SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : Formerly About Advanced Micro Devices -- Ignore unavailable to you. Want to Upgrade?


To: combjelly who wrote (720220)6/9/2013 11:15:31 AM
From: joseffy1 Recommendation

Recommended By
longnshort

  Respond to of 1576346
 
Lefty combelly is in AGONY over crooked Obama's betrayal of the US population.

Poor, desperate combelly.



To: combjelly who wrote (720220)6/9/2013 11:26:13 AM
From: longnshort  Read Replies (2) | Respond to of 1576346
 
Actually, President Obama clarified the situation today. He said no one is listening to your phone calls. The president said it's not what the program is all about. You know, like the IRS isn’t about targeting certain political groups. That's not what it's about!

I mean what's going on? The White House has looked into our phone records, checking our computers, monitoring our e-mails. When did the government suddenly become our psycho ex-girlfriend? When did that happen? When did that happen? When did that happen?

You know, I'll tell you, if Obama wants to put this snooping thing to good use, how about spying on the IRS next time they throw a $4 million party. Why don't you do that one? Yes, exactly, exactly. Find out about that. Yeah.


As you know by now, the IRS has taken some heat for reportedly spending $4 million on a conference in Anaheim last year where employees took dancing lessons. One of the dances they learned? Tap dancing around the issues. Yes, that was very good, be able to tap dance

Well, the latest one that came out today. You see this one? They're saying the IRS paid an artist $17,000 to paint portraits of Abraham Lincoln to help inspire the IRS agents. You know, if they want to see a picture of Lincoln for inspiration, take out a $5 bill and save the taxpayers $16,995. Exactly. That's what they said. They said.

Oh, the hearings have been unbelievable this week. Congressional investigators say the IRS basically threw a $4 million party for themselves. But in fairness, who else is going to throw a party for the IRS? Really? Now, a going away party, I think we'd all chip in. I would chip in! I would chip in! There you are, no problem. I would pay for that.



jay leno



To: combjelly who wrote (720220)6/9/2013 11:48:20 AM
From: joseffy  Respond to of 1576346
 
Obama's 'Muslim Outreach'--Like 'reaching out' to the Manson family.



To: combjelly who wrote (720220)6/9/2013 12:24:39 PM
From: joseffy1 Recommendation

Recommended By
FJB

  Respond to of 1576346
 
Professor From Columbia Comes Forward Saying Obama Never Attended the University



To: combjelly who wrote (720220)6/9/2013 1:07:54 PM
From: joseffy  Respond to of 1576346
 
Obama's Wiretapping. Blame Bush! Not So Fast.... (GOPBR Exclusive)



To: combjelly who wrote (720220)6/9/2013 1:10:13 PM
From: joseffy  Respond to of 1576346
 
Maxine Waters: ‘Obama Has Put In Place’ Secret Database With ‘Everything On Everyone’ (video)



To: combjelly who wrote (720220)6/9/2013 1:12:54 PM
From: steve harris8 Recommendations

Recommended By
Bill
greatplains_guy
joseffy
longnshort
Neeka

and 3 more members

  Read Replies (1) | Respond to of 1576346
 
There is a difference. Now this is pretty simple, so try to concentrate.

Bush gathered the data of overseas phone calls only where a suspected terrorist was involved.

Today, Dear Leader Obama demanded and received the database of all calls, foreign and domestic, of everyone.

If you can't see the difference, ask one of your teachers at school.



To: combjelly who wrote (720220)6/9/2013 1:19:17 PM
From: longnshort  Respond to of 1576346
 
Government likely to open criminal probe into NSA leaks: officials

President Barack Obama's administration is likely to open a criminal investigation into the leaking of highly classified documents that revealed the secret surveillance of Americans' telephone and email traffic, U.S. officials said on Friday.

The law enforcement and security officials, who were not authorized to speak publicly, said the agencies that normally conduct such investigations, including the FBI and Justice Department, were expecting a probe into the leaks to a British and an American newspaper.

Such investigations typically begin after an agency that believes its secrets have been leaked without authorization files a complaint with the Justice Department.

It was unclear on Friday whether a complaint had been submitted by the publicity-shy National Security Agency, which was most directly involved in the collection of trillions of telephone and email communications.

However, one U.S. official with knowledge of the situation said that given the extent and sensitivity of the recent leaks, federal law may compel officials to open an investigation.

A criminal probe would represent another turn in the Obama administration's battle against national security leaks. This effort has been under scrutiny lately because of a Justice Department investigation that has involved searches of the phone records of Associated Press journalists and a Fox News reporter.

Leaks to media outlets this week have revealed a government campaign of domestic surveillance going far beyond anything that had been acknowledged previously.

Late on Wednesday, Britain's Guardian newspaper published what U.S. officials later acknowledged was an order, approved by the secretive U.S. Foreign Intelligence Surveillance Court, requiring a subsidiary of Verizon Communications to give the NSA raw data showing phone calls made from numbers within the United States and from U.S. numbers to those overseas.

The data did not include the identities of people who made the calls or the contents of the calls.

On Thursday, the Guardian and the Washington Post published slides from a secret NSA powerpoint presentation that described how the agency gathered masses of email data from prominent Internet firms, including Google, Facebook and Apple under a Top-Secret program called PRISM.

Some of the companies denied that the NSA and FBI had "direct access" to their central servers, as the Post reported.

On Friday, for example, Facebook founder and Chief Executive Mark Zuckerberg said his company "is not and has never been part of any program to give the U.S. or any other government direct access to our servers."

"We have never received a blanket request or court order from any government agency asking for information or metadata in bulk, like the one Verizon reportedly received," Zuckerberg said. "And if we did, we would fight it aggressively. We hadn't even heard of PRISM" before Thursday, he said.

James Clapper, the director of U.S. national intelligence, condemned the leaks and asserted that the news articles about PRISM contained "numerous inaccuracies."

WIKILEAKS

Journalists involved in The Guardian and Washington Post articles have reported in depth on WikiLeaks, the website known for publishing secret U.S. government documents.

The Post report on the PRISM program was co-written by Laura Poitras, a filmmaker who has been working on a documentary on WikiLeaks, with the cooperation of its founder Julian Assange, and who last year made a short film about Bill Binney, a former NSA employee who became a whistleblowing critic of the agency.

Last year, the web magazine Salon published a lengthy article by the author of the Guardian report, Glenn Greenwald, accusing U.S. authorities of harassing Poitras when she left and re-entered the United States. Greenwald also has written frequently about Assange.

The Guardian and Post stories appeared in the same week that U.S. Army Private First Class Bradley Manning went on trial in Maryland accused of leaking hundreds of thousands of classified documents to WikiLeaks.

In an email to Reuters on Friday, Poitras rejected the notion that the trial had any impact on the timing of her story.

"I am fully aware we are living in a political climate where national security reporting is being targeted by the government, however, I don't think fear should stop us from reporting these stories," Poitras wrote.

"To suggest that the timing of the NSA PRISM story is linked in any way to other events or stories I'm following is simply wrong. Like any journalist, I have many contacts and follow multiple stories."

Kris Coratti, a Washington Post spokeswoman, said the timing of the paper's publication of Poitras' story had nothing to do with Manning's trial and that Assange had played no role in arranging or encouraging the story.

Greenwald did not respond to emailed requests for comment. The Guardian's editor-in-chief, Alan Rusbridger, declined to comment.



To: combjelly who wrote (720220)6/9/2013 1:20:27 PM
From: longnshort1 Recommendation

Recommended By
joseffy

  Read Replies (1) | Respond to of 1576346
 
Whistleblower’s NSA warning: ‘Just the tip of the iceberg’

The National Security Agency’s collection of phone data from all of Verizon’s U.S. customers is just the “tip of the iceberg,” says a former NSA official who estimates the agency has data on as many as 20 trillion phone calls and emails by U.S. citizens.

William Binney, an award-winning mathematician and noted NSA whistleblower, says the collection dates back to when the super-secret agency began domestic surveillance after the Sept. 11 attacks.

“I believe they’ve been collecting data about all domestic calls since October 2001,” said Mr. Binney, who worked at NSA for more than 30 years. “That’s more than a billion calls a day.”

He called his figures “back of the envelope” estimates, adding that they include emails as well as telephone calls.

Mr. Binney, who left the agency in October 2001, said the data were collected under a highly classified NSA program code-named “Stellar Wind,” which was part of the warrantless domestic wiretapping effort — the Terrorist Surveillance Program — launched on orders from President George W. Bush.

The Terrorist Surveillance Program was revealed by The New York Times in 2005, but officials said it only monitored calls between Americans and suspected terrorists abroad. The Bush administration said it based the program’s legal authority on the president’s powers as commander-in-chief.

Congress subsequently amended the law governing wiretapping by spy agencies — the 1978 Foreign Intelligence Surveillance Act (FISA) — to provide legislative authority for the program and require supervision by the special secret court the 1978 act established.

Britain’s Guardian newspaper posted online late Wednesday a copy of the “Top Secret” FISA court order directing telecommunications giant Verizon to hand over “metadata” about every call made or received by all of its customers in the United States. Such metadata include the calling and receiving phone numbers, the time of day and length of the call, and the whereabouts of the two parties.

Mr. Binney noted the order’s serial number, which indicates it is the 80th issued by the FISA court so far this year. The court likely has approved similar orders for the other major U.S. telecom providers, he said, “and they have to be renewed every 90 days.”

The order excludes the actual content of communications, such as the sound of voices on the call or the text of an email.

“On its face, the order reprinted in the [Guardian] article does not allow the Government to listen in on anyone’s telephone calls,” a senior U.S. government official said in an email.

Democrats and Republicans on the congressional intelligence committees defended the order Thursday, asserting that the wide-scale collection of such data had enabled authorities to disrupt at least one terrorist attack and noting that a warrant would still be required to access the actual content of calls.

But Stephen B. Wicker, a professor of electrical and computer engineering at Cornell University, said the practical distinction between the metadata of calls and their content is rapidly disappearing because of technological advances, such as GPS features in mobile phones.

“There is a blurring of the line between content and context,” said Mr. Wicker, whose research focuses on privacy issues in wireless information networks.

Using analytical software, the NSA could use mobile phones’ metadata over time to paint a picture of where their users went, who they talked to and what their habits were, Mr. Wicker said.

Story Continues ?

View Entire Story

‹‹ previous1 2 next ››

Read more: washingtontimes.com
Follow us: @washtimes on Twitter



To: combjelly who wrote (720220)6/9/2013 1:22:56 PM
From: longnshort  Read Replies (1) | Respond to of 1576346
 
Obama Administration Declassifies Details On “PRISM,” Blasts “Reckless” Media And Leakers
Facing a firestorm from liberals and conservatives over controversial counterterrorism surveillance programs, the Obama administration moved Saturday to declassify some details about a program to monitor foreign Internet traffic.

Following near-simultaneous reports from the Guardian and the WashingtonPost this week, Director of National Intelligence James Clapper said that contrary to press reports, “PRISM is not an undisclosed collection or data mining program.” He maintained that the government computer system is authorized by the Foreign Intelligence Surveillance Court and is overseen by all three branches of the federal government. He said that the program does not target US citizens or anyone known to be in the United States, and pushed back on reports that the government has continuous access to Internet companies’ systems.

“Service providers supply information to the Government when they are lawfully required to do so,” he said.

(MORE: PRISM of Interest: How TV Drama Anticipated the Data-Mining News)

The disclosure followed on a release Thursday of details about the National Security Agency’s collection of telephone “metadata” of all calls made in the United States.
In both instances, Clapper fiercely defended the programs, in the case of the Internet surveillance saying the program has “proven vital to keeping the nation and our allies safe.”

“It continues to be one of our most important tools for the protection of the nation’s security,” he added.

Clapper also lashed out at both the Guardian and the Washington Post, calling the disclosure of classified information “reckless.”

“There are significant misimpressions that have resulted from the recent articles,” he added. “Not all the inaccuracies can be corrected without further revealing classified information. I have, however, declassified for release the attached details about the recent unauthorized disclosures in hope that it will help dispel some of the myths and add necessary context to what has been published.”

(MORE: PRISM by the Numbers: A Guide to the Government’s Secret Internet Data-Mining Program)

The Director of National Intelligence’s fact sheet on the Internet surveillance:




To: combjelly who wrote (720220)6/9/2013 2:14:21 PM
From: bentway1 Recommendation

Recommended By
tejek

  Read Replies (1) | Respond to of 1576346
 
We are shocked, shocked…

07 Jun

Is it just me or does the entire news media — as well as all the agitators and self-righteous bloviators on both sides of the aisle — not understand even the rudiments of electronic intercepts and the manner in which law enforcement actually uses such intercepts? It would seem so.

Because the national eruption over the rather inevitable and understandable collection of all raw data involving telephonic and internet traffic by Americans would suggest that much of our political commentariat, many of our news gatherers and a lot of average folk are entirely without a clue.

You would think that the government was listening in to the secrets of 200 million Americans from the reaction and the hyperbole being tossed about. And you would think that rather than a legal court order which is an inevitable consequence of legislation that we drafted and passed, something illegal had been discovered to the government’s shame.

Nope. Nothing of the kind. Though apparently, the U.K.’s Guardian, which broke this faux-scandal, is unrelenting in its desire to scale the heights of self-congratulatory hyperbole. Consider this from Glenn Greenwald, the author of the piece: “What this court order does that makes it so striking is that it’s not directed at any individual…it’s collecting the phone records of every single customer of Verizon business and finding out every single call they’ve made…it’s indiscriminate and it’s sweeping.”

Having labored as a police reporter in the days before the Patriot Act, I can assure all there has always been a stage before the wiretap, a preliminary process involving the capture, retention and analysis of raw data. It has been so for decades now in this country. The only thing new here, from a legal standpoint, is the scale on which the FBI and NSA are apparently attempting to cull anti-terrorism leads from that data. But the legal and moral principles? Same old stuff.

Allow for a comparable example, dating to the early 1980s in a place called Baltimore, Maryland.

There, city detectives once began to suspect that major traffickers were using a combination of public pay phones and digital pagers to communicate their business. And they took their suspicions to a judge and obtained court orders — not to monitor any particular suspect, but to instead cull the dialed numbers from the thousands and thousands of calls made to and from certain city pay phones.

Think about it. There is certainly a public expectation of privacy when you pick up a pay phone on the streets of Baltimore, is there not? And certainly, the detectives knew that many, many Baltimoreans were using those pay phones for legitimate telephonic communication. Yet, a city judge had no problem allowing them to place dialed-number recorders on as many pay phones as they felt the need to monitor, knowing that every single number dialed to or from those phones would be captured. So authorized, detectives gleaned the numbers of digital pagers and they began monitoring the incoming digitized numbers on those pagers — even though they had yet to learn to whom those pagers belonged. The judges were okay with that, too, and signed another order allowing the suspect pagers to be “cloned” by detectives, even though in some cases the suspect in possession of the pager was not yet positively identified.

All of that — even in the less fevered, pre-Patriot Act days of yore — was entirely legal. Why?

Because they aren’t listening to the calls.

It’s at that point, people, that law enforcement requires a full-throated argument of probable cause. It’s at that point that privacy rights must be seriously measured against the legitimate investigate needs of law enforcement. And it’s at that point that the potential for authoritarian overreach becomes significant.

I know it’s big and scary that the government wants a data base of all phone calls. And it’s scary that they’re paying attention to the internet. And it’s scary that your cell phones have GPS installed. And it’s scary, too, that the little box that lets you go through the short toll lane on I-95 lets someone, somewhere know that you are on the move. Privacy is in decline around the world, largely because technology and big data have matured to the point where it is easy to create a net that monitors many daily interactions. Sometimes the data is valuable for commerce — witness those facebook ads for Italian shoes that my wife must endure — and sometimes for law enforcement and national security. But be honest, most of us are grudging participants in this dynamic. We want the cell phones. We like the internet. We don’t want to sit in the slow lane at the Harbor Tunnel toll plaza.

The question is not should the resulting data exist. It does. And it forever will, to a greater and greater extent. And therefore, the present-day question can’t seriously be this: Should law enforcement in the legitimate pursuit of criminal activity pretend that such data does not exist. The question is more fundamental: Is government accessing the data for the legitimate public safety needs of the society, or are they accessing it in ways that abuse individual liberties and violate personal privacy — and in a manner that is unsupervised.

And to that, the Guardian and those who are wailing jeremiads about this pretend-discovery of U.S. big data collection are noticeably silent. We don’t know of any actual abuse. No known illegal wiretaps, no indications of FISA-court approved intercepts of innocent Americans that occurred because weak probable cause was acceptable. Mark you, that stuff may be happening. As is the case with all law enforcement capability, it will certainly happen at some point, if it hasn’t already. Any data asset that can be properly and legally invoked, can also be misused — particularly without careful oversight. But that of course has always been the case with electronic surveillance of any kind.

Keep in mind that the FISA court was created as a means of having some definitive oversight into a world that previously had been entirely unregulated, and wiretapping abuses by the U.S. executive branch and by law enforcement agencies were in fact the raison d’etre for the creation of FISA and a federal panel of judges to review national security requests for electronic surveillance. Is it perfect? Of course not. Is it problematic that the court’s rulings are not public? Surely.

But the fact remains that for at least the last two presidential administrations, this kind of data collection has been a baseline logic of an American anti-terrorism effort that is effectively asked to find the needles before they are planted into haystacks, to prevent even such modest, grass-rooted conspiracies as the Boston Marathon Bombing before they occur.

So think for a minute about a scenario in which, say, a phone number is identified overseas as being linked to terror activity. It is so identified by, say, NSA overseas intercepts or through intelligence gathering by the CIA or the military. And say that there exists a database of billions and billions of telephonic contacts in the United States over a period of months or years. And say a computer could then run the suspect number through that data base and determine a pattern of communication between that overseas phone and several individuals in New York, or Boston, or Detroit. Would you want that connection to be made and made quickly? Or do you want to leave law enforcement to begin trying to acquire the call history on that initial phone from overseas carriers who may or may not maintain detailed retroactive call data or be unwilling to even provide that data fully to American law enforcement or do so while revealing the investigative effort to the targets themselves?

Keep in mind that law enforcement must still establish probable cause to then begin to actually monitor conversations on the domestic numbers, and that this request for electronic surveillance is then, of course, subject to judicial review by the FISA court.

Yes, I can hear the panicked libertarians and liberals and Obama-haters wailing in rare unison: But what about all the innocent Americans caught up in this voracious, overreaching dragnet? To which the answer is obvious if you think about the scale of this: What dragnet?

Your son’s devotional calls to 1-800-BEATOFF? Your daughter’s call from the STD clinic? Your brother-in-law calling you from his office at Goldman with that whispered insider-tip on that biomed stock? Is that what you’re worried about?

Take a deep breath and think:

When the government grabs the raw data from hundreds or thousands of phone calls, they’re probably going to examine those calls. They’re going to look to establish a pattern of behavior to justify more investigation and ultimately, if they can, elevate their surveillance to actual monitoring of conversations. Sure enough.

When the government grabs every single fucking telephone call made from the United States over a period of months and years, it is not a prelude to monitoring anything in particular. Why not? Because that is tens of billions of phone calls and for the love of god, how many agents do you think the FBI has? How many computer-runs do you think the NSA can do? When the government asks for something, it is notable to wonder what they are seeking and for what purpose. When they ask for everything, it is not for specific snooping or violations of civil rights, but rather a data base that is being maintained as an investigative tool.

There are reasons to object to governmental overreach in the name of law enforcement and anti-terrorism. And it is certainly problematic that our national security apparatus demands a judicial review of our law enforcement activity behind closed doors, but again, FISA is a basic improvement on the preceding vacuum it replaced. Certainly — and I find myself in rare agreement with the Rand Pauls of the world on this one — we might be more incensed at the notion of an American executive branch firing missles at U.S. citizens and killing them without the benefit of even an in absentia legal proceeding. Or ashamed at a racially-targeted sentencing guideline that subjects rock cocaine users to seventeen times the penalty of powdered-cocaine users? Or aghast at a civil forfeiture logic that allows government to seize private property and then requires citizens to prove a negative — that it was not purchased with money from ill-gotten gains.

There is a lot of authoritarian overreach in American society, both from the drug war and the war on terror.

But those planes really did hit those buildings. And that bomb did indeed blow up at the finish line of the Boston marathon. And we really are in a continuing, low-intensity, high-risk conflict with a diffuse, committed and ideologically-motivated enemy. And for a moment, just imagine how much bloviating would be wafting across our political spectrum if, in the wake of an incident of domestic terrorism, an American president and his administration had failed to take full advantage of the existing telephonic data to do what is possible to find those needles in the haystacks. After all, we as a people, through our elected representatives, drafted and passed FISA and the Patriot Act and what has been done here, with Verizon and assuredly with other carriers, is possible under that legislation. Indeed, one Republican author of the law, who was quoted as saying he didn’t think the Patriot Act would be so used, has, in this frantic little moment of national overstatement, revealed himself to be either a political coward or an incompetent legislator. He asked for this. We asked for this. We did so because we measured the reach and possible overreach of law enforcement against the risks of terrorism and made a conscious choice.

Frankly, I’m a bit amazed that the NSA and FBI have their shit together enough to be consistently doing what they should be doing with the vast big-data stream of electronic communication. For us, now — years into this war-footing and this legal dynamic — to loudly proclaim our indignation at the maintenance of an essential and comprehensive investigative database while at the same time insisting on a proactive response to the inevitable attempts at terrorism is as childish as it is obtuse. We want cake, we want to eat it, and we want to stay skinny and never puke up a thing. Of course we do.

When the Guardian, or the Washington Post or the New York Times editorial board — which displayed an astonishing ignorance of the realities of modern electronic surveillance in its quick, shallow wade into this non-controversy — are able to cite the misuse of the data for reasons other than the interception of terrorist communication, or to show that Americans actually had their communications monitored without sufficient probable cause and judicial review and approval of that monitoring, then we will have ourselves a nice, workable scandal. It can certainly happen, and given that the tension between national security and privacy is certain and constant, it probably will happen at points. And in fairness, having the FISA courts rulings so hidden from citizen review, makes even the discovery of such misuse problematic. The internal review of that court’s rulings needs to be somehow aggressive and independent, while still preserving national security secrets. That’s very tricky.

But this? Please. This is bullshit.

In Baltimore thirty years ago, after the detectives figured out which pay phones were dialing pagers, and then did all the requisite background checks and surveillance to identify the drug suspects, they finally went to a judge and asked for a wiretap on several pay phones. The judge looked at the police work and said, okay, you can record calls off those public pay phones, but only if you have someone watching the phones to ensure that your suspects are making the calls and not ordinary citizens. And if you make a mistake and record a non-drug-involved call, you will of course “minimize” the call and cease recording.

It was at that point — and not at the earlier stage of gathering thousands and thousands of dialed numbers and times of call — that the greatest balance was sought between investigative need and privacy rights. And in Baltimore, that wiretap case was made and the defendants caught and convicted, the case upheld on appeal. Here, too, the Verizon data corresponds to the sheets and sheets of printouts of calls from the Baltimore pay phones, obtainable with a court order and without any demonstration of probable cause against any specific individual. To get that far as a law-abiding investigator, you didn’t need to know a target, only that the electronic medium is being used for telephonic communication that is both illegal and legal. It’s at the point of actually identifying specific targets and then seeking to listen to the conversations of those targets that the rubber really hits the road.



To: combjelly who wrote (720220)6/9/2013 6:10:50 PM
From: jlallen2 Recommendations

Recommended By
Brumar89
FJB

  Respond to of 1576346
 
Lie.

Why must you pinheads lie so much....??

And hey.....how is that Weiner hacking investigation coming along??? lol

What a fukking moron you are.....



To: combjelly who wrote (720220)6/9/2013 8:43:22 PM
From: TopCat  Read Replies (1) | Respond to of 1576346
 
"So, whether or not I like it, and I don't, it happens to be legal now."

Is it?

The author of the law says what the Obama administration is doing is overreach. But, if it isn't overreach now, where does it become so? Where does it become illegal? Where would you draw the lne, CJ?



To: combjelly who wrote (720220)6/9/2013 9:29:43 PM
From: Tenchusatsu1 Recommendation

Recommended By
Brumar89

  Read Replies (2) | Respond to of 1576346
 
CJ,
When Bush started to do it, it was illegal. But with the anguished cries from the bed-wetters like you, Congress made it legal. Retroactively, at that. So, whether or not I like it, and I don't, it happens to be legal now.
So that's why the lefties aren't complaining like they used to under Bush? Because it's "legal" now?

That's pretty weak.

Tenchusatsu



To: combjelly who wrote (720220)6/9/2013 10:36:00 PM
From: i-node3 Recommendations

Recommended By
FJB
joseffy
THE WATSONYOUTH

  Read Replies (1) | Respond to of 1576346
 
>> So, whether or not I like it, and I don't, it happens to be legal now.

I don't know that it is "legal" now, and the scope of what Obama is doing is radically increased over what GWB did. And I think you know that.

Really, what does it take for you nutjobs to let go of your ideological commitment to this nitwit in the WH? Fine, he's big government and loves unions and believes in redistribution. We got that.

But he's a criminal. Republicans didn't support Nixon once it became apparent he was a scoundrel. At what point do you guys say enough is enough?