The latest Edward Snowden bombshell that the National Security Agency has been hacking foreign Google and Yahoo data centers is particularly disturbing. Plenty has been written about it so I normally wouldn’t comment except that the general press has, I think, too shallow an understanding of the technology involved. The hack is even more insidious than they know.
The superficial story is in the NSA slide (above) that you’ve probably seen already. The major point being that somehow the NSA — probably through the GCHQ in Britain — is grabbing virtually all Google non-spider web traffic from the Google Front End Servers, because that’s where the SSL encryption is decoded.
Yahoo has no such encryption.
The major point being missed, I think, by the general press is how the Google File System and Yahoo’s Hadoop Distributed File System play into this story. Both of these Big Data file systems are functionally similar. Google refers to its data as being in chunks while Hadoop refers to blocks of data, but they are really similar — large flat databases that are replicated and continuously updated in many locations across the application and across the globe so the exact same data can be searched more or less locally from anywhere on Earth, maintaining at all costs what’s called data coherency.
Data replication, which is there for reasons of both performance and fault tolerance, means that when the GCHQ in London is accessing the Google data center there, they have access to all Google data, not just Google’s UK data or Google’s European data. All Google data for all users no matter where they are is reachable through any Google data center anywhere, thanks to the Google File System.
This knocks a huge hole in the legal safe harbor the NSA has been relying on in its use of data acquired overseas, which assumes that overseas data primarily concerns non-U.S. citizens who aren’t protected by U.S. privacy laws or the FISA Court. The artifice is that by GCHQ grabbing data for the NSA and the NSA presumably grabbing data for GCHQ, both agencies can comply with domestic laws and technically aren’t spying on their own citizens when in fact that’s exactly what they have been doing.
Throw Mama from the train.
If Google’s London data center holds not just European information but a complete copy of all Google data then the legal assumption of foreign origin equals foreign data falls apart and the NSA can’t legally gather data in this manner, at least if we’re supposed to believe the two FISA court rulings to this effect that have been released.
This safe harbor I refer to, by the way, isn’t the US-EU safe harbor for commercial data sharing referred to in other stories. That’s a nightmare, too, but I’m strictly writing here about the NSA’s own shaky legal structure:
According the the Foreign Intelligence Surveillance Court of Review: …the Director of National Intelligence (DNI) and the Attorney General (AG) were permitted to authorize, for periods of up to one year, “the acquisition of foreign intelligence information concerning persons reasonably believed to be outside the United States” if they determined that the acquisition met five specified criteria. Id. These criteria included (i) that reasonable procedures were in place to ensure that the targeted person was reasonably .believed to .be located outside the United States; ( ii) that the acquisitions did not constitute electronic surveillance; 2 (iii) that the surveillance would involve the assistance of a communications service provider [I hate to jump in here, but Google says they didn’t know about the data being taken, so can this assistance be unknowing or unwilling? — Bob]; (iv) that a significant purpose of the surveillance was to obtain foreign intelligence information; and (v) that minimization procedures in place met the requirements of 50 U.S.C. § 1801(h)
This is a huge point of law missed by the general news reports — a point so significant and obvious that it ought to lead to immediate suspension of the program and destruction of all acquired data… but it probably won’t.
That probably won’t happen because Congress seems hell-bent on quickly passing an intelligence reform bill that not only doesn’t prohibit these illegal activities, the bill seems to give them a legal basis they didn’t have before.
Some kind of reform, eh?
This news also blows a hole in the argument that these agencies are gathering data mainly so they’ll be able to retrospectively analyze after the next terrorist attack as was done right after the Boston Marathon bombings. If we already have after-the-fact access to historical data through this hack, why bother even gathering it before?
The other part of this story that’s being under-reported I think is exactly how the GCHQ is gaining access to Google and Yahoo data? A cynical friend of mine guesses it is happening this way:
“The NSA probably has a Hadoop system set up and linked to Google’s. All data that goes onto Google’s network is automatically replicated on the NSA system. Heck that Hadoop system is probably sitting in Google’s data center. You don’t need to move the data. You just need to access a copy of it. It would not surprise me if this is being done with Google, Yahoo, Microsoft, Facebook, Twitter, … The government has probably paid each of them big bucks to set up, support, and manage a replica of their data in their own data centers.”
I think my friend is wrong because I can’t see either Google or Yahoo being stupid enough to help such a process occur. The associated revenue isn’t enough to be worth it for either company.
