Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Electronic Frontier Foundation Encryption Privacy

Ten Steps You Can Take Against Internet Surveillance 234

Hugh Pickens DOT Com writes "Danny O'Brien writes for the EFF that as the NSA's spying has spread, more and more ordinary people want to know how they can defend themselves from surveillance online. 'The bad news is: if you're being personally targeted by a powerful intelligence agency like the NSA, it's very, very difficult to defend yourself,' writes O'Brien. 'The good news, if you can call it that, is that much of what the NSA is doing is mass surveillance on everybody. With a few small steps, you can make that kind of surveillance a lot more difficult and expensive, both against you individually, and more generally against everyone.' Here's ten steps you can take to make your own devices secure: Use end-to-end encryption; Encrypt as much communications as you can; Encrypt your hard drive; Use Strong passwords; Use Tor; Turn on two-factor (or two-step) authentication; Don't click on attachments; Keep software updated and use anti-virus software; Keep extra secret information extra secure with Truecrypt; and Teach others what you've learned. 'Ask [your friends] to sign up to Stop Watching Us and other campaigns against bulk spying. Run a Tor node; or hold a cryptoparty. They need to stop watching us; and we need to start making it much harder for them to get away with it.'"
This discussion has been archived. No new comments can be posted.

Ten Steps You Can Take Against Internet Surveillance

Comments Filter:
  • by bazmail ( 764941 ) on Saturday October 26, 2013 @01:18PM (#45246079)
    Good idea, but can't really see that catching on, unfortunately.
    • And it doesn't always work, because one end is compromised.
      • If the spies are actively targeting someone, yes. But they can't hack *everyone* - not only would it be expensive, but they'd be detected in no time at all. So if your objective is to avoid the dragnet, it works.

    • Re: (Score:2, Funny)

      by Anonymous Coward

      é÷ÖúöÜHòÙ¥’`^&FQòÔ`sqÅxEÀÍ_,Bnâ|©1ßÉ*'

    • by lpq ( 583377 ) on Saturday October 26, 2013 @09:07PM (#45248767) Homepage Journal

      When the computer industry was "young", there was little likely hood the NSA had co-opted your developers & SW providers. Now?

      With every update you need to wonder if it contains a new backdoor at the request of the NSA, asked via a "security letter", which makes disclosure illegal.

      Examples in linux abound as vendors stumble over each other to provide secure-boot distro's, complete with windows-like service managers (systemd), that move config control out of scripts where you can see what they are doing, into binaries, that you have to verify come from a source that is likely too large for most of us to audit -- not to mention the problem looking for a backdoor that might be very well hidden these days... (ex. pre-solved factoring keys for AES encryption), etc... You got the latest certs downloaded from *where-ever* (needed for https and such)? How many aren't already cracked?

      I wouldn't have a problem with the NSA's spying, *IF* they didn't share anything not related to national security -- but our entire justice system is predicated on law-enforcement being 'human' and needing warrants to search private stuff -- but now? The NSA doesn't need those, and any info it finds is shared with generic, domestic law enforcement. It's already been seen that the FBI has been getting info dumps from the NSA that it's been using to start determined "take-down" efforts against *persons*. I.e. they just watch the people they want, and find some excuse to 'legally' find out the info, OR, find something else to bust them on.

      Of course it's been well documented here on "/.", how both foreign visitors and US citizens lose their constitutional rights when they are at a border -- losing laptops and having decryption keys demanded.

      What crap!.

      One rectifying solution would be to have any illegally leaked evidence taint prosecution of someone for *any, "hidden", charge*, for some number of years (whatever statute of limitations might be).
      By hidden, I mean things they'd have to probe into to find out -- not armed robbery or such...

      It sounds problematic, and the details would have to be ironed out, but between that, and the profit motive for "charging" a "rightless" property with "crimes" instead of the person, our legal rights as citizens are falling below western standards and down into the "outcast/illegal/brutal" regimes that we supposedly "invade" for....

      Who's gonna invade us to save us from our government? I think the only ones with the ability to save us are "us".

    • Not with major browsers like Firefox screaming blue murder at encrypted connections that haven't been officially by certification authorities. We can't have an encrypted web if browsers themselves are hostile towards it.

  • by MRe_nl ( 306212 ) on Saturday October 26, 2013 @01:19PM (#45246093)

    Step one: Don't post on forums.

    • by girlintraining ( 1395911 ) on Saturday October 26, 2013 @01:35PM (#45246179)

      Step one: Don't post on forums.

      Step Two: Terrorists Win.

      When you opt not to speak out against the government out of fear of reprisal, then you effectively have lost your right to free speech. Forums like Slashdot need to embrace the use of proxies like Tor, etc., instead of shutting them down with giant ugly off-red pages saying "Blocked!" Anonymization services like Tor are invaluable for creating a safe haven for free speech; in countries like Iran, North Korea, United States, France, Iraq, and Egypt, people are being harassed, arrested and imprisoned for chastizing the government for being a police state. We need websites to publish information about these governments' activities for the world to see, and sites like Slashdot that block Tor and similar technology are simply enabling those governments to build a digital iron curtain around themselves to lock down political dissent.

      • by t4ng* ( 1092951 ) on Saturday October 26, 2013 @01:54PM (#45246331)

        Considering the number of things the NSA has completely missed (e.g. Boston bomber, Snowden, Bengazi, etc.) I'm beginning to wonder if the NSA really has any decent spying capabilities at all. What if this is much like a Banana Republic, were the government puffs up it's chest and parades around a bunch of military men and equipment to try to scare it's citizens into line. But actually they are totally outnumbered by the citizenry, have very little real power, and they know it.

        All these "leaks" about the NSA spying on everyone in the world could just be a desperate attempt by a government that realizes it has very little real control over people to try to keep people in line. Sure, they might be collecting a lot of data, but storage and analysis may be such a monumental task that they can really only figure out things in retrospect, which really doesn't give them much advantage over classic investigation techniques. But hey, some tech companies are probably getting rich over this.

        • by girlintraining ( 1395911 ) on Saturday October 26, 2013 @02:31PM (#45246601)

          Considering the number of things the NSA has completely missed (e.g. Boston bomber, Snowden, Bengazi, etc.) I'm beginning to wonder if

          Back up the fail train there. The NSA wasn't tasked to find the Boston bomber, the FBI was. And they did. Bengazi is a figment of the tea party's over-active imagination -- there's no evidence that anything other than poor judgement and incompetence at a local level occurred. And Snowden... well, that's the only thing you mentioned that has any weight. The NSA management was warned about him long before "the incident" by Homeland Security. They ignored that warning. The case can be made this was a mistake -- but it seems from the after action reports online they're addressing their structural/organizational deficits that allowed it to happen post-incident. The fact is, there's always a risk of a defector, no matter how good your agency is. Every major intelligence agency from every major government in the world has had it happen. This is not a statement on the overall competence of the NSA as an intelligence organization.

          What if this is much like a Banana Republic, were the government puffs up it's chest and parades around a bunch of military men and equipment to try to scare it's citizens into line. But actually they are totally outnumbered by the citizenry, have very little real power, and they know it.

          That's pretty much the working definition of law enforcement everywhere, man. There's only 1 police officer for every, what, 10,000 citizens? It's a practical impossibility for the NSA to do all the things the tin foil hat brigade claims they're doing -- monitoring everyone's cell phones, everyone's e-mail, the entire internet... and just to keep things interesting, doing all that while cracking foreign powers' high level cryptography and military communications systems. To do everything they claim they're doing, even assuming their technology is twenty years more advanced than the civilian sector equivalents, would imply multi-trillion dollar budgets per year to sustain and a workforce vastly higher than the numbers available suggest.

          Sure, they might be collecting a lot of data, but storage and analysis may be such a monumental task that they can really only figure out things in retrospect, which really doesn't give them much advantage over classic investigation techniques. But hey, some tech companies are probably getting rich over this.

          The data collection is a massive operation because the data being sent only has data retrospectively; When they identify a potential suspect for development, based on those "classic investigation techniques", without that infrastructure they're starting at day zero. But if everything is logged, they can proceed immediately with looking into his/her background and recent communications. In the intelligence world, there are three things that give an asset value; Timeliness, accuracy, and analytical support. It does you no good to find the terrorist after the bomb has gone off, it does you no good to identify the wrong person, and it does you no good to have all the information that could have met the first two criterion if nobody analyzes it and suggests a course of action (arrest, drone strike, whatever).

          Once you understand that the analytical side of the intelligence cycle is the real bottleneck here, you quickly realize that the NSA can't possibly care about your marijuana stash, or even the warrant for your arrest. To develop leads and maintain a solid intelligence cycle, they can only focus on a tiny fraction of the data they're pulling in... so unless you're a .01%'er in the world of terrorism, counter-intelligence, spying, or foreign military... forget it. They don't care.

          • by whoever57 ( 658626 ) on Saturday October 26, 2013 @03:10PM (#45246877) Journal

            Back up the fail train there. The NSA wasn't tasked to find the Boston bomber, the FBI was.

            Back up the strawman train there. The GP was pointing out that the information gathered by the NSA failed to prevent the Boston bomber, and
            prevention is what the NSA claims that its massive surveillance program does.

            In reality, what it does is undermine democracy. What if the NSA discovered some embarrassing material relating to Dianne Feinsteinn and is using it to blackmail her to support the NSA? How do you know that it hasn't happened? The answer is that you don't and that's why democracy has been undermined. What would Herbert Hoover would have given to have the information that the NSA has?

            • Re: (Score:3, Informative)

              by theronb ( 1170573 )
              Umm, are you thinking of J. Edgar Hoover, director of the FBI for decades?
              • Umm, are you thinking of J. Edgar Hoover, director of the FBI for decades?

                He's another Hoover, they are all the same, aren't they? But really, yes. I did mean J. Edgar.

          • "That's pretty much the working definition of law enforcement everywhere, man. There's only 1 police officer for every, what, 10,000 citizens? It's a practical impossibility for the NSA to do all the things the tin foil hat brigade claims they're doing -- monitoring everyone's cell phones, everyone's e-mail, the entire internet... and just to keep things interesting, doing all that while cracking foreign powers' high level cryptography and military communications systems. To do everything they claim they're
        • The NSA has great spying capabilities. It just isn't using this ability to find terrorists.

      • As much as my comment was a jest, pure and simple;
        There's no such thing as a "terrorist", the term is a confabulation, a nebulous entity somewhere between "opponent" and "boogeyman".

  • by Anonymous Coward
    when i use https://slashdot.org/ [slashdot.org] i feel more secure, even if it redirect me the http:/// [http] because it do that in a secure why...
  • by Calibax ( 151875 ) * on Saturday October 26, 2013 @01:35PM (#45246177)

    According to news reports, there are around 1000 analysts at NSA engaged in surveillance. Let's assume half of them are looking at foreign traffic and half at domestic traffic. That's 500 analysts for 350 million population, or 1 analyst for every 700,000 people. What makes you think you are special enough to deserve their attention?

    Personally, I'm much more concerned about the way commercial organizations are spying on us. I think the loss of privacy to Facebook, Twitter, LinkedIn, Google, and other social media is much more creepy than some secret government bureau knowing that I called my parents 3 times last week.

    Of course, there are those that worry about cops knowing when they are calling their drug supplier to set up a buy, but all indications so far is that the data is not available to regular police organizations.

    • What makes you think you are special enough to deserve their attention?

      Well, if you are the ex-girlfriend of an NSA analyst, you might be special. Although, I guess that doesn't apply to Slashdotters.

      Maybe an NSA analyst has a grudge against you, dating back from High School times . . . ?

      In Soviet NSA, everyone gets their attention . . .

    • Personally, I'm much more concerned about the way commercial organizations are spying on us. I think the loss of privacy to Facebook, Twitter, LinkedIn, Google, and other social media is much more creepy than some secret government bureau knowing that I called my parents 3 times last week.

      So, you're "much more concerned" about social media spying on you than the Government, even though the Government gets the take from the social media PLUS their own "special" modes of spying....

    • by auric_dude ( 610172 ) on Saturday October 26, 2013 @02:24PM (#45246547)
      If using Moilla Firefox then add the lightbeam aka collusion addon https://www.mozilla.org/en-US/lightbeam/ [mozilla.org] then visit a few sites just to get an idea of how special the avertising companies think you are. This will work better if you disable Noscript, Requestpolicy, Httpeverywhere and whatever else you use to keed your surfing safish. Security services may not have the time to monitor your movements across the web but plenty of commercial companies do have the time, the kit and yet pay you nothing for thed ata they collect and I expect sell on to others.
    • by Burz ( 138833 )

      Its the threat that they can decide to make you "special" when and if it suits their cronies' prejudices and career prospects.

      Do you think you are special?

      We heard this kneejerk rejoinder all through the 2000s-- an attempt to stop critical thinking because it causes people like you too much cognitive dissonance. But that's the cop-out BS which landed us in the situation we have now.

      Chickenshit apologists, take a backseat.

    • by Okian Warrior ( 537106 ) on Saturday October 26, 2013 @02:35PM (#45246635) Homepage Journal

      According to news reports, there are around 1000 analysts at NSA engaged in surveillance. Let's assume half of them are looking at foreign traffic and half at domestic traffic. That's 500 analysts for 350 million population, or 1 analyst for every 700,000 people. What makes you think you are special enough to deserve their attention?

      Okay, let's look at those statistics more closely.

      500 analysts for 350 million people continuously is 500 analysts for roughly 1 million people per day each year, or roughly 1 analyst is spending an entire day looking at 2,000 people. Each year. So there's a 1-in-2,000 chance that sometime this year, an analyst will be pawing through your online behaviour.

      (Of course, if you assume that the analyst spends 1 hour on each person, it drops to 1-in-250 chance that sometime during the year you will be "analyzed" by an NSA agent.)

      Now consider the power of computers. Is it reasonable to think that 1 computer could collect and analyze the E-mail and online speech of 2,000 people in a single day of compute time? Assuming you put certain keywords in your online text ("I'm going to kill some time this afternoon by watching the presidential debate"), how likely do you think it will be that you win the 1-in-250 chance?

      Let's add in ambiguous laws. The recent trend is not to charge people with doing harm, but conspiracy for doing harm. One recent news report told of a couple of people charged with "conspiracy to join Al-Qaeda". Note that these two people didn't do a terorrist act, they didn't contribute to a terrorist group, and they weren't even a member of a terrorist group. They were talking about joining a terrorist group. People are commonly charged with "conspiracy to grow marijuana" (google has many links).

      We've reached the point where you can be arrested when no overt crime has been committed.

      There's a recent news story where, for the first time, the DOJ is informing a defendant [usatoday.com] that they used NSA/warrant-less surveillance to gather evidence. They used mass surveillance to get enough probable cause to apply for a real warrant which resulted in evidence of a crime.

      The important bit of the previous is that the DOJ was conflicted about revealing this information. The prosecutor felt that it was only a "procedural decision", since no evidence from the mass-surveillance warrant would be introduced at trial. (A couple of lawyers in the DOJ argued for disclosure.)

      All evidence indicates that they analyze everyone's online presence all the time, and use that information to pick-and-choose people for prosecution when no overt crime has been committed.

      Sock puppet, begone!

    • That's 500 analysts for 350 million population, or 1 analyst for every 700,000 people. What makes you think you are special enough to deserve their attention?

      But since you have so many people to check, doesn't that mean that they are going to make a massive use of automation to do the checks?

      Remember how good the spamfilters are? And they are designed against something extremely frequent

      Now remember how infrequent a terrorist attack is? And what about that False positive paradox [wikipedia.org]?

      It's not about feeling special or not, it's just the the system is broken by design... and the algorithms are surely perfect...

    • Presumably, protecting yourself against government spying will also protect you against commercial spying.

      Example: post all tweets as images of captcha text. If it can't readily be OCR'ed, they won't be collecting keywords without paying some cheap labor somewhere to manually transcribe everything. And if we all did it, that would be a really big and/or slow job. Tweets are designed to be read by human eyeballs only anyhow, aren't they? Captcha them all.
    • by FuzzNugget ( 2840687 ) on Saturday October 26, 2013 @08:21PM (#45248559)
      Seriously, this should not have to be explained on Slashdot.

      Data can be wrong. Interpretations can be wrong. Police tend to intepret everything as an act of wrongdoing as soon as they have a single data point or dumb-ass idea that suggests you are a suspect.

      Case in a point: David Marie [youtube.com] (jump to 5:00). He enters a subway station. He's flagged as a suspect because he's "wearing a jacket." Seriously. The Bumblefuck Police Department then use this as justification to raid his apartment where find a page of random scribbles they deem as "subway map" (seriously, look at the drawing in the video, it's just fucking random scribbles) and proceed to charge him as a terrorist. Oh, he's not in prison, he just can't get a Visa, leave the country or expect to ever be free from constant restrictions and "unwanted attention" in his life.

      Amazing how someone can be too dangerous not to be watched, but not dangerous enough to imprison. I wonder how it feels to be stupid enough to engage in that level of cognitive dissonance and not go insane.
  • More like "Steps to take to get on an NSA watchlist". Maybe use IRC a lot in your spare time.
  • by Anonymous Coward

    Wear unattractive clothes, don't wear makeup, stay sober, don't flirt, don't leave drinks unattended, don't be out after dark, don't be out alone, learn to cook, find a good husband, teach others what you learned.

    • by gmuslera ( 3436 )
      Forgot to add live locked in your house, and don't talk to anyone. Lets put all the blame on you, not on the rapists. That is what is doing the NSA&US government, becoming liable for try to live in freedom, anything that you in public/internet/wherever do could make turn you into a target.
  • Don't use the network. No matter what you do to prevent it, there are holes if you are well funded ( and have the fear of the 'law' behind you )

    • by cpghost ( 719344 )
      No, not using the network makes you even more suspicious. In fact, it makes you a prime suspect nowadays! Use the network in a "harmless" way, i.e. in a way that doesn't give away information about you. Be as invisible as possible, by blending in with the sheep. Just don't draw attention to you, even if you're not a person of interest.
    • Unless you happen to live in a country that requires individuals to file income tax returns online and refuses to provide a paper option.
      • by nurb432 ( 527695 )

        Then you move to a less oppressive and invasive country.

        • Can you recommend a country as well as a walkthrough for getting a resident visa in that country?
          • by nurb432 ( 527695 )

            Off the top of my head i doubt much of the middle east has gone digital. I am sure there are others ( aside from the US, i still print and us-mail my taxes in each year )

  • Maybe I'm naive or ignorant, but what can a normal user do about e-mail?
    Most e-mail from ISP's runs over port 25, and it all gets logged by logboxes and tappers. I don't think the default for an MTA is port 465 or 587, but still 25. If I'm wrong. please correct me.
    What should be done here, can someone inform me. Is there something a user, admin or mta-developer should do here?
    I read my mail over imaps and pop3s, and store it on my own-hosted imap server. But what to do about smtp-traffic?

    • by mlts ( 1038732 ) *

      As a normal user, it is hard. Once the mail hits the main SMTP relay and heads out, it is in plaintext unless one is running Exchange which has secure connectors and one sets up TLS links with other sites.

      It would be nice to have a TLS/SSL mechanism where company E-mail servers would be checked if they had a secure transport port, the key fetched and checked with a CA, and then the mail sent.

      However, there are really only three choices for E-mail:

      1: Have both users share the same provider so mail is just

      • Best of all, have a PGP/gpg web of trust

        Which requires expensive travel to participate in key signing parties in other cities unless you only want to communicate with others living in the same city. Sure, you can trust that someone is the person described by a particular government ID, but that's orthogonal to how much you trust her to sign others' keys.

  • Quit voting for mega-corporate bitches like Obama or most Republican candidates. Quit voting for those that support the police-state policies of Bush/Cheney and Obama administrations. Make people aware of what is happening to their freedoms. Raise awareness.

  • The video on the EFF site gives instructions for downloading a Vidalia Bundle for Mac - but this doesn't exist on the Tor website. The only downloads that I can see available are the 'Tor Browser Bundle' which is an auto-launching Tor node and browser combination.

    So you can't run a node without a Tor browser window open all the time?

  • ... switch to alternatives like the ones proposed in http://prism-break.org/ [prism-break.org]. Won't be fail safe, but will be some steps closer. And will add enough a bit of sand in the NSA machinery. In some point they will have to choose between snooping only on "easier", in the open, targets, focus in very specific people, or try to cope with the amount of people using open and with safe encryption people (and risk meltdowns [slashdot.org] because people sharing lolcats in encrypted channels)
  • Are you nuts?

    What sort of people run TOR nodes? Have you been following the news [channel4.com]?

    You'll be straight on the authorities' list of very-likely-some-kind-of-crimials. Probably a terrorist, drug addict/dealer, paedophile or pirate of Madonna/Boys-R-Us/One Direction/Lady Gaga music.

    • But if 1% of American households run an exit node, that's 7 million on said list. I doubt the authorities have time to follow 7 million exit nodes at once.
  • I saw a news story yesterday saying that Snowden has dirt on Intel but hasnt released it yet. Chances are good that your processor is probably compromised. Its a no-win deal here.
  • Just be more prudent (Score:5, Interesting)

    by cpghost ( 719344 ) on Saturday October 26, 2013 @02:17PM (#45246503) Homepage
    When using the network, always assume that you're being under observation... and act accordingly. Give less private information to the world. In fact, apply the principle of "need to know" in reverse: if the world doesn't need to know that you've taken your dog out 2 hours ago, then don't post it. Don't even mail it to your friend using PGP. It's as simple as this. Really. Be less talkative, be less open, and be more suspicious.

    By the way, thanks NSA for forcing us to censor our thoughts in our head, before we even write them down and tell them to someone. I couldn't have imagined that we'd come to live in a totalitarian-like world (at least that how it feels when you apply censorship in your head) just a few decades after the Iron Curtain was torn apart, and that this totalitarian world is being brought forward by a western country that formerly championed free speech and freedom in general.

  • Remember the Occupy movement? We seem to have forgotten everything that stood for in favor of the NSA. Funny thing that. Perhaps only so many battles can be fought at once, but I think that was a better starting point. After all, they are in bed together.
  • Windows (Score:3, Insightful)

    by Princeofcups ( 150855 ) <john@princeofcups.com> on Saturday October 26, 2013 @03:01PM (#45246811) Homepage

    "use anti-virus software"

    Just come out and say it. Don't use Windows.

  • I think one of the biggest risks is drive-by infections. I have been thinking that running my browser as a different (underprivileged) user might be a nice added layer of insulation. You could add that user's group to your extended group list and still get all the files. But it could not get at yours.

    • by tepples ( 727027 )
      Chromium does an automatic version of this, running the browser in an underprivileged sandbox and passing sensitive things such as file downloads through a broker process that I assume gets more closely audited than the rest of Chromium.
  • by Burz ( 138833 ) on Saturday October 26, 2013 @03:10PM (#45246879) Homepage Journal

    We get a long list of complicated half-measures from 10 years ago, especially the idea of using Tor to access commercial email providers that like to capriciously ban Tor users.

    If email metadata is such a concern (because metadata=data), then does it help all that much to have people try to adjust to using PGP? I don't think it does. Giving the wiretappers the Who and When (and even Subject) of our communications doesn't jibe with the underlying goal of stopping surveillance.

    The only really good encryption in this environment is the kind that effectively encrypts the Who, When and everything else... and doesn't limit you to Web browsing the way Tor normally does. TAILS already recognized the value of using I2P for comprehensive privacy, [geti2p.net] which is why they started including it in their distro years ago. The "downside" is that the other end has to use I2P as well (but that ensures end-to-end encryption, so its also a big plus).

    Tor is outdated and dangerous to use because it encourages illusions like: a) 1024bit encryption is 'enough'; b) an elect group of core nodes can provide cover for everyone else (I2P makes everyone a router); c) the insecurities of the whole everyday Internet and PCs can be rectified by installing a small app, and you don't have to make technical demands on people you're communicating with.

    In short: Use I2P for communications (it has a DHT-based email system, and you can even torrent fully over it) and use it with an OS built for privacy and security like TAILS or Qubes. If the recent exploits against the Tor Browser had occurred against a Qubes user, there is no way they could have discovered the user's real address or other info. That, plus put a secure open source firmware on your routers (its been revealed that the NSA breaks into routers more than anything else; garden variety crooks will probably be following suit).

  • Recommending tor for safety is like telling someone that if they paint themselves orange and shout at the top of their lungs, nobody will notice them in a crowd.
    Let's face it, tor is pretty much synonymous with "pedophile, drug user, crook". Despite its best intentions, it's like painting a huge target on your back for the spies to focus on you, not "oh, this one is using tor! our efforts have been foiled!".

  • Nice democracy/republic/free country you have there. Since it's your government, and they're working with your tax dollars, you might not want to make things more expensive for them. You might, however, want to cut their budget, and vote them out, and impeech them, and whatever else you do when you both check and balance your government.

    sheesh.

Business is a good game -- lots of competition and minimum of rules. You keep score with money. -- Nolan Bushnell, founder of Atari

Working...