242 lines
20 KiB
Plaintext
242 lines
20 KiB
Plaintext
|
|
Episode: 1160
|
||
|
|
Title: HPR1160: TGTM Newscast for 1/8/2013 DeepGeek
|
||
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr1160/hpr1160.mp3
|
||
|
|
Transcribed: 2025-10-17 20:47:09
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
You're listening to DGTM News, record for Tuesday, January the 8th, 2013.
|
||
|
|
You're listening to the Tech Only Hacker Public Radio Edition to get the full podcast
|
||
|
|
including political, commentary, and other controversial topics.
|
||
|
|
Visit www.topgeektme.us.
|
||
|
|
Here are the vials statistics for this program.
|
||
|
|
Your feedback matters to me.
|
||
|
|
Please send your comments to DG at deepgeek.us.
|
||
|
|
The webpage for this program is at www.topgeektme.us.
|
||
|
|
You can subscribe to me on Identica as the username DeepGeek.
|
||
|
|
Or you could follow me on Twitter.
|
||
|
|
My username there is DGTM.
|
||
|
|
As a deepgeek talk geek to me.
|
||
|
|
This is Dan Washco and now the tech roundup.
|
||
|
|
From torrentfreak.com by Nick Maxx dated December 22nd 2012.
|
||
|
|
US and Russia announced online piracy crackdown agreement.
|
||
|
|
Quote in Nick Maxx, the United States and Russia have announced an agreement to crack down on online piracy.
|
||
|
|
The countries have agreed to disrupt sites that facilitate infringement and take action against their operator.
|
||
|
|
As a result, uncertain times may lie ahead for many bit torn and other file-sharing sites
|
||
|
|
hosted in Russia.
|
||
|
|
The agreement also allows for the improved take-down of infringing content and discussions
|
||
|
|
on allowing Russian right holders to use the United States.
|
||
|
|
Six strike system.
|
||
|
|
For many years, Russia has been viewed as a soft touch on the issue of copyright infringement.
|
||
|
|
Dozens, perhaps hundreds of allegedly infringing sites operate there with impunity.
|
||
|
|
Some due to aspects of Russian law and others simply because authorities have no interest
|
||
|
|
in doing anything about them.
|
||
|
|
However, yesterday, sick December 21st 2012, came an announcement from the United States trade
|
||
|
|
representative Ron Kirk, which suggests that for the US, things are moving more quickly towards a
|
||
|
|
favorable situation. Kirk said that the United States and Russian Federation have reached
|
||
|
|
agreement on an intellectual property rights action plan aimed at improving copyright protection
|
||
|
|
and enforcement online.
|
||
|
|
Kirk, strong IPR protection and enforcement are vital to promoting innovation and creativity
|
||
|
|
by securing the rights of innovators and creative community, attracting high technology investment,
|
||
|
|
and fostering the jobs necessary for long-term sustainable growth.
|
||
|
|
According to the USTR, in addition to conducting enforcement actions against unauthorized
|
||
|
|
camcordering, agreement has been reached to disrupt the functioning of sites that, quote,
|
||
|
|
facilitate criminal copyright infringement.
|
||
|
|
In addition to disruption, whatever form that may take, Russia has reportedly agreed to take
|
||
|
|
action against the creators and operators of sites through which copyright infringement is committed.
|
||
|
|
The USTR also reports that Russian authorities have agreed to conduct meaningful consultations,
|
||
|
|
with rights holders to take action against high-priority websites.
|
||
|
|
In short, the sites on that list will probably be the ones submitted to the USTR by the RIAA
|
||
|
|
and MPAA for the Notorious Markets report.
|
||
|
|
The vast majority of the report is targeted at larger entities that might be engaged in or
|
||
|
|
connected to online piracy, but the USTR appears to have dangled a carrot that would enable
|
||
|
|
Russian companies to target US citizens in a limited way, end, quote, of the article.
|
||
|
|
From EFF.org by Trevor Tim, dated December 19, 2012, government attorneys agree with EFF,
|
||
|
|
new counterism database rules threaten privacy of every American.
|
||
|
|
Last week, the Wall Street Journal reported on how a little-known government agency, the
|
||
|
|
National Counterterrorism Center, NCTC, got the keys to government database full of detailed
|
||
|
|
personal information of millions of innocent Americans. Using the Freedom of Information Act
|
||
|
|
and interviews with officials, the Journal obtained emails and other information,
|
||
|
|
detailing how the massive new spying program, which the Attorney General signed off on in March,
|
||
|
|
was approved by White House in secret over-strenuous objections from government privacy lawyers.
|
||
|
|
As EFF first warned months ago, despite the terrorism justification, the new rules affect
|
||
|
|
every single American, the journal explained. Now, NCTC can copy entire government databases,
|
||
|
|
flight records, casino employee lists, the names of Americans hosting foreign exchange
|
||
|
|
students and many others. The agency has new authority to keep data about innocent US citizens
|
||
|
|
for up to five years and to analyze it for suspicious patterns of behavior.
|
||
|
|
Previously, both were prohibited. Data about Americans, quote, reasonably being
|
||
|
|
believed to constitute terrorism information, and quote, may be permanently retained.
|
||
|
|
Journalist Marcy Wheeler summed up the new guidelines up nicely in March, saying quote,
|
||
|
|
So, the data the government keeps to track our travel, our taxes, our benefits, our identity,
|
||
|
|
it just got transformed from bureaucratic data into national security intelligence, end quote.
|
||
|
|
Ironically, this civil liberties debacle apparently was a response to the attempt in 2009
|
||
|
|
Christmas underwear bombing by Mar Farak Abdul-Mudalab. As the ACLU observed, however,
|
||
|
|
Abdul-Mudalab wasn't a US citizen and collecting information on him wasn't a problem.
|
||
|
|
Instead, his own father had identified him to the US government as a potential terrorist.
|
||
|
|
In short, an attack by a known foreign terrorist suspect was used to justify changes to rules
|
||
|
|
about collecting information on US citizens. The Privacy Act is supposed to limit the ability
|
||
|
|
of the US government to collect and maintain detailed data about ordinary citizens.
|
||
|
|
Among other restrictions, it prohibits agencies from maintaining personal information unless
|
||
|
|
it is, quote, relevant and necessary, end quote, for a specific purpose. But thanks to a loophole
|
||
|
|
in the law, federal agencies can issue public notices to the federal register and attempt to
|
||
|
|
skirt those rules entirely, thereby opening the door to arbitrary and unnecessary data collection.
|
||
|
|
According to the journal's investigation, the debate over the program's potential privacy
|
||
|
|
violation sparked a, quote, heated, and, quote, testy debate in the Justice Department,
|
||
|
|
Department of Homeland Security and the White House. A DHS lawyer complained via email that
|
||
|
|
the advocates of the program were, quote, complete non-sequitors, end quote, and, quote, non-responsive,
|
||
|
|
end quote, examples. Ultimately, privacy lost. Of course, it's unclear whether the
|
||
|
|
data mining operation even works. At the Department of Justice, chief privacy officer Nancy
|
||
|
|
Liven raised concerns about whether the guidelines could unfairly target innocent people.
|
||
|
|
These people said, some researchers suggest that, statistically speaking,
|
||
|
|
there are too few terror attacks for predictive patterns of to emerge. The risk, then,
|
||
|
|
is that innocent behavior gets misunderstood, say, a man buying chemicals for a child
|
||
|
|
science fair, and a time refers to sprinkler sets off false alarms.
|
||
|
|
Just like EFF did in March, the journal compared the new NCTC program to the notorious
|
||
|
|
total information awareness. Surveillance program proposed by Admiral John Point Dexter in 2002.
|
||
|
|
Congress was so alarmed by the potential invasion to innocent American privacy that they
|
||
|
|
defunded it in 2003. What the journal did not mention, however, is that even the NCTC's
|
||
|
|
best-known database, Terrorist Identities Data Mart Environment, or TIDE, is already fraught
|
||
|
|
with problems. TIDE contains more than 500,000 identities suspected of terror links.
|
||
|
|
Explain the journal. Quote, TIDE files are important because they are used by the Federal Bureau
|
||
|
|
of Investigation to compile terrorist watch lists. End quote. But according to an unusually
|
||
|
|
blunt Senate investigation of so-called, quote, fusion centers, released last month,
|
||
|
|
the TIDE database is also full of information of innocent people that have nothing to do with
|
||
|
|
terrorism. The report gave examples of a TIDE profile of a person who the FBI had already
|
||
|
|
cleared of any connection to terrorism, a TIDE profile of two-year-old boy, and even a TIDE
|
||
|
|
profile of Ford Motor Company. Indeed, the data mining expansion seems like a horrible and
|
||
|
|
self-fulfilling prophecy. As a journal noted, the underwear bomber incident led President Obama
|
||
|
|
to order agencies to send all their leaders to NCTC to pursue thoroughly and exhaustively
|
||
|
|
terrorism threat threads. Predictably, NCTC was flooded with terror tips, creating a huge
|
||
|
|
backlog that NCTC couldn't process within the original time limits. NCTC then
|
||
|
|
predictably sought to retain more data longer. Congress needs to stop this vicious cycle.
|
||
|
|
It should investigate the new NCTC guidelines and the government's overall data collection
|
||
|
|
and data mining practices, and it should take a look at closing loopholes in the Privacy Act too.
|
||
|
|
From TechDirt.com by Mike Maznick dated December 28, 2012. Apparently, Congress isn't actually
|
||
|
|
interested in requiring a warrant for law enforcement to read your email. From the it was all a
|
||
|
|
charade department. Yes, we've already covered the rejection of key amendments in the FISA
|
||
|
|
Amendment Act renewal, but that wasn't the only case of Congress ignoring the public's privacy
|
||
|
|
concerns as they close out this subject. Back in September, we noted that Senator Patrick Lee,
|
||
|
|
who had been working on a much-needed reforms for ECPA, the Electronic Communications Privacy Act,
|
||
|
|
much as requiring law enforcement get a warrant to read your email, had attached his ECPA
|
||
|
|
reform plan to an update of the Video Privacy Protection Act VPPA. While I know some privacy
|
||
|
|
folks were worried about this update to the VPPA, I don't have much of a problem with it.
|
||
|
|
The original VPPA, written as a quick response to a video store revealing Robert Bork's somewhat
|
||
|
|
boring video rental history during his Supreme Court nomination hearing, did seem a bit limiting,
|
||
|
|
especially for online video sites such as Netflix that wanted to add some useful social features.
|
||
|
|
However, it was the ECPA reform part that was more important. Attaching ECPA reform to VPPA reform
|
||
|
|
didn't make some privacy folks happy, but they seemed willing to go along with the VPPA changes
|
||
|
|
if it really meant that we get a warrant requirements for emails and other digital messages.
|
||
|
|
There were some attempts to water down that ECPA reform at the end of last month,
|
||
|
|
but the Senate Judiciary Committee kept the warrant requirement in there and rejected various
|
||
|
|
attempts to weaken the bill. As we noted, however, it still was a long way from becoming law,
|
||
|
|
given the need to pass a full Senate vote and to have a companion House bill to make the rounds.
|
||
|
|
We assume that there would be no movement until next year and the new Congress. But, late last
|
||
|
|
week, the House rubber stamped the VPPA update and the Senate almost immediately signed off on
|
||
|
|
the House's version, which the President has expected to sign any moment now. In case you missed
|
||
|
|
that means the ECPA reforms, which were supposed to be bundled with the VPPA to make the whole
|
||
|
|
thing palatable, got dropped entirely, and now we get the VPPA reforms and no ECPA reform at all.
|
||
|
|
Neat trick, bundle two things to get support, and then at the last minute, drop one part and
|
||
|
|
rush through the other. From torrentfreak.com by Ernesto Data January 3rd, 2013, mega upload,
|
||
|
|
U.S. deliberately misled the court with unlawful search warrants.
|
||
|
|
When the U.S. government applied for the search warrants against mega upload last year,
|
||
|
|
it told the court that they had warned mega upload in 2010 that it was hosting infringing files.
|
||
|
|
Through its hosting company, mega upload was informed about a criminal search warrant in an
|
||
|
|
unrelated case where the government requested information on 39 infringing files stored by the
|
||
|
|
file hosting service. At the time, mega upload, who operated with this request, and handed over
|
||
|
|
the details on the uploaders. The files were kept online as mega upload was instructed not to touch
|
||
|
|
any of the evidence. However, a year later, this inaction is being used by the U.S. government to
|
||
|
|
claim that mega upload was negligent, leaving out much of the context. As of November 18th, 2011,
|
||
|
|
36 of the 39 infringing copies of the copyrighted motion pictures were still being stored on servers
|
||
|
|
controlled by the mega conspiracy. The government claimed in the mega upload search warrants.
|
||
|
|
This course of action is misleading according to mega upload's legal team.
|
||
|
|
Nowhere did the government tell this court that mega upload had done exactly what the government
|
||
|
|
had asked it to do. Execute a search warrant without alerting the extensible targets to the
|
||
|
|
existence of an investigation. Mega upload's lawyers write. The government's contention to this
|
||
|
|
court that mega upload's preservation of the status quo was evidence of criminal intent is false
|
||
|
|
and deliberately so they add. By failing to mention that the files were not removed because the
|
||
|
|
authority specifically requested this, the government deliberately misled the court mega upload says.
|
||
|
|
The lawyers argue that this is not only troubling by itself, but also fits into a wider picture of
|
||
|
|
misconduct that was revealed in New Zealand court proceedings. It is clear from the unsealed
|
||
|
|
warrants that the government withheld critical information from its supporting affidavits.
|
||
|
|
That withholding calls into grave question the legality of any and all seizures affected
|
||
|
|
pursuant to those warrants. The withholding is all the more worrisome considering the identified
|
||
|
|
pattern of governmental misconduct plaguing the proceedings in New Zealand, the legal team writes.
|
||
|
|
Mega upload therefore asks for these seashoes to be addressed in an upcoming hearing.
|
||
|
|
Kim.com told Torrent Freak that he is furious about the US government's actions which ruined his
|
||
|
|
business. Quote Kim.com, a legitimate business destroyed, 220 jobs destroyed, all assets frozen
|
||
|
|
without a hearing. Millions of users without access to the legitimate files, anti-terror forces to
|
||
|
|
arrest non-violent nerds, spy agencies to surveil our communications illegally. The White House,
|
||
|
|
a prime minister, two governments abusing all rights. To read this filing and the rest of the
|
||
|
|
article, please see the link in the show notes. From eff.org by Hannah Fackery dated December 21,
|
||
|
|
2012, Vermont Supreme Court allows limits to government computer search power. A new and
|
||
|
|
important decision by the Vermont Supreme Court could go a long way to safeguard privacy by
|
||
|
|
ensuring police computer searches remain narrow. EFF together with the ACLU and ACLU of Vermont
|
||
|
|
filed an amicus brief in the case which empowered courts that issue warrants to include specific
|
||
|
|
instructions on how the police can conduct the search so they remain narrow and particular.
|
||
|
|
This case started as part of an identity theft investigation where police in Burlington,
|
||
|
|
Vermont, applied for a search warrant to seize and search a number of computers, cell phones,
|
||
|
|
and other electronic devices in a house. Noting the ease with which electronic data can travel
|
||
|
|
between electronic devices, as well as the fact that evidence could be stored anywhere on the
|
||
|
|
computer, investigators submitted an extraordinarily overbroad search warrant application,
|
||
|
|
including requests to search other electronic devices found in the house even if its owners
|
||
|
|
wasn't suspected of committing a crime. They also ask for the ability to search the entire
|
||
|
|
contents of all the computers and devices they seized. But the fourth amendment requires searches
|
||
|
|
to be reasonable. That obviously means the police need a search warrant to search a place.
|
||
|
|
It also means that their search must be limited or particular so that the search only
|
||
|
|
intrudes into a private space where the thing the police want is most likely to be found.
|
||
|
|
But how does that work in the digital age, where computers and other electronic devices
|
||
|
|
store vast amounts of our private and sensitive information in any number of places?
|
||
|
|
The judge, grappling with the fourth amendment implications, issued the search warrant but
|
||
|
|
imposed limits on how the government could execute the search. The court relied heavily on the
|
||
|
|
ninth circuit court of appeals 2010 decision in United States versus comprehensive drug testing
|
||
|
|
incorporated, which provided law enforcement with the suggested guidelines designed to protect
|
||
|
|
privacy during computer searches. Unhappy with these limitations, the government filed a petition
|
||
|
|
for extraordinary relief in the Vermont Supreme Court asking that the original broad-worn
|
||
|
|
officers request to be granted. In last Friday's decision, the Vermont Supreme Court understood
|
||
|
|
the privacy implications at issue and ruled that the fourth amendment allows a judge to include
|
||
|
|
instructions in the search warrant to ensure an electronic search remains narrow and particular.
|
||
|
|
The court approved the three different limitations judges can place on the government as part of
|
||
|
|
a computer search that have important ramifications for other forms of electronic seizures.
|
||
|
|
First, searches can be performed by third parties or police personnel segregated from the main
|
||
|
|
investigators who segregate irrelevant information prior to disclosure. Second, judges can order
|
||
|
|
investigators to focus search techniques while precluding use of specialized search tools without
|
||
|
|
prior judicial authorization. And third, investigators are limited in data that they can copy,
|
||
|
|
non-responsive data should be destroyed and devices return. Judges control search
|
||
|
|
warns not the government. The court noted that warrant applications aren't submitted to judges
|
||
|
|
on a take it or leave it basis, but oftentimes it seems that this is precisely what the government
|
||
|
|
wants, wide-ranging authorization into electronic evidence with minimal oversight and little
|
||
|
|
particularity. And when prosecutors don't get their way, their default is to argue that the judges
|
||
|
|
are little more than rubber stamps permitted to do nothing more than approve or deny government
|
||
|
|
requests. Thankfully, the Vermont Supreme Court stood up to the government and told them they
|
||
|
|
couldn't have whatever they wanted. Other courts are starting to be more vocal too about the
|
||
|
|
government's efforts to intrude into the private lives of Americans. We need more courts to think
|
||
|
|
about the implications of their decisions and craft limits on electronic surveillance so they
|
||
|
|
can fulfill their traditional role as a check against government overreach. To read more details
|
||
|
|
about the three limitations, follow the article link in the show notes. Other headlines in the
|
||
|
|
news to read these stories follow the links in the show notes. German privacy regulator orders
|
||
|
|
Facebook to end its real name policy. List of groups honed by websites with anti-student
|
||
|
|
policy. Staff and produced by the talk geek to me news team, editorial selection by Deep Geek.
|
||
|
|
Views of the story authors reflect their own opinions and not necessarily those of TGTM news.
|
||
|
|
News from techdirt.com, the stand.org, and Havana Times.org used under arranged permission.
|
||
|
|
News from tornfreak.com and EFF.org used under permission of the creative commons by attribution
|
||
|
|
license. News from wlcentral.org and democracy now.org used under permission of the creative commons
|
||
|
|
by attribution, non-commercial, no derivatives license. News sources retain the respective copyrights.
|
||
|
|
Thank you very much. This has been Dan Walshko. Have a great day.
|
||
|
|
Thank you for listening to this episode of talk geek to me. Here are the vials statistics for this
|
||
|
|
program. Your feedback matters to me. Please send your comments to dg at deepgeek.us.
|
||
|
|
The webpage for this program is at www.talkgeektome.us. You can subscribe to me on identical as the
|
||
|
|
user name Deep Geek or you could follow me on Twitter. My username there is dggtm as in Deep Geek
|
||
|
|
talk geek to me. This episode of talk geek to me is licensed under the creative commons
|
||
|
|
attribution share like 3.0 unpoored license. This license allows commercial reuse of the work
|
||
|
|
as well as allowing you to modify the work so long as you share a like the same rights you have
|
||
|
|
received under this license. Thank you for listening to this episode of talk geek to me.
|
||
|
|
You have been listening to Hacker Public Radio at Hacker Public Radio does our
|
||
|
|
We are a community podcast network that releases shows every week day on day through Friday.
|
||
|
|
Today's show, like all our shows, was contributed by an HBR listener like yourself.
|
||
|
|
If you ever consider recording a podcast, then visit our website to find out how easy it
|
||
|
|
really is. Hacker Public Radio was founded by the digital dark pound and the
|
||
|
|
economical and computer cloud. HBR is funded by the binary revolution at binref.com
|
||
|
|
all binref projects are crowd-responsive by linear pages. From shared hosting to custom
|
||
|
|
private clouds, go to lunarpages.com for all your hosting needs. Unless otherwise stasis,
|
||
|
|
today's show is released under creative comments, attribution, share a like, 3.0 unlicense.
|