GCHQ could get the data from a network contractor like BT. Or they could do it themselves by physically tapping the fibers. There is a technique where if you bend individual fibers into a tight loop (tighter than the reflected angle) some light escapes the fiber and can be harvested with a detector and the unencrypted data read. All it looks like to the network is a slight signal attenuation. But given that cable bundles hold at least 148 fibers each, such physical extraction would require a unit the size of a refrigerator installed somewhere.
I doubt that the NSA and GCHQ are grabbing the signals from cables between data centers. Rather they are probably grabbing the signals from cables within the data centers — still unencrypted despite Google’s recently expanded encryption system. I’d bet money on that. These data centers tend to be leased buildings and I’m sure some royal is the beneficial owner of the UK facility and has access to the physical plant…
But this is all just speculation and will probably have to remain so as both governments do all they can to rein-in public debate.
My concern is also with what happens down the road. A lot of this more aggressive NSA behavior came in with the Patriot Act and has become part of the agency’s DNA, raising the floor for questionable practices. So there is less a question of what wrong will they do with this capability than in what direction and how far will they extend future transgressions?
This GCHQ business also feels to me like it may have come from the Brits and simply fallen in the lap of the NSA. If not, then why would they be simultaneously fighting the FISA court for the same information from domestic sources?
A mate who is a copper said that crooks have the best security as locks only keep out honest people. Those serious about secure communications are spending the time and effort to make it secure.
.
He also said we pretty much only catch the dumb crooks, those that are too lazy, to careless, to boastfully excessive. The big guys are quietly living in a suburb like yours. That’s who they are catching her, the dumb crook, the big guys are quietly getting on with business.
.
Besides, have we heard of any big breaks through using these techniques.
Wouldn’t it be fun if Germany offered political asylum and a guarantee of immunity to Edward Snowden?
And when Obama picks up the phone to complain to Merkel..?
It’d be doubly funny as it’s that much easier to get at and assassinate Snowden in a freeer, cooperating nation.
And what would that say about the “Land of the free”? Gotta love the irony.
Only a matter of time now before a bunch of governments worldwide are tripping over each other to offer Edward Snowden alternative asylum arrangements should he require it. Lots of good reasons for doing this of course, even beyond sticking two fingers up to those colossally arrogant americans who think national security can be used as an excuse for absolutely anything. I hear the UK petition already has over 500,000 signatures.
I’m an American, but right now you’ll not hear me say I’m proud of that fact. I wish our allies would flip the bird to this administration, so that maybe they might get a clue. The government here certainly isn’t “by the people, for the people” anymore. It’s more like “f*** the people, for the big corporations.” Hollywood, big oil, the auto industries, big insurance, and Wall Street get what they want (as well as those with deep pockets), own and control the government. Smart make a Four2 with a 0.8L diesel engine, but we’re only allowed the petrol engine because of the diesel’s better fuel economy would hurt big oil. BP trashes the Gulf of Mexico and pump prices go up, and they get basically a slap on the wrist. Keystone XL’s new transcon pipeline has had multiple spills, but it’s not on big media, which is the only thing the sheeple believe, because the government say they’re not allowed to report it. This government spies on everyone, violating the rights of its citizens, and citizens of other countries, and, so far, will just get away with it. Hollywood wants control of the internet because of “privacy” aka they aren’t making enough money, so now there’s talk of internet censorship. Forget freedom of speech, religion, right to privacy, renewable energy, fuel efficiency, and the so called “American Dream”. It’s all going down the toilet because nobody knows, and because of lack of coverage in the media, nobody believes it. No, I’m not proud to be an American if this is what America is.
The funny thing is that no one will care.
Now if you had a new cleavage shot of Kim Kardashian, you might get some attention.
sadly sir, I think you’re correct.
[…] https://www.cringely.com/2013/11/02/google-file-system-makes-nsas-hack-blatantly-illegal-know/?utm_so… […]
Although I agree there’s a likely legal pathway here to shut down (at least officially/”legally”) any such NSA activity, I don’t think it’s so black-and-white. As the headline suggests, the issue remains re Google, not Yahoo; Yahoo already has a process by which it only deploys domestic information to servers abroad by permission, so the person can in fact be said to be likely abroad; I’ve seen that warning/request pop up when abroad, where Yahoo offers up to cache your information on a server abroad, but only if you so agree.
