Home » Posts tagged 'nsa'

Tag Archives: nsa

Olduvai
Click on image to purchase

Olduvai III: Catacylsm
Click on image to purchase

Post categories

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai III: Cataclysm
Click on image to purchase

Will Elections ever be Valid Any More?

QUESTION: Mr. Armstrong; You have stated that you believe Kennedy was assassinated by the US Intelligence community. Given all this stuff with Comey, FBI, CIA, and NSA all conspiring against Trump, do you think that the real risk of interfering with our elections is not the Russians but closer to home? Is this a practice that always takes place that we are just suddenly becoming aware of these days?

Thank you

see you in Orlando

LD

ANSWER: Absolutely. It is being called Spygate and it is very disturbing. The Democrats did absolutely everything to put Hillary in office. They thought they won. They had the press in their pocket like CNN, New York Times, and the Washington Post leading a host of others. We have to realize that Democracy is dead. I really do fear that Trump will be the LAST democratically elected president. What comes after Trump is not going to be warm and endearing.

Politicians have been rigging elections since ancient times. There can be no greater example of political corruption that required desperate reform than the calendar. Cato or the more moderate Cicero both criticized Julius Caesar who became pontifex max (high priest) taking charge of the calendar. The Romans used the moon calendar but knew it was incorrect and thus it required adjustments by inserting days. The corruption degenerated to such a point that elections could be postponed by the insertion of days. This realization led to bribing the high priest to even insert months to affect the political elections. This is why Julius Caesar revised the calendar to eliminate the political corruption. Moreover, interest rates would rise during elections because of the amount of money being paid out in bribing votes.

…click on the above link to read the rest of the article…

European Court Rules NSA Surveillance Practices Violate Human Rights

(ANTIMEDIA) — Last week, the European Court of Human Rights ruled that the U.K.’s GCHQ spy agency is in violation of the European Convention on Human Rights with its mass surveillance programs. The court ultimately found that these activities violate the family and privacy rights of British and European citizens, and this assertion ultimately includes a rejection of the United States’ activities considering GCHQ has obtained much of its data from the NSA.

The suit was brought by Amnesty International, Big Brother Watch, the ACLU, the Bureau of Investigative Journalism, and other civil liberties groups. It addresses provisions of the U.K.’s 2000 Investigatory Powers Act, and though a new version of the law was passed in 2016 and is yet to be enacted, many of the issues the court identified remain in the 2016 bill.

Though the court stopped short of saying intelligence sharing between agencies like GCHQ, NSA, and members of the “Five Eyes” spying alliance violate the human rights convention, it said “using such intelligence sharing to bypass restrictions on surveillance of a member state’s own citizens would be a violation of the charter,” Ars Technica summarized. (In a 2015 ruling, a U.K. court ruled intelligence sharing did, in fact, violate European law).

The Guardian clarified the ruling, which found some activities are in violation of the charter but maintained others are not:

By a majority of five to two votes, the Strasbourg judges found that GCHQ’s bulk interception regime violated article 8 of the European convention on human rights, which guarantees privacy, because there were said to be insufficient safeguards, and rules governing the selection of ‘related communications data’ were deemed to be inadequate.

…click on the above link to read the rest of the article…

The Ritual Burial of the US Constitution

The Ritual Burial of the US Constitution

Winslow Homer Salt Kettle, Bermuda 1899

In the wake of a number of the Lehman and 9/11 commemorations in America, and as a monster storm is once again threatening to cause outsize damage, we find ourselves at a pivotal point in time, which will decide how the country interacts with its own laws, its legal system, its Constitution, its freedom of speech, and indeed if it has sufficient willpower left to adhere to the Constitution as its no. 1 guiding principle.

The main problem is that it all seems to slip slide straight by the people, who are -kept- busy with completely different issues. That is convenient for those who would like less focus on the Constitution, but it’s also very dangerous for everyone else. Americans should today stand up for freedom of speech, or it will be gone, likely forever.

The way it works is that president Trump is portrayed as the major threat to ‘the rule of law’, which allows other people, as well as companies and organizations, to drop below the radar and devise and work on plans and schemes that threaten the country itself, and its future as a nation ruled by its laws.

