This page permanently redirects to gemini://gemini.techrights.org/2015/07/25/plasma-mobile/.
● 07.25.15
● Links 25/7/2015: Plasma Mobile, Linux Mint 17.2 OEM
Posted in News Roundup at 11:08 am by Dr. Roy SchestowitzContentsGNU/LinuxGNU/Linux
=> ↺ The Lazarus Effect: Saved by Linux and Cash Converters
- I’ve been flirting with Linux on virtual machines for years, dissuaded more than once by the appearance of Ubuntu, I stumbled upon Kali Linux, the deluxe penetration testing and hacking distro compiled by the macho sounding Offensive Security.
Server
=> ↺ Container standards: Patching over the cracks
- Containers are coming together on Internet time. That’s because, as Jim Zemlin, the Linux Foundation’s executive director, explained in his OSCon, keynote that “Containers will change the datacenter in the same way that shipping containers changed global trade. They will shift IT from a server view of the world to an application view of the world.”
Kernel Space
=> ↺ Linux 4.3 Will Have Many Intel Graphics Improvements, Better For Skylake
- Daniel Vetter of Intel’s Open-Source Technology Center has sent in many Intel DRM driver changes to be queued up in DRM-Next for the Linux 4.3 kernel.
- This drm-intel-next load is quite big given that there’s three batches of changes due to Vetter having held off on sending out this pull request for the code to land in DRM-Next.
=> ↺ Linux Holds Its Own in VDI
- Anyone who still thinks that Linux is some sort of second-class citizen when it comes to virtual desktop infrastructure hasn’t been keeping up. New products are allowing IT departments to mix virtualized Linux desktops with those using Windows, without sacrificing any graphics performance.
Graphics Stack
=> ↺ Intel’s Mesa DRI Driver Now Supports Shader Subroutines
=> ↺ Where AMD’s Catalyst Driver Does The Best On Linux
- Earlier this week I finished up a 15-way AMD/NVIDIA graphics card comparison on Linux with the very latest proprietary Linux drivers. That earlier article focused on the OpenGL performance and simply put the Catalyst performance on the tested Radeon hardware was abysmal compared to NVIDIA’s Linux driver performance. However, there is one area where the Catalyst Linux driver really excels at performance and routinely beats out the green competition.
Applications
=> ↺ Dolphin Emulator 4.0.2 (Old Gaming Console Emulator) Has Been Released
- As you may know, Dolphin Emulator is an open-source, multi-platform Nintendo GameCube, Wii and Triforce emulator. Like all the emulated software, the games have minor bugs and issues. Being an open-source project, it may be improved by third party developers.
=> ↺ Mosh 1.2.5 (Open-Source SSH-Like Software) Brings New Features
Instructionals/Technical
=> ↺ How To Install Apache Solr In Ubuntu
=> ↺ Setup A Local Mail Server In CentOS 7
=> ↺ Install Dolphin Game Emulator on Linux Mint and Ubuntu 15.04
=> ↺ The Perfect Server – Ubuntu 15.04 (nginx, BIND, Dovecot and ISPConfig 3)
=> ↺ The Ubuntu MATE Welcome Screen Has Been Updated. Install And Test In Now, On Any Of The Supported Ubuntu MATE Systems
=> ↺ Install Calibre 2.33.0 (Open-Source E-book Management Software) on Linux
Games
=> ↺ SteamOS/Linux Version Of Gauntlet Cancelled
- A developer has posted on the Gauntlet Steam forums about Gauntlet: Slayer Edition, a free upgrade to Gauntlet. In the same post the developer noted that the SteamOS version has now been cancelled due to limited resources.
=> ↺ Fun Open Source Games and Apps: 112 Top Picks
- They say that taking a vacation is good for your health, so every summer, we take a break from our lists of more serious open source apps and focus on games. This year’s list is longer than ever before with 112 projects. While we’ve removed a few projects that are no longer actively maintained, you’ll find plenty of old favorites on the list, plus a few newcomers that have never been featured before.
=> ↺ Unreal Engine release, Laby, jMonkeyEngine, and more open gaming news
=> ↺ Cradle, A Unigine Linux Game, Finally Launches On Steam
- Back in 2011 we were talking about Cradle as the latest Unigine Engine game and it was expected to launch in 2012 with Linux support. Three years later, this game has finally launched on Steam with Linux support.
Desktop Environments/WMs
=> ↺ Enlightenment 0.19.6 Desktop Environment Arrives with Over 45 Bugfixes
- The developers behind the modern and beautiful Enlightenment desktop environment used in countless distributions of GNU/Linux have announced recently the immediate availability of the sixth maintenance release of Enlightenment 0.19.
K Desktop Environment/KDE SC/Qt
=> ↺ KDE Arrives in A Coruña for Akademy
- KDE is de-camping to the far west of Europe today to A Coruña in Galicia. In this north west corner of the Iberian Peninsula the sun is warm and the air is fresh. KDE contributors of all varieties will be spending a week in talks, discussions, hacking, renewing old friendships and getting to know people new to our KDE Community.
=> ↺ Plasma Mobile, a Free Mobile Platform
- Plasma Mobile offers a Free (as in freedom and beer), user-friendly, privacy-enabling, customizable platform for mobile devices. Plasma Mobile is Free software, and is now developed via an open process. Plasma Mobile is currently under development with a prototype available providing basic functions to run on a smartphone.
=> ↺ KDE’s Plasma Phone UI Runs on Top of Wayland, Ubuntu Touch, and Kubuntu – Video
- It was recently brought to our attention that the KDE developers are hard at work these days preparing a new user interface (UI) for mobile devices running on top of the Ubuntu Touch and Kubuntu operating system, as well as on the next-generation Wayland display server.
=> ↺ Plasma Mobile: Linux-based smartphone operating system
- There’s a new player in the smartphone operating system space: the folks behind the KDE desktop environment for Linux-based desktop computers have just unveiled Plasma Mobile.
=> ↺ Video: Plasma Mobile
=> ↺ KDE Announces Plasma Mobile, Available Now for LG Nexus 5, Supports Ubuntu and Android Apps
- Today, July 25, KDE, the company behind the modern, mature, and robust desktop environment with the same name, which is used in numerous Linux kernel-based operating systems, had the great pleasure of announcing a new project targeted at mobile device, Plasma Mobile.
=> ↺ More Details On KDE Plasma Mobile, Reference Images
- A lengthy write-up of the announcement has been posted to dot.kde.org. That announcement talks of Plasma Mobile’s advantages of freedom, user-friendliness, privacy, and customization and personalization. It also mentions that while native apps will be written using Qt5, it will also support GTK apps, Android apps, Ubuntu apps, and applications from other mobile ecosystems.
=> ↺ KDE Announces Plasma Mobile For Fully-Free Software For Mobile Devices
- At KDE’s Akademy event today, the KDE camp has just lifted the embargo on Plasma Mobile.
- KDE Plasma Mobile is focusing on a fully-free software stack that’s developed openly for mobile devices such as smartphones.
GNOME Desktop/GTK
=> ↺ GNOME News Promises to Be an Unbelievable Feed Reader for GNOME 3.18 – Video
- On July 24, Igor Gnatenko was more than proud to publish some details about his upcoming news reader app for the highly acclaimed GNOME desktop environment, called GNOME News.
=> ↺ An inlaid GNOME logo, part 4
- In the last part, I glued the paper templates for the shield and foot onto the wood. Now comes the part that is hardest for me: excavating the foot pieces in the dark wood so the light-colored ones can fit in them. I’m not a woodcarver, just a lousy joiner, and I have a lot to learn!
=> ↺ TDD, Unit Tests & Liblarch. Lesson — learnt!
Distributions
Ballnux/SUSE
=> ↺ openSUSE Leap 42.1 Milestone 1 Available
- DeMaio quoted Richard Brown, chairman of the openSUSE board, saying, “The opportunity for topping this SLE core with the things you want in a long-term release really makes this attractive and I see people wanting to get involved with this next chapter of openSUSE. Leap will fill the gap between the longevity of a SLE core and the innovation related to Tumbleweed.”
=> ↺ The First Milestone Reached For openSUSE 42.1 “Leap”
- OpenSUSE 42.1 Leap is derived from SUSE Linux Enterprise’s source-code and is going to be the openSUSE project’s next non-rolling release and entered development last month. Currently Leap is due for release in November. OpenSUSE Tumbleweed, the rolling-release arm of the distribution, will meanwhile keep on rolling.
Slackware Family
=> ↺ Chromium 44 available (Netflix still works)
- That updated version 44.0.2403.107 may have to wait, because I will be unable to do a lot of Slackware related stuff until august; real life is catching up with me. If there are real useability issues with 44.0.2403.89, let me know and I will see if I can shift priorities or make the older 43.x packages available again. My initial (not exhaustive) testing showed no weirdness at least.
Red Hat Family
Fedora
=> ↺ Schedules for Flock and F23, Atomic & Workstation, DNF — and a Fedora job opening!
- Speaking of schedules, Fedora 23 development is well underway. Last week, Fedora 23 branched from Rawhide, so that we can focus on stabilization and bugfixes for the planned October release while ongoing work on future features — Fedora 24 and beyond! — can continue in the development branch. The Alpha Freeze (where F23 features and changes are supposed to be substantially complete and testable) is scheduled for a week from today, with the actual Alpha release August 11th — the day before Flock starts. The QA team is already working on early test candidates, and Docs has put out a call for help with release notes.
=> ↺ PHP on the road to the 7.0.0 release
Debian Family
Derivatives
Canonical/Ubuntu
=> ↺ Ubuntu 14.10 (Utopic Unicorn) Gets One Last Linux Kernel Update
- On July 23, we reported that the Ubuntu 14.10 (Utopic Unicorn) operating system reached end-of-life and that Canonical urges all users that still run the Utopic distribution to upgrade to the current stable release, Ubuntu 15.04 (Vivid Vervet), as soon as possible.
=> ↺ Full-Featured Mir 0.14 Update Finally Lands in Ubuntu Touch, Notes App Updated
- On July 24, Canonical’s Łukasz Zemczak sent in his daily report on the work done by the Ubuntu Touch developers in the last 24 hours, informing us all that the full-featured Mir 0.14 display server update landed in the devel branch of Ubuntu Touch.
=> ↺ Inside the Vivid Vervet – All About the Latest Ubuntu Release
- The boot manager has been updated from something in the past called Upstart, to the more widely supported and loved systemd environment. Upstart still manages user sessions, but the systemd (pronounced System Dee) has been found to be more reliable according to many folks inside and outside of Canonical.
=> ↺ Ubuntu Phone is shipping, but it appears the software isn’t ready
- Over the last few years, Google and Android have increasingly dominated the mobile scene, with Microsoft relegated to bit-player status. Once-massive players like BlackBerry scarcely stir a ripple in the market. Nonetheless, Ubuntu has chosen to stick its neck out and create a mobile operating system based on its own software to hopefully compete against the massive entrenched players. A new review of the Ubuntu Phone OS puts the operating system through its paces — and finds a great deal wanting.
=> ↺ Plug A Mouse Into Your Ubuntu Phone And You Have A Computer
=> ↺ Ubuntu Touch OTA-6 to Bring Telephony Improvements, Wi-Fi Hotspot, APN Editor
- On July 24, Canonical’s Bill Filler sent in his report on the work done by the Ubuntu Touch developers, as well as to inform us all about the new features and bug fixes that will be implemented in the upcoming OTA-6 update for Ubuntu Touch.
Flavours and Variants
=> ↺ Linux Mint 17/17.1 KDE and Xfce Users Can Now Upgrade to Linux Mint 17.2
- Clement Lefebvre, leader of the Linux Mint project, has announced on July 23 that the upgrade path from the Linux Mint 17 (Qiana) and Linux Mint 17.1 (Rebecca) distributions to the Linux Mint 17.2 (Rafaela) operating system is now open for all editions.
=> ↺ Linux Mint: Monthly News – July 2015
- We’re now in the RC phase for the Xfce and KDE editions. So far most of the bugs were either minor or cosmetic. The upgrade paths for these two editions were also successfully tested and will be open to 17 and 17.1 users at around the same time as the stable releases, around the end of the month.
=> ↺ We’ve Got a Lot of Ideas for the Next Linux Mint Release, Says Clement Lefebvre
- On July 23, Clement Lefebvre, leader of the popular Linux Mint computer operating system, sent in his monthly report on the work done by the Linux Mint developers in the month of July 2015.
=> ↺ Linux Mint 17.2 OEM images available
- The following OEM installation images are now available:
- Linux Mint 17.2 Cinnamon OEM 64-bit Linux Mint 17.2 MATE OEM 64-bit
- Reminder: OEM images are for computer vendors and manufacturers. They allow Linux Mint to be “pre-installed” on a machine which is then used by another person than the one who performed the installation. After an OEM installation, the computer is set in such a way that the next reboot features a small setup screen where the new user/customer has the ability to choose his/her username, password, keyboard layout and locale.
=> ↺ RMS Likes Crowd Supply, Riddell Pokes Ubuntu & More…
=> ↺ Linux Mint 17.2 OEM and No-Codecs ISO Images Now Available for Download
- We reported the other day that Clement Lefebvre, leader of the Linux Mint project has published news about some of the upcoming work that will be done for the acclaimed GNU/Linux operating system based on Ubuntu.
Devices/Embedded
=> ↺ Stackable SBC sandwich runs Linux on ARM/FPGA Zynq SoC
- Sundance’s sandwich-style SBC runs Linux on an ARM/FPGA Xilinx Zynq SoC, offers VITA57.1 FMC-LPC I/O, and stacks via a PCIe/104 OneBank expansion bus.
=> ↺ A New MIPS Creator CI20 Is Running Much Better
- The MIPS Creator CI20 is a fun little $65 board for those wanting to experiment with alternative architectures on Linux.
=> ↺ Embedded Linux Pioneer MontaVista Spins IoT Linux Distribution
- MontaVista Software has launched an Internet of Things version of its commercial MontaVista Linux Carrier Grade Edition (CGE) development platform. The new Yocto Linux-based MontaVista Linux Carrier Grade eXpress (CGX) distribution will be available in the fourth quarter in a scaled down CGX Foundation optimized for IoT products. Customers can then add profiles including Carrier Grade and Virtualization in modular fashion.
Phones
Tizen
=> ↺ [Video] The Weather Network app running on Samsung Tizen Smart TV
- Smart TVs are becoming the central point of our communications in the modern Smart home. They can entertain and increasingly provide us with important information, and living in the UK it doesn’t get more Important than the weather for me.
Android
=> ↺ Fallout Shelter Finally Coming to Android Next Month, Getting Big Update
- Fallout Shelter, the mobile Fallout game developer Bethesda released in June on iOS devices, is finally coming to Android on August 13.
=> ↺ Android Circuit: Samsung Surrenders To Apple, New Moto G Leaks, More Galaxy Note 5 Secrets
- Taking a look back at seven days of news across the Android world, this week’s Android Circuit includes Samsung’s surrender to Apple, Samsung’s supporters in the Apple patent case appeal, details on the Moto G leak, updating the S6 Edge software, what we know about the Samsung Galaxy Note 5, the Android 5.1 update for Xperia handsets, who to add MicroSD support to the S6, details on the Pebble Time smartwatch sales, and AP releases a million minutes of archive footage on YouTube.
=> ↺ Samsung Galaxy Note 5, Galaxy S6 Edge Plus Spotted in Leaked Images
=> ↺ Samsung Galaxy Note 5, S6 edge+ images leaked
=> ↺ Diagram reveals Samsung Galaxy S6 Edge Plus’ size
=> ↺ Sorry, Folks – Nexus 7 Is Reportedly Not Getting Android M
=> ↺ Modder gets Half-Life running on an Android smartwatch
=> ↺ Android 5.1.1 Lollipop For Samsung Galaxy Note 4 (SM-N910F): How To Install it Using Resurrection Remix Custom ROM
=> ↺ Stephen Hawking plans to find aliens using our Android smartphones
=> ↺ Apple’s secret Android plan for Apple Watch
=> ↺ Dell Venue 8 Tablet, Nvidia Shield Portable jump ahead to Android 5.1
- A pair of Android tablets are climbing the update mountain to the peak of Android 5.1. They’re the highlight in a slower-than-usual week for Android devices, especially with the first-generation AT&T Moto X pushed back to a holding pattern.
Free Software/Open Source
=> ↺ Open source, adaptable infrastructure key to Etsy platform business model
- For an emerging platform business model, information technology may not top the owner’s agenda. Building a community and setting the ground rules for participation and conflict resolution are often the first priority. IT, however, tends to become a higher priority as a platform scales and matures. That’s been the case for Etsy, which was founded in 2005. Today, Etsy’s technology infrastructure plays a critical role in the current stage of the platform’s evolution.
- Etsy is largely built on open source technology, according to Allspaw. At its core, the company’s platform stack includes PHP and MySQL, Hadoop and Scalding, and Solr/Lucerne/ElasticSearch, he explained.
=> ↺ It’s Been A Great Month So Far For Open-Source/Linux Users
- Besides the open-source Mesa finally hitting OpenGL 4.0+, Vulkan being right on the horizon, there being Skylake just around the corner, AMD R9 Fury Linux benchmarks coming next week, and Intel Skylake being days away, there’s been many other exciting announcements so far this month and milestones for free software.
=> ↺ IFTTT joins the open source community
- Harnessing the power of apps, devices, and the cloud, IFTTT has just unveiled five open source projects. Now available on GitHub, the projects can be used by anyone to integrate IFTTT automation in their apps and services.
=> ↺ Tech Giants Boost Open Source Container Collaboration
- CNCF’s role is to foster developer and operator collaboration on common technologies for deploying cloud native applications and services, said Jim Zemlin, executive director at The Linux Foundation — that is, applications or services that are container-packaged, dynamically scheduled and micro services-oriented. To ease the process, CNCF aims to drive alignment among technologies and platforms.
Events
=> ↺ NetSurf developers and the Order of the Phoenix
- The fifth developer weekend was an opportunity for us to gather in a pleasant setting and work together in person. We were graciously hosted, once again, by Codethink in their Manchester offices.
=> ↺ OSCON: The Envelope, Please…
=> ↺ OSCON: Goodbye, Portland
Web Browsers
Mozilla
=> ↺ Firefox Nightlies Are Now Built with GTK+3, Coming For Firefox 42
- As of this commit yesterday, by Mike Hommey, Firefox nightly builds are now being built with PLATFORM_DEFAULT_TOOLKIT set to cairo-gtk3! It would appear, according to the commit tag, that mainline Firefox will be built with GTK+3 for Firefox 42. Firefox 42 is expected to be released this November.
SaaS/Big Data
=> ↺ We need the power of corporates, says OpenStack exec
- The OpenStack Foundation’s executive director has defended the community project’s growing corporatisation following criticism from a former colleague and lead pioneer.
- Jonathan Bryce told The Reg big companies are critical to the success of OpenStack as they bring vital resources lacking at startups and among individuals. They also tackle the unsexy work that makes OpenStack acceptable to enterprise customers.
=> ↺ Rackspace and Intel Team on Ambitious OpenStack Innovation Center
Hadoop Summit
=> ↺ Getting friendly with open source: Big Data firm liberates proprietary chokeholds
- Enterprise customers could consider open source as the solution to their problems. According to Anand Venugopal, Impetus’ head of real-time stream analytics platform StreamAnalytix, “People have become so friendly to open source, and they have been waiting to be liberated from the hold of proprietary vendors that they are positively biased toward open source-oriented technology.”
- Discussing a recent use-case scenario, Kankariya said, “The guy was looking for his problem to be solved; he doesn’t care if it’s Hadoop or NoSQL or whatever.” This openness has allowed Impetus to become a trusted partner and advisor for customers that want to “cross-learn from across the ecosystem.”
=> ↺ Squeezing more value out of data
- Cloudera, Inc.’s Todd Laurence, director, global partner sales, and Michael Crutcher, director of product management, joined theCUBE, SiliconANGLE’s Media team, at Hadoop Summit 2015 to discuss how Cloudera’s close relationship with EMC is benefiting its Isilon scale-out NAS storage customers and “bringing analytics to data where it lives today in EMC Isilon.”
BSD
=> ↺ FreeBSD 10.2 Gets Ready for Production Use, Release Candidate 1 Out for Testing
- The FreeBSD Project announced a few minutes ago that the first Release Candidate (RC) version of the upcoming FreeBSD 10.2 operating system is now available for download and testing through the usual channels.
=> ↺ FreeBSD 10.2-RC1 Released
- This latest development milestone for FreeBSD 10.2 has fixes for ZFS, Xen, SSH, pkg, and many other key components. Besides being offered for i386, amd64, PowerPC, PowerPC64, and SPARC64, there are also ARM spins for popular development boards from the RaspberryPi B to BeagleBone and PandaBoard.
=> ↺ LLVM 3.7 RC1 Ready For Testing By Developers
- One week after tagging LLVM 3.7-RC1, Hans Wennborg of Google announced its formal release on Thursday.
FSF/FSFE/GNU/SFLC
=> ↺ FSF Events: EmacsConf (San Francisco, CA)
=> ↺ FSF invites the free software community to its 30th birthday party on October 3rd, 2015
=> ↺ You’re invited: 30th birthday party and mini-conference
- As you may already know, this is the Free Software Foundation’s thirtieth year fighting for computer user freedom. It has been a great year already, with our biggest LibrePlanet conference ever and an article about GNU in the New Yorker. But what’s a birthday without a party?
Openness/Sharing
Open Data
=> ↺ ODI announces winners Open Data Awards 2015
- Earlier this month, the Open Data Institute held its Open Data Awards ceremony at Bloomberg’s London office, where ODI founders Sirs Tim Berners-Lee and Nigel Shadbolt presented this year’s winners.
Open Hardware
=> ↺ SketchUp’s Open-Source 3D-Printable WikiHouse Snaps Together Like Lego Bricks
- What if you could assemble your house like Legos using free modeling software and a 3D printer? That’s the idea behind Eric Schimelpfening‘s WikiHouse – a home designed entirely in SketchUp that can be downloaded by anyone, customized to fit the user’s needs and sent to the 3D printer. The components are then snapped together using less than 100 screws to make rooms that can be rearranged as easily as you would rearrange furniture.
Programming
=> ↺ PHP 7.0 Beta 2 Released
- Just two weeks after PHP 7 decided to go into beta, the second beta release is now available for testing.
- If you’ve been living under a rock, PHP 7.0 is slated to deliver much greater performance over PHP 5.6 (as much as 2x or more), consistent 64-bit support, various new language features, better handling of fatal errors, and other changes.
Standards/Consortia
=> ↺ ISO updates ODF document standard
- The International Organization for Standardization (ISO) has updated the ODF open document format standard for office application. ODF version 1.2 was published on 17 June.
Leftovers
Security
=> ↺ Friday’s security updates
=> ↺ Researchers Enlist Machine Learning In Malware Detection
- In 100 milliseconds or less, researchers are now able to determine whether a piece of code is malware or not — and without the need to isolate it in a sandbox for analysis.
=> ↺ The OpenSSH Bug That Wasn’t
- Get your facts straight before reporting, is the main takeaway from Peter Hansteen’s latest piece, The OpenSSH Bug That Wasn’t. OpenSSH servers that are set up to use PAM for authentication and with a very specific (non-default on OpenBSD and most other places) setup are in fact vulnerable, and fixing the configuration is trivial.
=> ↺ VUPEN Founder Launches New Zero-Day Acquisition Firm Zerodium
- In the weeks since the Hacking Team breach, the spotlight has shone squarely on the small and often shadowy companies that are in the business of buying and selling exploits and vulnerabilities. One such company, Netragard, this week decided to get out of that business after its dealings with Hacking Team were exposed. But now there’s a new entrant in the field, Zerodium, and there are some familiar names behind it.
Defence/Police/Secrecy/Aggression
=> ↺ Hundreds of never-before-seen photos of Bush and Cheney on 9/11 released by National Archives
- The National Archives on Friday released more than 350 never-before seen photos of former President George W. Bush and Vice President Dick Cheney, along with top members of the Bush administration, on Sept. 11, 2001, as they reacted to the most deadly attack in terrorism in American history.
=> ↺ Ex US Intelligence Want the Truth from White House who Shot Down MH17
- On Tuesday, the Ukrainian government refused to release an international report on the disaster, intensifying widespread concerns that it pointed to Ukrainian rather than Russian or rebel culpability in the crash.
=> ↺ Saudi-led coalition airstrikes kill more than 120 in Yemen
- Saudi-led coalition airstrikes killed more than 120 civilians and wounded more than 150 after shelling a residential area in the Yemeni province of Taiz on Friday evening, security officials, medical officials and witnesses said.
- The officials, speaking on condition of anonymity because they were not authorized to speak to reporters, said that most of the houses in the area were leveled and a fire broke out in the port city of Mokha. Most of the corpses, including children, women and elderly people, were charred by the flames, they said.
=> ↺ John Carlin Complains that ISIL Is Targeting Same Youth FBI Is
- I’m reviewing some of the videos from the Aspen Security Forum. This one features DOJ Assistant Attorney General for National Security John Carlin and CIA General Counsel Caroline Krass.
- I’m including it here so you can review Carlin’s complaints in the first part of the video. He explains to Ken Dilanian that ISIL’s recruiting strategy is different from Al Qaeda’s in that they recruit the young and mentally ill. He calls them children, repeatedly, but points to just one that involved a minor. 80% are 40 and under, 40% are 21 and under. In other words, he’s mostly complaining that ISIL is targeting young men who are in their early 20s. He even uses the stereotype of a guy in his parents’ basement, interacting on social media without them knowing.
- Carlin, of course, has just described FBI’s targeting strategy for terrorist stings, where they reach out to young men — many with mental disabilities — over social media, only then to throw an informant or undercover officer at the target, to convince him to press the button that (the target believes) will detonate a bomb — though of course the bomb is an FBI-supplied inert bomb.
Transparency Reporting
=> ↺ Why Hong Kong is the only Asian hub for global media
- Hong Kong is definitely the Asian hub of the global news industry.
=> ↺ Assange says WikiLeaks is “drowning in material now”
=> ↺ Julian Assange on WikiLeaks’ Comeback: ‘We Are Drowning in Material’
=> ↺ SPIEGEL Interview with Julian Assange: ‘We Are Drowning in Material’
- In an interview, Julian Assange, 44, talks about the comeback of the WikiLeaks whistleblowing platform and his desire to provide assistance to a German parliamentary committee that is investigating mass NSA spying.
=> ↺ Hillary Clinton likely ‘mishandled’ secrets because too much is classified
- The minute that private email server Hillary Clinton used for work emails as Secretary of State became a controversy, it was clear that evidence would surface showing that classified information passed through that address – despite her repeated denials.
- Of course there was “secret” information in her emails – but not because she had attempted to cover up smoking gun Benghazi emails like conspiracy-addled Republicans hoped. It’s because the US classification system is so insanely bloated and out of control that virtually everything related to foreign policy and national security is, in some way or another, classified.
- And now it’s finally happened: the New York Times reported late Thursday that two internal government watchdogs have recommended that the Justice Department open a criminal investigation into Clinton’s private email account, because the cache of 55,000 emails from her now-deleted server reportedly include “hundreds of potentially classified emails”.
=> ↺ The Declining Half-Life of Secrets
- The nature of secrets is changing. The “half-life of secrets” is declining sharply for many intelligence activities as secrets that in the past may have been kept successfully for 25 years or more, are now exposed well before.
- For evidence, one need look no further than the 2015 breach at the Office of Personnel Management (OPM), of personnel records for 22 million U.S. government employees and family members. OPM is just one instance in a long string of high-profile breaches, where hackers have gained access to personal information, trade secrets, or classified government material. The focus of the discussion needs to be on complementary trends in information technology, including the continuing effects of Moore’s Law, the sociology of the information technology community, and changed sources and methods for signals intelligence, all of which increase the likelihood that government secrets will not remain secret for long.
- An age where secrets become known sooner, means that “the front-page” test will become far more important to decision-makers. Even if a secret operation is initially successful, the expected costs of disclosure become higher as the average time to disclosure decreases.
Finance
=> ↺ Elizabeth Warren 1, Wall Street Clown 0
- On this week’s podcast, we look back on Elizabeth Warren ripping apart a rip-off artist from Primerica, break down the latest effort to pass a highway funding bill, and explain why a former NSA chief is talking to a bunch of fruit growers.
PR/AstroTurf/Lobbying
=> ↺ Side-By-Side Coverage of Cuba and Iran Highlights Shift in US Media Villain-Making
- US relations with Cuba have had a significant time to relax, and clearly there is a still a long way to go with Iran, which George W. Bush famously included as a member of the “axis of evil” in his 2002 State of the Union address (White House Archives, 1/29/02). One might wonder, however, were the US media to grant the same kind of legitimacy to Iranian perspectives as it now does to Cuba’s, whether that latter number might tick up.
=> ↺ Megyn Kelly’s Response To The Louisiana Theater Shooting Was To Speculate About An ISIS Connection
- Fox News anchor Megyn Kelly responded to breaking news of a deadly shooting at a Louisiana movie theater by baselessly asking about possible connections to ISIS or radical Islam.
=> ↺ Politico Finds ‘Capital of American Jihad’–Based on 2 Cases, 6 Years and 268 Miles Apart
- In his piece “Tennessee Is the Capital of American Jihad,” author and “War on Terror” think-tanker James Kitfield sets out to draw a connection between the the recent Chattanooga shooter Mohammad Youssef Abdulazeez and the case of Carlos Bledsoe, who shot up a recruiting station in Arkansas in 2009. The fact that both attacked recruiting stations, both lived in Tennessee and both were Muslim is apparently enough to make Tennessee the “Capital of American Jihad.”
=> ↺ Who Is Frank Luntz, The Guy Trying To Quietly Change Your Mind About Republicans?
- On Saturday, at the 2015 Family Leadership Summit, an event which showcases Republican candidates, Donald Trump gave a notorious interview in which he discussed John McCain’s military record. Trump said, “He’s not a war hero. He’s a war hero because he was captured. I like people who weren’t captured.” His interviewer cut him off twice and and asked what he thought again. Suddenly, Trump said McCain was a war hero multiple times, creating a debate about whether Trump meant that McCain is a war hero because being captured is heroic or that McCain only got hero status because he was captured, not because he was doing anything special. Amazingly, Trump got a standing ovation — and his interviewer, Frank Luntz, knew exactly what he was doing.
- Luntz is not a journalist. He is not a fellow politician or a Republican Party executive. He is a pollster who specializes in language, and though you might not have heard of him, the Republican candidates certainly have. He knows what words to use to make you like them more.
Censorship
=> ↺ Sri Lanka: Colombo Telegraph facing censorship despite presidential promise
- The Colombo Telegraph, Sri Lanka’s most iconoclastic investigative news website, is gearing up for this year’s second national election. And once again they face the threat of censorship — despite a presidential promise to bring it to an end.
- January’s polls saw the website blocked to domestic voters by order of authoritarian incumbent president Mahinda Rajapaksa. Unseated by shock winner Maithripala Sirisena, one of the victor’s first acts after the vote was to lift the official banning order.
=> ↺ Universal’s agents send Google a censorship demand for “127.0.0.1″
- 127.0.0.1 is the “loopback” address for your Internet stack, the address you tell your computer to visit when you want it to talk to itself.
- Links to 127.0.0.1 just go to your own computer — it’s like asking your computer to knock on its own door. Not understanding this is directly analogous to not being able to find your own ass with both hands.
=> ↺ Michigan Needs a New Voice: Challenging Censorship in the Wolverine State
- Earlier this year, the faculty advisor to Northern Michigan University’s college newspaper was outed for encouraging her students to file public records requests and draw attention to acts of secrecy performed by university administration. Noting that public records requests are legal and even encouraged as per Michigan’s Freedom of Information Act, it is unnerving to know that the accomplishments and reputations of our nation’s finest journalism educators can be undermined in the name of image control. But the Marquette-based college is not alone; the Rochester Talon, the nationally recognized and award-winning student newspaper of Rochester High School in Oakland County, has been subjected to prior review by school administration since January, when–in an attempt to raise awareness about changing smoking trends among students of legal smoking age–it ran a photo (shown below) of a teenager (lawfully, and in an off-campus location) smoking a hookah pen. The school administration’s swift retaliation made certain that no journalist would again dare attempt to inform the school community about an issue of social concern.
=> ↺ Turkey’s press council says censorship still in place
- Turkey’s Press Council has said censorship is still in place in Turkey, adding the country ranked 149th among 199 countries in press freedom reports, with 21 journalists in jail and a large number of ongoing cases filed against journalists, in a written statement issued to mark the 107th anniversary of Journalists Day.
=> ↺ Israeli artists sound alarm over growing censorship
- According to local filmmakers, the recent suppression of documentary Beyond The Fear is just one episode in a quickening erosion of artistic freedom in Israel.
- As Nanni Moretti’s Mia Madre began to roll on the opening night of the Jerusalem Film Festival in the picturesque Sultan’s Pool amphitheatre in early July, another screening was kicking off just metres above the spectators’ heads.
=> ↺ The Edge suspension triggers fears of media clampdown
- Putrajaya’s three-month ban on two local publications reveals a growing clampdown on press freedom in Malaysia and a bid to encourage self-censorship, human rights groups said today.
=> ↺ 14,000 sign petition against FPB online regulations
- “If the Film and Publication Board’s new internet regulations are implemented, they’d have the right to review and classify almost every blog, video, and personal website – even Avaaz campaigns like this one. Think apartheid-era censorship, reloaded and super-charged for an all-out assault on our digital freedoms.”
=> ↺ WeChat censorship report: 1.5% of posts get censored
- WeChat is China’s hottest social media app. But like internet services in China, discussion on WeChat isn’t entirely free – it is censored by Tencent in accordance with Chinese law. Just how censored is WeChat, and what exactly is being hidden from view? Those questions are the subject of an exhaustive new report from the University of Toronto’s Citizen Lab on WeChat censorship.
=> ↺ How Tight Is Internet Censorship In China? It Censors WeChat Even For Harmless Rumors
- The Citizen Lab report, published on Monday July 20, conducted an analysis over several thousand posts that were posted publically on the social messaging app WeChat’s public blog. WeChat is owned by Tencent.
=> ↺ Dear Instagram, I love you but you’re bringing me down
=> ↺ Robyn Lawley exposes Instagram’s censorship policy in a weekend Twitter rant
=> ↺ Bill raises online censorship fears
- Legislation that is being promoted as a way to update the country’s anti-discrimination rules has sparked controversy in the Lower House and society at large amid concerns that it could lead to censorship, particularly in online forums.
Privacy
=> ↺ Pakistan reportedly building a Mass Surveillance System reviving the NSA
- Pakistan has been striving to set up a refined National Security Agency-style public watching system capable of tapping the phone calls and emails of hundreds of millions of people globally.
=> ↺ Pakistan is spying on its citizens, says report by British NGO
- In 2013, Pakistan’s Inter-Services Intelligence commissioned a major surveillance system that taps into three international under-sea cables affecting communications of its citizens and also the neighbouring countries whose communications pass through its borders, according to the findings of a report published by the British NGO, Privacy International.
=> ↺ Surveillance in Pakistan exceeds legal capacity: report
- A report published by London-based advocacy group Privacy International claims that the practical surveillance capacity of the Pakistani government and Inter-Services Intelligence Agency (ISI) has exceeded local and international regulation laws for surveillance.
=> ↺ Pakistan Building Global Internet Surveillance To Rival NSA: Report
- Pakistan’s intelligence agency has been trying to build a sophisticated spying network that would rival the U.S. National Security Agency (NSA) in its scope, recording the phone calls and Internet data of hundreds of millions of people worldwide, according to a new report.
=> ↺ US, Pak discuss regional stability
- Top officials of US and Pakistan have stressed on achieving peace and stability in South-Asia and its economic development through enhanced cooperation.
=> ↺ The Ruskies are coming for you, NSA director tells City bankers
- You have to ask yourself: have trojan viruses and worms already been planted in peacetime, so that if we ever get into a serious confrontation with a potentially hostile state, then we will suddenly discover disruption?
=> ↺ How the NSA Is a Servant of Corporate Power
- Top-secret intercepts prove that economic spying by the U.S. is pervasive and wielded to benefit powerful corporate interests.
=> ↺ Documents Published by WikiLeaks Reveal the NSA’s Corporate Priorities
- For years public figures have condemned cyber espionage committed against the United States by intruders launching their attacks out of China. These same officials then turn around and justify the United States’ far-reaching surveillance apparatus in terms of preventing terrorist attacks. Yet classified documents published by WikiLeaks reveal just how empty these talking points are. Specifically, top-secret intercepts prove that economic spying by the United States is pervasive, that not even allies are safe and that it’s wielded to benefit powerful corporate interests.
=> ↺ NSA Appoints Obama Bundler As New Top Lawyer
- An Obama campaign bundler and prominent Washington, D.C., attorney has been tapped as the new general counsel for the National Security Agency, according to multiple sources familiar with the matter.
- Glenn Gerstell has decades of experience helping to run a major law firm, and he has served on public boards and a presidential commission. But while he is well known in Washington legal circles, he’s a relative outsider among national security lawyers and experts who have recently composed the recruiting pool for the top legal position at the nation’s largest intelligence agency.
=> ↺ Daily Beast: Obama Fundraiser Appointed to NSA Job
=> ↺ German officials use disposable phones over eavesdropping fears
=> ↺ German Authorities Investigate Surveillance Leaks
- The German domestic security service has urged the Federal Public Prosecutor to consider charges of treason as a result of two articles posted earlier this year by Netzpolitik.org, one of Germany’s most influential digital rights blogs. The articles reported on leaked documents regarding the German government’s mass surveillance plans. The German criminal code considers the leaking of state secrets to a foreign power, or to anyone else with the intention of damaging the Republic to be treason: the crime can be punished with up to five year’s imprisonment.
=> ↺ WikiLeaks: NSA spied on German FM for years, ‘helped CIA to kidnap and torture’
- A leaked NSA intercept shows that German FM Steinmeier was relieved to have “not received any definitive response” from the US on its rendition program at the time of the scandal, which exempted him from the need to act on the matter, WikiLeaks claims.
=> ↺ WikiLeaks: NSA monitored Germany’s discussions on CIA torture
- Secret-spilling organization WikiLeaks has published new evidence of what the group says shows the extent of the National Security Agency’s longstanding surveillance of top German officials.
- The latest release from the anti-secrecy group, published Monday on its website, includes a list of 20 targets, all pertaining to German politicians, who had been supposedly singled out by the NSA for the purpose of gathering intelligence on behalf of the U.S. government.
=> ↺ Germany Urges Answers over Reports NSA Spied on Foreign Minister
=> ↺ NSA spied on Steinmeier
=> ↺ New Wikileaks Release Shows The NSA Assisted The CIA In Kidnap And Torture Program
=> ↺ WikiLeaks: Steinmeier target of systematic NSA spying
=> ↺ Germany demands explanation from US over alleged NSA spying
=> ↺ Assange Indicates Intent to Help German MPs Investigate NSA Surveillance
=> ↺ Wikileaks’ Assange offers to help Germany’s NSA inquiry
=> ↺ Germany wants answers over alleged US spying
=> ↺ Whilst he was not the only one to look the other way, Steinmeier is currently the Foreign Minister of Germany
=> ↺ Germany confronts US envoy over spy scandal
=> ↺ German Officials to Ask US for Clarity on Latest Spy Claims
=> ↺ German Foreign Ministry presses US ambassador to clear up new report on alleged US espionnage
=> ↺ Germany must ‘throw off remains’ of allied occupation
=> ↺ WikiLeaks: Steinmeier Spying Was About Covering Up Torture
=> ↺ NSA Spied on German Officials to Help CIA Escape Scrutiny for Torture & Renditions
=> ↺ Assange ready to help Germany’s NSA inquiry
=> ↺ Wikileaks: NSA spied on German FM, provided assistance for torture
=> ↺ Germany to examine WikiLeaks claims of NSA spying
=> ↺ WikiLeaks: NSA spied on Germany foreign minister Frank-Walter Steinmeier
=> ↺ NSA ‘Outmaneuvered’ NSA Tapped Germany Phone Calls, Duped Europe Over CIA Treatment
- Following a meeting in the U.S. with then-Secretary of State Condoleezza Rice, the German Foreign Minister Frank-Walter Steinmeier allegedly, “seemed relieved that he had not received any definitive response from the U.S. secretary of state regarding press reports of CIA flights through Germany to secret prisons in Eastern Europe allegedly used for interrogating terrorism suspects.”
=> ↺ NSA Spied on Germany to Help CIA Avoid Torture Scrutiny
- Steinmeier, per the reports, didn’t appear too interested in investigating CIA torture flights going through German airports, and the NSA reported he seemed “thrilled” that his tactic of avoiding asking direct questions had succeeded, and relieved that Condi Rice had given him nothing he “had to” look too far into.
=> ↺ New WikiLeaks Data on NSA Shows German Gov’t ‘Vassal’ of US – Lawmaker
- The latest secret document revelations from WikiLeaks regarding US National Security Agency (NSA) espionage on Europeans, shows German government as a “complete vassal” of the United States, a member of the German Bundestag with the Die Linke party told Sputnik Tuesday.
=> ↺ New Data on NSA Spying on Germany Shows US Hypocrisy Toward Allies
- New WikiLeaks revelations about US National Security Agency (NSA) spying on the German Foreign Ministry reveal hypocrisy by the United States toward its allies, co-director of privacy activist group Code Red Simon Davies told Sputnik on Tuesday.
=> ↺ German spy chief sees reason to thank Snowden
- Germany’s domestic intelligence chief said Tuesday that the revelations by Edward Snowden have had at least one positive effect, by raising awareness about the importance of counter-espionage.
- Hans-Georg Maassen told a gathering of business leaders in the southwestern city of Stuttgart that after the Cold War ended, the issue of counter-espionage was seen as unimportant, German news agency dpa reported.
- “So maybe one can be grateful to Snowden that he has put a spotlight on the issue of counter-espionage in Germany,” dpa quoted Maassen as saying.
=> ↺ German spy chief thanks Snowden for raising counter-espionage awareness
=> ↺ NSA leaker Edward Snowden seeks return to US, on his terms
- Somewhere in the thousands of towering apartment blocks that ring the Russian capital, whistleblower Edward Snowden remains in hiding two years after outraging US intelligence agencies with revelations of their snooping into the private communications of millions of ordinary citizens.
- Mr Snowden’s release of classified files he took from his National Security Agency contractor’s job blew the lid off programs long said to be aimed at catching terrorists and keeping Americans safe. The leaks triggered a global debate on government trampling of personal liberties and led to last month’s congressional action to end the mass collection of telephone records, the first major restrictions on spy agency powers in decades.
=> ↺ NSA leaker Edward Snowden seeks return to U.S., on his terms
=> ↺ How Advertisers’ Cookies Are Helping the NSA’s Data-Collection Efforts
- On July 1, The Intercept published an exposé on and NSA program it called, “The NSA’s Google for the World’s Private Communications.” It turns out advertisers and the data they rely on are facilitating the government’s bulk surveillance.
=> ↺ Retired US Lawmaker Calls for Edward Snowden’s Public Execution
- Saxby Chambliss, a former Republican senator from Georgia, has called for National Security Agency whistleblower Edward Snowden to be publicly hanged.
=> ↺ US should hang NSA leaker Edward Snowden: Former senator
=> ↺ Ex-senator says Edward Snowden should be publicly hanged
=> ↺ Soundbites Former U.S. Sen. Saxby Chambliss on Edward Snowden: ‘We need to hang him on the court house square’
=> ↺ US should hang Edward Snowden, says former spy panel senator
=> ↺ Former Republican Rep. calls for the public murder of Edward Snowden
=> ↺ Chambliss: ‘We Need To Hang’ Snowden On The Courthouse Square
=> ↺ A Former Senator Has a Grisly Fate in Mind for Edward Snowden If He Comes Back to the US
=> ↺ Former Senator Declares Snowden Should Be Hanged “On the Courthouse Square”
=> ↺ Christie blasts Edward Snowden as a ‘piece of garbage’
- Gov. Chris Christie on Wednesday sharpened his verbal attacks on Edward Snowden for his disclosure of classified domestic surveillance programs, blasting the former NSA contractor as a “piece of garbage.”
=> ↺ Snowden Would Come Home If Politicians Promise Not to Hang Him
=> ↺ Eclair Bandersnatch: Street Artist for the Snowden Age
=> ↺ Glenn Greenwald: Why Americans Prefer Edward Snowden to Chelsea Manning
=> ↺ Snowden’s Plea to Top Technologists: Build an Internet for the People
- The internet is not for businesses, governments, or spies. It’s for users—and it’s up to the independent web engineers to keep it safe for them.
=> ↺ Build internet for users not government surveillance, Snowden tells IEFT
=> ↺ Snowden Describes How to Build an Internet Focused on Privacy
- Edward Snowden, a former CIA employee and NSA contractor who in 2013 blew the whistle on several government-run surveillance programs, envisions an Internet that largely focuses on privacy. He urges leading group of engineers to weave an interweb that prioritises on people’s privacy over anything else.
=> ↺ William Binney: NSA Claim Not to Be Mining Content Is an “Outright Lie”
- In a very powerful exclusive interview, I recently had the privilege of speaking to an American hero, William Binney, NSA whistleblower.
- We discussed how NSA mass data collection makes us LESS safe; how the intentions behind it are not misguided but positively nefarious; how the lies that have been told about it are snowballing, and how Rand Paul may uniquely represent an opportunity for change.
=> ↺ INTERVIEW: NSA Whistle-blower Says Agency’s Methods Make Us Less Safe
- We discussed how NSA mass data collection makes us LESS safe; how the intentions behind it are not misguided but positively nefarious; how the lies that have been told about it are snowballing, and how Rand Paul‘s presidential candidacy may uniquely represent an opportunity for change.
=> ↺ British police still investigating Snowden leak journalists
- Years after Edwards Snowden exposed the scale of NSA and GCHQ mass surveillance in a series of high profile leaks, UK police are still investigating the journalists involved in the expose to decide whether to prosecute.
- After refusing to confirm or deny whether the two-year investigation was still underway, the Metropolitan Police have revealed they are still examining the journalists who published the leaks by NSA contractor Edward Snowden.
- The disclosure was reported by the Intercept, who had been engaged in a Freedom of Information battle which has lasted seven months.
- In 2013 Cressida Dick, a high-ranking UK police officer, told a parliamentary inquiry the force was investigating whether the journalists should be charged for their reportage.
=> ↺ Russian Government Considering Delaying Data Localization Law
- A controversial data localization law in Russia that would require businesses to perform data storage and processing with servers located on Russian soil is set to go into effect on September 1, 2015, after an amendment passed late last year accelerated the law’s start date. Recently, the Association of European Businesses (“AEB”), an industry lobby group, raised concerns to the Russian government about industry’s ability to comply with the accelerated date. There is some indication that Russia may be considering giving businesses more time to comply.
=> ↺ What Americans Actually Do When the Government Is Watching
- The chilling effect of broad surveillance programs limits the exercise of the constitutional rights to freedom of speech, assembly, and religion, as well as equal protection under the law. It also causes professional harms—lawyers and journalists cannot do their jobs as well, and customers may avoid search engines and email servers run by U.S.-based companies.
=> ↺ Wikipedia Founder Demands Justice For NSA Spying
- In an interview with HuffPost Live on Tuesday, Wikipedia co-founder Jimmy Wales discussed changing American attitudes toward hacking and mass surveillance and expressed optimism about the lawsuit he helped bring against the government.
- Earlier this year, the Wikimedia Foundation, which Wales chairs, and the American Civil Liberties Union sued the National Security Agency. The suit, Wales explained, objects to the spy agency’s use of “upstream surveillance” methods, which Wales described as “collecting data on almost everybody’s Internet usage in a really wholesale manner.”
=> ↺ National Press Club Newsmaker Program: Will NSA Surveillance Reform Protect Public?
- Joseph P. Nacchio, the former chairman/CEO of Qwest Communications International and of two national commissions on security and infrastructure, will speak at a National Press Club Newsmaker news conference on Wednesday, July 29 – to explain why he believes the USA Freedom Act signed into law last month provides inadequate protection against National Security Agency’s (NSA) bulk data collection of the public’s electronic communications.
=> ↺ Missed Calls
- On March 20, 2000, as part of a trip to South Asia, U.S. President Bill Clinton was scheduled to land his helicopter in the desperately poor village of Joypura, Bangladesh, and speak to locals under a 150-year-old banyan tree. At the last minute, though, the visit was canceled; U.S. intelligence agencies had discovered an assassination plot. In a lengthy email, London-based members of the International Islamic Front for Jihad Against Jews and Crusaders, a terrorist group established by Osama bin Laden, urged al Qaeda supporters to “Send Clinton Back in a Coffin” by firing a shoulder-launched missile at the president’s chopper.
=> ↺ What does the panopticon mean in the age of digital surveillance?
- The parallel between Jeremy Bentham’s panopticon and CCTV may be clear, but what happens when you step into the world of data capture?
=> ↺ ‘Frontline of the battle is not tanks or planes – it’s cyberwarfare’
- People underestimate what cyberwarfare can do, but as the infrastructure of all our countries is run over the internet now, an attack on them could make society collapse within days, says Annie Machon, former MI5 agent.
- Germany passed legislation which requires over 2,000 essential service providers to implement new minimum information security standards. If they fail to do so within two years they are going to face fines of up to €100,000.
=> ↺ New Hampshire Bill Banning Warrantless Location Tracking Signed into Law
- A bill prohibiting law enforcement from obtaining location data from electronic devices without a warrant in most cases became law in New Hampshire this week. The new law not only protects privacy in New Hampshire, but also takes an important first step in addressing the growing federal surveillance state.
- Rep. Neal Kurk introduced House Bill 468 (HB468) back in January. The legislation prohibits any government agency from obtaining “location information from an electronic device without a warrant issued by a judge based on probable cause and on a case-by-case basis” with only a few exceptions. The law also prohibits law enforcement from placing tracking devices on any person, or their property, without a warrant.
=> ↺ HORNET: Tor-style dark web network allows high-speed anonymous web browsing
- A new anonymous web browser capable of delivering encrypted data across the dark web at high speeds has been developed by security researchers.
- HORNET (High-speed Onion Routing at the Network Layer), created by researchers from Zurich and London, is capable of processing anonymous traffic at speeds of more than 93 Gb/s, paving the way for what academics refer to as “internet-scale anonymity”.
- The research paper detailing the anonymity network reveals that it was created in response to revelations concerning widespread government surveillance that came to light through the US National Security Agency (NSA) whistleblower Edward Snowden.
=> ↺ Poles Should Expect Outsourcing of Surveillance to the NSA (Gazeta Wyborcza, Poland)
- On February 6 next year, legal provisions that allow police and the secret services to conduct surveillance will disappear. All of it! This will be the result of a judgment by the Constitutional Court a year ago – and the government has yet to prepare regulations to replace them. It was put on its work schedule in March, but at this point there isn’t even an outline of how to approach the project.
- A few weeks ago, the Sejm Speaker and a group of senators from the Civic Platform (PO) presented a plan to the lower chamber on how to implement Court decision as sparingly as possible. For example, the Court held that it’s necessary to establish the maximum time that surveillance of an individual is permitted. The senators propose that police should be limited to a year and a half. Other services, however, [like the intelligence agencies], have no such limitations; although the Court didn’t exempt them from its decision.
=> ↺ Palantir Raises $450 Million, Now Valued At $20 Billion
- Palantir, the makers of a data analytics platform used by government agencies, law enforcement, as well as financial, insurance, retail and healthcare industries, has confirmed by way of an SEC filing that it has raised an additional $450 million in a new round of funding. The filing indicates the company had offered $500 million in stock, which means $50 million more could still be in the works. According to a report by the WSJ, the funding was raised at a valuation of $20 billion, up from its late 2014 valuation of $15 billion.
=> ↺ Confirmed: Palantir raised a huge $450 million investment
- Palantir is a big-data company that can sift through vast amounts of data to find patterns, answer questions, and solve problems. It serves various government agencies including the military, law enforcement and spy agencies like the CIA and NSA. It also counts Wall Street financial firms, pharmaceutical firms and other big companies as clients.
=> ↺ Hacking Team built drone-based Wi-Fi hacking hardware
- Leaked e-mails from the Italy-based computer and network surveillance company Hacking Team show that the company developed a piece of rugged hardware intended to attack computers and mobile devices via Wi-Fi. The capability, marketed as part of the company’s Remote Control System Galileo, was shown off to defense companies at the International Defense Exposition and Conference (IDEX) in Abu Dhabi in February, and it drew attention from a major defense contractor. But like all such collaborations, it may have gotten caught up in the companies’ legal departments.
=> ↺ Large Intel Operations Challenged by Prevalence of Leaks – US Ex-Official
- Former White House Chief Privacy Officer Peter Swire told Sputnik that the likelihood of secrets coming to light limits the degree of control a government can exert over its people.
=> ↺ Collins, Warner look to give DHS more power to police federal networks
- The hack of the Office of Personnel Management databases is reverberating on Capitol Hill. The first phase of the response was a series of withering hearings that put (now former) OPM Director Katherine Archuleta in the spotlight, along with agency CIO Donna Seymour.
=> ↺ Encryption Protects Free Speech: Lavabit’s Ladar Levison on Online Freedom, Net Neutrality, and Cryptography
- “If we are going to continue to preserve our right to free speech in the electronic age, then we need to use tools like encryption,” says Ladar Levison, founder of the Lavabit, the encyrpted email service used by Edward Snowden prior to the NSA leaks.
- Levison shut down Lavabit after the FBI asked for access to all of his users data during what many suspect was a hunt for Snowden. He talked about that decision in an interview with Reason TV last year.
- Reason TV’s Zach Weissmueller sat down with Levison at Freedom Fest in Las Vegas this July to discuss the latest developments in the Dark Mail Alliance, a collaborative efforts by some of the world’s top cryptographers to create a user-friendly email service that encrypts data on the user devices themselves, rather than over a server.
=> ↺ Legal pitfalls of outsourcing to the cloud
- Cloud security and privacy has become critical in the wake of the Prism scandal, said Cronje.
=> ↺ Nothing Off Limits: UK Politicians Take Govt to Court Over Mass Spying
- Three British politicians, including a current MP, are taking the UK government to the country’s top secret security court over claims intelligence agencies are unlawfully intercepting the communications of MPs.
=> ↺ Feds Get the Power to Seize Medical Records on ‘Fishing Expedition’ Investigations with No Subpoena from a Judge
=> ↺ Letter: Obama’s data mining
- Not only has the NSA been collecting our personal information, but now it has finally leaked that the Obama administration has been undertaking a massive program to mine and collect personal data on your health, credit cards, jobs and movements.
=> ↺ 9 ways developers can rebuild trust on the Internet
- Public keys, trusted hardware, block chains — developers should use these tech tools to help secure the Internet for all
=> ↺ Korean Spy’s Suicide Note Asks Hard Questions
- Days ago South Korea’s National Intelligence Service (NIS) announced that it too had purchased hacking tools from cyber security pariahs, the Italian Hacking Team. Now the organization reveals one of its agents has been found dead in his car. The spy’s body was discovered beside a supposed suicide note that comments on the recent NIS revelation.
- The NIS was originally established as the Korean Central Intelligence Agency in 1961. In 1999 the organization changed its moniker to reflect its present mission which reflects something of a mix between Foreign Intelligence and NSA-level Domestic Spying – despite what its officials claim.
=> ↺ New Wassenaar Export Control Rules Will Make The Web Less Secure, Argues Google
- In a recent post, Google said the newly proposed export controls for vulnerability research from the U.S. Commercial Department would make finding bugs and reporting them much more difficult. Instead of the new rules protecting Internet users, they might even have the opposite effect and make the Web less secure overall.
=> ↺ America’s tweaks to weapons trade pact ‘will make web less secure’
- The period for comments on proposed amendments to the Wassenaar Arrangement – which governs the export of guns, lasers and proper weaponry, and computer hardware and software – ends today. So far, the tweaks concerning IT security products have received an overwhelming thumbs-down from the technology community.
- In May the US Bureau of Industry and Security (BIS) suggested altering the Wassenaar Arrangement to include controls on the selling of state-sponsored or commercial surveillance software among the 41 countries that abide by the agreement.
- But the amendments were so loosely written that they would also ban the trade in vulnerability exploits, including possibly making bug bounty programs illegal, and criminalizing many of the tools used by legitimate security researchers to test software for flaws.
=> ↺ Why appeasing governments over encryption will never work
- Ever since the internet emerged into public view in the 1980s, a key question has been whether digital technology would pose an existential challenge to corporate and governmental power. In this context, I am what you might call a recovering utopian – “utopian” in that I once did believe that the technology would put it beyond the reach of state and corporate agencies; and “recovering” in the sense that my confidence in that early assessment has taken a hammering over the years. In that period, technology has sometimes trumped politics and/or commercial power, but at other times it’s been the other way round.
=> ↺ Self-Censoring Font Redacts Words the Feds Are Watching For
=> ↺ Private data, public life
- In the digital world we live in– from the videos shared on social networks to location-aware apps on mobile phones to log-in information for connecting to our email to our search history — our data is no longer private, though we have every right to it
Civil Rights
=> ↺ Are Arabs white?
- In the US, race has always mattered. Whiteness in particular has mattered most, standing as the seal of civilisation and the gateway towards citizenship.
- Since 1944, Arabs have been deemed white by law. Many Arabs still embrace and defend that status today.
=> ↺ Palace fury over Hitler salute images is guff
- “England’s difficulty is Ireland’s opportunity”. Anyone who heard that in childhood as a wise saying, not to be questioned, was being told their elders believed the Nazis were not all bad.
=> ↺ British archives hiding royal family’s links to anti-Semitism in 1930s, says historian
- While research hitherto has focused on the support German aristocrats secretly provided Hitler within Germany, Urbach’s book discusses an additional, international dimension to this secret diplomatic back channel, most notably from members of the British royal family.
=> ↺ The Queen’s Nazi salute: Historical revisionism in the service of state censorship
- Writing in the Telegraph, Conservative London mayor Boris Johnson thundered that it “makes my blood boil to think that anyone should use this image in any way to impugn the extraordinary record of service of Her Majesty to this country.”
- She was “a tiny child, and she is making that parodic salute long before her family could possibly have grasped what Hitler and Hitlerism was really all about.”
- In the Guardian, columnist Michael White wrote that the “Queen’s Nazi salute [was] a sign of ignorance shared by many in scary times.” The royal family’s “wobbly views” were, he claimed, shared by the “great British public.”
- Elsewhere, military historian James Holland opined, “I don’t think there was a child in Britain in the 1930s or 40s who has not performed a mock Nazi salute as a bit of a lark. It just shows the Royal Family are as human as the next man.”
=> ↺ It’s true, teens can’t be punished like adults
- In the past decade, advances in neuroscience have given new insights into old problems, ranging from drug addiction and post-traumatic stress disorder to adolescent shenanigans.
- For example, if the new neuroscience shows that a drug addict’s brain is physically dissimilar to a non-addict’s brain in ways that make the former more prone to addiction, then we must ask if his infractions of the law ought to be treated less punitively.
=> ↺ Race should not be unthinkingly trotted out to gag free speech
=> ↺ Traumatized Amos Yee is open for Donation
- 16-year-old traumatized, Amos Yee is open for cash donation, who had already served four weeks in jail.
=> ↺ We welcome criticism within constraints, says Singapore PM Lee Hsien Loong
- Mr Lee was asked about the cases of Amos Yee and Roy Ngerng – the former found guilty of insulting a religion, the latter of defaming the Prime Minister – in an interview with Time.
=> ↺ AWARE statement on the prosecution of Amos Yee
- AWARE has grave concerns about the negative implications of the recent prosecution of Amos Yee. This statement focuses on harassment and hate speech as these areas are closest to our work, although we also share concerns that others have raised about the importance of upholding freedom of expression, children’s rights, and the integrity of people with autism and mental health issues.
=> ↺ Teen blogger Amos Yee files appeal
=> ↺ Amos Yee files appeal against conviction and sentence
=> ↺ Singaporean blogger Amos Yee appeals against conviction, sentence
- Teenage blogger Amos Yee, who received a four-week jail sentence for posting an obscene image online and posting content intended to hurt the religious feelings of Christians, is appealing against both his conviction and the sentence.
=> ↺ Lawyers want judge who’s not Christian for Amos Yee appeal
- The lawyers for teenage blogger Amos Yee want his appeal to be heard by a non-Christian judge when it goes before the High Court.
- The 16-year-old will be appealing against both his conviction and sentence. His lawyer Alfred Dodwell filed the notice of appeal on July 9, three days after Yee was released from remand.
Intellectual Monopolies
=> ↺ Corporate lobbying expense jumps as U.S. trade debate rages
- Washington lobbying by companies and groups involved in global trade boomed in the past nine months, records show, as Congress debated a landmark trade pact proposed by President Barack Obama, the 12-nation Trans-Pacific Partnership (TPP).
- Lobbying expenditures by members of a pro-TPP coalition increased to $135 million in the second quarter of 2015, up from $126 million in the first quarter and $118 million in the fourth quarter of 2014, according to Senate Office of Public Records reports reviewed by Reuters.
Trademarks
=> ↺ JDate Is Suing JSwipe Over The Letter ‘J’, Here’s What My Bubbie Would Have Said
- Today, Forbes unearthed a lawsuit from late last year that Jewish dating site JDate’s parent company filed against an app called JSwipe (also aimed at Jewish folk). It’s over the use of the letter J. The case is set to pick up again next month.
=> ↺ Jdate Sues Competitor Jewish Dating App For Using The Letter “J”
- Jdate, the popular dating service responsible for more Jewish hookups than a bottle of Manischewitz, is playing hardball in the dog-eat-dog world of nice Jewish match-making.
- Jdate’s parent company, Spark Networks, discreetly filed a lawsuit late last year against Jswipe, the ‘Tinder for Jews’ dating app, claiming intellectual property over the letter “J” within the Jewish dating scene (the company refers to the branding as the “J-family”).
=> ↺ Members Of The ‘Tribe’ Swipe For A Shidduch
- Over the sounds of the packed crowd at the lower level of Noho hotspot “Acme,” on Tuesday evening, one phrase could consistently be heard: “I work in real estate.”
=> ↺ Jdate Sues Competitor Jewish Dating App For Using The Letter “J”
- Additionally, Jdate claims it owns the patent on software that “confidentially determines matches and notifies users of mutual matches in feelings and interests.” Jswipe, like Tinder, notifies users when their romantic interest ‘swipes right’ on their picture, violating Jdate’s patent.
Copyrights
=> ↺ A 1990s anti-piracy law is why you haven’t seen the hacked list of Ashley Madison customers
- “Using the Digital Millennium Copyright Act (DMCA), our team has now successfully removed all posts related to this incident as well as all Personally Identifiable Information (PII) about our users published online,” said Ashley Madison parent company Avid Life Media in a statement. “We have always had the confidentiality of our customers’ information foremost in our minds and are pleased that the provisions included in the DMCA have been effective in addressing this matter.”
=> ↺ Response to IPO consultation on raising jail sentences for online infringement
- The Intellectual Property Office is consulting on proposals to increase prison penalties for criminal online copyright infringement to 10 years to bring them to the same levels as those for similar physical copyright infringement.
Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages. Permalink Send this to a friend
=> Techrights
➮ Sharing is caring. Content is available under CC-BY-SA.
Proxy Information
- Original URL
- gemini://gemini.techrights.org/2015/07/25/plasma-mobile
- Status Code
- Success (20)
- Meta
text/gemini;lang=en-GB
- Capsule Response Time
- 352.178806 milliseconds
- Gemini-to-HTML Time
- 39.861595 milliseconds
This content has been proxied by September (ba2dc).