. "To pretend the NSA lacks the ability to simply tap this new cable run...Or to pretend that they may be using hardware, protocols or other software that have been compromised to connect to the existing unsecure network. [ reply to this | link to this | view in thread ]" . . . .