- MCP server with stdio transport for local use - Search episodes, transcripts, hosts, and series - 4,511 episodes with metadata and transcripts - Data loader with in-memory JSON storage 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
284 lines
19 KiB
Plaintext
284 lines
19 KiB
Plaintext
Episode: 1221
|
|
Title: HPR1221: TGTM Newscast 93 for 2013-04-02 DeepGeek and Dann Washko
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr1221/hpr1221.mp3
|
|
Transcribed: 2025-10-17 21:54:08
|
|
|
|
---
|
|
|
|
You're listening to TGGM News No. 93 record for Tuesday, April 2, 2013.
|
|
You're listening to the Tech Only Hacker Public Radio Edition to get the full podcast
|
|
including political, commentary, and other controversial topics.
|
|
Please visit www.talkeakedme.us.
|
|
Here are the vials statistics for this program.
|
|
Your feedback matters to me.
|
|
Please send your comments to DG at deepgeek.us.
|
|
The webpage for this program is at www.talkeakedme.us.
|
|
You can subscribe to me on Identica as the username DeepGeek or you could follow me on Twitter.
|
|
My username there is DGTGM as a deepgeek talk geek to me.
|
|
This is Dan Waschko and now the tech round up.
|
|
From themocracynow.org dated March 26, NATO researchers, US-Israeli cyber attack on Iran
|
|
was illegal act of force.
|
|
A new study commissioned by NATO says the joint US-Israeli cyber attack launched on Iran's
|
|
nuclear facilities was an act of force that likely violated international law.
|
|
A group of 20 international researchers reportedly agreed unanimously that the launch of the
|
|
cyber-warms stocks net several years ago constituted an act of force which is prohibited
|
|
under the United Nations Charter except in cases of self-defense.
|
|
Some even thought the world constituted an armed attack which would mark the start of
|
|
a conflict and entitled Iran to use force to defend itself.
|
|
From techdirt.com by Mike Maznick dated March 25, rather than fix the CFA, how should
|
|
judiciary committee plan to make it worse?
|
|
So you know all that talk about things like Aaron's Law and how Congress needs to fix
|
|
the CFA?
|
|
Apparently, the House Judiciary Committee has decided to raise a giant middle finger
|
|
to folks who are concerned about abuses of the CFA.
|
|
Over the weekend, they began circulating a draft of a cyber security bill that is
|
|
so bad that it almost feels like the Judiciary Committee is doing it on purpose as a dig
|
|
at online activists who have fought back against things like SOPA, SISPA and the CFA.
|
|
Rather than fix the CFA, it expands it.
|
|
Rather than rein in the worst parts of the bill, it makes them worse.
|
|
And from what we've heard, the goal is to try to push this through quickly with a big
|
|
effort underway for a cyber week in the middle of April that will force through a bunch
|
|
of related bills.
|
|
Let's go through some of the pieces.
|
|
Adds computer crimes as a form of racketeering.
|
|
The bill adds to the current definition of racketeering activity so that it would now
|
|
link back to the CFA, such that if you are found to violate the CFA as part of an activity
|
|
that involves a variety of other crimes, you can now also be charged with racketeering.
|
|
Basically, this just gives the DOJ yet another tool to use against computer criminals when
|
|
they want to bring the hammer down on someone they don't like.
|
|
Not only could you be charged with computer fraud, but now racketeering as well.
|
|
Because you know, all you hackers are just like the mom.
|
|
Expanding the ways in which you could be guilty of the CFA, including making you, just
|
|
as guilty if you plan to violate the CFA, then if you actually did so.
|
|
Section 103 of the proposed bill makes a bunch of changes to the CFA, almost all of which
|
|
expand the CFA rather than limit it.
|
|
For example, they make a small change to the subsection B in 18 United States Code
|
|
1030, the CFA, such that it will now read, whoever conspires to commit or attempts to
|
|
commit an offense under subsection A of this section shall be punished as provided for
|
|
the completed offense and subsection C of this section.
|
|
All they did was add the four the completed offense to the sentence.
|
|
That may seem like a minor change at first, but it would now mean that they can claim
|
|
that anyone who talked about doing something conspired to commit that violates the CFA
|
|
shall now be punished the same as if they had completed the offense.
|
|
And considering just how broad the CFA is, think how ridiculous that might become.
|
|
Now, if you talk with others about the possibility of violating a terms of service, say talking
|
|
to your 12-year-old about helping them sign up for Facebook, even though the site requires
|
|
you to be 13, you may have already committed a felony that can get you years in jail.
|
|
That seems fair, right?
|
|
Ratchet's up many of the punishments.
|
|
They change around a bunch of the penalties that you can get for various CFA-A infractions.
|
|
Shaking up a variety of things and basically raising the maximum sentences available for
|
|
certain infractions, expanding the definition of exceeding authorized access in a very
|
|
dangerous way.
|
|
That's because the new bill says that you can exceed authorized access even if the
|
|
successor may be entitled to obtain or alter the same information in the computer for other
|
|
purposes.
|
|
Yes, read that again.
|
|
So even if the successor may be entitled to obtain or alter the same information in
|
|
the computer for other purposes, even if you are allowed to obtain info via your authorization
|
|
on your computer, they're now saying that if you use that information in a way that runs
|
|
a foul of the info above, you can be found to have exceeded authorized access.
|
|
Make it easier for the federal government to seize and forfeit anything.
|
|
We've seen how the federal seizure and forfeiture laws are frequently abused to seize goods,
|
|
which the government claims are used in commission of a crime, even if they never charge anyone
|
|
for the crime.
|
|
And we've seen with cases like, and we've seen with cases like the jazzle case, how the
|
|
government will use such tools to take and censor websites on no actual basis.
|
|
And now the CFA will make it even easier for the government to do such things.
|
|
It amends the existing sections to basically expand what can be forfeited, because it's
|
|
not like the government hasn't abused that one before.
|
|
The rest of the bill deals with two other things.
|
|
First, the section on cyber security, which includes punishment for those damaging critical
|
|
infrastructure computers.
|
|
Another section that tells the courts to figure out how to secure their computers are,
|
|
and finally a part that creates a national cyber investigative joint task force to be led
|
|
by the FBI.
|
|
Rather than fixing the law, they're expanding it so that computer crimes can be hit with
|
|
racketeering charges and expanding the general language and punishments for part of the
|
|
bill.
|
|
This is not a good thing.
|
|
The fact that this is being passed around the House Judiciary Committee suggests that
|
|
it's likely to be backed by HJC Chair Bob Goldley, which is unfortunate.
|
|
You would have hoped that Goldley and others in the HJC would recognize that now is the
|
|
time to fix the CFA, not make it worse.
|
|
From torrentfreak.com dated March 26th by Ernesto, BitTorrent's Brom Cohen patents revolutionary
|
|
live streaming protocol.
|
|
Earlier this month, BitTorrent Live was unveiled to the public.
|
|
The new protocol allows the public to send a video stream to millions of people without
|
|
having to invest in expensive bandwidth.
|
|
Around the same time as BitTorrent Live was launched, the underlying patent application
|
|
was published online.
|
|
In it, Cohen describes what makes the technology so unique and torrentfreak caught up with
|
|
BitTorrent's creator to find out more.
|
|
Quote, doing live streaming well on the internet has long been a problem.
|
|
Peer-to-peer live streaming has always suffered from high latency, meaning there is typically
|
|
a lot of delay between when a broadcast happens and when end users see it.
|
|
Typically dozens of seconds or minutes.
|
|
End quote, Cohen told Torrent Freak.
|
|
Quote, BitTorrent Live allows a broadcaster to stream to millions of people with just
|
|
a few seconds of latency.
|
|
This is new and unique and potentially world-changing.
|
|
End quote, he adds.
|
|
Brom Cohen explains that the patent is in no way going to restrict users' access to the
|
|
new protocol.
|
|
Quite the contrary, BitTorrent Live will be available to end users for free and publishers
|
|
who are using the service and hosting it on their own will not be charged either.
|
|
BitTorrent Live is a complex technology but basically works by dividing peers at the
|
|
various clubs of peers who share data among each other via UDP's Screamer Protocol.
|
|
To get slightly more technical, the way BitTorrent Live works is by making subsets of peers
|
|
responsible for subsets of data.
|
|
Hyrobusness and low latency is achieved by using a Screamer Protocol between those peers.
|
|
Cohen explains.
|
|
For the last hop, it uses a non-Screamer Protocol to regain congestion, control, and efficiency.
|
|
There is redundancy in some ways in the screaming.
|
|
But that's kept under control by only using it to get data to a small fraction of the
|
|
peers.
|
|
Brom Cohen believes that the future of television is on the internet, and BitTorrent Live
|
|
can help deliver live high-definition content to millions of people at once at no cost.
|
|
This is not just the future for independent broadcasters, but also for the major content
|
|
companies.
|
|
There are not many people who can change the fundamentals of the internet two times in
|
|
a row.
|
|
However, Brom Cohen already did it once with the original BitTorrent Protocol and he believes
|
|
that BitTorrent Live can have a similar impact.
|
|
To read the complete article, follow the article link in the show notes.
|
|
From techdirt.com by Mike Maznick, dated March 28th.
|
|
Department of Justice misled judges for years about how it was using stingray devices to
|
|
spy on people.
|
|
How many times does it need to be repeated?
|
|
If you give law enforcement the ability to spy on people, even with limits, law enforcement
|
|
will always blow through those limits and abuse its powers.
|
|
It has happened over and over and over again, and that becomes doubly true when law enforcement
|
|
has worked out ways to avoid oversight.
|
|
Back in 2011, the Wall Street Journal broke a huge story about the frequent use of
|
|
by-government officials of a technique for mobile device surveillance, generically
|
|
called stingray devices.
|
|
Technically, there are a few products used for this, only some of which are actually
|
|
called stingrays, but the name is now used to refer to all of them.
|
|
The device works by pretending to be a mobile phone tower, so devices can connect to it,
|
|
and law enforcement gets all your data.
|
|
It's basically a cellular man in the middle attack with law enforcement being the man
|
|
in the middle.
|
|
The technology has been a key component in the case involving Daniel Rigmaiden, which
|
|
we wrote about last year.
|
|
Rigmaiden was taken into custody on a fraud charge, and representing himself in court, he
|
|
has sought more info on how he was tracked down, leading to some reluctant disclosure about
|
|
law enforcement using stingray devices on questionable authority to find him.
|
|
In that case, we noted that law enforcement claimed it had court order to use the technology,
|
|
but the judge was confused, asking where were the warrants for the use of the device.
|
|
The judge asked how it was possible that a court order or warrant was issued without
|
|
the judge ever being told about the technology used in surveillance, and was told simply,
|
|
it was a standard practice.
|
|
Indeed, that appears to be the case.
|
|
The ACLU filed a bunch of Freedom of Information Act requests to dig into this and newly released
|
|
documents show that indeed.
|
|
It was apparently standard practice by the Department of Justice to be less than explicit
|
|
and less than forthright with judges in seeking warrants and court orders to make use of
|
|
this technology.
|
|
Here's an email that was revealed.
|
|
As some of you may be aware, our office has been working closely with the magistrate
|
|
judges in an effort to address their collective concerns regarding whether a pen register is
|
|
sufficient to authorize the use of law enforcement's wit technology, a box that simulates a
|
|
cell tower and can be placed inside a van to help pinpoint an individual's location
|
|
with some specificity to locate an individual.
|
|
It has recently come to my attention that many agents are still using wit technology
|
|
in the field, although the pen register application does not make that explicit.
|
|
While we continue to work on long-term fix for this problem, it is important that we are
|
|
consistent and forthright in our pen register requests to the magistrates.
|
|
Basically, that's the Department of Justice in admitting that it is not been forthright
|
|
or explicit in letting judges know that it is going to use this extremely intrusive form
|
|
of surveillance in seeking approvals.
|
|
And the courts have been concerned about this.
|
|
As the ACLU notes, this email was written three years after the rig made in situation
|
|
happened, suggesting that the Department of Justice has been getting away with this
|
|
sort of thing for many years without anyone digging in.
|
|
The ACLU is now arguing that this should be a reason to suppress the evidence obtained
|
|
via these devices, and will ask for the court to send a clear message that it cannot hide
|
|
the truth from federal judges in seeking rubber stamps to violate the privacy of the public.
|
|
From TechDirt.com by Mike Masnick, dated March 28th, government can keep key emails with Hollywood
|
|
lobbyists about six strikes secret.
|
|
From the Cannes interferes with that commercial relationship department.
|
|
While we keep hearing folks in the entertainment industry and their supporters in DC talk about
|
|
how great it is that the six strikes copyright alert system, CAS, was a voluntary agreement
|
|
between industry players and one of the worst kept secrets in the world was that the White
|
|
House was heavily involved.
|
|
They basically helped Hollywood out and at least hinted strongly at the fact that if
|
|
no voluntary agreement came through, legislation might have to be put in place, creating a novel
|
|
definition of voluntary.
|
|
Specifically, it came out that Victoria Espinell, the White House IP Enforcement Coordinator,
|
|
had been emailing with people about the program.
|
|
That news came out because Chris Sohoyin had submitted a Freedom of Information Act,
|
|
request seeking details of all communications between Espinell and her staff and the various
|
|
players and six strikes, both the entertainment industry and the various ISPs.
|
|
However, Sohoyin felt that the Office of Management and Budget OMB in which Espinell works kept
|
|
key documents from being revealed and appealed.
|
|
Following that, OMB released a few more documents, but still kept many secret.
|
|
Sohoyin then went to court over the issue, arguing specifically that exemptions claimed
|
|
for, quote, trade secrets, commercial or financial interests, end quote, and quote,
|
|
privileged interagency memoranda and letters, end quote, were inappropriate.
|
|
Unfortunately, the court has now rejected that case, citing with OMB.
|
|
At issue are some details of the draft memorandum of understanding that created the six strikes
|
|
cast program.
|
|
Apparently, entertainment industry lobbyists shared those drafts with Espinell, but OMB
|
|
won't release them, claiming that their commercial, confidential information.
|
|
OMB also argued that the documents were provided voluntarily and that the drafts were not
|
|
compelled or obligated.
|
|
In response, Sohoyin argued that the documents were clearly provided to OMB for the sake
|
|
of having Espinell, quote, press ISPs for additional steps to combat, copyright infringement.
|
|
Because they are not legally obligated to take end quote.
|
|
The court rejects this saying that the info was provided confidentially and voluntarily,
|
|
and it represents commercial information.
|
|
Sohoyin remained secret.
|
|
The court also rejected an attempt to see internal discussions within the government about
|
|
the Six Strikes Plan, as well as discussions on foreign laws like Hadopi Strikes, Six Strikes
|
|
Plan in France.
|
|
Espinell's office argued that these are protected because they are part of the deliberative
|
|
process privilege that lets them withhold internal deliberative discussions about policy
|
|
so that government employees can discuss stuff openly before coming to an official policy
|
|
position.
|
|
However, here Sohoyin argued that Espinell and the IPEC have almost no policy setting
|
|
role under the law, and thus this exemption makes little sense.
|
|
Once again, the court disagreed.
|
|
Here they argued that since the government may make policy decisions based on whether or
|
|
not Six Strikes formed or how well it works, that these communications were properly classified
|
|
as privilege and not open the FOIA requests.
|
|
The court goes into a bit more detail on a few specific withheld documents, but the conclusion
|
|
is all the same.
|
|
OME can keep these documents secret because they involve internal deliberative discussions.
|
|
This isn't too surprising, but it also means that we don't get to learn the full extent
|
|
of the government's involvement in this voluntary process.
|
|
There are headlines in the news to read these stories via the links in the show notes.
|
|
New Zealand gave Kim.com residency knowing he was wanted by FBI.
|
|
Websites can legally pirate porn movies, prosecutors' rule.
|
|
Staffed and produced by the TGTM News Team, editorial selected by Deep Geek, views of the
|
|
story authors reflect their own opinions and not necessarily those of TGTM News.
|
|
News from techdirt.com, in these times.com and allgov.com used under a range permission.
|
|
News from realitycheck.org used under terms of their re-publication policy.
|
|
News from tortfreak.com is used under permission of the Creative Commons by Attribution License.
|
|
News from democracy now used under permission of the Creative Commons by Attribution, non-commercial
|
|
no-derivatives license.
|
|
New sources retain their respective copyrights.
|
|
Thank you for listening to this episode of Talk Geek to Me.
|
|
Here are the vials statistics for this program.
|
|
Your feedback matters to me, please send your comments to DG at deepgeek.us.
|
|
The web page for this program is at www.talkgeektoMe.us.
|
|
You can subscribe to me on Identica as the username DeepGeek or you could follow me on Twitter.
|
|
My username there is DGTGM as in DeepGeek Talk Geek to Me.
|
|
This episode of Talk Geek to Me is licensed under the Creative Commons Attribution
|
|
share like 3.0 on-board license.
|
|
This license allows commercial reuse of the work as well as allowing you to modify the
|
|
work as long as you share alike the same rights you have received under this license.
|
|
Thank you for listening to this episode of Talk Geek to Me.
|
|
You have been listening to Hacker Public Radio or Hacker Public Radio does not.
|
|
We are a community podcast network that releases shows every weekday Monday through Friday.
|
|
Today's show, like all our shows, was contributed by a HBR who's snared by yourself.
|
|
If you ever consider recording a podcast, then visit our website to find out how easy
|
|
it really is.
|
|
Hacker Public Radio was founded by the Digital.Pound and the Infonomicom Computer Club.
|
|
HBR is funded by the Binary Revolution at binref.com.
|
|
All binref projects are proudly sponsored by Luna Pages.
|
|
From shared hosting to custom private clouds, go to LunaPages.com for all your hosting needs.
|
|
Unless otherwise stasis, today's show is released on the Creative Commons Attribution
|
|
Share Alive.
|
|
He does our license.
|