Bob Woodward’s book “Fear: Trump in the White House” and the anonymous op-ed published in the NYT a day later serve as a good reminder of these dynamics. If you succeed in confirming people’s idea that Trump is such an unhinged idiot that an unelected cabal inside the White House is needed to save the nation from the president it elected, you’re well on your way.

Well on your way to separate the country from its own laws, that is. Not on your way to saving it. You can’t save America by suspending its Constitution just because that suits your particular political goals or points of view.

…click on the above link to read the rest of the article…

The Ritual Burial of the US Constitution

Winslow Homer Salt Kettle, Bermuda 1899

In the wake of a number of the Lehman and 9/11 commemorations in America, and as a monster storm is once again threatening to cause outsize damage, we find ourselves at a pivotal point in time, which will decide how the country interacts with its own laws, its legal system, its Constitution, its freedom of speech, and indeed if it has sufficient willpower left to adhere to the Constitution as its no. 1 guiding principle.

The main problem is that it all seems to slip slide straight by the people, who are -kept- busy with completely different issues. That is convenient for those who would like less focus on the Constitution, but it’s also very dangerous for everyone else. Americans should today stand up for freedom of speech, or it will be gone, likely forever.

The way it works is that president Trump is portrayed as the major threat to ‘the rule of law’, which allows other people, as well as companies and organizations, to drop below the radar and devise and work on plans and schemes that threaten the country itself, and its future as a nation ruled by its laws.

Bob Woodward’s book “Fear: Trump in the White House” and the anonymous op-ed published in the NYT a day later serve as a good reminder of these dynamics. If you succeed in confirming people’s idea that Trump is such an unhinged idiot that an unelected cabal inside the White House is needed to save the nation from the president it elected, you’re well on your way.

Well on your way to separate the country from its own laws, that is. Not on your way to saving it. You can’t save America by suspending its Constitution just because that suits your particular political goals or points of view.

…click on the above link to read the rest of the article…

Towers to Heaven: The Alchemy of Prophecy, Terror, and Unity

Towers to Heaven: The Alchemy of Prophecy, Terror, and Unity

They had as king over them the angel of the Abyss, whose name in Hebrew is Abaddon and in Greek is Apollyon (that is, Destroyer).

– Revelation 9:11

At the end of last month, I read an article that claimed Special Counsel Robert Mueller’s investigation was foretold by a “20 Year Old Movie”. The film was a 1998 thriller entitled “Enemy of the State” starring Will Smith and Gene Hackman.

My curiosity aroused, I selected the show from my electronic catalog and watched it unwind; similar to the way I once queued up songs on jukeboxes in the halcyon days preceding the matrix.

In the film, Gene Hackman played an Edward Snowden-type National Security Agency (NSA) contractor gone rogue who revealed to the viewers the U.S. government’s high-tech surveillance capabilities. Two decades ago when the film was released, the surveillance grid disclosed therein would have seemed far-fetched. But not today. Now, in the aftermath of 911, the Patriot Act, and the Snowden revelations, those capabilities are not only common knowledge, but are the subjects of ongoing daily headlines.

The antagonist in the film was played by Jon Voight, a power-hungry NSA bureaucrat who assembled a team of technology experts and security agents that blackmailed Congress and even murdered a senator.  The politician was killed to aid the passing of a Patriot Act-style bill that would have, in effect, drilled the final screw into the coffin of the Fourth Amendment.

The film called to mind multiple recent news stories ranging from high-tech espionage, to social media spying and censorship, to CIA programs like UMBRAGE which masquerades as computer hacks by foreign governments, to the Awan brothers and the murder of former Democratic National Committee (DNC) staffer Seth Rich.  Essentially, the plot demonstrated Senator Chuck Schumer’s warning to President Donald Trump in an MSNBC interview on January 3rd, 2017:

…click on the above link to read the rest of the article…

The Sun Does Not Revolve Around the US

The Sun Does Not Revolve Around the US

While visiting Galileo’s house in Florence, Jean Ranc reflected on how America thinks the world revolves around it, as it was once falsely thought the sun revolves around the earth.


On a sunny day last January, my visit to Florence took me deep into the Tuscan hills where a conference titled, “The America of Trump, the Russia of Putin. And Europe?” had taken place, sponsored by the Fondazione Spadolini and the European University Institute. I visited the Fondazione to learn more about the conference, but on my return to Florence down the mountain, it was the Villa Galileo just across the road from a small trattoria where I had stopped, that truly intrigued me.

My on-line search that evening revealed that indeed, it had been the last home of Galileo after his trial as a “heretic.” To save himself from torture and execution, he denied his heliocentric vision and lived under villa arrest from 1631 until he died in 1642. I had stumbled upon the very site of one of the Inquisition’s most infamous persecutions.

A grim reminder of a 21st Century Inquisition we’re living through.

The villa where Galileo spent his remaining years under arrest.(Wikimedia Commons)

I thought of present-day truth-tellers being hounded by contemporary inquisitors just as Galileo had been persecuted. Tellers of truth such as Edward Snowden, who revealed the extent of illegal mass surveillance; Chelsea Manning, imprisoned seven years for revealing U.S. brutality in Iraq and Afghanistan; Julian Assange locked up in London’s Ecuadorian Embassy as an exile since August 2012 for publishing leaked U.S. secrets in Wikileaks; and Katharine Gun, a British whistleblower who faced two years in prison before her case was dropped for exposing the NSA’s spying on U.N. Security Council nations before a vote to consider authorizing the 2003 invasion of Iraq.

Continuing Empire

…click on the above link to read the rest of the article…

NSA Cracked Open Encrypted Networks of Russian Airlines, Al Jazeera, and Other “High Potential” Targets

FILE -- In this Nov. 1, 2006 file photo, a Qatari employee of Al Jazeera Arabic language TV news channel walks past the logo of Al Jazeera in Doha, Qatar. Hackers allegedly broke into the website of Qatar's state-run news agency and published a fake story quoting the ruling emir, authorities there said Wednesday, May 24, 2017, as Saudi Arabia and the United Arab Emirates responded by blocking Qatari media, including broadcaster Al-Jazeera. (AP Photo/Kamran Jebreili, File)
Photo: Kamran Jebreili/AP

NSA CRACKED OPEN ENCRYPTED NETWORKS OF RUSSIAN AIRLINES, AL JAZEERA, AND OTHER “HIGH POTENTIAL” TARGETS

THE NATIONAL SECURITY AGENCY successfully broke the encryption on a number of “high potential” virtual private networks, including those of media organization Al Jazeera, the Iraqi military and internet service organizations, and a number of airline reservation systems, according to a March 2006 NSA document.A virtual private network, or VPN, uses an encrypted connection to enable users to go over the internet and connect to a private network, such as a corporate intranet. This allows an organization’s staff to access internal services like file-sharing servers or private wikis without having to physically be in the office.

The NSA’s ability to crack into sensitive VPNs belonging to large organizations, all the way back in 2006, raises broader questions about the security of such networks. Many consumers pay for access to VPNs in order to mask the origin of their internet traffic from the sites they visit, hide their surfing habits from their internet service providers, and to protect against eavesdroppers on public Wi-Fi networks.

The fact that the NSA spied on Al Jazeera’s communications was reported by the German newsmagazine Der Spiegel in 2013, but that reporting did not mention that the spying was accomplished through the NSA’s compromise of Al Jazeera’s VPN. During the Bush administration, high-ranking U.S. officials criticized Al Jazeera, accusing the Qatar-based news organization of having an anti-American bias, including because it broadcasted taped messages from Osama bin Laden.

“Both protocols offer a zillion configurable options, which is a source of a lot of the vulnerabilities.”

At the time, Al Jazeera defended itself against this criticism, insisting that its reporting was objective. “Osama bin Laden, like it or not, is a party to this present crisis,” news editor Ahmed Al Sheikh told the BBC in 2001.

…click on the above link to read the rest of the article…

Edward Snowden: 5 years in Russia and still relevant as ever

Edward Snowden: 5 years in Russia and still relevant as ever

Edward Snowden changed the practices of both the internal and external focused US and global intelligence agencies.

TASS reported that August 1 was the five year anniversary of Edward Snowden’s being granted temporary asylum in the Russian Federation. This happened after his release of an enormous trove of information showing clandestine and illegal practices being carried out by the US intelligence agencies to gather information on just about anyone in the world, for any – or no – reason at all.

Edward Snowden, 35, is a computer security expert. In 2005-2008, he worked at the University of Maryland’s Center for Advanced Study of Language sponsored by the National Security Agency (NSA) and at the global communications division at CIA headquarters in Langley, Virginia. In 2007, Snowden was stationed with diplomatic cover at the US mission to the United Nations in Geneva, Switzerland. In 2009, he resigned from the CIA to join the Dell company that sent him to Hawaii to work for the NSA’s information-sharing office. He was particularly employed with the Booz Allen Hamilton consulting firm.

In June 2013, Snowden leaked classified information to journalists Glenn Greenwald and Laura Poitras, which revealed global surveillance programs run by US and British intelligence agencies. He explained the move by saying that he wanted to tell the world the truth because he believed such large-scale surveillance on innocent citizens was unacceptable and the public needed to know about it.

The Guardian and The Washington Post published the first documents concerning the US intelligence agencies’ spying on Internet users on June 6, 2013. According to the documents, major phone companies, including Verizon, AT&T and Sprint Nextel, handed records of their customers’ phone conversations over to the NSA and the Federal Bureau of Investigation (FBI), who also had direct access to the servers of Microsoft, Yahoo, Google, Facebook, Skype, YouTube, Paltalk, AOL and Apple.

…click on the above link to read the rest of the article…

Bill Binney In His Own Words: ‘A Collaborative Conspiracy to Subvert the Government of the US’

Bill Binney In His Own Words: ‘A Collaborative Conspiracy to Subvert the Government of the US’

“None are more hopelessly enslaved than those who falsely believe that they are free.”
Johann Wolfgang von Goethe

William Edward Binney is a former highly placed intelligence official with the United States National Security Agency (NSA) turned whistleblower who resigned on October 31, 2001, after more than 30 years with the agency.

He was a high-profile critic of his former employers during the George W. Bush administration, and later criticized the NSA’s data collection policies during the Barack Obama administration.

In 2016, he said the U.S. intelligence community’s assessment that Russia interfered in the 2016 presidential election was false.

Wikipedia, Bill Binney

Because of his analysis in conjunction with Veteran Intelligent Professionals for Sanity (VIPS) that has tended to carefully debunk the Russia Russia narrative, Binney has not been given much airtime on certain channels within the mainstream news media.  So like you I had not heard of him except recently when reading something else.

I found this recent interview to be very interesting.  I am not qualified or sufficiently well-informed to assess it, but listen to it for yourself and see what you think. It would seem to be worth your time at least.

He has some good things to say about Donald Trump and draining the swamp. And you know how I feel about his Presidency. So there must be something there for me to find it worth hearing.

He discussed a number of controversial topics including 9/11, etc.

Binney certainly has the right pedigree to be an informed whistleblower, and he has never been brought to heel or silenced, so he must have something going for him.  He does seem to be extraordinarily well-informed. I would imagine that if it was possible that he would be charged or discredited or smeared.

Silicon Valley Will Not Save You from the Surveillance State

Silicon Valley Will Not Save You from the Surveillance State

There was something quite odd about the very welcome news that some Google employees were objecting to a military contract, namely all the other Google military contracts. My sense of the oddness of this was heightened by reading Yasha Levine’s new book, Surveillance Valley: The Secret Military History of the Internet.

I invited Levine on my radio show (it will air in the coming weeks) and asked him what he thought was motivating the revolt over at Google. Were they objecting to a particular kind of weapon, in the manner that some people rather bizarrely object to drones only if they are automated but not if a human pushes the murder button? Were they actually clueless about their own company?

Levine’s answer requires investigation but certainly makes an interesting hypothesis. He said that all during the Obama years, the tech press and community aired no concerns whatsoever about militarism, whereas since the arrival of Trump such talk is to be heard and read. Levine maintains that Google employees do not object to militarism, they object to Trumpian militarism.

I had hoped for and wrongly predicted this phenomenon in the general public the moment Trump gained the throne. Is it possible that it’s finally begun, but begun in Silicon Valley?

Levine’s book describes Google and other internet corporations as major military and spy contractors from the beginning. Google partnered with Lockheed Martin on parts of the war on Iraq and is a major partner of the military, the CIA, the NSA, etc. Surveillance Valley goes back to the post-WWII origins of today’s military madness. Military experiments as preparation for war, “field tested” in Vietnam, and supported by President Kennedy as appropriately hi-tech and modern, were actually war and developed into one of the worst wars ever seen. Vietnam was mass-surveilled — or the attempt was made and foiled with bags of urine and other low-tech tricks.

…click on the above link to read the rest of the article…

The Wiretap Rooms

THE WIRETAP ROOMS

The NSA’s Hidden Spy Hubs in Eight U.S. Cities

THE SECRETS ARE hidden behind fortified walls in cities across the United States, inside towering, windowless skyscrapers and fortress-like concrete structures that were built to withstand earthquakes and even nuclear attack. Thousands of people pass by the buildings each day and rarely give them a second glance, because their function is not publicly known. They are an integral part of one of the world’s largest telecommunications networks – and they are also linked to a controversial National Security Agency surveillance program.

Atlanta, Chicago, Dallas, Los Angeles, New York City, San Francisco, Seattle, and Washington, D.C. In each of these cities, The Intercept has identified an AT&T facility containing networking equipment that transports large quantities of internet traffic across the United States and the world. A body of evidence – including classified NSA documents, public records, and interviews with several former AT&T employees – indicates that the buildings are central to an NSA spying initiative that has for years monitored billions of emails, phone calls, and online chats passing across U.S. territory.

The NSA considers AT&T to be one of its most trusted partners and has lauded the company’s “extreme willingness to help.” It is a collaboration that dates back decades. Little known, however, is that its scope is not restricted to AT&T’s customers. According to the NSA’s documents, it values AT&T not only because it “has access to information that transits the nation,” but also because it maintains unique relationships with other phone and internet providers. The NSA exploits these relationships for surveillance purposes, commandeering AT&T’s massive infrastructure and using it as a platform to covertly tap into communications processed by other companies.

…click on the above link to read the rest of the article…

Edward Snowden: ‘The people are still powerless, but now they’re aware’

Five years after historic NSA leaks, whistleblower tells the Guardian he has no regrets

Edward Snowden remains in exile in Russia.
Edward Snowden remains in exile in Russia. Photograph: Lindsay Mills

Edward Snowden has no regrets five years on from leaking the biggest cache of top-secret documents in history. He is wanted by the US. He is in exile in Russia. But he is satisfied with the way his revelations of mass surveillance have rocked governments, intelligence agencies and major internet companies.

In a phone interview to mark the anniversary of the day the Guardian broke the story, he recalled the day his world – and that of many others around the globe – changed for good. He went to sleep in his Hong Kong hotel room and when he woke, the news that the National Security Agency had been vacuuming up the phone data of millions of Americans had been live for several hours.

Snowden knew at that moment his old life was over. “It was scary but it was liberating,” he said. “There was a sense of finality. There was no going back.”

What has happened in the five years since? He is one of the most famous fugitives in the world, the subject of an Oscar-winning documentary, a Hollywood movie, and at least a dozen books. The US and UK governments, on the basis of his revelations, have faced court challenges to surveillance laws. New legislation has been passed in both countries. The internet companies, responding to a public backlash over privacy, have made encryption commonplace.

Snowden, weighing up the changes, said some privacy campaigners had expressed disappointment with how things have developed, but he did not share it. “People say nothing has changed: that there is still mass surveillance. That is not how you measure change. Look back before 2013 and look at what has happened since. Everything changed.”

…click on the above link to read the rest of the article…

Tripling Its Collection, NSA Sucked Up Over 530 Million US Phone Records in 2017

Tripling Its Collection, NSA Sucked Up Over 530 Million US Phone Records in 2017

“Overall, the numbers show that the scale of warrantless surveillance is growing at a significant rate,” says POGO’s Jake Laperruque.

In 2017, the NSA tripled the amount of data it collected from U.S. phones. (Image EFF Photos/flickr/cc)

In 2017, the NSA tripled the amount of data it collected from U.S. phones. (Image EFF Photos/flickr/cc)

The National Security Agency (NSA) collected over 530 million phone records of Americans in 2017—that’s three times the amount the spy agency sucked up in 2016.

The figures were released Friday in an annual report from the Office of the Director of National Intelligence (ODNI).

It shows that the number of “call detail records” the agency collected from telecommunications providers during Trump’s first year in office was 534 million, compared to 151 million the year prior.

“The intelligence community’s transparency has yet to extend to explaining dramatic increases in their collection,” said Robyn Greene, policy counsel at the Open Technology Institute.

The content of the calls itself is not collected but so-called “metadata,” which, as Gizmodo notes, “is supposedly anonymous, but it can easily be used to identify an individual. The information can also be paired with other publicly available information from social media and other sources to paint a surprisingly detailed picture of a person’s life.”

The report also revealed that the agency, using its controversial Section 702 authority, increased the number of foreign targets of warrantless surveillance. It was 129,080 in 2017 compared to 106,469 in 2016.

As digital rights group EFF noted earlier this year,

Under Section 702, the NSA collects billions of communications, including those belonging to innocent Americans who are not actually targeted. These communications are then placed in databases that other intelligence and law enforcement agencies can access—for purposes unrelated to national security—without a warrant or any judicial review.

“Overall,” Jake Laperruque, senior counsel at the Project On Government Oversight, said to ZDNet, “the numbers show that the scale of warrantless surveillance is growing at a significant rate, but ODNI still won’t tell Americans how much it affects them.”

The NSA Wants a Skeleton Key to Everyone’s Encrypted Data

The NSA Wants a Skeleton Key to Everyone’s Encrypted Data

Encryption can protect personal data from government intrusion, which means the government wants the key to break it.

Like it or not, you are your data. In this day and age, your receipts, social media activity, public records, GPS data, and internet search history are the proof of who you are. And while you may have thought you had secrets, the Federal Government would like the rest of them.

The seemingly innocuous pieces of information we trade away every day create a detailed mosaic of our lives used to target advertising and create personality profiles that are exploited by the FBI, political operatives like Cambridge Analytica, and Russian propagandists.

And those are just the legal shenanigans! Instances of malicious hacking that jeopardize social security numbers and other important data are on the rise as well.

But all hope is not lost! There is but one meaningful defense against such intrusions, one used by whistleblowers, banks, the government (often poorly), and college students: encryption.

Encryption Is Powerful, so Naturally the Government Wants to Control It

Encryption, to oversimplify, is the process of putting your data in a combination locked safe, and it’s becoming more popular. Like all passcodes, these combinations are best stored non-electronically.

Automatically encrypted search engines and internet services simplify the process for users. They protect individuals’ data from hacking, theft, and even the government, but they also retain a repository for all the combinations they use to lock data up.

This is the Trojan horse the NSA means to use to gain access to your private data even when it is encrypted.

But that may soon change.

…click on the above link to read the rest of the article…

Know Your History: Google Has Been a Military-Intel Contractor from the Very Beginning

Levine’s investigative reporting on the connection between the Silicon Valley tech giants and the military-intelligence community has been praised by high-level NSA whistleblower Thomas Drake, and many others. [See my interviews of Drake here:

“Google has partnered with the United States Department of Defense to help the agency develop artificial intelligence for analyzing drone footage, a move that set off a firestorm among employees of the technology giant when they learned of Google’s involvement.” — Gizmodo / March 6, 2018

Gizmodo’s report on Google’s work for the Pentagon has been making headlines all day. It’s also thrown the normally placid halls of Google’s Mountain View HQ into chaos. Seems that Googlers can’t believe that their awesome company would get involved in something as heinous as helping the Pentagon increase its drone targeting capability.

But the fact that Google helps the military build more efficient systems of surveillance and death shouldn’t be surprising, especially not to Google employees. The truth is that Google has spent the last 15 years selling souped-up versions of its information technology to military and intelligence agencies, local police departments, and military contractors of all size and specialization — including outfits that sell predictive policing tech deployed in cities across America today.

As I outline in my book Surveillance Valley, it started in 2003 with customized Google search solutions for data hosted by the CIA and NSA. The company’s military contracting work then began to expand in a major way after 2004, when Google cofounder Sergey Brin pushed for buying Keyhole, a mapping startup backed by the CIA and the NGA, a sister agency to the NSA that handles spy satellite intelligence.

…click on the above link to read the rest of the article…

 

Olduvai IV: Courage
In progress...

Olduvai II: Exodus
Click on image to purchase

Olduvai
Click on image to purchase

Olduvai II: Exodus
Click on image to purchase

Olduvai III: Cataclysm
Click on image to purchase