Announcement

Collapse
No announcement yet.

NSA monitoring all Verizon users

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • #61
    Re: NSA monitoring all Verizon users

    the always a bit overheated Escobar treatment . . .

    Digital Blackwater rules
    By Pepe Escobar

    The judgment of Daniel "Pentagon Papers" Ellsberg is definitive; "There has not been in American history a more important leak than Edward Snowden's release of NSA material". And that includes the release of the Pentagon Papers themselves. Here is the 12-minute video by The Guardian where Snowden details his motives.

    By now, everything swirling around the US National Security Agency (NSA) points to a black box in a black hole. The black box is the NSA headquarters itself in Fort Meade, Maryland. The black hole is an area that would include the suburbs of Virginia's Fairfax County near the CIA but mostly the intersection of the Baltimore Parkway and Maryland Route 32.

    There one finds a business park a mile away from the NSA which Michael Hayden, a former NSA director (1999-2005) told Salon's Tim Shorrock is "the largest concentration of cyber power on the planet". [1] Hayden coined it "Digital Blackwater".

    Here is a decent round up of key questions still not answered about the black hole. But when it comes to how a 29-year old IT wizard with little formal education has been able to access a batch of ultra-sensitive secrets of the US intelligence-national security complex, that's a no-brainer; it's all about the gung-ho privatization of spying - referred to by a mountain of euphemisms of the "contractor reliance" kind. In fact the bulk of the hardware and software used by the dizzying network of 16 US intelligence agencies is privatized.

    A Washington Post investigation found out that US homeland security, counter-terror and spy agencies do business with over 1,900 companies. [2] An obvious consequence of this contractor tsunami - hordes of "knowledge" high-tech proletarians in taupe cubicles - is their indiscriminate access to ultra-sensitive security. A systems administrator like Snowden can have access to practically everything.

    "Revolving door" does not even begin to explain the system. Snowden was one of 25,000 employees of Booz Allen Hamilton ("We are visionaries") for the past three months. [3] Over 70% of these employees, according to the company, have a government security clearance; 49% are top secret (as in Snowden's case), or higher. The former director of national intelligence Mike McConnell is now a Booz Allen vice president. The new director of national intelligence, the sinister-looking retired general James Clapper, is a former Booz Allen executive.

    At least US - and world - public opinion may now have a clearer idea of how a Pashtun girl in Waziristan is obliterated by a "targeted strike". It's all a matter of this privatized NSA-collected meta-data and matrix multiplication leading to a "signature". The "terrorist" Pashtun girl of course may eventually morph in the near future into a dangerous tree-hugger or a vocal political protester.

    It's all China's fault

    True to form, as soon as Snowden revealed his identity US corporate media privileged shooting the messenger instead of poring over the message. That included everything from cheap character assassination to the usual former CIA asset spinning that in Washington many were looking at Snowden as an agent in a potential Chinese espionage plot.

    Much has also been made of the John Le Carre-esque plot twist of Snowden leaving his tranquil life in Hawaii and flying to Hong Kong on May 20, because "they have a spirited commitment to free speech and the right of political dissent". Hong Kong-based blogger Wen Yunchao memorably described it as Snowden having "left the tiger's den and entered the wolf's lair". Yet Snowden's visa stamp at Chek Lap Kok airport lasts for 90 days - plenty of time to ponder the next move.

    Since 1996, before the British handover to China, an extradition treaty applies between the tiger and the wolf. [4] The US Department of Justice is already surveying its options. It's important to remember that the Hong Kong judicial system is independent from China's - according to the Deng Xiaoping-conceptualized "one country, two systems". As much as Washington may go for extraditing Snowden, he may also apply for political asylum. In both cases he may stay in Hong Kong for months, in fact years.

    The Hong Kong government cannot extradite anyone claiming he will be persecuted in his country of origin. And crucially, article 6 of the treaty stipulates, "a fugitive offender shall not be surrendered if the offence of which that person is accused or was convicted is an offence of a political character." Another clause stipulates that a fugitive shall not be surrendered if that implicates "the defense, foreign affairs or essential public interest or policy" of - guess who - the People's Republic of China.

    So then we may have a case of Hong Kong and Beijing having to reach an agreement. Yet even if they decided to extradite Snowden, he could argue in court this was "an offence of a political character". The bottom line - this could drag on for years. And it's too early to tell how Beijing would play it for maximum leverage. A "win-win" situation from a Chinese point of view would be to balance its commitment to absolute non-interference in foreign domestic affairs, its desire not to rock the fragile bilateral relation boat, but also what non-pivoting move the US government would offer in return.

    The ultimate Panopticon

    The usual rabid right-wingers in the US predictably skip the fact of how Snowden does not see intelligence analysts - and even the US government, per se - as inherent "bad guys". [5] What he stressed is how they all work under a false premise; "If a surveillance program produces information of value, it legitimizes it ... In one step, we've managed to justify the operation of the Panopticon".

    Oh yes, make no mistake; Snowden has carefully read his Michel Foucault (he also stressed his revulsion facing "the capabilities of this architecture of oppression").

    Foucault's deconstruction of the Panopticon's architecture is now a classic (see it here in an excerpt of his 1975 masterpiece Discipline and Punish). The Panopticon was the ultimate surveillance system, designed by utilitarian philosopher Jeremy Bentham in the 18th century. The Panopticon - a tower surrounded by cells, a pre-Orwellian example of "architecture of oppression" - was not originally conceived for the surveillance of a prison, but of a factory crammed with landless peasants on forced labor.

    Oh, but those were rudimentary proto-capitalist days. Welcome to the (savagely privatized) future, where the NSA black hole, "Digital Blackwater", lords over all as the ultimate Panopticon.

    Notes:
    1. Digital Blackwater: Meet the Contractors Who Analyze Your Personal Data, Alternet, June 10, 2013.
    2. Top Secret America, Washington Post, June, 2010.
    3. See here for company website.
    4. See here for extradition treaty.
    5. Code name 'Verax': Snowden, in exchanges with Post reporter, made clear he knew risks, Washington Post, June 10, 2013.

    Pepe Escobar is the author of Globalistan: How the Globalized World is Dissolving into Liquid War (Nimble Books, 2007) and Red Zone Blues: a snapshot of Baghdad during the surge. His new book, just out, is Obama does Globalistan (Nimble Books, 2009).

    He may be reached at pepeasia@yahoo.com.

    2013 Asia Times Online

    Comment


    • #62
      Re: NSA monitoring all Verizon users



      Americans Are as Likely to Be Killed by Their Own Furniture as by Terrorism


      According to the report, the number of U.S. citizens who died in terrorist attacks increased by two between 2010 and 2011; overall, a comparable number of Americans are crushed to death by their televisions or furniture each year.
      The deadly threat of furniture surely justifies extending round-the-clock surveillance of US citizens into homes and bathrooms.

      Comment


      • #63
        Re: NSA monitoring all Verizon users

        Originally posted by unlucky View Post


        Americans Are as Likely to Be Killed by Their Own Furniture as by Terrorism





        The deadly threat of furniture surely justifies extending round-the-clock surveillance of US citizens into homes and bathrooms.
        Within 10 years.

        Be kinder than necessary because everyone you meet is fighting some kind of battle.

        Comment


        • #64
          Re: NSA monitoring all Verizon users

          Originally posted by unlucky View Post
          The deadly threat of furniture surely justifies extending round-the-clock surveillance of US citizens into homes and bathrooms.
          No sooner had we moved into our condo than I was attacked by the shower. (I could have sworn I heard an Islamic phrase muttered as I slid to the floor . . .)

          Comment


          • #65
            Re: NSA monitoring all Verizon users

            Originally posted by metalman View Post
            duh... course not. bad guys hide behind 3 proxy servers... nsa is building a monster computer to bust aes...





            er... didn't catch them!



            how come no terror attacks & stasi spying defense in germany?

            a. history
            b. germany not doing this

            Should have said, "AT best they will catch..."

            If they are going to treat this like a "war", they have to learn that you will not eliminate casualties 100%. Ask any Army company commander if he could function in his job if he tried to fight with zero casualties. Dig in and hide behind trenches? Recipe for disaster. The real question is are the results worth it? Sometimes the medicine is worse than the disease.

            Comment


            • #66
              Re: NSA monitoring all Verizon users

              Originally posted by metalman View Post
              no, no, no... the uproar in germany was not the public po'd about the gov't blowing up wedding parties in 3rd world countries it was about pissing tax dollars away on drone r&d & losing the international arms sales competition to make the best drones to use to blow up wedding parties in 3rd world countries.

              how embarrassing. isn't this the country that invented this 70 yrs ago?

              V1 is more akin to cruise missiles but I get your point.

              Comment


              • #67
                Re: NSA monitoring all Verizon users

                And on a lighter note: apparently PRISM also ignores copyright law:

                http://www.theregister.co.uk/2013/06..._logo_scandal/

                Shock, horror, scandal! America's NSA secretly took data from my website for its fiendish PRISM web-snooping project - and it ended up blasted all over the internet! Top-secret slides detailing the massive electronic surveillance programme were leaked last week by ex-CIA techie Edward Snowden. A close inspection of the presentation reveals a terrible scandal missed by the entire mainstream media: the project's weird logo is startlingly similar, if not an exact copy, of my father's own work.



                The leaked slides now all over the internet … notice the PRISM logo in the top right corner




                That NSA PRISM logo in full - but flipped upside-down so you can compare it to the image below

                The NSA may have set aside a paltry annual budget of $20m for its internet-data hoovering program (we're doomed, doomed, I tell you), but that didn't stretch as far as bunging over some loose change for using my dad's prism photo for its creepy PRISM logo: the original image is hosted on my online gallery for free-to-use pics, although there are caveats (such as a requirement to credit and link to us). Here's the original:



                Look familiar? … prism photo snapped by former Tomorrow's World presenter Adam Hart-Davis (used with permission, full source)

                On the other hand, I'm not convinced we really want a picture credit.

                I am considering finding a bean-counter at the NSA and asking if he or she could scape together a small donation (which larger organisations often do, generously, in lieu of a fee), although I wonder if all my sites and activities would experience, ahem, enhanced scrutiny for a little while.

                Comment


                • #68
                  Re: NSA monitoring all Verizon users

                  http://www.guardian.co.uk/world/2013...tion1:sublinks

                  NSA surveillance played little role in foiling terror plots, experts say
                  Obama administration says NSA data helped make arrests in two important cases – but critics say that simply isn't true

                  Comment


                  • #69
                    Re: NSA monitoring all Verizon users

                    More Snowden:

                    http://www.scmp.com/news/hong-kong/a...kong-and-china

                    Snowden said that according to unverified documents seen by the Post, the NSA had been hacking computers in Hong Kong and on the mainland since 2009. None of the documents revealed any information about Chinese military systems, he said.
                    One of the targets in the SAR, according to Snowden, was the Chinese University of Hong Kong and public officials businesses and students in the city. The documents also point to hacking activity by the NSA against mainland targets.


                    ...

                    “We hack network backbones – like huge internet routers, basically – that give us access to the communications of hundreds of thousands of computers without having to hack every single one,” he said.

                    Comment


                    • #70
                      Re: NSA monitoring all Verizon users

                      The problem is no one is watching the watchers. For example say you want a camera on a street corner. Is there any reason not to have a public feed so that we see what they see?

                      Comment


                      • #71
                        Re: NSA monitoring all Verizon users

                        Originally posted by gwynedd1 View Post
                        The problem is no one is watching the watchers. For example say you want a camera on a street corner. Is there any reason not to have a public feed so that we see what they see?
                        No, the problem is that the system was designed from the ground-up to create a stable-state in a target system, in this case the system is the public and the stable-state is any state the owners of that system desire. No one is spying on your private data, except for in a few select cases. On the other hand, massive amounts of data is analyzed in order to assess the public mind and how to "adjust" it. This latter part of the system goals was always part of the design, and so access to data was always a key requirement. This latest news cycle is ridiculous given the original architect's desires, and hence it can only be concluded that these current media releases are for continued conditioning of the public mind.

                        May I suggest one embark upon an understanding of information and it's key role in a system by reading the following...


                        Information and Consciousness: A Critique of the Mechanistic Concept of Information

                        by Søren Brier:
                        http://www.imprint.co.uk/C&HK/vol1/v1-23sbr.htm
                        Last edited by reggie; June 12, 2013, 11:23 PM.
                        The greatest obstacle to discovery is not ignorance - it is the illusion of knowledge ~D Boorstin

                        Comment


                        • #72
                          Re: NSA monitoring all Verizon users

                          NSA Deception Operation? Questions Surround Leaked PRISM Document’s Authenticity

                          Was Edward Snowden spotted before he decided to leak documents, and set up by the NSA?



                          “I can’t in good conscience allow the US government to destroy privacy, Internet freedom and basic liberties for people around the world with this massive surveillance machine they’re secretly building.” -
                          Edward Snowden

                          Intelligence services have been feeding false information to known enemy informants in their own ranks for a long time, and they are very good at it.

                          Today, the potential whistleblower is one of the most dangerous informants an intelligence service can confront.
                          Was Edward Snowden spotted before he decided to leak documents, and set up by the NSA?

                          Substantial evidence supports the possibility that he was. Numerous questions cast doubt on the authenticity of the Power Point slide show describing PRISM, but the UK Guardian has not seen fit to release it to the public. Perhaps Glenn Greenwald should anonymously leak this file: In the words of Snowden himself, “The public needs to decide.”

                          Was Edward Snowden under surveillance at intelligence contractor Booz Allen in advance of releasing the PRISM document?

                          In the wake of the Wikileaks scandals, the U.S. intelligence community has answered “Who shall watch the watchmen?” by introducing active surveillance and detailed profiling of their own analysts and contractors, looking for potential whistleblowers.[1]

                          By his own account, Snowden often discussed perceived Agency wrongdoing with his co-workers, which suggests that he should have been profiled and flagged as a potential leaker by the NSA’s internal surveillance process.

                          Interviewd by Glenn Greenwald, Snowden described his workplace behavior in the time leading up to his decision to leak documents:
                          “When you see everything, you see them on a more frequent basis and you recognize that some of these things are actually abuses, and when you talk about them in a place like this, were this is the normal state of business, people tend not to take them very seriously and move on from them. But over time that awareness of wrongdoing sort of builds up and you feel compelled to talk about it, and the more you talk about it, the more you’re ignored, the more you’re told it’s not a problem, until eventually you realize that these things need to be determined by the public, not by somebody who is simply hired by the government.”[2]

                          Questioning The Document


                          Classified DoD briefing files are created to meet formal style specifications and are subject to stringent internal reviews. After the publication of pages from the PRISM presentation, independent analysts were quick to notice and report substantial deficiencies in the document.[3] Others have expressed serious doubts about the PRISM slide show’s pedigree, including the NSA’s former top attorney:
                          “Stewart Baker, the NSA’s general counsel in the 1990s and now an attorney at Steptoe and Johnson, said he was not familiar with PRISM or similar government activity, but the leaked Powerpoint presentation sounds “flaky,” as do the initial reports.
                          “The Powerpoint is suffused with a kind of hype that makes it sound more like a marketing pitch than a briefing — we don’t know what its provenance is and we don’t know the full context,” Baker said. He added, referring to the Post’s coverage: “It looks rushed and it looks wrong.” – Declan McCullagh, Wired, June 7, 2013[4]
                          The logos of major U.S. IT and communication service providers are splashed across the top of PRISM power point slides like sponsor patches on a NASCAR driver’s jacket. Vendor logos often do appear next to product illustrations in DoD briefing documents, and are sometimes used to indicate a vendor’s position in process or procurement flow charts. But the “ad banner” format present in the leaked PRISM slides is very unusual and apparently unique to the PRISM document. All of the vendors named have vehemently denied knowledge of the PRISM program described in the slides.[5] Some of these denials, such as those by Twitter and Google, are from companies which have previously fought court battles against arbitrary disclosure of their users’ data to Federal agencies.[6]

                          A second PRISM?


                          Unclassified documents available on the Internet identify a completely different PRISM program, a powerful integrated network communications tool for Department of Homeland Security counter-terrorism crisis management. This PRISM integrates incident reporting, GPS tracking of emergency service and law enforcement vehicles, “outbound 911″ public alert networks, CBN and other technical sensor data, etc. A detailed, unclassified 2004 description of the “DHS PRISM” is available at Cryptome.[7] A 2007 report from the RAND Corporation defines PRISM as a “Planning Tool for Resource Integration, Synchronization, and Management”[8]. It seems unlikely that two network-centric programs as large and different as the DHS and NSA PRISMs, both operating inside the United States, would bear the same name. Only Monty Python calls everyone Bruce “to avoid confusion.”

                          Would the NSA lie to us?


                          The National Security Administration is one of the country’s most officially secretive agencies. In the Washington press corps, its popular nicknames have included “No Such Agency” and the “Never Say Anything” agency.

                          It is against long standing Agency policy to comment directly on any classified matter, and its Directors have consistently refused to confirm or deny any Agency activity when questioned by the press. But when the UK Guardian broke the story of the PRISM leak, the Director of National Intelligence promptly confirmed the document as authentic, calling the leak “reprehensible”:
                          “The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans.” – James R. Clapper, Director of National Intelligence[9]

                          This very unusual confirmation raises more questions about the PRISM document than it answers.
                          Is it possible that the PRISM leak was set up by the NSA as a deception operation in support of the Obama Administration’s ongoing wars against whistleblowers and the 4th Amendment? Documents from Federal intelligence contractor HBGary, published in 2011 by anonymous hackers, include a Power Point presentation proposing methods for attacking Wikileaks, and this document names Glenn Greenwald, who broke the PRISM story, as a specific target:
                          “The presentation, which has been seen by The Independent, recommends a multi-pronged assault on WikiLeaks including deliberately submitting false documents to the website to undermine its credibility, pioneering cyber attacks to expose who the leakers to WikiLeaks are and going after sympathetic journalists.

                          “One of those mentioned is Glenn Greenwald, a pro-WikiLeaks reporter in the US. Writing on Salon.com. Greenwald stated that his initial reaction was “to scoff at its absurdity.” – Jerome Taylor, The Independent[10]

                          The UK Guardian released the PRISM story on the opening day of PFC Bradley Manning’s court martial. The leaked PRISM document will certainly influence public debate on both whistleblower protections and State surveillance – and influence is one of our intelligence community’s regular daily chores. Some commentators have been very quick to present forceful talking points in favor of free and unrestrained State surveillance[11], and there is growing consensus that reports depicting PRISM as a mass domestic surveillance dragnet were a false alarm. The Washington Post, which broke the story at the same time as the UK Guardian, has walked back its position on the civil rights implications of the PRISM materials.[12] Meanwhile, it seems that everyone has forgotten about Romas/COIN.

                          Universal Surveillance: Romas/COIN, Odyssey and beyond


                          The same security breach at HBGary that revealed formal proposals to plant false leaks and target reporter Glenn Greenwald personally, also disclosed the existence of a real surveillance program with dramatically more dangerous civil liberty implications than PRISM: Romas/COIN, and its planned successor, Odyssey. Barrett Brown summarizes what is known about this program in an article on the Project PM website:
                          “A successful bid for the relevant contract was seen to require the combined capabilities of perhaps a dozen firms – capabilities whereby millions of conversations can be monitored and automatically analyzed, whereby a wide range of personal data can be obtained and stored in secret, and whereby some unknown degree of information can be released to a given population through a variety of means and without any hint that the actual source is U.S. military intelligence. All this is merely in addition to whichever additional capabilities are not evident from the limited description available, with the program as a whole presumably being operated in conjunction with other surveillance and propaganda assets controlled by the U.S. and its partners.”[13]

                          According to its internal e-mail from 2010 and 2011, HBGary was a prime contractor coordinating bids from Google, Apple, AT&T and others to build an expanded, upgraded version of the Romas/COIN information warfare system. Minor publicity attending the naming of these high profile vendors in the HBGary documents may have inspired the NASCAR-style sponsor logos decorating the dubious PRISM slides.

                          When HBGary’s e-mails were disclosed, the Odyssey bid was on hold with HBGary and its partners waiting for a revision in program requirements from the DoD. Two years have passed since HBGary was preparing to bid against Northrop Grumman for the prime contractor position on the Odyssey program. Odyssey should now be completed or nearing completion.

                          Is it possible that the PRISM leak was intended to mislead the American people into dramatically under-estimating the real domestic surveillance capabilities of our National Security Agency? You might well think so, but this reporter could not possibly comment.

                          Notes

                          1) Eric Schmitt, White House Orders New Computer Security Rules, New York Times, October 6, 2011
                          https://www.nytimes.com/2011/10/07/u...ity-rules.html
                          2) Glenn Greenwald interviews Edward Snowden, Guardian US, Sunday 9 June 2013
                          http://www.guardian.co.uk/world/vide...nterview-video
                          3) Are the NSA’s PRISM slides photoshopped?, Top Level Telecommunications, June 7, 2013
                          http://electrospaces.blogspot.nl/201...toshopped.html
                          4) Declan McCullagh, “No evidence of NSA’s ‘direct access’ to tech companies”, Wired, June 7, 2013 at
                          http://news.cnet.com/8301-13578_3-57...ech-companies/
                          5) Joanna Stern, NSA PRISM: Dissecting the Tech Companies’ Adamant Denials of Involvement in Government Spying Program, ABC News, June 7, 2013
                          http://abcnews.go.com/Technology/nsa...ry?id=19350095
                          6) Declan McCullagh, Justice Department tries to force Google to hand over user data, CNET News, May 31, 2013
                          http://news.cnet.com/8301-13578_3-57...ver-user-data/
                          Declan McCullagh, DOJ sends order to Twitter for WikiLeaks-related account info, CNET News, January 7, 2011
                          http://news.cnet.com/8301-31921_3-20027893-281.html
                          7) MAJ Gregg Powell and COL Charles Dunn III, Homeland Security: Requirements for Installation Security Decision Support Systems, Battle Command Battle Lab (Gordon), March 21, 2004
                          http://cryptome.org/2013/06/dhs-prism.pdf
                          8) Carl Rhodes, Jeff Hagen, Mark Westergren, A Strategies-to-Tasks Framework for Planning and Executing Intelligence, Surveillance, and Reconnaissance (ISR) Operations, RAND Corporation, 2007
                          http://www.rand.org/pubs/technical_reports/TR434.html
                          9) James R. Clapper, Director of National Intelligence, DNI Statement on Activities Authorized Under Section 702 of FISA, June 06, 2013
                          http://www.dni.gov/index.php/newsroo...on-702-of-fisa
                          10) Jerome Taylor, The US bank and the secret plan to destroy WikiLeaks, The Independent February 13, 2011
                          http://www.independent.co.uk/news/wo...s-2215059.html
                          11) Tim Worstall, NSA’s PRISM Sounds Like A Darn Good Idea To Me: This Is What Governments Are For, Forbes, June 7, 2011
                          http://www.forbes.com/sites/timworst...ments-are-for/
                          12) Peter Weber, Is the NSA PRISM leak much less than it seems?, Yahoo! News, Jun 10, 2013
                          http://news.yahoo.com/nsa-prism-leak...l?.tsrc=rtlde/
                          13) Barrett Brown, Romas/COIN, Project PM, http://wiki.echelon2.org/wiki/Romas/COIN,
                          See also Barrett Brown, A sinister cyber-surveillance scheme exposed, UK Guardian, June 22, 2011
                          http://www.guardian.co.uk/commentisf...king-anonymous

                          Steve Kinney
                          is an independent researcher and writer on computer and network security topics, with a long standing interest in the civil and human rights implications of Internet censorship and surveillance by State and corporate actors.

                          Comment


                          • #73
                            Re: NSA monitoring all Verizon users

                            welcome to the wilderness of mirrors! or as the daily show put it: "good news! you're not paranoid." [sponsored by tinfoil]

                            Comment


                            • #74
                              Re: NSA monitoring all Verizon users

                              Paranoia is often cured by discovery.

                              Comment


                              • #75
                                Re: NSA monitoring all Verizon users

                                Originally posted by reggie View Post
                                No, the problem is that the system was designed from the ground-up to create a stable-state in a target system, in this case the system is the public and the stable-state is any state the owners of that system desire. No one is spying on your private data, except for in a few select cases. On the other hand, massive amounts of data is analyzed in order to assess the public mind and how to "adjust" it. This latter part of the system goals was always part of the design, and so access to data was always a key requirement. This latest news cycle is ridiculous given the original architect's desires, and hence it can only be concluded that these current media releases are for continued conditioning of the public mind.

                                May I suggest one embark upon an understanding of information and it's key role in a system by reading the following...


                                Information and Consciousness: A Critique of the Mechanistic Concept of Information

                                by Søren Brier:
                                http://www.imprint.co.uk/C&HK/vol1/v1-23sbr.htm

                                You are adding detail to my statement rather than refuting it. Its round. Its a basketball.

                                Comment

                                Working...
                                X