08.29.15
Posted in America, Courtroom, Law, Patents at 8:29 am by Dr. Roy Schestowitz
Software patents demolition in the United States
Summary: The crackdown on software patents is coming along nicely and the Alice case is now being utilised even in the capital of patent trolls
WE RECENTLY gave many examples where Alice demolished software patents [1, 2, 3, 4, 5, 6]. The Alice v. CLS Bank case (at SCOTUS) led even the CAFC (overzealously in favour of software patents and their original endorser decades ago) to — believe it or not — overturning decisions/biases. They must all simply obey the new rules/laws and examiners at the USPTO cannot grant patents on software like they used to. It’s huge news, even if many news sites continue to overlook these developments (patent lawyers’ sites try to counter these worrisome — to them of course — developments and precedents using propaganda and cherry-picking of facts).
“Business method patent app[lications] get no respect,” says Patently-O‘s article, according to Richard Beem (patent lawyer). He just says (or whines) that it harms his parasitic business. “The chart above shows the USPTO patent grant rate across a variety of major technology areas,” says Patently-O, but notice the reluctance to distinguish software patents from the rest. The survey does not list “software” separately from other things. Therein lies a potentially strong bias, like that of the originator of software patents, Martin Goetz. He recently wrote no less than two articles dismissing altogether the existence of a “software patents” category/classification.
“If this trend continues, then perhaps the trolls epidemic too will stop, not because of some corporate lobbyists who ask for a bogus ‘reform’ but because of the US Supreme Court.”The EFF, taking note of some recent developments, writes about the quick demise of software patents in the US, owing to courts’ decisions (each reinforcing predecessors). “With Kafkaesque Flourish,” says the title, “the Eastern District of Texas Penalizes Parties for Following the Rules” (we have already written some articles about corruption in Eastern District of Texas courts).
The Eastern District of Texas is the worst court when it comes to patents (favourable to software patents and patent trolls who wield these). To quote the EFF: “In the wake of the Supreme Court’s June 2014 decision in Alice v. CLS Bank, most courts have been quickly and efficiently getting rid of patents that improperly claim “abstract ideas.” In Alice, the Supreme Court held that “abstract ideas,” without more, were unpatentable under 35 U.S.C. § 101. According to one source, at least 150 patents have had claims invalidated as “abstract” since Alice. Those accused of infringing these invalid patents have regularly filed motions to dismiss at the outset of a case, having the issue heard before too much time and energy is spent. Courts have, for the large part, embraced these “Alice motions” and invalidated abstract patents as soon as practicable.”
Here comes the new part: “Following the Eastern District of Texas’s unconventional rules, the defendants filed a letter asking permission to file their Alice motion. Given the potential for wasted time, effort, and money, the defendants very shortly thereafter filed a motion for a stay of the case while the court decided the issue of whether the asserted patent claims are invalid under Alice. The patent owner did not oppose the motion to stay. Presumably the patent owner also recognized that it was more efficient to hear the issue at the outset, without incurring costs that may prove to be wasted if the Alice motion is granted.”
It is nice to see Alice being brought up even in Eastern District of Texas courts. If this trend continues, then perhaps the trolls epidemic too will stop, not because of some corporate lobbyists who ask for a bogus ‘reform’ but because of the US Supreme Court. Even corrupt courts must sooner or later follow the law to avoid being throughly discredited and potentially abolished. █
Permalink
Send this to a friend
Posted in Apple, GNU/Linux, Google, Microsoft, Oracle, Patents at 7:58 am by Dr. Roy Schestowitz
Patents on trivial concepts can’t carry water for Apple
Summary: Apple’s attacks on Android (and by extension Linux) run short of results
DESPITE Apple’s ‘generous’ payments to IDG (e.g. for advertisements), IDC‘s parent company, IDC now reports (as widely covered in the media) that Apple is unlikely to ever catch up with Android and Apple’s stock rapidly collapsed recently, costing the company around $100 billion in overall value.
Apple saw the writings on the wall some years ago. It started suing Android half a decade ago, taking advantage of a notorious patent system (the USPTO) that is such an utter joke that it actually let McDonalds have patents on making burgers (patents protectionism) just when in the US, based on this new report, some people are copyrighting a chicken sandwich (or at least trying to). Remember that Oracle attacks Android not only using patents but also copyrights (on APIs). CPTN, a consortium built around Novell’s patents with Apple, Microsoft and Oracle at its core, shows that there is a proprietary software collusion against Android/Linux. Microsoft has been destroying Nokia to turn it into a patent troll, using its patents to feed Android-hostile trolls like MOSAID.
Outside the US (although increasingly in the US too) Apple has not been so lucky when it comes to fighting Android. Watch Europe for instance. Aside from the fact that the system isn’t biased in favour of US companies (like the ITC tends to be), Apple’s slide-to-unlock patent, to give just one example, is nothing more than an old gate lock (thousands of years old) borrowed for digital metaphors. It’s just not patentable in many places, including in Europe. Apple has ultimately embarrassed itself by even trying to follow Steve Jobs' "thermonuclear" (apocalyptic) plan.
“Apple’s anti-Android/anti-Samsung patents are an endangered species in every jurisdiction in which they get challenged (and may soon be an extinct species in Europe)…”
–Florian MüllerAccording to Florian Müller, who has been working for Microsoft (and based on some reports also for Apple) as a sort of lobbyist, Apple continues to be defeated in Europe. To put it in his own words: “The spring 2014 armistice with Google has a major downside for Apple: it related only to infringement cases, not to challenges to the validity of its patents, a fact that was not clear at the time of the original announcement. Five months ago, the European Patent Office revoked Apple’s iconic rubberbanding patent on a Europe-wide basis. The sole remaining party opposing the grant of that patent was Motorola. I have no doubt that Google (not Lenovo) is the driving force behind this continuing effort to shoot down Apple patents, and I guess Google is paying Quinn Emanuel for representing Motorola in cases such as that one.
“Today, Google and QE’s continuing efforts have succeeded once again (and most probably not for the last time): the Federal Court of Justice, Germany’s highest court (besides, theoretically, the Federal Constitutional Court, which has never heard a patent case in its history), today announced (German-language press release) affirmance of the Federal Patent Court’s April 2013 decision to invalidate the German part of Apple’s European slide-to-unlock patent.”
In another article from Müller the failures of Apple are shown to be broader than just in Europe. To quote: “Apple’s anti-Android/anti-Samsung patents are an endangered species in every jurisdiction in which they get challenged (and may soon be an extinct species in Europe), except for the Northern District of California, where Judge Lucy Koh has so far acted as if she was the World Wildlife Fund for Apple patents. But a tipping point may have been reached at which conservation will come to an end even in her district court.”
When even Müller has no favourable opinion on Apple’s case it’s easy to conclude that Apple totally lost the plot.
Let’s hope that Apple will rot on its own, without (any longer) trying to take Android down along with it. █
Permalink
Send this to a friend
Posted in News Roundup at 7:12 am by Dr. Roy Schestowitz
Contents
-
Kernel Space
-
Benchmarks
-
Liam has done his initial port reports and such so it’s my turn to feed you some information. I’m once again putting my GTX 760 against the R7 370 to see what kind of performance we can expect from Company of Heroes 2.
-
Applications
-
-
-
Lubomir Rintel informs users about the release and immediate availability for download of the sixth maintenance version of the open-source NetworkManager network connection management utility for GNU/Linux operating systems.
-
As we all know, there are is no doubt that Linux has tremendous support for Virtualization. There are so many virtualization softwares available including VMWare, VirtualBox, OpenVZ, XEN, KVM, Docker and the list goes. These software are mainly for intermediate and advanced Linux users. If you’re a beginner and having very little knowledge in Virtualization, then it is bit difficult to use the above mentioned tools. You may, probably, need an Intermediate or an expert user’s help. I bet you what? you don’t need anyone help. Yes. Meet Gnome Boxes, a beginner friendly, lightweight, graphical tool that makes virtualization lot easier.
-
-
Instructionals/Technical
-
Games
-
Developed by Relic Entertainment and previously published by SEGA for PC, Company of Heroes 2 is also available now for Mac and Linux via Steam, with the Mac App Store version to follow shortly afterwards, Feral Interactive announced.
-
Carmageddon: Reincarnation is a game developed by the same team that made the first title all the way back in 1997. They have already released the game on Windows, and they plan to make it available for Linux users as well.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
The K Desktop Environment (KDE) is one of the earliest Linux desktop environments, dating all the way back to 1996, predating even the popular GNOME desktop environment, which was started in 1999. On Aug. 25, the core KDE desktop, Plasma, got an incremental update to version 5.4 that builds on the innovations that the first Plasma 5 release introduced in July. Among the many changes that users will notice with Plasma 5.4 are more than 1,400 new icons for all KDE applications, providing a more streamlined, modern look and feel to the desktop. Also new to Plasma 5.4 is an optional Application Dashboard that provides a different way to open up applications. Finding an application, or anything else on the KDE desktop, is also improved by way of enhanced search history in the integrated KRunner search tool that is part of the desktop. Plus, the 5.4 update now provides initial support for the Wayland display server that is intended to be a replacement for the decade-old X-Window server. KDE as a desktop environment is available on multiple Linux distributions, including Ubuntu, Fedora and openSUSE. In this slide show, eWEEK examines some of the key features of the KDE Plasma 5.4 desktop.
-
To start with, KDE sprints are intensive sessions centered around coding. They take place in person over several days, during which time skillful developers eat, drink and sleep code. There are breaks to refresh and gain perspective, but mostly sprints involve hard, focused work. All of this developer time and effort is unpaid. However travel expenses for some developers are covered by KDE. KDE is a frugal organization with comparatively low administrative costs, and only one paid person who works part time. So the money donated for sprints goes to cover actual expenses. Who gets the money? Almost all of it goes to transportation companies.
