Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use - Search episodes, transcripts, hosts, and series - 4,511 episodes with metadata and transcripts - Data loader with in-memory JSON storage 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
180
hpr_transcripts/hpr1212.txt
Normal file
180
hpr_transcripts/hpr1212.txt
Normal file
@@ -0,0 +1,180 @@
|
||||
Episode: 1212
|
||||
Title: HPR1212: TGTM Newscast for 3/22/2013 Rebecca "Bobobex" Newborough
|
||||
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr1212/hpr1212.mp3
|
||||
Transcribed: 2025-10-17 21:43:21
|
||||
|
||||
---
|
||||
|
||||
You're listening to TGT News, number 91, record for March 22, 2013.
|
||||
You're listening to the Tech Only Hacker Public Radio Edition, to get the full podcast
|
||||
including political, commentary, and other controversial topics.
|
||||
Please visit www.toggeektme.us.
|
||||
Here are the vials statistics for this program.
|
||||
Your feedback matters to me.
|
||||
Please send your comments to dg at deepgeek.us.
|
||||
The web page for this program is at www.toggeektme.us.
|
||||
You can subscribe to me on Identica as the username DeepGeek or you could follow me on Twitter.
|
||||
My username there is dgtgtm, as an deepgeek talk geek to me.
|
||||
Hello, Becky Nubra, aka Boba Bex, now here for the Tech Roundup.
|
||||
From EFF.org dated March the 13th, 2013, by Hany Fakori, finally some limit to electronic searches at the border.
|
||||
In an important new decision, the ninth circuit court of appeals created the first explicit limits
|
||||
on the government's ability to search electronic devices at the border.
|
||||
The court's decision in United States versus Cotterman, establishes the government agents must
|
||||
have reasonable suspicion before conducting a forensic examination of a computer at the border.
|
||||
In 2007, Howard Cotterman attempted to enter the United States from Mexico through the
|
||||
Lukeville Port of Entry in Arizona.
|
||||
Border agents detained Cotterman for eight hours while they searched without a warrant
|
||||
two laptops in a digital camera that he was carrying.
|
||||
Ultimately, wanting to do a more invasive examination of the devices, the agents let Cotterman
|
||||
enter the US but held onto his electronic devices and took them 170 miles away to Tucson
|
||||
where they continued their warrantless search for two days.
|
||||
Ultimately, the agents found trial pornography on the computers and Cotterman was arrested
|
||||
and indicted.
|
||||
The trial court suppressed the evidence finding the warrantless search violated the Fourth
|
||||
Amendment.
|
||||
The government appealed to a three-judge panel of the ninth circuit who reversed, finding
|
||||
the search valid under the government's broad authority to search at the border without
|
||||
a warrant or any individualized suspicion.
|
||||
Cotterman asked for the entire ninth circuit to review the case on bank.
|
||||
Together with the National Association of Criminal Defense Lawyers, we filed an amicus brief asking
|
||||
the court to review this dangerous precedent to which it agreed to do last summer.
|
||||
To read the rest of the story, please follow the link in the show notes.
|
||||
In other story from EFF.org, this time dated March 14th and by Peter Eckersley.
|
||||
Google takes the dark path, Census Adblock Plus on Android.
|
||||
In a shocking move, Google has recently deleted Adblock Plus from the Android Play Store.
|
||||
This is hugely disappointing because it demonstrates that Google is willing to censor
|
||||
the software and abandon its support for open platforms as soon as there's an ad-related
|
||||
business reason for doing so.
|
||||
Until now, the internet and the software development communities have relied on Google
|
||||
to be safely on their side when it comes to building open platforms, encouraging innovation
|
||||
and giving users a maximum choice about how their computers will function.
|
||||
But with today's news, that commitment to openness suddenly looks much, much weaker.
|
||||
Google clearly has a vested interest in preventing people from installing ad-blocking software
|
||||
like Adblock Plus.
|
||||
But until recently, the company did an admirable job of leaving that matter aside and letting
|
||||
users make their own choices about whether they wanted to hide ads on their phones and
|
||||
in their browsers.
|
||||
Google established a reputation for building tools that put the interests of their users
|
||||
first.
|
||||
This new form of censorship is the exact opposite.
|
||||
It is not only a betrayal of the principle of openness, but a betrayal of the trust that
|
||||
people put in Google when they decide to buy an Android phone.
|
||||
Please follow the link in the show notes to read the remainder of this story.
|
||||
Our next story is from democracynow.org, dated March 13.
|
||||
Cyberattacks are more of a threat to the US than al-Qaeda.
|
||||
The nation's top intelligence officials are warning cyberattacks from abroad now pose
|
||||
a greater threat to national security than al-Qaeda and other militant groups.
|
||||
For the first time ever, an annual review of threats to the United States lists the risk
|
||||
of foreign computer attacks on the network of US infrastructure and institutions higher
|
||||
than terrorism, organized crime and weapons of mass destruction.
|
||||
Director of National Intelligence, James Clapper, discussed the finding in testimony before
|
||||
the Senate Intelligence Committee.
|
||||
James Clapper said, when it comes to distinct threat areas, our statement this year leads
|
||||
with cyber, and it's hard to overemphasize its significance.
|
||||
Increasingly, state and non-state actors are gaining and using cyber expertise.
|
||||
They apply cyber techniques and capabilities to achieve strategic objectives by gathering
|
||||
sensitive information from public and private sector entities, controlling the content and
|
||||
flow of information and challenging perceived adversaries in cyberspace.
|
||||
These capabilities put all sectors of our country at risk.
|
||||
In response, the Pentagon's new cyber command has unveiled plans to create 13 offensive teams
|
||||
to counter computer attacks from overseas by the fall of 2015.
|
||||
The teams would be used for cyber operations against foreign countries linked to computer
|
||||
attacks on the United States.
|
||||
From TechDirt.com dated the March the 14th by Mike Masnick.
|
||||
Details come out on US attorneys withholding the evidence in the Air and Schwartz case.
|
||||
Last week we wrote about Air and Schwartz's girlfriend, Taran Strinebrick-Nakalfman,
|
||||
releasing a statement accusing the Department of Justice of a variety of things that hadn't
|
||||
really been covered before, including lying, seizing evidence without a warrant, and with
|
||||
holding its copulatory evidence.
|
||||
That resulted in an interesting discussion in the comments in which a few Department
|
||||
of Justice defenders suggested that since there were no details we were probably making
|
||||
this up, as if we don't have better things to do.
|
||||
Now however, the details have come out.
|
||||
In a letter that was sent at the end of January, but just now leaked to the press, Schwartz's
|
||||
lawyers have highlighted how assistant US attorney Steve Heyman was responsible for the charges
|
||||
above.
|
||||
The key issue is the search of Aaron's laptop.
|
||||
Cambridge Police seized the laptop on January 6, 2011.
|
||||
The Secret Service did not obtain a warrant until February 9, 2011, even though it had
|
||||
clearly been involved since before the arrest and was leading the investigation.
|
||||
Schwartz's legal team, quite reasonably, argued that the evidence from the laptop should
|
||||
be suppressed due to the massive delay in obtaining the necessary warrant.
|
||||
Heyman hit back that it was the Cambridge Police who had the laptop, so the Secret Service
|
||||
had nothing to do with it until it got the warrant.
|
||||
There was a court hearing about all of this, and Heyman again insisted that the Secret
|
||||
Service had no responsibility until after the warrant.
|
||||
However, right after that hearing, Heyman apparently approached Schwartz's lawyers to reveal
|
||||
a key email from the lead Secret Service agent on the case, Michael Pickett, to Heyman
|
||||
himself.
|
||||
The email had been sent on January 7, 2011, in which he noted that he was prepared to
|
||||
take custody of the laptop any time, or whenever you feel is appropriate.
|
||||
In other words, the Secret Service clearly had de facto control over the laptop, directly
|
||||
contrasting Heyman's claims.
|
||||
Furthermore, withholding that bit of evidence, which would have raised serious questions about
|
||||
Heyman's claims to the court until after the hearing just makes the whole thing even
|
||||
more sketchy.
|
||||
To read the rest of this story, please follow the link in the show notes.
|
||||
Our final story is also from TechDirt.com dated March 14 and is by Mike Maznick.
|
||||
Kickstarter projects that don't meet their goal are not failures, they help people avoid
|
||||
failures.
|
||||
A little while back on one of our funniest most insightful comments of the week posts,
|
||||
we featured a comment that someone had made anonymously in response to a story about
|
||||
Bjork's Kickstarter project that was taken down before it ended after it did not look
|
||||
like it was going to get anywhere near the required threshold.
|
||||
However, the comment has stuck with me and I think it deserves a post.
|
||||
In particular, the commenter called us out for saying that her project failed.
|
||||
This was not a failure, said the post.
|
||||
Platforms like Kickstarter have changed the way the market is functioning, and our ways
|
||||
of thinking about it even here on TechDirt have to catch up.
|
||||
Bjork's campaign did not fail even though the results were not what she was hoping for.
|
||||
She successfully learned that the market was not interested in this product.
|
||||
Spending £375,000 of her own money, now that would have been a failure.
|
||||
Using Kickstarter is more like running a science experiment than it is like selling a product.
|
||||
It increases the efficiency of the market by orders of magnitude and apparently beyond
|
||||
our ability to think about it clearly.
|
||||
This point, even if it was calling us out, is so true and it's so important for people
|
||||
to understand.
|
||||
It's easy to use the word failure for those projects that don't meet their goal.
|
||||
Hell, just in writing this post, I repeatedly had to consciously stock myself from using
|
||||
the words fail or failure in describing projects that don't reach their goal.
|
||||
But the commenter is right, those projects are not failed projects once you realise what
|
||||
Kickstarter really is, i.e. a platform to judge the market for products and to build
|
||||
commitments and funding around them.
|
||||
If a project doesn't reach the goal, that's actually valuable market research, suggesting
|
||||
that if they had gone ahead without going through the experience, they likely would have failed.
|
||||
So in actuality, it makes sense to look at such projects and recognise that they were
|
||||
saved from a dismal failure in which large sums of money may have been spent but at the
|
||||
same time clarifying the market's reaction to a product before it's even been introduced.
|
||||
With so many people thinking of Kickstarter more of a store than as a platform for supporting
|
||||
people trying to turn cool ideas into reality, it's important to be careful in how we choose
|
||||
our language.
|
||||
Putting up a Kickstarter project that doesn't reach its goal shouldn't be seen as a failure.
|
||||
It should be seen as a useful bit of data which helps one avoid failure and also to, hopefully,
|
||||
sharpen up their product and pitch so that the next time, it's more likely to be funded.
|
||||
Staff to produce by the Talk Geek to Me News team, editorial selection by DeepGeek, views
|
||||
of the story authors reflect their own opinions and not necessarily those of the Talk Geek
|
||||
to Me News.
|
||||
News from TechDirt.com, EmptyWheel.net, in these times.com and Maggy McNeil.WordPress.com are
|
||||
used under a range permission.
|
||||
News from EFF.org is used under permission of the Creative Commons by Attribution License.
|
||||
News from RH RealityCheck.org is used under permission of the Creative Commons by Attribution
|
||||
Share-Relike License.
|
||||
News from Venezuelanalysis.com and DemocracyNow.org are used under permission of the Creative
|
||||
Commons by Attribution Non-Commercial No-Drivatives License.
|
||||
New sources retain their respective copyrights.
|
||||
That's the end of the Tech Roundup for this week.
|
||||
Thank you for listening.
|
||||
Talk to you soon.
|
||||
This episode of Talk Geek to Me is licensed under the Creative Commons Attribution Share-Relike
|
||||
3.0 on Port License.
|
||||
This license allows commercial reuse of the work as well as allowing you to modify the
|
||||
work as long as you share alike the same rights you have received under this license.
|
||||
Thank you for listening to this episode of Talk Geek to Me.
|
||||
You have been listening to Hacker Public Radio at Hacker Public Radio.
|
||||
We are a community podcast network that releases shows every weekday Monday through Friday.
|
||||
Today's show, like all our shows, was contributed by a HBR listener like yourself.
|
||||
If you ever consider recording a podcast, then visit our website to find out how easy it really is.
|
||||
Hacker Public Radio was founded by the Digital Dog Pound and the Infonomicom Computer Club.
|
||||
HBR is funded by the Binary Revolution at binwreff.com or binwreff projects are crowd-responsive by Lina Pages.
|
||||
From shared hosting to custom private clouds, go to LinaPages.com for all your hosting needs.
|
||||
Unless otherwise stasis, today's show is released under a Creative Commons Attribution Share-Relike 3.0 license.
|
||||
Reference in New Issue
Block a user