–
But even re Google, the problem remains that the program may have begun in mere technical ignorance of Google’s caching or even begun before they were doing this on a broad, regular scale. And I’m not even 100% sure that Google moves all cached info if a US consumer’s behavior is seen as being solely in the US; many companies crow they have smarter algorithms than just duplicating all data. I think there’s a lot of legal wiggle room, certainly anyway when factoring in intent, here.
–
As you say, the real questions lay in details which we don’t know.
–
Anyway, the fundamental issue is to change the expectations of privacy via the laws. Short of that, the lack of confidentiality of third party information, the wide grey area re government use of information and hacking, and the age-old doctrine by which any agency will take a mile if offered an inch will conspire to ensure these problems remain ongoing. But I doubt a consensus in America exists to do this.
There is nothing even slightly legal with what the NSA is doing.
Obama is desperate to keep all cases out of the SCOTUS.
Given the current makeup of the SCOTUS, I doubt it matters if it makes it that far. Too many years of conservative Presidents have packed the Court with sympathetic justices.
Conservatives want less government and lower taxes. But they do see national defense as it’s primary function. You can’t blame the military for recognizing the value of intelligence in that regard. But with better budgetary oversight, the government would voluntarily choose to use subpoenas of private data rather than build massive worldwide hardware communications taps and storage facilities.
I don’t quite understand Bob’s point about why the claim of retrospective analysis is invalid. Even if the NSA creates duplicate data centers, it seems to me that’s the use they certainly will be put to.
On the other hand if you’re saying those duplicate data centers are invitations for all kinds of unwarranted searches, then yes that’s the troubling part.
Of course if the government can get a valid warrant then they have to have some way to get access to the data.
Outing all of this has actually opened up some space in the market for alternatives to Google and Yahoo for data storage, email, the works. I think Google can forget selling Google Apps to foreign governments now. Microsoft must be silently thanking them for having a vulnerability that was exploited.
The NSA can gather the data in its own data center and analyze it after the next terrorist attack OR they can simply use a subpeona and do the same search on Google, itself, saving, say, $100 million. It’s no faster to do it at the NSA and maybe even slower. It’s certainly more expensive. And with Google you don’t have to worry about having saved the wrong data because they keep everything. So why does the NSA instist on keeping its own local copy of the same data? It could be habit, could be fear they’ll lose something in the next budget cycle if they don’t keep spending, or it might just be they are looking for a lot more in that data than we’ve been told. THAT’s my reasoning. Does it make more sense now?
Retrospective analysis is just one of the reasons. Google is not obligated to save everything unless Congress passes a law to that effect and includes compensation for Google to do it. If I were in charge of the spying and had the budget, I’d copy it all as well. After all Google could loose some data even if it’s not their intention. Stuff happens.
But Google DOES save everything, whether they are required to or not. This is according to Brewster Kahle of the Internet Archive, who tries to save everything, too. The difference between the two is that you can exclude your stuff from the Archive if you specifically ask but Google never tells you what they have so they don’t have to comply with any such requests. It’s all there.
“…Google DOES save everything…” Whether or not that is even possible, and for how long, could be the subject of another discussion. Does Google also backup everything offsite? Larry’s mom’s basement will fill up at some point. 🙂
The NSA can more easily hide the reason for its searches if it already has the data. Let’s say, for example, a Republican administration decides to keep its party in power by accessing the Democrats’ communications. If it has to raise a subpoena then ask Google or the phone companies for that information, someone somewhere is going to smell a rat. If the TSA already has that data, it’s just a matter of asking the analysts to extract it from certain telephone numbers and email addresses. Divide the search between enough analysts and they won’t see a pattern.
“size of a refrigerator” may not be accurate. Fiber can only go 25-50 miles before it needs regeneration of the signal, clean up the signal edges, and so forth.
which used to be done by taking it out of one card and putting it back in another card, for each fiber, and once upon a time for each lambda (light color). this has not been the case for over a decade. Lucent has for a long time had a regenerator that is a box with all the fibers in a cable wrapped around a laser source, which with one laser shines on all the glass and effectively regenerates it without any electronics beyond laser drive. voila, nice clean signals for another hop.
with multi-terabit fiber systems, stands to reason you just have a little bank of detectors among the fibers at less than minimum bend radius, and bust out the signals on another card bank. that can be as tight as a third of a relay rack. maybe even tighter, depending on what they can buy from a certified fab like IBMs in South Burlington. the government just walks over a table and says, “build me a hundred,” and they arrive in due time. the NSA certified fab has no idea what they just built and cut off the wafers. you maybe lose a dB or so, below the “geez, Bill, we better dispatch this” at the carriers.
all you now need is a court order from FISA and boogie, a thousand times more datastream than you can process.
all from casual reading of trade mags, there is no inside information here.
If a guy like Snowden can reveal all this ‘activity’ going on, then what will a less idealistic government employed or contracted guy be doing with the bunch of trade secrets he comes across? Source code for this software, source code for that firmware, detailed descriptions of otherwise secret formulas or algorithms, they all seem to be within arm’s reach these days.
What the intelligence agencies have undeniably demonstrated thus far is that they’re not immune to their own leaks.
I’m wondering what’s more of a threat, missing nefarious communication or risking massive exposure of monitored and collected (personal) data transfers. We’ve seen it before with corporations and even government agencies ‘inadvertently’ exposing personal data. We’re now tapping into a treasure of US personal and corporate data that, when compromised, may lead to much extremer threats than what we’ve seen thus far. Information is power.
It surprised me that everyone didn’t already know what the NSA was doing. I started hearing about 10 years ago how the NSA has top secret rooms inside the telcos that T taped to all the lines. I assumed that the same was true for the Dotcoms. I also assumed since we gave up the Constitution with the patriotic act that there was no longer any privacy.
All (or most) of this bought to you by the “Patriot Act”. If ever there was a government oxymoron…
Why bother intercepting data by inserting a prism/bend at the door step? There are hundreds and thousands of data centres around Europe. That’s a large Real Estate portfolio to invest in and try to keep secret.
All the replication data you mentioned gets funnelled (in this case) through a few transatlantic cables and therefore a few UK cable landing points; and all these cables are operated by a small group of large companies, who may be amenable/vulnerable to government requests. You could get your hands dirty by doing a hardware “tap” on the fibre there.
But then again, then there are only a few companies who make the size of fibre switching gear needed at the fibre landing points. How hard would it be to update the firmware of an Add Drop Multiplexer to copy traffic off say, Google’s, STM-256(?) stream onto another STM-256 channel that the NSA/GCHQ pays for and listens to?
The hard part would be reverse engineering the Hadoop/Google File System packet format and turning it into a useful data store. But hiring some ex-Google or ex-Yahoo staff would cover that one.
I’m not saying that’s what they are doing, but if I was tasked to do it, that’s where I’d start. Benefits: less real estate required, doesn’t matter if target moves to a new data centre within the same continent, no need to actually touch physical cables.
And the only protection against that would be to start encrypting the block/chunk replication between data centres. Which would be large-scale real-time encryption that would require significant hardware to perform. And then you have to worry if the encryption protocol you choose is broken/weakened by design…
[…] The @google File System makes US NSA’s hack blatantly illegal & it knows it cringely.com/2013/11/02/goo… by […]
“grabbing the signals from cables within the data centers ” – they indeed have been tapping the direct fiber lines since the late 1990s. i worked at Tier 1 facility that was the transpacifc landing point for the fiber from asia. NSA had a mirroring switch installed to tap the OC-148 fiber at the facility. nothing new here..
All the talk about submarine cables is the distraction.
They’re doing it at the peering exchanges.
Dude,
You really should have had someone technical check this story. Google *builds* their own data centers, it doesn’t lease. They also maintain very high security, so it’s unlikely that the NSA would have been able to insert their own fiber taps in a Googly owned data center. It is actually more likely that the NSA has fiber taps placed at provider PoPs or uplink locations. Possibly even at peering points. The villain that no-one is talking about here is the service providers. They have been complicit, because you can’t insert a fiber tap without their knowledge or assistance.
Google may build its own data centers, but in London very little urban real estate is owned outright. Most is leasehold with possession reverting to the beneficial owner after a certain number of years. That owner is often the Crown, which retains rights of access. Google doesn’t even acknowledge having a London (or even a UK) data center, by the way, and this probably answers your question. There’s no way they don’t have a facility there (the closest they’ll acknowledge if in Dublin) but it’s not some huge industrial space. Rather it’s a floor in some building — some building owned by a third party.
Robert’s explanation rules out that the listening is happening at Internet Peering points. The internet traffic is encrypted with SSL as it traverses the internet, and that encryption is only removed once the traffic is “inside” the Google cloud. Those peering points you refer to are in the cloud on the left. The slide makes it clear they are focussing on access to the right hand cloud. Access to peering points would only give you a slivers of SSL traffic as it was accessed, not access to the full data store. Also, peering points have the wrong kind of people (geeks) running them; people less likely to keep a dirty secret. You’d be wanting to find some boring conservative mortgage and kids suits to do this work for you, which points me more towards a telco cooperating than a peering point.
–
Google are unlikely to rely on the Internet for their replication and control traffic between their own data centres – they are far more likely to have some very large private fibre links (probably a minimum OC-48/STM-16) between the data centres, which is where Robert’s theory about tapping the fibres comes from.
–
I only differ in thinking that the tapping happens in firmware at an ADM somewhere on the coast, rather than using physical tapping at the doorstep. We already know about Room 641A. I can’t imagine that was the only room.
–
I reckon the bit they are chuffed with and smiley-ing about on this slide is that they are reverse engineering the internal block/chunk replication traffic to build their own copy of the data stores. If that theory is correct, then they may have gaps in their copy of the data store, from old data which hasn’t needed to replicated since they gained this functionality.
Many good comments here. But the overriding concern for me is that we simply don’t know what is going on. We are not even allowed to know what we don’t know. Congress doesn’t know and I’m not sure that the President knows much, and the courts don’t want to know. History tells us that such a scenario will not end well.
Seems like the hardware vendors must have been in the know as well. Seagate, Dell, HP, etc. must have been shipping semi loads of storage systems to the NSA. I wonder if they have been sworn to secrecy as well.
When our kids were young and exploring the Internet for the first time we told them don’t say or post anything you don’t want the whole world to see. If you think about it the most popular websites and “cloud” services use the same type of technology as does Google. The government can tap into them just as easily. Perhaps it is time we follow the same advice we gave our kids.
.
Many years ago we heralded the Internet for “removing borders.” It opened communication and commerce to everyone everywhere. Now it has become an excuse for governments to side step their own laws. They can claim to be spying on others even though there are now no borders to keep them from spying on their own people too.
Eric Margolis also writes that Obama may be remembered as having gotten the world even angrier at the US than predecessor George W. Bush – quite an accomplishment.
See STASI MEETS STEVE JOBS:
http://ericmargolis.com/2013/10/stasi-meets-steve-jobs/
“Gentlemen do not read other gentlemen’s mail” sniffed US Secretary of State Henry Stimson in 1929 when told that American cryptographers had broken Japan’s naval and diplomatic codes. Stimson, who later headed the War Department, ordered code-breaking shut down.”
In 1975, Eric Margolis was invited to join the US Senate’s Church Committee. Its goal was to investigate massive illegalities committed by the CIA, National Security Agency and FBI. As a then staunch Republican, and having worked on President Nixon’s reelection campaign developing Mideast policy, he declined:
With the wisdom of hindsight, I should have joined the investigation.
Senator Frank Church warned: “ If this government ever became a tyrant, if a dictator ever took charge in this country, the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back because the most careful effort to combine together in resistance to the government, no matter how privately it was done, is within the reach of the government to know. “
…
Ben Franklin, that great thinker and sage, put it perfectly when he said that government (read spy agencies) is like fire – a useful tool, but a terrible master.”
http://ericmargolis.com/2013/11/ben-franklin-was-right-about-the-nsa/
[…] Robert X. Cringely writes: The latest Edward Snowden bombshell that the National Security Agency has been hacking foreign Google and Yahoo data centers is particularly disturbing. Plenty has been written about it so I normally wouldn’t comment except that the general press has, I think, too shallow an understanding of the technology involved. The hack is even more insidious than they know. […]
[…] The Google File System makes NSA’s hack blatantly illegal and they know it – I, Cringely – […]
First without reading the article I’d like to state that I saw plans for parallel servers ( NSA — Google) on some web site at least 3 — 4 years ago.
1 Google has said for years and it has been a NSA servant longest 2002 (?) that there is no privacy
2 Secret Laws and secret comands have again been around since 2002.
3 If you don’t understand mirrioring that’s not my fault.
4 If you don’t keep up with security matters that’s not my fault.
5 If you let the FBI CIA NSA control your freedom and privacy then throw out the constitution and form a dictatorship — like Iraq pre 2001.
If the NSA wanted to spy on google data centres legally, all they would have to do is pay google – secretly- to build large barges and put their data centres on them. Then tow the barges outside the territorial water of the U.S. & spy away to their hearts content. Government agency’s paying well known companies millions to build barges to carry out secret plans may sound far fetched; but it’s happened before; way back in the early 70’s when the CIA paid Howard Hughe’s company to pretend it was building a ship and a massive barge to mine manganese nodules off the sea floor. When in reality they were constructed as part of an operation to lift a sunken soviet sub (K129) off the bottom of the pacific. It’s interesting to note that construction on the google barges suddenly came to a halt at about the same time that it was reported the google CEO was unhappy about the latest revelations about the NSA snooping on google.
In case it helps there was an article in Washington Post which claimed that one of the leaked NSA slides contained data which were ONLY available from within the Google network, which kinda settles the matter …
“We showed some of the NSA’s briefing slides to private sector experts with detailed knowledge of the internal corporate networks of each company. In separate conversations, they agreed that the slides included samples of data structures and formats that never travel unencrypted on the public Internet.”
https://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/how-we-know-the-nsa-had-access-to-internal-google-and-yahoo-cloud-data/
I am a fan and groupie of C. Northcott Parkinson. He shows how Empires develop.
J. Edgar Hover was an empire builder. His Empire he preserved to his death forget retiring at 65! He used blackmail to remain in power. Use crime to fight crime!!
USA today has multiple empires without oversight – NSA, CIA Military you name it Empires are made. They’re made so you give them more power, because they say “We need this rule to make you safe” But it is a grab for unrestrained power. And empires always need more power.*
But when you look at their operation they fail the mustard. They’re lazy, irresponsible, willful and unlawful. USA history is full of stories of their transgressions without examination, curtailment or retribution.
Bruce Springsteen wrote a song about cops pumping 38 bullets into a man – when did the cops stop — Only when their clips were empty. The FBI boys club excluded a drunk womanizer who wanted to find Usama bin before 9/11. But each organization demands more powers. And no one in free and democratic USA can change it.
* USA Congress also has Empires — look at the age & longevity of members 30 years in power and 80+ in age. Their beliefs and votes are bought by the highest price.
You can’t run a country that way. USA reminds me of the USSR of the 60’s & 70’s!
Ossified idiots protecting their power! Look back to a revolution & end of the US SR.
Future USA has models already, Afghanistan, Iraq and Somalia all brought to you by Uncle Sam!
If you think USA will last for ever then you’ll expect 70 virgins in heaven. (The worst part of that magnanimous gesture by allah is how parsimonious he was – in eternity 70 women become very boring (Casanova had 5000 in 70 years) the only way it works is if you forget each encounter every time, so one could suffice!! And allah is a male chauvinist pig to use a feminism! Do female suicide bombers have to be lesbians? Or do they get 70 virgin boys? These are all theological questions Imams should answer. If all they want is to kill me, then the questions are still unanswered and Imams are fascist ignorant self-righteous fools just like the NSA!)
Proof of my assertions above see “Saving Bad (Public Servant) Apples” — http://city-journal.org/2013/cjc1107sg.html
And US SR decline into tribal fiefdoms through corrupt voting mechanisms and influences without due voter* diligence.
* Voter in local councils, local government, state government or federal government!
More proof:
I have predicted the demise of USA as we know it today by before the 250th anniversary of 1776 or 2026*. As in USSR the end comes from internal preventible causes unacknowledged or attended to today. Yanks are blind and deaf. Hear a voice crying in the wilderness who has seen the double standards of USA — John Crudele. USA Government has a therapeutic patent on the medical uses of marihuana and yet prosecutes its possession and allowed his wife to die painfully and make himself a criminal to care to reduce her suffering with dope!
http://nypost.com/2013/11/13/sorry-kids-but-this-debts-on-us/
http://nypost.com/2013/09/11/feds-patented-medical-marijuana-even-when-they-were-fighting-it/
Political correctness is a terminal disease with death the only outcome. Blunt force needs to be applied to Congress, NSA, CIA, Military and Police to rein in wonton power and crazed ideological beliefs.
* The 2020’s are going to be roaring, destructive and hell from so many quarters. Those alive will think the 7 Egyptian plagues were peaceful holidays. I’d start preparing by listening to The Animals’songs!
… [Trackback]
[…] There you will find 56243 more Infos: cringely.com/2013/11/02/google-file-system-makes-nsas-hack-blatantly-illegal-know/ […]
… [Trackback]
[…] Informations on that Topic: cringely.com/2013/11/02/google-file-system-makes-nsas-hack-blatantly-illegal-know/ […]