-
GNOME Desktop/GTK
-
Tarballs are due on 2015-08-31 before 23:59 UTC for the GNOME 3.17.91 beta release, which will be delivered on Wednesday. Modules which were proposed for inclusion should try to follow the unstable schedule so everyone can test them. Please make sure that your tarballs will be uploaded before Monday 23:59 UTC: tarballs uploaded later than that will probably be too late to get in 3.17.91. If you are not able to make a tarball before this deadline or if you think you’ll be late, please send a mail to the release team and we’ll find someone to roll the tarball for you!
-
Allan Day, a GNOME UX designer working for Red Hat and renowned GNOME developer/contributor, opened an interesting discussion on the official GNOME mailing list, about possible codenames for upcoming releases of the acclaimed desktop environment for GNU/Linux operating systems.
-
-
New Releases
-
4MParted, a Linux distribution based on the 4MLinux and GParted, is now at version 13.1 Beta and is ready for download and testing.
-
Red Hat Family
-
-
-
-
One of the S&P 500’s big winners for Wednesday August 26 was Red Hat Inc. (RHT) as the company’s stock climbed 5.93% to $73.05 on volume of 2.2 million shares.
-
Hong-Kong based cloud service provider ReadySpace announced Thursday that it has joined the Red Hat Certified Cloud and Service Provider program. The new Red Hat partner program, launched in July, allows ReadySpace to deliver solutions based on Red Hat’s open source technologies.
ReadySpace CEO David Loke said customers building on open source software and Linux servers had been asking for Red Hat solutions by name to run critical workloads in private and hybrid environments. The company will now offer private cloud build-outs, Linux infrastructure and PaaS solutions based on Red Hat.
-
Fedora
-
One of the newest features outlined by Christian that is in Fedora 23 is the ability to properly use two or more monitors with vastly different DPIs. This means that if you have a High DPI monitor and a standard DPI monitor the window and text sizes will no longer be tiny (or large) on one monitor and not the other. When dragging windows between the monitors the window will automatically scale to work with the DPI of the screen they are on.
-
Fedora Project, through Christian Schaller, was proud to report on the progress made for the next-generation Wayland display server that it might be used by default on the upcoming major release of the Fedora Linux operating system, Fedora 23.
-
-
When it boots, you’ll be able to select Fedora 23’s Alpha release from the menus. The Workstation, Atomic, and Server images are available.
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
The first beta of the Wily Werewolf (to become 15.10) has now been released!
This beta features images for Kubuntu, Lubuntu, Ubuntu GNOME, Ubuntu Kylin, Ubuntu MATE, Xubuntu and the Ubuntu Cloud images.
Pre-releases of the Wily Werewolf are *not* encouraged for anyone needing a stable system or anyone who is not comfortable running into occasional, even frequent breakage. They are, however, recommended for Ubuntu flavor developers and those who want to help in testing, reporting and fixing bugs as we work towards getting this release ready.
-
Ubuntu continues to grow in popularity, not only with mainstream consumers, but also with Fortune 500 companies. Moreover, government and top notch education entities across the globe have realized they can save millions of USD, and invest funds more prudently for social programmes.
-
We’ve recently written how Canonical is making Unity 8 act and looks like a proper Linux desktop, and developers have been quick to show us the progress.
-
Ubuntu Touch is actually a Linux distribution and it’s easy to forget that sometimes. This means that most of the stuff you can do in the OS can be done from the terminal, including dialing a number, for example.
-
In conclusion there is nothing which restricts people making derivatives of Ubuntu except the trademark, and removing branding is easy. (Even that is unnecessary unless you’re trading which most derivatives don’t, but it’s a sign of good faith to remove it anyway.)
Which is why Mark Shuttleworth says “you are fully entitled and encouraged to redistribute .debs and .iso’s”. Lovely.
-
Let’s have a pop quiz.
The most popular desktop operating system is… Windows. Right.
The most popular mobile operating system is… Android! Correct.
And, the most popular operating system on the public cloud is… Ubuntu Linux.
-
I use two desktop operating systems regularly — Windows 10 and Ubuntu. The former is on my main PC, while the latter came pre-installed on a laptop. I’ve always liked Ubuntu, but never enough to make it my primary OS. Because I spend my days writing about Windows it’s kind of a no brainer that I should immerse myself in Microsoft’s operating system.
-
Canonical, through Martin Wimpress, announced just a few minutes ago the immediate availability for download and testing of the first Beta builds for opt-in flavors of the forthcoming Ubuntu 15.10 (Wily Werewolf) operating system.
-
Although it isn’t official, Ubuntu Core–the tiny Internet of Things version of Ubuntu–now runs on the Raspberry Pi 2. There are prebuilt binaries as well as instructions for how to roll your own, if you prefer. You can even access GPIO
-
-
The makers of Mycroft, a device based on Raspberry Pi 2 that is governed by an AI and is capable of making your house a smart one, have just announced that they plan to release the voice recognition software to help users control their desktops.
-
We wrote numerous articles related to the GPS Navigation app available for Canonical’s Ubuntu Touch mobile operating system, but the next release promises to bring even more features, as well as a major facelift.
-
Canonical have announced that the latest Firefox 40.0.3 version has been made available in the repositories for the users of Ubuntu 15.04, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS.
-
A second Hackathon has just been completed in China, and developers from all over the country came ready to play with Ubuntu and all sorts of gadgets.
-
Recently there has been a flurry of concerns relating to the IP policy at Canonical. I have not wanted to throw my hat into the ring, but I figured I would share a few simple thoughts.
-
In a recent posting, Canonical has tried new methods to appeal to Chief Technology Officers (CTOs) and cost conscious home users that they should switch to Ubuntu in lieu of Windows 10.
-
Flavours and Variants
-
Canonical has announced the release of the first Beta build for Ubuntu 15.10 (Wily Werewolf) opt-in flavors, which include the well-known Xubuntu distribution built around the lightweight Xfce desktop environment.
-
The first Beta of Wily (to become 15.10) has now been released!
-
As part of the release of Ubuntu 15.10 (Wily Werewolf) Beta 1 for opt-in flavors, the Ubuntu Kylin team had the pleasure of announcing the immediate availability for download and testing of the first Beta build of the upcoming Ubuntu Kylin 15.10 distro.
-
The development team of the Lubuntu Linux operating system were among the last to announce the release of the first Beta build of the Ubuntu 15.10 (Wily Werewolf) release for opt-in flavors.
-
-
-
Advantech’s COM-like “MIO-3260″ Pico-ITX SBC runs Linux on a Bay Trail SoC and offers a PCIe/mSATA slot, MI/O expansion, and optional -40 to 85°C operation.
-
This development board merges three different worlds: pure OS, microcontroller, and FPGA. For the first time, the best of these three technologies can be found in a single board, and can work together for an improved programming experience.
-
Phones
-
Tizen
-
Unity, a development platform for creating multiplatform 3D and 2D games, has today finally been released for Linux as a 951Mb .deb file download. This is an Experimental Build, with future support not yet guaranteed and very much depends on user adoption and feedback.
-
Android
-
-
After many delays, all four major mobile Linux alternatives to Android have finally arrived on smartphones. Mozilla’s Firefox OS was first out of the gate two years ago, followed by Jolla’s Sailfish OS, and this year they were joined by the first Ubuntu and Tizen phones. Yet, a fifth open source mobile Linux platform may have already eclipsed them all. The CyanogenMod flavor of Android is rapidly expanding from its role as the most popular alternative mobile phone mod for flashing onto Android phones to being a much sought after pre-installed OS.
-
It’s been a little over a year since we the first crop of Android Wear smartwatches popped up around the time of Google I/O 2014. While many of us are expecting followups to some these devices by now (Samsung’s got a new Tizen powered smartwatch with a round face ready to go) it almost feels like we’re waiting on something. It could be that Android Wear’s biggest OEMs — Motorola, LG, ASUS, and Huawei — are planning to introduce their new round of smartwatches during this year’s IFA 2015.
-
-
Samsung’s new smartphones and tablets might not offer enough to entice current iPhone and iPad users to switch, but they keep Samsung at the head of the class among Android gadget makers.
The new Galaxy devices come weeks before comparable updates from Apple are expected. In a sense, if Samsung can’t beat the competition in sales, it can at least beat it to store shelves.
-
-
-
Google has transformed Android search for apps and now displays the results in a pictorial, grid-like fashion. For instance, searching for “music apps” (either in Now or a browser) brings up the above grid, and clicking on a given app will take you straight to Google Play, as you’d expect. The feature, spotted by Android Police, appears to have rolled out over the last few days. Regular search results are still displayed below, but the grid images take up the entire first page, in much the same way as Google’s Knowledge Graph. It only works on Android, so far — doing a similar search on iOS yields a regular app list with the option to install.
-
-
-
-
-
YouTube isn’t the only one to introduce a live-streaming app this week. Just days after YouTube Gaming was outed, Japan’s DeNA — a prolific producer of games itself — has entered the scene with its own take, called Mirrativ.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
The Huawei Watch, another nice-looking, round Android Wear smartwatch, is now up for preorder at Amazon. Pricing starts at $349 for a stainless steel model with black leather strap and goes all the way up to $799 for a gold-plated stainless steel watch with matching gold-plated steel band. That’s soundly Apple Watch territory, so it’ll be interesting to see what type of demand exists for an ultra-premium Android Wear device. Amazon says the Huawei Watch will begin shipping September 2nd.
-
But most kanban board tools are multi-purpose, and you can also use them to track next actions, someday/maybe lists, or even just what groceries you need to pick up. The killer feature of almost all of them is the ability to share your boards with a team, allowing group collaboration and keeping everyone on the same page. When looking for an open source tool to fit my needs, I came across five great options and wanted to share a little bit from my experience with each.
-
Amongst the top IT trends of the moment is the development of Linux Containers. Financial and technical investors, Linuxsoftware programmers and customers believe that Linux Containers will transform the way organisations manage their Linux environments from deployment to maintenance. A recent survey by Red Hat and Techvalidate says that 56% of the respondents plan to use Linux containers as vehicles for rolling out web and eCommerce over the next two years. The respondents included a number of Fortune 500 companies and public sector organisations. Any development in the world of e-Commerce is definitely worth taking a look.
-
Among the benefits of OSS is that it is hardly ever a standalone product. Most OSS is built on other open-source projects. Because of the way it is licensed, these enhancements are then passed back to the open-source community, so the software constantly evolves.
So, if such open-source technology is readily available, and has proved its scalability in webscale businesses, why reinvent the wheel?
Open source is certainly more accepted in the enterprise, said Tony Lock, distinguished analyst at Freeform Dynamics. “It is suitable for all businesses, not just for webscale businesses.”
-
Data backup is an essential, yet often neglected, part of running a successful small business.
Your business is vulnerable to unstable power grids, hackers, failing hardware, new employees, and big-thumbed interns. The loss of your business contacts, contracts, employee data, tax and regulation compliance documents, work projects, images, and video could result in a costly disaster.
-
The FCC has gotten behind a new platform that helps the deaf talk to each other over video link. The idea of Accessible Communications for Everyone, or ACE as it’s being called, is that it lets all kinds of different apps talk to each other. It’s kind of how you can email anyone without worrying what app they use, only for video, and text and audio, all together.
-
-
Events
-
It’s NodeConf EU time again — the third annual gathering of what is hoped to be 400 of the top influencers in Node.js at Waterford Castle from September 6th to 9th.
-
-
Web Browsers
-
Chrome
-
Google has announced that, beginning September 1, Chrome will no longer auto-play Flash-based ads in the company’s popular AdWords program
-
Mozilla
-
Just a few minutes ago, Mozilla pushed the third hotfix update to its popular, open-source, and cross-platform Mozilla Firefox 40.0 web browser for GNU/Linux, Mac OS X, and Microsoft Windows operating systems.
-
SaaS/Big Data
-
…the new owner just got itself a bunch of ex-NSA guys…
-
-
Hortonworks, the big data company built on Hadoop, bought early-stage startup Onyara today. The company, which launched at the end of last year, has its roots in the NSA — yes that NSA.
-
Hortonworks, a publicly traded company selling a commercial distribution of the Hadoop open-source big data software, announced today that it has acquired Onyara, an early-stage startup whose employees developed Apache NiFi, a piece of open-source software that was first used inside the National Security Agency (NSA).
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Whenever the Apache Software Foundation graduates an open source project to become a Top Level Project, it tends to bode well for the project. Just look at what’s happened with Apache Spark, for example.
Now, the Foundation (ASF), which is the steward for and incubates more than 350 Open Source projects, has announced that Apache Lens, an open source Big Data and analytics tool, has graduated from the Apache Incubator to become a Top-Level Project (TLP).
-
-
Oracle/Java/LibreOffice
-
The Document Foundation has just revealed that LibreOffice 5.0.1 has been released, making this the first maintenance version for the new generation of the famous office suite.
-
-
The Document Foundation today announced the first update to the milestone LibreOffice 5.0 released a few weeks ago. This is a bug fix release bringing over 75 commits since version 5.0 was unveiled August 5. It is recommended that those using the 5.0 branch upgrade their LibO installs with today’s update.
-
CMS
-
From a consumer perspective, I’d like open source to be ubiquitous to the point of invisibility. Using recent Ubuntu distros, I’m always shocked at how professional the environment feels. Just five years ago, you’d need to hunt down drivers and do a bunch of fiddling to get basic things like a sound card working. Now there are so many pushbutton ways to deploy open source tech, from OSes to CMS distros on Pantheon to buying an Android-powered mobile phone.
We’re not quite to the point where CMS users can feel like open source is transparent; there’s still a huge investment in vendors to give you the expertise to manage your Drupal or WordPress site, for example. But we’re closer than we were a decade ago, and that’s pretty exciting.
-
Business
-
Openwashing
-
Salesforce’s splashy new UI, the Lightning Experience, is more than a pretty face. It was built with Aura, the company’s open source UI framework, available for use independent from Salesforce’s services.
With Lightning — and Aura — Salesforce emphasizes how users can design applications that not only look great, but plug into more than Salesforce. Where, then, does Salesforce’s open source offering end with Aura, and where do its own services begin?
-
Last year, when Infosys hired Abdul Razack to own the company’s platform division, he came with a mandate to use open source first. Eleven months on and Infosys Information Platform (IIP) is flourishing with 120 projects on the go, some proofs of concept, many moving to production, but with open source at their heart in most situations.
-
Funding
-
-
Intel is investing $60 million in UAV firm Yuneec, whose prosumer “Typhoon” drones use Android-based controllers.
Intel Corp. CEO Brian Krzanich and Yuneec International CEO Tian Yu took to YouTube to announce an Intel investment of more than $60 million in the Hong Kong based company to help develop drone technology. No more details were provided except for Krzanich’s claim that “We’ve got drones on our road map that are going to truly change the world and revolutionize the industry.” One possibility is that Intel plans to equip the drones with its RealSense 3D cameras (see farther below).
-
FSF/FSFE/GNU/SFLC
-
Join the FSF and friends every Friday to help improve the Free Software Directory by adding new entries and updating existing ones.
-
Public Services/Government
-
Earlier this year, Croatian political party Sustainable Development of Croatia (ORaH) published a new policy that encourages the government to pursue open source solutions, addresses the dangers of vendor lock-in, and insists on open document standards. Best of all, they did it the open source way.
-
Licensing
-
But “free as in beer” isn’t really the point – huge numbers of corporate open-source users opt for paid commercial versions of open-source projects, for simplicity and support. And then there are all those various licenses that protect the openness of the software – GPL, Apache, Eclipse. But the good news is that, with very few exceptions, there aren’t many legal issues for the average company to worry about.
-
Openness/Sharing
-
Estonia will be promoting its eResidency for online business in the United States. The country’s Ministry of Economic Affairs and the Information System Authority (RIA) want to launch a media campaign, hoping to reach potential users such as business developers and software developers.
-
Portugal’s Agency for Administrative Modernisation (AMA) this summer added another 103 Espaços do Cidadão (Citizen Spots, or Citizen Places), where citizens can access eGoverment services using computer facilities managed by AMA and local public administrations. These access points offer users access to over 170 eGoverment services. Users will be assisted by local staff members, when needed.
-
Open Data
-
Dutch government data should be made available for free to the public as much as possible. “Public agencies should change their attitude towards the publishing of open data,” the Dutch Minister of the Interior, Ronald Plasterk said. “They are often not aware of the value of the data they collect. Publishing should become a basic principle.”
-
Open Hardware
-
Dr. Karu Sankaralingam, who led the team’s effort at the University of Wisconsin, where the project is based, says that building an open source or any other hardware project is bound to incur legal wrangling, in part because the IP almost has to be reused in one form or another. Generally, he says that for open source hardware projects like this one, the best defense is to use anything existing as a base but focus innovation on building on top of that. He says that to date, AMD has not been involved in the project beyond a few individuals offering some insight on various architectural elements. In other words, if the team is able to roll this beyond research and into any kind of volume, AMD will likely have words.
-
Impossible to prepare for; unrelated to the job: jobseekers are facing tougher and weirder questions than ever in job interviews.
Employers are turning to tricky questions to quickly sort through high numbers of candidates, so that only the very best shine through, according to Joe Wiggins, spokesman for Glassdoor in the UK.
“Often it is to see how you react under pressure,” Wiggins said. “It’s to see what happens when the rug is pulled from under you – how do you prepare for the completely unexpected?”
-
Science
-
-
Psychology has long been the butt of jokes about its deep insight into the human mind – especially from the “hard” sciences such as physics – and now a study has revealed that much of its published research really is psycho-babble.
-
Hardware
-
LG just announced the “Rolly,” a Bluetooth keyboard that folds up along the four rows of keys to create a wand-like device that can be tossed in a purse or pocket. LG is hardly the first electronics company to introduce a foldable, ultra-portable wireless keyboard — or even the first to introduce a gadget called the Rolly — but it might be the first to market either as a stick for your pocket.
-
Security
-
This report describes an elaborate phishing campaign against targets in Iran’s diaspora, and at least one Western activist. The ongoing attacks attempt to circumvent the extra protections conferred by two-factor authentication in Gmail, and rely heavily on phone-call based phishing and “real time” login attempts by the attackers. Most of the attacks begin with a phone call from a UK phone number, with attackers speaking in either English or Farsi.
The attacks point to extensive knowledge of the targets’ activities, and share infrastructure and tactics with campaigns previously linked to Iranian threat actors. We have documented a growing number of these attacks, and have received reports that we cannot confirm of targets and victims of highly similar attacks, including in Iran. The report includes extra detail to help potential targets recognize similar attacks. The report closes with some security suggestions, highlighting the importance of two-factor authentication.
-
FireEye mobile researchers discovered a security vulnerability that allowed an iOS application to continue to run, for an unlimited amount of time, even if the application was terminated by the user and not visible in the task switcher. This flaw allowed any iOS application to bypass Apple background restrictions. We call this vulnerability Ins0mnia.
-
It’s easy to laugh-and-point at Samsung over its latest smart-thing disaster: after all, it should have already learned its lesson from the Smart TV debacle, right?
Except, of course, that wherever you see “Smart Home”, “Internet of Things”, “cloud” and “connected” in the same press release, there’s a security debacle coming. It might be Nest, WeMo, security systems, or home gateways – but it’s all the same.
-
PayPal has patched a security vulnerability which could have been used by hackers to steal users’ login details, as well as to access unencrypted credit card information. A cross site scripting bug was discovered by Egyptian ‘vulnerabilities hunter’ Ebrahim Hegazy — ironically on PayPal’s Secure Payments subdomain.
-
Grsecurity has existed for over 14 years now. During this time it has been the premier solution for hardening Linux against security exploits and served as a role model for many mainstream commercial applications elsewhere. All modern OSes took our lead and implemented to varying degrees a number of security defenses we pioneered; some have even been burned into silicon in newer processors. Over the past decade, these defenses (a small portion of those we’ve created and have yet to release) have single-handedly caused the greatest increase in security for users worldwide.
-
Finland confirmed on Thursday it has detained a Russian citizen, Maxim Senakh, at the request of U.S. federal authorities on computer fraud charges, in a move that Russia calls illegal.
-
Finnish authorities have confirmed the detention of Maxim Senakh, a Russian citizen accused of committing malware crimes in the US. The Russian Foreign Ministry has expressed concern and called on Finland to respect international law.
-
Eighty-one percent of healthcare executives say their organizations have been compromised by at least one malware, botnet or other kind of cyberattack during the past two years, according to a survey by KPMG.
The KPMG report also states that only half of those executives feel that they are adequately prepared to prevent future attacks. The attacks place sensitive patient data at risk of exposure, KPMG said.
The 2015 KPMG Healthcare Cybersecurity Survey polled 223 CIOs, CTOs, chief security officers and chief compliance officers at healthcare providers and health plans.
-
-
The top election official in Kansas has asked a Sedgwick County judge to block the release of voting machine tapes sought by a Wichita mathematician who is researching statistical anomalies favoring Republicans in counts coming from large precincts in the November 2014 general election.
-
-
-
nsenter is a program that allows you to run program with namespaces of other processes
-
Iceland aims to shore up the security of its ICT infrastructure by raising awareness and increasing resilience. And next to updating its legislation, Iceland will also bolster the police’s capabilities to tackle cybercrime.
-
Open-source developers, however, can take steps to help catch these vulnerabilities before software is released. Secure development practices can catch many issues before they become full-blown problems. But, how can you tell which open-source projects are following these practices? The Core Infrastructure Initiative has launched a new “Best Practice Badge Program” this week to provide a solution by awarding digital badges to open-source projects that are developed using secure development practices.
-
Defence/Police/Secrecy/Aggression
-
First, the disastrous failures of US policy in Afghanistan and Iraq have led to an unprecedented programme of declassification of documents (some with significant redactions) as part of the cathartic process of trying to understand how so many mistakes were made before and after 9/11.
Second, the cache of cables dumped by WikiLeaks, coupled with further revelations from material leaked by Edward Snowden, has provided an exceptional level of insight into the workings of the intelligence agencies over the past three decades, together with priceless new information about the decision-making processes and about operational activities.
And third, there has been a cache of materials found locally following the military interventions of the past 12 years – such as audio tapes recovered from the presidential palace in Baghdad in 2003 that recorded thousands of hours of meetings, discussions and even phone calls made by Saddam Hussein and his inner circle, or boxes of cassettes that belonged to Osama bin Laden that were retrieved from a compound in Kandahar two year earlier.
This treasure trove allows us to understand the failures, incompetence and poor planning that accompanied the invasions of Afghanistan and Iraq in astonishing detail, but also to frame these within the context of a wider region – and a wider period. These two countries form part of a belt that stretches from the Mediterranean to the Himalayas, linking East and West, and that for millennia has served as the world’s central nervous system. Trade, commodities, people, even disease, spread through the webs of networks that connect these locations to each other and ultimately connect the Atlantic coasts of Europe and North Africa to the Pacific coast of China and South-east Asia.
-
Transparency Reporting
-
Sweden will begin talks with Ecuador about Julian Assange on Monday, after Stockholm moved to break the deadlock over five-year-old rape allegations against him.
Sweden initially rejected a demand by Ecuador that the two countries establish a formal agreement on judicial cooperation before Swedish prosecutors could interrogate the WikiLeaks founder in Ecuador’s embassy in London, saying it did not negotiate bilateral treaties.
-
One day, a monk and two novices found a heavy stone in their path. “We will throw it away,” said the novices. But before they could do so, the monk took his ax and cleaved the stone in half. After seeking his approval, the novices then threw the halves away. “Why did you cleave the stone only to have us throw it away?” they asked. The monk pointed to the distance the half stones had traveled. Growing excited, one of the novices took the monk’s ax and rushed to where one half of the stone had landed. Cleaving it, he threw the quarter, whereupon the other novice grabbed the ax from him and rushed after it. He too cleaved the stone fragment and threw it afield. The novices continued on in this fashion, laughing and gasping, until the halves were so small they traveled not at all and drifted into their eyes like dust. The novices blinked in bewilderment. “Every stone has its size,” said the monk.
At the time of writing, WikiLeaks has published 2,325,961 diplomatic cables and other US State Department records, comprising some two billion words. This stupendous and seemingly insurmountable body of internal state literature, which if printed would amount to some 30,000 volumes, represents something new. Like the State Department, it cannot be grasped without breaking it open and considering its parts. But to randomly pick up isolated diplomatic records that intersect with known entities and disputes, as some daily newspapers have done, is to miss “the empire” for its cables.
-
At the time of writing, WikiLeaks has published 2,325,961 diplomatic cables and other US State Department records, comprising some two billion words. This stupendous and seemingly insurmountable body of internal state literature, which if printed would amount to some 30,000 volumes, represents something new.
Like the State Department, it cannot be grasped without breaking it open and considering its parts. But to randomly pick up isolated diplomatic records that intersect with known entities and disputes, as some daily newspapers have done, is to miss “the empire” for its cables.
Each corpus has its size.
To obtain the right level of abstraction, one which considers the relationships between most of the cables for a region or country rather than considering cables in isolation, a more scholarly approach is needed. This approach is so natural that it seems odd that it has not been tried before.
The study of empires has long been the study of their communications. Carved into stone or inked into parchment, empires from Babylon to the Ming dynasty left records of the organizational center communicating with its peripheries.
-
Environment/Energy/Wildlife
-
Naomi Klein, the Canadian author, film-maker and social activist, will arrive in Australia this month for a series of events.
-
The World Trade Organization (WTO) on Wednesday ruled against India over its national solar energy program in a case brought by the U.S. government, sparking outrage from labor and environmental advocates.
As power demands grow in India, the country’s government put forth a plan to create 100,000 megawatts of energy from solar cells and modules, and included incentives to domestic manufacturers to use locally-developed equipment.
-
It’s hard to imagine Wall Street bankers worrying about what One Direction heartthrob Harry Styles thinks. But, it turns out at least some of them do.
Bankers at Credit Suisse on Thursday warned that Styles had sparked a surge in negative sentiment towards SeaWorld, the controversial aquatic theme park, which is already suffering a collapse in profits.
“Does anybody like dolphins?” Styles asked his fans during a concert in San Diego, home to one of SeaWorld’s biggest parks, last month. Following a roar from the crowd, he told them: “Don’t go to SeaWorld.” Styles’s comments were captured by hundreds of people, including Game of Thrones’ Maisie Williams, and spread across social media.
-
Finance
-
More than 4,000 people died within six weeks of being found “fit for work”, the Department for Work and Pensions (DWP) has revealed.
Figures released today show that between December 2011 to February 2014, 4,010 people died after being told they should find work following a “Work Capability Assessment”.
Of that figure, 1,360 died after losing an appeal against the decision.
Labour branded the figures a “wake-up call” for the Government, who has faced criticism for the way the assessment tests are carried out.
-
European Commission officials have held hundreds of meetings with lobbyists to discuss the proposed Transatlantic Trade and Investment Partnership (TTIP) treaty – yet only around one in ten is with public interest groups.
The world’s biggest companies in finance, technology, pharma, tobacco and telecoms are dominating discussions with the EU executive body’s trade department responsible for the proposed EU-US free trade treaty, which could become the biggest such deal ever made.
-
Jeb Bush is visiting the Hamptons today on a lucrative fundraising tour, hitting up multi-billionaires like hedge fund manager Julian Robertson to support his 2016 campaign.
According to invitations obtained by the Center for Media and Democracy, the events over the next few days include a coffee reception in the morning, and a brunch at 11, and an evening reception. The fundraisers in the wealthy New York beach community are officially organized by Bush’s 2016 campaign–even though many of the hosts and attendees have already reached the legal maximum on contributions to Bush’s primary election effort.
-
PR/AstroTurf/Lobbying
-
The Crown Prosecution Service (CPS) is considering bringing corporate charges against Rupert Murdoch’s British newspaper publisher over phone hacking, it has emerged.
The Metropolitan police handed over a file of evidence on News International – now renamed News UK – to the CPS for consideration after an investigation that stretches back to 2011, when the News of the World was closed at the height of the scandal.
“We have received a full file of evidence for consideration of corporate liability charges relating to the Operation Weeting phone-hacking investigation,” a spokeswoman confirmed.
The file was transferred on 23 July and reignites the controversy for Rupert Murdoch’s News Corp, News UK’s parent company, which believed it had been through the worst and come out the other side after an eight-month trial of former News of the World journalists that concluded in June 2014.
-
-
Would that even that degree of critical consideration would be granted to the anniversary of another disaster for low-income communities of color: the move to “end welfare as we know it,” signed into law in August 1996 by Bill Clinton. If you don’t remember the media stampede — Black women having babies for government checks! Pregnant teenagers draining public resources! — that’s partly because elite media, having championed hard for the dismantling of the safety net, were markedly less interested in tracking the human fallout.
-
Censorship
-
So, just last month, we wrote about United Airlines idiotic inflight video system that forces you to install DRM on your own devices to watch a movie. And, now, it appears that the company is filtering out all sorts of news sites. The EFF’s Nate Cardozo was on a flight yesterday when he started noticing that he couldn’t get to certain tech websites, including Ars Technica and The Verge — instead receiving messages they were blocked due to United’s “access policy.” The same was true for political news site Daily Kos. Eventually he even realized that United also blocks the NY Times (via his phone after the laptop battery ran out).
-
In this week’s installment of “Unnecessary Censorship,” Jimmy Kimmel Live uses its well-placed [bleeps] to make Trump’s bragging, Ted Cruz’s thoughts on political correctness, the Jeb Bush campaign’s plans, and a fan of President Obama all sound more vulgar than they were. In this week’s installment of “Unnecessary Censorship,” Jimmy Kimmel Live uses its well-placed [bleeps] to make Trump’s bragging, Ted Cruz’s thoughts on political correctness, the Jeb Bush campaign’s plans, and a fan of President Obama all sound more vulgar than they were.
-
In the clip, the presidential candidate speaks to a crowd of his supporters, bragging about having a huge … something. Being bleeped twice makes whatever Trump is saying sound worse, and yet, oddly believable!
-
He’s already talked with Tor developers about Marionette’s open-source code.
-
The edition had sparked controversy as it included a salacious account of a consensual sexual encounter between Syracuse University professor William J. Peace with a nurse in the 1970s, when he was an 18-year-old hospital patient.
-
A Northwestern University professor has resigned her position at the Feinberg School of Medicine after, she said, her complaints of academic censorship were ignored.
Alice Dreger, who worked part time as a clinical medical humanities and bioethics professor, initially complained in 2014 that the school dean removed a risque article from a website for the bioethics journal Atrium because of fear it would harm the school’s image.
-
…Japan’s method of handling violent video game content can be quite perplexing at times.
-
…mentions of the country’s economic weakness were pretty much absent from major Chinese media reports.
-
A number of services used to get around Chinese internet restrictions have been taken down or disrupted in the run up to a major parade in Beijing next week to mark the 70th anniversary of the end of the second world war.
Popular virtual private network (VPN) provider Astrill warned users on Wednesday that they may suffer service outages between now and the parade on September 3.
VPNs allow users to tunnel their internet traffic through an uncensored server, bypassing the so-called Great Firewall (GFW).
-
Last month we reported that the Malaysian government had censored the website of the Sarawak Report, which first broke news of the corruption allegations. A few days later, the government also suspended the publication licenses of two print publications that ran the same exposé.
-
The humble kiss has figured in its fair share of censorship debates over time. These debates have usually centred on whether the kiss should be represented at all, as well as a monitoring of the content and duration of the amorous scene.
-
South Korea has the world’s fastest internet with connectivity clocked at 25.3MBps by Akamai Technologies last year. That’s over two times better than the 11.5MBps measured in the United States. Such a wired environment, coupled with wide internet use, seem optimal grounds to foster free, creative discussions among peers in a democracy.
-
GitHub has fallen prey to a DDoS attack this week, allegedly perpetrated by Chinese actors, in response to tools available on the site that would help users circumvent censorship.
On Tuesday the site found that it was under attack from malicious sources, following a similar tirade against the site in March of this year. This time, though, the attacks have been much more intense.
-
Political correctness has made us more wary of one another.
-
Azize Tan has stepped down after nine years following protests over censorship at the latest edition in April, which led to the cancellation of the festival’s competitions and closing ceremony.
-
The Committee to Protect Journalists condemns a recent wave of newspaper censorship in Egypt. Three privately owned newspapers were prevented from going to print or into circulation because of content critical of President Abdel Fattah el-Sisi, according to news reports.
-
The Committee to Protect Journalists (CPJ) condemned Tuesday the recent wave of newspaper censorship in Egypt, citing the new anti-terrorism law as the pretext for this phenomenon.
Over the past two weeks, three newspapers were subjected to censorship, due to the presence of content critical of President Abdel Fattah Al-Sisi.
A Sout Al-Omma newspaper issue was confiscated on 14 August for containing reports on the health condition of President Abdel Fattah Al-Sisi’s mother, as well as reports on a corrupt network of Mubarak-era figures.
-
The book shows that differing opinions — and even vastly differing ways of thinking — exist and should be considered.
-
Many of the responses to the article focus on the authors’ status as “rich, white-skinned and well-established men, who work at the moment in business-type jobs,” (though a lawyer working at a non-profit and a career academic might take issue with a few of those descriptors). Some accuse Lukianoff and Haidt of “hysteria,” “scaremongering,” and wanting to “silence discussions.” Others offered some nuance by conceding that trigger warnings “run the risk of students avoiding or disengaging the material out of fear of being triggered,” but think the threat to free expression in higher education is over-hyped.
-
University of Maryland researchers developed P2P Alibi Routing to allows users to choose where they do NOT want their packets to go, thereby avoiding ‘censorship of Internet traffic and suspicious boomerang routing.’
-
One year ago UK police noisily took down Immunicity, a site dedicated to providing access to blocked websites. To mark this anniversary a new platform titled Hydra Proxy has launched with the aim of providing a takedown resistant service for all. TorrentFreak caught up with its founder to learn more.
-
Censorship often occurs because of power abuse, personal prejudice and ideological differences.
-
Privacy
-
I was in the midst of a career transition. I had spent three years working as a management consultant and then at a startup, but I wanted to become a computer engineer. I was earning a Master’s in computer science through Georgia Tech’s online program. I knew that I was slowly developing the skills that I would need in an engineering role, but I still lacked the confidence to apply for a full-time software role.
One morning, while working on a project, I Googled “python lambda function list comprehension.” The familiar blue links appeared, and I started to look for the most relevant one.
-
Just three in every 10,000 Ashley Madison members are real women, it has been revealed, as the huge scale of fake female accounts on the infidelity website was exposed.
Despite the website claiming 5.5 million of its 37 million customer accounts are “female” there was “a good chance” just 12,000 users actually are according to an analysis of the leaked data by the Editor-in-Chief of technology website Gizmodo.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Here’s a big problem with secret spying programs in the US: To dismantle them with a lawsuit, someone has to prove that their privacy rights were infringed. And that proof is almost always a secret.
That’s the Catch-22 that an appeals court served up Friday to plaintiffs who for the last two years have been attacking the NSA’s metadata collection program authorized under section 215 of the Patriot Act. The plaintiffs are led by constitutional lawyer and conservative activist Larry Klayman, who had sued the Obama administration for violating his fourth amendment privacy rights. In 2013, a lower court granted his a request for an injunction to stop the NSA’s spying on his data. But the Obama administration appealed that ruling, and an appellate court has now thrown out that injunction based on a familiar and vexing problem for those who sue the government’s secret spying apparatus: The plaintiffs couldn’t sufficiently prove that the NSA secretly spied on them.
-
On Friday, an appeals court overturned a U.S. District Court decision last May that had declared that the National Security Agency’s bulk collection of Americans’ phone records was beyond the authorization of the law. The three-judge panel of the U.S. Court of Appeals for the District of Columbia Circuit kicked the matter back to the lower court for additional deliberation.
-
The U.S. Court of Appeals for the D.C. Circuit’s opinion today in Klayman v. Obama is highly disappointing and, worse, based on a mistaken concern about the underlying facts. The court said that since the plaintiffs’ phone service was provided by one subsidiary of Verizon—Verizon Wireless—rather than another—Verizon Business—they couldn’t prove that they had standing to sue. The court sent the case back to U.S. District Judge Richard Leon to give the Klayman plaintiffs an opportunity to prove that their records were in fact collected. The appeals court did not rule one way or the other of the constitutionality of the mass collection program.
-
Authorities in the UK and Germany are cracking down on intelligence activities as public opinion swings against mass surveillance, coupled with heavy criticism from human rights groups and setbacks at the European Court of Human Rights.
-
-
-
-
-
-
-
-
Media reports on Thursday alleged that German spies traded access to information about the country to the US National Security Agency (NSA) in exchange for surveillance software.
-
-
Behind the public admonishment of the National Security Agency’s spying techniques, Germany has been secretly in cahoots with the intelligence agency. The country’s national intelligence agency, Office for the Protection of the Constitution, arranged to share surveillance data with the NSA in exchange for high-powered spyware that excavated citizens’ chat and browser histories, and webcam photos, according to a German media report.
-
-
-
In order to obtain a copy of the NSA’s main XKeyscore software, whose existence was first revealed by Edward Snowden in 2013, Germany’s domestic intelligence agency agreed to hand over metadata of German citizens it spies on. According to documents seen by the German newspaper Die Zeit, after 18 months of negotiations, the US and Germany signed an agreement in April 2013 that would allow the Federal Office for the Protection of the Constitution (Bundesamtes für Verfassungsschutz—BfV) to obtain a copy of the NSA’s most important program and to adopt it for the analysis of data gathered in Germany.
-
The exposure of an intelligence-sharing agreement between the US National Security Agency (NSA) and German spy agency the Federal Office for the Protection of the Constitution (BfV) shows that German spooks traded domestic data in exchange for the use of the XKeyscore spying programme.
Documents analysed by German publication Die Zeit revealed a secret deal set up with the NSA that allowed the use of XKeyscore to rapidly analyse the huge amounts of metadata collected by the German agency on the condition that no data on US citizens was kept.
The BfV, unlike the Bundesnachrichtendienst foreign intelligence agency, does not carry out so-called dragnet surveillance, instead having to go through parliament to get permission to collect metadata on individual citizens.
-
-
SHARE TWEET STUMBLE
The Federal Office for the Protection of the Constitution (BfV — Germany’s domestic spy agency) coveted access to Xkeyscore, the NSA’s flagship tool for searching and analyzing mass-surveillance data, so they secretly, illegally traded access to Germans’ data with the NSA for it.
In internal memos, the German spy agency said the deal had “far-reaching legal implications” — which is spookese for “we are totally breaking the law here.” The German Data Commissioner was not informed about the arrangement.
-
The NSA whistleblower claimed that the German intelligence spyware scandal illustrated how the US “collect it all” domestic surveillance philosophy that infected other democracies around the world.
-
-
The need to find a balance between privacy and security has become a truism in American media and political rhetoric. Surveillance makes us safer, we’re told, and too much concern with keeping personal lives private would reduce protection against terrorism. Such pie-chart depictions of privacy and security might seem logical, but they’re badly flawed.
-
When people talk about the US National Security Agency/Central Security Service (NSA), the talk usually centers on privacy, with good reason. Still, it’s not the only subject worth discussing. The volume of data collected by the NSA and the associated costs make it the ultimate in Big Data case studies. What can it tell us about data and business? What can it tell us about business risk and the potential benefits and consequences of Big Data investments?
The agency’s exact budget is a government secret, but estimates put it around $10 billion per year. Although not all of that is devoted to surveillance, it’s reasonable to conclude that something in the ballpark of $5 billion goes to fund NSA data gathering each year. This may not be the clear-cut biggest Big Data application (Google’s revenue was $66 billion last year, for example), but it’s substantial, focused and paid for by the public. We ought to discuss what we’re getting for the money.
-
-
After blowing the whistle on the NSA for wasteful spending and civil rights violations, the plaintiffs say they were threatened with prison time, subjected to illegal searches and seizures and had raids conducted on their homes.
-
Five whistleblowers are suing the Justice Department, National Security Agency, FBI and their former directors for violating their constitutional and civil rights after they complained about government waste and fraud through proper channels.
According to the complaint, filed in Washington, DC’s federal district court, all five were subjected to illegal searches and seizures, raids on their homes and places of business, false imprisonment, and cancellation of their security clearances after they complained about government waste and fraud at the NSA.
Four of the five whistleblowers worked at the National Security Agency: Thomas Drake, Ed Loomis, J. Kirk Wiebe and William Binney. The fifth, Diane Roark, worked at the Department of Energy. They are seeking some $100 million in damages.
-
-
-
-
-
-
-
-
President Barack Obama has apologized to Japan’s Prime Minister Shinzo Abe after WikiLeaks claimed the US had spied on Japanese politicians. Abe said the allegations “could shake our relationship of trust.”
-
US President Barack Obama has apologised to Japan over revelations from WikiLeaks that the US National Security Agency (NSA) undertook systematic mass surveillance of Japanese government officials and major companies. In a telephone conversation with Prime Minister Shinzo Abe, Obama expressed regret for causing concern but failed to confirm whether or not the spying claims were true.
-
-
-
-
-
-
The disclosure follows similar WikiLeaks revelations of US spying on Brazil, France and Germany. Yet while the previous exposés triggered widespread indignation and anger in those countries, Japan’s reaction has been muted by comparison.
-
From the first time I fired a .22 rifle at camp the summer after second grade, to my first read-in and access to classified information, and then to advanced weapons training and combat deployments with various NAVSOF elements, there was never a doubt that I was being entrusted with weapons that, when used improperly or negligently, could severely wound or kill the innocent.
-
Why is this ironic? Because the NSA and other spy agencies want to break that encryption that protects your communications and are unhappy when online services and products can protect the user’s privacy with built-in encryption. The NSA also wants quantum computers of its own.
According to a report in the International Business Times, experts at the NSA are “deeply” worried that quantum computers will be able to break encryption if used by the hackers of the future.
-
The incubator’s current class of 9 startups includes entrepreneurs that are working on technology for everything from cybersecurity to healthcare data—with the common theme being a connection to government-regulated industries. The CIC has the capacity to house 10-12 teams, but the location also allows for “planned” expansion.
-
Does the phrase “XKeyscore” mean anything to you? If your answer is “huh?” then Daniel McCarney has a site you can visit.
McCarney, a security engineer and hacker, set up join.xkeyscore.club over the weekend as a reminder of the National Security Agency’s XKeyscore tool. Internally the NSA said the program, which Glenn Greenwald reported first reported on for The Guardian back in 2013, gave analysts access to “nearly everything a typical user does on the internet.”
-
-
-
-
-
-
-
-
Civil Rights
-
The Associated Press filed a lawsuit (PDF) this morning, demanding the FBI hand over information about its use of fake news stories. The case stems from a 2007 incident regarding a bomb threat at a school. The FBI created a fake news story with an Associated Press byline, then e-mailed it to a suspect to plant malware on his computer.
The AP sent a Freedom of Information Act request to the FBI last year seeking documents related to the 2014 sting. It also seeks to know how many times the FBI has used such a ruse since 2000. The FBI responded to the AP saying it could take two years or more to gather the information requested. Unsatisfied with the response, the Associated Press has taken the matter to court.
-
Last fall, we wrote about how the FBI had set up a fake AP news story in order to implant malware during an investigation. This came out deep in a document that had been released via a FOIA request by EFF, and first noticed by Chris Soghoian of the ACLU. The documents showed the FBI discussing how to install some malware, called a CIPAV (for Computer and Internet Protocol Address Verifier) by creating a fake news story…
-
-
For carriage of the gun, she was delivered to Rikers Island and charged with attempted criminal possession of a weapon and eventually posted a bail bond of $10,000. Appearing in court in Queens, she was told by a judge, she said, “‘This ain’t Texas; we don’t carry guns here.’”
-
As of September 4, online identity theft will be illegal in Finland. Many people may soon find that even creating a fake social media profile can be considered a misdemeanour.
-
North Dakota police will be free to fire ‘less than lethal’ weapons from the air thanks to the influence of Big Drone.
It is now legal for law enforcement in North Dakota to fly drones armed with everything from Tasers to tear gas thanks to a last-minute push by a pro-police lobbyist.
With all the concern over the militarization of police in the past year, no one noticed that the state became the first in the union to allow police to equip drones with “less than lethal” weapons. House Bill 1328 wasn’t drafted that way, but then a lobbyist representing law enforcement—tight with a booming drone industry—got his hands on it.
The bill’s stated intent was to require police to obtain a search warrant from a judge in order to use a drone to search for criminal evidence. In fact, the original draft of Representative Rick Becker’s bill would have banned all weapons on police drones.
-
Hollywood has a lot to answer for. Thanks to the hit TV show 24 and movies like Zero Dark Thirty, we think we know what terrorist interrogations look like: After being roughed up and threatened, the suspect breaks down and reveals all. Mass murder is thwarted. Osama Bin Laden is shot.
The end, we tell ourselves, justifies the ugly means.
Even after the abuses committed at CIA “black sites” were laid bare last year by the U.S. Senate Intelligence Committee, most Americans stuck to this view. Some 59% believed the CIA’s harsh interrogation methods were justified, in a December 2014 poll run for the Washington Post and ABC News.
-
The conduct of the political class is utterly shameless. Meantime they indulge their fantasies of stripping workers of all protection and of stopping aid to the needy, and while the politicians gorge and gorge, the poor are quietly being slipped away to die.
-
I am worried that the continued delay in the publication of Chilcot’s report is giving rise to expectations that it will be forthright and damning of Blair and his supporters. Nothing could be further from the truth. Even though Blair plunged us into an illegal war with dreadful long-term consequences, the report has always been designed to be a typical Whitehall fudge. Mistakes made – errors of judgement – all in good faith – lessons learned. You don’t have to wait for it, that is it.
The Chilcot team was handpicked by Gordon Brown – himself up to his neck in guilt for the illegal invasion – and three of the five had been aggressive proponents of the war. The remaining two, Chilcot and Baroness Prasad, are “sound” for the Establishment. Let me remind you of my analysis of the committee members in 2009. Sir Lawrence Freedman was an active propagandist for the invasion while Sir Martin Gilbert (died while contributing to the committee) was so enamoured of the invasion he compared Bush and Blair to Roosevelt and Churchill. Rod Lyne was actively involved in selling the WMD lies and arguably in danger of war crime accusation himself.
-
Americans love, above all, a narrative. Preferably a moral one, marked by a clear good and evil. For many so-called “school reformers,” the tragedy of Katrina, which marks its ten-year anniversary today, provided that narrative. Its stark before-and-after provided a clear A/B test as to the righteousness of their cause. Before was a “broken school system,” and after is a glossy, privatized education system.
We’ll set aside the fact that this is largely a fantasy. Torture the data enough, and the “New Orleans miracle” can be teased out if one wants it enough. Despite studies and reporting showing otherwise, for the sake of this piece it doesn’t actually matter if radical post-Katrina New Orleans school reform was a “success,” a failure or somewhere in between. What is important is that so many corporatists think this “miracle” was not just an incidental positive but was, all things considered, worth it. Worth the 1,800 people killed and the 100,000 African-Americans permanently ejected from the city.
The most popular examination of this pathology is, of course, from Naomi Klein, who coined the idea of the ”shock doctrine” in her 2007 book of the same name. In it, she explores how Katrina and other manmade and non-manmade disasters are exploited to rush through a radical right wing corporate agenda.
-
Ten years after Hurricane Katrina devastated the Gulf Coast, environmental justice advocates feel the time is long overdue for the media to start connecting the dots between climate change and social justice.
There may be no clearer example of this intersection than in the impact and aftermath of 2005′s Hurricane Katrina. Between the devastating effects of the storm itself, and the decade-long effort to restore destroyed communities afterwards, the region’s African-American population has demonstrably suffered the most.
-
The government’s proposed citizenship stripping laws are about a lot more than taking citizenship off people who try to blow up a train. In fact, they may well rip away the rights of a vast range of people for a staggering number of reasons.
We’ve gone though the expert responses to the bill – currently before a parliamentary inquiry – and picked out the best ways to see your citizenship disappear if you are a dual national.
If you’re going to end up banished from Australia, you may as well have some fun doing it.
Before we go on we should note that it’s not exactly clear how many dual nationals there are in Australia but if you’re one of them, this could soon apply to you. We’re looking at you, John Pilger… Germaine Greer, et al.
-
At the talk titled The Future of One-Party Rule in Singapore, Dr Chee spoke about the implications of one-party rule in the past, present and future and how the next general election will influence democratic politics in Singapore. Students and faculty posed questions after Dr Chee gave brief opening remarks, leading to a lively discussion in an already overflowing room of more than 100 members of the Yale-NUS community.
[...]
