Files
Lee Hanken 7c8efd2228 Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use
- Search episodes, transcripts, hosts, and series
- 4,511 episodes with metadata and transcripts
- Data loader with in-memory JSON storage

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-26 10:54:13 +00:00

416 lines
18 KiB
Plaintext

Episode: 1125
Title: HPR1125: TGTM Newscast for 11/21/2012
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr1125/hpr1125.mp3
Transcribed: 2025-10-17 19:24:39
---
.
.
You're listening to Toa Geek to Me News.
Number 81, record for Wednesday, November 21, 2012.
You're listening to the Tech Only Hacker Public Radio
Edition to get the full podcast, including political,
commentary, and other controversial topics.
Please visit www.toageektoMe.us.
Here are the vials statistics for this program.
Your feedback matters to me.
Please send your comments to DG at deepgeek.us.
The webpage for this program is at www.toageektoMe.us.
You can subscribe to me on Identica as the username DeepGeek
or you could follow me on Twitter.
My username there is DGTGM, as in DeepGeek Toa Geek to Me.
Another tech roundup from EFF.log, dated November 8, 2012 by Henny Fakuri.
Court blocks Proposition 35's restriction on anonymous speech.
A few hours after EFF and the ACLU of North California filed a class action law
students in Francisco.
In San Francisco, federal court challenging California's
recently enacted Proposition 35, the court issued a temporary restraining
order blocking implementation of the initiative due to the existence of
serious questions about whether it violated the First Amendment.
Proposition 35 is ostensibly about increasing punishment for human
traffickers, but would also require all registered sex affairs in
California to turn over a list of all their internet identifiers
and service providers to law enforcement, leading up to the election
re-urge California voters to reject it, wearing this would result in a
significant restriction of free speech on the internet.
We want to loan a criticizing Proposition 35, newspapers like the LA Times
and Sacramento Bee spoke out against the initiative too.
Unfortunately, yet unsurprisingly, California voters overwhelmingly approved
the initiative on election night.
Wednesday morning, we filed suit, auging Proposition 35 violates the
First Amendment because requiring people, even unpopular people, to give up
their ability to speak freely and anonymously, chills free speech.
Proposition 35 eliminates the ability of a whole class of people, 73,000
individuals in California, to speak anonymously online by forcing them to
turn over any identifier they use, whether it's anonymous or Joan Jo, or their real name.
Plus, it requires disclosure of information about online accounts
unrelated to criminal activity, like Yelp or Amazon.com,
and most troubling it allows the government to monitor and record a wide
swath of innocent internet activity from a registrant with a fancy football
team to the one who comments on a political discussion group.
While we certainly believe that human trafficking is a terrible crime,
requiring registrants to turn over online identifiers
doesn't combat this issue.
Instead, it creates a dangerous slippery slope, like mandatory DNA collection
before it, what begins with sex offense inevitably expands as law enforcement
gets looked to accessing this online data and starts demanding more and more of it.
The temporary restraining order is an important first step in ensuring that
the First Amendment isn't the casualty of a well-intentioned but ultimately
overbroad and dangerous initiative.
In stopping the implementation of Proposition 35, the court recognized the important
issues that need to be considered before the law could go into effect.
A hearing is now scheduled for December 17th on whether the court should grant
a permanent injunction, striking down the law permanently.
From eff.log,
the end of November 14th, 2012 by Henny Fakuri and Kurt Opchall and Rainy Friedman.
When will our e-mail betray us?
An e-mail privacy primer in light of the proteus saga?
The unfolding scandal that led to the resignation of General David Patreus,
the director of the Central Intelligence Agency,
starred with some purportly harassing e-mail sent from pseudonymous e-mail
accounts to Jill Kelly.
After the FBI kicked its investigation into high gear,
it identified the sender as Polar Broadwell and, ultimately,
read massive amounts of private e-mail messages that uncovered an affair
between Broadwell and Patreus, and now the investigation has
expanded to include General John Allen's e-mails with Kelly.
We've received a lot of questions about how this works.
What legal process the FBI needs to conduct its e-mail investigation?
The short answer? It's complicated.
The Electronic Communications Privacy Act,
ECAPA, is a 1986 law that Congress enacted to protect U.S. privacy
in electronic communications like e-mail and instant messages.
ECAPA provides scant protection for your identifying information,
such as the IP address used to access an account.
While Polar Broadwell reportedly created a new pseudonymous account
for the allegedly harassing e-mails to Jill Kelly,
she apparently did not take steps to disguise the IP number
her messages were coming from.
The FBI could have obtained this information with Justice
Appena to the service provider,
but obtaining the account's IP address alone
does not establish the identity of the e-mail sender.
Broadwell apparently accessed the e-mails from hotels
and other locations, not her home,
so the FBI cross-reference the IP addresses
of these Wi-Fi hotspots against guest lists
from other cities and hotels looking for common names.
If Broadwell wanted to stay anonymous,
a new e-mail account combined with Open Wi-Fi was not enough.
The ACLU has an in-depth write-up of the surveillance
and security lessons to be learned from this.
After the FBI identified Broadwell, they searched her e-mail.
According to news reports, the affair between Portrayus
and Broadwell lasted from November the 2011 to July 2012.
The harassing e-mails sent by Broadwell to Jill Kelly
stored in May of 2012 and Kelly notified the FBI shortly thereafter.
Thus in the summer of 2012, when the FBI was investigating
the bulk of the e-mails would be less than 180 days old.
This 180 day old dividing line is important for determining
how ECPA applies to e-mail.
Compared to identifying information,
ECPA provides more legal protection for the contents of your e-mail
but with gaping exceptions.
While a small but increasing number of federal courts have found
that the Fourth Amendment requires a warrant for all e-mail,
the government claims ECPA only requires a warrant for e-mail
that is stored for 180 days or less.
But as the Department of Justice manual for searching
and seizing e-mail makes clear, the government believes
this only applies to unopened e-mail.
Other e-mail is fair game, with only a subpoena,
even if the messages are less than 180 days old.
According to reports, Betrayus and Broadwell
adopted a technique of drafting e-mails
and reading them in the draft folder rather than sending them.
The DOJ would likely consider draft messages as open e-mail
and therefore not entailed to the protection of a search warrant.
In a nutshell, although ECPA requires a warrant
for the government to obtain the contents of an e-mail
stored online for less than 180 days,
the government believes the warrant requirement doesn't apply for e-mail
that was opened and left on the server,
the typical scenario for web mail systems like Gmail.
Even if the messages are less than 180 days old,
so under the government's view, so long as the e-mails
had been opened or were saved in the draft folder,
only a subpoena was required to look at the contents
of Broadwell's e-mail account.
Confused? Well, here's where things get really complicated.
The government's view of the law was rejected by a 9th Circuit Court of Appeals,
the Federal Appellate Court that covers the Western United States,
including California, and the home to many online e-mail companies,
and the service that hosts their messages.
As a result, the DOJ manual notes that agents outside of the 9th Circuit
can therefore obtain such e-mail and other stored
electrical wire communications in electronic storage,
more than 180 days using a subpoena,
but reminds agents in the 9th Circuit to get a warrant.
News reports show that the FBI agents involved in the portrayal scandal
were in Tampa, Florida.
Thus, according to the DOJ manual,
they did not need to get a warrant,
even if the e-mail provider was in California,
like, for example, Gmail.
Law enforcement elsewhere may continue to apply
the traditional narrow interpretation of electronic storage,
even when the data sort is within the 9th Circuit.
A subpoena for e-mail content would generally require notice
to the subscriber, though another section of Equipa
allows for delayed notice for up to 90 days.
The FBI interviewed Broadwell for the first time in September,
about 90 days after the investigation began in June.
However, many providers nevertheless
protect their users by following the 9th Circuit rule
and insist upon a warrant for the contents of all e-mail.
In EFF's experience, the government will seek a warrant
rather than litigate the issue.
Thus, assuming the service provider stepped up,
it is likely that the government used a warrant
to obtain access to the e-mails at issue.
To either ask this far call, follow links in the show notes.
From torrentfreak.com, by Ernesto Day, November 18, 2012,
mega-uploads search warrant requests ignored, massive,
non-infringing use.
In the wake of the January shutdown of mega-upload,
many of the site's legitimate users complained
that their personal files had been lost.
Among these users are many people in the US military
who used the site to share pictures and videos with family.
Torrentfreak learned that at least 15,634 soldiers
had accounts at mega-upload between them
sharing hundreds of thousands of files.
One of the users, entrepreneur Kyle Goodwin,
asked the court to return his files.
As part of this request, his attorneys filed
a motion to unseal the mega-upload search warrant
so they can see on what grounds the data was taken.
This week, Judge O'Grady granted the request
and ordered the release of the warrants
and their applications albeit redacted.
This means we can now see how the US put forward its request
to seize the domains and servers.
The search warrant applications don't offer any new facts
and mostly recite what has already been written in the indictment.
The government describes mega-upload as nothing more than a place
where copyright infringing files are stored
and this is what the judge signed off on.
However, what is striking is that none of the release records
even mentioned legitimate use of the site.
In other words, the rights of mega-uploads
legitimate users were never taken into consideration.
Speaking with Torrentfreak, Kim.com shares our surprise
knowing that nearly half of all files stored mega-upload
were never downloaded.
Quote, the legitimate use was completely ignored
in the seizure warrant applications.
Almost 50% of the files stored mega-upload
didn't have a single download.
There was massive, non-unfringing use
by those who just wanted to store data in the cloud.
Unquote.com says.
The lack of discussion about the many legitimate users
of mega-upload is concerning.
Several of the allegations made against mega-upload
could easily apply to other hosting and video services.
The FBI, for example, explains in detail
how their undercover agent was able to upload
view and download copyright videos,
something that's also quite common on YouTube.
More direct allegations against mega-upload
are misleading.com.
For example, that the mega-upload team failed
to delete infringing files that were pointed out
in a criminal search warrant back in 2010.
Quote, a member of the mega-conspiracy
informed several of his co-conspirators at that time
that he located the named files using internal searches
of the mega-conspiracy systems.
As of November 18, 2011,
36 of the 39 infringing copies of the copyright motion pictures
were still being stored on service controlled
by the mega-conspiracy, the DOJ rights.
However, .com now explains that they didn't touch the files
because they were never asked to do so
and didn't want to interfere with evidence
in a criminal case.
A document seen by Torrent Freak acts this up.
Quote, the FBI asked us for uploader information
regarding 39 files and told us to keep
their investigation confidential.
We assisted and obviously didn't touch the uploader accounts
or files because of the ongoing investigation.com.
Quote, to use this against us and to tell a judge
that the mega-upload domain seizures justified
because we have not removed those 39 files
is totally unethical and misleading.
Quote, he adds, to read the rest of this article
following in the show notes.
From Torrent Freak.com, by our nestoded number 15th, 2012,
Verizon will reduce speeds of repeated Bitcoin Torrent Pirates.
Last year, the MPAA and RIA teamed up
with five major internet providers
in the United States to launch a center
for copyright information, the CCI.
The prize agreed on a system
through which subscribers all warned
that their copyright infringements have been observed
by rights holders after several warnings,
ISPs may then take a variety of repressive measures
to punish the alleged infringers.
From leaked AT&T training documents,
we learned that the company will block users' access
to popular websites until they complete
a copyright education course.
However, none of the participating internet providers
have publicly commented on the measures
they plan to take until now.
During a panel discussion hosted by the New York Chapter
of the Internet Society, Verizon and Time Warner Cable
unveiled details of their plans.
Link, hoeing, vice president of Internet
and Technology Issues for Verizon,
said his company will employ a three-stage process,
the first to alert the result in a simple notification email,
informing the users that their connection has been flagged
for copyright infringements.
After the second warning comes the acknowledgement phase,
and which a pop-up is delivered to users.
Once received, subscribers are required to read
and confirm a process designed to ensure
that they are aware of the unauthorized sharing
that's taken place via their account.
If the infringements continue,
punishments become a reality on the 5th and 6th alerts.
Hearing said that these repeated infringers
will have their internet connections throttled,
resulting in significantly slower download speeds.
This throttling is temporary and will be lifted after two
or three days to read the RSSOGLE follow links in the show notes.
From TechDirt.com by Timothy Gagna,
date November 16, 2012.
Taliban spokesman accidentally copies mailing lists
on press release email.
You know that mistake you make where you want to send an email
to a bunch of people,
typically annoying chain letters about finding love next week
if they forward it to 20 people immediately.
Luck just doesn't wait around you now.
But you don't want to expose all of your friends
and family's emails so you blind copy everyone,
except you didn't.
Now you're the jackass sending emails with 40 addresses,
listed and your grandmother hates you for spamming her?
Well, funny story.
It turns out that one of the few things
we frame loving folks in the states
haven't common without Taliban enemies
is an amusing and capacitive check
to whom we're sending our emails.
Take a look at the oops Taliban spokesperson,
Kari Husef Hamedi made,
when he accidentally c-seed rather than b-c-seed,
the Taliban's mailing list on a press release email
this past Saturday.
Quote,
In a Dilbert-esque faux pas,
a Taliban spokesperson sent out a routine email
last week with one notable difference.
He publicly c-seed the names
of everyone on his mailing list.
The names were disclosed in an email
by Kari Husef Hamedi,
an official Taliban spokesperson on Saturday.
The email was a press release he received from the account
of Zabahula Mushad-Muhadid,
another Taliban spokesperson.
Kari Husef Hamedi then forward Muhadid's email
to the full Taliban mailing list,
but rather than using the b-c-seed function
or blind-carbon copy which keeps email addresses private,
Kari Husef Hamedi made the addresses public.
I'm sure years from now,
when the CIA has once again employed the Taliban
to fire on our behalf against the Chinese,
Australian, alien alliance,
we'll look at back on this
and have a nice laugh.
But there's no understanding that this is a massive screw-up.
Sure, most of the folks on the distribution list
were journalists,
but exposing their names that way,
particularly for those that are working
within Afghanistan,
isn't a good thing.
Besides that,
not all the people who were exposed were journalists.
Quote.
The list also includes an address
appearing to belong to a provincial governor,
an Afghan legislature,
several academics and activists,
an Afghan consultative committee,
and a representative of Gul Budin,
Hekbata,
an Afghan warlord whose outlawed group,
Hezboe Islami,
is believed to be behind several attacks
against coalition troops.
Somehow, I don't see this making the Taliban brass very happy,
and Senator Joe Lieberman wants the internet services
to block Taliban messages.
Why?
Let them keep making these kind of mistakes.
News from tector.com,
in these times.com,
iSinViv.com,
used under a range permission.
News from torrentfreak.com,
and eff.org,
used under permission of the creative comments
by attribution license.
News from Venezuelananalysis.com
and democracynow.org,
used under permission of the creative comments
by attribution,
non-commercial, no-durabous license.
News sources retain their respective copyrights.
Here are the vials statistics for this program.
Your feedback matters to me.
Please send your comments to
DG at deepgeek.us.
The webpage for this program
is at www.talkgeektome.us.
You can subscribe to me
on Identica as the user name DeepGeek.
Or you could follow me on Twitter.
My username there is DGTGM.
As an DeepGeek talk geek to me.
This episode of Talk Geek to me
is licensed under the creative comments
attribution share like 3.0
unpoored license.
This license allows
commercial reuse of the work
as well as allowing you to modify the work
as long as you share a like
the same rights you have received
under this license.
Thank you for listening to this episode of Talk Geek to me.
You have been listening to
DGTGM.
Thank you for listening to this episode of Talk Geek to me
on Identica as the user name
on Identica as the user name
on Identica as the user name
on Identica as the user name
on Identica as the user name
on Identica as the user name
on Identica as the user name
on Identica as the user name
on Identica as the user name
on Identica as the user name
on Identica as the user name
on Identica as the user name