Initial commit: HPR Knowledge Base MCP Server

- MCP server with stdio transport for local use
- Search episodes, transcripts, hosts, and series
- 4,511 episodes with metadata and transcripts
- Data loader with in-memory JSON storage

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
Lee Hanken
2025-10-26 10:54:13 +00:00
commit 7c8efd2228
4494 changed files with 1705541 additions and 0 deletions

180
hpr_transcripts/hpr1212.txt Normal file
View File

@@ -0,0 +1,180 @@
Episode: 1212
Title: HPR1212: TGTM Newscast for 3/22/2013 Rebecca "Bobobex" Newborough
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr1212/hpr1212.mp3
Transcribed: 2025-10-17 21:43:21
---
You're listening to TGT News, number 91, record for March 22, 2013.
You're listening to the Tech Only Hacker Public Radio Edition, to get the full podcast
including political, commentary, and other controversial topics.
Please visit www.toggeektme.us.
Here are the vials statistics for this program.
Your feedback matters to me.
Please send your comments to dg at deepgeek.us.
The web page for this program is at www.toggeektme.us.
You can subscribe to me on Identica as the username DeepGeek or you could follow me on Twitter.
My username there is dgtgtm, as an deepgeek talk geek to me.
Hello, Becky Nubra, aka Boba Bex, now here for the Tech Roundup.
From EFF.org dated March the 13th, 2013, by Hany Fakori, finally some limit to electronic searches at the border.
In an important new decision, the ninth circuit court of appeals created the first explicit limits
on the government's ability to search electronic devices at the border.
The court's decision in United States versus Cotterman, establishes the government agents must
have reasonable suspicion before conducting a forensic examination of a computer at the border.
In 2007, Howard Cotterman attempted to enter the United States from Mexico through the
Lukeville Port of Entry in Arizona.
Border agents detained Cotterman for eight hours while they searched without a warrant
two laptops in a digital camera that he was carrying.
Ultimately, wanting to do a more invasive examination of the devices, the agents let Cotterman
enter the US but held onto his electronic devices and took them 170 miles away to Tucson
where they continued their warrantless search for two days.
Ultimately, the agents found trial pornography on the computers and Cotterman was arrested
and indicted.
The trial court suppressed the evidence finding the warrantless search violated the Fourth
Amendment.
The government appealed to a three-judge panel of the ninth circuit who reversed, finding
the search valid under the government's broad authority to search at the border without
a warrant or any individualized suspicion.
Cotterman asked for the entire ninth circuit to review the case on bank.
Together with the National Association of Criminal Defense Lawyers, we filed an amicus brief asking
the court to review this dangerous precedent to which it agreed to do last summer.
To read the rest of the story, please follow the link in the show notes.
In other story from EFF.org, this time dated March 14th and by Peter Eckersley.
Google takes the dark path, Census Adblock Plus on Android.
In a shocking move, Google has recently deleted Adblock Plus from the Android Play Store.
This is hugely disappointing because it demonstrates that Google is willing to censor
the software and abandon its support for open platforms as soon as there's an ad-related
business reason for doing so.
Until now, the internet and the software development communities have relied on Google
to be safely on their side when it comes to building open platforms, encouraging innovation
and giving users a maximum choice about how their computers will function.
But with today's news, that commitment to openness suddenly looks much, much weaker.
Google clearly has a vested interest in preventing people from installing ad-blocking software
like Adblock Plus.
But until recently, the company did an admirable job of leaving that matter aside and letting
users make their own choices about whether they wanted to hide ads on their phones and
in their browsers.
Google established a reputation for building tools that put the interests of their users
first.
This new form of censorship is the exact opposite.
It is not only a betrayal of the principle of openness, but a betrayal of the trust that
people put in Google when they decide to buy an Android phone.
Please follow the link in the show notes to read the remainder of this story.
Our next story is from democracynow.org, dated March 13.
Cyberattacks are more of a threat to the US than al-Qaeda.
The nation's top intelligence officials are warning cyberattacks from abroad now pose
a greater threat to national security than al-Qaeda and other militant groups.
For the first time ever, an annual review of threats to the United States lists the risk
of foreign computer attacks on the network of US infrastructure and institutions higher
than terrorism, organized crime and weapons of mass destruction.
Director of National Intelligence, James Clapper, discussed the finding in testimony before
the Senate Intelligence Committee.
James Clapper said, when it comes to distinct threat areas, our statement this year leads
with cyber, and it's hard to overemphasize its significance.
Increasingly, state and non-state actors are gaining and using cyber expertise.
They apply cyber techniques and capabilities to achieve strategic objectives by gathering
sensitive information from public and private sector entities, controlling the content and
flow of information and challenging perceived adversaries in cyberspace.
These capabilities put all sectors of our country at risk.
In response, the Pentagon's new cyber command has unveiled plans to create 13 offensive teams
to counter computer attacks from overseas by the fall of 2015.
The teams would be used for cyber operations against foreign countries linked to computer
attacks on the United States.
From TechDirt.com dated the March the 14th by Mike Masnick.
Details come out on US attorneys withholding the evidence in the Air and Schwartz case.
Last week we wrote about Air and Schwartz's girlfriend, Taran Strinebrick-Nakalfman,
releasing a statement accusing the Department of Justice of a variety of things that hadn't
really been covered before, including lying, seizing evidence without a warrant, and with
holding its copulatory evidence.
That resulted in an interesting discussion in the comments in which a few Department
of Justice defenders suggested that since there were no details we were probably making
this up, as if we don't have better things to do.
Now however, the details have come out.
In a letter that was sent at the end of January, but just now leaked to the press, Schwartz's
lawyers have highlighted how assistant US attorney Steve Heyman was responsible for the charges
above.
The key issue is the search of Aaron's laptop.
Cambridge Police seized the laptop on January 6, 2011.
The Secret Service did not obtain a warrant until February 9, 2011, even though it had
clearly been involved since before the arrest and was leading the investigation.
Schwartz's legal team, quite reasonably, argued that the evidence from the laptop should
be suppressed due to the massive delay in obtaining the necessary warrant.
Heyman hit back that it was the Cambridge Police who had the laptop, so the Secret Service
had nothing to do with it until it got the warrant.
There was a court hearing about all of this, and Heyman again insisted that the Secret
Service had no responsibility until after the warrant.
However, right after that hearing, Heyman apparently approached Schwartz's lawyers to reveal
a key email from the lead Secret Service agent on the case, Michael Pickett, to Heyman
himself.
The email had been sent on January 7, 2011, in which he noted that he was prepared to
take custody of the laptop any time, or whenever you feel is appropriate.
In other words, the Secret Service clearly had de facto control over the laptop, directly
contrasting Heyman's claims.
Furthermore, withholding that bit of evidence, which would have raised serious questions about
Heyman's claims to the court until after the hearing just makes the whole thing even
more sketchy.
To read the rest of this story, please follow the link in the show notes.
Our final story is also from TechDirt.com dated March 14 and is by Mike Maznick.
Kickstarter projects that don't meet their goal are not failures, they help people avoid
failures.
A little while back on one of our funniest most insightful comments of the week posts,
we featured a comment that someone had made anonymously in response to a story about
Bjork's Kickstarter project that was taken down before it ended after it did not look
like it was going to get anywhere near the required threshold.
However, the comment has stuck with me and I think it deserves a post.
In particular, the commenter called us out for saying that her project failed.
This was not a failure, said the post.
Platforms like Kickstarter have changed the way the market is functioning, and our ways
of thinking about it even here on TechDirt have to catch up.
Bjork's campaign did not fail even though the results were not what she was hoping for.
She successfully learned that the market was not interested in this product.
Spending £375,000 of her own money, now that would have been a failure.
Using Kickstarter is more like running a science experiment than it is like selling a product.
It increases the efficiency of the market by orders of magnitude and apparently beyond
our ability to think about it clearly.
This point, even if it was calling us out, is so true and it's so important for people
to understand.
It's easy to use the word failure for those projects that don't meet their goal.
Hell, just in writing this post, I repeatedly had to consciously stock myself from using
the words fail or failure in describing projects that don't reach their goal.
But the commenter is right, those projects are not failed projects once you realise what
Kickstarter really is, i.e. a platform to judge the market for products and to build
commitments and funding around them.
If a project doesn't reach the goal, that's actually valuable market research, suggesting
that if they had gone ahead without going through the experience, they likely would have failed.
So in actuality, it makes sense to look at such projects and recognise that they were
saved from a dismal failure in which large sums of money may have been spent but at the
same time clarifying the market's reaction to a product before it's even been introduced.
With so many people thinking of Kickstarter more of a store than as a platform for supporting
people trying to turn cool ideas into reality, it's important to be careful in how we choose
our language.
Putting up a Kickstarter project that doesn't reach its goal shouldn't be seen as a failure.
It should be seen as a useful bit of data which helps one avoid failure and also to, hopefully,
sharpen up their product and pitch so that the next time, it's more likely to be funded.
Staff to produce by the Talk Geek to Me News team, editorial selection by DeepGeek, views
of the story authors reflect their own opinions and not necessarily those of the Talk Geek
to Me News.
News from TechDirt.com, EmptyWheel.net, in these times.com and Maggy McNeil.WordPress.com are
used under a range permission.
News from EFF.org is used under permission of the Creative Commons by Attribution License.
News from RH RealityCheck.org is used under permission of the Creative Commons by Attribution
Share-Relike License.
News from Venezuelanalysis.com and DemocracyNow.org are used under permission of the Creative
Commons by Attribution Non-Commercial No-Drivatives License.
New sources retain their respective copyrights.
That's the end of the Tech Roundup for this week.
Thank you for listening.
Talk to you soon.
This episode of Talk Geek to Me is licensed under the Creative Commons Attribution Share-Relike
3.0 on Port License.
This license allows commercial reuse of the work as well as allowing you to modify the
work as long as you share alike the same rights you have received under this license.
Thank you for listening to this episode of Talk Geek to Me.
You have been listening to Hacker Public Radio at Hacker Public Radio.
We are a community podcast network that releases shows every weekday Monday through Friday.
Today's show, like all our shows, was contributed by a HBR listener like yourself.
If you ever consider recording a podcast, then visit our website to find out how easy it really is.
Hacker Public Radio was founded by the Digital Dog Pound and the Infonomicom Computer Club.
HBR is funded by the Binary Revolution at binwreff.com or binwreff projects are crowd-responsive by Lina Pages.
From shared hosting to custom private clouds, go to LinaPages.com for all your hosting needs.
Unless otherwise stasis, today's show is released under a Creative Commons Attribution Share-Relike 3.0 license.