Home » Posts tagged 'nsa'

Tag Archives: nsa

Olduvai
Click on image to purchase

Olduvai III: Catacylsm
Click on image to purchase

Post categories

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai III: Cataclysm
Click on image to purchase

The Government Is Lying to Us About Cybersecurity

The Government Is Lying to Us About Cybersecurity

The Department of Justice is full of excuses for wanting back doors into encryption systems, but they’re just that: excuses.

In a press conference, Deputy Attorney General Rod Rosenstein stated that the “absolutist position” that strong encryption should be, by definition, unbreakable is “unreasonable.”

The DOJ is lying about three things:

First

The US government works against the security of businesses. Just this week, I had to tell Apple that my iPhone app did not have certain kinds of encryption that the U.S. government has export control on. Encryption export controls cripple the security and innovation of software products made by American businesses.  

Furthermore, the U.S. government hoards software exploits so it can hack into your computer rather than publish them that so companies can patch their products. The NSA intentionally sneaks weaknesses into protocols and bribes businesses to add holes to security products so it can steal the data of their customers.

The only “cybersecurity” that the government cares about is its ability to conduct surveillance and attacks on political targets.

When businesses want to improve the security of their products, they offer rewards for exploits – Microsoft pays up to $250,000 per exploit, Facebook has paid $40,000, and so on. The NSA purchases millions of dollars of exploits from hackers and uses them to spy on the entire world, including U.S. citizens. Unfortunately, the NSA is incompetent at keeping secrets, so it lost their exploit database and caused millions of computers to be infected and hijacked with the exploits they hoarded.The hardware and software pieces of both the Internet and individual user’s computers are made by private companies. There is nothing the U.S. government can do to improve “cybersecurity” other than prosecuting criminal behavior.  However, the U.S. government prosecutes a minuscule proportion of cybercrime.

…click on the above link to read the rest of the article…

How to Protect Yourself Online, No Matter Your Security Needs

How to Protect Yourself Online, No Matter Your Security Needs

Find a balance between security and convenience that is appropriate for your life.

Almost every week, it seems that there is some kind of major security breach. Whether celebrity nudes, the social security numbers of the majority of Americans, or a Bitcoin heist, it seems that our private data is under constant attack.

The Internet and your co-workers are full of advice: put a sticker over your webcam, disable Flash/Java in your browser, encrypt your drives, delete your Facebook account, cover your hand while using the ATM, get a burner phone, pay for everything with cash, start wearing a tinfoil hat to protect against the NSA’s spy rays, etc.

The reality is that as more and more of our lives become digital, information security becomes increasingly important. Many bad things can happen when your privacy is breached: from finding out that you have a boat loan that you didn’t know about to having your naked photos all over the web to being thrown in jail because the government doesn’t approve what you have to say. It’s important to take appropriate measures to protect yourself, but what is appropriate for you really depends on the kind of secrets you have to keep and the kinds of threats you need to protect against.

Let’s consider three people who care about their privacy, and steps they should take to keep their stuff private:

Lisa Monroe

Lisa Monroe lives in Madison, Wisconsin. She is a college student with a part-time job.  She just got her first credit card, and just started going steady with a boyfriend.

To keep her private photos private, Lisa only sends them using Snapchat.

Lisa doesn’t have many secrets to keep, but she is worried about fraud to her credit and debit cards and the naughty pics she trades with her boyfriend Brad.

…click on the above link to read the rest of the article…

“False Flags” Are So Common that U.S. Officials Commonly Discuss Them

“False Flags” Are So Common that U.S. Officials Commonly Discuss Them

Despite the attempt to marginalize the concept, “false flags” are so common that U.S. officials frequentlyuse that phrase.

For example, Colonel Lawrence Wilkerson, former chief of staff to Colin Powell:

Former Director for Transnational Threats on the U.S. National Security Council, Roger Cressey:

Former CIA counterterrorism official Philip Mudd:

Lieutenant General Thomas McInerney, a high ranking Air Force official:

Former U.S. Ambassador to the United Nations (and Neocon warmonger) John Bolton:

The Washington Post notes that Secretary of Defense Donald Rumsfeld approved as an acceptable interrogation method

A technique known as “false flag,” or deceiving a detainee into believing he is being interrogated by someone from another country.

NBC News points out:

In another document taken from the NSA by Snowden and obtained by NBC News, a JTRIG official said the unit’s mission included computer network attacks, disruption, “Active Covert Internet Operations,” and “Covert Technical Operations.” Among the methods listed in the document were jamming phones, computers and email accounts and masquerading as an enemy in a “false flag” operation. The same document said GCHQ was increasing its emphasis on using cyber tools to attack adversaries.

Washington’s Blog asked high-level NSA official Bill Binney* if he had heard of the term “false flags” when he was with the NSA.

Binney responded:

Sure, they were under deception and manipulation programs.  I was not involved in doing them; but, I did have to figure out some that the other side was doing.  The other side called them “dezsinformatsiya” and Manipulatsiya.”

The Brits have been doing this for several hundred years and are quite good at it.

Washington’s Blog asked Philip Giraldi – a former counter-terrorism specialist and military intelligence officer with the CIA – the same question with regards to his experience with the CIA.

…click on the above link to read the rest of the article…

What the Kennedy Assassination Records Reveal: Uncontrollable Incompetence

What the Kennedy Assassination Records Reveal: Uncontrollable Incompetence

Imagine Harvey Weinstein wielding a “top secret” stamp to block any exposure of the uncomfortable truth and you have the FBI, CIA and NSA.

One way to interpret the intelligence community’s reluctance to let all the Kennedy assassination archives become public is that the archives contain evidence of a “smoking gun”: that is, evidence that the intelligence agencies of the United States of America were complicit in the assassination of the President.

I think the agencies fear something larger: exposure of their gross incompetence, their “cowboy” recklessness and their disavowal of elected-civilian control. Their fear of this exposure is based on one simple fact: nothing’s changed since 1963. They were unaccountable and incompetent then, and they remain unaccountable and incompetent now. The only difference is their funding has greatly increased.

We rarely get an insider’s glimpse of the intelligence community’s pettiness, hubris and incompetence. The Ministry of Propaganda is tasked with showing the NSA, CIA, FBI, et al. as super-competent, super-dedicated, and focused on defeating evil (which is always presented as unambiguously evil, i.e. anti-American.)

Although it’s 30 years old, I still recommend this account of a top MI5 (U.K.) officer, SpyCatcher: The Candid Autobiography of a Senior Intelligence Officer.

I’ve read many books on the intelligence community, but few (if any) reveal the inter-agency rivalries and bad blood that (as far as I can tell) still exist beneath a formal veneer of co-operation. The CIA and FBI were always envious of the NSA’s SigInt (signal intelligence, i.e. eavesdropping), and so they’ve attempted to create their own versions, with laughably incompetent results in the case of the FBI’s “Russians stole the election” inquiry.

…click on the above link to read the rest of the article…

In Shocking, Viral Interview, Qatar Confesses Secrets Behind Syrian War

In Shocking, Viral Interview, Qatar Confesses Secrets Behind Syrian War

 A television interview of a top Qatari official confessing the truth behind the origins of the war in Syria is going viral across Arabic social media during the same week a leaked top secret NSA document was published which confirms that the armed opposition in Syria was under the direct command of foreign governments from the early years of the conflict.

And according to a well-known Syria analyst and economic adviser with close contacts in the Syrian government, the explosive interview constitutes a high level “public admission to collusion and coordination between four countries to destabilize an independent state, [including] possible support for Nusra/al-Qaeda.” Importantly, “this admission will help build case for what Damascus sees as an attack on its security & sovereignty. It will form basis for compensation claims.”

A 2013 London press conference: Qatari Prime Minister Sheikh Hamad bin Jassim bin Jabr Al Thani with U.S. Secretary of State John Kerry. A 2014 Hillary Clinton email confirmed Qatar as a state-sponsor of ISIS during that same time period. 

As the war in Syria continues slowly winding down, it seems new source material comes out on an almost a weekly basis in the form of testimonials of top officials involved in destabilizing Syria, and even occasional leaked emails and documents which further detail covert regime change operations against the Assad government. Though much of this content serves to confirm what has already long been known by those who have never accepted the simplistic propaganda which has dominated mainstream media, details continue to fall in place, providing future historians with a clearer picture of the true nature of the war.

…click on the above link to read the rest of the article…

 

NSA Concealed Records on JFK Assassination for Decades

THERE IS SOMETHING perverse about the fact that President Donald Trump, the exuberant and all-too-successful spinner of conspiracy theories, and deeply ignorant of American history besides, will oversee the release of the remaining classified files related to the assassination of his presidential predecessor, John F. Kennedy.

In 1992, Congress approved, and former President George H.W. Bush signed, the John F. Kennedy Assassination Records Collection Act. They were prodded by an Oliver Stone film on the killing released the year prior and the resulting flurry of public interest. The act mandated the disclosure of all assassination-related records no later than 25 years after its signing, by October 26, 2017 — this Thursday.

While federal agencies can contest the release of the documents on the grounds of “identifiable harm to the military defense, intelligence operations, law enforcement, or conduct of foreign relations” that “outweighs the public interest in disclosure,” according to the act, the chief executive gets the final say in all such cases. In other words, much of what we can still hope to learn about the JFK assassination hinges on Trump.

The estimated 113,000 pages of material, presently with the National Archives, are known from metadata searches to contain extensive mentions of Cuba and the former Soviet Union. Two documents provided by National Security Agency whistleblower Edward Snowden and published for the first time today further underline how closely the intelligence community has held information related to Cuba’s potential role in the killing, indicating that the NSA for decades has kept secret its efforts to monitor Cuban agents’ communications in the aftermath of the event.

…click on the above link to read the rest of the article…

NSA Document Says Saudi Prince Directly Ordered Coordinated Attack by Syrian Rebels on Damascus

A LOOSELY KNIT collection of Syrian rebel fighters set up positions on March 18, 2013, and fired several barrages of rockets at targets in the heart of Damascus, Bashar al-Assad’s capital. The attack was a brazen show of force by rebels under the banner of the Free Syrian Army, targeting the presidential palace, Damascus International Airport, and a government security compound. It sent a chilling message to the regime about its increasingly shaky hold on the country, two years after an uprising against its rule began.

Behind the attacks, the influence of a foreign power loomed. According to a top-secret National Security Agency document provided by whistleblower Edward Snowden, the March 2013 rocket attacks were directly ordered by a member of the Saudi royal family, Prince Salman bin Sultan, to help mark the second anniversary of the Syrian revolution. Salman had provided 120 tons of explosives and other weaponry to opposition forces, giving them instructions to “light up Damascus” and “flatten” the airport, the document, produced by U.S. government surveillance on Syrian opposition factions, shows.

The Saudis were long bent on unseating Assad. Salman was one of the key Saudi officials responsible for prosecuting the war in Syria, serving as a high-ranking intelligence official before being promoted to deputy minister of defense later in 2013.

The NSA document provides a glimpse into how the war had evolved from its early stages of popular uprisings and repression. By the time of the March 2013 attack, arguably the most salient dynamic in the conflict was the foreign powers on both sides fueling what appeared to be a bloody, entrenched stalemate. The document points to how deeply these foreign powers would become involved in parts of the armed uprising, even choosing specific operations for their local allies to carry out.

…click on the above link to read the rest of the article…

The Legacy of Reagan’s Civilian ‘Psyops’ 

The Legacy of Reagan’s Civilian ‘Psyops’ 

Special Report: When the Reagan administration launched peacetime “psyops” in the mid-1980s, it pulled in civilian agencies to help spread these still-ongoing techniques of deception and manipulation, reports Robert Parry.


Declassified records from the Reagan presidential library show how the U.S. government enlisted civilian agencies in psychological operations designed to exploit information as a way to manipulate the behavior of targeted foreign audiences and, at least indirectly, American citizens.

Walter Raymond Jr., a CIA propaganda and disinformation specialist who oversaw President Reagan’s “psyops” and “perception management” projects at the National Security Council. Raymond is partially obscured by President Reagan. Raymond is seated next to National Security Adviser John Poindexter. (Photo credit: Reagan presidential library)

A just-declassified sign-in sheet for a meeting of an inter-agency “psyops” committee on Oct. 24, 1986, shows representatives from the Agency for International Development (USAID), the State Department, and the U.S. Information Agency (USIA) joining officials from the Central Intelligence Agency and the Defense Department.

Some of the names of officials from the CIA and Pentagon remain classified more than three decades later. But the significance of the document is that it reveals how agencies that were traditionally assigned to global development (USAID) or international information (USIA) were incorporated into the U.S. government’s strategies for peacetime psyops, a military technique for breaking the will of a wartime enemy by spreading lies, confusion and terror.

Essentially, psyops play on the cultural weaknesses of a target population so they could be more easily controlled or defeated, but the Reagan administration was taking the concept outside the traditional bounds of warfare and applying psyops to any time when the U.S. government could claim some threat to America.

…click on the above link to read the rest of the article…

Trump Administration Lobbying Hard for Sweeping Surveillance Law

Admiral Mike Rogers, Director of the National Security Agency (NSA), testifies about the Fiscal Year 2018 budget request for US Cyber Command during a House Armed Services Committee hearing on Capitol Hill in Washington, DC, May 23, 2017. / AFP PHOTO / SAUL LOEB        (Photo credit should read SAUL LOEB/AFP/Getty Images)
Photo: Saul Loeb/AFP/Getty Images

THE TRUMP ADMINISTRATION is pushing hard for the reauthorization of a key 2008 surveillance law — section 702 of the Foreign Intelligence Surveillance Act, known as FISA — three months before it sunsets in December.

To persuade senators to reauthorize the law in full, the Trump administration is holding classified, members-only briefings for the entire House and Senate next Wednesday, with heavy hitters in attendance: Attorney General Jeff Sessions, Director of National Intelligence Dan Coats, NSA Director Mike Rogers, and FBI Director Christopher Wray will give the briefings, according to an internal announcement of the meetings provided to The Intercept and confirmed by multiple sources on Capitol Hill.

Section 702 serves as the legal basis for two of the NSA’s largest mass surveillance programs, both revealed by Edward Snowden. One program, PRISM, allows the government to collect messaging data sent to and from foreign targets, from major internet companies like Google, Facebook, Apple, and Microsoft. The other, UPSTREAM, scans internet backbone sites in the U.S. and copies communications to and from foreign targets.

Both programs ostensibly only “target” foreigners, but likely collect massive amounts of Americans’ communications as well. And despite persistent questioning from members of Congress, the Obama and Trump administrations have repeatedly refused to provide an estimate of how many domestic communications the programs collect. Civil liberties advocates have long warned liberal defenders of the program under President Obama that one day the surveillance apparatus may fall into the hands of a president with little regard for rule of law or constitutional protections.

Privacy activists have also raised concerns about how the data is shared with law enforcement, and routinely used for purposes unrelated to national security. The FBI frequently conducts “backdoor searches” on the data during ordinary criminal investigations, which allows them access to Americans’ communications without having to get a warrant.

…click on the above link to read the rest of the article…

How the NSA Built a Secret Surveillance Network for Ethiopia

Photo: Minasse Wondimu Hailu/Anadolu Agency/Getty Images

“A WARM FRIENDSHIP connects the Ethiopian and American people,” U.S. Secretary of State Rex Tillerson announced earlier this year. “We remain committed to working with Ethiopia to foster liberty, democracy, economic growth, protection of human rights, and the rule of law.”

Indeed, the website for the U.S. Embassy in Ethiopia is marked by press releases touting U.S. aid for farmers and support for public health infrastructure in that East African nation. “Ethiopia remains among the most effective development partners, particularly in the areas of health care, education, and food security,” says the State Department.

Behind the scenes, however, Ethiopia and the U.S. are bound together by long-standing relationships built on far more than dairy processing equipment or health centers to treat people with HIV. Fifteen years ago, the U.S. began setting up very different centers, filled with technology that is not normally associated with the protection of human rights.

In the aftermath of 9/11, according to classified U.S. documents published Wednesday by The Intercept, the National Security Agency forged a relationship with the Ethiopian government that has expanded exponentially over the years. What began as one small facility soon grew into a network of clandestine eavesdropping outposts designed to listen in on the communications of Ethiopians and their neighbors across the Horn of Africa in the name of counterterrorism.

In exchange for local knowledge and an advantageous location, the NSA provided the East African nation with technology and training integral to electronic surveillance. “Ethiopia’s position provides the partnership unique access to the targets,” a commander of the U.S. spying operation wrote in a classified 2005 report. (The report is one of 294 internal NSA newsletters released today by The Intercept.)

…click on the above link to read the rest of the article…

Bill in Congress to Fund CIA & NSA Outlaws Wikileaks

Bill in Congress to Fund CIA & NSA Outlaws Wikileaks

Bill in Congress to Fund CIA & NSA Outlaws Wikileaks

The bill in Congress to fund US intelligence services includes a provision, Sec. 623, which states:

SEC. 623. SENSE OF CONGRESS ON WIKILEAKS.

It is the sense of Congress that WikiLeaks and the senior leadership of WikiLeaks resemble a non-state hostile intelligence service often abetted by state actors and should be treated as such a service by the United States.

In other words: if this bill passes, Wikileaks will be categorized by US Intelligence in the same way as will the intelligence services of Russia, Iran, Syria, North Korea, and other countries that the US Government wants to conquer. (Whereas the Cold War ended in 1991 on the Russian side, it secretly has continued on the American side.) Cooperation with Wikileaks would then be treated by the US Government as treachery, the same as cooperation with Soviet intelligence was treated when the Republican Joseph R. McCarthy (backed by the Democratic Party’s Kennedy family) held sway over the US Senate, from 9 February 1950 to 9 March 1954. Though this was the situation during the Cold War (prior to its having been ended by Russia in 1991), the time when there existed an authentic ideological reason for the US Establishment’s opposition to the Soviet Union’s ruling Establishment (and when there existed not only the ongoing thirst for conquest of the entire world by the US aristocracy), America’s Establishment (the aristocracy and its agents) is trying to restore that hostility now, 26 years after 1991, which was the year when the Soviet Union broke up, and after which, only Russia remained, and when communism had ended, and when the Soviet Union’s military alliance with the Soviet Union’s surrounding nations, the Warsaw Pact (mirroring America’s NATO), also ended — all of that happening in 1991.

…click on the above link to read the rest of the article…

The United States of Hubris

The United States of Hubris

If anyone should have any questions about whether the United States of America is not the most aggressive, warlike, and terroristic nation on the face of the earth, its latest proposed action against the supposed rogue state of North Korea should allay any such doubts.

Last week, the US circulated a draft resolution which it intends to present to the UN Security Council that would give the American Navy and Air Force the power to interdict North Korean ships at sea to determine if they were transporting “weaponry material” or fuel and that US forces would be given “the right” to use “all necessary measures” to “enforce compliance.”*

Not surprisingly, Nikky Haley, the blood-thirsty and incompetent American Ambassador to the UN, has enthusiastically backed the resolution, utterly clueless of its ramifications if passed, the most horrific of which would be the igniting of WWIII.  Trump’s selection of the neocon mouthpiece as UN Ambassador has been a disaster on several fronts: first, it was an early and quite telling sell out of his political base whom he promised an American First foreign policy of less belligerency and intervention.  Second, Haley had no foreign policy experience and has made a fool of herself internationally on more than one occasion with her inane statements.

That the US is even considering such a provocative scheme once again shows the hubris which exists within its vast corridors of power.  Any other country which would suggest such an audacious act would be rightly condemned, ostracized, and labeled as a rogue state.  Yet, it is US lawmakers, policy wonks, and the CIA/NSA-directed American press corps that charge others (mostly those who do not kowtow to US dictates) of “terrorism.”

…click on the above link to read the rest of the article…

Your Bitcoin is NOT Anonymous: IRS Moves To Track Bitcoiners With New Chain Analysis Tools

Your Bitcoin is NOT Anonymous: IRS Moves To Track Bitcoiners With New Chain Analysis Tools

bitcoin-2

Last month Alt-Market.com founder Brandon Smith warned that Bitcoin may not be all that it’s cracked up to be in terms of its purported anonymity:

For years, one of the major original selling points of bitcoin was that it was “anonymous.” It always surprised me that so many people in the liberty movement bought into this scam. Surely after the revelations exposed by Edward Snowden and organizations like Wikileaks, it is utterly foolish to believe that anything in the digital world is truly “anonymous.” The feds have been proving there is no anonymity, even in bitcoin, for some time, as multiple arrests using bitcoin tracking have indeed occurred when the FBI decided it was in their interest. Meaning, when the feds want to track bitcoin transactions, they can, and it does not matter how well the people involved covered their actions.

Because every transaction exists on a public blockchain ledger, an enterprising organization – say like the NSA or IRS – could conceivably implement blockchain analysis tools to track down Bitcoin fund transfers around the globe. These days most bitcoin transactions are originated on “trusted” exchanges that exist in Western nations, where governments have always found new and innovative ways to ensure citizens have no privacy whatsoever, especially when it comes to personal finances. This means that there is more than likely a record of your original Bitcoin transaction, perhaps involving a credit card or bank transfer, and if regulators ask an exchange to turn over the information you can bet they’ll do so in order to avoid unwanted government scrutiny. Moreover, most exchanges now require a driver’s license, passport and even a phone number in order to approve your account for trading.

…click on the above link to read the rest of the article…

How many Americans are swept up in the NSA’s snooping programs?

How many Americans are swept up in the NSA’s snooping programs?

How many Americans are swept up in the NSA's snooping programs?
© Getty Images

Former Director of National Intelligence James Clapper famously (or infamously) told Congress the National Security Agency did not “wittingly” collect data on Americans. That turned out to be false.

More recently, Sen. Ron Wyden (D-Ore.) asked the current director of national intelligence, Dan Coats whether the government could use Section 702 of the Foreign Intelligence Surveillance Act “to collect communications it knows are entirely domestic.”

“Not to my knowledge. That would be illegal,” Coats responded.

However, a subsequent letter from Coats’ office to Wyden’s office suggests the director’s answer was incomplete. The Office of the Director of National Intelligence clarified that “section 702(b)(4) plainly states we ‘may not intentionally acquire any communication as to which the sender and all intended recipients are known at the time of acquisition to be located in the United States.’ The DNI interpreted Senator Wyden’s question to ask about this provision and answered accordingly.”

Wyden has since gone on record with his contention that the DNI did not answer his question, requesting the office provide a public response. The exchange offers insight into how intelligence agencies use semantics to obfuscate their activities, while also illustrating the frustration many privacy advocates and lawmakers encounter in the search for Section 702 surveillance transparency.

FISA Section 702 authorizes two major NSA snooping programs. One is “upstream” collection, a process in which the NSA collects digital communications through the internet’s backbone — undersea cables that process large volumes of internet traffic, which internet service providers send to the government. The government attempts to sort the data for foreign targets’ information and then is supposed to discard the rest.

…click on the above link to read the rest of the article…

EXCLUSIVE: Documents expose how Hollywood promotes war on behalf of the Pentagon, CIA and NSA

EXCLUSIVE: Documents expose how Hollywood promotes war on behalf of the Pentagon, CIA and NSA

US military intelligence agencies have influenced over 1,800 movies and TV shows

Plato’s Cave reimagined for the Hollywood era — copyright Derek Swansonn

Tom Secker and Matthew Alford report on their astonishing findings from trawling through thousands of new US military and intelligence documents obtained under the Freedom of Information Act.

The documents reveal for the first time the vast scale of US government control in Hollywood, including the ability to manipulate scripts or even prevent films too critical of the Pentagon from being made — not to mention influencing some of the most popular film franchises in recent years.

This raises new questions not only about the way censorship works in the modern entertainment industry, but also about Hollywood’s little known role as a propaganda machine for the US national security apparatus.


When we first looked at the relationship between politics, film and television at the turn of the 21st century, we accepted the consensus opinion that a small office at the Pentagon had, on request, assisted the production of around 200 movies throughout the history of modern media, with minimal input on the scripts.

How ignorant we were.

More appropriately, how misled we had been.

We have recently acquired 4,000 new pages of documents from the Pentagon and CIA through the Freedom of Information Act. For us, these documents were the final nail in the coffin.

These documents for the first time demonstrate that the US government has worked behind the scenes on over 800 major movies and more than 1,000 TV titles.

The previous best estimate, in a dry academic book way back in 2005, was that the Pentagon had worked on less than 600 films and an unspecified handful of television shows.

…click on the above link to read the rest of the article…

Olduvai II: Exodus
Click on image to purchase

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai III: Cataclysm
Click on image to purchase