04.12.15
Posted in News Roundup at 3:55 pm by Dr. Roy Schestowitz

Contents
-
Desktop
-
According to StatCounter, their data should not be used this way but the approach is reasonable. It suggests that globally, we are near ~100million people using GNU/Linux assuming other countries follow these trends.
-
Kernel Space
-
Linus Torvalds indicated last week when releasing Linux 4.0-rc7 that Linux 4.0 might be released next weekend (this weekend). Nothing dramatic happened in kernel development over the past week with say any mighty regressions, but as he’ll be travelling in the days ahead, he may end up delaying Linux 4.0 for one more week to avoid opening the Linux 4.1 kernel merge window while he’s preoccupied. We’ll see shortly what he’s decided to do for the Linux 4.0 release.
-
Graphics Stack
-
For those running older Radeon graphics cards with the R600 Gallium3D graphics driver, an important update landed in Mesa 10.6-devel Git this past week.
-
-
Benchmarks
-
The benchmarks in this article are looking at the EXT4 / Btrfs / XFS / F2FS file-systems under the Linux 4.0 Git kernel as well as the Linux 3.19.0 stable kernel. These four file-systems were tested on a 240GB OCZ Vertex 3 solid-state drive. The stock mount options for each file-system on Linux 3.19/4.0 were used during testing.
-
Applications
-
In the last couple of months I have been experimenting with various distributions on the Raspberry Pi 2. Recently, my attention has turned to home theatre distributions which come with a pre-configured version of Kodi. Kodi (previously called XBMC) is software that turns a computer into a device that rules all your living room media needs.
-
We did some minor changes in last weeks, so it’s a bit different from the one you’ve if you installed the Calculator App Reboot from the store. Anyway, now you can remove the one from the store and update your default app, you will have the new one. Unfortunately, your old calc history will be lost, but we found out that to create an importer for old calcs required some time, so we prefered to update the app.
-
For those of you running Ubuntu Touch/Phone, once updating your default calculator app you’ll be presented by the brand new “calculator reboot” app.
-
GnuPG 2.1.3 adds LDAP keyserver support to the 2.1 modern series, new GPG options, improves searching for mail addresses when using a keybox, changed the default algorithms with gpgsm to AES-128 and SHA-256, and provides various other fixes.
-
-
Instructionals/Technical
-
-
Reviews
-
This is a review of the latest edition of Semplice, a desktop distribution based on the unstable branch of Debian.
Before this review, Semplice 5 was the previous edition last reviewed on this website. See Semplice 5 review – High Hopes.
Where Semplice 5 featured a custom graphical installer and the Openbox window manager, Semplice 7 still featues the same custom graphical installer, but a different desktop environment and window manager.
If you’ve never used Semplice, this cursory review will provide enough information about the distribution to bring you up to date on what to expect from it.
-
New Releases
-
There is no such thing as the perfect Linux distribution. Try all you want, but your search will leave you fatigued and confused; perfection is impossible. With that said, you can definitely achieve happiness once you commit to a distro despite potential shortcomings. Ultimately, you must weigh the pros and cons and pick something that meets your needs.
-
-
Softpedia was the first to announce the final release of the elementary OS 0.3 Freya today, April 11, 2015. Users can download elementary OS 0.3 right now from our website or read the release announcement for more details.
-
After approximately two years of continuous work, the team behind the elementary OS Linux distribution announced today, April 11, the immediate availability for download of the final build of their elementary OS 0.3 computer operating system.
-
Parsix GNU/Linux is a live and installation DVD based on Debian. Our goal is to provide a ready to use and easy to install desktop and laptop optimized operating system based on Debian’s testing branch and the latest stable release of GNOME desktop environment. Users can easily install extra software packages from Parsix APT repositories. Our annual release cycle consists of two major and four minor versions. We have our own software repositories and build servers to build and provide all the necessary updates and missing features in Debian stable branch.
-
Screenshots
-
Arch Family
-
The crew behind the Arch Linux derived Antergos operating system have updated their official installation media.
The big changes with this updated install media is using the new Cnchi v0.8.0 installer and defaulting to GNOME 3.16 for the desktop experience.
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
Their next OTA update should be the last one until the Ubuntu RTM branch migrates to Ubuntu 15.04 as code-base.
-
-
Phones
-
Android
-
Even as handset OEMs are upgrading their smartphones to Android 5.0 Lollipop as well as the recently announced Android 5.1 Lollipop, an incremental update dubbed Android 5.1.1 has been spotted in the Android SDK Manager.
-
Every month, we try our best to put together a selection of the Top 10 Android Wear apps and watch faces from the past month. It doesn’t seem like much has changed in the past few weeks, but there have been some interesting launches in the past couple weeks, and it’s a good time to be in to watch faces, as there are a lot on offer these days.
-
Taking a look back at seven days of news across the Android world, this week’s Android Circuit highlights a number of stories including my review of the Galaxy S6 Edge, Samsung’s handling of #Bendgate, more Xperia Z4 leaks, Samsung’s falling profits, Android Wear on iOS, repairing the Edge, and some great tips for improving Android.
-
When I started Free Software Magazine, over 10 years ago, it was a very different world. Magazines still mattered, Facebook was a primitive site for university students, Digg was about to become a huge new site (before disappearing a few years later), and… did I mention that Magazines still mattered?
Fast-forward to 2015: it has been 11 years. While I can say that for the first time I have contributed to an exciting free software project with a few thousands lines of code, Hotplate — and believe me, I’ve been keeping busy — I was forced to put Free Software Magazine in hiatus in order to complete Hotplate.
-
Events
-
Coming Wednesday, it’s time for the monthly Berlin ownCloud meetup again. Last month, we wanted to play with some little development boards, install ownCloud on them and see what they could do. But we had over a dozen new participants join, turning the meetup mostly in a ‘how to get an ownCloud development environment up and running’ session.
-
Programming
-
In consequence, it would not surprise me if we hear more and more about “corporate development methodologies” (a.k.a. agile) vs. “upstream development methodologies” (a.k.a. FLOSS).
Scrum, XP, Kanban -ish fans will need to face those challenges and find solutions in order to succeed in open collaboration environments. In the same way, based on the increasing influence that companies are gaining in these ecosystems, FLOSS methodologies in a few years will differ from what we knew 10 years ago.
-
Politics
-
A day before Hillary Clinton is expected to announce her second run for the White House, President Barack Obama said she would make an “excellent president.”
“She was a formidable candidate in 2008,” Obama said in response to a question at a news conference in Panama. “She was a great supporter of mine in the general election. She was an outstanding secretary of state. She is my friend. I think she would be an excellent president.”
Obama and Clinton have remained in touch since she left the State Department in 2013 where she served as Obama’s secretary of state in the first term.
[...]
“Not only have I run my last election, but I am not in the business of prognosticating future elections,” he said.
Join The Conversation
McClatchy Washington Bureau is pleased to provide this opportunity to share information, experiences and observations about what’s in the news. Some of the comments may be reprinted elsewhere in the site or in the newspaper. We encourage lively, open debate on the issues of the day, and ask that you refrain from profanity, hate speech, personal comments and remarks that are off point. Thank you for taking the time to offer your thoughts.
-
Rand Paul has in fact inherited much of his father’s popularity among the grassroots and youth activists of his party. I would tend to agree with most political insiders that he is one of the leading contenders for the Republican nomination. However, I can’t help but wonder just how long and to what effect his disingenuous charade can possibly continue. At what point do his key voting blocs stop and realize what his actions are really designed to accomplish? Which is to trick them into electing an unremarkable first term Republican senator as America’s first “Libertarian” president.
-
But my promise wasn’t kept. I stepped down as KCIA director in January 1963. The military government relinquished power to a civilian elected-government. But the KCIA kept its authority to investigate and has been blamed for abusing and politicizing its power many times since. It is still trying to hold onto the authority it promised to hand over. The motto that I drafted has also been damaged. I do feel responsible for its abuse of power and misdeeds as its founder.
-
Health/Nutrition
-
Political lobbying, on an international scale, has intensified. There is much to play for. Other biotech giants are involved – Dow, DuPont, Syngenta, Bayer, BASF – but Monsanto is at the head of the pack, pushing hard into Europe and Asia and, with the help of the Bill and Melinda Gates Foundation, into Africa too.
-
Security
-
In December 2014, Google released information about a vulnerability that researchers working on its Project Zero bug-hunting initiative had discovered in Microsoft’s Windows 8.1 operating system. Google had raised the issue privately with Microsoft three months previously, but Microsoft had failed to address the issue within Project Zero’s 90-day deadline.
-
Defence/Police/Secrecy/Aggression
-
The Russian Navy vessel Priazovye has helped to evacuate 308 people from war-torn Yemen. The Russian Defense Ministry stated citizens from 19 countries had been rescued, including Russian, Ukrainian, US and Yemini nationals.
-
Opponents of Iran’s initial agreement to curb its nuclear program are being “disingenuous” when they say the deal could still allow the Middle Eastern state to build nuclear weapons, the head of the Central Intelligence Agency said on Tuesday.
-
CIA Director John Brennan reportedly says the preliminary framework around the nuclear deal with Iran does what had once seemed impossible, calling some critics of the agreement “wholly disingenuous” and expressing surprise at the Iranians’ concessions.
-
Last night, Director of Central Intelligence John Brennan participated in a question-and-answer session at Harvard Kennedy School’s Institute of Politics. The first thirty-seven minutes consisted of an unusually probing exchange between Brennan and Harvard professor Graham Allison (full disclosure: Graham is a former boss of mine). Most notably, between 19:07 and 29:25 in the video, Allison pressed Brennan repeatedly about whether the United States is winning the war on terrorism and why the number of al-Qaeda-affiliated groups has only increased since 9/11: “There seem to be more of them than when we started…How are we doing?”
-
-
-
America’s most famous former spy and a fallen-star New York Times writer have started a new round of smacktalk over a topic that has 2003 written all over it: Who’s to blame for the U.S. invasion of Iraq?
Judy Miller and Valerie Plame Wilson have re-litigated the question of war over the past week in op-ed pages and on Facebook and Twitter. It became personal.
-
These revelations come from veteran New York Times reporter Judith Miller’s new book, The Story: A Reporter’s Journey. It tells how special prosecutor Patrick Fitzgerald rigged the 2007 perjury trial of Vice President Dick Cheney’s former chief of staff, Lewis “Scooter” Libby, in the Valerie Plame case, and inadvertently condemned thousands of Americans to be killed and maimed needlessly in Iraq.
-
As embarrassing as the Judith Miller case was for the New York Times, the fiasco underscores a more troubling development that strikes near the heart of American democracy – the press corps’ gradual retreat from the principle of skepticism on national security issues to career-boosting “patriotism.”
-
Then she misused that same influence and prestige. So she doesn’t get to ridicule all those who initially took her Times stories seriously, as the United States launched a war that killed 4,500 U.S. service members and left an Iraqi toll many times higher.
-
On April 3, former New York Times journalist Judith Miller published an article in the Wall Street Journal entitled “The Iraq War and Stubborn Myths: Officials Didn’t Lie, and I Wasn’t Fed a Line.” If this sounds a bit defensive, Miller has tons to be defensive about.
In the article, Miller claims, “false narratives [about what she did as a New York Times reporter] deserve, at last, to be retired.” The article appears to be the initial salvo in a major attempt at self-rehabilitation and, coincidentally, comes just as her new book, The Story: A Reporter’s Journey, is to be published today.
In reviewing Miller’s book, her “mainstream media” friends are not likely to mention the stunning conclusion reached recently by the Nobel Prize-winning International Physicians for the Prevention of Nuclear War and other respected groups that the Iraq War, for which she was lead drum majorette, killed one million people. One might think that, in such circumstances – and with bedlam reigning in Iraq and the wider neighborhood – a decent respect for the opinions of mankind, so to speak, might prompt Miller to keep her head down for a while more.
-
“You were just cheering from the sidelines,” ex-CIA operative says about Miller’s role in helping build support for the Iraq War
Former CIA operative Valerie Plame took to social media to criticize former New York Times reporter Judith Miller’s recent column that deflected her role in ginning up support for the Iraq War.
-
Judith Miller recently popped out of the Fox News bubble for a quick jaunt to the Wall Street Journal editorial page, the home base for John Bolton, Max Boot, and other neo-con hawks, to give her forthcoming book a little free advertising. In the process she attempts to whitewash her role as an influential pro-war voice in the lead-up to the Iraq War.
Her April 3, 2015 statement predictably follows the same party line as Dick Cheney, Donald Rumsfeld, Tony Blair, and George W. Bush. She strongly defends herself against those who claim her reportage in the run-up to the war consciously fanned the flames of pro-war sentiment prior to the start of “shock and awe” on March 19, 2003. She claims she was a victim of faulty intelligence and “everybody” got it wrong about Iraq’s weapons of mass destruction. So why single her out?
-
Valerie Plame, who was outed as a CIA agent by members of the Bush administration, fired back at a journalist whose work helped push the U.S. into war with Iraq.
Former New York Times reporter and current Fox News contributor Judith Miller published an essay last week in the Wall Street Journal claiming responsibility for her eventually discredited reporting on Iraqi’s alleged weapons of mass destruction.
Plame suggested in a Facebook post that Miller was flattering herself.
“Dear Judy,” she posted Monday night. “No one is crediting you with starting the Iraq war. We know you were not actually on the team that took us into the biggest, most tragic U.S. foreign policy debacle ever. You were just cheering from the sidelines. Your attempt to re-write history is both pathetic and self-serving.”
-
The fight against the Islamic State group received a jolt of energy when the United States and Turkey sealed a pact to train and arm Syrian rebels. Two months later, the program faces delays and skepticism — as Turkish officials, Syrian rebels and even former American advisers openly question whether it can ever have any battlefield impact.
-
In an unprecedented violent attack inside Jordan’s most secretive and feared government security agency, The General Intelligence Directorate (GID), also known as the “Mukhabarat” in Arabic, an intelligence officer attacked and stabbed a high ranking senior officer during an alleged armed robbery attempt last week using a stun baton Taser and a knife. The attacker was identified in a statement by the victim’s tribe and reported by the London-based newspaper Al Rai al Youm as Mohamad Abdullah al Odwan. Odwan had allegedly entered the office of intelligence officer, Lt. Colonel Khaled Tawfiq al Utoom and demanded a hundred thousand dinar ( $ 150.000) from a safe the victim had in his office and supposedly contained millions more. Rai al Youm reported that Odwan stabbed and clubbed Utoom with his stun baton after the latter refused to hand over the money to him. Odwan then fled the building after taking large sums of money from the safe, but later was arrested and currently is under investigation.
-
The War on Terror provided the US an opportunity to expand its military footprint in the Philippines.
-
The Haqqanis were a terrorist threat that was well known in Washington and Kabul, and they were a constant source of diplomatic headaches. During the Cold War, Jalaluddin Haqqani was a handsomely paid CIA proxy in the fight against the Soviets, but after 9/11, his family took up arms against the latest infidel invaders. “In Pakistan’s tribal areas of North and South Waziristan, Maulavi [Jalaluddin] Haqqani and his sons run a network of madrasas and training bases and provide protection for foreign fighters and terrorist groups, including Al-Qaeda,” The New York Times reported in June 2008.
-
Below is a very disturbing and well-known Wikileaks video exposing what happened (and is still happening) in the Middle East on a daily basis. It’s called “Collateral Murder,” and the solider you see in the video is Ethan McCord; he is one of many soldiers heard in the Wikileaks video who were deployed in Iraq.
There is some disturbing footage in it, but it’s a powerful tool to let people know about something that is commonly covered up, leaving the Western world oblivious to the reality of the situation.
We are made to believe that soldiers are sent over to these countries to fight terror, completely ignoring the fact that innocent people, for no reason, are being killed every day.
-
Absent from the Leader’s memo was the fact that PATRIOT Act Sec. 215 data has never stopped a single terrorist threat to the United States, as Obama administration officials were forced to admit in the fall of 2013. Also missing from McCarthy’s memo was that fact that the “shoe bomber”, the “underwear bomber”, the Ft. Hood shooter, and the Boston Marathon bombers were not stopped by NSA’s global surveillance dragnet, as typified by Sec. 215. McCarthy’s troops were also spared the reminder that Obama’s review group on intelligence and communications technologies found the program useless. Given those omissions, it’s also not shocking that Mr. McCarthy didn’t want his members focused on DEA’s own decades-long metadata program, which only raises very uncomfortable questions about how many mass surveillance programs are running that we don’t know about.
-
Sunday morning news television is where Washington sets its media agenda for the week and, more importantly, defines its narrow range of conventional, acceptable viewpoints. It’s where the Serious People go to spout their orthodoxies and, through the illusion of “tough questioning,” disseminate DC-approved bipartisan narratives. Other than the New York Times front page, Sunday morning TV was the favorite tool of choice for Bush officials and neocon media stars to propagandize the public about Iraq; Dick Cheney’s media aide, Catherine Martin, noted in a memo that the Tim-Russert-hosted Meet the Press lets Cheney “control message,” and she testified at the Lewis Libby trial that, as a result, “I suggested we put the vice president on Meet the Press, which was a tactic we often used. It’s our best format.”
-
Transparency Reporting
-
The FBI is taking extraordinary and potentially unconstitutional measures to keep local and state police forces from exposing the use of so-called “Stingray” surveillance technology across the United States, according to documents obtained separately by the Guardian and the American Civil Liberties Union.
Multiple non-disclosure agreements (NDAs) revealed in Florida, New York and Maryland this week show federal authorities effectively binding local law enforcement from disclosing any information – even to judges – about the cellphone dragnet technology, its collection capabilities or its existence.
In an arrangement that shocked privacy advocates and local defense attorneys, the secret pact also mandates that police notify the FBI to push for the dismissal of cases if technical specifications of the devices are in danger of being revealed in court.
-
Even a cursory glance at what Dan Ellsberg has been up to recently will show that he obviously considers them all to have made huge, historic and overwhelmingly beneficial contributions to the world. So maybe Penn should listen to what his ‘very informed’ whistleblower (who was, himself, vilified in his own day, of course) has to say on the subject.
-
We are going to discuss official lies, whistleblowers, silent witnesses, and how the majority falls for official fictions and dismisses truth. We will also be discussing another common tactic used by the deep state and its tentacles to promote official-lies and cover up truth: Muddying the facts by bombarding people with conflicting, contradicting, and confusing supplementary lies before moving on to their next officially-narrated official lie.
-
Environment/Energy/Wildlife
-
Just over 200 million years ago, the end-Triassic mass extinction killed off more than half of the species of organisms living on Earth’s land and in the oceans. We are only just beginning to understand how this – and the period of runaway global warming that followed – changed the chemistry of open oceans.
The end-Triassic mass extinction marked the transition between the Triassic to the Jurassic Period and the rise of the large herbivorous dinosaurs, such as the Diplodocus. The extinction meant that previously abundant species were cleared from ecological niches which allowed dinosaurs to move in with little competition from other animals. The Jurassic lasted another 55 million years until the beginning of the Cretaceous Period.
-
Finance
-
Ten U.S. senators, representing the political spectrum, are seeking a federal investigation into displacement of IT workers by H-1B-using contractors.
They are asking the U.S. Department of Justice, the Department of Homeland Security and the Labor Department to investigate the use of the H-1B program “to replace large numbers of American workers” at Southern California Edison (SCE) and other employers.
This letter is a significant development in this contentious issue. It arrives at the same time that lawmakers are pushing a substantial increase in H-1B visas under the I-Squared bill, legislation that would raise the H-1B cap. Two of the co-sponsors of the I-Squared bill also signed the letter asking for an investigation into H-1B program practices.
-
‘When did you last get a job from a poor person?’ So goes my favorite Tea Party slogan. The Americans are good at slogans but the Tea Party specializes in discombobulatingly daft ones. Of course you won’t get a job from a poor person, we wearily concede, but it doesn’t follow that the rich create jobs, as if they have special powers that turn their gains into a gift of jobs to the rest of us. U.S. billionaire Nick Hanauer is refreshingly honest about this: ‘If it was true that lower taxes for the rich and more wealth for the wealthy led to job creation, today we would be drowning in jobs.’ So why hasn’t the spectacular shift in income and financial wealth to the rich over the last four decades led to unprecedented jobs growth?
-
As economic crises, declines and dislocations increasingly hurt or threaten people around the globe, they provoke questions. How are we to understand the forces that produced the 2008 crisis, the crisis itself, with its quick bailouts and stimulus programs, and now the debts, austerity policies and deepening economic inequalities that do not go away? Economies this troubled force people to think and react. Some resign themselves to “hard times” as if they were natural events. Some pursue individual strategies trying to escape the troubles. Some mobilize to fight whoever they blame for it all. Many are drawn to scapegoating, usually encouraged by politicians and parties seeking electoral advantages.
-
PR/AstroTurf/Lobbying
-
In recent years, the dinner has become quite a production, growing from a small gathering of 50 in 1921 to 2,600 attendees in 2014, complete with Hollywood celebrities and lavish parties in the days before and after the big event.
-
Censorship
-
China’s government has threatened to shut down Sina, one of the country’s most popular news websites unless it “improves censorship”, reporters its state media
-
Privacy
-
SOCIAL NETWORK Facebook has admitted that it tracked non-users, but said that this happened only because of a bug.
Facebook’s remarks come in response to a recent report from Belgium’s data protection authority accusing the firm of multiple violations of EU privacy law.
These violations include “stalking” people geographically via Facebook mobile apps, and failing to inform users of data collection practices.
-
Facebook researchers have found “a bug” that caused it to track people, even if they had never visited its website, the social media giant acknowledged this week.
The bug caused the company to place cookies — a common way to track people’s browsing habits on the Web — on “some” people’s browsers, even if they had never visited Facebook.com to sign up for an account, the social media website’s European Public Policy Vice President Richard Allan wrote in a blog post on Wednesday.
-
Starting weeks before Islamic militants attacked the U.S. diplomatic outpost in Benghazi, Libya, longtime Clinton family confidante Sidney Blumenthal supplied intelligence to then Secretary of State Hillary Clinton gathered by a secret network that included a former CIA clandestine service officer, according to hacked emails from Blumenthal’s account.
-
On Wednesday, the Privacy and Civil Liberties Oversight Board met to approve its next project. They are just about completing a general overview of the Intelligence Community’s use of EO 12333 (as part of which they’ve been nagging agencies, notably DEA and Treasury, to comply with requirements imposed by Ronald Reagan). Next, they will move onto a deep dive of two programs conducted under EO 12333, one each for NSA and CIA. PCLOB has now posted materials from Wednesday’s meeting, though this overview is also useful.
[...]
Finally, remember that CIA has conducted investigations targeting Senate Intelligence Committee staffers, which suggests it interprets its ability to conduct counterintelligence investigations unbelievably broadly.
-
Defenders of the NSA’s notorious bulk telephony program have stressed since it was first disclosed that the massive database of calling information can only be used for national security investigations of foreign terror groups, and is tightly regulated by the FISA Court. This week, however, USA Today confirmed that the Drug Enforcement Administration’s own bulk telephony program, first reported in January, began nearly a decade before the attacks of September 11, 2001—vacuuming up records of Americans’ calls to a whopping 116 foreign countries “linked to drug trafficking” using administrative subpoenas. This is presumably the “massive database of phone records” referenced in a 2013 Reuters story on the shady practice of “parallel construction,” wherein state or local law enforcement agency are fed tips from DEA, then encouraged to “phony up investigations” (in the words of one Harvard law professor) in order to conceal the true origins of the information from courts and criminal investigations.
-
The justification they were using for the NSA’s program – that it was only being used against dangerous terrorists, not ordinary criminals – just wasn’t true with the DEA. The public would clearly be outraged by the twisted legal justification that radically re-interpreted US law in complete secrecy. “They couldn’t defend both programs”, a former Justice Department official told Heath. The piece also reveals that Attorney General Eric Holder “didn’t think we should have that information” in the first place, which is interesting because Holder was one of the first Justice Department officials to approve the program during the Clinton administration. It’s nice he came to his senses, but if the program never risked going public, would he have felt the same?
There are many other surveillance programs the government is desperate to keep hidden. Consider Stingray devices, the mini fake cell phone towers that can vacuum up cell phone data of entire neighborhoods at the same time and which are increasingly being used by local cops all around the country. The Associated Press reported this week that the Baltimore police have used these controversial devices thousands of times in the course of ordinary investigations and have tried to hide how the devices are used from judges.
The lengths to which the FBI will go to keep these devices secret from the public is alarming. As a Guardian investigation detailed on Friday, the FBI makes local police that use them sign non-disclosure agreements, and goes as far as to direct them to dismiss charges against potential criminals if the phone surveillance will be exposed at trial (as is required by due process rights in the Fifth Amendment).
-
Like others before him — such as Daniel Ellsberg with the Pentagon Papers — Snowden released his findings to the press, and trusted journalists to do their job in exposing government malfeasance and lack of accountability. Also like Ellsberg, Snowden was charged under the Espionage Act of 1917.
-
The Baltimore Police Department surprised many when it revealed recently that it has used a cellphone surveillance device known as a “stingray” 4,300 times since 2007.
-
American police and spies love the idea of back door access to encrypted data that lets them snoop on suspicious types, but many will tell you that they’re wildly optimistic. Even if you don’t mind the implication that the government has a right to spy on anyone, this could easily introduce a flaw that any attacker can use. National Security Agency chief Michael Rogers thinks there’s a happy medium, however. At a recent speech, he called for a “front door” encryption key that would provide access, but would be broken into pieces that prevents any one agency or person from getting in. This theoretically prevents thieves (and less than scrupulous authorities) from grabbing your data, but still lets officials look around when they have permission.
-
The National Security Agency is embroiled in a battle with tech companies over access to encrypted data that would allow it to spy (more easily) on millions of Americans and international citizens. Last month, companies like Google, Microsoft, and Apple urged the Obama administration to put an end to the NSA’s bulk collection of metadata. The NSA, on the other hand, continues to parade the idea that the government needs access to encrypted data on smartphones and other devices to track and prevent criminal activity. Now, NSA director Michael S. Rogers says he might have a solution.
-
Four decades of domination over almost all aspects of life in East Germany came to an abrupt halt 25 years ago on 31 March 1990. One of the most intrusive surveillance organisations in human history, the Ministry for State Security, more infamously known as the Stasi, was dissolved. This is a poignant milestone as a global debate about privacy rages in the wake of revelations of massive US surveillance of internet communications.
-
Civil Rights
-
Virginia Beach Police say they are investigating a “Use of Force” incident that occurred during an arrest that was recorded on a cell phone back in January.
[...]
Cervera would not say what part of the video he’s uncomfortable with, but did say he is questioning whether an officer stopped the recording and later deleted it.
-
Upset about the amount of noise he claimed a group of young people were making in a nearby park, Servin recklessly fired over his shoulder at a crowd while sitting in his car. Rekia Boyd died less than 24 hours after being struck in the head by one of the five rounds Servin fired.
-
The same people, of course, told you I was lying when I blew the whistle on torture and extraordinary rendition in 2004. The security services and the British Government would never do such a thing, they said. I was insane, they said.
-
What’s the right way to compensate someone for decades of lost freedom?
-
A TWO-YEAR police probe into the so-called rendition flights has failed to unearth evidence that terror suspects were travelling on planes which used Scots airports.
-
A small remote airport in north-eastern Poland, once used by the CIA as a rendition hub, has already received over €30 million in EU funds for its re-fit, but experts say it is a perfect example of “how-not-to and where-not-to” invest, as its economic feasibility, projected tourist forecasts, and impact on local employment are desperately low.
-
The UK government continues to delay the publication of flight records which could prove the British overseas territory of Diego Garcia was used by the CIA for “torture flights,” a human rights NGO has said.
Reprieve, which advocates for prisoners’ human rights in Guantanamo and elsewhere, said the UK government admitted in 2008 that Diego Garcia, a British territory in the Indian Ocean, was used by two CIA rendition jets carrying prisoners in 2002.
With the release of the Senate torture report in December, it was revealed that the CIA flew captives to secret prisons, known as black sites, across the globe as part of its rendition program.
-
The UK Foreign Office (FCO) has further delayed publication of flight records for Diego Garcia, following disclosures by a senior Bush administration official that interrogations took place at a CIA black site on the British island.
FCO officials are “still assessing the suitability of the full flight records for publication”, nine months after they were first requested from the government by human rights NGO Reprieve.
-
The UK Government is continuing to delay the publication of flight records which could hold evidence of the use of British territory by CIA ‘torture flights’ – over eight months after it said it was “assessing their suitability for publication.”
The Government has previously admitted that Diego Garcia, a British territory in the Indian Ocean, was used by two CIA ‘rendition’ jets carrying prisoners in 2002. The rendition programme saw prisoners flown around the world in order to be subjected to torture at secret prisons known as ‘black sites’, says the legal charity Reprieve.
However, since making the admission in 2008, successive British administrations have failed to publish flight records which could shed further light on the role played in the rendition programme by the island.
-
In announcing the reorganization in early March, Obama’s CIA Director John Brennan boasted that after the sweeping reorganization is implemented, the agency will be in the position to cover “the entire universe, regionally and functionally, and so something that’s going on in the world falls into one of those buckets.”
-
We tend to meet any new situation by reorganizing, and a wonderful method it can be for creating the illusion of progress while producing confusion, inefficiency and demoralization.
-
-
They certainly sought to please in those initial dark days when a position at the NATO table was at stake. This was something of a new world order – the attacks after September 11, 2001 did certainly allow Washington to make that spurious case. The stakes were high, and the “need” for pressing intelligence saw a crude clipping of various liberties and protections.
-
According to new accounts from former agent John Kiriakou, several spies warned against the rendition to Syria of Mahrer Arar, where he was tortured.
A former spy was convinced that the U.S. intelligence agency CIA’s rendition and torture of the Canadian Mahrer Arar amounted to punishment of the wrong man.
According to new accounts from former agent John Kiriakou, several colleagues warned against the treatment of Arar, which led to a public inquiry in Canada and a US$10 million federal government pay-out.
-
-
-
A former spy has described the debate within the CIA over the arrest, rendition and torture of Canadian Maher Arar, saying multiple colleagues warned against it because they were convinced they were punishing an innocent man.
The account from former CIA officer John Kiriakou sheds new light on decade-old events that caused a public inquiry in Canada, a $10 million payout from the federal government, and unsuccessful lawsuits in the U.S.
It’s a rare peek into discussions within the U.S. Central Intelligence Agency — whose role in the 2002-03 events has never been publicly examined, having remained off-limits in Canada’s inquiry.
-
A former CIA spy’s eyes widen when he hears that, in Canada, the political opposition doesn’t get to see or scrutinize national-security intelligence files.
“You’re kidding me,” says John Kiriakou, who’s now under house arrest in Virginia after a two-year prison stay for revealing information about his former employer.
-
CIA insiders objected to the arrest, rendition, and torture of Syrian-born Canadian Maher Arar, but high-ranking officials ignored concerns that they were punishing an innocent man, according to former spy and whistleblower John Kiriakou in an interview with the Canadian Press.
-
The United States will never apologize for sending former Ottawa resident Maher Arar off to be tortured in a Syrian prison, nor will the country tell us what led to that awful decision. For all we know, Arar remains on our neighbour’s anti-terror watch list, despite having his name cleared by a public inquiry here and earning a $10 million settlement (and an apology) from the Canadian government for its own shameful role in his extraordinary rendition.
-
CIA whistleblower John Kiriakou has revealed new details about the CIA’s internal debate over the arrest, rendition and torture of Canadian citizen Maher Arar. Kirakou told The Canadian Press news agency numerous colleagues warned against arresting Arar, saying he was innocent. But Kiriakou said an unnamed female officer insisted on pressing ahead, saying Arar had links to al-Qaeda.
-
A former spy has described the debate within the CIA over the arrest, rendition and torture of Maher Arar, saying multiple colleagues warned against it because they were convinced they were punishing an innocent man.
-
-
John Kiriakou has alleged that CIA insiders protested the arrest and torture of Syrian-born Canadian Maher Arar knowing that he was innocent, but a woman in CIA middle-management, whose identity he will not reveal, insisted upon the man’s arrest.
-
-
-
He was jailed for telling journalists a bit too much about his former employer: the CIA. He insists he was punished for blowing the whistle on the use of torture in 2007, not because he tipped off journalists to the identity of a couple of former spy colleagues, which is why he was charged.
“I’m 100 per cent positive,” Kiriakou says in an interview at home, where he’s completing his sentence under house arrest after two years in jail.
He’s adamant that he’s being singled out. Lots of names leak out of the agency without consequences, he says. Also, he accuses the FBI of trying to entrap him several times and failing.
To avoid a return trip to prison, there are limits to what he’ll say in interviews.
He will describe how former CIA colleagues protested the arrest, transfer, and torture in Syria of Canadian Maher Arar — but he absolutely won’t reveal the name of a woman in CIA middle-management who he says insisted on Arar’s arrest.
-
The British government has been accused of stalling over the publication of flight records in and out of the British-owned island of Diego Garcia, amid claims the remote Indian Ocean location was used as part of the CIA’s post 9/11 torture and rendition program.
-
During the election campaign the scene was set to overthrow Rajapaksa by ballot or by force.
-
Retired Gen. Bilgin Balanlı, who was among the 236 suspects acquitted in the “Balyoz” (Sledgehammer) coup-plot case, has said the United States or the Central Intelligence Agency (CIA) could have had a finger in the coup case.
The CIA or the U.S.’ “deep state” could have been involved in the case, recalling the testimony of a suspect, who said in 2010 he and a former deputy had picked up a sack full of documents in 2007 to be used in the Balyoz coup plot case from an American senator and a retired Turkish major in Istanbul and taken it to Ankara, according to Balanlı.
-
As female CIA operatives complain about how women spies are portrayed in Homeland, and Ed Miliband says The Thick Of It was “too close to reality”, we take a look at some of the best-loved TV shows – how good were they at capturing real life?
-
Women in the CIA say that depictions of female agents are not accurate and that some of the portrayals are downright offensive. The women in the CIA sisterhood say that Hollywood shows female agents as seductresses who rely on their good looks and charm. However, many CIA agents say that simply isn’t true and that female CIA agents are far from centerfolds.
The New York Times, at the request of the notoriously tight-lipped CIA organization, spoke with current and former female agents to get a better understanding of exactly what the women agents in the field do. In the movies and on television, female agents are highly sexualized and can be seen sleeping with terrorists, seducing assets, and becoming overly emotional while in the field.
-
-
-
-
An international human rights group has launched a campaign calling on President Barack Obama to ensure that future presidents will not “view torture as a viable policy option.”
Human Rights Watch, an international non-governmental organization that conducts research and advocacy on human rights, has drawn up a petition urging the Obama administration to begin a “full criminal investigation” into torture techniques used by the Central Intelligence Agency (CIA) post 9/11 attacks.
-
President Obama has arrived in Panama to attend the Summit of the Americas along with other leaders from Canada, Central America, South America, the Caribbean — and for the first time, Cuba. On Thursday, Obama announced the State Department has finished its review of whether Cuba should be removed from the list of state sponsors of terrorism. The move would allow the two countries to reopen their embassies and move forward on historic efforts to normalize relations that were announced in December. Meanwhile, the United States faces other tensions at the summit over its recent sanctions against Cuba’s close ally, Venezuela. An executive order signed by President Obama last month used the designation to sanction top Venezuelan officials over alleged human rights abuses and corruption. This week, the United States announced it no longer considers the country a national security threat. Other topics expected to be on the summit’s agenda include trade, security and migration. We speak with two guests: Miguel Tinker Salas, professor of Latin American history at Pomona College and author of the new book, “Venezuela: What Everyone Needs to Know,” and Mark Weisbrot, co-director of the Center for Economic and Policy Research and president of Just Foreign Policy. His article in The Hill is headlined “Obama Could Face Disastrous Summit Due to Venezuela Sanctions.”
-
Caracas has joined Havana in withdrawing its delegation to the Civil Society Forum at the 7th Summit of the Americas this week, after Cuban delegates broke the news that at least 20 counter-revolutionary Cuban “mercenaries” had also been invited to participate in the event.
Among the highly controversial figures set to participate in the forum are the radical anti-Cuban government dissidents, Manuel Cuesta Morúa, Elizardo Sánchez and Rosa María Payá, as well as members of the Cuban exile community. All are known to have financial ties to U.S. funding agencies such as the National Endowment for Democracy (NED) and have a history of trying to subvert the Cuban government. Ex-CIA agent, Félix Rodríguez Mendigutía, better known for his role in the assassination of Argentinian revolutionary, Ernesto “Che” Guevara, is also participating in the summit.
-
According to some reports, Felix Rodriguez has arrived in Panama to attend the OAS forums.
According to Yoanislandia, quoting “friends in solidarity with Cuba,” the man who murdered Ernesto “Che” Guevara, Felix Rodriguez, arrived in Panama on Tuesday to attend the Summit of the Americas forums.
-
Aleida Guevara, daughter of Cuban-Argentinean revolutionary Ernesto Che Guevara, described as shameful the presence in the activities of the Summit of the Americas of Felix Rodriguez Mendigutia, who was directly involved in the assassination of her father, in Bolivia.
“In was a nonsense decision by whoever admitted him, said Guevara and reiterated that the presence of the former CIA agent is shameful. Felix was a CIA instrument and he offered himself in a mean manner to murder him.”
-
Leaders of the United States and Cuba did something Saturday they hadn’t done since the spring of 1959, all the way back to the Eisenhower administration: Meet diplomatically face-to-face.
President Barack Obama and Cuban President Raul Castro — the brother of longtime ruler Fidel Castro — met at the Summit of the Americas in Panama Saturday, and the visit is the talk of the conference.
-
The FBI and CIA’s common misuse of paying informants to entrap others globally into joining plots of terrorism was well documented in researcher-author Trevor Aaronson’s book The Terror Factory: Inside the FBI’s Manufactured War on Terrorism. Between 9/11 and 2011 he confirmed that 508 defendants were recruited by informants paid up to $100,000 in multiple sting operations. In fact, in all but only three high profile cases were the FBI and their informants not involved. Again, this demonstrates that the US government’s calling card around the world reads “Terrorism-R-US,” just another M.O. for squandering hard earned taxpayer dollars to keep its invented “war on terror” very much ongoing and alive forever.
-
Russian authorities have denied entry to prominent businessman Seppo Remes and accused him of espionage, the Finnish investor claims. Remes is a board member in several Russian energy companies.
-
Finnish businessman Seppo Remes, co-owner of a Swedish company which invests in Russian electricity assets, said he had been denied entry into Russia for five years after receiving a warning from the Federal Security Service.
-
Russia’s Federal Security Service has detained an opposition-minded journalist in Crimea, a colleague said, in the latest in a series of Moscow’s investigations against Crimean reporters and writers who have criticized Moscow’s annexation of the peninsula.
-
-
Intellectual Monopolies
-
Copyrights
-
Piracy is a hot topic around the world and in Australia the issue has made mainstream headlines over the past week. After the announcement of a new anti-piracy scheme and the news of copyright trolls coming Down Under this week, VPN usage has surged to unprecedented levels.
Permalink
Send this to a friend
04.11.15
Posted in News Roundup at 5:42 pm by Dr. Roy Schestowitz

Contents
-
Desktop
-
Server
-
Aurora is scheduled to come online in 2018, as an Office of Science budget document that was released earlier this year showed. Theta will arrive in 2016 to support Argonne with the transition from Mira to Aurora. As prime contractor for contract, Intel Federal, a wholly-owned subsidiary of Intel Corp., is responsible for the delivery of the two systems, a position that Intel last held nearly two decades ago with the installment of ASCI Red at the Sandia National Laboratory.
-
Kernel Space
-
Ted published the twenty-two patches earlier this month for implementing encryption support into EXT4, complete with file-name and symlink encryption. The patches were developed by Ted Ts’o and Michael Halcrow.
-
Graphics Stack
-
Intel’s i965 Mesa driver has begun using the NIR intermediate representation by default when dealing with fragment shaders.
-
For those interested in XenGT as Intel’s form of mediated GPU pass-through support on Linux, the newest quarterly update has surfaced.
-
As part of the work towards allowing easy UEFI/BIOS updates from the Linux desktop in a standardized manner, Richard Hughes has been developing the new fwupd component.
Fwupd is a daemon to allow session software to update device firmware on a local machine. Fwupd can be accessed from GNOME Software, via the command-line tool, or by interfacing via D-Bus.
-
Applications
-
-
Kallithea project have just released Kallithea 0.2. Kallithea is a Python-based GPLv3 source code management software for web-based hosting of Mercurial and Git repositories.
-
Instructionals/Technical
-
-
-
Ubuntu 15.04 (Vivid Vervet) will arrive in just a couple of weeks, but if you really want to, you can upgrade your current Ubuntu installation right now. You don’t have to wait until launch day, but there are some small risks.
-
While participating in the Nordic IoT Hackathon 2015 our team Hello North (wrongly tagged as «HackLab team») wanted to explore the potential of running node.js applications running native in Android.
-
Games
-
StarDrive 2 looks awesome, and to a fan of the old Master of Orion games like me it was a must buy. Here are some thoughts on it.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
KDE announced the immediate availability of KDE Frameworks 5.9.0, a collection of over 60 add-on libraries for the Qt 5.x GUI toolkit that can be used by KDE developers to create applications and core components for the famous KDE Plasma 5 desktop environment.
-
-
-
New Releases
-
arpinux, the creator of the HandyLinux operating system informed Softpedia about the immediate availability for download of the HandyLinux 1.9 release, the last version based on the upstream Debian 7 Wheezy distribution, before the switch to Debian 8 Jessie.
-
TheeMahn announced the immediate availability for download of the Ultimate Edition 4.4 Linux operating system based on the Ubuntu 14.10 (Utopic Unicorn) distribution. This version was built on the Server edition of Ultimate Edition.
-
Screenshots
-
PCLinuxOS/Mageia/Mandriva Family
-
A post to the Mageia Linux development mailing-list indicates Mageia 5 may be shaping up nicely. Over on The Document Foundation Blog, Italo Vignoli updates the public on the progress of the the Document Liberation project. Linux Mint Debian Edition 2 was released today in two varieties and Kevin Fenzi tries to clear up Fedora’s Yum/DNF confusion.
-
-
Arch Family
-
The Manjaro developers have finally fixed the embarrassing problem they had with an expired SSL certificate that made accessing their forums and wiki much harder.
-
Red Hat Family
-
Fedora
-
-
Flock is the premier Fedora community conference for North America, Europe, the Middle East, and Africa. Flock will be held August 12-15 in Rochester, New York, USA.
-
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
Canonical has announced that a few vulnerabilities were found in the Linux kernel packages, affecting the OMAP4 kernel of the Ubuntu 12.04 LTS (Precise Pangolin) operating system, and they have been fixed.
-
The newest demo video of the convergence concept shows the Ubuntu Touch browser (Webbrowser App), running on the Ubuntu 15.04 desktop.
-
Flavours and Variants
-
The team is proud to announce the release of LMDE 2 “Betsy” MATE.
-
-
For those not familiar with elementary OS, this is an Ubuntu-based Linux distribution (with Freya being based on Ubuntu 14.04 LTS, supported until April 2019) which ships with its own desktop environment, called Pantheon, and its own custom application for the most part, which look great, integrate very well with the desktop and ship with sane defaults so the user doesn’t have to tweak anything.
-
After approximately two years of continuous work, the team behind the elementary OS Linux distribution announced today, April 11, the immediate availability for download of the final version of their elementary OS 0.3 Freya computer operating system.
-
Version 0.3 of Elementary OS, which is codenamed Freya, is now available after being under development for more than one year.
-
-
Phones
-
Android
-
Steve Jobs, so incensed by how similar the first version of Android was to his precious iPhone, vowed to destroy it completely, famously promising to go “thermonuclear” on the platform.
-
-
The Android 5.0 Lollipop update is now reaching older Samsung Galaxy devices. Sprint is updating its model of the Galaxy Note 3 as well as the Galaxy Note Edge as of Thursday.
-
Just after we saw Apple’s newest iOS update fix a bevy of bugs (and add at least one more), it’s Google’s turn to take some heat for Android. According to posts in Google Product Forums, some Nexus users are seeing their devices lock up, sometimes for no reason at all. This seems to affect both Nexus 7 and Nexus 5 — but not the Nexus 6. There isn’t even one Android update we can point to. All we know is Lollipop might be bricking devices.
-
-
Google’s Nexus Android 5.1 release continues to make progress for select smartphones and tablets. This week, we’ve seen a number of new details emerge for owners of Nexus smartphones and tablets and we want to take a look at what we think you need to know now about Google’s Nexus Android 5.1 update for devices like the Nexus 5, Nexus 7 and more.
-
-
For years, American Joint Terminal Attack Controllers (JTACs) have been forced to call in their Close Air Support (aka airstrike) requests using radios and paper maps, then wait half an hour or more for help to arrive. During that waiting period, the JTAC would also have to carefully coordinate with and monitor the positions of inbound aircrews in order to avoid friendly fire. However, doing so is far easier said than done when you’re in the middle of a firefight. But thanks to a new ruggedized Android tablet from DARPA, our frontline soldiers can call in the air cavalry in less time than it takes to order a pizza. Not have a pizza delivered, order one.
-
While Apple wins in Hardware in the United States, Android wins in software. So says the most recent report on smart device usage in the United States. This week comScore has released their report mobile device usage in the month of February 2015 for the USA. This study showed the three month average starting in December of 2014, ending in February of 2015, and studied smartphone subscribers ages 13 and older. As you can probably guess already, Apple and their 2nd-place opponent Samsung are still neck-and-neck here in 2015 for hardware market share.
-
Instead of making flagship Android Wear devices of its own to take on Apple’s three distinct Watch models, Google is apparently working on a sneakier way to fight the iOS wearables. Just as rumored in the past, the company is apparently adapting its Android Wear platform to work with iPhone in the future.
-
Over the weekend, OnePlus released their custom Android skin, also known as OxygenOS, to the OnePlus One as an “update” just a week after it was originally supposed to debut. I’m putting “update” in quotes there because well, it’s not really an update. This is a custom ROM that requires a full factory reset and a custom recovery in order to get onto your phone. This isn’t delivered over-the-air (OTA) – instead it requires you to be familiar with adb commands, fastboot, unlocking a bootloader, and more. It’s a load of fun!
-
-
-
-
Can you think of anything worse than bricking your phone when flashing a new ROM? Well, how about your Android device turning into a fancy paperweight when the official OTA update is installing? That’s right, a good bunch of Nexus 7 owners, both 2012 and 2013, are reporting that Android 5.0+ Lollipop is bricking their tablets.
-
This year is seriously cruising by. Can you believe we’re already in the second quarter? The good news is that summer is just around the corner and, of course, it also means we’re back with our quarterly list of the very best Android smartphones you can buy.
Samsung and HTC have new flagship smartphones out. You can already order the One M9 directly from HTC and it’s hitting U.S. carriers soon. Meanwhile, the Galaxy S6 and Galaxy S6 Edge hit store shelves today.
-
For those searching for a low-cost system/motherboard for experimenting with Coreboot, there’s another new AMD motherboard that now works with Coreboot’s upstream Git code. The board costs only about $30 USD and works with all modern AMD AM1 processors.
-
The newest additions to Coreboot are the Veyron_Mighty and Veyron_Jerry. The Veyron series has been part of the Chromium OS repository since last year. These codenames are for devices powered by a Rockchip ARM SoC.
-
The definition of open source can get complicated (especially when you start talking about licensing). Essentially open source software makes the source code freely available for use and/or modification, free of charge.
This could give the impression that open source is for hobbyists and amateurs, but you will probably recognize the names of some major open source users: The Emmys, The Grammy Foundation, NBC, CBS and Sony, all use Metal Toad Media to develop their websites with open source tools.
-
With the rise of mass surveillance efforts being carried out by intelligence agencies, researchers and industry professionals are currently working together to look for solutions that will enable them to protect sensitive information from being breached.
-
Web Browsers
-
Mozilla
-
On March 31, Mozilla released the latest version of Firefox, 37.0 — but the foundation has already issued a significant patch for that update, after discovering a critical security bug that broke HTTPS encryption in a way that was invisible to the end user. Ironically, one of the original points of the Firefox 37 update was to add security through the use of a feature known as opportunistic encryption.
-
Oracle/Java/LibreOffice
-
The Document Liberation is a project of The Document Foundation, announced in early April 2014 to host the different libraries handling proprietary and legacy document formats within LibreOffice. The idea was to provide a single repository for other software projects willing to deploy the same libraries, in order to simplify the integration. The project is led by Fridrich Strba and David Tardon, two long time LibreOffice contributors.
-
The Document Liberation Project was officially announced at LGM in Leipzig on April 2 2014, a year ago. We (the founding members) gave a talk about the project later on the same day.
-
Openness/Sharing
-
With a cordial evening handshake, President Barack Obama and Cuban President Raul Castro moved Friday toward a groundbreaking meeting on the sidelines of the Summit of the Americas in what would be a remarkable display of reconciliation between two nations.
The powerful symbolism of a substantial exchange Saturday between the leaders with the leadership of the Western Hemisphere gathered around them could signal progress. Both sides are still working through nettlesome issues that would lead to the opening of embassies in Washington and Havana, the first stage in a new diplomatic relationship.
-
A new daycare for adults in Brooklyn, N.Y. is just the latest symbol of the infantilism of American grown-ups.
-
Science
-
One day last August, in the early hours of the morning, a 6.0-magnitude earthquake rocked Napa Valley, waking people all around California’s famed wine region. Many were wearing fitness trackers. Once the quake was over, tracker company Jawbone gathered the data in a public graphic, using it to detail the differences in disturbance for lifeloggers in Berkeley, Oakland and San Jose.
-
Security
-
-
But deterrence is useless if you can’t figure out who attacked you. Malware isn’t like an ICBM that leaves a clear trail going from point-A to point-B. Thanks to Ed Snowden it’s public knowledge Five-Eyes Intelligence agencies have invested heavily in developing anonymity technology and conducting deception operations that aim to conceal the origins of their clandestine attacks. It would be naïve to believe that other countries aren’t doing the same.
-
Defence/Police/Secrecy/Aggression
-
U.S. imperialism is being challenged by regional organizations like CELAC, according to Bolivia’s president.
-
“Harmed” how? By offering a movie no one on campus was obligated to watch? It wasn’t a mandatory event and those offended by the movie had several options available, most of which didn’t involve ensuring no one on campus could see the movie.
In what would appear to be a dig at the “victims” infantilization-by-proxy of the entire student body, but is more likely due to a limited selection of last-minute offerings (guaranteed not to result in a swift petitioning), the CCI decided to screen “Paddington Bear” instead. For a student body composed of 18-23 year olds.
-
A group of anti-drone US military veterans want to put an end to American’s campaign of drone strikes in foreign countries, and they’re now taking the fight to prime time by directly calling on Air Force pilots to stop the destruction through a series of graphic television spots.
-
Anti-drone groups are airing cable television commercials near Beale Air Force Base, California, urging remotely piloted aircraft pilots to refuse to carry out missions.
“The reason that we felt we had to start running these ads is the president and the Congress have been irresponsible and – we believe – operating illegally and immorally to let these drone attacks continue,” said Nick Mottern, of the group KnowDrones, the lead group behind the effort. “We felt that we had to speak directly to the people who were being ordered to do the killing because, at this point, it seems they’re the only ones who can put a stop to this.”
-
The goal of the campaign is to appeal to those who receive orders to kill. Those people should listen to the call of their conscience before they launch another drone, campaign organizers believe.
-
If a human soldier commits a war crime, he has to face the consequences (at least in theory). The same goes for human operators of drones (again, in theory). But if a fully autonomous war machine with no human operator goes rogue and kills a whole bunch of innocent people, who would be responsible? Its programmers? The manufacturers? Finding someone to blame would be hard enough, and proving it in a court of law would be nearly impossible.
-
You can’t bomb a country into existence, however much America seems determined to try.
In the last week, 164 Yemeni civilians have lost their lives in the Saudi bombardment of my country. In media reports – full of geopolitical talk of “proxy wars” and “regional interests” – the names of the dead are absent. As always, it is ordinary Yemeni families who are left grieving, and forgotten.
-
The Middle East imbroglio demonstrates the complexity of the post-9/11 world in which Obama’s foreign policy has managed to upset America’s traditional Arab allies while strengthening the position of its adversary, Iran.
President Obama’s preferred approach to US foreign policy largely flows from the strategies of retrenchment, ie reducing but not completely avoiding American military and financial commitments abroad, and offshore balancing, that is: using regional allies to check the rise of potential hostile powers.
Retrenchment has so far backfired in Iraq and a positive outcome in Afghanistan is yet to emerge. Offshore balancing is useful in regions where great powers have minimal engagements. In places like the Middle East the strategy is bound to spawn contradictions and Obama’s foreign policy therefore rests on inherent– and deliberate– ambiguity.
-
-
Drones seemed to come out of nowhere, sexy as the latest iPhones and armed to kill. They were all-seeing eyes in the sky (“a constant stare,” as drone promoters liked to say) and surgically precise in their ability to deliver death to evildoers. Above all, without pilots in their cockpits, they were, in terms of the human price of war (at least when it came to the lives that mattered to us), cost free. They transformed battle into a video-game experience, leaving the “warriors” – from pilots to generals – staring at screens. What could possibly go wrong?
-
In the immediate aftermath of September 11th, George W. Bush had predicted that the United States would embark upon a new kind of warfare, “a war that requires us to be on an international manhunt.” Something that initially sounded like nothing more than a catchy Texas cowboy slogan has since been converted into state doctrine, complete with experts, plans, and weapons. A single decade has seen the establishment of an unconventional form of state violence that combines the disparate characteristics of warfare and policing without really corresponding to either, finding conceptual and practical unity in the notion of a militarized manhunt.
-
The US has unleashed a great deal of blood upon the world, with its willingness to use “bombs” as our first reaction to any situation. We killed over one million in Iraq, and we have lost the ability to solve problems diplomatically; rather, we resort to the only tool in our tool bag, bombs. Such a policy has caused incredible death and destruction in Iraq, but also in Libya, Syria, and now Yemen, and much of current Yemeni blood is on our hands.
-
Somalia’s government has issued bounties for 11 top leaders of the Al-Qaeda-linked Shebab militants, with $250,000 offered for the extremist’s chief, Ahmad Umar.
-
President Obama and White House officials are defending the United States’ “low-investment, light-footprint approach to counterterrorism.” As war and death plague places like Somalia and Yemen every day, President Obama continues to issue airstrikes with drones.
-
The whole world knows of the horrors inflicted on Kenyan civilians by Somalia’s Al-Shabaab. But, the “corporate media tells Americans little if anything about Somalia’s road to ruin,” paved by the United States and its Ethiopian and Kenyan allies. “If there were true justice in this world the United States and its puppets would not only have to leave that country but make restitution as well.”
-
Harold Koh, the former legal adviser to the U.S. Department of State, is getting a chilly reception from some law students and alumni of New York University Law School, where he is currently a visiting scholar.
-
”We’ve never asked a soldier to go and fight the Taliban for 12 hours and then go and pick up the kids from school,” he says.
-
-
-
-
A court in Pakistan has ordered police to investigate two former CIA officials over the deaths of two people in a drone strike.
-
A high court in Pakistan has ordered criminal charges against two CIA officials for a deadly drone strike in 2009. John Rizzo, the CIA’s former acting counsel, and Jonathan Bank, the agency’s ex-station chief, would face charges including murder, terrorism and conspiracy.
-
-
-
Would a Muslim receive tougher terrorism sentencing than anybody else?
The question might seem outlandish but the differing court verdicts of terrorism cases, between a Muslim and those of other beliefs, emphasize the inconsistencies in legal judgements.
This kind of double standard has angered the British Muslim community. It’s now holding credible weight. The Lufthansa’s Germanwings airliner tragedy being a case in point. The investigation’s prosecutor, Brice Robin, dismissed the notion of terrorism, quoting: ‘There is no indication of any kind of terrorist background’. In other words, when a person’s background ticks all the boxes is it terrorism.
This logic is deeply flawed. The co-pilot Andreas Lubitz’s suicide mission that killed him and the rest of the 150 passengers shared the same intent as the 9/11 killings, yet the media stopped short of reporting terrorism. No doubt, a Muslim name would have swung it.
-
The NY Times on Monday ran a lengthy piece (“One Woman’s Mission to Free Laos from Millions of Unexploded Bombs”) on Channapha Khamvongas, a 42-year-old Laotian-American woman on a mission to get the US to help Laos clean up the countless unexploded anti-personnel “bombis” that it dropped, which are still killing peasants — especially children — half a century after the so-called “Secret War” by the US against Laos ended.
The article explained that Khamvongas, as a young adult in Virginia, had read a book by anti-war activist Fred Branfman, Voices from the Plain of Jars: Life Under an Air War (originally published in 1972 and reissued in 2013), which featured accounts and hand drawings by refugees from that war of the deadly US aerial attacks and bombings of their farms and villages. It was a book that sparked revulsion in the US over the saturation bombing of Southeast Asia’s smallest and least developed country — a nation of under six million people.
-
It is very bewildering, albeit horrifyingly fascinating, to watch American politicians jockey and posture for war with Iran. With the announcement last week that years of negotiations have yielded a framework agreement that will arrest any Iranian nuclear weapons program, not that one actually exists, while starting the much needed process of bringing Iran back into the world community, many members of Congress seem not just reluctant, but hostile, to the prospects of averting a war with Iran.
-
Yemen is one of many examples of what happens following lawless US intervention.
-
-
To suggest that the US policies in Yemen were a “failure” is an understatement. It implies that the US had at least attempted to succeed. But “succeed” at what? The US drone war had no other objective aside from celebration the elimination of whomever the US hit list designates as terrorist.
-
As an Army officer, Jack wrote the US Department of Defense manual urging abstinence toward all use of chemical and biological warfare banned under the 1925 post-World War I Geneva Protocol and again reinforced in 1972 and 1993. Yet that’s rarely stopped hypocritical rogue states in their arrogance of exceptionalism like the US and Israel as the world’s most notorious violators from breaking international law at will, most recently using flesh burning white phosphorus in Fallujah, Iraq and tear gas on our own citizens exercising their First Amendment rights to peaceful assembly and free speech during the Occupy Wall Street movement and frequent public demonstrations right up to the present. Of course Israel has used poison nerve gas on Palestinians on numerous occasions with impunity. Recall that it was during the 1980’s Reagan administration that sent US made chemical weapons to then ally Saddam Hussein while he waged war against neighboring Iran, knowing Hussein would use it on his own people the Kurds as well as on Iran’s military that US intelligence provided Hussein with enemy troop movement.
-
But the drone strikes have also killed many Yemeni civilians and they have been hugely resented by local tribes.
-
Saudi Arabia bears the greatest responsibility for the triumphant advance of the Houthi militia in Yemen, says Birgit Svensson: the leading Sunni power in the Gulf simply stood by while a Shia counterbalance emerged virtually on its doorstep, thereby creating an opportunity for Tehran
-
War is ravaging Yemen and civilians, including infants, are getting killed. The situation is catastrophic.
As we have seen before with the US-led invasion of Iraq, no matter how much the missile-shooter, bomb-droppers and drone-attackers would have you believe about perfection of their war machines, gadgets and equipment, they simply have not perfected their deadly science. They are never precise, which leads to unintended consequences, what are conveniently dumped as the ‘collateral damages’. Thus, we witnessed the cold-blooded murder of nearly a million Iraqis, old and young, and another quarter million or so in Afghanistan who had nothing to do with the WMD and 9/11.
-
Capital of Uttar Pradesh and India’s 8th most populous city: Lucknow has become the first city in India to use to drones for crowd control. Police chief of Lucknow, Yashasvi Yadav has announced that they have purchased 5 high powered drones, costing Rs 6,00,000 each, which will be used for monitoring and controlling unruly mob.
-
Innovation, Edmund Burke reminds us in “A Letter to a Noble Lord,” does not necessarily imply reform. While the peaceful uses of drones are often treated as the benign effects of the security industrial complex, the spill over into more violent deployments has proven unavoidable. What is done in Waziristan against Taliban militants will eventually be done to US citizens on a smaller yet significant scale – the civilian cloaking there becomes as irrelevant in tribal foothills as it does on the streets of Chicago.
The drone monitors have gotten excited by an announcement that Indian police forces will be making use of drones to deploy pepper spray against protesters. Trials were conducted on Tuesday in Lucknow, with the city’s police force anticipating using five such vehicles later this month. “The results,” claimed the jubilant police chief Yashasvi Yadav, “were brilliant. We have managed to work out how to use it to precisely target the mob in winds and congested areas.”[1]
The language used by Yadav serves an important purpose. Drones are weapons of use against that dark, primordial “mob,” difficult to control, unruly of purpose. From the perspective of many state authorities, any protesting group constitutes an unruly “mob”. The idea of a peaceful protest is nowhere to be seen, the greatest of unnatural phenomena. But Yadav insists that, “Pepper is non-lethal but very effective in mob control. We can spray from different heights to have maximum results.”
-
Many Americans are unaware that President Obama is:
— Making war in eight countries around the world — Afghanistan, Iraq, Libya, Pakistan, Somalia, Syria, Yemen and the Philippines — in violation of the U.N. Charter, which forbids “the threat or use of force against the territorial integrity or political independence of any state” without the authorization of the U.N. Security Council.
-
A single bench comprising Justice Shaukat Aziz Siddiqui will hear the case. The IHC had ordered for the registration of murder case in respect of two persons killed in drone attack at South Waziristan in 2010.
The petitioner sought contempt of court proceedings against the SHO Secretariat police for not registering a murder case of two persons killed in drone attack.
-
There was nothing illegal about the participation of the US in Operation Plan Exodus in Mamasapano last Jan. 25 that resulted in the killing of international wanted terrorist Zulkifli bin Hir, alias Marwan, as well as the death of 44 police commandos, at least 17 Moro fighters and five civilians, Justice Secretary Leila de Lima said yesterday.
De Lima said the involvement of US forces in the planning and execution of the operation did not violate the Constitution or any law.
-
The report estimates that at least 1.3 million people have been killed in Iraq, Afghanistan and Pakistan from direct and indirect consequences of the U.S. “war on terrorism.” One million people perished in Iraq alone, a shocking 5 percent of the country’s population. The staggering civilian toll and the hostility it has engendered erodes the myth that the sprawling “war on terrorism” made the U.S. safer and upheld human rights, all at an acceptable cost.
-
Diplomacy is barely keeping the lid on a conventional war in Ukraine; from Nigeria to the Fertile Crescent war is about as common as peace.
-
-
The author highlights that the Azerbaijani side has significantly increased its military spending over the recent years, and this trend has not abated, despite the global decline of oil prices. Israel has been one of Azerbaijan’s strongest defense partners for several years now, and as a result of this relationship, the Armed Forces of Azerbaijan have acquired Israeli drones.
-
Iran has accused Israel and its allies in the West of assassinating its nuclear scientists and attacking its nuclear sites with computer viruses.
Israel has always declined comment on such accusations, saying that it does not comment on foreign reports.
-
The U.S. Army may investigate accusations of sexual assault against its soldiers and contractors in Colombia, a spokesman said Friday, the military’s first response to claims published by a joint project of Colombia’s government and the guerrillas of the FARC.
Army investigators are working with Colombia’s government to decide whether to launch a formal investigation into any of the claims that at least 54 Colombian girls and women were assaulted by U.S. troops and contractors between 2004 and 2007. A probe into a previous assault claim was inconclusive, although the alleged victim declined to cooperate with investigators, the spokesman told USA Today.
The claims originated from a joint project of the ongoing peace talks between Colombia’s government and the leftist guerrillas of the Revolutionary Armed Forces of Colombia. Historical researchers said in a report that they found evidence that 53 girls were raped by U.S. contractors operating out of Colombia’s Tolemaida military base near the village of Melgar in the central state of Tolima. Their independent report was aimed at addressing the rights of more than 7 million victims of Colombia’s 50-year internal conflict.
-
I should however like to see clarification from the SNP. Labour and Tory can of course combine to vote Trident replacement through. If that happens with Labour in office, the SNP should make plain that would mean the withdrawal of support for that government. For the SNP to allow Labour to push Trident through with Tory support, and then the SNP revert to supporting the Labour government in office, would be a betrayal of the Scottish people. To me, there has not been absolute clarity in our response on this issue. It must be given.
-
Transparency Reporting
-
Bloomberg’s Anthony Capaccio reported: “Historians say the redacted segment probably refers to a threat by former President Lyndon Johnson to expose an illegal attempt by Nixon’s presidential campaign to derail the 1968 Paris peace talks on ending the Vietnam War.”
-
Environment/Energy/Wildlife
-
Almost half of Spain’s electricity in March was generated by renewable sources — mostly wind and hydroelectric. About 22.5% was from wind and 17.5% from hydro, with the rest produced by solar PV, solar thermal, and thermal renewables.
-
Finance
-
The irony of history: Albeit the U.S. has lost the ability to steer the oil price – one of its central political leverages –, it has in another way been able to drastically strengthen its hegemony via the new prices set by the global market. For the high oil prices have multiplied the percentage share of oil trade within global trade, which caused massively higher demand for dollars and U.S. government bonds. As a result, for the foreseeable future the U.S. dollar will thereby remain the indisputable reserve currency.
It is precisely here that we can identify the actual basis for U.S. dominance: By way of an unlimited creation of the dollar as the globe’s reserve currency, the U.S. constitutes the only economy in the world that can finance several mega-projects at once – such as the bailing-out of banks and gigantic defense spending – through public debt and the issuing of government bonds.
-
Intense lobbying of regulators, many of them veterans of the industry themselves, helped ensure that practices the Dodd-Frank law was meant to stop would remain in place.
-
Britain, France, Germany and Italy recently announced that they would be joining the new Asian Infrastructure Investment Bank (AIIB), just as the BRICS nations are shifting away from US dollar world reserve hegemony. This is another blow to the US led financial order, deepening a loss of confidence in its leadership among its European allies. In a recent interview on the Keiser report, former Goldman Sachs director and author of All the President’s Bankers, Nomi Prins pointed out how the recent US conflict with Russia is a manufactured aggression all about trying to maintain its financial supremacy in the face of inevitable decline. Prins described this as a crisis of the world order established after World War II and pointed to how a new cold war is brewing.
-
With corporate tax minimisation in the news, the Government is considering ways to claw back at least some money from easy targets. And it is taking us for fools in the process.
The Government is considering a range of measures in next month’s budget which it says will restore integrity to the tax system and ensure billions of dollars in extra revenue. A key measure will be to ensure that the 10% GST is charged on video downloads and streaming – a so-called ‘Netflix tax’.
Treasurer Joe Hockey has been meeting with state treasurers in Canberra in an unsuccessful attempt to come to new arrangements on how the GST – which goes to the states – should be shared. Everyone, unsurprisingly, wants a bigger share of the pie, so it seems like the only answer is to increase the size of that pie.
[...]
Don’t hold your breath on that one. It’s all bullshit. Google and Apple and Microsoft – and local companies like News Limited and BHP – have been ripping us all off for years with clever international tax minimisation schemes that take advantage of different taxation rates in different companies.
-
Censorship
-
A Ukrainian-born pianist who has been barred from performing with the Toronto Symphony Orchestra says she’ll be giving a free concert in Toronto Friday night – but now that show appears to be in doubt.
-
MOSCOW — For three straight days last weekend, the employees of the Novaya Buryatia newspaper in southern Siberia used scissors to remove an article from 50,000 copies of the weekly before it could be distributed.
-
If you believe certain kinds of expression must be regulated or prohibited, you don’t support free speech.
Unfortunately, we live in an era of hypersensitivity, where intolerance reigns under the guise of tolerance, and where the exercise of truly free speech has become an increasingly risky proposition. And you’d be hard pressed to find worse free-speech hypocrisy than what passes for discourse on college campuses.
-
The hashtags were used to share images of students holding up placards and posters, protesting the state’s decision to have the “Unsilencing Balochistan” session cancelled. The posters were emblazoned with slogans such as “talking about a province is not anti-state” and “you don’t believe in freedom of speech if you don’t believe in it for those who disagree with you.”
-
-
The Charlie Hebdo killings have prompted a clampdown. But history teaches that openness and debate are the most effective weapons in the battle of ideas
-
Ronnie Screwvala, former filmmaker and the founder of UTV group, believes an interactive dialogue between the industry and the censor board can solve a lot of problems.
-
Twitter and YouTube were blocked in Turkey once again April 6, sparking plenty of fanfare across social networks.
This time around, the block was imposed after the mass circulation of photos from a hostage crisis that ended with the death of government prosecutor Mehmet Selim Kiraz and two leftist militants on March 31.
-
The Turkish government’s unrelenting crackdown on free speech continues unabated. On Tuesday, Google narrowly avoided being banned in the country after it complied with a court order to remove links to a photograph showing militants holding a gun to the head of a prosecutor.
-
With the closure of the office came the end of censorship in Poland. Up until then, all forms of public communication were controlled, including press announcements such as obituaries, as well as posters.
-
China’s top Internet regulator threatened to shut down the news services of one of China’s most popular social media and online news companies if it doesn’t fix problems with inadequate censorship and the spreading of false information.
-
Chinese web giant Sina will face suspension of its Internet news services if it fails to improve censorship of illegal content, authorities have warned.
The Cyberspace Administration of China (CAC) summoned Sina leaders to a meeting late on Friday over “massive numbers of public complaints about its law violations”.
-
Twitter has complied with Turkey’s request to remove photographs of an Istanbul prosecutor held at gunpoint by far-left militants and a ban on the micro-blogging site will be lifted very shortly, a senior Turkish official has said.
“Twitter has agreed to shut down accounts and remove images relating to last week’s hostage-taking. The web site will reopen to access very shortly,” the official told Reuters.
-
That’s according to a report from Citizen Lab — an ICT, security and human rights lab based within the Munk School of Global Affairs at the University of Toronto. Citizen Lab looked into these recent attacks and identified ‘Great Cannon’, a tool built to intercept data and redirect it to specific sites, as the attack system responsible for them.
-
The Chinese government’s massive attack on GitHub at the end of March, which directed massive amounts of traffic at its servers in an attempt to overwhelm them, was thought to have been accomplished by simply diverting traffic from what is known as China’s Great Firewall. Now researchers from the academic think tank Citizen Lab have found that China actually intercepted foreign traffic flowing into Chinese tech titan Baidu to attack targeted sites—a weaponized process that the researchers have dramatically termed “the Great Cannon.” And it turns out the tech used in this interception technique is startlingly similar to tech already developed by the NSA and its British equivalent, GCHQ.
-
China has upgraded the website-blocking systems on its borders, dubbed The Great Firewall, so it can blast foreign businesses and orgs off the internet.
Researchers hailing from the University of Toronto, the International Computer Science Institute, the University of California Berkeley, and Princeton University, have confirmed what we’ve all suspected: China is hijacking web traffic entering the Middle Kingdom to overpower sites critical of the authoritarian state.
-
The Finnish parliament has cancelled a discussion event where the Swedish artist Lars Vilks, known for his depictions of the prophet Mohammed. The Secretary General of the Finnish parliament said that the cancellation was made on Security Intelligence Police advice.
-
Privacy
-
In less than 60 days, Congress – whether they like it or not – will be forced to decide if the NSA’s most notorious mass surveillance program lives or dies. And today, over 30 civil liberties organizations launched a nationwide call-in campaign urging them to kill it.
-
A campaign has been set up by more than 30 civil liberties organisations in an attempt to bring an end to a controversial section of the Patriot Act that allows the NSA and FBI to conduct suspicionless mass surveillance.
Section 215 of the Patriot Act, which was first passed through Congress following the 9/11 terrorist attacks in 2001, is set to expire on 1 June unless the US Congress votes for it to be reauthorised.
-
A coalition of 34 organizations from across the political spectrum is launching Fight215.org today to help concerned individuals contact lawmakers and demand an end to NSA’s unconstitutional mass surveillance under the Patriot Act.
-
Edward Snowden avoided saying whether he had read every NSA document he handed over to journalists in an interview with comedian John Oliver on Sunday, as the HBO host posed uncomfortable questions to the NSA whistleblower in Moscow.
-
The National Security Agency has a gun aimed at the head of each and every American, Edward Snowden says in a new interview, and they’re being asked to accept the NSA’s vast surveillance operations in the name of counterterrorism.
-
Does evidence of a decades-old surveillance program throw out the case many public officials have made for the modern surveillance state?
Since Edward Snowden first leaked documents about secret National Security Agency (NSA) programs, government officials have defended them in the name of September 11 and national security. Again and again, we heard that these programs were built in the wake of that tragic day to “connect the dots” so no event like that would ever occur again. They addressed issues of national security, not day-to-day policing.
-
Apparently, the NSA’s massive surveillance program wasn’t a first: it was modeled after a precursor that ran from 1992 until 2013. According to USA Today, that program was called USTO, because it monitored almost every American’s calls from the US to other countries. It was a joint initiative by the Justice Department and the Drug Enforcement Administration, which began as a way to keep tabs on Colombian drug cartels and their supply routes. Since then, it grew in scope (thanks in part to a powerful computer provided by the Pentagon) to cover all international calls made to around 116 countries worldwide, including Canada, Mexico, parts of Asia and Europe, and most of Central and Southern America. The group was only dissolved after Edward Snowden went public with the NSA’s secrets in 2013.
-
-
-
Most laptops today have a built-in camera above the display. And most of those have a small light next to them that is supposed to turn on to alert the user when the camera is active. But a couple of years ago, researchers discovered that this doesn’t always work; hackers can activate the camera on certain MacBook models (and probably some other laptops) without enabling the light and tipping off the user.
-
Bid announcement video taken off YouTube due to copyright claim over a song.
-
-
Turns out, many Americans don’t really know who former NSA contractor Edward Snowden is, and they seem to know even less about the shadowy government surveillance programs he went to lengths to reveal.
-
CanTheySeeMyDick.com uses Oliver’s interview and revelation that private photos of American genitalia are now available to the government as the nexus around which to inform people about the varying laws, practices, and extralegal maneuvers that would grant access to citizens’ information. It’s a great tongue-in-cheek approach that runs with Oliver’s elaborate dick joke and makes it much easier to understand the prevalence and reach that has been afforded to the intelligence community and its surveillance capabilities.
-
Even though the National Security Agency has taken a lot of flak for its electronic spying programs the agency does play a vital role in the maintenance of national security. It sifts through vast swathes of data of all kinds to find clues about potential terrorist plots. Sometimes those plots could be hidden inside porn and that’s why the National Security Agency has set aside a whole room just for watching porn.
-
There’s been a lot of concern about how intelligence agencies around the world have been covertly snooping on private emails, instant message communications and phone calls, but here’s something you may not have realised.
-
But she has also said she would support reforms to ensure that surveillance doesn’t go too far and that the National Security Agency should be “more transparent” about its practices. She has also called for a “full, comprehensive discussion” about the NSA’s spying program. “That’s the discussion that has to happen in a calm atmosphere without people defending everything we’ve done and people absolutely opposing everything we’ve done,” she said in a 2013 appearance. “And we’re not having that conversation yet.”
-
1. Keith, why is the NSA collecting our dick pics? Are you collecting our tit pics too?
2. I would like to collect it all, Keith: all of your personal and family photos! Okay, Keith?
3. Cool if the government listens in next time you call your wife, Keith?
4. Still convinced Snowden is a secret Russian spy, not a whistleblower, Keith?
5. Why should we trust you, Keith, or your successor?
6. Who was the person, Keith, who you called the most times last year? Who did you call on your birthday, Keith, and at what time of day? How long did each of you speak, Keith? In fact, would you mind sharing with me, Keith, your personal cell phone number, all the numbers you dialed, and the duration of all incoming and outgoing calls?*
-
New research suggests nearly three quarters of British adults are worried about the distribution of their personal information online, with concerns including hackers and unauthorized access to data.
The figures, compiled by pollster YouGov, found that 32 percent of respondents would be happy to pay for extra online security to ensure their date was protected. A further 29 percent felt it came down to the individual to take responsibility for protecting their data.
There has been a huge rise in the level of consumer mistrust in tech firms since NSA whistleblower Edward Snowden revealed in 2013 the UK and US governments were accessing consumer data without permission.
-
It could have been worse. Authorities believe the two people who were shot by NSA police last week outside the agency’s headquarters on Fort Meade got there by mistake.
The driver, identified by the FBI as 27-year-old Ricky Shawatza Hall of Baltimore, was pronounced dead at the scene. A passenger was shot in the chest and taken to the Maryland Shock Trauma Center; the passenger’s identity and condition have not been available.
Authorities have released few details of the incident, but the FBI was quick to rule out terrorism. Police say Hall and the passenger were traveling in an SUV that was reported stolen from a man at a motel in nearby Elkridge shortly before they arrived at the NSA gate off the Baltimore-Washington Parkway Monday morning.
-
A major piece of business that Congress failed to complete last year was to strengthen the privacy rights of Americans by curtailing government spying on them. It should be at the top of the agenda this year.
A key argument for the wide latitude allowed the government under current law to seize private records without a court order is that such power is necessary to protect against terrorist activities.
-
Why else would someone lock the bedroom or bathroom door? Use passwords to protect their social media accounts? Or why would they tell their spouses or psychiatrists things they wouldn’t tell others?
-
-
-
When the topic of the disclosures of programs of mass surveillance comes up in conversation, people often proclaim since they are doing nothing wrong, they have nothing to hide. Glenn Greenwald, the journalist who broke the NSA document leak story involving Edward Snowden, declares that people who take this position are “Engaged in an act of self-depreciation.” He notes that what they are effectively saying is, “I have agreed to make myself such a harmless, unthreatening and uninteresting person, that I don’t fear to have the government know what I’m doing.”
[...]
Michel Foucault, a 20th Century French philosopher, realized that the Panopticon could be used in any institution as a means of control: schools, hospitals, factories, work places, etc. Foucault posited that the means of control previously used by societies — punishment, imprisonment, killing dissidents, forced obedience to a particular party — were no longer needed, that mass-surveillance is a much more subtle and effective means of control than brute force. Eventually, Foucault surmised that surveillance is longer even needed, because people begin to police their own behavior.
-
The university invited the lawyer-turned-journalist, known for his work on an award-winning series in British newspaper The Guardian that detailed global surveillance programs, to speak during a week devoted to exploring surveillance by the U.S. government.
-
The journalist and ex-lawyer who came to prominence by helping Edward Snowden to disclose the secrets of the National Security Agency has spoken of ‘government inside the government’ and the critical role of the NSA’s ‘Intelligence Community Comprehensive National Cybersecurity Initiative Data Center’ at a gathering in Utah, describing the plant as having an “ominous role in the surveillance state”.
-
-
-
In a brisk 30-minute meeting on Wednesday in Washington, members of the Privacy and Civil Liberties Oversight Board read prepared statements about a “work plan” to perform two “deep dives” on agency practices that lean on the order.
-
-
The Privacy and Civil Liberties Oversight Board (PCLOB) voted 4–1 yesterday to conduct reviews of how Executive Order 12333 is used in counterterrorism investigations by the CIA and NSA. The PCLOB’s plan to investigate two surveillance programs conducted under the wide-ranging executive order will result in three reports — two classified, one public — that it hopes to complete by the end of this year.
-
The usual suspects came out in opposition of a Maine bill that would turn off support and resources to the NSA in the Pine Tree State during a committee hearing last week.
Maine Attorney General Janet Mills and law enforcement lobbyists expressed reservations about LD531 during a Senate Committee on Judiciary hearing, saying it could hinder police from catching child pornographers and other dangerous criminals. Their arguments echoed those of law enforcement interests in Montana and Alaska.
-
At the time, President Obama resisted calls to investigate lawless intelligence practices, insisting that “we need to look forward as opposed to looking backwards.” Unfortunately, we know where the road forward led. The NSA spied on citizens. The CIA spied on Congress. And the American people, as Hayes warned, became further desensitized to the idea of an intelligence apparatus that operates in secret and plays by its own set of rules — or perhaps none at all.
-
Paul said eliminating the mass collection of data on American citizens doesn’t mean putting an end to our intelligence agencies.
-
From March to September 2014, the U.S. submarine’s 152-man crew cruised the deeps of the Mediterranean, Red Sea and Arabian Gulf, earning a earning a coveted Battle “E” for their efficiency in doing all the fleet had asked of them. Which involved … what, exactly? They covered 34,000 nautical miles, participated in one multinational exercise, and made port calls in Portugal, Spain, Bahrain, and Gibraltar, according to official Navy reports.
-
Glenn Greenwald, the lawyer and journalist who became a left-wing celebrity for his articles helping whistle-blower Edward Snowden expose the NSA’s mass-surveillance program, admits enjoying the reaction when critics discovered he would be in North Texas to appear on Glenn Beck’s right-wing radio show—and then to address the conservative National Center for Policy Analysis.
Talking Friday to about 250 people at a luncheon meeting of the NCPA, a Dallas think tank that’s headed now by tea party hero Allen West, Greenwald said of the kerfuffle that was particularly created by his Beck appearance: “I love it.” He recalled trading barbs with “people on Twitter who thought it was a terrible thing to do.” But, he added, “I’ve made it a point to find common ground. I find that’s a healthy thing to do.”
-
Media coverage of John Oliver’s critique about the lack of discussion surrounding government surveillance programs seems to prove his point. Much, if not most, of the attention given to Sunday night’s episode of Last Week Tonight has focused on Oliver’s interview with Edward Snowden instead of focusing on the fact that the law governing one of the most heavily-criticized surveillance programs is up for potential reauthorization in less than two months. We’re talking about Section 215 of the Patriot Act, the provision allowing the NSA to collect vast quantities of Americans’ phone records.
-
The report covers requests from Nov. 1, 2014 to Feb. 28, 2015. Over that time, it is said authorities asked for information on Snapchat users 403 times. Of that total, 375 requests were from the U.S. government and 28 were from foreign governments. The United Kingdom requested data the second most.
-
Never a people to let Americans one-up them on anything, French lawmakers are considering a Patriot Act-ish bill that one civil liberties group describes as “a naked expansion of surveillance powers.” The measure, which already has preliminary approval, would justify snooping on a variety of grounds far beyond the anti-terrorism concerns driving much of the country’s political activity in the wake of the Charlie Hebdo massacre. Besides security, the proposed Projet de Loi Relatif au Renseignement allows for deep government intrusions into online life to achieve economic, scientific, and international relations goals.
-
Sunday on Face the Nation, someone made the absurd comparison of Hillary Clinton to Richard Nixon, as if her deleted emails had any similarity to Nixon in cahoots with Kissinger in that secret war of carpet bombing Cambodia.
-
Oklahoma City University’s Powerful Prose series will continue with a presentation on the book “No Place to Hide,” a book written by Glenn Greenwald about accused classified intelligence leaker Edward Snowden. OCU law professor Art LeFrancois will discuss the book at 6:30 p.m., Thursday, April 30.
The presentation is free to the public and will be held at Full Circle Bookstore, the series co-sponsor, in the 50 Penn Place shopping center at 1900 Northwest Expressway.
-
The Drug Enforcement Administration’s pioneering and purportedly discontinued dragnet pulled records from pliable phone companies for two decades without court review using administrative subpoenas.
-
Human Rights Watch, a nonpartisan organization that fights human rights abuses across the globe, filed suit against the U.S. Drug Enforcement Administration late Tuesday for illegally collecting records of its telephone calls to certain foreign countries as part of yet another government bulk surveillance program. The group is represented by the Electronic Frontier Foundation (EFF), which has launched a series of legal challenges against unconstitutional government surveillance.
-
Sen. Richard Burr (R-NC) is trumpeting a major Senate cyber bill that he claims is better at protecting privacy. Burr, who is chairman the Senate Select Committee on Intelligence, hails this bipartisan measure which was recently approved by his panel, as taking the first step in cracking down on the theft of personal data and intellectual property. Elaborating, he goes on to insist that the bill would create “a cybersecurity information-sharing environment that works much like a neighborhood watch program–allowing all participants to get a better understanding of the current cybersecurity threats that may be used against them.”
-
President Cristina Fernández de Kirchner’s government has vowed to respond to documents that allegedly show how the British government was engaged in surveillance and cyber operations against the Argentine authorities and military officials and attempted to shape public opinion against the country’s sovereignty claims over the Malvinas Islands.
-
Following Defence Minister Agustín Rossi’s brief comments on Friday, Buenos Aires Governor Daniel Scioli yesterday was the highest-ranking Victory Front (FpV) official to respond to recently released documents that suggest British espionage against Argentine and military officials over the Malvinas Islands, considering them serious and “a violation against the privacy and the rights of our country within the framework of freedom and democracy.”
-
Yeupp, the government can and does collect dick pics.
This is not a trivial matter. Sunday night, Oliver devoted the entire half hour of his HBO show “Last Week Tonight” to the matter of domestic surveillance, and the upcoming vote in Congress about whether to reauthorize the Patriot Act, including its provision allowing the government to collect our private information.
The trouble is that Americans seem really ill-informed about the whole matter of domestic surveillance, as Oliver illustrates with on-the-street interviews. They also seem not to know exactly who whistleblower Edward Snowden is.
-
The slow drip feed of classified NSA material taken by Edward Snowden and published by journalists Glen Greenwald, Nicky Hager, David Fisher and others in outlets such as The Intercept and the New Zealand Herald caused a stir when first published.
Revelations of mass surveillance and bulk collection of telephone and email data of ordinary citizens in the Five Eyes democracies and detailed accounts of how the NSA and its companion agencies in Australia, Canada, New Zealand and the UK spy on friend and foe alike, including trade partners and the personal telephones of the German prime minister and Indonesian president, caused both popular and diplomatic uproars.
-
The American Civil Liberties Union said that the Erie County Sheriff’s Office in the US state of New York used invasive cellphone tracking devices called Stingrays to spy on local residents without a search warrant.
-
-
In the wake of the Edward Snowden leaks of nearly two years ago, the NSA, FBI, and even local police have hammered a consistent drumbeat of trust. Time and time again, at every level of government, local to national, elected officials and appointed commissioners have promised that the cutting-edge tools of mass surveillance used to hoover your personal information are actually tightly controlled and used only under appropriate conditions. Unfortunately, available evidence continues to blow holes in this narrative, most recently in New York State.
-
The bulk collection of phone data goes back to 1992, with a DEA program that inspired the NSA
-
-
Programs such as PRISM for foreign surveillance and domestic wiretapping drew huge outcry. At the time, Brazilian President Dilma Rousseff accused the U.S. on the floor of the United Nations of “a breach of international law and an affront” to national sovereignty. Similar claims were made about domestic programs, especially since the their capabilities, let alone their use, were unknown to the vast majority of Americans.
-
More and more it appears that focusing on Congress to stop federal spying is a complete waste of time.
Even if Congress were to pass substantive reforms or allow provisions of the Patriot Act authorizing bulk phone surveillance to expire – and this seems highly unlikely – a recently declassified court order indicates spying would likely continue.
-
It can’t be overstated how important it is to use strong passwords, given that we still haven’t figured this mess out. And until we do, PSAs like this one stay important. And it could hardly come from a more relevant source. Edward Snowden famously leaked key details about the NSA’s mass surveillance, so he knows a thing or two about what makes a system secure or not.
-
A Texas bill that would prohibit law enforcement from obtaining location data from electronic devices without a warrant in most cases, representing an important first step in addressing the growing federal surveillance state will receive an important House committee hearing this week.
-
Facebook says it’s begun fixing a bug that tracks web users even when they’re not registered on the social network. However, it rejected other accusations presented in a report by Belgian scholars questioning the legality of the revised privacy policy.
-
One fine day in 1991, an ambitious senator named Joe Biden introduced legislation declaring that telecommunications companies “shall ensure” that their hardware includes backdoors for government eavesdropping. Biden’s proposal was followed by the introduction of the Clipper Chip by the National Security Agency (NSA) and a remarkable bill, approved by a House of Representatives committee in 1997, that would have outlawed encryption without back doors for the feds.
-
The government’s Inspector-General of Intelligence and Security Cheryl Gwyn announced on March 26 that she would investigate complaints made by the Green Party and others “over alleged interception of communications of New Zealanders working or travelling in the South Pacific by the Government Communications Security Bureau (GCSB).”
The aim of the inquiry is to contain the damage to the government and the political establishment more broadly from revelations of the GCSB’s illegal and anti-democratic activities.
-
An explosive new report reveals the federal government secretly tracked billions of U.S. phone calls years before the 9/11 attacks. According to USA Today, the Justice Department and Drug Enforcement Administration collected bulk data for phone calls in as many as 116 countries deemed to have a connection with drug trafficking. The program began in 1992 under President George H.W. Bush, nine years before his son, George W. Bush, authorized the National Security Agency to gather logs of Americans’ phone calls in 2001. This program served as a blueprint for NSA mass surveillance. We speak with Brad Heath, the USA Today investigative reporter who broke the story.
-
So, here’s my pathetic version of a grand insight: wearables like the Apple watch actually serve a very different function — indeed, almost the opposite function — from that served by previous mobile devices. A smartphone is useful mainly because it lets you keep track of things; wearables will be useful mainly because they let things keep track of you.
-
Apple is set to follow through on expansion plans for its $250 million datacenter in Prineville, Oregon, a Wednesday report suggests, after the Oregon legislature resolved a tax issue that could have tacked millions of dollars onto Apple’s bills in the future.
-
When whistleblower Edward Snowden used an email encryption program called PGP to contact documentary filmmaker Laura Poitras, only a tiny fraction of journalists used it. The precaution, designed to scramble messages so only the sender and receiver can read them, was essential for Snowden to leak the information.
-
The U.S. government started keeping secret records of Americans’ international telephone calls nearly a decade before the Sept. 11 terrorist attacks, harvesting billions of calls in a program that provided a blueprint for the far broader National Security Agency surveillance that followed, USA Today newspaper reported today.
-
-
There’s a lot we may never know about the odd incident last week in which two men were shot, one fatally, while allegedly trying to ram the gate at the employees-only entrance to the National Security Agency at Fort George G. Meade. But there does seem to be one contributing factor you’d think authorities could fix quickly – a poorly marked entrance ramp from Baltimore-Washington Parkway.
-
Who’s keeping watch of the National Security Agency? In Congress, the answer in more and more cases is that the job is going to former lobbyists for NSA contractors and other intelligence community insiders.
A wave of recent appointments has placed intelligence industry insiders into key Congressional roles overseeing intelligence gathering. The influx of insiders is particularly alarming because lawmakers in Washington are set to take up a series of sensitive surveillance and intelligence issues this year, from reform of the Patriot Act to far-reaching “information sharing” legislation.
After the first revelations of domestic surveillance by NSA whistleblower Edward Snowden, President Obama defended the spying programs by claiming they were “subject to congressional oversight and congressional reauthorization and congressional debate.” But as Rep. Alan Grayson, D-Fla., and other members of Congress have pointed out, there is essentially a “two-tiered” system for oversight, with lawmakers and staff on specialized committees, such as the House and Senate committees on Intelligence and Homeland Security, controlling the flow of information and routinely excluding other Congress members, even those who have asked for specific information relating to pending legislation.
-
Amazon Dash – the company’s single purpose internet-connected ordering button – may soon be blackening our skies with drones delivering loo rolls and detergent. And so, the relentless march of technology – not to mention cheap labour, unthinking consumerism and scandalous environmental devastation – goes on.
-
Though “Citizenfour” (2014) is not a horror film – rather, it’s a documentary – it ranks among the most frightening films I have ever seen because of its unyielding revelations of the U.S. government’s spying programs and the implications of those reports.
-
Case lead by privacy campaigner Max Schrems sees 25,000 users sue social network for alleged illegal tracking of their data and its involvement in the NSA’s surveillance programme
-
Facebook is being sued in Austria over alleged privacy violations and claimed participation in the US National Security Agency’s (NSA) PRISM programme.
An Austrian law graduate called Max Schrems is leading the class action lawsuit on behalf of around 25,000 Facebook users based in Europe and beyond.
-
A class action against Facebook over alleged breaches of European privacy laws is being heard in a Vienna district court today.
Austrian law graduate Max Schrems and 25,000 other Facebook users are suing the social network. They allege that Facebook violated European citizens’ “fundamental rights” (defined in the European Convention on Human Rights) by transferring their personal data to the US National Security Agency (NSA).
-
A nonprofit group is entitled to attorney fees from the government for its efforts to obtain a presidential order on cybersecurity, a federal judge ruled.
-
These are all issues Congress has tried and failed to address before. Patent reform died in the Senate last spring, controversial cybersecurity legislation never saw a floor vote last year and a NSA reform bill could not pass a Senate procedural vote last December.
-
The US government has blocked Intel from shipping high-end Xeon processors to China’s supercomputer builders – and other American chip giants are banned, too.
Intel confirmed to The Register last night it was refused permission to sell the chips to the Middle Kingdom’s defense labs and other parts of its supercomputing industry.
-
The DEA’s newly revealed bulk collection of billions of American phone records on calls to 116 countries preceded the NSA’s similar program by years and may have even helped to inspire it, as reported in USA Today’s story Wednesday. And the program serves as a reminder that most of the legal battles between government surveillance efforts and the Fourth Amendment’s privacy protections over the last decades have played out first on the front lines of America’s War on Drugs. Every surveillance test case in recent history, from beepers to cell phones to GPS tracking to drones—and now the feds’ attempts to puncture the bubble of cryptographic anonymity around Dark Web sites like the Silk Road—began with a narcotics investigation.
-
For more than two decades, the U.S. government has carried out domestic electronic espionage that has impacted hundreds of countries including Mexico, the USA Today reported Wednesday.
-
There are two plausible reasons. First, as Admiral Michael Rogers, the head of the NSA and Cyber Command has argued, norms create a basic structure for international political relations. If, for example, the U.S. is to deter cyberattack from other countries, and vice versa, all the countries involved need to reach a common agreement on basic questions such as what cyberattacks are, when they are acceptable and when not acceptable, and so on. Creating this kind of common understanding takes a lot of hard work building common norms of acceptable and unacceptable behavior, as Emanuel Adler’s research on arms control during the Cold War demonstrates.
-
The benefits of data collection “must be more clearly weighed against the potential damage to the normative commitments to an open and secure Internet,” writes Farrell, who urges intelligence-gathering agencies to “adopt a fundamental change of mind-set.”
-
Civil Rights
-
The federal government has commissioned a $4.1m telemovie designed to dissuade asylum seekers from coming to Australia by boat.
The telemovie, set to be broadcast in refugee hotspots including Syria, Afghanistan and Iran, would include storylines about asylum seekers drowning at sea and feature the Australian navy, the ABC has reported.
-
An Argentine judge issued an arrest warrant for Justin Bieber on Friday (April 10), saying the singer failed to respond to summons related to allegations he ordered bodyguards to attack a photographer in 2013
Judge Alberto Julio Banos ordered the “immediate detention” of Bieber and bodyguards Hugo Alcides Hesny and Terrence Reche Smalls.
-
Denmark does not need a special whistleblower law for public authorities, an expert committee has concluded.
-
Intellitar was selling its “immortality” service for $25 a month to people who wanted to create a digital doppelgänger that would live on even after their death. Customers uploaded a photo of themselves to Intellitar’s “Virtual Eternity” website, took a personality test, provided a voice sample and then trained their avatars’ “brains”—an artificial-intelligence engine—by feeding it stories, memories and photos. The result, the company said, was an animated avatar that your family, friends, and great-great-grandchildren could talk to, even after you went to the big database in the sky.
-
This past January, the U.S. Court of Appeals heard the oral argument for the Hassan v. City of New York case. What makes this case so special is that it has been the first case to ever challenge the New York City Police Department Muslim Surveillance Program. The United States National Security Agency controversy left America reeling — in June 2013, allegations arose that the NSA had been spying on millions of Americans every day through tapping of telecommunications networks (computer networks, telephones, the Internet, etc.) with the help of major companies like Google, Facebook, Apple, Yahoo and Microsoft. Though this came to light through journalist Glenn Greenwald’s exposé revealing a partnership between Verizon and the NSA, it has been going on for years. It is a common suspicion that the revelation barely scratches the surface of all the surveillance that is likely going on, but Muslims have been sounding off on their loss of constitutional rights — and thereby the loss of every American’s constitutional rights — for years.
-
More bad news has just arrived on the “We’re all not that terrible” PR front: according to Philly’s police department, each and every car owner whose vehicle’s license plate has had the misfortune of being scanned by the PD’s license plate readers is some sort of criminal. Charges TBD.
-
China wants to recruit 10 million young people, mostly university students belonging to the Communist Party’s youth wing, to “spread positive energy” on the Internet — in other words, to use social media to praise and defend the government.
-
The 23-year-old South Carolina man who used his phone to videotape a police officer fatally shooting a suspect in the back multiple times said Thursday that another officer who arrived on the scene ordered him to stop recording.
-
Eight-grader Domanik Green was arrested on felony charges in Holiday, Fla. Wednesday after breaking into his teacher’s computer to change the background picture to two men kissing.
-
FOIA clearinghouse MuckRock has scored another revealing document, this time from Customs and Border Protection. As we’re well aware, the US border isn’t technically considered to be part of the United States, at least not as far as the Constitution is concerned. All bets are off, 4th (and others) Amendment-wise. If you’re traveling with anything — whether its a vehicle, suitcase or laptop — expect it to be searched.
-
Knowing they were being video recorded by a news helicopter hovering above, Southern California deputies did not let that stop them from repeatedly punching and kicking a man who had already surrendered by lying flat on his stomach after he was tased earlier this afternoon.
Up to nine San Bernardino County sheriff’s deputies can be seen running up to the suspect to kick and punch him, angry at having been forced to chase him through the desert.
-
Internet/Net Neutrality
-
Internet is a global network, with total freedom. Well, that is soon going to change, unless you act now. While you are reading this, someone is trying to control what you see, read, download, listen or write on the internet by taking control over the sites you can access! Don’t wait for that moment to happen. Act now, and protect Net Neutrality by signing in for the petition.
-
Intellectual Monopolies
-
Copyrights
-
The filmmakers behind the action movie “Manny” have filed hundreds of lawsuits against BitTorrent pirates this year, but not all have been successful. In a prominent ruling Florida District Court Judge Ursula Ungaro refused to issue a subpoena, arguing that IP-address evidence is not enough to show who has downloaded a pirated movie.
-
Last year Time Warner Cable and the Los Angeles Dodgers struck a twenty-five year, $8.35 billion deal giving Time Warner Cable the exclusive broadcast rights to all Dodgers games in Los Angeles via its creatively-named regional sports network, Time Warner Cable SportsNet LA. Time Warner Cable then immediately turned around and demanded massive price hikes (rumored to be around $5 per subscriber) for any other pay TV provider that wanted to offer the channel. All of the regional cable operators (including AT&T, Cox, Dish and DirecTV) balked at the hike, resulting about 70% of fans in Dodgers territory being unable to watch the final six games of last season.
-
The EFF and the Entertainment Software Alliance are going head-to-head over the need to preserve functionality in abandoned games. The EFF wants an exemption to the DMCA to keep games alive after its servers are closed down, but the ESA and its allies the MPAA and RIAA are vigorously opposing the digital rights group.
Permalink
Send this to a friend
Posted in News Roundup at 12:13 am by Dr. Roy Schestowitz

Contents
-
Desktop
-
The hardware is nearly identical to the Windows version that launched in January, including the edge-to-edge display that essentially fits a 13-inch laptop in an 11-inch body. But instead of Microsoft’s operating system, the XPS 13 Developer Edition comes with Ubuntu 14.04.
It’s even $50 cheaper than the Windows version when you line up the tech specs, starting at $950 with Core i5-5200U processor, 1080p non-touch display, 8 GB of RAM of and 128 GB of solid state storage. The configuration options are a bit different, though, so let’s walk through them:
-
Dell has come through again with its latest laptop that’s just for Linux developers: The fourth generation Dell XPS 13 Developer Edition. This model is the latest in Dell’s high-end workstation laptops for programmers.
-
-
-
-
-
Server
-
Few technologies in the virtualization space are as hyped as Docker containers are today. Many companies have made promises about products and services for Docker, including cloud giant Amazon, and now Amazon is making good on its promise.
-
It was the second “best overall open source cloud project,” according to a survey by the Linux Foundation and The New Stack last July. And Google Trends shows Docker accelerating in buzz ahead of OpenStack and virtualization, out of virtually nowhere in 2013.
-
Varnish Software, the Norwegian web-performance company behind the open source project Varnish Cache is releasing Varnish API Engine, focused on managing high call volumes.
-
Kernel Space
-
-
Puppet’s dozens of Git repositories see new code commits every day from more than 200 people, says Michael Stahnke, director of engineering services at Puppet Labs. And he personally uses the open source revision control system several times a day.
“I can’t think of another tool that changed the way I work, in a positive way, more than git,” Stahnke said.
In this Q&A celebrating Git’s 10-year anniversary this week, Stahnke shared why Puppet Labs uses Git, their Git success stories, and his top pro tip for using the tool. For more in our “Git Week” series, see our interviews, below, with Git creator Linus Torvalds, and project maintainers from KVM, Qt, Drupal, and Tor.
-
The Linux Foundation has a track record in helping build open-source communities around projects like Let’s Encrypt, which aims to make Internet use more secure.
-
Setting aside the head-scratching title, Linux 4.0 isn’t a massive change from Linux 3.19. It would have been named Linux 3.20, but lots of people wanted to see Linux 4.0. As Linus Torvalds himself said, “the strongest argument for some people advocating 4.0 seems to have been a wish to see 4.1.15 – because ‘that was the version of Linux Skynet used for the T-800 Terminator.’”
-
A new release of ZFS On Linux is available this week for providing the latest capabilities for this Oracle/Sun ZFS file-system implemented as an out-of-tree, native Linux kernel driver.
The new ZFS On Linux 0.6.4 release is now compatible with kernels up through Linux 4.0. ZFS On Linux 0.6.4 also adds new feature flags of spacemap_histogram, extensible_dataset, bookmarks, enabled_txg, hole)birth, and embedded_data.
-
-
Graphics Stack
-
Simply put, there is no actual official NVIDIA support for Optimus technology for Linux. Or at least, not completely. Until recently, there was none at all. As of 2013, NVIDIA did start to provide initial support for Optimus, but it is extremely barebones and arguably doesn’t actually properly implement the Optimus features as it’s meant to be.
But let’s look at the current options for running an NVIDIA Optimus-enabled computer with Linux…
-
Applications
-
Once I knew what mpfc stood for, it made perfect sense — it is, after all, a music player for the console.
-
-
Kovid Goyal announced today, April 10, the immediate availability for download of Calibre 2.24, an open-source and cross-platform ebook library management software for GNU/Linux, Mac OS X, and Microsoft Windows operating systems.
-
Proprietary
-
Opera Software, through J. Gladykowski, announced on April 9 the immediate availability of another Beta update for the upcoming Opera 29 web browser, a release that fixes no more that ten issues (details below), based on the latest upstream Chromium Beta channel.
-
Instructionals/Technical
-
-
-
-
-
-
-
-
-
-
-
-
-
-
I’ll use Fedora 21 Server, and will have a dedicated encrypted volume group for data but leave the main operating system volume group unencrypted. The encryption key will be stored on a USB memory stick. When it is connected the system will boot normally; otherwise it will wait for a while for it to be connected and finally fall back to emergency mode.
-
Wine or Emulation
-
Wine Maintainer Alexandre Julliard decided to try out the Git revision control system just a few months after creator Linux Torvalds released the first version – that was 10 years ago. Now, he says, “I can no longer imagine doing software development without it.”
Wine, the open source software used to run Windows applications on Linux, still mostly uses email to exchange and review patches. But Git is the project’s version control system (VCS.) Here, Julliard discusses why they use Git, their Git success stories, and pro tips for using the open source tool.
-
Games
-
Fire is a puzzle adventure set in the Stone Age about a quest to bring fire back to your village. It’s a game with a simple story, told without words, where the fun is in the enjoyable puzzles.
-
The Steam Machines from Valve is the proverbial elephant in the room that no one is willing to talk about it. Everybody wants Valve to succeed, and many gamers are rooting for them, but not many people actually believe that it will be a success.
-
Last year Valve made all of their games free to Debian developers as a thank you since SteamOS is based on Debian. Now Valve is giving out their collection of all current and future games to open-source Mesa developers.
-
OpenTTD (Open Transport Tycoon Deluxe) is a Transport Tycoon clone, working on Linux and Unix systems. Being an old game, it does not have good graphics, but it has a convincing gameplay.
-
“Dying Light” has a new 1.5.1 update for Windows PC and Linux. The patch aims to fix graphics performance issues while squashing gameplay and weapons glitches in the process.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
Anyone who has used a desktop environment can be up and running in KDE in a matter of minutes. However, KDE has a way of hiding more advanced features, and some of them can take months or even years to discover.
-
GNOME Desktop/GTK
-
-
Clemenent Lefebvre published today, April 9, a new maintenance release of the stable 2.4 branch of the acclaimed Cinnamon desktop environment used in numerous distributions of GNU/Linux, including Linux Mint.
-
The GNOME development team announced today, April 10, that the first point release of the GNOME 3.16 desktop environment will be published on April 15, 2015. GNOME 3.16.1 is the first maintenance release of the acclaimed desktop interface, bringing several improvements and updated translations.
-
-
Reviews
-
If we ignore the touchpad fiasco, Linux Mint 17.1 KDE is a very robust, very elegant release. It comes with all the necessities for a happy, carefree desktop usage. Everything works out of the box, the system is fast and stable, and apart from some small niggles, hardware detection and compatibility is quite good.
Perhaps this isn’t the most exciting KDE around, but most of them come with a fairly reserved and somewhat bland default presentation, and it takes time digging under the hood to bring all the excitement to the surface. Overall, if you like the Mint family, then this is a very decent offering, and it also works well on modern laptops plagued with evil concepts. So that’s an added bonus, for sure. All in all, 8.81/10. Definitely worth a try.
-
New Releases
-
endian S.r.l. announced the immediate availability for download and testing of the first Beta version of their upcoming Endian Firewall Community 3.0.5 operating system, a minor release that contains numerous improvements and fixes more than 350 issues.
-
Last week the former Evolve OS project announced they needed a new name. Suggestions came in and a decision was made. Now under a new name, the project tries to carry on with its original mission. In other news, Fedora 22 Beta was delayed causing a ripple effect throughout the remaining cycle and Red Hat announced their partners of the year.
-
Chromixium is a new distribution of Linux based on the upstream Ubuntu 14.04 LTS (Trusty Tahr) operating system, built around the Chromium web browser, and designed from the ground up to look and act like the Chrome OS operating system created by Google.
-
Bella OS 2.2 was announced recently, based on the upstream packages of the Ubuntu 14.04.2 LTS (Trusty Tahr) operating system. The Bella OS distribution aims to be a beautiful and user-friendly Linux OS tailored for end-users.
-
-
-
Screenshots
-
Ballnux/SUSE
-
Red Hat Family
-
-
Software defined storage (SDS) is growing, and resellers would be wise to learn more, Ranga Rangachari, VP of Red Hat’s Storage Business Unit, told Channlenomics during the Red Hat’s partner conference this week.
Rangachari estimates that the SDS market is growing seven times faster than the overall storage market. He added that it has become the macro trend that customers are now asking about.
-
Research firm Zacks has rated Red Hat Inc (NYSE:RHT) and has ranked it at 3, indicating that for the short term the shares are a hold. 23 Wall Street analysts have given the company an average rating of 1.41. The counter has received a hold rating based on the suggestion from 4 analysts in latest recommendations. Strong buy was given by 17 Wall Street Analysts. The counter had a buy rating from 2 analysts.
-
-
Fedora
-
Fedora Project, through Jaroslav Reznik, announced that the Beta release of the upcoming Fedora 22 Linux operating system will be delayed by one week, due to unresolved blocker bugs.
-
Good news, everyone. New version of DNF and DNF-PLUGINS-CORE was built for F22 and F23. The documentation of yum and DNF differences was extended by yum plugin alternatives part and erase command was deprecated in favor of remove command name. DNF is getting more and more stable with 20 bug fixes while DNF-PLUGINS-CORE 0.1.6 newly adds Config manager.
-
New versions of DNF and DNF-PLUGINS-CORE have been released and there’s pre-built packages for Fedora 22 and Fedora 23.
-
-
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
Immediately after announcing new kernel updates for the Ubuntu 14.04 LTS (Trusty Tahr) and Ubuntu 12.04 LTS (Precise Pangolin) operating systems, Canonical has also published details about a kernel update for its Ubuntu 14.10 (Utopic Unicon) distribution, urging users to update as soon as possible.
-
Canonical and Bq have announced that the Bq Aquaris e4.5 Ubuntu Edition is now available for purchase on regular channels, which puts an end to the flash sales.
-
-
Back when the BQ Aquaris E4.5 Ubuntu Edition smart-phone launched in February it was only available in limited numbers via “flash sales” facilitated by the company. At last, now this first Ubuntu smart-phone is available to order by anyone within the European Union.
-
Quick update: the BQ Ubuntu Phone is now available for general purchase in the European Union. Until now, the phones could only be bought through flash sales.
-
-
-
-
Flavours and Variants
-
The second 17.x point release will be Linux Mint 17.2 codename ‘Rafaela’.
Rafaela is a feminine form of Raphael, which is of Hebrew origin and which meaning is “God has healed”.
-
Most people assume that whenever a software update is released they immediately need that upgrade or they are “missing out” something. One of the things I do for the Bodhi project is package software updates for our repositories. Part of this task is not only reading change logs for lots of new software releases, but also helping test those software releases for regressions. When I first started packaging software it was fairly surprising how often a new release for some pieces of software broke features than bugs it fixed.
After dealing with a number of frustrating regressions over the years I have taken on a “do not fix that which is not broken” attitude when it comes to my own production machines. The less time I spend with my own system having downtime, the more productive I am able to be. It does not matter that I am using version ABC of a software package when version DEF is the latest that exists. If version ABC does not have any security vulnerabilities and is functional for my needs it can stay right where it is!
-
Linux Mint Debian Edition is not as well known as its Ubuntu-based sibling. But it offers the convenience of a rolling release along with the advantages of using Debian as its base. Linux Mint Debian Edition 2 has finally been released and you can download the Cinnamon or MATE versions today.
-
LMDE (Linux Mint Debian Edition) is a very exciting distribution, targeted at experienced users, which provides the same environment as Linux Mint but uses Debian as its package base, instead of Ubuntu.
LMDE is less mainstream than Linux Mint, it has a much smaller user base, it is not compatible with PPAs, and it lacks a few features. That makes it a bit harder to use and harder to find help for, so it is not recommended for novice users.
-
The MATE and Cinnamon desktop versions of Linux Mint Debian Edition 2 (LMDE 2) are now available for download.
-
-
-
-
Conventional wisdom says small, powerful embedded Linux like the Raspberry Pi, Beaglebone, or the Intel Edison are inherently manufactured devices, and certainly not something the homebrew tinkerer can produce at home. [hak8or] is doing just that, producing not one, but two completely different tiny Linux computers at home.
The first is based on Atmel’s AT91SAM9N12 ARM processor, but the entire board is just about two inches square. On board is 64 MB of DDR2 DRAM, a USB host and OTG port, and not much else. Still, this chip runs a stripped down Linux off of a USB drive.
-
-
Phones
-
Android
-
DARPA is working hard on making it easier for Forward Air Controllers to order fast precision air strikes under chaotic and stressful conditions. Under a new initiative, a revolutionary new way of calling in crucial air support includes migrating away from clumsy radios and hardbook laptops to Android tablets and data links.
-
Earlier this year, news leaked that Google was working on an Android Wear app for the iOS App Store, and it appears that the company’s progress on engineering Android Wear devices to work with iPhones is nearing completion.
-
-
-
Spring has been traditionally known as a time for rebirth. Snow melting, flowers blossoming and for Android manufacturers, a time to release their latest and greatest offerings.
Friday will see the release of HTC’s newest One M9 and two new Samsung Galaxys, the S6 and S6 Edge.
-
Over the past two months LG and its partnering carriers have been busy pushing the LG G3 Android 5.0 Lollipop update out to owners. And while most of the feedback has been positive, the Android 5.0 Lollipop update is also causing problems for many. The update initially started outside of the US, and then hit the AT&T LG G3 in February, and has continued to almost all US carriers.
-
-
Amazon’s Prime service has proven to be quite popular with its customers. One of the biggest selling points is Prime Instant Video, which lets customers view movies and TV shows. Now Android users can get the Amazon Prime Instant video app on their tablets.
-
Google is continuing to get its Chrome OS platform to work well with its Android-powered mobile devices. Using the latest version Google’s Developer channel Chrome OS, you can manipulate files on a USB-connected Android phone or tablet.
-
Wondering when you could get your hands on the Alcatel OneTouch Idol 3? You know, the Android smartphone that can take calls upside down? Well, it shouldn’t be too much longer.
-
Sony is rolling out two new Android Lollipop builds for its Xperia Z3 series devices in select regions.
-
If you’re really honest, do you actually read the permissions that Android apps are asking for before you install them? If you do, then there’s little doubt that you’re in the minority. Most of us treat them like terms and conditions, blindly clicking, or tapping, our way through. Is this something we should be taking more seriously? What are we actually giving away here?
-
Ah, spring time. The evenings are staying lighter for longer, the flowers are coming out, and there’s a fresh, grassy smell in the air.
-
Today, open source is pervasive in enterprise IT, forming the foundation of many cloud services and applications.
The open source community represents a vast pool of collaborative intellectual property, and it has become a fundamental part of businesses around the world and in Australia and New Zealand.
“Open source is a great fit for any organisation that is looking to innovate more rapidly and effectively, and to save costs and increase the bottom line,” says Colin McCabe, senior manager, Services and Training, Red Hat.
-
This week on Coders, RCR CEO and Editorial Director Jeff Mucci digs into evolving 5G cellular standards, software and proof of concept deployments with co-host Victor Agreda.
-
Open source allows for a more natural adoption approach within the enterprise. It is free and generally easy to download, install, and get started with. This allows easy exploration of and experimentation with new technologies and allows enterprises to get comfortable with the software on smaller, non-mission-critical projects before any financial commitment is required.
-
Sirius is an open source, customizable system that can be commanded through vocal input. It has been built by University of Michigan researchers and is similar to Apple Siri, Microsoft Cortana, and Google Now. According to University of Michigan, Sirius “is designed to spark a new generation of intelligent personal assistants” for wearables and other devices.”
-
In March of 2014 I found myself on the Turkish-Syrian border, doing research among Syrian refugees. The stories I heard were horrific. Mass sieges were in effect; the Syrian government and brutal militias were starving out entire neighborhoods, and the government appeared to be deliberately targeting hospitals and doctors. Smuggling medical supplies into opposition-held areas was punishable by torture and death. Syrians were besides themselves, trying to find some way to get food and medicine into these besieged areas. They asked me why the US did nothing.
-
Web Browsers
-
Chrome
-
Google has given its Chrome Store a spring cleaning, ridding it of more than 200 browser add-ons and extensions that may have been delivering spyware and malware to users. “Obviously, they need to put more work into screening of uploads to the Chrome Store if it should be considered a trusted source,” noted Martin Zetterlund, founder of ScrapeSentry.
-
A few months back I wrote about the poor state of Chrome/Chromium HiDPI support on Linux but fortunately with the latest unstable web browser code these issues appear to have been resolved.
-
Mozilla
-
Did you know that not all websites honor Do Not Track? If privacy while browsing is at the top of your priority list, Jack Wallen offers up a Firefox tip that just might allow you to sigh a breath of private air.
-
SaaS/Big Data
-
In this interview with Red Hat’s Alvaro Lopez Ortega, we learn a little bit about RDO, a community distribution of OpenStack which is designed to make it easy to install on operating systems like Fedora and CentOS. Alvaro is presenting at OpenStack Live next week, where he’ll share both some technical details on RDO as well as a little bit about the community that makes it happen.
-
Over time, it only had to become easier to leverage the open source Hadoop project, which has been the driving technology behind much of the Big Data trend. At one point, the Big Data trend–sorting and sifting large data sets with new tools in pursuit of surfacing meaningful angles on stored information–remained an enterprise-only story, but now businesses of all sizes are evaluating tools that can help them glean meaningful insights from the data they store.
-
The first Release Candidate (RCs) for the upcoming OpenStack Kilo release are now out. I’ve seen the RC for Nova (https://github.com/openstack/nova/tree/proposed/kilo), and the RC for Trove at: https://github.com/openstack/trove/tree/proposed/kilo with more set to follow.
-
The OpenStack Kilo milestone release is several weeks away, but networking vendor PLUMgrid is already prepared for it. This week, PLUMgrid announced the release of its ONS (OpenStack Networking Suite) 3.0, compatible with OpenStack Kilo. The new ONS 3.0 platform also provides new tools for enabling networking in OpenStack clouds.
-
One size rarely fits all. That’s a lesson OpenStack vendor Piston Cloud Computing is showing it understands quite well with its CloudOS 4.0 release. Prior to CloudOS 4.0, Piston’s primary cloud server platform was called Piston OpenStack, with the most recent update being the 3.5 release, which debuted in September 2014.
-
Recently I passed a magic number with my ownCloud in a box appliance. It hit the five fives, 55.555 total downloads, on SUSE Studio. It is the most popular download there. I would never have imagined that so many people would be interested in it and use it when I started with this. Amazing.
-
Oracle/Java/LibreOffice
-
One may notice that the points listed above loosely match the main points usually mentioned when discussing the benefits of ODF in the more standard settings of the desktop. This is not surprising, but it was not necessarily intended; if anything this is a testimony to the value of a standard like ODF and its importance. The key point here is that when it comes to the cloud and big data, ODF is both a factor of transparency and innovation. This is something worth promoting and is a potential path to renewed success of ODF in the future.
-
The Document Liberation Project only was founded last year officially and now can see at least it’s first birthday. Not yet picked up much steam from new contributors so far, but then already serving e.g. users of Calligra, with libraries like LibRevenge, LibOdfGen, LibWpd, LibWpg, LibWps, LibVisio, LibEtonyek etc., to read in data from files in WordPerfect, MS Works, MS Visio, and Keynote formats.
-
CMS
-
WordPress is the world’s largest open source CMS.
-
BSD
-
LibFuzzer was recently added to LLVM as a library for in-process fuzzing. LibFuzzer combined with other open-source fuzzing capabilities make it easy for uncovering new bugs within LLVM and other projects.
-
Openness/Sharing
-
Before leaving Technicolor, I developed an interest in the open source concept and started researching it in more depth. It seemed to me that if open source could be applied to film and television production, there was the possibility to really revolutionize the industry and encourage creativity in an entirely new way.
-
-
This week, API management platform and marketplace Mashape unveiled Mockbin, a service that helps developers log, debug and simulate API calls made over HTTP.
-
Open Hardware
-
Natsuo Akazawa wants humans to have a better understanding of robotics. He believes that this will change the relationship between robots and humans. His company PLEN Project Company Ltd is running a Kickstarter campaign to fund their PLEN2 robot and billing it as the first printable open-source humanoid.
-
Programming
-
JavaScript originally was developed at Netscape in 1995, first under the name Mocha, and then as LiveScript. Soon (after Netscape and Sun got together; nowadays, it’s the Mozilla Foundation that manages the language) it was renamed JavaScript to ride the popularity wave, despite having nothing to do with Java. In 1997, it became an industry standard under a fourth name, ECMAScript. The most common current version of JavaScript is 5.1, dated June 2011, and version 6 is on its way. (However, if you want to use the more modern features, but your browser won’t support them, take a look at the Traceur compiler, which will back-compile version 6 code to version 5 level.)
-
Here’s an example. Let’s say I’m writing an 800 word article about Microsoft — which I’ve been known to do on occasion. Well, to make sure that search engines understand that the article is about Microsoft, I have to name the company, and frequently, within the article. According to SEO experts, I would need to use the word “Microsoft” at least eight times within the article to obtain a keyword density of one percent — just to make sure the search engines understand that this article is indeed about our buddies in Redmond. I’d also need to make sure that the title also contains the word “Microsoft,” as search engines give extra weight to keywords included in the title.
-
You’ll notice that both Paul and Lewis agreed to one more question, and Paul left when Lewis asked a second “last question.” But that Paul walked off quickly and that the lights were turned off made it look that he left in the middle of it. Optics!
-
Defence/Police/Secrecy/Aggression
-
A UKIP candidate has been obliged to report to the police for breaking the law on “treating” for providing sausage rolls at an event. Yet Jack Straw at elections in 2005 and 2010 held rallies for the Muslim community in Blackburn at which the Labour Party provided hundreds of voters with full sit down meals, free of charge, and Police refused to take any action – indeed they were protecting the event. This is yet another example of the political elite being above the law.
-
In a terrorism sting operation, the FBI arrested a twenty year-old man from Topeka, Kansas, who United States government officials claim attempted to “detonate a vehicle bomb at Fort Riley military base near Manhattan, Kansas.” He also apparently suffers from mental illness.
John T. Booker Jr., who also goes by the name Mohammed Abdullah Hassan, was charged with attempting to use a weapon of mass destruction, attempting to damage property by means of an explosive and attempting to provide material support to the Islamic State.
“Thanks to the efforts of the law enforcement community, we were able to safely disrupt this threat to the brave men and women who serve our country,” Assistant Attorney General for National Security John P. Carlin declared. “Protecting American lives by identifying and bringing to justice those who wish to harm U.S. citizens remains the National Security Division’s number one priority.”
But, according to an affidavit [PDF] by an FBI Joint Terrorism Task Force in Topeka, Booker had no direct interaction or communication with any terrorists or terrorist organizations prior to the FBI targeting him. He had obtained no explosives to carry out any sort of attack. He lacked the resources or capabilities act and told one of the informants in the case that he wanted to join the Islamic State but “didn’t know anyone who could help him do so.”
An informant (CHS 1) introduced Booker to a second informant (CHS 2), who claimed to be a “high ranking sheik planning terrorist acts in the United States.” CHS 1 provided the list of materials that Booker needed to have in order to build a vehicle bomb. The two informants built the vehicle bomb, not Booker.
-
A Kansas man arrested and charged Friday morning for attempting to provide material support to the Islamic State was under surveillance by the FBI last year when he checked himself into a mental institution and was not regarded as an immediate threat, according to a document obtained by The Intercept.
In fact, the U.S. Army had approved the new recruit for a Secret clearance.
John T. Booker Jr., who also goes by the name Mohammed Abdullah Hassan, was arrested Friday and charged with attempting to provide material support to the Islamic State, plotting to use a weapon of mass destruction, and planning to destroy property with an explosive.
-
The United States is expanding its intelligence-sharing with Saudi Arabia to provide more information about potential targets in the kingdom’s air campaign against Houthi militias in Yemen, U.S. officials told Reuters.
-
The British government is refusing to disclose the job title and taxpayer-funded salary of one of the most senior law enforcement officials in the United Kingdom, claiming the details have to be kept a secret for security reasons.
Cressida Dick (pictured above) was formerly one of the highest ranking officers at London’s Metropolitan Police, the largest police force in the U.K., where she headed the Specialist Operations unit and oversaw a controversial criminal investigation into journalists who reported on Edward Snowden’s leaked documents.
-
Despite the ongoing danger to their lives, Awnallah says that his family has received no assistance from the U.S. government. “[My family] has tried to get in touch, but no one is helping them,” he said. “They are asking me all the time if they are going to die here.”
On April 9, Awnallah’s family and dozens of other Yemeni-Americans filed a lawsuit against the U.S. government on behalf of American citizens trapped in the country. Citing Executive Order 12656, which obligates “protection or evacuation of U.S. Citizens and nationals abroad” in times of danger, the lawsuit further alleges that the U.S. government’s refusal so far to conduct evacuation operations in Yemen represents the continuation of longstanding policies that effectively deny full citizenship rights to Yemeni-Americans.
-
The framework for the Iranian nuclear deal is about as good as anyone could reasonably expect. If it were solely up to the negotiators, it would likely be finalized in June. But they are not the only players, and it’s become clear that the biggest danger to the deal are hawks in Iran and the U.S.
-
Finance
-
In the wake of the HSBC, Swiss Leaks and LuxLeaks tax avoidance scandals the Green Party has pledged to introduce a Tax Dodging Bill in the first 100 days after the election. The campaign for such a Bill is being widely supported by a network of NGOs, cooperatives, faith groups, MPs and Unions [1].
-
Like, do these adults — at least physically, the three are in that stage of life — have no shame? Tony King of Apple, Maile Carnegie of Google, and Bill Sample of Microsoft were not in any way fazed by the fact that the companies they head locally cheat on their taxes.
-
PR/AstroTurf/Media
-
Unnamed “investigators”–who may come from the “FBI, Secret Service [or] US intelligence agencies,” we learn earlier in the piece–“believe” there are “tell-tale codes and other markers” that “point to” Russian government employees–how much fuzzier does evidence get? Yet immediately CNN is talking about the “Russian hack” as though it’s proven fact,,,
-
In its analysis of an unprecedented change to how the chief justice of the Wisconsin Supreme Court is selected, The Wall Street Journal ignored the significant financial contributions a right-wing group made in support of the move, which would strengthen conservative control of the court before it examines possible illegal campaign coordination between that same group and Wisconsin Gov. Scott Walker (R). Instead, the editorial board focused on the fact that the current chief justice has a lawyer who is on the board of directors of a judicial election reform group founded by George Soros.
-
Hillary Clinton’s campaign team held an off-the-record dinner Thursday night in Washington, D.C., for roughly two dozen journalists and staff members at John Podesta’s house, according to sources familiar with the matter.
The dinner signals that the Clinton team is trying to engage with top reporters in the days before the Democrat’s expected announcement of a 2016 presidential run. It also suggests the new campaign team is looking to change course from the toxic relationship with the press that plagued the 2008 race. The Clinton team is also holding a private event in New York on Friday night for journalists, according to sources.
-
Lawyer and writer Josh Bornstein demanded an explanation from The Times of Israel on Thursday after the site published an op-ed under his name that advocated genocide of Palestinians.
The post, which sparked outrage across social media and was quickly taken down by the site, called Palestinians “cockroaches” and said that Israel should “exterminate them.”
The Times of Israel tweeted that it was “looking into” the post and noted that it did not endorse its content. The article ran under Bornstein’s byline, although several people noted that it looked nothing like anything else he had ever published.
At about 6 p.m.. EDT, Bornstein took to Twitter from his home in Australia to clarify that not only had he not written the “racist” pro-genocide post, but that he had never started an account at the Times in the first place.
“I didn’t write that shit,” he said. He noted he was a “secular atheist,” contrary to the religious tone of the piece. He later added that he suspected the site was hacked.
Bornstein said he wanted an explanation from the Times of Israel.
-
Censorship
-
On March 16, GreatFire.org observed that servers they had rented to make blocked websites accessible in China were being targeted by a Distributed Denial of Service (DDoS) attack. On March 26, two GitHub pages run by GreatFire.org also came under the same type of attack. Both attacks appear targeted at services designed to circumvent Chinese censorship. A report released by GreatFire.org fingered malicious Javascript returned by Baidu servers as the source of the attack. Baidu denied that their servers were compromised.
-
Privacy
-
Tor, the free and open source software for anonymous web communications, has been using the Git revision control system for more than six years. The tool is so ingrained in the project’s development that Director and Chief Architect Nick Mathewson’s daily work flow is built around Git, he says.
“Git’s the eighth version control system I’ve had to use, and the first one I’ve seriously trusted,” Mathewson said. “Many thanks to the Git developers for all their hard work.”
-
Privacy International and several other human rights organisations are taking the UK Government to the European Court of Human Rights over its mass surveillance practices, after a judgement last year found that collecting all internet traffic flowing in and out of the UK and bulk intelligence sharing with the United States was legal.
The appeal, filed last week by Privacy International, Bytes for All, Amnesty International, Liberty, and other partners, comes in response to a ruling in December by the UK’s surveillance court, the Investigatory Powers Tribunal, dealing with the industrial-scale spying programmes TEMPORA and PRISM revealed by National Security Agency whistleblower Edward Snowden.
-
We’re happy to announce that sources can now access our SecureDrop document-submission website using HTTPS. Although SecureDrop connections were already encrypted previously, our new setup provides leakers with additional assurance that they are connecting with the authentic Intercept SecureDrop and not an impostor.
-
I’ve been laying this explanation out since USA Today provided new details on DEA’s International Dragnet, but it’s clear it needs to be done in more systematic fashion, because really smart people continue to mistakenly treat the Section 215 database as the analogue to the DEA dragnet described by USAT, which it’s not. There are at least five known telecommunications dragnets (some of which appear to integrate other kinds of metadata, especially Internet metadata).
-
Civil Rights
-
It’s been a tough week for the student movement in Quebec. A fractious congress that resulted in the resignation and firing of the entire executive of the Association pour une solidarité syndicale étudiante, the largest student federation in the province, led into a week where schools already on strike have struggled to win votes to maintain that strike, and few if any new schools have joined them. Facing a growing consensus that the strike should be postponed until the fall in order to join public sector unions in a common front, striking students are vulnerable.
-
The Indian government has frozen bank accounts of Greenpeace after accusing the international environment campaign group of encouraging “anti-development” protests in the emerging economic power.
The Union Home Ministry on Thursday suspended the official registration for foreign funding of Greenpeace India for six months and froze seven bank accounts connected with the organisation, The Hindu, a local newspaper, reported.
Samit Aich, the executive director of Greenpeace, said the move was “an attack on democracy”.
-
The Pasco County Sheriff’s Office has charged Domanik Green, an eighth-grader at Paul R. Smith Middle School, with an offense against a computer system and unauthorized access, a felony. Sheriff Chris Nocco said Thursday that Green logged onto the school’s network on March 31 using an administrative-level password without permission. He then changed the background image on a teacher’s computer to one showing two men kissing.
-
A quick and happy update from New Mexico: Gov. Susana Martinez (R) has signed HB 560, which I detailed here, into law. New Mexico has thus effectively abolished civil asset forfeiture by requiring a criminal conviction before the government can seize property.
Permalink
Send this to a friend
04.09.15
Posted in News Roundup at 7:00 pm by Dr. Roy Schestowitz

Contents
-
A few years ago NCR took a fresh look at ATM operations. Cloud computing was becoming more powerful and NCR decided that banks could achieve significant efficiency by moving to a thin client ATM. It chose Android as its first operating operating system but may consider others in the future.
-
You might not think of Dell as a big name in tablets — not on the level of, say, Apple or Samsung. In fact, though, the once-stodgy PC maker sells one of our favorite Android tabs, the Venue 8 7000, which won a Best of CES award and earned a strong score of 84 in our review. Now, the company is back with a 10-inch edition (the Venue 10), and it’s basically a blown-up version of the original, just with some improved ergonomics.
-
-
On Monday, April 20, the Linux Users’ Group of Davis will offer a presentation on KDE Connect, software that lets a phone and computer easily share files, control each other and more.
For example, users can receive their phone notifications on their computer, use their phone as a remote control for their desktop, and easily share photos and other files between devices without using cables.
-
The Instagram account of Snoop Dogg is a mishmash of ideas and various aspects of the artist’s life, but it’s also a personal account. This is where he decided to post a screenshot from a game (GTA IV most probably) of him using a Linux-powered laptop.
-
Desktop
-
Dell announced recently that a new edition of its XPS 13 Ultrabook is now available for purchase on the company’s website, designed especially for developers.
-
The Large Hadron Collider at CERN has been restarted after a two-year hiatus, and it looks like some of the researchers are using Ubuntu and a whole lot of other Linux-related props.
-
Server
-
-
HP has invested billions in its cloud offerings. Now, out of the blue sky, HP is leaving the public cloud business behind.
-
Partnership Enables Stronger DevOps Practices so Companies Can Deploy Applications Faster While Reducing Errors
-
Cumulus Networks, home of a Linux-of-choice for white-box switches, has linked arms with Puppet Labs and joined its Puppet Supported Program.
While it’s “just another” certification from one angle, Puppet’s Carl Caum told The Register it’s important to the company.
He said while there are plenty of tools to manage equipment in the software-defined networks (SDN) space, these pieces of software can only work via the equipment vendors’ APIs – the networking devices themselves remain black boxes.
-
Dell and Red Hat have announced an enhanced edition of the Dell Red Hat Cloud Solution, a co-engineered, enterprise-grade private-cloud solution based on OpenStack. We’ve covered the OpenStack-focused alliance between the two powerful companies before, and the announcement is one of several from Red Hat this week. Working with Red Hat, Dell is effectively becoming an OEM for Red Hat’s software solutions.
-
Converting a dead Xbox 360 to a Linux server is not as difficult as it seems, especially if you only use the case of the console. It’s still a nice try, and it will make a nice addition to the living room.
-
Kernel Space
-
Canonical, through John Johansen, announced today, April 8, that new kernel updates for the Ubuntu 14.04 LTS (Trusty Tahr) and Ubuntu 12.04 LTS (Precise Pangolin) are available to users via the default software repositories of the respective distributions.
-
The Linux Foundation, the nonprofit organization dedicated to accelerating the growth of Linux and collaborative development, today announced it will host the Internet Security Research Group (ISRG) and its Let’s Encrypt project, a free, automated and open security certificate authority for the public’s benefit. Let’s Encrypt allows website owners to obtain security certificates within minutes, enabling a safer web experience for all.
-
The Linux Foundation will now host the Internet Security Research Group and its Let’s Encrypt platform, which provides secure, open SSL encryption for websites.
-
As part of an effort to make encryption a standard component of every application, the Linux Foundation launched its open source Let’s Encrypt project along with its intention to provide access to a free certificate management service.
-
The Linux Foundation is to host an open encryption project aimed at providing a free and easy way to protect the huge amount of data passed over the internet every day.
This data includes usernames and passwords, credit card data, cookies, and other types of sensitive or personal information.
-
The Linux Foundation is lending support to the Let’s Encrypt project, to make it both free and simple for any Web server to encrypt connections
-
The Linux Foundation has lined up financial support for a group producing an easier way to encrypt Web site and mobile device traffic.
-
-
Open Source Encryption For Everyone [Ed: but to make encryption work one must use it on top of a Free software stack]
This version of the software is designed for Windows desktop computers, but further versions for other operating systems and mobile devices are in the pipeline. The research team is also working on various add-ons, including one that supports ad hoc encryption.
-
Graphics Stack
-
After almost two years of the X.Org Foundation’s Board of Directors pursuing a merger with SPI, the 2015 X.Org Elections have ended and the results were sent out to X.Org members last night.
-
While AMD has yet to make the Catalyst 15.3 Beta Linux graphics driver available for download from their web-site, they released the driver to Canonical and as such this new AMD Linux driver has been available in Ubuntu 15.04 for a few weeks. Canonical is now back-porting this proprietary driver back into Ubuntu 14.04 LTS Trusty Tahr.
-
Applications
-
Plasma 5 is about to become part of the mainstream Linux distributions, and we are getting more and more feedback about this new platform. This blog post is a reaction to this increasing feedback from our users.
Plasma5 introduces the KDE Frameworks 5 platform (or KF5) which uses Qt5 as it’s foundation. This new platform aims to replace the legacy KDE4 platform, which was mainly the old monolithic kdelibs. More and more applications got ported to this new platform. Just stay tuned with the next release announcement, which is imminent. However, some applications, and among them some important ones, are not yet ported to the KF5 platform. And this brings on, or more appropriately reminds, the coinstalability matter.
-
Andrea Scarpino announced today, April 8, that the Choqok instant messenger application used by default in the KDE desktop environment is about to be ported to the KDE Frameworks 5 infrastructures.
-
Of course, for popular bugzilla fields we should make sure the command line tool has an explicit and document option, but this takes the pressure off of us to add an option for every custom Red Hat extension.
-
-
Instructionals/Technical
-
-
-
-
-
-
-
-
-
-
-
The Linux Learner Bundle is a crash course in Linux for beginners and you can learn Linux in just 5 days and we have the Linux Learner Bundle for just $49 a saving of 91% off the normal retail price of $601 in the Geeky Gadgets Deals store.
-
Games
-
Aside from demonstrating that Linux CAN be used for gaming, SteamOS will have another great advantage for the Linux gaming community: it will bring a lot of casual gamers that will be looking for a different experience into the world of Linux. This move should increase the percentage of Linux gamers enough to make PC gamers curious, and game developers willing to take a leap of faith and create games for Linux as well.
-
OpenTTD, an open source simulation game based on the popular Microprose title Transport Tycoon written by Chris Sawyer, has been upgraded once more and the developers have added a number of features and important.
-
I have been waiting rather impatiently for this, as the initial Linux release of Chivalry: Medieval Warfare contained many crash to desktop bugs.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
A Calligra developer wrote an interesting post on his blog informing users about the progress made on porting the KDE’s number one office suite to the next-generation KDE Frameworks 5 and Qt 5 technologies that are being used in the KDE Plasma 5 desktop environment.
-
Last month, in March, with the 2.9.0 release done, we Calligra developers followed our plans and started a branch named “frameworks”, to work on version 3.0, to be the first version based on Qt5 and KDE Frameworks 5. Calligra 3.0 should not see any new features, the focus is purely on getting the port to the new platform done without any regressions.
-
The great team of developers behind the KDE Project met in February 2015 in the Blue Systems office in Barcelona, Spain, to discuss and plan the upcoming features that will be implemented in the highly anticipated KDE Plasma 5.3 release.
-
-
New Releases
-
Every revolution starts with a small step. Semplice 7 is ours.
-
Eugenio Paolantonio announced on April 8, 2015, the immediate availability for download of his Semplice 7 Linux operating system, a Debian Sid-based distribution powered by the latest Linux 3.19.3 kernel and built around the Openbox window manager.
-
Evolve OS recently changed its name to Solus and the developers are now trying to put some order into the normal chaos that surrounds most of the distros. They intend to have a precise schedule and to work on several important features.
-
Bella OS is a beautiful and user friendly 64bit Linux desktop operating system.
Launch release version 2.2 is now live!
-
Screenshots
-
Arch Family
-
The Manjaro Linux development team announced a few days ago that a new update is available for its stable operating systems, Manjaro Linux 0.8.12, bringing all sorts of improvements and the latest versions of pre-installed components.
-
A few days ago, Manjaro Linux developer Philip Müller informed all Manjaro users that the SSL (Secure Sockets Layer) certificate of their manjaro.org website where the Wiki and Forum of the project are hosted has expired and that they forgot to update it in time to not create any accessibility issues.
-
Red Hat Family
-
Open Source software developer Red Hat (RHT) is hosting its annual North American Partner Conference this week in Orlando, where more than 350 partners are gathered to hear company executives discuss the past fiscal year and to learn more about what is in store for resellers in 2015.
-
Red Hat senior manager, Colin McCabe, has laid out the opportunities and possibilities businesses should consider when deciding on implementing and open source solutions.
“Open source is a great fit for any organisation that is looking to innovate more rapidly and effectively, and to save costs and increase the bottom line,” he said.
“At Red Hat, we’ve been working for over two decades to maintain the open source model. It’s in Red Hat’s DNA to unravel complex technology challenges ranging from Cloud applications to content management using open source solutions. Red Hat is part of different open source communities and works on a variety of projects.
-
Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced the winners of its annual Red Hat North American Partner Awards. The winners were announced last night at an event held during the Red Hat North American Partner Conference in Orlando, Fla.
-
Fedora
-
While Fedora developers did a good job getting out the Fedora 22 Alpha on time, the beta release of Fedora 22 will come at least one week late.
At today’s Go/No-Go meeting it was decided F22 Beta isn’t ready to ship next week but will have to be delayed by one week at least to take care of unresolved blocker bugs. This beta delay pushes back all future F22 milestones — including the release of F22 final expected to take place in May.
-
Debian Family
-
The Debian Project Leader electsions are going on. This is the yearly election for the leader, where members of the project vote for a new leader for a year. The debate this year seemed to me to be quite quiet, and voting activity seems to not be very high, either. Pity. Many years ago, the election period used to be quite energetic, bringing up some quite good viewpoints.
-
Derivatives
-
Canonical/Ubuntu
-
digiKam is an Open-Source project Photos management software, specially for KDE but you can use it on Ubuntu or others distros too. In digiKam photos are organized in albums which can be sorted chronologically, by folder layout or by custom collections. Developers recently released digiKam 4.9.0 with 33 bug fixes. Developers main focus is on digiKam 5.0 release, as it is supposed to be a major release of digiKam.
-
We were recently informed by Željko Popivoda, the developer of the Linux AIO project that builds all sorts of Live DVDs with multiple editions of an operating system, that there’s an update for the Linux AIO Ubuntu Live DVD.
-
Canonical has a series of automated testing methods for Ubuntu Touch which helps them weed out most of the bugs and problems before publishing updates for the operating system, and now they have set up a new lab that should find apps that are draining the battery.
-
I work as a systems administrator and frequently write and speak about my work in that role. My current position is with HP on the OpenStack Project Infrastructure where we maintain dozens of static systems that developers interface with for their work on OpenStack and a fleet of hundreds of worker servers that run all of the tests that are done against the code before it’s merged. This infrastructure is fully open source, with all of our system configurations, Puppet tooling and projects we used available via git here. Since I have a passion for both systems administration and open source, it’s been quite the dream job for me as I work with colleagues from around the world, across several companies.
-
Details about a Libtasn1 vulnerability that was affecting Ubuntu 14.10, Ubuntu 14.04 LTS, Ubuntu 12.04 LTS, and Ubuntu 10.04 LTS have been published in a security notice by Canonical.
-
Canonical has been talking about convergence for a while now, but it’s still difficult to explain it to new users without some visual aid. A new video has been posted showing the Ubuntu web browser, an application developed initially for the phone OS, running in the desktop edition Ubuntu 15.04.
-
ZaReason and System76 have each launched Intel NUC style mini-PCs running Ubuntu on 5th Gen. Intel Core “Broadwell” processors, starting at about $500.
-
The Ubuntu MX4 is yet to receive an official price or release date, but our opening impressions of it are very positive.
Featuring a premium design, innovative operating system, and decent internal specifications the MX4 looks like a great smartphone.
We also have to praise Canonical for the great work it’s done over the past year to improve Ubuntu mobile’s stability and performance, and can’t wait to test the OS more thoroughly.
-
Flavours and Variants
-
Gabriele Martina announced on April 8 the immediate availability for download of the SalentOS 14.04.2 Linux distribution based on the upstream Ubuntu 14.04.2 LTS (Trusty Tahr) operating system from Canonical.
-
After a successful release of Linux Mint 17 ‘Qiana’ and Linux Mint 17.1 ‘Rebecca’ here is a preparation for another successful release Linux Mint 17.2. On April, 8 Clem posted news on blog.linuxmint.com saying the next release Linux Mint 17.2 has been codenamed ‘Rafaela’. Here is what Rafaela means. Tell us Is it religious?
-
Recently, the developers have announced that Linux Mint 17.2 (based on Ubuntu Trusty) will be named “Rafaela”, the tradition being to use feminine names. The codenames of major releases use the next letter, from the alphabet, while the point releases’ names start all with the same letter.
-
-
At IDF Shenzhen, Intel announced plans for a rugged IoT version of the Intel Atom x3 SoC, with built in cellular radios, and both Linux and Android support.
At the Intel Development Forum (IDF) in Shenzhen, China, Intel announced a future Internet of Things version of its new Atom x3 (Sofia) system-on-chips, some of which are built by China-based Rockchip. Intel announced the Atom x3 at Mobile World Congress in early March along with the more powerful, 14nm fabricated “Cherry Trail-T” Atoms, the Atom x5 and x7.
-
Phones
-
Tizen
-
We were overjoyed to see a high profile messaging app like WhatsApp available on the Tizen Store at launch for the Samsung Z1. Now it seems the WhatsApp Android App, which used Open Mobile’s ACL technology to run on Tizen, has served its purpose and a Native App has launched today with WhatsApp Messenger being replaced.
-
Currys electronics, a UK online and In-store retailer has now got the Tizen based Samsung 2015 TV range In stock and available to buy right now!!! It seems it is only the larger branches that currently have some stock of the UE65JS9000 65″ at £3,999 and UE55JS9000 55″ at £3,099.
-
Have you ever passed your phone to someone for them to use, only to see them going through your private pictures? This is something that seems more common in the Indian sub-continent and it is VERY annoying. To the rescue we have the SecretVault App that allows you to easily hide your pictures, Videos, Audios, and any other files that you do not want others to see.
-
Android
-
It usually takes months for mobile devices to get Android updates, but Intel and Google want to slash the wait time.
Tablets and smartphones made as part of a new Intel mobile-device development program will be able to receive new Android versions and features in two weeks via over-the-air upgrades.
-
-
-
Reviews of Tim’s Apple Watch are pouring in, mixing like oil and water. Most reviewers agree that Apple’s new shiny timepiece isn’t fully perfected. That being said, the chief contention among reviews relate to degree and magnitude of imperfection. In other words, many reviewers can’t agree on (if or by) how much the Apple Watch sucks.
-
Apple has spared no opportunity to advertise how customizable its debut smartwatch is, thanks to the promised number of bands wearers will be able to swap in and out. Unsurprisingly Google wants to take some of the wind out of those sails. The company has taken this moment to highlight a set of straps available for various Android Wear devices from the likes of Clockwork Synergy, E3 Supply Co., and Worn & Wound.
-
The Apple Watch hits stores in just two weeks, and based on the reviews, it’s both an impressive bit of modern technology and a beautiful piece of jewelry. But the Apple Watch isn’t the only smartwatch on the market.
Apple’s nemesis, Google, already has its own watch operating system, Android Wear, and companies like Samsung, LG, and Motorola make smartwatches that run it. What’s more, these Google watches are less expensive than the Apple Watch and come in a host of different styles.
-
The Android 5.1 Lollipop update for the Nexus 5 is finally starting to roll out to additional owners of the smartphone almost a month after being initially announced by Google.
-
As previously announced, Sony has started pushing Android Lollipop out to Xperia Z2 and Z2 tablet devices all over the world. These updates are going out in phases and vary according to your region and carrier, so you still may have to exercise patience a bit longer.
-
As it turns out, Google has been listening to your feedback and has decided to reintroduce month view to its Calendar app. Since Google updated the Calendar app alongside the jump to Android 5.0 Lollipop, many users have been begging the company to bring back the month overview so they can see more events at one time.
-
A new Nexus 7 Android 5.1 update has been confirmed thanks to Google’s Android Open Source Project and it’s probably not the one that many Nexus 7 users were expecting.
-
-
While Sony is gearing up to release its fourth Xperia Z phone, some phablet fans are still sitting pretty with the original’s larger-than-life cousin, the Xperia Z Ultra. For those who opted to keep things pure, the GPe variant was the way to go. Fortunately, Google hasn’t forgotten about the largest phone to have been offered with stock Android, as the just a few days after Android 5.1 hit LG’s G Pad 8.3 GPe, it’s now time for the Z Ultra GPe to receive the latest Lollipop build.
-
Multitasking is great, but smartphones will never offer a multitasking experience on par with desktop devices because they just don’t have enough screen real estate. That doesn’t mean switching back and forth from app to app is the only way to go on mobile phones, however, and a great Android app called Flynx has come up with a simple and elegant solution that you really have to check out.
-
Mozilla announced Firefox for Android hit a big milestone today: 100 million downloads. The figure is confirmed on Google Play, where the app now shows the installs category is in the “100,000,000 – 500,000,000″ range.
-
For the longest time, Amazon enticed users to choose the Fire tablet with exclusive access to Prime Instant Video; despite the fact that Fire devices run a version of Android, purely Android tablets were denied the benefits of their modified brethren. Yesterday, though, that finally changed — Amazon unceremoniously made the Prime Instant Video app available to all Android tablets.
-
ScrollBack is a new, open source community management tool that offers the extensive reach of social media, the engagement and archival abilities of forums, and the interactive and real time experience of chat.
-
For those of you who are more “bah humbug” than “pass the eggnog”, Santa Tracker offers an online method of tracking Santa’s fictional progress through the logistical chore of stuffing soon-to-be-ignored amusing plastic tat down the chimneys of the world’s best-fed and most-privileged children.
-
Twenty years ago, open source was a cause. Ten years ago, it was the underdog. Today, it sits upon the Iron Throne ruling all it surveys. Software engineers now use open source frameworks, languages, and tools in almost all projects.
-
Many companies say they love open source, but what does that actually mean? Does it mean they use a lot of software other people have written? Does it mean they like that they don’t have to pay for things? Or do they understand that loving open source also means contributing back to the community the code came from?
-
Web Browsers
-
Chrome
-
High DPI screens are beginning to show in an increasing number of devices, and developers need to adjust their applications to support it. The Chromium developers have just added this feature for the Linux platform.
-
Databases
-
-
MariaDB has announced the Spring 2015 release of MariaDB Enterprise, which will include new scalability and security capabilities.
Research from Wikibon has predicted that the Big Data database market will reach $4.5 billion in 2017, which represents a large rise from $2.7bn in 2014. It is expected that SQP will represent 64% of the database market.
-
-
Google is dropping encryption into MariaDB, the fork of Oracle’s MySQL, to help shut out SQL injection attacks.
-
The MariaDB Enterprise Spring 2015 release introduces optimised server executables that are claimed to increase overall database performance by over 15 percent, as well as enhanced high availability and scalability on IBM’s Power8 server platform, and updates to the firm’s MaxScale database proxy tool to boost security.
-
CMS
-
The Git revision control system is “at the center” of Drupal’s hyper-collaborative community says Drupal core committer Angie Byron. The open source content management platform has 37,802 developers with Git commit access, and about 1,300 actively committing each month, she says.
-
Open source will remain the best way to achieve a better developer experience, and as it grows in popularity, engaging with neighbor technology will become easier. Reusing existing components and becoming more distributed will be less complex. Thanks to open source, developers are able to work faster and more efficiently, which is good for business. But this is just the beginning. Open source has taken the CMS development experience to a whole new level, and it doesn’t look like it’s slowing down anytime soon.
-
The Federal Bureau of Investigation issued an alert on April 7 about the potential danger of Islamic State (ISIS) terrorists abusing vulnerabilities in the open-source WordPress blog and content management system software.
-
Funding
-
Google has a program for their employees called 20% time that allows them to work on a side project one day a week. It’s how Carol Smith came to manage their Google Summer of Code (GSoC) program over 5 years ago. That, and learning about the job from the program manager at the time, Leslie Hawthorn, who later left Google in 2010, opening up the job for Smith.
-
BSD
-
DragonFlyBSD developers have updated their ACPI power management implementation against Intel’s ACPICA code as of yesterday.
With this commit pushed out today, it syncs the ACPICA code in the DragonFlyBSD kernel against Intel’s newest reference code. This contains the first part of upstream DragonFlyBSD support, the Windows 10 _OSI string was added, printf issue fixes, and other changes.
Details on the ACPI Component Architecture can be found at ACPICA.org.
-
Openness/Sharing
-
The Greek government has held a three-day public consultation on the re-opening of the public TV channel ERT. The consultation was opened on the national open government portal, opengov.gr, on March 9 and closed on March 12 at 10.00. In total, 583 comments were added by Greek citizens.
-
Security
-
A security flaw in New South Wales’ Internet voting system may have left as many as 66,000 votes vulnerable to interception and manipulation in a recent election, according to security researchers. Despite repeated assurances from the Electoral Commission that all Internet votes are “fully encrypted and safeguarded,” six days into online voting, Michigan Computer Science Professor J. Alex Halderman and University of Melbourne Research Fellow Vanessa Teague discovered a FREAK flaw that could allow an attacker to intercept votes and inject their own code to change those votes, all without leaving any trace of the manipulation. (FREAK stands for Factoring RSA Export Keys and refers to the exploitation of a weakness in the SSL/TLS protocol that allows attackers to force browsers to use weak encryption keys.) But instead of taking the researchers’ message to heart, officials instead attacked the messengers.
-
I figure 24 hours is about the amount of time it takes from a security patch to be released until weaponized exploits show up. After that, if you’re not patched, you’re living dangerously, depending on the nature of the bug. Bundling new features with a high risk of regression with security fixes means users wait to upgrade.
The iOS 8.3 update is 280MB. It can’t even be downloaded over the air, only via wifi. Security patches are important enough that they should always be made available separately. Then I could download them, even OTA, without fear of regression.
What aggravates me most is that this is business as usual. As always. We’re training people not to patch. Users should be embarrassed to admit they’re running unpatched software; instead it’s regarded as the prudent choice.
-
The certificate was issued by Google Internet Certificate Authority G2, which issues digital certificates for Google web sites and properties.
-
Experts have repeated conference data security warnings after it was revealed the personal details of thousands of conference delegates may have been leaked in Australia after a data breach.
-
Linux Australia had a bit of a nightmare Easter Weekend.
While the rest of us were loafing at the beach, the Penguinistas from Down Under were owning up to a pretty extensive cyberintrusion.
The team has published a decent document setting out what happened, and it went something like this:
Crooks broke into the organisation’s Conference Management server.
Crooks got root on the server.
Crooks installed a remote access Trojan (RAT) for later.
Crooks rebooted the server and activated the RAT.
Crooks “logged in” again and installed zombie malware, also known as a bot.
While the crooks had access, a conference database backup took place to the server.
Ironically, the backup that was intended to deliver one leg of the “security trinity” (availability) ended up hurting one of the other legs (confidentiality).
-
All your systems are Fedora 21, RHEL 7.1 or Ubuntu 14.02 all is working fine as the included SSSD is new enough to handle 2FA. All kerberized services can be used with 2FA w/o logging in again during the validity of your Kerberos ticket. Very convenient, very secure.
[...]
2FA works well, convenient and secure in a datacenter and office environment. Notebooks are fine as well as long as there is a network connection available. The mobile world (Smartphones and Tablets) is not yet ready for 2FA. Some issues can be worked around (with some drawbacks) while others render 2FA not usable at all (offline usage).
Hopefully there will be some smart solutions available for mobile usage soon, as mobile usage causes the most of the security headaches.
-
-
Defence/Police/Secrecy/Aggression
-
This is something out of Alice in Wonderland. The Islamic Republic of Iran, born in 1979, has not attacked another country. (With U.S. help, Iraq attacked Iran in 1980.) In contrast, Israel has attacked its Arab neighbors several times its founding, including two devastating invasions and a long occupation of Lebanon, not to mention repeated onslaughts in the Gaza Strip and the military occupation of the West Bank. Israel has also repeatedly threatened war against Iran and engaged in covert and proxy warfare, including the assassination of scientists. Even with Iran progressing toward a nuclear agreement, Israel (like the United States) continues to threaten Iran.
-
-
The former head of the CIA in Pakistan should be tried for murder and waging war against the country, a high court judge ruled on Tuesday.
Criminal charges against Jonathan Banks, the former CIA station chief in Islamabad, were ordered in relation to a December 2009 attack by a US drone which reportedly killed at least three people.
-
A Pakistani court on Tuesday ordered criminal charges to be filed against a former C.I.A. station chief and a former C.I.A. lawyer over a 2009 drone strike that killed two people.
-
As tons of desperately needed medical supplies await clearance to be flown into Yemen, aid workers warned Tuesday of an unfolding humanitarian crisis, saying at least 560 people, including dozens of children, have been killed, mostly in a Saudi-led air campaign and battles between Shiite rebels and forces loyal to the embattled president.
More than 1,700 people have been wounded and another 100,000 have fled their homes as fighting intensified over the past three weeks, the World Health Organization said.
-
The CIA’s drone base in the rippled surface of the Saudi Arabian desert has undergone major renovations over the past few years. Satellite imagery shows dozens of additions that appear to include living quarters, a new clamshell hangar for hiding aircraft and neat rows of freshly planted palm trees.
-
Last year, after concluding that many passages in the document “no longer merited secrecy,” the Second Circuit published a redacted version of the Justice Department’s July 2010 Office of Legal Council memo that approved the “targeted killing” of Anwar al-Aulaqi. The court’s view was that government officials had already disclosed much of the information they were trying to withhold. In speeches, media interviews, and congressional testimony, officials had acknowledged the government’s role in the strike that killed al-Aulaqi, explained the purported legal basis for the strike, and invoked still-secret OLC memos to reassure the public that the strike was lawful. Having done all of this, the court said, the government couldn’t plausibly claim that the entirety of the July 2010 memo was still secret, and it couldn’t lawfully withhold the entirety of the memo under the Freedom of Information Act.
From one perspective, the Second Circuit’s ruling was a victory for transparency. Human rights groups and media organizations had been calling for the release of the legal memos underlying the targeted-killing program; thanks to the Second Circuit’s ruling, one of those memos — arguably the most important one — was made public. From another perspective, the court’s ruling wasn’t very significant at all. The ruling didn’t expose secrets. By its own terms, it exposed facts and legal analysis that had already been disclosed.
-
Jameel Jaffer has a post on the government’s latest crazy-talk in the ongoing ACLU and NYT effort to liberate more drone memos. He describes how — in the government’s response to their appeal of the latest decisions on the Anwar al-Awlaki FOIA — the government claims the Court’s release of an OLC memo does not constitute official release of that memo. (Note, I wouldn’t be surprised if the government is making this claim in anticipation of orders to release torture pictures in ACLU’s torture FOIA suit that’s about to head to the 2nd Circuit.)
But there’s another interesting aspect of that brief. It provides heavily redacted discussion of the things Judge Colleen McMahon permitted the government to withhold. But it makes it clear that one of those things is a March 2002 OLC memo that offers different analysis about the assassination ban than the analysis used to kill Anwar al-Awlaki.
-
Transparency Reporting
-
The AMA saw Assange fielding questions alongside Sarah Harrison, Renata Avila and Andy Müller-Maguhn, who were all representing the Courage Foundation, an organization which runs the official defense funds of whistleblowers. Assange spoke of how he believes the NSA leaks impacted society and its relationship with the government, along with outlining his thoughts on how the public can help protect whistleblowers, and offering his opinion on whether or not the average Joe’s and Jane’s can have any influence on how the government operates in regards to the privacy of its citizens.
-
Environment/Energy/Wildlife
-
An oilfield near Gatwick airport could hold up to 100bn barrels of oil, according to a British exploration firm, in possibly the biggest onshore oil discovery in England since the 1980s.
UK Oil and Gas Investments revealed it had found a “world-class potential resource” after drilling 3,000ft below ground in West Sussex. However, UKOG said only 3-15% of the total would be recovered, based on similar finds in the US.
-
For union organizers in Colombia, the dangers of their trade were intensifying. When workers at the country’s largest independent oil company staged a strike in 2011, the Colombian military rounded them up at gunpoint and threatened violence if they failed to disband, according to human rights organizations. Similar intimidation tactics against the workers, say labor leaders, amounted to an everyday feature of life.
-
Finance
-
Hollywood moguls and the vast majority of leftist entertainers have joined forces in a last-ditch effort to bully wavering Democratic lawmakers into backing President Obama’s fast-track authority for the Trans-Pacific Partnership (TPP) as the centerpiece of what he calls his “pro-trade agenda.”
-
WikiLeaks did more than expose governmental eavesdropping and foreign policy blunders: A 2009 data dump is shedding new light on the spat between Delta, United, and American and the three largest Gulf carriers over government subsidies and Open Skies agreements.
The Business Travel Coalition, which backs retaining Open Skies agreements and is seeking to counter the U.S. carriers’ charges that Emirates, Qatar, and Etihad received $42 billion in unfair government subsidies, uncovered a U.S. congressional report, disclosed by WikiLeaks in 2009, that documents how U.S. aviation, including commercial airlines, the FAA, and airports, received $155 billion in federal direct spending from 1918 to 1998.
-
-
Last month I was asked to speak at a conference in the City of London on the ethical issues surrounding new payment systems. The audience was packed with people working on innovative things like payment apps for smart phones and ‘contactless payments,’ where you can just wave a card or a phone over a terminal.
Their new financial technologies are rapidly changing the way we pay for everything. This may be convenient, but as wand-waving and other high-tech alternatives to cash become the only ways to pay for anything, what happens if the wand loses its magic? What are the costs of becoming entirely dependent on technology in a cashless society?
[...]
This uncertainty is related to a second issue—that of anti-competitive practices. Visa and Mastercard already account for over 80 percent of the credit card market worldwide, and well over 90 per cent in many countries. The Financial Times refers to this situation as “a well-protected oligopoly” and so, for them, a good investment. Yet it also represents a hitherto unimaginable degree of control over the means of payment. Even if policies are adopted to diversify this market or—if that doesn’t work—to break up these oligopolies directly, such unprecedented levels of control raise a third area of concern in the form of peoples’ rights to privacy.
-
PR/AstroTurf/Lobbying
-
The proponents of the Trans-Pacific Partnership (TPP) are doing everything they can to try to push their case as they prepare for the fast-track vote before Congress this month. Roger Altman, a Wall Street investment banker and former Clinton administration Treasury official, weighed with a New York Times column, co-authored by Richard Haass, the president of the Council on Foreign Relations.
They begin by giving us three “myths”–all of which happen to be accurate depictions of reality. The first “myth” is that trade agreements have hurt US manufacturing workers and thereby the labor market more generally. Altman and Haas cite work by MIT economist David Autor showing that trade with China has reduced manufacturing employment by 21 percent, but then assert that the problem is trade not trade agreements.
-
Hillary Clinton is betting that if Stephanie Hannon can handle natural disasters, she can certainly handle a controversial presidential campaign.
Hannon, Google’s director or product management, has left the Internet giant to take over as the chief technology officer for Clinton’s still unannounced presidential campaign.
-
Hillary Clinton has hired Stephanie Hannon, Google’s director of product management for civic innovation and social impact, as chief technology officer for her potential presidential campaign, fueling accusations from Julian Assange that Google is in bed with the US government.
Privacy
-
The FBI wants to make us all less safe. At least that’s the implication from FBI director Jim Comey’s push to ban unbreakable encryption and deliberately weaken everyone’s security. And it’s past time that the White House makes its position clear once and for all.
Comey was back before Congress this week – this time in front of the House Appropriations Committee – imploring Congressmen to pass a law that would force tech companies to create a backdoor in any phone or communications tool that uses encryption.
-
A DEA official said, “Parallel construction is a law enforcement technique we use every day. It’s decades old, a bedrock concept.”
-
In a Chicago court, several Facebook users filed a class-action lawsuit against the social media giant for allegedly violating its users’ privacy rights to acquire the largest privately held stash of biometric face-recognition data in the world.
The court documents reveal claims that “Facebook began violating the Illinois Biometric Information Privacy Act (IBIPA) of 2008 in 2010, in a purported attempt to make the process of tagging friends easier.”
-
Have you been trying to convince friends and family to use encryption in light on the NSA revelations and had little success? Otr.to is a newly released web based chat client that requires no installation and offers OTR encryption via JavaScript libraries. With no installs necessary, sending encrypted messages to your least technical friends should be a lot less challenging.
-
Desjardins Insurance has launched a smartphone app that tracks driver behaviour in return for the promise of substantial savings on car insurance, the first of its type in Canada, the company says.
-
It’s been almost ten years since Laura Poitras’ name has been on the NSA Watch List. Every time she returns to her home country, security agents wait for her, somewhere between the gate of the plane and the US Immigration booth. They take her away to a room, confiscate her gear, her notebooks, and her videos. They question her and copy her hard drives. This has happened to her at least forty times since 2006.
-
Francesca Hogi, 40, had settled into her aisle seat for the flight from New York to London when the man assigned to the adjoining window seat arrived and refused to sit down. He said his religion prevented him from sitting beside a woman who was not his wife. Irritated but eager to get underway, she eventually agreed to move.
-
Comedy host John Oliver conducted an interview with National Security Agency whistleblower Edward Snowden in Moscow recently that was broadcast Sunday on his HBO show “Last Week Tonight with John Oliver.” In the process, Oliver exposed his solidarity with the American state and its vast, illegal spying operations. He took the opportunity of the conversation to come out harshly against Snowden’s decision to leak large quantities of NSA documents.
Pushing for a confession that his actions were potentially “harmful,” the British-born Oliver demanded to know whether Snowden had personally read every single document contained in the files that the former NSA employee transferred to journalists beginning in the summer of 2013.
“I have evaluated all of the documents that are in the archive. I do understand what I turned over,” Snowden replied.
“There’s a difference between understanding what’s in the documents and reading what’s in the documents. Because when you’re handing over thousands of NSA documents, the last thing you’d want to do is read them,” Oliver retorted sarcastically. He went on, “You have to own that. You’re giving documents with information that could be harmful.”
Oliver repeated the favored arguments of the Obama administration and intelligence establishment to the effect that the preservation of “national security” required the elimination of civil liberties, such as Fourth Amendment protections against arbitrary searches and seizures.
-
In about 10 days, Congress will take up cyber information sharing bills. And unlike past attempts, these bills are likely to pass.
That, in spite of the fact that no one has yet explained how they’ll make a significant difference in preventing hacks.
So I’m going to try to examine roughly one hack a day that immunized swift information sharing between the government and the private sector wouldn’t prevent.
-
Hundreds of thousands of travelers cross US borders every day. And none of them—save the precious few with diplomatic immunity—have any right to privacy, according to Department of Homeland Security documents recently obtained by MuckRock.
The US Department of Homeland Security’s (DHS) Privacy Impact Assessment for the Border Searches of Electronic Devices outlines the finer points of border officials’ authority to search the electronic devices of citizens and non-citizens alike crossing the US border. What becomes clear is that this authority has been broadly interpreted to mean that any device brought into or out of the country is subject to the highest level of scrutiny, even when there is no explicit probable cause.
Based upon little more than the opinion of a single US Customs and Border Patrol (CBP) officer, any device can be searched and its contents read. With approval from a supervisor, the device can be seized, its contents copied in full, or both.
-
Finally, we must briefly push back on Carrie’s statement that “changing FISA’s standard to a ‘significant purpose’ . . . has been overwhelmingly understood as an important substantive correction.” We may be traveling in somewhat different circles, but that hasn’t been our experience. Rather, among colleagues in our field, this change is widely viewed as the moment in which FISA became an existential threat to the Fourth Amendment’s warrant requirement in ordinary criminal cases. The “correction” that’s needed is to restore the primary purpose test.
-
I mention this because a lot of people seem concerned that the “cyber threat sharing” bills in congress (CISA/CISPA) will divulge private information to the NSA. This is nonsense. The issue is private information exposed to the FBI and other domestic agencies. It’s the FBI, ATF, or DEA that will come break down your door and arrest you, not the NSA.
-
Federal prosecutors have portrayed wealthy Mexican businessman José Susumo Azano Matsura as a supervillain who was always one step ahead of the law. For two decades, prosecutors said, federal agents investigated Azano for drug trafficking, money laundering, extortion and tax fraud to no avail before he was popped last year on charges he illegally donated to San Diego politicians.
But the relationship between Azano and the U.S. government is more complicated than the Justice Department has let on.
-
Trying to get a handle on hundreds of sensitive, closely held surveillance programs, a Senate committee is compiling a secret encyclopedia of American intelligence collection. It’s part of an effort to improve congressional oversight of the government’s sprawling global spying effort.
Sen. Dianne Feinstein launched the review in October 2013, after a leak by former National Security Agency systems administrator Edward Snowden disclosed that the NSA had been eavesdropping on German Chancellor Angela Merkel’s cellphone. Four months earlier, Snowden had revealed the existence of other programs that vacuumed up Americans’ and foreigners’ phone call records and electronic communications.
“We’re trying right now to look at every intelligence program,” Feinstein told The Associated Press. “There are hundreds of programs we have found … sprinkled all over. Many people in the departments don’t even know (they) are going on.”
Feinstein and other lawmakers say they were fully briefed about the most controversial programs leaked by Snowden, the NSA’s collection of American phone records and the agency’s access to U.S. tech company accounts in targeting foreigners through its PRISM program. Those programs are conducted under acts of Congress, supervised by a secret federal court.
-
A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.
Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin – not only from defense lawyers but also sometimes from prosecutors and judges.
-
The Baltimore Police Department has used secretive cellphone surveillance equipment 4,300 times and believes it is under orders by the U.S. government to withhold evidence from criminal trials and ignore subpoenas in cases where the device is used, a police detective testified Wednesday.
The unusual testimony in a criminal case marked a rare instance when details have been revealed about the surveillance devices, which the Obama administration has aggressively tried to keep secret. Citing security reasons, the government has intervened in routine state public-records cases and criminal trials, and has advised police not to disclose details.
-
He also details some of the over-inflated claims of other surveillance programs in the past — all of which were later shown to be false. But, the article doesn’t really attempt to answer the question — just raise it. In the past, we’ve noticed that the entire concept of a cost-benefit analysis seems antithetical to the way the surveillance state does business. But why is that?
-
Say what you will about the Baltimore PD and its cell tower spoofers (like… “It would rather let accused criminals go than violate its [bogus] non-disclosure agreement with the FBI…” or “It hides usage of these devices behind pen register/trap and trace warrants and then argues the two collection methods are really the same thing…”), but at least it’s making sure the hundreds of thousands of dollars it’s spent on the technology isn’t going to waste.
Civil Rights
-
On February 13, 2015, former Chicago Police Commander Jon G. Burge was released from federal custody, having served a little less than four years of his four-and-a-half year sentence for lying under oath about whether he tortured scores of African-American men during his time as commander. Less than a week before, I sat across from him in a small room in Tampa, Florida, questioning him, pursuant to a court order, yet again about his role in a torture case—this time, the case of Alonzo Smith, who was repeatedly suffocated with a plastic bag and beaten with a rubber nightstick in the basement of the Area 2 police station by two of Burge’s most violent henchmen after Burge informed him that they “would get him to talk, one way or another.”
-
The New York Times (4/7/15) released a video of a black South Carolina man Walter Scott being shot, casually and without apparent mercy, eight times in the back by white police officer Michael T. Slager. The media’s outrage after the video’s publication was righteous and swift. The state of South Carolina followed suit, filing murder charges against Slager. Indeed, the video offers no ambiguity whatsoever:
-
A white police officer in North Charleston, S.C., was charged with murder on Tuesday after a video surfaced showing him shooting in the back and killing an apparently unarmed black man while the man ran away.
The officer, Michael T. Slager, 33, said he had feared for his life because the man had taken his stun gun in a scuffle after a traffic stop on Saturday. A video, however, shows the officer firing eight times as the man, Walter L. Scott, 50, fled. The North Charleston mayor announced the state charges at a news conference Tuesday evening.
-
Bill O’Reilly cited debunked statistics to claim that more white than black Americans are killed by police officers in the wake of the fatal South Carolina police shooting of an unarmed black man.
A police officer was charged with murder in the shooting death of an unarmed black man in North Charleston, South Carolina on April 7, as reported by The New York Times. The Times noted that “the shooting came on the heels of high-profile instances of police officers’ using lethal force in New York, Cleveland, Ferguson, Mo., and elsewhere. The deaths have set off a national debate over whether the police are too quick to use force, particularly in cases involving black men.”
-
This series of ethnic stereotypes becomes Oren’s whole prism for interpreting the negotiations, which are “an ideal example of how not to buy a Middle Eastern carpet.” He argues: “The Security Council’s five permanent members plus Germany could have offered the lowest possible price as their final bid—take it or leave it. Iran would have had little choice but to sell the carpet.”
When the US and its negotiating partners “recogniz[ed] the Islamic Republic’s right to enrich and to maintain its nuclear facilities,” Oren scolds: “The haggling had scarcely begun and already the merchant profited.” Actually, the right to a peaceful nuclear program was guaranteed to Iran when it signed the Nuclear Non-Proliferation Treaty (FAIR Blog, 4/8/13), but there isn’t really a stereotype that involves the customers of a “merchant” agreeing to respect international law.
-
There’s not an ounce of probable cause to search me at the airport — as I was today at LAX. To violate my body. To touch my breasts. To grope my hair. To have the blue latex-gloved hand of Sharonda Juana Walker, feel inside my turtleneck.
And no, I don’t go through the scanners, and the metal detector line wasn’t an option at just before 7 a.m., when I got to the airport to leave for…no, not an ISIS meet-and-greet but an evolutionary psychology conference in Boston. Apparently, the sparse traffic at the airport at this hour leaves them plenty of time to feel up travelers.
-
The witness hailed as a hero for capturing the shooting of Walter Scott on camera has come forward to speak publicly about the incident for the first time.
Identified by NBC News as Feidin Santana, the man whose video made headlines around the world described the “emotional” moment he handed his vital evidence over to the Scott family.
Mr Santana’s video showed 33-year-old Officer Michael Slager shooting Mr Scott in the back as he runs away, and the witness said he only came forward when the police’s version of events – that Mr Scott had seized control of the officer’s Taser – appeared in the media.
-
Anyone with a sliver of vision and a shred of morality can see this.
South Carolina Patrolman Michael Slager cowardly hid behind his badge when he claimed he felt threatened by Scott after pulling him over for a faulty brake light. Slager alleged that Scott reached for the officer’s stun gun and his life was in danger – Slager said he had no other option but to kill Scott.
Slager lied. Video evidence does not.
That video showed the world that the real victim was Scott, who was shot in the back as he attempted to run from Slager. And the real criminal is Slager, a man who resorted to lethal force after a mere traffic stop.
The facts are clear-cut and the video evidence is undeniable. So why do I keep hearing this statement?
-
A video supplied to The New York Times, showing the shooting death of 50-year-old Walter Scott at the hands of a South Carolina police officer, appears on first viewing to be the latest example of an unarmed black person killed unnecessarily by a white cop.
But it’s so much more than that. Because three days elapsed between the shooting and the publication of the video of the shooting, the Scott incident became an illuminating case study in the routinized process through which police officers, departments and attorneys frame the use of deadly force by American cops in the most sympathetic possible terms, often claiming fear of the very people they killed. In the days after the shooting, the police version of events — an utterly typical example of the form — was trotted out, only to be sharply contradicted when the video surfaced. In most cases like this, there is no video, no definitive, undisputed record of much of what happened, and thus no way to rebut inaccurate statements by the police.
-
Secret mass surveillance conducted by the Drug Enforcement Administration is falling under renewed scrutiny after fresh revelations about the broad scope of the agency’s electronic spying.
-
When Bruce E. Ivins, an Army microbiologist, took a fatal overdose of Tylenol in 2008, the government declared that he had been responsible for the anthrax letter attacks of 2001, which killed five people and set off a nationwide panic, and closed the case.
Now, a former senior F.B.I. agent who ran the anthrax investigation for four years says that the bureau gathered “a staggering amount of exculpatory evidence” regarding Dr. Ivins that remains secret. The former agent, Richard L. Lambert, who spent 24 years at the F.B.I., says he believes it is possible that Dr. Ivins was the anthrax mailer, but he does not think prosecutors could have convicted him had he lived to face criminal charges.
In a lawsuit filed in federal court in Tennessee last Thursday, Mr. Lambert accused the bureau of trying “to railroad the prosecution of Ivins” and, after his suicide, creating “an elaborate perception management campaign” to bolster its claim that he was guilty. Mr. Lambert’s lawsuit accuses the bureau and the Justice Department of forcing his dismissal from a job as senior counterintelligence officer at the Energy Department’s lab in Oak Ridge, Tenn., in retaliation for his dissent on the anthrax case.
-
It was a nasty kind of deja vu at the Times of Israel on Thursday after the website caused an uproar by publishing and then removing an op-ed calling for the mass murder of Palestinians.
-
On a late spring evening eight years ago, police pulled over my mother’s 1997 Oldsmobile Aurora, in the suburb of St. Ann, Missouri, as she raced to pick up a relative from St. Louis’s Lambert International Airport. “Do you know why I stopped you?” the officer asked. “No I don’t,” my mother answered. The police charged her with speeding, but she did not receive a mere ticket. Instead, an officer ran my mother’s name and told her that since she had failed to appear in court for driving without a license, there was a six-year-old warrant out for her arrest. “I just started crying. I couldn’t believe it,” my mother said. The police arrested her and hauled her off to St. Louis County Jail, where authorities eventually allowed her one phone call, which she placed to my stepfather. He said, shaking his head, “I was surprised because I knew she didn’t have no warrants.”
-
Spontaneous dancing remains outlawed in Sweden except in venues with special “dance licences” after a majority in parliament voted down a move to free the feet.
-
Particularly given that the only question of those I posed for my book that Miller did not answer was whether she saw Cheney on the trip to Aspen that she used to explain Scooter Libby’s Aspen letter, I find her admission that she did and does speak to Cheney — though had not, about the war — telling. (Remember, too, that Cheney did not release journalists he had spoken to to reveal him as a source in the way everyone else in the Executive Branch did.)
Miller goes on to present a nonsense story about how Fitzgerald misled her and caused her to testify incorrectly, falsely testifying to the grand jury that Libby had told her Plame was at the CIA back in June. It doesn’t make sense — and doesn’t do anything to undermine the other evidence that would have been sufficient to convict Libby, notably Libby’s own notes and David Addington’s testimony as well as a second, far more important, meeting between Libby and Miller just days before Novak outed Plame.
Maybe Miller just has no fucking clue what got presented at the trial?
But having presented a flimsy excuse to question the verdict against Libby, Miller has presented others with an opportunity to point to another detail she includes in her book: that Fitzgerald offered to drop the charges against Libby if he would testify against Cheney. Again, that’s not surprising. Libby’s lies served to cover up Cheney’s orders to leak stuff to Judy Miller (not in the meeting she newly focuses on, but in the meeting during the week of Novak’s article).
-
“Did the use of pressure cooker bombs,” the jury in the Dzhokhar Tsarnaev trial was asked in several different ways on Wednesday afternoon, “cause the death of Martin Richard?”
“Yes,” the jury declared Tsarnaev’s guilt in the murder of Richard, the 8-year old boy watching the race from the finish line killed in Tsarnaev’s attack on the Boston Marathon two years ago. “Yes,” the jury said, over and over. The jury gave the same response when asked about Tsarnaev’s responsibility for killing Lingzi Lu, a Boston University statistics student; Krystle Campbell, a 29-year old restaurant manager; and Sean Collier, an MIT cop, all of whom he and his brother killed. The jury found Tsarnaev guilty of all 30 counts against him.
-
Last month, Archbishop Desmond Tutu wrote a letter to Leonie Brinkema, the judge in the Jeffrey Sterling trial, calling on her to prove cynicism wrong in her sentencing of Sterling. The letter was docketed this week.
-
We, the undersigned organizations, are writing to urge you to remove the Department of Commerce’s Inspector General, Todd Zinser. Through his actions both before his appointment as IG and since, Mr. Zinser has proven that he is not fit for the position.
IGs are supposed to root out fraud, waste, and abuse—a job they would not be able to do without whistleblowers. If there is anyone in government who should understand the importance of utilizing and protecting whistleblowers, it is an IG.
This is why it is particularly worrisome that there have been multiple allegations and investigations of Mr. Zinser’s own retaliation against whistleblowers. A 2013 report by the Office of Special Counsel found that Mr. Zinser had shielded two top deputies charged with threatening two employees with retaliation if they blew the whistle on mismanagement at the Commerce IG’s office.
Intellectual Monopolies
-
Copyrights
-
Back during the SOPA fight, in a discussion with someone who was working with the politicians pushing SOPA, I pointed out that such a law would encourage much more encryption — and the response was “that’s no problem, because we’ll just ban encryption next.” As stupid and impossible as such a statement is, it shows the mindset of some copyright extremists. Thus, it should be no surprise that they’re actually starting down just such a path in New Zealand. As we noted last year, Kiwi ISPs, frustrated that their users kept running up against geoblocks, have started offering VPN services that get around geoblocks as a standard feature there. Basically, this is nothing more than a recognition that the internet really is global and attempts to pretend otherwise are pretty fruitless.
Permalink
Send this to a friend
04.08.15
Posted in News Roundup at 4:03 pm by Dr. Roy Schestowitz

Contents
-
I adore Linux because I can do what I want on it. My first PC way back in 1994ish was an Apple something. It was fun, and then I got an IBM PC running Windows 3,1 and DOS 5. Windows was useless, so I spent a lot of time in DOS. Then I learned about Linux and never looked back. And Windows is still useless, and Apple is too confining. They both have their little walled gardens, and their primary purpose is lock-in and to keep selling you junk whether you want it or not, and whether or not it’s any good. They think they retain ownership of your stuff that you have purchased, which is a concept that needs to die.
-
Desktop
-
-
Windows 7 – 33.8%
Mac OS X – 21.5%
Linux – 20.5%
Windows 8 – 19.5%
-
Server
-
Gene Kim: It’s called “The DevOps Cookbook,” and it was actually supposed to come out before “The Phoenix Project.” The goal of the book is to put into context the cultural norms, principles, and observed patterns in high-performing organizations that enable fast flow of features from dev to ops while preserving world-class reliability and stability. For me, I think the big surprise three years into this project is that it’s as much about organizational learning as it is about key performance measures.
-
Cloud is the next big front for some serious tech warfare and CoreOS just got the much needed ammunition.
First things first. CoreOS is a company that offers a solution with the same name. And this solution is an extremely light and minimalistic operating system based on Google’s Chrome OS (or you can also call it a fork).
-
Kernel Space
-
Linus Torvalds is mostly known for developing the Linux kernel, but he’s also the one who made Git, the distributed revision control system that’s used today for numerous projects, including the kernel. The project just turned ten years old, and Linus made some comments about this fact.
-
Git has come a long way in the 10 years since Linux creator Linus Torvalds released the first version of the now-popular distributed revision control system. For example, the addition of pull requests came three years after the original release, according to Atlassian. And over time it has added more collaboration tools, code review tools, integration to continuous integration systems, and more, recalls Qt Project core maintainer and software architect at Intel, Thiago Macieira.
-
Radhika Hirannaiah, is currently working as an intern at OpenDaylight. She received a PhD degree in Electrical Engineering from Wichita State University in 2014. Her interests include Software Defined Networking (OpenFlow, OpenDaylight etc), Voice over IP, wireless and working on open source software projects.
-
Systemd’s logind and systemctl components have added support for rebooting to the EFI firmware setup. Running systemctl –firmware-setup (or accessing via systemd’s logind interfaces) will cause the system’s firmware UEFI setup utility to show at next boot as another alternative to just hitting DEL/F2 at boot time or newer distributions that add a boot menu entry to GRUB2 for EFI firmware configuration. Of course, this will only work for newer systems that were originally booted in the EFI mode.
-
Graphics Stack
-
There’s more improvements in Mesa Git to talk about this week for Intel open-source customers, including those still on older “Gen4″ graphics hardware.
-
FreeGLUT, the open-source replacement to GLUT for handling system-specific setup tasks like windowing system configuration and OpenGL initialization, now is natively supported on Wayland.
-
Chris Wilson of Intel’s Open-Source Technology Center hasn’t yet managed the xf86-video-intel 3.0 DDX release, but over in kernel-space, he’s just published a set of 70 new DRM patches for the Intel kernel driver.
-
The Khronos UK Chapter is holding a meeting at the LLVM conference happening one week from today at the Goldsmiths University in London. Vulkan, SPIR-V, and OpenCL 2.1 will be the primary discussion items for the event lasting the afternoon.
-
If you’re not on the NVIDIA 349 Linux beta but rather an older version of NVIDIA’s binary Linux driver, today they released the 346.59 bug-fix release as the latest in their long-lived series.
-
Tom Stellard of AMD has landed initial support into the AMD GPU LLVM back-end for the assembler and supporting inline assembly.
-
Benchmarks
-
It’s been a while since last running any Linux file-system tests on a hard drive considering all of the test systems around here are using solid-state storage and only a few systems commissioned in the Linux benchmarking test farm are using hard drives, but with Linux 4.0 around the corner, here’s a six-way file-system comparison on Linux 4.0 with a HDD using EXT4, Btrfs, XFS, and even NTFS, NILFS2, and ReiserFS.
-
Applications
-
The Qt Installer Framework allows for offline and online installers for Windows, Linux, and OS X. This framework is focused on Qt’s needs but can also be used by other applications as an installer/updater.
-
The application is very simple, lightweight and doesn’t get in your way. In fact, it doesn’t even come with a GUI by default and instead, it only shows an entry in the Ubuntu Sound Menu which allows you to play various relaxing sounds like forest, storm, rain, wind, night, fire, coffee shop or sea.
-
For any object moving through a fluid, forces are applied to the object as the fluid moves around it. A fluid can be something like water, or even something like the air around us. When the object is specifically designed to maximize the forces that the fluid can apply, you can designate these designs as airfoils. A more common name that most people would use is a wing. The shape of a wing, or airfoil, determines the forces that are applied to it when it moves through a fluid or the air. These forces also depend on the speed of motion through the fluid and the direction of flow around the airfoil.
-
In fact, I spent the last month porting Choqok bits from Qt 4 to Qt 5, but I also fixed minor bugs you discover when doing this kind of work. Regressions could happen, so please report them and we’ll fix them!
-
darktable 1.6.4 has been released recently bringing a wide range of improvements, support for new cameras, new white balance presets, new noise profiles, and several updated translations.
-
-
It will probably be a cold day in you-know-where before we ever see a native version of iTunes for Linux. Apple just isn’t interested in supporting Linux. But you actually can run iTunes in Linux via WINE, and if that doesn’t float your boat then there are some native Linux alternatives to iTunes that are worth considering.
-
Most of patool seems to work as command-action-target format, so extracting a file — just about any compressed file, I might add — is as simple as patool extract file. The extension of the file appears to be irrelevant to patool — if I rename a file to show a different extension, it manages to extract it anyway.
-
-
Instructionals/Technical
-
Games
-
It’s so damn good to see Humble back on form with a true Humble Indie Bundle, we just gained access to new games too!
-
We announced the Humble Indie Bundle 14 game sale initiative at the beginning of the month, a great occasion for Linux, Windows, and Mac gamers to get their hands on a fabulous collection of cross-platform games.
-
Tripwire have announced that Killing Floor 2 will be released on the 21st of April into Early Access, but we have it confirmed Linux is not in the initial release.
-
-
-
Desktop Environments/WMs
-
The Enlightenment crew at Samsung have released their first alpha version of the upcoming EFL 1.14.0 library set.
-
K Desktop Environment/KDE SC/Qt
-
NetworkManagerQt is officially a Frameworks now. As a consequence the repository has been renamed from libnm-qt to networkmanager-qt and NMQt version number now follows Frameworks version number (currently 5.8.0).
-
In February 2015 the Plasma developers met in the Blue Systems office in Barcelona to discuss and plan out where we would take Plasma over the duration of the next year. The sprint consisted of active Plasma developers and visual designers from around the world, from Canada to India.
-
The digiKam development team has announced a few hours ago, on April 7, the immediate availability for download of the digiKam Software Collection 4.9.0 image viewer and organizer application for the KDE desktop environment.
-
-
-
We have released another plasma-nm version for KDE 4. It’s possible that this release will be the last one, because every distribution is now switching to Plasma 5 and given our irregular releases it’s possible that current distributions wouldn’t pickup the updated version anyway. I’ll keep backporting fixes from Plasma 5 to our KDE 4 branch if possible, so if you want to keep running on KDE 4 from some reason, you will still have a way how to get at least some fixes. There is also a new release of networkmanager-qt for KDE 4, which is required for below mentioned OpenConnect fixes.
-
A Linux user has started an LKML discussion over compiling the kernel with -O3 for driving performance improvements out of a more-optimized kernel binary.
-
GNOME Desktop/GTK
-
The GTK+ development team has announced the immediate availability for download of the first maintenance release of the GTK+ 3.16 GUI toolkit used in the GNOME 3.16 desktop environment.
-
GNOME 3.16 was released last week and is the result of more than 30000 commits by over 1000 persons, I am always impressed by those numbers, thank you all!
-
GNOME/GTK+ developers are finally preparing themselves to drop support for Microsoft Windows XP.
While Microsoft no longer offers public support for Windows XP and most modern software has done away with XP support, GNOME’s tool-kit continues to support Windows going back to XP. It’s been discussed before about dropping XP and this discussion has resurrected once again.
-
-
Papyros is a new Linux distribution designed around a Material Design framework, and it promises to be one of the most interesting releases in the Linux ecosystem. After a month that brought no news about its progress, the devs explained that the project is not dead, but alive and kicking.
-
Ubuntu developers are preparing to launch the last OTA update for the current branch of Ubuntu Touch RTM, and they are also working to change the base of the system to 15.04 (Vivid Vervet).
-
Reviews
-
There are people out there that will want all of the verbose options, giving access to every available installation option but maybe there could be a general installer and a custom installer to make it easier for the masses.
-
Void is an independent distribution and offers a rolling release approach to package management. There are many Void editions we can download. There are Void images for the BeagleBone and Raspberry Pi computers along with builds for 32-bit and 64-bit x86 machines. In addition, there are spins of Void for specific desktop environments and we can download images for Cinnamon, Enlightenment, MATE and Xfce flavours. I decided to begin my trial with the 64-bit Cinnamon build of Void. The download for the Cinnamon image is 454MB in size.
-
New Releases
-
With pleasure SalentOS Team announces the release of SalentOS 14.04.2.
-
Screenshots
-
Slackware Family
-
The set has been spiced up with the latest Long Term Support (LTS) sources that I took from KDE Applications 14.12.3, specifically the newest versions of kde-workspace, kdelibs and kdepim. Essentially, I have used the exact same sources from which I built my KDE 4.14.3 packages for Slackware-current before.
-
Red Hat Family
-
Pat Riehecky from the Scientific Linux development team has announced today, April 7, the immediate availability for download and testing of the second and last Release Candidate (RC) version of the forthcoming Scientific Linux 7.1 operating system.
-
Besides the speeches, 170 1-hour breakout sessions are planned. Breakout sessions are presentations by industry experts on topical issues. Some speakers include Thomas Cameron, John Shakshober, and Matt Hicks. A Partner Pavillion will be open showcasing many of Red Hat’s partners and their wares. Labs will let attendees test out Red Hat’s latest tech. For those wanting still more add-ons include in-depth training courses with expert instructors and certification exams in Red Hat OpenStack. Developers can attend DevNation for “a week of keynotes, technical sessions, BoFs, evening programming events, and more” with folks from some of the top tech companies around.
-
Speaking to ChannelBuzz.ca ahead of the company’s North American Partner Conference here, Mark Enzweiler, senior vice president of global channel sales and alliances at Red Hat, described a shift in the conversation his company and its partners are having with their customers. Gone are the days of convincing customers that open source is “for real” in the enterprise. Now everybody’s got an opinion on open source – not just Linux, but other major projects as well, most notably OpenStack. Now, they want to know more, and that means partners have to know more.
-
Fedora
-
DNF is the next-generation Yum and after being available for the past few Fedora releases, with Fedora 22 it’s ready for prime-time. Kevin Fenzi last week started a mailing list thread about dnf replacing yum and dnf-yum. DNF is installed by default as part of the “core” group, DNF-Yum is also installed by default, Yum is still installed so if something still depends directly on it or a user manually wants it, and the Yum RPM package now requires dnf-yum.
-
Using the XFS file-system as the default within an LVM has been part of the Fedora Server technical spec while with Fedora 22 it’s finally happened. The default layout for Fedora Server 22 installations is using XFS atop LVM while /boot is outside the LVM setup.
-
Debian Family
-
As a follow-up to my post about bootstrapping arm64 in Debian, we’ve had more hardware given to Debian for us to use in porting and building packages for arm64. Applied Micro sent me an X-Gene development machine to set up and use. Unfortunately, the timing was unlucky and the machine sat on my desk unopened for a few weeks while I was on long holiday in Australia. Once I was back, I connected it up and got it working. Out of the box, a standard Jessie arm64 installation worked using network boot (dhcp and tftp). I ran through d-i as normal and installed a working system, then handed it over to the DSA and buildd folks to get the machine integrated into our systems. Easy! The machine is now up and running as arm-arm-03.debian.org and has been building packages for a few weeks now. You can see the stats here on the buildd.debian.org site.
-
Derivatives
-
Canonical/Ubuntu
-
Canonical revealed details about Oxide vulnerabilities that have been found and fixed in Ubuntu 14.10 and Ubuntu 14.04 LTS. This update brings a few fixes, but it’s nothing all that important.
-
Ubuntu 15.04 (Vivid Vervet) is about to be released in a little over two weeks, and the developers have announced that they settled on Linux kernel 3.19.3, a couple of days before the kernel freeze.
-
Every once in a while Ubuntu developers made improvements to the Unity desktop environment, but that usually happens for new Ubuntu releases, like 15.04 for example. That doesn’t stop them from porting those improvements to older releases, such as Ubuntu 14.04 LTS.
-
Hello Linux Geeksters. As you may know, Firefox 37.0.1 has been recently released, coming with important bug-fixes. Not long after that, Canonical has patched it and added it to the default repositories of all the supported Ubuntu systems.
-
The much requested Unity feature to always show the menus, which is already available in Ubuntu 15.04 Vivid Vervet for almost three months, has been backported to Ubuntu 14.04 LTS.
-
In recent months we’ve covered an Ubuntu tablet with a 1TB hard drive, another sketchy Ubuntu tablet, and other awkward devices looking to ship Ubuntu in tablet/mobile form without any support from Canonical. There’s yet another tablet to talk about today.
-
Details about a Mailman vulnerability in Ubuntu 14.10, Ubuntu 14.04 LTS, Ubuntu 12.04 LTS that has been found and fixed were published in a security notice by Canonical.
-
Flavours and Variants
-
Uri Herrera from Nitrux S.A. recently announced the immediate availability of Nitrux OS 4.15 Linux operating system that is currently used in their NXQ mini PC unveiled a couple of months ago.
-
CompuLab is working hard on the MintBox Mini. SMT (Supervised Manufacturer’s Testing) was done, and they’re now soldering, testing, starting mechanical assembly and packing of the units.
-
The name of the next Linux Mint 17.2 release has been chosen and it’s going to be “Rafaela.” The project continues with the feminine names, so the new code name should be no surprise.
-
Ostensibly, Information and Communication Technologies (ICTs) have significantly permeated our society, yet their integration in our educational system has not been achieved. The glaring disparity among students who are ICT literate and those who are not, is evidence of this. Understandably though, there are several priorities and challenges that may be responsible for the slow progress in this area. Fortunately for us, we have a few Liberians in our educational system who possess the dynamism needed to bring significant changes. However, these changes must parallel those of the global community’s. In doing so, we will effectively be eliminating one of the barriers that young Liberians graduating from high school face when they submit applications for employment; the ubiquitous, “must be computer literate” listed as a job requirement. In today’s article, I will discuss how EDUBUNTU, a Free and Open Source Software (FOSS), can help us integrate ICTs in schools to achieve some level of equilibrium with regard to basic ICT literacy among Liberian students.
-
-
Embedian has launched a SMARC COM that runs Linux on a Freescale i.MX6, and offers up to 2GB RAM, 4GB eMMC, -40 to 85°C operation, and a Mini-ITX baseboard.
-
Phones
-
The Jolla community has put together an application called Jolla Communicator that allows users to send and receive messages on Ubuntu, which connected to a Sailfish OS-powered smartphone.
-
Android
-
Back in January HTC announced they’d miss the deadline they set themselves for the HTC One M8 Android 5.0 Lollipop update, but since then we’ve received plenty of good news as it’s rolling out to multiple carriers in the United States. It first kicked off for owners back in January, and over the past few weeks has continued to arrive for more and more proud owners.
-
We all know there are good reasons why Android will never be rolled out as efficiently as the way Apple rolls out new versions of iOS. That said, surely the process can be better than it is right now… can’t it?
-
Motorola has begun rolling out the Android 5.1 Lollipop update for the Moto G Google Play Edition (GPE), and it is possible that other versions of the phone could receive the update anytime soon.
-
Check the Amazon Instant Video splash page and you’ll see the news: You can officially stream videos from Amazon to your Google Android tablet. I say “officially” because tech savvy folks may have already sideloaded, or manually installed, the phone version some time ago. But for the mainstream masses who typically get their apps from the Google Play Store — a smart move for security reasons — this is new.
-
The mobile companion game for Mortal Kombat X is available for download on both iOS and Android. Mortal Kombat X Mobile can be downloaded for free (with in-app purchases) on the Apple App Store and the Google Play Store, according to Hardcore Gamer. The Mortal Kombat X Mobile is the full Mortal Kombat X experience built for mobile devices.
-
-
There are many Android fans who aren’t enamored with Chrome OS. They cite lack of apps for the latter, and the wealth of features that make up the great utility of the former. There has long been speculation that Google will eventually merge the two platforms into one OS. I hope that never happens.
-
What is a smartwatch, and what can it do? The Apple Watch arrives in a landscape filled with things for your wrist. How does it stack up? Great in some ways, and not so wonderfully in others. Let’s look at the closest competition and see.
-
Owners of the Google Play Edition of the HTC One M7 and M8 should stay tuned for Android 5.1.
In a tweet late Tuesday, HTC vice president of product management Mo Versi said that “approval for both M8 & M7 GPE versions have been granted by Google for 5.1 OS. OTA out shortly!” That means an over-the-air update should reach both models soon if it hasn’t already. The Google Play Editions of such phones come with pure Android, which excludes any customizations typically made by the manufacturers.
-
Itching to make your shiny new Android Wear watch really yours? You’re in luck — Google’s curating not only the best watchfaces to throw on your teensy wrist-display, but some of the handsome watchbands you should lash onto it too. Android Wear product manager Jeff Chang pointed out new (and mostly leather, sadly) straps available from E3 Supply Co., Worn & Wound and Clockwork Synergy in a post on the Official Android Blog earlier today. Thing is, you can’t actually buy these accessories straight from the Play Store proper — you’ll still have to mosey on over to each retailer’s site to lay claim to your next bit of wrist candy so the approach isn’t exactly as seamless as we would’ve hoped.
-
We’re going to take the scenic route in getting to the point today. If you don’t want to wait, you can go down to the bottom where it says, “The moral of the story…” But the point of today’s exercise is that we in the decentralized FOSS realm are a creative bunch, and in that creativity is our strength.
-
Etsy attributes recent accomplishments in data center efficiency in large part to using the Facebook-developed, open source HipHop Virtual Machine (HHVM), according to software engineer Dan Miller on Etsy’s blog. Etsy is an extremely popular marketplace for handmade, vintage and unique items. The company is expected to IPO soon.
-
Open source, popular as it has been, has hardly killed off proprietary software. While margins and new license revenues have suffered across the enterprise software spectrum, it is the cloud, more than open-source software, that is to blame (or thank, depending on whose stock you own). Yes, open source built the cloud, but it is the cloud that gets all the credit (and cash).
-
Events
-
Open source developers can create an immense amount of value for any company that relies on open source software by giving it the ability to direct and influence aspects of the open source community. This allows the company to shape the tools they rely on and make them better fit company needs, a phenomenon otherwise known as “scratching their own itch.”
Although an open source developer’s primary skill is writing good code, their value extends far beyond technical skills. Adopting open source practices requires participation in diverse communities that have a number of stakeholders who each have their own itches to scratch. Open source developers find themselves in a complex position that requires them to be experts not only in their technical field, but also in communication and collaboration.
-
To defend against targeted attacks based on spoofed emails he proposed to detect whether the writing style of an email corresponds to that of previously seen emails of the presumed contact. In fact, their research shows that they are able to tell whether the writing style matches that of previous emails with very high probability.
-
Web Browsers
-
Chrome
-
Behind the bug A bug in the most recent version of the Chrome allows miscreants to crash browser tabs simply by embedding a link with a malformed URL in the HTML of a page.
-
Mozilla
-
Mozilla issued the Firefox 37.0.1 update, which disables the opportunistic encryption feature that was just introduced in Firefox 37.
Mozilla has had a change of heart regarding opportunistic encryption—for now. The company rolled out its open-source Firefox 37 Web browser on March 31, with one of the key new features being a capability known as opportunistic encryption. However, due to a security issue related to opportunistic encryption, Mozilla disabled the feature in the Firefox 37.0.1 update released April 3.
-
SaaS/Big Data
-
I’ve been involved in the ASF since 2005 when I got involved in the Apache Nutch project. I was a PhD student at USC taking Search Engines class and also working at NASA JPL. My final project in the class was an RSS parsing plugin (NUTCH-30) that got integrated. It was a budding, awesome community, and I got more and more excited after my patch and started helping out on the lists. I also saw a big use for Nutch and what eventually became Hadoop at NASA.
-
This weekend, NASA is hooking up with IBM’s BlueMix cloud platform in an unprecedented development effort. More than 10,000 developers, scientists, entrepreneurs and students in 62 countries will work in tandem on a code-a-thon aimed at building technology for space exploration. Here are more details.
-
PLUMgrid, which focuses on virtual network infrastructure for OpenStack cloud deployments, has announced the latest SDN software PLUMgrid Open Networking Suite 3.0 for OpenStack with new operational tools, features for dynamic routing, and expanded service insertion for third party virtual, physical and container based appliances. Based on OpenStack Juno, PLUMgrid ONS 3.0 is Red Hat certified with RHEL OSP 6.
-
Barzan Mozafari, Assistant Professor of Computer Science and Engineering at the University of Michigan (Ann Arbor), will be giving a talk on the predictability of performance in database systems at the OpenStack Live conference in Santa Clara, California on Tuesday, April 14.
-
Education
-
This February, EBSCO Information Services announced plans to provide funding and technical assistance for contributors to the Koha open source ILS platform. Led by the Koha Gruppo Italiano (KGI)—founded by the American Academy in Rome, American University of Rome, and the Pontificia Università della Santa Croce—with development support from ByWater Solutions, Catalyst IT, and Cineca, the partnership will enable an upgrade of Koha’s core search engine to Elasticsearch, the popular open source, multitenant-capable full-text search engine.
-
Funding
-
It is my sad duty to inform the community that Chris Yeoh passed away this morning. Chris leaves behind a daughter Alyssa, aged 6, who I hope will remember Chris as the clever and caring person that I will remember him as. I haven’t had a chance to confirm with the family if they want flowers or a donation to a charity. As soon as I know those details I will reply to this email.
-
FSF/FSFE/GNU/SFLC
-
This year the GNU Cauldron Conference is going to be held in Prague, Czech Republic, from August 7 to 9, 2015.
The GNU Cauldron Conference is a gathering of users and hackers of the GNU toolchain ecosystem.
Meaning that if you are interested in projects remotely related to the GNU C library, GNU Compiler Collection, the GNU Debugger or any toolchain runtime related project that has ties with the GNU system you are welcome!
-
Openness/Sharing
-
Open Access/Content
-
“Open Access: Is a national licence the answer?” is a proposal by David Price and Sarah Chaytor of University College London for a mechanism to provide full access to everyone within the UK to all published research. It was published on 31 March 2015 by the Higher Education Policy Institute (HEPI) whose director, Nick Hillman, wrote the foreword.
-
Programming
-
April Fool’s Day is well behind us, so all the pranks should be over, right? I ask because today, Google announces that it is making its Santa Tracker project open source on GitHub. The fact that it is open source is great, but the timing is odd. The last thing I expected to read about in April is friggin’ Santa Claus, but here we are.
-
Christmas may be a distant memory by now and the thought of Christmas 2015 might seem just as distant, as April has only just begun. However, it seems Christmas is not too far away from Google’s mind today, as the Search giant have just opened sourced their popular Santa Tracker software. If you are unfamiliar with Santa Tracker, then it is rather self-explanatory. Each year, around about Christmas time, Google releases its Santa Tracker offering the ability to track Santa while he is out and about and delivering his presents to all the boys and girls. That said, the tracker software is not just for tracking Santa and this is why last year Google released the Tracker as early as December 1st.
-
Performance on these kinds of questions is at best a discrete skill that can be improved through practice, eliminating their utility for assessing candidates. At worst, they rely on some trivial bit of information or insight that is withheld from the candidate, and serve primarily to make the interviewer feel clever and self-satisfied. They have little if any ability to predict how candidates will perform in a job.
-
The Guardian has published an open appeal to Tory and Lib Dem voters to vote Labour in Dundee West. I think that tells you all you need to know about the Red Tories and their priorities. It is also a new low in journalism even for the fanatic and increasingly desperate Severin Carrell, who is a total disgrace to his profession. The costs of publishing the Guardian ought to be counted against Marra’s election expenses: this is not journalism in any sense, merely a puff piece for a candidate.
-
Security
-
Defence/Police/Secrecy/Aggression
-
Nasir al-Din Shah, Shah of Iran from 1848-1896, sold Baron Julius de Reuter the right to operate all of Iran’s railroads and canals, most of the mines, all of the government’s forests, and all future industries. The famous British statesman Lord Curzon called it “the most complete and extraordinary surrender of the entire industrial resources of a kingdom into foreign hands that has probably ever been dreamed of.” Iranians were so infuriated that the Shah had to rescind the sale the next year.
[...]
Our rhetoric on Iran seems nonsensical: Do U.S. leaders actually believe Iran would engage in a first nuclear strike on Israel or the U.S., given that would lead to a quick and devastating retaliation from those well-armed nuclear powers?
Even conservative U.S. foreign policy experts know that’s incredibly unlikely. They’re not worried that we can’t deter a nuclear-armed Iran — they’re worried that a nuclear-armed Iran could deter us. As Thomas Donnelly, a top Iran analyst at the American Enterprise Institute, put it in 2004, “the prospect of a nuclear Iran is a nightmare … because of the constraining effect it threatens to impose upon U.S. strategy for the greater Middle East. … The surest deterrent to American action is a functioning nuclear arsenal.”
-
Finance
-
Fox News’ campaign of misinformation surrounding food assistance programs may be continuing to influence GOP legislation, as lawmakers in both Missouri and Kansas consider measures addressing “fake problems” within their state’s benefit programs.
Republican lawmakers in Kansas recently introduced legislation restricting where recipients of Temporary Assistance for Needy Families (TANF, formerly known as “welfare”) can spend their money and what they can buy. The bill would limit the daily spending allowance to $25 and ban recipients from using benefits at psychics and tattoo parlors. Another measure, introduced by the House GOP in Missouri, will similarly limit how recipients of the Supplemental Nutrition Assistance Program (SNAP, formerly knowns as “food stamps”) can use their benefits, prohibiting them from buying “steak, seafood, soda, cookies, chip[s], and energy drinks.”
-
PR/AstroTurf/Lobbying
-
There is nothing like a journalistic plane crash to inspire newsroom loudmouths to jump on their desks and lecture colleagues about the collapse of standards and crow that they’re such exemplars of the craft that never in a trillion years could they or their publication be snookered by a fabulist, a hoaxer, a dissembler or a liar.
-
The author accuses news outlets of doing exactly what he himself and the U.S. mainstream media in general does when reporting about foreign policy issues such as Ukraine: they “systematically [regurgitate U.S. propaganda, spread] lies, half-truths, and conspiracy theories.” The advantage they have is that they don’t need to translate anything. Apparently for Rohac an article written in Russian has to be Russian propaganda. It’s that simple: Russians are just not producing any honest journalistic content. This argument about texts being “directly translated from Russian sources” is not only weak, it is xenophobic.
-
Censorship
-
Nintendo’s never-ending desire to control how YouTubers review its games or do “let’s plays” has been laughable from the start. From the trust-destroying agreement YouTubers had to enter into in order to get access to visual content to the beauracratic nightmare individuals had to wade through just to get a video approved for monetization, the whole thing started off on messy footing. And the biggest issue in all of this: Nintendo still can’t seem to grasp that these YouTubers are giving the company free advertising. Gamers love the kinds of videos these YouTubers produce. They use them to make purchasing decisions, to become interested in new games, and to fuel word-of-mouth advertising that no trumped up ad campaign could ever possibly hope to achieve. Why make any of that more complicated by creating an approval system for the videos? And, more importantly, why take away the incentive for fans to promote your games by demanding a share of their YouTube revenue?
-
This seems to happen every political season. When he was a Presidential candidate, John McCain got annoyed at YouTube taking down political videos based on copyright claims. During the last Presidential election, a Mitt Romney TV ad featuring President Obama singing an Al Green song was taken down via a copyright claim. And now, 2016 Presidential candidate Rand Paul has discovered that his announcement speech from Tuesday morning has been taken down.
-
Privacy
-
The U.S. government started keeping secret records of Americans’ international telephone calls nearly a decade before the Sept. 11 terrorist attacks, harvesting billions of calls in a program that provided a blueprint for the far broader National Security Agency surveillance that followed.
For more than two decades, the Justice Department and the Drug Enforcement Administration amassed logs of virtually all telephone calls from the USA to as many as 116 countries linked to drug trafficking, current and former officials involved with the operation said. The targeted countries changed over time but included Canada, Mexico and most of Central and South America.
-
Rand Paul’s campaign kickoff just concluded with a rousing speech by the libertarian-leaning U.S. senator from Kentucky in which he promised that his first act as president would be to stop the NSA’s illegal spying on American citizens. He vowed to win the White House while clutching the Bill of Rights in one hand and the Constitution in the other.
-
Bill Binney, a former U.S. National Security Agency employee turned whistleblower, is on a mission to expose the agency’s domestic spying programs and violations of constitutional rights.
In an interview with AJ+’s Dena Takruri, Binney discusses why he thinks President Barack Obama is “violating the public trust” and what Americans can do to protect themselves from unwarranted surveillance.
-
The U.S. government started keeping secret records of Americans’ international telephone calls nearly a decade before the Sept. 11 terrorist attacks, harvesting billions of calls in a program that provided a blueprint for the far broader National Security Agency surveillance that followed.
-
The Drug Enforcement Administration (DEA), under approval from the top echelons of the Department of Justice, ran a secret, extensive phone metadata bulk collection program for over two decades, amassing billions of records, according to a new report published Tuesday in USA Today.
This database had previously been revealed to a lesser extent earlier this year, but neither its operational details nor its scope had been revealed until now.
-
Note that it actually makes sense to use a one-time pad in this instance. The message is a ten-digit number, and a one-time pad is easier, faster, and cleaner than using any computer encryption program.
-
Data brokers, which track browsing habits to sell to third parties, are not governed by any laws stating what can and can’t be done with the data. But they are not the same as hackers, who could theoretically access information about membership to porn sites. Vice said hackers would be more likely to sell the credit card information than release it online for no gain.
Neither brokers nor hackers have a vested interest in creating Thomas’s nightmare vision of a searchable porn-user database. But that doesn’t mean the data isn’t out there. Even a browser in incognito mode will send tracking information to data brokers that according to one privacy researcher is “all sitting in a database somewhere”.
Vice said that shouldn’t surprise internet users: “It’s a truth about the modern internet that just about anywhere you go, you’re being tracked.”
-
TrueCrypt’s relative clean bill of health last week has now spawned a new focus on existing alternatives to the open source encryption software, namely VeraCrypt and CipherShed.
-
ORG supporters are invited to our General Election Training run by ORG staff on how we can make an impact this election! We’ll give you all the knowledge you need to be confident and effective digital rights activist this election.
-
An Australian court has ordered internet service providers (ISPs) to hand over details of customers accused of illegally downloading a US movie.
-
Civil Rights
-
Hours after police removed an illicit bust of Edward Snowden from its perch in a Brooklyn park on Monday, artists replaced it with a hologram.
-
John Oliver’s Monday night interview of Edward Snowden — which in 24 hours has been viewed by 3 million people on YouTube alone — renewed all the standard attacks in Democratic circles accusing Snowden of being a traitor in cahoots with the Kremlin. What’s most striking about this — aside from the utter lack of evidence for any of it — is how identical it is to what Nixon officials said to smear the last generation’s greatest whistleblower, Daniel Ellsberg (who is widely regarded by Democrats as a hero because his leak occurred with a Republican in the White House).
-
The Intercept revealed last month that it is quite easy to be deemed a “suspected terrorist” at airports in the United States. A leaked checklist used by the Transportation Security Administration shows an expansive list of “suspicious signs” for screening passengers, including yawning, fidgeting, whistling, throat clearing and staring at one’s feet. All of these, according to the TSA, are considered behaviors that indicate stress or deception. Well now The Intercept has revealed who the program actually targets: not terrorists, but undocumented immigrants. Taking a five-week period at a major U.S. airport, The Intercept found that 90 percent of all those arrested were detained for being in the country illegally. Not a single passenger was arrested or suspected for ties to terrorism. The overwhelming detention of undocumented immigrants bolsters criticism that government screening programs have targeted passengers with racial profiling. We speak to the reporter who broke this story, Jana Winter.
-
As the economic landscape in China continues to shift, an awakening working class is demanding fair treatment and higher wages—and the movement is picking up steam.
The Associated Press on Monday highlighted the emerging resistance to workplace exploitation and authoritarian government policies that has steadily grown over the past four years, with numbers of strikers doubling annually since 2011 until they reached more than 1,300 last year.
-
The police department in Erie County, New York fought hard to prevent the New York Civil Liberties Union from obtaining records about its use of a controversial surveillance tool known as a stingray.
-
Internet/Net Neutrality
-
Following copyright threats from large media companies a Kiwi ISP has taken down its VPN service. Lightbox, MediaWorks, SKY, and TVNZ had threatened legal action against services that bypass geo-restrictions on sites such as Netflix and Hulu. Other ISPs offering similar products are currently standing firm.
-
Intellectual Monopolies
-
The peak lobby group for American pharmaceutical manufacturers has been given privileged access to negotiations for a major regional trade pact that could see the cost of medicines skyrocket in Australia.
Public health advocates and business groups are concerned that pharmaceutical giants will be able to advance their commercial interests in the once-in-a-lifetime pact through their seat at the negotiating table, while the details are kept secret from the Australian public.
-
The draft of the investment chapter published by Wikileaks last week outlines the controversial investor‐state dispute settlement mechanism which would allow foreign corporations to sue governments in offshore tribunals.
Permalink
Send this to a friend
04.07.15
Posted in News Roundup at 6:54 pm by Dr. Roy Schestowitz

Contents
-
Linux Australia Hacked and CoreOS Hearts Kubernetes [Ed: a dozen news articles today, even in corporate news/Web sites, about one single server getting cracked because it's "Linux Australia"]
In a post to the Linux-aus mailing list Saturday The Linux Australia Council informed members and conference attendees that due to a server breach personal information could be compromised. The March 22 hack was discovered two days later when steps were taken to “minimize the immediate damage.” Elsewhere, CoreOS has joined the race to Kubernetes and folks are still buzzing about the Wired.com quote saying Open Source Windows is a possibility.
-
-
The president of open-source software user group Linux Australia has called on registered attendees of the organisation’s conferences for the past three years to change their passwords after it was discovered that the server hosting its conference management system had been breached.
-
-
-
-
-
-
-
Desktop
-
-
Linux PC retailer ZaReason has released one of its first computers with an Intel Broadwell processor. The ZaReason Zini 1550 is a tiny desktop computer which sells for $549 and up.
It’s based on Intel’s NUC mini PC platform, but unlike some NUC systems, the Zini 1550 comes with memory, storage, and an operating system which means you should be able to start using the computer almost as soon as you plug it in.
-
As you’re getting used to Linux (potentially as your new main operating system), you’ll eventually try to find a way to efficiently manage your music. iTunes comes to mind because it’s been the most popular way to manage music over the years, but you’ll quickly find out that iTunes isn’t available natively on Linux. Plus, better ways exist to manage your music now that it’s 2015.
However, that doesn’t automatically mean that you won’t be able to manage your music the way you want to. There’s plenty of other ways to keep tabs on your music library. Here’s six great ways to get it done.
-
If I plan on being productive I can’t listen to ‘regular’ music. It distracts me. I start singing along or get reminded of a different track, so end up poking around my library and… Well, that’s that.
-
One Czech technical high school partnered with the Linux Professional Institute on courses and certification. Red Hat has been hiring up a storm in the Czech Republic.
-
Google recently grabbed a lot of headlines for its new Chromebit, a Chrome OS computer in a HDMI stick. That’s fine, but Google and Asus are far from the first to put a computer on an HDMI stick. That honor goes to FXI Technologies Cotton Candy, which released it first model in 2012.
-
Kernel Space
-
Linus Torvalds 10 years ago today released Git after it was clear BitKeeper was no longer an option for the Linux community. He assessed other existing revision control systems and decided none would do. Ultimately, he decided he would just write a new one, so he went away for a weekend and came back with another hole in one. Most people know Linus created Linux, but many don’t know he is the mastermind behind what has become the most popular revision control system in software development today. If you ask him which is his crowning achievement, he’ll say “do I have to have just one?”
-
Git will be celebrating it’s 10 anniversary this month. It’s yet another contribution of Linus Torvalds to the world in addition to Sub Surface and Linux. Jennifer Cloer of The Linux Foundation interviewed the father of Linux and presented us with a very comprehensive story behind Git.
-
Linux Kernel 3.18.11 has been recently released with number of bug fixes and improvements for ARM, ARM64, s390, PowerPC, x86, MicroBlaze, and SPARC architectures and Updates to the NILFS2 and FUSE file systems. All Linux Kernels 3.18 users are urged to upgrade to Kernel 3.18.11 as soon as possible. Here is how you can manually upgrade to Kernel 3.18.11.
-
Linus Torvalds had the pleasure of announcing today, April 6, the immediate availability for download and testing of the seventh and last RC (Release Candidate) version of upcoming Linux 4.0 kernel, as well as the fact that the final version of Linux kernel 4.0 will be unveiled in two weeks from today, around April 19, 2015.
-
It’s coming a day later than anticipated, but the seventh weekly update for the Linux 4.0 kernel is now available.
-
Linus Torvald’s mailing list announcement mentioned the changes over the past week were small albeit the release delay was due to the holiday. Linus confirmed he’s planning to ship Linux 4.0 next weekend, ~12 April. However, that might be delayed as he’s planning to travel next week and that could complicate his opening of the merge window for Linux 4.1. So if he decides against the release next weekend due to the travel complications, Linux 4.0 might not be officially released for two weeks.
-
-
Since announcing our Intro to Linux course for free on the edX platform a year ago, we’ve been working on doing a variety of things to make Linux learning and access to tour training and certification programs more accessible to all.
-
Recently there was some discussion about ways to ease the tired backs of kernel maintainers. Apparently the merge windows are times of great labor, and some folks wanted to alert contributors to some preferable code submission habits.
There were a variety of ideas, and Kevin Cernekee summarized them in patch form, but one key idea was that none of this advice really could be treated as etched into stone. Linus Torvalds and Theodore Ts’o, in particular, pointed out that maintainers all have their own ways of doing things, and that no general rules could be relied on universally to produce repeatable results.
-
Graphics Stack
-
Nvidia had the pleasure of publishing today, April 6, an update to its Long Lived Branch of the Nvidia video driver for GNU/Linux, BSD, and Solaris operating systems, version 346.59.
-
Applications
-
I am pleased to announce that after months of work a new release of GNUstep’s IRC client, TalkSoup, is ready!
-
Git-cinnabar is a git remote helper to interact with mercurial repositories. It allows to clone, pull and push from/to mercurial remote repositories, using git.
-
It’s been an interesting two weeks, talking about and looking into why text-to-speech (TTS) is such a mess in Linux. I’ve spoken with seventeen of you; seventeen who know a bit about software programming. “A bit” is a purposeful understatement. Some of you have forgotten more about software programming than I will ever know. That being the case, I have learned a bit about why TTS in Linux is next to worthless. For those who are just joining into the conversation, let me catch you up quickly.
-
Proprietary
-
IT administrators who use Linux servers now have access to a backup and disaster recovery from a trusted industry solution with today’s release of StorageCraft® ShadowProtect® SPX. This addition to the StorageCraft Recovery-Ability™ solution offers Linux users reliable backup, protect, migrate and – most importantly – recovery for virtual and physical Linux servers.
-
Instructionals/Technical
-
-
-
-
-
-
-
-
-
-
-
-
-
This week marks the 10-year anniversary of the day Linux creator Linus Torvalds released the first version of the Git distributed revision control system. Thousands of open source projects now rely on this popular software development tool, which fuels the growth of the collaborative development model that now dominates tech innovation.
-
`Alternative Toolbar` is a Rhythmbox plugin which replaces the default Rhythmbox toolbar with a client-side decorations (header bars) toolbar or a compact toolbar that can be hidden.
-
Games
-
The free modification for Half-Life 2 ‘Transmissions: Element 120′ is in need of people who can help port it to Linux.
-
Outlast, a first-person horror game developed and published by Red Barrels on Steam, has been released on the Linux platform.
-
…the game has been patched with Mac and Linux support…
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
In a blog post on April 6, 2015, Boudewijn Rempt laid down the plans for the next major release of the best open-source digital painting software, Krita 3.0, which will be ported to Qt5.
-
The digiKam Team is proud to announce the release of digiKam Software Collection 4.9.0. This release includes a new sets of bugs fixes from Maik Qualmann who maintain KDE4 version while KF5 port is under progress.
-
-
Reviews
-
Parsix GNU/Linux 7 is a feature-rich rendition of the GNOME desktop that you must take for a spin regardless of how you feel about the GNOME desktop.
-
New Releases
-
David Cortarello announced on April 6 that the second maintenance release of Kwort Linux 4.0, an open source distribution based on the CRUX operating system and designed to be robust, extendable, and clean, is now available for download.
-
As the title says Kwort 4.2 is out there in the wild
-
Screenshots
-
Gentoo Family
-
At many of our readers’ request, today we start a new series of screenshot tours that will track the changes implemented in the Sabayon Linux distribution, a rolling-release operating system based on Gentoo.
-
Arch Family
-
Other than the hardware-specific issues, I’ve been amazed by how well Arch Linux works, given that it doesn’t have release cycles, or a big team with a lot of money supporting and marketing it. I’ve heard only 30 developers maintain the core Arch packages, with most of them having a full-time job doing something else! At the same time, it shouldn’t be a total surprise things work so well because free software doesn’t just fall off a turnip truck:
-
Ballnux/SUSE
-
We reported a few days ago that the April update of openSUSE Tumbleweed will switch to the KDE Plasma 5 desktop environment by default. Today, we have some more news regarding the transition to KDE Plasma 5 in openSUSE.
openSUSE Tumbleweed/Factory is a rolling-release version of openSUSE, where all the new technologies get implemented before they land in the main openSUSE distribution.
-
Red Hat Family
-
Thousands of Expected Attendees to Talk about the Future of Enterprise Technology, Including Cloud Computing, Internet of Things, Linux Containers, Big Data, Mobile, and Beyond
-
His 19 followers would lead one to believe that Salo’s presence in the community is small. And yet, in the past year alone, he made 845 contributions – over two or so per day. As of writing, his contribution streak has lasted only two days, but his longest one – between the lead up to new year’s and the early weeks of January – lasted almost two weeks.
-
The list is compiled based on objective criteria set by CRN, taking into account each vendor’s investments in program offerings, partner profitability, partner training, education and support, marketing programs and resources, sales support, and communication. Vendors are assessed using the information that they provide in their completed applications. 5-star recipients were selected based on the information provided in their award applications, and how it matched up to the aforementioned criteria.
-
NethServer is a free, Open Source, CentOS based all-in-one Linux server distribution, specially designed for small offices and medium-size enterprises. NethServer offers number of built-in modules that can be used to turn any systems into a mail, Web, Proxy, DNS, FTP, Cloud, IDS, Samba, or VPN servers instantly within few minutes. Just forget the step by step and comprehensive installation steps, because we can install the modules of our choice with a ‘single click’. It comes with a built-in powerful and modern web interface that simplifies the common administrative tasks. Since it is based on popular CentOS distribution, NethServer is very powerful, solid, secured distribution. We can regularly get security fixes, updates from the official CentOS repositories as well.
-
Fedora
-
Debian Family
-
For the Debian GNU/Linux community, there has long been an idiom that has often been repeated about release dates. That idiom is that, ‘it’s done when it’s done.”. At long last it would appear that the next major milestone release of Debian, version 8.0 also known as ‘Jessie’ is *almost* done.
-
I recently spent some time updating my systemd knowledge and decided to put together some slides that I’ll use for a lecture. I’m interested in feedback about things that are missing, unclear, etc. Available on slideshare, as PDF, and as LaTeX source.
-
Derivatives
-
The Elive Team is proud to announce the release of the beta version 2.6.2
-
Canonical/Ubuntu
-
A Softpedia user informs us today that there is an old bug in the current Ubuntu releases that affects the way Wine apps are working on the distribution. The issue being related to the Compiz compositing manager.
-
There are a ton of community projects for Ubuntu Touch, and some of them are really interesting, like the upcoming Unity Tweak app that is being built right now by a developer.
-
There are plenty new features that 15.04 family has to offer. The question is which is the most expected? Let’s vote for that!
-
AliExpress has a Chinese Cube table for sale that runs Ubuntu Linux. The 11.6-inch tablet is dubbed Cube I7 and promises to offer either the Ubuntu Kylin or Windows 8 operating systems, according to the screenshots and information presented on the website.
-
UbuTab is a tablet supposedly built to take advantage of both Android and Ubuntu Touch operating systems and promises some great hardware components. The tablets should start shipping mid-April, but there is a problem. Ubuntu developers have no knowledge about the possible implementation of Ubuntu Touch on the tablet.
-
-
-
The new machines start off at $949 (around £639, or AU$1,240) and come with Ubuntu 14.04 installed in addition to an Intel Core i5 Broadwell processor and 8GB of RAM that offers a boost compared to the XPS 13 range.
-
Ubuntu developers usually plan beyond what they are working on at any particular moment, and it looks like they are finally taking an important decision regarding the presence of Python 2 libraries and dependencies, which might be solved for the Ubuntu 15.10 launch.
-
Details about a number of Firefox vulnerabilities and a new Firefox in its Ubuntu 14.04 LTS and Ubuntu 12.04 LTS operating systems have been revealed by Canonical, and the company has pushed a version of the software into the repositories.
-
The first ‘production’ smartphone running the Ubuntu operating system is finally here. Designed and marketed by the Spanish company BQ (not to be confused with the Chinese company BQ Mobile) and made in China, the first Ubuntu Phone is based on the 4.5-inch BQ Aquaris E4.5, which normally ships with Android 4.4. Included with the BQ Aquaris E4.5 Ubuntu Edition are two copies of the quick-start guide (in four languages each, one of the eight being English), a charger (with a built-in two-pin continental mains plug) and a 1-metre USB-to-Micro-USB cable. A comprehensive User Manual is available for download from the BQ website. The list price for the Aquaris E4.5 Ubuntu Edition, which is only available in the EU, is €169.90 (~£125).
-
Flavours and Variants
-
elementary OS is definitely one of the stars of the Linux ecosystem right now and with good reason. It’s one of the most beautiful operating systems out there, and you would think that that’s enough, but there are as many reasons to hate it as there are to love it.
-
MintBox Mini is a mini-PC designed and built by CompuLab. The new system was just made available and the first batch is already sold out.
-
-
Inforce unveiled a tiny “6501 Micro SoM” that runs Android on a quad-core 2.7GHz Snapdragon 805 SoC, and offers A/V, camera, USB, serial, and wireless I/O.
Inforce Computing’s 6501 Micro SoM taps the same Qualcomm Snapdragon 805 SoC used by its Inforce 6540 Pico-ITX SBC, but in computer-on-module form. The 50 x 28mm module, which is supported with an Inforce 6501 Development Kit, is claimed to be the “world’s smallest Snapdragon module for embedded applications.” Last September, Intrinsyc announced an 82 x 35mm, SODIMM-style COM based on the Snapdragon 805 called the Open-Q 8084 SOM, which is similarly supported with a carrier board.
-
Seco has released a commercial SBC spun from the original i.MX6-based open spec Udoo hacker SBC, adding eMMC flash and subtracting Arduino compatibility.
-
Allwinner unveiled a Cortex-A7 based SoC for smart connected cameras that integrates its HawkView image signal processor, and supports Linux and “Camdroid.”
Allwinner jumped on the ARM Cortex-A7 spec early, using it for its popular, low-priced system-on-chips like the Allwinner A10, dual-core A20, and quad-core A31. Like the A10, Allwinner’s new “V3″ SoC has a single Cortex-A7 core, in this case clocked to 1.2GHz. However, Like a number of TI’s Linux-focused, DSP-based DaVinci SoCs, the V3 is designed for camera applications. It follows Allwinner V-Series SoCs including the quad-core, Cortex-A7 V10 and Cortex-A8-based V15.
-
For anyone who doesn’t have Microsoft on their agenda, there is an option to save $40 and get a preinstalled Linux flavour instead. The Intel Compute Stick is up pre-order at $150 for the Windows-powered version, or $110 if you opt for Ubuntu.
-
Phones
-
Android
-
Verizon has just announced that it is rolling out an Android 5.0 Lollipop update to users of Samsung Galaxy Note 4. The latest software version, N910VVRU1BOAF, is said to have everything that Lollipop can offer.
-
Android TV devices have left a lot to be desired so far. Back at CES Razer showed off a device that should finally do justice to Android TV. The Razer Forge TV is a beast of a set-top box, and you can pre-order it right now from Amazon. Razer is typically known for their gaming products, which is precisely what makes this device so great.
-
The much anticipated LG G2 Android 5.0 Lollipop update is finally here and slowly arriving for more and more owners, but the Android 5.0 Lollipop update is also causing problems for many. The update initially started outside of the US for unlocked devices, and then earlier this month the LG G2 in the US finally received Android 5.0 Lollipop, starting with Verizon.
-
Google’s Nexus 5 Android 5.1 Lollipop update has been rolling out slowly for several and we’re finally starting to see Google make a big push with the roll out. With that in mind, we want to take a look at how the Nexus 5 Android 5.1 update has been performing on Google’s aging former flagship. This is our Nexus 5 Android 5.1 review.
-
-
Before you ask, yes, this article is basically just another excuse for me to use Android Police’s favorite device abbreviation, LGGP83GPE. (That’s the short-lived Google Play Edition of the LG G Pad 8.3, from way back in 2013.) According to at least one Twitter user and, hey, my own tablet, the LGGP83GPE is getting its Android 5.1 update right about now. If you’re running stock software, head to the usual spot (Settings>About tablet>System updates) to check for yours.
-
The speculation about Google merging Chrome OS and Android has been a constant over the last few years. Why does Google have two separate systems when everyone else is merging? Why doesn’t Chrome just get folded into Android? Google has to kill one of them off. It’s odd that the tech world insists on Highlander rules – there can be only one. But the truth is that Google can bring them closer and closer together, and create a seamless experience for us, and it doesn’t need one to assimilate the other in order to do that.
-
It’s been a long wait, but we promise you — it’s worth it. HTC One M8 owners on AT&T had to sit back and watch as the other “Big 4″ carriers in the US pushed out Android Lollipop to the device.
-
Owners of the HTC One M8 phone on AT&T should be on the lookout for a shot of Android Lollipop as of Tuesday.
-
Good news if you have an LG G Pad 8.3 Google Play Edition tablet: The Android 5.1 software update is in the air, waiting to be installed on your device. Android Police notes that the new version became available for the slate on Monday. Google updated and posted the software for many of its own Nexus devices a few weeks ago. If you have one of those, you can download and install the Android 5.1 factory image directly from Google here.
-
Last week, Google published its comeback. The company’s “Android Security 2014 Year in Review” report shows that less than 1% of Android devices have any malware. Google scans Active Android devices with a product called “Verify Apps,” which seeks out viruses, ransomware, or other “potentially harmful applications” (PHAs).
-
Google has launched a tool that lets Android apps run on any machine that can run its Chrome browser.
The software, called Arc Welder, acts as a wrapper around Android apps so they can run on Windows, OSX and Linux machines.
-
Phone maker HTC has been apparently working on a new system codenamed “Cello” that links up with everything from navigation to night vision in a bid to provide a much more robust alternative to Google’s Android Auto and Apple CarPlay.
-
In October when Google announced the brand new Android 5.0 Lollipop update many manufacturers promised quick updates, and that included Motorola. Google’s been busy pushing updates to Nexus users, as well as a new Android 5.0.2 and Android 5.1 update to fix some bugs, and today we’ve learned the Moto G is getting Android 5.1 Lollipop for some.
-
If you own an Android phone, that also means you have a Google account. Google would like you to know that this account isn’t just there for show — it’s there to unlock a bunch of cool services on your smartphone. To help out Android newbies, Google has created a whole page dedicated to “78 things you didn’t know you could do with Google” to provide users with the basics they need to help them get the most out of Google’s services.
-
Google’s own director of engineering for Android Wear gives us a glimpse at what devices he carries, how he sets up his home screens, and what apps he can’t live without.
-
“To have GitHub cohost their first conference outside of the US in Wellington is a strong endorsement of our tech capability.”
-
As a digital immigrant who has, without sometimes knowing why, gone down he android path for my devices, I’m inherently drawn to the open source philosophy.
In a sense, at a time when public participation in democracy is lessening, it is events such as this that continue to hold the flame for non-secrecy and more sharing in society.
-
Open source’s influence extends far beyond sharing code, but this aspect sometimes goes unappreciated. For example, I previously wrote about how the special way of developing and collaborating associated with open source has come to also reflect many DevOps best practices, from transparency to iterative fast releases. I’d argue that it is many of these same default behaviors that are helping to make the Internet of Things a hot topic today.
-
Events
-
Fedora Jam is coming to Linux Fest North West in Bellingham, Washington, April 24th to 26th. If you are a friend of Fedora, sign up on the wiki and participate in our booth. Or if you are a musician, come by to try out Fedora Jam, we will have a guitar, keyboard and other instruments to try out. We will have Fedora shirts at the Friday game night, show your Fedora pride during the fest.
-
Web Browsers
-
Mozilla
-
Mozilla is working on a new feature called Tracking Protection that is helping users identify and block websites that collect personal data despite the fact that the browser has the “Do Not Track” policy enabled.
-
SaaS/Big Data
-
As part of the OpenStack Live conference next week in Santa Clara, California, she’ll be delivering a three hour tutorial on OpenStack networking architecture and concepts, along with her colleague Faan DeSwardt.
-
At one point, the Big Data trend–sorting and sifting large data sets with new tools in pursuit of surfacing meaningful angles on stored information–remained an enterprise-only story, but now businesses of all sizes are evaluating tools that can help them glean meaningful insights from the data they store. As we’ve noted, the open source Hadoop project has been one of the big drivers of this trend, and has given rise to commercial companies that offer custom Hadoop distributions, support, training and more. Cloudera, Hortonworks and MapR are leading the pack among these Hadoop-focused companies.
-
Funding
-
Every time I hear of another great open source project shutting its doors, I hold my breath in hopes it will be forked. Sadly though, this isn’t a great plan for all projects. Sometimes these projects are rich in users but poor in developers. In this article, I’ll explore this issue and what can be done to keep open source projects funded.
-
Google has a vested interest in CoreOS bringing Kubernetes to the enterprise, with Google Ventures investing $12 million in Tectonic.
-
FSF/FSFE/GNU/SFLC
-
-
This post from 2011 is no longer applicable; nongnu submissions have been accepted again for some years, as detailed in later news items.
-
Public Services/Government
-
The Basque Parliament is planning to overhaul its workflow, wishing to increase its use of digital identity and electronic signature solutions. The Basque Parliament is using Sinadura, an open source eID tool developed by Zylk, a Bilbao-based open source IT service provider. The parliament now wants to combine this with more applications, the company says.
-
Openness/Sharing
-
-
-
The Qatar Digital Library is soon set to reach some 500.000 images, and it’s increasing by the minute. You don’t want to miss this great (and free) source of information.
-
Open Data
-
The German federal government has launched an online platform where anyone can submit ideas for open data. After four weeks (later this month), the online phase will be closed and all the ideas will be collected.
-
The Vienna Municipal Department of Land Surveying, MA 41, has made all of its geodata available for free. This data includes multi-purpose (surface) maps, orthophotos, terrain models, structure models, and surface models, all part of the Geodata Infrastructure.
-
Open Access/Content
-
Let’s start with an explanation of the digital humanities. The digital humanities is where traditional humanities scholarship—or, the academic study of arts, language, history, and the like—meets the digital age. By using technology in new and innovative ways, digital humanities scholars can create research projects that explore topics in ways that were not possible (or were extremely laborious undertakings) before computers.
-
A group of Rutgers-Camden students are celebrating what they see as a huge step toward the university offering an alternative to traditional — and traditionally expensive — textbooks.
-
I see that in “journalists” questioning Blair, nobody asked the obvious question, which is who was paying for this particular speech.
-
I wondered how on earth they got an audience so completely unrepresentative of Scottish opinion, and the answer was not hard to find. The audience has been selected “based both on current opinion polls and the last general election result.”
-
Health/Nutrition
-
A lobbyist for Monsanto claimed that it was safe to drink “a quart” of the company’s Roundup pesticide, but pointedly refused to try even a sip when offered a glass during an interview with French TV before storming off the set.
Patrick Moore told a Canal+ journalist that glyphosate, the active ingredient in the world’s most widely used weed killer, was not responsible for an increase in cancer rates in Argentina.
“You can drink a whole quart of it and it won’t hurt you,” he insisted.
When the journalist informed him that a cup of the herbicide was prepared for him, Moore bristled, saying: “I’m not stupid.”
But when pressed by the interviewer if the substance was dangerous, Moore replied: “It’s not dangerous to humans.” He added that many try to commit suicide by drinking Roundup, but “fail regularly.”
-
Sen. Rand Paul (R-Ky.) is poised to become the first top-tier presidential candidate from either party to make marijuana reform a major campaign issue.
Paul, who will announce his White House bid on Tuesday, has argued forcefully that states should be allowed to adopt their own policies on the use of medical marijuana without fear of federal interference.
-
Security
-
-
A new version of the popular Tor software that enables anonymous communication between computers around the world was released today, April 7, in order to fix two security issues discovered in the previous versions.
-
The operator of an underground marketplace hosted within the Tor network has reported a flaw in Tor that he claims is being used for an ongoing denial of service attack on the site.
The problem, which is similar to one reported by another hidden site operator in December on the Tor mailing list, allows attackers to conduct a denial of service attack against hidden sites by creating a large number of simultaneous connections, or “circuits,” via Tor, overwhelming the hidden service’s ability to respond.
-
Jonathan LeBlanc of PayPal is on a mission is to replace the password with something more secure and easier to use.
-
-
Defence/Police/Secrecy/Aggression
-
Last week, at a crucial moment in nuclear negotiations between the U.S. and Iran, the New York Times published an op-ed by former U.S. Ambassador to the UN John Bolton titled “To Stop Iran’s Bomb, Bomb Iran.” As I pointed out at the time, the Times accidentally undermined him by linking one of his key claims to an explanation of why that claim was wrong. After I asked about it, the Times changed the link.
Bolton’s many other factual mistakes, detailed below, have also not been corrected — on top of which, Bolton failed to make a relevant disclosure about his paid work for a group that advocates the overthrow of the Iranian regime. It’s worth dwelling on these problems a bit given that Bolton’s perspective has a significant constituency in Congress — which could still derail the accord the White House is closing in on with the Iranians.
-
With the end of the Obama presidency just around the corner, discussions of his administration’s foreign policy legacy are already well under way. But one central element of that policy has received little attention: the Obama administration’s dramatic acceleration of U.S. weapons exports.
The numbers are astonishing. In President Obama’s first five years in office, new agreements under the Pentagon’s Foreign Military Sales (FMS) program—the largest channel for U.S. arms exports—totaled over $169 billion. After adjusting for inflation, the volume of major deals concluded by the Obama administration in its first five years exceeds the amount approved by the Bush administration in its full eight years in office by nearly $30 billion. That also means that the Obama administration has approved more arms sales than any U.S. administration since World War II.
-
Transparency Reporting
-
I had not realised that Julian had so much Scottish ancestry or quite so recently. After independence, he will definitely be entitled to a Scottish passport!
-
Environment/Energy/Wildlife
-
The Wall Street Journal editorial board recently recycled many of the same claims it made in a 2009 editorial titled, “California’s Man-Made Drought.” Right-wing website Hot Air dubbed the drought “California’s ‘man-made’ environmental disaster.” And when potential 2016 presidential candidate Carly Fiorina described the drought as “a man-made disaster” during an appearance on Glenn Beck’s radio show, Beck demanded to know why “we don’t hear that story on the news at all,” while Rush Limbaugh declared that “there is a man-made lack of water in California,” and “[Fiorina is] right.”
No, these media figures haven’t suddenly seen the light on climate change. Instead, they’re using the historic drought as an opportunity to baselessly attack environmental policies.
-
A fire has broken out at a Russian nuclear submarine during repair work at a shipyard in Severodvinsk. The cause of the fire is believed to be related to welding work on the sub.
The United Shipbuilding Company confirmed the incident, adding that nobody was hurt in it. According to the the shipyard’s spokesperson, the submarine’s nuclear reactor was shut down and its weapons unloaded before the repair started.
-
A Moscow radio station published a picture showing smoke billowing from the submarine.
-
A Russian nuclear submarine has caught fire in a shipyard, according to news agency RIA Novosti.
The 500m-long (1,640ft6) 949 Antei was being repaired on in Zvyozdochka shipyard in Russia’s northern province of Arkhangelsk, according to Russian news agency reports.
-
Russian news agency Interfax cited a separate source as saying there were no weapons on board the submarine and other news agencies said the fire had started during welding, causing insulation materials to catch fire.
-
PR/AstroTurf/Lobbying
-
Experts in military and veteran suicide issues are criticizing National Rifle Association board member Ted Nugent for claiming that veterans are committing suicide because they believe President Obama “is the enemy.”
-
The reaction from fans — and readers — might have been different if any of the reporters had asked actual security experts about the efficacy of metal detectors at preventing terrorism. Because as I found in researching the topic for Vice Sports (9/23/14) last fall, there’s no evidence that walkthrough metal detectors at airports or ballgames make anybody safer — and reason to believe they may even make us less safe.
-
Censorship
-
The UK’s attempts to filter the Internet of all of its naughty bits are nothing if not amusing, whether it’s the nation’s porn filter architect getting arrested for child porn, or the complete and total obliviousness when it comes to the slippery slope of expanding those filters to include a growing roster of ambiguously objectionable material. The idea of forcing some kind of overarching structure upon porn consumption in the UK is another idea that never seems to go away, whether it’s requiring a “porn license” (requiring users to clearly opt in if they want to view porn) or the latest push — mandatory age checks.
-
Privacy
-
Microsoft has reversed its position on the contentious Do Not Track (DNT) browser feature, saying Internet Explorer will no longer send DNT signals to websites by default.
“Put simply, we are updating our approach to DNT to eliminate any misunderstanding about whether our chosen implementation will comply with the W3C standard,” Microsoft chief privacy officer Brendon Lynch said in a Friday blog post.
-
Over the past few years we’ve followed the saga of TrueCrypt. The popular and widely used full disk encryption system got some attention soon after the initial Snowden leaks when people started realizing that no one really knew who was behind TrueCrypt, and that the software had not been fully audited. Cryptographer Matthew Green decided to lead an effort to audit TrueCrypt. A year ago, the team released the first phase, finding a few small vulnerabilities, but no backdoors and nothing too serious. This week the full audit was completed and again finds no evidence of any backdoors planted in the code.
-
On the second floor of a narrow brick building in the London Borough of Islington, Edin Omanovic is busy creating a fake company. He is playing with the invented company’s business cards in a graphic design program, darkening the reds, bolding the blacks, and testing fonts to strike the right tone: informational, ambiguous, no bells and whistles. In a separate window, a barren website is starting to take shape. Omanovic, a tall, slender Bosnian-born, Scottish-raised Londonite gives the company a fake address that forwards to his real office, and plops in a red and black company logo he just created. The privacy activist doesn’t plan to scam anyone out of money, though he does want to learn their secrets. Ultimately, he hopes that the business cards combined with a suit and a close-cropped haircut will grant him access to a surveillance industry trade show, a privilege usually restricted to government officials and law enforcement agencies.
-
The Department of Homeland Security aims to increase its domestic human intelligence collection activity this year, the Department recently told Congress.
In a question for the record from a September 2014 congressional hearing, Rep. Paul C. Broun (R-GA) asked: “Do we currently have enough human intelligence capacity–both here in the homeland and overseas–to counter the threats posed by state and non-state actors alike?”
-
Let me make something clear: I am pro dick pic. I mean, who doesn’t love the occasional consensual staring contest with a one eyed bandit? When Edward Snowden told everyone to keep taking dick pictures on Last Week Tonight, he was making an important point. Governments are meant to be accountable to people and controlled by them in democracies. Leaving aside any specific analysis of how much or whether America is really a democracy, Snowden’s message is profound and valid. We should have that freedom, and we have it by practicing that freedom at our governments. But we should be on a dick pic strike nevertheless.
-
Civil Rights
-
Previously, Zeman said that his visit to Russia would be a “sign of gratitude for not having to speak German in this country.” He also intended to pay tribute to the memory of 150,000 Soviet soldiers who died liberating Czechoslovakia.
-
Barrett Brown, the brash journalist and former member of Anonymous who was sentenced in January 2015 to over five years in federal prison, had his e-mail privileges suddenly revoked, seemingly for corresponding with journalists.
On Sunday, Brown’s supporters published his account of the punishment, describing how he suddenly lost access to his prison-supplied e-mail account on March 31. In the ensuing days, Brown attempted to contact various prison officials to get further information, including someone named “Trust Fund Manager Coleman.”
-
Malaysia has passed a controversial anti-terrorism bill, which the government says is needed to tackle the threat from Islamic extremists.
The bill reintroduces indefinite detention without trial – something the prime minister had repealed in 2012.
-
April 5th marked the five year anniversary of WikiLeaks publication of the Collateral Murder Video. The footage of a secret US military video depicted an Apache helicopter killing Iraqi civilians, including two Reuters journalists. It provided an uncensored view of modern war for the world to see. The light that shone in the darkness was the conscience of a young woman. Chelsea Manning (formally Bradley Manning) is now serving 35 years behind bars for her great public service.
-
April 5 marked the five-year anniversary of the release of the Collateral Murder video by WikiLeaks. The shocking footage showed the entire world the 2007 US Apache attack helicopter airstrike on Baghdad that killed 12 people – including two Reuters staff members – and injured two small children.
-
On 1 April 2015, Barack Obama signed into law an Executive Order “Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities”
Media reports speculated that the new powers granted by this Executive Order would enable executive authorities to confiscate cryptocurrency holdings and even prohibit donations to Edward Snowden’s defence fund.
Since news of the Executive Order came to light, the bitcoin account for Edward Snowden’s official defence fund experienced a significant surge in donations , due at least in part to this post on reddit. We have received over 200 separate donations this month, including a single donation of 8.49 bitcoin, or over 2000 US dollars.
-
US President Barack Obama has issued an executive order authorising the Treasury Secretary to enact sanctions against those whom it deems to have “have materially assisted, sponsored, or provided financial, material, or technological support for” cyber-related crimes.
Reuters reports that even US lawmakers consider the order “surprisingly broad”, and investigative journalists are concerned about its wide-ranging scope.
-
Vulnerable young boys were taken from a children’s care home in Belfast in the 1970s, trafficked to London and abused by powerful figures who were part of a Westminster pedophile ring, a victim has claimed.
Richard Kerr, a victim of child sex abuse at the Kincora care home for boys, told Channel 4 News he also suffered abuse at London’s Elm Guest House and Dolphin Square.
-
ANOTHER official at the National Democratic Assembly (Al Wahdawi) has been arrested for allegedly criticising military action in Yemen.
Deputy secretary general Mohammed Al Motawa was yesterday accused of spreading false and malicious information about Operation Decisive Storm, led by Saudi Arabia and nine allied countries, including Bahrain.
The coalition countries launched air strikes against Houthi rebels in Yemen on Thursday after Shi’ite militias sought to topple the Yemeni government led by President Abd-Rabbu Mansour Hadi.
-
A Pakistani judge on Tuesday ordered that criminal charges be filed against a former CIA lawyer who oversaw its drone program and the one-time chief agency operative in Islamabad over a 2009 strike that killed two people.
Former acting general counsel John A. Rizzo and ex-station chief Jonathan Bank must face charges including murder, conspiracy, terrorism and waging war against Pakistan, Justice Shaukat Aziz Siddiqui of the Islamabad High Court ruled. A court clerk and a lawyer involved the case, Mirza Shahzad Akbar, confirmed details of the judge’s ruling.
-
Permalink
Send this to a friend
04.06.15
Posted in News Roundup at 6:33 pm by Dr. Roy Schestowitz

Contents
-
The original objective in starting the compilation was to dispel the FUD that Linux does not have the necessary software to compete with Windows. Over time, the aim of the compilation was to enable Linux users, whatever their level of computing experience, to identify software of all types that is worth exploring. With the huge range of open source software available, there is simply not enough time for users to evaluate every application even within a single category of software.
-
Thus far, no member of Linux Australia has expressed outrage or otherwise negative feelings about the organization’s handling of the matter. In fact, they lauded the president for transparency and disclosure. Let this be a lesson in server administration, then: sometimes even when you think you’ve covered all your bases, you haven’t.
-
-
Desktop
-
So today I pulled the cables from my main Linux desktop, plugged them into the Windows machine and hit the power button, just to see if it would still boot for a few days — long enough for me to prepare a couple of returns. Because the machine is old and hadn’t been started for a year, I fully expected the hard drive to fail during boot. Unfortunately, it booted, and in a few minutes I was greeted by the Windows splash screen.
-
Server
-
CoreOS’s first plan was to bring container-enabled Linux to the cloud. The company is still working on that, but with its new program Tectonic, it’s upped its game. The company is working on bringing Google’s container management system, Kubernetes, to the enterprise.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Kernel Space
-
While the Linux 4.0 kernel hasn’t even been released yet, there’s already a number of items we’re looking forward to seeing with Linux 4.1.
-
Ten years ago this week, the Linux kernel community faced a daunting challenge: They could no longer use their revision control system BitKeeper and no other Software Configuration Management (SCMs) met their needs for a distributed system. Linus Torvalds, the creator of Linux, took the challenge into his own hands and disappeared over the weekend to emerge the following week with Git. Today Git is used for thousands of projects and has ushered in a new level of social coding among programmers.
To celebrate this milestone, we asked Linus to share the behind-the-scenes story of Git and tell us what he thinks of the project and its impact on software development. You’ll find his comments in the story below. We’ll follow this Q&A with a week of Git in which we profile a different project each day that is using the revision control system. Look for the stories behind KVM, Qt, Drupal, Puppet and Wine, among others.
-
With the systemd developers pursuing their vision for how distributions/software should be distributed, more Btrfs specific functionality is being added to the init manager.
As systemd’s grand plans involve the use of the Btrfs file-system for having per-user and per-app Btrfs sub-volumes and take advantage of other features (like snapshots) presented by this next-generation Linux file-system, systemd is starting to see more code specifically for handling Btrfs features.
-
Of the well known operating systems in the world, Linux has had the distinct reputation of being installed almost anywhere there is a processor to be found. Of course, just because you can, doesn’t mean you should, but running Linux on any computer possible has always been an exercise in skill and a cause for bragging. While Canon’s digital cameras are not exactly as esoteric as refrigerators and washing machines, getting Linux to run on these more often than not very closed devices can open up a world of possibilities.
-
Early adopters are using unikernel technology to run websites, critical systems infrastructure, cutting-edge research or to operate as a network appliance. MirageOS, for example, is serving as a successful testbed for cutting-edge research at the University of Cambridge and other academic groups, while Galois’ clients use The Haskell Lightweight Virtual Machine (HaLVM) for a number of network services and functions.
-
Graphics Stack
-
While the Radeon, Nouveau, and LLVMpipe/Softpipe drivers have already supported the OpenGL ARB_clip_control extension, the Intel (i965) driver now finally supports this OpenGL 4.5 extension too.
-
Following Intel’s development of NIR as the new intermediate representation for Mesa and the Raspberry Pi graphics driver switching to NIR, the Freedreno Gallum3D driver as the open-source user-space GPU driver for Qualcomm Adreno now has NIR support too.
-
Benchmarks
-
Last week I discovered The Fan Club’s Experiments page. It reminds me of the Debian Experiments community on Google+. I like the concept of trying out all kinds of different things and reporting back to the community on how it works. I’ve been meaning to do more of that myself so this is me jumping in and reporting back on something I’ve been poking at this weekend.
-
Applications
-
For users of the vim text editor interested in new syntax highlighting options, meet color_coded.
-
Instructionals/Technical
-
-
-
-
-
-
-
-
-
I’ve recently witnessed a lot of discussions around using load balancers and FreeIPA on the user’s mailing list, and I realized there is a lot of confusion around how to use load balancers when Kerberos is used for authentication.
-
Wine or Emulation
-
Following Friday’s release of Wine 1.7.40, the equivalent Wine-Staging update is now out with a few extra changes.
-
Games
-
Freedom Planet is a rather quirky looking platformer with tons of action, motorcycles, cats, and lots of other random junk.
-
Making the rounds on the Internet this weekend is that BioWare — which is owned by EA Games — has released their first open-source project.
-
The Unvanquished development team had the pleasure of announcing today, April 6, the immediate availability for download of a new Alpha build of their FPS (First-person shooter) game for GNU/Linux, Mac OS X, and Microsoft Windows operating systems.
-
Desktop Environments/WMs
-
For those still living in the GNOME 2 days, the MATE Desktop 1.10 has arrived for Easter.
The MATE Desktop 1.10 release has more work on porting to GTK3, adds GObject introspection support, provides many RandR fixes, adds a new org.mate.desktop GSettings schema, and has numerous other changes.
-
K Desktop Environment/KDE SC/Qt
-
A lot has been happening on the KDE side of openSUSE… this post summarizes what’s been going on so far.
-
Talked about recently were the KDE Plasma 5 transition plans for openSUSE and coming out today are more details on the planned switch.
[...]
In terms of the Plasma 5 upgrade in openSUSE Tumbleweed, the developers feel that with the upcoming KDE Plasma 5.3 release there is “the level of quality expected from the default openSUSE desktop” and so for this milestone is when they plan on making the switch.
-
Krita 3.0 is going to be the first Qt 5.x-based Krita. April 13th, 2006, we ported Krita to Qt 4. Seventeen days after porting started, I could publish Krita 2.0 runs!”
-
For users of KDE’s Krita digital painting / raster graphics editor, the Qt5 port of the program won’t be fully ready for at least another half-year, but it’s being done right.
-
-
Linux, originally developed as a free-to-use operating system, is growing more powerful, capable, and user-friendly by day. Currently there are a large number of Linux versions, called distributions or “distros” for short, available in the market, each followed by a large group of users and developers who are working to further enhance the product. To identify the best fit for your organization, it’s important to know the capabilities and limitations of these distros.
The Linux operating system is basically a kernel or a wrapper over the physical hardware that enables applications to interact with the underlying processing machinery. Since it is open source, organizations are free to use its core elements to build and release their own distros. A large number of organizations have already developed several flavors of Linux distros targeting different audiences and adding flexibility and choices based on their requirements.
-
New Releases
-
Jacque Montague Raymer had the pleasure of announcing the immediate availability for download of the MakuluLinux Unity 8 computer operating system. This is the first ever edition of the MakuluLinux distribution to use the Unity desktop environment from the upstream Ubuntu Linux OS.
-
4MParted, a Linux distribution based on the 4MLinux and GParted, has been upgraded and is now ready for download and testing.
-
Screenshots
-
Arch Family
-
The Manjaro development team, through Philip Müller, was proud to announce recently that the upcoming Manjaro Linux 0.8.13 operating system would ditch the regular Calamares installer in favor of the another one called Thus, which will boast a wide range of improvements.
-
Red Hat Family
-
According to Matt Asay, it’s time for Red Hat to step up and make OpenStack work for the enterprise. Do you agree?
[...]
For example, CEO Jim Whitehurst explained that half of its OpenStack sales were six-figure deals (though how he answered the question implied that a significant chunk of every deal involved professional services to make OpenStack work), and CFO Charlie Peters called out that several of Red Hat’s top-30 deals included an OpenStack component.
-
Debian Family
-
WhyTheName is a very useful Debian wiki that explains the name of most packages found in the operating system and teaches readers some cool new facts.
-
Derivatives
-
Canonical/Ubuntu
-
Canonical is almost ready to offer the next generation of its Unity environment for the desktop, and it will be accompanied by Mir, their brand-new display server. One of the community’s biggest worries was that GTK apps will have a problem running on the new desktop, but that issue won’t be a problem.
-
Ubuntu for phones has been officially released and it’s running on Bq phone in the wild, not to mention the thousands of Nexus 4 devices, but not many people know that it also comes with an integrated default firewall.
-
Cube’s $399, Ubuntu-based “i7-CM” tablet has an Intel Core M CPU and an 11.6-inch HD display. Meanwhile, an Ubuntu-driven “MJ Tech” tablet has broken cover.
A Chinese company called Cube, owned by Ele Technology, has begun selling an Ubuntu Linux-based version of its Windows-based i7 tablet. The Cube i7-CM appears to be one of the first tablets to run the Ubuntu Touch UI extensions.
As first reported by CNGadget, and picked up by Liliputing, the i7-CM starts at just $399 at AliExpress, compared to $581 for the Windows version. The 11.6-inch tablet is notable for running on one of Intel’s new 14-nm fabricated Core M processors. Meanwhile, at least two other Ubuntu tablets are also in the works, including a model from MJ Technology.
-
The Ubuntu MATE developers are preparing for the launch of the latest 15.04 branch of the operating system. One of the features to be present in Ubuntu MATE 15.04 is Compiz integration, and one of the developers has put together a video showing all the cool stuff to be available.
-
If iOS, Windows and Android tablets are not to your liking you might be interested in a new Ubuntu tablet in the form of the Cube i7-CM that launches in China this week priced at around $399.
Even though the Ubuntu tablet is launching in China international shipping is available, but be warned the $399 price is limited to launch and is expected to rise to an as yet unspecified higher price later on its been revealed.
-
We’re not far from the final release of Ubuntu 15.04. So it’s a good time to take a peek at the changes and new features in Canonical’s latest version of Ubuntu. Unfortunately, Ubuntu 15.04 might be somewhat underwhelming for those expecting tons of new features. There are some important changes, but most of them won’t be apparent to desktop users.
-
Unity 8 is not ready for regular use, but Canonical is improving it all the time. Users need to know that despite all the important changes and improvements announced for the Unity 8, it won’t be terribly different from the current implementation.
-
Ubuntu developers are working hard to improve the battery life the Ubuntu Touch operating systems, and they are preparing for the launch of a new major update that should provide better performance in this regard.
-
Flavours and Variants
-
A new update has been announced for the nOS Ubuntu-based Linux operating system that uses the KDE4 desktop environment. nOS is a rolling-release distribution, but new ISO images are being released by the nOS development team at the beginning of each month for those who want to install the operating system on new computers.
-
-
OSMC is the successor of Raspbmc and Crystalbuntu, created and maintained by Sam Nazarko. It is licensed under the GNU GPL v2 license. It aims to be simple and easy to use, with no knowledge of Linux needed. This is because the system is managed through the OSMC interface. If you want to experiment, there are the complete Debian repositories available containing more than 30,000 packages.
-
It look a little longer than expected, but Intel’s Compute Stick PC is up for pre-order through some online stores.
The stick-sized computer is available from Newegg with Windows 8.1 on board. If you’re the type that always spells “Microsoft” with a dollar sign, Newegg is also selling the Linux version for $110. Liliputing reports that it comes with Ubuntu 14.04. The price for the Linux Compute Stick was supposed to be $89, but we’ve yet to see it anywhere for that cheap.
-
The palm-sized device will be available in both Windows and Linux flavors, both of which will come with an Intel Atom Z3735F processor (Core M version in the cards), HDMI output, full-size USB 2.0 port, microSD card reader, microUSB port (for power), Wi-Fi 802.11b/g/n, and Bluetooth 4.0.
-
A Softpedia user has brought to our attention that the Intel Compute Stick mini computer, which was unveiled by Intel at CES 2015 back in January, is now available for pre-order on several retail websites, including Amazon, Newegg, and Zones.
-
-
-
-
-
-
-
Phones
-
My wife recently got a new phone which left the Nexus 4 she had been using previously up for grabs. I had been itching to give Sailfish OS a try on a piece of modern hardware for some time now so I took this as an opportunity to load it up on the now extra phone.
-
Android
-
-
Android 5.0 Lollipop has so far been rolling out for smartphones but it seems that Samsung is expanding that now to tablets.
Samsung has apparently started seeding the Android 5.0 Lollipop OS to Samsung Galaxy Tab S10.5 LTE units though it may be for a select number of regions only.
-
But since Android lets app makers do certain things that Apple prohibits, there are a few exclusive options that stand out.
-
Android: The rollout of Android Auto is one of Google’s slowest, and unless you have a Lollipop phone and an expensive aftermarket head unit, you can’t use it. If you’d rather skip the expensive car modifications, AutoMate can give you a similar dashboard experience with just your phone.
Inexplicably, Android Auto has not officially been released in a simple app form that any old phone in landscape mode could use. While AutoMate is not official in any way, it does many of the same things, including controlling your music player, getting directions, and reading your texts aloud.
-
Up until recently, Xposed only supported devices running Android 4.4 or earlier, but in February Xposed developer Rovo89 released Xposed Framework for Android 5.0. Now there’s an unofficial build that works with (some) devices running Android 5.1.
-
OnePlus launched the OnePlus One last year, a high end smartphone that offered an excellent value to the consumer. A couple of days ago OnePlus announced OxygenOS, an operating system based on Android Lollipop 5.0.2, available for OnePlus One owners.
-
Google made strides in 2014 to improve Android security, but a large number of legacy users might not see the full benefit.
-
The fact is, though, hard data now shows that Android is not a target of hackers, and even in the case of the security vulnerability that PaloAlto Networks identified, no reports of actual hacks arrived. In a new report released by Google, the remarkable news has emerged that fewer than one percent of Android devices had a potentially harmful application installed last year.
-
Verizon has begun rolling out the latest Android 5.0 update for the Samsung Galaxy Note 4, and in addition to all of the features and improvements you would expect to get with a Lollipop upgrade, it also adds support for VoLTE.
This Lollipop upgrade includes Samsung’s latest TouchWiz software for the Note 4, which has been redesigned slightly to better match Google’s Material Design guidelines.
-
Amazon Prime Instant Video finally supports Android-powered tablets, almost 7 months after making its Android debut. The service, which offers thousands of movies and TV shows to Prime subscribers, is available through the Amazon Appstore.
-
Arne Exton, the creator of numerous distributions of Linux that are available for download on Softpedia, was happy to inform us about his latest creation, RaspAnd, a custom OS that allows you to run the Android 5.1 Lollipop mobile operating system on a Raspberry Pi 2 computer board.
-
Welcome to this week’s best Android apps roundup. As ever, prices are correct at the time of writing, and (Free + IAP) means the app is freemium and uses in-app purchases.
-
The problems with iOS 8 have stretched on for months. Come on, Apple!
-
Sony Mobile already started rolling out the Android 5.0 Lollipop update for the Sony Xperia Z2 and Sony Xperia Z3 series in the Baltic and Nordic regions mid-March, but the mobile manufacturer has not sent out the updates to other countries yet.
-
Although iOS scored widget support last year, Android is still the undisputed king of widgets. Naturally, those who swear by Google and Android have tinkered with these; in the meantime, those heavily investing into customization are certainly always searching high and low for a new widget that will give a whole new flavor to their Android screens.
-
We knew it was coming, and over the weekend it finally arrived: OnePlus has officially released the custom-made OxygenOS flavour of Android that will be powering the company’s handsets and devices in the future.
-
When Android 5.0 Lollipop was released last year, it was filled with bugs and customer complaints started to pour in. Google rolled out Android 5.0.1 Lollipop and Android 5.0.2 Lollipop to try to fix the issues, but those were not enough.
Google started rolling out Android 5.1 Lollipop in March, as a bigger maintenance update that looks to address the several issues that plagued the initial release of Google’s latest mobile operating system.
Android 5.1 Lollipop improves the overall stability, battery life and performance of Android devices compared to the previous release. Most of these changes are under the hood, but there are also several new features that Android 5.1 Lollipop brings.
-
The unexpected Huawei Watch appears to be the best Android Wear device ever made. To further build up hype around the device ahead the Apple Watch launch, the company published 12 things “you need to know” about the Huawei Watch on its community pages.
-
Michael Bryzek saw open source playing a big role in his company’s IT infrastructure, right from the start.
The CTO and co-founder of online retailer Gilt Groupe, Bryzek built the eight-year-old members-only shopping site using the Web framework Ruby on Rails, the Linux operating system and the object-relational database system PostgreSQL — all open-source tools.
He says open source doesn’t have the “friction” — that is, sticking points like contractual limits — that typically come with commercial products. He also says his engineers can be more creative and innovative with open source.
-
Jay, a javascript wallet framework developed for NXT, has just released their open-source, trustless web wallet, which may be the easiest way to make NXT transactions yet.
-
Events
-
ApacheCon is coming up, and within that massive conference there will be a glimmering gem: a forum dedicated to Spark.
-
But one change that has become especially noteworthy is the degree to which Apache Spark has captured the attention and excitement of the industry.
-
SaaS/Big Data
-
Piston Cloud Computing, Inc. has announced the availability of Piston CloudOS 4.0, which is billed as “an operating system for the modern data center that transforms clusters of commodity servers into a single unified environment.” The platform can purportedly deploy OpenStack in minutes, and CloudOS 4.0 also lets users deploy Hadoop and Spark on bare metal, with forthcoming support for container orchestration tools such as Kubernetes, Mesos and Docker Swarm.
-
Piston Cloud Computing has announced a move beyond OpenStack for its Piston CloudOS 4.0, an operating system for the data center that transforms clusters of commodity servers into a single unified environment.
-
The company was founded in 2011 by Chris Kemp, who had been chief technology officer for IT at NASA where he helped create OpenStack. Kemp left NASA to push OpenStack forward. As Kemp explained to Tech Republic in the fall of 2014, “I wanted the project to live on beyond the work we were doing … I knew that if we could open-source this work under a very flexible open-source framework, and really get a community gathered around contributing to it, the project could live on.”
-
Business
-
Semi-Open Source
-
At the outset, one needs to appreciate that the word “Religion” is related to the Abrahamic faiths more. Eastern spiritual traditions, which find their beginnings in Hinduism, are neither faiths nor religions. Hinduism is an amalgam of various spiritual traditions. The ways are different, the goals are different and the very way of looking at man, divine and life is different. Open Source, personal, subjective, experiential and not fixed in history via a person or event. Now, let us look at what is on offer from Hinduism. Something that is fundamental to human well being.
-
BSD
-
OpenBSD 5.7 is planned for release in less than one month and it will be presenting a number of new features for this security-minded BSD operating system.
-
FSF/FSFE/GNU/SFLC
-
Whatever you do…..don’t get beat up over your Energy Management strategy. GNU remotecontrol is here to help simplify your life, not make it more complicated. Talk to us if you are stuck or cannot figure out the best option for your GNU remotecontrol framework. The chances are the answer you need is something we have already worked through. We would be happy to help you by discussing your situation with you.
-
GCC 5 is expected to be formally released later this month and it by far is looking to be the most exciting GNU Compiler Collection update yet! GCC 5 has amassed a ton of exciting open-source compiler features over the past year.
-
The XKCD webcomics are funny because they are usually right on the money, with just a side dish of ridiculousness. The latest one is called Operating Systems and encompasses everything that is done wrong in this world, with just a single drawing and small, smart text about Richard Stallman.
-
Public Services/Government
-
With an aim to reduce project costs, the government has decided to give preference to open source software (OSS) over proprietary in e-governance procurements.
-
Federal and state agencies must make it mandatory for suppliers to give OSS a preference over proprietary or closed source software while responding to requests for proposals. “Suppliers shall provide justification for exclusion of OSS in their response,” according to the policy statement posted to the website of the Ministry for Communication & Information Technology.
-
Openness/Sharing
-
Programming
-
As part of the mission’s education outreach program, children in UK schools will get the chance to write code to run their own applications in space. The Pis will each have a specially made sensor board attached in order to access data on the space station’s atmosphere. Schools will get the chance to run experiments in their own classroom and compare the results from space, or just make interesting applications to run on the space station. We’re really excited to see what the young minds of Britain come up with, and what they can learn from turning their ideas to a reality by programming the boards.
-
One hundred years after the mass killings of Armenians, US band System of a Down is taking the fight for remembrance beyond politicians to the world’s music fans.
The Los Angeles-area hard rockers, who have sold more than 40 million albums since the mid-1990s, are of Armenian descent and are preparing a European tour to culminate in a public concert on April 23 in Yerevan, the band’s first performance in Armenia.
-
Defence/Police/Secrecy/Aggression
-
Leaders of the U.S. Missile Defense Agency were effusive about the new technology.
It was the most powerful radar of its kind in the world, they told Congress. So powerful it could detect a baseball over San Francisco from the other side of the country.
If North Korea launched a sneak attack, the Sea-Based X-Band Radar — SBX for short — would spot the incoming missiles, track them through space and guide U.S. rocket-interceptors to destroy them.
-
At least nine people from a single family were killed when what appeared to be an airstrike by the Saudi-led military coalition struck a home in a village outside Sana, Yemen’s capital, officials said Saturday.
Village residents gave a higher toll, saying that as many as 11 members of the Okaish family, including five children, were killed in the bombing on Friday. The airstrike may have been intended for an air defense base about a mile and half away, a Yemen Interior Ministry official said.
Bombings attributed to the coalition have killed dozens of civilians since the start of the Saudi-led air offensive intended to cripple the Houthis, a Yemeni militia that has gained control of Sana and other parts of Yemen in the past eight months.
-
The real story behind America’s 30-year Cold War with Iran
[...]
The real reason the Bush White House had abandoned the opening to Iran was that the CIA and the Pentagon desperately needed to replace the Soviet threat as justification for continuing Cold War levels of appropriations.
To head off deep cuts in the CIA budget, the agency’s new director, Robert M. Gates, had identified Iran and the proliferation of nuclear weapons as a new threat. Just two weeks after Gates became director in November 1991, a “senior administration official” was quoted by the Los Angeles Times as saying that relations with Iran would remain in the “deep freeze,” because of Iran’s “continued support for international terrorism” and its pursuit of weapons of mass destruction.
That comment dovetailed with the argument Gates made in pubic testimony to fend off deep budget cuts. Testifying before the Defense Policy Panel in early December, just two days after the dissolution of the Soviet Union, Gates said the “accelerating proliferation” of weapons of mass destruction and their delivery systems were “probably the gravest concern” among post-Cold War threats.
-
Transparency Reporting
-
The CIA’s internal document designations seem to bear some resemblance to the NYPD’s use of its “SECRET” stamp — which is deployed arbitrarily and without oversight to declare certain documents out of the reach of Freedom of Information Law (FOIL) requests. If the CIA feels exemption b(5) gives it the best chance to keep documents out of the hands of journalists like Jason Leopold. it can slap these designations on as many papers as possible and mention its predetermination in FOIA lawsuit declarations.
Second, Boasberg’s refusal to challenge even a single exemption assertion by the CIA isn’t particularly good news, considering his recent appointment to the FISA court. While he has pushed back on government secrecy in the past, he’s also been just as likely to grant its wishes. Considering he’s replacing FISA Judge Reggie Walton — one of the few FISA judges to openly question surveillance tactics and hold the NSA accountable for its abuses — this latest decision seems to indicate his appointment is a downgrade in terms of government accountability.
-
Finance
-
But Will’s claim about Reagan’s job creation record is disingenuous. As Business Insider pointed out, Reagan’s so-called million job month in September 1983 was simply an outlier inflated due to nearly 675,000 striking communication workers returning to work…
-
ONCE upon a time in America, baby boomers paid for college with the money they made from their summer jobs. Then, over the course of the next few decades, public funding for higher education was slashed. These radical cuts forced universities to raise tuition year after year, which in turn forced the millennial generation to take on crushing educational debt loads, and everyone lived unhappily ever after.
-
Censorship
-
Turkey’s President Recep Tayyip Erdogan is calling for a ban on social media once again.
A spokesperson for this office said on Monday that a prosecutor has ordered Internet providers to block sites that include YouTube and Twitter, which is extremely popular in the country.
The request comes after photos spread online showing militants holding a prosecutor hostage at gunpoint last week during a takeover of this courthouse office. Prosecutor Mehmet Selim Kiraz, who investigated the death of a teenager who was hit by a police gas canister fired during nationwide anti-government protests in 2013, died last week in a shootout between police and the Marxist militants.
-
A lawyer and Turkish Pirate Party member tracked down the root of the sudden ban on all of WordPress: a court order seeking to block a single blog post written by a professor accusing another professor of plagiarism. This post apparently led to several defamation lawsuits and the lawsuits led to a court order basically saying that if blocking the single post proved too difficult, fuck it, block the entire domain.
-
Twitter and YouTube are blocked once again in Turkey as of today, April 6, following the mass circulation of photos of a hostage crisis that ended with the death of a government prosecutor. According to Hurriyet Daily News, authorities have also blocked 166 websites that posted the photos.
Although Facebook was initially blocked for the same reason, the block was lifted after the company complied with Turkish officials’ orders to remove the offending images.
-
Privacy
-
You now need an army of spies, analysts and police to watch the security cameras, check on the spies and watch for people jumping fences. This is not about the bad thing you first objected to any more. It’s now about jumping fences to get to places that have been made unreachable by them, checking on spies for telling lies, dealing with corruption among your informers, suppressing all the “SJW”s who whine about the loss of freedom and undermining your political opposition who are equally clueless about blocking fields but can see that what you are doing is hugely unpopular.
Congratulations! Your attempt to stop something your supporters disapprove of by mandating the impossible has created a police state. It doesn’t matter how bad the thing you were trying to stop is; people probably agree that it’s a bad thing.
By mandating the impossible, you caused collateral damage that outweighed any benefits, and by associating it with a thing no-one dares defend in public you were able to accidentally destroy society without opposition. And you didn’t notice because you never do for walks in the fields.
-
On his HBO program last night, John Oliver devoted 30 minutes to a discussion of U.S. surveillance programs, advocating a much more substantive debate as the June 1 deadline for renewing the Patriot Act approaches (the full segment can be seen here). As part of that segment, Oliver broadcast an interview he conducted with Edward Snowden in Moscow, and to illustrate the point that an insufficient surveillance debate has been conducted, showed video of numerous people in Times Square saying they had no idea who Snowden is (or giving inaccurate answers about him). Oliver assured Snowden off-camera that they did not cherry-pick those “on the street” interviews but showed a representative sample.
-
Microsoft has updated its ‘Do Not Track’ policy, which will no longer be a default setting in its browser, thus giving third parties like advertisers a free hand in deciding whether to track the user or not, unless the option has been turned on manually.
The ‘Do Not Track’ (DNT) setting in browsers specifies whether the user wants his or her browsing information to be available to third parties such as content providers and advertisers, who gather it so they can learn about a person’s interests and habits.
-
A controversial Transportation Security Administration program that uses “behavior indicators” to identify potential terrorists is instead primarily targeting undocumented immigrants, according to a document obtained by The Intercept and interviews with current and former government officials.
The $900 million program, Screening of Passengers by Observation Techniques, or SPOT, employs behavior detection officers trained to identify passengers who exhibit behaviors that TSA believes could be linked to would-be terrorists. But in one five-week period at a major international airport in the United States in 2007, the year the program started, only about 4 percent of the passengers who were referred to secondary screening or law enforcement by behavior detection officers were arrested, and nearly 90 percent of those arrests were for being in the country illegally, according to a TSA document obtained by The Intercept.
-
Dressed in reflective yellow construction gear while working under the cover of darkness early Monday, a small group of artists installed a tribute to NSA-leaker Edward Snowden in a Brooklyn park.
The Snowden bust stands atop a column at the Prison Ship Martyrs Monument in Fort Greene Park, a site built to honor more than 11,000 American prisoners of war who died aboard British ships during the American Revolutionary War.
-
A group of artists secretly installed a 100-pound sculpture of government leaker Edward Snowden in a New York City park early on Monday morning, though it was taken down by city officials later in the day.
The handful of people wearing yellow reflector vests and hard hats snuck into the park and, in the predawn hours, attached the massive bust of a neatly coiffed Snowden wearing his trademark square-rimmed glassed onto the Prison Ship Martyrs’ Monument in Brooklyn, which honors soldiers imprisoned in the Revolutionary War.
In a statement provided to city blog Animal, which also produced a short video about the installation, the activists said that the effort was meant to reinvigorate the focus on the leaker and the massive government surveillance that he exposed.
“We have updated this monument to highlight those who sacrifice their safety in the fight against modern-day tyrannies,” they told the website.
-
A trio of anonymous artists and helpers installed a bust of Edward Snowden in Brooklyn Monday morning.
The 100-pound statue was hauled into Fort Greene Park just before dawn, according to ANIMALNewYork, which originally reported the story.
The idea for the statue came from two artists and was made by a West Coast sculptor. Snowden leaked classified information from the National Security Agency to mainstream media in June 2013. He was charged by the U.S. Department of Justice with two counts of violating the Espionage Act and theft of government property and currently lives in Russia.
-
NYPD says the art prank is under investigation
New York City has removed a statue of former National Security Agency contractor Edward Snowden erected by a group of artists in a Brooklyn park.
-
“Last Week Tonight With John Oliver” viewers got a surprise during Sunday’s show when the British satirist interviewed a man he described as “the most famous hero and/or traitor in recent American history:” NSA leaker Edward Snowden.
-
Civil Rights
-
Eight San Francisco police officers implicated in sending and receiving racist and homophobic text messages have been suspended and are expected to be fired, according to news reports.
-
The Bureau of Prisons’ contempt for the First Amendment has been on full display this week.
Journalist and activist Barrett Brown pled guilty to offenses stemming from YouTube videos he uploaded containing a threat directed at the FBI, emails from hackers he redacted and laptops found in a kitchen cabinet that he hid from authorities. He was sentenced to five years and three months in jail on January 22.
-
On Tuesday March 31, I used the inmate computer system to send an email to a journalist of my acquaintance in which I inquired about getting him in touch with another inmate who was interested in talking to the press about potentially illegal conduct by BOP officials. When I tried to log in to the system one hour afterwards, I received a message reading: “Denied: You do not have access to this service.” I asked our Counselor Towchik about this and he called another office, from which he apparently received a vague explanation to the effect that they were “working on it”, which we took to understand that this was a system maintenance issue; he told me to return to his office later that afternoon. I did so, and he told me that several people were having issues with the system and that he would make further inquiries, and that if necessary he would bring the technical staff over to our unit the next day to discuss it with us, assuming the problem had still not been fixed. The next morning I reached my mother by phone and learned that apparently everyone on my message contact list had received an automatic email to the effect that my messaging privileges had been temporarily suspended, but I reassured her that it was merely a mistake. When I met again with Towchik, however, he conceded that the problem didn’t seem to be technical after all and that I should ask Trust Fund Manager Coleman about it at lunch. Failing to find Mr. Coleman, I met that afternoon with Unit Manger Ivory, who checked my files but could find no reason why my access should have suddenly been suspended and also advised me to meet with Mr. Coleman. At some point that day, my attempts to log in started to prompt a different message stating: “This account is on suspension until 4/1/2016 11:59:59 pm (from portal 16)”. At the next lunch period on Thursday, April 2nd, I was unable to locate Mr. Coleman, but laid out my problem to the associate warden who told me to return in five minutes, when Mr. Coleman would be present.
-
People in the West tend to have a monolithic view of Iran. But there’s a lot more to the country than the mullah-led theocracy, and it often gets ignored. And national pride is alive and well.
-
A petition launched in Venezuela opposing President Barack Obama’s latest sanctions and the labelling of Venezuela as a national security threat has topped 8 million signatures, it was announced Sunday.
President Obama issued an executive order March 9 declaring a “national emergency with respect to the unusual and extraordinary threat to the national security and foreign policy of the United States posed by the situation in Venezuela.”
Venezuelan President Nicolas Maduro thanked the supporters who backed the call for Obama to “repeal the decree” through his Twitter account.
The signatures will be handed in during the Summit of the Americas which starts later this week in Panama and will be attended by all the nations in the hemishphere.
-
On March 19th, there was a ruling [pdf] in a case in a federal district court in Vermont, brought by the National Federation for the Blind against Scribd, saying that the Americans with Disabilities Act (ADA) applied to the internet, and thus Scribd had to comply with the ADA. The specific concern is whether or not a website is a “place of public accommodation.” Three years ago there was a similar ruling against Netflix (also brought by the National Federation for the Blind), which we noted had some troubling aspects to it. Since then, there have been a number of cases that have gone the other way. And, indeed, just this week the 9th Circuit appeals court upheld a lower court ruling [pdf] saying that Netflix does not need to comply with the ADA.
-
The Scotsman claims that the police had first removed the vehicle and then replaced it, and this explains the mystery of why the gun was so far from the car after McRae’s remarkable two shot “suicide”. For me, that adds just another level of improbability to so very many. How, inside a car, you shoot yourself in the head in such a way that the gun falls out of the window, seems problematic. The car was crashed over a burn; how you order that with the suicide is peculiar.
-
The “difficult and personal” decision of whether folks like these can decide if you can shop at a store or not.
-
Fox News misleadingly slurred immigrants with legal permission to work in the United States as “illegals” during a segment highlighting attempts by disadvantaged school districts around the country to boost bilingual education initiatives.
Permalink
Send this to a friend
04.05.15
Posted in News Roundup at 8:12 pm by Dr. Roy Schestowitz

Contents
-
On April 1st the Magic Lantern team announced a proof of concept that lets you run Linux on a Canon EOS camera. Because of the date of the post we’ve poured over this one and are confident it’s no joke. The development has huge potential.
-
Desktop
-
This is a “first impression” review. I’ve had the system in my hands for all of about twenty-four hours and am still exploring and forming more solid opinions. Also any problems I had likely do have solutions, but as I said: less than forty-eight hours of ownership so I haven’t had a chance to. Linux-centric system review will follow this weekend / next week.
-
A rise of 0.5% represents 1M increase in users, assuming share of page-views = share of desktop PCs = share of users.
-
Server
-
A public server belonging to Linux Australia, the umbrella group for Linux user groups in the country, were breached on March 22, and the personal information of members may have been stolen.
-
In an email, Linux Australia revealed that its servers where compromised during the morning of 22 March. Over the course of a few hours, the organisation believes its databases containing conference information were dumped to an external source. A “currently unknown vulnerability” caused a buffer overflow that allowed the hacker to acquire root access.
-
I think you do not even begin to understand the complexities of how communities in Linux interact with each other. I have friends across Red Hat, Ubuntu, Fedora, Arch, Debian and countless other distributions that I’ve acquired during the past 5 years of working on Kubuntu and KDE. Sure, from time to time we joke about the short comings of one another’s projects, but that’s what they are, jokes. We most certainly do not intend to belittle each others work and to be honest, I am quite happy that you’re not part of this community.
-
How could I have missed ONLYOFFICE? If not for this How to Forge article on installing it, I would have never known that it existed as a hosted alternative to Google Docs/Spreadsheets or that you can self-host the software, though I’m not sure how functional the roll-your-own version is at this point.
-
Kernel Space
-
Sasha Levin has announced the immediate availability for download and update of the Linux kernel 3.18.11 LTS (Long Term Support), a release that brings a great number of bugfixes, updated drivers, and other important improvements to the most advanced LTS version of the Linux kernel.
-
Applications
-
-
-
For users of QEMU as part of their Linux virtualization that wish to test out the very latest features, the QEMU 2.3-rc2 development release is now available.
-
-
There are so many different codecs out in the world — some are extremely popular, and others are barely used. While you’re using Linux, you may come across all sorts of codecs, and you might want to use some codecs rather than others.
-
Proprietary
-
Opera 29 build 1795.30 Beta used Chromium 42.0.2311.60 as code-base and brings bug-fixes, while Opera 30 build 1820.0 Dev comes with a tab cycling inspired from the classic versions of the browser, permitting the users to cycle tabs in the order of the most recently used tabs. If you use the Opera sync service, you will see the tabs left open on other devices where you have Opera installed.
-
Instructionals/Technical
-
-
-
-
-
-
-
KDAB works on a lot of projects based on qml.
-
Games
-
Version 1.1 of Godot, an impressive open-source game engine, is now out in beta form.
-
Wine development team was able to produce a new experimental release today. 1.7.40 bringing many new features and as many as 29 bugfixes.
-
Will Fight For Food: Super Actual Sellout: Game of the Hour is actually a real name, blimey! It’s a comedy role-playing brawler with deep conversation options, and a nonlinear plot.
-
Cortex Command is a game that came with a Humble Indie Bundle quite some time ago, sadly the Linux version fell behind a lot (last update in 2012). Looks like that could end soon, woo!
-
VoidExpanse is a really interesting 2D space sandbox RPG that has recently released in full for Linux. I hadn’t tried it since January, so I’ve been eager to see the full release in action.
-
Desktop Environments/WMs
-
Torvalds, in a now-deleted Google Plus post, had called Xfce “A step down from GNOME 2, but a huge step up from GNOME 3″.
Xfce’s biggest problem seems to be that no one sticks with it. Torvalds soon moved back to GNOME and, after experimenting with Xfce, Debian also went back to using GNOME as the default for the upcoming Debian Jessie.
-
MATE, one of the most lightweight and appreciated open source desktop environments used in numerous distributions of Linux, including Ubuntu MATE and Linux Mint, has reached today version 1.10.0, a released that introduces several new features and a great number of improvements.
-
K Desktop Environment/KDE SC/Qt
-
Krunner is exactly like that lovely, lovely 80s futuristic Dystopian sci-fi movie with Arnold and Jesse, except that is different in every single way. Now, for those of you who’ve fiddled with KDE before, possibly on a roof, hihi, then Krunner is not a stranger. It’s a familiar and useful application available in the desktop framework set of default tools. Only now we have Plasma at our disposal, and we need to give it a fresh new try.
-
This is not about KDE e.V.’s new time travel program. This is about Plasma and its concept of Activities. They have been a topic of hot debates. Some people love them, some don’t care. Björn called for finding a new metaphor which better fits the mental model of the user, so that Plasma’s activities can appeal to a larger group of people. Here are my thoughts.
-
I must say KDE Connect is one of my personal killer features in our KDE eco system and if you haven’t tried it, you should. Really. It always makes me smile when someone tells me “sure I’m using KDE Connect” – my sister’s been over for lunch a few days ago and I spotted her phone on the “Available Devices” list. That was quite surprising, to say the least. However, it makes me sad to see how we suck at marketing. This made me think on how we could make KDE Connect an integral part of our user experience rather than a 3rd party kind of thing.
-
The next Skrooge version, initiating the 2.x naming scheme, will be based on kf5. Don’t expect too much in terms of functionalities or appearance, this is for some other time.
-
-
New Releases
-
finally the long wait is over, The MakuluLinux unity desktop is now live and available for download, You can head over to the Unity section and check out the release notes and grab your copy from the download section. Hope you guys enjoy this release, a lot of hard work went into making this and I want to than all the testers for their hard work in helping making this release a unique one !
-
The next incremental update of LXLE has been released, ticking it up to 14.04.2 along with the last 32bit version of LXLE ever, which is based on 12.04.5. The 32bit closely mirrors the changes to the latest 64bit edition of the OS.
-
Approximately a month ago, we’ve reported that the Beta release of the Lubuntu-based LXLE Linux distribution was released introducing UEFI (Unified Extensible Firmware Interface) support in the 64-bit ISO images, and that they’ve decided to switch to SeaMonkey as the default web browser. Today, we announce that the final release of LXLE 14.04.2 is now available for download.
-
PCLinuxOS/Mageia/Mandriva Family
-
Debian Family
-
In my opinion, creating and maintaining Debian copyright file is the most boring task required to create a Debian package. Unfortunately, this file is also one of the most important of a package: it specifies some legal aspect regarding the use of the software.
-
Derivatives
-
Canonical/Ubuntu
-
Canonical is about to release a new update for the Ubuntu Touch RTM branch, used on both Ubuntu Phones, created by Bq and Meizu, which will most likely bring improvements in battery life, among others.
-
Despite the fact that Ubuntu Touch is a young platform, over 1200 apps are already available for the Ubuntu Touch OS, including some real important apps, like Telegram, Cut The Rope, Tox or GCompris.
-
Flavours and Variants
-
elementary OS 0.3 Freya is not even finished and the hard working team behind one of the most beautiful distributions of Linux have started development on the next major release of the operating system, elementary OS 0.4, which is rumored to be released sometime in 2017.
-
-
-
Phones
-
Android
-
Android 5.0 Lollipop (known previously as just L) was the biggest change to Android since Ice Cream Sandwich. Frankly, I’d rank it as the biggest change to Android ever, for a variety of reasons.
-
Last year, Chinese phone maker OnePlus tried to take on Samsung and HTC with a flagship-style phone at half the price. That device, the OnePlus One, ran a customized version of Android developed by Cyanogen, but now the company is ready to unveil its own software. After a couple of delays, OxygenOS is now available for OnePlus One owners to download and flash onto their smartphones.
-
After a pretty sizable delay, OnePlus has at last released OxygenOS, its in-house version of Android 5.0 Lollipop. As promised back near the start of the year, this Cyanogen replacement is all about a “back to basics” approach that keeps things stock unless the startup thinks a new feature would be genuinely useful. Right now, that’s largely limited to features you already had on your One: you can draw Oppo-style gestures to trigger functions when the screen is off, switch between hardware and software navigation keys and customize your quick-access settings. OxygenOS isn’t for the faint of heart at this stage, since you’ll have to be comfortable with installing ROMs (and likely put up with early bugs), but it’s worth a shot if you want to catch a glimpse of OnePlus’ software future.
-
The China-based mobile phone manufacturer has been teasing OxygenOS since last year, after the company encountered issues when launching its One phone in India. It learned that Cyanogen, the organization behind CyanogenMod, had granted exclusivity to another manufacturer in the country, which ultimately expedited OnePlus’s development of OxygenOS.
-
Asus has raised its sales expectations for smartphones to 30 million for this year. The company is on the rise in this category, given it only shipped 10,000 units in early 2014.
-
ASUS has been ramping up its mobile strategy in the past few months, announcing cost effective products in both the smartphone and wearables markets. As the new Zenfone 2 range makes its way out around the world, ASUS has just updated its sales expectations to 30 million units for 2015.
-
The Android 5.0 update (also known as Android L or Lollipop) has been very slow to roll out on Samsung flagship phones. Ever since it was announced in June of last year and officially launched in November of that year, its trickling down has been very slow, especially for those who are users of the Samsung Galaxy S5, the S4, the Note 4, the Note 3, and the Note Edge. There have been reports that Android 5.1 might be just as delayed as Android 5.0.
-
Amazon doesn’t seem to particularly want Android users to enjoy its video streaming service. First it took its sweet time expanding the offering out from Fire and iOS devices. Then when it did finally bring the app to Android, it required installing the standard Amazon app, which then prompted you to install a dedicated Prime Instant Video app from the Amazon Appstore (Google Play, what’s that?). After that, it only ran on phones. Tablets, for the most part, were inexplicably left out.
-
If you’re a fan of the “inbox zero” mentality when it comes to managing email, odds are you’ve tried Mailbox for Android. The app, which was an iOS exclusive for some time, makes it easier than ever to delete, snooze and archive emails with just a few swipes. When the application launched on Android, there were few differences between the iOS and Android versions, at least aesthetically speaking. But today that changes, as Mailbox is receiving quite the update to version 2.0.1 which brings a Material Design refresh to the app.
-
But that positive news carries a darker undertone. Google’s “Chrome app” platform was already underperforming, and now developers have even less incentive to write Chrome apps when they can reuse their existing Android apps.
-
The Sony Xperia line will finally get the much awaited Android Lollipop 5.0 OS update after the company formally announced the rollout through Twitter.
-
Sony might have taken a lot of heat for being so late to update its current flagship phone. But the manufacturer apparently isn’t taking any chances when it comes to Android 5.1. New firmware has been certified for both the Sony Xperia Z3 and Sony Xperia Z3 Compact. The new firmware version is 23.2.A.0.278.
-
Sony has shared a teaser on its Sony Xperia Google+ page showing the Xperia Z with Android 5.0 Lollipop’s lock-screen notification feature and the tag “Coming Soon”, indicating that the Japanese company could release the new update to the first generation Xperia smartphone, ahead of the newer Z1 and Z Ultra models.
-
-
ONOS has announced the availability of the second release of its open networking operating system, Blackbird, promising to bring carrier grade Software Defined Networking (SDN) implementation option for service providers. The ONOS Blackbird release includes a set of metrics to effectively measure performance and other carrier-grade attributes of the SDN control plane.
-
If you’re familiar with Unix-like free software operating systems, I’m sure you’ve probably lost count of the number of Linux distributions in active developments. I know, it’s a very long list, and growing.
But get ready for the same trend on the container technology side, because the conditions that made it possible to have hundreds of Linux distributions – freely available source code, hordes of developers with time to spare and an itch to scratch – are also in play in the field of containerization.
So far, I’ve been able to identify just six of such container-native operating systems, as they are called, but trust me, there will be many more to come.
So here are six container-native operating systems that I’m aware of. If you know of any not in the list, please post a comment.
Read more
-
SaaS/Big Data
-
Mirantis, the pure-play OpenStack company, has joined the Cloud Foundry Foundation, an open source Platform as a Service (PaaS) project that acts as a middleware for OpenStack deployments. Mirantis is commited to supporting Cloud Foundry and partnering with distribution vendors in its ecosystem instead of building its own Cloud Foundry distribution.
-
Oracle/Java/LibreOffice
-
After half of year of development, Ken Mays announced earlier this week the availability of a new OpenIndiana release, 2015.03, dubbed Hipster. OpenIndiana is the continuation of the OpenSolaris operating system, and this new release introduces several updated packages, an alternative desktop environment, and various under-the-hood improvements.
-
BSD
-
AMD tech support has allegedly confirmed that Catalyst is being ported to FreeBSD.
-
Public Services/Government
-
With an aim to reduce project costs, the government has decided to give preference to open source software (OSS) over proprietary in e-governance procurements.
-
The problem for teen density is that the rest of the country keeps getting older and the population keeps growing.
-
They called it “the Chelsea effect”. Senior advisers to Barack Obama coined the phrase during his 2008 campaign for president, after they noticed a surprising trend in the long and bitter battle for the nomination between the then-senator from Illinois and Hillary Clinton.
-
Happy Easter!
From wild pranks on April Fools Day to hidden tricks in its search engine, the Google team loves creating surprises for users. Here’s how to find Google’s Easter eggs, for the four latest versions of its Android operating system.
-
Science
-
A group of scientists from the UK and Japan have managed to produce a chip that uses a special type of teleportation called quantum teleportation to make quantum computers a little easier to manufacture.
-
Conspiracy theories about “chemtrails” and HAARP may be pure bunk, but weather modification is real. Its advocates call it geoengineering.
-
Health/Nutrition
-
Most people visit hair and nail salons, at most, only for a few hours a month. Beauticians, however, work in these often toxic environments all day, every day, breathing in fumes and absorbing chemicals through the skin. Hair sprays, permanent waves, acrylic nail applications and other salon products contain ingredients associated with asthma, dermatitis, neurological symptoms and even cancer. Because these products are considered neither foods nor drugs, the U.S. Food and Drug Administration (FDA) has no responsibility to ensure the products are made safer.
-
Sergio Canavero, a doctor in Turin, Italy, has drawn up plans to graft a living person’s head on to a donor body and claims the procedures needed to carry out the operation are not far off.
-
Even more than measuring travel as the crow flies, what Congressman Walz finds illogical is using a medical facility incapable of providing the care a veteran needs, to deny that veteran access to the Choice Card program.
-
A nonprofit hospital that operates a free clinic on the side can be held liable for damages when people are injured on its property, the New Jersey Supreme Court has ruled.
In a unanimous decision, the court said a nonprofit hospital is covered by the limited liability protections afforded to hospitals, which cap damages at $250,000, rather than the complete immunity afforded by the Charitable Immunity Act, even though it was engaged in a charitable act when the injury occurred.
-
Defence/Police/Secrecy/Aggression
-
First Minister Nicola Sturgeon has this afternoon spoken at the annual anti-Trident rally in Glasgow, urging people across the UK to seize the moment of the Westminster election to block the renewal of Trident nuclear weapons.
-
Whatever the truth may be regarding the manner in which the release of the hostages was secured, the truth remains: The Iran Revolution happened, the Shah fell and fled, Khomeini rose, the US Embassy was sacked, the hostages were taken and subsequently freed, and since that time the United States and Iran have been in a de-facto state of war. After the hostages were home and President Reagan was installed, sanctions were levied against Iran – against its currency, its weapons program, and most notably its nuclear program – which have shattered its economy.
-
For the most part, commentary and analysis of the preliminary nuclear deal with Iran falls along predictable lines. On the one hand, we see President Obama’s policy backed by the American mainstream, many congressional Democrats, a variety of foreign policy experts, and most of our allies.
-
The Azov Battalion was founded and its members were selected by Andrei Biletsky, a Ukrainian nazi (that’s an ideological term, meaning racist fascist — not a term referring specifically to the first political party with that particular ideology, the National Socialist Party of Germany). When Britain’s Guardian interviewed members, the reporter was shocked to find that they’re nazis (“neo-Nazis”).
-
-
-
Chelsea Manning, the US soldier serving 35 years in military prison for leaking state secrets to WikiLeaks, has joined the social media site Twitter.
-
More than 200,000 US troops sent to Iraq and Kuwait in January 1991 were exposed to nerve gas and other chemical agents. The Department of Defense and CIA launched a campaign of lies and concocted a cover-up that continues today, notes
-
Another widespread fallacy is that such neoconservatives as Richard Perle and Paul Wolfowitz strong-armed an inexperienced president into taking the country to war. President Bush, as he himself famously asserted, was the “decider.” One could argue, however, that Hans Blix, the former chief of the international weapons inspectors, bears some responsibility. Though he personally opposed an invasion, Mr. Blix told the U.N. in January 2003 that despite America’s ultimatum, Saddam was still not complying fully with his U.N. pledges. In February, he said “many proscribed weapons and items,” including 1,000 tons of chemical agent, were still “not accounted for.”
[...]
By then, however, most Americans had concluded that no such weapons existed. These were not new chemical arms, to be sure, but Saddam Hussein’s refusal to account for their destruction was among the reasons the White House cited as justification for war.
-
-
Ex CIA analyst Ray McGovern today points out that “The mainstream U.S. media portrays the Iran nuclear talks as ‘our good guys’ imposing some sanity on ‘their bad guys.’”
-
Years ago, when the United States and the Soviet Union had both experienced setbacks in their space programs, one of my professors suggested that our scientists and theirs may have flunked the same course at Heidelberg. It was no great secret that, in the waning days of World War II, the United States scrambled to capture German rocket scientists before the Soviets got them. Hitler’s rocket attacks on Great Britain had made clear that the Germans were far ahead of us in that technology. The Cold War was in its infancy, and the United States already foresaw using rockets to transport nuclear weapons.
Of the more than 1,600 Nazi scientists brought to the United States, Eric Lichtblau, author of “The Nazis Next Door,” singles out Wernher von Braun as the preeminent catch. Infamous for having led development of the German V-2 rocket, von Braun ended up in Huntsville, Ala., helping develop the rockets that eventually took American astronauts to the moon. It was well known that the V-2s had been built by slaves, mostly prisoners of war, many of whom were abused, starved and worked to death. Von Braun did not deny his role in this, yet with the aid of Walt Disney, who on his TV show repeatedly turned to von Braun as an expert on space travel, the German emerged as an American hero.
-
“The robotic war is here, and the future of war could be an Orwellian version of Terminator.” This quote, taken from the director’s statement, best summarises the growing fear of future, and even contemporary, military combat. Documentary director Tonje Hessen Schei wants to bring to the forefront the secretive CIA drone war, and the impact this has on both the victims and the combatants.drone (1)
-
The Iranians may be a bit paranoid but, as the saying goes, this does not mean some folks are not out to get them. Israeli Prime Minister Benjamin Netanyahu and his knee-jerk followers in Washington clearly are out to get them – and they know it.
Nowhere is this clearer than in the surreal set of negotiations in Switzerland premised not on evidence, but rather on an assumption of Iran’s putative “ambition” to become a nuclear weapons state – like Israel, which maintains a secret and sophisticated nuclear weapons arsenal estimated at about 200 weapons. The supposed threat is that Iran might build one.
-
Iran has been an important player in the region since the ousting of Prime Minister Mohammad Mosaddeq in 1953 by a coup. The CIA much later acknowledged that the coup to overthrow Mosaddeq, who was nationalizing Iranian oil, was carried out under CIA direction.
-
The US Marine Corps’ press office said the Tainan Airport is an US-approved divert airfield, but China’s foreign ministry said it had complained to Washington about the two US F/A-18s that landed in Tainan on Wednesday
-
The United States has a long tradition of arming its allies to advance Washington’s foreign policy. In 1940, President Franklin D. Roosevelt called the U.S. the “arsenal of democracy” as he pledged thousands of ships, tanks and warplanes to countries battling Nazi Germany.
Roosevelt’s characterization is no less true today. The U.S. government is sending large amounts of weapons to allies desperately battling Islamic State extremists in Iraq and Syria. Washington is also considering equipping the battered Ukrainian military, which has been fighting Russian-sponsored rebels in the country’s east.
Broadly speaking, there are two ways the U.S. can arm an ally. America can donate, or sell cheap, the latest U.S.-made weaponry. Or it can send foreign-made weaponry — Russian usually — through a middleman.
-
Robert Levinson, a retired FBI agent who also had worked for the CIA, disappeared during a visit to Iran’s Kish Island more than eight years ago. While Iran has denied holding him, U.S. officials believe he has been in Iranian custody.
-
Supporters of four Americans believed to be held in Iran are hoping the “framework” for a deal between the West and the Islamic Republic includes freedom for the U.S. citizens.
-
The main part of the Samford event involved two parents of missing students addressing the crowd through an interpreter. At times breaking down in tears, they said their children had gone out to fundraise for their education. After fundraising, the parents explained, the students were attending protests in Iguala and hoping to travel to Mexico City. They were instead intercepted by the Iguala police and eventually handed off to the drug-trafficking organization called Guerreros Unidos, the parents said.
-
The remains of 13 year-old Soad Nicole Ham were found in the Honduran capital of Tegucigalpa last Wednesday after a death squad kidnapped and murdered her for participating in recent student demonstrations against the country’s crumbling education system. A medical examination of the girl’s remains, which were discovered in a plastic bag on the street, revealed signs of brutal torture.
Soad Nicole was the fourth demonstrator to be killed by death squads in Tegucigalpa last week. The bodies of Elvin Antonio López, Darwin Josué Martínez, and Diana Yareli Montoya—all between the ages of 19 and 21 and all actively involved in student protests—were also discovered in various neighborhoods of the city. Yareli Montoya, whose body was riddled with 21 bullets by masked attackers, took two painful days to die.
-
In the 1960s, hundreds of kilograms of uranium went missing in the US state of Pennsylvania. Is it buried in the ground, poisoning locals – or did Israel steal it to build the bomb, Scott Johnson asks.
-
In sum, nearly all US defense secretaries have been CFR members or analysts, some even high-ranking Council officials. At the same time, US defense secretaries and CFR agents have counseled one another and collaborated in efforts to shape the course of Western globalization. Given this ubiquitous exchange between the CFR and the office of United States Secretary of Defense, an Ashton Carter military should be expected to follow the CFR’s script.
-
It’s a good thing the Times is keeping the faith about the dangers of NSA surveillance, the moral necessity of closing Guantanamo, the crucial importance of accountability in drone strikes, and the urgency of a laser-like focus on CIA interrogations that took place more than a decade ago.
-
The discovery of crude in 1908 laid the foundations for the company that would become British Petroleum and opened one of the richest opportunities that Western oil companies have ever enjoyed in the turbulent Middle East. Since then, the industry’s history in Iran is intertwined with CIA-backed coups, colonial exploitation and the anti-Western resentment surrounding the 1979 Islamic Revolution.
-
Outside the boardroom of BP’s headquarters in London, a display case houses the geological data from Masjid-i-Solaiman, Iran’s first oil well. The discovery of crude in 1908 laid the foundations for the company that would become British Petroleum and opened one of the richest opportunities that western oil companies have ever enjoyed in the turbulent Middle East. Since then the industry’s history in Iran is intertwined with Central Intelligence Agency (CIA)-backed coups, colonial exploitation and the anti-western resentment of the 1979 Islamic Revolution.
-
US military aircraft are no longer allowed to be deployed to Taiwan after Washington established ties with Beijing in 1979, but Air Asia was able to deal with the US planes, showing it is still active. Chang Ching, a Taiwanese military expert, rejected rumors on the internet that the US was trying to provide F/A-18C technology to Taiwan by sending the two fighters, calling the claims nonsense.
-
The U.S. interventions around the world have not always been for the good. We have overthrown democratically elected governments because they were supposedly Communist. The Chilean people might have a different take on our allowing the C.I.A. to overthrow the democratically elected Allende and then to install a dictator like Augusto Pinochet. Pinochet was wanted in Spain and arrested in England for his crimes. He was later reindicted in Chile but died before trial. George W. Bush was actually convicted in absentia in Malaysia for torture. We expect other countries to follow the Geneva Conventions and the United Nations. It is no wonder so many citizens of Venezuela and Cuba have a negative attitude towards the good old U.S.A. We also tried to overthrow the Castro government militarily and with exploding cigars. Our CIA also told the white South African police where Nelson Mandela was hiding after his conviction on terrorism by the same legal system, leading to 27 years on Robbins Island at hard labor. We also replaced a head of state picked by the citizens of Iran in the 1950s and replaced him with the Shah of Iran. We all know how that turned out, but just as in this country, we care about those of lighter skin colors. We should heed the words of Dr. Martin Luther King, Jr., “Injustice anywhere is injustice everywhere.”
-
In an analysis in Jerusalem Post today, Yossi Melman makes the case that there is no existential threat to Israel and indeed Israel has a submarine capability to make a nuclear retaliatory strike against Iran, should Iran destroy Israel with nuclear weapons. Melman reports that the submarines are coming from Germany out of “pangs of guilt following the Holocaust.”
-
Even at this late date a lot of people claim not to know the difference between us true conservatives and the so-called “neo” conservatives.
Hint: “Neo” means new. And if you have new beliefs, then by definition you’re not a conservative. We stick to the tried and true. Plato’s fine but that Aristotle guy was getting a little ahead of himself.
Another hint: If you’re a true conservative, then people will call you an “isolationist.”
-
The US has not limited its dealings to the Middle East but has conspired to control many countries by making them financially dependent. This has been done by promising countries the US would help in power generation and construction of infrastructure. Huge loans were organised and contracts awarded to US companies such as Haliburton, so the money never left the US. The loans were impossible to repay which led to increased unemployment and poverty in the target country. The US could then control the assets of that country for its own gain, whether it be oil, gas, minerals or, in the case of Panama, the canal.
-
The U.S. Defense Department has cleared the way for American military planes to start refueling Saudi Arabian jets bombing Houthi fighters in Yemen as the U.S. deepens its role in the expanding regional conflict, U.S. defense officials said Thursday.
-
It is hard to believe that history now seems to be repeating with Egypt and Saudi Arabia again engaged in a counter-guerrilla war in Yemen! For Nasser, it was Egypt’s Vietnam. Will the new Yemen war be Egypt’s (and Saudi Arabia’s) Afghanistan? I think it is very likely. All of the signs point in that direction.
And, as I have laid out in numerous essays on Afghanistan, Iraq, Syria, Somalia, Mali and Algeria, and in my little book Violent Politics, guerrilla wars are almost never “won” but usually drain the supposedly dominant power of its wealth, moral position and political unity.
-
It has been one of the world’s longest and deadliest civil conflicts. Since the first incidents more than three decades ago, an estimated 40,000 lives have been lost.
It has been, some say, a battle by activists among Turkey’s Kurdish minority for independence. It has been, others say, a guerrilla war by rebels who have punctuated their campaign with terrorist acts.
-
Libya is no exception to this rule. Since the overthrow of Libya’s ruler Muammar Qaddafi in October 2011, the country has fallen into chaos in which armed militias govern their own patch of territory while successive governments have been unable to stabilize the situation and actively take control of the country. According to a BBC report, there are more than 1,700 armed and ideologically divided groups across Libya creating indescribable havoc, which is not only fragmenting the country but bringing Libya to the status of a lawless failed state. Some of the groups are Jihadist, others secular, liberal, or split according to geographical location, ethnic identity, or along tribal lines.
[...]
Khalifa Haftar was a colonel under Qaddafi. He led Libyan forces during a disastrous war with Chad in the south. After his defeat by Chadian forces in 1987, he was taken captive for almost five years, refusing to return to Libya out of fear Qaddafi would “punish” him for his defeat. Later, the CIA succeeded in whisking him out of Chad together with 300 of his men to Virginia where he underwent special training by the CIA. After living in exile in the U.S. for 20 years, he returned to Libya and led ground forces to help oust Qaddafi in 2011.
-
Transparency Reporting
-
But Obama’s lack of transparency — after promising in 2008 to run a transparent administration — has left him at the mercy of Washington’s closed club of insiders, while alienating him from the broad American public. With neoconservatives and other opinion leaders dictating the dominant narrative on topic after topic, Obama has ended up reacting to events, not controlling them.
-
President Barack Obama’s administration claims that the executive branch alone may decide whether to disclose previously classified videos of the force-feeding of a former Guantanamo Bay prisoner—even though the videos are judicial records and a judge should be able to unseal and release them to the public.
On October 3, 2014, a federal district court ordered the Obama administration to review videos of Abu Wa’el Dhiab, a Syrian who at the time was still being held in indefinite detention. The government was granted permission to redact portions they believed needed to be censored for “national security.” Lawyers for Dhiab and media organizations, which supported disclosure, were to put forward a proposal for the release of videos.
-
Environment/Energy/Wildlife
-
After being confronted by Texas Department of Public Safety investigator Jeff Green, Chapa first denied having seen the photo, then claimed it was ‘photo-shopped and someone was trying to frame him,’ the complaint stated.
Two days after the race, Texas Racing Commission stewards suspended Chapa, pending an investigation and hearing.
ESPN reports that Chapa faces a felony charge and that a warrant was issued for his arrest on Tuesday, but authorities have so far been unable to locate him.
-
Mountaineers usually shed baggage as they climb higher. A 30-member Indian team setting out for Mount Everest next month plans to come down with 4,000 kilos of excess baggage, or rather, garbage.
-
Offshore oil is not the only resource the UK Government wants kept out of Scottish control; England needs our water supplies. Over-population has begun a series of famines which will increase throughout the century. More wastelands must be cultivated, and Scotland has many used as sporting estates by very few. Unionist politicians thwarted Irish Home Rule by giving a separate UK parliament to northern Protestants who owned Ireland’s heaviest industries. In the 1970s the Westminster party leaders created an oil fund for the Shetland Islands, whose people have quietly benefited from local oil fields in a way Westminster openly denied to the rest of Scotland. The Shetlanders have now a generally higher standard of living than on the Scottish mainland, and higher than many parts of London.
-
Finance
-
We know who lives near wells. We don’t know how it’s harming them.
-
Kern County produces 80 percent of the state’s oil, yet it is one of the poorest communities in California.
-
What the US is going through is not in any way politics or government as usual, but the emergence of a new and undemocratic political system and government.
-
The reason is that many of the retention bonuses those firms gave employees during the 2008 financial crisis will reach their final installments this year. At the same time, several brokerages have started deferring more of advisers’ current pay. Continued…
-
But it is also true that Mr. Cotton and other Republicans benefited from millions in campaign spending in 2014 by several pro-Israel Republican billionaires and other influential American donors who helped them topple Democratic opponents.
-
PR/AstroTurf/Lobbying
-
THE Holyrood inquiry into historic child abuse will be asked to investigate Scottish links to an infamous CIA-backed brainwashing programme, the Sunday Express can now reveal.
-
Google’s Chairman Eric Schmidt is apparently friends with Obama–cue fanfare and commence the investigation! SearchEngineLand reported Republicans think the Federal Trade Commission is treating the search giant with kid gloves when it comes to antitrust laws and are calling for an investigation.
-
The story of Cass Edison is nothing short of tragic. At age 55, the accomplished journalist had had many experiences most of her peers could only imagine—living in Singapore and the Philippines, being recruited by the CIA, starting her own newspaper. Alcoholism took its toll, though, and led to lost relationships, money, and even her home. Then, one morning last month, she was found dead, her body dumped in a stranger’s yard. A suspect is in custody and, based on evidence, the case against him is strong.
-
In this context, Fox News’s “Fair and Balanced” slogan is a bit of genius. It gives Fox’s opponents something to drive themselves nuts over, since the network is (with a few exceptions, such as Shepard Smith’s straight news reporting) so manifestly uninterested in adhering to its own stated mission. But while liberals fight to preserve the idea that news should be fair and balanced, Fox News and publications built on its model get on with their real work of being wildly entertaining and pushing the ideas and narratives its anchors and writers think are important.
-
Censorship
-
Feinstein is currently Vice Chair of the Senate Select Committee on Intelligence, but under her chairmanship of the committee, which ended last year, she was responsible for the release of the report on the CIA’s use of torture against detainees during the Iraq and Afghanistan wars. She released her request on Friday.
-
The Anarchist Cookbook was written by William Powell in 1971, and contains instructions to make explosives. Powell has fought to have is own book removed from publication, but the publisher has refused.
-
Earlier this week came word that the massive denial-of-service attacks targeting code-sharing site GitHub were the work of hackers with control over China’s Internet backbone. Now, a security researcher has provided even harder proof that the Chinese government is the source of the assaults.
-
This International Women’s Day marked the beginning of a large-scale campaign to eradicate gender inequality and end violence against women in India. India’s Daughter, a documentary from Leslee Udwin focusing primarily on the December 2012 gang-rape of Jyoti Singh, was intended to air on BBC that day to launch the campaign. According to Udwin, the campaign will show this film to 20 million schoolchildren in an effort to educate them on issues of gender sensitivity. BBC decided to release the film four days early while the Indian government banned it amid controversy. Discussion around India’s Daughter since then has primarily focused on the ban.
-
No, it was screaming tabloid headlines and a promise from the Tories to bring in web blocking powers, Internet regulation and what amounts to electronic ID cards.
-
That said, many outlets in the United States debated publishing some of the controversial Charlie Hebdo cartoons after the attacks. The New York Times declined to do so, saying it would cross the “line between gratuitous insult and satire.” Online outlets, including BuzzFeed, Vox and the Huffington Post, opted to publish the cartoons.
-
Pornography websites must adopt age-restriction controls or face closure, the Conservatives say.
-
We’re just three months into 2015 but Google has already processed copyright takedown requests for 100 million allegedly infringing links. This is a significant increase compared to last year, and one that hasn’t been without controversy.
-
Privacy
-
Russia’s President Vladimir Putin was a KGB officer before he moved on to politics. Mixing the secret world of spying and public office is not a good idea, argues DW’s Alexander Andreev.
-
One of the most interesting political movies of recent years was the German film The Lives of Others, which gave a realistic depiction of the overwhelming espionage to which the government of East Germany subjected the citizens of that country, and of the corruption at the highest level, as officers of the state and the ruling party used their powers for unspeakable private purposes. The movie won the 2006 Academy Award for Best Foreign Language Film, along with a number of other prizes, and was acclaimed by many as a masterpiece.
-
Fearful that Nazi leader Adolf Hitler would attempt to flee Germany, US intelligence tried to predict what the Führer would like if he altered his appearance.
-
We have known for some time that the U.S. intelligence and law enforcement community looks to find and exploit vulnerabilities in commercial software for surveillance purposes. As part of its reluctant, fitful transparency efforts after the Snowden leaks, the government has even officially acknowledged that it sometimes uses so-called zero-days. These statements are intended to reassure the public that the government nearly always discloses vulnerabilities to software vendors, and that any decision to instead exploit the vulnerability for intelligence purposes is a thoroughly considered one. But now, through documents EFF has obtained from a Freedom of Information Act (FOIA) lawsuit, we have learned more about the extent of the government’s policies, and one thing is clear: there’s very little to back up the Administration’s reassuring statements. In fact, despite the White House’s claim that it had “reinvigorated” its policies in spring 2014 and “established a disciplined, rigorous and high-level decision-making process for vulnerability disclosure,” none of the documents released in response to our lawsuit appear to be newer than 2010.
-
But my post was about more that just the phone dragnet. It was about two things: First, the way that, rather than go “cold turkey” after it ended the Internet dragnet in 2011 as the AP had claimed, NSA had instead already started doing the same kind of collection using other authorities that — while they didn’t collect all US traffic — had more permissive rules for the tracking they were doing. That’s an instructive narrative for the phone dragnet amid discussions it might lapse, because it’s quite possible that the Intelligence Community will move to doing far less controlled tracking, albeit on fewer Americans, under a new approach.
-
Dogged in pursuit of hidden national security-related documents, the New York Times and investigative reporter Charlie Savage are returning to federal court to demand the release of the National Security Agency’s inspector general reports.
-
Civil Rights
-
Yesterday the United States gave the U.N. Human Rights Committee its one year follow-up report on progress made to implement four priority recommendations made by the committee a year ago. The independent human rights experts had reviewed the United States’ compliance with a major human rights treaty, the International Covenant on Civil and Political Rights (ICCPR). They found the U.S. coming up short in many areas, including accountability for torture, privacy and surveillance, Guantánamo, and gun violence.
-
Ever since Treasury Permanent Secretary Nicholas MacPherson stated that civil service impartiality rules do not apply in the case of Scottish independence, I have been warning the SNP that we are going to be the target of active subversion by the UK and US security services. We are seen as a danger to the British state and thus a legitimate target. I spelled this out in my talk to the Edinburgh SNP Club on 6 March, of which more below.
-
It seems to me the overwhelming probability is that this document, whether it purports to be a FCO or Scottish Office document, was originated by the Security Services, possibly with the active collusion of someone in the Scottish Office, or equally possibly without their knowledge. Whatever it purported to be, it never entered the normal civil service distribution systems, as the FCO would have a copy, and it would have raised alarm bells all over the place as seriously weird and improbable. It is in that sense a fake, even if it were physically produced inside the Scottish Office. Its purpose was to be leaked to the media and influence the election.
-
Between 1979 and 2007, average incomes for the 1% increased 241 percent. In the same time period, middle-class incomes grew 19 percent.
The top 10 percent in this country earns an average income of $161,000 (a little less than the average salary of your Congressional representative) while the bottom 90 percent bring in a little under $30,000.
-
The high cost of failed oversight
A combined $21 million in taxpayer funds are dedicated to the city’s police accountability structure, among the Independent Police Review Authority, Internal Affairs, and the Police Board, according to the City of Chicago’s 2015 budget. In contrast, a proposed ordinance to fund reparations for police torture victims seeks a one-time sum of $20 million, to provide counseling and education to those tortured into false confessions by police, alongside monetary restitution and inclusion of the city’s decades-long police torture scandal in Chicago public school curricula.
Between 2012 and 2014, the City of Chicago Department of Law requested payment of $192 million in settlements, verdicts and fees attributed to the Chicago Police Department. $61 million was paid to settle wrongful convictions, and another $43 million went toward cases charging excessive force. The majority of cases were from the city’s backlog, which as of September 2014 included 491 Chicago police cases – but on average 20 percent, or 250 cases, were the result of incidents taking place in the years of the current administration.
-
-
Lithuanian prosecutors said on Thursday they had restarted an investigation into allegations that state security officials helped the CIA run a secret jail in the Baltic state as part of the agency’s global programme to interrogate al Qaeda suspects.
Prosecutors re-opened a probe, which was dropped four years ago, after a U.S. Senate report last year detailed a secret CIA facility that matched reports about a site in Lithuania, a spokeswoman for the prosecutor’s office said.
-
Lithuanian prosecutors said Thursday they have reopened an investigation into allegations that the Baltic nation hosted a secret US interrogation centre for Al-Qaeda suspects a decade ago.
-
Lithuanian prosecutors have restarted an investigation into claims that state security officials helped the CIA run a secret jail in the country, as part of the US intelligence agency’s post 9/11 interrogation and rendition program.
-
Lithuanian prosecutors have reportedly reopened a criminal investigation into claims that state security officials helped the American Central Intelligence Agency (CIA) to operate a ‘black site’ in the Baltic country.
Senior prosecutor Irmantas Mikelionis has decided to restart the investigation into the “possible abuse” of power by state employees, the spokeswoman for the prosecutor-general’s office told Reuters in an email on Thursday.
-
When late last year the US Senate Select Committee on Intelligence published parts of its 6,700 page report on the CIA’s detention and interrogation programme, it shed light – remarkable light – on how the ‘war on terror’ had been conducted by the US for some time.
It very rightly prompted questions for this country. The most immediate and top level question was, if that is what the US did, what did Britain do? But one need barely scratch the surface of the matter before encountering some difficult questions about method – how do we find out what Britain did? – and about scrutiny – are there lessons to be learned about oversight and accountability?
-
One year ago Friday, the Senate Intelligence Committee, then under the command of Sen. Dianne Feinstein (D-Calif.), voted to share with the world some of Washington’s most tightly held secrets: gruesome accounts of CIA personnel torturing detainees for the good of all Americans — who had little idea what was being done in their name.
After a protracted battle with both the CIA and the White House over how much information to release, the executive summary of Feinstein’s massive torture report finally saw the light of day in early December. Its release did not set off a violent backlash overseas despite panicked warnings from the intelligence community, nor did it irrevocably damage U.S. national security. It didn’t sit well with the American public either, who saw headlines about rectal feeding and sodomization for weeks.
-
Poland must de-classify details of an investigation into a secret CIA jail on its soil, or it will be in breach of a European Court of Human Rights (ECHR) ruling, a lawyer for a former inmate at the secret jail said.
-
A lawyer for a man who was held at a secret CIA prison in Poland is warning Warsaw that it must declassify documents related to the investigation or be in breach of a ruling by the European Court of Human Rights, Reuters reports.
-
Poland must de-classify details of an investigation into a secret CIA jail otherwise it will be in breach of a European Court of Human Rights (ECHR) ruling.
-
Poland has been warned that it must de-classify details of an investigation into a secret CIA jail in the country, or it will be in breach of a European Court of Human Rights (ECHR) ruling, according to the lawyer of a former inmate who was held at the facility.
-
A small airport in north-eastern Poland used by the CIA to fly in kidnapped detainees for torture at a nearby intelligence training camp has received over €30 million in EU funds.
The EU money is part of a larger €48.5 million sum to turn the former military airstrip into an international commercial airport known as Szymany.
-
Poland, which allowed the CIA to have a secret interrogation site there after 9/11, has formally asked the United States to make sure the alleged mastermind of the USS Cole bombing is spared the death penalty, Poland’s Foreign Office said Wednesday.
-
Poland’s government has sent an official note to U.S. authorities seeking diplomatic assurances that an inmate at the U.S. military jail in Guantanamo Bay will not be subject to the death penalty, the Polish Foreign Ministry said on Tuesday.
-
-
-
-
-
-
-
A Washington, D.C., federal judge ruled Tuesday that the Central Intelligence Agency did not have to cough up documents to a Vice Media Inc. reporter on its use of contentious “enhanced interrogation” techniques, finding the documents were exempt from the Freedom of Information Act.
-
-
-
-
-
Leutrell Osborne is a 27-year veteran of the CIA who as a case officer oversaw spies and assets in 30 countries. He said he befriended Sterling, who like Osborne is African American, during the course of a discrimination lawsuit Sterling initiated against the CIA in 2000. That litigation was ultimately dismissed by the courts in early 2006 due to the government’s national security claims.
[...]
However, Osborne said the CIA never contacted him about Sterling, prior to or during the course of the criminal investigation targeting Sterling. That criminal investigation, which led to Sterling’s indictment in 2010, was initiated by at least 2008 — when reporter Risen was first subpoenaed in the case. Osborne also said that, to date, the CIA has not returned a call he made to the agency shortly after Sterling’s conviction in late January.
If the CIA was truly concerned that Sterling was leaking classified information, then the agency should have vetted anyone who had his confidence, particularly current and former CIA personnel, to determine the extent of his alleged espionage activities, Osborne contends.
“The CIA investigated Sterling, and they knew I knew him, or should have known, yet they did not talk to me,” Osborne said. “Is the CIA that incompetent in security? The CIA is supposedly the best security organization in the world, and yet they didn’t care that there were holes in their investigation? That raises a red flag for me.”
-
A new book tells the story of how the CIA used unwitting college kids to send in reports from Third World countries. And I was one of them.
-
A major problem in adding cyber resources will be avoiding duplication with NSA and with the Pentagon’s Cyber Command.
-
Unlike many other Congressional reports that are soon forgotten, the Senate Intelligence Committee’s report on the CIA’s interrogation program has been quickly followed by a major restructuring in the agency it so harshly criticized. Unfortunately, the CIA’s reform announced by its director, John Brennan, goes in the opposite direction of the Senate’s report logical conclusions.
-
Whistleblower John Kiriakou, a former CIA veteran recently released from federal prison for disclosing the agency’s torture program, says the federal government recommended he not work for a Washington think tank on account of his goal of prison reform.
Kiriakou tweeted Wednesday that the federal Bureau of Prisons (BOP) — a subagency of the US Department of Justice that is responsible for operation of all federal prisons, including the one Kiriakou served time in — said it was “inappropriate” for him to work at the Institute of Policy Studies, a social justice think tank located in Washington, given his stated desire to work for reform of the US prison system.
-
The national coordinator of the Free Brazil Movement, or Movimento Brasil Livre (MBL), Renan Haas, denied any links or financing by US Central Intelligence Agency (CIA) in an interview with Sputnik.
-
Former CIA Officer Larry Johnson says that CIA exploiting college students travelling abroad to gather intelligence during the Cold War is not a shocking discovery.
-
CIA Director John Brennan announced recently that the organization will be broadly restructured to include cyberspying—plus 10 mission centers to analyze dangerous regions worldwide.
Cyberspying will enable the CIA to track targets via their digital activity such as car rentals. It will also help CIA agents conceal their online tracks.
-
John Yoo (Yale Law, ’92), is a charter member of the Richard Rich Society. He is the very model of a modern Richard Rich. At the CIA’s request, Yoo wrote secret memos assuring CIA agents that they had legal authority to use “extraordinary techniques” when interrogating prisoners. These memos were secret, of course, because they could not have withstood the light of day. CIA officials jokingly referred to them as “get out of jail free cards” because they were meant to give American war criminals a new legal defense: “I’m not a war criminal because my lawyer said I could do it.”
Yoo also wrote memos justifying the creation of military tribunals that would not be bound by the ordinary rules of evidence – something officials don’t do unless they intend to introduce evidence obtained by illegal means.
The memos were a “bad idea and even worse advice,” Dean Chris Edley (Harvard Law, ’78) conceded when he defended Yoo’s return to his tenured position at Boalt Hall, but they couldn’t be deemed criminal unless a court so ruled. And because President Barack Obama (Harvard Law, ‘91), would not allow the torturers to be prosecuted, there was nothing to prevent Yoo from returning to the classroom.
-
Even as the Senate Intelligence Committee released its scathing report last December highlighting the role of psychologists in designing and implementing the CIA’s torture of detainees, the American Psychological Association (APA) had already begun to distance itself from the two leading psychologists, James Mitchell and Bruce Jessen, who created what the committee called the “ineffective” and “inhumane” $81 million program for the CIA. That program was also adapted by the U.S. military, leading to the horrors of Abu Ghraib. In an October, 2014 press release and public statements in response to James Risen’s book, Pay Any Price: Greed, Power and Endless War, the world’s largest psychology organization sought to rebut the damning confidential emails in Risen’s book about how the APA’s own leaders apparently colluded with the Bush administration’s top national security psychologists, including those with the CIA, to provide ethical and legal cover for psychologists’ involvement in “enhanced interrogation.”
-
Only one American in history has ever been convicted of torture committed abroad: Chuckie Taylor, the son of former Liberian President Charles Taylor.
His father led militants to take control of Liberia in the late ’90s, went in exile after Liberia’s Second Civil War and was found guilty of abetting war crimes in Sierra Leone. But young Chuckie Taylor seemed far removed from that warlord life — he lived in America with his mother and stepfather, just another teenager listening to hip-hop and watching TV in his room.
-
Confessions of a DC Madam (Trine Day, March 2015) is an autobiographical account of Henry W. Vinson’s odyssey from the humble origins of Williamson, West Virginia to running the largest gay escort service in Washington, D.C. by the time he was 26 years old.
This haunting exposé is the first book to tell the tale of sexually blackmailed politicians and government officials in the U.S. by an individual who actually witnessed these sinister maneuverings first-hand. Confessions of a DC Madam proves that there is a clandestine checks-and-balances system in effect within our government—blackmail.
Vinson intricately documents his interactions with various closeted and non-closeted VIPs who solicited the escorts he employed. Moreover, this new book details Vinson’s numerous exchanges with a CIA asset whose specialty was sexually compromising the power brokers of Washington, DC, and the trials and tribulations Vinson suffered because he was privy to information that could have produced a seismic political scandal.
-
Also nearby is the only known military “black site” on American soil. A place where torture happened.
-
Following December’s release of the U.S. Senate report on American complicity in torture, Prime Minister Stephen Harper quickly declared, “It has nothing to do whatsoever with the government of Canada.” Despite the CIA’s close relationship with Canadian state security agencies, as well as two judicial inquiries finding Ottawa complicit in the torture of Canadian citizens in Syria and Egypt, Harper preferred to ignore the facts.
At about the same time, a stunning memoir was published that paints another damning portrait of Canadian authorities from even before September 11, 2001. Guantanamo Diary was originally composed by hand in 2005 from a cell at the infamous U.S. torture camp, which remains open despite President Obama’s promise to close it eight years ago. It tells the remarkable story of Mohamedou Ould Slahi, a Mauritanian national who remains detained there despite a 2010 U.S. release order.
-
About 40 mothers being held at an immigration detention camp in Karnes, Texas, have launched a hunger strike to protest the detainment of their children as the families await immigration and asylum hearings, according to detainees and advocates working on their behalf.
-
Intellectual Monopolies
-
Copyrights
-
Give up the idea of pirates being cool. They’re not. My biggest regret in my part in all of this was to use the word pirate. Not even Johnny Depp can make pirates look cool – and he manages to make cocaine-dealers look awesome. Pirates are awful. And today’s pirates – the ones in Somalia – also lost their battles. Good! So let’s get rid of this stupid culture of having a stupid culture.
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »