A
Anonymous
Guest
Solution : recognise that THE clear and present danger is the cabal that's in power today, as we speak.
Not Emanuel Goldstein (1984).
:face:
Not Emanuel Goldstein (1984).
:face:
That would seem dependent on which end of the gun you are on. :twisted:Yak":x800xhr2 said:The Gattling gun was supposed to make warfare so horrifying that people would never consider it again.
:face:
No, Yakst…not lost. I can’t address every point in the avalanche of stuff you’ve posted in this thread; there’s only so much time. Anyhow, I was hoping someone else would cover it, or that you would do your own research and discover for yourself that the infamous "_NSAKEY" was not a back door into Windows.Yak":em0tif4b said:Lost in the shuffle (apparently)
If "some" believe that, some didn't read this:JKenP":i8ob22hf said:Some seem under the impression that this is recent. A number of years ago it was known that at least one floor in AT&T SF tower had been turned over to NSA and they had access to their complete network.
:mrgreen:Vito":i8ob22hf said:PRISM is essentially a next-step application of the same method that NSA was already caught doing in the Room 641A incident in 2006, wherein the Feds used a beam splitter on an Internet backbone fiber optic cable owned by AT&T. As the Electronic Frontier Foundation reported, it wasn't anything so trivial as a mere "wiretap" of Google, or Microsoft, ...etc.; it was a country tap — a massive interception of a huge portion of the Internet flowing in and out of the U.S.
Hmmm...I think there are many (including yours truly) whose greatest wish is that the Feds will not use the data to its fullest extent.JKenP":i8ob22hf said:Having the data and not using it to its fullest extent makes collecting it a worthless activity.
Vito wrote:":36vkj73l said:I respectfully submit that whether you or I or anyone else thinks their capturing the data is "worthless" is something they're not likely to be especially concerned about. The fact remains that they are capturing the data, and they're doing it by a circuitous route that ends up being a violation of the Fourth Amendment.
Enter your email address to join: