416 lines
18 KiB
Plaintext
416 lines
18 KiB
Plaintext
|
|
Episode: 1125
|
||
|
|
Title: HPR1125: TGTM Newscast for 11/21/2012
|
||
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr1125/hpr1125.mp3
|
||
|
|
Transcribed: 2025-10-17 19:24:39
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
.
|
||
|
|
.
|
||
|
|
You're listening to Toa Geek to Me News.
|
||
|
|
Number 81, record for Wednesday, November 21, 2012.
|
||
|
|
You're listening to the Tech Only Hacker Public Radio
|
||
|
|
Edition to get the full podcast, including political,
|
||
|
|
commentary, and other controversial topics.
|
||
|
|
Please visit www.toageektoMe.us.
|
||
|
|
Here are the vials statistics for this program.
|
||
|
|
Your feedback matters to me.
|
||
|
|
Please send your comments to DG at deepgeek.us.
|
||
|
|
The webpage for this program is at www.toageektoMe.us.
|
||
|
|
You can subscribe to me on Identica as the username DeepGeek
|
||
|
|
or you could follow me on Twitter.
|
||
|
|
My username there is DGTGM, as in DeepGeek Toa Geek to Me.
|
||
|
|
Another tech roundup from EFF.log, dated November 8, 2012 by Henny Fakuri.
|
||
|
|
Court blocks Proposition 35's restriction on anonymous speech.
|
||
|
|
A few hours after EFF and the ACLU of North California filed a class action law
|
||
|
|
students in Francisco.
|
||
|
|
In San Francisco, federal court challenging California's
|
||
|
|
recently enacted Proposition 35, the court issued a temporary restraining
|
||
|
|
order blocking implementation of the initiative due to the existence of
|
||
|
|
serious questions about whether it violated the First Amendment.
|
||
|
|
Proposition 35 is ostensibly about increasing punishment for human
|
||
|
|
traffickers, but would also require all registered sex affairs in
|
||
|
|
California to turn over a list of all their internet identifiers
|
||
|
|
and service providers to law enforcement, leading up to the election
|
||
|
|
re-urge California voters to reject it, wearing this would result in a
|
||
|
|
significant restriction of free speech on the internet.
|
||
|
|
We want to loan a criticizing Proposition 35, newspapers like the LA Times
|
||
|
|
and Sacramento Bee spoke out against the initiative too.
|
||
|
|
Unfortunately, yet unsurprisingly, California voters overwhelmingly approved
|
||
|
|
the initiative on election night.
|
||
|
|
Wednesday morning, we filed suit, auging Proposition 35 violates the
|
||
|
|
First Amendment because requiring people, even unpopular people, to give up
|
||
|
|
their ability to speak freely and anonymously, chills free speech.
|
||
|
|
Proposition 35 eliminates the ability of a whole class of people, 73,000
|
||
|
|
individuals in California, to speak anonymously online by forcing them to
|
||
|
|
turn over any identifier they use, whether it's anonymous or Joan Jo, or their real name.
|
||
|
|
Plus, it requires disclosure of information about online accounts
|
||
|
|
unrelated to criminal activity, like Yelp or Amazon.com,
|
||
|
|
and most troubling it allows the government to monitor and record a wide
|
||
|
|
swath of innocent internet activity from a registrant with a fancy football
|
||
|
|
team to the one who comments on a political discussion group.
|
||
|
|
While we certainly believe that human trafficking is a terrible crime,
|
||
|
|
requiring registrants to turn over online identifiers
|
||
|
|
doesn't combat this issue.
|
||
|
|
Instead, it creates a dangerous slippery slope, like mandatory DNA collection
|
||
|
|
before it, what begins with sex offense inevitably expands as law enforcement
|
||
|
|
gets looked to accessing this online data and starts demanding more and more of it.
|
||
|
|
The temporary restraining order is an important first step in ensuring that
|
||
|
|
the First Amendment isn't the casualty of a well-intentioned but ultimately
|
||
|
|
overbroad and dangerous initiative.
|
||
|
|
In stopping the implementation of Proposition 35, the court recognized the important
|
||
|
|
issues that need to be considered before the law could go into effect.
|
||
|
|
A hearing is now scheduled for December 17th on whether the court should grant
|
||
|
|
a permanent injunction, striking down the law permanently.
|
||
|
|
From eff.log,
|
||
|
|
the end of November 14th, 2012 by Henny Fakuri and Kurt Opchall and Rainy Friedman.
|
||
|
|
When will our e-mail betray us?
|
||
|
|
An e-mail privacy primer in light of the proteus saga?
|
||
|
|
The unfolding scandal that led to the resignation of General David Patreus,
|
||
|
|
the director of the Central Intelligence Agency,
|
||
|
|
starred with some purportly harassing e-mail sent from pseudonymous e-mail
|
||
|
|
accounts to Jill Kelly.
|
||
|
|
After the FBI kicked its investigation into high gear,
|
||
|
|
it identified the sender as Polar Broadwell and, ultimately,
|
||
|
|
read massive amounts of private e-mail messages that uncovered an affair
|
||
|
|
between Broadwell and Patreus, and now the investigation has
|
||
|
|
expanded to include General John Allen's e-mails with Kelly.
|
||
|
|
We've received a lot of questions about how this works.
|
||
|
|
What legal process the FBI needs to conduct its e-mail investigation?
|
||
|
|
The short answer? It's complicated.
|
||
|
|
The Electronic Communications Privacy Act,
|
||
|
|
ECAPA, is a 1986 law that Congress enacted to protect U.S. privacy
|
||
|
|
in electronic communications like e-mail and instant messages.
|
||
|
|
ECAPA provides scant protection for your identifying information,
|
||
|
|
such as the IP address used to access an account.
|
||
|
|
While Polar Broadwell reportedly created a new pseudonymous account
|
||
|
|
for the allegedly harassing e-mails to Jill Kelly,
|
||
|
|
she apparently did not take steps to disguise the IP number
|
||
|
|
her messages were coming from.
|
||
|
|
The FBI could have obtained this information with Justice
|
||
|
|
Appena to the service provider,
|
||
|
|
but obtaining the account's IP address alone
|
||
|
|
does not establish the identity of the e-mail sender.
|
||
|
|
Broadwell apparently accessed the e-mails from hotels
|
||
|
|
and other locations, not her home,
|
||
|
|
so the FBI cross-reference the IP addresses
|
||
|
|
of these Wi-Fi hotspots against guest lists
|
||
|
|
from other cities and hotels looking for common names.
|
||
|
|
If Broadwell wanted to stay anonymous,
|
||
|
|
a new e-mail account combined with Open Wi-Fi was not enough.
|
||
|
|
The ACLU has an in-depth write-up of the surveillance
|
||
|
|
and security lessons to be learned from this.
|
||
|
|
After the FBI identified Broadwell, they searched her e-mail.
|
||
|
|
According to news reports, the affair between Portrayus
|
||
|
|
and Broadwell lasted from November the 2011 to July 2012.
|
||
|
|
The harassing e-mails sent by Broadwell to Jill Kelly
|
||
|
|
stored in May of 2012 and Kelly notified the FBI shortly thereafter.
|
||
|
|
Thus in the summer of 2012, when the FBI was investigating
|
||
|
|
the bulk of the e-mails would be less than 180 days old.
|
||
|
|
This 180 day old dividing line is important for determining
|
||
|
|
how ECPA applies to e-mail.
|
||
|
|
Compared to identifying information,
|
||
|
|
ECPA provides more legal protection for the contents of your e-mail
|
||
|
|
but with gaping exceptions.
|
||
|
|
While a small but increasing number of federal courts have found
|
||
|
|
that the Fourth Amendment requires a warrant for all e-mail,
|
||
|
|
the government claims ECPA only requires a warrant for e-mail
|
||
|
|
that is stored for 180 days or less.
|
||
|
|
But as the Department of Justice manual for searching
|
||
|
|
and seizing e-mail makes clear, the government believes
|
||
|
|
this only applies to unopened e-mail.
|
||
|
|
Other e-mail is fair game, with only a subpoena,
|
||
|
|
even if the messages are less than 180 days old.
|
||
|
|
According to reports, Betrayus and Broadwell
|
||
|
|
adopted a technique of drafting e-mails
|
||
|
|
and reading them in the draft folder rather than sending them.
|
||
|
|
The DOJ would likely consider draft messages as open e-mail
|
||
|
|
and therefore not entailed to the protection of a search warrant.
|
||
|
|
In a nutshell, although ECPA requires a warrant
|
||
|
|
for the government to obtain the contents of an e-mail
|
||
|
|
stored online for less than 180 days,
|
||
|
|
the government believes the warrant requirement doesn't apply for e-mail
|
||
|
|
that was opened and left on the server,
|
||
|
|
the typical scenario for web mail systems like Gmail.
|
||
|
|
Even if the messages are less than 180 days old,
|
||
|
|
so under the government's view, so long as the e-mails
|
||
|
|
had been opened or were saved in the draft folder,
|
||
|
|
only a subpoena was required to look at the contents
|
||
|
|
of Broadwell's e-mail account.
|
||
|
|
Confused? Well, here's where things get really complicated.
|
||
|
|
The government's view of the law was rejected by a 9th Circuit Court of Appeals,
|
||
|
|
the Federal Appellate Court that covers the Western United States,
|
||
|
|
including California, and the home to many online e-mail companies,
|
||
|
|
and the service that hosts their messages.
|
||
|
|
As a result, the DOJ manual notes that agents outside of the 9th Circuit
|
||
|
|
can therefore obtain such e-mail and other stored
|
||
|
|
electrical wire communications in electronic storage,
|
||
|
|
more than 180 days using a subpoena,
|
||
|
|
but reminds agents in the 9th Circuit to get a warrant.
|
||
|
|
News reports show that the FBI agents involved in the portrayal scandal
|
||
|
|
were in Tampa, Florida.
|
||
|
|
Thus, according to the DOJ manual,
|
||
|
|
they did not need to get a warrant,
|
||
|
|
even if the e-mail provider was in California,
|
||
|
|
like, for example, Gmail.
|
||
|
|
Law enforcement elsewhere may continue to apply
|
||
|
|
the traditional narrow interpretation of electronic storage,
|
||
|
|
even when the data sort is within the 9th Circuit.
|
||
|
|
A subpoena for e-mail content would generally require notice
|
||
|
|
to the subscriber, though another section of Equipa
|
||
|
|
allows for delayed notice for up to 90 days.
|
||
|
|
The FBI interviewed Broadwell for the first time in September,
|
||
|
|
about 90 days after the investigation began in June.
|
||
|
|
However, many providers nevertheless
|
||
|
|
protect their users by following the 9th Circuit rule
|
||
|
|
and insist upon a warrant for the contents of all e-mail.
|
||
|
|
In EFF's experience, the government will seek a warrant
|
||
|
|
rather than litigate the issue.
|
||
|
|
Thus, assuming the service provider stepped up,
|
||
|
|
it is likely that the government used a warrant
|
||
|
|
to obtain access to the e-mails at issue.
|
||
|
|
To either ask this far call, follow links in the show notes.
|
||
|
|
From torrentfreak.com, by Ernesto Day, November 18, 2012,
|
||
|
|
mega-uploads search warrant requests ignored, massive,
|
||
|
|
non-infringing use.
|
||
|
|
In the wake of the January shutdown of mega-upload,
|
||
|
|
many of the site's legitimate users complained
|
||
|
|
that their personal files had been lost.
|
||
|
|
Among these users are many people in the US military
|
||
|
|
who used the site to share pictures and videos with family.
|
||
|
|
Torrentfreak learned that at least 15,634 soldiers
|
||
|
|
had accounts at mega-upload between them
|
||
|
|
sharing hundreds of thousands of files.
|
||
|
|
One of the users, entrepreneur Kyle Goodwin,
|
||
|
|
asked the court to return his files.
|
||
|
|
As part of this request, his attorneys filed
|
||
|
|
a motion to unseal the mega-upload search warrant
|
||
|
|
so they can see on what grounds the data was taken.
|
||
|
|
This week, Judge O'Grady granted the request
|
||
|
|
and ordered the release of the warrants
|
||
|
|
and their applications albeit redacted.
|
||
|
|
This means we can now see how the US put forward its request
|
||
|
|
to seize the domains and servers.
|
||
|
|
The search warrant applications don't offer any new facts
|
||
|
|
and mostly recite what has already been written in the indictment.
|
||
|
|
The government describes mega-upload as nothing more than a place
|
||
|
|
where copyright infringing files are stored
|
||
|
|
and this is what the judge signed off on.
|
||
|
|
However, what is striking is that none of the release records
|
||
|
|
even mentioned legitimate use of the site.
|
||
|
|
In other words, the rights of mega-uploads
|
||
|
|
legitimate users were never taken into consideration.
|
||
|
|
Speaking with Torrentfreak, Kim.com shares our surprise
|
||
|
|
knowing that nearly half of all files stored mega-upload
|
||
|
|
were never downloaded.
|
||
|
|
Quote, the legitimate use was completely ignored
|
||
|
|
in the seizure warrant applications.
|
||
|
|
Almost 50% of the files stored mega-upload
|
||
|
|
didn't have a single download.
|
||
|
|
There was massive, non-unfringing use
|
||
|
|
by those who just wanted to store data in the cloud.
|
||
|
|
Unquote.com says.
|
||
|
|
The lack of discussion about the many legitimate users
|
||
|
|
of mega-upload is concerning.
|
||
|
|
Several of the allegations made against mega-upload
|
||
|
|
could easily apply to other hosting and video services.
|
||
|
|
The FBI, for example, explains in detail
|
||
|
|
how their undercover agent was able to upload
|
||
|
|
view and download copyright videos,
|
||
|
|
something that's also quite common on YouTube.
|
||
|
|
More direct allegations against mega-upload
|
||
|
|
are misleading.com.
|
||
|
|
For example, that the mega-upload team failed
|
||
|
|
to delete infringing files that were pointed out
|
||
|
|
in a criminal search warrant back in 2010.
|
||
|
|
Quote, a member of the mega-conspiracy
|
||
|
|
informed several of his co-conspirators at that time
|
||
|
|
that he located the named files using internal searches
|
||
|
|
of the mega-conspiracy systems.
|
||
|
|
As of November 18, 2011,
|
||
|
|
36 of the 39 infringing copies of the copyright motion pictures
|
||
|
|
were still being stored on service controlled
|
||
|
|
by the mega-conspiracy, the DOJ rights.
|
||
|
|
However, .com now explains that they didn't touch the files
|
||
|
|
because they were never asked to do so
|
||
|
|
and didn't want to interfere with evidence
|
||
|
|
in a criminal case.
|
||
|
|
A document seen by Torrent Freak acts this up.
|
||
|
|
Quote, the FBI asked us for uploader information
|
||
|
|
regarding 39 files and told us to keep
|
||
|
|
their investigation confidential.
|
||
|
|
We assisted and obviously didn't touch the uploader accounts
|
||
|
|
or files because of the ongoing investigation.com.
|
||
|
|
Quote, to use this against us and to tell a judge
|
||
|
|
that the mega-upload domain seizures justified
|
||
|
|
because we have not removed those 39 files
|
||
|
|
is totally unethical and misleading.
|
||
|
|
Quote, he adds, to read the rest of this article
|
||
|
|
following in the show notes.
|
||
|
|
From Torrent Freak.com, by our nestoded number 15th, 2012,
|
||
|
|
Verizon will reduce speeds of repeated Bitcoin Torrent Pirates.
|
||
|
|
Last year, the MPAA and RIA teamed up
|
||
|
|
with five major internet providers
|
||
|
|
in the United States to launch a center
|
||
|
|
for copyright information, the CCI.
|
||
|
|
The prize agreed on a system
|
||
|
|
through which subscribers all warned
|
||
|
|
that their copyright infringements have been observed
|
||
|
|
by rights holders after several warnings,
|
||
|
|
ISPs may then take a variety of repressive measures
|
||
|
|
to punish the alleged infringers.
|
||
|
|
From leaked AT&T training documents,
|
||
|
|
we learned that the company will block users' access
|
||
|
|
to popular websites until they complete
|
||
|
|
a copyright education course.
|
||
|
|
However, none of the participating internet providers
|
||
|
|
have publicly commented on the measures
|
||
|
|
they plan to take until now.
|
||
|
|
During a panel discussion hosted by the New York Chapter
|
||
|
|
of the Internet Society, Verizon and Time Warner Cable
|
||
|
|
unveiled details of their plans.
|
||
|
|
Link, hoeing, vice president of Internet
|
||
|
|
and Technology Issues for Verizon,
|
||
|
|
said his company will employ a three-stage process,
|
||
|
|
the first to alert the result in a simple notification email,
|
||
|
|
informing the users that their connection has been flagged
|
||
|
|
for copyright infringements.
|
||
|
|
After the second warning comes the acknowledgement phase,
|
||
|
|
and which a pop-up is delivered to users.
|
||
|
|
Once received, subscribers are required to read
|
||
|
|
and confirm a process designed to ensure
|
||
|
|
that they are aware of the unauthorized sharing
|
||
|
|
that's taken place via their account.
|
||
|
|
If the infringements continue,
|
||
|
|
punishments become a reality on the 5th and 6th alerts.
|
||
|
|
Hearing said that these repeated infringers
|
||
|
|
will have their internet connections throttled,
|
||
|
|
resulting in significantly slower download speeds.
|
||
|
|
This throttling is temporary and will be lifted after two
|
||
|
|
or three days to read the RSSOGLE follow links in the show notes.
|
||
|
|
From TechDirt.com by Timothy Gagna,
|
||
|
|
date November 16, 2012.
|
||
|
|
Taliban spokesman accidentally copies mailing lists
|
||
|
|
on press release email.
|
||
|
|
You know that mistake you make where you want to send an email
|
||
|
|
to a bunch of people,
|
||
|
|
typically annoying chain letters about finding love next week
|
||
|
|
if they forward it to 20 people immediately.
|
||
|
|
Luck just doesn't wait around you now.
|
||
|
|
But you don't want to expose all of your friends
|
||
|
|
and family's emails so you blind copy everyone,
|
||
|
|
except you didn't.
|
||
|
|
Now you're the jackass sending emails with 40 addresses,
|
||
|
|
listed and your grandmother hates you for spamming her?
|
||
|
|
Well, funny story.
|
||
|
|
It turns out that one of the few things
|
||
|
|
we frame loving folks in the states
|
||
|
|
haven't common without Taliban enemies
|
||
|
|
is an amusing and capacitive check
|
||
|
|
to whom we're sending our emails.
|
||
|
|
Take a look at the oops Taliban spokesperson,
|
||
|
|
Kari Husef Hamedi made,
|
||
|
|
when he accidentally c-seed rather than b-c-seed,
|
||
|
|
the Taliban's mailing list on a press release email
|
||
|
|
this past Saturday.
|
||
|
|
Quote,
|
||
|
|
In a Dilbert-esque faux pas,
|
||
|
|
a Taliban spokesperson sent out a routine email
|
||
|
|
last week with one notable difference.
|
||
|
|
He publicly c-seed the names
|
||
|
|
of everyone on his mailing list.
|
||
|
|
The names were disclosed in an email
|
||
|
|
by Kari Husef Hamedi,
|
||
|
|
an official Taliban spokesperson on Saturday.
|
||
|
|
The email was a press release he received from the account
|
||
|
|
of Zabahula Mushad-Muhadid,
|
||
|
|
another Taliban spokesperson.
|
||
|
|
Kari Husef Hamedi then forward Muhadid's email
|
||
|
|
to the full Taliban mailing list,
|
||
|
|
but rather than using the b-c-seed function
|
||
|
|
or blind-carbon copy which keeps email addresses private,
|
||
|
|
Kari Husef Hamedi made the addresses public.
|
||
|
|
I'm sure years from now,
|
||
|
|
when the CIA has once again employed the Taliban
|
||
|
|
to fire on our behalf against the Chinese,
|
||
|
|
Australian, alien alliance,
|
||
|
|
we'll look at back on this
|
||
|
|
and have a nice laugh.
|
||
|
|
But there's no understanding that this is a massive screw-up.
|
||
|
|
Sure, most of the folks on the distribution list
|
||
|
|
were journalists,
|
||
|
|
but exposing their names that way,
|
||
|
|
particularly for those that are working
|
||
|
|
within Afghanistan,
|
||
|
|
isn't a good thing.
|
||
|
|
Besides that,
|
||
|
|
not all the people who were exposed were journalists.
|
||
|
|
Quote.
|
||
|
|
The list also includes an address
|
||
|
|
appearing to belong to a provincial governor,
|
||
|
|
an Afghan legislature,
|
||
|
|
several academics and activists,
|
||
|
|
an Afghan consultative committee,
|
||
|
|
and a representative of Gul Budin,
|
||
|
|
Hekbata,
|
||
|
|
an Afghan warlord whose outlawed group,
|
||
|
|
Hezboe Islami,
|
||
|
|
is believed to be behind several attacks
|
||
|
|
against coalition troops.
|
||
|
|
Somehow, I don't see this making the Taliban brass very happy,
|
||
|
|
and Senator Joe Lieberman wants the internet services
|
||
|
|
to block Taliban messages.
|
||
|
|
Why?
|
||
|
|
Let them keep making these kind of mistakes.
|
||
|
|
News from tector.com,
|
||
|
|
in these times.com,
|
||
|
|
iSinViv.com,
|
||
|
|
used under a range permission.
|
||
|
|
News from torrentfreak.com,
|
||
|
|
and eff.org,
|
||
|
|
used under permission of the creative comments
|
||
|
|
by attribution license.
|
||
|
|
News from Venezuelananalysis.com
|
||
|
|
and democracynow.org,
|
||
|
|
used under permission of the creative comments
|
||
|
|
by attribution,
|
||
|
|
non-commercial, no-durabous license.
|
||
|
|
News sources retain their respective copyrights.
|
||
|
|
Here are the vials statistics for this program.
|
||
|
|
Your feedback matters to me.
|
||
|
|
Please send your comments to
|
||
|
|
DG at deepgeek.us.
|
||
|
|
The webpage for this program
|
||
|
|
is at www.talkgeektome.us.
|
||
|
|
You can subscribe to me
|
||
|
|
on Identica as the user name DeepGeek.
|
||
|
|
Or you could follow me on Twitter.
|
||
|
|
My username there is DGTGM.
|
||
|
|
As an DeepGeek talk geek to me.
|
||
|
|
This episode of Talk Geek to me
|
||
|
|
is licensed under the creative comments
|
||
|
|
attribution share like 3.0
|
||
|
|
unpoored license.
|
||
|
|
This license allows
|
||
|
|
commercial reuse of the work
|
||
|
|
as well as allowing you to modify the work
|
||
|
|
as long as you share a like
|
||
|
|
the same rights you have received
|
||
|
|
under this license.
|
||
|
|
Thank you for listening to this episode of Talk Geek to me.
|
||
|
|
You have been listening to
|
||
|
|
DGTGM.
|
||
|
|
Thank you for listening to this episode of Talk Geek to me
|
||
|
|
on Identica as the user name
|
||
|
|
on Identica as the user name
|
||
|
|
on Identica as the user name
|
||
|
|
on Identica as the user name
|
||
|
|
on Identica as the user name
|
||
|
|
on Identica as the user name
|
||
|
|
on Identica as the user name
|
||
|
|
on Identica as the user name
|
||
|
|
on Identica as the user name
|
||
|
|
on Identica as the user name
|
||
|
|
on Identica as the user name
|
||
|
|
on Identica as the user name
|