Terrorism 2.0? New Challenges in Cyberspace

facebooktwittergoogle_plusredditpinterestlinkedinmail
Officers of the 36th electronic warfare squadron monitor a simulated test of cyberwarfare in the Central Control Facility at Eglin Air Force Base in Florida, 19 April 2008 (User Martin H., Wikimedia Commons)

Officers of the 36th Electronic Warfare Squadron monitor a simulated test of cyberwarfare in the Central Control Facility at Eglin Air Force Base in Florida, 19 April 2008 (User Martin H., Wikimedia Commons)

Discourse around cyber security and cyber terrorism is changing. It is evolving, slowly but perceptibly, from anxiety about a single catastrophic event—a “cyber Pearl Harbor”—to a conversation about how to manage a digital threat landscape that includes a large number of smaller incidents directed against a wide range of targets. Some of these episodes, to be sure, may prove catastrophic to individual victims. The strategic impact of proliferating cyber challenges, however, is more likely to be felt in their accumulated effect on our economic interests over time than in a single catastrophic event targeting American infrastructure.

Alongside this shift in the strategic conversation about cybersecurity must come a parallel conceptual shift in how we understand the threat posed by the use of cyber capabilities by terrorist groups. The conversation must evolve from a focus on fears about cataclysmic acts of cyberterrorism to a focus on changing how we approach the use of digital organization and communication technologies by terrorist groups. We also must develop a conceptual vocabulary to deal with the use, by states, of destructive cyber capabilities against private actors for political ends.

A Subtle Shift in Discourse

For the last several years, a substantial part of the discussion about cyber risk among our national leadership has revolved around preventing or preparing for the risk of a single catastrophic cyber event that destroys some component of America’s critical infrastructure. Thus, in the fall of 2012, then-Secretary of Defense Leon Panetta warned about “a cyber Pearl Harbor; an attack that would cause physical destruction and the loss of life. In fact, it would paralyze and shock the nation and create a new, profound sense of vulnerability.” As recently as November 2014, Mike Rogers, then the Chairman of the House Permanent Select Committee on Intelligence prognosticated “that threat of a catastrophic and damaging cyber attack on U.S. critical infrastructure like our power or financial networks is actually becoming less hypothetical every day.”

Panetta and Rogers are correct—the threat of a cyber attack that results in catastrophic damage to critical infrastructure is a real (if low probability) risk. But the kind of cyberattacks that have become most prominent in recent years—the kind that have plagued Target, Home Depot, Sony Pictures, Anthem Health, and many, many others—are quite different. Rather than a single catastrophic event that cripples a component of American critical infrastructure, these attacks attrite America’s strategic dominance by targeting its economic interests over time. The combination of the cyber attack and expensive cybersecurity measures imposes large costs on American businesses and causes the seepage of valuable intellectual property.

Indeed, the accumulated threat posed by narrowly focused—albeit pervasive—intellectual property or cyber-enabled theft (of credit card and other personally identifiable information) is increasingly being recognized at a strategic level. As Director of National Intelligence James Clapper recently said, “Rather than a ‘Cyber Armageddon’ scenario that debilitates the entire U.S. infrastructure, we envision something different. We foresee an ongoing series of low-to-moderate level cyber attacks from a variety of sources over time, which will impose cumulative costs on US economic competitiveness and national security.”

Cyber Terrorism? 

This subtle shift in the discourse on cybersecurity has parallel implications for how we think about the most important threat posed by the use of cyber capabilities by terrorist groups. Terrorism is understood as the intentional use of violence and fear, generally by non-state actors, in pursuit of a political agenda. In the last several years, fears of “cyber terrorism” have become part of national discourse.

While it is valid to be concerned that terrorist groups might one day engage in cyberattacks that result in significant destruction, the threat landscape involving terrorist groups and cyber capabilities is different. Indeed, at a conceptual level, scholars like Thomas Rid assert that the kinds of cyber “attacks” with which we are familiar should not be thought of as acts of war. This is because the cyber “attacks” that we have faced do not use violence for instrumental purposes, as required according to Clausewitz’s canonical definition of “war.” Rather, the exercise of cyber capabilities is better thought of as some combination of espionage, sabotage, or subversion. Attacks by ISIS sympathizers on U.S. Central Command’s Twitter account just don’t cut it.

Instead of directing our efforts to the low probability risk of a cyber terrorist attack, we should focus our attention on better developing a conceptual framework for managing two terrorism-related uses of cyber capabilities that pose more immediate challenges. The first pertains to changing our understanding of what it means to “belong to” or provide “services” that are prohibited by law to a terrorist group. The second involves how we understand the use of coercive cyber attacks against private actors by nation-states.

Cyber-Enabled Terrorism

The United States has long had laws against the provision of material support to terrorism. These statutes have generated the conviction of people like Sulaiman Abu Ghayth, Osama bin Laden’s son-in-law, for serving as al-Qaeda’s spokesman. They also served as the grounds for prosecuting Tarek Mehanna, convicted for “translating and posting on the Internet al Qaeda recruitment videos and other documents,” along with a litany of other acts. The Supreme Court’s 2010 decision in Holder v. Humanitarian Law Project also barred the provision of non-violent training to a designated terrorist organization, while at the same time affirming the First Amendment rights of individuals to engage in “independent advocacy,” even if that advocacy involves ideas embraced by terrorist groups.

The distributed and decentralized ways in which new(ish) terrorist phenomena like ISIS use social media to recruit and organize create a gray area between speech clearly protected by the First Amendment, and acts constituting criminal provision of material support. In that space, people not formally linked to terrorist groups make effective use of social media to benefit terrorist organizations. This conduct might not be punishable under U.S. criminal statutes barring the provision of material support to terrorist groups. There may also be a relatively large number of, say, Twitter users who serve as de facto recruiters for groups like ISIS, urging disaffected young people to go fight on their behalf. While this conduct might escape the ambit of today’s criminal laws, it nonetheless creates a significant problem for those trying to blunt the brutal effectiveness of ISIS.

Governments have noticed and are struggling to determine how to approach this problem within established constitutional frameworks. John Carlin, Assistant Attorney General for National Security, recently said that the Justice Department would “’consider criminal charges’ against people who are ‘proliferating ISIS social media.’” But he left undefined exactly under what circumstances DOJ would do so.

British government officials, operating in an environment with different legal and cultural understandings of the boundaries between permissible and prohibited speech, have been even more forward-leaning in criticizing social media companies whose platforms have “become the command-and-control networks of choice for terrorists and criminals.” But they too have struggled to identify the specific steps necessary (and permissible) to tackle the problem.

American traditions of free speech and public debate have facilitated incredible innovation and should not be sacrificed. At the same time, the ability of ISIS and other related groups to recruit and propagandize via social media is unprecedented. Determining how to navigate between competing values that prize free speech and that seek to degrade ISIS will be a dominant conceptual challenge for the internet generation.

Terrorism 2.0?

As non-state actors use cyber means in new ways, governments—specifically rogue regimes like North Korea and Iran—are also shifting towards cyber capabilities to inflict damage on private actors with political objectives in mind. This trend departs from the traditional notion of terrorism as acts conducted by non-state actors. For example, the 2012 hacks on Saudi Aramco appear to have been attempts at retaliation by Iran for western efforts to halt its nuclear program through sanctions or cyber activities. Furthermore, North Korea recently objected to a satirical movie about Kim Jong Un by allegedly launching a destructive cyber attack on Sony Pictures and threatening violence against movie theaters that displayed it.

These acts would likely have been considered terrorist attacks had non-state actors conducted them, and/or if they had been kinetic in nature. But the attacks targeted private actors and were conducted by governments. And while the Sony hack attempted to coerce private companies with respect to their decision whether to show a movie, it is not clear how the U.S. government would respond if another government threatened (or committed) cyber attacks against dozens of companies in order to coerce the U.S. government with respect to its own activities. An acceleration of trends in which private companies are attacked for political reasons may put the U.S. government in the awkward position of having to defend companies with whose activities it might not agree. And, more generally, to pick and choose which American (or foreign) entities it will defend and which it will not.

The digitization of nearly all aspects of modern life has generated immense benefits. It has also however, facilitated easier means for engagement in nefarious activities. This altered landscape calls into question existing boundaries between familiar concepts—the distinction between acts of terrorism and other forms of political violence, the boundaries between free speech, and the provision of material support to terrorism, among many others. Solutions to these problems are a long way off; but the first step is to recognize their novelty.

facebooktwittergoogle_plusredditpinterestlinkedinmail
Zachary K. Goldman

Zachary K. Goldman is the Executive Director of the Center on Law and Security at New York University School of Law. He has extensive experience in policy advisory with both the Department of Treasury and the Department of Defense on the topics of terrorist financing, national security strategy and counterterrorism. Mr. Goldman is a Term Member of the Council on Foreign Relations, and an Adjunct Senior Fellow at the Center for a New American Security, and has published articles on national security strategy, financial sanctions, counterterrorism, and U.S. foreign policy in outlets such as The New York Times, Foreign Affairs, Political Science Quarterly, Cold War History, The Atlantic, The Diplomat, The National Interest, and others. In the private sector, Mr. Sullivan worked as an Associate in the litigation department of Sullivan & Cromwell LLP in New York. He received his J.D. from New York University School of Law, his Masters in International Relations from the London School of Economics, and his B.A. from Harvard University.

58 Comments

  • February 24, 2017

    ig

    Hey there! This is my 1st comment here so I just wanted to give
    a quick shout out and tell you I really enjoy reading your articles.
    Can you recommend any other blogs/websites/forums that go over
    the same topics? Thank you so much!

  • February 25, 2017

    ig

    Hi to every one, because I am in fact keen of reading this website’s post to be updated regularly.
    It carries good stuff.

  • February 27, 2017

    WAN Movies

    Hello Everyone, Check Our Website For New and Lastes Movies named “Terrorism 2.0? New Challenges in Cyberspace |” ,Our Website for Watching The Lastes Movies And download Online for Free You Can take a Look to Our Website WAN Movies Let Us Grow and Thank you for you support

  • March 2, 2017

    betterscooter.com

    irrrm a sucker for the exact betterscooter.com http://adf.ly/6249830/banner/www.scamadviser.com/is-betterscooter.com-a-fake-site.html, they are decent .

  • March 3, 2017

    brazilian body wav

    I really like The brazilian body wav https://www.youtube.com/watch?v=T6hp4Ndf7vU!!!!!!

  • March 3, 2017

    oceanside rv storage

    Going The North County Model Railroad Society welcomes visitors on Thursdays from 3-5 and nevertheless it is sensible to arrange your visit ahead of time by phone 760-722-7366 or mail
    info@ Saturdays 11-2.

  • Hello there! This is kind of off topic but I need
    some advice from an established blog. Is it hard to set up your own blog?
    I’m not very techincal but I can figure things out pretty quick.
    I’m thinking about making my own but I’m not sure where
    to begin. Do you have any ideas or suggestions? Many thanks

  • March 11, 2017

    Bobbo

    You have more useful info than the British had colonies pr-WIWIe.

  • March 11, 2017

    Augusto de Arruda Botelho

    Today, I went to the beach with my kids. I found a sea shell and gave it to my 4 year
    old daughter and said “You can hear the ocean if you put this to your ear.” She
    put the shell to her ear and screamed. There was
    a hermit crab inside and it pinched her ear. She never wants to go back!
    LoL I know this is completely off topic but I had to tell someone!

  • March 18, 2017

    AGS Capital

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    nationwide home comfort

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    Beverly diamonds

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    Beverly Diamonds

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    Furniture From Home

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    Beverly Diamonds

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    Beverly Diamonds

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    www.furniturefromhome.com

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    nationwide home comfort

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    BEVERLY DIAMONDS

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    Margarita

    Keep this going please, great job!

  • BROCKSTAR BY BRIAN NELSON WILLIS SFO probes US lender over missing millions Brockstar Finance

  • March 19, 2017

    Brockstar

    BROCKSTAR BY BRIAN NELSON WILLIS SFO probes US lender over missing millions Brockstar Finance

  • March 19, 2017

    Pantera125@gmail.com

    Great post. Thank you for your time in helping me understand about this.

  • March 19, 2017

    Shavers1480@gmail.com

    Great site. Thank you for your time in helping me learn about this.

  • March 20, 2017

    Aimee

    Thanks for ones marvelous posting! I actually enjoyed reading it,
    you can be a great author. I will be sure to bookmark your blog and
    may come back from now on. I want to encourage yourself to continue
    your great posts, have a nice morning!

  • March 20, 2017

    Trisha

    Asking questions are actually pleasant thing if you are not understanding something fully, however this post provides fastidious understanding yet.

  • March 20, 2017

    good business

    I am sure this piece of writing has touched all the internet users, its really really good piece
    of writing on building up new web site.

  • March 20, 2017

    Sue

    Hi there, yup this piece of writing is really fastidious and I have learned lot of things from it concerning blogging.
    thanks.

  • March 21, 2017

    perfect body shape

    I am curious to find out what blog platform you have been using?
    I’m having some small security issues with my latest blog and I’d like to
    find something more safeguarded. Do you have any solutions?

  • March 21, 2017

    Sebastian

    Greetings from Colorado! I’m bored at work so I decided
    to browse your website on my iphone during lunch break.
    I enjoy the info you present here and can’t
    wait to take a look when I get home. I’m shocked at how fast your blog loaded
    on my cell phone .. I’m not even using WIFI, just
    3G .. Anyways, excellent blog!

  • March 21, 2017

    Todd

    Hi, I think your blog may be having browser compatibility issues.
    When I look at your website in Safari, it
    looks fine however, if opening in Internet Explorer,
    it’s got some overlapping issues. I simply wanted to provide you with a quick heads up!
    Other than that, great blog!

  • March 22, 2017

    Forrest

    What’s up, just wanted to tell you, I liked this
    post. It was funny. Keep on posting!

  • March 23, 2017

    Dusty

    Hello i am kavin, its my first occasion to commenting anywhere, when i read this article
    i thought i could also make comment due to this good post.

  • March 23, 2017

    overcome credit

    Have you ever thought about writing an ebook or guest authoring on other sites?
    I have a blog based on the same ideas you discuss and would
    love to have you share some stories/information. I know
    my visitors would appreciate your work. If you
    are even remotely interested, feel free to shoot me an e mail.

  • March 24, 2017

    Issac

    I visited multiple sites except the audio quality for audio songs present at this website is actually wonderful.

  • March 24, 2017

    gaining cellulite

    Hey just wanted to give you a quick heads up.
    The text in your content seem to be running off the screen in Safari.
    I’m not sure if this is a format issue or something to do with internet browser compatibility but I figured I’d post to let you know.

    The design and style look great though! Hope you get the issue resolved soon. Cheers

  • March 24, 2017

    services play

    Howdy! I know this is kind of off-topic however I
    needed to ask. Does building a well-established website like yours require a massive amount
    work? I’m brand new to writing a blog however I do write
    in my journal every day. I’d like to start a blog so I can easily share my
    own experience and feelings online. Please let me know
    if you have any suggestions or tips for new
    aspiring bloggers. Thankyou!

  • March 24, 2017

    social media financial

    Very good post. I’m facing a few of these issues as well..

  • March 24, 2017

    fungus type involved

    Magnificent goods from you, man. I’ve understand your stuff previous to and you’re just too fantastic.
    I really like what you’ve acquired here, really like what you are saying and the way in which
    you say it. You make it entertaining and you still take care of to keep it wise.

    I cant wait to read far more from you. This is really a terrific site.

  • March 24, 2017

    fundamental web design

    This is the right website for anyone who wishes to understand this topic.
    You realize so much its almost hard to argue with you (not that I personally would
    want to…HaHa). You certainly put a fresh spin on a subject
    which has been written about for a long time.
    Wonderful stuff, just excellent!

  • March 24, 2017

    Egli Diana Pinto

    Today, I went to the beach front with my children. I found a sea shell and gave it
    to my 4 year old daughter and said “You can hear the ocean if you put this to your ear.” She
    placed the shell to her ear and screamed. There was a hermit crab inside and it pinched
    her ear. She never wants to go back! LoL I know this is totally off
    topic but I had to tell someone!

  • March 25, 2017

    Itamar Serpa Fernandes

    What’s Happening i’m new to this, I stumbled upon this I have discovered It absolutely helpful and it has helped me out loads.
    I’m hoping to contribute & aid different customers like
    its aided me. Good job.

  • It’s actually a great and helpful piece of information. I’m satisfied that you shared this
    helpful information with us. Please keep us informed like this.

    Thanks for sharing.

  • March 25, 2017

    advisors stands

    What’s up mates, nice piece of writing and fastidious urging commented at this place, I am truly enjoying by these.

  • March 25, 2017

    Itamar Serpa Fernandes

    You made some really good points there. I looked on the
    web for more info about the issue and found most people will
    go along with your views on this web site.

  • March 25, 2017

    Egli Diana Pinto

    Your method of explaining everything in this piece of writing is really
    nice, every one be able to simply know it, Thanks a lot.

  • March 25, 2017

    best forex tips

    Heya this is somewhat of off topic but I was wondering if
    blogs use WYSIWYG editors or if you have to manually code with HTML.
    I’m starting a blog soon but have no coding skills so I wanted to get advice from someone with experience.
    Any help would be enormously appreciated!

  • March 25, 2017

    car computer exchange

    A fascinating discussion is definitely worth comment.
    I think that you ought to publish more on this subject matter, it may not be a taboo matter but typically people don’t talk about these subjects.
    To the next! Kind regards!!

  • March 26, 2017

    numbers take

    This is very fascinating, You’re an overly professional blogger.

    I have joined your rss feed and look ahead to in search
    of extra of your wonderful post. Additionally, I’ve shared your site in my
    social networks

  • March 26, 2017

    Egli Diana Pinto

    If you wish for to obtain much from this post then you have to
    apply such techniques to your won website.

  • March 26, 2017

    credit track record

    Thanks for one’s marvelous posting! I definitely enjoyed reading it, you will be
    a great author.I will always bookmark your blog and may come
    back down the road. I want to encourage continue your great writing, have a nice afternoon!

  • March 26, 2017

    Dianna

    I’m extremely impressed with your writing skills as well as with the layout on your blog.
    Is this a paid theme or did you modify it yourself?
    Either way keep up the nice quality writing, it is rare to see
    a nice blog like this one these days.

  • March 27, 2017

    Stephan

    hello there and thank you for your info – I’ve definitely
    picked up anything new from right here. I did however expertise several technical
    points using this web site, as I experienced to reload the web site lots
    of times previous to I could get it to load correctly. I had been wondering if your
    hosting is OK? Not that I am complaining, but slow loading instances times will often affect your placement in google and can damage your high-quality score if advertising and marketing with
    Adwords. Anyway I’m adding this RSS to my e-mail and can look
    out for much more of your respective exciting content.
    Ensure that you update this again very soon.

  • March 27, 2017

    Vickie

    I am really impressed with your writing skills as well as with the layout on your blog.
    Is this a paid theme or did you customize it yourself?
    Anyway keep up the nice quality writing, it’s rare to see a
    great blog like this one these days.

  • March 27, 2017

    Maple

    I must thank you for the efforts you’ve put in writing this
    site. I’m hoping to check out the same high-grade content by you in the future as well.
    In truth, your creative writing abilities has inspired me to get my own, personal website now ;
    )

  • March 28, 2017

    Egli Diana Pinto

    Nice post. I learn something new and challenging on websites
    I stumbleupon every day. It’s always interesting to read articles from other authors and use something from other sites.

  • March 30, 2017

    nxt bike together

    What i do not realize is actually how you’re not really a lot more smartly-appreciated than you might be right now.
    You’re very intelligent. You understand therefore significantly when it
    comes to this topic, produced me individually consider it
    from a lot of numerous angles. Its like men and women don’t seem to be interested except it is something to do with Girl
    gaga! Your own stuffs outstanding. All the time handle it up!

  • March 30, 2017

    bike ride

    Way cool! Some extremely valid points! I appreciate you writing this write-up plus the rest of
    the website is extremely good.

Leave a Reply