Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Communications Encryption Government Privacy United States

FBI Seeks To Legally Hack You If You're Connected To TOR Or a VPN 385

SonicSpike writes The investigative arm of the Department of Justice is attempting to short-circuit the legal checks of the Fourth Amendment by requesting a change in the Federal Rules of Criminal Procedure. These procedural rules dictate how law enforcement agencies must conduct criminal prosecutions, from investigation to trial. Any deviations from the rules can have serious consequences, including dismissal of a case. The specific rule the FBI is targeting outlines the terms for obtaining a search warrant. It's called Federal Rule 41(b), and the requested change would allow law enforcement to obtain a warrant to search electronic data without providing any specific details as long as the target computer location has been hidden through a technical tool like Tor or a virtual private network. It would also allow nonspecific search warrants where computers have been intentionally damaged (such as through botnets, but also through common malware and viruses) and are in five or more separate federal judicial districts. Furthermore, the provision would allow investigators to seize electronically stored information regardless of whether that information is stored inside or outside the court's jurisdiction.
This discussion has been archived. No new comments can be posted.

FBI Seeks To Legally Hack You If You're Connected To TOR Or a VPN

Comments Filter:
  • Bad idea (Score:5, Insightful)

    by AmiMoJo ( 196126 ) * on Tuesday January 20, 2015 @11:39AM (#48856709) Homepage Journal

    If the FBI starts to attack Tor and VPN users, those users are going to fight back. If they are not in the US the FBI might not be able to stop them doing it either.

    All this kind of thing does is make the US a more legitimate target for cyber attacks. The NSA and GCHQ are already fair game for hacking because they try to illegally hack you, so it's just self defence.

    • Re:Bad idea (Score:5, Interesting)

      by TWX ( 665546 ) on Tuesday January 20, 2015 @11:42AM (#48856739)
      I wouldn't be surprised if people put up honeypots on Tor just to mess with 'em, and log all of the output over serial or something so that even if they get in, they can't purge the logs of their attempts.
      • by Etherwalk ( 681268 ) on Tuesday January 20, 2015 @02:32PM (#48858865)

        I wouldn't be surprised if people put up honeypots on Tor just to mess with 'em, and log all of the output over serial or something so that even if they get in, they can't purge the logs of their attempts.

        Search warrants are still subject to constitutional requirements of reason and due process; this is a procedural rule independent of that.

        It will allow a judge to issue the warrant even if the FBI or police are not sure what judicial district it's happening in. It's important to let a magistrate judge approve a warrant on that basis, because the current rule 41(b) does not provide for it except in terrorism cases. So if you have someone selling hard drugs online, for example, but the government can't tell whether they are located inside the United States or not, this provides a way for them to get a warrant to search.

        See the proposed rule (from last November) on page 111 of http://www.uscourts.gov/uscour... [uscourts.gov]

        The old one is here: http://www.law.cornell.edu/rul... [cornell.edu]

      • by account_deleted ( 4530225 ) on Tuesday January 20, 2015 @03:22PM (#48859415)
        Comment removed based on user account deletion
      • by gweihir ( 88907 )

        It is actually pretty easy to set up a fully transparent logging proxy. Just have it masquerade as an Ethernet switch, use a smart-switch that copies everything to a sniffing port, or, the really secure option, sniff passively using a classical dumb hub that is not smart enough to be hacked. I have several hubs here for Fast Ethernet that still work fine and I am not the only one. On the cheap, a physical SLIRP connection can be listened to with two serial inputs and that is totally undetectable, except for

    • Re:Bad idea (Score:5, Insightful)

      by ron_ivi ( 607351 ) <sdotno@NOSpAM.cheapcomplexdevices.com> on Tuesday January 20, 2015 @11:57AM (#48856951)

      Most VPNs are corporate.

      I imagine corporations will fight back legally if/when their employees start getting hacked by the FBI.

    • Re:Bad idea (Score:5, Insightful)

      by davydagger ( 2566757 ) on Tuesday January 20, 2015 @11:57AM (#48856961)

      I think thats the point. Once they start fighting back, you can now openly declare war, and then have everyone who even remotely looks suspicious arrested.

      Read, the war on nerds continues

      Realisticly what can we do?

      How about this, until this happy horse shit stops, lets all boycott working for the federal government. Take a job somewhere else. Unexpectedly find reasons to be somewhere else when they ask for help. Play internet detective and debunk all their theories on digital warfare.

      Someone else can wage digital war on North Korea, Syria, Russia, and China. Someone else can keep state secrets safe. Just pass this around until we get a complete boycott on working for Uncle Sam.

      Lets also continue to heckle recruiters and inform the n00bs to stay away from these people.

      We don't need a war, we need to go on strike.

      • Re:Bad idea (Score:5, Informative)

        by meta-monkey ( 321000 ) on Tuesday January 20, 2015 @12:21PM (#48857255) Journal

        Yeah, it's not like the high-functioning sociopaths that seem so well-represented in the programmer population would be at all interested in the six-figure salaries offered by the secret government agencies with access to the most advanced and expensive computing resources on the planet, and may, with the blessing of the government, go crack and exploit all the things. I'm sure the "strike" will be very effective.

        • Actually the sociopaths tend to go into management, not programming. From my own experience I would say that programmers are very rarely in the psychopathy spectrum, more typically going toward the autism spectrum. I was curious as to what value psychopaths had in an evolutionary sense (both individually and in society), and I learned that they can be valuable. In an experiment with spiders, an equivalent to psychopathy was indicated as a group survival trait, as without it nobody defended the group agai

    • Phase 1 (Score:4, Interesting)

      by frovingslosh ( 582462 ) on Tuesday January 20, 2015 @12:02PM (#48857035)
      This is just Phase 1. Once this is in place then in Phase 2 if you ever use any service that uses https then you must be trying to hide something and so they can take all of your data. Same for any other use of encryption, you might be a criminal or terrorist hiding something. And if you ever send anything through the mail in a sealed envelope, well you must be a criminal trying to hide stuff.
    • Re:Bad idea (Score:5, Insightful)

      by ShanghaiBill ( 739463 ) on Tuesday January 20, 2015 @12:04PM (#48857059)

      If the FBI starts to attack Tor and VPN users, those users are going to fight back.

      Both TFA and the summary wildly misrepresent what this is all about. The FBI is NOT asking for permission to attack anyone that happens to be using Tor or a VPN. What they are asking for is the ability to get a warrant to search a particular Tor/VPN node, that appears to be engaging in criminal activity, without knowing who the owner is or where the system is physically located.

      • Re:Bad idea (Score:5, Insightful)

        by redmid17 ( 1217076 ) on Tuesday January 20, 2015 @12:34PM (#48857397)
        The ability to get a warrant "without providing specific details" and the person doesn't have to be within the court's jurisdiction.

        That's, um, just as troubling as it sounds.
        • Re:Bad idea (Score:5, Insightful)

          by ShanghaiBill ( 739463 ) on Tuesday January 20, 2015 @12:52PM (#48857613)

          That's, um, just as troubling as it sounds.

          Yes, it is troubling, and we should be having a rational discussion about that. Instead we have a lot of hysterical rants based on the wildly misleading headline, summary, and article, that imply that the FBI wants to "legally hack" anyone connected to TOR or a VPN. That is not at all what this is about. By trying to manufacture outrage about a phony issue, the author is obfuscating the real issue.

  • Harvest Exploits (Score:5, Interesting)

    by Anonymous Coward on Tuesday January 20, 2015 @11:40AM (#48856723)

    1. Run FF via TOR using valgrind.
    2. Trace data flow
    3. Harvest Exploit
    4. Harden FF
    5. Sell Exploit

  • by Anonymous Coward on Tuesday January 20, 2015 @11:42AM (#48856745)

    Or if you know somebody who has used TOR or a VPN. Or if you know what TOR or VPN is. Or if you might know somebody who might possibly know someone else who could know what TOR or VPN is. In fact, the FBI just wants to hack you.

  • Please do (Score:4, Funny)

    by Opportunist ( 166417 ) on Tuesday January 20, 2015 @11:43AM (#48856757)

    My computer is not so well shielded against attacks. And you might want to take a good look at that "terror_cells_US.docx" file. Yes, you may have to activate macros, it has a bit of active content.

    What? Me hack the FBI? I swear, I never even thought about it. I had this proof of concept for how to infest even well guarded VM-secured analysis centers to the point of taking them offline or making them my bitch on my PC but I have no idea how it got there...

    • Re:Please do (Score:4, Interesting)

      by oodaloop ( 1229816 ) on Tuesday January 20, 2015 @11:57AM (#48856947)

      I had this proof of concept for how to infest even well guarded VM-secured analysis centers to the point of taking them offline or making them my bitch on my PC

      Good luck with that. I don't know if you watched Skyfall one too many times, but all of those centers are disconnected from the internet and run on their own network, precisely for this reason.

      • Good luck with that. I don't know if you watched Skyfall one too many times, but all of those centers are disconnected from the internet and run on their own network, precisely for this reason.

        Fairly close. Where those networks need to cross over they are protected by what the military had labeled the 10 digit interface. Some poor SOB has to read what is on screen A and type it in on screen B.

  • by Anonymous Coward on Tuesday January 20, 2015 @11:45AM (#48856775)

    but if you use it, that is grounds for us to take it away.

    Makes perfect sense in an inside the belt way sort of way.

  • USPS (Score:4, Insightful)

    by buback ( 144189 ) on Tuesday January 20, 2015 @11:45AM (#48856783)

    So the Postal service is still the most secure legally protected method for sending data. Just mail CDs.

    • That would be a waste of taxpayers money. Multiple jobs would need to be created to open the mail and to manually download the data.

    • Re:USPS (Score:5, Informative)

      by alphatel ( 1450715 ) * on Tuesday January 20, 2015 @12:04PM (#48857057)

      So the Postal service is still the most secure legally protected method for sending data. Just mail CDs.

      The USPS scans all mail [nytimes.com]
      The USPS monitors mail [washingtontimes.com] on behalf of the feds without any authorization.
      What's to stop them from opening it without a warrant? Sorry but the whole system is controlled and abused by your favorite government officials.

      Sidenote: CDs were replaced by DVDs and now Blu Rays. Just fyi if you want to send more than 700mb of crap.

  • then the FBI should have the authority to put cameras in your house. Right?

  • Boy, I can imagine all of the companies that have employees connect through VPNs to do confidential work will love this. I work for an internationally-based corporation that has me on a VPN before I can even BEGIN to work and I would imagine they'll be pretty pissed off if the FBI is legally hacking into their private systems.

    This is such bullshit. When are we going to get some lawmakers who actually understand the fucking technology?

    Such idiots...
    • by neilo_1701D ( 2765337 ) on Tuesday January 20, 2015 @11:58AM (#48856963)

      When are we going to get some lawmakers who actually understand the fucking technology?

      They understand the technology well enough. It's the Constitution they're having problems understanding.

      • When are we going to get some lawmakers who actually understand the fucking technology?

        They understand the technology well enough. It's the Constitution they're having problems understanding.

        They understand the Constitution well enough. They just don't care about it all that much. After all TERRORISTS and PROTECT THE CHILDREN (and the power grabs that these words enable them to achieve) are much more important to them than a 200+ year old piece of paper.

    • When we the people demand it.
  • by PeeAitchPee ( 712652 ) on Tuesday January 20, 2015 @11:46AM (#48856805)
    ...just a few few days ago? How do you like him now? That's right, he's still smearing turds all over the Constitution, and having him gone will be one of the best things about Obama's terms finally ending.
    • i did no such thing
    • by fnj ( 64210 )

      You win some, you lose some. Mr. Holder is a lot like just about everybody else in the government. They do a lot of good and a lot of evil, and it's all mixed up together. When they say or do good things you give them credit. When they say and do evil things you lambaste them. Or would you rather not run your life by ethics and logic?

    • Technically [xkcd.com] this is the FBI, so you should be pissed off at Comey, not Holder. Comey is officially Holder's subordinate at the DoJ, though I'm not sure how much the FBI chief really answers for.

      And you won't have to wait so long for Holder's departure; he announced his resignation months ago and Obama already tapped his replacement [wikipedia.org].

  • by galaad2 ( 847861 ) on Tuesday January 20, 2015 @11:48AM (#48856823) Homepage Journal

    ALL major online email providers (google mail, yahoo, microsoft, etc.) and all major company networks work internally by using a VPN between the various locations that those companies have around the country/world... => they are going to be hacked... and this will raise an enormous shitstorm.

    • by ShaunC ( 203807 ) on Tuesday January 20, 2015 @01:17PM (#48857915)

      ALL major online email providers (google mail, yahoo, microsoft, etc.)

      That horse [imgur.com] has already left the barn [imgur.com], they even poked fun at Google's internal setup with a doodle [imgur.com]. There was no enormous shitstorm. Google responded by encrypting their internal traffic (or announcing that they did, anyway) and life went on. Millions upon millions of Americans simply don't care, and millions more actually want the government reading everyone's email because they think it protects us from them ay-rab turrists. Until the surveillance apparatus somehow fucks up football or The Voice or Pawn Stars, nobody's going to give a shit.

  • by hawguy ( 1600213 ) on Tuesday January 20, 2015 @11:48AM (#48856829)

    When I'm connected to my company's VPN connection, they route all of my traffic over that connection, sounds like this law is giving the feds carte blanche to hack all work-from-home users.

    • Comment removed based on user account deletion
      • So in order to get around isps bitching about too much netflix traffic someone uses a vpn. They may very well use one of these "VPN providers" that you claim exist to carry "legitimate traffic."

        Usage of a VPN for non-business purposes doesn't automatically mean criminal activity. If the FBI knows a VPN provider is being marketed as a service for hiding criminal activity there is nothing stopping them from getting a warrant now - loosening the restrictions is just a power grab.

      • by DarkOx ( 621550 ) on Tuesday January 20, 2015 @12:23PM (#48857277) Journal

        That's not what's meant by VPN in this context.

        "context" don't make me laugh. There is no application of context to modern law. All sides take advantage. The words are stretched and the intents are ignored until the law can practically mean anything the AG wants it to mean that day. "VPN" already has plenty of interpretations in the tech world once the legal world gets hold of it, it is certain to be interpreted as just about anything that isn't a direct essentially the most direct path between hosts available using a plaintext protocol.

        If you think otherwise you are crazy, or haven't been paying attention.

    • When I had a contract with a local telco I would have to use a VPN in order to get onto a network with a test switch. The problem with I had was that I lost my access to the Internet with that connection. What I ended up doing was running the VPN in a virtual machine. My software ran in the virtual machine connecting to the test switch without a problem but the rest of my computer still had access to the Internet.

      You could do the same and only your business stuff would be sent over the VPN. Of course th

  • by Anonymous Coward

    Once we kick those evil Rethuglicans out of power, we'll see the Democrats restore our rights.

    Yeah, that worked out real well.

    Are we beginning to see that the problem is the government itself, and not the particular party in power?

    And are we beginning to see that giving that government more money is a really bad idea?

    • by NetNed ( 955141 )
      Beginning? You miss the last 15 to 20+ years or something?
      • There's a difference there Bush had high profile terror attack to get the people behind him, once that happened he had carte blanche.

        With Obama's sidestepping and reinterpretation of laws and the Constitution a very dangerous precedent has been set for us.
    • by fnj ( 64210 )

      Having the government collect and spend more money is an empowerment. It can empower good, and it can empower evil. You might want to consider that the problem is not the government itself. The government is made up of people. That is like saying the problem is people.

      There are problems only the government can address, and you won't make any progress with those problems by strangling the government.

      • by DarkOx ( 621550 )

        The problem is people, that is why we set a government up in the first place; primarily to protect ourselves from each other.

        So yes government is the problem. It never can be anything better than a necessary evil. It should be restricted, strangled, starved, and otherwise impeded to the point it can only barely achieve its goal of protecting people from each other, with minimal efficacy. To allow it to get any bigger or more capable than that as we have done not only invites abuse but assures it.

    • by Uberbah ( 647458 )

      Are we beginning to see that the problem is the government itself, and not the particular party in power?

      If you've read so much Rand that you believe that keeping a mining company from dumping lead and arsenic into your drinking water is just as evil as illegal spying and assassinations, maybe. Cuz gubbmit.

  • by Trachman ( 3499895 ) on Tuesday January 20, 2015 @11:51AM (#48856857) Journal

    NSA and others do it and will do it no matter what the law says, while their dime eyed lawyers continue telling that they are defending our liberties. FBI was also doing it, but now that the discussion is public, there are same voices, probably in-house lawyers, who foresee a case in the future where the litigation is lost if FBI will continue lying using the paralel construction, like they (and all others) always did.

    So now they want to legitimize something that is not legitimizable.

  • That bit about "particularly describing the place to be searched, and the persons or things to be seized" isn't just a matter of criminal procedure. It actually comes from the constitution. Really -- check the restroom at headquarters, it's right there on the toilet paper.

  • by cant_get_a_good_nick ( 172131 ) on Tuesday January 20, 2015 @11:58AM (#48856967)

    So, you use a VPN to avoid getting hacked by your local situation, then get hacked by your own government.

  • By that reasoning they can justify a search warrant if I close the drapes in my house.
  • by SailorSpork ( 1080153 ) on Tuesday January 20, 2015 @12:02PM (#48857039) Homepage
    They seem to be asking for all of this, but I wonder which subset of these they actually expect to get. If they ask for 10 unreasonable things but only get one, will we celebrate, or mourn the loss of one more civil right to privacy?
  • It's the same thing we always hear all the time. The lines that are an attempt to fool the general public. It goes "We need "x" because we can't do our job, and if we can't do our job your "(family, kids, wife, money, future, home, the earth)" are all in danger, so do it for them!"
    • I agree. The pathetic thing is that they keep trying to frame these requests as "we really want to do our job well but can't because of X." All I hear is "Doing our job with X in place is too haaard!" in the same whiny voice a kid might use if asked to take out the garbage instead of playing video games. These attempts aren't "we can't do our job" requests, but attempts to change the system - which was put in place to prevent abuses - because they're just too lazy to work within the system the way they'v

    • Sure, but this should be pretty easy for them to get. I've seen headlines from the Silk Road case that the judge and jury are confused by the (and I quote) "mumbo jumbo" about Tor, and basically have no understanding of what it is.

      Public: "The FBI wants to hack Tor? What's that?"
      Feds: "It's the secret system pedophiles, drug dealers, and terrorists (also drug dealing, terrorist pedophiles) use."
      Public: "Oh okay."

  • by Jaywalk ( 94910 ) on Tuesday January 20, 2015 @12:07PM (#48857101) Homepage

    The specific rule the FBI is targeting outlines the terms for obtaining a search warrant. It's called Federal Rule 41(b), and the requested change would allow law enforcement to obtain a warrant to search electronic data without providing any specific details as long as the target computer location has been hidden through a technical tool like Tor or a virtual private network.

    Everything my employer does is via a VPN. This little change would be carte blanche for virtually all corporate communications within the United States. Even the company's internal networks would be laid bare if they're remotely accessible. The opportunities for abuse are staggering.

  • by kwiecmmm ( 1527631 ) on Tuesday January 20, 2015 @12:08PM (#48857115)

    The first arrest that happens due to this, will result in appeals that will eventually get this rule overturned as unconstitutional.

    This is no different than saying your neighbor committed a crime so we want to search your house as well due to proximity to him. A decent lawyer will be able to make the argument that just because you are on a TOR or a VPN does not mean you are doing something illegal.

    TOR was created as a method to allow people in oppressed countries to speak freely, it is funny that the country that funded this is now going to be one of those oppressed countries.

  • Wow ... (Score:5, Insightful)

    by gstoddart ( 321705 ) on Tuesday January 20, 2015 @12:14PM (#48857175) Homepage

    So it's true ... when they outlaw privacy, only criminals will have privacy.

    And then there's this:

    Furthermore, the provision would allow investigators to seize electronically stored information regardless of whether that information is stored inside or outside the court's jurisdiction.

    We want extraterritorial laws, with no judicial oversight.

    I'm sorry, but can the rest of the world decree that FBI agents should all be shot on sight as enemies of basic civil rights? The argument is about equally stupid as what the FBI claim.

    America, you have a problem, and you are making it the problem of everyone on the planet.

    Land of the free and home of the brave? You have to be fucking kidding us.

  • Some already avoid email & might use pictures w/steganography.

  • by real gumby ( 11516 ) on Tuesday January 20, 2015 @12:22PM (#48857275)

    The US government funded Tor development [onion-router.net] and encourages its use as a way to avoid repressive governments [state.gov] and then considers its use in the US to be a suspcious act.

    The irony, it burns!

  • by MobyDisk ( 75490 ) on Tuesday January 20, 2015 @12:35PM (#48857413) Homepage

    From the article:

    ...without providing any specific details as long as the target computer location has been hidden through a technical tool like Tor or a virtual private network. It would also allow nonspecific search warrants...

    Text of the 4th amendment to the constitution:

    The right of the people to be secure in their persons, houses, papers, and effects,[a] against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

    The article is light on details, but if it is accurate, this looks like a straightforward violation of the 4th amendment. The devil is always in the details though. The article may be an oversimplification.

  • So, if an opposing campaign uses VPN to secure their communications, it makes them a target by the sitting executive branch party.
    Guess we won't hear anything about this on the SOTU.
  • Articles like this often get written because the author doesn't really understand the law, and rather than really trying to understand what's going on they just guess. The claims made in this article are so wildly off-base, however, that it makes me question whether the author is just trolling people.

    Contrary to what the article suggests, Federal Criminal Rule 41(b) does not have a thing to do with what evidence law enforcement agencies are required to show to get a warrant, nor does it authorize the FBI (or anyone else) to get any particular type of warrant. Rule 41(b) is about VENUE; e.g., if you've already got enough evidence to get a search warrant, what judge (in what federal District) is the judge that you are supposed to present that evidence to?

    You can read Rule 41(b) here: http://www.law.cornell.edu/rul... [cornell.edu]

    The basic rule it sets out is that, when you want a warrant, you ask a judge located within the District where the person/property you want to search is located. There are exceptions to that basic rule, much like any other rule, because it's not always a simple matter of "X is located here." Sometimes things are located across several different Districts, sometimes they're mobile and can be easily moved to another District, etc. This is why there are currently 5 subsections to 41(b), each dealing with slightly different semi-unusual factual scenarios. At the end of the day, each exception is there for a very simple reason: to clearly and unambiguously tell federal law enforcement agencies how to identify the judge they are supposed to go to if they want to get a search warrant.

    The proposal for changing Rule 41(b) is located here: http://justsecurity.org/wp-con... [justsecurity.org]

    What the DOJ is asking for is a scenario not currently covered by Rule 41(b). That being...what happens if you are dealing with someone you know to have committed a crime, you have enough evidence to get a search warrant, but the perpetrator of the crime is using some sort of technological means (like encryption, IP masking, etc.) to prevent you from finding the exact physical location of whatever you want to search? As of right now, it is not clear who the right judge would be to issue that warrant. The only thing the proposal would do is say that, if you can't identify the physical location of the computer to be searched (and therefore do not know which federal District it's located in), then you can go get your warrant from a judge in the District where the target of the crime was located.

    Example: I'm an evil h@xx3r, and I hack some computers at the GooglePlex. I have masked my IP address, so the FBI does not know exactly where I'm at. Under current Rule 41(b), it's not clear who the right judge would be to try to get a warrant from. Under "new" Rule 41(b), they can go to a judge in California since that's where the GooglePlex is located.

    That's literally the only thing this proposal would change. It says nothing about VPNs or TOR networks. It does not give the FBI (or any other law enforcement agency) the authority to hack your computer or your phone whenever they want. It doesn't even grant them the authority to do that with a warrant, because they already have the ability to do that with a warrant. It also doesn't say anything about how much evidence they have to present to get the warrant, because Rule 41(b) has nothing to do with that. The standards for search warrants are exactly the same as they have been for years; this proposal would only clarify who the right judge is to issue the warrant.

    I don't know a whole heck of a lot about the "FEE" is, but if this article is representative of their work and/or legal abilities then color me unimpressed.

  • by ruir ( 2709173 ) on Tuesday January 20, 2015 @01:19PM (#48857945)
    installed without PC owners knowing as malware.... should provide hours of fun to the FBI.
  • by prgrmr ( 568806 ) on Tuesday January 20, 2015 @02:47PM (#48859077) Journal
    There are a host of federal regulations regarding maintaining the privacy of data that necessitate the use of corporate VPNs. Were the FBI to hack a corporate VPN and expose regulated data to the internet or the public via documents in an open hearing, the circus that would ensue as the Attorney General would try to explain how the FBI is exempt from all of those regs would be both entertaining and horrific.
  • by paiute ( 550198 ) on Tuesday January 20, 2015 @02:47PM (#48859079)
    My Lord, I request permission to knock in any door in Boston which my men find latched.

Dennis Ritchie is twice as bright as Steve Jobs, and only half wrong. -- Jim Gettys

Working...