2002 US Wiretap Report 265
GMontag writes "Full report:2002 WIRETAP REPORT Administrative Office of the United States Courts
Leonidas Ralph Mecham, Director I especially like this part: 'Public Law 106-197 amended 18 U.S.C. 2519(2)(b) to require that reporting should reflect the number of wiretap applications granted for which encryption was encountered and whether such encryption prevented law enforcement officials from obtaining the plain text of communications intercepted pursuant
to the court orders. Encryption was reported to have been encountered in 16 wiretaps terminated in 2002 and in 18 wiretaps terminated in calendar year 2001 or earlier but reported for the first time in 2002; however, in none of these cases was encryption reported to have prevented law enforcement officials from obtaining the plain text of communications intercepted.'"
Hey (Score:3, Insightful)
Re:Hey (Score:2)
Re:Hey (Score:3, Insightful)
Easier, sure, but also a helluva lot more detectible. You gotta figure that anytime you have a local device, you're running a pretty high risk of getting caught given that you (a) have to place it, (b) have to have something physically there that might be found, and (c) it has to transmit data out somehow. Tapping a line at the phone company has none of these drawbacks.
Re:Hey (Score:3, Insightful)
These difficulties are manageable if the feds are only conducting this level of surveillance on a few hundred targets. For law-abiding citizens in general, imposing this sort of practical limit on the government is a feature, not a bug.
Re:Hey (Score:3, Informative)
Re:Hey (Score:3, Funny)
Re:Hey (Score:2, Informative)
Misdirection; answer is elsewhere (Score:5, Insightful)
Or maybe I just need to check the shielding on my tinfoil hat, but history says that the above is probably much closer to the truth than anyone in the administration wants to admit.
Re:Misdirection; answer is elsewhere (Score:2, Interesting)
The numbers for FISA taps are available for 2001 [fas.org]. The 2002 numbers aren't available yet.
Interesting post on this from Orin Kerr [blogspot.com], a law professor at George Washington.
Re:Hey (Score:3, Insightful)
I would have to think that at least one of those would be coming to a federal courtroom sometime soom. Unless these are all secret wiretaps for secret hearings, which seems to be more and more common these days.
Another method would be a survey of which encryption methods are likely to be used by individuals seeking to secur
Re:Hey (Score:2, Funny)
um...I was just straightening my pants... O_o
[...while thinking of michael... -_-]
Encryption (Score:5, Insightful)
So are we talking ROT13 here, or real encryption? Seems a little unnerving if it's the latter.
Re:Encryption (Score:3, Insightful)
Re:Encryption (Score:2)
Yes there is [canoe.ca].
Re:Encryption (Score:4, Insightful)
Re:Encryption (Score:2)
It doesn't. That was his/her/it's freakin' point. Esentially, the post was about "hidden" processes running on various OS's out there. *MUCH* easier to detect on *NIX. THAT was the point. I suggest you actually read articles and posts before posting in the future.
Re:Encryption (Score:2)
Re:Encryption (Score:3, Funny)
Hardware keysniffers are easy to take care of. Simply make sure no one has physical access to your keyboard. It's impossible to install a keysniffer on a keyboard that you don't have physical access to.
Re:Encryption (Score:3, Insightful)
easy to take care of. Simply make sure no one has physical access to your keyboard. It's impossible to install a keysniffer on a keyboard that you don't have physical access to.
Yes, but.
I'm probably not the only person that feels their PGP key provides significantly greater protection than the lock on the front door of the house.
If I lock my house and activate my cheapo burglar alarm, that will prevent most unauthorized access, but is insufficient to deter an expert with more resources intent on instal
Re:Encryption (Score:2)
It might not completely rule out unauthorized physical access, but it'd be damn hard to get the evidence of the access hidden by the time I got home!
Re:Encryption (Score:2)
Re:Encryption (Score:3, Funny)
Re:Encryption (Score:2)
A laptop is really one of the best solutions--you can use it for sensitive things when you're certain that there aren't any bugs in the vicinity and if you keep it with you at all times, you can be relatively sure that no one has planted any bugs in it.
Re:Encryption (Score:2)
defeating keysniffers /w software (Score:2, Interesting)
Re:Encryption (Score:2)
"You Illeaglly searched my client's residence"
"Actually we were just there fufilling the wire tap order"
"INSIDE my client's home?"
"Well he had a scrambler on his phone so we used a different method to install the legal wiretap, we placed a bug IN the phone. We just happened to see other incriminating evidence while performing the wiretap".
Most good judges whould have a fit at this!
How was the plain text obtained? (Score:5, Insightful)
It's not the encryption algorithm or perhaps even the implementation that's weak. It's how the user manages his or her data.
Re:When will they ever learn? (Score:3, Funny)
'muffy' is NOT a good encryption key. Either that, or get a better name for your pet.
Re:Encryption (Score:3, Interesting)
From an American Mathematical Society report, for instance:
"NIST's evaluation used published research from academic and industry experts and private advice from the National Security Agency (NSA)." Gee, I wonde
Re:Encryption (Score:2, Insightful)
1) The list consists solely of FBI, DEA or similar "non-intelligence" agency (wait, that came out wrong...) whose activities were not supported by an intelligence agency (NSA, CIA)
2) The list includes NSA or CIA-supported entities.
If (1), these wiretaps were performed by someone other than an intelligence agency, then the encryption probably became a non-obstacle either because t
FYI - Starium 100 TripleDES bump in the line (Score:4, Informative)
Re:FYI - Starium 100 TripleDES bump in the line (Score:2)
Re:FYI - Starium 100 TripleDES bump in the line (Score:3, Interesting)
Re:FYI - Starium 100 TripleDES bump in the line (Score:2)
Eric Blossom speculates that the same functionality could be put into cellphone software someday. I bet the manufacturers wouldn't dare put strong encryption in at the factory, though.
Read carefully (Score:5, Interesting)
Does this mean that all the communications were successfully decrypted? Or maybe it just means that failures were not reported?
-- Brian
Re:Read carefully (Score:5, Insightful)
Could be that they got one end of the transmission to roll over on his buddy and hand out the plain text, this seems most likely. All the tough guy criminals squeal like little piggies when a DA starts talking about jail time.
Could be they got the password to decrypt the wiretaps, or the plain text, through normal policework (like a warrant to search the PC). The fact that guy A is talking to known crime figure B is probably enough for such a warrant, regardless of whether its known what they said.
I mean, if somethings encrypted on the wire, then it was plaintext when it went in, and when it came out. I'd think most detectives would try another angle before they sat around trying to brute force decrypt a transmission.
Re:Read carefully (Score:4, Insightful)
Point being, all of this claptrap on restricting encryption is just that, meaningless nonsense.
If encryption were creating a real problem for law enforcement then there would be some number of un-decripted messages to account for and I would not assume even that would create a problem in each instance.
Re:Read carefully (Score:2)
How are the "real criminals" restricted? They can literally use whatever they like and, yes, this is yet another arguement against encryption restriction.
Umm, how are the rest of us "restricted"?
Re:Read carefully (Score:2)
Re:Read carefully (Score:5, Informative)
>
>Does this mean that all the communications were successfully decrypted? Or maybe it just means that failures were not reported?
Yes, it means all of the communications were successfully decrypted. It does not mean that failures were not reported.
It is (deliberately) vague about whether decryption was done by s00per-s33kr1t quantum computers on Mars, or if it was done by using other methods to compromise the suspect's password, passphrase, key, or leaked transmissions of plaintext. I don't have a need to know, but I would suspect the latter is the more likely possibility. The weakest link in any cryptosystem is the moron behind the keyboard.
I would point out that we're still barely talking about double digit numbers of wiretaps here. ("16", "18")
Those of you with nightmares about everybody in the US being tapped can move along, because there's very little to see. While it may be possible to do such a thing, it would still be prohibitively expensive. Not just in terms of computing gear (which is getting cheaper and always will get cheaper), but in terms of manpower (which ain't any cheaper, and ain't gonna get any cheaper) to analyze it.
Re:Read carefully (Score:2, Insightful)
Those of you with nightmares about everybody in the US being tapped can move along, because there's very little to see.
I am not a huge conspiracy theorist myself, but playing devil's advocate on this is irresistable - do you really think that simply because the agency reported only 16 or 18 wiretaps for the given years that only 16 or 18 actually took place?
Isn't the worry of all the 1984-ists o
Re:Read carefully (Score:2)
Those of you with nightmares about everybody in the US being tapped can move along, because there's very little to see.
From the article:
So, we see that:
- The number of wiretaps applied for (i.e. that they had a legal justification for doing) which were actually encrypted was barely double-digits. This gives us no inf
Indeedyay... (Score:5, Funny)
An interesting number (Score:5, Interesting)
I don't see any reference to how the number is determined, like if it includes parts of salaries for employees.
Wow, another number (Score:4, Informative)
Re:Wow, another number (Score:3, Interesting)
(If you think that doesn't happen, look at the past.)
Re:Wow, another number (Score:2)
At $900K/wiretap, that's 6.2Million dollars in the NY area. If you subtract $300K for some donught-eating dective to exclusively listen on each line 24/7 ($100K*3 shifts), that still leaves 4.1Million for hardware and social engineering to circumvent those combined wiretaps' encryption.
For my part I'd say
Makes me glad.... (Score:2, Funny)
Public Report (Score:5, Insightful)
Re:Public Report (Score:2)
Re:Public Report (Score:5, Insightful)
"Make what you will about this report, but consider this for a moment: In what other country in the world would this report ever see the light of day?"
Oo! I know! A country whose government realized a long time ago that they could fool 99% of the population -- and simultaneously marginlize the remainder as leftists -- by releasing just enough and/or falsified data to make people think this is evidence of an open government?
Am I right? Do I get a lolipop?
Iran-Contra taught me everything I needed to know about the government's willingness to not only lie to the people and Congress itself but to be proud of doing so. For those who don't remember all the details, this was Oliver North being directed by Ronald Reagan to sell arms to Iran (despite a Congressional ban) and using the proceeds to fund the South American Contras (which was also specifically banned by Congress by way of the Boland Amendment [ncsu.edu]). The Contras were fighting the Sandinistas, a democratically-elected government that wasn't kissing our ass).
Don't get me wrong here... I'm not claiming this data is either falsified or incomplete. But claiming that because we've recieved something from the government is prima facie evidence that we have a government that puts us before it's own perceived interests is nothing short of hilarious.
Re:And to make matters worse... (Score:2)
I'm convinced that Iran/Contra must have been considered the penultimate act of patriotism. How else could one rationally explain former convict John Poindexter's involvement with the TIA effort? (For those with short memories, his felony conviction for his involvement with Iran/Contra was overturned on a technicality).
Oh wait...there's this thing called irony.
Re:And to make matters worse... (Score:3, Insightful)
That, however, does not mean that he wasn't guilty as sin; only that he can't legally be punished for it. In any event, under no circumstances should he be serving in a senior Pentagon position requiring any level of security clearance.
Re:Public Report (Score:3, Interesting)
Re:Public Report (Score:2)
"Sorry, but wiretaps really ARE expensive and aren't all that common. The tinfoil hat crowd may think the NSA/CIA/FBI is monitoring all of their phone and computer communications but, really, there just isn't the manpower or the time. I've heard the paranoids claim there is "s00per-s33kr1t" voice reconition to do automated monitoring, but based on what I know about computers and linguistics this just isn't currently possible."
Post grad-level students were using 30-node (not a typo) AI nets to ex
Re:Public Report (Score:2)
They don't have the means or the funds to monitor everyone, or even most people. But they do have the means to at least somewhat monitor the milli
I wonder (Score:3, Insightful)
Oh my! (Score:2, Funny)
Am I going to have to filter everything through my Swedish chef filter? Bork bork bork, bork, bork bork?
Re:Oh my! (Score:2)
Not by itself. You need to chain two of them in series.
Form the report (Score:3, Interesting)
Re:Form the report (Score:2)
Re:[From] the report (Score:2)
Major Offenses for Which Court-Authorized Intercepts Were Granted
Pursuant to 18 U.S.C. 2519
January 1 Through December 31, 2002
Other
Racketeering
Homicide and Assault
Narcotics
Gambling
Kidnapping
Bribery
Larceny, Theft, and
Robbery
Loansharking, Usury,
and Extortion
See report for numbers.
They probably got the keys from the users (Score:4, Insightful)
10 to 1, they either found other evidence to force the users to voluntarily cough up the keys, got a warrant to put a sniffer on the user's keyboard in the case of computer communications and then retrieved the keys from the computer after they got the password, or they physically copied the encryption keys out of the phones in the case of encrypting phones.
I've always wondered if they can get a password from you involuntarily by just hooking you up to a lie detector and asking questions like, "is the first letter a vowel? Is it 'A'? Is it 'E'? Is the second letter a number?... etc.
Anyway, most encryption is pretty useless if the cracker can own the machine or its keyboard for a while without the user's knowledge and almost all of it is useless if you own the user.
Re: Polygraphs (Score:2)
Only if you believe in the polygraph's ability to tell truth. Polygraphs are garbage [google.com]; see for yourself. Their primary use is to scare people who don't know better into confessing something they otherwise wouldn't.
well, not really. (Score:5, Informative)
the polygraph is not a lie detector. [howstuffworks.com] A polygraph actually records a number of different signals. Respiration, persperation... A polygraph only detects your output, not your internal processes. That may eventually change with walk-through brain scanners at the airports...
The polygraph operator may be thoroughly trained to interpret this data, or they might simply have bought a polygraph and hired themselves out immediately. Training and certification varies greatly from state to state. [howstuffworks.com] It's claimed [techtv.com] that they measure 'deceptive reactions' pretty well, (bear in mind that they also run on Windows..No, i'm not kidding.) If you really believe what you're saying, a polygraph won't pick that up. But on the other hand, it might. I would say that the jury's out on their effectiveness, but they don't let polygraph results anywhere near a jury. (we'll get to that.) Dweceptive behaviour is not the same as lying. If you give a patently false answer to every question, it messes with the baseline. If you give honest answers that mislead, it may or may not pick them up. If you tell the truth but think about something bad you've done lately, you might get a false positive. It's that messy.
Voice analysers [spyzone.com] promise similar results- the ability to pick up changes in a person's voice, microtremors, when deceptive intent creeps in... but have also been shown to be faulty. And then shown to be fine. And then faulty again. And so on.
The supreme court has ruled that polygraph tests can be administered- but that the data may not be used as evidence in court. Although it is illegal to make a polygraph test part of the private industry hiring practice, the feds can do this all they want, and are expanding their activities in this regard as more sophisticated, digital equipment becomes available.
It's more likely that brain imaging will evolve to replace the polygraph- and even then, it probably won't be 100%. There will always be those who can believe what they are saying to be true. It's all about confidence. So to answer the question- yes, they could try, but they might not be able to get anything useful from it, and if you know enough about how they work, you could give them enough false positives that they'd never work it out. Then they'd simply get a court order to bug your keyboard instead, out of sheer frustration. Unless you were deemed a REAL threat to national security- in which case they import you to egypt for 'questioning...'
sorry if i sound pessimistic. But the answer is that if it's that important, they'll use something more proven than a polygraph....
Re:well, not really. (Score:2)
I think the difference in this case is that the proof is in whether or not the password works. If the password works, you've met your goal which was to be able to get into the user's machine and decode the message using the keys there (and perhaps another password). The password itself doesn't have to be admissable in court.
Also, I suppose I wasn't thinking of a normal polygraph. I was thinking of a device that I played with 17 years ago where you could put a set of electrodes on your head and move a cu
Re:They probably got the keys from the users (Score:2)
This could lead to the slowest brute-force attack ever...
FBI: So, is your password "jhT78$^&" ?
Rube: No.
FBI: He's telling the truth. Damn. So, is your
password "jhT78$^*" ?
Rube: No.
FBI: Damn. He's still telling the truth.
So, is your password "jhT78$^(" ?
Rube: No.
...
etc.
(Yes, I *know* that's not what the poster suggests, but still...)
polygraph is a fraud (Score:2)
Re:polygraph is a fraud (Score:2)
Re:They probably got the keys from the users (Score:2, Funny)
Only 16? (Score:2, Insightful)
Steganography, anyone? (Score:5, Interesting)
Given that the average cost of a federal wiretap in 2002 was $75,659, I imagine there was a strong incentive for gov't wiretappers to get their money's worth. And given the feds' almost unparalleled codebraking resources, it would take pretty solid encryption to sneak one past them.
The supposed 100% success ratio in cracking encrypted communications is most likely because the individuals under surveillance (mainly drug smugglers and organized crime) lack the sophistication necessary to match wits with the feds.
I'd assume that the most elite, technically savvy criminals out there don't get caught by law enforcement wiretapping, for two reasons:
1. They are subtle enough that they never even come under suspicion, and are thus not under surveillance.
2. They are smart enough to communicate in ways that are not easily intercepted by the feds: private couriers, simple signals that were agreed upon in advance, etc.. Those that rely on electronic communications probably use steganography or other means to disguise the fact that a "message" is even being sent. Let's face it, a suspected drug dealer sending a simple, encrypted text message may as well be waving a big red flag and shouting: "look at me! I've got something to hide!"
Interesting tables. (Score:5, Interesting)
Another interesting table is this [uscourts.gov] one. It gives $/tap. The average cost is over $50K. That suggests that a wiretap is going to take a big bite out of almost any agency's budget (average cost for the Feds is $75K). The cost may be the best protection of our privacy. Certainly it seems a better bet than the judiciary.
Finally, there is the table [uscourts.gov] which shows arrests and convictions. Slightly over half of the arrests related to wiretaps result in convictions. Does anyone know how that compares to investigations without wiretaps? It suggests that more than half of the wiretaps were in response to some broken law. Hopefully they were good laws, rather than DMCA-style disasters.
In short, one could almost imagine that the folks in the tin-foil hats are crazy to worry about the cops tapping their computers.
Actual costs of wiretaps. (Score:2)
That's only part of the cost. Back when Guliani was busting the New York Mafia, they had to pay New York Telephone's retail rates for each wiretap. Their wiretapping bill exceeded $1 million a year, and the New York FBI office wasn't budgeted for it. Much of the pressure for CALEA (the "communications assistance to law enforcement act) came from those days.
Now, law enforcement doesn't have to pay telcos directly. Telcos are authorized to pass wiretapping costs along to thei
IN SOVIET RUSSIA... (Score:2)
What, were you expecting something different here? Fine..
IN SOVIET RUSSIA... encryption wiretaps YOU!
Re:IN SOVIET RUSSIA... (Score:5, Insightful)
The decryption sessions would occur in a a small dark room where you would be "inconvienenced" and "annoyed" and "harrased" by being forced to stand for LONG periods of time, having food and water withheld, being locked in a 3x3 room with no human contact for weeks on end, being woken up at random times just to be asked a question hoping that in a sleepy state you might divulsge something, having sound payed and near painful levels for hours/days on end.
Yea... the U.S. system is SOOO much better than the old Soviet system. At least the Soviets had the balls to make it common knowledge what they did, you knew what to expect. Here in the U.S. the government pussyfoots around the issue and makes you think that the "interviewees" are treated just like you and I when questioned by the local beat cop.
Old joke: "Need a job?" (Score:3, Funny)
- [source unknown, seen in .sig files for at least 10 years]
Re:Old joke: "Need a job?" (Score:2)
of advanced mathematics. If you'd like a circular describing these new
research opportunities, just pick up your phone, call your mother, and
ask for one."
The first time I saw this was on a poster distributed by RSA Security. This was back in the clipper chip days when there was a real possiblity non-escrowed encryption might be banned.
Dumb question (Score:2, Interesting)
Re:Dumb question (Score:3, Informative)
Even when using multiple different algorithms there is a chance of weaking the whole thing. Depends on which algorithms you're using and how you're using them. I think you are generally safe using different known-good algorithms though (say 3DES then AES). I would not encrypt multiple times w
Re:Dumb question (Score:2)
Assume that you have a message, M. You encrypt with with algorithm f using key kf into M'. Then you encrypt it with algorithm g using key kg into M''. If an adversary is able to decrypt M', he may or may not be able to decrypt M''. Let us look at the possibilities for the adversary:
Re:Dumb question (Score:2)
However, your example is missing a possibility. It is completely possible that the interaction between algorithm f and g could produce a weaker result M". Of course it would be easier for anyone trying to break it to know which algorithms you used, but we have to accept that there is a chance they would have this information.
The attack would not be to try and break ea
Re:Dumb question (Score:3, Insightful)
Re:Dumb question (Score:3, Insightful)
In general, assuming a rock solid algorithm, you will not gain anything by using two 1024 bit keys, over a 2048 bit key.
In practice, I suspect that with any actual algorithm, the 2048 bit key would be more secure. This is becuase there entropy in the key is not evenly distributed, but is concentrated in the higher order bits. So by having two sets of low order bits, you have less ent
chaffing and winnowing (Score:5, Interesting)
Anyway, the reason I was wondering is all the comments about extracting passwords from people. What would happen if something were encrypted in a way that different passwords revealed different content? It would be trivial with chaffing and winnowing, but I'm sure it could work with other types of encryption.
The key idea is that of plausible deniability. Say you interleave three streams of data: the real stuff, the decoy stuff, and some random garbage to mess with messages sizes. If you can give 'them' the password for the decoy stuff, and it works, aren't you pretty much off the hook?
Re:chaffing and winnowing (Score:4, Interesting)
What a bunch of FUD!!! (Score:3, Interesting)
Re:What a bunch of FUD!!! (Score:2)
Note that we're talking about the 2,000 or so cases a year where the criminals are smart enough that 10 minutes of detective work doesn't break it wide open - they're sneaky enough that we have to spend $50K in resources to nail them to the wall.
A criminal running a $10M/year drug ring is probably *smarter* than the average businessman who has a $10M/year business - the gu
Re:What a bunch of FUD!!! (Score:2)
They can't all be that dumb. Otherwise, we wouldn't need to be spending $50k+ to track them down. Actually, at a certain point, criminal behavior -- particularly what is known as "organized crime" -- resembles a corporation in its structure and in the ability of its workers.
These criminals' key weakness may not be normal run of the mill "I broke my cup holder" stupidity, but an arrogant belief that, unlike most criminals that came before them, they will not be caught.
If these people really were stupi
Encrypted communication is not needed (Score:2, Interesting)
There are two main problems at work here. Whom is listening in on your conversations, and who let them?
The person within the law enforcement community listening in on your calls may not be perfect. They could use this information to their own ends. They might tip off a friend as to when you are going on vacation and have the rob you. Or they might let that information slip in a public place, with the same result. They might be a childmolester in the making, or a murderer, or something else. Just beca
Criminals are dumb. (Score:2)
Given that most wiretaps were for narcotics and that your average drug dealer isn't exactly a rocket scientist, I suspect most of the "encryption" was somthing lame Joe criminal picked up out of a "spy/PI" catalog.
Ummm (Score:2, Funny)
Re:Stupid bad guys. (Score:5, Interesting)
I tend to believe that the government is able to either break or circumvent levels of encryption at a much higher level than commonly thought. I mean, it's entirely possible that old devices were being used for communication, but it seems to be if you're going to be cautious enough to encrypt comms at least one or two would have done it properly.
I wonder: If encryption on the line prevents a court-ordered wiretap from obtaining useful information, is that enough cause to, say, break in and bug the room? The wording of the statement seems to suggest that...
Encryption isn't the problem or the solution. (Score:3, Insightful)
If ``higher level'' means ``arrest the guy you sent the encrypted message to, and get him to decrypt it'', I'm sure you're right.
The gov't may be able to do a bit more than they say, but keeping/learning secrets isn't generally a technological problem; it's a social problem. Governments have been solving the learning secrets problem for thousands of years. If th
Re:Stupid bad guys. (Score:4, Insightful)
I do find it interesting that most of the taps had to do with narcotics... what passwords do drug dealers use that are easy to guess?
Re:Stupid bad guys. (Score:2)
What a wonderfully naive view of the world. You seem to think that law enforcement officials feel compelled to themselves obey the law in the pursuit of an investigation.
Speaking from personal experience, I can tell you straight out that this often isn't the case. If you have to bend or even break a few laws to get the bad guy, then that's what you do - just make sure that no
Re:PATRIOT Act and Freedom (Score:5, Insightful)
Re:PATRIOT Act and Freedom (Score:3, Insightful)
Homer: Lisa, I want to buy your rock.
Additionally, given the immense inertia of the government, could the Patriot Act even have an effect by now? My guess is that any successful intercepts of terrorist plans recently are still done the same way they would have been done five or ten years ago.
A good example of the inertia would be the Department of Homeland Security. They are progressing towards their goals, but I wouldn't be suprised if another decade goe
Re:PATRIOT Act and Freedom (Score:2, Insightful)
Unfortunately the government is not a friendly, caretaker. The government is composed of people and people can be evil. It is men (and women) that will have access to our information via the PATRIOT act. It is these people that I bel
Re:A message for those 'in the know' (Score:2)
It was great because it was such an aberration for Hollywood. I wonder what they had to do to get that thing made. I mean, the Greens party was actually villainized right at the start. The story of how they got that script out has to be almost as good as the movie.
If you've never seen the movie we're talking about here, Red Dawn, rent it and try to remember that the Soviet Union and nuclear annihilation were still a viable threat when it was made. Either it'll reinforce your opinions about the 2nd amm