Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,208,983 members, 8,004,521 topics. Date: Saturday, 16 November 2024 at 06:21 PM

Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide - Science/Technology - Nairaland

Nairaland Forum / Science/Technology / Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide (3544 Views)

16 Nigerian Iventors With Remarkable Inventions Worldwide / FSTN Lcds For Media Equipment, Car Monitor, Lcds For Cellphone And Laptop / GPS Wrist Watch Cellphone - 1.5 Inch LCD Display - Two Way Calling (2) (3) (4)

(1) (2) (Reply) (Go Down)

Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by Fulaman198(m): 5:28pm On Dec 05, 2014
OPERATION AURORAGOLD
HOW THE NSA HACKS CELLPHONE NETWORKS WORLDWIDE
BY RYAN GALLAGHER

In March 2011, two weeks before the Western intervention in Libya, a secret message was delivered to the National Security Agency. An intelligence unit within the U.S. military’s Africa Command needed help to hack into Libya’s cellphone networks and monitor text messages.

For the NSA, the task was easy. The agency had already obtained technical information about the cellphone carriers’ internal systems by spying on documents sent among company employees, and these details would provide the perfect blueprint to help the military break into the networks.

The NSA’s assistance in the Libya operation, however, was not an isolated case. It was part of a much larger surveillance program—global in its scope and ramifications—targeted not just at hostile countries.

According to documents contained in the archive of material provided to The Intercept by whistleblower Edward Snowden, the NSA has spied on hundreds of companies and organizations internationally, including in countries closely allied to the United States, in an effort to find security weaknesses in cellphone technology that it can exploit for surveillance.

The documents also reveal how the NSA plans to secretly introduce new flaws into communication systems so that they can be tapped into—a controversial tactic that security experts say could be exposing the general population to criminal hackers.

Codenamed AURORAGOLD, the covert operation has monitored the content of messages sent and received by more than 1,200 email accounts associated with major cellphone network operators, intercepting confidential company planning papers that help the NSA hack into phone networks.

One high-profile surveillance target is the GSM Association, an influential U.K.-headquartered trade group that works closely with large U.S.-based firms including Microsoft, Facebook, AT&T, and Cisco, and is currently being funded by the U.S. government to develop privacy-enhancing technologies.

Karsten Nohl, a leading cellphone security expert and cryptographer who was consulted by The Intercept about details contained in the AURORAGOLD documents, said that the broad scope of information swept up in the operation appears aimed at ensuring virtually every cellphone network in the world is NSA accessible.

THE OPERATION APPEARS AIMED AT ENSURING VIRTUALLY EVERY CELLPHONE NETWORK IN THE WORLD IS NSA ACCESSIBLE.
“Collecting an inventory [like this] on world networks has big ramifications,” Nohl said, because it allows the NSA to track and circumvent upgrades in encryption technology used by cellphone companies to shield calls and texts from eavesdropping. Evidence that the agency has deliberately plotted to weaken the security of communication infrastructure, he added, was particularly alarming.

“Even if you love the NSA and you say you have nothing to hide, you should be against a policy that introduces security vulnerabilities,” Nohl said, “because once NSA introduces a weakness, a vulnerability, it’s not only the NSA that can exploit it.”

NSA spokeswoman Vanee’ Vines told The Intercept in a statement that the agency “works to identify and report on the communications of valid foreign targets” to anticipate threats to the United States and its allies.

Vines said: “NSA collects only those communications that it is authorized by law to collect in response to valid foreign intelligence and counterintelligence requirements—regardless of the technical means used by foreign targets, or the means by which those targets attempt to hide their communications.”

Network coverage

The AURORAGOLD operation is carried out by specialist NSA surveillance units whose existence has not been publicly disclosed: the Wireless Portfolio Management Office, which defines and carries out the NSA’s strategy for exploiting wireless communications, and the Target Technology Trends Center, which monitors the development of new communication technology to ensure that the NSA isn’t blindsided by innovations that could evade its surveillance reach. The center’s logo is a picture of the Earth overshadowed by a large telescope; its motto is “Predict – Plan – Prevent.”


The NSA documents reveal that, as of May 2012, the agency had collected technical information on about 70 percent of cellphone networks worldwide—701 of an estimated 985—and was maintaining a list of 1,201 email “selectors” used to intercept internal company details from employees. (“Selector” is an agency term for a unique identifier like an email address or phone number.) From November 2011 to April 2012, between 363 and 1,354 selectors were “tasked” by the NSA for surveillance each month as part of AURORAGOLD, according to the documents. The secret operation appears to have been active since at least 2010.
The information collected from the companies is passed onto NSA “signals development” teams that focus on infiltrating communication networks. It is also shared with other U.S. Intelligence Community agencies and with the NSA’s counterparts in countries that are part of the so-called “Five Eyes” surveillance alliance—the United Kingdom, Canada, Australia, and New Zealand.

Aside from mentions of a handful of operators in Libya, China, and Iran, names of the targeted companies are not disclosed in the NSA’s documents. However, a top-secret world map featured in a June 2012 presentation on AURORAGOLD suggests that the NSA has some degree of “network coverage” in almost all countries on every continent, including in the United States and in closely allied countries such as the United Kingdom, Australia, New Zealand, Germany, and France.

map
One of the prime targets monitored under the AURORAGOLD program is the London-headquartered trade group, the GSM Association, or the GSMA, which represents the interests of more than 800 major cellphone, software, and internet companies from 220 countries.

The GSMA’s members include U.S.-based companies such as Verizon, AT&T, Sprint, Microsoft, Facebook, Intel, Cisco, and Oracle, as well as large international firms including Sony, Nokia, Samsung, Ericsson, and Vodafone.

The trade organization brings together its members for regular meetings at which new technologies and policies are discussed among various “working groups.” The Snowden files reveal that the NSA specifically targeted the GSMA’s working groups for surveillance.

Claire Cranton, a spokeswoman for the GSMA, said that the group would not respond to details uncovered by The Intercept until its lawyers had studied the documents related to the spying.

“If there is something there that is illegal then they will take it up with the police,” Cranton said.

By covertly monitoring GSMA working groups in a bid to identify and exploit security vulnerabilities, the NSA has placed itself into direct conflict with the mission of the National Institute for Standards and Technology, or NIST, the U.S. government agency responsible for recommending cybersecurity standards in the United States. NIST recently handed out a grant of more than $800,000 to GSMA so that the organization could research ways to address “security and privacy challenges” faced by users of mobile devices.

The revelation that the trade group has been targeted for surveillance may reignite deep-seated tensions between NIST and NSA that came to the fore following earlier Snowden disclosures. Last year, NIST was forced to urge people not to use an encryption standard it had previously approved after it emerged NSA had apparently covertly worked to deliberately weaken it.

Jennifer Huergo, a NIST spokewoman, told The Intercept that the agency was “not aware of any activities by NSA related to the GSMA.” Huergo said that NIST would continue to work towards “bringing industry together with privacy and consumer advocates to jointly create a robust marketplace of more secure, easy-to-use, privacy-enhancing solutions.”

gstreetview2
GSMA headquarters in London (left)
Encryption attack

The NSA focuses on intercepting obscure but important technical documents circulated among the GSMA’s members known as “IR.21s.”

Most cellphone network operators share IR.21 documents among each other as part of agreements that allow their customers to connect to foreign networks when they are “roaming” overseas on a vacation or a business trip. An IR.21, according to the NSA documents, contains information “necessary for targeting and exploitation.”

The details in the IR.21s serve as a “warning mechanism” that flag new technology used by network operators, the NSA’s documents state. This allows the agency to identify security vulnerabilities in the latest communication systems that can be exploited, and helps efforts to introduce new vulnerabilities “where they do not yet exist.”

The IR.21s also contain details about the encryption used by cellphone companies to protect the privacy of their customers’ communications as they are transmitted across networks. These details are highly sought after by the NSA, as they can aid its efforts to crack the encryption and eavesdrop on conversations.

Last year, the Washington Post reported that the NSA had already managed to break the most commonly used cellphone encryption algorithm in the world, known as A5/1. But the information collected under AURORAGOLD allows the agency to focus on circumventing newer and stronger versions of A5 cellphone encryption, such as A5/3.

The documents note that the agency intercepts information from cellphone operators about “the type of A5 cipher algorithm version” they use, and monitors the development of new algorithms in order to find ways to bypass the encryption.

In 2009, the British surveillance agency Government Communications Headquarters conducted a similar effort to subvert phone encryption under a project called OPULENT PUP, using powerful computers to perform a “crypt attack” to penetrate the A5/3 algorithm, secret memos reveal. By 2011, GCHQ was collaborating with the NSA on another operation, called WOLFRAMITE, to attack A5/3 encryption. (GCHQ declined to comment for this story, other than to say that it operates within legal parameters.)

The extensive attempts to attack cellphone encryption have been replicated across the Five Eyes surveillance alliance. Australia’s top spy agency, for instance, infiltrated an Indonesian cellphone company and stole nearly 1.8 million encryption keys used to protect communications, the New York Times reported in February.


Click to enlarge.
The NSA’s documents show that it focuses on collecting details about virtually all technical standards used by cellphone operators, and the agency’s efforts to stay ahead of the technology curve occasionally yield significant results. In early 2010, for instance, its operatives had already found ways to penetrate a variant of the newest “fourth generation” smartphone-era technology for surveillance, years before it became widely adopted by millions of people in dozens of countries.

The NSA says that its efforts are targeted at terrorists, weapons proliferators, and other foreign targets, not “ordinary people.” But the methods used by the agency and its partners to gain access to cellphone communications risk significant blowback.

According to Mikko Hypponen, a security expert at Finland-based F-Secure, criminal hackers and foreign government adversaries could be among the inadvertent beneficiaries of any security vulnerabilities or encryption weaknesses inserted by the NSA into communication systems using data collected by the AURORAGOLD project.

“If there are vulnerabilities on those systems known to the NSA that are not being patched on purpose, it’s quite likely they are being misused by completely other kinds of attackers,” said Hypponen. “When they start to introduce new vulnerabilities, it affects everybody who uses that technology; it makes all of us less secure.”

“IT AFFECTS EVERYBODY WHO USES THAT TECHNOLOGY; IT MAKES ALL OF US LESS SECURE.”
In December, a surveillance review panel convened by President Obama concluded that the NSA should not “in any way subvert, undermine, weaken, or make vulnerable generally available commercial software.” The panel also recommended that the NSA should notify companies if it discovers previously unknown security vulnerabilities in their software or systems—known as “zero days” because developers have been given zero days to fix them—except in rare cases involving “high priority intelligence collection.”

In April, White House officials confirmed that Obama had ordered NSA to disclose vulnerabilities it finds, though qualified that with a loophole allowing the flaws to be secretly exploited so long as there is deemed to be “a clear national security or law enforcement” use.

Vines, the NSA spokeswoman, told The Intercept that the agency was committed to ensuring an “open, interoperable, and secure global internet.”

“NSA deeply values these principles and takes great care to honor them in the performance of its lawful foreign-intelligence mission,” Vines said.

She declined to discuss the tactics used as part of AURORAGOLD, or comment on whether the operation remains active
Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by ArtanK(m): 6:07pm On Dec 05, 2014
“Even if you love the NSA and you say you have nothing to hide, you should be against a policy that introduces security vulnerabilities,” Nohl said, “because once NSA introduces a weakness, a vulnerability, it’s not only the NSA that can exploit it.

That's worrying. It makes me want to throw away my laptop, phone, tablet, TV, fridge and toaster lol.

2 Likes

Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by Nobody: 1:45pm On Dec 07, 2014
ArtanK:


That's worrying. It makes me want to throw away my laptop, phone, tablet, TV, fridge and toaster lol.

I hope you don't have an Xbox.

1 Like

Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by Fulaman198(m): 1:55am On Dec 08, 2014
At least you both understand the implications of all this
Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by Fulaman198(m): 1:58am On Dec 08, 2014
ArtanK:


That's worrying. It makes me want to throw away my laptop, phone, tablet, TV, fridge and toaster lol.

Whilst your devices without a doubt may have loop holes in security. I wouldn't worry too that extent. What I would do since I assume that you are on a wireless network are the bare minimum. WPA2 encryption with AES, and MAC address filtering. Unless if the person really knows how to hack, that would help your internal devices. Make sure that when configuring your router that it uses 'https:' instead of 'http:'
Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by LordReed(m): 10:05am On Dec 08, 2014
The darkside of technology. Once a tech exists its almost inevitable somebody will use it for wrong, even the "good guys".

1 Like

Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by ArtanK(m): 11:38am On Dec 09, 2014
EnlightenedSoul:


I hope you don't have an Xbox.

I don't but why Xbox?

I've never owned an one. I've been a loyal Playstation fan since 1997. cool
Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by ArtanK(m): 11:45am On Dec 09, 2014
Fulaman198:


Whilst your devices without a doubt may have loop holes in security. I wouldn't worry too that extent. What I would do since I assume that you are on a wireless network are the bare minimum. WPA2 encryption with AES, and MAC address filtering. Unless if the person really knows how to hack, that would help your internal devices. Make sure that when configuring your router that it uses 'https:' instead of 'http:'

How about using a proxy at all times? Does that help?
Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by Nobody: 10:54pm On Dec 09, 2014
ArtanK:


I don't but why Xbox?

I've never owned an one. I've been a loyal Playstation fan since 1997. cool

Considering the fact that MS has handed over their encryptions to the NSA, a lot of people are really concerned about the "always on" Kinect camera/microphone on the Xbox One.
Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by Fulaman198(m): 5:00pm On Dec 10, 2014
ArtanK:


How about using a proxy at all times? Does that help?

ROFL no it helps in no way what so ever. It only helps if you are visiting websites and you don't want them to know the exact geographical location you are from. Let's say you want to watch some video that is not available to your region, by utilising a proxy, you can bypass those geographical requirements.
Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by Fulaman198(m): 5:01pm On Dec 10, 2014
EnlightenedSoul:


Considering the fact that MS has handed over their encryptions to the NSA, a lot of people are really concerned about the "always on" Kinect camera/microphone on the Xbox One.

Yep, all the major corps did so, but when documentation by Snowden was released, they were all exposed. Google, Microsoft, Yahoo, Apple, etc. etc. all handed over their encryption keys to the N.SA. So your iPhone, your front facing camera could be capturing you right now and you wouldn't know, or your MacBook Pro cheesy
Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by Nobody: 5:09pm On Dec 10, 2014
Fulaman198:


Yep, all the major corps did so, but when documentation by Snowden was released, they were all exposed. Google, Microsoft, Yahoo, Apple, etc. etc. all handed over their encryption keys to the N.SA. So your iPhone, your front facing camera could be capturing you right now and you wouldn't know, or your MacBook Pro cheesy

Stop scaring me. I knew about Microsoft, but Apple??

Geez, well delivered. That was uber creepy. Not that should be surprised, or anything... undecided

1 Like

Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by ArtanK(m): 8:44pm On Dec 10, 2014
Fulaman198:


ROFL no it helps in no way what so ever. It only helps if you are visiting websites and you don't want them to know the exact geographical location you are from. Let's say you want to watch some video that is not available to your region, by utilising a proxy, you can bypass those geographical requirements.

LOL I feel like such a noob.

Thanks to you and E-soul, I'm 100 times more paranoid than I was before.

2 Likes

Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by Nobody: 10:54pm On Dec 10, 2014
ArtanK:


LOL I feel like such a noob.

Thanks to you and E-soul, I'm 100 times more paranoid than I was before.

He legit scared me wallahi. Dang lol.

1 Like

Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by ArtanK(m): 11:04pm On Dec 10, 2014
EnlightenedSoul:


He legit scared me wallahi. Dang lol.

It will only get worse from here onwards. It's time to head to the plains of Mudug and live a simple life lol.

2 Likes

Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by Nobody: 11:18pm On Dec 10, 2014
ArtanK:


It will only get worse from here onwards. It's time to head to the plains of Mudug and live a simple life lol.

After this? Oh, I'm so there already. You can locate me somewhere on the gulf of Tadjoura, bro lols.

2 Likes

Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by ArtanK(m): 11:37pm On Dec 10, 2014
EnlightenedSoul:


After this? Oh, I'm so there already. You can locate me somewhere on the gulf of Tadjoura, bro lols.

Remember no phones, tablets and computers tongue

North Mudug doesn't sound very nice compared to Tadjoura *scratches head*

2 Likes

Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by Fulaman198(m): 11:52pm On Dec 10, 2014
ArtanK:


LOL I feel like such a noob.

Thanks to you and E-soul, I'm 100 times more paranoid than I was before.

Nothing wrong with being paranoid, you have every right to be because it's actually happening.

1 Like

Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by Fulaman198(m): 11:54pm On Dec 10, 2014
EnlightenedSoul:


Stop scaring me. I knew about Microsoft, but Apple??

Geez, well delivered. That was uber creepy. Not that should be surprised, or anything... undecided



Loll yeah

1 Like

Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by Nobody: 12:05am On Dec 11, 2014
ArtanK:


Remember no phones, tablets and computers tongue

North Mudug doesn't sound very nice compared to Tadjoura *scratches head*

Nah, you're just more honest about the 'simple life' thing. You say plains, I say...bustling gulf cities? Could've gone more inland JS embarassed

1 Like

Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by ArtanK(m): 2:00am On Dec 11, 2014
EnlightenedSoul:


Nah, you're just more honest about the 'simple life' thing. You say plains, I say...bustling gulf cities? Could've gone more inland JS embarassed

Well you could settle nearby the beautiful Arta mountains, they overlook the gulf so you could have both if you like.

1 Like

Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by Nobody: 3:40pm On Dec 15, 2014
ArtanK:


Well you could settle nearby the beautiful Arta mountains, they overlook the gulf so you could have both if you like.

Yh, and it gets much cooler temps in the summer when the rest of Djib is pretty much unbearably hott. Gr8 looking out, bro lol. Come to think of it, your name sounds a lot like those mountains, but I'm struggling with the root word..
Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by ArtanK(m): 2:20am On Dec 16, 2014
EnlightenedSoul:


Yh, and it gets much cooler temps in the summer when the rest of Djib is pretty much unbearably hott. Gr8 looking out, bro lol. Come to think of it, your name sounds a lot like those mountains, but I'm struggling with the root word..

I'm not sure you know, I asked my dad(last month) and my grandma separately but they contradicted each other. My grandma started speaking in Hadrawi type Somali so I gave up trying to understand what she was going on about. The only thing I understood from her long speech was that the name has something to do with the sun, clouds and the rainy season. While my dad said that it means victorious warrior, coincidentally there was a famous Somali warrior with that name in the 18th century.

I prefer the last-mentioned of course tongue
Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by Nobody: 4:19pm On Dec 17, 2014
ArtanK:



I'm not sure you know, I asked my dad(last month) and my grandma separately but they contradicted each other. My grandma started speaking in Hadrawi type Somali so I gave up trying to understand what she was going on about. The only thing I understood from her long speech was that the name has something to do with the sun, clouds and the rainy season. While my dad said that it means victorious warrior, coincidentally there was a famous Somali warrior with that name in the 18th century.

I prefer the last-mentioned of course tongue

That's awesome smiley

When you say Hadrawi, you mean the type spoken in Sanaag, Aeyn, Togdheer/Burco etc? Basically the 'waqooyi' of Som.? Some of the lingo & grammar they use is totally unfamiliar, so I def get what you mean. I was told the language there is 'purer' than farther south, and even northern-most Djib.

Sounds like your grandmother has a lot to say. You should learn Hadrawi, and earn her ear. I envy you that.

1 Like

Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by ArtanK(m): 9:58pm On Dec 17, 2014
EnlightenedSoul:


That's awesome smiley

When you say Hadrawi, you mean the type spoken in Sanaag, Aeyn, Togdheer/Burco etc? Basically the 'waqooyi' of Som.? Some of the lingo & grammar they use is totally unfamiliar, so I def get what you mean. I was told the language there is 'purer' than farther south, and even northern-most Djib.

Sounds like your grandmother has a lot to say. You should learn Hadrawi, and earn her ear. I envy you that.

Yeah, tough northern dialect with unfathomable words and sentences. I'll lend her an attentive ear when I see her next, hopefully by then I'll be more proficient in Hadrawi.

1 Like

Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by axum: 1:26pm On Dec 22, 2014
EnlightenedSoul:


That's awesome smiley

When you say Hadrawi, you mean the type spoken in Sanaag, Aeyn, Togdheer/Burco etc? Basically the 'waqooyi' of Som.? Some of the lingo & grammar they use is totally unfamiliar, so I def get what you mean. I was told the language there is 'purer' than farther south, and even northern-most Djib.

Sounds like your grandmother has a lot to say. You should learn Hadrawi, and earn her ear. I envy you that.


E-Soul Macaanto how have you been?
Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by adamskutty(m): 3:01pm On Dec 22, 2014
axum:



E-Soul Macaanto how have you been?
look who we have here, oh axum my boy u were greatly missed. grin
Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by Fulaman198(m): 5:32pm On Dec 22, 2014
LordReed:
The darkside of technology. Once a tech exists its almost inevitable somebody will use it for wrong, even the "good guys".

I don't know why I missed this message earlier. This is absolutely true. I also love how you put 'good guys' in quotation marks loll we both know they are not good guys.
Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by axum: 2:02am On Dec 23, 2014
adamskutty:
look who we have here, oh axum my boy u were greatly missed. grin


So I have heard.


Great to see that you haven't fallen ill to the Ebola virus. But I have a feeling the Aids virus will get you. smiley
Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by adamskutty(m): 6:49am On Dec 23, 2014
axum:



So I have heard.


Great to see that you haven't fallen ill to the Ebola virus. But I have a feeling the Aids virus will get you. smiley
ebola has seen been eliminated with ease grin

The aids virus can't get me, i have a feeling u already have it in ur system, so u are finding a way to transfer it to me through the net. grin
Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by axum: 8:03am On Dec 23, 2014
adamskutty:
ebola has seen been eliminated with ease grin

The aids virus can't get me, i have a feeling u already have it in ur system, so u are finding a way to transfer it to me through the net. grin


I assume your parents haven't sat down with you and had the bird and the bees talk. cheesy
Re: Operation Auroragold How The Nsa Hacks Cellphone Networks Worldwide by ratatis(m): 4:24am On Dec 29, 2014
@ OP, thanks for sharing.
" Forewarned is Fore-armed ".

1 Like

(1) (2) (Reply)

How Can I Install .jar Files On My Android? / Video: Gulf Of Alaska Where Two Oceans Meet But Do Not Mix / Nokia Phone Inform Of A Gun!

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 71
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.