Home » Posts tagged 'spying' (Page 2)

Tag Archives: spying

Olduvai
Click on image to purchase

Olduvai III: Catacylsm
Click on image to purchase

Post categories

Post Archives by Category

US Intelligence Developing Better Storage To HOARD YOUR DATA Based On Human DNA

US Intelligence Developing Better Storage To HOARD YOUR DATA Based On Human DNA

Since the United States insists on spying its own people and saving massive amounts of personal data, the government is running out of storage space.  So now, they are developing a new and improved data storage system based on human DNA.

It’s obvious the spying isn’t going to stop, and the US is no longer making it a secret that they want every scrap of data available on you stored. The Molecular Information Storage program, run by the Intelligence Advanced Research Projects Activity (IARPA), is recruiting scientists to help develop a system for storing huge amounts of data on sequence-controlled polymer, molecules with a similar makeup and structure to DNA.

According to RT, US intelligence services struggle to store the trove of data collected during their snooping operations, so a team of researchers is developing the radical new storage technology. The issue for the government of how to store data is one the world’s intelligence services intend to solve for the overbearing governments of the planet. Costly data centers take up huge amounts of land, which is unsustainable given the increasing amount of data generated by each person on a daily basis.

Some data centers are currently being housed in urban locations. The Lakeside Technology Center in Chicago is the largest data storage facility in the US. It spans a whopping 1.1 million square feet, which is equivalent to an entire city block. The site is actually at the location of the former printing press for the Yellow Pages, but the center was transformed in 1999 and now holds more than 50 generators whirring around the clock. The Chicago facility is only matched by the NSA’s $1.5 billion Bumblehive data center in Bluffdale, Utah, which is just over 1 million square feet.

…click on the above link to read the rest of the article…

How the Feds Use Transportation Funds to Spy on You

How the Feds Use Transportation Funds to Spy on You

red light camera.jpg

A recent announcement by a local transit authority in Virginia sheds light on how the Department of Homeland Security (DHS) and the Transportation Security Administration (TSA) are building a massive, intrusive surveillance network built on America’s transportation system.

The Greater Richmond Transit Company (GRTC) recently announced plans to install more than 100 live surveillance cameras at stops along a rapid transit line. According to a WTVR report, GRTC plans to install approximately four cameras at 26 Pulse stops along Broad Street. The system will be live 24 hours a day and directly connected to the city’s 911 facility.

The ACLU of Virginia opposes the system. The organization’s director of strategic communications said constant monitoring changes the nature of a community.

“There’s very little evidence that this type of surveillance enhances public safety, and there is every reason to think that it inhibits people. That it causes us to behave differently than we would if we weren’t being watched,” Bill Farrar said, adding that the system will “keep tabs” on people who rely on public transit.

“GRTC has said in promoting this, in promoting the need for this particular line, we want to help people get out of the East End food desert. So we’re saying use this to get the food that you need, but we’re going to watch you while you do it.

GRTC Pulse is “a modern, high quality, high capacity rapid transit system serving a 7.6-mile route.” It was developed through a partnership between the U.S. Department of Transportation, the Virginia Department of Transportation, the City of Richmond and Henrico County.

According to Style Weekly, “this new system will bring the total number of easily accessible, city or government-owned cameras available to police and other authorities to more than 300, including roughly 200 stationary cameras Richmond police already have easy access to, and 32 cameras owned by city police.”

…click on the above link to read the rest of the article…

The Untold Story of Japan’s Secret Spy Agency

Photo: NHK

THE UNTOLD STORY OF JAPAN’S SECRET SPY AGENCY

EVERY WEEK IN Tokyo’s Ichigaya district, about two miles east of the bright neon lights and swarming crowds in the heart of Shibuya, a driver quietly parks a black sedan-style car outside a gray office building. Before setting off on a short 10-minute drive south, he picks up a passenger who is carrying an important package: top-secret intelligence reports, destined for the desks of the prime minister’s closest advisors.

Known only as “C1,” the office building is located inside a high-security compound that houses Japan’s Ministry of Defense. But it is not an ordinary military facility – it is a secret spy agency headquarters for the Directorate for Signals Intelligence, Japan’s version of the National Security Agency.

The directorate has a history that dates back to the 1950s; its role is to eavesdrop on communications. But its operations remain so highly classified that the Japanese government has disclosed little about its work – even the location of its headquarters. Most Japanese officials, except for a select few of the prime minister’s inner circle, are kept in the dark about the directorate’s activities, which are regulated by a limited legal framework and not subject to any independent oversight.

Now, a new investigation by the Japanese broadcaster NHK — produced in collaboration with The Intercept — reveals for the first time details about the inner workings of Japan’s opaque spy community. Based on classified documents and interviews with current and former officials familiar with the agency’s intelligence work, the investigation shines light on a previously undisclosed internet surveillance program and a spy hub in the south of Japan that is used to monitor phone calls and emails passing across communications satellites.

Night view of the C1 building, inside Japan’s Ministry of Defense compound in Ichigaya.
Photo: NHK

…click on the above link to read the rest of the article…

Business is Booming for the U.K.’s Spy Tech Industry

Photo: David Goddard/Getty Images

BUSINESS IS BOOMING FOR THE U.K.’S SPY TECH INDUSTRY

DRIVING INTO CHELTENHAM from the west, it is hard to miss the offices of Government Communications Headquarters, or GCHQ, the United Kingdom’s surveillance agency. The large, doughnut-shaped building sits behind high-perimeter fencing with barbed wire and many levels of security. The facility – used to eavesdrop on global emails and phone calls – is located on the edge of the sleepy Gloucestershire town, which feels like an incongruous location for one of the world’s most aggressive spy agencies.

Cheltenham has a population of just 117,000 people, and GCHQ’s presence has turned the area into one of Europe’s central hubs for companies working in the fields of cybersecurity and surveillance. GCHQ says it employs almost 6,000 people in Cheltenham and at some smaller bases around the U.K., although the agency has in recent years secretly expanded its workforce, reportedly employing thousands more staff.

People in the area are now talking of a cyber “corridor” that stretches for 50 miles from Malvern, just north of Cheltenham, all the way to Bristol, where the Ministry of Defence has its equipment and support headquarters at Abbey Wood. Many quaint English towns, known for their farming and country pubs, have seen an influx of companies dealing in cybersecurity and electronic spying. Even office space on former farms is being used for this burgeoning industry.

Chris Dunning-Walton, the founder of a nonprofit called Cyber Cheltenham, or Cynam, organizes quarterly events in the town attended by politicians and entrepreneurs. “Historically, there has been a need for the companies that are working here to be very off the radar with their relationships with GCHQ and to some extent, that does exist,” says Dunning-Walton. But since Edward Snowden leaked information in 2013 about GCHQ’s sweeping surveillance activities, the agency has been forced to come out of the shadows and embrace greater transparency.

…click on the above link to read the rest of the article…

Bayou Bridge Pipeline Opponents Say Louisiana Governor’s Office Is Surveilling Them

Bayou Bridge Pipeline Opponents Say Louisiana Governor’s Office Is Surveilling Them

Louisiana Bucket Brigade founder Anne Rolfes at a press conference protesting Louisiana Governor John Bel Edwards' treatment of anti-pipeline activists.

Opponents of the Bayou Bridge pipeline accused Louisiana Governor John Bel Edwards of meeting with representative of the oil and gas industry while refusing to meet with activists and communities affected by the pipeline’s construction. They further allege that the administration has instead placed them under surveillance, pointing to similar treatment of Dakota Access pipeline opponents in North Dakota in 2016. Their claims are based in part on emails and other public records released by the state.

The activists brought their grievances to the Democratic governor’s home and office on March 1, holding a press conference in front of the Governor’s Mansion in Baton Rouge and then occupying the foyer to his office in the State Capitol for over an hour.

The Bayou Bridge pipeline should be called the John Bel pipeline,” Louisiana Bucket Brigade founder and director Anne Rolfes declared at the press conference. In her view, “any accidents that will happen” related to the pipeline lead back to the Governor. He had the power to stop it, she said, but chose not to.

At the press conference, representatives from the HELP Association, 350 New Orleans, L’eau est La Vie (Water Is Life) camp, and the Center for Constitutional Rights also expressed disappointment in what they described as the state government’s cozy relationship with industry.

Louisiana Bucket Brigade read aloud emails about the Bayou Bridge pipeline from the Edwards administration and industry that were obtained by the Center for Constitutional Rights (CCR), a New York-based legal and educational nonprofit.

Pastor Harry Joseph of Mt. Triumph Baptist Church in St. James, Louisiana
Pastor Harry Joseph of the Mount Triumph Baptist Church in St. James, where the pipeline will terminate, speaking at the press conference in Baton Rouge.

Security staff at the Louisiana Bucket Brigade press conference March 1
Security next to the press conference in Baton Rouge.

…click on the above link to read the rest of the article…

FBI Has Been Paying Geek Squad To Spy On Customers For Over A Decade

For over a decade, the FBI had been paying employees of Best Buy’s Geek Squad to pass on information about illegal materials on customer devices sent in for repair, according to records obtained through the Freedom of Information lawsuit filed last year.

At no point did the FBI get warrants based on probable cause before Geek Squad informants conducted these searches. Nor are these cases the result of Best Buy employees happening across potential illegal content on a device and alerting authorities. –EFF.org

Records posted Tuesday by the Electronic Frontier Foundation reveal that federal agents from the FBI’s Louisville division had been paying Geek Squad informants for information that might kick off investigations related to their “Computer Intrusion and Cyber Crime” program, according to the documents.

The documents released to EFF show that Best Buy officials have enjoyed a particularly close relationship with the agency for at least 10 years. For example, an FBI memo from September 2008 details how Best Buy hosted a meeting of the agency’s “Cyber Working Group” at the company’s Kentucky repair facility.

The memo and a related email show that Geek Squad employees also gave FBI officials a tour of the facility before their meeting and makes clear that the law enforcement agency’s Louisville Division “has maintained close liaison with the Geek Squad’s management in an effort to glean case initiations and to support the division’s Computer Intrusion and Cyber Crime programs.” –EFF

Another document details a $500 payment from the FBI to a Geek Squad informant, which appears to be directly related to the FBI’s prosecution of California doctor Mark Rettenmaier, who was charged with possession of child pornography after Best Buy sent his computer to a repair facility in Kentucky.

…click on the above link to read the rest of the article…

The Powerful Global Spy Alliance You Never Knew Existed

Photo: Kristian Laemmle-Ruff

THE POWERFUL GLOBAL SPY ALLIANCE YOU NEVER KNEW EXISTED

IT IS ONE of the world’s most powerful alliances. And yet most people have probably never heard of it, because its existence is a closely guarded government secret.The “SIGINT Seniors” is a spy agency coalition that meets annually to collaborate on global security issues. It has two divisions, each focusing on different parts of the world: SIGINT Seniors Europe and SIGINT Seniors Pacific. Both are led by the U.S. National Security Agency, and together they include representatives from at least 17 other countries. Members of the group are from spy agencies that eavesdrop on communications – a practice known as “signals intelligence,” or SIGINT.

Details about the meetings of the SIGINT Seniors are disclosed in a batch of classified documents from the NSA’s internal newsletter SIDToday, provided by whistleblower Edward Snowden and published today by The Intercept. The documents shine light on the secret history of the coalition, the issues that the participating agencies have focused on in recent years, and the systems that allow allied countries to share sensitive surveillance data with each other.

The SIGINT Seniors Europe was formed in 1982, amid the Cold War. Back then, the alliance had nine members, whose primary focus was on uncovering information about the Soviet Union’s military. Following the attacks on the U.S. in September 2001, the group grew to 14 and began focusing its efforts on counterterrorism.

The core participants of the Seniors Europe are the surveillance agencies from the so-called Five Eyes: the NSA and its counterparts from the U.K., Australia, Canada, and New Zealand. As of April 2013, the other members were intelligence agencies from Belgium, Denmark, France, Germany, Italy, the Netherlands, Norway, Spain, and Sweden.

…click on the above link to read the rest of the article…

UK Mass Digital Surveillance Regime Ruled Illegal

UK Mass Digital Surveillance Regime Ruled Illegal 

On 30 January, the UK Court of Appeal ruled that the Data Retention and Investigatory Powers Act of 2014 (DRIPA), which made way for the Investigatory Powers Act of 2016 (IPA), did not restrict the access of confidential personal phone and web browsing records to investigations of serious crime. The IPA means that Internet service providers must now store details of everything we do online for twelve months and render it accessible to dozens of public bodies. 

This data can be virtually everything, from browsing records to personal information on private citizens, to include but not limited to: search engine activity, every phone call to text message plus geographical location, private financial and credit repair services, personal correspondence, medical records, and data from banking, insurance, and investment services which is stored on computers and mobile telephones.  This law obliges technology companies to hand over the data that they have about private citizens to intelligence agencies and it can force tech companies like Apple to remove encryption, ultimately weakening the security of their own products in total secrecy.

The ability of the government to spy on private citizens’ includes the encroachment upon the fundamental rights of privacy in financial matters, such that a “super-spy search engine” has become part of the arsenal that the Home Office is accused of hosting.  What does surveillance mean in an era where financial information needs to be safeguarded and when economic interests such as crypto robots and cryptocurrencies could face government spying?

Let’s step back to 2004, when philosopher Giorgio Agamben refused to submit passport biodata in 2004 in the United States when he famously rescinded his appointment to lecture at New York University.  Resisting the submission of fingerprints required to enter

the United States as a foreign visitor, Agamben’s actions then foreshadowed what he would later address in his 2013 Athens lecture:

…click on the above link to read the rest of the article…

Is Facebook Using Your Phone’s Camera And Microphone To Spy On You? 

Is Facebook Using Your Phone’s Camera And Microphone To Spy On You? 

Do you ever feel like you’re being watched when there’s nobody else around?

Decades ago, if the answer to that question was ‘yes’, doctors might’ve advised you to see what they called a headshrinker. But technological progress has a funny way of turning situations on their head. For example, at the turn of the 20th century, everybody had horses – but only the wealthy had cars.

Today, everybody has a car: but only rich people have horses.

The same principle applies to surveillance: If you don’t believe you’re being spied on constantly, then you should probably have your head examined.

As advertisers hone increasingly sophisticated microtargeting techniques, ordinary social media users are reporting disturbing coincidences like the one Jen Lewis recounted to the Daily Mail.

While out shopping, Lewis and a friend discussed purchasing a film camera. Not 20 minutes later, Lewis’s friend checked Facebook on her phone and discovered, to her alarm, a targeted advertisement for the very same camera she had just considered purchasing.

Then, less than 20 minutes later, an advert popped up on Lois’s phone, for the exact same product. Same colour, same model, same everything.

‘They’re listening, they’re watching,’ she said.

‘Oh don’t be daft,’ I replied. ‘Who’s listening? Who’d want to listen to us?’

‘I’m serious,’ said Lois. ‘This keeps happening. This is no coincidence. Someone is listening to our conversations. Advertisers. They’re listening via our phones’ microphones.’

At first, Lewis didn’t understand what her friend was getting at. But it quickly dawned on her: Was Facebook recording their conversation and converting its content into fodder for targeted advertisements – all in real time?

…click on the above link to read the rest of the article…

Finland’s Largest Newspaper Faces Treason Charges For Publishing Leaked Files On Spy Ops Targeting Russia

Finland’s Largest Newspaper Faces Treason Charges For Publishing Leaked Files On Spy Ops Targeting Russia

A bizarre story of a police raid on a Finnish journalist’s home is drawing international attention, especially as it occurred in a country known for its protection of press freedoms. The journalist is Laura Halminien from Finland’s largest daily newspaper, Helsingin Sanomat, where she published a bombshell investigative report on Saturday based on previously leaked documents connected to a Finnish intelligence operation which closely monitors Russian military movements just across the border in the St. Petersburg region.

The report gave details of Finish Defense Intelligence Agecy (VKoeL) secretive facilities and ongoing operations regarding surveillance of Russia, with special focus on a signals surveillance complex in the city of Tikkakoski in central Finland. The Tikkakoski complex is said use a high tech and advanced monitoring system to observe Russian military maneuvers based on electromagnetic radiation. 


Main offices for Finland’s largest daily newspaper, which is now under investigation over the leaks. Image source: 
Hakaniemi

The unusual police search occurred on Sunday evening, when authorities showed up the journalist’s home without a warrant, yet in response to a possible fire. According to Reuters the series of events unfolded as follows:

Finnish police searched a reporter’s home and seized her computer after she tried to destroy the hard drive to protect sources linked to a security story, her newspaper reported. The journalist, Laura Halminen, said she tried to smash up her computer with a hammer in her home, but the laptop then started smoking and she called the fire brigade, according to an interview published by her employer Helsingin Sanomat.

Police officers who came to her home with the fire service to investigate the blaze then took her computer and searched her property, police said…

…click on the above link to read the rest of the article…

Has Trump Made It Easier to Spy on Journalists? Lawsuit Demands Answers.

National Counterintelligence and Security Center Director William Evanina (2ndR), US Attorney General Jeff Sessions (R) and bodyguards stand at the Department of Justice during an announcement about leaking of classified information on August 4, 2017 in Washington, DC.US Attorney General Jeff Sessions on Friday condemned the 'staggering number' of leaks emanating from President Donald Trump's administration, as he vowed a crackdown on people revealing classified or sensitive national security information. / AFP PHOTO / Brendan Smialowski (Photo credit should read BRENDAN SMIALOWSKI/AFP/Getty Images)
Photo: Brendan Smialowski/AFP/Getty Images

PRESS FREEDOM GROUPS filed suit today to force the government to disclose more about how and when it obtains journalists’ communications, amid reports that the Department of Justice under Attorney General Jeff Sessions is pursuing a record number of leak investigations.

The question the groups hope to answer is whether the Trump administration — openly hostile toward news media — has jettisoned or modified rules that limit the government’s ability to spy on journalists while they do their jobs.

Those rules were made more stringent by former President Barack Obama’s attorney general Eric Holder in 2014, after outcry when it was revealed that the administration had secretly obtained call records from the Associated Press and surveilled a Fox News reporter, naming him a co-conspirator in a national security leak case. Holder pledged that his department would go after journalists’ records in criminal cases only as a “last resort.”

Carrie DeCell, a staff attorney with Knight First Amendment Institute, which is bringing the suit along with the Freedom of the Press Foundation, said that “we have seen the DOJ media guidelines that Obama released, but we understand that Sessions is reconsidering those guidelines, and the way the government uses subpoenas against journalists.”

In August, Sessions announced that his department was reviewing the guidelines as part of a crackdown on leaks but did not specify what changes might be made. Sessions also told Congress this month that he has 27 investigations open into leaks of classified information to reporters – compared to just three last year. (Not all leaks are illegal, and many of the disclosures that Trump has publicly complained about would likely not be considered criminal.)

…click on the above link to read the rest of the article…

Secret Code Is Recording Every Keystroke You Make On More Than 400 Of The Most Popular Websites On The Internet

Secret Code Is Recording Every Keystroke You Make On More Than 400 Of The Most Popular Websites On The Internet

If someone secretly installed software on your computer that recorded every single keystroke that you made, would you be alarmed?  Of course you would be, and that is essentially what is taking place on more than 400 of the most popular websites on the entire Internet.  For a long time we have known that nothing that we do on the Internet is private, but this new revelation is deeply, deeply disturbing.  In my novel entitled “The Beginning Of The End”, I attempted to portray the “Big Brother” surveillance grid which is constantly evolving all around us, but even I didn’t know that things were quite this bad.  According to an article that was just published by Ars Technica, when you visit the websites that have installed this secret surveillance code, it is like someday is literally “looking over your shoulder”…

If you have the uncomfortable sense someone is looking over your shoulder as you surf the Web, you’re not being paranoid. A new study finds hundreds of sites—including microsoft.com, adobe.com, and godaddy.com—employ scripts that record visitors’ keystrokes, mouse movements, and scrolling behavior in real time, even before the input is submitted or is later deleted.

Go back and read that again.

Do you understand what that means?

Even if you ultimately decide not to post something, these websites already know what you were typing, where you clicked and how you were moving your mouse.

Essentially, it is like someone is literally sitting behind you and watching every single thing that you do on that website.  The following comes from the Daily Mail

…click on the above link to read the rest of the article…

The Government Is Lying to Us About Cybersecurity

The Government Is Lying to Us About Cybersecurity

The Department of Justice is full of excuses for wanting back doors into encryption systems, but they’re just that: excuses.

In a press conference, Deputy Attorney General Rod Rosenstein stated that the “absolutist position” that strong encryption should be, by definition, unbreakable is “unreasonable.”

The DOJ is lying about three things:

First

The US government works against the security of businesses. Just this week, I had to tell Apple that my iPhone app did not have certain kinds of encryption that the U.S. government has export control on. Encryption export controls cripple the security and innovation of software products made by American businesses.  

Furthermore, the U.S. government hoards software exploits so it can hack into your computer rather than publish them that so companies can patch their products. The NSA intentionally sneaks weaknesses into protocols and bribes businesses to add holes to security products so it can steal the data of their customers.

The only “cybersecurity” that the government cares about is its ability to conduct surveillance and attacks on political targets.

When businesses want to improve the security of their products, they offer rewards for exploits – Microsoft pays up to $250,000 per exploit, Facebook has paid $40,000, and so on. The NSA purchases millions of dollars of exploits from hackers and uses them to spy on the entire world, including U.S. citizens. Unfortunately, the NSA is incompetent at keeping secrets, so it lost their exploit database and caused millions of computers to be infected and hijacked with the exploits they hoarded.The hardware and software pieces of both the Internet and individual user’s computers are made by private companies. There is nothing the U.S. government can do to improve “cybersecurity” other than prosecuting criminal behavior.  However, the U.S. government prosecutes a minuscule proportion of cybercrime.

…click on the above link to read the rest of the article…

Telecoms Knew About Spying Loophole for Decades, Did Nothing

Telecoms Knew About Spying Loophole for Decades, Did Nothing

Issues with the SS7 network only really entered the public consciousness a few years ago. But the telecom community has known about the issues for a lot longer.

PHOTO ILLUSTRATION BY SARAH ROGERS/THE DAILY BEAST

Spies and hackers are actively exploiting a backbone of how mobile phones communicate—and telecoms have known about it for 19 years.

By targeting a network and set of related protocol known as SS7, for-profit surveillance companies and financially motivated criminals can track phones across the planet, or intercept calls and text messages.

In recent years, security researchers and the media have highlighted these problems, with one news outlet even eavesdropping on the calls of Congressman Ted Lieu to demonstrate the vulnerabilities. Despite high-profile coverage, generally the problems in SS7 persist.

But at least some members of the telecom community have known about the serious security issues in SS7 for nearly two decades, according to a document reviewed by The Daily Beast. The news highlights the snail’s pace at which the industry has addressed glaring holes in the world’s mobile infrastructure, leaving U.S. citizens and others around the world open to spying.

“There is no adequate security in SS7. Mobile operators’ needs [sic] to protect themselves from attack by hackers and inadvertent action that could stop a network or networks operating correctly,” a recently unearthed, 1998 document from the European Telecommunications Standards Institute (ETSI) reads.

ETSI is a nonprofit organization that today has over 800 members from the telecom industry, including giants such as T-Mobile, Vodafone, and Orange. ETSI developed versions of SS7 for the European market, organization spokesperson Claire Boyer told The Daily Beast. The document itself is a report from a meeting of ETSI’s “Special Mobile Group.”

The 1998 document adds that “the problem with the current SS7 system is that messages can be altered and injected into the global SS7 networks in an un-controlled manner.”

…click on the above link to read the rest of the article…

The US Spy Hub in the Heart of Australia

A SHORT DRIVE south of Alice Springs, the second largest population center in Australia’s Northern Territory, there is a high-security compound, code-named “RAINFALL.” The remote base, in the heart of the country’s barren outback, is one of the most important covert surveillance sites in the eastern hemisphere.

Hundreds of Australian and American employees come and go every day from Joint Defence Facility Pine Gap, as the base is formally known. The official “cover story,” as outlined in a secret U.S. intelligence document, is to “support the national security of both the U.S. and Australia. The [facility] contributes to verifying arms control and disarmament agreements and monitoring military developments.” But, at best, that is an economical version of the truth. Pine Gap has a far broader mission — and more powerful capabilities — than the Australian or American governments have ever publicly acknowledged.

An investigation, published Saturday by the Australian Broadcasting Corporation in collaboration with The Intercept, punctures the wall of secrecy surrounding Pine Gap, revealing for the first time a wide range of details about its function. The base is an important ground station from which U.S. spy satellites are controlled and communications are monitored across several continents, according to classified documents obtained by The Intercept from the National Security Agency whistleblower Edward Snowden.

Together with the NSA’s Menwith Hill base in England, Pine Gap has in recent years been used as a command post for two missions. The first, named M7600, involved at least two spy satellites and was said in a secret 2005 document to provide “continuous coverage of the majority of the Eurasian landmass and Africa.” This initiative was later upgraded as part of a second mission, named M8300, which involved “a four satellite constellation” and covered the former Soviet Union, China, South Asia, East Asia, the Middle East, Eastern Europe, and territories in the Atlantic Ocean.

…click on the above link to read the rest of the article…

Olduvai IV: Courage
Click on image to read excerpts

Olduvai II: Exodus
Click on image to purchase

Click on image to purchase @ FriesenPress