I am frustrated at how a country this economically advanced can be so socially backward, but to think about it, it is not surprising at all. With all that has been going down in recent years (e.g. Amos Yee, the National Library Board penguin saga), the world is looking at us. What Singapore needs right now is for people in power to put their foot down and say, “Hey, this is wrong, and I’m going to fight for what is right.” Unfortunately, at the end of the day, elections are a race for votes, and few are willing to risk losing votes this way. After all, the less people you piss off, the higher the chances you have at winning. We need social change, and we need it now. Yet how can we ever have real change if advocating for it only puts people off or gets you shut down?
-
Intellectual Monopolies
-
Trademarks
-
Regardless of spelling, Armor&Glory’s market impact appears minimal. According to the story, “it has so far made less than $100,000 in revenue since 2013 — about 0.003 percent of Under Armour’s sales just last year. The company’s online store sells $20 shorts and $25 shirts designed largely for a core Christian audience, with slogans like “Be spiritually attractive” and ‘Put on God’s armor and receive His glory.’”.
-
Copyrights
-
Following news this week that a man is facing a custodial sentence after potentially defrauding the movie industry out of £120m, FACT Director General Kieron Sharp has been confronted with an uncomfortable truth. According to listeners contacting the BBC, the public has little sympathy with Hollywood.
-
Pirate Bay founder Gottfrid Svartholm was released from a Danish prison yesterday, only to be immediately re-arrested by police. The Swede is now expected to be extradited back to his home country where he will be returned to prison, but not before appearing in court today to appeal the decision.
-
The CCIA, which represents global tech firms including Google, Facebook and Microsoft, has published an extensive research paper on the future of copyright in the digital landscape. One of the main suggestions is to extent current copyright law, so that senders of wrongful DMCA takedown notices face serious legal consequences.
-
Facebook says it will give video creators and publishers a way to remove copyrighted videos that have been uploaded to its popular social network without the proper permission.
Permalink
Send this to a friend
08.27.15
Posted in FUD, GNU/Linux, Microsoft, Windows at 11:17 am by Dr. Roy Schestowitz
This is what Microsoft staff distributes to attendees in FOSS events:
Photo credit: Neil McAllister
Summary: Microsoft’s relentless attacks on GNU/Linux and Free software in general (even if it runs on Windows) are so evident that claims of ‘love’ remain laughable at best (if not infuriating)
MICROSOFT JUST CANNOT HELP itself. It’s like a scorpion riding a tortoise over a river. It keeps attacking GNU/Linux while claiming that it “loves Linux”. The truth is, Microsoft loathes Linux with a deep passion, but it doesn’t want to show this because it needs to infiltrate Linux events such as LinuxCon. It’s a strategy of entryism. It’s really ugly.
Imagine Microsoft having Linux folks as its keynote guests/speakers in its developers’ events, preaching passionately in favour of Free software (GPL for instance). Microsoft keeps infiltrating every single Linux event that matters. Microsoft is paying for it and it knows that it’s annoying people who pay a lot of money to attend (or whose employers are sponsors). Microsoft runs many developers’ events. Imagine Linux ‘infiltrating’ these. That would be entryism in reverse. But FOSS doesn’t play dirty. We leave the crimes and the unethical deeds to Microsoft.
Several days ago someone wrote to point out that Microsoft speaks nonsense and spread FUD again. To quote:
The giant from Redmond must be desperate since it has to use a controversial story from a relatively small Italian city to combat open source software, as in the mean time many larger deployments also in Italy are happy with LibreOffice and the numbers produced by Provincia di Perugia prove the opposite of the Microsoft-publication.
As Robert Pogson put it: “Why do they keep spreading it? Every time they get caught lying they destroy their own credibility amongst their loyal followers, if there are any left…”
Microsoft and its goons recently spread some more lies about Munich, using media partners which took the words of just two people and made that seem like the whole of Munich was upset with GNU/Linux. “Most people don’t really realize that they have Linux and they do not really care,” wrote Mr. Heath yesterday [1]. He was the first person who wrote a story about this in English, foreseeing and properly preparing for Microsoft’s FUD attacks (Microsoft advocacy sites soon took the story out of context to lie about Munich).
Susan Linton, writing her daily column, said that “everyone reading of this knew that couldn’t be entirely right and today Heath reported, “the bulk of users have not taken issue with the move.” He quoted Munich IT developer, Jan-Marek Glogowski, at DebConf15 saying, “Most people don’t really realize that they have Linux and they do not really care, they want to do their stuff.” That’s not to say there aren’t issues and growing pains, primarily keeping up with hardware support with LTS Ubuntu-base, but plans are to keep forging ahead. Robert Pogson linked to the actual video from DebConf15.”
So basically we have just Microsoft FUD going on. Here is a new article that is just more utter lies, maybe ‘prepared’ propaganda from Microsoft (misleading, inaccurate) [2]. They have totally made up the ‘facts’ to sell people the illusion that GNU/Linux is a failure. It’s that same old tired Munich lobbying from Microsoft Germany. As Pogson noted:
Lately, in the news, we read that agitators are still pushing to roll back GNU/Linux desktops.
They really are just “agitators”; there are only 2 of them at the moment, but they are joined by Microsoft spinners who have access to newspapers and/or news sites. “Munich councillors want to return to proprietary software,” wrote Gijs Hillenius in the European press, but we are speaking about just “two councillors [who] have not yet responded to emails seeking their position on interoperability” (if they know what it is at all, as they’re non-technical). Maybe they need to ask Microsoft Germany.
This headline, “Munich Officials Who Dumped Windows For Linux Want Microsoft’s OS Back” [3], is also a lie because it’s not the same officials, there’s no change of mind, there are just 2 dissenting voices.
This latest round of anti-GNU/Linux FUD is not something that we are unfamiliar with. We wrote dozens of in-depth articles about this. Munich is a large-scale migration and as we showed in previous years, Microsoft usually orchestrates this FUD behind the scenes. Sometimes some information leaks out to the media, showing Microsoft’s role in it (occasionally through proxies like HP). All we have here is a PR exercise, not news. █
Related/contextual items from the news:
-
In spite of complaints from a couple of councillors about the Limux OS, the city council said the bulk of users have not taken issue with the move.
“Most people don’t really realize that they have Linux and they do not really care,” said Jan-Marek Glogowski, a developer in the IT team at the City of Munich told the DebConf Debian developers meeting earlier this month.
-
Whatever the case, the city of Munich will have to wait it out for another year at least. According to The Inquirer, a review and subsequent response into the future IT policy will not take place until the end of 2016.
-
Permalink
Send this to a friend
Posted in Europe, Patents at 10:51 am by Dr. Roy Schestowitz
Summary: The European Patent Office has ceased even trying to pretend that it respects human rights, including the right to free speech
Staff suicides at the EPO are a frequent occurrence [1, 2, 3] as the last/latest one was just a week ago. This can reasonably well be blamed on a regime of terror, led by the arrogant, Napoleonic Battistelli. He rules with an iron fist and violates many rules, laws, regulations, etc. There’s no real protection from a thug like him who pretends to be above the law (impunity), so people are rightly afraid. It’s the same with armed policemen who destroy video evidence and do as they wish, basically acting like unaccountable goons.
Worst among all is probably Battistelli’s so-called Investigation Unit, which is basically just a bunch of goons, who even hire the ‘British Blackwater’ to go after staff and after journalists. Just for the uninitiated, who haven’t been following what we covered here before, here are some reminders:
“The Office continues to filter emails sent to EPO staff and containing the word SUEPO in the subject,” SUEPO wrote on the 26th of this month (an update titled “Filtering of SUEPO emails”). It’s not exactly surprising anymore. The EPO is nuts, so this is expected. “A SUEPO lawyer addresses Mr Battistelli,” wrote SUEPO, “by pointing out the legal implications and requests the end of the filtering. A copy of the letter can be found here.”
In a very crude, undemocratic fashion they do not just try to completely gag opposition, even if that opposition is the staff union, i.e. EPO staff rather than outsiders. For the record, here is the text of this complaint from SUEPO (it’s in German, so translations would be well received) █
Permalink
Send this to a friend
Posted in Europe, Patents at 10:40 am by Dr. Roy Schestowitz
The US patent system may be getting exported to Europe (a silent occupation), without even consulting European citizens on this matter
Summary: The EPO-backed Unitary Patent scheme threatens to bring software patents to Europe and along with them a lot of patent trolls from all around the world (especially the United States)
“The Unitary Patent might be able to open the floodgates for software patents in Europe,” says this new analysis, published earlier today in a lawyers’ site. It echoes many of the warnings from the likes of FFII, among other European groups that have repeatedly warned about the Unitary Patent (UPC).
“It echoes many of the warnings from the likes of FFII, among other European groups that have repeatedly warned about the Unitary Patent (UPC).”The long piece is titled “The Murky Waters Of Software Patents” and it’s not as positive as one might expect. Given the publication it comes from (pro-patents), it’s hardly surprising at all. “Software patents,” says the author, “have been the subject of much debate – not only in the US, but also in Europe. This has been a thorny issue for many years and the future of software patents still remains unknown. At the outset, a breakdown of the differences between patents and copyrights will highlight why the patent is the form of intellectual property which is proving to be the most problematic with regards to software.”
The author later alludes to Alice, which we may write a lot more about tomorrow. “In the US,” he says, “software patents have been in existence since the early 1970s, but courts have recently started to reject software patents. The courts have ruled that simply “doing something on a computer” does not enable one to obtain a software patent on the matter. After hundreds of thousands of patents being issued, it became clear that there needed to be more restriction and the courts have recently been invalidating patents that were already granted. In 2014, in the landmark Alice Corp judgment, the courts stated “the mere recitation of a generic computer cannot transform a patent ineligible abstract idea into a patent eligible invention.” Thus the US is now retreating from its original position of granting software patents somewhat liberally.”
Then the author writes about Europe, in particular about the effects of the UPC. “The Unitary Patent,” he explains, “is a very recent brainchild of the European Patent Office. Through one single request, one will be able to obtain patent protection in 25 member states (Spain, Italy and Croatia are not currently participating). This patent will be subject to the exclusive jurisdiction of the Unitary Patent Court, which will comprise of a court of first instance, a court of appeal and a registry.
