Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

NSA agent: "Everyone under virtual surveillance!"
WorldNetDaily ^ | December 5, 2012 | staff writer

Posted on 12/05/2012 12:15:36 PM PST by wesagain

Did you ever get the feeling you were being watched?

And watched by the government?

There’s very good reason to feel that way, says a whistleblower from the National Security Agency who says everyone in the U.S. is under virtual surveillance by federal authorities.

In an interview with RT, William Binney, a former mathematician and code breaker at the NSA, says the FBI records the emails of nearly all Americans, including members of Congress, and warns that the government can use this information against anyone.

“The FBI has access to the data collected, which is basically the emails of virtually everybody in the country. And the FBI has access to it,” Binney said.

“All the congressional members are on the surveillance, too, no one is excluded. They are all included. So, yes, this can happen to anyone. If they become a target for whatever reason – they are targeted by the government, the government can go in, or the FBI, or other agencies of the government, they can go into their database, pull all that data collected on them over the years, and we analyze it all. So, we have to actively analyze everything

(Excerpt) Read more at wnd.com ...


TOPICS: Constitution/Conservatism; Crime/Corruption; Government; Politics/Elections
KEYWORDS: 666
Navigation: use the links below to view more comments.
first 1-5051-61 next last

1 posted on 12/05/2012 12:15:38 PM PST by wesagain
[ Post Reply | Private Reply | View Replies]

To: wesagain
Use PGP and Tor to at least give yourself a fighting chance.

At least you'll be fairly safe from brute force decryption attempts.

2 posted on 12/05/2012 12:17:49 PM PST by Bloody Sam Roberts (Political correctness does not legislate tolerance; it only organizes hatred.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: wesagain
"If they become a target for whatever reason – they are targeted by the government, the government can go in, or the FBI, or other agencies of the government"

Here's the all important question:

WHO THE HELL IS THE GOVERNMENT?

3 posted on 12/05/2012 12:18:19 PM PST by wesagain (The God (Elohim) of Abraham, Isaac and Jacob is the One True GOD.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: wesagain

Of course they monitor everything! Anyone who believes otherwise must watch “Polyanna” reruns constantly.

Acres and acres and acres of computing power and storage, dozens of satellites, scads and scads of downlinking and surveillance antennas. Thousands and thousands of analysts, programmers, cryptographers and functionaries.

You didn’t think they were still working against the Russians, did you?


4 posted on 12/05/2012 12:20:05 PM PST by Gaffer
[ Post Reply | Private Reply | To 1 | View Replies]

To: wesagain
"Psst... didja ever get the feelin' you was bein' watched?
By millions of people?"

"PEOPLE!?! ARRRRGGGHHH!"

Even my 78 year old father knows that everything we write is being recorded. Every conversation is potentially listened to, and he's no nut.

5 posted on 12/05/2012 12:20:18 PM PST by SparkyBass
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bloody Sam Roberts

I’ll give you the unclassified, on-the-web and easily verifiable answer through google or Bing -whatever.

“There is no commercial encryption that the government allows to propagate on the web that the government cannot ‘break’ if it wants to.”


6 posted on 12/05/2012 12:22:44 PM PST by Gaffer
[ Post Reply | Private Reply | To 2 | View Replies]

To: wesagain

The Bilderbergs and the globalists.

Gee here is an idea send real letters and quit thinking everything you do needs to be on a marquee for all to see.

I send maybe 100 texts a month (to my kids) and send maybe 10 personal emails a month. No facecrapper. I pay bills by mail.


7 posted on 12/05/2012 12:25:05 PM PST by Resolute Conservative
[ Post Reply | Private Reply | To 3 | View Replies]

To: Gaffer

I don’t think so. Strong encryption, with strong keys, does work and is mathmatically verifiable.


8 posted on 12/05/2012 12:25:34 PM PST by proxy_user
[ Post Reply | Private Reply | To 6 | View Replies]

To: wesagain

If you don’t think every word posted on Free Republic isn’t in a DHS file with your name on it, you’re kidding yourself.


9 posted on 12/05/2012 12:26:27 PM PST by pabianice (washington, dc ..)
[ Post Reply | Private Reply | To 1 | View Replies]

To: wesagain

A lot of my material is copyrighted. I’m just sayin..


10 posted on 12/05/2012 12:26:26 PM PST by ILS21R (Everything... IS... a conspiracy)
[ Post Reply | Private Reply | To 1 | View Replies]

To: wesagain

Everyone is under surveillance. Reminds me of the current TV show Person of Interest. If you liked the show 24 you’ll probably like POI.

The underlying premise is everyone is being watched and recorded and the heroes try to right some wrong future events. Mind candy. But fun.

http://www.cbs.com/shows/person_of_interest/


11 posted on 12/05/2012 12:27:35 PM PST by Hang'emAll (Ride to the sound of the guns!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: wesagain

Use cash


12 posted on 12/05/2012 12:29:06 PM PST by Broker ( sojourner)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gaffer

Yeah I demanded PGP public keys from our business partners to protect client and customer data from hackers if shipments were lost. At least make reasonable efforts so it’s just not wide open for say a, Julian Assange spy or some other dork who might find or steal a lost FedEx or UPS package.

The gov’t has always demanded access for off-shore encryption software. I always figured domestic wasn’t too far behind, since you know copies of it always make it offshore through the black market.


13 posted on 12/05/2012 12:30:13 PM PST by F15Eagle (1 John 5:4-5, 4:15, 5:13; John 3:17-18, 6:69, 11:25, 14:6, 20:31; Rom10:8-11; 1 Tim 2:5; Titus 3:4-5)
[ Post Reply | Private Reply | To 6 | View Replies]

To: wesagain

“When government fears the people, we have democracy. When the people fear government, we have tyranny”. The fiscal cliff is merely a symptom of our real problem.


14 posted on 12/05/2012 12:32:01 PM PST by Dapper 26
[ Post Reply | Private Reply | To 1 | View Replies]

To: wesagain

This is the politics of fear at work. Have a supposedly loose cannon rogue agent “release” it into the wild. Now everyone’s looking over their shoulder. They do this very thing in North Korea to let everyone know they’re being watched.


15 posted on 12/05/2012 12:34:26 PM PST by SpaceBar
[ Post Reply | Private Reply | To 1 | View Replies]

To: Broker

“Use cash”

That works pretty good for some stuff. Some places still demand credit or debit cards (car rental, hotels).

I think cash will eventually be outlawed by all nations when the following comes.

Revelation 13

http://www.biblegateway.com/passage/?search=Revelation%2013&version=KJV

11 And I beheld another beast coming up out of the earth; and he had two horns like a lamb, and he spake as a dragon.

12 And he exerciseth all the power of the first beast before him, and causeth the earth and them which dwell therein to worship the first beast, whose deadly wound was healed.

13 And he doeth great wonders, so that he maketh fire come down from heaven on the earth in the sight of men,

14 And deceiveth them that dwell on the earth by the means of those miracles which he had power to do in the sight of the beast; saying to them that dwell on the earth, that they should make an image to the beast, which had the wound by a sword, and did live.

15 And he had power to give life unto the image of the beast, that the image of the beast should both speak, and cause that as many as would not worship the image of the beast should be killed.

16 And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads:

17 And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name.

18 Here is wisdom. Let him that hath understanding count the number of the beast: for it is the number of a man; and his number is Six hundred threescore and six.


16 posted on 12/05/2012 12:34:35 PM PST by F15Eagle (1 John 5:4-5, 4:15, 5:13; John 3:17-18, 6:69, 11:25, 14:6, 20:31; Rom10:8-11; 1 Tim 2:5; Titus 3:4-5)
[ Post Reply | Private Reply | To 12 | View Replies]

To: wesagain

But they can’t find Rachel form Credit Card Services. She violates the no call lists thousands of times a day and they don’t even seem to be looking for her.


17 posted on 12/05/2012 12:34:43 PM PST by mountainlion (Live well for those that did not make it back.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gaffer

The only thing we have going for us is the total incompetence of government.


18 posted on 12/05/2012 12:37:18 PM PST by Dapper 26
[ Post Reply | Private Reply | To 4 | View Replies]

To: proxy_user
Strong encryption, with strong keys, does work and is mathmatically verifiable.

You might want to take a look at D-Wave before wrapping yourself in certainty.

I figure that if they are publicly claiming 128 bits of quantum computer that NSA is playing with a prototype of 512. Just my opinion though.

Free course management software for homeschoolers and educators. Beta testers wanted, Free.

19 posted on 12/05/2012 12:44:40 PM PST by Mycroft Holmes (<= Mash name for HTML Xampp PHP C JavaScript primer. Programming for everyone.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: wesagain
In an interview with RT, William Binney, a former mathematician and code breaker at the NSA, says the FBI records the emails of nearly all Americans, including members of Congress, and warns that the government can use this information against anyone.

I realize that data storage is getting cheaper by the day but the amount of data storage space that would be required to store every email message sent by even 50 % of the people in the US in a single year would be incredible.

I just have a hard time believing that it would be possible for the NSA to have that kind of data storage capacity. It doesn’t even make sense that they would want to do such a thing. I realize that paranoia is their business but in only makes sense to narrow the focus to persons of realistic interest to national security.

20 posted on 12/05/2012 12:50:13 PM PST by Pontiac (The welfare state must fail because it is contrary to human nature and diminishes the human spirit.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: wesagain

More news from the cap’n opbvious agency of little known facts. They should be spending their time with the real murderers of America, the WH.


21 posted on 12/05/2012 12:50:20 PM PST by Karliner ( Jeremiah 29:11, Romans 8:28, Romans 8:38"...this is the end of the beginning."WC)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mycroft Holmes

Granted they probably are . However there is a limit to what they can do ie supercomputer time is very expensive & using it to decrypt Aunt Katie’s casserole recipe and Knock Knock jokes will really tie things up & waste their budget especially if you use more than 1 crypto system. to multi encrypt .


22 posted on 12/05/2012 12:55:14 PM PST by Nebr FAL owner
[ Post Reply | Private Reply | To 19 | View Replies]

To: Mycroft Holmes
You might want to take a look at D-Wave before wrapping yourself in certainty.

Your 'D-Wave' link is a link to this thread.

23 posted on 12/05/2012 12:58:43 PM PST by TigersEye (Who is John Galt?)
[ Post Reply | Private Reply | To 19 | View Replies]

To: wesagain

It used to be us, the American citizens.... but now it’s an organized crime syndicate operating out of D.C. .


24 posted on 12/05/2012 12:59:25 PM PST by Gator113 (**WHO in the hell gave the damn order to NOT rescue our men in Benghazi?**)
[ Post Reply | Private Reply | To 3 | View Replies]

To: wesagain

Then by GOSH, BENGHAZI should be NO PROBLEM AT ALL to investigate. GET cracking.


25 posted on 12/05/2012 12:59:32 PM PST by annieokie
[ Post Reply | Private Reply | To 1 | View Replies]

To: Hang'emAll

I’ve come to the conclusion that there really are cameras everywhere just like on PERSON OF INTEREST. We put them there. They’re called cell phones. They’re “filming” and “listening” even when you think your phone is turned off.


26 posted on 12/05/2012 12:59:38 PM PST by Terry Mross (I haven't watched the news since the election. Someone ping me if anything big happens.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: wesagain

Nothing to worry about, it’s just for advertising.../sarcasm


27 posted on 12/05/2012 1:01:17 PM PST by Enough is ENOUGH (This is a whole different world we live in now. We'd better wise up.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: wesagain

Yet, they still have no clue who released the Climate Gate files that proved a Global Conspiracy of the NWO Elites to deny energy to the worlds poor.


28 posted on 12/05/2012 1:02:42 PM PST by justa-hairyape
[ Post Reply | Private Reply | To 1 | View Replies]

To: TigersEye
Your 'D-Wave' link is a link to this thread.

Whoops! I didn't follow the World Nut Daily link as I have wasted far too much time there. I presume that the D-wave link is there. Oh well...

29 posted on 12/05/2012 1:03:17 PM PST by Mycroft Holmes (<= Mash name for HTML Xampp PHP C JavaScript primer. Programming for everyone.)
[ Post Reply | Private Reply | To 23 | View Replies]

To: Pontiac
I just have a hard time believing that it would be possible for the NSA to have that kind of data storage capacity.

