Files
hpr-knowledge-base/hpr_transcripts/hpr1160.txt
Lee Hanken 7c8efd2228 Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use
- Search episodes, transcripts, hosts, and series
- 4,511 episodes with metadata and transcripts
- Data loader with in-memory JSON storage

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-26 10:54:13 +00:00

242 lines
20 KiB
Plaintext

Episode: 1160
Title: HPR1160: TGTM Newscast for 1/8/2013 DeepGeek
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr1160/hpr1160.mp3
Transcribed: 2025-10-17 20:47:09
---
You're listening to DGTM News, record for Tuesday, January the 8th, 2013.
You're listening to the Tech Only Hacker Public Radio Edition to get the full podcast
including political, commentary, and other controversial topics.
Visit www.topgeektme.us.
Here are the vials statistics for this program.
Your feedback matters to me.
Please send your comments to DG at deepgeek.us.
The webpage for this program is at www.topgeektme.us.
You can subscribe to me on Identica as the username DeepGeek.
Or you could follow me on Twitter.
My username there is DGTM.
As a deepgeek talk geek to me.
This is Dan Washco and now the tech roundup.
From torrentfreak.com by Nick Maxx dated December 22nd 2012.
US and Russia announced online piracy crackdown agreement.
Quote in Nick Maxx, the United States and Russia have announced an agreement to crack down on online piracy.
The countries have agreed to disrupt sites that facilitate infringement and take action against their operator.
As a result, uncertain times may lie ahead for many bit torn and other file-sharing sites
hosted in Russia.
The agreement also allows for the improved take-down of infringing content and discussions
on allowing Russian right holders to use the United States.
Six strike system.
For many years, Russia has been viewed as a soft touch on the issue of copyright infringement.
Dozens, perhaps hundreds of allegedly infringing sites operate there with impunity.
Some due to aspects of Russian law and others simply because authorities have no interest
in doing anything about them.
However, yesterday, sick December 21st 2012, came an announcement from the United States trade
representative Ron Kirk, which suggests that for the US, things are moving more quickly towards a
favorable situation. Kirk said that the United States and Russian Federation have reached
agreement on an intellectual property rights action plan aimed at improving copyright protection
and enforcement online.
Kirk, strong IPR protection and enforcement are vital to promoting innovation and creativity
by securing the rights of innovators and creative community, attracting high technology investment,
and fostering the jobs necessary for long-term sustainable growth.
According to the USTR, in addition to conducting enforcement actions against unauthorized
camcordering, agreement has been reached to disrupt the functioning of sites that, quote,
facilitate criminal copyright infringement.
In addition to disruption, whatever form that may take, Russia has reportedly agreed to take
action against the creators and operators of sites through which copyright infringement is committed.
The USTR also reports that Russian authorities have agreed to conduct meaningful consultations,
with rights holders to take action against high-priority websites.
In short, the sites on that list will probably be the ones submitted to the USTR by the RIAA
and MPAA for the Notorious Markets report.
The vast majority of the report is targeted at larger entities that might be engaged in or
connected to online piracy, but the USTR appears to have dangled a carrot that would enable
Russian companies to target US citizens in a limited way, end, quote, of the article.
From EFF.org by Trevor Tim, dated December 19, 2012, government attorneys agree with EFF,
new counterism database rules threaten privacy of every American.
Last week, the Wall Street Journal reported on how a little-known government agency, the
National Counterterrorism Center, NCTC, got the keys to government database full of detailed
personal information of millions of innocent Americans. Using the Freedom of Information Act
and interviews with officials, the Journal obtained emails and other information,
detailing how the massive new spying program, which the Attorney General signed off on in March,
was approved by White House in secret over-strenuous objections from government privacy lawyers.
As EFF first warned months ago, despite the terrorism justification, the new rules affect
every single American, the journal explained. Now, NCTC can copy entire government databases,
flight records, casino employee lists, the names of Americans hosting foreign exchange
students and many others. The agency has new authority to keep data about innocent US citizens
for up to five years and to analyze it for suspicious patterns of behavior.
Previously, both were prohibited. Data about Americans, quote, reasonably being
believed to constitute terrorism information, and quote, may be permanently retained.
Journalist Marcy Wheeler summed up the new guidelines up nicely in March, saying quote,
So, the data the government keeps to track our travel, our taxes, our benefits, our identity,
it just got transformed from bureaucratic data into national security intelligence, end quote.
Ironically, this civil liberties debacle apparently was a response to the attempt in 2009
Christmas underwear bombing by Mar Farak Abdul-Mudalab. As the ACLU observed, however,
Abdul-Mudalab wasn't a US citizen and collecting information on him wasn't a problem.
Instead, his own father had identified him to the US government as a potential terrorist.
In short, an attack by a known foreign terrorist suspect was used to justify changes to rules
about collecting information on US citizens. The Privacy Act is supposed to limit the ability
of the US government to collect and maintain detailed data about ordinary citizens.
Among other restrictions, it prohibits agencies from maintaining personal information unless
it is, quote, relevant and necessary, end quote, for a specific purpose. But thanks to a loophole
in the law, federal agencies can issue public notices to the federal register and attempt to
skirt those rules entirely, thereby opening the door to arbitrary and unnecessary data collection.
According to the journal's investigation, the debate over the program's potential privacy
violation sparked a, quote, heated, and, quote, testy debate in the Justice Department,
Department of Homeland Security and the White House. A DHS lawyer complained via email that
the advocates of the program were, quote, complete non-sequitors, end quote, and, quote, non-responsive,
end quote, examples. Ultimately, privacy lost. Of course, it's unclear whether the
data mining operation even works. At the Department of Justice, chief privacy officer Nancy
Liven raised concerns about whether the guidelines could unfairly target innocent people.
These people said, some researchers suggest that, statistically speaking,
there are too few terror attacks for predictive patterns of to emerge. The risk, then,
is that innocent behavior gets misunderstood, say, a man buying chemicals for a child
science fair, and a time refers to sprinkler sets off false alarms.
Just like EFF did in March, the journal compared the new NCTC program to the notorious
total information awareness. Surveillance program proposed by Admiral John Point Dexter in 2002.
Congress was so alarmed by the potential invasion to innocent American privacy that they
defunded it in 2003. What the journal did not mention, however, is that even the NCTC's
best-known database, Terrorist Identities Data Mart Environment, or TIDE, is already fraught
with problems. TIDE contains more than 500,000 identities suspected of terror links.
Explain the journal. Quote, TIDE files are important because they are used by the Federal Bureau
of Investigation to compile terrorist watch lists. End quote. But according to an unusually
blunt Senate investigation of so-called, quote, fusion centers, released last month,
the TIDE database is also full of information of innocent people that have nothing to do with
terrorism. The report gave examples of a TIDE profile of a person who the FBI had already
cleared of any connection to terrorism, a TIDE profile of two-year-old boy, and even a TIDE
profile of Ford Motor Company. Indeed, the data mining expansion seems like a horrible and
self-fulfilling prophecy. As a journal noted, the underwear bomber incident led President Obama
to order agencies to send all their leaders to NCTC to pursue thoroughly and exhaustively
terrorism threat threads. Predictably, NCTC was flooded with terror tips, creating a huge
backlog that NCTC couldn't process within the original time limits. NCTC then
predictably sought to retain more data longer. Congress needs to stop this vicious cycle.
It should investigate the new NCTC guidelines and the government's overall data collection
and data mining practices, and it should take a look at closing loopholes in the Privacy Act too.
From TechDirt.com by Mike Maznick dated December 28, 2012. Apparently, Congress isn't actually
interested in requiring a warrant for law enforcement to read your email. From the it was all a
charade department. Yes, we've already covered the rejection of key amendments in the FISA
Amendment Act renewal, but that wasn't the only case of Congress ignoring the public's privacy
concerns as they close out this subject. Back in September, we noted that Senator Patrick Lee,
who had been working on a much-needed reforms for ECPA, the Electronic Communications Privacy Act,
much as requiring law enforcement get a warrant to read your email, had attached his ECPA
reform plan to an update of the Video Privacy Protection Act VPPA. While I know some privacy
folks were worried about this update to the VPPA, I don't have much of a problem with it.
The original VPPA, written as a quick response to a video store revealing Robert Bork's somewhat
boring video rental history during his Supreme Court nomination hearing, did seem a bit limiting,
especially for online video sites such as Netflix that wanted to add some useful social features.
However, it was the ECPA reform part that was more important. Attaching ECPA reform to VPPA reform
didn't make some privacy folks happy, but they seemed willing to go along with the VPPA changes
if it really meant that we get a warrant requirements for emails and other digital messages.
There were some attempts to water down that ECPA reform at the end of last month,
but the Senate Judiciary Committee kept the warrant requirement in there and rejected various
attempts to weaken the bill. As we noted, however, it still was a long way from becoming law,
given the need to pass a full Senate vote and to have a companion House bill to make the rounds.
We assume that there would be no movement until next year and the new Congress. But, late last
week, the House rubber stamped the VPPA update and the Senate almost immediately signed off on
the House's version, which the President has expected to sign any moment now. In case you missed
that means the ECPA reforms, which were supposed to be bundled with the VPPA to make the whole
thing palatable, got dropped entirely, and now we get the VPPA reforms and no ECPA reform at all.
Neat trick, bundle two things to get support, and then at the last minute, drop one part and
rush through the other. From torrentfreak.com by Ernesto Data January 3rd, 2013, mega upload,
U.S. deliberately misled the court with unlawful search warrants.
When the U.S. government applied for the search warrants against mega upload last year,
it told the court that they had warned mega upload in 2010 that it was hosting infringing files.
Through its hosting company, mega upload was informed about a criminal search warrant in an
unrelated case where the government requested information on 39 infringing files stored by the
file hosting service. At the time, mega upload, who operated with this request, and handed over
the details on the uploaders. The files were kept online as mega upload was instructed not to touch
any of the evidence. However, a year later, this inaction is being used by the U.S. government to
claim that mega upload was negligent, leaving out much of the context. As of November 18th, 2011,
36 of the 39 infringing copies of the copyrighted motion pictures were still being stored on servers
controlled by the mega conspiracy. The government claimed in the mega upload search warrants.
This course of action is misleading according to mega upload's legal team.
Nowhere did the government tell this court that mega upload had done exactly what the government
had asked it to do. Execute a search warrant without alerting the extensible targets to the
existence of an investigation. Mega upload's lawyers write. The government's contention to this
court that mega upload's preservation of the status quo was evidence of criminal intent is false
and deliberately so they add. By failing to mention that the files were not removed because the
authority specifically requested this, the government deliberately misled the court mega upload says.
The lawyers argue that this is not only troubling by itself, but also fits into a wider picture of
misconduct that was revealed in New Zealand court proceedings. It is clear from the unsealed
warrants that the government withheld critical information from its supporting affidavits.
That withholding calls into grave question the legality of any and all seizures affected
pursuant to those warrants. The withholding is all the more worrisome considering the identified
pattern of governmental misconduct plaguing the proceedings in New Zealand, the legal team writes.
Mega upload therefore asks for these seashoes to be addressed in an upcoming hearing.
Kim.com told Torrent Freak that he is furious about the US government's actions which ruined his
business. Quote Kim.com, a legitimate business destroyed, 220 jobs destroyed, all assets frozen
without a hearing. Millions of users without access to the legitimate files, anti-terror forces to
arrest non-violent nerds, spy agencies to surveil our communications illegally. The White House,
a prime minister, two governments abusing all rights. To read this filing and the rest of the
article, please see the link in the show notes. From eff.org by Hannah Fackery dated December 21,
2012, Vermont Supreme Court allows limits to government computer search power. A new and
important decision by the Vermont Supreme Court could go a long way to safeguard privacy by
ensuring police computer searches remain narrow. EFF together with the ACLU and ACLU of Vermont
filed an amicus brief in the case which empowered courts that issue warrants to include specific
instructions on how the police can conduct the search so they remain narrow and particular.
This case started as part of an identity theft investigation where police in Burlington,
Vermont, applied for a search warrant to seize and search a number of computers, cell phones,
and other electronic devices in a house. Noting the ease with which electronic data can travel
between electronic devices, as well as the fact that evidence could be stored anywhere on the
computer, investigators submitted an extraordinarily overbroad search warrant application,
including requests to search other electronic devices found in the house even if its owners
wasn't suspected of committing a crime. They also ask for the ability to search the entire
contents of all the computers and devices they seized. But the fourth amendment requires searches
to be reasonable. That obviously means the police need a search warrant to search a place.
It also means that their search must be limited or particular so that the search only
intrudes into a private space where the thing the police want is most likely to be found.
But how does that work in the digital age, where computers and other electronic devices
store vast amounts of our private and sensitive information in any number of places?
The judge, grappling with the fourth amendment implications, issued the search warrant but
imposed limits on how the government could execute the search. The court relied heavily on the
ninth circuit court of appeals 2010 decision in United States versus comprehensive drug testing
incorporated, which provided law enforcement with the suggested guidelines designed to protect
privacy during computer searches. Unhappy with these limitations, the government filed a petition
for extraordinary relief in the Vermont Supreme Court asking that the original broad-worn
officers request to be granted. In last Friday's decision, the Vermont Supreme Court understood
the privacy implications at issue and ruled that the fourth amendment allows a judge to include
instructions in the search warrant to ensure an electronic search remains narrow and particular.
The court approved the three different limitations judges can place on the government as part of
a computer search that have important ramifications for other forms of electronic seizures.
First, searches can be performed by third parties or police personnel segregated from the main
investigators who segregate irrelevant information prior to disclosure. Second, judges can order
investigators to focus search techniques while precluding use of specialized search tools without
prior judicial authorization. And third, investigators are limited in data that they can copy,
non-responsive data should be destroyed and devices return. Judges control search
warns not the government. The court noted that warrant applications aren't submitted to judges
on a take it or leave it basis, but oftentimes it seems that this is precisely what the government
wants, wide-ranging authorization into electronic evidence with minimal oversight and little
particularity. And when prosecutors don't get their way, their default is to argue that the judges
are little more than rubber stamps permitted to do nothing more than approve or deny government
requests. Thankfully, the Vermont Supreme Court stood up to the government and told them they
couldn't have whatever they wanted. Other courts are starting to be more vocal too about the
government's efforts to intrude into the private lives of Americans. We need more courts to think
about the implications of their decisions and craft limits on electronic surveillance so they
can fulfill their traditional role as a check against government overreach. To read more details
about the three limitations, follow the article link in the show notes. Other headlines in the
news to read these stories follow the links in the show notes. German privacy regulator orders
Facebook to end its real name policy. List of groups honed by websites with anti-student
policy. Staff and produced by the talk geek to me news team, editorial selection by Deep Geek.
Views of the story authors reflect their own opinions and not necessarily those of TGTM news.
News from techdirt.com, the stand.org, and Havana Times.org used under arranged permission.
News from tornfreak.com and EFF.org used under permission of the creative commons by attribution
license. News from wlcentral.org and democracy now.org used under permission of the creative commons
by attribution, non-commercial, no derivatives license. News sources retain the respective copyrights.
Thank you very much. This has been Dan Walshko. Have a great day.
Thank you for listening to this episode of talk geek to me. Here are the vials statistics for this
program. Your feedback matters to me. Please send your comments to dg at deepgeek.us.
The webpage for this program is at www.talkgeektome.us. You can subscribe to me on identical as the
user name Deep Geek or you could follow me on Twitter. My username there is dggtm as in Deep Geek
talk geek to me. This episode of talk geek to me is licensed under the creative commons
attribution share like 3.0 unpoored license. This license allows commercial reuse of the work
as well as allowing you to modify the work so long as you share a like the same rights you have
received under this license. Thank you for listening to this episode of talk geek to me.
You have been listening to Hacker Public Radio at Hacker Public Radio does our
We are a community podcast network that releases shows every week day on day through Friday.
Today's show, like all our shows, was contributed by an HBR listener like yourself.
If you ever consider recording a podcast, then visit our website to find out how easy it
really is. Hacker Public Radio was founded by the digital dark pound and the
economical and computer cloud. HBR is funded by the binary revolution at binref.com
all binref projects are crowd-responsive by linear pages. From shared hosting to custom
private clouds, go to lunarpages.com for all your hosting needs. Unless otherwise stasis,
today's show is released under creative comments, attribution, share a like, 3.0 unlicense.