Episode: 1221 Title: HPR1221: TGTM Newscast 93 for 2013-04-02 DeepGeek and Dann Washko Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr1221/hpr1221.mp3 Transcribed: 2025-10-17 21:54:08 --- You're listening to TGGM News No. 93 record for Tuesday, April 2, 2013. You're listening to the Tech Only Hacker Public Radio Edition to get the full podcast including political, commentary, and other controversial topics. Please visit www.talkeakedme.us. Here are the vials statistics for this program. Your feedback matters to me. Please send your comments to DG at deepgeek.us. The webpage for this program is at www.talkeakedme.us. You can subscribe to me on Identica as the username DeepGeek or you could follow me on Twitter. My username there is DGTGM as a deepgeek talk geek to me. This is Dan Waschko and now the tech round up. From themocracynow.org dated March 26, NATO researchers, US-Israeli cyber attack on Iran was illegal act of force. A new study commissioned by NATO says the joint US-Israeli cyber attack launched on Iran's nuclear facilities was an act of force that likely violated international law. A group of 20 international researchers reportedly agreed unanimously that the launch of the cyber-warms stocks net several years ago constituted an act of force which is prohibited under the United Nations Charter except in cases of self-defense. Some even thought the world constituted an armed attack which would mark the start of a conflict and entitled Iran to use force to defend itself. From techdirt.com by Mike Maznick dated March 25, rather than fix the CFA, how should judiciary committee plan to make it worse? So you know all that talk about things like Aaron's Law and how Congress needs to fix the CFA? Apparently, the House Judiciary Committee has decided to raise a giant middle finger to folks who are concerned about abuses of the CFA. Over the weekend, they began circulating a draft of a cyber security bill that is so bad that it almost feels like the Judiciary Committee is doing it on purpose as a dig at online activists who have fought back against things like SOPA, SISPA and the CFA. Rather than fix the CFA, it expands it. Rather than rein in the worst parts of the bill, it makes them worse. And from what we've heard, the goal is to try to push this through quickly with a big effort underway for a cyber week in the middle of April that will force through a bunch of related bills. Let's go through some of the pieces. Adds computer crimes as a form of racketeering. The bill adds to the current definition of racketeering activity so that it would now link back to the CFA, such that if you are found to violate the CFA as part of an activity that involves a variety of other crimes, you can now also be charged with racketeering. Basically, this just gives the DOJ yet another tool to use against computer criminals when they want to bring the hammer down on someone they don't like. Not only could you be charged with computer fraud, but now racketeering as well. Because you know, all you hackers are just like the mom. Expanding the ways in which you could be guilty of the CFA, including making you, just as guilty if you plan to violate the CFA, then if you actually did so. Section 103 of the proposed bill makes a bunch of changes to the CFA, almost all of which expand the CFA rather than limit it. For example, they make a small change to the subsection B in 18 United States Code 1030, the CFA, such that it will now read, whoever conspires to commit or attempts to commit an offense under subsection A of this section shall be punished as provided for the completed offense and subsection C of this section. All they did was add the four the completed offense to the sentence. That may seem like a minor change at first, but it would now mean that they can claim that anyone who talked about doing something conspired to commit that violates the CFA shall now be punished the same as if they had completed the offense. And considering just how broad the CFA is, think how ridiculous that might become. Now, if you talk with others about the possibility of violating a terms of service, say talking to your 12-year-old about helping them sign up for Facebook, even though the site requires you to be 13, you may have already committed a felony that can get you years in jail. That seems fair, right? Ratchet's up many of the punishments. They change around a bunch of the penalties that you can get for various CFA-A infractions. Shaking up a variety of things and basically raising the maximum sentences available for certain infractions, expanding the definition of exceeding authorized access in a very dangerous way. That's because the new bill says that you can exceed authorized access even if the successor may be entitled to obtain or alter the same information in the computer for other purposes. Yes, read that again. So even if the successor may be entitled to obtain or alter the same information in the computer for other purposes, even if you are allowed to obtain info via your authorization on your computer, they're now saying that if you use that information in a way that runs a foul of the info above, you can be found to have exceeded authorized access. Make it easier for the federal government to seize and forfeit anything. We've seen how the federal seizure and forfeiture laws are frequently abused to seize goods, which the government claims are used in commission of a crime, even if they never charge anyone for the crime. And we've seen with cases like, and we've seen with cases like the jazzle case, how the government will use such tools to take and censor websites on no actual basis. And now the CFA will make it even easier for the government to do such things. It amends the existing sections to basically expand what can be forfeited, because it's not like the government hasn't abused that one before. The rest of the bill deals with two other things. First, the section on cyber security, which includes punishment for those damaging critical infrastructure computers. Another section that tells the courts to figure out how to secure their computers are, and finally a part that creates a national cyber investigative joint task force to be led by the FBI. Rather than fixing the law, they're expanding it so that computer crimes can be hit with racketeering charges and expanding the general language and punishments for part of the bill. This is not a good thing. The fact that this is being passed around the House Judiciary Committee suggests that it's likely to be backed by HJC Chair Bob Goldley, which is unfortunate. You would have hoped that Goldley and others in the HJC would recognize that now is the time to fix the CFA, not make it worse. From torrentfreak.com dated March 26th by Ernesto, BitTorrent's Brom Cohen patents revolutionary live streaming protocol. Earlier this month, BitTorrent Live was unveiled to the public. The new protocol allows the public to send a video stream to millions of people without having to invest in expensive bandwidth. Around the same time as BitTorrent Live was launched, the underlying patent application was published online. In it, Cohen describes what makes the technology so unique and torrentfreak caught up with BitTorrent's creator to find out more. Quote, doing live streaming well on the internet has long been a problem. Peer-to-peer live streaming has always suffered from high latency, meaning there is typically a lot of delay between when a broadcast happens and when end users see it. Typically dozens of seconds or minutes. End quote, Cohen told Torrent Freak. Quote, BitTorrent Live allows a broadcaster to stream to millions of people with just a few seconds of latency. This is new and unique and potentially world-changing. End quote, he adds. Brom Cohen explains that the patent is in no way going to restrict users' access to the new protocol. Quite the contrary, BitTorrent Live will be available to end users for free and publishers who are using the service and hosting it on their own will not be charged either. BitTorrent Live is a complex technology but basically works by dividing peers at the various clubs of peers who share data among each other via UDP's Screamer Protocol. To get slightly more technical, the way BitTorrent Live works is by making subsets of peers responsible for subsets of data. Hyrobusness and low latency is achieved by using a Screamer Protocol between those peers. Cohen explains. For the last hop, it uses a non-Screamer Protocol to regain congestion, control, and efficiency. There is redundancy in some ways in the screaming. But that's kept under control by only using it to get data to a small fraction of the peers. Brom Cohen believes that the future of television is on the internet, and BitTorrent Live can help deliver live high-definition content to millions of people at once at no cost. This is not just the future for independent broadcasters, but also for the major content companies. There are not many people who can change the fundamentals of the internet two times in a row. However, Brom Cohen already did it once with the original BitTorrent Protocol and he believes that BitTorrent Live can have a similar impact. To read the complete article, follow the article link in the show notes. From techdirt.com by Mike Maznick, dated March 28th. Department of Justice misled judges for years about how it was using stingray devices to spy on people. How many times does it need to be repeated? If you give law enforcement the ability to spy on people, even with limits, law enforcement will always blow through those limits and abuse its powers. It has happened over and over and over again, and that becomes doubly true when law enforcement has worked out ways to avoid oversight. Back in 2011, the Wall Street Journal broke a huge story about the frequent use of by-government officials of a technique for mobile device surveillance, generically called stingray devices. Technically, there are a few products used for this, only some of which are actually called stingrays, but the name is now used to refer to all of them. The device works by pretending to be a mobile phone tower, so devices can connect to it, and law enforcement gets all your data. It's basically a cellular man in the middle attack with law enforcement being the man in the middle. The technology has been a key component in the case involving Daniel Rigmaiden, which we wrote about last year. Rigmaiden was taken into custody on a fraud charge, and representing himself in court, he has sought more info on how he was tracked down, leading to some reluctant disclosure about law enforcement using stingray devices on questionable authority to find him. In that case, we noted that law enforcement claimed it had court order to use the technology, but the judge was confused, asking where were the warrants for the use of the device. The judge asked how it was possible that a court order or warrant was issued without the judge ever being told about the technology used in surveillance, and was told simply, it was a standard practice. Indeed, that appears to be the case. The ACLU filed a bunch of Freedom of Information Act requests to dig into this and newly released documents show that indeed. It was apparently standard practice by the Department of Justice to be less than explicit and less than forthright with judges in seeking warrants and court orders to make use of this technology. Here's an email that was revealed. As some of you may be aware, our office has been working closely with the magistrate judges in an effort to address their collective concerns regarding whether a pen register is sufficient to authorize the use of law enforcement's wit technology, a box that simulates a cell tower and can be placed inside a van to help pinpoint an individual's location with some specificity to locate an individual. It has recently come to my attention that many agents are still using wit technology in the field, although the pen register application does not make that explicit. While we continue to work on long-term fix for this problem, it is important that we are consistent and forthright in our pen register requests to the magistrates. Basically, that's the Department of Justice in admitting that it is not been forthright or explicit in letting judges know that it is going to use this extremely intrusive form of surveillance in seeking approvals. And the courts have been concerned about this. As the ACLU notes, this email was written three years after the rig made in situation happened, suggesting that the Department of Justice has been getting away with this sort of thing for many years without anyone digging in. The ACLU is now arguing that this should be a reason to suppress the evidence obtained via these devices, and will ask for the court to send a clear message that it cannot hide the truth from federal judges in seeking rubber stamps to violate the privacy of the public. From TechDirt.com by Mike Masnick, dated March 28th, government can keep key emails with Hollywood lobbyists about six strikes secret. From the Cannes interferes with that commercial relationship department. While we keep hearing folks in the entertainment industry and their supporters in DC talk about how great it is that the six strikes copyright alert system, CAS, was a voluntary agreement between industry players and one of the worst kept secrets in the world was that the White House was heavily involved. They basically helped Hollywood out and at least hinted strongly at the fact that if no voluntary agreement came through, legislation might have to be put in place, creating a novel definition of voluntary. Specifically, it came out that Victoria Espinell, the White House IP Enforcement Coordinator, had been emailing with people about the program. That news came out because Chris Sohoyin had submitted a Freedom of Information Act, request seeking details of all communications between Espinell and her staff and the various players and six strikes, both the entertainment industry and the various ISPs. However, Sohoyin felt that the Office of Management and Budget OMB in which Espinell works kept key documents from being revealed and appealed. Following that, OMB released a few more documents, but still kept many secret. Sohoyin then went to court over the issue, arguing specifically that exemptions claimed for, quote, trade secrets, commercial or financial interests, end quote, and quote, privileged interagency memoranda and letters, end quote, were inappropriate. Unfortunately, the court has now rejected that case, citing with OMB. At issue are some details of the draft memorandum of understanding that created the six strikes cast program. Apparently, entertainment industry lobbyists shared those drafts with Espinell, but OMB won't release them, claiming that their commercial, confidential information. OMB also argued that the documents were provided voluntarily and that the drafts were not compelled or obligated. In response, Sohoyin argued that the documents were clearly provided to OMB for the sake of having Espinell, quote, press ISPs for additional steps to combat, copyright infringement. Because they are not legally obligated to take end quote. The court rejects this saying that the info was provided confidentially and voluntarily, and it represents commercial information. Sohoyin remained secret. The court also rejected an attempt to see internal discussions within the government about the Six Strikes Plan, as well as discussions on foreign laws like Hadopi Strikes, Six Strikes Plan in France. Espinell's office argued that these are protected because they are part of the deliberative process privilege that lets them withhold internal deliberative discussions about policy so that government employees can discuss stuff openly before coming to an official policy position. However, here Sohoyin argued that Espinell and the IPEC have almost no policy setting role under the law, and thus this exemption makes little sense. Once again, the court disagreed. Here they argued that since the government may make policy decisions based on whether or not Six Strikes formed or how well it works, that these communications were properly classified as privilege and not open the FOIA requests. The court goes into a bit more detail on a few specific withheld documents, but the conclusion is all the same. OME can keep these documents secret because they involve internal deliberative discussions. This isn't too surprising, but it also means that we don't get to learn the full extent of the government's involvement in this voluntary process. There are headlines in the news to read these stories via the links in the show notes. New Zealand gave Kim.com residency knowing he was wanted by FBI. Websites can legally pirate porn movies, prosecutors' rule. Staffed and produced by the TGTM News Team, editorial selected by Deep Geek, views of the story authors reflect their own opinions and not necessarily those of TGTM News. News from techdirt.com, in these times.com and allgov.com used under a range permission. News from realitycheck.org used under terms of their re-publication policy. News from tortfreak.com is used under permission of the Creative Commons by Attribution License. News from democracy now used under permission of the Creative Commons by Attribution, non-commercial no-derivatives license. New sources retain their respective copyrights. Thank you for listening to this episode of Talk Geek to Me. Here are the vials statistics for this program. Your feedback matters to me, please send your comments to DG at deepgeek.us. The web page for this program is at www.talkgeektoMe.us. You can subscribe to me on Identica as the username DeepGeek or you could follow me on Twitter. My username there is DGTGM as in DeepGeek Talk Geek to Me. This episode of Talk Geek to Me is licensed under the Creative Commons Attribution share like 3.0 on-board license. This license allows commercial reuse of the work as well as allowing you to modify the work as long as you share alike the same rights you have received under this license. Thank you for listening to this episode of Talk Geek to Me. You have been listening to Hacker Public Radio or Hacker Public Radio does not. We are a community podcast network that releases shows every weekday Monday through Friday. Today's show, like all our shows, was contributed by a HBR who's snared by yourself. If you ever consider recording a podcast, then visit our website to find out how easy it really is. Hacker Public Radio was founded by the Digital.Pound and the Infonomicom Computer Club. HBR is funded by the Binary Revolution at binref.com. All binref projects are proudly sponsored by Luna Pages. From shared hosting to custom private clouds, go to LunaPages.com for all your hosting needs. Unless otherwise stasis, today's show is released on the Creative Commons Attribution Share Alive. He does our license.