It is amazing but here it is.

30 posted on 12/05/2012 1:03:46 PM PST by TigersEye (Who is John Galt?)
[ Post Reply | Private Reply | To 20 | View Replies]

To: Mycroft Holmes

Thanks.


31 posted on 12/05/2012 1:05:21 PM PST by TigersEye (Who is John Galt?)
[ Post Reply | Private Reply | To 29 | View Replies]

To: TigersEye
Here is a real D-wave link. I am getting decrepit.
32 posted on 12/05/2012 1:06:54 PM PST by Mycroft Holmes (<= Mash name for HTML Xampp PHP C JavaScript primer. Programming for everyone.)
[ Post Reply | Private Reply | To 23 | View Replies]

To: Mycroft Holmes

Your link opens a blank page.

However:

“Integer factorization is believed to be computationally infeasible with an ordinary computer for large integers if they are the product of few prime numbers (e.g., products of two 300-digit primes).[10] By comparison, a quantum computer could efficiently solve this problem using Shor’s algorithm to find its factors. This ability would allow a quantum computer to decrypt many of the cryptographic systems in use today, in the sense that there would be a polynomial time (in the number of digits of the integer) algorithm for solving the problem. In particular, most of the popular public key ciphers are based on the difficulty of factoring integers (or the related discrete logarithm problem, which can also be solved by Shor’s algorithm), including forms of RSA. These are used to protect secure Web pages, encrypted email, and many other types of data. Breaking these would have significant ramifications for electronic privacy and security.

“However, other existing cryptographic algorithms do not appear to be broken by these algorithms.[11][12] Some public-key algorithms are based on problems other than the integer factorization and discrete logarithm problems to which Shor’s algorithm applies, like the McEliece cryptosystem based on a problem in coding theory.[11][13] Lattice-based cryptosystems are also not known to be broken by quantum computers, and finding a polynomial time algorithm for solving the dihedral hidden subgroup problem, which would break many lattice based cryptosystems, is a well-studied open problem.[14] It has been proven that applying Grover’s algorithm to break a symmetric (secret key) algorithm by brute force requires roughly 2n/2 invocations of the underlying cryptographic algorithm, compared with roughly 2n in the classical case,[15] meaning that symmetric key lengths are effectively halved: AES-256 would have the same security against an attack using Grover’s algorithm that AES-128 has against classical brute-force search (see Key size). Quantum cryptography could potentially fulfill some of the functions of public key cryptography.”

So using such a computer, you could cut in half the trillions of years required for a brute-force attack on 256-bit Rinjdael, Blowfish, or Twofish.


33 posted on 12/05/2012 1:07:22 PM PST by proxy_user
[ Post Reply | Private Reply | To 19 | View Replies]

To: Bloody Sam Roberts

Using PGP probably gets you put on a heightened watch list.


34 posted on 12/05/2012 1:09:12 PM PST by FreedomPoster (Islam delenda est)
[ Post Reply | Private Reply | To 2 | View Replies]

To: SpaceBar

When my late father retired from the Marine Corps as a communications chief, he went to work at the phone company, tapping lines so the government could listen in. That was in the 1960’s. It was not a new thing.


35 posted on 12/05/2012 1:11:16 PM PST by 2ndDivisionVet (I'll raise $2million for Sarah Palin's presidential run. What'll you do?)
[ Post Reply | Private Reply | To 15 | View Replies]

To: wesagain
Would it be impolite to tell them this just in case they are here right now? Oh better this could be Obee's song...

http://www.youtube.com/watch?v=cQpwXzl-Q9Q

36 posted on 12/05/2012 1:11:55 PM PST by taildragger (( Tighten the 5 point harness and brace for Impact Freepers, ya know it's coming..... ))
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gaffer

Baloney, they can’t even break RC4 if you code it properly.

I’m sure tests are run regularly to see what the gov can break.

Foreign groups could pass messages encoded using common algorithms. These would be messages that if the gov were able to read them they would have to tip their hand and act upon the content. If an algorithm was shown to be weak the info would slip out as it’s hard to keep such a secret.

Anyone who has given this a little thought comes to the obvious conclusion that this is how decrypt abilities must be tested.

I’m certain that NSA types must worry over this constantly and be fearful of acting on any decrypts they manage.

The big enchilada of crypto is finding a fast way to factor primes.... I doubt anyone has found such an algorithm.


37 posted on 12/05/2012 1:14:22 PM PST by Bobalu (It is not obama we are fighting, it is the media.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Mycroft Holmes
I am getting decrepit.

lol You and me both, FRiend. Thank you for the link! I will make use of it.

38 posted on 12/05/2012 1:16:51 PM PST by TigersEye (Who is John Galt?)
[ Post Reply | Private Reply | To 32 | View Replies]

To: 2ndDivisionVet

Back then they used to deploy little battery operated receiver/recorders near a house to get a record of all phone numbers dialed. The old rotary dial phones made static pops as the numbers were dialed...all you had to do is slow down the playback and count the pops to get the numbers. This was mostly a PI thing since the gov could monitor at the phone company and avoid getting close to the target. Fidelity was not a concern so the tape moved very slowly past the recording head giving a long recording time.

You can learn a lot about someone if you know who they call on the phone.


39 posted on 12/05/2012 1:23:20 PM PST by Bobalu (It is not obama we are fighting, it is the media.)
[ Post Reply | Private Reply | To 35 | View Replies]

To: FreedomPoster
Using PGP probably gets you put on a heightened watch list.

True but what good is that watch list when 50 million people are on it?

40 posted on 12/05/2012 1:24:38 PM PST by TigersEye (Who is John Galt?)
[ Post Reply | Private Reply | To 34 | View Replies]

To: Pontiac

E-mail is text, text compresses really nice, a little bit of petabyte storage (which I personally know of 2 governmentally related non-spooky organizations that regularly ADD petabytes to their storage capacity) goes a long way.

The real question isn’t can they gather all the data, because they can, all the data at some point goes through at least one government computer anyway (remember who built the backbone for this thing). The question is what can they do with it. The hard part is searching the data, even really good keyword data gets hard to sort through when you’ve got that much junk. In general figure most of it gets used the other way around, if they decide they want to get you personally they’ve got the data they need, but until they’re already looking at you personally the likelihood of them finding dirt on you is pretty slim.


41 posted on 12/05/2012 1:25:28 PM PST by discostu (Not a part of anyone's well oiled machine.)
[ Post Reply | Private Reply | To 20 | View Replies]

To: discostu
E-mail is text, text compresses really nice

I send and receive a lot of big photo files and or graphic files.

They are compressible but not so much.

42 posted on 12/05/2012 1:35:38 PM PST by Pontiac (The welfare state must fail because it is contrary to human nature and diminishes the human spirit.)
[ Post Reply | Private Reply | To 41 | View Replies]

To: wesagain

I really, honestly, totally do not care. God is bigger than this godless government and much bigger than allah, the god of those who have subverted this government.


43 posted on 12/05/2012 1:38:16 PM PST by MeneMeneTekelUpharsin (Freedom is the freedom to discipline yourself so others don't have to do it for you.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2ndDivisionVet
If you're going to compare this to tapping a telephone line in the '60s you would have to give an example of recording every phone call made and putting those recordings in a database that was instantly searchable using any parameter you could think of. Names, places, times, phone numbers, keywords based on words spoken in the conversation, ... any and every characteristic of a phone call imaginable.

The Secret Sharer Is Thomas Drake an enemy of the state May 23, 2011

Even in an age in which computerized feats are commonplace, the N.S.A.’s capabilities are breathtaking. The agency reportedly has the capacity to intercept and download, every six hours, electronic communications equivalent to the contents of the Library of Congress. Three times the size of the C.I.A., and with a third of the U.S.’s entire intelligence budget, the N.S.A. has a five-thousand-acre campus at Fort Meade protected by iris scanners and facial-recognition devices. The electric bill there is said to surpass seventy million dollars a year.

(snip)

In the late nineties, Binney estimated that there were some two and a half billion phones in the world and one and a half billion I.P. addresses. Approximately twenty terabytes of unique information passed around the world every minute. Binney started assembling a system that could trap and map all of it. “I wanted to graph the world,” Binney said. “People said, ‘You can’t do this—the possibilities are infinite.’ ” But he argued that “at any given point in time the number of atoms in the universe is big, but it’s finite.”

As Binney imagined it, ThinThread would correlate data from financial transactions, travel records, Web searches, G.P.S. equipment, and any other “attributes” that an analyst might find useful in pinpointing “the bad guys.” By 2000, Binney, using fibre optics, had set up a computer network that could chart relationships among people in real time. It also turned the N.S.A.’s data-collection paradigm upside down. Instead of vacuuming up information around the world and then sending it all back to headquarters for analysis, ThinThread processed information as it was collected—discarding useless information on the spot and avoiding the overload problem that plagued centralized systems. Binney says, “The beauty of it is that it was open-ended, so it could keep expanding.”

Pilot tests of ThinThread proved almost too successful, according to a former intelligence expert who analyzed it. “It was nearly perfect,” the official says. “But it processed such a large amount of data that it picked up more Americans than the other systems.” Though ThinThread was intended to intercept foreign communications, it continued documenting signals when a trail crossed into the U.S. This was a big problem: federal law forbade the monitoring of domestic communications without a court warrant. And a warrant couldn’t be issued without probable cause and a known suspect. In order to comply with the law, Binney installed privacy controls and added an “anonymizing feature,” so that all American communications would be encrypted until a warrant was issued. The system would indicate when a pattern looked suspicious enough to justify a warrant.


44 posted on 12/05/2012 1:39:44 PM PST by TigersEye (Who is John Galt?)
[ Post Reply | Private Reply | To 35 | View Replies]

To: wesagain
Here's a good synopsis: Daily Reckoning
45 posted on 12/05/2012 1:42:08 PM PST by crosshairs (Hurricane Barry is 1000 times more destructive than Hurricane Sandy.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: F15Eagle

This is probably not much more upbeat than your take on this BUT 666 was the number of talons of silver Solomon taxed the Jews after people after he ‘went rouge’ on God.

This represented a HUGE increase in taxes.

So an alternate interpretation would be the “Antichrist will raise taxes on his people to make it a huge burden on them”.


46 posted on 12/05/2012 1:42:36 PM PST by ChinaGotTheGoodsOnClinton (Go Egypt on 0bama)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Pontiac

That’s you. 99% of the e-mail is text, and small amounts of text at that, most compression can shrink pure text by as much as 40%. All the e-mails a person sends in a week can be stored in a couple of KB, that’s a 10 to the third measurement, PB storage is a 10 to the 15 measurement. 5 years ago Teradata launched Teradata 12, 50 PB of compressed data. That’s a purchasable tool. And it’s 5 years old, they’re up to Teradata 14 now.

All of our data is storable within commercially available systems. Let’s not even get into secret stuff the government is often claimed to have access to.


47 posted on 12/05/2012 1:48:04 PM PST by discostu (Not a part of anyone's well oiled machine.)
[ Post Reply | Private Reply | To 42 | View Replies]

To: F15Eagle

When you see these things come to pass, look up and know that your salvation is at hand.


48 posted on 12/05/2012 1:52:22 PM PST by Slyfox (The key to Marxism is medicine - V. Lenin)
[ Post Reply | Private Reply | To 16 | View Replies]

To: wesagain

So if the goivernment already has this all encompassing snooping capability, why would they want to implement laws that increase government intrusion and control? Increasing government intrusion and control would discourage the use of e-mails and the internet (especially among people of potential interest to the government), thus reducing the amount of information that could be gathered.


49 posted on 12/05/2012 1:53:18 PM PST by grumpygresh (Democrats delenda est; zero sera dans l'enfer bientot)
[ Post Reply | Private Reply | To 1 | View Replies]

To: wesagain

Carnivore and Echelon and others have been around a while...


50 posted on 12/05/2012 1:53:18 PM PST by ▀udda▀udd (>> F U B O << "What the hell kind of country is this if I can only hate a man if he's white?")
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-5051-61 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson