Files
Lee Hanken 7c8efd2228 Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use
- Search episodes, transcripts, hosts, and series
- 4,511 episodes with metadata and transcripts
- Data loader with in-memory JSON storage

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-26 10:54:13 +00:00

284 lines
19 KiB
Plaintext

Episode: 1221
Title: HPR1221: TGTM Newscast 93 for 2013-04-02 DeepGeek and Dann Washko
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr1221/hpr1221.mp3
Transcribed: 2025-10-17 21:54:08
---
You're listening to TGGM News No. 93 record for Tuesday, April 2, 2013.
You're listening to the Tech Only Hacker Public Radio Edition to get the full podcast
including political, commentary, and other controversial topics.
Please visit www.talkeakedme.us.
Here are the vials statistics for this program.
Your feedback matters to me.
Please send your comments to DG at deepgeek.us.
The webpage for this program is at www.talkeakedme.us.
You can subscribe to me on Identica as the username DeepGeek or you could follow me on Twitter.
My username there is DGTGM as a deepgeek talk geek to me.
This is Dan Waschko and now the tech round up.
From themocracynow.org dated March 26, NATO researchers, US-Israeli cyber attack on Iran
was illegal act of force.
A new study commissioned by NATO says the joint US-Israeli cyber attack launched on Iran's
nuclear facilities was an act of force that likely violated international law.
A group of 20 international researchers reportedly agreed unanimously that the launch of the
cyber-warms stocks net several years ago constituted an act of force which is prohibited
under the United Nations Charter except in cases of self-defense.
Some even thought the world constituted an armed attack which would mark the start of
a conflict and entitled Iran to use force to defend itself.
From techdirt.com by Mike Maznick dated March 25, rather than fix the CFA, how should
judiciary committee plan to make it worse?
So you know all that talk about things like Aaron's Law and how Congress needs to fix
the CFA?
Apparently, the House Judiciary Committee has decided to raise a giant middle finger
to folks who are concerned about abuses of the CFA.
Over the weekend, they began circulating a draft of a cyber security bill that is
so bad that it almost feels like the Judiciary Committee is doing it on purpose as a dig
at online activists who have fought back against things like SOPA, SISPA and the CFA.
Rather than fix the CFA, it expands it.
Rather than rein in the worst parts of the bill, it makes them worse.
And from what we've heard, the goal is to try to push this through quickly with a big
effort underway for a cyber week in the middle of April that will force through a bunch
of related bills.
Let's go through some of the pieces.
Adds computer crimes as a form of racketeering.
The bill adds to the current definition of racketeering activity so that it would now
link back to the CFA, such that if you are found to violate the CFA as part of an activity
that involves a variety of other crimes, you can now also be charged with racketeering.
Basically, this just gives the DOJ yet another tool to use against computer criminals when
they want to bring the hammer down on someone they don't like.
Not only could you be charged with computer fraud, but now racketeering as well.
Because you know, all you hackers are just like the mom.
Expanding the ways in which you could be guilty of the CFA, including making you, just
as guilty if you plan to violate the CFA, then if you actually did so.
Section 103 of the proposed bill makes a bunch of changes to the CFA, almost all of which
expand the CFA rather than limit it.
For example, they make a small change to the subsection B in 18 United States Code
1030, the CFA, such that it will now read, whoever conspires to commit or attempts to
commit an offense under subsection A of this section shall be punished as provided for
the completed offense and subsection C of this section.
All they did was add the four the completed offense to the sentence.
That may seem like a minor change at first, but it would now mean that they can claim
that anyone who talked about doing something conspired to commit that violates the CFA
shall now be punished the same as if they had completed the offense.
And considering just how broad the CFA is, think how ridiculous that might become.
Now, if you talk with others about the possibility of violating a terms of service, say talking
to your 12-year-old about helping them sign up for Facebook, even though the site requires
you to be 13, you may have already committed a felony that can get you years in jail.
That seems fair, right?
Ratchet's up many of the punishments.
They change around a bunch of the penalties that you can get for various CFA-A infractions.
Shaking up a variety of things and basically raising the maximum sentences available for
certain infractions, expanding the definition of exceeding authorized access in a very
dangerous way.
That's because the new bill says that you can exceed authorized access even if the
successor may be entitled to obtain or alter the same information in the computer for other
purposes.
Yes, read that again.
So even if the successor may be entitled to obtain or alter the same information in
the computer for other purposes, even if you are allowed to obtain info via your authorization
on your computer, they're now saying that if you use that information in a way that runs
a foul of the info above, you can be found to have exceeded authorized access.
Make it easier for the federal government to seize and forfeit anything.
We've seen how the federal seizure and forfeiture laws are frequently abused to seize goods,
which the government claims are used in commission of a crime, even if they never charge anyone
for the crime.
And we've seen with cases like, and we've seen with cases like the jazzle case, how the
government will use such tools to take and censor websites on no actual basis.
And now the CFA will make it even easier for the government to do such things.
It amends the existing sections to basically expand what can be forfeited, because it's
not like the government hasn't abused that one before.
The rest of the bill deals with two other things.
First, the section on cyber security, which includes punishment for those damaging critical
infrastructure computers.
Another section that tells the courts to figure out how to secure their computers are,
and finally a part that creates a national cyber investigative joint task force to be led
by the FBI.
Rather than fixing the law, they're expanding it so that computer crimes can be hit with
racketeering charges and expanding the general language and punishments for part of the
bill.
This is not a good thing.
The fact that this is being passed around the House Judiciary Committee suggests that
it's likely to be backed by HJC Chair Bob Goldley, which is unfortunate.
You would have hoped that Goldley and others in the HJC would recognize that now is the
time to fix the CFA, not make it worse.
From torrentfreak.com dated March 26th by Ernesto, BitTorrent's Brom Cohen patents revolutionary
live streaming protocol.
Earlier this month, BitTorrent Live was unveiled to the public.
The new protocol allows the public to send a video stream to millions of people without
having to invest in expensive bandwidth.
Around the same time as BitTorrent Live was launched, the underlying patent application
was published online.
In it, Cohen describes what makes the technology so unique and torrentfreak caught up with
BitTorrent's creator to find out more.
Quote, doing live streaming well on the internet has long been a problem.
Peer-to-peer live streaming has always suffered from high latency, meaning there is typically
a lot of delay between when a broadcast happens and when end users see it.
Typically dozens of seconds or minutes.
End quote, Cohen told Torrent Freak.
Quote, BitTorrent Live allows a broadcaster to stream to millions of people with just
a few seconds of latency.
This is new and unique and potentially world-changing.
End quote, he adds.
Brom Cohen explains that the patent is in no way going to restrict users' access to the
new protocol.
Quite the contrary, BitTorrent Live will be available to end users for free and publishers
who are using the service and hosting it on their own will not be charged either.
BitTorrent Live is a complex technology but basically works by dividing peers at the
various clubs of peers who share data among each other via UDP's Screamer Protocol.
To get slightly more technical, the way BitTorrent Live works is by making subsets of peers
responsible for subsets of data.
Hyrobusness and low latency is achieved by using a Screamer Protocol between those peers.
Cohen explains.
For the last hop, it uses a non-Screamer Protocol to regain congestion, control, and efficiency.
There is redundancy in some ways in the screaming.
But that's kept under control by only using it to get data to a small fraction of the
peers.
Brom Cohen believes that the future of television is on the internet, and BitTorrent Live
can help deliver live high-definition content to millions of people at once at no cost.
This is not just the future for independent broadcasters, but also for the major content
companies.
There are not many people who can change the fundamentals of the internet two times in
a row.
However, Brom Cohen already did it once with the original BitTorrent Protocol and he believes
that BitTorrent Live can have a similar impact.
To read the complete article, follow the article link in the show notes.
From techdirt.com by Mike Maznick, dated March 28th.
Department of Justice misled judges for years about how it was using stingray devices to
spy on people.
How many times does it need to be repeated?
If you give law enforcement the ability to spy on people, even with limits, law enforcement
will always blow through those limits and abuse its powers.
It has happened over and over and over again, and that becomes doubly true when law enforcement
has worked out ways to avoid oversight.
Back in 2011, the Wall Street Journal broke a huge story about the frequent use of
by-government officials of a technique for mobile device surveillance, generically
called stingray devices.
Technically, there are a few products used for this, only some of which are actually
called stingrays, but the name is now used to refer to all of them.
The device works by pretending to be a mobile phone tower, so devices can connect to it,
and law enforcement gets all your data.
It's basically a cellular man in the middle attack with law enforcement being the man
in the middle.
The technology has been a key component in the case involving Daniel Rigmaiden, which
we wrote about last year.
Rigmaiden was taken into custody on a fraud charge, and representing himself in court, he
has sought more info on how he was tracked down, leading to some reluctant disclosure about
law enforcement using stingray devices on questionable authority to find him.
In that case, we noted that law enforcement claimed it had court order to use the technology,
but the judge was confused, asking where were the warrants for the use of the device.
The judge asked how it was possible that a court order or warrant was issued without
the judge ever being told about the technology used in surveillance, and was told simply,
it was a standard practice.
Indeed, that appears to be the case.
The ACLU filed a bunch of Freedom of Information Act requests to dig into this and newly released
documents show that indeed.
It was apparently standard practice by the Department of Justice to be less than explicit
and less than forthright with judges in seeking warrants and court orders to make use of
this technology.
Here's an email that was revealed.
As some of you may be aware, our office has been working closely with the magistrate
judges in an effort to address their collective concerns regarding whether a pen register is
sufficient to authorize the use of law enforcement's wit technology, a box that simulates a
cell tower and can be placed inside a van to help pinpoint an individual's location
with some specificity to locate an individual.
It has recently come to my attention that many agents are still using wit technology
in the field, although the pen register application does not make that explicit.
While we continue to work on long-term fix for this problem, it is important that we are
consistent and forthright in our pen register requests to the magistrates.
Basically, that's the Department of Justice in admitting that it is not been forthright
or explicit in letting judges know that it is going to use this extremely intrusive form
of surveillance in seeking approvals.
And the courts have been concerned about this.
As the ACLU notes, this email was written three years after the rig made in situation
happened, suggesting that the Department of Justice has been getting away with this
sort of thing for many years without anyone digging in.
The ACLU is now arguing that this should be a reason to suppress the evidence obtained
via these devices, and will ask for the court to send a clear message that it cannot hide
the truth from federal judges in seeking rubber stamps to violate the privacy of the public.
From TechDirt.com by Mike Masnick, dated March 28th, government can keep key emails with Hollywood
lobbyists about six strikes secret.
From the Cannes interferes with that commercial relationship department.
While we keep hearing folks in the entertainment industry and their supporters in DC talk about
how great it is that the six strikes copyright alert system, CAS, was a voluntary agreement
between industry players and one of the worst kept secrets in the world was that the White
House was heavily involved.
They basically helped Hollywood out and at least hinted strongly at the fact that if
no voluntary agreement came through, legislation might have to be put in place, creating a novel
definition of voluntary.
Specifically, it came out that Victoria Espinell, the White House IP Enforcement Coordinator,
had been emailing with people about the program.
That news came out because Chris Sohoyin had submitted a Freedom of Information Act,
request seeking details of all communications between Espinell and her staff and the various
players and six strikes, both the entertainment industry and the various ISPs.
However, Sohoyin felt that the Office of Management and Budget OMB in which Espinell works kept
key documents from being revealed and appealed.
Following that, OMB released a few more documents, but still kept many secret.
Sohoyin then went to court over the issue, arguing specifically that exemptions claimed
for, quote, trade secrets, commercial or financial interests, end quote, and quote,
privileged interagency memoranda and letters, end quote, were inappropriate.
Unfortunately, the court has now rejected that case, citing with OMB.
At issue are some details of the draft memorandum of understanding that created the six strikes
cast program.
Apparently, entertainment industry lobbyists shared those drafts with Espinell, but OMB
won't release them, claiming that their commercial, confidential information.
OMB also argued that the documents were provided voluntarily and that the drafts were not
compelled or obligated.
In response, Sohoyin argued that the documents were clearly provided to OMB for the sake
of having Espinell, quote, press ISPs for additional steps to combat, copyright infringement.
Because they are not legally obligated to take end quote.
The court rejects this saying that the info was provided confidentially and voluntarily,
and it represents commercial information.
Sohoyin remained secret.
The court also rejected an attempt to see internal discussions within the government about
the Six Strikes Plan, as well as discussions on foreign laws like Hadopi Strikes, Six Strikes
Plan in France.
Espinell's office argued that these are protected because they are part of the deliberative
process privilege that lets them withhold internal deliberative discussions about policy
so that government employees can discuss stuff openly before coming to an official policy
position.
However, here Sohoyin argued that Espinell and the IPEC have almost no policy setting
role under the law, and thus this exemption makes little sense.
Once again, the court disagreed.
Here they argued that since the government may make policy decisions based on whether or
not Six Strikes formed or how well it works, that these communications were properly classified
as privilege and not open the FOIA requests.
The court goes into a bit more detail on a few specific withheld documents, but the conclusion
is all the same.
OME can keep these documents secret because they involve internal deliberative discussions.
This isn't too surprising, but it also means that we don't get to learn the full extent
of the government's involvement in this voluntary process.
There are headlines in the news to read these stories via the links in the show notes.
New Zealand gave Kim.com residency knowing he was wanted by FBI.
Websites can legally pirate porn movies, prosecutors' rule.
Staffed and produced by the TGTM News Team, editorial selected by Deep Geek, views of the
story authors reflect their own opinions and not necessarily those of TGTM News.
News from techdirt.com, in these times.com and allgov.com used under a range permission.
News from realitycheck.org used under terms of their re-publication policy.
News from tortfreak.com is used under permission of the Creative Commons by Attribution License.
News from democracy now used under permission of the Creative Commons by Attribution, non-commercial
no-derivatives license.
New sources retain their respective copyrights.
Thank you for listening to this episode of Talk Geek to Me.
Here are the vials statistics for this program.
Your feedback matters to me, please send your comments to DG at deepgeek.us.
The web page for this program is at www.talkgeektoMe.us.
You can subscribe to me on Identica as the username DeepGeek or you could follow me on Twitter.
My username there is DGTGM as in DeepGeek Talk Geek to Me.
This episode of Talk Geek to Me is licensed under the Creative Commons Attribution
share like 3.0 on-board license.
This license allows commercial reuse of the work as well as allowing you to modify the
work as long as you share alike the same rights you have received under this license.
Thank you for listening to this episode of Talk Geek to Me.
You have been listening to Hacker Public Radio or Hacker Public Radio does not.
We are a community podcast network that releases shows every weekday Monday through Friday.
Today's show, like all our shows, was contributed by a HBR who's snared by yourself.
If you ever consider recording a podcast, then visit our website to find out how easy
it really is.
Hacker Public Radio was founded by the Digital.Pound and the Infonomicom Computer Club.
HBR is funded by the Binary Revolution at binref.com.
All binref projects are proudly sponsored by Luna Pages.
From shared hosting to custom private clouds, go to LunaPages.com for all your hosting needs.
Unless otherwise stasis, today's show is released on the Creative Commons Attribution
Share Alive.
He does our license.