“The rulings of this court will affect the Member States who have ratified the agreement. The EPO hopes that the establishment of the court will add to more predictability in proceedings and avoid parallel litigation. Since all unitary patents will thus have their own court, there is also an expectation of faster and more efficient procedures than if these were to be held in the relevant Member States. So far, seven Member States have ratified the agreement – and Malta was among the first to do so. It will come into force once it has been ratified by thirteen states, which is expected to be around 2016. Nevertheless, the position of software patents under this new patent system will remain to be seen. When it comes into force, it will lay the cornerstone for more debate on the subject – as being able to achieve a unitary software patent will mean that it will automatically be recognized in all the Member States.
“The Unitary Patent might be able to open the floodgates for software patents in Europe, since if it allows for software patents, they will become immediately applicable in all the EU Member States. The same might be said for the contrary – however, the fact that the EPO allows for a Unitary Patent court of appeal means that this discussion might go on for years to come.”
Another site of patent lawyers now informs us of “Progress on the Unitary Patent”. It says that “[o]n 10 July 2015, the Preparatory Committee (which handles all the subsidiary issues arising from the creation of the Unified Patent Court (“UPC”), such as HR or IT management) met to discuss the last (18th) draft of the Rules of Procedure for the UPC. They are expected to reach an agreement on a final set of Rules in October 2015.
“The draft Protocol on Provisional Application of parts of the Agreement on a Unified Patent Court was also on the agenda as well as the salary package of the judges, the privileges and immunities of the UPC and the division of costs and responsibilities.”
According to this, Portugal too has caved in without even consulting or liaising with its citizens. What a coup!
“Confirmation of Portugal’s ratification of the UPC Agreement was published on 6 August 2015,” says a site about the UPC, “in the country’s Official Gazette of legislation. In the Diário da República Eletrónico, the Decree of the President of the Republic No. 90/2015 indicated that Aníbal Cavaco Silva had approved the UPC Agreement on 30 July 2015 following Parliament’s approval (No 108/2015) on 10 April 2015; a certified copy of the original UPC Agreement was also published in English and Portuguese. See here.”
Here in the UK as well, without even consulting citizens, the government is now preparing for the UPC. Nobody voted for it. This just serves to show how undemocratic the European Union has become, possibly even worse than the EPO alone.
What happens here is similar to what happens in New Zealand right now [1, 2, 3], with persistent efforts to thwart the law (a law banning software patents) through all-encompassing ‘trade’ deals, effectively ‘laundering’ the law at the behest of rich and powerful people who collude in secret. In New Zealand, the loopholes for software patenting have thus far been similar to Europe’s “as such”. █
Permalink
Send this to a friend
Posted in Deception, Microsoft, Vista 10, Vista 7, Vista 8, Windows at 10:16 am by Dr. Roy Schestowitz
Bad Vista
Summary: Windows surveillance expands retroactively, making its way into platforms other than Windows and also expanding to predecessors of Vista 10
IN TERMS of sales and technical weaknesses, Vista 10 is a huge disaster, doing probably worse than its predecessor, which also did worse than the mythically ‘great’ Windows Vista. It really is a total disaster, but Microsoft employees won’t say this to the media for fear of personal retribution (firing).
“…Microsoft is putting Bing inside Cyanogen OS, not just from the company Cyanogen but also in OnePlus.”The unprecedented spyware problem is no longer limited to just Vista 10, so users of Windows on PCs are all affected. They should escape all of Windows as soon as possible because even older versions have spying features silently added to them. Well, this has actually been known for a while and we wrote about it several weeks ago. Now it appears as though more people become aware of it (the latest headline says “Updates Make Windows 7 and 8 Spy On You Like Windows 10″). Based on [1-3], Microsoft is putting Bing inside Cyanogen OS, not just from the company Cyanogen but also in OnePlus. This company, OnePlus, should dump Cyanogen OS, for reasons we covered here before [1, 2].
Mind this new article titled “Windows 10 automatically sends parents detailed dossier of their children’s internet history and computer use”. To quote just the opening paragraphs: “Windows 10 sends a weekly “activity update” on childrens’ internet browsing and computer history to parents, by default and without telling anyone. The feature could be dangerous as well as embarrassing, users have pointed out, allowing parents to watch everything their children do on the computer.
“Microsoft has become just a surveillance company and Windows the surveillance platform.”“The operating system sends a weekly note that includes a list of websites children have visited, how many hours per day they have spent on the computer, and for how long they have used their favourite apps, according to reports.”
Microsoft has become just a surveillance company and Windows the surveillance platform.
Vista 10 lies (“marketing”) now grow in lieu with Munich propaganda (anti-GNU/Linux myth-making, in order to scare CIOs who are fed up with Windows). Beware Microsoft’s fake vista 10 figures. These are being pushed by Microsoft into its boosters and moles in the media right now. The company has a long history gaming numbers to lie about number of ‘sales’ or ‘useds’ [sic]. Here is one Microsoft booster disseminating what it essentially Microsoft marketing with a sloppily-made image that cement the Big Lie (carving it in stone, within an image that cannot be edited for correction). “The only question,” wrote to us iopkh, “is how they are fiddling the stats.”
These claims are pulled directly from Microsoft, or rather, they are being pushed by Microsoft onto gullible journalists or complicit ‘journalists’. The author is a known Microsoft booster with history. Microsoft’s own figures hysterically debunk some early claims that the media cited a lot (between 45 million and 55 million ‘upgrades’ after 3 days). We warned that these were baseless claims from the rumour mill and Microsoft’s trolls army.
This time too we cannot trust the figures since they come from Microsoft. Based on how it has always gamed the numbers (‘sales’ not meaning actual sales or even users), we know these are lies. Look at web statistics from some of the more respected sources. Maybe 5% market share (or less) is what Microsoft’s latest beast has got at the moment, which given the price and other exceptional factors, is truly (and quite frankly) pathetic. █
Related/contextual items from the news:
-
-
-
Permalink
Send this to a friend
Posted in Europe, Patents at 9:36 am by Dr. Roy Schestowitz
Summary: Yet another EPO member of staff has just committed suicide, leading to the inevitable question: how many people need to die before Battistelli and his minions are out of the Office for good?
THE EPO‘s management has been so rogue that suicides have been happening, as we previously covered in [1, 2, 3]. Any outsider would agree that this may be a sign of terrible, incompetent management that over-stresses staff and rules by fear, reigning by terror.
Hearing from sources that 5 people at the EPO have committed suicide under the Battistelli regime is going to motivate more activism against the EPO, including staff demonstrations. Staff at the EPO needn’t be suicidal or depression-leaning. Many employees — and examiners in particular — are highly qualified, often with Ph.D.-level degrees and many years of technical experience. Money is not an issue and these people are a lot smarter than their ‘boss’, Battistelli, who merely comes from a prestigious (expensive) French school and has plenty of powerful connections other than his cabal inside the EPO’s management.
“Yet another EPO employee committed suicide last week,” wrote a person to us. This person managed to secure possession of a note that Ciaran McGinley published and disseminated among all EPO staff this week. We have deleted the name of the dead person in order to respect the wishes of his family.
“Just watch how negative the work atmosphere has become.”“The note of Ciaran McGinley looks poetic,” said our source, “but it is highly hypocritical and cynical. The term suicide has been carefully omitted. The suicide rate has now become extremely worrying. This is the fifth suicide in 39 months during the mandate of Mr Battistelli. And it is the third one in the principal directorate of Mr McGinley since his appointment. Mr McGinley systematically refuses any independent investigation whether the workplace could have played a role in these tragedies. And his lyrical note would be sufficient to make his staff forget that they are told that they are overpaid and will soon be replaced by machines. Their professional pride has been completely destroyed.”
The EPO scandals are far from over. We have some exclusive stories about the EPO’s other abuses. They are lined up for publication next month and we are eager to expose corruption with more tenacity than before as the regime of Battistelli is costing more than just money (not to mention the harm to European citizens). Some people prefer not to live under it.
When Battistelli doesn’t just eliminate people by illegally ‘suspending’ them (like a house ban) he just turns out to be ruling by intimidation. That’s never a healthy way to manage. If some staff are opting to eliminate themselves rather than eliminate corrupt elements in the institution that employs them, who wins?
Just watch how negative the work atmosphere has become. It now including censorship, self-censorship, suspicion that ill staff are just lying to get a day off, and so on. This must end.
Below is the text of the message from Ciaran McGinley [PDF]
. █
Our colleague ██████████ passed away
26.08.2015
A message of PD 2.1 Ciaran McGinley
Dear Colleagues,
By now, most of you will have been made aware of the unexpected passing away of our colleague ███████████. ██████, who was only 42 years old, leaves behind a wife and two young children. Our thoughts and deepest sympathy must, first and foremost, go to them. We have lost a colleague, a friend and a future leader. His family have lost something much more precious – a son, a husband and a father. I think I speak on behalf of everyone in PA when I express my shock and sadness about this tragic loss. His family have asked the EPO to be discreet and to respect what is a very private matter. We all therefore need to behave in a way that fully supports their wishes on this point. The best way to do this is to remember ██████ for how we at the EPO knew him – instantly likeable, open and always with a sincere, warm and caring smile.
Arrangements are currently being made for him to be flown home. The family has indicated that they prefer that the funeral takes place in a close, intimate circle. The family very much appreciate all the good wishes and expressions of sympathy, but they also want, and need, their privacy. The EPO social services have offered full support to the family as is usual in such tragic circumstances. Finally, I would like to take this opportunity to thank ████ OHS for the support she has offered and given to colleagues in the past two days – it has been much appreciated and I know that it will continue to be necessary in the coming weeks as we all try to get to terms with what has happened.
Ciaran McGinley
PD Patent Administration
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »