Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use - Search episodes, transcripts, hosts, and series - 4,511 episodes with metadata and transcripts - Data loader with in-memory JSON storage 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
415
hpr_transcripts/hpr1125.txt
Normal file
415
hpr_transcripts/hpr1125.txt
Normal file
@@ -0,0 +1,415 @@
|
||||
Episode: 1125
|
||||
Title: HPR1125: TGTM Newscast for 11/21/2012
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr1125/hpr1125.mp3
|
||||
Transcribed: 2025-10-17 19:24:39
|
||||
|
||||
---
|
||||
|
||||
.
|
||||
.
|
||||
You're listening to Toa Geek to Me News.
|
||||
Number 81, record for Wednesday, November 21, 2012.
|
||||
You're listening to the Tech Only Hacker Public Radio
|
||||
Edition to get the full podcast, including political,
|
||||
commentary, and other controversial topics.
|
||||
Please visit www.toageektoMe.us.
|
||||
Here are the vials statistics for this program.
|
||||
Your feedback matters to me.
|
||||
Please send your comments to DG at deepgeek.us.
|
||||
The webpage for this program is at www.toageektoMe.us.
|
||||
You can subscribe to me on Identica as the username DeepGeek
|
||||
or you could follow me on Twitter.
|
||||
My username there is DGTGM, as in DeepGeek Toa Geek to Me.
|
||||
Another tech roundup from EFF.log, dated November 8, 2012 by Henny Fakuri.
|
||||
Court blocks Proposition 35's restriction on anonymous speech.
|
||||
A few hours after EFF and the ACLU of North California filed a class action law
|
||||
students in Francisco.
|
||||
In San Francisco, federal court challenging California's
|
||||
recently enacted Proposition 35, the court issued a temporary restraining
|
||||
order blocking implementation of the initiative due to the existence of
|
||||
serious questions about whether it violated the First Amendment.
|
||||
Proposition 35 is ostensibly about increasing punishment for human
|
||||
traffickers, but would also require all registered sex affairs in
|
||||
California to turn over a list of all their internet identifiers
|
||||
and service providers to law enforcement, leading up to the election
|
||||
re-urge California voters to reject it, wearing this would result in a
|
||||
significant restriction of free speech on the internet.
|
||||
We want to loan a criticizing Proposition 35, newspapers like the LA Times
|
||||
and Sacramento Bee spoke out against the initiative too.
|
||||
Unfortunately, yet unsurprisingly, California voters overwhelmingly approved
|
||||
the initiative on election night.
|
||||
Wednesday morning, we filed suit, auging Proposition 35 violates the
|
||||
First Amendment because requiring people, even unpopular people, to give up
|
||||
their ability to speak freely and anonymously, chills free speech.
|
||||
Proposition 35 eliminates the ability of a whole class of people, 73,000
|
||||
individuals in California, to speak anonymously online by forcing them to
|
||||
turn over any identifier they use, whether it's anonymous or Joan Jo, or their real name.
|
||||
Plus, it requires disclosure of information about online accounts
|
||||
unrelated to criminal activity, like Yelp or Amazon.com,
|
||||
and most troubling it allows the government to monitor and record a wide
|
||||
swath of innocent internet activity from a registrant with a fancy football
|
||||
team to the one who comments on a political discussion group.
|
||||
While we certainly believe that human trafficking is a terrible crime,
|
||||
requiring registrants to turn over online identifiers
|
||||
doesn't combat this issue.
|
||||
Instead, it creates a dangerous slippery slope, like mandatory DNA collection
|
||||
before it, what begins with sex offense inevitably expands as law enforcement
|
||||
gets looked to accessing this online data and starts demanding more and more of it.
|
||||
The temporary restraining order is an important first step in ensuring that
|
||||
the First Amendment isn't the casualty of a well-intentioned but ultimately
|
||||
overbroad and dangerous initiative.
|
||||
In stopping the implementation of Proposition 35, the court recognized the important
|
||||
issues that need to be considered before the law could go into effect.
|
||||
A hearing is now scheduled for December 17th on whether the court should grant
|
||||
a permanent injunction, striking down the law permanently.
|
||||
From eff.log,
|
||||
the end of November 14th, 2012 by Henny Fakuri and Kurt Opchall and Rainy Friedman.
|
||||
When will our e-mail betray us?
|
||||
An e-mail privacy primer in light of the proteus saga?
|
||||
The unfolding scandal that led to the resignation of General David Patreus,
|
||||
the director of the Central Intelligence Agency,
|
||||
starred with some purportly harassing e-mail sent from pseudonymous e-mail
|
||||
accounts to Jill Kelly.
|
||||
After the FBI kicked its investigation into high gear,
|
||||
it identified the sender as Polar Broadwell and, ultimately,
|
||||
read massive amounts of private e-mail messages that uncovered an affair
|
||||
between Broadwell and Patreus, and now the investigation has
|
||||
expanded to include General John Allen's e-mails with Kelly.
|
||||
We've received a lot of questions about how this works.
|
||||
What legal process the FBI needs to conduct its e-mail investigation?
|
||||
The short answer? It's complicated.
|
||||
The Electronic Communications Privacy Act,
|
||||
ECAPA, is a 1986 law that Congress enacted to protect U.S. privacy
|
||||
in electronic communications like e-mail and instant messages.
|
||||
ECAPA provides scant protection for your identifying information,
|
||||
such as the IP address used to access an account.
|
||||
While Polar Broadwell reportedly created a new pseudonymous account
|
||||
for the allegedly harassing e-mails to Jill Kelly,
|
||||
she apparently did not take steps to disguise the IP number
|
||||
her messages were coming from.
|
||||
The FBI could have obtained this information with Justice
|
||||
Appena to the service provider,
|
||||
but obtaining the account's IP address alone
|
||||
does not establish the identity of the e-mail sender.
|
||||
Broadwell apparently accessed the e-mails from hotels
|
||||
and other locations, not her home,
|
||||
so the FBI cross-reference the IP addresses
|
||||
of these Wi-Fi hotspots against guest lists
|
||||
from other cities and hotels looking for common names.
|
||||
If Broadwell wanted to stay anonymous,
|
||||
a new e-mail account combined with Open Wi-Fi was not enough.
|
||||
The ACLU has an in-depth write-up of the surveillance
|
||||
and security lessons to be learned from this.
|
||||
After the FBI identified Broadwell, they searched her e-mail.
|
||||
According to news reports, the affair between Portrayus
|
||||
and Broadwell lasted from November the 2011 to July 2012.
|
||||
The harassing e-mails sent by Broadwell to Jill Kelly
|
||||
stored in May of 2012 and Kelly notified the FBI shortly thereafter.
|
||||
Thus in the summer of 2012, when the FBI was investigating
|
||||
the bulk of the e-mails would be less than 180 days old.
|
||||
This 180 day old dividing line is important for determining
|
||||
how ECPA applies to e-mail.
|
||||
Compared to identifying information,
|
||||
ECPA provides more legal protection for the contents of your e-mail
|
||||
but with gaping exceptions.
|
||||
While a small but increasing number of federal courts have found
|
||||
that the Fourth Amendment requires a warrant for all e-mail,
|
||||
the government claims ECPA only requires a warrant for e-mail
|
||||
that is stored for 180 days or less.
|
||||
But as the Department of Justice manual for searching
|
||||
and seizing e-mail makes clear, the government believes
|
||||
this only applies to unopened e-mail.
|
||||
Other e-mail is fair game, with only a subpoena,
|
||||
even if the messages are less than 180 days old.
|
||||
According to reports, Betrayus and Broadwell
|
||||
adopted a technique of drafting e-mails
|
||||
and reading them in the draft folder rather than sending them.
|
||||
The DOJ would likely consider draft messages as open e-mail
|
||||
and therefore not entailed to the protection of a search warrant.
|
||||
In a nutshell, although ECPA requires a warrant
|
||||
for the government to obtain the contents of an e-mail
|
||||
stored online for less than 180 days,
|
||||
the government believes the warrant requirement doesn't apply for e-mail
|
||||
that was opened and left on the server,
|
||||
the typical scenario for web mail systems like Gmail.
|
||||
Even if the messages are less than 180 days old,
|
||||
so under the government's view, so long as the e-mails
|
||||
had been opened or were saved in the draft folder,
|
||||
only a subpoena was required to look at the contents
|
||||
of Broadwell's e-mail account.
|
||||
Confused? Well, here's where things get really complicated.
|
||||
The government's view of the law was rejected by a 9th Circuit Court of Appeals,
|
||||
the Federal Appellate Court that covers the Western United States,
|
||||
including California, and the home to many online e-mail companies,
|
||||
and the service that hosts their messages.
|
||||
As a result, the DOJ manual notes that agents outside of the 9th Circuit
|
||||
can therefore obtain such e-mail and other stored
|
||||
electrical wire communications in electronic storage,
|
||||
more than 180 days using a subpoena,
|
||||
but reminds agents in the 9th Circuit to get a warrant.
|
||||
News reports show that the FBI agents involved in the portrayal scandal
|
||||
were in Tampa, Florida.
|
||||
Thus, according to the DOJ manual,
|
||||
they did not need to get a warrant,
|
||||
even if the e-mail provider was in California,
|
||||
like, for example, Gmail.
|
||||
Law enforcement elsewhere may continue to apply
|
||||
the traditional narrow interpretation of electronic storage,
|
||||
even when the data sort is within the 9th Circuit.
|
||||
A subpoena for e-mail content would generally require notice
|
||||
to the subscriber, though another section of Equipa
|
||||
allows for delayed notice for up to 90 days.
|
||||
The FBI interviewed Broadwell for the first time in September,
|
||||
about 90 days after the investigation began in June.
|
||||
However, many providers nevertheless
|
||||
protect their users by following the 9th Circuit rule
|
||||
and insist upon a warrant for the contents of all e-mail.
|
||||
In EFF's experience, the government will seek a warrant
|
||||
rather than litigate the issue.
|
||||
Thus, assuming the service provider stepped up,
|
||||
it is likely that the government used a warrant
|
||||
to obtain access to the e-mails at issue.
|
||||
To either ask this far call, follow links in the show notes.
|
||||
From torrentfreak.com, by Ernesto Day, November 18, 2012,
|
||||
mega-uploads search warrant requests ignored, massive,
|
||||
non-infringing use.
|
||||
In the wake of the January shutdown of mega-upload,
|
||||
many of the site's legitimate users complained
|
||||
that their personal files had been lost.
|
||||
Among these users are many people in the US military
|
||||
who used the site to share pictures and videos with family.
|
||||
Torrentfreak learned that at least 15,634 soldiers
|
||||
had accounts at mega-upload between them
|
||||
sharing hundreds of thousands of files.
|
||||
One of the users, entrepreneur Kyle Goodwin,
|
||||
asked the court to return his files.
|
||||
As part of this request, his attorneys filed
|
||||
a motion to unseal the mega-upload search warrant
|
||||
so they can see on what grounds the data was taken.
|
||||
This week, Judge O'Grady granted the request
|
||||
and ordered the release of the warrants
|
||||
and their applications albeit redacted.
|
||||
This means we can now see how the US put forward its request
|
||||
to seize the domains and servers.
|
||||
The search warrant applications don't offer any new facts
|
||||
and mostly recite what has already been written in the indictment.
|
||||
The government describes mega-upload as nothing more than a place
|
||||
where copyright infringing files are stored
|
||||
and this is what the judge signed off on.
|
||||
However, what is striking is that none of the release records
|
||||
even mentioned legitimate use of the site.
|
||||
In other words, the rights of mega-uploads
|
||||
legitimate users were never taken into consideration.
|
||||
Speaking with Torrentfreak, Kim.com shares our surprise
|
||||
knowing that nearly half of all files stored mega-upload
|
||||
were never downloaded.
|
||||
Quote, the legitimate use was completely ignored
|
||||
in the seizure warrant applications.
|
||||
Almost 50% of the files stored mega-upload
|
||||
didn't have a single download.
|
||||
There was massive, non-unfringing use
|
||||
by those who just wanted to store data in the cloud.
|
||||
Unquote.com says.
|
||||
The lack of discussion about the many legitimate users
|
||||
of mega-upload is concerning.
|
||||
Several of the allegations made against mega-upload
|
||||
could easily apply to other hosting and video services.
|
||||
The FBI, for example, explains in detail
|
||||
how their undercover agent was able to upload
|
||||
view and download copyright videos,
|
||||
something that's also quite common on YouTube.
|
||||
More direct allegations against mega-upload
|
||||
are misleading.com.
|
||||
For example, that the mega-upload team failed
|
||||
to delete infringing files that were pointed out
|
||||
in a criminal search warrant back in 2010.
|
||||
Quote, a member of the mega-conspiracy
|
||||
informed several of his co-conspirators at that time
|
||||
that he located the named files using internal searches
|
||||
of the mega-conspiracy systems.
|
||||
As of November 18, 2011,
|
||||
36 of the 39 infringing copies of the copyright motion pictures
|
||||
were still being stored on service controlled
|
||||
by the mega-conspiracy, the DOJ rights.
|
||||
However, .com now explains that they didn't touch the files
|
||||
because they were never asked to do so
|
||||
and didn't want to interfere with evidence
|
||||
in a criminal case.
|
||||
A document seen by Torrent Freak acts this up.
|
||||
Quote, the FBI asked us for uploader information
|
||||
regarding 39 files and told us to keep
|
||||
their investigation confidential.
|
||||
We assisted and obviously didn't touch the uploader accounts
|
||||
or files because of the ongoing investigation.com.
|
||||
Quote, to use this against us and to tell a judge
|
||||
that the mega-upload domain seizures justified
|
||||
because we have not removed those 39 files
|
||||
is totally unethical and misleading.
|
||||
Quote, he adds, to read the rest of this article
|
||||
following in the show notes.
|
||||
From Torrent Freak.com, by our nestoded number 15th, 2012,
|
||||
Verizon will reduce speeds of repeated Bitcoin Torrent Pirates.
|
||||
Last year, the MPAA and RIA teamed up
|
||||
with five major internet providers
|
||||
in the United States to launch a center
|
||||
for copyright information, the CCI.
|
||||
The prize agreed on a system
|
||||
through which subscribers all warned
|
||||
that their copyright infringements have been observed
|
||||
by rights holders after several warnings,
|
||||
ISPs may then take a variety of repressive measures
|
||||
to punish the alleged infringers.
|
||||
From leaked AT&T training documents,
|
||||
we learned that the company will block users' access
|
||||
to popular websites until they complete
|
||||
a copyright education course.
|
||||
However, none of the participating internet providers
|
||||
have publicly commented on the measures
|
||||
they plan to take until now.
|
||||
During a panel discussion hosted by the New York Chapter
|
||||
of the Internet Society, Verizon and Time Warner Cable
|
||||
unveiled details of their plans.
|
||||
Link, hoeing, vice president of Internet
|
||||
and Technology Issues for Verizon,
|
||||
said his company will employ a three-stage process,
|
||||
the first to alert the result in a simple notification email,
|
||||
informing the users that their connection has been flagged
|
||||
for copyright infringements.
|
||||
After the second warning comes the acknowledgement phase,
|
||||
and which a pop-up is delivered to users.
|
||||
Once received, subscribers are required to read
|
||||
and confirm a process designed to ensure
|
||||
that they are aware of the unauthorized sharing
|
||||
that's taken place via their account.
|
||||
If the infringements continue,
|
||||
punishments become a reality on the 5th and 6th alerts.
|
||||
Hearing said that these repeated infringers
|
||||
will have their internet connections throttled,
|
||||
resulting in significantly slower download speeds.
|
||||
This throttling is temporary and will be lifted after two
|
||||
or three days to read the RSSOGLE follow links in the show notes.
|
||||
From TechDirt.com by Timothy Gagna,
|
||||
date November 16, 2012.
|
||||
Taliban spokesman accidentally copies mailing lists
|
||||
on press release email.
|
||||
You know that mistake you make where you want to send an email
|
||||
to a bunch of people,
|
||||
typically annoying chain letters about finding love next week
|
||||
if they forward it to 20 people immediately.
|
||||
Luck just doesn't wait around you now.
|
||||
But you don't want to expose all of your friends
|
||||
and family's emails so you blind copy everyone,
|
||||
except you didn't.
|
||||
Now you're the jackass sending emails with 40 addresses,
|
||||
listed and your grandmother hates you for spamming her?
|
||||
Well, funny story.
|
||||
It turns out that one of the few things
|
||||
we frame loving folks in the states
|
||||
haven't common without Taliban enemies
|
||||
is an amusing and capacitive check
|
||||
to whom we're sending our emails.
|
||||
Take a look at the oops Taliban spokesperson,
|
||||
Kari Husef Hamedi made,
|
||||
when he accidentally c-seed rather than b-c-seed,
|
||||
the Taliban's mailing list on a press release email
|
||||
this past Saturday.
|
||||
Quote,
|
||||
In a Dilbert-esque faux pas,
|
||||
a Taliban spokesperson sent out a routine email
|
||||
last week with one notable difference.
|
||||
He publicly c-seed the names
|
||||
of everyone on his mailing list.
|
||||
The names were disclosed in an email
|
||||
by Kari Husef Hamedi,
|
||||
an official Taliban spokesperson on Saturday.
|
||||
The email was a press release he received from the account
|
||||
of Zabahula Mushad-Muhadid,
|
||||
another Taliban spokesperson.
|
||||
Kari Husef Hamedi then forward Muhadid's email
|
||||
to the full Taliban mailing list,
|
||||
but rather than using the b-c-seed function
|
||||
or blind-carbon copy which keeps email addresses private,
|
||||
Kari Husef Hamedi made the addresses public.
|
||||
I'm sure years from now,
|
||||
when the CIA has once again employed the Taliban
|
||||
to fire on our behalf against the Chinese,
|
||||
Australian, alien alliance,
|
||||
we'll look at back on this
|
||||
and have a nice laugh.
|
||||
But there's no understanding that this is a massive screw-up.
|
||||
Sure, most of the folks on the distribution list
|
||||
were journalists,
|
||||
but exposing their names that way,
|
||||
particularly for those that are working
|
||||
within Afghanistan,
|
||||
isn't a good thing.
|
||||
Besides that,
|
||||
not all the people who were exposed were journalists.
|
||||
Quote.
|
||||
The list also includes an address
|
||||
appearing to belong to a provincial governor,
|
||||
an Afghan legislature,
|
||||
several academics and activists,
|
||||
an Afghan consultative committee,
|
||||
and a representative of Gul Budin,
|
||||
Hekbata,
|
||||
an Afghan warlord whose outlawed group,
|
||||
Hezboe Islami,
|
||||
is believed to be behind several attacks
|
||||
against coalition troops.
|
||||
Somehow, I don't see this making the Taliban brass very happy,
|
||||
and Senator Joe Lieberman wants the internet services
|
||||
to block Taliban messages.
|
||||
Why?
|
||||
Let them keep making these kind of mistakes.
|
||||
News from tector.com,
|
||||
in these times.com,
|
||||
iSinViv.com,
|
||||
used under a range permission.
|
||||
News from torrentfreak.com,
|
||||
and eff.org,
|
||||
used under permission of the creative comments
|
||||
by attribution license.
|
||||
News from Venezuelananalysis.com
|
||||
and democracynow.org,
|
||||
used under permission of the creative comments
|
||||
by attribution,
|
||||
non-commercial, no-durabous license.
|
||||
News sources retain their respective copyrights.
|
||||
Here are the vials statistics for this program.
|
||||
Your feedback matters to me.
|
||||
Please send your comments to
|
||||
DG at deepgeek.us.
|
||||
The webpage for this program
|
||||
is at www.talkgeektome.us.
|
||||
You can subscribe to me
|
||||
on Identica as the user name DeepGeek.
|
||||
Or you could follow me on Twitter.
|
||||
My username there is DGTGM.
|
||||
As an DeepGeek talk geek to me.
|
||||
This episode of Talk Geek to me
|
||||
is licensed under the creative comments
|
||||
attribution share like 3.0
|
||||
unpoored license.
|
||||
This license allows
|
||||
commercial reuse of the work
|
||||
as well as allowing you to modify the work
|
||||
as long as you share a like
|
||||
the same rights you have received
|
||||
under this license.
|
||||
Thank you for listening to this episode of Talk Geek to me.
|
||||
You have been listening to
|
||||
DGTGM.
|
||||
Thank you for listening to this episode of Talk Geek to me
|
||||
on Identica as the user name
|
||||
on Identica as the user name
|
||||
on Identica as the user name
|
||||
on Identica as the user name
|
||||
on Identica as the user name
|
||||
on Identica as the user name
|
||||
on Identica as the user name
|
||||
on Identica as the user name
|
||||
on Identica as the user name
|
||||
on Identica as the user name
|
||||
on Identica as the user name
|
||||
on Identica as the user name
|
||||
Reference in New Issue
Block a user