You are currently browsing the tag archive for the ‘Security’ tag.

As a conservative you have the same duty as every other American to vote for the chief executive you feel is most fit to run the country.

With the meltdown currently going on in the Republican Party after just 3 months post convention, having similar meltdowns spread throughout the entire governmental apparatus during the next four years, seems not like a good idea.

But what happens if you vote for Hillary?

One, you become part of a huge pool of voters she is responsible to and for…

Two, you vote for someone though she may have liberal ideas, has a very conservative morality deeply rooted in family and religious values.

Three, you have voted for the most qualified candidate we have ever had for our chief executive.  John Quincy Adams comes the closest as to being equally qualified based on experience for the challenges the Oval Office throws at its newest inhabitant.

Four, you have voted for a person who’s deepest concern, on which all her convictions lie, is centered upon our children.  From her book 10 years ago she lays down the claim that it is children who in raising, are what makes us civilized.  It is the interests of our children in the future,  which is her North Star, against which she bases all decisions…

Five, you have voted for someone who when not running against Conservatives, is well respected, well liked, and well appreciated by Conservatives who personally know her..


So you see, despite what you may have been told, despite all the anger fostered against her, she is really not that bad… She is similar to the current president and we have done ok economically under him, we’ve done ok internationally under him, we’ve done ok morally under him…

All the stories of massive upheaval and disruption that would occur when Obama took over, (remember one Congressperson calling him a liar in his first address to Congress?) failed to materialize. Nor will they materialize under Hillary.

With Hillary you know that in four years, or maybe eight, you will have a good chance to run again, perhaps winning the White House… If you can’t, then you obviously need to realign your party in order to do so….  By now, there is no doubt where the problem with your party lies.

Your real enemy are the “crazies” you harbor.  You turned your heads, you looked away, you used them because they gave you votes,  and with Priebus allowing way too many candidates for president (27), you let them consolidate in numbers strong enough to name your chief… To win in the future it should now be obvious, you need to cut them away, then cull Democrats who are only Democratic because they aren’t crazy like your party was, reinstall them back into the fold, and work yourselves back to a majority…

You need Hillary as President to do this.   If you have Trump, or even let him come close, or even give him more than Ross Perot got as a 3rd party,. you will have to contend with crazy and it will kill you…

Vote Hillary,  kick out the crazies, let them become the 3rd party, not you, and try again in four years… It won’t be that bad and you know as well as I, it could have been ALOT worse…

There should be no shame in voting for the best person available… With Hillary, that is all you are doing…

(Plus, if you live in the 8th Senatorial District of Delaware, you need to get out and vote for Republican Meredith Chapman for State Senate….. One of the best things you can do for your future, is to put a non-crazy Republican in office.)

Life is not over; thank goodness this election almost is.. 🙂


I really didn’t give this report much respect coming out of the gate for the word-leaked-out, was that it does nothing to stop the NSA’s abuse.   However, I have deep respect for Richard Clarke who was one of the five, so I felt compelled to read the whole thing

Since I’m sure few of you will venture to read the entire report, If something jumps out, I jotted it down below…

1. The United States Government must protect, at once, two different forms of security: national security and personal privacy.

In addition to reducing risks to national security, public officials must consider four other risks:

• Risks to privacy;
• Risks to freedom and civil liberties, on the Internet and elsewhere;
• Risks to our relationships with other nations; and
• Risks to trade and commerce, including international commerce.

We recommend that Congress should end such storage and transition to a system in which such metadata is held privately for the government to query when necessary for national security purposes.

In our view, the current storage by the government of bulk meta-data creates potential risks to public trust, personal privacy, and civil liberty.

We recognize that the government might need access to such meta-data, which should be held instead either by private providers or by a private third party. This approach would allow the government access to the relevant information when such access is justified, and thus protect national security without unnecessarily threatening privacy and liberty.

We endorse a broad principle for the future: as a general rule and without senior policy review, the government should not be permitted to collect and store mass, undigested, non-public personal information about US persons for the purpose of enabling future queries…

We also recommend that legislation should be enacted authorizing telephone, Internet, and other providers to disclose publicly general information about orders they receive directing them to provide information to the government. Such information might disclose the number of orders that providers have received, the broad categories of information produced, and the number of users whose information has been produced…

We recommend that, in the absence of a specific and compelling showing, the US Government should follow the model of the Department of Homeland Security and apply the Privacy Act of 1974 in the same way to both US persons and non-US persons.

We recommend a series of organizational changes.  We believe that the Director should be a Senate-confirmed position, with civilians eligible to hold that position; the President should give serious consideration to making the next Director of NSA a civilian. NSA should be clearly designated as a foreign intelligence organization….

The head of the military unit, US Cyber Command, and the Director of NSA should not be a single official.

We favor a newly chartered, strengthened, independent Civil Liberties and Privacy Protection Board (CLPP Board) to replace the Privacy and Civil Liberties Oversight Board (PCLOB)…

We recommend that Congress should create the position of Public Interest Advocate to represent the interests of privacy
and civil liberties before the FISC.

The US Government should take additional steps to promote security, by

(1) fully supporting and not undermining efforts to create encryption standards;

(2) making clear that it will not in any way subvert undermine, weaken, or make vulnerable generally available commercial
encryption; and

(3) supporting efforts to encourage the greater use of encryption technology for data in transit, at rest, in the cloud, and in

The use of “for-profit” corporations to conduct personnel investigations should be reduced or terminated.

There then follow forty-six recommendations, most of which were mentioned above… They start on page 26 and continue until page 44,  For the most part, these are where the complaints that the report is too soft, lie.  The report states things should be in a certain way, and like the Articles of Confederation, there is no teeth to back them up….  For instance it states we recommend that private third parties turn over data only if it is necessary to the security of the United States… Easily setting up this scenario… “Hi, can you give me info on Ms Murphy.  Appears we have some trousers in some soup…” ” Is it a national emergency?” “Yes, sure is”… “Ok here are all their calls…” Essentially unless teeth are added, this allows the same actions as go on today, to progress further.

Teeth such as:  any third party who gives, or any governmental employee who asks for private confidential information for purposes other than an immediate physical threat to national security, may be sued in court for any damages such misuse of information may cause…. etc…

It is our sincere hope, that one, this power is removed from the government.  Private corporations cannot arrest one in the middle of the night, and that with this data in the hands of private entities, that those private entities are at risk if any wrong information falls into anyone’s wrong hands…

Most of us would still trust our privacy in that scenario…  “What?  Someone just told my spouse I was sexting Miley Cyrus?  Oh well, (sigh) with the judgment of $68 million I’ll eventually receive, I’m much better off if I’m divorced before I receive it… ..”

When computers first started, vulnerabilities were not made public. Instead one alerted the maker of the vulnerability privately, so the bad guys would not find out about it.  But most often, those receiving the alert in secret, would be in no hurry to fix it.

Then vulnerabilities started to became public. As soon as one was found, it was posted and the makers were forced by public pressure to scramble and fix the flaw. So once a vulnerability was found, a temporary fix could be slapped together even if it meant taking the server off line.  Publishing made the Internet safer for us all.

The NSA does just the opposite.  Not only was it collecting data as it passed through its servers, but it has compromised a huge number of user’s computers and phones just like any hacker.  It has the potential to control almost any computer around the globe, according to the most recent release of data coming from Edward Snowden.

It has the unique ability to do so by its strategic location in the middle of the data stream. Many of the “401 File not found”s you have received from what you thought were up-and-running sites,  innocuously came from the NSA according to Snowden’s released data.  Once connected, the NSA then installs it’s own data directing all your flow to its secret servers, first before it gets passed on to where you were intending.

The ease with which your servers are compromised comes from NSA’s collusion it has with Verizon, Comcast, and the other servers who have access to the internal workings of your machine.  This, coupled with back doors manufactured expressly for the NSA, makes any computer susceptible to infiltration.

There is no way your IT guys can block them, because it is so secret.

And that is the problem.  Edwards Snowden left the NSA with tremendous amounts of information, and fortunately decided to make it public.  Computer surveillance has been in effect 10 years now.  One must wonder, how many service technicians working with the NSA, have left with that information, and who have not gone public, but chose to sell it to those to whom such information is important?

What if the Chinese already have all the codes the NSA uses to get into any American’s computer?  (All we have is the NSA’s words that they don’t.  But the NSA has rarely told the truth.)

In other words… because all these NSA codes and methods are top secret, any bad agent possessing that powerful secret, can wreak havoc far longer than he could if the IT community were able to pounce and scramble out a fix right away….

We are now at the point, where cyber infiltration is a far more serious threat to the USA than ragged desert terrorists jumping through hoops of fire in training videos.

The NSA needs to recognize this and turn to the IT community and publish their back doors and vulnerabilities.

It would make everyday spying on Americans much harder, but would protect our system of electronics against a devastating attack.

In layman’s terms, it is much easier to get away with murdering someone in a mountain cabin far from other people, than it is to do so in the middle of a police station…  If everyone is a cop, we are much safer than if we have something we think is a secret, but is turns out it is not.

Balanced against spying on American citizens, i think sealing up the NSA caused vulnerabilities to our system, is a no-brainer.