Cyber Intelligence: The Challenge for Japan

facebooktwittergoogle_plusredditpinterestlinkedinmail
(cloudfront.net)

(cloudfront.net)

Information and telecommunication technology is progressing rapidly. With the benefits of this progress come inevitable risks and new sources of insecurity. In particular, systems are at risk of unauthorized access and exploitation from countries that seek sensitive information. Countries also possess the ability to destabilize the electrical system with the aim of disrupting the network. I term this activity ‘cyber intelligence.’ As a consequence, cyber attacks play a major role in realizing national interests and constitute a grave new problem for the security of nations. Japan in particular, with its large, technologically advanced economy, must learn to cope with the new dangers cyber intelligence poses.

 

Cyber Espionage Cases in Japan

Cyber intelligence refers to espionage activity that utilizes information and telecommunication technology. Sophisticated cyber threats come primarily from foreign intelligence and military services. Attacks take the form of Advanced Persistent Threats (APT) that can quietly infiltrate systems and remain active for long periods of time. Their aim is to gain political, economic, or military advantage over industries and government agencies. Several recent examples illustrate this trend for Japan.

One of the first cases of cyber espionage in Japan concerns its largest defense contractor, Mitsubishi Heavy Industries, which was hit by such an attack in 2011. The company discovered eighty virus-infected computers both at its headquarters in Tokyo and at its research and manufacturing facilities. Its lucrative submarine, missile, and nuclear power plant component factories were the targets.

Another case concerns the House of Representatives and the House of Councillors, whose computers were infected by an illegal program capable of information theft. Following this situation, government officials announced that the IDs and passwords of all lawmakers had been compromised and that their emails could have been intercepted for a maximum of fifteen days. The announcement further revealed that the Ministry of Foreign Affairs staff’s computers had also been infected with the same aim. Similarly, computers belonging to the Ministry of Agriculture, Forestry, and Fisheries were attacked. Internal documents related to the Trans-Pacific Partnership (TPP), which the Ministry had prepared, including preparatory conference materials and documents from the U.S.-Japan summit meeting, were accessed illegally several times and leaked in 2011 and 2012.

While it had been previously unobserved in Japan, hackers frequently target defense contractors, notably Lockheed Martin. Various APT attacks have been found, one after another. Cyber intelligence is the least expensive and most accessible method of intelligence gathering. If present trends continue, these phenomena have a high potential for undermining diplomatic, economic, and security functions at the international level.

 

The Global Threat of Cyber Espionage

In response to this global threat, countries have launched protection measures to keep sensitive information safe from theft. The long history of intelligence gathering goes hand-in-hand with that of warfare. Today, new technologies offer advanced tools for this age-old practice of information collection. The open nature of the Internet enables unprecedented access to information.

Currently, China and North Korea have overtly and provocatively developed the capabilities to carry out cyber attacks. Both countries organize training institutes for cyber hackers and cyber attack forces at the national level. In fact, they have developed information theft as well as various disruption activities that have been used on a daily basis, penetrating the networks of government agencies and industries in Japan and the United States. China and North Korea possess highly advanced technology to launch cyber attacks against their targeted countries.

Sony Entertainment Pictures (SPE) suffered a cyber attack in November 2014. After a thorough investigation, the FBI made a comment that North Korea had organized the attack, a view that President Obama confirmed. North Korea aims at projecting its cyber attack capability and threatening its neighbors. To this end, North Korea has trained six thousand cyber troops with significant assistance from China. Japan should take measures to counteract North Korea and not sit on the sidelines as mainstays of Japanese industry, such as SPE, are increasingly under threat.

 

Security and the Japanese ‘Cyber Intelligence’ Moment

Cyber intelligence has become a critical tool for the international security establishment. Related technology development and operational training have become more routine. In this regard, national strategy and international relations are at a critical stage in coming to grips with this reality. Unfortunately, Japan’s cyber intelligence capabilities are insufficient; they lack the necessary cyber literacy and sense of leadership. This situation arises from a disconnect between Japanese policy officials, who are ignorant of the technology, and those with the requisite expertise, who have remained pacifist and uninvolved in issues of security. In the interest of its national security, it is imperative that Japan strengthen its efforts to combat cyber intelligence by bridging the divide between these two groups.

 

National Police Agency Efforts Towards Cyber Intelligence

The Japanese police and more than four thousand businesses, which are often targets of cyber attacks, have launched an information sharing network which conducts the following measures:

  1. The police visit individual businesses and collect information regarding cyber attack concerns, such as targeted mail designed to steal information.
  2. The police provide feedback for businesses based on the information the police analyzed to improve businesses’ cyber security.
  3. The police, antivirus software companies, and operating system providers set up an advisory council against malware for counter intelligence. The council carries out information sharing regarding countermeasure against illegal program. In particular, the police provide information on new threats and sources of vulnerability for commercial enterprises so that IT users can improve their security countermeasures.

It is important to build on these efforts. Japan should further strengthen the exchange of information between foreign intelligence agencies and private sector entities to share the knowledge gained in these efforts.

 

Further Analysis: Marine Cable for National Security

The Internet does not exist solely in cyberspace. Rather, its existence depends upon physical infrastructure, most notably a network of cables that crisscross the world’s oceans. These marine cables, which have been lain for more than a hundred years, are crucial to the operation of information technology worldwide. Today, these cables utilize fiber-optic technology to transmit information at unprecedented speeds. Tied to this technology are political considerations over the potential for illegal surveillance and another theater for the conduct of cyber war with vast amounts of information at stake. This risk of war laid at the bottom of the sea demands greater attention.

Marine cable was the first point of IT connection between the United States and Asia. This connection plays a crucial role in Japan’s geopolitical concerns. Important in these considerations is the major telecommunication carrier KDDI and the cable-laying business, NEC. In August 2014, a consortium of six global communication companies, including China Mobile International and Google, awarded NEC a contract to expand the marine cable system that runs from Thailand to Hong Kong.

The first fiber-optic network lain in Japan runs between Japan and the United States. The technology, including the new FASTER cable set to be completed in 2016, greatly enhances the flow of data between the two continents.

These lines are vulnerable to damage, however, especially considering the fact that the sea bottom around Japan is the most quake-prone in the world. For example, the Great East Japan Earthquake damaged some of these marine cables, resulting in significant disruption of the communication network in Japan. This makes a system charged with the responsibility of cable maintenance and rapid repair imperative.

Another major issue surrounding marine cable is that of surveillance. Among the revelations brought to light by the former NSA contractor Edward Snowden is the fact that the intelligence agencies of the United States and United Kingdom have planted bugs in more than two hundred marine cable networks worldwide.

The information war existed over marine cable existed long before Mr. Snowden leaked this classified information. In reality, cases of cable bugging date back to the 1970s when the NSA sought to listen in on the Soviet Union during the Cold War. Similar acts of bugging today are to be expected. As a result, the discussion should not focus too much on issues of US bugging but instead on future policies.

The potential for nations to collect information from the marine cable carries important implications. While current data analysis technology cannot handle the sheer magnitude of information, intercepting specific personal information could overcome this barrier. Such technology has already been developed and personal information will become more important than it is now due to technology’s ever-expanding ability to exploit such data. Therefore, the value of marine cable, already responsible for the transmission of vast amounts of information, will increase in the near future.

While not all countries tap marine cables, several countries may seek to damage the telecommunication network to counter an enemy’s technological superiority by cutting them off from the network at a time of war. In this way, the building of marine cable infrastructure has become an area of interstate competition as countries seek to build resiliency and redundancy into the system. Thus, marine cable policy should consider not only the potential for damages caused by nature forces, in the land of earthquakes, but also this aspect of national security and the prominent role that marine cables play in interstate diplomacy.
 

Intelligence Refereed in Japan National Security Strategy

Within Japan’s December 2013 national security strategy is a commitment to fundamentally strengthen its information-collecting capabilities across a diverse range of sources, including human intelligence, open source intelligence, signals intelligence, and imagery intelligence. In addition, Japan will promote the utilization of geospatial intelligence that combines various types of intelligence, including cyber intelligence. Moreover, Japan will enhance its intelligence analysis, consolidation, and sharing capabilities by bolstering its human resources, including developing highly-skilled analysts. Japan will thereby make use of the array of information-collecting means at its disposal.

Japan will also operate the intelligence cycle more effectively through the timely provision of materials and intelligence to the National Security Council. Japan’s National Security Council serves as the control tower of foreign and security policy, as well as through the appropriate utilization of intelligence in policy formulation. Furthermore, under the Act on the Protection of Specially Designated Secrets (*provisional English translation), Japan will strengthen its counterintelligence functions by facilitating intelligence functions throughout the government.

 

Defense Technology Cooperation

There are increasing opportunities to cooperate in a more effective manner in the interests of international peace. One example is the utilization and provision of heavy machinery and other defense equipment to disaster-stricken areas by the SDF. Additionally, participation in international joint development and production projects has become routine in order to improve the performance of defense equipment while also address the reality of rising costs of defense equipment.

Against this backdrop, while giving due consideration to the Three Principles on Arms Exports, the Government of Japan will set out clear principles on the overseas transfer of arms and military technology that fit the new security environment. In this context, Japan will make considerations with regard to defining cases where transfers are prohibited, limiting cases where transfers could be allowed with strict examination, and ensuring appropriate control over transfers to minimize the risks of unauthorized use and third party transfer.

 

Japan’s Cyber Future

The intensification of the cyber threat requires further strengthening the capabilities of the public and private, including academic, sectors. Towards this end, the Lower House of the Japanese Diet passed the Cybersecurity Basic Act in November 2014, which set new requirements for national and local governments to respond to cyber threats and reorganized the Information Security Policy Council into the Cybersecurity Strategy Headquarters. The Act requires ministries and agencies to provide information regarding cyber attacks to the Headquarters in a timely manner. The Headquarters has been established under Chief Cabinet Secretary and will serve as a focal point for the Japanese government to coordinate cyber strategy, policy and procedures. This will effectively coordinate Japan’s disparate agencies responsible for responding to cyber threats, including the Self Defense Force, the National Police Agency, and the National Information Security Council’s Computer Emergency Response Team. Critical infrastructure companies and cyber security firms are also obligated to cooperate with national and local governments on cyber defenses.

Japan will implement these reforms gradually. As they are put in place, quick responses to cyber threats will remain critical to successful policy. The work of the Cybersecurity Strategy Headquarters will build upon that of the Japanese Computer Emergency Response Team (CERT) to ensure an effective response to attacks as they develop

The Japanese Diet should be lauded for taking these actions as they promise to meaningfully improve the country’s ability to respond to and prevent future acts of cyber aggression. Yet there is always more work to be done. As this article has demonstrated, the current state of cyber intelligence demands a rethinking of outdated diplomatic and security paradigms. Cyber vulnerabilities run deep, present in both physical infrastructure and virtual systems that contain treasure troves of personal data. Japan needs to build on current efforts and improve the cyber literacy of policymakers in order to respond to future crises given the far-reaching implications for the international order.

 

Disclaimer: This paper was prepared and written in the author’s personal capacity. The opinions expressed herein are the author’s own.

facebooktwittergoogle_plusredditpinterestlinkedinmail
Yoko Nitta

Dr. Yoko Nitta is a senior principal researcher at Japan Safe and Security Crisis Management, where she works to facilitate global cyber security among the European Union, the United States, Russia, and Japan at an official policy level. She also gives lecture on cyber warfare at National Defense Academy, where she focuses on cyber espionage, information warfare, and intelligence.

53 Comments

  • February 24, 2017

    ig

    I enjoy what you guys are up too. Such clever work and reporting!
    Keep up the amazing works guys I’ve added you guys to blogroll.

  • February 25, 2017

    ig

    I am genuinely thankful to the owner of this website who has shared this great piece of writing
    at at this place.

  • March 7, 2017

    Arsenal

    ElsaFarre Uruguay BusterZxr
    SusannaBe Brasilien AnitaBell
    BADSilke Chile DavidaepQ
    ChristieP Roma AjaMillar
    MargoMonc Argentina MelisaMcC
    RoyLirian Wales EdenVaux
    CindiFort Osterrike MasonPayt
    JettluAga Argentina SilkeJuli
    MillieGal Island WileyCond
    SimonRags Belgien DwainCagl

  • March 7, 2017

    fodboldtrøjer

    Margareta Manchester United RobertoBo
    EmilioBro Chile AidanLand
    ShelleyCo Island PamelaFer
    YaniraSla West Ham United SpencerGa
    DianxvJmt Chile NoreenPhi

  • March 8, 2017

    fotbollströjor

    TammySker AC Milan RyderRawl
    Wilhemina Argentina IlaUgtlr
    Sylvester Argentina Alexander
    LucasChau Turkiet MelodyooR
    NinaDaly Brasilien JonahElia
    NXMAnders Portugal ThurmanWi
    LavadaMcG Arsenal AngusMade
    DaleEarp Juventuss MadgeOnti
    BIJLeola Atletico Madrid RamonugAk
    SophieLew Olympique Lyonnais BlaineWal

  • Does your site have a contact page? I’m having a tough time locating it but,
    I’d like to send you an e-mail. I’ve got some creative ideas for your blog you might be interested in hearing.
    Either way, great blog and I look forward to seeing it develop over time.

  • Very soon this website will be famous amid all blogging visitors,
    due to it’s fastidious articles

  • March 11, 2017

    Augusto de Arruda Botelho

    I love what you guys tend to be up too. This kind of clever work and coverage!

    Keep up the great works guys I’ve added you guys to
    blogroll.

  • March 16, 2017

    Lynell

    Spot on with this write-up, I honestly believe this amazing site needs
    a lot more attention. I’ll probably be back again to read through more, thanks for the information!

  • March 18, 2017

    www.furniturefromhome.com

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    Furniture From Home

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    Beverly Diamonds

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    Beverly Diamonds

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    Beverly Diamonds

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    Furniture From Home

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    BEVERLY DIAMONDS

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    BRIAN WILLIS Brockstar

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    Beverly diamonds

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • BROCKSTAR BY BRIAN NELSON WILLIS SFO probes US lender over missing millions Brockstar Finance

  • March 19, 2017

    Joie

    Hello it’s me, I am also visiting this web site
    on a regular basis, this website is in fact nice and the users are actually
    sharing fastidious thoughts.

  • March 20, 2017

    Kaley

    For most recent information you have to go to see world-wide-web and on world-wide-web I found this web site as
    a finest website for most recent updates.

  • March 20, 2017

    online money transfer

    Attractive part of content. I just stumbled upon your weblog and in accession capital to say
    that I get actually enjoyed account your weblog posts. Any
    way I’ll be subscribing in your feeds or even I success you get admission to constantly fast.

  • March 20, 2017

    Norman

    Whats up are using WordPress for your site platform?
    I’m new to the blog world but I’m trying to get started and set up my own. Do
    you require any html coding knowledge to make your own blog?
    Any help would be greatly appreciated!

  • March 20, 2017

    good design

    I blog quite often and I genuinely appreciate your information. The
    article has really peaked my interest. I will bookmark your blog and keep checking for
    new details about once a week. I subscribed to your Feed
    too.

  • March 20, 2017

    Florene

    Pretty great post. I simply stumbled upon your
    blog and wished to mention that I have truly loved surfing around your weblog posts.
    After all I’ll be subscribing on your rss feed and I hope you write
    again very soon!

  • March 20, 2017

    Jose

    excellent issues altogether, you simply received a new reader.
    What may you recommend about your publish that you just
    made a few days in the past? Any positive?

  • March 20, 2017

    Rita

    It’s in reality a great and useful piece of info.
    I am glad that you simply shared this useful information with us.
    Please stay us up to date like this. Thanks for sharing.

  • March 20, 2017

    Itamar Serpa Fernandes

    Its like you learn my thoughts! You seem to know a lot about this, such as you wrote the guide in it or something.
    I feel that you simply can do with some p.c. to drive the message house a little bit, however instead of that, this is wonderful blog.
    A fantastic read. I’ll certainly be back.

  • March 21, 2017

    Julissa

    Woah! I’m really enjoying the template/theme of this website.

    It’s simple, yet effective. A lot of times it’s
    challenging to get that “perfect balance” between usability and appearance.

    I must say you’ve done a amazing job with this.
    Also, the blog loads super quick for me on Chrome.
    Exceptional Blog!

  • March 21, 2017

    Eileen

    Hey There. I found your blog using msn. This is a very well written article.
    I will be sure to bookmark it and come back to read more of your useful info.
    Thanks for the post. I’ll certainly comeback.

  • March 21, 2017

    Rudolph

    Hi, every time i used to check webpage posts here early
    in the morning, because i like to find out more and more.

  • March 22, 2017

    Adolph

    Heya just wanted to give you a brief heads up and let you know a
    few of the pictures aren’t loading properly. I’m not sure why but I think its
    a linking issue. I’ve tried it in two different web browsers and both show the same outcome.

  • March 22, 2017

    same numbers

    Hey there! I could have sworn I’ve been to this blog before but after reading
    through some of the post I realized it’s new to me.
    Anyways, I’m definitely glad I found it and I’ll be bookmarking and
    checking back frequently!

  • March 23, 2017

    Georges Sadala

    Hi there to all, it’s genuinely a fastidious for me to pay a quick visit this site, it consists of helpful
    Information.

  • March 23, 2017

    Georges Sadala

    Why viewers still use to read news papers when in this technological world all is accessible on web?

  • March 23, 2017

    mlm marketing strategy

    Appreciating the hard work you put into your website and in depth information you present.

    It’s awesome to come across a blog every once in a while that isn’t the
    same out of date rehashed material. Great read! I’ve saved your site and I’m including your RSS feeds
    to my Google account.

  • March 23, 2017

    sandersPa

    Credo di aver messo in confusione.
    sandersPa

  • March 23, 2017

    Egli Diana Pinto

    Really no matter if someone doesn’t know after that its up to other viewers that
    they will assist, so here it takes place.

  • March 23, 2017

    Roseanne

    Superb post however I was wanting to know if you could write a litte more on this subject?
    I’d be very grateful if you could elaborate a little bit
    further. Kudos!

  • March 23, 2017

    Georges Sadala

    It’s remarkable for me to have a web page, which is helpful in favor of my knowledge.
    thanks admin

  • March 23, 2017

    Georges Sadala

    It’s hard to find experienced people on this subject, however, you sound like
    you know what you’re talking about! Thanks

  • March 24, 2017

    Egli Diana Pinto

    Ridiculous quest there. What happened after?
    Take care!

  • March 24, 2017

    Egli Diana Pinto

    I don’t know whether it’s just me or if everyone else encountering
    issues with your site. It appears as if some of the written text on your content are running off the screen. Can somebody else
    please provide feedback and let me know if this is happening to them
    too? This could be a issue with my web browser because I’ve had this happen before.
    Thanks

  • March 24, 2017

    Alana

    What’s up to all, how is all, I think every one
    is getting more from this web page, and your views are fastidious for new users.

  • March 24, 2017

    Augusto de Arruda Botelho

    If some one needs expert view on the topic of blogging
    and site-building after that i recommend him/her to pay a
    quick visit this website, Keep up the fastidious work.

  • March 25, 2017

    Itamar Serpa Fernandes

    Incredible points. Solid arguments. Keep up the good work.

  • March 25, 2017

    Egli Diana Pinto

    Fantastic goods from you, man. I’ve take into accout your stuff prior to and
    you’re just extremely fantastic. I really like what you’ve bought right here, certainly
    like what you are saying and the way in which you are saying it.
    You make it entertaining and you still care for to stay it wise.
    I can not wait to learn far more from you.
    That is really a terrific site.

  • March 25, 2017

    Ashton

    Nice blog! Is your theme custom made or did
    you download it from somewhere? A design like yours with a few simple adjustements would really make my blog stand out.
    Please let me know where you got your design. Bless you

  • March 25, 2017

    Robert

    Wow! This blog looks just like my old one! It’s on a totally different topic but it has pretty much the same page layout and design. Wonderful choice of colors!

  • March 25, 2017

    Phillip

    Unquestionably believe that which you stated. Your favorite reason seemed to be on the net the simplest
    thing to be aware of. I say to you, I definitely get
    annoyed while people think about worries that they plainly
    do not know about. You managed to hit the nail upon the top as well as defined out the whole thing without having side-effects , people could take
    a signal. Will likely be back to get more. Thanks

Leave a Reply