12.18.13
New Examples of Censorship in West Europe, Facebook, Google, Saudi Arabia, China, Japan, and North America
-
The UK Government Is Already Censoring The Global Internet
Today, a special police unit can decide that a certain website needs to disappear from the Internet, and threaten its domain name registrar into revoking the address “until further notice”, without any legal basis whatsoever.
The name of the unit is PIPCU (Police Intellectual Property Crime Unit) and it has just reported on the success of Operation Creative – a three month long campaign that resulted in 40 websites accused of copyright infringement shutting down, or at least moving to a new Web address.
-
Who decides what we can read?
Speaking at the Internet Service Providers Association, Security Minister James Brokenshire said that an announcement on blocking extremist websites is ‘forthcoming.’
-
Will French Parliamentarians Consent to a Democratorship?
Numerous reactions are now being voiced against the inclusion in the 2014-2019 Defense Bill of article 13 whose provisions enable a pervasive surveillance of online data and communications. Gilles Babinet, appointed in 2012 as French Digital Champion to Nellie Kroes, Vice-President of the European Commission responsible for the Digital Agenda for Europe, was quoted [fr] in the French newspaper Les Echos, “This law is the most serious attack on democracy since the special tribunals during the Algerian War” (our translation).
-
German Court Tells Wikimedia Foundation That It’s Liable For Things Users Write
-
Facebook Uses “Social Signals” and Profile Information to Stop Piracy
Social networking giant Facebook has been granted a patent to use profile information to analyze whether shared files are “pirated” or not. The data is carefully analyzed using several social indicators including the interests of the poster and recipient, their geographical location, and their social relationship. According to Facebook the patent can help the company to “minimize legal liabilities,” but whether users will be happy remains to be seen.
-
Facebook Needs To Learn It Can’t Teach Tolerance By Acting As An Overzealous Censor
Facebook is developing a speech impediment. The recent fracas over beheading videos was marked by severe bouts of waffling from the social media giant. On one hand, it seems to want to ease unfettered expression. On the other hand, it’s set itself up as the content police.
These two aspects often collide with disastrous results. Beheadings are a go, but breast cancer groups can’t post photos of mastectomies. Recent partnerships with government agencies see Facebook willing to censor by proxy, even as it attempts to roll back its control in other areas. Giving 800+ million users access to a “report” button is well-intended, but the reality is more troubling. Something that’s simply unpopular can be clicked into oblivion in nearly no time whatsoever.
-
Condom to sex: Google’s weird list of banned words for Android 4.4 KitKat
It seems that Google now wants you to make use of words in a more careful and responsible way, and thus, has drawn off many words, including a bunch of profane words, from its built-in dictionary for Android. With the rollout of Android 4.4 KitKat, Google has now stopped giving you predictive suggestions for a raft of words.
-
Saudi Arabia: Popular sci-fi novel banned
Last Tuesday (26 Nov) representatives from the country’s Commission for the Promotion of Virtue and Prevention of Vice — the Haya’a — raided several bookshops selling the novel H W J N by Ibraheem Abbas and Yasser Bahjatt’s, demanding it’d be taken off the shelves. H W J N is a “fantasy, sci-fi and romance” novel about a genie who falls in love with a human, and is a best-seller in Saudi Arabia.
-
China’s rumor crackdown has ‘cleaned’ Internet, official says
China’s campaign against online rumors, which critics say is crushing free speech, has been highly successful in “cleaning” the Internet, a top official of the country’s internet regulator said on Thursday.
-
Japan Reacts to Fukushima Crisis By Banning Journalism
-
Japan’s Dangerous Anachronism
The government of Prime Minister Shinzo Abe this month rammed through Parliament a state secrecy law that signals a fundamental alteration of the Japanese understanding of democracy. The law is vaguely worded and very broad, and it will allow government to make secret anything that it finds politically inconvenient. Government officials who leak secrets can be jailed for up to 10 years, and journalists who obtain information in an “inappropriate” manner or even seek information that they do not know is classified can be jailed for up to five years. The law covers national security issues, and it includes espionage and terrorism.
-
Japan’s New ‘Fukushima Fascism’
Fukushima continues to spew out radiation. The quantities seem to be rising, as do the impacts.
The site has been infiltrated by organized crime. There are horrifying signs of ecological disaster in the Pacific and human health impacts in the U.S.
-
Chris Hedges: Journalism is Being Pushed To the Fringes of Society
-
Canadian Cyberbullying Bill Expands Scope, Targets Open WiFi Over Terrorism, Child Porn Fears
The drawn-out process in which a bill becomes a law lends itself to harmful things, like mission creep and bloating. Canada’s new cyberbullying legislation, problematic in its “purest” form, is now becoming even worse as legislators have begun hanging language aimed at other issues (child porn, terrorism, cable theft [?]) on the bill’s framework.
As was noted earlier, language aimed at punishing revenge porn had already been attached to the bill. But the urge to target as much as possible with a broadly written bill is too much for Canada’s politicians to resist. Michael Geist notes that Bob Dechert (Secretary to the Minister of Justice) took a moment during the debate to speculate about the “dangers” of “stolen” cable.
-
The Government’s Secret Plan to Shut Off Cellphones and the Internet, Explained
This month, the United States District Court for the District of Columbia ruled that the Department of Homeland Security must make its plan to shut off the Internet and cellphone communications available to the American public. You, of course, may now be thinking: What plan?! Though President Barack Obama swiftly disapproved of ousted Egyptian President Hosni Mubarak turning off the Internet in his country (to quell widespread civil disobedience) in 2011, the US government has the authority to do the same sort of thing, under a plan that was devised during the George W. Bush administration. Many details of the government’s controversial “kill switch” authority have been classified, such as the conditions under which it can be implemented and how the switch can be used. But thanks to a Freedom of Information Act lawsuit filed by the Electronic Privacy Information Center (EPIC), DHS has to reveal those details by December 12 — or mount an appeal. (The smart betting is on an appeal, since DHS has fought to release this information so far.)
Links 18/12/2013: KDE News
-
digiKam Software Collection 4.0.0-beta1 is out..
-
KDE Commit-Digest for 24th November 2013
-
Qt 5.2 Released | The Best Qt Yet
We’re proud to announce that Qt 5.2 is now available. With the release of Qt 5.1 in July, we showcased the Qt for Android and iOS ports and laid down the beginning of some heavy improvements we have now done on Qt’s graphics capabilities. In the last 6 months, we’ve worked very hard to finalize this release and especially these ports.
-
A First – KDE and the Outreach Program for Women
-
5th Update of Qt for Tizen
Fresh Alpha 5 update brings improvements of Qt Quick Controls, aligns to newer Tizen 2.2.1 and standard Qt 5.2 RC 1 released week ago.
-
KDevelop 4.6 Improves Its UI, GDB Support, PHP
-
KDE Commit-Digest for 17th November 2013
-
Early KDE Plasma 2 Images Now Available
Project Neon, the daily builds of KDE Frameworks 5 and KDE Plasma 2 for Kubuntu, has started releasing ISO images for testing. These are very early previews of the next generation of KDE Software. It is strongly recommended not be installed on a production machine but can be tested as live images or installed into a VirtualBox or other VM.
-
Qt 5.3 To Focus On Performance, Stability
-
Test KDE Frameworks 5/Plasma Workspaces 2 using Project Neon 5 ISO
If you are using a Linux desktop computer that’s running the KDE desktop, it’s likely that you are running a KDE 4.11 series, either version 4.11.2 or 4.11.3. Those are the last two stable editions.
-
KDE’s Plasma Media Center 1.2 Now In RC Form
-
Calligra 2.8 Beta Released
Links 18/12/2013: GNOME Desktop News
-
GNOME’s Virtual Filesystem Gained SFTP Pull Support
After receiving push support for the SFTP (secure FTP) protocol last month, the GVFS (GNOME Virtual File System) software was updated a few days ago with pull support for the aforementioned protocol.
-
Geary 0.5.0 Email Client Is Now Available for Download
On December 12, the Yorba Foundation has unofficially announced that a new version of its Geary email client for the GNOME desktop environment reached version 0.5.0 and it’s available for download, or update where appropriate.
-
The latest on GNOME Software from Fedora Rawhide
-
Epiphany 3.10.3 Brings Greater Web Compatibility
-
Canonical Is Forking The GNOME Control Center
The latest open-source project being forked by the Ubuntu developers at Canonical is the GNOME Control Center. In Ubuntu 14.04, there will now be the Unity Control Center.
-
GNOME Photos 3.11.3 Allows Users to Access Facebook Photos
The GNOME developers have announced earlier today, December 11, the immediate availability for download and testing of the GNOME Photos 3.11.3 photo viewer application for the upcoming GNOME 3.12 desktop environment.
-
GNOME 3: Adjust ‘hot corner’ sensitivity with the Activities Configurator extension
-
GParted 0.17 Supports Online Resizing
GParted 0.17.0 was released today and its key feature is support for online resizing of file-systems along with other bug fixes and updates.
-
GNOME 3 Worst Linux Idea Yet
-
New GNOME Software Releases Bring Lots of Bugfixes
12.16.13
Links 16/12/2013: Applications and Instructionals
-
Uncovering the Best Open Source Google Analytics Alternatives
Web analytics is the measurement, collection, analysis and reporting of internet data. In a nutshell, it is the study of website visitor behavior. It is the process of using online data to transform a organization from faith-based to data driven.
This type of software helps you generate a holistic view of your business by turning customer interactions into actionable insights. Using reports and dashboards, web analytics software lets you sort, sift and share real-time information to help identify opportunities and issues. Keeping track of web visitors, analyzing traffic sources, measuring sales and conversions are just some of the possibilities.
-
NetworkManager Gets A New Text Interface
-
Bitcasa Unveils Fresh New Look to Its Web App; Adds Linux Client
-
Calibre 1.15 eBook Manager Now Features a Native and Complete Book Editor
-
10 Useful Chaining Operators in Linux with Practical Examples
-
How to configure static DNS on CentOS or Fedora
-
Getting Started with Multi-Node OpenStack RDO Havana + Gluster Backend + Neutron VLAN
-
Troubleshooting in the Command Line: Tips for Linux Beginners
-
How to install and run Chromium OS on VMware Player
-
Troubleshooting in the Command Line: Tips for Linux Beginners
-
How to start a program automatically in Linux desktop
-
How to Setup PostgreSQL Database Server and PhpPgAdmin in Ubuntu Server 13.10
Links 16/12/2013: Valve, Steam, SteamOS, and Other News About Games
-
Running The SteamOS Kernel On Ubuntu Linux
-
Video Of A Steam Machine Being Opened
-
Valve has released a public beta version of SteamOS
-
Valve releases SteamOS beta, early build-your-own system requirements
-
SteamOS Beta 1.0 is released
-
SteamOS beta available for download
Valve has opened the flood gates if you’re curious or brave enough to download and try the beta version of SteamOS which is making its public debut today. Some 300 lucky recipients were also slated to receive prototype hardware, including controllers, this weekend meanwhile the rest of us can take a peek at the gaming-oriented Linux fork that Valve has been cooking for a while.
-
Valve’s SteamOS Now Ready to Download
-
Maia Colony Building Game Now Has A Linux Version On Steam
-
SteamOS Now Available for Linux Enthusiasts
-
Steam OS review – from a Linux user’s point of view
-
Everything you need to know to install SteamOS on your very own computer
-
Valve’s SteamOS Now Available To Download; Linux Virgins Cautioned
-
The Steam Controller Works “Out Of The Box” On Linux
-
SteamOS 1.0 is Here, Based on Debian 7.1
-
The First NVIDIA GeForce Benchmarks On The SteamOS Beta
-
The first “Steam Machine” has been revealed
Following the announcement of “Steam Machines” from Valve to “conquer” the living room, the first “Steam Machine” has been revealed recently. The American company iBuyPower has revealed its own vision of a Steam box to compete with the recently released game consoles from Microsoft and Sony.
-
Will you download SteamOS?
I suspect that savvy Linux users will perceive this the way that a bull thinks of a red flag when it’s waved in front of it. In other words, they will charge! Hey, why not right? It could be a lot of fun for distrohoppers and other Linux tinkerers to snag SteamOS and see what they can do with it.
-
Valve SteamOS is available for download right now
-
SteamOS is Live, No AMD or Intel GPU Support Yet
-
Valve’s Steam OS available to download now, but you might want to wait
-
Download SteamOS now — Valve’s free Linux-based operating system releases
-
Valve’s SteamOS is ready to download — only Linux vets are encouraged to apply
-
SteamOS available to download tomorrow: Stand by for a very slow Linux gaming revolution
-
Rust Survival Game From Garry’s Mod Developers Now On Steam For Linux
-
Valve Set To Debut SteamOS Linux Today
-
Livalink Survival FPS Gets A Major Update
-
Double Fine Announce Hack ‘N’ Slash Puzzle Game With Linux Support
-
It Came From Space, And Ate Our Brains Survival Shooter On IndieGameStand Store For Linux
NSA Roundup: Latest News in a Nutshell
Summary: December news about the NSA and its international partners
Tracking Devices (Also Known as Mobile Phones)
-
NSA defends global cellphone surveillance as legal
The National Security Agency on Friday said its tracking of cellphones overseas is legally authorized under a sweeping U.S. presidential order.
-
NSA Defends Cellphone Tracking: Reagan Authorized It
The NSA is tracking the locations of “hundreds of millions” of people worldwide using cellphone GPS. They said they weren’t in previous comments, but that was just one of many lies they got caught in. Now they’re defending it.
[...]
It’s not surprising that they’re not mentioned, because when Ronald Reagan issued the order, in 1981, there were no cellular telephones in the United States, and there was no such thing as civilian GPS.
-
NSA Phone Data on U.S. Locations Incidental, Chief Says
The National Security Agency can inadvertently intercept mobile phone data revealing the location of U.S. citizens, the agency’s chief said.
-
Local law enforcement using methods from NSA playbook
In 2006, the Montgomery Police Department used cellphone tower data to help convict a man who shot and killed a 30-year-old police officer in the head during a traffic stop.
Mario Woodward, 40, was charged with capital murder and then in 2008, sentenced to the death penalty by Montgomery County Circuit Judge Truman Hobbs. The officer, Keith Houts, left behind a wife and five children.
-
A conspiracy so vast — it’s not just the NSA, now the FBI, your local police are also spying on US citizens
Readers of this page are well aware of the revelations during the past six months of spying by the National Security Agency (NSA). Edward Snowden, a former employee of an NSA vendor, risked his life and liberty to inform us of a governmental conspiracy to violate our right to privacy, a right guaranteed by the Fourth Amendment.
-
Cops and Feds Routinely ‘Dump’ Cell Towers to Track Everyone Nearby
The nation’s mobile phone carriers received more than 9,000 requests last year for cell-tower dumps, which identify every mobile phone at a particular location and time, often by the thousands.
-
Not just the NSA; local police tap U.S. citizens’ cellphone data
-
Police Follow NSA Lead With Stingray Devices for Cell Phone Monitoring
-
Interactive: How police scoop up cellphone data
-
Cellphone data spying: It’s not just the NSA
The National Security Agency isn’t the only government entity secretly collecting data from people’s cellphones. Local police are increasingly scooping it up, too.
Armed with new technologies, including mobile devices that tap into cellphone data in real time, dozens of local and state police agencies are capturing information about thousands of cellphone users at a time, whether they are targets of an investigation or not, according to public records obtained by USA TODAY and Gannett newspapers and TV stations.
-
The world’s most dangerous mobile phone spying app just moved into the tablet and iPad market
The evolution of GPS and the smart-phone market has spawned a macabre industry of surveillance apps designed to be covertly installed onto the cellphones of vulnerable employees, business associates, partners and children.
Products such as Flexispy and Mobile Spy – allegedly used by hundreds of thousands of voyeurs – are chiefly marketed to paranoid parents and suspicious partners who want to invisibly monitor target phone activity – particularly real-time geo-location and call logs.
-
Outgoing Deutsche Telekom chief blasts EU and German leaders over surveillance inaction
Rene Obermann, who will end his seven-year spell as head of Germany’s big telecoms player at the end of the month, said in an interview that he doesn’t understand why everyone is “pussy-footing” around the U.S. on privacy issues.
-
AT&T to Shareholders: No NSA Snooping Data for You
-
Privacy groups want AT&T punished for selling data to CIA
Privacy groups are asking regulators to discipline phone companies that sell subscriber information to third parties, including the CIA.
-
AT&T accused of violating privacy law with sale of phone records to CIA
Consumer advocates have asked the Federal Communications Commission (FCC) to declare that AT&T violated a privacy rule in the Communications Act by selling phone records to the Central Intelligence Agency (CIA).
-
Verizon tries to sweep NSA disclosure proposal under the rug
Last week, AT&T sent a letter to the Securities and Exchange Commission saying that it will not disclose information about how it shares private data with the NSA. Reuters reports that Verizon is now taking a similar stance, but rather than challenging the proposal from its own shareholders by taking the necessary steps with the SEC, the wireless carrier plans to skip the vote all together if it can.
-
NSA has ability to decode phone conversations, texts
-
NSA cracks cell phones, can listen to most calls
-
NSA can decode many GSM cellphone calls
The NSA may say that its phone surveillance efforts focus on metadata rather than the associated calls, but we now know that the agency can listen to many of those conversations whenever it wants. Documents leaked to the Washington Post by Edward Snowden confirm that the NSA can decode GSM-based cellphone calls without obtaining the encryption keys. The ability isn’t surprising when GSM has known weaknesses, but the document suggests that the NSA (and potentially other US agencies) can easily process cellphone calls worldwide. Not surprisingly, the intelligence branch argues that such cracking is necessary — folks on both sides of the law use encryption to hide information, after all. The NSA may not have such an easy time in the future, however. AT&T, T-Mobile Germany and other carriers worldwide are moving to tougher encryption methods for their GSM service, and 3G calls are typically more secure as a matter of course. These measures don’t prevent eavesdropping, but they do complicate any attempts to snoop on cellular chats.
-
The NSA Can Decode Private, Encrypted Cellphone Conversations
-
Archaic but widely used crypto cipher allows NSA to decode most cell calls
The National Security Agency can easily defeat the world’s most widely used cellphone encryption, a capability that means the agency can decode most of the billions of calls and texts that travel over public airwaves each day, according to published report citing documents leaked by Edward Snowden.
-
WWII Story Shows How Badly NSA May Have Hurt US Tech Brands
Bruce Schneier, an information technology expert, wrote today “I think about this all the time with respect to our IT systems and the NSA. Even though we don’t know which companies the NSA has compromised — or by what means — knowing that they could have compromised any of them is enough to make us mistrustful of all of them. This is going to make it hard for large companies like Google and Microsoft to get back the trust they lost.”
Embassies
-
NSA spies on Italians from roof of US Embassy in Rome, magazine reports
The U.S. National Security Agency has been spying on Italian communications from installations on the roof of the U.S. Embassy in Rome and the country’s consulate in Milan and even mounted an operation to capture information from inside the Italian embassy in Washington, D.C., the Italian weekly magazine L’Espresso claimed Friday.
Obama
-
Obama defends NSA surveillance but suggests reforms could be on their way
-
NSA reform advocates hopeful of change in 2014 despite failure so far
Twin bills to curb surveillance yet to pass committee stage but reformers pledge to fight anew when Congress returns next year
-
How President Obama Misled Chris Matthews About NSA Surveillance
But the more common practice when presidents mislead on cable news is for the broadcasters involved to neither revisit their answers nor correct false impressions they left. Leaving these particular remarks unchallenged does a disservice to MSNBC viewers as they try to understand the ongoing, high-stakes surveillance debate.
Canada
-
This Week in Review: Questions on journalists’ handling of NSA files, and the value of viral content
The two biggest stories, however, have been about the journalists that have published the stories on the leaks. The first was regarding The Guardian, whose editor, Alan Rusbridger, was called in to testify to a Parliament committee about his paper’s reporting on the leaks. The paper’s staff could be charged with terrorism offenses related to their publication of the leaks.
-
NSA considered spying on Canadians without this country’s consent, top-secret directive says
The U.S. National Security Agency considered spying on Canadians without the knowledge or consent of its intelligence partners in this country, according to a top-secret draft NSA directive.
-
Canadian Spy Agency Establishes Covert Surveillance Operations Worldwide as Part of NSA Global Spying Apparatus
-
Inside Canada’s top-secret billion-dollar spy palace
-
Snowden document shows Canada set up spy posts for NSA
A top secret document retrieved by American whistleblower Edward Snowden reveals Canada has set up covert spying posts around the world and conducted espionage against trading partners at the request of the U.S. National Security Agency.
The leaked NSA document being reported exclusively by CBC News reveals Canada is involved with the huge American intelligence agency in clandestine surveillance activities in “approximately 20 high-priority countries.”
-
Canada’s spooks were NSA bagmen, established spy-posts in 20+ countries and “transnational targets”
The CBC quotes an expert who predicts that the revelation will undermine Canada’s diplomatic standing and relations around the world (duh), and who speculates that the Prime Minister himself may have signed off on the arrangement.
-
Leaks on Five Eyes spy network are fuelling ‘misinformation,’ CSEC chief says
-
Canada-NSA Spying Allegations Called ‘Misinformation’ By Watchdog
-
Canada spied jointly with U.S. on trade partners, report says
Drugs
-
The inept mind-control experiment that led to 20 years of CIA funding
-
If the NSA Could Hack Into Human Brains, Should It?
Technology has changed the surveillance state in ways that the American public doesn’t yet understand, according to Joel F. Brenner, a former senior counsel at the NSA.
“During the Cold War our enemies were few and we knew who they were. The technologies used by Soviet military and intelligence agencies were invented by those agencies,” he writes. “Today our adversaries are less awesomely powerful than the Soviet Union, but they are many and often hidden. That means we must find them before we can listen to them. Equally important, virtually every government on Earth, including our own, has abandoned the practice of relying on government-developed technologies. Instead they rely on commercial off-the-shelf, or COTS, technologies. They do it because no government can compete with the head-spinning advances emerging from the private sector, and no government can afford to try.”
Antivirus
-
Do Antivirus Companies Whitelist NSA Malware?
Dear antivirus vendors: Are you aiding and abetting National Security Agency (NSA) spying?
Analysis/Overview
-
Looking back at NSA revelations since the Snowden leaks
-
Investigating the 9/11 Attacks. The NSA’s “Lone Wolf Terrorists” Justification for Mass Spying Is Nonsense
But we want to focus on another angle: the unspoken assumption by the NSA that we need mass surveillance because “lone wolf” terrorists don’t leave as many red flags as governments, so the NSA has to spy on everyone to find the needle in the haystack.
But this is nonsense. The 9/11 hijackers were not lone wolves.
-
Read This If You Want To Understand Just How Far The NSA Has Gone, And The Political Mess Behind It
-
The NSA is out of control and must be stopped
The National Security Agency is breaking trust in democracy by breaking trust in the internet. Every day, the NSA records the lives of millions of Americans and countless foreigners, collecting staggering amounts of information about who they know, where they’ve been, and what they’ve done. Its surveillance programs have been kept secret from the public they allegedly serve and protect. The agency operates the most sophisticated, effective, and secretive surveillance apparatus in history.
-
Reform corporate surveillance
The FSF issued the following statement in response to the recent open letter on government surveillance published by AOL, Apple, Facebook, Google, LinkedIn, Microsoft, Twitter, and Yahoo.
-
Spying has its limits
-
We cannot afford to be indifferent to internet spying
We’ve seen less than 1% of the NSA documents Edward Snowden took with him from his employer, Booz Allen. The whistleblower had been employed to consolidate training documents used to brief NSA agents and contractors on the full range of NSA programmes and sources, which gave him access to the intimate (and sometimes boastful) details of the NSA’s capabilities.
The disclosures will keep coming, and they will be worse. The journalists handling the Snowden trove have taken extraordinary care to redact them in order to preserve the legitimate law-enforcement capabilities of western spy agencies, and there are certainly programmes of even grander sweep and more sensitive details that will take more time-consuming verification and caution before they can be disclosed.
-
Six months after NSA story broke, Snowden looks even more patriotic
Six months ago this week, the Guardian and Washington Post published the first stories based on leaks from Edward Snowden. Since then, in what has become a steady drumbeat of revelations about the about the US National Security Agency other nations’ spy agencies, we’ve learned how utterly hostile our governments have become to our most fundamental rights in the post 9/11 world – but we’ve also seen the first genuine push-back by some of the people who have the power to make a near-term difference.
-
State surveillance of personal data: what is the society we wish to protect?
What in principle would justify the scope of the surveillance revealed by the Snowden leak? Would it be enough, for example, if it could be shown that a specific potential act of terrorism had been prevented by, and could only have been prevented by, the full breadth and depth of what we now have learned is the playing field of the security services?
-
The year the NSA hacked the world: A 2013 PRISM timeline (Part I)
On 20 May 2013, a diminutive and bespectacled computer specialist employed as a contractor by the American National Security Agency (NSA) boarded a plane to Hong Kong. He’d taken a leave of absence from work on the pretext of receiving treatment for his newly-diagnosed epilepsy, and bought a last-minute plane ticket at the airport, with no advance booking.
-
State of Deception
Wyden told me, “The answer was obviously misleading, false.” Feinstein said, “I was startled by the answer.” In Washington, Snowden’s subsequent leaks created the most intense debate about the tradeoffs between national security and individual liberty since the attacks of September 11th. The debate will likely continue. According to Feinstein, Snowden took “millions of pages” of documents. Only a small fraction have become public. Under directions that the White House issued in June, Clapper declassified hundreds of pages of additional N.S.A. documents about the domestic-surveillance programs, and these have only begun to be examined by the press. They present a portrait of an intelligence agency that has struggled but often failed to comply with court-imposed rules established to monitor its most sensitive activities. The N.S.A. is generally authorized to collect any foreign intelligence it wants—including conversations from the cell phone of Germany’s Chancellor, Angela Merkel—but domestic surveillance is governed by strict laws.
-
Snowden Leaks Notwithstanding, It’s Business as Usual at the NSA Museum
-
Edward Snowden, the NSA, and the Never-Ending End of Privacy
-
Orwellian Obama
Apologists for National Security Agency (NSA) espionage argue “national security!” But leaked NSA files show Washington spying to gain an advantage in economic negotiations and to keep a close eye not so much on terrorists as on political opponents and rivals.
-
NSA Whistleblower
When the U.S. government figured that out, prosecutors came down hard, indicting him on multiple national security charges, including espionage, which, if convicted, could have earned him as much as 35 years in prison.
But Thomas Drake stood his ground. The U.S. government’s case collapsed on the eve of his trial.
In the process, he inspired Edward Snowden to follow his conscience, even if it meant breaking the law.
Today, Thomas Drake is quick to point out that over-reaching government surveillance isn’t a U.S. problem alone. That countries such as Canada … with its Communications Security Establishment Canada (CSEC), is following Washington’s lead.
Mr. Snowden’s leaks have revealed that Canada allowed the U.S. to conduct widespread surveillance in Canada during the G8 and G20 summits in 2010 … spying that was closely coordinated with CSEC. And there are allegations that CSEC conducted industrial espionage in Brazil by targeting the country’s Ministry of Mines and Energy last year.
Petitions/Actions
-
Americans angered by NSA spying take protest to Utah Data Centre, aka Bumblehive
In the Utah desert, the U.S. government has built a secretive data centre, built to store much of the world’s electronic signals intelligence, a yottabyte’s worth of data. Members of Restore the Fourth are outraged.
-
State surveillance of personal data is theft, say world’s leading authors
-
Surveillance Is Theft: World’s Leading Authors Protest NSA
-
NSA files – more than 500 authors condemn state surveillance
-
America’s Public Libraries take on the NSA
“Libraries are all about meta-data,” Alan Inouye, director of the Office for Information Technology Policy at ALA, told The Hill. As a library user, “you need to have some freedom to learn about what you think is important without worrying about whether it ends up in some FBI file. We’re talking about the information patterns of people. If that’s not personal, I don’t know what is.”
America’s libraries have been vulnerable to government intrusion ever since the passing of the Patriot Act (pdf) in the aftermath of the September 11, 2001, attacks. The law’s controversial Section 215, which allows the government to access business records, can be used to compel libraries to release data pertaining to research done by library users.
-
‘Shame on Feinstein’ group warns of tech sales impact from unchecked NSA operations
Sympathy
-
NSA Morale is Down After Edward Snowden Leaks
-
NSA confidence shaken since Snowden leaks began – report
Morale at the US National Security Agency has plummeted since the Edward Snowden leak made international headlines and inspired an ongoing wave of criticism against the intelligence agency – news that coincides with the publication of more NSA documents.
-
Do You Trust the Washington Post’s Sources on Morale at the NSA?
Former officials insist that employees are upset because President Obama hasn’t visited to show his support.
-
Morale plummets at the NSA
-
NSA morale down after Edward Snowden revelations, former U.S. officials say
-
NSA Website Down Again: DDoOS Attack Or ‘Internal Error’ At Fault?
There were no immediate reports indicating what may have caused the site to go down, but it comes less than two months after an hours-long Oct. 25 outage that was initially blamed on a Distributed Denial of Service (DDoS) attack by a group such as the Anonymous hacktivist collective or a foreign government or another entity. A spokesperson for the NSA later stated that the website went down instead as a result of an “internal error,” but rumors persist that it actually came at the hands of a cyberattack, which would represent a major embarrassment for the high-tech agency.
Sweden
-
It’s Becoming Clear That The NSA’s Nightmare Has Just Begun
Second, on Thursday Swedish television reported that Sweden’s signals intelligence agency, the FRA, has been a key partner for the United States in spying on Russia and its leadership. A previous report said that Sweden is also a key partner of the GCHQ.
-
Swedes Shame the NSA With Gingerbread Data Center Spy Movie
It’s probably the single most enjoyable comment on the year’s NSA spying scandal. And it’s certainly the strangest.
-
The UK government is working in a Snowden-free bubble
Anyone who took the time to read the UK government’s latest update on its cybersecurity strategy could be forgiven for thinking that a man called Edward Snowden never existed.
Most people who are even slightly plugged in to the world around them would agree, however, that we live in decidedly more interesting times for internet security and privacy than the document would have us believe. Not a day seems to have gone by since the summer without a new revelation of activities by the NSA or GCHQ that have gone just a little further than what most people find acceptable.
-
Who is behind the “people’s Intelligence apparatus”? On the Swedish collaboration with US spying
I believe that there are some alternative answers to Sundberg’s quest, and that those are found 1) partly in main political parties of the Swedish establishment, and 2) partly in the economic-military establishment; 3) also the assisting role played by the Swedish state-owned media and MSM monopolies is paramount.
-
The Snowden Documents and Sweden with English subtitles
After six months reporters Fredrik Laurin, Sven Bergman and Joachim Dyfvermark made contact with Glenn Greenwald who holds the documents that Edward Snowden leaked from American signal intelligence organization NSA. They made this report.
-
Sweden aids NSA-led hacking ops: report
Hungary
Bitcoin
Change
-
IETF Group Proposes Making Tor Anonymity an Internet Standard
There continue to be many people around the globe who want to be able to use the web and messaging systems anonymously, despite the fact that some people want to end Internet anonymity altogether. Typically, the anonymous crowd turns to common tools that can keep their tracks private, and one of the most common tools of all is Tor, an open source tool used all around the world.
-
Edward Snowden to give evidence to EU parliament, says MEP
British Conservatives oppose video appearance by NSA whistleblower, which Green MEP says could happen this year
-
EU parliament votes to invite Snowden to testify over NSA spying
The European Parliament has voted to formally invite former NSA contractor and whistleblower Edward Snowden to provide official court testimony on NSA spying, in the face of overwhelming concern from conservative MEPs.
European conservatives seemed reluctant to pay full attention to the possibility of the hearing on Wednesday. The European People’s Party (EPP), which is a conglomerate of center-right parties, had displayed a great deal of concern over the possibility of inviting Snowden for a hearing, suggesting that he could potentially throw the transatlantic trade agreement with the US into disarra
-
Who is monitoring the covert operations of the world’s spy agencies?
Mission drift: our intelligence agencies are in danger of straying from their core purpose.
Australia
-
More whistleblowers emerge in Australia’s Timor spying scandal
The Australian government’s moves to suppress further exposures of its surveillance operations suffered a blow yesterday when it was revealed that three more whistleblowers have given statements to the East Timorese government about the illegal installation of bugging devices in the walls of Dili’s cabinet offices. The bugging involved Australian Secret Intelligence Service (ASIS) agents posing as aid workers helping renovate Timorese government buildings.
-
Australian police to roll out ‘NSA-type’ surveillance tech by next year
The Deep Packet Inspection technology is expected to go for a trial in February followed by a complete roll out in April
France
-
French Intelligence Granted More Snooping Powers Than NSA
Despite condemning US security agencies’ snooping on European citizens, France has passed a law which will grant its intelligence services the power to expand their own surveillance activity – with no judicial oversight.
In 2015, French agencies will gain the power to record telephone conversations, and access emails, location data and other electronic communications, for a wide range of reasons including national security and protecting France’s business interests. Internet companies and human rights groups opposed the new law, which places no legal oversight on the agencies.
-
‘Almost everyone took the bait’: Promise of naked pictures of Carla Bruni was used as bait to break into computers at G20 summit in Paris
The promise of nude pictures of former French first lady Carla Bruni was used by hackers as bait to snare dozens of diplomats attending the G20 summit in Paris in 2011, it has emerged.
-
Drones: What France wants for Christmas
The country hailed for its privacy laws is investing in drones to surveil its citizens
-
France steps up net surveillance weeks after protesting against NSA spying
Legality
-
Op-Ed: Enough debate — Is NSA spying constitutional or not?
Privacy is not negotiable. What I am sending and who I am sending it to is not the government’s business unless they have evidence that I am doing something illegal. The debate is over. The government’s lies have been exposed and the people have found that they do not like what it is doing. We’ve talked long enough. Now we need action.
Misc.
-
A conversation with Bruce Schneier
-
The NSA’s Reach Might Be Even Bigger Than We Thought
-
Glenn Greenwald: Industrial espionage is hypocrisy
Western state sponsored espionage for economical reasons undermines free competition and contains a large portion of hypocrisy says journalist Glenn Greenwald, who has examined the entire material that Edward Snowden took with him from the NSA, and who has studied the documents regarding the Swedish espionage.
-
Glenn Greenwald : “I intend to publish Edward Snowden’s documents to the very last”
Glenn Greenwald doesn’t want to abdicate, still willing to smash to smithereens the “toxic habits” of media. We met him in Rio for an exclusive interview.
-
Silicon Valley Takes On the NSA [article misrepresents the story]
-
NSA Data Mining: Three Points to Remember [misrepresents the story also]
Virtual Worlds
-
NSA and GCHQ spies ‘operated in games including World of Warcraft and Second Life’
-
The NSA is more likely to find budding romance on World of Warcraft than secret plots
-
World of Spycraft? The NSA on World of Warcraft
So it is that the NSA has been “playing” games for the last few years. Whether they’ve found any real enemy action is a question yet to be answered.
-
That trash-talking elf in World of Warcraft may be an NSA spy
-
To fel with you! There’s an NSA spook in my World of Warcraft
-
Spy Games: NSA and CIA Allegedly Tried to Recruit World of Warcraft and Second Life Players
-
Revealed: spy agencies’ covert push to infiltrate virtual world of online games
NSA and GCHQ collect gamers’ chats and deploy real-life agents into World of Warcraft and Second Life
[...]To the National Security Agency analyst writing a briefing to his superiors, the situation was clear: their current surveillance efforts were lacking something. The agency’s impressive arsenal of cable taps and sophisticated hacking attacks was not enough. What it really needed was a horde of undercover Orcs.
That vision of spycraft sparked a concerted drive by the NSA and its UK sister agency GCHQ to infiltrate the massive communities playing online games, according to secret documents disclosed by whistleblower Edward Snowden.
-
NSA files: games and virtual environments paper
-
World of Spycraft: NSA and CIA Spied in Online Games
Awards and Recognition
-
Pell Center names NSA spying program as 2013 Story of the Year
The Pell Center for International Relations and Public Policy at Salve Regina University has named the unfolding saga of digital spying by the National Security Agency (NSA) as the 2013 “Story of the Year.”
-
Edward Snowden voted Guardian person of the year 2013
-
Shooting the Messenger
There is a deeply misguided attempt to sacrifice Julian Assange, WikiLeaks, Chelsea Manning and Jeremy Hammond on the altar of the security and surveillance state to justify the leaks made by Edward Snowden. It is argued that Snowden, in exposing the National Security Agency’s global spying operation, judiciously and carefully leaked his information through the media, whereas WikiLeaks, Assange, Manning and Hammond provided troves of raw material to the public with no editing and little redaction and assessment. Thus, Snowden is somehow legitimate while WikiLeaks, Assange, Manning and Hammond are not.
“I have never understood it,” said Michael Ratner, who is the U.S. lawyer for WikiLeaks and Assange and who I spoke with Saturday in New York City. “Why is Snowden looked at by some as the white hat while Manning, Hammond, WikiLeaks and Julian Assange as black hats? One explanation is that much of the mainstream media has tried to pin a dumping charge on the latter group, as if somehow giving the public and journalists open access to the raw documents is irresponsible and not journalism. It sounds to me like the so-called Fourth Estate protecting its jobs and ‘legitimacy.’ There is a need for both. All of us should see the raw documents. We also need journalists to write about them. Raw documents open to the world give journalists in other countries the chance to examine them in their own context and write from their perspectives. We are still seeing many stories based on the WikiLeaks documents. We should not have it any other way. Perhaps another factor may be that Snowden’s revelations concern the surveillance of us. The WikiLeaks/Assange/Manning disclosures tell us more about our war crimes against others. And many Americans do not seem to care about that.”
-
Hacktivists on Trial
Prosecutors are warping the law to throw activist hackers like Aaron Swartz behind bars for years.
Branding
-
New US spy satellite features world-devouring octopus
President Obama is out to put the public’s mind at ease about new revelations on intelligence-gathering, but the Office for the Director of National Intelligence can’t quite seem to get with the program of calming everyone down.
Over the weekend, the ODNI was pumping up the launch of a new surveillance satellite launched by the National Reconnaissance Office. The satellite was launched late Thursday night, and ODNI’s Twitter feed posted photos and video of the launch over the following days.
Arizona
-
Arizona senator moves to ban unconstitutional NSA spying
Arizona Sen. Kelli Ward announced Monday that she will act to ban the National Security Agency from unconstitutional operations in her state. Ward describes her nullification legislation, the Fourth Amendment Protection Act, as a pre-emptive strike against the embattled agency.
“While media attention is focused on a possible effort to shut off water to the NSA data center in Utah, I’m introducing the Arizona Fourth Amendment Protection Act to back our neighbors up,” Ward said, referencing actions by Utah’s privacy advocates to drive the agency from its borders.
-
Legislation would aim to keep NSA out of Arizona
-
New law could ban NSA from Arizona
-
New Legislation Would Ban NSA From Arizona
Cookies
-
How advertisers became the NSA’s best friend
This week, new documents from NSA leaker Edward Snowden arrived with some troubling revelations: the NSA has been piggybacking on Google’s network, using the company’s “preferences” cookie to follow users from site to site, proving their identity before targeting them with malware. It means the agency has tapped into one of the most popular features on the web and the core of Google’s multibillion-dollar ad-targeting empire. Instead of just targeting ads and saving preferences, the infrastructure is being used to find people the NSA is interested in and silently infect their devices with malware.
-
Snowden latest: NSA stalks the human race using Google, ad cookies
The already strained relationship between Google and the NSA has got a little bit worse, after claims in the latest Snowden leak that intelligence agencies are using the Chocolate Factory’s cookies to track targets.
-
Twitter gobbles up more cookies with retargeted ads, says users have privacy choices
Twitter will start delivering targeted ads on mobile devices based on Web browsing data
-
How The NSA Uses Cookies To Hack Computers
-
NSA taps tracking cookies used by Google, others, to monitor surveillance targets
-
NSA uses Google cookies to pinpoint targets for hacking
The National Security Agency is secretly piggybacking on the tools that enable Internet advertisers to track consumers, using “cookies” and location data to pinpoint targets for government hacking and to bolster surveillance.
The agency’s internal presentation slides, provided by former NSA contractor Edward Snowden, show that when companies follow consumers on the Internet to better serve them advertising, the technique opens the door for similar tracking by the government. The slides also suggest that the agency is using these tracking techniques to help identify targets for offensive hacking operations.
-
GCHQ and NSA ‘track Google cookies’
The latest Snowden leak suggests US and UK cyberspies are taking advantage of Google’s proprietary cookie technology in an effort to track suspects.
-
NSA and GCHQ Uses Google Ad Cookies to Spy on Suspects
Nigeria
-
EXCLUSIVE: Elbit Systems officials arrive; begin installation of $40 million Internet Spy facility for Nigeria
While the House of Reps investigative panel dilly dallies on its planned investigations, the Internet Spy device will be installed and “Big Brother” will come alive, somewhere in Abuja, soon.
Recruitment
-
NSA wooing students to work for US intelligence
-
The NSA Is Recruiting Teens
The National Security Agency is hiring its spies early and recruiting teens as young as 15 for internships.
Students who answer ads seeking aspiring journalists have the chance to work as paid interns for the NSA in Fort Meade, Md.
The agency currently employs 500 young interns on staff, and according to an NSA spokeswoman in Newser, up to 95% of interns who want to stay on with the agency after their internships are able to do so.
Journalism
-
Snowden docs had NYTimes exec fearing for his life
Informing the American people about how their government spies on them can be risky business for journalists.
-
Glenn Greenwald: What I’ve Learned
China/Distractions/Deflections
-
NSA Revelations Have Irreparably Hurt U.S. Corporations in China
-
China hacked Europe before G20: reports
-
Show us a better way than collecting metadata, NSA director says to critics
-
Firms slam NSA snooping but profit from personal data
At stake is the trust of massive online audiences that attract digital advertising. As companies collect personal data and learn more about each user’s interests and habits, advertising becomes easier to sell. The marketing campaigns are particularly important to Google, Yahoo and Facebook, all of which make most of their money from ads. Although Microsoft and Apple make billions from the sale of software and devices, the two companies are also hitching their fortunes to Internet services.
UK
-
NSA files – UK MP aims to introduce bill to tighten surveillance laws – live
A former British minister will today try to introduce a bill to tighten up the rules around the interception of communications by the security services to ensure there is judicial oversight of the material captured in this way.
-
UK Secure Email Provider Shut Down His Service In January To Prevent GCHQ From Obtaining Encryption Keys
Shutting down secure email services because of surveillance agency interference apparently isn’t just a local phenomenon. Lavabit, Snowden’s email provider, shut down earlier this year to prevent being forced by the NSA to sabotage its own encryption. Silent Circle, another secure email service, shut down only hours later. Silent Circle hadn’t yet been pressured by the government, but obviously felt it was only a matter of time.
-
GCHQ Forced Secure Email Service PrivateSky to Shut Down
Android/Gmail
-
Google tells EFF: Android 4.3′s privacy tool was a MISTAKE, we’ve yanked it
-
Google removed a ‘vital’ privacy feature in Android and the EFF is pissed
-
Google Removes Vital Privacy Feature From Android, Claiming Its Release Was Accidental
After we published the post, several people contacted us to say that the feature had actually been removed in Android 4.4.2, which was released earlier this week. Today, we installed that update to our test device, and can confirm that the App Ops privacy feature that we were excited about yesterday is in fact now gone.
-
Awesome Privacy Tools in Android 4.3+
To date, there has been no way to run apps on Android with real and reliable privacy controls. Android version 4.3 and higher take a huge step in the right direction, letting users install apps while denying some of the apps’ attempts to collect the user’s data.
-
Don’t fall prey to Gmail’s image problem
As the flu subsides some, I feel ever so cranky and, hehe, suspicious. So I look askance at the newest Gmail changes and ask my favorite question: “Who benefits?” By product manager John Rae-Grant’s reckoning, you do. But Google gains more from plans to display remote images.
-
Dear Gmailer: I know what you read last summer (and last night and today)
How Gmail’s image tweak is a boon to marketers, stalkers, and debt collectors.
-
Google Says That Despite Changes, Marketers Can Still Track Open Rates In Gmail
-
With the New Gmail, People Will Know When You Open That Message
Today, the web giant announced a change to its popular Gmail service: Images embedded in emails will now be automatically displayed, saving users from clicking on a “display images” link and, Google claims, making “your messages more safe and secure.” But buried in the fine print, a different picture emerges.
New Zealand
-
NZ judge: Kim Dotcom is likely still being spied upon
A New Zealand court judge on Wednesday (11 October) affirmed that it is likely that Kim Dotcom and his family have been and continue to be under surveillance.
IBM
-
IBM hid China’s reaction to NSA spying ‘cos it cost us BILLIONS, rages angry shareholder
An IBM shareholder is suing Big Blue, accusing it of hiding the fact that its ties to the NSA spying scandal cost it business in China – and wiped billions off its market value.
-
Lawsuit accuses IBM of collaborating with NSA and hurting business with China
-
IBM Shareholder Sues Over Cooperation With NSA Spy Program
IBM lobbied in favor of a bill that would allow it to share customers’ personal data, including data from customers in China, with the NSA, according to the complaint. In June, documents released by Snowden disclosed the NSA’s “Prism” surveillance program, which used information from technology companies such as IBM, the pension fund said.
-
US to keep NSA and cyber command chief’s job unified
The White House has decided to maintain the “dual-hatted” arrangement which sees a single military officer head the National Security Agency eavesdropping service and US cyber warfare operations, an official said Friday.
Reform
-
White House Calls for Cosmetic Changes to Illegal NSA Spying
-
Presidential Task Force Recommends Overhaul of NSA Surveillance Tactics
The draft report embraces recent suggestions that a civilian lead the NSA and that the agency be separated from Cyber Command, the military’s main cyberwarfare unit. When Cyber Command was launched in 2009, the Obama administration selected the director of NSA to also head the unit.
-
No Civilian Leadership for NSA After All
It’s starting to look like the only part I got right last night might be this: “In the end, I suspect that most of this will amount to very little.”
-
This Rumored Recommendation for NSA Reform Is a Horrible Idea
-
White House says no plans to split NSA, Cyber Command
President Barack Obama’s administration said on Friday it will keep one person in charge of both the National Security Agency spy agency and the military’s Cyber Command, despite calls for splitting the roles after revelations about vast US electronic surveillance operations.
-
Will surveillance scandal lead to NSA reorganization?
-
Senate Committee Passes Two Bills Protecting NSA’s Actions
Indications show that there is little effort on the part of the U.S. government to ease its use of “eavesdropping” and “data collection” archives according to many reports, but none more notable than one from the New York Times.
-
NSA may leave spying programmes unchanged
-
NSA deputy director steps down
Chris Inglis, the deputy director of the National Security Agency and its top civilian official, stepped down this week, according to an agency spokeswoman.
Fran Fleisch is now serving as the acting NSA deputy director, the agency’s No. 2 position. She had been the NSA executive director, which is the third-highest ranking post.
Amnesty Claims/CBS
-
NSA Split on Amnesty for Snowden
-
NSA agent open to cutting a deal with Snowden
-
Report: Some NSA Officials Consider Amnesty for Snowden
-
Report: NSA mulls Snowden amnesty (but it probably won’t happen)
According to an interview on 60 Minutes scheduled for broadcast this coming Sunday, a top National Security Agency (NSA) official says that some in the government are considering giving amnesty to Edward Snowden in exchange for the return of all of the documents that he exfiltrated from the NSA.
According to CBS News, whose parent company produces 60 Minutes, NSA official Rick Ledgett told the news program that “it’s worth having a conversation about” possible amnesty for Snowden. Ledgett is in charge of the NSA’s unauthorized leak task force to investigate the Snowden leaks.
-
The Sad Decline of ‘60 Minutes’ Continues With This Week’s NSA Whitewash
-
NSA documentary on CBS sparks Twitter fury
-
Don’t be fooled by the 60 Minutes report on the NSA
-
’60 Minutes’ reporter didn’t want NSA story to be ‘a puff piece’
-
NSA bosses divided over providing amnesty to Edward Snowden
The National Security Agency executives are reportedly in a split about the idea of providing amnesty to whistleblower Edward Snowden who revealed classified data about the controversial mass surveillance programmes by the US.
Very Recent
-
The NSA Is Coming to Town, So Encrypt for Goodness’ Sake
-
Data Retention Directive breaches fundamental rights, says Advocate General
According to an influential legal opinion in the European Court of Justice, the Directive breaches privacy rights and should be replaced with a new law.
-
NSA officials go on tour to heal agency image amid surveillance scandal
The National Security Agency has endured six months of criticism from media outlets since Edward Snowden released documents disclosing the agency’s massive global surveillance apparatus. With its back against the wall, NSA head Keith Alexander and Snowden task force head Richard Ledgett are speaking directly to the press as a means of getting ahead of the story, with the hope of painting themselves — and Snowden himself — in a new light.
-
Cover your tracks: beat the NSA and GCHQ at their own game
-
Inside NSA: We Brought In a Recording Device So You Don’t Have To
In recent months, the agency been taking preliminary steps—themselves dramatic for a signals intelligence agency—to engage the public debate. Tomorrow evening, for example, 60 Minutes will air a segment on NSA that reflects considerable cooperation with CBS.
-
ACLU blasts NSA surveillance with video featuring creepy Santas
-
The NSA files and the network effect
-
NSA Spy’s ‘Reassuring’ Essay Is Spectacularly Unreassuring
-
Snowden sitting on 1.5 million more documents, NSA estimates
And now for your weekend Snowden update. Edward Snowden, as you may know if you haven’t been living in Plato’s cave, is the 30-year-old former NSA employee who stole and leaked “thousands” of documents revealing some of the incredible extent to which the NSA and other international spy agencies go to spy on Americans, Chinese, Germans, and the rest of the world. Last month the NSA said Snowden had leaked 200,000 documents to journalists. Now we’re hearing estimates from the NSA itself that Snowden is sitting on 1.5 million additional documents — but the agency admits even that figure is more-or-less a shot-in-the-dark.
12.13.13
Links 13/12/2013: Linux (Kernel) News
Spanning over one week, grouped and clustered for convenience
KVM/QEMU/Xen
-
IBM will be bringing KVM Linux virtualization to Power in 2014
Linux has many hypervisors, such as Xen, and it’s supported by more, such as Azure, but it also has its own built-in hypervisor: Kernel-based Virtual Machine (KVM). Unfortunately, KVM only works on Intel and AMD processors. Earlier this year, IBM announced that it would be adding KVM support to its Power architecture, and now we know that it will be appearing sometime in 2014.
-
QEMU 1.7 Is Bringing New Features For Linux Emulation
QEMU 1.7.0-rc2 was released yesterday and if all goes according to plan the official QEMU 1.7 release will happen on Wednesday. This next QEMU emulator update that’s also relied upon by Linux KVM will bring some exciting improvements.
-
KVM/QEMU 3D Support Still Being Figured Out
-
Xen PVH Support Brought Back Up For The Linux Kernel
-
Xen Project Builds Its Own Cloud OS Mirage
‘Linux Experience’
-
openSUSE 13.1 vs Ubuntu 13.10: a friendly match
I often hear the argument that Android is not Linux or Chrome OS is not Linux. Technically that’s not true. Linux is just the kernel and both these operating systems user Linux so they are Linux-based operating systems.
What people are actually trying to say is they don’t get the same ‘Linux experience’ when they use these operating systems. What’s that Linux experience?
Kernel Version 3.12
-
Linux Kernel News
-
Linux Kernel 3.12.3 Is Now Available for Download
-
Linux Kernel 3.12.2 Is Now Available for Download
Greg Kroah-Hartman has just announced a few minutes ago, November 29, that the second maintenance release of the Linux kernel 3.12 is now available for download.
-
Linux Kernel 3.12.4 Is Now Available for Download
Greg Kroah-Hartman has just announced a few minutes ago, December 8, that the fourth maintenance release of the Linux kernel 3.12 is now available for download.
-
Linux 3.13-rc3
.. I’m still on a Friday release schedule, although I hope that
changes soon – the reason I didn’t drag this one out to Sunday is that
it’s already big enough, and I’ll wait until things start calming
down.Which they really should, at this point. Hint hint. I’ll start
shouting at people for sending me stuff that isn’t appropriate as
we’re starting to get later into the release candidates.That said, it’s not like rc3 is somehow unmanageably large or that
anything particularly scary has happened. I’d have *liked* for it to
be smaller, but I always do.. And nothing particularly nasty stands
out here.The bulk here is drivers (net, scsi, sound, crypto..) and ARM DT
stuff, but there’s the usual randon stuff too, with arch updates
(pa-risc, more ARM, x86) and some filesystem and networking updates.
Kernel Version 3.13
-
VirtualBox 4.3.4 Released with Support for Linux Kernel 3.13
-
File-Systems Appear To Slowdown On Linux 3.13 Kernel
-
Download Linux Kernel 3.13 Release Candidate 2
-
Download Linux Kernel 3.13 Release Candidate 3
-
Linus Torvalds closes merge window two days early with Linux 3.13-rc1 release
-
Random Is Faster, More Randomness In Linux 3.13
The /dev/random changes went in for the Linux 3.13 kernel and this pull request was even interesting for the very promising next kernel release. While not in Linux 3.13, it’s mentioned the Linux kernel might also end up taking a security feature from the FreeBSD playbook.
-
Linux 3.13 Gets A Second Helping Of Power Management
A second pull request has been submitted for the Linux 3.13 kernel that provides further updates to the often less than desirable ACPI and power management code.
Submitted (and pulled) two weeks ago were already big ACPI and PM updates for this next Linux kernel release. However, Rafael Wysocki has now sent in a second ACPI/PM update for Linux 3.13 that’s queued up some more changes then and right ahead of the 3.13-rc1 tagging.
-
Linux Kernel 3.12.1 Is Now Available for Download
Greg Kroah-Hartman has just announced a few hours ago, November 20, that the first maintenance release of the Linux kernel 3.12 is now available for download.
-
Jon Corbet’s Linux Weather Forecast
This page is an attempt to track ongoing developments in the Linux development community that have a good chance of appearing in a mainline kernel and/or major distributions sometime in the near future. Your “chief meteorologist” is Jonathan Corbet, Executive Editor at LWN.net. If you have suggestions on improving the forecast (and particularly if you have a project or patchset that you think should be tracked), please add your comments to the Discussion page. There’s a blog that reports on the main changes to the forecast. You can view it directly or use a feed reader to subscribe to the blog feed. You can also subscribe directly to the changes feed for this page to see feed all forecast edits.
-
DRM Gets More Linux 3.13 Updates; VMware DRI3
For those keeping track of Linux 3.13 kernel activity, another DRM subsystem pull update was submitted during this merge window.
Jailhouse
-
Jailhouse: A Linux-based Partitioning Hypervisor
We are happy to announce the Jailhouse project, now also to a broader community!
-
New Linux Hypervisor Announced: Jailhouse
Linux Foundation
-
A Summer Spent on OpenPrinting with the Linux Foundation
This past summer marked Moscow-based developer Anton Kirilenko’s third Google Summer of Code internship with The Linux Foundation. That’s three summers, three different projects and mentors, and three totally different experiences with Linux and open source software.
-
LinuxCon/CloudOpen Goose Chase Ends in Tie for Grand Prize (October)
-
Slideshow: The Linux Foundation’s Guide to the Open Cloud
-
Linux Foundation Gains New Cloud, Open Hardware and Gaming Members
-
The People Who Support Linux: PhD Student Powers Big Data with Linux
-
How Did KVM Virtualization Get Into the Linux Kernel?
Kernel-Based Virtual Machine, more commonly referred to as KVM, is one of the most popular open-source virtualization technologies in use today. Both IBM and Red Hat use it as the basis for their Linux virtualization technologies, and it is the most widely used virtualization technology in the OpenStack cloud as well.
KVM was originally written by Israeli software developer Avi Kivity while he was working at Qumranet. Qumranet was acquired by Red Hat for $107 million in 2008.
Training
-
Outreach Program for Women Seeks New Linux Kernel Interns
The interns who worked with The Linux Foundation as part of the FOSS Outreach Program for Women this summer come from diverse backgrounds and levels of experience, but they now have at least one thing in common (besides their gender). They can all add “Linux kernel hacker” to their resume.
-
A Summer Spent on the LLVM Clang Static Analyzer for the Linux Kernel
-
Training college students to contribute to the Linux kernel
Following my recent post on the initiatives now in place to rebalance the demographics of the Linux Kernel community, I would like to share a set of specific training activities to get beginners, specifically college students, involved in the kernel.
These were created by an enthusiastic group at Red Hat, including Matthew Whitehead and Priti Kumar, and unfolded on campus at Rensselaer Polytechnic Institute, Rensselaer Center for Open Source (RCOS), and State University of New York at Albany.
Graphics Stack
-
Radeon Gallium3D MSAA Mesa 10.1 Git Benchmarks
-
NVIDIA’s PTX Back-End For GCC Has Been Published
As part of the work to bring OpenACC 2.0 and NVIDIA GPU support to GCC, a large set of patches were published this morning for adding NVIDIA’s PTX back-end to the Free Software Foundation’s compiler.
-
AMD APU vs. Radeon GPU Open-Source Comparison
Earlier this month I ran some benchmarks showing that with the very latest open-source AMD Linux graphics driver code, the AMD APU Gallium3D performance can be ~80%+ the speed of Catalyst, the notorious Linux binary graphics driver. For end-users curious what the AMD A10-6800K “Richland” APU performance is comparable to when it comes to discrete Radeon graphics cards with the R600 Gallium3D driver, here’s some weekend comparison benchmarks.
-
MSM DRM Will Support New Hardware In Linux 3.14
An early patch-set has been sent out by Rob Clark as he prepares the “MSM” DRM driver changes for the Linux 3.14 kernel. This open-source DRM graphics driver will support at least two new boards in the next kernel development cycle.
-
NVIDIA Helping Nouveau With Video Decoding
While it isn’t in the form of any complete documentation, a NVIDIA engineer has begun answering questions by the open-source Nouveau driver developers about video decoding with their H.264 engine.
-
New Wayland Live CD Has A Lot Of Features
The oddly-named Wayland Live CD environment for checking out the next-generation Linux display stack has been updated. The Wayland Live CD ships with many enabled tool-kits, the latest Wayland code, Orbital and Hawaii support, KDE Frameworks Wayland programs, and other new native Wayland applications.
-
DRI3 Support Comes For X.Org GLAMOR
As the first X.Org graphics driver past the open-source Intel driver to have mainline support for Direct Rendering Infrastructure 3 is GLAMOR.
-
Quad-Monitor AMD/NVIDIA Linux Gaming: What You Need To Know
-
How to start contributing to Mesa3D
-
Crystal HD Decodes New Linux Support Improvements
A couple years ago Broadcom released the Crystal HD as a standalone hardware video decoder chip. While there’s been an open-source Linux driver for the Crystal HD, we haven’t heard much about it in recent months, but that changed this morning.
-
AMD APU On Linux: Gallium3D Can Be 80%+ As Fast As Catalyst
After running earlier this week a 21-way graphics card comparison with Intel, AMD, and NVIDIA GPUs, there were requests by some Phoronix readers to see some new APU performance numbers. For ending out November, here’s new Catalyst vs. Gallium3D driver benchmarks on Ubuntu Linux for the AMD A10-6800K with its Radeon HD 8670D graphics. The results with the latest Linux kernel and Mesa are very positive towards the open-source AMD driver where in some tests the performance can nearly match Catalyst! For at least one Source Engine game, the open-source driver can now even run significantly faster than the binary driver.
-
Mesa 10.0 Release Brings OpenGL 3.3
The 10.0 release was expected a few days back, but now it’s finally happened via Intel’s Ian Romanick with this brief announcement.
-
zRAM Is Still Hoping For A Promotion
While zRAM has been part of the Linux kernel’s staging area for a while now and this RAM-based compressed block device is used by Chrome OS and Android, it’s struggling to get promoted to the main area of the kernel.
-
Intel’s GL Windows Driver Pushes Further Ahead Of Linux
Intel’s Windows OpenGL driver continues to make progress in a more steadfast manner than the open-source Intel Linux graphics driver. The latest achievement for the Intel Windows driver is OpenGL 4.2 compliance for Haswell.
-
Another Game Studio Backs AMD’s Mantle API
There’s another game studio now backing AMD’s Mantle graphics rendering API that aims to be faster and easier to implement for games than OpenGL. However, we’re still waiting for AMD Mantle on Linux.
-
AMD “RadeonSI” Team Fortress 2 Is Now 75% Faster
The RadeonSI Gallium3D driver for AMD HD 7000 series GPUs and newer is now 75% faster for the Source Engine Team Fortress 2 game thanks to a new patch-set by Marek.
-
Ultra HD 4K Linux Graphics Card Testing
If you’ve been eyeing a purchase of a 4K “Ultra HD” TV this holiday season and will be connecting it to a Linux system, here’s the information that you need to know for getting started and some performance benchmarks to set the expectations for what you can expect. This article has a number of AMD Radeon and NVIDIA GeForce benchmarks when running various Linux OpenGL workloads at a resolution of 3840 x 2160.
-
XDG-Shell Patches Get Moving For Wayland
After a lot of mailing list discussions amongst developers that have a stake in Wayland and early patches sent out, the latest xdg-shell patches were formally distributed today on the developers’ mailing list. The xdg-shell is a new protocol living outside of the core Wayland protocol.
Benchmarks
Btrfs
-
Btrfs hands-on: Exploring the error recovery features of the new Linux file system
This is my final post in this series about the btrfs filesystem. The first in the series covered btrfs basics, the second was resizing, multiple volumes and devices, the third was RAID and Redundancy,and the fourth and most recent was subvolumes and snapshots.
I think (and hope) that all of those together give a reasonable overview of what the btrfs filesystem is, what you can do with it, and how you can do some of those things. In this post I will wrap up a couple of loose ends – error recovery, and integration with other standard Linux utilities – and try to give a recap of the series as a whole. For complete and authoritative information, please refer to the Btrfs Wiki at kernel.org.
-
Btrfs hands on: My first experiments with a new Linux file system
Btrfs is a new file system for Linux, one that is still very much in development. Although I wouldn’t exactly describe it as “experimental” any more, it is, as stated in the Wiki at kernel.org, “a fast-moving target”.
It has also been said publicly that the basic format and structure of the filesystem should now be stable; it would only be changed in the future if some overriding reason or need is found.
The point of all this should be clear — it is still very early days, and it is not recommended to use btrfs in critical systems of any kind.
I leave it to the reader to decide how critical their systems are; for my own purposes, I will be using btrfs on several systems that I use as testbeds, some of which I carry with me and use for normal work on a daily basis, so it will get a “real” test, but I will not be using it on the primary systems that my partner and I use for home/work/business activities.
Misc.
-
Linux the Easy Way – Watching 100 Videos
The Linux Foundation launched the 100 Linux Video Tutorials campaign last January and today an update was posted. According to Jennifer Cloer nearly 100 videos have been submitted but she said, ” We need your help to reach 100 Linux video tutorials in January.” The collection boasts 83 submissions so far.
-
Petition to Synaptics Corporation regarding flakey Linux drivers
Windows might be the majority, but a big part of that is because the laptop manufacturers expend little to no effort on the alternative. Meanwhile, 50% of their customers would be happier running Linux if it was well setup!
-
Basic Data Structures and Algorithms in the Linux Kernel
-
Knock: TCP Port Knocking Proposed For Linux Kernel
-
KTAP 0.4 Allows For New Kernel Tapping
KTAP version 0.4 is now available as the script-based dynamic tracing tool for Linux.
-
New AVX/AVX2 Crypto Code For The Linux Kernel
-
Knock: A Linux kernel patch for NAT-compatible, stealthy port knocking
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »