed to the recent CHIP computer Kickstarter, or host a wallet on one of these devices. Well, if any of these applies to you, and your device is powered by an Allwinner SoC, you should probably wipe it and put an OS on it with the most recent kernel release. Why? Allwinner left a development “tool” on their ARM Linux kernel that allows anyone to root their devices with a single command. This oversight has serious security implications for any Allwinner powered device, especially so for those of us hosting sensitive data on them.

    • 5 steps to reduce cyber vulnerabilities

      The National Vulnerability Database (NVD) — the U.S. government’s repository of standards-based vulnerability management data — says 2015 was another blockbuster year for security vulnerabilities with an average of 17 new vulnerabilities added per day.

      While IT managers can somewhat breathe a collective sigh of relief that the total number of vulnerabilities actually decreased from 7,937 in 2014 to 6,270 in 2015, there’s no time to relax. According to NVD data, 37 percent of vulnerabilities reported in 2015 were classified as highly severe, up from 24 percent in 2014.

    • How to Get an Open Source Security Badge from CII

      Everybody loves getting badges. Fitbit badges, Stack Overflow badges, Boy Scout merit badges, and even LEED certification are just a few examples that come to mind. A recent 538 article “Even psychologists love badges” publicized the value of a badge.

    • 4 Steps To Secure Serverless Applications

      Serverless applications remove a lot of the operational burdens from your team. No more managing operating systems or running low level infrastructure.

      This lets you and your team focus on building…and that’s a wonderful thing.

    • How the Top 5 PC Makers Open Your Laptop to Hackers [iophk: "Windows again"]
    • Google plans to replace smartphone passwords with trust scores [iophk: "if you have to travel unexpectedly, you'll probably get locked out."]

      Goodbye, Password1. Goodbye, 12345. You’ve been hearing about it for years but now it might really be happening: the password is almost dead.

      At Google’s I/O developer conference, Daniel Kaufman, head of Google’s advanced technology projects, announced that the company plans to phase out password access to its Android mobile platform in favour of a trust score by 2017. This would be based on a suite of identifiers: what Wi-Fi network and Bluetooth devices you’re connected to and your location, along with biometrics, including your typing speed, voice and face.

      The phone’s sensors will harvest this data continuously to keep a running tally on how much it trusts that the user is you. A low score will suffice for opening a gaming app. But a banking app will require more trust.

    • Security advisories for Wednesday
  • Defence/Aggression

    • Defeating the Islamic State will take more than gunpowder

      With the beginning of separate offensives against the Islamic State (IS) in Fallujah and Raqqa, many analysts are highlighting that this is the beginning of the end of IS, with Mosul next in sight. However, there is one key issue with this analysis; these offensives do nothing to address the structural failures in both Iraq and Syria that led to IS’ rise. Moreover, there is no valid plan for the governance of the people being ‘liberated’ from IS. Without addressing these issues, history will repeat itself and IS will either return or morph into another radicalised entity looking to represent marginalised Sunnis.

      The offensive in Fallujah happens as the prime minister of Iraq, Haider al-Abadi, is under pressure to show action against IS, due to scores of suicide bombs in Baghdad and his failure to implement reforms. The position of Abadi – and the central government of Iraq in general – optimises the chaos in Iraq, further highlighting the difficulty of implementing a successful post-IS solution.

    • The Only Way to Honor Veterans is to Stop Producing Them

      I also deplore focus on America’s war dead rather than the far, far greater numbers America has killed in our nearly continuous wars of choice. The aggregate death toll in Southeast Asia in the 1970s inflicted by direct, indirect and proxy US aggression and political destabilization in Vietnam, Cambodia and Indonesia was approximately 7,650,000. The US death toll was 58,220, a ratio in our favor of 132/1. In our gratuitously justified “War on Terror” in Iraq, Afghanistan and Pakistan, Physicians for Social Responsibility estimated 1.3 million Muslims killed while some 6,800 Americans have died, a ratio of 191/1. And that estimate excluded our destruction of Libya and ongoing proxy war on Syria with an American death toll limited to four in Benghazi and probably a few Special Forces “advisers” in Syria. Our victims deserve at least six to ten months of continuous memorial days to one day of ours, and our appropriate national mood should be not grief but remorse.

    • MSF Excoriates US, Russia, UK Over Complicity in Hospital Bombings

      On the heels of a World Health Organization report documenting pervasive—and often deliberate—attacks on medical facilities in conflicts, a humanitarian specialist with Doctors Without Borders is stressing that the world’s major powers are themselves complicit in such attacks.

      Speaking to the Guardian, Michiel Hofman directed his sharp criticism at four of the five permanent members of the UN Security Council—France, Russia, the United Kingdom, and the United States—which provide arms, intelligence, and logistical support to forces which have conducted these often deadly attacks.

    • Building Trust in Afghanistan

      Glancing upward at one of the six U.S. manufactured aerostat blimps performing constant surveillance over Kabul, I wonder if the expensively high-tech giant’s-eye view encourages a primitive notion that the best way to solve a problem here is to target a “bad guy” and then kill him. If the bad guys appear to be scurrying dots on the ground below, stomp them out.

    • What Happened to Netanyahu?

      Instead of the comfortable and pleasant partner, Netanyahu chose a devious bully who does not even bother to hide his deep contempt for him. Avigdor Lieberman does not hide his hopes to succeed Netanyahu at the first opportunity either. A partner who the entire world views as a dangerous man. Why? There is no explanation. No logical reason. To bring Lieberman into the government is a suicidal act. To hand the Defense Ministry to him is an insane act.

    • Libya: How to Bring Down a Nation

      French president Nicolas Sarkozy’s eagerness to support a military intervention with the purported aim of protecting the civilian population contrasts with the reception offered to the Libyan president, Muammar Gaddafi, when he visited Paris in December 2007 and signed major military agreements worth some 4.5 billion euros along with cooperation agreements for the development of nuclear energy for peacetime uses. The contracts that Libya seemed no longer willing to pursue focused on 14 Dassault Rafale multirole fighter jets and their armament (the same model that France sold or is trying to sold to Egypt´s General Abdel Fattah al-Sisi, the self-proclaimed marshal), 35 Eurocopter helicopters, six patrol boats, a hundred armored vehicles, and the overhaul of 17 Mirage F1 fighters sold by Dassault Aviation in the 1970s[2].

    • Turkey marks Constantinople ‘conquest’

      Turkey on Sunday marked the 563rd anniversary of the Ottoman conquest of Istanbul with huge parties and a fireworks show in the former Byzantine imperial capital once known as Constantinople.

      Around a million people were expected for a giant party in the city to mark its capture in 1453 by Ottoman Sultan Mehmet II, nicknamed “the Conqueror”.

      The Air Force aerobatics team was to perform a fly past prior to an evening fireworks display with Turkish President Recip Tayyip Erdogan and Prime Minister Binali Yıldırım due at the festivities in the Yenikapi district in the European half of the city.

    • 5 Things You See Notifying The Families Of Dead Soldiers

      In many military movies, the arrival of a green-clad soldier at a family home with a folded flag in hand often signifies both the fall of a hero and motivation for the rest of the characters. You don’t stop to think about the guy whose job it is to deliver the worst news possible to family after family. If you’re trying to find a candidate for Worst Fucking Job in the World, that definitely has to be in the top three.

      Those guys are known as Casualty Notification Officers, and we interviewed one who served during the Iraq War, when he unfortunately got plenty of on-the-job experience. He says …

    • Imperial Exceptionalism: a Cause Worthy of Defeat

      Rather than accept the onset of multipolarity demanded by the emergence of Russia and China as major strategic, military and/or economic powers, Washington and its proxies are determined to increase military, economic, and geopolitical pressure on both with the objective of returning them to their ‘rightful place’ in service to US hegemony.

    • Hillary’s Role in Honduran Coup Sunk US Relations With Latin America to a New Low

      When former Secretary of State Hillary Clinton sat down with the New York Daily News editorial board in April, she was asked what must have been a surprising and unwelcome question. In the years since the 2009 coup in Honduras, there has been remarkably little scrutiny in the major media of how Clinton’s State Department handled it, and she has had to answer few questions about it.

      But Juan González asked why she resisted cutting off aid to the coup regime and instead brokered a deal for new elections. Clinton controversially doubled down on defending the coup, outrageously suggesting that the oligarchs and generals who had forced President Manuel Zelaya out had a legal justification. Worse, she suggested that Honduras emulate Plan Colombia: the U.S.-funded war on drugs and guerrillas that sparked the biggest internal refugee crisis in the world outside of Syria, involved the deliberate killing of thousands of innocent civilians by Colombian armed forces, and fostered death squads now poised to stick around even as the country nears an end to its civil war.

    • The Ongoing Rape of Japan

      When President Obama went to Hiroshima, the American media focused on what he would – or wouldn’t – say about Harry Truman’s horrendous war crime against the Japanese people. Would he apologize? Leaving aside how one apologizes for such a monstrous act – short of committing seppuku – as it turned out he just spoke in harmless generalities about the dangers of nuclear weapons, expressing a commendable albeit vague wish to rid the world of them. What the pundits mostly ignored, however, was Japanese Prime Minister Shinzo Abe’s outrage at the latest murderous sex crime committed by an American soldier stationed on Okinawa; the brutal murder of 20-year-old Rina Shimabukuro by a US military contractor.

    • ISIL counter-attack in Fallujah: can Iraqi Forces maintain momentum?
    • Isis faces likely defeat in battles across Iraq and Syria – but what happens next?

      In the second of a four-part series examining Isis, Patrick Cockburn says the terror group may be under threat, but regaining the terrority it captured would not necessarily stabilise the region

    • At Least 4,164 People, Including Americans, Killed in Iraq During May

      During May, at least 4,164 people were killed and 2,396 were wounded in Iraq. These figures should be considered very low estimates. Heavy fighting at the Fallujah and Mosul frontlines prevents independent verification of any reports, but we do know there is heaving fighting going on. In April, 4,609 were killed and 1,772 were injured.

    • Turning Blind Eye to Brazilian Coup, OAS Targets Venezuela’s Maduro

      Secretary General invokes Democratic Charter at the behest of Venezuela’s right-wing opposition at the same time Brazil faces an overt crisis of democracy

    • Imperial Blues: On Whitewashing Dictatorship in the 21st Century

      Hillary Clinton’s support for the “Promesa” bill should not be at all surprising. Clinton has time and again trampled on Puerto Rico. The Democratic Party’s Clintonista wing’s preferred scare-tactic revolves around a Donald Trump presidency, but Trump is a symptom of current political indolence, the product of McCarthyism, the Red Scare, and Fox News. Clinton is a vector of transmission of this disease. She is against the release of our political prisoner, Oscar López Rivera. She represents the most reactionary conservative elements of her party and is inexcusably tied to the neoliberal agenda of Wall Street. Is it at all surprising that she would support a bill that seeks to impose a neocolonial Congressional dictatorship on Puerto Rico?

    • Preparing for the Next Memorial Day

      Memorial Day weekend was replete with parades, American flags, and tributes to our war dead, but little reflection on war, particularly the tragic fact that the United States has fallen into the death trap that President Eisenhower warned us about: the military-industrial complex.

      Instead of defending our nation as the Constitution stipulates, since the 9/11 attacks the U.S. military, CIA, and military contractors have been waging aggressive wars or interfering by proxy in other nations’ internal affairs.

    • Senate Looks To Cut Defense Spending By Taking Money Out Of Troops’ Pockets

      The Senate Armed Services Committee wants to save money by cutting back on housing benefits for armed service members, potentially costing individual military members hundreds of dollars a month.

      Currently, armed service members who live off-base in the United States receive a flat-rate stipend called the Basic Allowance for Housing (BAH), which is calculated based on their family status, rank, and cost of living by zip code. If they find housing for less than the allotted benefit or live with a working spouse or roommate, how they use the extra money is up to them.

    • Don’t Trip on Those Milestones Strewn Across America’s Wars

      Barack Obama called the drone assassination on May 21 of Mullah Akhtar Muhammad Mansour, the leader of the Afghan Taliban, “an important milestone.”

      It might turn out to be. But I doubt it. My advice is every time you hear an American official use the term “milestone,” run the other way.

      For example, back in September 2014 Secretary of State John Kerry claimed the formation of a new Iraqi government then was “a major milestone” for the country. But on the same day that Obama was proclaiming his own milestone, protesters stormed the Green Zone in Baghdad seeking the end of that previous milestone government.

    • Trump Threatens Neocon Policies
    • Pentagon: Special Ops Killing of Pregnant Afghan Women Was “Appropriate” Use of Force

      An internal Defense Department investigation into one of the most notorious night raids conducted by special operations forces in Afghanistan — in which seven civilians were killed, including two pregnant women — determined that all the U.S. soldiers involved had followed the rules of engagement. As a result, the soldiers faced no disciplinary measures, according to hundreds of pages of Defense Department documents obtained by The Intercept through the Freedom of Information Act. In the aftermath of the raid, Adm. William McRaven, at the time the commander of the elite Joint Special Operations Command, took responsibility for the operation. The documents made no unredacted mention of JSOC.

    • How Teenagers Got Police to Back Down and Remove Military-Grade Weaponry From Their High Schools

      Los Angeles high school students and organizers forced police to remove grenade launchers and M-16s from their arsenals.

    • Part 2: In Wake of Coup, Should Brazil’s Olympics Be Moved or Become a Site of Protest?

      We continue our conversation with Dave Zirin, author of the book “Brazil’s Dance with the Devil: The World Cup, the Olympics, and the Fight for Democracy,” and Jules Boykoff, author of “Power Games: A Political History of the Olympics.” In early August, more than 10,000 athletes across the world will convene in Rio de Janeiro’s Olympic City for one of the most widely watched sporting events of the year. This comes as Brazil is battling an economic recession, a massive Zika outbreak and its worst political crisis in over two decades.

    • A US Hand in Brazil’s Coup?

      The ouster of Brazil’s left-of-center president was the latest right-wing victory in Latin America, but was this “quiet coup” driven by local politics or part of a broader U.S. strategy to reclaim dominance over its “backyard,” asks Ted Snider.

    • Inside the Perilous Journey Out of Syria

      Matthew Cassel has reported on the Middle East for over a decade, including a five-year stint covering the Arab world for Al Jazeera. Living and working in Istanbul, he saw the rising tide of refugees making their way to Europe in 2014. But as he noted in an interview with Field Notes, traditional news outlets were slow to recognize the gravity of the crisis. While coverage existed, media attention didn’t intensify “until Alan Kurdi, who was the young poor kid from Kobaní, inside Syria, washed up on the shore in Turkey — if you remember that iconic image from September of 2015,” he said. “But there were people who were dying, people who were struggling to get to Europe before that.”

  • Transparency/Investigative Reporting

    • Waiting for California and the FBI

      Some Democratic leaders are privately scouting around for someone to replace Hillary Clinton if she stumbles again in California and/or the FBI detects a crime in her email scandal, reports Robert Parry.

    • Emailgate: the Clinton Spin Doctors In Action

      The IG report does not make pretty reading for the avid Clintonite. It dismisses a core claim that using government servers was not standard practice during her tenure, pointing to departmental protocols dating back to 2005.

    • Just How Unprofessional IS the Trump Campaign – When Hillary In Trouble, Trump Hogs Limelight?

      So we get to see some remarkable insights into the two campaigns. (obviously this is again a blog article about the US election, not about digital/mobile/tech). Hillary had her worst days this year, from the middle of last week when the Inspector General of the State Department found she had broken rules about emails and was at fault. For a pro campaign and very seasoned veteran politician, Hillary’s campaign had a disastrous moment (every campaign has some of those) and it was clearly her worst moment of the year so far (don’t fall for any of the Bernie ‘moments’ her victory was never in doubt so they were never that bad for her). And like a pro in a pro campaign, she went immediately onto the talk shows, put out as much of the fires as possible, then went to lay down low, riding out the rest of the news cycle. Her best hope is for other news stories to overtake this bad news email story, and that it won’t grow to be any bigger than it now is.

  • Environment/Energy/Wildlife/Nature

    • Cleaning up mercury a must in Grassy Narrows

      The federal and provincial governments cleaning up the Wabigoon River will show a new era has dawned in our relationship with indigenous peoples

    • Passing Ban, Scottish Parliament Declares: ‘No Ifs, No Buts, No Fracking’
    • Federal Agencies Find That Fracking In The Pacific Would Have No ‘Significant’ Environmental Impacts

      A Center for Biological Diversity investigation into chemicals used in California’s offshore fracking operations found that at least 10 of the chemicals routinely used in fracking could be lethal to marine animals. Some of the chemicals have also been shown to break down into nonylphenol, a toxic substance that can lead to intersex fish species and bioaccumulate in animals further up the food chain, like in already-threatened sea otters.

    • Amazon Tribes Resist US Anthropologists’ Attempt to Forcibly Contact the Uncontacted

      Fighting back against the notion, put forth by American academics, that isolated tribes must be forced into contact with the modern world, Amazonian Indians are warning of another potential Indigenous “genocide” if such ideas come to pass.

      U.S. anthropologists Kim Hill, a professor at Arizona State University, and University of Missouri associate professor Robert Walker, have argued that in order to ensure the survival of the most remote tribal people they must be “contacted in a controlled way.”

    • North America Failing Dismally on Ocean Protection, Groups Warn

      North America is falling woefully behind on public promises to protect surrounding oceans from fishing, oil and gas development, and other harmful human activities—and those promises are paltry, found a joint report from Canadian and American conservation groups.

      The cooperative venture from the Marine Conservation Institute (MCI) and Canadian Parks and Wilderness Society (CPAWS) discovered that while Canada, Mexico, and the U.S. have promised to protect 10 percent of the continental ocean estate—”defined as the territorial sea plus exclusive economic zone, which together extend 200 nmi from each country’s shoreline”—by 2020, currently only .89 percent is protected.

    • EU never used power to scrutinise emissions labs

      The European Commission wants new powers to oversee the way new cars are approved before they are sold, but it has never used a key scrutinising power it has had for more than eight years, the EUobserver has learned.

      Under current rules, the commission can ask a member state to submit assessments of the test facilities that carry out certification tasks including emissions testing.

    • All the World’s a Stage: Thoughts on the Death of Harambe, the Cincinnati Zoo Gorilla

      As I write, the zoo’s Gorilla World page still shows a bio of Harambe, along with the bios of several remaining gorillas. They, captive and unable to safely return to their lands, should not be exhibited, but should instead be offered private refuge. No captive breeding. No public viewing or cognitive research.

    • Dear Internet Experts on Gorillas and Parenting: Save Your Outrage—There’s No ‘Justice for Harambe’
    • A Zoo Story: From Harambe to Human Bondage

      Every so often, our society — which proves daily how little it values animal life — erupts in an uproar about the tragic death of an individual animal. Whether it’s a case of lethal cruelty to a domestic animal, the high-profile shooting of a majestic lion, or more recently, the shooting of a gorilla named Harambe at the Cincinnati Zoo, public outrage typically isolates a human target and flares until a particular hashtag has exhausted itself on Twitter.

    • 2015 Saw Renewable Energy Boom, Led by Developing Nations

      Renewable energy boomed in 2015, a year that saw fossil fuel prices plummet and ended with a historic climate agreement hammered out in Paris.

      In fact, investments in renewables such as wind and solar were more than double the amount spent on new coal and gas-fired power plants in 2015, according to the Renewables Global Status Report (pdf) from REN21, an international non-profit association based at the United Nations Environment Programme in Paris, France.

      An estimated 147 gigawatts (GW) of renewable power capacity was added in 2015—the largest annual increase ever—while renewable heat capacity and biofuels production also increased. Indeed, the world now adds more renewable power capacity annually than it adds (net) capacity from all fossil fuels combined, the report states. Furthermore, employment in the renewable energy sector rose in 2015 to an estimated 8.1 million direct and indirect jobs.

    • Dam backup plan for glacier ice loss

      Summer water shortages caused by the reduction of glacier ice mass could be alleviated by dams being constructed to contain springtime runoff from melting snow.

    • Here’s What Actual Climate Scientists Think Of Trump’s New Energy Plan

      If Donald Trump is elected president, America’s approach to energy and the environment will be drastically different than it is today.

      Trump made that clear last week, when he laid out his full energy policy proposal for the first time in Bismarck, North Dakota. In that speech, Trump said he would roll back president Obama’s climate change regulations, build the Keystone XL pipeline, and “cancel” the landmark Paris climate agreement. In a nutshell, Trump promised to undo almost every major policy developed in the last decade intended to slow human-caused global warming.

      What Trump did not do in his speech, however, was mention the words “climate change.” He did not say whether he believed the phenomenon was occurring, and he didn’t speculate on how his policies would solve or worsen the problem.

    • The Nuts And Bolts Behind How The World Will Deploy A Massive Amount of Clean Energy

      Energy ministers from 23 countries and the European Commission, representing 75 percent of global greenhouse gas emissions and 90 percent of worldwide renewable power investments, will convene June 1-2 in San Francisco to encourage a new drive toward clean energy deployment, and further hasten the growing movement away from coal to the increasing use of green power.

    • Job Losses Expected As Maryland Governor Stuns Solar Industry With Clean Energy Veto

      For the past 12 years, Maryland has had a highly successful program requiring utilities to use more renewable energy. Republican Gov. Larry Hogan’s own Dept. of Environment last fall said the renewable portfolio standard (RPS) was creating thousands of jobs and would create billions in economic activity by 2020. In April, the governor signaled his own commitment to clean energy, signing the Greenhouse Gas Emissions Reduction Act.

    • Climate activists and blacklisted workers face the same struggle against surveillance

      The climate movement and trades union movement need to come together to stop repressive corporate/state spying.

    • An American Fukushima May Be Closer Than You Think

      The 2011 Fukushima Daiichi nuclear disaster was horrific to watch unfold. It will take decades — and billions of dollars — to clean up, as more problems seem to emerge by the minute.

      Most recently, Tepco announced that it’s still missing a large amount of spent fuel — in part because radiation remains so high that robots and other devices cannot function inside the plant to give workers a better picture of what’s going on.

    • Justice For the Gorilla, And Never Mind the Humans

      We mourn the loss last weekend of Harambe, the 17-year-old Western lowland silverback gorilla killed while either entertaining and/or threatening a four-year-old who somehow slipped away from his mother and fell into the gorilla’s enclosure at the Cincinnati Zoo as onlookers screamed, which likely didn’t help. Zoo officials, determining a tranquilizer gun might further agitate Harambe and endanger the boy, made the controversial and difficult decision to shoot Harambe. Defending the move, Zoo director Thane Maynard declared it “a sad day all the way around,” but insisted, “The right choice was made.”

      Hah, said a furious, sanctimonious, all-knowing and – once it was determined the family was black – racist Internet mob of animal lovers, mom shamers, dad blamers, parenting and/or gorilla experts, and thousands more with axes to grind. Quick as you can say “Get a life,” the outrage had fueled “Prayers for Harambe” and “Justice For Harambe” Facebook pages (130,000 likes) to “raise awareness of Harambe’s murder,” a petition (400,000 names) urging city officials to investigate the child’s “home environment,” another petition (140,000) calling for passage of a new Harambe’s Law to punish anyone harming or killing an animal, a charge by PETA that “Harambe paid with his life for others’ negligence,” a memorial, a protest, a call for a boycott, and a hit piece on the child’s father, who wasn’t even there but it turns out had a criminal history before turning his life around.

    • Did Donald Trump Deny The California Drought Because He’s Lost Touch With Reality?

      Many credible sources have said that Donald Trump has lost touch with reality. Even so, I won’t say it.

      We all have a responsibility to be judicious with words — as Trump himself explained in January, “I was going to say ‘dummy’ Bush; I won’t say it.”

      Yes, it’s true that an actual headline Friday from CBS in Sacramento was, “Donald Trump Tells California ‘There Is No Drought’ As Drought Continues.” And yes, it’s true that scientists report that 86 percent of California is still in a “moderate drought,” 61 percent in a “severe drought,” 43 percent in an “extreme drought,” and over one-fifth of the state (21 percent) is in an “exceptional drought.”

    • Celebrate the Ocean

      Join us as we celebrate and learn about our world ocean during National Ocean Month.

  • Finance

    • Trump Has a $100 Million Conflict of Interest

      This candidacy brought to you by Deutsche Bank.

    • Guess Which Presidential Candidate Top CEOs Prefer? Hint: It’s Not Trump.

      A majority of chief executives of the world’s biggest companies say they would support Hillary Clinton over Donald Trump for president, according to a new survey that upends the usual Republican leanings of corporate CEOs.

      Fortune magazine in May sent a poll to all of the executives on its 500 list asking them to rank their preference between the two candidates. (No other options were given.)

      Of those who responded, 58 percent said they would choose Clinton, while 42 percent said they favored Trump.

    • The Big Banks Can Be Beaten

      Working families are turning their anger at Wall Street into action.

    • ‘We need to be in the EU in order to beat TTIP’
    • Authoritarian Britain is made freer by the EU

      The idea that the EU undermines English liberty is nonsense: it has helped curtail the British state’s repressive surveillance.

    • It’s not just Brexit — Greece, Spain, France are also on the brink

      Last week, a research wing of the International Monetary Fund (IMF) came out with a report admitting that neoliberalism has been a failure. The report, entitled “Neoliberalism: Oversold?” is hopefully a sign of the ideology’s death. They were only about 40 years late. As Naomi Klein tweeted about the report, “So all the billionaires it created are going to give back their money, right?”

    • Our Poverty Myth

      The illusion that people are to blame for their own poverty goes back centuries in our culture.

    • University of Helsinki to introduce tuition fees of €13,000–18,000 for non-EU/EEA students

      The University of Helsinki has announced its decision to impose tuition fees of 13,000–18,000 euros on its postgraduate degree students from outside the European Union and the European Economic Area (EEA).

    • Once Homeless Student Who Worked 4 Jobs To Support Family Graduates College

      After persevering through trying times, one college student wore her cap and gown with pride.

      Bianca Jeannot, a 22-year-old who attended the College of New Rochelle in New York, has been through a lot. She has experienced homelessness and also had to work multiple jobs to support and care for her brothers while attending college, ABC News reported.

      Recently, the student saw her hard work come to fruition as she graduated from the school with honors, WABC reported.

    • Cuts blamed as London fire deaths rise by 20 per cent

      Fire deaths across the capital have gone up by 20 per cent in the last year, according to figures released by the London Fire Brigade (LFB).

      A total of 36 people died from fires in London in 2015/16, compared with 30 in the previous year.

    • ‘Employers Have an Incentive to Work People Long Hours’

      It’s no secret that those Americans who are working are working more hours for less pay than in decades–and suffering for it. And while it’s true wealthy people may be finding new clandestine ways to tuck money away, some of the core causes of working people’s problems are more out in the open, in the demonstrable erosion of worker wage protections.

      This, our next guest’s group says, is a fixable problem. And one step in that direction came recently with the Labor Department’s issuance of a new rule raising the salary threshold below which salaried workers are automatically eligible for overtime pay.

      Here to talk about the overtime rule, the pushback against it and where it fits in broader efforts to fight inequality is Ross Eisenbrey. He’s vice president of the Economic Policy Institute. He joins us now by phone from Washington, DC. Welcome to CounterSpin, Ross Eisenbrey.

    • A Legal System That Supports Businessmen
    • ‘Days of Revolt’: Chris Hedges, Lynne Stewart and Ralph Poynter on the Evolution of Radicalism

      In this week’s episode of teleSUR’s “Days of Revolt,” Truthdig contributor Chris Hedges sits down with guests Lynne Stewart and Ralph Poynter, both veterans of the 1960s civil rights movement. Stewart, a former civil rights attorney, and Poynter, a human rights activist and Stewart’s husband, have a long history of community organizing.

      The two met while working at a school in Harlem in the early 1960s—she as a librarian and he as a teacher. Hedges interviews them about their role in the civil rights and anti-war movements, before moving on to ask them whether our society has lost the political consciousness it had in the 60s and 70s.

    • OECD is Latest Economic Bigwig to Question Austerity’s “Loop of Doom”

      Less than a week after the International Monetary Fund (IMF) expressed reservations about neoliberal policies like austerity, the Organization for Economic Co-operation and Development (OECD) is urging governments to increase spending in order to “make good on promises to current and future generations.”

      Not doing so, OECD chief economist Catherine Mann told Reuters, deprives youths of job opportunities and means the elderly will not get the healthcare and pension benefits they expect. “We are breaking promises to young people and old people,” she said.

      In its twice-yearly Global Economic Outlook, the 24-nation body said the world is stuck in a “low-growth trap” that will only get worse under status quo policies like quantitative easing.

      Indeed, the OECD said “almost all countries have room to reallocate spending and taxation towards items that offer more support to growth” like investments in infrastucture as well as education.

    • After Empowering the 1% and Impoverishing Millions, IMF Admits Neoliberalism a Failure

      Last week a research wing of the International Monetary Fund came out with a report admitting that neoliberalism has been a failure. The report, entitled, “Neoliberalism: Oversold?” is hopefully a sign of the ideology’s death. They were only about 40 years late. As Naomi Klein tweeted about the report, “So all the billionaires it created are going to give back their money, right?”

      Many of the report’s findings which strike to the core of the ideology echo what critics and victims of neoliberalism have been saying for decades.

      “Instead of delivering growth,” the report explains that neoliberal policies of austerity and lowered regulation for capital movement have in fact “increased inequality.” This inequality “might itself undercut growth…” As a result, the report states that “policymakers should be more open to redistribution than they are.”

    • Va. Gov. Terry McAuliffe Took $120K From a Chinese Billionaire—But the Crime Is That It Was Legal

      When news broke that Virginia Governor Terry McAuliffe was under investigation by the Justice Department and that his campaign had taken $120,000 directly from a Chinese-owned business, it may have seemed liked an open-and-shut case.

      But federal law doesn’t preclude foreign-owned businesses from making political donations, and Virginia law doesn’t limit their size. So amazingly enough, if there was something illegal here, that wasn’t it.

    • Wednesday’s papers: Plan to scrap health centres, police speed camera claims challenged, and what to do with a six-minute longer workday?

      Negotiations over a plan to lengthen the working day by six minutes – as well as cut holiday benefits and freeze pay net year – are wavering at the last hurdle, but there’s still chance of a deal this week, the papers report. Elsewhere, there’s a proposal to replace Finland’s health centres with bigger clinics offering more under one roof, and police claims that speed cameras have made a Helsinki highway safer come under scrutiny.

    • Walmart, Gap, H&M Called Out for Global Worker Exploitation and Abuse

      Some of the world’s biggest retailers, including Walmart, Gap, and H&M, have failed to improve workplace safety three years after the Rana Plaza factory collapse in Bangladesh killed more than 1,100 people and turned a spotlight on dangerous labor conditions faced by some of the world’s poorest workers.

      A series of new reports released Tuesday by the Asia Floor Wage Alliance, a coalition of rights groups and trade unions, finds that tens of thousands of laborers in Bangladesh are still making garments in buildings without proper fire exits, while pregnant workers in Indonesia and India face discrimination and wage theft.

    • Why the Verizon Worker’s Victory is A Big Deal

      On Friday, May 27, the six-and-a-half-week Verizon strike came to an end with a tentative contract agreement.

      The Communications Workers of America and International Brotherhood of Electrical Workers, the unions that represent the Verizon workers, hailed the contract as a victory, citing its creation of 1300 new call center jobs along the East Coast, first-ever contracts for Verizon wireless store employees in Brooklyn and Everett, Massachusetts, and raises of nearly 11 percent over the life of the contract. The workers beat back demands from the company to cut pensions, transfer workers out of state for up to two months, and proposed cuts in disability and accident benefits.

    • France’s Nuit Debout Movement’s White, Middle Class Problem

      When the Nuit Debout youth movement erupted in Paris to protest the most significant reform to the country’s labor code in decades, it made headlines both nationally and globally as it was immediately compared to other upsrisings such as Spain’s Indignados and Occupy Wall Street. However, as the movement occupying Paris’ Republic Square approaches its two-month anniversary on Tuesday, it is still struggling to evolve into a more diverse and inclusive movement, as activists say it must do more to involve France’s marginalized communities, especially from the suburbs, who have been struggling against unemployment, police violence and state racism for decades.

    • Treasury’s New So-Called Transparency about Saudi-Held US Debt

      More likely, the vehicle of exchange and secrecy set up in 1974 were renewed when the US and Saudis signed the similar Technical Cooperation Agreement in 2008, which got extended in 2013 until 2023. Which would suggest Treasury has a reason to show us the old-style debt holdings, but not whatever they have going on now.So in the interest of “transparency” (that is, in the interest of avoiding any panic as the Saudis threaten to dump US debt if we start releasing information the Kingdom’s role in sowing terrorism) Treasury has revealed the old-style arrangement, but not whatever is the core of what we’ve got going on now.

      In other words, what Treasury’s so-called transparency actually tells us is the larger part of Saudi holdings (they threatened to dump $750 billion in US debt) are stashed somewhere even more secret than the original holdings. And they likely rolled out that even-more-secret stash in 2008, long after we knew they were sponsoring terrorism around the world.

  • AstroTurf/Lobbying/Politics

    • Common Sense on the Democratic Presidential Race

      Clinton surrogates and operatives are pounding on Bernie Sanders to get out of the race, claiming they want to unify the party even as they excoriate Sanders and scorn his supporters. Perhaps it is time for a little common sense about the campaign.

    • How the Internet Is Empowering the Grass Roots and Transforming Democracy

      In the next week alone—the last before the June 7 primary in California—Sanders supporters in Los Angeles will host nearly 200 small-scale events in homes, businesses, and public parks from Burbank to Compton.

    • Write-In Voting and Political Protest

      With the increasingly likelihood of a presidential contest between the generally despised Hillary Clinton and Donald Trump, millions of angry voters are considering protesting the lineup by either sitting out the election or writing in alternatives. With almost one-third of all eligible voters already failing to participate in elections, a greater abdication of voting responsibility in an election between the lesser of two evils could lead to a tyranny of the minority. On the other hand, by carefully writing in the names of their true choices, voters can exercise the only power available to them. If sufficiently widespread, such a protest could have a lasting effect on the course of the Nation, including the abandonment of the two major political parties and the emergence of new—more relevant—alignments.

    • Thanks for the Memories, Stephen Harper

      As former PM Stephen Harper quits parliament, his legacy is more of a gift to Conservatives than to Canadians.

      There’s no question that Stephen Harper, Canada’s former prime minister, will be leaving a legacy when he quits parliament this summer.

      A political mastermind, he united the country’s fractious right in 2003 when his Conservative Party of Canada (CPC) was born. In 2006, he led it to the first of its three successive electoral victories. Canada was his for nine years – at least until Justin Trudeau’s Liberals trounced his government last October.

      The party is still holding together seven months after he stepped down from the party leadership. Canadians are united as well – in celebrating his departure.

      So Harper’s legacy is more of a gift to Conservatives than to Canadians.

    • DNC Chair Wasserman Schultz Faces Criticism for Bias & Opening Up DNC to Lobbyists

      As the Democratic National Convention approaches, some Democrats are considering pressuring DNC Chairwoman Debbie Wasserman Schultz to step down. Democratic presidential candidate Bernie Sanders has long accused Wasserman Schultz of being biased toward Hillary Clinton. Wasserman Schultz has also quietly repealed ethics rules implemented in 2008 by President Obama preventing federal lobbyists from donating to the DNC. The opposition from Capitol Hill Democrats comes as Wasserman Schultz is also in a tight race against progressive challenger Tim Canova for her own congressional seat in Florida. In an unusual move, Sanders has backed Canova. For more, we’re joined by Lee Fang, investigative reporter for The Intercept.

    • It’s Not Just the Speeches: Hillary Clinton Questioned over Son-in-Law’s Ties to Goldman Sachs

      The California primary is just over one week away, and Democratic presidential candidate Hillary Clinton and Bernie Sanders are in a dead heat. Hillary Clinton has changed this week’s campaign schedule to add more California stops in order to try to reverse Sanders’ growing momentum. Yet multiple issues have continued to dog Clinton’s campaign, including the question of her connection to Goldman Sachs. The Wall Street giant paid Clinton $675,000 in 2013 to give three speeches. And now new questions are being raised about the ties between Goldman Sachs and Hillary’s son-in-law, Marc Mezvinsky. Mezvinsky worked at Goldman for eight years and then formed a hedge fund in part with help from Goldman CEO Lloyd Blankfein. For more, we’re joined by Intercept investigative reporter Lee Fang. His recent piece is headlined “Hillary Clinton Won’t Say How Much Goldman Sachs CEO Invested with Her Son-in-Law.”

    • Hillary Clinton’s Memoir Deletions, in Detail

      As was reported following the assassination of prominent Honduran environmental activist Berta Cáceres in March, former Secretary of State Hillary Clinton erased all references to the 2009 coup in Honduras in the paperback edition of her memoirs, “Hard Choices.” Her three-page account of the coup in the original hardcover edition, where she admitted to having sanctioned it, was one of several lengthy sections cut from the paperback, published in April 2015 shortly after she had launched her presidential campaign.

      A short, inconspicuous statement on the copyright page is the only indication that “a limited number of sections” — amounting to roughly 96 pages — had been cut “to accommodate a shorter length for this edition.” Many of the abridgements consist of narrative and description and are largely trivial, but there are a number of sections that were deleted from the original that also deserve attention.

    • Trump: A Fool and a Fraud

      As Trump showed the world, it is relatively easy to run for president if you are willing to say or do anything to get attention and you believe in nothing except your own self-inflated myth. His reality-television-style campaign overwhelmed a badly fractured Republican Party. But the act is getting harder to pull off because now his words, often chosen for their shock value, have real consequences.

    • Trump University Documents Expose Presumptive Con-Man-in-Chief
    • Trump Self-destructing

      He’s also had a feud with the judge of Art Cohen v. Donald J. Trump, about Trump University fraud. He criticized the judge publicly, accusing him of being “Mexican” etc. Rather than finding Trump in contempt, the judge just decided to release Trump’s “playbooks”, recipes for roping in “students”, actually high-pressure sales tactics. It seems rather than teaching dealing in real estate, TU was applying such tactics to students and not delivering much of value, certainly not hand-picked-by-Trump instructors. The “playbooks” also showed an intense interest in the wealth of students rather than their aptitude for success…

    • Inside the Trump University ‘playbooks’

      And some of the material offers a potential counterweight to claims that Trump University’s aim was just to sell someone on the highest-priced course. For example, the 2007 sales playbook tells staffers, “you are here to meet the needs of your client, not to push product.” And the 2010 version advises that one should “sell for a relationship, not a commission.”

    • Opportunist Trump Meets Fanatical NRA

      By accepting the NRA’s presidential endorsement, Donald Trump bought into the gun lobby’s paranoid view of government and its distorted interpretation of the Second Amendment, writes Lawrence Davidson.

    • 4 Shady Business Practices That Trump University Used To Target Students

      Documents detailing exactly how Trump University convinced students to enroll in its real estate classes were made public on Tuesday after a federal court ordered their release.

      The business, which began operating in 2005 and is now defunct, was actually never an accredited university. Instead, students paid thousands of dollars for advice from professors whom they believed were handpicked by Trump. In reality, the professors were not chosen by Trump, something the real estate mogul has admitted in depositions.

    • WATCH: A retired veteran tells CNN how Trump University scammed him out of $26,000

      We’re going to be hearing a lot more about Trump University in the coming days, especially after a judge whom Trump had bashed for being a “Mexican” recently ordered the release of several internal Trump U. documents that will be out by the end of the week. CNN spent some time talking with some former Trump University students who described how the “university” took $26,000 of his money and gave him almost nothing in return.

    • Another Kind of Warrior—Bernie Sanders—Fires Up the Golden State Faithful

      There was a palpable thrill in the air as some 20,000 supporters stood in lines that stretched for blocks to hear Bernie Sanders speak Monday in Oakland, Calif. Hundreds of supporters were turned away in the name of security at the event, which marked one of Sanders’ campaign stops before the state’s crucial primary election on June 7.

    • [Column] Donald Trump: Joker’s Wild

      Since Trump has never been a politician – and presents himself as an anti-politician — his campaign has been nothing but a series of gestures. To have a platform and well thought-out positions would bring him too much into the realm of real politics. Trump rolls out proposals – building a wall in the southwest and getting Mexico to pay for it, banning all Muslim immigrants, bringing back waterboarding – as a network executive might introduce a new season of TV shows. They’re meant to generate headlines, capture attention, and create a loyal following. They’re not meant to add up to anything larger.

    • Ahead of Election, Native Americans Rise Up Against Repressive Voting Laws

      Refusing to be silenced by restrictive new voting laws, Native Americans across the western U.S. are taking their fight to the courts, arguing that tribal communities have become even further disenfranchised by rules passed in the wake of the Supreme Court’s landmark voting rights ruling.

      An in-depth report published by Reuters on Tuesday highlights revisions to a North Dakota law that “eliminated a provision that had allowed people without proper identification…to vote if they were recognized by a poll worker or if they signed an affidavit swearing to their identity.”

    • Stoking the Fires: Trump and His Legions

      Looking back at the 1932 U.S. presidential election is instructive. Herbert Hoover, the Republican incumbent, bore the blame for the Great Depression. It had happened on his watch. Armies of the unemployed moved into shantytowns, which they named Hoovervilles. Hoover’s main Democratic opponent, Franklin D. Roosevelt, came from establishment stock. Roosevelt’s main plank was to shrink the government and expand U.S. trade with the world. These were policy positions much favored by the elite. During the election, there was little sign that Roosevelt would expand the U.S. government and use state spending to enhance economic activity. The tone of the campaign was ugly, with Hoover calling Roosevelt (correctly as it turned out) a “chameleon in plaid” and Roosevelt responding that Hoover was a “fat, timid capon” (a capon being a rooster). Hoover felt that Roosevelt was “very badly informed and of comparably little vision”. Roosevelt was elected to three consecutive terms. He died in office.

    • Trump, Sanders and the Exhaustion of a Political Model

      Bernie Sanders, in a way, is the perfect opposite of Trump and both embody the exhaustion of the American people.

    • Cenk Uygur Warns Mainstream Media: Don’t Underestimate Impact of Libertarian Candidate

      44 percent of voters want a third-party option come November.

    • Troubles of Anti-Trump/Clinton Write-ins

      Distraught over the likely choice of Trump or Clinton, many Americans are thinking about third parties or write-ins, but the process is harder than one might expect, like much else about the U.S. electoral system, notes William John Cox.

      [...]

      Under state laws, political parties must “qualify” for their candidates to be listed on the ballots and counted. The two major parties are qualified in every state, but the Libertarian Party candidates will appear on the ballots in only 33 states, the Green Party in 21, and the Constitution Party in 13.

    • Clinton, media still counting superdelegates despite DNC pleas

      On April 28, Luis Miranda, communications director for the Democratic National Committee, did an interview with CNN’s Jake Tapper to formally clarify the official position of the Democratic Party on when superdelegates are, and are not, supposed to actually count in public vote tallies.

      What he said shocked the hell out of me and should shock the hell out of you — in part because not a single media outlet or the Hillary Clinton campaign has paid one bit of attention to it before or since. Since election season began, networks, newspapers and pundits have included superdelegates in their tallies, but the DNC emphatically said that was wrong over a month ago.

    • Trump Rejects Hitler Comparison But Has A Few Alternatives

      On MSNBC and in the New York Times, he’s been likened to segregationist George Wallace. Louis CK and Glenn Beck have compared him to Adolf Hitler.

    • Bernie Sanders Fights On: The Rolling Stone Interview

      Even at this late date, with the threat of a Donald Trump presidency looming, Sanders pulls no punches against Hillary Clinton. His stump speech links her to a “rigged economy” – highlighting “hundreds of thousands of dollars” in contributions to the Clinton campaign by a member of the Walton family, whose Wal-Mart fortune, Sanders says, is richer than the combined wealth of the “bottom 40 percent” of the American people. Transforming jeers into cheers, Sanders demands of the billionaire clan, “Instead of making large campaign contributions to Secretary Clinton, pay your workers a living wage!”

    • Make Presidential Race About Issues, Not a Spitball Fight

      Donald Trump has now won the delegates needed to give him the Republican presidential nomination. The Bernie Sanders surge continues — he may even win California — but Hillary Clinton apparently has the superdelegate support needed to give her the nomination. We’re headed to a presidential race with two candidates burdened with record levels of disfavor.

    • Vast Majority of Democrats Want Sanders to Stay in Race: Poll

      A new poll released Wednesday found that a majority of registered Democrats want presidential hopeful Bernie Sanders to stay in the race.

      The national survey of 2,001 voters by Morning Consult found that 57 percent of all Democrats polled want Sanders to keep running, while 33 percent want him to drop out. Ten percent have no opinion.

      The findings contradict the pressure from prominent Democratic politicians and centrist pundits on Sanders to drop out of the presidential race—some of whom even argue that he’s already lost—despite the fact that several states (including delegate-rich California) and U.S. territories have yet to hold their primaries. (Polls also show Sanders and Clinton in a dead heat in California, which votes on June 7.)

  • Censorship/Free Speech

  • Privacy/Surveillance

    • Stung By Yelp Reviews, Health Providers Spill Patient Secrets

      Burned by negative reviews, some health providers are casting their patients’ privacy aside and sharing intimate details online as they try to rebut criticism.

      In the course of these arguments — which have spilled out publicly on ratings sites like Yelp — doctors, dentists, chiropractors and massage therapists, among others, have divulged details of patients’ diagnoses, treatments and idiosyncrasies.

      One Washington state dentist turned the tables on a patient who blamed him for the loss of a molar: “Due to your clenching and grinding habit, this is not the first molar tooth you have lost due to a fractured root,” he wrote. “This tooth is no different.”

      In California, a chiropractor pushed back against a mother’s claims that he misdiagnosed her daughter with scoliosis. “You brought your daughter in for the exam in early March 2014,” he wrote. “The exam identified one or more of the signs I mentioned above for scoliosis. I absolutely recommended an x-ray to determine if this condition existed; this x-ray was at no additional cost to you.”

    • Google voice search records and keeps conversations people have around their phones – but the files can be deleted

      Google could have a record of everything you have said around it for years, and you can listen to it yourself.

      The company quietly records many of the conversations that people have around its products.

      The feature works as a way of letting people search with their voice, and storing those recordings presumably lets Google improve its language recognition tools as well as the results that it gives to people.

    • Thailand Government Wants To Undermine Website Encryption, Hold ISPs Responsible For Third-Party Content

      Thailand’s government has never been considered a friend of internet services or users, thanks to its interest in suppressing dissent/ensuring its king remain unoffended. It has often claimed it has no interest in censoring the internet — sometimes in statements delivered while shutting down livestreams of discussions with ISPs on how to better censor the internet.

      Unsurprisingly, it’s not a fan of encryption. The Thai government is currently amending its Computer Crimes Act in hopes of updating its censorship abilities. In addition to codifying ISP compliance with government demands, it’s also looking to destroy anything standing between it and full control of internet activity.

    • MPs’ private emails are routinely accessed by GCHQ

      Computer Weekly investigation reveals the extent of interception of MPs’ and peers’ email communications and data

      GCHQ and the US National Security Agency (NSA) have access to intercepted emails sent and received by all members of the UK Parliament and peers, including with their constituents, a Computer Weekly investigation has established.

    • Guardian of the GPL: Online advertising is becoming “a perfect despotism”

      Time is running out to prevent complete totalitarian dictatorship until the end of human civilisation, Eben Moglen, the guardian of the GPL, told Ars in an interview.

      But let’s rewind a bit. Earlier this month, Moglen and Mishi Choudhary, both of the Software Freedom Law Center, told a packed crowd at the Re:publica conference in Germany about the worrying outlook for Homo sapiens.

      “This is the last generation in which the human race gets a choice,” Moglen said during the duo’s opening keynote for the media and technology conference. “Most of the human race doesn’t know what the choice is, and if we here, who do know, do not help them understand,” he said, “if we don’t give them proof of concept plus running code, the revolution becomes impossible.”

      Moglen is a Columbia law professor and a well-known stalwart of the free software movement. As general counsel to the Free Software Foundation for many years, he helped Richard M. Stallman draft the GPLv3. He received the EFF’s Pioneer Award in 2003, and is the author of The dotCommunist Manifesto, among many other works. Choudhary is the SFLC’s legal director and previously practised as litigator before the High Court and Supreme Court in India.

    • 4th Circuit Appeals Court Rolls Back Its Warrant Requirement For Cell Site Location Info

      The Fourth Circuit Court of Appeals was one of the few appeals courts to rule on the constitutionality of obtaining cell site location info without a warrant. And it was — was — the only appeals court to find warrantless access violated the Fourth Amendment. The decision was limited to the collection of historical cell site data for extended periods of time (the court appeared to believe anything beyond two weeks was questionable), mainly because there was a good chance the records would contain considerable detail about a person’s movements in private places.

    • Cops can easily get months of location data, appeals court rules

      A full panel of judges at the Fourth US Circuit Court of Appeals has now overturned last summer’s notable decision by the standard trio of appellate judges, which had found that police needed a warrant to obtain more than 200 days’ worth of cell-site location information (CSLI) for two criminal suspects.

      In the Tuesday en banc decision, the Fourth Circuit relied heavily upon the third-party doctrine, the 1970s-era Supreme Court case holding that there is no privacy interest in data voluntarily given up to a third party like a cell phone provider. That case, known as Smith v. Maryland, is what has provided the legal underpinning for lots of surveillance programs, ranging from local police all the way up to the National Security Agency.

    • Federal Appellate Court Strikes Potential Death Blow to Privacy in New Cell Site Location Information Case
    • Privacy Takes Major Hit as Court Rules No Warrant Needed for Cell Location Data

      In a major setback for privacy advocates, a U.S. appeals court on Tuesday ruled that cellphone location data is not protected by the Fourth Amendment and can be collected without a warrant.

      By a 12-3 vote, the 4th Circuit Court of Appeals in Richmond, Virginia upheld what is known as a third-party doctrine, which states that consumers who willingly give information to outside parties—like telecommunications companies—have “no reasonable expectation of privacy” for that data, regardless of what it reveals. The case is United States v. Graham, in which two defendants were tracked by police without warrants for several months in 2010 and 2011 as part of an armed robbery investigation.

      The ACLU discovered in 2015 that the collected data revealed information that went beyond the scope of the case—including that the wife of defendant Aaron Graham was pregnant.

    • The FBI Wants to Exempt Massive Biometric Database From the Privacy Act

      A broad coalition of 45 signatories, including civil liberties, racial justice, human rights, and privacy organizations, published a letter Tuesday strongly condemning a proposal by the FBI to exempt its massive biometric database from certain provisions of the Privacy Act. Known as the Next Generation Identification system, or NGI, the FBI database houses the world’s largest collection of fingerprints, DNA profiles, palm prints, face images, and other biometric identifiers. The letter, signed by groups such as La Raza, Color of Change, Amnesty International, National LGBTQ Task Force, as well as the companies Uber and Lyft, criticized the agency’s May 5 proposal on the grounds that the “system uses some of the most advanced surveillance technologies known to humankind, including facial recognition, iris scans, and fingerprint recognition.”

    • FBI Wants to Remove Privacy Protections from its Massive Biometrics Database

      Since 2008, the FBI has been assembling a massive database of biometric information on Americans. This database, called Next Generation Identification (NGI), includes fingerprints, face recognition, iris scans and palm prints—collected not just during arrests, but also from millions of Americans for non-criminal reasons like immigration, background checks, and state licensing requirements. Now the FBI wants to exempt this vast collection of data from basic requirements guaranteed under the federal Privacy Act—and it’s giving you only 21 business days to object.

    • Appeals Court Delivers Devastating Blow to Cellphone-Privacy Advocates

      Courts across the country are grappling with a key question for the information age: When law enforcement asks a company for cellphone records to track location data in an investigation, is that a search under the Fourth Amendment?

      By a 12-3 vote, appellate court judges in Richmond, Virginia, on Monday ruled that it is not — and therefore does not require a warrant.

      The 4th Circuit Court of Appeals upheld what is known as the third-party doctrine: a legal theory suggesting that consumers who knowingly and willingly surrender information to third parties therefore have “no reasonable expectation of privacy” in that information — regardless of how much information there is, or how revealing it is.

      Research clearly shows that cell-site location data collected over time can reveal a tremendous amount of personal information — like where you live, where you work, when you travel, who you meet with, and who you sleep with. And it’s impossible to make a call without giving up your location to the cellphone company.

    • Anonymized Data Really Isn’t Anonymous: Vehicle Data Can Easily Be Used To Identify You

      Companies increasingly hoover up larger and larger oceans of consumer data, promising that security and privacy aren’t much of a worry because data is “anonymized.” But as research has shown time and time again, anonymous data isn’t all that anonymous — since it takes only a modicum of effort to either analyze the data — or cross reference it with other data — to ferret out personal identities. It doesn’t really matter whether we’re talking about NSA surveillance troves or social networking data: anonymous data just isn’t anonymous.

    • William Binney: NSA Surveillance Takes a Page From Nazi Germany

      With the Obama Administration’s unprecedented crackdown on whistleblowers, Radio Sputnik’s Loud & Clear speaks with National Security Agency (NSA) whistleblower William Binney about the growing American police state.

      “They [the NSA] don’t care what they do, they feel that they have the right to do anything that they feel necessary, and they will cover up crimes and procedures and violations of regulations that they’ve done to achieve whatever their ends are,” Binney tells Loud & Clear host Brian Becker.

    • Facebook using people’s phones to listen in on what they’re saying, suggests professor

      Facebook could be listening in on people’s conversations all of the time, an expert has claimed.

      The app might be using people’s phones to gather data on what they are talking about, it has been claimed.

      Facebook says that its app does listen to what’s happening around it, but only as a way of seeing what people are listening to or watching and suggesting that they post about it.

      The feature has been available for a couple of years, but recent warnings from Kelli Burns, mass communication professor at the University of South Florida, have drawn attention to it.

    • Advertisers Might Already Be Using Your Phone’s Hardware to Track You

      Your phone is like your best friend. It holds all of your secrets, and there’s a bond of trust—at least, you hope that there is. Advertisers may already be exploiting this trust and turning your phone against you, by using its tiny quirks to track you across the web.

      Because people are becoming savvy to advertisers’ bag of tricks, the usual methods of following folks around online just aren’t paying off like they used to. Now and in the future, advertisers may track you with “fingerprinting”—identifying a particular device by, say, tracking its screen dimensions and plugins, alongside lots of other personalized information which is then communicated and collected through a browser before being sent to advertisers.

      Recent research has pointed to a method of device fingerprinting that uses the miniscule, unique imperfections in each phone’s accelerometer and gyroscope—basically, its hardware—to create a profile of that phone that can be used to track its user’s activities across the web, without her knowledge. Unlike location data, most sites don’t ask for permission to access a phone’s motion sensors.

    • Iran orders foreign messaging apps to store data within its borders

      Iran has ordered foreign messaging apps to store all data on its citizens within the country’s borders, Reuters reports, giving the companies one year to comply. Iran’s Supreme Council of Cyberspace announced the measures on Sunday, saying they are based on the “guidelines and concerns of the supreme leader” Ayatollah Ali Khamenei, according to the local IRNA news agency.

      “Foreign messaging companies active in the country are required to transfer all data and activity linked to Iranian citizens into the country in order to ensure their continued activity,” the council said.

    • Snowden slams Clinton and Trump, but leaves Sanders unscathed
    • Edward Snowden Criticizes Hillary Over Violation of Classified Laws
    • Snowden Slams US for Ignoring Hillary Clinton’s Email Controversy
    • Should Consideration be Given When Sentencing a Criminal if the Crime Led to Positive Changes?
    • NSA leaker Edward Snowden performed a ‘public service’: Editorial
    • President Obama, pardon Edward Snowden and Chelsea Manning
    • Why Obama Is Wrong About Snowden
  • Civil Rights/Policing

    • New Jersey Officer Leaked Mugshots Of 14-Year-Old Gunned Down By Police

      Shortly after 14-year-old Radazz Hearns was shot seven times in the legs and buttocks by Trenton, New Jersey police, an officer used a juvenile court database to find and leak the teenager’s mugshots.

      Last August, a state trooper and an officer from Mercer County were responding to gunfire near an apartment complex in Trenton when they saw a group of three teenagers, including Hearns, in the area of the reported shots. When they exited their unmarked patrol car and ordered the teenagers to put their hands up, Hearns tried to flee. According to the police, the teenager pointed a gun in their direction, so they gunned him down in self-defense. But one eyewitness claimed Hearns was trying to pull up his pants, and findings by the state attorney general’s office differed from the officers’ account of what happened.

    • The U.S. Senator Who Thinks We Need More Incarceration

      Freshman U.S. Senator Tom Cotton (R-Ark.), a firebrand darling of the extreme right, thinks the United States has a problem with incarceration—underincarceration, that is. That’s right.

      Cotton criticized congressional efforts to reform the country’s broken prison system, arguing instead that federal and state governments ought to be building more prisons and jailing even more Americans, rather than fewer.

      According to The Sentencing Project, the U.S. leads the world in incarceration, with 2.2 million people in prison or jail, a 500 percent increase over the last 40 years.

    • Hearing Thursday Could Clear Path to Freedom for ‘Guantánamo Diary’ Author

      Mohamedou Slahi has been unlawfully detained for 14 years at Guantánamo Bay and is the author of a best-selling book about the ordeal he suffered there. A hearing Thursday could result in his freedom.

      After years of waiting and litigation, Slahi will finally receive a Periodic Review Board hearing. President Obama ordered PRB hearings for the men at Guantánamo five years ago. The board is made up of senior officials from military and intelligence agencies who are tasked with determining whether a detainee poses a “significant threat” to the United States or can be cleared for release. A PRB does not determine whether the initial detention was justified — that is a task for the federal courts deciding habeas corpus challenges. In Slahi’s habeas case, a federal court judge — still the only neutral person to have reviewed all the evidence — found in 2010 that Slahi’s detention was unlawful and ordered him released. But the Obama administration appealed, and the federal habeas case languishes still.

    • Singaporean Activists Harassed by Police for ‘Breaching’ Election Rules

      It’s a worrying state of affairs when expressing your political opinions on Facebook on a particular day is all it takes for police to gain access to all your data without a warrant or court order.

      Last Friday Singapore’s Elections Department announced that its Assistant Returning Officer had lodged police reports against news website The Independent Singapore and two individuals, Roy Ngerng and Teo Soh Lung, for breaching election rules relating to Cooling-Off Day during the Bukit Batok by-election held earlier this month.

    • Dalai Lama says ‘too many’ refugees in Europe

      The Dalai Lama said in an interview published Thursday that Europe has accepted “too many” refugees, and that they should eventually return to help rebuild their home countries.

      “When we look into the face of every single refugee, especially the children and women, we can feel their suffering,” said the Tibetan spiritual leader, who has himself lived in exile for over half a century.

    • Freedom From Violence: Lessons From Black Prisoner Organizing

      Collective rebellions are episodic. Expanded technologies of control and limited leftist movements on the outside have made such rebellions even rarer in prisons. But the long-standing black critique of the American criminal justice as a system of racial dominance continues, aided and abetted by the existence of resurgent opposition to prisons beginning in the late 1990s and with added ferocity since the economic collapse of 2008. In 1998, two organizations formed with direct connections to the previous generation of prison protest. Bo Brown, who spent seven years in prison for her involvement with the Seattle-based clandestine George Jackson Brigade, and Angela Davis were part of the intergenerational founding collective of Critical Resistance (CR). CR helped popularize a systemic analysis of prisons as part of a wider organization of the political economy — a prison-industrial complex. Alongside feminist antiviolence organizations such as Incite!: Women of Color against Violence, CR has worked to reengage a politics of (prison) abolition that updates 1970s innovations.

    • Man allegedly pooped on Kroger U-Scan machine

      A Cincinnati man was jailed after he allegedly stripped naked in front of an employee at the Kroger store in Hyde Park and defecated on a U-Scan machine.

      Colin Murphy, 23, was charged with public indecency and disorderly conduct for his actions, which took place on Sunday, according to police.

      According to a court affidavit, Murphy smelled of alcohol, had slurred speech and staggered walk.

    • Russian cyber-espionage group hits Sanoma

      Yle has obtained new evidence of cyber-attacks on Finnish targets by a cyber-espionage group linked to Russian state intelligence. The group, known as Sofacy or Pawn Storm, has attempted to hack into data communications of Finland’s largest group, Sanoma, as well as of a Finnish member of Bellingcat, an international group investigating the Ukraine conflict.

    • Effort to Expose Russia’s ‘Troll Army’ Draws Vicious Retaliation

      Seeking to shine some light into the dark world of Internet trolls, a journalist with Finland’s national broadcaster asked members of her audience to share their experience of encounters with Russia’s “troll army,” a raucous and often venomous force of online agitators.

      The response was overwhelming, though not in the direction that the journalist, Jessikka Aro, had hoped.

      As she expected, she received some feedback from people who had clashed with aggressively pro-Russian voices online. But she was taken aback, and shaken, by a vicious retaliatory campaign of harassment and insults against her and her work by those same pro-Russian voices.

      “Everything in my life went to hell thanks to the trolls,” said Ms. Aro, a 35-year-old investigative reporter with the social media division of Finland’s state broadcaster, Yle Kioski.

      Abusive online harassment is hardly limited to pro-Russian Internet trolls. Ukraine and other countries at odds with the Kremlin also have legions of aggressive avengers on social media.

    • Smugglers Made $6 Billion From Refugee Crisis in 2015: Interpol

      People smugglers capitalizing on the refugee crisis created by the Syrian conflict gleaned some $6 billion from those attempting to reach the European mainland in 2015, according to a report released by world policing bodies Tuesday.

      Interpol and Europol, the international and European cross-border crime agencies, issued a report on “Migrant Smuggling Networks” that showed that 90 percent of the influx of refugees into the European Union is facilitated by smuggling networks in Africa, the Middle East and Eastern Europe.

    • EU naval mission is ‘MIGRANT MAGNET’: Damning verdict on Brussels plan ‘helping smugglers’

      THE European Union’s flagship naval mission to crack down on migrant crossings has today been branded a spectacular failure which has HELPED the people smugglers.

    • Muslim in Eastern Uganda Kills Christian Wife for Leaving Islam, Relatives Say

      A Muslim in eastern Uganda strangled his wife to death this month for leaving Islam, relatives and neighbors said.

      Awali Kakaire, 34, early in the morning on May 8 killed Mariam Nakirya for embracing Christianity in Mbaale village, Imanyiro Sub-County, Mayuge District, the area residents told Morning Star News. She was 30.

    • Florida Prosecutors Drop Charges Against PINAC Reporter Jeff Gray – Again

      For the fifth time since 2010, Florida prosecutors were forced to dismiss criminal charges against PINAC reporter Jeff Gray before even going to trial, proving once again what we have known all along.

      That his arrests are always unlawful and unconstitutional; nothing but an attempt to keep him from doing his job.

    • Vietnam vet claims guards at El Paso VA clinic used “excessive force” against him

      Jose Oliva, 71, went to the El Paso Veterans Affairs Clinic for a check up. But what happened that afternoon still has him shaken up three months later.

      Oliva says he was attempting to enter the VA clinic. But his interaction with the guards went horribly wrong leaving him in cuffs and, he says, with injuries.

      “You know, they could have killed me,” Oliva said.

      Oliva, a Vietnam vet, said he’s had shoulder and throat surgery after what happened at the VA clinic on Feb. 16.

    • Former Miss Turkey gets suspended sentence for insulting Erdogan

      Turkey sentenced a former beauty queen to 14 months in prison on Tuesday, deepening concerns that the country is swaying toward an increasingly authoritarian form of rule.

      An Istanbul court found Merve Buyuksarac, 27, guilty of insulting a public official, after she shared a poem on her Instagram account in 2014 that was deemed insulting to Recep Tayyip Erdogan, the country’s president.

    • Fresh third party video of Amos Yee being assaulted in Jurong Point emerges

      Youtube user Jhan DABOMB who witnessed the recent assault of Amos Yee in Jurong Point and has released his video footage of the incident. He said that when he saw one youth chasing another in Jurong Point, with a girl in tow, it looked to him like a case of molestation. Only when Amos was dragged out of NTUC Fairprice did the Youtube user realise that it was Amos Yee.

    • Israeli Company Claims Its Software Can Look At Your Face And Determine If You’re A Terrorist Or Murderer

      There is a regular experience I have that I assume is common for anyone that operates within the technology industry: I will often hear non-technical people make claims about a specific kind of technology that are wildly overstated. To clarify, I am technically proficient in the barest sense, mostly meaning that I have enough of an understanding of the underlying process by which things work that I can explain them, but not implement them. To those without even that barest understanding, I can understand how technology can simply seem like magic. That can open the doors for others who know better to try to take advantage of this.

      Enter into the conversation Israeli startup company Faception, which claims its facial recognition software can look at your features and then determine if you’re a terrorist, pedophile, or criminal.

    • Fired for Speaking Out on Guantánamo, Former Prosecutor Settles With Library of Congress

      In a small but significant victory for free speech, Col. Morris Davis, the former chief prosecutor at Guantánamo Bay, announced a $100,000 settlement Tuesday in his lawsuit against the Library of Congress’s Congressional Research Service.

      Davis was fired from the CRS in 2009 for authoring two opinion pieces (one in the Wall Street Journal, the other in the Washington Post) that criticized President Obama for prosecuting some terror suspects in federal courts and others in military commissions — what Davis called a “dangerous legal double standard.”

      Davis became an assistant director at CRS after retiring from a 25-year career as an Air Force lawyer in 2008.

      The ACLU sent a letter to CRS in 2009 asking for Davis’s reinstatement, noting that his work at CRS had nothing to do with Guantánamo Bay. When CRS refused, the ACLU sued on Davis’s behalf.

    • 9/11 Suspect Calls for U.S. Judge to Step Down, Citing Evidence Destruction

      The U.S. military judge overseeing the trial of the accused mastermind of the Sept. 11 attacks should step down and the case should be scrapped because he effectively conspired with prosecutors to destroy evidence, defense lawyers said in a court filing.

      The motion said Judge James Pohl, an Army colonel, and prosecutors had tainted the case against Pakistan-born Khalid Sheikh Mohammed by keeping defense lawyers from learning that the evidence had been destroyed.

    • Judge ‘manipulated’ 9/11 attacks case, court document alleges
    • Gitmo Judge Allowed Destruction of Evidence in 9/11 Case: Report

      The judge in charge of military tribunals at Guantánamo Bay allegedly colluded with prosecutors to hide evidence that supported the defense of suspected 9/11 architect Khalid Sheikh Mohammed, “irreparably” harming his case, according to a court document obtained by the Guardian on Tuesday.

      The accusation could be the impetus to reform the highly controversial tribunals at the U.S. military prison in Cuba altogether, according to Karen Greenberg, the director of Fordham University Law School’s Center on National Security.

      “This may well be the straw that breaks the camel’s back in underscoring the unviability of the military commissions,” Greenberg told the Guardian.

      According to the recently unsealed defense filing, Army Colonel James Pohl “in concert with the prosecution, manipulated secret proceedings and the use of secret orders.”

    • Europe’s War on Refugees is Repeating the Mistakes of the War on Drugs

      On 19th April 2015, the sinking of a single refugee boat off the coast of Lampedusa led to the drowning of over 700 people. By the end of the month, an estimated 1300 had drowned in the same way, making it the deadliest month on record in the Mediterranean refugee crisis. The tragedy was the direct result of a successful British-led campaign to end the Italian search-and-rescue operation Mare Nostrum, which had prevented such mass drownings before its closure in October 2014. Those events led to a public outcry and pressure to restart search-and-rescue operations; but resisting such pressure, on 23rd April 2015 the European Council instead adopted a British-drafted resolution vowing to “undertake systematic efforts to identify, capture and destroy [refugee] vessels”. The EU was giving notice that its response to the refugee crisis would no longer be based on humanitarian commitments, but on military force. It was, not coincidentally, a proposal originally made by the British fascist Nick Griffin five years earlier.

    • Chile’s Robocops

      Robocop is not only a movie. It’s real life in Chile where grown men, disturbingly silly, dress up in armored uniforms, similar to the movie Robocop (Orion Pictures, 1987) bashing peaceful demonstrations of students wearing blue jeans.

      Yes, they beat up and intimidate kids, which is a glaring example of a world gone mad! Ruled by horrifying neoliberal principles of financial domination, controlled by elitist, kicking the daylights out of teenagers. The whole affaire is simply one more example of the spirit of meanness from which neoliberal principles pit the elite class against all others.

    • Democrats Targeted for Creating, and Now Ignoring, Mass Incarceration Disaster

      A new petition released Tuesday calls on Democratic Party leadership to make ending mass incarceration a core part of the party platform.

      “So far, both [parties] have fallen short,” reads the petition created by non-partisan public policy institute the Brennan Center for Justice. “Even Democratic Party platforms haven’t merely been silent; they have actually called for policies creating more imprisonment.””

    • Why is Obama Ignoring Pleas to Release Political Prisoner Oscar López Rivera?

      Two and a half months ago, asked by award-winning playwright Lin-Manuel Mirandaabout imprisoned Puerto Rican nationalist Oscar López Rivera – whose only crime, according to Nobel Peace Laureate Archbishop Desmond Tutu, is “conspiracy to free his people from the shackles of imperial justice” – President Barack Obama told the Hamilton creator that he “had [the case] on his desk.” Miranda, whose parents hail from Puerto Rico, used his invitation to the White House to bring up the issue of López Rivera’s continued incarceration, which is of tremendous importance to Puerto Ricans. Both on the island and in the diaspora, freedom for the 73-year-old political prisoner enjoys overwhelming popular support and has united people across the political spectrum.

    • Samantha Power, Former Human Rights Journalist, to Receive Award From Henry Kissinger

      In her 2002 Pulitzer Prize-winning book, “A Problem From Hell: America and the Age of Genocide,” Samantha Power lambasted former Secretary of State Henry Kissinger for his role in genocidal foreign policy. “[T]he [Ford] administration had very little credibility,” she wrote. “Kissinger had bloodied Cambodia and blackened his own reputation with past U.S. policy.”

      Now, in an ironic twist, Power is set to receive The American Academy of Berlin’s Henry A. Kissinger Prize—and it will be presented to her from Kissinger himself. The award is given “annually to a renowned figure in the field of international diplomacy.” Power, a “human rights celebrity,” began her career as a journalist reporting from war-torn regions such as “Bosnia, East Timor, Kosovo, Rwanda, Sudan, and Zimbabwe.” She eventually became a member of President Obama’s administration when he made her the United States’ youngest U.N. ambassador.

    • Samantha Power, Obama’s Atrocity Enabler

      A new documentary called “Watchers of the Sky” tells the moving story of Raphael Lemkin, Polish lawyer and resistance fighter who spent his final years seeking to secure legislation against the crime of genocide at the United Nations. Lemkin’s struggle to guarantee a legal order capable of preventing the slaughter of civilians is brought to life through the narration of Samantha Power, a Pulitzer Prize-winning journalist and famed diplomat who earned renown with her 2002 book, “A Problem From Hell,” documenting the international community’s failure to stop genocide in Rwanda.

    • Boston to Protestings Students: You’re Not Worth it.

      The student protest outside of Boston City Hall was winding down. Of the 1,000 students who’d walked out of their schools for the second time this spring, about 100 were left, waiting to get inside in hopes of testifying before a City Council committee against proposed school budget cuts. First, though, the students had to pass through a metal detector, a process as inefficient as an airport TSA line. “This is what democracy looks like,” they chanted, a protest staple that for once felt almost true. “The whole world is watching,” they shouted, amplified by the hulking architecture of City Hall.

    • Jessica Williams, 29: Another Black Woman Gunned Down By Police

      Oscar Salinas, from the Amor for Alex coalition [formed after police fired 59 shots killing Alex Nieto while he was eating a burrito], gave a strong message of solidarity from the Black and Brown alliance that is fighting police impunity.

    • Happy Sunday, Welcome to Rikers

      Anna has made the trip to Rikers hundreds of times in the nearly six years her son has been awaiting trial. Each time, a friend picks her up early in the morning near her apartment in Manhattan’s Lower East Side and drives her out through the city, past the brick houses and manicured lawns of northwestern Queens. They park near the Q100 bus stop and sit silently in the car until the bus pulls up.

    • Blair government’s rendition policy led to rift between UK spy agencies

      British involvement in controversial and clandestine rendition operations provoked an unprecedented row between the UK’s domestic and foreign intelligence services, MI5 and MI6, at the height of the “war on terror”, the Guardian can reveal.

      The head of MI5, Eliza Manningham-Buller, was so incensed when she discovered the role played by MI6 in abductions that led to suspected extremists being tortured, she threw out a number of her sister agency’s staff and banned them from working at MI5’s headquarters, Thames House.

      According to Whitehall sources, she also wrote to the then prime minister, Tony Blair, to complain about the conduct of MI6 officers, saying their actions had threatened Britain’s intelligence gathering and may have compromised the security and safety of MI5 officers and their informants.

    • MI5 Chief ‘Right to Be Disgusted’ over MI6 Involvement in CIA Rendition & Torture
  • Internet Policy/Net Neutrality

    • Factually Challenged Op-ed Insists Google Greed Is Behind FCC’s Desire For More Set Top Box Competition

      So wait, just so we’re clear, your ingenious solution for the cable industry’s aggressive walled garden anti-competitive stranglehold over set top box hardware is — to regulate Google? And for years we’ve pointed out that the idea of “search neutrality” is bullshit. Throughout the net neutrality debate it was the cry of a telecom sector and its various policy tendrils, all pretending to be willfully oblivious to why physical, last mile services without competition (broadband) aren’t regulated exactly the same as Internet services that users can choose not to use.

      And buried under the Op-ed’s conflations and bizarre omissions, that’s just the thing the editorial intentionally misses — quite painfully. Increasing set top box competition means that consumers would have a choice of set top boxes. As such, they could choose one that doesn’t rely on Google technology if this is really such a concern for them. Of course it isn’t — the great Google set top antitrust albatross is a giant red herring being pushed by cable operators via an endless number of similar editorials. All of them carry the same message: don’t open up the stagnant cable set top box market to competition or Google will run away with your daughter and pee on your azaleas.

      Again it’s a bunch of nonsense intended to misdirect the public from a central truth of the set top box debate: the cable industry is absolutely terrified of losing a central pillar in its quest to ensure cable remains a closed, walled garden ecosystem. Opening the set top box market to competition not only kills $21 billion in captive annual revenues, it suddenly opens the door to cheaper, better, more open hardware platforms — built by companies with no qualms about pushing traditional cable customers toward alternative streaming options.

  • DRM

    • Author Sues Publisher For Portraying eBook Licenses As ‘Sales’ To Pay Out Fewer Royalties

      If you’re a consumer, that piece of digital wordsmithery you purchased probably isn’t worth the paper it isn’t printed on. Like most digital media available for “purchase,” ebooks are often “sold” as licenses that allow the publisher to control use of the product indefinitely, whether through DRM or by simply attaching EULAs no one will ever read to every download.

  • Intellectual Monopolies

    • PDF Poland 2016: Is civic tech a good solution?

      “Civic tech is a great potential solution, but it is a solution that is vulnerable to being monopolised by elites if we don’t try to push the service beyond its traditional user base.”

      [...]

      Should be accessible to all citizens

    • Trademarks

    • Copyrights

      • 10 Years Ago Hollywood Awoke The Pirate Bay ‘Beast’

        Ten years ago today The Pirate Bay was raided by the Swedish police. While the entertainment industries hoped that this would shut the site down once and for all, they inadvertently helped to create one of the most resilient websites on the Internet.

      • MPAA Lobbyist / SOPA Sponsor to Draft Democratic Party Platform

        The Democratic Party has appointed a committee tasked with drafting the party’s platform. The 15-member panel includes MPAA lobbyist Howard L Berman, an attorney and former U.S. Representative who not only co-sponsored SOPA and tried to enshrine P2P network sabotage in law, but has also been funded by Hollywood throughout his career.

      • Re-Mixing Protected By Freedom Of Arts Fundamental Right, German Court Rules

        The German Constitutional Court today ruled in favour of the “freedom to sample” – or freedom to remix – in a case between the singer/songwriter Sabrina Setlur and the band Kraftwerk.

        The latter had filed complaints against the sampling of two seconds of rhythm from its 1977 song “Metall auf Metall” in Setlur’s 1997 “Nur mir”. The Federal High Court and several lower courts ruled in favour of Kraftwerk, pointing to German copyright legislation underlining the difference between re-using snippets from the original recording medium to re-performing them.

      • Police Target 50 Streaming Sites, Detain Five Suspects

        Police in Italy are reporting the execution of a large operation against a network offering live sports, movies and TV shows online without permission. The Guardia di Finanza say they targeted 50 sites running on 41 servers located on three continents. Five suspects were detained in what police estimate to be a 40 million euro business.

]]>
http://techrights.org/2016/06/01/unreal-engine-4-12/feed/ 0
Links 12/4/2016: MythTV 0.28 Released, ZFS Jar of Worms Opened http://techrights.org/2016/04/12/zfs-jar-of-worms-opened/ http://techrights.org/2016/04/12/zfs-jar-of-worms-opened/#comments Tue, 12 Apr 2016 11:28:09 +0000 http://techrights.org/?p=91636

GNOME bluefish

Contents

GNU/Linux

  • Desktop

  • Server

    • 5 reasons to use Docker for productivity software installation

      When Docker brought new life to Linux containers at the beginning of 2013, the technology quickly gained popularity among software developers. Today Docker has millions of container downloads, thousands of community contributors, and countless third party projects who are using it. What explains this extraordinary popularity?

  • Kernel Space

    • The linux-stable security tree project

      Hi all,

      I’d like to announce the linux-stable security tree project. The purpose
      is to create a derivative tree from the regular stable tree that would
      contain only commits that fix security vulnerabilities.

    • Linux Foundation’s Role, Combining Linux ZFS, Mint News

      Today in Linux news Richard Stallman posted a Free Software Foundation statement on ZFS in a GPL2 Linux and Software Freedom Conservancy is pleased with his conclusions. Elsewhere, Eben Moglen discussed the Linux Foundation’s role in the Linux community. Sam Varghese today said that Ubuntu may be everywhere, but Canonical is still operating in the red and Clement Lefebvre introduced some of the changes coming in Mint 18. The Fedora 24 supplemental wallpaper selection is in the voting phase and a new Pisi video has Megatotoro scratching his head.

    • How Should the Free Software Movement View the Linux Foundation?

      The opinions offered here are my own. I am not expressing the views of any SFLC clients, the Free Software Foundation, or Richard M. Stallman.

      There has been much recent controversy concerning the relationship between the Linux Foundation and “community,” or non-commercial organizations in the world of free software. I’ve been somewhat confused by the dynamics of that conversation, which has spilled out from private mailing lists into the public eye occasionally, and I have found it useful in clarifying my own views to state my thoughts on the subject, which I’ve now decided to share.

    • The mind behind Linux

      A video uploaded on Ted.com this month features a question-and-answer session with Linux creator Linus Torvalds recorded in February at TED 2016 in Vancouver.

      In the interview with TED curator Chris Anderson, Torvalds talked openly about the personality traits that prompted his unique philosophy of work, engineering and life.

      Some highlights from the chat, edited for brevity:

    • Linus Torvalds: The mind behind Linux

      Linus Torvalds transformed technology twice — first with the Linux kernel, which helps power the Internet, and again with Git, the source code management system used by developers worldwide. In a rare interview with TED Curator Chris Anderson, Torvalds discusses with remarkable openness the personality traits that prompted his unique philosophy of work, engineering and life. “I am not a visionary, I’m an engineer,” Torvalds says. “I’m perfectly happy with all the people who are walking around and just staring at the clouds … but I’m looking at the ground, and I want to fix the pothole that’s right in front of me before I fall in.”

    • Linus hasn’t given up on the year of the Linux desktop

      Much has been written, over and over again, about the fabled (and some would say mythic) year of the Linux desktop. But Linux creator Linus Torvalds has not given up on the idea. Linus thinks that someday Linux could come to dominate desktop computing.

    • Linux 4.6-rc3
    • Live Kernel Patching Microconference Accepted into 2016 Linux Plumbers Conference

      Live kernel patching was accepted into the Linux kernel in v4.0 in February 2015, so we can declare the 2014 LPC Live Kernel Patching Microconference to have been a roaring success! However, as was noted at the time, this is just the beginning of the real work. In short, the v4.0 work makes live kernel patching possible, but more work is required to make it more reliable and more routine.

      Additional issues include stacktrace reliability, patch-safety criteria for kernel threads, thread consistency models, porting to non-x86 architectures, handling of loadable modules, compiler optimizations, userspace tooling, patching of data, automated regression testing, and patch-creation guidelines.

    • Linux-Stable-Security Kernel Tree Announced

      Sasha Levin of Oracle has announced the formation of the Linux-Stable Security Tree.

      This new tree will be based off the mainline Linux stable tree but focus on just carrying fixes for security vulnerabilities. Other changes normally found in stable Linux point releases wouldn’t be integrated.

    • Graphics Stack

      • Intel Has New DRM Linux Driver Code Ready For Testing: More Atomic Goodness

        Daniel Vetter of Intel OTC has sent out an announcement about another round of i915 DRM kernel driver code that’s ready for testing by developers and the community.

        The latest drm-intel-testing work continues with more atomic-related driver work. One of the more prominent atomic changes in this latest Git branch is making the Intel color manager support fully atomic. Some race conditions were also fixed up in their driver, many small improvements to the GEM memory management code, GuC firmware loading fixes, PLL clean-ups for Cherryview and Valleyview, reworked DisplayPort detection, and various other improvements.

    • Benchmarks

  • Applications

  • Desktop Environments/WMs

  • Distributions

    • A Pisi Video!

      This is an animated short video featuring some known characters from Pisi Linux.

    • Reviews

      • Isolating processes with Qubes OS 3.1

        There are several approaches to computer security. One method is to try to make every component work as correctly and error-free as possible. This is called security through correctness. Another approach is called security by obscurity and it involves hiding secrets or flaws. A third approach to security is isolation, which is sometimes called security by compartmentalization. This third method keeps important pieces separate so if one component is compromised, the other components can continue to work, unaffected.

        These different styles of security might make more sense if we look at an example from the non-digital world. Imagine we have some valuables we want to keep locked away and we decide to buy a safe to store our precious documents, jewels and money. If we buy a high quality safe that is hard to force open, that is security through correctness. If we hide our safe behind a picture or in a secret room, that is security through obscurity. Buying two safes and placing half of our valuables in each so if one is robbed then we still have half of our items is an example of security by compartmentalization.

    • New Releases

      • HandyLinux 2.4 Is Based on Debian GNU/Linux 8.4, Iceweasel Replaced with Firefox

        The developers of the Debian-based HandyLinux distribution have announced the immediate availability for download of HandyLinux 2.4, a maintenance release in the 2.x stable series of the OS.

        HandyLinux 2.4 comes only ten days after the release of the Debian GNU/Linux 8.4 “Jessie” operating system, on which the French distro is now based, offering users new installation mediums that include the latest security patches and software updates pushed upstream.

    • Red Hat Family

      • Red Hat, QCT Partner On OpenStack Hardware System

        Quanta Cloud Technology is teaming with Red Hat to produce a ready-to-plug-in package of OpenStack, Linux, and Ceph storage loaded on Quanta servers, storage, and switches.

      • Red Hat Linux Developer Suite

        Red Hat Enterprise Linux is now available for free to developers who are members of the Red Hat Developers Program.

        The idea is to make it easier for developers to carry out serious Linux development for Enterprise Linux. The new non-production developer subscription is unsupported, but gives you a strong development environment for programming enterprise applications.

        When you register for the subscription, you get Red Hat Enterprise Linux (as part of the Red Hat Enterprise Linux Developer Suite) along with the entire Red Hat JBoss Middleware portfolio and the Red Hat Container Development Kit (CDK). You also get a number of open source compilers, dynamic languages, development tools, databases, web servers and other middleware. Available software is grouped into software repositories that are used to segregate packages by type, source, or support life cycle.

      • Finance

      • Fedora

        • Moving Down the Hall

          I’m moving! Today is my first day on the Release Engineering Development team (RED team) of the PnT DevOps organization at Red Hat. After I get my bearings, I’ll be working on “Factory 2.0″ which, while still quite a nebulous and undefined thing, boils down to focusing on the next-generation build and release pipeline for RHEL and other Red Hat products. What’s cool about this is that, since it’s future-facing work, I get to focus on how to knit the effort with what’s been going on in Fedora releng. We’ll have lots to talk about and hack on, I’m sure.

        • Fedora 24 Wallpapers: Vote now!

          Nearly two months ago, the submission phase for the Fedora 24 Supplemental Wallpapers were opened. Now, the submission phase is closed and the voting phase is now open. If you have a FAS account and are CLA+1 status, you can cast your vote in Nuancier.

        • Fedora nightly image finder

          Finding nightly Fedora builds has always been a bit of a pain. For quite a while we had this page, which just linked to a couple of canned Koji searches. It kinda worked, but it was terribly slow and the results weren’t the nicest thing to look at; it also couldn’t find you installer images, as they don’t come out of Koji. It doesn’t work any more, as the Koji tasks it searches for are no longer correct; it could easily be ‘fixed’ but it’d still be a bad experience.

        • BrickHack 2016 and Fedora: Event Report

          As an event sponsor, the Fedora Ambassadors of North America had a table for the event. The Ambassadors offered mentorship and assistance to BrickHack 2016 programmers, gave away some free Fedora swag, and offered an introduction to Linux, open source, and the community. This report is a recollection of some highlights from the event and also focuses on the impact we made as an event sponsor.

    • Debian Family

  • Devices/Embedded

Free Software/Open Source

  • The Best Things in Life are Free

    On the other hand, software is still scarce — which is a problem because without software a computer is basically a paper weight. Yes, distributing software is nearly costless. However unlike hardware which involves costly manufacturing processes, the cost of making software consists almost completely of finding intelligent people to write it — and intelligent people are just as scarce as they’ve always been. Luckily, there’s a solution to this dilemma: open source. This idea isn’t new, but I think it’s really important so I wanted to write about it.

    Open source software is software that is distributed freely. Now, this may sound like a terrible idea. People are altruistic — but only to a certain point. Why would people contribute to software for no reward? The key is that open source software is not only free, the process behind making it is transparent. You can change it. Open source projects start when people share code they wrote for their individual needs. Many times making this software publicly available is more cost effective than selling it. Since the source code is publically available, people can adapt the code, and fix problems as they arise.

  • Chatty Puppets on Atlassian HipChat

    HipChat is a team communications platform that provides ‘persistent’ one-on-one chat, group chat, video chat, file sharing and integrations.

  • Open Source Audio Video Apps: 36 Top Apps

    In the media-saturated world we live in, having an array of top-notch audio-video tools really comes in handy. Trim a file, edit a video, maximize your audio – we all need to feed our social media streams, and companies always need audio-video content to best communicate with users.

    This list of audio video apps is potentially a major cost saver. The following open source apps replace expensive commercial AV apps, often with very similar functionality.

    If you have addition AV apps you’d like to recommend, please use the Comments section below. Happy downloading!

  • Using behavioral patterns to build awesome communities

    Human beings are complicated animals. We are packed with ambitions, fears, desires, anxieties, and other nuggets of the human condition. Of course, the extent and manifestation of these different elements varies from person to person, across cultures, and in different environments.

    This makes building human systems—such as communities or companies—complicated. To some (typically bureaucrats), it can be tempting to ignore what makes us human and instead create seemingly logical processes, despite the processes not matching our human attributes well, and then convince people to use them. If you want to build engaging communities, don’t try to model people in spreadsheets; rarely does it work well.

  • Is your open team fully awesome, or too cool for school?
  • Events

    • 2016 EuroLLVM Videos Now Available
    • Community Leadership Summit 2016

      On 14th – 15th May 2016 in Austin, Texas the Community Leadership Summit 2016 will be taking place. For the 8th year now, community leaders and managers from a range of different industries, professions, and backgrounds will meet together to share ideas and best practice. See our incredible registered attendee list that is shaping up for this year’s event.

      This year we also have many incredible keynotes that will cover topics such as building developer communities, tackling imposter syndrome, gamification, governance, and more. Of course CLS will incorporate the popular unconference format where the audience determine the sessions in the schedule.

    • Chariot Solutions Partners with Open Source Hazelcast

      The software development specialist Chariot adds open source Hazelcast 3.6 to its enterprise portfolio as the two companies announce partnership at the Philly ETE 2016 conference.

  • Web Browsers

    • Mozilla

      • Mozilla Firefox 45.0.2 Released for Linux, Windows & Mac OS X with More Bugfixes

        Today, April 11, 2016, Mozilla has announced the general availability of the second point release of the Mozilla Firefox 45.0 web browser for all supported platforms, including GNU/Linux, Mac OS X, and Microsoft Windows.

      • Welcome Sean White, Vice President of Technology Strategy

        Dr. Sean White joins the Mozilla leadership team this week as a Vice President of Technology Strategy.

      • firefox vs rthreads

        Firefox is too slow. OpenBSD is too slow. The combination is too too slow. This situation was known for some time, but resolution was also slow for quite some reasons.

        Many Firefox on OpenBSD users, particularly developers, only use OpenBSD so the extent of the performance gap between platforms went unnoticed. Web browsing would grow ever slower, but the only page that matters would continue to load as quickly as ever, once the slumbering lizard had awoken. Clearly the reason it takes me thirty seconds to view a single tweet was idiot kids and their infernal javascript frameworks.

  • SaaS/Back End

  • Oracle/Java/LibreOffice

    • 16 Most Used Microsoft Office Alternatives for Linux

      Productivity on any operating system is without doubt one of the most important things that can make or break a platform however, execution is the key – if done right, enterprise adaptation would be shortly underway.

      Linux today is most certainly an ultimate viable alternative to Windows – both in the general consumer and business market.

  • BSD

    • FreeBsd Vs OpenBsd

      There are a number of Unix-like operating systems based on or descended from the Berkeley Software Distribution (BSD) series of Unix variants. The three most notable descendants in current use are FreeBSD, OpenBSD, and NetBSD, which are all derived from 386BSD and 4.4BSD-Lite, by various routes. Both NetBSD and FreeBSD started life in 1993, initially derived from 386BSD, but in 1994 migrating to a 4.4BSD-Lite code base. OpenBSD was forked in 1995 from NetBSD. Other notable derivatives include DragonFly BSD, which was forked from FreeBSD 4.8, and Apple Inc.’s iOS and OS X, with its Darwin base including a large amount of code derived from FreeBSD.

    • Linux Top 3: CoreOS 1010.1.0, FreeBSD and PC-BSD 10.3

      Yes of course, we *know* that FreeBSD isn’t Linux, but aside from using a different kernel (a big aside of course), there are a lot of common areas between modern BSD and Linux.

  • FSF/FSFE/GNU/SFLC

  • Public Services/Government

    • White House misses big opportunity with open source push

      To me — as a lawyer, a software developer, and a former government technologist — the question of open source versus closed source when it comes to government software shouldn’t even be a question. With a few obvious exceptions for things like national or operational security, if taxpayers fund the creation of software, they should have the right to access that software. This is increasingly true as government agencies automate the traditionally human-based process they use to regulate industry and deliver citizen services each day. When such processes begin to be shielded behind commercial copyright or self-induced bureaucratic necessity, our government quickly becomes a black box.

    • Storming the government castle

      Open source software seems like a perfect fit for government IT projects. Developers can take advantage of existing code bases and, it’s hoped, mold that code to their needs quickly and at less cost than developing code from scratch. Over the last few years, governments in the U.S. and abroad have been more closely embracing open source. However, agencies at all levels of U.S. government are still wary of open source and can be reluctant to adopt it. It’s still not easy for government projects to use open source or for developers employed in the public sector to contribute their work to open source project.

    • Urgent – Help until 10 April to influence how 750 millions will be spent

      We were notified of a very interesting consultation by the European Commission. The European Commission is about to allocate 750 million Euro over the next years on the “future internet”, but the really important subjects (like: everything we learned from Edward Snowden) are not on their radar – yet.

      However, if we bundle our efforts that is something that is definitely within reach. At the moment we are told there are only a couple of dozens of submissions from mostly the usual suspects, so your response would (at least on paper) count for influencing a few million Euro of this budget. It really makes a difference if you submit something, even if it is really short.

  • Openness/Sharing/Collaboration

    • A French paperback edition of the book Free Culture by Lawrence Lessig is now available

      I’m happy to report that the French paperback edition of my project to translate the Free Culture book by Lawrence Lessig is now available for sale on Lulu.com. Once I have formally verified my proof reading copy, which should be in the mail, the paperback edition should be available in book stores like Amazon and Barnes & Noble too.

      This French edition, Culture Libre, is the work of the dblatex developer Benoît Guillon, who created the PO file from the initial translation available from the Wikilivres wiki pages and completed and corrected the translation to match the original docbook edition my project is using, as well as coordinated the proof reading of the final result. I believe the end result look great, but I am biased and do not read French. In addition to the paperback edition, the book is available in PDF, EPUB and Mobi format from the github project page linked to above.

    • Open Data

      • Open Government integral part of Smart Cities

        Open Government initiatives should be an integral part of Smart Sustainable Cities. They ensure access to government data, stimulate citizen participation, and facilitate innovation. This is one of the recommendations made in the ‘Smart Sustainable Cities — Reconnaissance Study’ published last month by the Operating Unit on Policy-Driven Electronic Governance at United Nations University (UNU-EGOV).

      • Updated Austrian Manual for Data Managers available

        Last month, Austria published an updated ‘Handbuch für Dateneinsteller’ (Manual for Data Managers). It provides the country’s public administration with all the information needed by agencies to get started using the national Open Government Data portal www.data.gv.at.

        The manual explains the OGD Austria initiative, the open data principles, the why, how, and by whom of publishing open data, followed by all the legal, procedural, organisational and technical details.

        The ‘Handbuch für Dateneinsteller’ is written in German and is freely available from the OGD Austria website.

  • Programming/Development

    • Give your Git Repository an Open Source Web Interface

      Git is a very popular open source version control system. Many developers use Git on a desktop machine and push their updates to a central server running on a service like GitHub or GitLab. Although such services are great, this may lead some to think of Git as a client-server model with local checkout of code and updates that are always being pushed back to the single central server.

    • pypy: suprisingly good

      That’s better than I expected for the JIT technology.

Leftovers

  • Security

  • Defence/Aggression

  • Transparency/Investigative Reporting

    • Obama: The Word ‘Classified’ Means Whatever We Need It To Mean

      How do we know whether information is classified? Well, because the government tells us it is. But what does that mean? It turns out it means whatever the government wants it to mean, subject to time, place, personnel involved, etc.

      Classified material handed over to movie producers by Leon Panetta? Probably not a big deal. Classified material handed over to journalists by whistleblowers? That’s a prosecutin’.

      No one explains this slippery approach to classification better than President Obama, who was gamely trying to answer questions about an ongoing investigation (Hillary Clinton and her famous emails) during an interview with Fox News.

  • Environment/Energy/Wildlife/Nature

    • From DC’s Deficit Panic to Flint’s Poisoned Water

      We know that the Washington Post editors really hate Bernie Sanders and rarely miss an opportunity to show it. Dana Milbank got in the act big time today as he once again denounced Sanders (along with Donald Trump and Ted Cruz) in his column.

    • Water Woes Divide California into Haves, Have Nots

      People have long predicted that California could eventually collapse into the ocean following a mega earthquake. Now, an eerily similar true-life scenario is playing out — but it’s thanks to the weather.

      The Gold Rush State has sunk more than 45 feet since 1935 – something the U.S. government calls the “largest human alteration of the earth’s surface.” But earthquakes aren’t the cause. It’s happening because of excessive groundwater mining brought on by drought, and geologists say all the rain in the world won’t reverse cave-ins of dirt and rock in underground aquifers.

    • National Weather Service will stop using all caps in its forecasts

      New forecast software is allowing the agency to break out of the days when weather reports were sent by “the wire” over teleprinters, which were basically typewriters hooked up to telephone lines. Teleprinters only allowed the use of upper case letters, and while the hardware and software used for weather forecasting has advanced over the last century, this holdover was carried into modern times since some customers still used the old equipment.

  • Finance

    • Rothschild says Ukraine president’s trust up to international standards

      The wealth management arm of Rothschild Group set up a trust it handles for Ukrainian President Petro Poroshenko in line with international standards for the treatment of assets of politicians in office, the company said on Thursday.

      Poroshenko has had to defend himself repeatedly against accusations he tried to evade tax after the “Panama Papers” data leak on Sunday showed he had placed his Roshen confectionary business assets in an offshore account.

      Rothschild said Poroshenko had appointed it as a trustee of a blind trust to hold his shares in Roshen.

      “The trust has been modelled on international standards for politicians requiring trusts to hold their assets while they are in office,” it said in emailed comments.

    • Dennis Skinner: Why I called the Prime Minister ‘Dodgy Dave’ – and would do it again

      I, like most people in the country, view tax havens as dodgy.

      Cameron looked after himself by maxing out the taxpayers’ credit card to pay a mortgage on expenses in Oxfordshire and even claimed to cut the wisteria off his chimney.

      So I, like most people in the country, think it dodgy he now earns a small fortune renting out a house in Notting Hill while living in Downing Street and Chequers.

    • All PFI Contracts Should Be Cancelled and the Assets Nationalised

      The Private Finance Initiative was always a scam. It was yet another way to divert money from ordinary tax-payers to the super rich. Instead of schools and hospitals being built and paid for by the taxpayer, they were built and paid for by the bankers, hedge fund managers and other “financial services” sharks, giving state guaranteed returns averaging 7% from the taxpayer, when we now have negative interest rates. It is such a massive scam that every man, woman and child in the UK owes £3,000 to PFI financiers. Like so many far right Tory ideas, its most fervent practitioners were Gordon Brown and Tony Blair.

    • Poor People Should Just Go Die

      Imagine that — in one of the world’s richest countries, people die simply because we can’t find a way to provide them good healthcare as does the rest of the civilized world.

    • Starvation in Australia: Utopia’s dirty secret

      I had a call from Rosalie Kunoth-Monks the other day. Rosalie is an elder of the Arrernte-Alyawarra people, who lives in Utopia, a vast and remote region in the “red heart” of Australia. The nearest town is Alice Springs, more than 200 miles across an ancient landscape of spinifex and swirling skeins of red dust. The first Europeans who came here, perhaps demented by the heat, imagined a white utopia that was not theirs to imagine; for this is a sacred place, the homeland of the oldest, most continuous human presence on earth.

      Rosalie was distressed, defiant and eloquent. Her distinction as one unafraid to speak up in a society so often deaf to the cries and anguish of its first people, its singular uniqueness, is well earned. She appears in my 2013 film, Utopia, with a searing description of a discarded people: “We are not wanted in our own country.” She has described the legacies of a genocide: a word political Australia loathes and fears.

    • Menace To Tax Dodgers David Cameron Has His Own Tax Dodging Exposed By The Panama Leaks

      One of the more darkly entertaining aspects of the massive Panama Leaks has been watching exposed politicians attempting to reconcile past promises to get tougher on financial wrongdoers with their own tax-dodging efforts.

      UK Prime Minister David Cameron has spent several years in crackdown mode, as the New York Times notes. Going all the way back to 2012, Cameron has made a habit of promising better regulation, stricter enforcement and harsher penalties for tax-dodging corporations while selling himself to voters and small businesses. He also singled out individuals, like comedian Jimmy Carr, for his use of “dodgy tax-avoiding schemes.” He also promised to close a loophole that allowed wealthy UK residents to avoid paying taxes and suggested those that did should face prison time.

  • AstroTurf/Lobbying/Politics

    • The Empire Strikes Back

      Several people have argued with my reference to “corporate media”, as the consortium includes state organisations such as the BBC. My response to that is that the BBC has become in the last few years a mouthpiece for state propaganda with no effective independence of government, and that the politicians are very much in the pocket of the corporations who fund them. The BBC therefore promotes corporate interests just as much as those outlets directly owned by corporate interests. It is simply a question of direct or indirect control.

    • The GOP’s worst kept secret: More people voting hurts Republicans — so they’re openly trying to prevent it

      By now it should be more than obvious. Republicans continue to push for new voter ID laws, which, of course, they publicly insist are all about weeding out rampant voter fraud, even though the likelihood of significant voter is virtually nil.

      Over the last four years, however, one GOP operative after another has proved the adage that you can’t keep a secret among a large group of people. Indeed, they continue to blab about the true motive behind voter ID laws — that it’s all about disenfranchising Democratic voters and keeping turnout low. The fewer Democratic voters, and, yes, the lower the overall turnout, the better Republicans fare.

  • Censorship/Free Speech

  • Privacy/Surveillance

    • Aggies preform highly in NSA Codebreaker Challenge [Ed: puff piece/marketing]

      Cybersecurity is one of this century’s newest and most complex challenges. Data is becoming more and more difficult to protect, but an National Security Administration challenge aims to train the next generation of computer engineers to be able to handle the task.

      The NSA Codebreaker challenge gave students around the country a chance to put their coding skills to use in a difficult context with a variety of interesting applications.

    • US Gov’t Wants to Use NSA Spy Data to Prosecute Citizens – Advocacy Group

      The US government is developing a policy that would allow the Justice Department to prosecute criminals based on evidence acquired secretly by the National Security Agency (NSA), Human Rights Watch said in a press release.

    • WATCH: Exclusive Interview by Glenn Greenwald with Former Brazilian President Lula da Silva
    • Is The Government Getting Stingier With Cyber Threat Data?

      In late February, the University of California, Berkeley, announced a hack into a school financial system that compromised the Social Security or bank account numbers of about 80,000 students, alumni and vendors.

      For more than two years, suspected Chinese and other nation-state hackers nestled inside computers at Penn State’s engineering school, which happens to develop sensitive technology for the Navy, Bloomberg reported in May 2015.

    • University Says Government’s Pretty Terrible At Sharing Cyberthreat Information

      Multiple government agencies have gone all-in on cybersecurity. CISA was pushed through late last year — dumped into the back pages of a “must pass” omnibus spending bill. Just like that, the government expanded its surveillance power and cleared its cyberthreat inboxes to make way for all the information non-governmental entities might want to share with it. It promised to share right back — making this all equitable — but no one really believed the government would give as much as it would take.

    • Congress’s New Encryption Bill Just Leaked, And It’s As Bad As Experts Imagined

      In the aftermath of Apple and the FBI’s high-profile battle over an iPhone used by one of the San Bernardino shooter suspects, observers on Capitol Hill have been anxiously awaiting the arrival of new Congressional bill that would force tech companies to provide assistance to police in accessing their customers’ data, even if it means building software tools to circumvent their own security measures.

    • Burr And Feinstein Plan One Sided Briefing For Law Enforcement To Bitch About ‘Going Dark’

      With the world mocking the sheer ignorance of their anti-encryption bill, Senators Richard Burr and Dianne Feinstein are doubling down by planning a staff “briefing” on the issue of “going dark” with a panel that is made up entirely of law enforcement folks. As far as we can tell, it hasn’t been announced publicly, but an emailed announcement was forwarded to us, in which they announce the “briefing” (notably not a “hearing”) on “barriers to law enforcement’s ability to lawfully access the electronic evidence they need to identify suspects, solve crimes, exonerate the innocent and protect communities from further crime.” The idea here is to convince others in Congress to support their ridiculous bill by gathering a bunch of staffers and scaring them with bogeyman stories of “encryption caused a crime wave!” As such, it’s no surprise that the panelists aren’t just weighted heavily in one direction, they’re practically flipping the boat. Everyone on the panel comes from the same perspective, and will lay out of the argument for “encryption bad!”

    • The right to delete your own data

      We have more protection for your credit card data than the information someone can use to set up a fake credit card in your name.

      If you do anything online, your data is at risk. Always. Every time you open an account somewhere, you provide a bunch of personal information. Some sites don’t ask for much more than an email address and a password. Other sites require more data about you. And other sites don’t require many details to get started, but you add more anyway.

    • MIT Tech Review Tries To Blame Apple Encryption For Wrongful Arrest
    • FBI, DEA Taking Two Different Approaches To Pending All Writs Orders Directed At Apple

      Some of the other iPhones the FBI tried to pretend weren’t going to be the beneficiaries of a precedential All Writs order are apparently not even the beneficiaries of the agency’s Break Into an iPhone Using This One Simple Trick! anticlimax in the San Bernardino case.

      Director James Comey noted there were still more windmills to tilt at after discovering the still-secret exploit only works on a smallish subset of Apple’s offerings. In two other cases, the agency has explored its available options. In one case in Massachusetts, it appears to be on the verge of abandoning its quest to force Apple to break into a phone for it, as Motherboard reports.

  • Civil Rights/Policing

    • Sheriff And Deputy Somehow Manage To Screw Up Forfeiture Badly Enough To Be Indicted On Extortion Charges

      The situation is not unlike hundreds of others that have occurred over the years. Colbert and Gragg stopped a motorist, found cash and drug paraphernalia, seized the cash and then proceeded to not file criminal charges against the driver.

    • Grand jury indicts Wagoner County sheriff, calls for his removal

      Indicted Wagoner County Sheriff Bob Colbert will fight an accusation that he took a $10,000 bribe after a traffic stop, his attorneys said Thursday.

      “This money was earmarked for fighting drug trafficking to help protect the citizens,” his attorney, Michon Hughes, said. “The accusations remain politically motivated. We are so sad for the sheriff.”

      The state’s multicounty grand jury on Thursday indicted Colbert, 60, and Capt. Jeff Gragg, 48, on three felony counts. The grand jury also called for Colbert’s immediate suspension and eventual removal from public office on misconduct grounds.

    • Supreme Court Says Government Can’t Take Your Money And Lock You Out Of Your Choice In Representation

      This decision was handed down by the Supreme Court more than a week ago, but it’s worth reporting. Late last year, the Court decided to take a look at an issue related to asset forfeiture and the implications it has for the Sixth Amendment.

      In this case, the defendant, Sila Luis, argued that the government’s seizure of her assets — pre-conviction — denied her the right to defend herself fully against its charges. She could still use an attorney, but it would have to be one appointed to her or one willing to work for deferred compensation (in the hopes that assets would eventually be returned).

      The problem here isn’t a small one. The government has the power to seize assets pre-conviction using nothing more than a grand jury’s indictment as the basis. This is done to provide some sort of assurance that the accused can compensate those wronged (as well as pay any fines, fees, etc. associated with the conviction) when the trial is concluded.

    • A Pirate’s First Month in Government

      In the mean time, tomorrow I am due to give a talk at Bath University on all things Pirate Party UK and how our first “Pirate in Power” is doing.

      All in all, I’d say we Pirates have had a pretty successful month. We’re already pushed back against the AMs bad call on the environment and immediately represented the constituents while making connections with the investing parties, unions and charites.

    • Some of Globe’s ‘Predictions’ for Trump’s America Have Already Come True

      On Sunday, the Boston Globe published a mock front page, filled with ominous headlines and half-joking prognostications, to “warn” the GOP against nominating Donald Trump. A accompanying editorial proclaimed that Trump’s “vision for the future of our nation is as deeply disturbing as it is profoundly un-American.”

      But what’s strange about this “satire” is how most of the things it’s warning about are already underway, or have long existed. Indeed, Trump’s vision isn’t un-American; it’s America on steroids.

    • Leaflets calling for Ahmadi Muslims to be killed if they do not convert found in south London mosque

      Leaflets calling for the killing of members of the Ahmadi sect of Islam have been found in a south London mosque.

      A pile of the flyers, which were found in Stockwell Green Mosque, seem to endorse the killing of Ahmadis if they do not convert to mainstream Islam.

      It has been speculated that they were printed by Khatme Naubwwat – a group which says on its official website that its “sole aim has been and is to unite all the Muslims of the world to safeguard the sanctity of Prophethood and the finality of Prophethood and to refute the repudiators of the belief in the finality of Prophethood of the Holy Prophet Hazrat Muhammad”.

    • Cybersecurity Expert Caught in FBI Mass Hack Gets Two Days Jail Time

      The Department of Justice has charged at least 137 people in the US with child pornography related crimes, after the FBI used a hacking tool to identify visitors of a large site on the so-called dark web. Many of those people are facing years in prison.

      One person caught has avoided any serious jail time altogether though: Brian Haller, a former cybersecurity employee at Booz Allen Hamilton who himself has ties to the government. Haller was sentenced on Friday to time served—two days and one night, according to court documents and local media reports.

      Haller pleaded guilty to one count of possession of child pornography, court documents state. Haller was also sentenced to 10 years of supervised release, in which his computer will undergo constant monitoring (except devices that are used as part of his employment), and he was ordered to pay a fine of $1,000.

  • Internet Policy/Net Neutrality

    • Comcast doesn’t like its customers using their own routers, and it’s fighting back

      It’s rare that you hear a positive story about the business practices of American mass media corporation Comcast, and the latest news item doing the rounds doesn’t break from that tradition. Customers are reporting that the company is injecting its own ads into their Web browsers.

      On the surface, this might seem like just another addition to the list of frustrations Comcast users are expected to endure on a daily basis. However, the product being advertised and the strategy underpinning this campaign are noxious enough to set this apart from the now-standard tales of the company’s disregard for its customers.

  • Intellectual Monopolies

    • Trademarks

      • Dov Seidman Now Suing His Agent Over The Use Of The Word ‘How’ By Third Party Ad Agency

        You may recall a story from a few years back involving self-proclaimed “corporate virtue advisor” Dov Seidman and his quest to sue Chobani for using the phrase “How food is made matters” and the social media hashtag #howmatters. Seidman’s problem with all of this? He had a trademark registered for the word “how.” Yeah, seriously. Seidman claimed that his super-awesome transformational use of “how” as a noun instead of a verb had been trademarked and that this somehow meant that a company that sells yogurt couldn’t use the word in any way similar.

      • USPTO proposes first TTAB changes for nine years

        The USPTO has suggested 29 pages-worth of changes to Trademark Trial and Appeal Board practice, including to electronic filing, service and electronic communication, streamlining discovery and pre-trial procedures, and making trials more efficient.

    • Copyrights

      • MPA: We’ve Reached a Turning Point on Piracy

        The president of the MPAA’s European operation says he believes a turning point has been reached on piracy, with service providers and search engines beginning to understand they all have a role to play. However, it’s also clear that Hollywood is fearful of opening up content across Europe, which in itself could contribute to piracy.

      • U.S. ISPs Refuse to Disconnect Persistent Pirates

        The U.S. broadband association USTelecom, a trade association representing many ISPs, is taking a stand against abusive takedown notices and a recent push to terminate the accounts of repeat infringers. They argue that ISPs are not required to pass on takedown notices and stress that their subscribers shouldn’t lose Internet access based solely on copyright holder complaints.

      • Appeals Court Says Google Must Take Further Abuse From AG Jim Hood Before It Can Challenge Hood’s Abusive Behavior

        Towards the end of 2014, Google filed for an injunction against Mississippi Attorney General Jim Hood, whose close ties with the MPAA had led to a sustained campaign of harassment over Google’s supposed lack of interest in policing the entire internet for infringing material.

        Early in 2015, the district court granted Google’s requested injunction against Hood’s 79-page subpoena, which the court noted was a “burdensome fishing expedition” that went beyond the bounds of what a state AG could actually demand. Not only that, but the court noted that many of Hood’s actions were blocked by Section 230 of the CDA because the content in question had been uploaded by third parties.

        Unfortunately for Google, the Fifth Circuit Appeals Court has reversed the lower court’s decision and vacated the injunction. It’s being portrayed as a victory for the MPAA and its kept man, Jim Hood, but those actually reading the decision will find the reversal is just procedural. TL; DR: Google must face additional legal harassment from Jim Hood before it can challenge said legal harassment in a federal court.

]]>
http://techrights.org/2016/04/12/zfs-jar-of-worms-opened/feed/ 0
Links 8/3/2016: Future Kodi Versions, Solus 1.1 http://techrights.org/2016/03/08/future-kodi-veraions/ http://techrights.org/2016/03/08/future-kodi-veraions/#comments Wed, 09 Mar 2016 00:51:26 +0000 http://techrights.org/?p=90234

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • ​Enterprise ready: OwnCloud 9 handles petabytes of data

    When you think of ownCloud, you think of a cloud Infrastructure-as-a-Service (IaaS) cloud you can run off a home server. OwnCloud 9, which will be released tomorrow, March 8, is far more than that.

  • Still reeling, SourceForge looks to the future

    The SourceForge and Slashdot communities have had a much bumpier ride than the opendesktop.org communities over the years. I won’t go into detail about the ownership changes, but here’s the tl;dr: The founders of Slashdot, Rob ‘CmdrTaco’ Malda and Jeff Bates, sold the site in 1999, about two years after its launch, to Andover.net. Then in 2000, Andover.net merged with VA Linux, which changed its name to SourceForge, Inc. in 2007, and became Geeknet, Inc. 2009.

  • Open source security: know your code [Ed: the FUD firm uses terms like “code hygiene”]

    The adoption of open source is a good thing overall, leading to faster time-to-market and lower development costs. But if we are relying on open source so widely (and we are), we have an obligation as security professionals to understand what we’re deploying. Since 2014, more than 6,000 new vulnerabilities associated with open source have been disclosed. And the fact that the open source code you use today is free from vulnerabilities doesn’t mean that it will remain that way in the future.

  • Google vendor security review tool goes open source

    Google’s decided that the first-phase questionnaire it uses to vet vendors might be useful to the rest of the world.

    Until now an internal document, the Vendor Security Assessment Questionnaire (VSAQ) was created to help Mountain View cope with the huge number of vendor approaches it receives.

    The questionnaires help vendors describe their security posture to Google, so as to thin out the amount of stuff the Chocolate Factory has to let in the door for a presentation.

  • ownCloud 9.0 Released with Major Enhancements, Brings Federation to a New Level

    Today, March 8, 2016, ownCloud Inc. is proud to announce the release and immediate availability of ownCloud 9.0, the next major release of the self-hosting cloud server used by millions of people worldwide.

  • ownCloud 9.0 officially announced; innovative collaboration leads new features
  • Intel Appears To Be Rolling Out FSP 2.0 Blob

    A controversial point of Intel’s Coreboot support has been the FSP, or Firmware Support Package, which is needed for initializing the systems on all recent hardware generations. With the upcoming Apollo Lake it appears there is now a “FSP 2.0″, but still relies upon binary blobs.

  • OSI: Don’t Forget To Vote!

    With just a few days to go in our elections, here’s your gentle reminder to vote on who you would most like to see on the board of the OSI. You have until midnight PST on March 14th, 2016 to do so.

  • ownCloud 9.0 is a Must-Have Upgrade for the Popular Cloud Platform
  • OwnCloud 9.0 Released As Latest Version Of Open-Source Dropbox Alternative
  • 9.0 is the biggest ownCloud release so far
  • Non-Linux FOSS: CreateUserPkg
  • WSO2 Unveils a Lightweight Java Framework for Building Microservices

    “It started about a year ago, from zero to pretty much every single customer asking us: What is your strategy on microservices, and what is your strategy for container-based services?” noted Isabelle Mauny, who is the vice president of product management at WSO2.

    In effect, the customers were telling the middleware company,”That’s what we want to deploy,” Mauny said.

  • Amida Technology Solutions Releases Indaba, an Open Source Data Collaboration and Knowledge Management Tool [Ed: source code]
  • Google opens up VSAQ security assessor to the open source community

    On Monday, the tech giant said the Vendor Security Assessment Questionnaire (VSAQ), a selection of self-adapting questionnaires, have been used in the past to help the firm assess the practices and risk related to hundreds of vendors and their security every year.

  • When selling a site means selling a community

    In January, the CEO of ownCloud, Frank Karlitschek, sold his network of more than 30 community sites. The same month, DHI Group, Inc. announced that it completed the sale of its Slashdot and SourceForge community-driven businesses to BIZX, LLC.

    In both cases, websites weren’t the only things changing virtual hands. Entire online communities transferred to new stewards.

  • Events

  • Web Browsers

  • SaaS/Big Data

  • Databases

  • Pseudo-/Semi-Open Source (Openwashing)

  • BSD

    • LLVM 3.8 Officially Released

      While running late, the release of LLVM 3.8 and Clang 3.8 is now officially available.

      If you missed out on LLVM/Clang 3.8 features, see our feature overview. Aside from all the traditional compiler improvements, LLVM 3.8 is also exciting for AMDGPU users as being an important update for those using the AMD open-source Linux graphics driver stack.

    • Bitcoin Devs Could Learn a Lot from BSD

      There’s never been a whirlwind of politics surrounding an open source project on the scale that we see with Bitcoin. Alternative implementations are considered controversial on principle, and Core devs can’t propose a bug fix without being accused of manipulation on behalf of outside interests. However, BSD, another popular open source project, doesn’t seem to have these problems. Why not?

    • Proactive Security & (re)discovering OpenBSD

      OpenBSD — a security-focused & research-based Operating System — started auditing their source code tree in 1996. They combed their source code repository looking for bugs that could lead to security vulnerabilities. The results were hundreds of security bugs found & patched. Thankfully, some of those fixes made it to Linux, FreeBSD and NetBSD. Today, OpenBSD proudly boasts about 2 vulnerabilities in more than 10 years. Code auditing is still on-going !

  • FSF/FSFE/GNU/SFLC

    • Free Software Foundation submits comment to Copyright Office with over 1200 co-signers calling for end to DMCA anti-circumvention provisions

      The Copyright Office was seeking comments in response to a request from Congress to study the effects of the DMCA’s anti-circumvention provisions and the triennial exemptions process. The DMCA’s anti-circumvention provisions create legal penalties for the circumvention of technologies that restrict access to copyrighted works, known as Digital Restrictions Management (DRM). It further criminalizes the sharing of tools needed to avoid DRM. The DMCA also set up a system where activists, academics and researchers may request that certain uses be exempted from the anti-circumvention provisions. Every three years they may submit a request to the Copyright Office that the circumvention of a particular type of work be free from the DMCA’s penalties. Even when an exemption is granted, it expires three years later when the next round of the exemptions process begins, requiring repeated effort to maintain narrow exemptions.

  • Public Services/Government

    • Juha Saarinen: IT plans need open-source solutions

      Oh, and those open-source-based solutions work too. So well, in fact, that they can be used to build businesses and public services that run on top of them.

      By now there should be more than enough examples of successful, large-scale enterprise open-source solutions for our authorities to at least trial, rather than automatically tying themselves to proprietary software – and burning through enormous amounts of cash in return for nothing in the process.

    • Achieving IT independence through open-source

      The unwelcome possibility arose that we might have to purchase these expensive systems all over again in a few years, once support for the discontinued products ceased.

      In fact, this kind of dependence on a few large foreign software vendors is a common hazard in many industries.

      Fortunately, Kazi Farms group, the parent company of Deepto TV, also runs a software company called Sysnova which has helped our other businesses to run on free and open source software.

    • Millions saved by Spain’s eAdministration tool

      The SIR software is made available for free to all Spanish public administrations. They can download the software from the CTT repository.

  • Licensing

    • GPL Fun

      The other one is Canonical who have announced it plans to ship zfs with Ubuntu. An employee wrote in a confusing blog post “As we have already reached the conclusion, we are not interested in debating license compatibility, but of course welcome the opportunity to discuss the technology.” but in linking to differing opinions feels the need to highlight “please bear in mind that these are opinions.” The Software Freedom Conservancy wrote an post discussing why it was a derived work and why that’s illegal to distribute. And the SFLC’s Eben Moglen wrote another one which based on a link from Dustin’s blog is the opinion they are replying upon for thinking everything is ok. Eben’s blog post is fascinating and makes for page turning bed-time reading by going into exactly why it’s a derived work. It all depends on “literal interpretation of GPLv2’s system library exception” and that based on that

  • Openness/Sharing

    • Open Hardware

      • Tiny Open Source Robot

        We watched the video introduction for this little open source robot, and while we’re not 100% sure we want tiny glowing eyes watching us while we sleep, it does seem to be a nice little platform for hacking. The robot is a side project of [Matthew], who’s studying for a degree in Information Science.

      • TAU Open Source Mini Arduino Zero Development Board Unveiled (video)

        Arduino enthusiasts that are looking for a smaller Arduino Zero board for their next project may be interested in a new piece of hardware called the TAU that has been developed by Rabid Prototypes and which has been equipped with an Atmel ATSAMD21E17A ARM Cortex M0+ micro controller and offers 16KB RAM.

        The TAU has been created to provide an affordable open source miniature version of the large Arduino Zero and offers 32-bit ARM processor running at 48MHz and can be easily programmed using the Arduino IDE.

Leftovers

  • Internet Archive brings hundreds of classic Apple II games to your web browser

    The Internet Archive has been on a roll lately, bringing back classic MS-DOS games, Windows 3.1 software, and even defanged versions of old PC viruses.

    Now, the site has hit a milestone with its Apple II collection: A group of anonymous hackers have successfully broken the elaborate copy-protection schemes on more than 500 classic games and programs. The result is that these Apple II classics are now playable directly in modern web browsers.

  • Retro Apple II software lands at the Internet Archive

    DIGITAL HOARDER the Internet Archive has unleashed a load of previously copy-protected Apple II software from their old floppy prisons and added them to its accessible shelves.

    This is great news for people who like to have a go on things that they used to have a go on in the 1980s and 1990s. You could be in the Apple Computer software library now, running riot and making merry with all the stuff that the 4am Group has found, stored and shared with you. There is a lot of it.

    “Among the tens of thousands of computer programs now emulated in the browser at the Internet Archive, a long-growing special collection has hit a milestone: the 4am Collection is now past 500 available Apple II programs preserved for the first time,” said the Internet Archive in a blog post.

  • These Drone Photos Show the Density of High-Rises in Hong Kong

    Hong Kong is a densely populated city where high-rises are crammed close together and where an estimated 100,000+ people live in 40-square-foot cubicle apartments. Photographer Andy Yeung used a drone to capture this density for his project Urban Jungle.

    The photo above of the Sheung Wan area of the city was selected as a 500px.com Editors’ Choice.

  • Science

    • The End of Journals

      From the Section of Cardiovascular Medicine and the Robert Wood Johnson Foundation Clinical Scholars Program, Department of Internal Medicine, Yale School of Medicine, New Haven, CT; Department of Health Policy and Management, Yale School of Public Health, New Haven, CT; and Center for Outcomes Research and Evaluation, Yale-New Haven Hospital, New Haven, CT.

    • 8 guidelines to advance women in tech on International Women’s Day

      Just in time for International Women’s Day, the University of California, Los Angeles (UCLA)’s Luskin Center for Innovation has released “Rethinking Public, Private and Nonprofit Strategies to Advance Women in Technology,” a 60-page report that articulates just how far the tech industry still needs to go to address its gap in gender diversity – and how it can get there.

    • Guy Who Pretends He Invented Email Whines At Every Journalist For Writing Obit Of Guy Who Actually Helped Create Email

      Over the years, we’ve written a few times about Shiva Ayyadurai, a guy who’s basically staked his entire life on the misleading to false claim that he “invented” email. Every couple of years he pops up again as he’s able to fool some reporters into believing him. In 2012, he fooled the Washington Post and, astoundingly, the Smithsonian. In 2014, he was somehow able to get the Huffington Post to publish a multi-part series claiming he had “invented” email — though after we called them out on it (and after they stood by it) — those stories were eventually deleted. Ayyadurai also threatened to sue us for calling out his false claims, but there’s been no lawsuit yet.

  • Hardware

    • Heat doesn’t kill hard drives. Here’s what does

      “Free-cooled” datacenters use ambient outside air instead of air conditioning. That lets us see how environment affects system components. Biggest surprise: temperature is not the disk drive killing monster we thought. Here’s what is.

  • Health/Nutrition

    • Two Billion People Eat Insects and You Can Too

      Edible insects have long been a part of the human diet and are commonly consumed as a food source in many regions of the world, according to the United Nations Food and Agriculture Organization (FAO). It is estimated that two billion people currently consume insects as part of their diets. Insects may be an increasingly important source of protein because of the rising cost of animal protein, food insecurity, environmental pressures, climate change and population growth.

    • WHO: Zika Virus Spreading, R&D Needs Financing, Sample Sharing Discussed

      The World Health Organization said today that evidence of the relationship between the Zika virus and neonatal malformations and neurological disorders is growing stronger, and that the virus is spreading geographically. The Emergency Committee set up by the WHO at a gathering today issued advice to the WHO director general, including warning pregnant women to avoid travelling to Zika infected countries. Meanwhile, discussions are ongoing on the sharing of the samples of the virus, and on the question of benefit-sharing. And a call was made for research and development to intensify.

  • Security

  • Defence/Police/Secrecy/Aggression

    • Exclusive: Navy Secretly Conducting Electromagnetic Warfare Training on Washington Roads

      Without public notification of any kind, the US Navy has secretly been conducting electromagnetic warfare testing and training on public roads in western Washington State for more than five years.

      An email thread between the Navy and the US Forest Service between 2010 and 2012, recently obtained via a Freedom of Information Act (FOIA) request filed by Oregon-based author and activist Carol Van Strum in November 2014, revealed that the Navy has likely been driving mobile electromagnetic warfare emitters and conducting electromagnetic warfare training in the Olympic National Forest and on public roads on Washington’s Olympic Peninsula since 2010.

    • Drone Casualty Report Promised as U.S. Airstrike Kills 150 Al Shabaab Members

      AFTER YEARS OF INTENSE SECRECY, the Obama administration on Monday announced that it will for the first time acknowledge the number of people it has killed in drone strikes outside of conventional war zones, including civilians. The report, administration officials said, will be released “in the coming weeks,” and will continue to be released annually. The news came as the Pentagon confirmed that it had carried one of the largest airstrikes in the history of the war on terror.

      Lisa Monaco, the president’s counterterrorism and homeland security adviser, described the plan in comments made during a talk at the Council on Foreign Relations. “We know that not only is greater transparency the right thing to do, it is the best way to maintain the legitimacy of our counterterrorism actions and the broad support of our allies,” Monaco said, adding that the operations described in the report would not cover areas of “active hostilities,” such as Afghanistan, Iraq, and Syria.

    • The Noxious Legacy of Fracking King Aubrey McClendon

      WHEN FRACKING BILLIONAIRE Aubrey McClendon died after crashing his Chevy Tahoe into a bridge last week, the federal investigation into his alleged bid-rigging came to an end. At his memorial in Oklahoma City today, his friends and family will remember him as a “swashbuckling innovator” and a loyal friend, but his most enduring legacy may be his role in convincing policymakers and the public that natural gas could be an environmental boon and a solution to global warming. More than any other individual, McClendon personified the excesses of the fracking boom, gobbling up land so quickly and spinning the boom’s story so effectively that regulators, environmentalists, and even Wall Street struggled to keep pace.

      McClendon was not only the founder of Chesapeake Energy, the most important fracking company in the technique’s history, but he also co-founded one of the gas industry’s most important lobbying arms, America’s Natural Gas Alliance. In creating both, McClendon became an architect of the energy market’s reorientation around a product whose climate-warming emissions rival those of coal.

    • Finding Security by Helping the ‘South’

      Official Washington’s new group think is that more money must be poured into the Military-Industrial Complex to continue wars in the Middle East and hem in Russia and China on their borders. But the real security threats come from mass dislocations in the Third World, says ex-CIA official Graham E. Fuller.

    • Saudi Arabia’s Exploding Christmas Gifts From Hillary Clinton

      As Hillary Clinton emerges as the front-runner for the Democratic Party’s presidential candidate, she is receiving increased scrutiny for her years as Secretary of State. Many are criticizing her hawkish foreign policy, which is the best indication of what President Hillary’s foreign policy would be, with many focusing on her long relationship with Saudi Arabia.

      On Christmas Eve in 2011, Hillary Clinton and her closest aides celebrated a $29.4 billion sale of over 80 F-15 fighter jets, manufactured by US-based Boeing Corporation, to Saudi Arabia. In a chain of enthusiastic emails, an aide exclaimed that it was “not a bad Christmas present.”

      These are the very fighter jets the Saudis have been using to intervene in the internal affairs of Yemen since March 2015. A year later, at least 2,800 Yemeni civilians have been killed, mostly by airstrikes – and there is no end in sight. The indiscriminate Saudi strikes have killed journalists and ambulance drivers. They have hit the Chamber of Commerce, facilities supported by Médecins Sans Frontières (also known as Doctors Without Borders), a wedding hall, and a center for the blind. The attacks have also targeted ancient heritage sites in Yemen. International human rights organizations are saying that the Saudi-led strikes on Yemen may amount to war crimes.

  • Transparency Reporting

    • Former paid agent of Swedish Security Police dictated Amnesty Sweden’s stance against Assange

      Svenska Dagbladet (Svd), one of Sweden’s leading newspapers, has now revealed that a well-known journalist and ‘left activist’ – who, among other things, exerted considerable influence with Amnesty International Sweden – was a paid agent of Sweden’s Security Police (SÄPO). [5]

      The government security agent, Martin Fredriksson, was mainly active during the years that former Foreign Minister Carl Bildt was dictating Sweden’s foreign policy, when the “Assange Affair” was widely publicized on the home page of Sweden’s Ministry of Foreign Affairs. According to statements Fredriksson posted on Twitter, his “work” at SÄPO covered different periods between 2004 and 2010, the year Sweden opened its ‘investigation’ against the WikiLeaks founder Julian Assange.

      The Swedish media establishment awarded this SÄPO secret agent its highest investigative journalism prize, ‘Guldspaden’ (Golden Spade), in 2014. The rationale on which the award was given to Fredriksson referred precisely to the work he had implemented as a paid agent of Sweden’s Secret Police. [6] In the photo below, at the centre of the group, the ex-Security Police agent Martin Fredriksson.

    • Last chance for a pro-transparency trade legacy for Obama

      As the presidential campaign heats up, President Obama continues to press forward with his policy agenda. High on his remaining “to do” list is his trade agenda. With less than a year left in office, President Obama continues to urge Congress to approve the landmark Trans-Pacific Partnership (TPP) while pressing forward on an ambitious trade deal with Europe, the Transatlantic Trade Partnership (TTIP). For the moment, according to Speaker Paul Ryan (R-Wis.), it appears the votes aren’t there for TPP approval. Central to the challenge is a problem of the administration’s own making.

    • Two Former White House Tech Advisors Tell The President To Actually Be Transparent About Trade Deals

      Two former Obama tech staffers — Professor Colleen Chien (who advised the administration on intellectual property issues) and Quentin Palfrey (who worked for years in the Commerce Dept and the Office of Science and Technology Policy on intellectual property issues) — have written a fantastic opinion piece for The Hill, arguing that the White House has one last chance to actually be transparent in trade negotiations as it moves forward with the TTIP agreement with the EU. The piece notes that part of the reason that the TPP agreement is in so much trouble was its secrecy…

  • Environment/Energy/Wildlife

    • You’re Running Out of Time to See One of Nature’s Most Spectacular Sites

      If you have ever been snorkeling in a tropical paradise and seen the psychedelic colors and teeming variety of otherworldly sea critters, you were gazing upon something increasingly rare: a healthy coral reef. That site also does a lot more than dazzle vacationers. Coral reefs occupy just 0.1 percent of the oceans’ bottom but provide habitat to a quarter of the world’s fish species. They also prevent erosion along coastlines and buffer the impact of storms, providing protection, food, and livelihoods for about 500 million people.

    • On Fracking, Clinton And Sanders Give Vastly Different Answers

      Democratic presidential candidates Hillary Clinton and Bernie Sanders gave vastly different answers on fracking at the CNN Democratic debate on Sunday, illustrating a key policy contrast between the two.

      The candidates were asked by University of Michigan student Sarah Bellaire about whether they support fracking, the controversial process of injecting high-pressure water, sand, and chemicals underground to crack shale rock and let gas flow out more easily. Clinton, who answered first, said she does — but only under certain conditions.

      Specifically, Clinton said that she would not support fracking when local communities don’t want it; when it causes pollution; and when fracking companies don’t disclose the chemicals they use.

  • Finance

    • Corporate Sovereignty Now So Toxic, For Once It Isn’t Being Used Against Canada — Yet

      Despite that painful track record, in 2014 Canada signed the Foreign Investor Protection Agreement (FIPA) with China, which not only included corporate sovereignty provisions, but guaranteed that they would take precedence over the Canadian constitution for 31 years. However, it seems that something — maybe the decision by TransCanada to sue the US for $15 billion because of President Obama’s rejection of the Keystone XL pipeline — has started to make people aware of ISDS’s dangers. That, at least, is what a blog post on the Canadian Dogwood Initiative suggests. It’s a story about a Chinese mining company filing a lawsuit against Canada’s provincial government in British Columbia (BC) over a land transfer.

    • The Financial System Is A Larger Threat Than Terrorism

      In the 21st century Americans have been distracted by the hyper-expensive “war on terror.” Trillions of dollars have been added to the taxpayers’ burden and many billions of dollars in profits to the military/security complex in order to combat insignificant foreign “threats,” such as the Taliban, that remain undefeated after 15 years. All this time the financial system, working hand-in-hand with policymakers, has done more damage to Americans than terrorists could possibly inflict.

  • PR/AstroTurf/Lobbying

    • Hillary Is Now Picking and Choosing Which Obama Accomplishments to Take Credit For

      According to Hillary Clinton’s latest campaign ploy, she deserves credit for domestic policies passed under Obama — notably, ObamaCare — but not issues — in this case, trade deals — she negotiated as Secretary of State.

      She rolled out former Governor and erstwhile Michigan resident Jennifer Granholm (when this story hit, some local folks were talking about how Granholm hasn’t been seen in these parts of late) to claim that Hillary can’t be held responsible for NAFTA — which she supported when it got passed by her spouse (who is, of course, a key campaign surrogate) — or for the Trans-Pacific Partnership — which she helped negotiate as Secretary of State. It’s the latter I find particularly remarkable.

    • Tim Cook, Larry Page, And Elon Musk Plan To Stop Donald Trump At A Secretive Meeting

      The top leaders from Silicon Valley and Republican Commiserate recently met at the American Enterprise Institute’s annual World Forum gathering. Apparently, meeting’s main agenda was “How to stop Republican front-runner Donald Trump?”

    • At Secretive Meeting, Tech CEOs And Top Republicans Commiserate, Plot To Stop Trump

      Billionaires, tech CEOs and top members of the Republican establishment flew to a private island resort off the coast of Georgia this weekend for the American Enterprise Institute’s annual World Forum, according to sources familiar with the secretive gathering.

      The main topic at the closed-to-the-press confab? How to stop Republican front-runner Donald Trump.

    • Michigan mayor says he was nearly kicked out of Dem debate

      Fouts, an Independent mayor who attended both the Republican and Democratic debates in his home state, commented on the noticeable differences between the two events.

      “The Democratic debate is totally controlled by Hillarys [sic] good friend DNC Chair Debbie Wasserman Schultz,” Fouts wrote in a Facebook post. “No commentary is allowed by the audience. Particularly if you are cheering Bernie Sanders. Persons who do not adhere to Hillarys [sic] rules are threatened with expulsion.”

      He also said the Democratic Party’s debate process “borders on totalitarian control” and in an interview on Monday, he said Wasserman Schultz should resign.

      This is not the first time fellow Democrats have been publicly critical of Wasserman Schultz and how she’s handled the party’s debates. Critics have accused the DNC chairwoman of limiting the number of debates in order to aid Democratic front-runner Hillary Clinton.

    • An LSD trip story: “Went to a Donald Trump speech on acid SUPER BAD VIBES”

      It may be fact, it may be fiction. We do not know. But this first-hand account of an unfortunate fellow who fell under the delusion that it would be a good idea to attend a campaign rally for GOP presidential candidate and noted racist shitbag Donald Trump while tripping balls–it’s a very good acid trip story.

    • Donald Trump’s Sworn Testimony About His University: “I Don’t Know the People”

      Trump University, a now-defunct sales ploy that promised to teach Donald Trump’s real estate “secrets” to enrollees and make them rich in the process, has become a flashpoint in the Republican presidential primary debates. In last night’s debate in Detroit, for instance, Sen. Marco Rubio lit into Donald Trump over the “handpicked” instructors. Trump retorted with a fabrication, claiming that the Better Business Bureau had given Trump University an A rating. As Rubio pointed out in the exchange, the most recent rating was a D minus.

  • Censorship

  • Privacy

    • Verizon racks up $1.35M fine for violating consumer privacy

      On Monday, the Federal Communications Commission said it had reached a deal with Verizon over the company’s use of a technology that allowed marketers to track customers’ web browsing so they could provide more targeted advertising. The so-called supercookies were hidden bits of code that couldn’t be easily erased when consumers cleared their browsing history.

    • Victory: Verizon Will Stop Tagging Customers for Tracking Without Consent

      Today, Verizon reached an agreement with the FCC to acquire affirmative consent before injecting their UIDH tracking header into their customers’ web activity on non-Verizon owned sites. This is exactly what we asked them to do in November 2014, and is a huge win for Internet privacy. ISPs are trusted carriers of our communications. They should be supporting individuals’ privacy rights, not undermining them.

      Verizon started their tracking header program in 2012, but did not describe the program in its privacy policy at that time. In 2014, EFF analyzed the header and warned that it acted as an undeletable supercookie, bypassing typical steps people take to protect their Internet privacy, like deleting cookies or using browser extensions that block unwanted tracking.

    • Punished for a Paradox: Brazil’s Random Detention of Facebook Executive Fails Justice

      Yesterday, Diego Dzodan, Facebook’s Vice President for Latin America, was arrested at his Sao Paolo home by federal police, escorted to a forensic institute and then held at Pinheiros Provisional Detention Center in the city. His arrest was ordered by Judge Marcel Montalvão, who was been demanding personal data from WhatsApp as part of a drug-related investigation in Brazil’s northeastern state of Sergipe. The arrest comes after the judge had begun serving WhatsApp, which is owned by Facebook, a series of fines for withholding information from the court.

      Davi Tangerino, WhatsApp’s lawyer, told reporters what he told the court: WhatsApp can’t provide the contents of the communications, because the company has no record of those communications. That may be for technological reasons—many WhatsApp communications are end-to-end encrypted. It may also be result of the companies own logging policies: WhatsApp says it makes no permanent record of the data that the court requires. In either case, the court is punishing a single employee for the court’s own impossible demands.

    • Broadband Industry ‘Studies’ Claim Users Don’t Need Privacy Protections Because ISPs Are Just Harmless, Innovative Sweethearts

      With few protections in play, most of the last decade broadband ISPs have collected any and every shred of data about their customers’ online behavior. It began with clickstream data, which ISPs sold to third parties, then either refused to comment on or outright lied about. Since then, more intelligent network hardware has let ISPs use deep packet inspection to track and monetize user online behavior down to the second. In wireless, carriers like AT&T and Verizon not only collect and sell user online behavior and location data, but now embed stealth packet headers to track and profile users across the entire Internet.

      It was that last decision that raised eyebrows at the FCC, prompting the agency recently to consider whether it should use its new Title II authority to build at least some basic rules of the road regarding broadband user privacy. This has, of course made the broadband industry rather nervous. After all, the telecom industry has grown very comfortable with the fact that nobody has bothered to give half a damn about broadband privacy for the better part of a generation.

    • Amid an Inconclusive Answer on Encryption, Hillary Reveals She Doesn’t Understand How Metadata Works

      Right in the middle, however, Hillary reveals not understanding a key part of this controversy. To the extent Syed Rizwan Farook used the Apple software on his work phone to communicate with accomplices, we know who he communicated with, because we have that metadata (as Admiral Mike Rogers recently confirmed). We just don’t know what he said.

      We wouldn’t necessarily know who he talked to if he used an App for which metadata was more transient, like Signal. But if so, that’s not an Apple problem.

      Moreover, if ISIS recruits are — as Hillary said — smart, then they definitely wouldn’t (and in fact generally don’t) use Apple products, because they’d know that would make their communications easily accessible under the PRISM or USA Freedom programs.

      This response is not really any different from what we’re getting from other to Obama officials. But it does come with some indication of the misunderstandings about the problem before us.

    • EFF Opposes McCaul-Warner Encryption Commission

      Senator Mark Warner and Representative Mike McCaul are calling on Congress to create an “Encryption Commission” composed of business, tech, and law enforcement and intelligence agency leaders that will investigate and report on encryption issues. The commission is set to ask questions already answered in the 1990s like whether or not the government should mandate backdoors or otherwise change current law. The answer is no. At the end of the day, the commission shows Congress still hasn’t learned that math is not something you can convince to compromise.

      The Warner-McCaul Commission tasks Senate and House leaders with appointing 16 representatives from private industry, law enforcement, academia, the privacy and civil liberties community, and the intelligence community to publish two reports within a year. Each report will investigate (among other topics) how encryption is used, if current law or warrant procedures should change, the value of encryption, the effects of encryption on law enforcement, and the costs of weakening encryption standards.

    • Of Cockpits And Phone Encryption: Tradeoffs And Probabilities

      Blake Ross (boy genius Firefox founder and later Facebook product guy) has written a somewhat bizarre and meandering — but totally worth reading — article about the whole Apple v. FBI fight, entitled (believe it or not): Mr. Fart’s Favorite Colors. There are a few very good points in there, about the nature of programming, security and the government (some of which even make that title make sense). But I’m going to skip over the farts and colors and even his really excellent description of the ridiculousness of TSA security theater in airports, and leap forward to a key point raised in the article, focused on airplane security, which presents a really good analogy for the iPhone encryption fight. He points out that the only thing that has truly helped stop another 9/11-style plane hijacking (as Bruce Schneier points out repeatedly) is not the TSA security theater, but reinforced, locked cockpit doors that make it impossible for people in the cabin to get into the cockpit.

    • FBI makes clandestine changes to rules governing access to NSA data

      A secret court accepted changes to the rules governing the FBI’s access to NSA data about US citizen’s international emails and phone activity. The Guardian received confirmation from US officials that the classified changes were made to Section 702 of the Foreign Intelligence Surveillance Act (Fisa).

      The Privacy and Civil Liberties Oversight Group (PCLOB) has previously revealed that the FBI was able to search through NSA’s collection of trawled data about international communication. The classified nature of the latest changes mean it is impossible to know exactly what they entail, but they are described as being a step towards “enhancing privacy”.

    • FBI adopts new rules for accessing NSA data: report

      New policies adopted by the FBI reportedly affect the bureau’s access to intelligence gathered by the National Security Agency on U.S. citizens, but officials say they’re barred from explaining since the changes are classified.

      The Guardian newspaper reported on Tuesday that the FBI has “quietly revised” its privacy rules with respect to how it searches NSA databases for phone records, email information and other metadata concerning Americans.

      Specifically, the changes are said to involve the way the FBI uses Section 702 of the Foreign Intelligence Surveillance Act (FISA), the federal law that allows the U.S. intelligence community to collect information regarding non-U.S. persons.

    • FBI quietly changes its privacy rules for accessing NSA data on Americans

      The FBI has quietly revised its privacy rules for searching data involving Americans’ international communications that was collected by the National Security Agency, US officials have confirmed to the Guardian.

      The classified revisions were accepted by the secret US court that governs surveillance, during its annual recertification of the agencies’ broad surveillance powers. The new rules affect a set of powers colloquially known as Section 702, the portion of the law that authorizes the NSA’s sweeping “Prism” program to collect internet data. Section 702 falls under the Foreign Intelligence Surveillance Act (Fisa), and is a provision set to expire later this year.

      A government civil liberties watchdog, the Privacy and Civil Liberties Oversight Group (PCLOB), alluded to the change in its recent overview of ongoing surveillance practices.

    • Sweden re-evaluates eID needs and requirements

      The Swedish government is re-evaluating its approach to electronic identification tools. A report will be submitted at the end of the month, summarising the changing needs and requirements of public administrations, compared to the available private sector solutions.

      For their eGovernment services, Swedish public administrations commonly rent private sector eID solutions under a country-wide framework agreement signed in 2008. This contract will end this summer, which is why Sweden is studying the alternatives.

    • DOJ To NY Court: Hey, Can We Have Another Judge Look Over That Ruling About Breaking Into iPhones?

      This is hardly a big surprise, but the Justice Department is not at all happy about NY magistrate judge James Orenstein’s decision last week in the case against accused drug trafficker Jun Feng, that it cannot force Apple to break the security on an iPhone using the All Writs Act. While so much of the attention concerning iPhone encryption has been placed on the case in San Bernardino, the NY case made news well before the California case, and Orenstein was clearly aware that his ruling would have a much wider impact (and it was clearly written with that intent in mind). The Justice Department, of course, is now, in effect asking for a second opinion on the issue, carefully trying to position this case as something quite different than the San Bernardino case. In particular, the Justice Department is claiming that since this particular iPhone is using iOS 7, rather than 8, Apple already has a backdoor, and can easily unlock the contents of the phone.

      [...]

      As we’ve noted, that’s not actually true. The earlier orders involved earlier versions of iPhones where Apple did have easy access to opening up those phones — and the San Bernardino case was different because it used a more modern version of the operating system, where it did not have such access.

    • Amazon will restore Fire OS‘ encryption support in the spring
    • Amazon Decides to Re-Encrypt Fire OS Mobile Device Data for Privacy
    • Hacker Shows How To Hack Anyone’s Facebook Account
    • The technology at the heart of the Apple-FBI debate, explained
    • Apple Fight Could Lead To “Virtually Limitless” Surveillance Powers, Judge Warns
    • Deep Dive: Why Forcing Apple to Write and Sign Code Violates the First Amendment
    • British Spy Agency Chief Says Tech Companies Should Be Able to Provide a Way Around Encryption
    • GCHQ’s Robert Hannigan: Leave internet privacy laws to politicians, not tech companies
    • GCHQ chief urges Government action over data encryption

      The head of GCHQ has called for politicians to set out the boundaries on the use of data as he called for greater co-operation between technology companies and spy agencies over the issues of encryption.

    • Why is GCHQ boss encouraging activists and journalists to use the Tor network?
    • Britain’s GCHQ seeks co-operation from tech firms to facilitate State surveillance
    • GCHQ: Government Should Have Final Say on Encryption, Not Tech Firms
    • GCHQ boss: Tech needs ‘new relationship’ with security services
    • Head of Britain tech security agency backs encryption
    • GCHQ director says Tor is a ‘brilliant invention’
    • GCHQ: Crypto’s great, we’re your mate, don’t be like that and hate
    • GCHQ boss denies Snooper’s Charter will weaken encryption
    • GCHQ director: Tech companies ‘routinely’ help law enforcement
    • British Spy Agency Chief Says Tech Companies Should Provide a Way Around Encryption
    • The head of GCHQ wants a ‘new relationship’ with tech companies
    • GCHQ director: Tor is a ‘brilliant invention’ that highlights the perils of encryption
    • UK Spy Chief Says Tech Companies Need to Work With Government on Encryption
    • GCHQ: US and UK tech firms need to work together to solve encryption challenges
    • Privacy fight risks letting terrorists in, says head of GCHQ [Ed: British media helps the propaganda]
    • UK’s head of GCHQ seeks co-operation with tech groups
    • Welcome common sense on encryption
    • GCHQ chief urges Government action over data encryption
    • UK spy chief calls for tech sector co-operation to combat “abuse of encryption”
    • GCHQ uses MIT speech to get chummy with tech industry over crypto backdoors

      GCHQ’s director, Robert Hannigan, used a speech he gave yesterday at MIT to try to cosy up to the tech industry in order to promote what he called “a constructive dialogue.” That’s a dramatic reversal of his position less than 18 months ago, when he wrote in the Financial Times that Internet companies were “command-and-control networks of choice for terrorists and criminals,” and “in denial” about it.

      On Monday, Hannigan admitted that his comments in the FT had caused “a bigger stir than I expected, and were widely seen as an attack on the tech industry.” Now, he said, “we recognise that we need a new relationship between the tech sector, academia, civil society and Government agencies. We should be bridging the divide, sharing ideas and building a constructive dialogue in a less highly-charged atmosphere.”

      Encryption is the key area where Hannigan believes that dialogue is needed, and he devoted most of his speech to the topic. “The idea that we do not favour strong encryption is alien to anyone who has worked in my organisation,” he said, and went on to emphasise: “I am not in favour of banning encryption. Nor am I asking for mandatory backdoors.”

    • Some impressions from the TorDevMeeting and the Internet Freedom Festival (IFF) in Valencia

      Overheard at the Tor Dev meeting in Valencia, from people speaking about online identities: “You were on top of the list of the people I thought were you.”

    • Advanced Tor Browser Fingerprinting

      The ability to privately communicate through the internet is very important for dissidents living under authoritary regimes, activists and basically everyone concerned about internet privacy.

      While the TOR network itself provides a good level of privacy, making difficult or even practically impossible to discover the real I.P. address of the tor users, this is by no means enough to protect users privacy on the web. When browsing the web, your identity can be discovered using browser exploits, cookies, browser history, browser plugins, etc.

      Tor browser is a firefox browser preconfigured and modified to protect user privacy and identity while browsing the web using TOR. Browser plugins are disabled, history and cache aren’t persistent and everything is erased after closing the browser, etc.

  • Civil Rights

    • In blow to inmates’ families, court halts new prison phone rate caps

      Prison phone companies today were granted a judicial stay that halts implementation of new, lower rate caps on inmate calls. The court did not halt new limits on certain ancillary fees related to inmate calls, though, so the overall price of prison calling should go down.

      Global Tel*Link (GTL) and Securus Technologies had asked the US Court of Appeals in the District of Columbia to stay new price regulations until a lawsuit against the Federal Communications Commission is decided, arguing that they have a high likelihood of prevailing in the case. The companies argue that the FCC overstepped its authority and that the new limits fall short of what prison phone companies are contractually obligated to pay in “site commissions” to correctional facilities. Despite protest from the FCC, the court today partially granted the stay request.

    • DOM Defense Department Seeks SUB Hackers, Tech Companies For Partnership Built On Distrust

      Despite these limitations, Defense Secretary Ash Carter thinks the program will be a success. He believes the DoD and whatever hackers actually make it past the vetting process will “enhance national security” by playing controlled cyberwar games in a controlled environment.

    • International Women’s Day

      On a lighter note, it is also rather charming that International Women’s Day, designed by Communists as a rather heavy handed propaganda vehicle, morphed through the actions and desires of ordinary human beings into a celebration of romance. Throughout the Eastern Bloc, International Women’s Day became indistinguishable from the Western practices of Valentine’s Day, only with the gifts and flowers and dining taken to even higher levels of corniness. Restaurants throughout the UK will be busy today as couples involving at least one partner from our brilliant new large Eastern European population go out to celebrate. Including us.

    • Read Bernie Sanders’ 1961 Testimony on His University’s Racist Housing Policy

      On the campaign trail, Sen. Bernie Sanders often mentions his work as a civil rights activist in the early 1960s, when he was a campus organizer for the Congress of Racial Equality (CORE). As a leader of the University of Chicago chapter, he led sit-ins to protest racial discrimination at university-owned properties and picketed a Howard Johnson’s restaurant.

      Now we know a little bit more. L.E.J. Rachell, a researcher with the CORE Project, which is dedicated to collecting and preserving the records of CORE, recently uploaded four documents offering more details about Sanders’ involvement with the group. During this period in 1961, UChicago’s CORE chapter was sending white and black volunteers to university-owned housing facilities in the neighborhood to determine if the school was honoring its anti-discrimination policy.

      The most interesting of the CORE Project documents is a testimonial written by Sanders himself. In it, he details a “test” he conducted of a hotel just off campus. He visited to see if it would rent a room to his older brother, Larry, and the clerk assured him that they would. When UChicago CORE finished its testing, the results were clear—rooms that were available to white students were not available to black students. The next year they launched a series of sit-ins to force the university’s hand.

    • What Do Children’s Doctors and Nuns Have in Common? They Both Support Women’s Access to Contraception.

      The premiere pediatric association, the American Academy of Pediatrics, and the National Coalition of American Nuns are among a diverse group of organizations and individuals who recently filed friend-of-the-court briefs in the latest Supreme Court challenge to the Affordable Care Act’s contraception requirement. Nearly 30 briefs were filed in support of the federal government’s argument that women are legally entitled to insurance coverage for contraception coverage with no co-pay, regardless of their employer’s religious beliefs.

    • Harvard Law School Wants to Remove Slaveholder’s Crest From Logo

      After months of student protests, Harvard Law School could soon stop using its official symbol, a shield based on the crest of an 18th-century slaveholder whose donation paid for the first professorship of law at the university.

      In a letter to the university’s president and fellows released on Friday, the dean of the law school, Martha L. Minow, argued that the time had come to dissociate the school from the legacy of Isaac Royall, who left Harvard part of a fortune acquired through the labor of slaves at his father’s sugar plantation in Antigua.

      Every year, the dean wrote, she welcomes new students with a discussion of the benefactor’s portrait in which she notes “that while Harvard University at that time acted legally in accepting the gift, it is crucial that we never confine ourselves to solely what is currently lawful, for the great evil of slavery happened within the confines of the law.”

  • Internet/Net Neutrality

    • ICANN Meeting In Marrakesh: More Hiccups On Way To IANA Transition

      The 55th meeting of the Internet Corporation for Assigned Names and Numbers (ICANN) in Marrakesh this week is expected to finalise the last proposal necessary for the transition of the Internet Assigned Numbers Authority (IANA), a set of core functions necessary for the running of the internet.

      [...]

      Sharply criticising the transition proposal, Ismailov said it appeared that ICANN would remain a US corporation and the functions of the NTIA would just be resolved within the ICANN procedures, and be totally laid on US ground. “We hope that will be a temporary situation,” he said, adding concerns about “internal contradictions” in the US, pointing to recent letters from Republican Presidential candidate Sen. Ted Cruz.

  • DRM

  • Intellectual Monopolies

    • UN Global Dialogue On Innovation And Access To Medicines This Week

      The United Nations Secretary General’s High-Level Panel on Access to Medicines is holding a global dialogue this month, attended by governments, civil society, industry and academia, to discuss potential solutions to promote innovation and at the same time increase access to medicines. The first public dialogue session is this week, on 10 March in London.

      The High-Level Panel was established in November. In December, the panel issued a call for contributions to address the issue of alignment of the rights of inventors, and international human rights laws, trade rules and public health (IPW, Public Health, 1 February 2016).

    • Copyrights

      • Perfect 10 and the RIAA Still Trying to Rewrite Copyright to Give Hollywood A Veto Right Over Innovation: EFF Files Brief In Support of Giganews and Sound Copyright Policy

        Some people just never learn. For decades, porn purveyor Perfect 10 has been fighting a losing battle to deputize service providers to police potentially infringing uses of its works. Indeed, at this point Perfect 10 spends far more time on litigation than creation. But court after court has rejected those efforts. In fact, Perfect 10′s main achievement in the courts has been to inadvertently make good copyright law. For example, its litigation led to key decisions ruling that an image search engine was fair use and confirming that rightsholders must follow DMCA Section 512′s clear rules for takedown notices.

      • Author Sues Google For Copyright Infringement For Copying His ‘Philosophy’ In A TV Ad

        Yeah, by now, we get it. The legacy copyright folks have spent decades beating into the minds of the public that every idea and concept and philosophy is “owned” and that you need to get permission for just about everything that it’s no surprise to see crazy, nutty copyright lawsuits pop up every here and there. At least, usually, the really nutty ones are filed pro se (i.e., without a lawyer) and quickly dumped. However, it’s doubly amazing when you get a lawsuit that feels like a pro se lawsuit, but is actually filed by a real lawyer. In this case, the lawyer is Joel D. Peterson, whose website lists “intellectual property” as one of his specialties. If that’s the case, he may want to demand a refund from his law school.

      • Dutch Govt Denies Blame For Movie Piracy Losses

        The Dutch Government has no intention of compensating local film companies for the piracy losses they have allegedly suffered. A coalition of filmmakers is demanding 1.2 billion euros in piracy damages claiming that the Government failed to deter illegal downloading, but the Dutch Minister of Justice denies any liability.

      • “Disgusted” Member of Parliament Intervenes in Internet Piracy Case

        A Member of Parliament has intervened after an 83-year-old grandmother was accused of illegally downloading the Robert Redford movie The Company You Keep and hit with a demand for £600. Ian Austin MP has called on the UK Business Secretary to safeguard consumers from copyright trolls and will also raise the matter in Parliament.

      • Google Asked to Remove 100,000 ‘Pirate Links’ Every Hour

        Copyright holders are continuing to increase the number of pirate links they want Google to remove from its search results, which have now reached a record-breaking 100,000 reported URLs per hour. This remarkable milestone is more than double the number of pirated links that were reported around the same time last year.

]]>
http://techrights.org/2016/03/08/future-kodi-veraions/feed/ 0
Links 28/12/2015: Corporate Media Associates Linux With N. Korea and Abuses, Linux 4.4 RC7 Released http://techrights.org/2015/12/28/linux-4-4-rc7-released/ http://techrights.org/2015/12/28/linux-4-4-rc7-released/#comments Mon, 28 Dec 2015 20:58:47 +0000 http://techrights.org/?p=87844

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • SaaS/Big Data

    • On the OpenStack Scene, Get Credentials to Get Hired

      As part of its efforts to grow the OpenStack talent pool and global community, the OpenStack Foundation has announced a new professional certification program that is meant to provide a baseline assessment of knowledge and be accessible to OpenStack professionals around the world. Some of the first steps in advancing the program are taking place now, and other companies are also advancing OpenStack certification plans. Here is a sampling of the educational opportunities.

  • Pseudo-/Semi-Open Source (Openwashing)

  • BSD

  • Licensing

    • What topped the GitHub charts in 2015

      It’s been a year of open-source projects. Both enterprises and startups have been releasing their code into the wild as a way to grow their capabilities. It’s not just the code that’s important; it’s the programmers and contributors that can get their hands on it, alter it, fix it, and make it better.

    • Best of Opensource.com: Law
    • Answer to a Frequently Asked Question

      Q: Which open source license is best?

      A: Unlike bilateral copyright licenses, which are negotiated between two parties and embody a truce between them for business purposes, multilateral copyright licenses — of which open source licenses are a kind — are “constitutions of communities”, as Eben Moglen and others have observed. They express the consensus of how a community chooses to collaborate. They also embody its ethical assumptions, even if they are not explicitly enumerated.

  • Openness/Sharing

  • Standards/Consortia

    • Switzerland Wants a Single, Universal Phone Charger by 2017

      Apple’s Lightning cable cartel be damned: Switzerland is moving forward with a plan for a single, universal phone charger across the country, standardizing phone chargers across the board. While the exact standard hasn’t been mentioned yet, it wouldn’t be hard to guess the standard: Micro USB, used across phone platforms, most especially Android, which has a gigantic chunk of the cell phone market worldwide.

Leftovers

  • Security

    • Security Researchers Offer Warnings About Hackable Railroads

      The well-being of critical infrastructure and transportation has long been the elephant in the room when it comes to cybersecurity: plenty of researchers have warned about the possibility of attacks on power-plants, the national grid, and, more recently, even the emergence of internet connected cars.

      Now, researchers are warning of the gaping holes in the security of railroad systems. On Sunday at Chaos Communication Congress, a security, arts and politics conference held annually in Hamburg, Germany, members of the SCADA StrangeLove collective presented a long list of problems with railroad systems that attackers could exploit.

    • DLL Hijacking Just Won’t Die

      To make a long and complicated story short, a bad guy who exploits this vulnerability places a malicious DLL into your browser’s Downloads folder, then waits. When you run an installer built by an earlier version of NSIS from that folder, the elevation prompt (assuming it runs at admin) shows the legitimate installer’s signature asking you for permission to run the installer. After you grant permission, the victim installer loads the malicious DLL which runs its malicious code with the installer’s permissions. And then it’s not your computer anymore.

    • CA Council to Improve Internet Certificate Security in 2016

      At the heart of much of the Internet’s security is the use of Secure Sockets Layer/Transport Layer Security (SSL/TLS), which provides encryption for data in motion. Certificate Authorities (CAs) are the trusted entities that issue TLS certificates, and as a group, the CAs are gearing up for big year in 2016, with multiple efforts designed to improve the security of the Internet.

    • Backspace Flaw Enables Linux Zero-Day Attack
    • Monday’s security updates
  • Environment/Energy/Wildlife

    • Thousands More Homes Face Flooding Threat

      Thousands of homes are being evacuated in York after “unprecedented” levels of rain caused the Foss and Ouse rivers to burst their banks and the city’s flood barrier to be lifted.

    • UK flooding: Government rejected warnings of high flood risk from own advisers

      Minsters were warned by the Government’s own climate change advisers that they needed to take action to protect the increasing number of homes at high risk of flooding – but rejected the advice.

      The decision not to develop a comprehensive strategy to address increased flood risk came in October just a few weeks before the flooding in Cumbria before Christmas and the most recent flooding in Lancashire and Yorkshire.

    • Why Engineers Can’t Stop Los Angeles’ Enormous Methane Leak

      One of the biggest environmental disasters in US history is happening right now, and you’ve probably never heard of it.

      An enormous amount of harmful methane gas is currently erupting from an energy facility in Aliso Canyon, California, at a startling rate of 110,000 pounds per hour. The gas, which carries with it the stench of rotting eggs, has led to the evacuation 1,700 homes so far. Many residents have already filed lawsuits against the company that owns the facility, the Southern California Gas Company.

  • Finance

  • PR/AstroTurf/Lobbying

    • Bill O’Reilly Had A Terrible 2015

      Numerous Journalists Took Apart O’Reilly’s Falklands War Tales. O’Reilly has repeatedly attempted to bolster his reporting credentials by claiming over the years that he reported “in the Falklands” during the 1982 Falklands War. A Mother Jones exposé, however, found that O’Reilly fabricated his reporting resume and his former colleagues said he was actually 1,200 miles away in Buenos Aires. O’Reilly also claimed to have reported on a 1982 Buenos Aires protest in which “many were killed,” but numerous journalists who reported from the scene and a historian disputed his story. Furthermore, O’Reilly claimed to have helped an injured CBS photographer during the protest, but his colleagues have no recollection of that incident.

  • Censorship

    • True or false, decide through self-censorship, says minister

      He said self-censorship was important to see that the information they received and believed were valid and not detrimental and disruptive to harmony in society and country.

    • Public should practice self-censorship on social media, says minister

      Communications and Multimedia Minister Datuk Seri Dr Salleh Said Keruak today called on the people to use their power of self-censorship to reject or accept any information posted on the social media.

      He said self-censorship was important to see that the information they received and believed were valid and not detrimental and disruptive to harmony in society and country.

      “The important thing is, we should not be confused between news and views. Views are people’s own and not necessarily accurate and our views could differ from each other’s. But news contain facts, the veracity of which are verified before being disseminated.

    • Anonymous Attacks Asia Pacific Telecommunity website to protest Internet censorship

      The global hacktivist group, Anonymous has now turned its eyes to the varying degrees of censorship being practised in Asia. The Asia Pacific Telecommunity website (apt.int) has not only been hacked by members of the Anonymous hacker collective, and they also have got entry to the site’s admin panel (running Drupal), and also have been able to get their hands on a database dump.

    • Anonymous Hacks Asia Pacific Telecommunity Against Internet Censorship in Asia

      Anonymous hacker collective has attacked the official website of Asia Pacific telecommunity and defaced it in protest against growing plans for internet censorship in Asia.

      The hackers gained access of the website’s admin panel (running Drupal) and from there, leaked all the data stored on the website along with defacing the site with one of their own pages.

    • Court Orders Shutdown of Libgen, Bookfi and Sci-Hub

      A New York District Court has granted Elsevier’s request for a preliminary injunction against several sites that host academic publications without permission. As a result the site’s operators are now ordered to quit offering access to infringing content, while the associated registries must suspend their domain names.

    • Amidst censorship row, two “porn-coms” are releasing in India in January

      India’s 2016 film calendar will begin on a controversial note. Two Bollywood adult comedies starring the same actor are releasing within a week of each other in January. Both Maastizaade and Kya Kool Hain Hum 3 are releasing after facing considerable objections from India’s censor board.

    • The Splinternet: A New Era of Censorship, Surveillance, and Cyberwarfare

      For more than a decade, the internet has become a seemingly borderless land of free flowing information. It began as a not so open U.S. military data system decades ago, but it evolved over time into the public digital domain it has become.

    • On the Aggressive, Hilarious Theorizing in ‘Censorship Now!!’
    • Harvard Law Review Freaks Out, Sends Christmas Eve Threat Over Public Domain Citation Guide

      In the fall of 2014, we wrote about a plan by public documents guru Carl Malamud and law professor Chris Sprigman, to create a public domain book for legal citations (stay with me, this isn’t as boring as it sounds!). For decades, the “standard” for legal citations has been “the Bluebook” put out by Harvard Law Review, and technically owned by four top law schools. Harvard Law Review insists that this standard of how people can cite stuff in legal documents is covered by copyright. This seems nuts for a variety of reasons. A citation standard is just an method for how to cite stuff. That shouldn’t be copyrightable. But the issue has created ridiculous flare-ups over the years, with the fight between the Bluebook and the open source citation tool Zotero representing just one ridiculous example.

  • Privacy

    • Why ownCloud’s CEO isn’t worried about the death of Safe Harbor [Ed: Katherine Noyes should be smarter than that and not quote Microsoft propagandist Enderle]
    • Windows 10: Microsoft hits new low with ‘Upgrade Now’ or ‘Upgrade Tonight’ pop-up [Ed: how to push spyware]

      The latest pop-up message to consumers, outed on Reddit, removes the explicit option to opt out of the upgrade, instead offering two options: ‘Update Now’ or ‘Update Tonight’. Simply closing the box will make it go away (we’re still trying to ascertain for how long) but it seems that this is a deliberate attempt to prey on the less tech savvie.

    • The Tax Sleuth Who Took Down a Drug Lord

      “I’m not high-tech, but I’m like, ‘This isn’t that complicated. This is just some guy behind a computer,’” he recalled saying to himself. “In these technical investigations, people think they are too good to do the stupid old-school stuff. But I’m like, ‘Well, that stuff still works.’ ”

      Mr. Alford’s preferred tool was Google. He used the advanced search option to look for material posted within specific date ranges. That brought him, during the last weekend of May 2013, to a chat room posting made just before Silk Road had gone online, in early 2011, by someone with the screen name “altoid.”

    • China passes law requiring tech firms to hand over encryption keys

      Under the guise of counter-terrorism, the controversial law is the Chinese government’s attempt to curtail the activities of militants and political activists. China already faces criticism from around the world not only for the infamous Great Firewall of China, but also the blatant online surveillance and censorship that takes place. This latest move is one that will be view very suspiciously by foreign companies operating within China, or looking to do so.

    • New Chinese law takes aim at encryption

      A new law passed by China’s Parliament on Sunday requires technology companies to assist the government in decrypting content, a provision that the country maintains is modeled after Western law.

      A new law passed by China’s Parliament on Sunday requires technology companies to assist the government in decrypting content, a provision that the country maintains is modeled after Western law.

      ISPs and telecommunication companies must provide technical assistance to the government, including decrypting communications, for terrorism-related investigations, according to Xinhua, China’s official news agency.

    • China Using US Encryption Fight To Defend Its New Encryption Backdoor Mandate

      So, again, to all the politicians and lawmakers supporting backdooring encryption, what’s your response when China uses it to say that’s why they’re doing it as well?

    • Senator Richard Burr: Confused And Wrong On Encryption

      Right, except so far officials haven’t been able to show evidence of any of those cases actually using encryption. Similarly, law enforcement has failed to show that criminals using encryption have really been that much of a problem either. And that’s because it’s not a problem. Even in the (still mostly rare) cases where encryption is being used, criminals still reveal plenty of information that would allow law enforcement to track them down. It’s called doing basic detective work.

  • Civil Rights

  • Internet/Net Neutrality

    • India Tells Facebook To Shut Down Controversial Zero Rating Program ‘Free Basics’

      The Indian government has spent much of the last year trying to craft net neutrality rules, and had recently been fielding public comment on whether or not Facebook’s zero rating effort, Free Basics, violates net neutrality. As we’ve covered at length, Facebook’s been trying to corner the developing nation ad market with a zero rated program that offers free access to curated, Facebook approved content. Critics and Free Basic content partners alike haven’t been comfortable with giving Facebook that much control.

    • How the Internet of Things Limits Consumer Choice
    • Why India’s Net Neutrality Activists Hate Facebook

      Facebook Inc. Chairman Mark Zuckerberg made a personal appeal in one of India’s leading newspapers for the country to allow a free Internet service that has stirred controversy and invited questions from regulators.

      Facebook’s proposed Free Basics plan allows customers to access the social network and other services such as education, health care, and employment listings from their phones without a data plan. Yet activists say the program threatens the principles of net neutrality and could change pricing in India for access to different websites.

      The backlash in India centers on net neutrality, the principle that all Internet websites should be equally accessible. Critics accused the world’s largest social networking company of favoring a limited swath of the Internet and excluding rival services. And Facebook’s broader Internet.org initiative, including Free Basics, is seen as an effective way to draw more users onto a social network already used by over a billion people.

    • Facebook’s Zuckerberg: If You Oppose Our International Power Grab, You’re An Enemy Of The Poor

      Last week we noted that India had shut down Facebook’s Free Basics program, arguing the company’s plan for zero rating Facebook-approved content and services is effectively glorified collusion; an attempt to eventually corner global ad markets under the banner of altruism. The country has been trying to craft net neutrality rules, and has slowly realized that whatever neutrality looks like, Facebook deciding what content Indians get access to isn’t it.

    • Comcast Cap Blunder Highlights How Nobody Is Ensuring Broadband Meters Are Accurate

      For years now we’ve noted that while broadband ISPs rush toward broadband caps and usage overage fees, nobody is checking to confirm that ISP meters are accurate. The result has been user network hardware that reports usage dramatically different from an ISPs’ meters, or users who are billed for bandwidth usage even when the power is out or the modem is off. Not only have regulators historically failed to see the anti-innovation, anti-competitive impact of usage caps, you’d be hard pressed to find a single official that has even commented on the problem of inaccurate broadband usage meters.

  • Intellectual Monopolies

    • Copyrights

      • El Paquete Semanal: How Offline Piracy Flourishes in Cuba

        For more than a decade many Cubans have been pirating the latest entertainment without a proper connection to the Internet. Instead, they have built their own person-to-person distribution network to share a weekly package of pirated material: El Paquete Semanal.

]]>
http://techrights.org/2015/12/28/linux-4-4-rc7-released/feed/ 0
Richard Stallman and Eben Moglen on the Microsoft-Red Hat Deal http://techrights.org/2015/11/30/redhat-microsoft-patent-agreement-fsf-replies/ http://techrights.org/2015/11/30/redhat-microsoft-patent-agreement-fsf-replies/#comments Mon, 30 Nov 2015 11:56:29 +0000 http://techrights.org/?p=86673 Richard Stallman and Eben Moglen
Photo source: Professor Conrad Johnson

Summary: Founder of Free software and author of the GPL (respectively) comment on what Microsoft and Red Hat have done regarding patents

WE FINALLY GOT some feedback regarding the baffling patent agreement which seemingly affects every user of GNU/Linux. We got this feedback from Stallman and (indirectly) Moglen, two of the Free software world’s most prominent individuals, especially when it comes to the GPL (GNU Public Licence/License).

Coverage of the Red Hat-Microsoft patent agreement can be found in [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13]. We sought feedback from Red Hat and spoke to low(er) level people for weeks, without ever hearing back from high-level management. After weeks of trying and waiting we ended up asking legal professionals to examine whatever legal contracts — even if under NDA or some other secrecy clauses that legally-binding deals may have — were involved. We first wrote to the FSF as follows:

Dear FSF licensing folks,

As discussed earlier in IRC (freenode), I have been pursuing answers from Red Hat regarding an urgent matter. I previously interviewed their CEO regarding patents and last week I spoke to a fairly senior person from Red Hat (unnamed for his own protection), for the third time this month. I wrote about 10 articles on this subject and it led to others writing about it as well, including some prominent bloggers.

“We need to understand what Red Hat agreed on with Microsoft on as Microsoft can use this behind closed doors against other companies, for pressure/leverage.”To put it concisely, Red Hat signed a deal with Microsoft which not only involved technical work but also what they call patent “standstill”. Who is this “standstill” for? Apparently Red Hat and its customers. I strongly doubt, especially in light of Alice v. CLS Bank, that a “standstill” should be needed. Red Hat does not threaten to sue Microsoft, whereas Microsoft did in the past threaten Red Hat (even publicly). This leaves those outside Red Hat in an awkward position and ever since this deal I have taken note of at least two companies being coerced by Microsoft using patents (over “Android” or “Linux” [sic]) or sued by one of its patent trolls, e.g. Intellectual Ventures. This isn’t really a “standstill”. It’s more like the notorious “peace of mind” that Novell was after back in 2006.

Red Hat has also admitted to me that it is still pursuing some software patents in the USPTO — a fact that does not surprising me, especially given the soaring market cap of RHT and the growing budget. This serves to contradict what people like Rob Tiller say to the courts; it shows double standards and no principled lead by example.

“The analysis and the voice of the FSF may be needed at this stage.”I have asked the FSF’s Joshua if it had looked into the patent agreement between Red Hat and Microsoft. Their lawyers in this case, Mr. Piana and Mr. Tiller (probably amongst others whom we don’t know about yet), would probably claim and even insist that it’s GPL-compatible, but the wording in the FAQ make it look exclusionary and there’s no transparency, so one cannot verify these claims.

We need to understand what Red Hat agreed on with Microsoft on as Microsoft can use this behind closed doors against other companies, for pressure/leverage. I am genuinely worried and fellow journalists who focus on GNU/Linux (Sean Michael Kerner for instance) tell me that they are too.

The analysis and the voice of the FSF may be needed at this stage. I have politely urged Red Hat for a number of weeks to become more transparent, whereupon some in the company said they had escalated these requests, but evidently nothing is being done, hence I feel the need to turn to the FSF.

I would gladly provide additional information that I have upon request.

With kind regards,

“In concrete terms,” Stallman responded, “what did they agree to do?”

“It is effectively a technical collaboration,” I told him, “which also involves a ceasefire regarding patents.”

“It is impossible to discuss whether it is good or bad,” he said, “until we know what it is.”

“We know too little about the patent aspects,” I explained.

Referring to Red Hat’s FAQ, Stallman said that I “seem[ed] to be talking about text I [Stallman] have not seen.”

To quote the relevant part for readers:

4. Does the new partnership address patents?

Red Hat and Microsoft have agreed to a limited patent arrangement in connection with the commercial partnership for the benefit of mutual customers.

The heart of the arrangement is a patent standstill that provides that neither company will pursue a patent lawsuit or claim against the other or its customers, while we are partnering. Neither company acknowledged the validity or enforceability of the other’s intellectual property; it is not a patent license or a covenant not to sue and no payment was made or will be made for intellectual property.

The partnership is between commercial companies related to their common customer offerings, spurred by customer demand. Both parties carefully designed for FOSS licensing compliance in building the arrangement and each party’s relationship to the FOSS community stands on its own.

“Covering only customers and not downstream users,” Stallman said, “it is not a good thing, but it may not do a lot of harm.”

“Covering only customers and not downstream users is not a good thing, but it may not do a lot of harm.”
      –Richard Stallman
I responded by saying “I hope that a thorough look into it will help remove uncertainty and get some hard answers. Right now it’s too vague or me and some fellow developers to conclude anything from.”

Days ago I asked whether “there been any progress on this case” because “I just want[ed] to be sure that licensing is looking for answers regarding the matter.”

Stallman, by that stage, seemed to have already spoken to a colleague and friend. “Eben Moglen,” he explained, “told me it doesn’t violate GPLv3. Other than getting that information, I don’t know what progress we could hope for.”

Well, as GPLv3 co-authors, their take on this sure counts. We therefore got an answer without taking a look at the contract itself (they had made access to it highly privileged information).

Assuming the case won’t go any further than this, we believe it helps set the record straight on the Microsoft-Red Hat situation.

]]>
http://techrights.org/2015/11/30/redhat-microsoft-patent-agreement-fsf-replies/feed/ 0
Links 23/10/2015: New Verifone POS Suite Runs Linux, BlackBerry to Ship Linux November 6th http://techrights.org/2015/10/23/blackberry-to-ship-linux/ http://techrights.org/2015/10/23/blackberry-to-ship-linux/#comments Sat, 24 Oct 2015 00:02:56 +0000 http://techrights.org/?p=85666

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Open source design is ugly, here’s why

    In particular, Braithwaite said open source projects need design help in three key areas: User Experience, Branding, and Visual User Interface. But recruiting them isn’t going to be easy, Braithwaite said, because open source developers haven’t created an atmosphere where designers can feel like they’re part of a community. Open source communities can feel “highly ­exclusive,” Braithwaite said, adding: “It feels like a cool kids’ club that (designers) are not a part of ­ or maybe a really nerdy kids’ club.” Developers need to help motivate designers, he said.

  • Open source lessons for synthetic biology

    However, there are significant differences between the acceptance of open source software and open source biology, primarily boiling down to regulation and safety issues (after all, a badly written program can crash your computer, but a badly formed bacteria can kill you). The number of regulations that need to be followed when legally producing a transgenic organism are immense, particularly in ensuring that they are both non-harmful and unlikely to spread throughout the wild. These regulatory — and thus financial — burdens severely limit the degree to which any individual biohacker can take their ideas and develop them. Note, however, that this is individual biohackers — larger firms can naturally afford to bring developments through this stage to market. Can a larger firm thus make money from open source biology? We believe so, provided the company uses a method similar to Red Hat, Google, or Tesla, in using the open source component to drive customers toward their own market strength — for example, by releasing blueprints and software for lab automation, then selling that equipment and support.

  • TastyIgniter: An Open Source Platform to Manage a Restaurant

    Say you own a restaurant and you are ready to expand the reach of your services. You are thinking about incorporating online table reservations and ordering into your services but you have no idea what it entails. You like the idea but you don’t know how to code a website. There’s software you can install that will take care of all of that.

    What’s more? The software has features to aid kitchen management, customer and staff management, store management and internationalisation already built in.

    And it is free.

  • Swarm v. Fleet v. Kubernetes v. Mesos

    Most software systems evolve over time. New features are added and old ones pruned. Fluctuating user demand means an efficient system must be able to quickly scale resources up and down. Demands for near zero-downtime require automatic fail-over to pre-provisioned back-up systems, normally in a separate data centre or region.

  • Events

    • IoT and open source contributions keynote at All Things Open 2015

      One of my favorite things about the keynotes at All Things Open this year was that attendees didn’t have just one great speaker to listen to each morning—we had a few. I enjoyed hearing multiple stories and many insights from dynamic speakers all in one sitting.

    • FSF Blogs: Videos and photos from the FSF30 celebrations now available

      First, watch this video of FSF general counsel and Software Freedom Law Center President and Executive Director Eben Moglen’s talk, “FSF from 30 to 45,” given at the User Freedom Summit held at Lesley University in Cambridge, MA. Moglen looks ahead to the crucial issues facing the free software movement in its next fifteen years.

      At the 30th anniversary party held in Boston, we had two recorded greetings from friends of the FSF who were unable to attend in person. One was by FSF member, BoingBoing co-editor, and EFF fellow Cory Doctorow. The other greeting was from computer scientist and science fiction writer Vernor Vinge.

      Check out the video of the performance of the Free Software Song and the Bulgarian folk song that inspired it, Sadi Moma Bela Loza, by members of the Boston Bulgarian singing groups Divi Zheni and Zornitsa. We will have more videos of other guest toasts and RMS’s address soon.

    • Ubucon Slated for SCALE 14X, Bassel Offered MIT Job & More…

      I don’t say enough good things about Ubuntu, so when they give me reason to, I’m on it. I also don’t talk enough about openSUSE either; good, bad or indifferent.

      [...]

      But Wait, There’s More: Speaking of SCALE 14x, you still have a week to submit a talk for the first-of-the-year Linux/FOSS show in the world (now before linux.conf.au and FOSDEM in 2016, by some stroke of scheduling luck). SCALE 14x is four days of Peace, Love and Linux at the Pasadena Convention Center from Jan. 21-24, 2016…Getting the computers to the kids is no easy feat, even when the truck is working: My good friend and FOSS Force colleague (not to mention Houston Astros fan) Ken Starks has an Indiegogo campaign to replace the now-deceased delivery vehicle for Reglue (Recycled Electronics and GNU/Linux Used for Education). Throw in a few bucks if you can.

  • Web Browsers

    • Mozilla

      • Mozilla commits $1M to support free open-source software projects

        Mozilla, the company behind the Firefox browser, announced today that it has allocated $1 million to dole out grants to support free and open-source software projects around the world.

      • Mozilla Launches Open Source Support Program

        Today Mozilla is launching an award program specifically focused on supporting open source and free software. Our initial allocation for this program is $1,000,000. We are inviting people already deeply connected to Mozilla to participate in our first set of awards.

  • SaaS/Big Data

    • How CERN uses OpenStack to drive their scientific mission

      One of the world’s largest scientific organization is using OpenStack to understand what makes up everything in our universe. CERN runs one of the most collaborative scientific projects on Earth, responsible for producing enormous amounts of data on a routine basis to make Nobel prize winning discoveries such as the Higgs boson has some pretty unique computing requirements.

    • OpenStack Security Groups using OVN ACLs

      It’s worth looking at how this has been implemented with OVS in the past for OpenStack. OpenStack’s existing OVS integration (ML2+OVS) makes use of iptables to implement security groups. Unfortunately, to make that work, we have to connect the VM to a tap device, put that on a linux bridge, and then connect the linux bridge to the OVS bridge using a veth pair so that we have a place to implement the iptables rules. It’s great that this works, but the extra layers are not ideal.

    • Oracle Puts OpenStack into Docker Containers

      There is a misconception among some people that Docker containers and OpenStack are competitive technologies. The truth is the exact opposite, and in fact, Oracle is now providing the best proof yet by using Docker images as a mechanism to actually install an OpenStack cloud.

    • OpenStack Addresses Network Orchestration Layer

      While the OpenStack community likes to present a unified front to the outside world, inside the various projects that make up the OpenStack framework, there is a lot of frustration with the Neutron networking component of OpenStack. Much of that frustration stems from the fact that after five years of effort Neutron still doesn’t scale particularly well. As such, many of the organizations that have embraced OpenStack wind up swapping in a commercial network layer of software to replace Neutron.

    • Exposing the Truth About OpenStack Cloud Deployments

      Lured by the siren song of better business agility and accelerated innovation, an increasing number of companies are considering or have already deployed private clouds as part of their IT strategy. Since emerging in 2010 as an open-source initiative to help organizations build cloud services on industry-standard hardware, OpenStack has garnered much attention, but its adoption in production environments has been tempered by an assortment of perceived limitations, both real and imagined.

    • Mapr Adds Apache Drill 1.2 to Its Hadoop Distro

      MapR announced it has added Apache Drill 1.2 to its Apache Hadoop distribution for additional analytics support.

    • MapR Delivers Apache Drill 1.2 in its Hadoop Distribution

      MapR Technologies which offers a popular distribution of Apache Hadoop that integrates web-scale enterprise storage and real-time database capabilities, has announced the availability of Apache Drill 1.2 in its Distribution as well as a new Data Exploration Quick Start Solution. The addition of Drill 1.2 comes right on the heels of MapR adding Apache Spark to its distribution.

  • Databases

    • Oracle MySQL 5.7 Database Nears General Availability

      Ahead of Oracle’s OpenWorld conference in 2013, the company first began to talk about a major new release of its open-source MySQL database. Now two years later, development on MySQL 5.7 is compete and general availability is set for October 26.

  • Oracle/Java/LibreOffice

    • Template Management in LibreOffice 5

      If you’re a LibreOffice power user, you’ve probably ventured into the realm of templates. But, if you’ve upgraded to LibreOffice 5, you’ve probably noticed a few minor changes to the way this feature is managed. It’s not a profound or game-changing shift, but a shift nonetheless.

      Because many people overlook the template feature in LibreOffice, I thought it would be a good idea to approach template management for LibreOffice 5 as if it were a new feature…and one that should be considered a must-have for all types of users. So, sit back and prepare to discover that feature which will make your time with LibreOffice exponentially easier.

    • LibreOffice Developers Working on a New Toolbar Layout

      The LibreOffice developers are working on a new interface that aims to unify all the different toolbars. This is still under development, and it will be provided as an option and not as default.

    • UK licence deal to boost use of open source office

      Public administrations in the UK can get professional support for using LibreOffice, the open source office alternative, thanks to a licence deal by the UK’s central procuring agency Crown Commercial Service with Collabora, a UK-based ICT service provider.

    • First bug hunting session for LibreOffice 5.1

      Those who cannot join during the bug hunting session are always welcome to help chasing bugs and regressions when they have time. There will be a second bug hunting session in December, to test LibreOffice 5.1 Release Candidate 1.

    • LibreOffice 5.1 Is Working On New Features For A February Debut

      LibreOffice 5.1 is planned for release in early February while to catch some bugs early they’re organizing the first bug hunt from 30 October to 1 November. Builds of LibreOffice 5.1 Alpha 1 are already available for testing. More details via The Document Foundation’s blog.

    • finding UI crashes by fuzzing input events with american fuzzy lop

      As mentioned previously I’ve been experimenting using afl as a fuzzing engine to fuzz a stream of serialized keyboard events which LibreOffice reads and dispatches.

  • BSD

    • Deweloperzy OpenBSD: Dmitrij D. Czarkoff

      In 2005 I tried OpenBSD for the first time. I still recall how I was impressed by the fact that I only needed ifconfig (as opposed to ifconfig, iwconfig and wpa_supplicant on Linux) to configure my wireless network card.

    • Deweloperzy OpenBSD: Marc Espie

      Funny story actually. It was about 20 years ago, and I didn’t have any Internet access at home. I wanted to play with some Unix on my home Amiga, as I didn’t have root access on the suns at University. Getting anything on my Amiga was complicated, as I had to transfer everything through floppies. Turned out OpenBSD was the only OS with sane and clear instructions. NetBSD gave you so many different choices, I couldn’t figure out which one to follow, and Linux was a jungle of patches.

    • W^X enabled in Firefox port

      After recent discussions of revisiting W^X support in Mozilla Firefox, David Coppa (dcoppa@) has flipped the switch to enable it for OpenBSD users running -current.

    • Google Continues Working On CUDA Compiler Optimizations In LLVM

      While it will offend some that Google continues to be investing in NVIDIA’s CUDA GPGPU language rather than an open standard like OpenCL, the Google engineers continue making progress on a speedy, open-source CUDA with LLVM.

  • Openness/Sharing

Leftovers

  • What Is the Most Dangerous Gang in Prison?
  • Mythbusters hosts say 14th season will be last, announce farewell tour

    In 2016, Mythbusters hosts and stars Jamie Hyneman and Adam Savage will warn viewers not to try this at home for the last time. The duo announced on Wednesday that the Discovery Channel TV series’ 14th season, which begins airing January 9, will be its last.

  • Angry Birds’ Rovio Cuts 213 Jobs, Axes Learning To Refocus On Games And Video

    After announcing in August that it would cut up to 260 jobs, Rovio — maker of the Angry Birds games — today released details of the final number: the Finland-based company is letting go of 213 employees, around 25% of staff, as it continues to restructure and cut away unprofitable parts of its business. The whole of the company is being affected, with the exception of those working on the production of The Angry Birds Movie in the U.S. and Canada.

  • The Chinese Internet Wants To Know About David Cameron And Pigs

    The state visit to the UK by president Xi Jinping has been seen as a success in China, although ordinary people on Weibo keep asking David Cameron about pigs.

  • Security

    • Fitbit can allegedly be hacked in 10 seconds

      Fitness-tracking wristband Fitbit, which has sold more than 20 million devices worldwide, and tracks your calorie count, heart rate and other highly personal information, can be remotely hacked, according to research by Fortinet. This gives hackers access to the computer to which you sync your Fitbit.

    • Adobe releases emergency patch for Flash zero-day flaw
    • Adobe confirms major Flash vulnerability, and the only way to protect yourself is to uninstall Flash

      Just one day after Adobe released its monthly security patches for various software including Flash Player, the company confirmed a major security vulnerability that affects all versions of Flash for Windows, Mac and Linux computers. You read that correctly… all versions. Adobe said it has been made aware that this vulnerability is being used by hackers to attack users, though it says the attacks are limited and targeted. Using the exploit, an attacker can crash a target PC or even take complete control of the computer.

    • Western Digital self-encrypting hard drives riddled with security flaws

      Several versions of self-encrypting hard drives from Western Digital are riddled with so many security flaws that attackers with physical access can retrieve the data with little effort, and in some cases, without even knowing the decryption password, a team of academics said.

      The paper, titled got HW crypto? On the (in)security of a Self-Encrypting Drive series, recited a litany of weaknesses in the multiple versions of the My Passport and My Book brands of external hard drives. The flaws make it possible for people who steal a vulnerable drive to decrypt its contents, even when they’re locked down with a long, randomly generated password. The devices are designed to self-encrypt all stored data, a feature that saves users the time and expense of using full-disk encryption software.

  • Transparency Reporting

    • WikiLeaks publishes e-mail from CIA director’s hacked AOL account

      WikiLeaks has released a cache of e-mails which the site says were retrieved from CIA Director John Brennan’s AOL account.

      The e-mails include Brennan’s SF86, a form that he had to fill out to get his current position and security clearance. The form, from 2008, “reveals a quite comprehensive social graph of the current Director of the CIA with a lot of additional non-governmental and professional/military career details,” according to WikiLeaks’ description of the document.

    • WikiLeaks Is Publishing the CIA Director’s Hacked Emails

      WikiLeaks may describe itself as an outlet for whistleblowers, but it’s never hesitated to publish stolen documents offered up by a helpful hacker, either. So it’s no surprise that it’s now leaked the pilfered files of the CIA’s director, John Brennan.

      On Wednesday, the secret-spilling group published a series of selected messages and attachments from a trove of emails taken from Brennan’s AOL account. Though WikiLeaks hasn’t revealed its source, there’s little doubt the files were handed off by the self-described teen hackers calling themselves CWA or “Crackas With Attitude,” who claim to have hacked Brennan’s AOL account through a series of “social engineering” tricks.

  • Finance

  • PR/AstroTurf/Lobbying

    • Even corporate America wants campaign finance reform to stop crony capitalism

      Political corruption is eating our democracy out from the inside. Most Americans know that. But democratic and economic health can’t be easily disentangled. As it diminishes our public sphere and drowns out the myriad of citizen voices, it also sucks the energy and vitality from our economy. This causes pain to business owners.

      According to a recent report from the Committee on Economic Development, an old, white-shoe non-partisan organization that came out of the aftermath of World War II (and was a booster for the Marshall Plan), the United States economy is increasingly represented by crony capitalism, not competitive capitalism.

    • Fox Guest: Black Lives Matter Is A “Terrorist Group”
  • Privacy

    • Facebook Is The Borg

      For days, I had mysterious annoying bell dings on my Mac. It turns out that Facebook turned on sound notifications — entirely without my doing — for when people comment on posts.

    • Why Vietnam’s Communists Are Learning to Like Facebook

      Vietnam’s Communist government, which once blocked Facebook Inc., is now embracing the online tools of capitalism by establishing its own page on the social media website in order to reach young Internet-savvy users who turn to it for news and discourse.

    • The scientists encouraging online piracy with a secret codeword

      In many countries, it’s against the law to download copyrighted material without paying for it – whether it’s a music track, a movie, or an academic paper. Published research is protected by the same laws, and access is generally restricted to scientists – or institutions – who subscribe to journals.

      But some scientists argue that their need to access the latest knowledge justifies flouting the law, and they’re using a Twitter hashtag to help pirate scientific papers.

    • EFF’s Let’s Encrypt has support from super browser brothers

      A SECURITY CERTIFICATE EFFORT involving the Electronic Frontier Foundation (EFF), Mozilla, Cisco, Akamai, IdenTrust and the University of Michigan has lived up to promises to be in order by 2015.

    • Proposed German law: telecoms must store customer data on airgapped servers

      The German Bundestag (parliament) has passed a controversial law requiring telecoms and Internet companies to store customers’ metadata and to make it available to law enforcement agencies investigating “severe crimes.” Specifically, “phone providers will now have to retain phone numbers, the date and time of phone calls and text messages, and, in the case of mobile phones, location (approximated through the identification of cell phone towers).” In addition, “Internet providers are required to save the IP addresses of users as well as the date and time of connections made,” a post on the Lawfare blog explains.

    • DHS now needs warrant for stingray use, but not when protecting president

      As expected, the Department of Homeland Security (DHS) has released its own stingray requirements. Agents must now obtain a warrant prior to deploying the secretive surveillance tool as part of criminal investigations. This new policy comes over a month after the Department of Justice released its own similarly policy.

      The new rules will apply to DHS, as well as agencies that fall under its umbrella, such as the Secret Service, Customs and Border Protection, Immigration and Customs Enforcement.

    • CISA Moves Forward: These 83 Senators Just Voted To Expand Surveillance

      Well, it’s not a huge surprise that it moved forward, but the faux “cybersecurity” bill, which is actually a surveillance bill in disguise, CISA, has moved forward in the Senate via an overwhelming 83 to 14 vote. As we’ve discussed at length, while CISA is positioned as just a “voluntary” cybersecurity information sharing bill, it’s really none of those things. It’s not voluntary and it’s not really about cybersecurity. Instead, it’s a surveillance bill, that effectively gives the NSA greater access to information from companies in order to do deeper snooping through its upstream collection points. Even the attempts to supposedly “clarify” the language to protect data from being used for surveillance shows that the language is deliberately written to look like it does one thing, while really opening up the ability of the NSA and FBI to get much more information.

  • Civil Rights

    • Critics say air marshals, much wanted after 9/11, have become ‘bored cops’ flying first class

      At a price tag of $9 billion over the past 10 years, Duncan called the program “ineffective” and “irrelevant.”

      [...]

      Duncan acknowledged at an oversight committee last month that the program “has come to be a symbol of everything that’s wrong with the DHS, when 4,000 bored cops fly around the country First Class, committing more crimes than they stop.”

    • New ‘Car Safety Bill’ Would Make Us Less Safe, Block Security Research And Hinder FTC And Others

      The House Energy and Commerce Committee is pushing an absolutely terrible draft bill that is supposedly about improving “car safety.” This morning there were hearings on the bill, and the thing looks like a complete dud. In an era when we’re already concerned about the ridiculousness of how copyright law is blocking security research on automobiles (just as we’re learning about automakers hiding secret software in their cars to avoid emissions testing), as well as questions about automobile vulnerabilities and the ability to criminalize security research under the CFAA (Computer Fraud and Abuse Act), this bill makes basically all of it worse.

    • Sheldon Whitehouse Freaks Out, Blames ‘Pro-Botnet Lobby’ For Rejecting His Terrible CFAA Amendment

      As we mentioned yesterday, one of the (many) bad things involved in the new Senate attempt to push the CISA “cybersecurity” bill forward was that they were including a bad amendment added by Senator Sheldon Whitehouse that would expand the terrible Computer Fraud and Abuse Act, a law that should actually be significantly cut back. Senator Ron Wyden protested this amendment specifically in his speech against CISA. And, for whatever reason, Whitehouse’s amendment has been pulled from consideration and Whitehouse is seriously pissed off about it.

    • Why Internet Users Should be Very Angry about the TPP

      The Trans-Pacific Partnership (TPP) exploded onto the Canadian media landscape last week, when negotiators from the 12 participating countries finally agreed on a deal. Even if you were paying attention, you might not have heard about the impacts on the Internet, since much of the focus was on the farming and auto sectors. But the TPP is about a lot more than dairy and cars – it’s also about our fundamental right to free expression.

    • Eritrean mistakenly killed opens old wounds in Israel

      Images of an Eritrean asylum seeker lying in a pool of blood as an angry mob kicks him has renewed debate in Israel over alleged racism and how to respond to violence.

      Habtom Zarhum, 29, was shot by a security guard this week at a bus station in the southern city of Beersheba after being mistaken for an assailant in an attack that killed an Israeli soldier.

      He later died of his injuries.

      Footage of Zarhum bleeding as an angry mob rains blows on his head and torso has spread rapidly on social media, prompting soul searching among Israelis over their response to a wave of attacks as well as their treatment of African migrants.

      One photo posted on Facebook shows Zarhum smiling with colleagues at a nursery where he worked.

    • Chase Madar on Prosecuting Police

      This week on CounterSpin: Nearly a year after 12-year-old Tamir Rice was killed by a Cleveland police officer, the county prosecutor is giving signs that he won’t be strenuously encouraging indictments, deflating the hopes of many that the officer, Timothy Loehmann, will face any punishment at all for the killing.

    • Rush Limbaugh Applauds Himself For Coining The Term “Feminazi”
  • YouTube/Internet

    • You Can Now Pay to Watch YouTube Without Ads

      Dubbed YouTube Red, the new service will offer ad-free versions of all current YouTube videos, as well as access to music streaming and additional exclusive content from some of the site’s top creators. It will cost $9.99 per month and launch on Oct. 28.

    • YouTube Red Doesn’t Want to Be Compared to Netflix

      YouTube believes its content, stable of talent and audience makes it an entirely new player in paid streaming.

    • Red Dawn

      An inside look at YouTube’s new ad-free subscription service

    • Europe’s ‘Net Neutrality’ Could Allow Torrent and VPN Throttling

      Next week the European Parliament will vote on Europe’s new telecoms regulation which includes net neutrality rules. While the legislation is a step forward for many countries, experts and activists warn that it may leave the door open for BitTorrent and VPN throttling if key amendments fail to pass.

  • Intellectual Monopolies

    • Copyrights

      • Google Opposes Whole-Site Removal of “Pirate” Domains

        Google is rejecting calls from copyright holders to remove entire domain names from Google search based on copyright infringements. In a letter to the U.S. Government the company points out that this would prove counterproductive and lead to overbroad censorship.

]]>
http://techrights.org/2015/10/23/blackberry-to-ship-linux/feed/ 0
Links 12/10/2015: Linux 4.3 RC5, Parsix GNU/Linux 8.0 Reviewed http://techrights.org/2015/10/12/parsix-gnu-linux-8-0-reviewed/ http://techrights.org/2015/10/12/parsix-gnu-linux-8-0-reviewed/#comments Tue, 13 Oct 2015 02:06:14 +0000 http://techrights.org/?p=85379

GNOME bluefish

Contents

GNU/Linux

  • Don’t blame Linux for the XOR botnet

    The real culprits are the irresponsible vendors behind cheap broadband routers and their clueless customers

  • 2015 Indonesia Linux Conference Talks About Digital Forensic

    The 2015 Indonesia Linux Conference (ILC) that is held in Tegal, Central Java starting from October 10 to 11 is set to exhibits variety of Linux application. One of interesting application is a mobile digital forensic application that have been used by the police to assist investigation by detecting criminals’ phone and sim cards.

    “Ditigal forensic is aimed to investigate cell phone and Sim Cards, Said Dedy Hariyadi from Ubuntu Indonesia community on Friday, October 9.

  • Desktop

    • Survey: Users love their desktops more than their cheapo tablets

      In the same survey last year by ACSI, tablets scored 80 on a 100-point scale, just one point behind desktops at 81. This year, consumers rated tablets at at 75—alongside laptops, which also fell this year, the survey said. The survey criteria require that the respondent purchased a new personal computer in the last years.

  • Server

    • The 5 states of the modern sysadmin

      I think there’s (at least) 5 states you might find yourself in as a sysadmin in these days:

      Day to day things that aren’t (yet) automated.

      Automating and designing for the future.

      Fires and outages

      Interruptions

      Time to dream

  • Kernel Space

    • Linux 4.3-rc5

      The 4.3 release cycle continues to be fairly smooth – knock wood.
      There’s nothing particularly worrying here: we had some annoying
      fallout from the new strscpy stuff (it’s not actually *used* anywhere
      yet, but we had build failures on some architectures), and a vfs layer
      change uncovered an ancient and fascinating ext[34] bug, but on the
      whole things look pretty normal. It’s the usual “lots of small fixes
      to drivers and architecture code, with some filesystem updates thrown
      in for variety”. The appended shortlog gives an overview of the
      details.

      Things also seem to be calming down nicely, although since there was
      no network pull this week, we might have a bump from that next rc.

      Anyway, if you haven’t tried a recent kernel lately, feel free to hop
      right in – it all looks pretty good.

      Linus

    • BBC bypasses Linux kernel to make streaming videos flow

      Back in September, The Register’s networking desk chatted to a company called Teclo about the limitations of TCP performance in the Linux stack.

      That work, described here, included moving TCP/IP processing off to user-space to avoid the complex processing that the kernel has accumulated over the years.

      [...]

      The Beeb boffins started by getting out of the kernel and into userspace, which let them write what they call a “zero-copy kernel bypass interface, where the application and the network hardware device driver share a common set of memory buffers”.

    • Linux golden age threatened by bug army

      Golden ages are normally brought to an end by a rebellion of giants, titans or plagues. Jim Zemlin, executive director of the Linux Foundation said that Linux will be killed off by giant, titanic plagues of security bugs.

      Several high profile zero-day vulnerabilities in popular open source technologies last year served not only to show the importance of open source to the internet and IT world, but how how badly it projects were under-resourced.

    • Coreboot Now Supports The Sandy Bridge MacBook Air

      With the latest Git code pushed into Coreboot this morning, the Apple MacBook Air 4,2 is now supported.

    • Linux Kernel 4.3 RC5 Uncovers an Ancient and Fascinating EXT3/EXT4 Bug
    • Linux 4.3-rc5: The Cycle Is Going Smooth
    • Learn it Faster: The Complete Linux Kernel in a Single MapLearn it Faster: The Complete Linux Kernel in a Single Map

      The internet runs on Linux, everybody knows this fact. The Linux Kernel is one of the most complex and popular open source projects. If you wish to learn the basics, there is tons of material available online. Still, the core of the Linux kernel is a subject difficult to understand.

    • Linux 4.2 vs. 4.3 Kernel Benchmarks On Other Systems

      Last week I delivered some Linux 4.3 Git kernel benchmarks on Intel Skylake comparing it to Linux 4.2 stable. However, for those not yet on Intel’s latest generation of processors, here are some Linux 4.2 vs. Linux 4.3 benchmarks with older hardware.

    • Structural and semantic deficiencies in the systemd architecture for real-world service management, a technical treatise

      You’re probably wide-eyed and gnawing at your teeth already.

      I was finally tempted into writing this from a Hacker News discussion on “Debian Dropping the Linux Standard Base,” where some interest was expressed in reading an architectural critique of systemd.

      To the best of my knowledge, this article – though it ultimately ended up more of a paper in article format, is the first of its kind. This is startling. It’s been over 5 years of systemd, and countless instances of religious warfare have been perpetrated over it, but even as it has become the dominant system in its area, there really hasn’t been a solid technical critique of it which actually dissects its low-level architecture and draws remarks from it.

      In fact, much more worthwhile has been written on the systemd debate than on systemd itself. Among these include Judec Nelson’s “systemd: The Biggest Fallacies” and my own later “Why pro-systemd and anti-systemd people will never get along”.

      I am very wary of publishing this, due to being keenly aware of how these discussions descend into an inferno with the same dead horse talking points, even in cases where the author makes relatively salient or previously unexplored points. The tribal instinct to show where one stands kicks in and people begin slinging mud about init systems, even if it’s tangential to whatever they’re supposed to be commenting on.

    • Good Software, Bad Behavior

      You might say that those who are critical of the behavior on the list are not grateful for their work, and to make that assumption is a laughable mistake. It’s not the work under indictment, once again it’s the attitudes. The prevailing caustic attitude may change and it may not, but if the latter course is chosen, then the list continues in its cancerous way at its own peril.

    • Graphics Stack

      • Performance-Boosting DCC Support Being Worked On For RadeonSI VI GPUs
      • Intel Haswell Graphics Have A Few Gains With Ubuntu 15.10

        I ran some quick tests of Ubuntu 15.04 vs. 15.10 out-of-the-box to show the performance difference between the Linux 3.19 + Mesa 10.5 stack against the upcoming Linux 4.2 + Mesa 11.0 powered distribution. An Intel Core i7 4790K processor with HD Graphics 4600 was used for this weekend’s tests.

      • NVIDIA 358.09 Beta Prepares For DRM Mode-Setting Interface

        The first public beta in NVIDIA’s 358 driver series for Linux, BSD, and Solaris is available! Building off the NVIDIA 355 series, the 358 series adds in more pieces of the puzzle for interfacing with DRM/KMS and continues stepping closer to Mir/Wayland support.

      • Nvidia 358.09 Beta Linux Driver Brings a New Kernel Module

        A new Nvidia Beta driver has been released, and developers have added quite a few OpenGL changes and improvements, among other things.

        The Nvidia developers have just pushed a new Beta driver out the door and this time it’s full of all kinds of OpenGL updates and fixes. It will be a while until all of these changes make their way onto the stable branch of the drivers, but these are pretty important, and it won’t take all that long.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • KDE Plasma 5.5 Promises a Lot of Cool New Features

        The KDE developers are already considering what they need to do to improve the Plasma desktop after the 5.4.2 launch, and they’ve shared some of the features that are going to be made available.

      • KDE Frameworks 5.15.0 Has Just Landed in Kubuntu 15.10 (Wily Werewolf)

        The Kubuntu developers, through Marco Parillo, announced this past weekend that the they updated the KDE Frameworks package in the development version of Kubuntu 15.10 to version 5.15.0, which was released on October 10, 2015.

      • KDE PIM Sprint in Toulouse

        The KDE PIM spring sprint was held in Toulouse, France in March this year in Makina Corpus offices.

        The sprint was very important, because the team needed to decide how to continue from the current situation. At the previous sprint in Munich in November when Christian and Aaron introduced their new concept for next version of Akonadi it was decided to refocus all our efforts on working on that, which meant switching to maintenance mode of KDE PIM for a very long time and then coming back with a big boom. In Toulouse we re-evaluated this plan and decided that it is not working for us and that it will be much better for the project as well as the users if we continue active development of KDE PIM instead of focusing exclusively on the “next big thing” and take the one-step-at-the-time approach.

      • Interview with Pierre Geier

        If I remember correctly I’ve known about Krita since 2005, I guess, when I used KDE and there was this office stuff and a drawing program, which I never used. Until early 2015 I used only MyPaint and GIMP. And now I’ve been using Krita since April 2015.

      • Some Of The Features Coming To KDE Plasma 5.5

        While KDE developers are increasingly working on their Plasma mobile plans, there still are new changes coming to the KDE desktop. For the upcoming Plasma 5.5 release, there is going to be improvements to the user-switcher including a new prompt and new plasmoid, the KDE Color Picker plasmoid has returned, the Solid Device Auto Mounter has also been restored, and there are other plasmoid improvements and smaller changes throughout.

      • KWrite on Mac

        It is still ugly, as scaled on my HiDPI display as the plist file is missing and it crashs on everything (aka open dialog) and has no icons.

    • GNOME Desktop/GTK

      • Star ratings in GNOME Software

        A long time ago, GNOME software used to show star ratings as popularity next to the application using the fedora-tagger application. This wasn’t a good idea for several reasons.

      • GNOME Files/Nautilus Search Is Finally Being Overhauled

        A Google Summer of Code student who worked on GTK+ and Nautilus has managed to overhaul the search feature of GNOME’s file manager.

        The new search feature built into Files/Nautilus is designed to be much more intuitive with new filters and more. The new code hasn’t yet been merged and still needs to be reviewed, but looks promising so far.

      • GNOME Software To Get A “Kudos” Rating System For Apps

        GNOME Software abandoned their “star rating system” over issues with abuse, lack of standardization by reviewers, and that package rating system really not working out. Now they’re going to introduce a “kudos” rating system.

      • GNOME Software Is Getting a New Rating System with Kudos

        The GNOME developers are preparing to reintroduce a rating system for GNOME Software, but nothing as simple as the old one. It will be a complex way of rating the applications so that users can make informed decisions.

      • Boston GNOME Summit update

        The first day was filled with discussions and planning, with one of the central topics being how to make gnome-builder, xdg-app and gnome-continuous play well together. You can find notes and conclusions from this discussion here.

      • GNOME Photos 3.18 App Gets Its First Hotfix Release Ahead of GNOME 3.18.1

        Earlier today, October 12, Debarshi Ray was happy to inform us all about the immediate availability of the first point release of his GNOME Photos 3.18 image viewer application for the soon-to-be-released GNOME 3.18.1 desktop environment.

      • View your GTK3 app or VM on the Web

        Ever wondered how to view gedit in a browser? It’s not a secret anymore, broadway is there for some time.

      • The new search for GNOME Files (aka Nautilus)

        As some (most? none? who knows =P) of you already know, last cycle I worked as a Google Summer of Code intern with Gtk+ and Nautilus. We saw the very positive results of it. And the picky eyes out there noticed that I wrote with these exact words: “While the project is over, I won’t stop contributing to Nautilus. Even with the interesting code, even with all the strange things surrounding it. Nautilus is like an ugly puppy: it may hurt your eyes, yet you still warmly love it.”

  • Distributions

  • Devices/Embedded

    • TI “Processor SDK” initially targets Sitara with Yocto and U-Boot

      TI has launched a “Processor SDK” based on a mainline LTS Linux kernel, U-Boot, a Yocto file system and Linaro tool chain, initially covering Sitara SoCs.

      Texas Instruments has introduced a Processor Software Development Kit based on Linux as well as its own TI-RTOS, that will eventually scale across multiple Sitara and DSP processors families. The first two SoC families supported by Processor SDK are the 720MHz, Cortex-A8 Sitara AM335x and the 1GHz, single-core Cortex-A9 Sitara AM437x. Both SoCs are notable for offering a PRU-ICSS (Programmable Real-Time Unit and Industrial Communication Subsystem), which comprises 32-bit microcontrollers that enable customization of I/O.

    • Linksys WRT1900ACS Router is Ready for Open Source Tinkering

      We still regard the Linksys WRT1900AC as one of the best and fastest routers available, though if you’re eyeing that model, there’s a new version available with more memory and a faster processor.

      It’s the WRT1900ACS, which is essentially an improved version of the WRT1900AC. The new model boasts a 1.6GHz dual-core processor, an upgrade over its predecessor’s 1.2GHz chip; 128MB of flash memory (same as before); 512MB of DDR3 RAM, which is two times as much as the WRT1900AC; and eSATA and USB ports.

    • Linux Foundation Takes on Real-Time Computing for Embedded Apps

      What’s the next step for open source in the embedded computing market? Google (GOOG), the Linux Foundation and other inaugural supporters of the Real-Time Linux Collaborative Project, which launched this month with a focus on the robotics, telecom, manufacturing, aviation, medical and similar industries, think kernel-level real-time support is the answer.

    • Phones

      • Android

        • Huawei Ascend P7 gets Android 5.1.1 indicating imminent rollout of Android M

          Users of Huawei’s flagship Ascend P7 now have lots to cheer as Android 5.1.1, the latest Lollipop build is now seeding to the handset across the world. Owners of the smartphone should notice the latest update via automatic OTA.

          As per a GSMArena report, Huawei Ascend P7 owners can check out the Android 5.1.1 OS update in the form of a 1.26GB size file. Those preferring to download manually can do so by checking out the official firmware section on Huawei’s website.

        • Fun with permissions: Why the change in Android 6.0 may make you repeat yourself

          In switching to a runtime permissions model in Android 6.0 — you’re no longer giving access to your data just by installing an app — developers can now more easily explain themselves. Sort of.

        • Google Android 6.0 Marshmallow: 5 new features you REALLY should know about

          Unfortunately the latest version of the hugely popular Android operating system is currently only available to those running a Nexus or Android One devices.

          Express.co.uk has provided a quick guide on how to upgrade your handset, here.

          If you are lucky enough to be running Marshmallow – here are FIVE new features and tweaks you should know about.

        • Pichai names Lockheimer SVP of Android, Chrome OS, Chromecast

          A member of the Google family since 2006, Lockheimer has been noted to be one of the more friendly faces among the roster of Android engineers. He has been held in high esteem by Pichai, who then also managed Android and Chrome before he was appointed to oversee all Google products last year. Although not as public a persona as Pichai, something that will of course be changing soon, Lockheimer has once in a while gone public about the direction that Android is heading to, like Google’s position on Android Auto and the future of Android in general. Most recently, Lockheimer setup an Reddit AMA thread to answer some of the more pressing questions about the newly announced Nexus 6P and Nexus 5X smartphones.

        • GranitePhone Security-Focused Android Smartphone Now Up for Pre-Orders

          The security-focused smartphone segment has seen a couple of launches from companies such as Silent Circle and Turing Robotic Industries. The security-focused Blackphone 2 smartphone (from Silent Circle), which was introduced back in March at MWC, went on sale recently. Meanwhile, price of the ‘unhackable, unbreakable, and waterproof’ smartphone, the Turing Phone (Turing Robotic Industries), was also revealed recently by the company.

        • Paranoid Android Development Team Taking A Breather

          One of Android’s greatest strengths is that it is open source and relatively easy to modify. This means that the source code may be taken by anybody and modified to suit their particular purpose. A great many handsets sold in China are Android-based, whereby the manufacturer has reinvented how Android works partially because until very recently, one could not access Google Services in China. We have also seen Amazon build their Fire tablets using Fire OS, which is based on Android. At the opposite end of the scale, we have also seen dedicated teams of developers over the planet building custom ROMs for Android devices. By a “custom ROM,” I mean a replacement for the software that runs your Android device. There are many reasons why people will install a custom ROM onto their handset or tablet, from wishing to experiment with different software, to circumventing restrictions placed on them by the stock software, or through wishing to optimize or change how the device performs.

        • 10 Android smartphones that feature laser autofocus cameras

          It took a while — longer than a year, actually — but the innovative laser autofocus system that first made its appearance on the LG G3 has actually made it to no less than nine other Android smartphones. We knew there was something to it ever since we saw the laser beams firing from the LG G3′s sensor and helping it focus quickly and accurately on objects from the scene. So it makes us feel especially cheerful that more manufacturers have discovered this technology for their own smartphones!

        • Use Cabinet to Manage Files on Your Android Device

          File management on Android is improving, but it’s still not great, and it can be frustrating trying to take control of exactly which files are saved and where they’re stored. Numerous third-party apps have rushed in to fill the gap but one of the best we’ve seen in recent times is Cabinet—it’s fast, feature-rich and a signed-up member of the Material Design club.

        • Linux Top 3: Quirky 7.2, NetBSD 7.0 and Android x86 5.1
        • Android 6.0 review: A small but significant bump for the world’s dominant OS

          All the big changes happened in Lollipop. Now it’s Marshmallow’s turn is to show the world how useful and personal Android can be.

        • Leak reveals a brand-new Android phone made by… Pepsi

          Wait, what? And why? A new leak has revealed that Pepsi — yes, that Pepsi — is making an Android phone. Android Headlines has spotted a listing for a new phone on a Chinese website called the Pepsi P1 that appears to be Pepsi’s first attempt at making its own smartphone. Despite selling for roughly $200, it looks like the device will have some decent specs.

        • 5 Reasons to Still Choose an Android Phone Over an iPhone

          Today, you’ll find a handful of Android smartphones that are every bit as beautiful, capable, reliable, and well-designed as the iPhone. In fact, there are plenty of reasons why people should be choosing Android phones over the iPhone.

        • A First Look at the Most Expensive Android Wear Watch Ever Made

          Intel and Tag Heuer have done tons of hyping for its still upcoming, $1,800 Android Wear watch. But after hearsay that a November launch was coming, the Swiss luxury watchmaker is sticking with that rumored game plan. The most expensive Android Watch ever made is coming November 9th.

        • Tag Heuer is unveiling its Android Wear smartwatch next month

          Swiss watchmaker Tag Heuer has set a date for its upcoming Android Wear smartwatch unveiling. The Tag Heuer Connected, as it’s called, will make its debut at the LVMH Tower in New York City on November 9th, according to invites sent out by the company today. The watch is reportedly based on the popular Tag Carrera and will cost around $1,800, according to a interview with Tag CEO Jean-Claude Biver on CNBC last month.

        • ZTE lifts lid on Axon mini Android smartphone pricing and specs

          Chinese handset-maker ZTE has revealed more about the pricing, specs, and availability of the mini version of its Axon flagship smartphone.

          Following on from ZTE’s US launch of its $450 flagship Axon in July, the company has announced it will begin offering two variants of its smaller sibling. Although the mini was also unveiled in July, ZTE has only now revealed prices.

        • Android 6.0 has a great auto backup system that no one is using (yet)

          We recently published a rather lengthy review of Google’s newest operating system, Android 6.0 Marshmallow, but there was one feature we couldn’t get working in time for the review: the new automatic backup feature for app data. The theory is that this feature would take all your app data, stick it in the cloud, and when you restore your phone or buy a new one, it would be like nothing ever changed—all your settings and logins would come back like magic.

        • Android users left at risk… and it’s not even THEIR FAULT this time!
        • Huawei Rolling Out Android 5.1.1 Lollipop To Ascend P7
        • 10 Android Tips And Tricks For A Better, Smarter Phone
        • The need for a 3D Android interface is now

          Fear not, Android faithful, 3D Touch will be coming to our favorite platform. A few days ago, Synaptics announced their ClearForce technology that recognizes different levels of pressure to the screen. Synaptics is working with Android OEMs to make this happen.

          The skeptics, of course, abound. Before Apple rolled out devices with this feature, people were doubtful of its usability. What Apple did, however, was seriously impress. They took a very challenging feature and made it work. That’s something Apple is quite good at.

Free Software/Open Source

  • Open source as a tool of cultural change

    The government is the de facto “keeper of the data” for the entire country. There’s all kinds of useful data on pretty much any topic. The problem is that often, that data is stored in a way that is very difficult to discover and access. In my opinion this is primarily a workflow issue as opposed to a policy issue. Too many datasets exist as documents on a walled-off shared folder somewhere. Even sharing data with another agency is difficult, especially if it’s of substantial size. Most agency networks block file sharing services like Dropbox. So, the opportunities for open data are really endless if we can change the way the government stores, creates, and releases data.

  • The importance of face-to-face in the open source world

    This is particularly important when it comes to Open Source. The Open Source world is a fabric of interconnected personalities, relationships, and expectations. It is critically important to not just get work done but to also ensure the people doing the work feel a sense of connection. To this end, face to face communication and collaboration is essential.

  • Extending a Free, Open Source Community to Our Students

    What makes the open source community so important though? Well, there are a lot of reasons out there, but for Butler, a lot of it has to do with collaboration. This is noteworthy when considering the value an open source community can bring to educational collaboration, then.

  • 3 open source projects for modern COBOL development

    GnuCOBOL (formerly known as OpenCOBOL) is a modern, open source, COBOL compiler. It works by translating COBOL code into C and compiling the code using GCC. While the project does not claim standards compliance, it passes most of the tests in the COBOL 85 test suite from the National Institute of Standards and Technology. Other compilers might be more standards compliant or contain the same quirks as their historical antecedents, but GnuCOBOL is the compiler used by the other two projects I cover below.

  • Open source office at Veneto health care

    The ULSS5 health care organisation, one of 22 in the Italian Veneto Region, has nearly completed the transition to the open source office suite LibreOffice and the open document format ODF. Already 70% of all 1500 workstations have LibreOffice implemented, and the migration will be completed in 2016, says Enio Gemmo, one of the instructors involved in the project. Exchanging documents with others remains one of the main problems.

  • Industry Veterans Partner to Create a School for Software Engineers

    Another interesting angle is that during their first year at school all projects except their own, if they decide otherwise, must be open sourced online on the repository of their choice (such as GitHub).

    “Open source is a great option for teaching students because it not only helps you in building new skills as as software engineers, but also you know how to communicate with your peers. You have to understand how the team is working among many things. So I think open source is a great way to learn software engineering,” added Barbier.

    Because the Linux Foundation also runs many specialized courses, I asked whether the school had any plans to collaborate with the Foundation. I was told that, although they are in touch with the Linux Foundation, it’s too early to comment on it.

  • Eximbank opts for Allevo’s open source application FinTP

    It originates from Allevo’s older offering, qPayintegrator. The open source project has been in the making for a few years.

  • Volkswagen’s Diesel Fraud Makes Critic of Secret Code a Prophet

    A Columbia University law professor stood in a hotel lobby one morning and noticed a sign apologizing for an elevator that was out of order. It had dropped unexpectedly three stories a few days earlier. The professor, Eben Moglen, tried to imagine what the world would be like if elevators were not built so that people could inspect them.

  • Web Browsers

    • Mozilla

      • Mozilla to Bar Many Legacy Plug-ins in Firefox By End of 2016

        As we’ve reported several times, Google has been introducing big changes in its Chrome browser, especially when it comes to how the browser handles extensions. If you’ve regularly used either or both of the most popular open source Internet browsers–Google Chrome and Mozilla Firefox–then you’re probably familiar with the performance and security problems that some extensions for them have caused.

        Mozilla, like the Chrome team, is also focused on the effect that extensions have on performance and reliability. Now, Benjamin Smedberg, a Mozilla senior engineering manager, in a post to a blog, has confirmed that Mozilla will bar almost all plug-ins built using decades-old NPAPI technology by the end of 2016.

  • SaaS/Big Data

  • Healthcare

    • Taunton and Somerset trust explores wider open source adoption

      Taunton and Somerset NHS Foundation Trust has commenced “exploratory work” around expanding its use of open source technology to include an e-prescribing solution after going live with a non-proprietary electronic patient record (EPR) system earlier this month.

      Trust IT director Malcolm Senior said that although work around potentially adopting a new e-prescribing system was at an early stage, Taunton and Somerset was now considering dates for possible implementation.

      Senior said he was confident the trust would be able to meet a timeline for completing development of an e-prescribing service in line with aims for a ‘paperless NHS’ by 2018.

  • Business

  • Funding

    • Your Last Chance To Crowdfund InvizBox Go, A Portable Open Source VPN Router

      A small Irish tech startup is in the last few days of crowdfunding for a small Linux-based router it’s hoping to ship out to supporters in February 2016.

      If its Kickstarter campaign is successful, InvizBox Go will offer users some protection when connecting to WiFi networks. Whether you’re at home, at a hotel, or working out of a coffee shop, the InvizBox Go will be able to connect your devices and route all of your traffic over Tor or a VPN connection (or even both). And since it can connect all devices simultaneously, it’s a great solution for keeping your housemates secure without requiring them to plug into anything or even download any software. Or, let’s face it, it’s also good for watching blocked content from around the world. Users will also be able to block a known list of ad providers. An optional feature will block Windows 10’s tracking domain. Additionally, the device can acts as a WiFi extender or even be used to charge a mobile phone or tablet if users plug into its USB port.

    • Irish firm’s product to mask online activity
  • BSD

    • FreeBSD/PC-BSD 10.2 vs. Ubuntu 15.04/15.10 Benchmarks

      It’s been a while since last running any BSD vs. Linux benchmarks, so I’ve started some fresh comparisons using the latest releases of various BSDs and Linux distributions. First up, as for what’s completed so far, is using the FreeBSD-based PC-BSD 10.2 compared to Ubuntu 15.04 stable and the latest development release of Ubuntu 15.10.

  • FSF/FSFE/GNU/SFLC

  • Public Services/Government

    • Italy’s Bari switching to LibreOffice and ODF

      The Italian city of Bari is about to complete its transition to LibreOffice and the open document format ODF. At the end of this year, the open source suite of office productivity tools will have been implemented on 75% of the city’s nearly 1700 PC workstations. Change management is a key part of the transition, explains Marini Latini, who helped train the city’s staff members.

    • Another city swaps in LibreOffice to replace Microsoft Office

      Another city has decided to swap out Microsoft Office for the open source LibreOffice productivity suite. As ZDNet reported, the municipality of Bari in Italy is currently installing the open-source office software on its 1,700 PCs after a successful trial involving 100 PCs.

  • Openness/Sharing

    • Open Data

      • ODS Onsite Training – Onsite Training to the European Commission

        The course aims at enhancing the understanding of linked open data principles and technologies. By the end of the course, participants should have a clear understanding of what linked open data is and how linked data technologies can be applied to improve the availability, understandability and usability of EU data.

Leftovers

  • Notable Moments in White People Taking Credit For Discovering Things (Columbusing)

    For some of you, today is Columbus Day. For others it is Indigenous Peoples day and for the rest of you, it’s Monday.

    Christopher Columbus was an Italian sailor who wandered around the Caribbean and the Americas capturing and raping indigenous peoples. For his troubles, he is said to have “discovered” what we now know as the United States, an attribution that—just as he did—leaves out the worth of the millions of people who had been living here for a very, very long time.

    Objectively, fuck Christopher Columbus.

    However, one of the few helpful things he did was inadvertently give us a word for the phenomenon when someone (specifically a white someone) takes or is given credit for discovering something that existed long before it came to that individual’s attention.

  • Field Report: Pirate Bloc – Tory Party Conference demo 4/10/2015

    Over the last week, the Tory party had their conference in Manchester. On Sunday 4th October, 60,000 people took to the streets to protest, organised by the People’s Assembly Against Austerity. We joined them as the Pirate Bloc, with some help from our friends over at the Manchester branch of Open Rights Group. We broadcast a lot of the march live on Periscope, and there are a number of videos saved on Bambuser, but we also have a few pictures to share with you.

  • The Self-Appointed Elite

    I am an unrepentant enthusiast for the European Union, indeed a European Federalist. I think the freedoms of movement of people and goods within the EU are the most profound political achievement of my lifetime, and have made the world a very much better place.

    I am therefore flabbergasted by the group of unpleasant elitist bastards who apparently will lead the pro-EU campaign for the referendum. How could anybody wishing to win a vote believe that a Board including Peter Mandelson and Danny Alexander is going to help? While the appointment of Lord Rose seems to confirm belief in the “Michelle Mone theory”, that selling knickers grants universal expertise.

    Most egregious of all, the Executive Director is Will Straw, whose main qualification is that his father is a war criminal. Founder of the rabid anti-Corbyn website Left Foot Forward and every bit as Atlanticist as Liam Fox, Will Straw is as insanely pro-United States hegemony and as ultra-Zionist as only an extreme Blairite can be. He really is a deeply unappealing figure.

  • Yogi Berra’s 50 greatest quotes

    Yogi Berra probably is better known for his unique take on the English language than for his baseball career — and it was a heck of a baseball career.

  • Science

    • Pressure to ‘publish or perish’ may discourage innovative research, UCLA study suggests

      The researchers’ conclusions are drawn from a database they assembled of more than 6 million scholarly publications in biomedicine and chemistry

    • How PowerPoint is killing critical thought

      I still remember the best lecture I ever attended. It was part of a joint series offered by the English and philosophy departments in my first term at university and, given that the subject was Sartre’s Being and Nothingness, should have been the dullest event in Christendom that night. But it wasn’t. The lecturer, Thomas Baldwin, had a deceptively simple style: he would write a proposition on the blackboard facing us and gaze at it for a moment, like a medium beckoning a spirit. Then he would turn and smile, and start to explain.

    • The Apple bias is real

      If there’s one constant on the consumer tech calendar, it’s iPhone reviews day. Happening sometime between the announcement and the release of the latest iPhone, it manifests itself with glowing accounts of the latest Apple smartphone at the top of the page, and irate accusations of Apple-favoring bias in the comments at the bottom. This is as reliable a phenomenon as today’s autumnal equinox.

      The funny thing is that everyone’s right. Readers are right to claim that the iPhone is treated differently from other smartphones, and reviewers are correct in doing so. Apple makes more in quarterly profit than many of its mobile competitors are worth, and the success and failure of its smartphone plays a large role in shaping the fate of multiple related industries. The iPhone is reviewed like a transcendental entity that’s more than just the sum of its metal, plastic, and silicon parts, because that’s what it is.

  • Hardware

  • Health/Nutrition

    • Sudden and dramatic demise of Addenbrooke’s Hospital is tragic and couldn’t be a starker warning of impact of this government’s reckless policies on the NHS

      “The sudden and dramatic demise of Addenbrooke’s Hospital is tragic and couldn’t be a starker warning of the impact of this government’s reckless policies on the NHS. The Tories are a danger to the security of our NHS and the public’s health.

      The problems at Addenbrookes are symptomatic of a financial crisis right across the NHS with two thirds of trusts predicting a deficit this year. This is a result of chronic underfunding of the NHS following a £20 billion efficiency savings programme over the last five years. Whilst healthcare inflation runs at 4% per year, the NHS budget under Tories increased just 0.8% per year during the last Parliament, the lowest average annual increase of any parliament. With the government intent on another £22 billion of savings over the next five years, the situation for patients can only get worse under the Tories and will be further exacerba‎ted by the growing rift Jeremy Hunt has created with NHS staff over the introduction of a full 24/7 NHS and the imposition of a damaging junior doctor contract.

    • U.S. Paid Healthcare.gov Contractor $4 Million to Fix Its Own Mess

      The U.S. government paid the main healthcare.gov contractor $4 million to correct defects of the botched site and withheld only $267,420 of what it owed the company, according to a new federal audit.

      The report on the Centers for Medicare and Medicaid Services (CMS) and its contract with CGI Federal is to be published today by the Health and Human Services Office of Inspector General. It is the latest in a series of audits critical of federal oversight of the private companies that built the insurance marketplace at the heart of Obamacare. Although CMS replaced the contractor a few months after healthcare.gov’s meltdown in 2013, the agency had little power to recover the money it spent trying to fix the site.

  • Security

  • Defence/Police/Secrecy/Aggression

    • Henry Kissinger, dangerous fraud: Why he’s as responsible for Iraq and the Middle East as Vietnam

      Two weeks ago, a mini-scandal rocked the New York literary world. Gawker revealed that Andrew Roberts, the New York Times Book Review’s choice to review the authorized biography of Henry Kissinger, had in fact been Kissinger’s original choice to write the authorized biography.

      Roberts also was a long-time friend of Niall Ferguson, the man who Kissinger wound up choosing to write his authorized biography. Roberts and Ferguson had even written a lengthy chapter together in a volume of essays edited by Ferguson. Worse yet: Roberts had revealed almost none of these involvements — with Ferguson, with Kissinger — to the New York Times when it asked him to write the review.

      So unseemly were these entanglements, and the lack of transparency about them, that Margaret Sullivan, the New York Times public editor, felt called upon to rap the paper’s knuckles. Which prompted a further back and forth between Sullivan and Pamela Paul, the editor of the Times Book Review. While the back-scratching world of book reviews in the New York Times is an old topic — unlike other publications, the Times purports to be objective and untainted by personal connections, and its reviews help promote or kill books — this scandal brought it into especially sharp relief.

      The person who revealed the scandal in Gawker was Greg Grandin, an NYU historian and winner of multiple academic and literary prizes. Grandin has his own book out on Kissinger, “Kissinger’s Shadow,” which was reviewed by the Times the same day that Ferguson’s bio was.

    • Tories have forgotten that Thatcher wasn’t just a terrorist sympathiser, but close friends with one

      It’s not surprising to see the right-wing Government and press try to assassinate Jeremy Corbyn’s character. So far they’ve linked him with the IRA, Hamas and Hezbollah. In their eyes, the Labour leader is a terrorist sympathiser.

      The problem with this narrative, as with almost all narratives that invoke the spectre of terrorism, is that they rely on a decidedly one-sided view of the world. In their minds, life comprises two neatly opposed groups: those who support terror and those who oppose it.

      The charges against Corbyn, regardless of their merit, cannot exist in a political vacuum of good versus evil though. Some conservatives would be wise to look closer to home before casting the first stone.

      Whatever his views, Corbyn has never wielded the levers of power in government, and has never done more than put forward ideas. Yet if we look to the icon of conservative politics and “keeping Britain safe”, we have someone with a well-documented history of being a terrorist sympathiser. During her time as Prime Minister, Margaret Thatcher openly called a terrorist a “true friend”, invited a terrorist into her home for tea, and personally lobbied against a terrorist’s prosecution for war crimes.

    • The Author of Our Best SF Military Novel Explains the Future of War

      For my money, the best novel to read about the future of war today, in 2015, was published in 1974. Joe Haldeman’s The Forever War is an all-time science fiction classic, but it hasn’t quite enjoyed the same degree of mass cultural saturation as other war-themed SF staples like Ender’s Game or Starship Troopers—maybe because it hasn’t been made into a film or TV show, maybe because its politics are too thorny and complex.

    • The WWII-Era Plane Giving the F-35 a Run for Its Money

      On December 5, 2001, an American B-52 flying tens of thousands of feet above the ground mistakenly dropped a 2,000-pound satellite-guided bomb on an Army Special Forces team in Afghanistan. The aircrew had been fed the wrong coordinates, but had the plane been flying as low and slow as older generations of attack planes did, the crew might’ve realized their error simply by looking down at the ground.

      It was not long after the Twin Towers fell, and American soldiers were killed in Afghanistan by an American bomb dropped by an American plane. That this mistake happened illustrates just how poorly the air campaign in the United States’ longest war was executed, and how efforts ultimately failed to make things better by going after high-tech solutions that aren’t what they’re cracked up to be compared to the old tried and true technology.

  • Transparency Reporting

    • WikiLeaks’ Julian Assange: still wanted, no longer so hunted

      Is now the time for Julian Assange to try to make a break for it?

      The British government has spent more than $19 million over the last three years trying to make sure that Assange, founder of the website WikiLeaks, doesn’t escape its clutches. Assange has been holed up in the tiny Ecuadorean Embassy in London since June 2012, a fugitive from arrest on allegations that he sexually assaulted two women in Sweden.

      But authorities have apparently decided that the vigil is no longer worth it. Scotland Yard announced Monday that it was withdrawing its 24-hour presence at the embassy, which sits in one of London’s toniest neighborhoods, near the famous Harrods department store.

    • Julian Assange: Police end guard at Wikileaks founder’s embassy refuge

      Police will no longer be stationed outside the Ecuadorean embassy in London where Wikileaks founder Julian Assange has sought refuge since 2012.

      Met Police officers had been there since Mr Assange sought asylum to avoid extradition to Sweden over a rape allegation, which he denies.

      The Met said it had cost £12.6m and was “no longer proportionate” – but it would still try to arrest him.

      Wikileaks said the decision did not change Mr Assange’s situation.

    • Police pull 24-hour guard of Julian Assange’s London embassy hide out

      Police in London have removed their around-the-clock guarding of the Ecuadorian Embassy, where Wikileaks founder Julian Assange has been hiding out since 2012.

      Assange sought refuge at the embassy, where he has stayed for three years, while facing extradition to Sweden for questioning about alleged sex crimes.

      For the entirety of his stint inside the building, the Metropolitan Police have posted a guard outside the embassy, until Monday.

  • Environment/Energy/Wildlife

    • Watch A CBS Correspondent Question Charles Koch On Whether Dark Money Is “Good For The Political System”

      Anthony Mason: “Do You Think It’s Healthy For The System That So Much Money Is Coming Out Of A Relatively Small Group Of People?”

    • New Zealand deports climate change asylum seeker to Kiribati

      New Zealand has deported a Kiribati man who lost a legal battle to be the first person granted refugee status on the grounds of climate change alone.

      Ioane Teitiota, 39, has argued that rising sea levels in his homeland meant his family would not be safe there.

    • UK, France and Germany lobbied to keep loopholes in car emission tests

      The UK, France, and Germany lobbied in secret to retain outdated approaches to testing car emissions that would create major loopholes for manufacturers to exploit. According to documents seen by The Guardian, the overall effect would have been to increase real-world carbon dioxide emissions by 14 percent over those shown in the tests. Although not involving software, these loopholes would allow the carbon dioxide testing procedures to be gamed to produce deceptively good results just as Volkswagen has been doing for NOx gases.

    • Volkswagen Diesel Scandal Expands: What Should Jetta, Passat, Golf, Beetle And Audi Owners Do?

      In the wake of revelations that Volkswagen deceived regulators and car buyers about the high level of polluting emissions from its diesel-powered vehicles, you have two options if you own one of these cars: Park it or pollute.

    • Climate activists score huge victory: Hillary Clinton comes out against Keystone XL pipeline

      Breaking her years-long silence on an issue that has galvanized climate activists, Democratic presidential candidate Hillary Clinton came out against construction of the Keystone XL oil pipeline on Tuesday — marking a reversal of the position she seemed to hold as secretary of state and underscoring the issue’s resonance among the progressive voters Clinton needs to secure her party’s nod.

      Speaking in Des Moines, Clinton reiterated that she had not taken a public position on the project because she did not want to interfere with the Obama administration’s deliberations over whether to approve the pipeline, which would transport oil from the tar sands of Canada to the Gulf of Mexico. But given the administration’s persistent delays in announcing a decision on Keystone, Clinton said she now felt a “responsibility” to speak out.

    • Clinton comes out against Keystone XL pipeline

      Democratic presidential front-runner Hillary Clinton came out Tuesday against the Keystone XL oil pipeline, arguing the debate over its construction was a distraction from efforts to tackle climate change.
      The announcement follows years of pressure from environmentalists, and as Clinton seeks to reassure supporters surprised that she faces a tough challenger for the Democratic presidential nomination in Sen. Bernie Sanders (I-Vt.), an opponent of Keystone.

    • Warming Arctic is trouble for Caribou in unexpected way

      Global warming in the Arctic means earlier and more plentiful mosquitoes in Greenland, and that’s bad news for the country’s already shrinking caribou population, Alaska Dispatch Newsreports.

      A new study found that for every degree Celsius the temperature rises in Greenland, mosquitoes take 10% less time to reach full, biting adulthood. And less time spent as larva means more mosquitoes survive into adulthood. The study found that a 5-degree Celsius jump raised mosquito survival rates by 160%.

  • Finance

    • Facebook paid £4,327 corporation tax despite £35m staff bonuses

      Social networking firm paid average of £210,000 to staff in Britain, but overall loss in UK of £28.5m meant very little corporation tax was due

    • Elizabeth Warren demolishes the myth of “trickle-down” economics: “That is going to destroy our country, unless we take our country back”

      Stephen Colbert once described Elizabeth Warren as the “school librarian you had a crush on” but on last night’s Late Show, she was the Sheriff of Wall Street.

      Like every interview with the senior senator of Massachusetts, there was a question about whether or not she’d be running for President in 2016. “You are a household name in American politics,” Colbert said. “And yet, you are one of the few household names that is not running for President of the United States. Are you sure you’re not running for President of the United States? Have you checked the newspapers lately, because a lot of people have jumped in, you might have done it in your sleep…. These days politicians have to check the ‘opt-out’ button. It’s like unsubscribing from an email.”

    • Thailand Might Be Required To Sacrifice Plant And Seed Sovereignty For The Sake Of Trade Agreement With EU

      Compliance with demands of the European Union or hasty government amendments to domestic laws allows the government to claim that Thailand did not amend any laws on account of the EU-Thai FTA negotiations.

      That’s noteworthy, because there’s evidence that the European Commission is aiming to implement key US demands for TAFTA/TTIP before negotiations are completed so that it too can claim that it did not amend any laws on account of it. If the biothai.org post is correct, it’s a sneaky trick that seems to be spreading.

  • PR/AstroTurf/Lobbying

    • No, the Kochs’ Political Spending Is not “Reported”

      Charles Koch misled CBS when he suggested that the Kochs’ political spending is publicly disclosed.

      On October 11, the elder Koch brother gave a rare interview to CBS Sunday Morning. Reporter Anthony Mason asked, “Do you think it’s good for the political system that so much what’s called ‘dark money’ is flowing into the process now?”

      Koch replied: “First of all, what I give isn’t ‘dark.’ What I give politically, that’s all reported. It’s either to PACs or to candidates. And what I give to my foundations is all public information.”

    • Carly Fiorina’s post-truth politics: Even her most delusional defenders admit she’s fudging the facts

      I usually avoid reading anything by Jonah Goldberg because life is short and the world has a finite supply of blood pressure medication. But his column in the Los Angeles Times covering the controversy over Carly Fiorina’s comments about the Planned Parenthood videos is so awful, it has to be read to be believed.

      The editorial starts off with the full Fiorina quote that has become so controversial: “Anyone who has watched this videotape, I dare Hillary Clinton, Barack Obama to watch these tapes. Watch a fully formed fetus on the table, its heart beating, its legs kicking while someone says, ‘We have to keep it alive to harvest its brain.’”

  • Censorship

    • France confirms that Google must remove search results globally, or face big fines

      Google’s informal appeal against a French order to apply the so-called “right to be forgotten” to all of its global Internet services and domains, not just those in Europe, has been rejected. The president of the Commission Nationale de l’Informatique et des Libertés (CNIL), France’s data protection authority, gave a number of reasons for the rejection, including the fact that European orders to de-list information from search results could be easily circumvented if links were still available on Google’s other domains.

    • Mark Crispin Miller, Peter Hart, and Gerry Condon

      Mark Crispin Miller of NYU discusses some of the recent additions to his Forbidden Bookshelf series, which seeks out important out-of-print political works and republishes them as e-books; Miller explains the insidious ways the books were first “disappeared.” Next, Peter Hart with the National Coalition Against Censorship speaks about this year’s Banned Books Week, and some of the means — short of outright banning — which keep important books away from students. The program concludes with Gerry Condon of Vets for Peace, speaking about the historic vessel Golden Rule, brought to San Francisco as part of a protest against the U.S. Navy’s annual Fleet Week activities there.

    • The President Stood Up For Free Speech On Campus — But He Didn’t Mean Middle School Campuses

      Well, it didn’t take him long to reveal that his sudden free speech platform was bullshit — with the blocking of a young conservative activist from seeing or responding to his Twitter feed,” conservative YouTube sensation CJ Pearson, a 13-year-old black middle schooler from Georgia.”

    • The Trend Of Killing News Comment Sections Because You ‘Just Really Value Conversation’ Stupidly Continues

      Over the last year, there has been a tidal wave of websites that have decided to close their news comment sections because the companies are no longer willing to invest time and effort into cultivating healthy on-site discussion. While that’s any site’s prerogative, these announcements have all too often been accompanied by amusing, disingenuous claims that the reason these sites are muting their on-site audience is because they’re simply looking to build relationships or just really value conversation. Nothing says “we care about your opinions” like a shiny new muzzle, right?

    • Pirate Bay Forum Knocked Offline by ICANN Complaint

      The Apple bias is real

      The Pirate Bay’s official SuprBay forum has gone dark after experiencing domain name problems. The forum’s domain name registrar eNom suspended the site following an ICANN complaint over inaccurate Whois information, and the site remains offline for now.

    • Man arrested for disparaging police on Facebook settles suit for $35,000

      A Wisconsin man arrested for posting disparaging and profanity laced comments on a local police department’s Facebook page has settled a civil rights lawsuit and is being awarded $35,000.

      Thomas G. Smith used the Facebook page of a rural Wisconsin village called Arena to, among other things, label local cops as “fucking racists bastards.”

      He was charged criminally in state court on allegations of disorderly conduct and unlawful use of computerized communications. He was sentenced to a year of probation and 25 hours of community service. A state appeals court overturned his conviction last year.

  • Privacy

    • Whoops: OPM Says Hackers Stole 5.6 Million Fingerprints, Not 1.1 Million

      Months after hackers first broke into Office of Personnel Management (OPM), the US government agency that handles all federal employee data, the hack keeps on getting worse.

    • OPM says 5.6 million fingerprints stolen in cyberattack, five times as many as previously thought
    • Snowden Treaty Launched: Effort To Get Countries To End Mass Surveillance

      Of course, chances of the US signing on to this are basically nil, but it will be interesting to see if other countries think it’s worth supporting. Countries that have tried to hold themselves out as bastions of free speech and against mass surveillance might make interesting targets. But, of course, actually getting countries to commit to such things isn’t always easy. Still, the effort seems worthwhile, even if it merely raises the issue of what kind of world do we live in that such a thing should even be necessary?

    • Obama administration explored ways to bypass smartphone encryption

      The approaches were analyzed as part of a months-long government discussion about how to deal with the growing use of encryption in which no one but the user can see the information. Law enforcement officials have argued that armed with a warrant they should be able to obtain communications, such as e-mails and text messages, from companies in terrorism and criminal cases.

    • [Old] Facebook case may force European firms to change data storage practices
    • [Old] How NSA Surveillance May Result In Fragmenting The Internet: EU Court Leaning Towards Ending ‘Privacy Safe Harbor’
    • Senate Intelligence Committee Forced To Drop ‘Terrorist-Activity’ Reporting Requirements For Social Media Platforms

      Less than three months after announcing it was considering turning major social media platforms into unpaid government informants, the Senate Intelligence Committee is dropping its proposed requirement that Facebook, Twitter, etc. report “terrorist activity” to designated agencies.

    • FBI Ignores Court Order, Congressional Oversight; Refuses To Respond To Questions About Clinton Emails

      Grassley is right about most of this. The FBI does tend to believe it’s above the law, what with its warrantless surveillance, refusal to cooperate with DOJ oversight and its general indifference to its own internal policies. But what Grassley is complaining about is standard operating procedure by the agency. When not withholding information for bogus reasons, the agency quite frequently cites “ongoing investigations” when refusing to turn over documents.

    • As US Turns Away From Idea Of Backdooring Crypto, David Cameron Has A Problem

      Last week, Mike wrote about what seems an important shift in US government policy on encryption, as the White House finally recognizes that adding backdoors isn’t a sensible option. That leaves a big question mark over what the UK will do, since David Cameron and intelligence officials have been hinting repeatedly that they wanted to undermine encryption in some unspecified way. Just last week, the new head of MI5, the UK’s domestic intelligence service, gave the first-ever live media interview by a senior British intelligence official.

    • [India] National Encryption Policy draft withdrawn: 13 things to know

      If you were worried that deleting WhatsApp, Facebook and Viber chats could put you behind bars, fret not. In a complete u-turn, the government has withdrawn the proposed National Encryption policy that may have landed you in trouble for deleting your WhatsApp, Facebook messages before 90 days.

    • India’s Government Looking At Mandating Backdoors In Encryption
    • India joins war on crypto

      India’s newly released draft national encryption policy includes a requirement that plaintext versions of all encrypted data and messages must be kept by every user, whether a business or an individual, for 90 days. And the “verifiable” plaintext must made available to law enforcement agencies on demand. This unprecedented requirement is likely to make security breaches even more serious, and present enormous logistical problems for companies using encryption on a large scale, since they will have to manage the storage and timely deletion of the plaintext versions.

    • Twitter Makes All Its Shortlinks HTTPS By Default

      We have discussed for years, of course, the value of encrypting more of the web, and especially increasing use of HTTPS-by-default. Kudos to Twitter for making this move and encouraging widespread use of HTTPS to better protect people’s surfing. It’s worth noting that Twitter is also warning sites that they may see a drop in referrals from Twitter, because browsers drop the referrer from the header when an HTTPS link goes to an HTTP destination — but it notes that it will be using referrer policy instead, which is good. Most modern browsers support referrer policy, and thus this isn’t really that big a deal. However, it’s one of the random complaints that some anti-HTTPS campaigners have argued over the years (that the lack of referrer is a big loss under HTTPS).

    • 4chan Message Board Sold to Founder of 2Channel, a Japanese Web Culture Pioneer

      4chan, an anonymous message board founded by Christopher Poole in 2003, has been home to a veritable smorgasbord of everything the web has to offer. With posts on the site lasting only a matter of days or even hours before they are deleted, the message board has been described as the collective id of the Internet, home to hardcore pornography, hardcore cooking tips and everything in between.

    • Government Asks Appeals Court To Change Its Mind On Warrant Requirement For Cell Site Location Info

      The Fourth Circuit Court of Appeals might be revisiting its recent decision of imposing a warrant requirement on the acquisition of cell site location information. The government has asked for an en banc hearing to settle this issue.

      As of now, there is no unified view on the privacy (or lack thereof) inherent to historical cell site information. Nathan Freed Wessler, staff attorney for the ACLU, has put together a map of current decisions that shows where warrant requirements have been established (for now — many are being appealed/challenged) and where they haven’t. (Click through for a [slightly] larger version.)

    • George W. Bush Tried To Retroactively Declare Illegal, Unconstitutional NSA Surveillance Legal, Because He Said So

      When it comes to the NSA, we’ve been discussing just how dangerous it is when the government gets to put in place its own secret interpretation of laws that, when read by the public, appear to say something quite different than the secret interpretation. Otherwise you have secret laws, and that’s no way to run an open Constitutional democracy. For many years, it’s been known that in March of 2004 there was a hospital room showdown between then White House Counsel Alberto Gonzales (with White House Chief of Staff Andy Card) and (at the time, quite ill) Attorney General John Ashcroft and acting Attorney General James Comey, over whether or not to reauthorize some sort of surveillance program. Comey, Ashcroft, and then FBI Director Robert Mueller all threatened to resign over the issue, and eventually, we were told, President Bush overruled Gonzales and Card. We knew at the time that the dispute was over domestic surveillance and whether or not it was legal. More recently, it came out that it was over domestic collection of internet/email metadata. This was a program similar to the phone metadata program that was revealed by Ed Snowden, but for email/internet information.

  • Civil Rights

    • Saudi Arabia declares all atheists are terrorists in new law to crack down on political dissidents

      Saudi Arabia has introduced a series of new laws which define atheists as terrorists, according to a report from Human Rights Watch.

      In a string of royal decrees and an overarching new piece of legislation to deal with terrorism generally, the Saudi King Abdullah has clamped down on all forms of political dissent and protests that could “harm public order”.

      The new laws have largely been brought in to combat the growing number of Saudis travelling to take part in the civil war in Syria, who have previously returned with newfound training and ideas about overthrowing the monarchy.

    • Militant group publishes global hitlist of bloggers, activists and writers

      An Islamic militant group in Bangladesh has issued a hitlist of secular bloggers, writers and activists around the world, saying they will be killed if its demands are not met.

      The list will raise fears that Islamic militant violence within the unstable south Asian country could take on an international dimension.

    • Phone video clears man charged with assaulting cop — even after phone disappears

      Cellphone went missing after police took it, but uploaded file exonerated accused man and left judge questioning officers’ honesty, finding their testimony “deliberately misleading.”

    • Taken Offline: Years in Prison for a Love of Technology

      Writing a letter with a pen has an odd feeling in a digital age. You pick your words carefully, without a delete key. You urge your hands to recall their best handwriting. You ponder about forms of address and how much space to leave; should I fill the page, or sign off half-way down?

      The last time I wrote a letter was to the Syrian technologist, Bassel Khartabil. I had to write a letter, because Bassel’s not online right now, despite being an enthusiastic adopter of new technology when it reached his home town of Damascus. Bassel’s not online, because he was arrested and thrown in jail for his love of the Internet and free culture, and has now been incarcerated for over three and a half years.

    • ACLU, Lawyers Group Sue Cali Police Department Over $3,000 Fee Demand For Body Cam Footage

      Once again, a government agency is attempting to price itself out of the public records market. The Hayward (CA) police department told the National Lawyers Guild that it needed to come up with $3,000 before it would turn over requested body camera footage.

  • Internet/Net Neutrality

    • White House report says Internet is a ‘core utility’ just like electricity

      A White House report says broadband Internet is a core utility people need to participate in modern society. But millions of Americans, especially in rural areas, still don’t have access to high-speed Internet.

    • The Wall Street Journal Doubles Down On Dumb: Falsely Claims Net Neutrality (‘Obamanet’) Has Crushed Broadband Investment

      Last week, we noted that the Wall Street Journal appeared to have reached a completely new low in the “conversation” about net neutrality, with a bizarre, facts-optional missive about how Netflix was to blame for pretty much everything wrong with the Internet. According to Holman W. Jenkins Jr., Netflix is the diabolical villain at the heart of a cabal to regulate the Internet, cleverly convincing regulators to treat hard-working, honest companies like Comcast unfairly. As we noted, the screed is part of a broader telecom-industry attempt to vilify Netflix for not only its support of net neutrality, but for daring to erode traditional cable TV subscriptions through (gasp) competition.

    • Network Engineers Weigh In to Support the Open Internet

      Yesterday, EFF and the ACLU filed a friend-of-the-court brief (press release) defending the Federal Communications Commission’s net neutrality rules in the federal Court of Appeals for the District of Columbia. Along with our legal arguments, we submitted a statement signed by dozens of engineers familiar with Internet infrastructure. Signers include current and former members of the Internet Engineering Task Force and Internet Corporation for Assigned Names and Numbers’ committees, professors, CTOs, network security engineers, Internet architects, systems administrators and network engineers, and even a founder of the company that registered the first “.com” domain.

      [...]

      The engineers explain in detail how ISP discrimination could require innovators to negotiate with ISPs before their applications will work, rather than being able to rely on ISPs to pass data in a neutral manner. ISP interference could also introduce errors and security vulnerabilities that would be challenging to fix.

    • The internet is run by an unaccountable private company. This is a problem

      What if instead of organising a football competition every four years, Fifa took on management of the internet? Leaving aside the arrests and bribery allegations, the organisation might look a bit like the Internet Corporation for Assigned Names and Numbers ( Icann), the private California company responsible for overseeing the running of the internet. The scary thing about Fifa is that, when things go wrong, no one else has the power to intervene.

      It was thought that 30 September 2015 was supposed to be a significant date in internet governance. The US government was going to hand over key responsibilities to the internet community – but that date will be missed, because Icann’s board looks set to oppose plans to make itself more accountable.

      If Icann’s board can override the consensus of its own community, it casts doubt on the viability of the entire Icann model, and exposes the flakiness of the way essential internet resources are governed.

  • DRM

    • White Hat Hackers Would Have Their Devices Destroyed Under the TPP

      Car hackers, farmers fixing their high-tech tractors, and teenage DVD rippers; all over the world, these digital tinkerers could have their devices seized and destroyed by the authorities thanks to provisions in the newly-minted Trans-Pacific Partnership trade deal.

      The finalized copyright chapter of the TPP, leaked on Friday by Wikileaks, reveals that under the agreement, “judicial authorities shall, at least, have the authority to [...] order the destruction of devices and products found to be involved in” any activity that circumvents controls that manufacturers build into their software or devices, known as Digital Rights Management (DRM) technology.

    • Researchers Could Have Uncovered Volkswagen’s Emissions Cheat If Not Hindered by the DMCA

      Automakers argue that it’s unlawful for independent researchers to look at the code that controls vehicles without the manufacturer’s permission. We’ve explained before how this allows manufacturers to prevent competition in the markets for add-on technologies and repair tools. It also makes it harder for watchdogs to find safety or security issues, such as faulty code that can lead to unintended acceleration or vulnerabilities that let an attacker take over your car.

  • Intellectual Monopolies

    • Trademarks

    • Copyrights

      • WikiLeaks: ISPs to hand over copyright infringer details under TPP

        The Trans-Pacific Partnership (TPP) will force internet service providers (ISPs) to give up the details of copyright infringers so that rights holders can protect and enforce their copyright through criminal and civil means with few limitations, according to the intellectual property chapter released by WikiLeaks over the weekend.

      • Pirate Bay: What Raid? Police Never Got Our Servers

        Late last year The Pirate Bay was pulled offline after Swedish police raided a datacenter near Stockholm. The police confiscated dozens of servers which many believed to belong to the notorious torrent site. Today, the TPB team reveals that this is not the case.

      • South African Cybercrime Bill Would Throw the Book at Copyright Infringers

        Last month South Africa released its draft Cybercrimes and Cybersecurity Bill for public comment; the latest in a wave of such laws that has been sweeping the continent and beyond. EFF is currently reviewing the Bill with a view to sending a submission by the deadline of November 30, and we’ll have more to say about it before then. But there is one provision that deserves immediate comment: a clause that would criminalize essentially any infringement of copyright. This provision is oddly timed, given that South Africa is also separately considering amendments to its Copyright Act.

      • [Old] Judge Says Warner Chappell Doesn’t Hold The Copyright On Happy Birthday (But Not That It’s Public Domain)
      • Cox Accuses Rightscorp of Mass Copyright Infringement

        Internet provider Cox Communications has hit back at anti-piracy company Rightscorp. While denying responsibility for the alleged copyright infringements of its subscribers, Cox turns the tables, accusing Rightscorp of sharing thousands of copyrighted works without permission.

      • RIAA CEO: Piracy Notices Are Costly & Increasingly Pointless

        The CEO and chairman of the RIAA says that the current notice and takedown anti-piracy process is both costly and increasingly pointless. Cary Sherman says the safe harbor provisions of the DMCA have forced labels into a “never-ending game” of whack-a-mole while sites under its protection effectively obtain a discount music licensing system.

      • Leaked TPP Chapter Proposes Drastic Copyright Changes

        A leaked chapter of the final Trans-Pacific Partnership (TPP) agreement proposes several changes to the copyright laws of participating countries. The intellectual property chapter covers a broad range of issues including extended copyright terms, ISP liability and criminalization of non-commercial piracy.

      • Kim Dotcom Denied Fresh Bid to Delay U.S. Extradition Hearing

        A judge has denied a bid by Kim Dotcom to suspend his long-awaited extradition hearing. The hearing began yesterday but was met with immediate calls by the Megaupload founder’s legal team to postpone to a later date. The decision handed down today by Judge Nevin Dawson means that evidence will be heard when the court resumes on Thursday.

      • Kim Dotcom’s Extradition Hearing Gets Underway

        After more than 3.5 years of legal argument and ten delays in proceedings, Kim Dotcom’s extradition hearing finally got underway this morning. The United States government wants Dotcom and his co-accused to be tried overseas for their role in Megaupload, but the larger-than-life entrepreneur intends to turn this into a dogfight.

      • U.S. Uncovers Kim Dotcom’s Self-incriminating Skype Calls

        After several years’ delay the extradition hearing of Kim Dotcom finally got moving this morning in the Auckland District Court. Characterizing the case as one of straightforward fraud, Crown lawyer Christine Gordon QC likened Megaupload to a post office shipping drugs, one in which its owners were well aware of their cargo.

]]>
http://techrights.org/2015/10/12/parsix-gnu-linux-8-0-reviewed/feed/ 0
Open Source Revisionism of GNU and Free Software History http://techrights.org/2015/05/13/rms-emails-on-revisionism/ http://techrights.org/2015/05/13/rms-emails-on-revisionism/#comments Wed, 13 May 2015 20:20:22 +0000 http://techrights.org/?p=82833 Richard Stallman
Source: Conference by Richard Stallman, “Free Software: Human Rights in Your Computer” (2014)

Summary: Media mistreatment of the very roots of Free/Open Source software (FOSS), which is now approaching 35 years in age and increasingly thriving

IN recent weeks we have found several ‘news’ articles that gave us cause for concern. Some were shared with Richard Stallman, a regular reader of Techrights, for his views to be expressed and portions of the correspondence can be found here (cautiously redacted to reduce potential animosity/tensions).

It is not unusual, especially these days (age of openwashing), to see the label “Open Source” misused. Not too long ago we identified some very gross distortion of the term “open source” to essentially openwash Facebook’s surveillance ambitions, focusing on poor people. Facebook traffic has sunk pretty badly over the past year (based on Alexa it’s a massive drop), so Facebook is trying really hard to frame/paint itself as “ethical”, even when it tries to expand its surveillance to people too poor to get connected to the Internet. This isn’t altruism, it’s opportunism and malice. It’s definitely not “open source” and the dot org suffix (Internet.org) is clearly inappropriate, not just misleading. “Facebook mistreats its users,” Stallman explained. “Facebook is not your friend, it is a surveillance engine.”

There was also an effort to delete GNU from history — an effort that has gone rather aggressive. Stallman was in the process of speaking to editors who jad allowed this to happen (dumb lawyers called GNU and Stallman’s text “Open source Manifesto” in the article “Open source Manifesto turns 30″). Stallman asked me to show him the original publication site and tell him how to write to them. It wasn’t too clear whether to write to the editor/site or the author/law firm. The former can issue some fixes/corrections, we tend to think, superseding what was contributed by lawyers. The article comes from a formal publication which often publishes patent lawyers’ pro-software patents columns (we have seen over 100 of them over the years). The target audience is lawyers. The latest is no exception to the rule. It is an article by Leech Tishman Fuscaldo & Lampl LLC and the Web site is London-based, with Andrew Teague as the Associate Publisher, Mark Lamb as the Publishing Director, and Chris Riley handling subscriptions. When it was first published Stallman was eager to contact “Either one, or both! [editor and writer] But the sooner the better.” No correction has yet been published. It’s nowhere to be found.

GNU and Free software are 30+ years old. A lot of people contribute to the misconception that it all started when Torvalds released Linux or when the term “Open Source” (not open source intelligence) was coined by the likes of O’Reilly. Watch the “Open Source” O’Reilly nonsense starting the clock more than 10 years later than GNU: “Twenty years ago, open source was a cause. Ten years ago, it was the underdog. Today, it sits upon the Iron Throne ruling all it surveys. Software engineers now use open source frameworks, languages, and tools in almost all projects.”

Rachel Roumeliotis is advertising OSCON 2015 (OS stands for “Open Source”), but she should know about GNU and its age. These people conveniently start the clock when O’Reilly and his henchmen got involved. They want all the credit and they want people not to speak about freedom. Eben Moglen already ranted about this, right on stage in an OSCON event nearly a decade ago.

“This shows how “open source” misses the point,” Stallman wrote to us. “If the frameworks, languages and tools they use are free software, that is good for their freedom. But if what they develop with those is nonfree software, it doesn’t respect our freedom.

“So open source “won” by ducking the important battle.”

Well, the “we already won” attitude (or notion) helps a defeatist’s approach; why fight for more freedom if “we won”? That’s what those people (even developers) who open a MacBook or some ‘i’ device want to happen; some would further insist that Apple and Microsoft are now “open source” players, so “game over”…

We have noticed that Microsoft is now googlebombing with “Windows open source”, promoting the ludicrous notion that it’s now “open” (or gratis), or that it will be so one day. It started about a month ago, maybe two; dozens of articles have served this PR strategy. we wrote some rebuttals and will write another one this weekend. There is a gross distortion of what actually happened and what is happening.

“Stallman was unhappy about the increasing prevalence of proprietary software,” said the aforementioned article From Lexology, “software protected by copyright law and usually licensed on a commercial basis by its owners.”

Yes, but Free software too is protected by copyright law, it’s just twisted into copyleft. “Source code is sometimes licensed under GNU GPL terms,” says the article, “a form of
“copyleft” rather than copyright.”

OK, so surely they know what Free software is and where it comes from. Why proceed with statements like: “The “open source” movement emerged in GNU’s wake. As with GNU, users of
open source code can look at the source code and modify it. However, unlike with GNU, they are not required to share their developments with the world at large.”

“We have noticed many articles throughout this past year or so — including some from Linux Foundation staff — that basically start history in 1991 as if GNU/Linux came out of a vacuum or from Torvalds’ bedroom.”Actually, unless they are using something like the BSD licence, they usually must. Then there are issues like SaaS, which are addressed by the AGPLv3, among other licences. But either way, Free software remains Free software, there is no justification for renaming it “Open Source” and calling the GNU Manifesto “Open source Manifesto”. It’s insulting to those who started the whole thing and wish to receive fair coverage or attribution, at the very least.

The Lexology sites presents some other issues, mostly to do with access, not just paywalls. Stallman asked: “Can you email me the full text of that article? I tried to fetch the page and what I got did not include the text.”

Stallman said he “wrote to them”, but more than a month later the article remains uncorrected, not updated, etc.

Another big load of revisionism (changing history) uses the “Open Source” label to delete GNU from history. Published last month, the article titled “At Birth, Open Source Was About Saving Money, Not Sharing Code” focuses on Torvalds (see feature image) and frames the movement as one that is centered around money. Stallman asked: “Is that someone opinionated who won’t listen to me?”

It is of course worthless asking for a correction when you know in advance none would be made. It later turned out to be part of a broader series of articles, some of which did cover GNU. I personally read several hundreds of items from the author and he’s more into ‘practical’ benefits, so I don’t think it would be worth arguing over. Some people just aren’t fond of freedom in the context of computing.

We have noticed many articles throughout this past year or so — including some from Linux Foundation staff — that basically start history in 1991 as if GNU/Linux came out of a vacuum or from Torvalds’ bedroom. Quite frankly, we think it’s an insult to history. We deem it negligent at best. Of course it leads people to deducing that the success of the system in its entirety is owing to the great “Linux values”, not GNU philosophy.

In summary, in our threads of communication with Stallman we were able to reaffirm that there were factual issues in the “Open Source Manifesto” article (it speaks about the GNU Manifesto) and despite Stallman’s request for correction, nothing has been done by the publishers. It’s like people just don’t wish to speak favourably about freedom in computing. Mac Asay, a Mormon (i.e. more superstition a religion than most other religions), compares Free software people to dangerous religions — a typical smear directed at a largely secular Free software community. Perhaps there are just those who are impossible to please because they are inherently opposed to control over one’s machine and would rather buy digital prisons from Apple than work a little harder to gain control or acquire freedom-respecting tools.

]]>
http://techrights.org/2015/05/13/rms-emails-on-revisionism/feed/ 0
Links 13/1/2015: Galaxy A7, Linux Mint 17.1 Reviews http://techrights.org/2015/01/13/galaxy-a7/ http://techrights.org/2015/01/13/galaxy-a7/#comments Tue, 13 Jan 2015 23:06:40 +0000 http://techrights.org/?p=81108

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Open source software platform released by Lockheed Martin

    Lockheed Martin software engineers have created a platform for easing big data analysis for developers and non-developers and are open sourcing the project on GitHub, a well-known web-based hosting service.

  • 6 excellent open source network monitoring tools

    There are tools that notify users when problems occur as well as when problems have been solved. And others are very good at spotting just about anything out of the ordinary or providing analysis of trends.

  • Three Pillars Of Open Source Governance

    Open source software has morphed from its underground DIY roots to become a common tool that runs essential parts of many businesses. In turn, commercial companies have sprung up around open source projects. These companies make money offering updates, support, and services.

    The intersection of open source and commercial interests raises questions about authority, authenticity, and culture.

    Is the project driven by the commercial sponsor or outside contributors? Will commercial interests trump the wishes of the community? How and where do you draw lines between a commercial entity and the open source community?

  • Top 5 open source project management tools in 2015

    Last year, I covered five of the best open source project management tools, like ProjectLibre and OpenProject. The article struck a chord with readers and continues to prove valuable. So, this year I revisited the tools mentioned in last year’s article, taking into account comments and suggestions from readers, and provided an update on where they are today. Next, I share five new open source project management tools for 2015. All in all, this article will give you a good look at 11 of the top open source project management tools out there.

  • Events

    • Free embedded computing conference posts agenda

      “Tomorrow’s Internet of Things will be built as an orchestration of hardware and software platforms, many of which will be built on Linux,” states the RTC Group in its RTECC event announcement. Attendees will have the opportunity to grab a copy of the most recent free RTC Magazine, featuring a cover that asks: “Linux: Can it run everywhere?”

    • Consumer Electronics Show 2015: Open source highlights

      The 48th annual Consumer Electronics Show (CES) has come and gone, bringing with it some exciting new open source platforms and products. While it’s difficult to capture every open source announcement and unveiling that happened last week, let’s take a look at a few of the highlights:

    • Linux.Conf.Au 2015 Kicks Off In Auckland

      This year’s LCA 2015 keynotes include Linus Torvalds, Bob Young, and Eben Moglen. For those not down under attending the conference, at least there’s usually top-notch videos of the keynotes and various sessions that are available in the weeks ahead. I’ll also be monitoring for the slides and other presentation assets to analyze and share on Phoronix.

  • Web Browsers

    • Mozilla

      • Announcing the Mozilla Science Lab Fellowship Program

        With generous support from the Leona M. and Harry B. Helmsley Charitable Trust, we are excited to announce the Mozilla Science Lab’s first Open Science fellowship program. The grant is one of the first investments by the Trust’s new funding program dedicated to collaboration, reproducibility, and infrastructure in biomedical sciences.

      • Firefox 35 Is Ready For Release, Available For Download Now

        In usual Mozilla fashion, Firefox 35.0 is scheduled to be released tomorrow but if you’re so tempted to upgrade to the latest release of this open-source web-browser you can do so tonight.

  • Oracle/Java/LibreOffice

  • Project Releases

    • rfoaas 0.1.1

      A brand new and shiny version of rfoaas is now on CRAN. The rfoaas package provides an interface for R to the most excellent FOAAS service–which provides a modern, scalable and RESTful web service for the frequent need to tell someone to f$#@ off.

    • Early Preview Release Of Git 2.3

      Beyond announcing Git v2.2.2 on Monday with various bug-fixes, Junio Hamano announced the release of Git 2.3.0-rc0 as a preview release towards Git 2.3.

  • Openness/Sharing

    • Open Access/Content

      • Meet the open access dinosaurs of the year

        As we enter 2015, it’s a good time to reflect on the state of paleontology and the state of open access. Because I’m a dinosaur paleontologist (my apologies to the other 99% of life that ever lived), this post will of course address that clade in particular!

        Thirty-eight new genera or species of dinosaur were announced in 2014 (according to my count based on a list at Wikipedia and the dinosaur genera list), spanning everything from sauropods to tyrannosaurs to horned dinosaurs. Seventeen of these were published in open access or free-to-read journals. This works out to around 45%.

    • Open Hardware

      • Open Source Hardware Advances Science,Technology

        On June 12, 2014 Elon Musk caused a stir by announcing Tesla’s decision to open its patents. To many, Tesla’s bold move signaled the beginning of an era and an open call for open source.

Leftovers

  • Hardware

    • making it work

      Linus recently noted that many-core (1000+ core) computing will never happen because software doesn’t work with it. Fortunately for us, Linus is a man of limited vision and is wrong about the inevitability of that outcome because he makes a flawed assumption: we will continue writing software the way we currently do. He is right that if we keep writing software the way we do, many-core will not happen. Even multi-system will run into limits, particularly on the client side. However, we don’t need to keep writing software the way we do.

  • Health/Nutrition

    • Fall in life expectancy raises alarm amid fears that cuts and pressure on NHS may be to blame for earlier deaths

      Health officials are investigating a “statistically significant, sustained” decline in life expectancy among elderly people in some parts of England, amid warnings that cuts to social care and pressures on the NHS may be contributing to earlier deaths.

    • EU lawmakers pass controversial GMO food law

      EU lawmakers on Tuesday approved controversial legislation to allow EU member states to decide for themselves whether to allow cultivation of Genetically Modified foods after years of bitter dispute.

      “This agreement will ensure more flexibility for member states who wish to restrict the cultivation of the GMOs in their territory,” said Liberal Democrat MEP Frederique Ries who steered the legislation through the assembly.

      For some of the 28 European Union nations such as France, GMO foods are a potential threat to public health and the reputation and integrity of its famed agricultural produce.

  • Security

  • Defence/Police/Secrecy/Aggression

    • The Centcom ‘hack’ that wasn’t

      Hackers claiming links to the Islamic State have hijacked several social media accounts belonging to U.S. military’s Central Command. The hacking group, which calls itself “CyberCaliphate,” is tweeting out what the group claims are U.S. military PowerPoints and data on retired Army personnel — seemingly sensitive files that have no business being publicly aired. The images are meant to show that the hackers have penetrated the Pentagon’s network. But the chances of this actually having happened appear rather slim. Here’s why.

    • Manipulation of Terror

      Nationalists are spreading hate, fanatics are attacking Muslims, governments are capitalizing on this tragedy.

  • Transparency Reporting

    • WikiLeaks: not perfect, but more important than ever for free speech

      The secret CIA files appeared just before Christmas. One detailed how CIA operatives could maintain cover, using fake IDs, when travelling through foreign airports. Israel’s Ben Gurion airport was said to be one of the hardest to trick.

      The other document, from 2009, was an assessment of the CIA’s assassination program. It raised doubts about the effectiveness of the program in reducing terrorism. Likewise with Israel’s killing of Palestinians.

      In Afghanistan, the CIA discovered that murdering Taliban leaders could radicalise the militants, allowing even more extreme actors to enter the battlefield. The Obama administration ignored this advice and unleashed “targeted killings” in the country. Unsurprisingly, the insurgency is thriving.

  • Privacy

    • David Cameron’s internet surveillance plans rival Syria, Russia and Iran

      What David Cameron thinks he’s saying is: “We will command all the software creators we can reach to introduce back doors into their tools for us.” There are enormous problems with this: there’s no back door that only lets good guys go through it. If your WhatsApp or Google Hangouts has a deliberately introduced flaw in it, then foreign spies, criminals, crooked police (such as those who fed sensitive information to the tabloids who were implicated in the phone-hacking scandal – and like the high-level police who secretly worked for organised crime for years) and criminals will eventually discover this vulnerability. They – and not just the security services – will be able to use it to intercept all of our communications, from the pictures of your kids in your bath you send to your parents to the trade secrets you send to co-workers.

    • WhatsApp and iMessage could be banned under new surveillance plans

      David Cameron could block WhatsApp and Snapchat if he wins the next election, as part of his plans for new surveillance powers announced in the wake of the shootings in Paris.

    • UK government could ban encrypted communications with new surveillance powers

      Britain’s Prime Minister, David Cameron, is calling for new surveillance powers in the wake of the recent shootings in Paris. Speaking at a public event in the UK this morning, Cameron outlined the government’s stance on secure communications that can’t be read by police or government agencies. “In our country, do we want to allow a means of communication between people which […] we cannot read?” he asked, comparing letters and phone conversations to encrypted communications used online, adding that “we must not” allow a means of communication where individuals can communicate in secret over the internet.

    • David Cameron Should Worry You

      It should have come as a surprise to nobody that leaders around the world are jumping on the Charlie Hedbo attacks in Paris as a means to justify increased warrantless surveillance.

      What you should take away from his statement is that he’s willing to encroach on the civil liberties of millions of British people in a misguided attempt to increase national security. We know from leaked NSA slides (see left) that this has always been the desire of the surveillance arms of the UK and US governments. Now, they’re using the fear that Paris generated to pass legislation.

    • Max Hastings embraces ‘der Deutsche Blick’

      It is concerning that, in the midst of citing the “coherent doctrine[s]” of Nazism and the Eastern Bloc, Hastings advocates their “everything about everyone” methods of domestic surveillance. The NSA’s term is “collect it all”. Apparently, Hastings is blind to the danger of history repeating, a history that includes MI5 finding itself with “very little to do” by the early 1970s, and turning (in the 1980s) on the people it was supposed to protect (see: DS19, and F branch) – surveilling for the first time with data banks and networks. By the 1990s, whistleblowers were reporting that Hastings’ “few mavericks, [...] who abuse such power” were a majority within positions of power, and broadly ignoring the Act of Parliament (1989) meant to curtail the agency’s excesses. Without oversight, institutions are as likely to devolve as reform, and Hastings’ outdated deference creates the space for further abuses.

    • U.K. Prime Minister David Cameron Proposes Banning End-to-End Encryption
    • What David Cameron just proposed would endanger every Briton and destroy the IT industry

      What David Cameron thinks he’s saying is, “We will command all the software creators we can reach to introduce back-doors into their tools for us.” There are enormous problems with this: there’s no back door that only lets good guys go through it. If your Whatsapp or Google Hangouts has a deliberately introduced flaw in it, then foreign spies, criminals, crooked police (like those who fed sensitive information to the tabloids who were implicated in the hacking scandal — and like the high-level police who secretly worked for organised crime for years), and criminals will eventually discover this vulnerability. They — and not just the security services — will be able to use it to intercept all of our communications. That includes things like the pictures of your kids in your bath that you send to your parents to the trade secrets you send to your co-workers.

      [...]

      Cameron is not alone here. The regime he proposes is already in place in countries like Syria, Russia, and Iran (for the record, none of these countries have had much luck with it). There are two means by which authoritarian governments have attempted to restrict the use of secure technology: by network filtering and by technology mandates.

    • Why MI5 does not need more surveillance powers after the Paris attacks

      Soon after the attacks in Paris last week, the director general of MI5, Andrew Parker, said of the jihadi threat: “Whenever we lose visibility of what they are saying to each other, so our ability to understand and mitigate the threat they pose is reduced.”

      Few would disagree with this sentiment, or in any way underestimate the enormous responsibility counter-terrorist agencies face after the killings, but the coded suggestion that MI5 needs further sweeping surveillance powers to track down terrorists is more controversial, because it doesn’t take into account the facts.

    • George Brandis still struggling with metadata

      While it is perhaps unsurprising, the Attorney-General’s latest attempt to use the Sydney siege and recent events in France as justifications for the government’s mandatory data retention laws is as distasteful as it is misleading.

    • What new snooping powers do PM and MI5 want – and what are the concerns?
    • In wake of Paris attacks, French surveillance gets a closer look

      French President Francois Hollande chaired an emergency meeting Monday morning with key cabinet ministers and heads of police and security services to discuss how persons known to the country’s intelligence community were still able to coordinate violent raids in Paris. But just days before the attacks on the offices of satirical magazine Charlie Hebdo left 12 dead and wounded another 11, a controversial new law, broadly expanding the French government’s surveillance powers, went into effect.

    • MI6 forced to show how it may snoop on privileged lawyer-client exchanges

      MI6 has been forced to reveal documents detailing how it may access legally privileged communications between solicitors and their clients, even if the lawyers are suing the government.

      Policy guidance handed over to the civil liberties organisation Reprieve shows how the Secret Intelligence Service (SIS) is attempting to regulate its mass surveillance practices and demonstrate compliance with the law.

      The revelations have emerged from a case brought by lawyers for two Libyans, Abdel-Hakim Belhaj and Sami al-Saadi, who, along with their families, were abducted in a joint MI6-CIA operation and sent back to Tripoli to be tortured by Colonel Muammar Gaddafi’s regime in 2004.

      Their complaint about illegal monitoring is being heard before the investigatory powers tribunal and a full trial of the issues is expected this spring.

      Exchanges between lawyers and their clients enjoy a special protected status under UK law. Following exposure of widespread monitoring by the US whistleblower Edward Snowden in 2013, Belhaj’s lawyers feared that their exchanges with their clients could have been compromised by GCHQ’s interception of phone conversations and emails.

    • After Paris: More Intelligence, not More Surveillance

      This is the extraordinary thing about mass surveillance. Every time it fails, its supporters use it as evidence that we must have more (even though blanket surveillance is no longer possible in the EU.) If something doesn’t work, you shouldn’t do more of it, but something different and more effective. One of the striking things to emerge from the report on intelligence matters relating to the murder of Fusilier Lee Rigby, which I wrote about back in November, was that the UK intelligence services simply didn’t have enough people to follow up all the leads they had. So the idea that we need *more* surveillance data, more false positives, more leads to follow up, is clearly folly.

    • What you ‘like’ on Facebook gives away your personality

      Be careful what you “like” on Facebook. You’re opening a small window on your soul.

      A machine-learning algorithm can now predict human personality types using nothing but what people like on the Facebook social media site. A team at Stanford University in California and the University of Cambridge used data from a questionnaire filled out by 86,000 people that identified their “big five” personality traits. The results were correlated with their Facebook activity.

      On the basis of between 100 and 150 Facebook likes, the team’s algorithm could determine someone’s personality more accurately than could their friends and family, and nearly as well as their spouse.

    • Ever liked a film on Facebook? You’ve given the security services a key to your soul

      Why on earth does David Cameron feel the need to call for new digital powers for the security services when they are only beginning to use the ones they already have? Suppose you wanted personality profiles of a quarter of the population of England? Turns out you can mine them from Facebook with publicly published algorithms. About half the adult population of England uses Facebook at least once a month. About a quarter of us have “liked” more than 250 things there. So it’s really disconcerting to discover that completely banal acts on Facebook can add up to a quite detailed psychological profile.

  • Civil Rights

    • Risen finally off hook in leak trial

      New York Times reporter James Risen won’t be called to the witness stand at a leak trial for one of his alleged sources, but jurors may hear some of the words he uttered at a pre-trial hearing last week, according to lawyers and the judge overseeing the case.

    • Feds want Risen out of leak trial

      Federal prosecutors who have decided after a seven-year legal battle not to call New York Times reporter James Risen in the leak trial of one of his alleged sources are now intent on making sure the defense in the case can’t call Risen either—or even talk about the government’s decision not to call him.

    • Psychologists provided legal cover for US torture programs in exchange for status and power, book shows

      James Risen’s new book “Pay Any Price: Greed, Power and Endless War” spells out how the American Psychological Association and the US security apparatus worked together, towards mutually beneficial aims, to cloak the government’s torture programs in a mask of legality. Essentially, the APA gave the military what it wanted—claims that the torture programs were medically sound—in exchange for power and prestige.

      The story is simultaneously pathetic and horrifying.

      Risen describes how in 2002, the APA changed its ethical guidelines to allow members to do things that violate the APA code of ethics, as long as the psychologists were following the law or what they called “governing legal authority.” As long as the US government said it was ok, the APA’s members could engage in torture—its own ethics rules be damned. As Risen observes, the “change introduced the Nuremberg defense into American psychology—following lawful orders was an acceptable reason to violate professional ethics.” Always a bad sign when one begins to take legal cues from Nazis.

    • “Insider Threat” Program Lags Behind Schedule

      Currently, the anticipated achievement of an Initial Operating Capability for insider threat detection by January 2017 is “at risk,” according to a new quarterly progress report. Meanwhile, the date for achieving a Full Operating Capability cannot even be projected. See “Insider Threat and Security Clearance Reform, FY2014, Quarter 4.”

    • The Corrupt Philanderer Who Built the CIA’s Black Sites

      Democratic deliberation rests on the premise that ideas, once exposed to the public—unfolded, challenged, tested, and disputed—will stand or fall on their own merit. The bureaucratic drive for secrecy rests, in many cases, on a need to keep information out of the hands of individuals who could use it to harm the bureaucracy. The bureaucrat will invariably say that an enemy could use the information to harm the country, but more often than not the real concern originates with the bureaucrat personally or the office where he or she works.

    • America’s over-policing bombshell: How new data proves “stop & frisk” critics were right all along

      People are talking about the police a lot these days. The killing of unarmed residents. The killing of cops. Disputes between New York City mayor Bill de Blasio and rank-and-file officers over issues of respect. And yet, a policing issue that totally consumed and divided New York and the nation in recent years now garners little mention: the NYPD’s stop-and-frisk policy.

      One big reason, of course, is that the tactic is used much less now. But another is that, while few have announced it, the debate over the once hotly divisive practice is effectively over. As new data this week confirmed, when it comes to whether a city can reduce crime without stopping-and-frisking enormous numbers of its residents of color, one side was right and one was wrong.

    • The VICE News Interview: Joseph Hickman

      According to the US government, three detainees — all imprisoned as part of the global war on terror — hung themselves in their cells that night. But Army Staff Sergeant Joseph Hickman, who was on guard that night at Camp Delta, came to believe something very different: that the three men were murdered in a secret CIA black site at Guantanamo.

    • Hotter Than Lava

      Every day, cops toss dangerous military-style grenades during raids, with little oversight and horrifying results.

    • Politicians apply double standard in support of David Petraeus amid FBI leaks inquiry

      Though under investigation by the FBI for unauthorized disclosure of classified information related to an affair with his biographer, David Petraeus counts among his defenders a host of prominent politicians who typically denounce security leaks.

      The former US army general and CIA director has deep ties to a bipartisan host of political heavyweights, from potential Democratic presidential nominee Hillary Clinton to former Republican presidential nominee John McCain, and a well of media support stemming from his stewardship of the 2007-08 Iraq troop surge. Many have raced to support Petraeus in the days since word emerged that the most acclaimed military officer of his generation might face felony charges.

    • Obama & Counterterror: The Ignored Record

      Torture, paradoxically, has been the area where Obama’s policy has been both the firmest and the most qualified. By all available evidence, use of the “enhanced interrogation techniques” has stopped. Obama also prohibited further use of secret detention facilities where suspects had “disappeared” in CIA custody for torture. (To be fair, Bush by the end of his presidency seemed to have ended both too.)

    • Guantanamo Bay: A ‘Battle Lab’ Where Personnel Experimented on Prisoners to Develop Torture Techniques

      On the thirteenth anniversary of the first prisoners brought to Guantanamo Bay, a report from the Seton Hall Law Center for Policy and Research examines how the United States government used the facility as a “battle laboratory.”

      Prisoners were treated like “test subjects” as personnel, including medical officers, engaged in experiments to develop new interrogation techniques. Numerous detainees were drugged upon arrival to help interrogators break them. One prisoner, Mohammed al-Qahtani, was treated like a “lab rat” and monitored closely by medical personnel to determine if his body could continue to be tortured.

    • “Circus of Hypocrisy”: Jeremy Scahill on How World Leaders at Paris March Oppose Press Freedom

      An estimated 3.7 million people rallied across France on Sunday in response to the Charlie Hebdo shootings and ensuing attacks that left 17 people dead. More than a million people marched in Paris, making it the largest demonstration in French history. More than 40 world leaders traveled to Paris to help lead the march. “What we saw on display on the one hand was very heartening, to see so many people come into the streets,” says Jeremy Scahill, co-founder of The Intercept. “But on the other hand, this is a sort of circus of hypocrisy when it comes to all of those world leaders who were marching at the front of it. Every single one of those heads of state or representatives of governments there have waged their own wars against journalists.”

    • The Intercept Found Serial’s Elusive Jay, but Can It Find a Profitable Future? [UPDATED]
    • Consent of the Governed

      Recent polling data confirms that a majority of Americans — in some cases a vast majority — have very low levels of trust in our ruling institutions. Only about a fifth of the population has a lot or great deal of trust in big business. Americans have an all-time historic low level of trust for the US Congress — a minuscule 7 percent — and distrust in the government as a whole is at an historic high: 81 percent. Though these numbers are abysmal, the troubling aspect of the reporting is that the numbers continue to trend in the wrong direction. Meaning, it will likely get worse without corrective action. This condition is more serious than some realize.

    • I Helped Create Gitmo. Now I Want It Shut Down.

      Thirteen years ago this month, I arrived in Guantanamo Bay, Cuba, as the commander, Joint Task Force 160, charged with constructing and operating a detention facility to hold Taliban and al Qaeda detainees. Today the detention facility at Guantanamo is a blight on our history, and it should be closed.

    • Nigeria’s Horror in Paris’s Shadow

      Why a 10-year-old suicide bomber isn’t front-page news

  • Internet/Net Neutrality

  • Intellectual Monopolies

]]>
http://techrights.org/2015/01/13/galaxy-a7/feed/ 0
Wrapping Up a Year of NSA Disgrace, Propaganda Film Advocating State Abuses Already in Preparation (Starring Benedict Cumberbatch Again) http://techrights.org/2013/12/30/spies-in-2013/ http://techrights.org/2013/12/30/spies-in-2013/#comments Mon, 30 Dec 2013 12:52:37 +0000 http://techrights.org/?p=74381 Serving those who abuse their power

Benedict Cumberbatch

Summary: 2013 a terrible year for spies and vandals who work for the state; propaganda blockbuster designed to manufacture consent for this is already in the pipeline

Having repeatedly covered NSA affairs for several years now, we finally have documents confirming what we warned about, reminding people that Free software is essential for genuine trust in computing [1]. This post is an accumulation of about 3 weeks of news about the NSA and its affiliates (commercial companies and other ‘satellite’ agencies around the world). This will hopefully help readers get their heads around it all with a high level of concision (yet a comprehensive enough scope). It takes a huge amount of time to prepare a post like this (weeks of daily research) and the references below should help support the claims, providing a gateway to further information.

In December, the series of revolutionary [2], important [3] and widely-known [4] scandals turned 6 months old [5]. Two court decisions were contradicting one another and the ACLU plans to appeal, based on its latest statement. The ACLU challenged in court the tracking and profiling systems that are based on people’s phonecalls. One judge considered it illegal [6-9] and unconstitutional [10-11], agreeing with many prominent commentators [12] (maligned by CNN [13]), putting aside the later ruling [14-18]. Even sections of the corporate media [19], which usually pretends to be impartial while pro-NSA [20], gave this coverage.

Merkel, who told Obama this was reminiscent of the Stasi [21,22] (still in positions of power [23]), made some headlines also. A German coalition now generally favours German-owned or Free software because of the NSA revelations [24-25] and lack of trust [26-27] (Germany is not alone [28-29]). France would be hypocritical to say much at this point [30] and new videos reveal a very high degree of distrust even within Europe itself, dividing East and West, still (Not East and West Germany but Russia and/or Europe and north America/UK) [31-32].

The importance of the latest court ruling is high; it is a nightmare for the NSA [33] because it recognises Edward Snowden as a whistleblower [34] and makes it known that the real criminals are Clapper, Alexander and other military men/politicians including President Obama [35], who tries to dodge discussion about his complicity in this [36-43] and actively obstructs justice [44-46], delaying/procrastinating [47] where possible, etc.

The US and UK (closely connected [48]) have politicians who merely parrot the talking points from spooks [49-50] and this is being noticed. They no longer get away with it so easily, not even when state propaganda channels repeat the claim (CBS is widely disgraced for what it did for the NSA a few weeks ago).

Edward Snowden, another man whom history will most likely remember as a hero [51] is looking for asylum to become effective next year, choosing Germany [52-53] or Brasil as one very strategic, strong-enough-to-resist-blackmail asylum (the reporter who worked with him lives there) [54-56]. Brasil has just ditched Boeing, perhaps in part due to Wikileaks and Snowden (revealing corruption and back doors) [57-60]. In this age of governance by algorithms [61] and hardware (e.g. CCTV [62]) we risk approaching something that’s worse than 1984, to paraphrase Snowden [63-69] (he claims to have “won” [70-75]). Some people want the NSA shut down [76] and they get their views broadcasted [77-78], citing/crediting Snowden’s contributions [79-80].

It is only getting worse over time [81-84], as the NSA is ignoring advice from NSA manager-turned-whistleblower, instead following the trajectory suggested by Morell (CIA) [85-88]. And so, observing a sort of entryism (fox guards the hen house), Snowden wants to accomplish real change this time [89], with or without help from the corporate press [77-78]. He called for real change (through Congress [79], which should protect him [80]) in this age of more useless promises from chronic liars [89].

British scientist Tim Berners-Lee (best known for creating the Web) called for real change [90], but British spies and their apologists (see Guardian articles, including one about Bletchley Park) seem to just burying the current events under the rug [91-94].

There are real concerns here [95] because political espionage (see the surveillance used against KGB’s Putin [96-97] and outrageous surveillance of regulators, politicians, and even charities [98-111]) or industrial espionage (examples given before) are the key areas the NSA has been involved in. It’s not about terrorism [112-114], which is mostly a privacy-infringing [115-117] pretext and excuse [118] (the corporate press needs to acknowledge this [119], putting aide the 9/11 hype [120-121]). “Sometimes I think we do the terrorists’ job for them,” Dan K. Thomasson wrote [122], alluding to how we prove them right by mocking and revoking our own freedom and rights.

Zynga’s Mark Pincus has asked Obama to pardon Edward Snowden [123], but the spies want to just kill Snowden [124-126] because they are sociopaths [127-128] (exceptionalism complex) and empathy/sympathy cannot be tolerated [129-130] (Snowden cannot expect fair trial [131-132]). It should be noted that Zynga, a spam and surveillance company (which also makes games), is too hypocritical; it’s ridiculous for Zynga to take such a position. A lot of the surveillance done by the NSA has been facilitated by so-called ‘cloud’ and Internet companies, as well as carriers [133-144]. They store data for the government, so they — and especially phone companies — should be seen as NSA extensions [145]. Fake/weak encryption and back doors play a role [146-147] (bribes played a role [148-152] and alternatives now emerge, e.g. from BitTorrent [153-154]). Perhaps Mark Pincus worries about loss of business [155-156], not ethics. Some businesses walk out of the US for business purposes [157-158], especially when it comes to data storage.

The NSA has become somewhat of a joke (subject of satire [159-161]) and its biggest proponents in politics are the same right-wing politicians who tried to classify Wikileaks “terrorism” and treat it as such [162]. They lie, too [163]. It’s that exceptionalism again.

Some suspect that the NSA now interferes with free speech [164-165] using cracking techniques [166] (evidence is weak most of the time). Glenn Greenwald has blasted the corporate media [167-180] for helping the NSA do its thing and also hinted at the next major leak: the NSA and GCHQ are dying to snoop on your gadgets mid-flight [181]. Alan Dershowitz, who pretended to help Wikileaks (he only exploited Wikileaks), is showing his real face again by slamming Greenwald [182-185] and Applebaum, a Wikileaks employee, has just had his house in Germany allegedly raided [186], ahead of a major report [187-188] that reveals serious NSA crimes [189] and back doors — the types of back doors that would in theory enable spooks to plant suicide notes and tamper with browser history before assassinating people and making it look like a suicide [190].

The surveillance industry is taking many blows and right now the British media is trying to use Turing [191], a national hero to manym as part of a recruitment drive for GCHQ. This includes a propaganda film featuring the same shameless actor who starred in the anti-Wikileaks film. It’s not just the CIA but also the NSA et al. that require popular propaganda films to change public image. Be ready for gullible people to get deceived and to somehow associate NSA et al. with beating the Nazis, never mind if a lot of Nazi officers actually joined the CIA and NSA after WW2. Propaganda can be powerful and it is inevitable. The more we find out about the NSA, the better equipped we’ll be in shooting down this type of propaganda.

Related/contextual items from the news:

  1. 12 Ways of NSA Suspicion

    With open source code the NSA would be foolish to install a true back door.

  2. EUGENE ROBINSON: Snowden’s NSA revelations have changed the world
  3. Welcome Big Brother, 2013 version

    Freedom is a precious commodity. Like virtue, once it is given up, it is difficult — if not impossible — to regain.

  4. NSA has become a four-letter word in US

    The NSA “has become a four-letter word in the US” and Americans are irritated, executive director of the Ron Paul Institute for Peace and Prosperity, Daniel McAdams, told RT while commenting on a ruling which states that the agency’s spying is legal.

  5. The year the NSA hacked the world: A 2013 PRISM timeline (Part II)

    When June 2013 came to a close, the world was just coming to terms with the revelations of widespread and unaccountable spying by the American National Security Agency (NSA) revealed by whistleblower Edward Snowden. Mass gathering of metadata, recording of phonecalls, spying on civilian populations: at first, it seemed as if this would be a good old fashioned unaccountable-spy-agency-against-the-people kind of story. But it would soon become apparent that the rot went much further than that.

  6. Judge Questions Legality of N.S.A. Phone Records
  7. A striking reverse for the NSA

    The broad issue that Judge Leon looked at is the NSA’s power to collect metadata – the record of who is telephoning whom, when the call is made and for how long. Defenders of the NSA argue that the acquisition of phone metadata only allows the agency to see the context in which a call is made, establishing links between potential terrorists. It does not give the NSA access to the content of calls.

  8. The NSA Needs an Adversary in Court

    In the six months since Edward Snowden began leaking details about the National Security Agency’s efforts to collect telephone data on a colossal scale, NSA officials have repeatedly asserted that the program is on firm legal ground. Now U.S. District Court Judge Richard Leon has ruled that it probably infringes on the Fourth Amendment, calling it “almost Orwellian” in scope.

  9. This Week in Review: A judge deals the NSA a blow, and breaking down Patch’s fatal flaws

    60 Minutes’ NSA flattery: CBS News’ 60 Minutes touted a big story on the NSA surveillance beat when it got exclusive access to NSA officials to talk to them about their mass surveillance programs and Edward Snowden’s leaks. The story did contain one bit of pertinent news — that the NSA is considering granting Snowden amnesty in exchange for the return of its documents, a trial balloon that Reuters’ Jack Shafer examined more closely.

    The piece’s reporter, John Miller, explained an behind-the-scenes interview with 60 Minutes that he didn’t want the story to be a puff piece. As it turned out, in the eyes of most every media critic who watched it, that’s exactly what he produced. The Wire’s Sara Morrison laid out a good, basic summary of the puffiness of the piece, and Mike Masnick of Techdirt highlighted a few elements: zero difficult questions, no NSA critics in the piece, unchecked ad hominem attacks against Snowden.

  10. Updated: Federal judge finds NSA phone spying likely unconstitutional

    In a stunning decision, a DC-based federal judge has ruled that the National Security Agency spying revealed this summer violates the constitution.

  11. NSA phone surveillance ‘likely unconstitutional’
  12. I challenged the NSA in court because it’s a totalitarian attack on human rights
  13. NSA SLAYER CALLS FOR FIRINGS AT CNN

    Klayman has praised the courage of Judge Richard Leon of the U.S. District Court for the District of Columbia, who ruled that the NSA’s regular collection of virtually all phone records is almost certainly unconstitutional.

    Klayman’s case, on behalf of a Verizon Wireless customer, was launched after the extent of government spying on Americans was unveiled by former NSA contractor Edward Snowden, who said the court’s decision made him feel justified in releasing classified documents. Named in the case are the NSA, Department of Justice and several U.S. officials, including President Obama and Attorney General Eric Holder.

  14. Is the NSA’s Spying Constitutional? It Depends Which Judge You Ask
  15. U.S. judge upholds NSA phone surveillance program

    A U.S. judge ruled the National Security Agency’s program that collects records of millions of Americans’ phone calls is lawful, rejecting a challenge by the American Civil Liberties Union to the controversial counter-terrorism program.

  16. Judge Defends Government Secrecy & Dismisses ACLU Lawsuit Challenging NSA Surveillance Program
  17. Ratifying NSA Spying, a Court Calls FISA ‘Courts’ Into Question
  18. Judge’s Wikipedia Page Vandalized After Ruling In Favor Of NSA Surveillance

    The National Security Agency on Friday won a court opinion ruling that its tactics of bulk phone data collected on Americans and others worldwide does not violate the U.S. Constitution. Following the decision, vandals began defacing the Wikipedia entry for the district court judge who issued the decision: the Hon. William H. Pauley III.

  19. NSA Spying Sweeps ‘Have Gone Too Far’, Report

    A panel has recommended curbing the secretive powers of the National Security Agency, warning its mass spying sweeps in the war on terror had gone too far.

  20. NSA data surveillance – right or wrong?
  21. Merkel compared NSA to Stasi in heated encounter with Obama
  22. US snooping revelations: Merkel ‘told Obama NSA was like the Stasi’

    During angry exchanges over the scope and scale of American spies’ snooping exposed by the NSA whistlewblower Edward Snowden, Angela Merkel reportedly told Barack Obama his country’s conduct was reminiscent of the Stasi.

    The German Chancellor had the discussion with her US counterpart in October, shortly after the revelation that her personal mobile phone had been tapped.

  23. Ex-Stasi staff still work at archives of East Germany’s former secret police

    It was set up as a unique historical experiment: an agency that would open up the secret service’s files to those it had spied upon. But now the commissioner in charge of the East Germany’s secret police archive has admitted that his agency still counts 37 former Stasi employees among its staff.

  24. German coalition favors German-owned or open source software, aims to lock NSA out
  25. GERMANY URGES US FIRMS TO BAN PASSING SENSITIVE DATA TO NSA
  26. NSA surveillance eroded transatlantic trust

    One year ago, most people on either side of Atlantic had scant or no knowledge of the NSA and its activities. Edward Snowden’s revelations changed all that and rocked one of the pillars of transatlantic relations.

  27. NSA Scandal May Help Build Cyber-Barriers

    Deutsche Telekom has also proposed to help Europe avoid NSA surveillance by creating “Schengen area routing,” a network for the 26 European countries that have agreed to remove passport controls at their borders. This network would supposedly allow these nations to securely exchange data among themselves. Conveniently, the Schengen area does not include the U.K., which is now known to be closely cooperating with the NSA.

  28. Europe Turns to Alternatives on NSA Fallout
  29. NSA Fallout in Europe Boosts Alternatives to Google

    During its first four years, Berlin-based Posteo e.K. struggled to find customers for its secure e-mail service. That changed in June, when U.S. National Security Agency contractor Edward Snowden revealed that his former employer monitored phones and e-mails worldwide. In the past six months, Posteo has tripled the subscribers of its 1-euro-per-month ($1.37) encryption service, to more than 30,000.

  30. Final Adoption of Generalised Surveillance in France: a Disturbing Political Drift

    The French President promulgated [fr] the 2014-2019 Defense Bill last night. Adoption of article 20 (former article 13) opens the door to the generalised surveillance of communications and the failure to request its constitutional challenge demonstrates the deep crisis of a political system which does not hesitate anymore to massively compromise fundamental rights. La Quadrature du Net thanks all those who contributed to the opposition to this article. It calls for the continuation of the fight against surveillance of our communications on the Internet by any means: before parliament or judges, through technology and usage choices.

  31. [Video] Tom Drake — Full Interview
  32. [Video] Revealed: Norway widely spies on Russia for NSA – new Snowden leak
  33. The NSA’s rough week just got even worse

    Back in August, not long after Edward Snowden began leaking details about NSA surveillance programs, President Obama created a panel to review the NSA’s data surveillance practices and recommend changes. Yesterday, the panel released its 308-page report and recommended 46 changes, including ending the collection of phone call metadata, which the panel says “creates potential risks to public trust, personal privacy, and civil liberty.” Instead, phone companies or other private entities should control the data, and it should only be accessed with an order from the Foreign Intelligence Surveillance Court (FISC).

  34. Finally, a Ruling That Recognizes Snowden as a Whistleblower
  35. Why are there no charges against the NSA crew: Clapper, Alexander and Obama?

    It’s curious how then-President Bill Clinton was impeached and removed from office by the US Congress for just one lie concerning the relatively trivial matter of an extramarital affair – a scandal that didn’t concern his official duties.

    But James Clapper and Keith Alexander, who are in charge of the NSA system, have told a number of lies while under oath – one journalist counted 14 lies by Alexander – to the US Congress concerning matters of vital importance to the Congress, the American people and the world. Specifically, they have lied, used half-truths, and obfuscated while under oath to conceal from the Congress, and the public, the massive surveillance of the American people’s online activities secretly carried out by the NSA. Yet no charges or attempted charges have been brought.

  36. White House Tries to Prevent Judge From Ruling on Surveillance Efforts

    The Obama administration moved late Friday to prevent a federal judge in California from ruling on the constitutionality of warrantless surveillance programs authorized during the Bush administration, telling a court that recent disclosures about National Security Agency spying were not enough to undermine its claim that litigating the case would jeopardize state secrets.

  37. Obama ‘hijacks’ tech executive meeting to make ‘PR pitch’ on Obamacare website fix instead of dealing with NSA surveillance

    During a White House meeting called to brief America’s largest tech companies today about government overreach in electronic surveillance, President Barack Obama changed the subject – angering some meeting participants by shifting gears to address the failed launch of healthcare.gov.

    ‘That wasn’t what we came for,’ a vice-president of a company whose CEO attended told MailOnline. ‘We really didn’t care for a PR pitch about how the administration is trying to salvage its internal health care tech nightmare.’

  38. Obama Can’t Avoid the NSA Report, But He’ll Try

    A panel of presidential advisers has urged the White House to rein in the National Security Agency, and recommended a set of expansive policy reforms that would check the agency’s broad surveillance powers, including an end to the bulk collection of virtually all American phone records. At the same time, the recommendations also leave in place most of the NSA’s surveillance programs.

  39. NSA Report Ups Pressure for Reforms Obama Sought to Avoid

    The review panel’s calls for minor reforms are already more than President Obama is likely to want to make, but as the surveillance scandal continues to grow, his ability to put off calls for reform with promises of “transparency” is going to be tested.

  40. President Obama’s NSA review group is typical administration whitewash

    Notice how the White House moved quickly to thwart the only substantive NSA changes the review group was making

  41. NSA survelliance reforms lack substance

    There is one concrete way for the president to demonstrate good faith in dealing with the reforms: Pardon Edward Snowden.

  42. NSA leaks: Obama hints at surveillance rethink

    US President Barack Obama has suggested there may be a review of surveillance by the National Security Agency in the wake of a series of spying revelations.

  43. Editorial: Obama must explain NSA or accept changes
  44. Despite Releasing New NSA Information, Government Still Tries to Block Groundbreaking EFF Case

    U.S. government intelligence officials late last night released some previously secret declarations submitted to the court in Jewel v. NSA — EFF’s long-running case challenging the NSA’s domestic surveillance program – plus a companion case, Shubert v. Obama. The documents were released pursuant to the court’s order.

    Surprisingly, in these documents and in the brief filed with them, the government continues to claim that plaintiffs cannot prove they were surveilled without state secrets and that therefore, a court cannot rule on the legality or constitutionality of the surveillance. For example, despite the fact that these activities are discussed every day in news outlets around the world and even in the president’s recent press conference, the government states broadly that information that may relate to Plaintiffs’ claims that the “NSA indiscriminately intercepts the content of communications, and their claims regarding the NSA’s bulk collection of … metadata” is still a state secret.

  45. U.S. government moves to block further litigation in NSA surveillance cases

    The U.S. government again claimed state-secrets privileges in a move to block two lawsuits challenging the constitutionality of the National Security Agency’s monitoring of Americans’ phone communications and email, according to court filings late Friday.

  46. Feds admit start of NSA surveillance, still say it’s too secretive for court

    This weekend, the US government filed documents in two long-running cases (both in California’s Northern District) related to National Security Agency (NSA) surveillance. As the New York Times notes, these filings mark the first time the government acknowledged that the NSA “started systematically collecting data about Americans’ e-mails and phone calls in 2001, alongside its program of wiretapping certain calls without warrants.” However, the bigger takeaway from the new documents is that the government continues to evoke state secrets privilege—the right to prevent certain, potentially harmful information from being used in court even if it means a case might be dismissed—despite previous rulings against this argument.

  47. Obama to make a “definitive statement” on NSA future in January
  48. UK’s GCHQ doing the NSA’s heavy lifting – George Galloway

    Robles: Do you think that the UK has lost a lot of sovereignty to the US, especially with all this NSA spying and stuff? Or is that…?
    Galloway:No, I do, I believe that the British State has essentially rented itself out, I don’t want to be too candid in the analogy, but it has …
    Robles: I was going to say lapdog, but I tried not to.
    Galloway:Well it’s worse than that. It has prostituted itself to the United States. The GCHQ at Cheltenham is doing most of the heavy lifting for the National Security Agency, in the illegal vacuuming of the spectrum, and is collecting uncountable scores of millions of telephone calls, texts and e-mails every day across Europe, and further beyond, as the fiber optics cross the British landmass, coming from the United States across the Atlantic and thence to Europe.

  49. Sunday’s NSA report confirms it: 60 Minutes is now in the spin business

    The special NSA report was a promotional. It follows a string of spectacularly biased ‘news’ shows and shoddy reporting

  50. MPs grill Theresa May over spy chiefs’ ‘melodramatic soundbites’ on NSA files

    Home affairs committee asks home secretary whether she has been given proof by MI5 and MI6 to support their rhetoric

  51. From Snowden To Manning… To Ben Franklin And Sam Adams? A History Of Leakers Of Secret Gov’t Documents
  52. Snowden will help Germany investigate NSA spying if granted asylum – report
  53. Snowden offers Germany help on NSA tapping if granted asylum
  54. Snowden: Dear Brazil, the NSA is watching you
  55. Snowden willing to help Brazil against NSA in exchange for asylum
  56. NSA Whistleblower Edward Snowden ‘to Assist Brazil in Return for Asylum’

    NSA whistleblower Edward Snowden told the Brazilian government that he would be willing to help it investigate US eavesdropping activities in Brazil in exchange for political asylum.

    In an open letter to the Brazilian people published by Folha de S. Paulo newspaper, Snowden – who is currently in hiding in Russia – offered support over NSA program’s targeting of Brazil.

    “I’ve expressed my willingness to assist where it’s appropriate and legal, but, unfortunately, the US government has been working hard to limit my ability to do so,” said the letter, translated into Portuguese by the newspaper.

  57. NSA Fallout Hits American Business To The Tune Of Four Billion Dollars: Brazil Ditches Boeing, Buys Gripen

    Brazil ditches Boeing’s F/A-18 in favor of SAAB’s JAS 39 Gripen over the NSA’s rogue behavior. In a press conference tonight, Brazil’s defense department announces that Brazil will buy the Swedish fighter jet, according to multiple Brazilian sources. The direct reason for rejecting Boeing’s F/A-18 was the United States’ hostile and unacceptable spying behavior against Brazil and the rest of the world.

  58. Blunt ‘Disappointed’ NSA Spying Cost Boeing A Brazilian Contract
  59. Saab shares soar on $4.5bn Brazil defence deal
  60. NSA leaks sink US business deals

    The United States’ National Security Agency (NSA) and Central Intelligence Agency operate Special Collecting Services (SCS) “listening posts” in more than 80 cities worldwide, including Beijing, Shanghai, and Hong Kong. [1] In recent months, the NSA’s extensive electronic eavesdropping

  61. Governance By Algorithm: Big Data, The NSA & A Sinister Future

    One of the biggest stories of the year has been the perhaps-not-shocking revelation that the American NSA and our own GCHQ have been snooping on our everyday communications. Becky Hogge writes about how we’re struggling to grasp the consequences of this erosion of our rights, and asks what we might do to counter it

  62. Is this the end of CCTV cars?
  63. Edward Snowden says NSA spying worse than Orwell’s ‘1984’ in his ‘Alternative Christmas Message’

    The The 30-year-old who revealed the NSA’s massive spying programs claims the widespread surveillance is far beyond the ominous thought police of author George Orwell’s dystopian novel “1984.”

  64. Watch NSA Whistleblower Edward Snowden Deliver an Alternative Christmas Address to UK

    After NSA whistleblower Edward Snowden granted The Washington Post an extensive interview this week, he took to United Kingdom airwaves to offer the traditional “alternative Christmas address” on Channel 4.

  65. Snowden: How the NSA has access to your information
  66. Ex-NSA fugitive leaker Snowden goes public with Post interview, TV message
  67. Edward Snowden claims he wanted NSA to conduct itself properly
  68. Snowden: Orwell’s ’1984′ ‘nothing’ compared to NSA spying
  69. Whatever your stance on privacy, Edward Snowden has a Xmas message for you
  70. Snowden: ‘I am still working for the NSA … to improve it’

    “If I defected at all, I defected from the government to the public.”

  71. Edward Snowden: ‘I already won’
  72. NSA leaker Edward Snowden: ‘I already won’

    Nearly six months after the first leaks, The Washington Post has landed the first extensive interview with NSA leaker Edward Snowden, offering a new peek into his motivations for the life-changing leaks and his subsequent life in Russia. In contrast to earlier interviews, Snowden now says the leaks are having the real political impact he’d hoped for. “For me, in terms of personal satisfaction, the mission’s already accomplished,” Snowden told the Post. “I already won. As soon as the journalists were able to work, everything that I had been trying to do was validated.”

  73. ‘I Already Won,’ Says NSA Leaker Edward Snowden
  74. Edward Snowden, after months of NSA revelations, says his mission’s accomplished
  75. Edward Snowden looks back at NSA leaks, considers his personal mission accomplished
  76. Rick Jensen: Is it time to shut down NSA?

    How many people have been blackmailed by NSA employees using these technologies?

    The NSA isn’t saying.

  77. The best week for privacy in a long time
  78. Spy wars: Americans need to know more than Snowden has revealed

    We’ve been here before, in the 1960s and ’70s, when spy agencies flagrantly violated civil rights in the name of national security.

  79. NSA leaker Snowden urges US to ‘end mass surveillance’
  80. Congress Can And Should Protect Ed Snowden And Thank Him For Revealing Government Overreach
  81. NSA surveillance programme: ‘It’s going to get worse’

    The NSA’s surveillance programme is prompting many US writers to abandon topics that could be deemed too sensitive – yet that programme looks set to grow

  82. NSA review group member wants to expand data collection program

    A review group hand-picked by United States President Barack Obama said last week that the National Security Agency needs to reform dozens of the ways it does business. One member of that panel, however, says the NSA doesn’t do enough.

    Michael Morell, the former acting director of the Central Intelligence Agency and a member of the five-person NSA review group compiled by Pres. Obama, said in a recent interview that the secretive US spy agency should have its powers expanded to collect not just telephone metadata, but email information as well.

  83. Former CIA Boss, Task Force Member Says Even Though Metadata Collection Hasn’t Been Useful, It Should Be Expanded
  84. Edward Snowden has stripped us of all illusion about our digital world

    There can no longer be an illusion that our information is private or used only for good purposes

  85. NSA Struggles to Make Sense of Flood of Surveillance Data
  86. NSA drowns under an ocean of data

    All is not well in the land of US spooks despite them having access to all the data on citizens that they can eat.

    William Binney, creator of some of the computer code used by the National Security Agency to snoop on Internet traffic around the world, has warned that the agency knows too much.

    According to the Wall Street Journal, the NSA can’t understand the data it has because it has too much to do anything useful with it.

  87. NSA drowning in overcollected data, can’t do its job properly
  88. Data overload at NSA

    That’s not the NSA routine — even Snowden doesn’t say it is. Cellphone usage, like that of other phones, goes into its collection of “metadata” — that is, what number is calling what number. The automatic collection does not include locations or travels of the phones.

  89. NSA review recommends sweeping changes
  90. Tim Berners-Lee leads call for more transparency over mass surveillance

    The inventor of the web, Sir Tim Berners-Lee, has collaborated with more than 100 free speech groups and leading activists in an open letter to protest against the routine interception of data by governments around the world.

  91. Bletchley Park accused of airbrushing Edward Snowden from history
  92. White House report on NSA ‘has not changed David Cameron’s view’
  93. Obama’s NSA review gives the lie to Britain’s timid platitudes: a debate is possible

    In the US, the official response to Snowden’s revelations celebrates journalism and calls for real change. In Britain, the picture has been rather different

  94. Dave Eggers: US writers must take a stand on NSA surveillance
  95. 10 Government Surveillance Concerns Revealed By Edward Snowden’s NSA Leaks

    The Edward Snowden revelations about government surveillance of private individuals resulted in 10 major issues of public interest being brought to the fore, the editor of the Guardian has told a high-profile panel convened to discuss internet privacy.

  96. CIA preformed psychological profile of Putin for President George Bush

    In his book “Decision Points”, former President George Bush recalls when he met Vladimir Putin for the first time at a Slovenian palace once used by the communist leader Tito. What was surprising to me was the fact that he admitted receiving a (psychological) intelligence briefing about Putin that included aspects of his personal religious faith.

  97. President Putin backs NSA surveillance as ‘necessary’ to fight terrorism
  98. A list of the business leaders, US allies and charities the NSA has been spying on
  99. New leaks show NSA spying on European regulators and charities

    New leaks from NSA whistleblower Edward Snowden reveal an unexpected list of surveillance targets for the agency, including European economic regulators with no obvious connection to US national security. European Commission vice president Joaquín Almunia was one such target; he was surveilled during his tenure overseeing the European Union’s economic, financial, and monetary affairs. After Alumnia took authority over the commission’s antitrust office, he would go on to lead antitrust cases against Microsoft, Intel, and Google.

  100. Snowden docs reveal spying on EU antitrust chief
  101. NSA and GCHQ targeted aid agencies and European officials – live updates
  102. N.S.A. Spied on Allies, Aid Groups and Businesses
  103. GCHQ and NSA targeted charities, Germans and EU chief

    Unicef and Médecins du Monde were on surveillance list

  104. Charities were ‘among GCHQ and NSA spying targets’

    Leigh Daynes, an executive director of Medecins du Monde in the UK, told the Guardian he was “shocked and surprised by these appalling allegations of secret surveillance on our humanitarian operations”.

  105. Obama: NSA Spying Sweeps May Be Reviewed

    Other targets were said to include the United Nations Children’s Fund, French aid organisation Medecins du Monde, French oil and gas firm Total, and French defence company Thales Group.

  106. N.S.A. Dragnet Included Allies, Aid Groups and Business Elite

    Secret documents reveal more than 1,000 targets of American and British surveillance in recent years, including the office of an Israeli prime minister, heads of international aid organizations, foreign energy companies and a European Union official involved in antitrust battles with American technology businesses.

  107. GCHQ and NSA targeted charities, Germans, Israeli PM and EU chief

    British and American intelligence agencies had a comprehensive list of surveillance targets that included the EU’s competition commissioner, German government buildings in Berlin and overseas, and the heads of institutions that provide humanitarian and financial help to Africa, top secret documents reveal.

  108. NSA, GCHQ spied on Israel, Germany, UN and others – new Snowden leaks
  109. GCHQ and NSA targetted Israeli PM and German govt
  110. Analysis: Why has Netanyahu been silent over NSA spying on Israel?

    Why Israel is reacting so differently than other countries, aside from possibly having been less naïve and having expected US spying, could relate to reports from a few months ago that Israel has sometimes joined the US in electronic spying on others and is on the receiving end of huge volumes of the controversial collected US intelligence.

  111. Israel PM Netanyahu Condemns US Surveillance
  112. NSA program stopped no terror attacks, says White House panel member

    A member of the White House review panel on NSA surveillance said he was “absolutely” surprised when he discovered the agency’s lack of evidence that the bulk collection of telephone call records had thwarted any terrorist attacks.

  113. NSA surveillance stopped no terror attacks, says White House panel member

    A member of the White House review panel on NSA surveillance said he was “absolutely” surprised when he discovered the agency’s lack of evidence that the bulk collection of telephone call records had thwarted any terrorist attacks, said Geoffrey Stone, a University of Chicago law professor, in an interview with NBC News. “The results were very thin.”

  114. NSA Phone Data Collection Made No Difference to National Security
  115. Stanford Researcher Proves NSA Can Probably Identify Individuals From Phone Records

    The National Security Agency likes to claim that intelligence officers are only collecting the phone records of millions of Americans, safely omitting their actual names from analysis. But a Stanford researcher, Jonathan Mayer, found that he and his co-author could easily match so-called “meta-data” to individual names with little more than a Google search.

  116. NSA can easily find individuals hidden in metadata – study
  117. NSA security claims blown apart

    Claims by the US spooks that they can’t find out much about a person from their metadata have been blown apart…

  118. Senator Says ‘Arguments For The Status Quo’ In NSA Spying ‘Fell Apart This Week’

    Sen. Mark Udall (D-CO), who has been one of the most outspoken lawmakers on the NSA’s surveillance programs, said on Sunday that the government should move quickly to implement the White House’s reform recommendations, and suggested that by the end of next year, the NSA will no longer be collecting massive amounts of Americans’ phone data.

  119. Officials’ defenses of NSA phone program may be unraveling
  120. Declassified Documents Prove 9/11 Led To Mass NSA Surveillance
  121. Obama says President Bush authorized NSA spying after 9/11

    “The government seems to be trying to reset the clock to before June 2013 or even December 2005,” EFF Legal Director Cindy Cohn said in a statement.

  122. Dan K. Thomasson: Oversight missing amid NSA oversteps

    Sometimes I think we do the terrorists’ job for them.

  123. Zynga’s Mark Pincus asked Obama to pardon NSA leaker Edward Snowden
  124. Ex-CIA chief: Amnesty for Snowden idiotic, he ‘should be hanged by his neck’
  125. Former CIA chief: Snowden should be “hanged by the neck until dead”

    After all the virtual public flogging National Security Agency leaker Edward Snowden has received, in the past week a few voices have suggested cutting him some slack.

    At a Tuesday closed-door meeting with tech leaders, one unnamed participant suggested to Obama that Snowden be pardoned; Obama said he couldn’t do that. During a 60 Minutes report on the leaks that aired Sunday, though, even an NSA official suggested it might be worth discussing amnesty—if and only if he returns the leaked documents securely, almost surely an impossibility at this point. (CBS news has been busy defending itself against accusations that Sunday’s show was a “puff piece.”)

    Even that tiny, tentative olive branch seems to have crossed a line for security hawks. NSA Director Gen. Keith Alexander dismissed the idea, comparing Snowden to “a hostage taker taking 50 people hostage, shooting 10, and then say[ing], ‘You give me full amnesty and I’ll let the other 40 go.’”

    Former CIA director James Woolsey responded to the suggestion of amnesty even more strongly, saying in a Fox News interview that Snowden should be hanged.

  126. Snowden should be ‘hanged’ if convicted for treason, says ex-CIA chief
  127. Spooks and American Exceptionalism
  128. We’re The Good Guys

    My Christmas holiday frequently includes a series of reunions with other former CIA people, often grouped by the overseas stations that we served in. This year the Istanbul gathering preceded Spain and the Rome Station ca. 1980 soon followed. Some of the retirees are still working for the government as contractors so I try to keep a low profile at such functions, rarely asking questions about what anyone might be doing and seldom venturing into any detailed critiques of current government policy. But sometimes my wife and I find the occasional gung ho expressions of solidarity with torturers and drone operators to be just a bit too much and we are forced to react.

  129. NSA director says Snowden shouldn’t get amnesty
  130. Obama Adviser Cool To Snowden Amnesty
  131. If Snowden Returned to US For Trial, All Whistleblower Evidence Would Likely Be Inadmissible
  132. If Snowden returned to US for trial, could court admit any NSA leak evidence?
  133. Google users do battle in court

    The group, Safari Users Against Google’s Secret Tracking, has accused Google of bypassing security settings on the Safari internet browser in order to track their online browsing and to target them with personalised advertisements. However, Google is claiming that because it is based in the US the court has no jurisdiction to try the claims relating to UK claimants.

  134. Here’s how data thieves have captured our lives on the internet

    As Professor Eben Moglen of Columbia University puts it, the intelligence agencies “presented with a mission by an extraordinarily imprudent national government in the United States, which having failed to prevent a very serious attack on American civilians at home, largely by ignoring warnings, decreed that they were never again to be put in a position where they should have known. This resulted in a military response, which is to get as close to everything as possible. Because if you don’t get as close to everything as possible, how can you say that you knew everything that you should have known?” In a real war, one in which the very survival of a state is threatened by a foreign adversary, almost anything is permissible, including the suspension of civil liberties, the right to privacy and all the other things we liberals hold dear. Between 1939 and 1945, Britain was governed by what was effectively a dictatorship wielding unimaginable powers, including comprehensive censorship, the power to requisition private property on demand, and so on. Citizens might not have liked this regime, but they consented to because they understood the need for it.

  135. Verizon to Publish Transparency Report Amid NSA Furor
  136. Telcos could have prevented NSA spying: Expert
  137. Cell Phone Carriers Didn’t Use Tech Fixes To Combat NSA Spying: Expert

    While the German cryptologist criticized carriers for failing to implement technology to protect customers from surveillance as well as fraud, he said he does not think they did so under pressure from spy agencies.

  138. Bah! No NSA-proof Euro cloud gang. Cloud computing standards will ‘aid data portability’

    New cloud computing standards to be developed within the EU should facilitate users’ ability to transfer data and services between cloud providers, MEPs have said.17 Dec 2013

  139. Gmail blows up e-mail marketing by caching all images on Google servers
  140. Thousands of cameras, millions of photographs, terabytes of data. You’re tracked, wherever you go.

    Concerns about the new technology were raised immediately, including from within the government. A 1984 report for the Greater London Council Police Committee warned that the system made every car a potential suspect and handed policy on mass surveillance to the police. “This possibility in a democracy is unacceptable,” it concluded.

  141. Data brokers won’t even tell the government how it uses, sells your data

    A Senate committee released a report this week that goes to great lengths to determine all of the things that data brokers, the companies that trade in consumer data, don’t want to talk about. The 35-page report describes some of the companies’ strategies for collecting and organizing data, but significant portions of the report discuss what the companies are unwilling to talk about: namely, where they get a lot of their data and where that data is going.

  142. The NSA Panel’s Pointless Private-Sector Fig Leaf
  143. As New Services Track Habits, the E-Books Are Reading You

    Before the Internet, books were written — and published — blindly, hopefully. Sometimes they sold, usually they did not, but no one had a clue what readers did when they opened them up. Did they skip or skim? Slow down or speed up when the end was in sight? Linger over the sex scenes?

  144. Minnesota librarians push to curb NSA snooping

    Hodgepodge of groups backs legislation that would limit authority to spy on Americans.

  145. Phone companies might have to store snoop data instead of NSA, Obama says

    US President Barack Obama signalled that he might halt the National Security Agency’s collection and storage of millions of Americans’ phone records and instead require phone companies to hold the data.

  146. Task Force Report’s Langauge Hints At Backdoors In Software

    After looking over the White House intelligence task force’s proposals to reform the way the US government does surveillance, we pointed out one oddity that hinted that the NSA may have been engaged in financial manipulation. Others have been combing through the report for other hints of things it might accidentally reveal, and Ed Felten (who I still think should have led the task force) has spotted another one, in how the report discusses the issue of backdoors in software.

  147. Presidential panel to NSA: Stop undermining encryption

    New report recommends the government not in any way subvert, undermine or weaken commercial software

  148. Exclusive: Secret contract tied NSA and security industry pioneer

    As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry, Reuters has learned.

  149. Report: NSA paid RSA to make flawed crypto algorithm the default
  150. Security industry tainted in latest RSA revelations
  151. Prestigious speaker Mikko Hypponen cancels RSA talk to protest NSA deal

    On Monday, Mikko Hypponen, chief research officer of Finland-based antivirus provider F-Secure, publicly canceled the talk he was scheduled to deliver at the RSA Conference USA 2014, which is slated for February. A highly sought-after security researcher who regularly speaks at Black Hat, Defcon, Hack in the Box, in addition to the more mainstream Ted and South by Southwest conferences, Hypponen said his cancellation was in protest of the recently revealed $10 million contract to make the NSA-influenced Dual EC_DRBG BSAFE’s default pseudo random number generator (PRNG). Hypponen also cited RSA’s decision to keep Dual EC_DRBG the default PRNG for more than five years after serious vulnerabilities were uncovered in it and Monday’s non-denying denial from RSA in response to Friday’s report from the Reuters news agency.

  152. How Worried Should We Be About the Alleged RSA-NSA Scheming?
  153. BitTorrent rolls out secure chat service following NSA leaks

    BitTorrent has reportedly announced a secure chat service that would only a message’s sender and receiver to see the content irrespective of whether it is encrypted or not.

  154. BitTorrent Is Building An NSA-Proof Chat Product
  155. NSA Snooping’s Negative Impact On Business Would Have The Founding Fathers ‘Aghast’

    James Madison would be “aghast.” That was one of the incendiary charges leveled at the National Security Agency and its mass surveillance activities by Judge Richard Leon in his December 16 opinion ordering the government to stop collecting some of the data that it’s been gathering on private citizens here and abroad.

  156. The NSA’s other victim: U.S. business competitiveness

    The impact of NSA intrusion on our civil liberties can’t be overstated — but damage to America’s business reputation is serious, too

  157. A New Twist in International Relations: The Corporate Keep-My-Data-Out-of-the-U.S. Clause

    By now, we’ve heard from tech companies such as Facebook, Google and Cisco Systems that the National Security Agency’s spying poses a threat to their international business and, in Cisco’s case, is already hurting it. So what does that threat look like, exactly, at ground level?

    Some companies are apparently so concerned about the NSA snooping on their data that they’re requiring – in writing – that their technology suppliers store their data outside the U.S.

  158. New industry contracts say “no data in the USA,” report says

    Firms in the UK and Canada are reportedly updating their cloud contracts to demand that their data be kept out of the US. The report doesn’t contain enough details, however, to say if this is a trend or an isolated incident.

  159. Op-Ed: NSA has Santa’s naughty and nice list (Satire)
  160. What’s your favorite NSA movie title?

    With Edward Snowden’s revelation and the surveillance scandal out, the general public cannot get enough of the jokes around the topic. Earlier this week, the video on the Youtube emerged showing Santa Clauses around New York spying on people. The title of the song “The NSA is coming to town” is a hit, making it one of the most top viewed videos online. Now Twitter community can’t get enough of it as well launching a funny competition and asking to share the title of their most favorite NSA movie title.

  161. Cyber Santa: secret NSA Santa surveillance on naughty children and drone delivery of Christmas presents worldwide

    Santa Claus must be a real hero to deliver Christmas presents all over the world in one night and to find out where good and obedient boys and girls live. It is true that Santa’s workshop is full of elves and reindeers who are always ready to help, making it the busiest factory in the world during Christmas time. But Father Christmas needs to move his operation into the twenty-first century and start using military drones to make his deliveries, and various surveillance programs similar to the NSA program to find out who behaved badly.

  162. Rep. King Says Sen. Paul “Disgraced” Office by Criticizing NSA

    Gen. Paul says Gen. Clapper lied to Congress, the nation under oath; Rep. King says it was an innocent mistake

    Under the (literally) crumbling dome of the Congress Building in Washington, D.C., the question/revelation of spying on Americans by the U.S. National Security Agency (NSA) is producing deep, and some would say revealing division within both ruling parties.

  163. Rep. Mike Rogers Falsely Claims Edward Snowden Traded NSA Documents For ‘Personal Gain’
  164. BIZARRE RADIO MELTDOWN DURING NSA INTERVIEW

    “It wouldn’t be logical for the NSA to target my show,” Klein said, pointing out he has aired numerous broadcasts questioning the loyalties of NSA whistleblower Edward Snowden.

    Other broadcasts investigated what Klein described as the anti-American leanings of former Guardian reporter Glenn Greenwald, who has been serving as a conduit for Snowden to communicate to the public.

    “I think Snowden is being used in a big way to turn Americans against the NSA,” said Klein. “The whole Snowden story stinks.”

  165. Radio station experiences major software meltdown during anti-NSA broadcast
  166. The state should be exposing the cyber-snoops, not joining them

    For a fugitive, Edward Snowden is attracting rather a lot of well-placed sympathisers. “A child born today will grow up with no conception of privacy at all,” he said, when delivering Channel 4’s alternative Christmas message from his Moscow hideaway. The surveillance programmes run by governments now go far beyond anything George Orwell imagined, he added – which is a problem, because privacy matters. Quite right, says Sir Tim Berners-Lee, inventor of the World Wide Web: this is why we need whistleblowers such as Snowden. What’s more, Richard Leon, a US federal judge, also thinks Snowden is right – America’s spying is almost Orwellian, and probably illegal.

  167. Glenn Greenwald: ‘A Lot’ More NSA Documents to Come

    Nearly seven months after journalist and privacy activist Glenn Greenwald publicized Edward Snowden’s first revelations of the vast scope of the NSA’s digital surveillance, his life has changed absolutely.

  168. Greenwald: US, British media are servants of security apparatus
  169. Glenn Greenwald calls for Snowden asylum at Chaos Computer Club congress
  170. Greenwald mocks US, UK media as slaves of gov’t, calls for Snowden asylum
  171. Greenwald mocks US, UK media as slaves of gov’t, calls for Snowden asylum
  172. Glenn Greenwald: I’m not Edward Snowden’s flak
  173. Glenn Greenwald rips MSNBC bias — on MSNBC
  174. Glenn Greenwald Takes One More Swipe at MSNBC, and It’s Pretty Brutal
  175. Glenn Greenwald: I Defend Edward Snowden ‘Like People On MSNBC Defend President Obama’
  176. Glenn Greenwald: I Defend Snowden Just Like People On MSNBC Defend Obama
  177. Revealing Gaffe on MSNBC About Obama Coverage
  178. Glenn Greenwald Defends Edward Snowden Like ‘People on MSNBC Defend President Obama’ (Video)
  179. Greenwald Doubles Down on MSNBC Criticism
  180. Glenn Greenwald lambasts media for complacency after NSA leaks

    Greenwald hasn’t shied away from criticizing the perceived complacency of U.S. media and politicians in the face of revelations about the NSA’s collection of Americans’ and other people’s phone records and emails. But at the 30C3 on Friday, he took the opportunity to lambast American and British politicians and media organizations more harshly and directly than before.

  181. Snowden leak journo leaks next leak: NSA, GCHQ dying to snoop on your gadgets mid-flight

    Top-secret documents leaked by NSA whistleblower Edward Snowden have been plastered across our screens and front-pages for months by Glenn Greenwald and his team.

    And on Friday the journalist couldn’t help but leak a few details about a forthcoming wave of fresh revelations regarding the US and UK governments’ mass surveillance operations.

  182. Alan Dershowitz: Glenn Greenwald “Never Met A Terrorist He Didn’t Like”
  183. Alan Dershowitz: ‘Glenn Greenwald Never Met a Terrorist He Didn’t Like’
  184. Alan Dershowitz: Glenn Greenwald ‘never met a terrorist he didn’t like’
  185. Alan Dershowitz rips Edward Snowden: ‘We have an absolute right’ to spy on other countries
  186. Snowden ally Applebaum says his Berlin apartment subject to raids
  187. TAO: the NSA’s hacker plumber-wunderkinds
  188. Shopping for Spy Gear: Catalog Advertises NSA Toolbox

    When it comes to modern firewalls for corporate computer networks, the world’s second largest network equipment manufacturer doesn’t skimp on praising its own work. According to Juniper Networks’ online PR copy, the company’s products are “ideal” for protecting large companies and computing centers from unwanted access from outside. They claim the performance of the company’s special computers is “unmatched” and their firewalls are the “best-in-class.” Despite these assurances, though, there is one attacker none of these products can fend off — the United States’ National Security Agency.

    Specialists at the intelligence organization succeeded years ago in penetrating the company’s digital firewalls. A document viewed by SPIEGEL resembling a product catalog reveals that an NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry — including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell.

  189. NSA reportedly intercepting laptops purchased online to install spy malware
  190. Is Singapore Western Intelligence’s 6th Eye in Asia?

    One concern is that this growth in intelligence collection really has very little to do with terrorism and crime, but rather commercial interests. The death of Shane Todd in Singapore sheds a light on the relationship between industry and espionage, where there were concerns that the Chinese phone company Huawei is involved in espionage. Taxpayer money is being used to protect the intellectual property of private corporations.

  191. Interview: John Graham-Cumming

    Open source developer and writer John Graham-Cumming was able, through a Downing Street online petition, to persuade the Gordon Brown Labour-led government to issue an unequivocal apology for the gross indecency conviction of Alan Turning in 1952. After admitting a sexual relationship with a man, Turing was unable to continue work as a code breaker at GCHQ, as his security clearance was withdrawn. Two year later he killed himself. Linux Format caught up with the Graham-Cumming to discuss open source development, debugging and why he opposes the move for a pardon, which has been given via royal decree.

]]>
http://techrights.org/2013/12/30/spies-in-2013/feed/ 0
Alternatives Needed to the Existing Internet, Which Turned From Tool of Self Expression and Creativity to Surveillance and Oppression http://techrights.org/2013/10/18/internet-and-web-are-broken/ http://techrights.org/2013/10/18/internet-and-web-are-broken/#comments Fri, 18 Oct 2013 11:50:42 +0000 http://techrights.org/?p=72454 Vint Cerf
By Вени Марковски

Summary: The de facto packet transmitter, which came from the budget hoard of the US military, is broken beyond repair and needs to be replaced in order for human dignity to be restored

RATHER than use the Internet to emancipate ourselves and communicate privately, many of us are now using it to inform corporations and governments, letting them read our minds. The transition is an interesting one to explore. The Internet came from the US military, so it is not surprising that the US still controls the Web [1], no matter what some may claim [2] to save face. The NSA has “commandeered” the Web/Internet, as Bruce Schneier put it, and it is now used as a strategic tool for controlling the population, e.g. by intruding people’s hard -drives remotely (Microsoft Windows), fetching lists of everyone they ever spoke to (Facebook), and even reading their minds (Google). Telecom giants in the US meanwhile move forward, advancing their attacks on the Internet/Web [3,4]. Here in the UK (but elsewhere too), some silly Internet bodies like Nominet just look for new ways to tax us [5] for merely registering domains (an overpriced process as it is, given how little infrastructural overhead it entails). DPI is also a big menace here.

“The notion of hypertext was not invented by Tim Berners-Lee and the Web was not so innovative.”The Internet is getting seriously messed up and now that the W3C wants to make it a DRM conduit it seems like a good time to embrace alternatives to the Internet (note capitalisation), ones that are build for security and privacy from the ground up, are decentralised, and definitely not controlled by the most militant nation on Earth (the flawed topology also enabled China to police its citizentry through the Internet, adding layers of censorship and surveillance). Even tools like Tor are not so trustworthy anymore; they’re under attack. Darknets are loosely defined in Wikipedia, but maybe the notion of an independent network of peer-to-peer-like nodes (e.g. wireless) should be embraced. OLPC sought to implement such a thing (interconnected meshes that use encryption and send packets by hopping netween end nodes) and Eben Moglen spoke about the flaws in existing networks a couple of years ago, suggesting one alternative or workaround. To many, this would seem impossible, ludicrous, unnecessary, etc. But after the NSA leaks it should become clearer that things are far worse than the population and even our governments care to realise. Even the US government was not properly informed (people like James Clapper lied repeatedly) of what the NSA (or military) had begun doing on the Internet.

It seems reasonable to say that in many ways the Internet is now broken beyond repair and it might be worth starting something from scratch. That would also obviate the need to figure out migrations from IPv4 to IPv6 (which hardly ever happened, even after a decade of waiting). The notion of hypertext was not invented by Tim Berners-Lee and the Web was not so innovative. Project Xanadu was the first hypertext project and it is more than half a century old. We can pick these earlier efforts (some are better implemented in their linking methods than the World Wide Web) and see if a better ‘internet’ can be built, this time more properly, right from the get-go. Whether landline infrastructure and wireless equipment can be re-purposed to suit the requirements of a new ‘internet’ is an open question and given what’s practical to implement, perhaps it’s worth making a strong start (the Internet can be used as a temporary compatibility layer, buffered with encryption to circumvent snooping).

Related/contextual items from the news:

  1. The US is Losing Control of the Internet…Oh, Really?

    All of the major internet organisations have pledged, at a summit in Uruguay, to free themselves of the influence of the US government.

    The directors of ICANN, the Internet Engineering Task Force, the Internet Architecture Board, the World Wide Web Consortium, the Internet Society and all five of the regional Internet address registries have vowed to break their associations with the US government.

    In a statement, the group called for “accelerating the globalization of ICANN and IANA functions, towards an environment in which all stakeholders, including all governments, participate on an equal footing”.

  2. The core Internet institutions abandon the US Government
  3. What if Verizon succeeds in killing the Internet?
  4. AT&T: The Internet is awesome, so let’s get rid of phone regulations
  5. Say no to the Nomitax!

    Nominet were told to stop creating new second level domains (like .co.uk or .me.uk) because they are a monopoly, and instead an independent consultative group decides when new .uk domains are needed. This group also decides who controls them, to avoid Nominet simply inventing new new second level domains (SLDs). This is important, as many people want to own all the domains potentially associated with their personal or company name. Only really new and non-confusing SLDs should be added, so that this problem is avoided.

]]>
http://techrights.org/2013/10/18/internet-and-web-are-broken/feed/ 0
The Foot in Stallman’s Face: Bill Gates Still Redefines Free Software http://techrights.org/2013/07/19/bill-gates-on-free/ http://techrights.org/2013/07/19/bill-gates-on-free/#comments Fri, 19 Jul 2013 09:53:07 +0000 http://techrights.org/?p=70600 “There’s free software and then there’s open source… there is this thing called the GPL, which we disagree with.”

Bill Gates, April 2008

“They’ll get sort of addicted, and then we’ll somehow figure out how to collect sometime in the next decade.”

Bill Gates

Summary: The ongoing war by Microsoft and its proxies against software freedom, which gives more value to the world’s industry than the FUD would have people believe

There is another reason to abandon the term “Open Source”, which left the term “Free software” more vulnerable to abuse by bad people, makers of proprietary software. Here is Bill Gates’ latest attempt to run over Free/libre software, characterising his trap as “free”. To quote a Romanian site:

Bill Gates had a very interesting opening keynote speech at the Microsoft Research Faculty Summit 2013, explaining that he was grateful for the existence of free software, when asked about patents and their influence on technology.

“Thank God for commercial software. It actually funds salaries, gives people jobs. And thank God for free software, it lets people get things out there, you can play around, build on. The two work very well in an ecosystem,” stated Bill Gates during the Q&A.

This is nonsense, as anybody with a clue knows that commercial means not proprietary and Free/libre can be used commercially, paying wages to users and developers.

A lot of this kind of attacks on Free software usually goes back to Microsoft and its proxies. Right now we have Black Duck, a company created by a marketing guy from Microsoft, throwing around some numbers, looking for sites that will print them. Here is one:

Here is the press release. What nonsense. Trying to quantify code in terms of revenue is not the only silliness; it is the idea that money is being lost as a result of having no licence. Similar propaganda was previously used to describe FOSS as a jobs destroyer, as if people are writing software with such aims. Some tried to portray FOSS as a cause for losses in the industry, not a saver of money and elevator of productivity (which in turn makes room for more hirings per given budget). This is the type of propaganda we are up against and we keep seeing it brought up also in public talks.

Here is another new example of Black Duck being used to reinforce FUD — namely the idea that Free software is about cost, not freedom, and that it is chosen for price, not other qualities. Watch how the Black Duck-run Future of Open Source survey [1, 2, 3, 4] is being used to spread misconceptions. This new FOSS-hostile article (“The Hidden Cost of Free”) says: “Bottom line, open source may be “eating the software world,” but not all of it. For ISVs and other software development professionals, open source is a no-brainer. We use it in development and in our commercial products wherever and whenever it makes sense. It is free, after all, and the quality is second to none, as this year’s Future of Open Source survey reinforces.”

Black Duck reinforces all sorts of proprietary software talking points. Black Duck is, after all, a proprietary software company.

“This is the type of propaganda we are up against and we keep seeing it brought up also in public talks.”Speaking of FUD against FOSS, the latest Android security fear-mongering comes from a Microsoft partner created and managed by a Microsoft guy (who hopes to turn Android perceptions into Windows perceptions when it comes to security). To quote the company’s description: “He is also a Microsoft Most Valuable Professional (MVP) in Visual Developer Security, a frequent speaker, press resource, and is featured regularly in the Associated Press and global security media.”

“Bluebox was founded in mid-2012,” it says, and it was groomed by the Gartner Group (currently fully dedicated to Android FUD and monetisation attempts, akin to Black Duck).

The war on FOSS is very real and Microsoft partners are trying to remove the F from FOSS or altogether make it proprietary. A few days ago we showed how three Micrososft-controlled entities threw around (or under the bus) and blurred out the FOSS identity of Zimbra (here is more on that); we should also pay attention to the hallmark of effective FOSS FUD because it’s quite consistent. As explained a week ago by Eben Moglen at the EU Parliament, the GPL brought enormous value to the industry, more so than Apple and Microsoft combined. Unfortunately the video is only on YouTube, hence embedded below.

Will politicians ‘get’ it?

]]>
http://techrights.org/2013/07/19/bill-gates-on-free/feed/ 0
Links 29/6/2013: Fedora 19 Due July 2nd, Android 4.3 Ousted http://techrights.org/2013/06/29/android-4-3-ousted/ http://techrights.org/2013/06/29/android-4-3-ousted/#comments Sat, 29 Jun 2013 15:25:17 +0000 http://techrights.org/?p=69928

GNOME bluefish

Contents

GNU/Linux

  • Logic Supply partners with Linux developer for digital signage, kiosks

    Industrial and embedded computer provider Logic Supply recently announced a new partnership for with RapidRollout, a developer of custom Linux platforms for computing appliances. This partnership will allow Logic Supply to offer customers complete Linux operating system solutions in addition to its computer hardware, the company said.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • KDE Releases Second Beta Of Plasma Workspaces, Applications and Platform 4.11

        The KDE community has released the second beta version of their new Plasma Workspaces, Applications and Development platforms. The KDE team is now focusing on bug fixing and polishing, while API, dependency and features remain fixed.u

      • QUndoStack versus Kate’s Undo System
      • qt-signal-tools 0.2
      • More Software Compositing

        One of the most often repeated misconceptions about Wayland is that it requires hardware acceleration. I would have thought that this issues would have been resolved once the reference compositor, Weston, supported rendering through Pixman. The reason for this misconception is most likely that the earlier versions of Weston required hardware acceleration.

      • Qt 5.2 Plans Are Laid With New Features

        With Qt 5.1 finally being released soon, Digia has begun to formalize plans for the Qt 5.2 tool-kit successor. Qt 5.2 is anticipated for a November release and will carry new features and functionality.

  • Distributions

    • New Releases

    • Red Hat Family

      • Red Hat’s OpenShift Online Expands the Company’s Cloud Horizons

        In June, Red Hat has steadily taken its next significant steps in the cloud computing arena, as it expanded the focus of its OpenShift open source Platform-as-a-Service hybrid cloud computing offering, launching a new cloud-hosted commercial edition called OpenShift Online. OpenShift Online is Red Hat’s public cloud application development and hosting platform for automating the provisioning, management and scaling of applications. Now, Red Hat runs private and public versions of OpenShift, and note that there is a free usage policy for OpenShift Online, although more resource-intensive applications will probably require subscription services.

      • Fedora

        • Fedora 19 Go for July 2 Release

          Since the June 25 release candidate a couple more internal releases have been tested. Several major bugs have been squashed and while some issues remain, there are none blocking final release. At last night’s Go/No-Go meeting, it was decided to release July 2.

    • Debian Family

      • Derivatives

        • Canonical/Ubuntu

          • Mir in Ubuntu 13.10, Benchmarking, and More

            Many of you will have seen the recent news about Mir coming to Ubuntu 13.10 in October 2013. For those of you who are unaware of Mir, it is an Open Source display server we are building that we will use across desktops, phones, tablets, and TV. It currently works with Open Source drivers and we are currently in discussions with the major GPU manufacturers to discuss Mir support in their proprietary drivers.

          • Ubuntu Planning on Shipping Mir in 13.10

            ubuntu_logoIn Stephen King’s Dark Tower series, the giant, insane, cyborg bear named Shardik is known by the forest dwelling people around his territory as Mir, the world beneath the world. Ubuntu’s naming of Mir probably leans more towards the African heritage deriving the name from “Mayor”, or “Leader”, but personally I like the insane bear analogy better. ThePowerBase.com has a story linked to fridge.ubuntu.com reporting that Ubuntu plans to ship their controversial replacement for X11 in the next version of Ubuntu, 13.10, by default, along with XMir, an X11 compatibility layer running on top of Mir.

          • Flavours and Variants

            • München and Monaco go Lubuntized

              These are good news for the open software. And it demonstrates that Lubuntu isn’t at all the “little brother” of Ubuntu. Well, maybe yes talking about setup size or memory requierements, but not less considered. So I want to thank Julien Lavergne, the coordinator of the Lubuntu Team, and their respective collaborators (and users) for a rewarded great job.

            • Linux MintBox 2 priced at $600
            • The MintBox 2
            • MintBox 2 announced, runs Linux Mint 15 Olivia on a Core i5

              If you are considering a switch to Linux as an operating system, then giving it a trial run first couldn’t be easier. There are multiple distributions that have the option of running the OS from a USB stick or dual booting with your existing OS before deciding to replace it completely. It’s actually more difficult to buy a new PC with Linux preinstalled than it is to replace a copy of Windows, but Linux Mint is trying to change that.

            • Intel Core i5 CPU update sweetens MintBox mini-PC

              The Linux Mint project and CompuLab announced an updated version of their MintBox mini-PC, which comes with Linux Mint pre-installed. The MintBox 2 switches to a faster Intel Core i5 processor, doubles the storage to a 500GB HDD, adds a second gigabit Ethernet port, and bumps the price up to $599.

            • A Quick Look at Linux Deepin 12.12

              When I learned of Linux Deepin about a week ago, I jumped to the conclusion that it was just “another Ubuntu derivative”. As it turns out, I was way off-the-mark. While Deepin is based on Canonical’s ultra-popular distribution, Deepin has been around since at least 2004. Originally, the distro was based on Debian, but it shifted over to the Ubuntu base in 2006, and through its time, 11 major versions have been released.

              The reason most of us haven’t heard of Deepin until now is that it’s Chinese-based, although English versions have been offered since at least 2009. After hitting up the main website, you’ll want to click on the “English” link at the top to be able to navigate around (unless of course, you can read Mandarin). Once translated to English, we can see what Deepin is about: “Fast, Elegant and easy to use.“

  • Devices/Embedded

    • Get into Linux in under an hour on a Raspberry Pi
    • EOMA-68 PC-on-a-card goes dual-core, supports Debian Linux, has new accessories in the works

      Rhombus Tech‘s EOMA-68 project involves cramming all the key components of a PC onto a small board out the size of an old-school PCMCIA card. Then you can slot that card into a desktop, laptop, or tablet dock to function as the brains of a computer, and when you want to replace or upgrade you can just swap out the card for a new one.

    • Tiny control computer runs Linux on Atmel ARM9 SoC
    • Rugged Mini-ITX board runs quad-core AMD Kabini SoC

      Elitegroup Computer Systems (ECS) announced a ruggedized Mini-ITX motherboard based on an AMD A6-5200 Kabini system-on-chip processor, which integrates four 2GHz Jaguar CPU cores plus a Radeon HD 8400 GPU. The KBN-I/5200 offers PCIe and mini-PCIe expansion, along with interfaces for dual SATA, HDMI, VGA, serial, gigabit Ethernet, six USB ports, and more.

    • Phones

      • Ballnux

        • Backup program allows root access to LG smartphones

          At least 40 LG Android smartphones are vulnerable as a result of security vulnerabilities in the pre-installed backup program Sprite Backup. Crafted backups can be used to execute commands as a root user, apparently without the user’s knowledge – that at least is the suggestion in an advisory, which states that this is possible “under specific circumstances”. An exploit (CVE-2013-3685) is already available on GitHub.

      • Android

        • Android 4.3 Leaked!

          While we were waiting for Google to officially announce the latest Android Jelly Bean 4.3, folks over at SamMobile got their hands on Android 4.3 test build firmware for the Google Pay Edition Galaxy S4(GT-19505G). This news tells us that indeed Android Jelly Bean 4.3 will make its way to devices soon.

        • New MIPS processors coming, may target Android

          Imagination Technologies announced a MIPS “Warrior” family of 32/64-bit processors designed for everything from high-end networking equipment to Android tablets, and also announced updates to its embedded-focused MIPS Aptiv 32-bit processor line. The Warrior IP will feature multi-core hardware virtualization and multi-threading, MIPS SIMD architecture, and Imagination’s security framework.

          The new Warrior and updated Aptiv product lines are the first new MIPS processors to be announced since MIPS Technologies was acquired by Imagination Technologies for $100 million in early February (see farther below for background).

    • Sub-notebooks/Tablets

Free Software/Open Source

  • Free Software post-PRISM

    The news has been full of talk of spying, whistleblowing and data mining. Glyn Moody looks at how open source has been used to threaten freedom and privacy and how it could be used to defend them.

  • Adobe open sources Flash C++ compiler

    Adobe has open sourced its Flash C++ compiler, FlasCC. An open source version of the tool is now hosted as part of the CrossBridge project on GitHub; previously, FlasCC was part of Adobe’s Creative Cloud product. Adobe is hoping that the move to open source will deliver faster development and plenty of innovation from an active community. The software company has said it will itself remain actively involved in the development of the code as part of CrossBridge.

  • Web Browsers

    • Chrome

    • Mozilla

      • Firefox 22 offers real-time video communications and faster JavaScript

        Firefox 22 has been released by Mozilla and, unlike recent updates to Firefox which have been feature-light, the new release offers some important enhancements for future web development. Leading the feature list is full WebRTC support, which will allow web developers to integrate real-time audio and video connections between browsers. Working with JavaScript-based applications, WebRTC can potentially be used for anything from multiplayer interactive games on the web, like Mozilla’s own BananaBread game or Google’s Cube Slam demo, to simple user-to-user chatting with video calls and file sharing. More information on WebRTC can be found in a post on the Mozilla Hacks blog.

      • Serious accusations against AdBlock Plus

        The plugin, which is available for Chrome and Firefox, introduced a whitelist for web sites with non-obtrusive ads in version 2.0 and Pallenberg is questioning how this list of “acceptable ads” is compiled. Pallenberg is accusing the ABP developers of having connections to advertising and affiliate programmes and that their advertisements are included in the whitelist as a result.

  • SaaS/Big Data

  • Healthcare

    • Two deep dives into open source EHR

      As meaningful use and the various components of the Affordable Care Act begin to activate, medical professionals and facilities are beginning to face the same proprietary vs. open source choice that many other IT operations have faced over the years.

  • FSF/FSFE/GNU/SFLC

    • Your input needed: Questions for panel w/ Eben Moglen, RMS, 4 MEPs

      For this discussion we’re bringing some of the Free Software movement’s leading minds together with the people who represent us in the European Parliament. We’re extremely happy to have a list of first-rate participants:

      Eben Moglen (Columbia University / Software Freedom Law Center)
      Richard M Stallman (FSF)
      Judith Sargentini (MEP Greens/EFA)
      Marc Tarabella (MEP S&D – tbc)
      Nils Torvalds (MEP ALDE)
      Ioannis A. Tsoukalas (MEP EPP)

    • GNU lightning 2 second alpha is available
    • Hi, I’m Sankha, summer campaigns intern

      I am Sankha Narayan Guria, a second-year undergraduate in India. I will be working with the Free Software Foundation as an intern this summer. I am primarily a developer and contribute to Mozilla Firefox. I have also been a Mozilla Rep and have been involved in creating communities in different software-related fields.

  • Programming

    • Rails 4.0 rolls out to reduce client-side coding

      Focusing on a need to build modern web applications without having to create client-side JavaScript applications that talk to a server with JSON, the new version of Ruby on Rails, version 4.0, has arrived. To achieve this goal, the new release uses techniques such as Russian Doll caching to make caching much more efficient by maximising cache hits, Turbolinks that turn links into JavaScript-driven content reloading, and declarative ETags (entity-tags) so that servers can quickly determine if content is up to date. In combination, this should mean that sites which don’t use the JavaScript/JSON route for performance should run much faster, especially under load.

Leftovers

  • The Big Comparison Of Google Reader RSS Feed Alternatives
  • A hail and farewell to AltaVista

    It once was the best of the bunch, in the era before Internet search meant Google and three guys named Moe. Ancient history by now.

  • Health/Nutrition

    • 120,000 People Cut Off From Aid

      An estimated 120,000 people have fled fighting in and around the main towns in Pibor County in South Sudan’s Jonglei state and are now hiding in unsafe and malaria-infested swamps without access to safe drinking water, food, or medical care, the international medical humanitarian organization Médecins Sans Frontières (MSF) said today.

  • Security

    • Google’s Transparency Report shows malware spread

      It is now possible to see the statistics on the presence of malware and of sites linking to malware, thanks to Google’s latest move to make its data more transparent. Google has announced that it is expanding its transparency reporting to include statistics from its Safe Browsing programme. The Transparency Report, which also carries information about copyright removal requests and government agencies’ and courts’ demands for user data now has a Safe Browsing section. As part of that Safe Browsing data, Google is identifying autonomous systems (AS) on the internet and how much malware they contain. This is available through a Malware Dashboard.

  • Defence/Police/Secrecy/Aggression

    • U.S. Begins Shipping Arms for Syrian Rebels
    • American killed in Egypt rival demonstrations
    • US student among dead as riot-ridden Egypt descents into ‘security crisis’

      Tens of thousands of supporters and opponents of President Morsi join protests across Egypt with violent clashes between the rival parties reported in Alexandria, where police used tear gas as at least two people were killed and nearly 90 injured.

    • Governor seeks to delay freeing 10K Calif. inmates

      Gov. Jerry Brown’s administration on Friday asked a panel of federal judges to delay its order that California release nearly 10,000 additional inmates by year’s end, granting him time to appeal the decision to the nation’s high court.

      The judges have said they will permit no further delays in reducing prison crowding, which they previously found was the leading cause of an unconstitutional level of inmate medical care. The judges have threatened to cite Brown for contempt if he does not immediately begin complying.

    • Hollywood helped Adolf Hitler with Nazis’ propaganda drive, academic claims

      Historian Ben Urwand says he has cache of documents that prove Tinseltown enthusiastically cooperated with Nazis’ global propaganda effort

    • Rogue drone crashes, gives up operator’s secrets

      “I am disturbed by the revelation that the FBI has unilaterally decided to begin using drone surveillance technology without a governance policy, and thus without the requisite assurances that the constitutional rights of Americans are being protected,” Paul said.

    • Drone protest planned at Horsham Air Guard Station

      The protesters will toll a bell, read the names of drone-strike victims, and carry a 10-foot drone replica as part of the action.

    • The NYPD Embedded Four CIA Officers After 9/11

      In the decade after 9/11, the New York Police Department embedded four Central Intelligence Agency Officers, including one who assisted with surveillance in the United States, reports the New York Times.

    • UK ‘must come clean’ on GCHQ support for CIA drone strikes, says Reprieve

      Speaking in Los Angeles on 25 June, UK Foreign Secretary William Hague said of the UK’s policy on intelligence-sharing with the United States: “We operate under the rule of law and are accountable for it. In some countries secret intelligence is used to control their people. In ours, it only exists to protect their freedoms.”

      His comments come as the UK government is locked in a battle to avoid revealing what GCHQs policy is on providing intelligence to support CIA drone strikes.

    • Assange: US waging war against whistleblowers

      US federal prosecutors have charged whistleblower Edward Snowden with espionage, theft and conversion of government property in a criminal complaint after he revealed to the Guardian newspaper the extent of the NSA’s surveillance programs, including PRISM, which can monitor email and phone calls of anyone in the world and has been shared with the British surveillance center GCHQ.

    • CIA Report to US Congress Justifies Torture Programs

      Brennan now faces the possibility of incurring the wrath of Congress if they perceive a program he stands condemned by public opinion, or, conversely, can earn the rejection of his colleagues if strength protects the views of their subordinates.

    • CIA Presence in NYPD Leads to Charges of Domestic Spying

      “The CIA is not permitted to engage in domestic surveillance,” Ginger McCall, director of the group’s Open Government Project, told The Times. “Despite the assurances of the CIA’s press office, the activities documented in this report cross the line and highlight the need for more oversight.”

    • CIA Classifies NFL As Domestic Terrorist Organization [Satire]

      “Oh no, we’re just classifying them as a terrorist organization. We are required by law to do so based on the number of people NFL players have killed or injured. But I assure you that the NFL is far too important to this country to actually do anything about it. Besides, as a Cincinnati Bengals fan I would hate to destroy the league now that the team is finally turning it around.”

    • Polish Authorities Must Ensure Independent Investigation Into Secret CIA Prison – OpEd

      Global human rights organization Amnesty International called for immediate completion of the investigation into Poland’s involvement in the US-led secret detention programs and bringing to justice in fair trials those responsible for human rights violations.

      According to the published information, the Polish government is accused of colluding with the US Central Intelligence Agency (CIA) to establish a secret prison at Stare Kiejkuty, 180 km north of Warsaw, where suspects were subjected to enforced disappearance and tortured between 2002 and 2005. The investigation has dragged on since 2008 and has been repeatedly delayed due to changes in prosecution personnel, a shift in location from Warsaw to Krakow, and claims that cooperation from the US government has not been forthcoming.

    • Pentagon Helicopters Purchased from Syrian Enabler May Never Fly

      Human Rights First today denounced news that the Pentagon is spending millions of taxpayer dollars to purchase helicopters from a congressionally-barred Russian arms dealer that is fueling atrocities in Syria and then sending the aircraft to Afghanistan, where there are not enough troops with the expertise to fly them. The group notes that the irresponsible and wasteful Pentagon contracts will have lethal implications for the people of Syria and threaten U.S. national security interests.

    • Senate lays out $625.1 billion for the National Defense Authorization Act

      That amount includes $526.6 billion for DoD base budget and $17.8 billion for the Energy Department, which is the same topline levels as the House version (H.R. 1960). A difference in the two bills is with the overseas contingency operations funding which is set at $80.7 billion in the Senate bill and $85.8 billion in the House bill.

  • Cablegate

  • Finance

    • Will the Fed chair finally crack down on Wall Street?

      If appointed, US Central Bank Vice Chairwoman Janet Yellen is likely to be a tougher regulator than Bernanke

    • Thinking Utopian: How about a universal basic income?

      In light of the recent Oregon Medicaid study, several people have discussed the idea of taking parts of the social insurance system and replacing them with cash benefits. This naturally brings up the debate about whether it should be a policy goal for the United States to adopt a universal basic income (UBI). These poverty-level targeted incomes are universal and unconditional, so everyone would get them regardless of their income, status or work participation. Wonkblog’s Dylan Matthews wrote an overview of universal basic incomes and some proposals for such a system last year.

    • U.S. feds make their first-ever Bitcoin seizure

      It may be the currency of the future, but it now appears that Bitcoin is not immune to the U.S. government’s prying eyes and hands — especially when it’s being used to fuel black market activities.

  • Censorship

    • Dentist Threatens Patient Who Left Yelp Criticism With Criminal Charges

      As Ken White points out, Texas repealed its criminal libel law in 1974. Also, just recently Texas passed what is probably the strongest anti-SLAPP law in the country, even better than the one in California. While de la Riva’s letter initially worked in stifling Jen B’s speech — scaring her into pulling the review — after White connected her with Leif Olson, a lawyer in Texas who was willing to help her out pro bono, things are looking up. Olson sent de la Riva and Coppola quite the epic reply.

  • Privacy

    • Who is Leaking More: Edward Snowden or the Government Officials Condemning Him?

      In the month since the Guardian first started reporting on the surveillance documents provided by NSA whistleblower Edward Snowden, the government has taken to the media to condemn his leaks and insist he is flagrantly violating the law. To prove this, the government has been incessantly leaking information itself.

      Huffington Post’s Michael Calderone extensively detailed this week’s NSA media counteroffensive against Snowden, as officials have tried to explain—anonymously and without real proof—that Snowden’s leaks have hurt national security. On Wednesday, intelligence officials described to ABC News, Washington Post, Reuters, and AP about the how terrorists are allegedly “changing their tactics” now that they’ve been tipped off the US is monitoring the Internet.

    • The Daily News has officially committed this week the most heinous act in contemporary journalism.

      I want to say Greenwald is now even braver than he was before the smears, in contextualizing these smears, hanging tough, and refusing to be cowed by slurs that are so disgusting and inappropriate — that is, for other ‘journalists’ to traffic in. And the Guardian is gutsy too in carrying on with the proper focus — on getting the news out.

      All of us, all of us have done things that are not illegal or even relevant to our professional lives but that could be used against us, to embarrass or discredit us.

      I think we should start a movement to tweet our ‘embarrassing’ revelations from our pasts in support of Glenn Greenwald.

      I applaud Greenwald’s defense of his and by extension everyone’s right to have lived complex, adult lives.THAT IS WHAT THE FOURTH AMENDMENT IS FOR. I deplore this smearing and effort at distraction politics, aimed at a courageous journalist; and it is truly despicable to see other journalists or news outlets give any air or space to a form of attempted destruction of reputation that could any day, any moment, be aimed at them — now, post NSA revelations, with more ammunition than ever.

    • Senators’ letter to US director of national intelligence James Clapper

      Bipartisan group of 26 US senators complain that the Obama administration is relying on a ‘body of secret law’ to collect massive amounts of data on US citizens

    • Ex-Microsoft adviser backs Snowden leaks

      British MPs and a former Microsoft privacy chief say Brussels must stand up to America to protect European citizens from illegal internet surveillance. VoR’s Vivienne Nunis reports from Westminster.

    • Royal Family granted new right of secrecy

      Special exemptions to be written into Freedom of Information Act

    • Glenn Greenwald: NSA Can Store A Billion Cell Phone Calls Every Day

      Guardian journalist Glenn Greenwald says he has another big scoop about the National Security Agency’s surveillance practices up his sleeve.

      Speaking over Skype to the Socialism Conference in Chicago, Greenwald claimed that the NSA has the ability to store one billion phone calls each day.

    • The NSA Can’t Tell the Difference Between an American and a Foreigner

      The National Security Agency has said for years that its global surveillance apparatus is only aimed at foreigners, and that ordinary Americans are only captured by accident. There’s only one problem with this long-standing contention, people who’ve worked within the system say: it’s more-or-less technically impossible to keep average Americans out of the surveillance driftnet.

    • Guardian editors discuss NSA surveillance with Charlie Rose – video
    • India’s new surveillance network will make the NSA green with envy

      India doesn’t seem to worry that the surveillance scandal recently rocking the US might perturb its own citizens. The country is going ahead with an ambitious program that will let it monitor any one of its 900 million telecom subscribers and 120 million internet users.

      The Centralised Monitoring System (CMS) will be operational in 10 of the country’s 22 telecom “circles” (i.e., regions) by the end of the year, according to the Press Trust of India. The far-reaching surveillance program rivals the worst in the world, and makes the US National Security Agency (NSA) look like a model of restraint.

    • U.S. Prism, Meet China’s Golden Shield

      On Tuesday, shortly before China escalated its criticism of the United States over its global surveillance programs, saying they showed not just the “hypocrisy” but also the “true face” of the U.S., a Beijing lawyer named Xie Yanyi filed a public information request with the police asking about China’s own surveillance operations.

    • What It’s Like to Get a National-Security Letter

      In the summer of 2011, while he was fighting an indictment for alleged computer crimes, Aaron Swartz, an information activist, read Kafka’s “The Trial” and commented on it at his Web site.

    • If PRISM doesn’t freak you out about cloud computing, maybe it should, says privacy expert

      Caspar Bowden warned Parliament that governmental snooping should make companies think twice before going to cloud.

    • Why Monopolies Make Spying Easier

      These days, America has one dominant search engine, one dominant social-networking site, and four phone companies. The structure of the information industry often goes unnoticed, but it has an enormous effect on the ease with which the government spies on citizens. The remarkable consolidation of the communications and Web industries into a handful of firms has made spying much simpler and, therefore, more likely to happen.

    • Oliver Stone, Noam Chomsky, Tom Hayden Urge President Correa to Grant Snowden Asylum
    • Revealed: Whistleblower Edward Snowden posted comments attacking citizen surveillance while working for CIA

      The ex-CIA employee and whistleblower Edward Snowden posted hundreds of messages on a public internet forum railing against citizen surveillance and corporate greed, it was revealed today.

    • Senators accuse government of using ‘secret law’ to collect Americans’ data

      Bipartisan group seeks answers from intelligence chief James Clapper over scale of and justification for NSA surveillance

    • Stellar Wind: NSA collected US email records for more than two years under Obama
    • Total Surveillance

      In 1952, in a famous Supreme Court case that arose when President Truman attempted to seize control of the steel industry to support the Korean War effort when workers threatened to continue striking…

    • Contra George Mitchell, NSA Surveillance Is Not a Minor Issue

      In an item yesterday, I praised the considerable accomplishments and reflectiveness of statesman George Mitchell. I also noted that I often disagree with his politics without giving an example. A statement of his that touched on the NSA controversy captures the differences in our perspectives.

    • Obama Defends NSA Surveillance, But Is Anyone Buying It?

      President Obama brags about the situation as proof of his “transparency,” but the reality is that he got caught, well into his second term in office, in a decidedly secret scheme, and has been fighting vigorously to punish the whistleblower who uncovered it.

  • Civil Rights

  • Intellectual Monopolies

    • Copyrights

      • The Miracle in Marrakesh: Copyright Reform to End the “Book Famine”

        An international copyright treaty, adopted by the World Intellectual Property Organization (WIPO) in Marrakesh on June 27, will dramatically increase access to reading materials for the 300 million visually impaired people around the world. This is a historic moment for the blind. The treaty was adopted 32 years after WIPO and UNESCO first investigated the need for a solution to end the “book famine”—the fact that blind people have access to only 1–5 percent of published works.

      • Police plot against intellectual property profiteers

        City of London launches IP crime unit

      • UK Government Announces New Intellectual Property Crime Unit

        Following news earlier this month that UK police had begun sending threatening letters to torrent site operators, today the government has announced the creation of a brand new unit dedicated to cracking down on intellectual property offenses. The Intellectual Property Crime Unit at the City of London Police will be funded with £2.5m of public funds and is set to launch in September, targeted those said to be illegally profiteering on the back of content creators’ work.

]]>
http://techrights.org/2013/06/29/android-4-3-ousted/feed/ 0
Eben Moglen – How To Retrofit The First Law Of Robotics (HOPE 9, 2012) http://techrights.org/2013/01/29/hope-9-2012/ http://techrights.org/2013/01/29/hope-9-2012/#comments Tue, 29 Jan 2013 11:47:29 +0000 http://techrights.org/?p=65968 Summary: Eben Moglen’s recent talk which is important in light of news about phones becoming illegal to jailbreak


]]>
http://techrights.org/2013/01/29/hope-9-2012/feed/ 0
Stop Fighting Software Patents the Way Lawyers Say We Should http://techrights.org/2012/12/13/lawyer-problem/ http://techrights.org/2012/12/13/lawyer-problem/#comments Fri, 14 Dec 2012 02:39:38 +0000 http://techrights.org/?p=65144 With few exceptions…

Carlo Piana

Summary: So-called ‘moderates’ or ‘realists’ (usually lawyers and law professors) obscure the permanent solution to software patents

Eric Goldman, a lawyer talking about a conference stacked with law professors, says this about software patents, offering no end to software patents as though a compromise can somehow resolve a problem that most countries in the world already recognise. Here is another go at it. He says:

Software patents play a huge–and controversial–role in our economy. In a recent post, I explained some of the unique problems that software innovations pose to the patent system. This post extends that discussion by exploring two structural hurdles to addressing those problems: (1) the challenge of defining “software,” and (2) which regulatory institution(s) can implement any fixes. In the near future, I will conclude this three-part series of posts by exploring specific ideas to fix software patents.

[...]

In theory, we can distinguish software from physical devices (e.g., “hardware”). Even if we do, innovators can often replicate software functionality by designing hardware to incorporate the functionality directly. In this sense, hardware and software are partial substitutes for each other. In fact, before patent law clearly allowed software patents, innovators (especially IBM ($IBM)) routinely obtained “software” patents by patenting hardware designed to perform the software-like function. So any special rules for software patents will just push innovators and their patent lawyers to seek patent protection for hardware that achieves the same outcome, obtaining the synthetic equivalent of a software patent. In that case, we aren’t making much progress.

[...]

So, fixing software patents is tricky. It may not be possible to define software patents precisely, it may be easy for patent applicants to game any software-specific rules, and we have to find a way to remain in compliance with our treaty obligations. On the other hand, if we avoid software patent-specific fixes and instead try to make changes across all patents, that would dramatically increase the number…

Hold on there. The problem with where this argument goes (again!) is that it is leading to the “bad” patents or “bad” lawsuits line of reasoning. It is taking us nowhere, just like the effort to squash one patent at a time — a strategy famously used by the EFF some years ago, under the “patent busting” banner. The EFF now calls for the end of all software patents. It is the real solution.

Consider this news about a one-patent-at-a-time approach:

‘Steve Jobs’ iPhone patent used against Samsung/Motorola invalidated by US patent office, could affect lawsuits

In October, as pointed out in Samsung filings with U.S. District Lucy Koh, we told you that the U.S. Patent and Trademark Office issued a non-final decision that declared 20 claims related to Apple’s rubber-banding patent invalid. While Samsung and Apple were back in court yesterday regarding post-trial motions, today FossPatents reported (via MacRumors) the USPTO has issued another non-final ruling declaring yet another Apple multitouch patent invalid.

This time it’s a touchscreen patent, commonly called “the Steve Jobs patent,” that courts previously deemed valid in cases against Samsung and Motorola in the past…

It will not derail entire cases, only weaken them. The lawsuit against the market leader, Samsung, carries on and Pamela Jones says: “Judge Koh has also ruled on the various requests for sealing. For Samsung, it’s two granted, including the HTC one, and another which asks for something Apple asked for too and four denied, with one partly granted; for Apple it’s 2 granted and 1 partially granted. It’s been like that every time I check who gets the most motions denied.”

Here is a link shared by Jones:

In response to some questions posed by the United States International Trade Commission (USITC), wireless baseband supplier Qualcomm has torn into Apple in a court filing, saying that apple “should be embarassed” at the length and depth of the iPad makers’ patent infringement. The move is curious, as Apple has been Qualcomm’s largest customer for three years.

“That’s not vitriol,” remarks Jones. “It’s just true. Apple revealed it is NOT a willing licensee in the Wisconsin case that got dismissed because it refused to commit to obey a judge’s royalty rate unless it liked and agreed with it. Qualcomm is just pointing that out.”

Apple is now guided by lawyers because its engineers are unable to catch up with Android, technically.

Stop listening to lawyers if you want the problem to end; there are exceptions like Carlo Piana (Samba lawyer) or Eben Moglen (law professor), but in general, the vast majority of lawyers, including Red Hat’s, have a view and agenda different from everyone else’s. To them, litigation is like war for a weapons contractor. Lawyers, like bankers, also like to complicate things with complex legalese (terminology) which makes them seemingly necessary, totally barring the debate so as to shut out everyone not of their occupation. This develops cult-like, self-preserving corrupt institutions which seek to justify their own parasitic existence. We must recognise this institutional issue and openly talk about it. Politicians too are mostly lawyers.

]]>
http://techrights.org/2012/12/13/lawyer-problem/feed/ 0