The Wall Street Journal reports: Google Inc. Executive Chairman Eric Schmidt slammed reports that the U.S. government allegedly spied on the company’s data centers, describing such an act as “outrageous” and potentially illegal if proven.
“It’s really outrageous that the National Security Agency was looking between the Google data centers, if that’s true. The steps that the organization was willing to do without good judgment to pursue its mission and potentially violate people’s privacy, it’s not OK,” Mr. Schmidt told The Wall Street Journal in an interview. “The Snowden revelations have assisted us in understanding that it’s perfectly possible that there are more revelations to come.”
Mr. Schmidt said Google had registered complaints with the NSA, as well as President Barack Obama and members of the U.S. Congress.
“The NSA allegedly collected the phone records of 320 million people in order to identify roughly 300 people who might be a risk. It’s just bad public policy…and perhaps illegal,” he said.
When contacted Monday, the NSA referred to its statement last week that said recent press articles about the agency’s collection had misstated facts and mischaracterized the NSA’s activities. [Continue reading…]
Category Archives: internet
NSA surveillance may cause breakup of internet, warn experts
The Guardian reports: The vast scale of online surveillance revealed by Edward Snowden is leading to the breakup of the internet as countries scramble to protect private or commercially sensitive emails and phone records from UK and US security services, according to experts and academics.
They say moves by countries, such as Brazil and Germany, to encourage regional online traffic to be routed locally rather than through the US are likely to be the first steps in a fundamental shift in the way the internet works. The change could potentially hinder economic growth.
“States may have few other options than to follow in Brazil’s path,” said Ian Brown, from the Oxford Internet Institute. “This would be expensive, and likely to reduce the rapid rate of innovation that has driven the development of the internet to date … But if states cannot trust that their citizens’ personal data – as well as sensitive commercial and government information – will not otherwise be swept up in giant surveillance operations, this may be a price they are willing to pay.”
Since the Guardian’s revelations about the scale of state surveillance, Brazil’s government has published ambitious plans to promote Brazilian networking technology, encourage regional internet traffic to be routed locally, and is moving to set up a secure national email service.
In India, it has been reported that government employees are being advised not to use Gmail and last month, Indian diplomatic staff in London were told to use typewriters rather than computers when writing up sensitive documents.
In Germany, privacy commissioners have called for a review of whether Europe’s internet traffic can be kept within the EU – and by implication out of the reach of British and US spies. [Continue reading…]
Angry over U.S. surveillance, tech giants bolster defenses
The New York Times reports: Google has spent months and millions of dollars encrypting email, search queries and other information flowing among its data centers worldwide. Facebook’s chief executive said at a conference this fall that the government “blew it.” And though it has not been announced publicly, Twitter plans to set up new types of encryption to protect messages from snoops.
It is all reaction to reports of how far the government has gone in spying on Internet users, sneaking around tech companies to tap into their systems without their knowledge or cooperation.
What began as a public relations predicament for America’s technology companies has evolved into a moral and business crisis that threatens the foundation of their businesses, which rests on consumers and companies trusting them with their digital lives.
So they are pushing back in various ways — from cosmetic tactics like publishing the numbers of government requests they receive to political ones including tense conversations with officials behind closed doors. And companies are building technical fortresses intended to make the private information in which they trade inaccessible to the government and other suspected spies.
Yet even as they take measures against government collection of personal information, their business models rely on collecting that same data, largely to sell personalized ads. So no matter the steps they take, as long as they remain ad companies, they will be gathering a trove of information that will prove tempting to law enforcement and spies. [Continue reading…]
Dan Gillmor writes: It is dawning, at long last, on the major American technology companies that they are under attack – from their own government, not just from foreign powers and criminals. They’d already been co-opted by spies and law enforcement, forced to obey secret orders targeting their customers and users. Or, in some cases, they’d willingly collaborated with the government’s mass surveillance schemes.
Now they are realizing that their own government considers them outright adversaries. They understand, especially in the wake of the Washington Post’s report about western spy services hacking into the intra-corporate networks of internet giants Google and Yahoo, that no amount of cooperation will ever satisfy the people who wage a relentless campaign to spy on anything and everything that moves. (The NSA, of course, has issued a denial of sorts, but it’s more of a non-denial denial of the Washington Post report).
For the users of cloud services and computing/communications technologies, the evidence mounts that we have to be skeptical (I would go as far as to say highly skeptical) of what the tech companies are telling us. We can appreciate their avowed good intentions, but they have created an architecture that obliges us to believe they may be selling us out at just about every opportunity, even if they are not. [Continue reading…]
Amid NSA spying revelations, tech leaders call for new restraints on agency
The Washington Post reports: Mounting revelations about the extent of NSA surveillance have alarmed technology leaders in recent days, driving a renewed push for significant legislative action from an industry that long tried to stay above the fray in Washington.
After months of merely calling for the government to be more transparent about its surveillance requests, tech leaders have begun demanding substantive new restraints on how the National Security Agency collects and uses the vast quantities of information it scoops up around the globe, much of it from the data streams of U.S. companies.
The pivot marks an aggressive new posture for an industry that often has trod carefully in Washington — devoting more attention to blunting potentially damaging actions than to pushing initiatives that might prove controversial and alienate users from its lucrative services.
Six leading technology companies — Facebook, Google, Apple, Yahoo, Microsoft and AOL — sent a letter to Senate leaders Thursday reflecting the sharpening industry strategy, praising the sponsors of a bill that would end the bulk collection of phone records of millions of Americans and create a privacy advocate to represent civil liberties interests within the secretive court that oversees the NSA. [Continue reading…]
NSA’s MUSCULAR secretly breaks into the cloud of U.S. tech companies, siphons off data, fouls up revenues overseas
Wolf Richter writes: The cloud is where the NSA goes to pick through everyone’s data. Under the PRISM program, revealed by Snowden some time ago, the NSA has enjoyed easy access to user accounts and their data. Companies cooperate. It’s permitted under the Foreign Intelligence Surveillance Act and overseen by the Foreign Intelligence Surveillance Court. We just didn’t know about it.
MUSCULAR is darker. It secretly targets American companies. Google and Yahoo have been named in top-secret documents that Snowden had pilfered and that landed at the Washington Post. To get around legality issues in the US, the NSA broke into Google’s and Yahoo’s overseas data centers. If you have anything in the cloud – and you do, whether you want to or not – it’s stored in numerous locations, including overseas.
In March last year, when David Petraeus was still CIA Director, before emails, ironically, about an extramarital affair unraveled his career, he spoke at the In-Q-Tel CEO Summit. He was accompanied by NSA specialists. He raved about how startups that had been funded by In-Q-Tel – the CIA’s venture capital branch – were “providing enormous support to us as we execute various critical intelligence missions.” He talked about “innovative technologies developed by the firms represented in this room.”
It was just a speech, and no one really paid attention. But he was disclosing the true nature of our perfect surveillance society, on the eve of the Snowden revelations.
“We have to rethink our notions of identity and secrecy. In the digital world, data is everywhere,” he said. “Data is created constantly, often unknowingly and without permission” – emphasis mine. “Every byte left behind reveals information about location, habits, and, by extrapolation, intent, and probable behavior.” The data “that can be collected is virtually limitless,” he said, which presented “enormous intelligence opportunities.” And in closing he thanked the executives and tech gurus for “helping to keep America’s Intelligence Community at the forefront of global innovation.”
So far, the Snowden revelations have shown exactly that: an intense, hand-in-glove cooperation between the Intelligence Community and American tech companies, from scrappy startups to corporate mastodons, at every level, whether adding backdoors to Windows operating systems or compromising the keys to encryption.
But the revelations about the MUSCULAR program show that, in parallel, the NSA also worked against these tech companies – Google and Yahoo so far, but more documents are likely to trickle out, as they have done in the past, like Chinese water torture, to reveal that other American companies got hit as well. [Continue reading…]
NSA issues non-denial denial of infiltrating Google and Yahoo’s networks
TechDirt: While NSA boss Keith Alexander issued a misleading denial of this morning’s report of how the NSA has infiltrated Yahoo and Google’s networks by hacking into their private network connections between datacenters, the NSA has now come out with its official statement which is yet another typical non-denial denial. They deny things that weren’t quite said while refusing to address the actual point:
NSA has multiple authorities that it uses to accomplish its mission, which is centered on defending the nation. The Washington Post’s assertion that we use Executive Order 12333 collection to get around the limitations imposed by the Foreign Intelligence Surveillance Act and FAA 702 is not true.
The assertion that we collect vast quantities of US persons’ data from this type of collection is also not true. NSA applies attorney general-approved processes to protect the privacy of US persons – minimizing the likelihood of their information in our targeting, collection, processing, exploitation, retention, and dissemination.
NSA is a foreign intelligence agency. And we’re focused on discovering and developing intelligence about valid foreign intelligence targets only.
Note what is missing from all of this. They do not deny hacking into the data center connection lines outside of the US. They do not deny getting access to all that data, especially on non-US persons. As for the claim that they’re protecting the privacy of US persons, previous statements from Robert Litt, the general counsel for the Office of the Director of National Intelligence, have already made it clear that if they collect info on Americans, they’re going to use this loophole to search them:
“If we’re validly targeting foreigners and we happen to collect communications of Americans, we don’t have to close our eyes to that,” Litt said. “I’m not aware of other situations where once we have lawfully collected information, we have to go back and get a warrant to look at the information we’ve already collected.”
So, for all the claims that this kind of information will be “minimized,” it certainly looks like they’ve already admitted they don’t do that. [Continue reading…]
Glenn Greenwald: On leaving the Guardian
Glenn Greenwald writes: As many of you know, I’m leaving the Guardian in order to work with Pierre Omidyar, Laura Poitras, Jeremy Scahill and soon-to-be-identified others on building a new media organization. As I said when this
news was reported a couple of weeks ago, leaving the Guardian was not an easy choice, but this was a dream opportunity that was impossible to decline.We do not yet have an exact launch date for the new outlet, but rest assured: I’m not going to disappear for months or anything like that. The new site will be up and running reasonably soon.
In the meantime, I’ll continue reporting in partnership with foreign media outlets (stories on mass NSA surveillance in France began last week in Le Monde, and stories on bulk surveillance of Spanish citizens and NSA’s cooperation with Spanish intelligence have appeared this week in Spain’s El Mundo), as well as in partnership with US outlets. As I did yesterday when responding to NSA claims about these stories, I’ll also periodically post on my personal blog – here – with an active comment section, as well as on our pre-launch temporary blog. Until launch of the new media outlet, the best way to learn of new stories, new posts, and other activity is my Twitter feed, @ggreenwald. My new email address and PGP key are here. [Continue reading…]
Rogue intelligence agency: NSA infiltrates links to Yahoo, Google data centers worldwide
The Washington Post reports: The National Security Agency has secretly broken into the main communications links that connect Yahoo and Google data centers around the world, according to documents obtained from former NSA contractor Edward Snowden and interviews with knowledgeable officials.
By tapping those links, the agency has positioned itself to collect at will from among hundreds of millions of user accounts, many of them belonging to Americans. The NSA does not keep everything it collects, but it keeps a lot.
According to a top secret accounting dated Jan. 9, 2013, NSA’s acquisitions directorate sends millions of records every day from Yahoo and Google internal networks to data warehouses at the agency’s Fort Meade headquarters. In the preceding 30 days, the report said, field collectors had processed and sent back 181,280,466 new records — ranging from “metadata,” which would indicate who sent or received e-mails and when, to content such as text, audio and video.
The NSA’s principal tool to exploit the data links is a project called MUSCULAR, operated jointly with the agency’s British counterpart, GCHQ. From undisclosed interception points, the NSA and GCHQ are copying entire data flows across fiber-optic cables that carry information between the data centers of the Silicon Valley giants.
The infiltration is especially striking because the NSA, under a separate program known as PRISM, has front-door access to Google and Yahoo user accounts through a court-approved process.
The MUSCULAR project appears to be an unusually aggressive use of NSA tradecraft against flagship American companies. The agency is built for high-tech spying, with a wide range of digital tools, but it has not been known to use them routinely against U.S. companies. [Continue reading…]
The real privacy problem
Evgeny Morozov writes: In 1967, The Public Interest, then a leading venue for highbrow policy debate, published a provocative essay by Paul Baran, one of the fathers of the data transmission method known as packet switching. Titled “The Future Computer Utility,” the essay speculated that someday a few big, centralized computers would provide “information processing … the same way one now buys electricity.”
Our home computer console will be used to send and receive messages—like telegrams. We could check to see whether the local department store has the advertised sports shirt in stock in the desired color and size. We could ask when delivery would be guaranteed, if we ordered. The information would be up-to-the-minute and accurate. We could pay our bills and compute our taxes via the console. We would ask questions and receive answers from “information banks”—automated versions of today’s libraries. We would obtain up-to-the-minute listing of all television and radio programs … The computer could, itself, send a message to remind us of an impending anniversary and save us from the disastrous consequences of forgetfulness.
It took decades for cloud computing to fulfill Baran’s vision. But he was prescient enough to worry that utility computing would need its own regulatory model. Here was an employee of the RAND Corporation—hardly a redoubt of Marxist thought—fretting about the concentration of market power in the hands of large computer utilities and demanding state intervention. Baran also wanted policies that could “offer maximum protection to the preservation of the rights of privacy of information”:
Highly sensitive personal and important business information will be stored in many of the contemplated systems … At present, nothing more than trust—or, at best, a lack of technical sophistication—stands in the way of a would-be eavesdropper … Today we lack the mechanisms to insure adequate safeguards. Because of the difficulty in rebuilding complex systems to incorporate safeguards at a later date, it appears desirable to anticipate these problems.
Sharp, bullshit-free analysis: techno-futurism has been in decline ever since.
To read Baran’s essay (just one of the many on utility computing published at the time) is to realize that our contemporary privacy problem is not contemporary. It’s not just a consequence of Mark Zuckerberg’s selling his soul and our profiles to the NSA. The problem was recognized early on, and little was done about it. [Continue reading…]
The decline of Wikipedia
Tom Simonite writes: The sixth most widely used website in the world is not run anything like the others in the top 10. It is not operated by a sophisticated corporation but by a leaderless collection of volunteers who generally work under pseudonyms and habitually bicker with each other. It rarely tries new things in the hope of luring visitors; in fact, it has changed little in a decade. And yet every month 10 billion pages are viewed on the English version of Wikipedia alone. When a major news event takes place, such as the Boston Marathon bombings, complex, widely sourced entries spring up within hours and evolve by the minute. Because there is no other free information source like it, many online services rely on Wikipedia. Look something up on Google or ask Siri a question on your iPhone, and you’ll often get back tidbits of information pulled from the encyclopedia and delivered as straight-up facts.
Yet Wikipedia and its stated ambition to “compile the sum of all human knowledge” are in trouble. The volunteer workforce that built the project’s flagship, the English-language Wikipedia — and must defend it against vandalism, hoaxes, and manipulation — has shrunk by more than a third since 2007 and is still shrinking. Those participants left seem incapable of fixing the flaws that keep Wikipedia from becoming a high-quality encyclopedia by any standard, including the project’s own. Among the significant problems that aren’t getting resolved is the site’s skewed coverage: its entries on Pokemon and female porn stars are comprehensive, but its pages on female novelists or places in sub-Saharan Africa are sketchy. Authoritative entries remain elusive. Of the 1,000 articles that the project’s own volunteers have tagged as forming the core of a good encyclopedia, most don’t earn even Wikipedia’s own middle-ranking quality scores.
The main source of those problems is not mysterious. The loose collective running the site today, estimated to be 90 percent male, operates a crushing bureaucracy with an often abrasive atmosphere that deters newcomers who might increase participation in Wikipedia and broaden its coverage. [Continue reading…]
Mozilla Lightbeam reveals who’s watching you online
Evan Dashevsky writes: You are being stalked, right now, at this very moment. And by that, I mean your personal information is considered a very hot commodity among people you have never even met.
We all leave behind little bits of personal information with every new new step in our digital footprint: What sites we visit, what searches we conduct, what links we follow, and so on. Collecting that information is big business. Every time you visit a website—even this one—a ripple of data is sent through the Internet, often without our knowledge and sometimes without our consent. Lightbeam, a visually striking new add-on from Mozilla, helps illuminate the sometimes-invisible connections that weave our digital lives.
Firefoxers can find the Lightbeam add-on here. Once installed, users will find the Lightbeam logo in the bottom right of the browser. Clicking it will open a new tab with three visualization options: Graph, Clock, and List.
The default Graph option creates an zoomable, interactive visualization of your Web activity. Every time you voluntarilly visit a site, Lightbeam records this hit with a circle icon. Lightbeam assigns a triangle icon for every third-party site actively sucking data from the page you visited. Each site you visit is visually connected with a drawn line; a purple line means that a cookie is involved in the data transfer. Each site icon will be sized according to the amount of connections, and each icon will be closer to other icons depending on how many connections they share. [Continue reading…]
The core Internet institutions abandon the U.S. government
Internet Governance Project: In Montevideo, Uruguay this week, the Directors of all the major Internet organizations – ICANN, the Internet Engineering Task Force, the Internet Architecture Board, the World Wide Web Consortium, the Internet Society, all five of the regional Internet address registries – turned their back on the US government. With striking unanimity, the organizations that actually develop and administer Internet standards and resources initiated a break with 3 decades of U.S. dominance of Internet governance.
A statement released by this group called for “accelerating the globalization of ICANN and IANA functions, towards an environment in which all stakeholders, including all governments, participate on an equal footing.” That part of the statement constituted an explicit rejection of the US Commerce Department’s unilateral oversight of ICANN through the IANA contract. It also indirectly attacks the US unilateral approach to the Affirmation of Commitments, the pact between the US and ICANN which provides for periodic reviews of its activities by the GAC and other members of the ICANN community. (The Affirmation was conceived as an agreement between ICANN and the US exclusively – it would not have been difficult to allow other states to sign on as well.)
Underscoring the global significance and the determination of the group to have a global impact, the Montevideo statement was released in English, Spanish, French, Arabic, Russian and Chinese. In conversations with some of the participants of the Montevideo meeting, it became clear that they were thinking of new forms of multistakeholder oversight as a substitute for US oversight, although no detailed blueprint exists.
But that was only the beginning. A day after the Montevideo declaration, the President and CEO of ICANN, Fadi Chehadi – the man vetted by the US government to lead its keystone Internet governance institution – met with Brazilian President Dilma Rousseff. And at this meeting, Chehade engaged in some audacious private Internet diplomacy. He asked “the president [of Brazil] to elevate her leadership to a new level, to ensure that we can all get together around a new model of governance in which all are equal.” A press release from the Brazilian government said that President Rousseff wanted the event to be held in April 2014 in Rio de Janeiro. The President of ICANN thus not only allied himself with a political figure who has been intensely critical of the US government and the NSA spying program, he conspired with her to convene a global meeting to begin forging a new system of Internet governance that would move beyond the old world of US hegemony. [Continue reading…]
Skype under investigation in Luxembourg over link to NSA
The Guardian reports: Skype is being investigated by Luxembourg’s data protection commissioner over concerns about its secret involvement with the US National Security Agency (NSA) spy programme Prism, the Guardian has learned.
The Microsoft-owned internet chat company could potentially face criminal and administrative sanctions, including a ban on passing users’ communications covertly to the US signals intelliigence agency.
Skype itself is headquartered in the European country, and could also be fined if an investigation concludes that the data sharing is found in violation of the country’s data-protection laws.
The Guardian understands that Luxembourg’s data-protection commissioner initiated a probe into Skype’s privacy policies following revelations in June about its ties to the NSA. [Continue reading…]
Aaron Swartz’s father blasts MIT report, says school wasn’t neutral
Time reports: Aaron Swartz’s father is sharply critical of the Massachusetts Institute of Technology’s new report on the school’s role in the criminal investigation and subsequent death of his son. Aaron, a celebrated young computer programmer and Internet activist, committed suicide in January. He was facing a federal prison sentence on felony data-theft charges for downloading academic articles using MIT’s network. Swartz’s death triggered an outpouring of grief in the technology and Internet community, and prompted soul-searching questions among policy experts, lawmakers and MIT officials.
MIT has come under intense criticism for its handling of the Swartz affair. Two days after Swartz’s death, MIT president L. Rafael Reif asked Hal Abelson, a professor of electrical engineering and computer science at MIT, to conduct an investigation into MIT’s actions leading up to Swartz’s suicide. Abelson’s 182-page report, which was released Tuesday, asserts that MIT remained neutral throughout the Swartz investigation, and did not publicly advocate on Swartz’s behalf because to do so “might make circumstances worse” for Swartz.
In an interview with TIME, Robert Swartz, Aaron’s father, praised Abelson for assembling the facts, but said that a clear reading of those facts shows that MIT was not neutral in Aaron’s case. “The report is a contradiction because it says that MIT was neutral, and yet it makes very clear that MIT was actually not neutral,” Robert Swartz said. “MIT called in the police and then violated the law by providing the government with information and material from Aaron’s computer without a court order. Then they lied to me about those facts.” [Continue reading…]
Facebook widens data targeting
The Wall Street Journal reports: Gunning to win more advertising dollars, Facebook Inc. is using new ways to cull personal information from outside the social network and match it with data submitted by its billion-plus users.
The efforts are winning over advertisers such as General Motors Co. and Neiman Marcus Group Inc. but are further raising privacy concerns as Facebook harnesses a mosaic of information about its users.
On Wednesday, Facebook officially plans to roll out a new advertiser tool to help advertisers directly target Facebook users based on their offline spending history.
The tool marries what Facebook already knows about people’s friends and “likes” with vast troves of information from third-party data marketers such as Datalogix Inc., Acxiom Corp. and Alliance Data Systems Corp.’s Epsilon. That includes data on the Web pages that consumers visit, the email lists they have signed up for, and the way they are spending money online and offline.
A data broker like Datalogix, for example, aggregates information about which items and brands a consumer buys through sources like loyalty-card programs. Through software that obscures users’ identifying information such as email addresses and phone numbers, Datalogix and Facebook can combine their databases, and group users based on their offline purchases. Then, through the “partner categories” tool, brands can select which groups should see their advertisements.
For instance, a review of the “partner categories” tool by The Wall Street Journal found that categories often apply to tens of millions of people—for instance, there are some 20 million U.S. users who are heavy juice buyers on the social network.
A small chocolatier can target young parents in New York who buy lots of organic food products, for example. Hyundai Motor Co. recently ran a test to send ads to people identified as “intenders,” or those likely to buy a car soon based on their use of auto-research sites.
While Facebook doesn’t provide data on individuals to advertisers, it now can feed advertisers information on broad swaths of its members including their behavior outside of the social network. [Continue reading…]
Video: Policing the freedom of the internet
The Internet is four corporations controlling how you access information

'The Realms of GAFA' by David Parkins, The Economist
The god that failed: Evgeny Morozov’s ‘To Save Everything, Click Here’
Los Angeles Review of Books: Evgeny Morozov is done with the Internet. In his latest book, To Save Everything, Click Here: The Folly of Technological Solutionism, Morozov dismantles the myth that the Internet is inherently a force for social change; it can no more fix higher education, save the economy, or topple a dictator than it can make us stupid, lonely, or shallow. “The Internet” (Morozov wraps the term in quotation marks for most of the book) is not a naturally occurring phenomenon or a living thing, but a socially constructed myth that “effortlessly fills minds, pockets, coffers, and even the most glaring narrative gaps.” “The myth of the Internet,” he argues, “tells us nothing about how the world works and even less about how it should.” In fact, at one point, he questions whether the Internet even exists.
Morozov is best known for the colorful hyperbole of his polemical criticism in The New Republic and elsewhere (his book reviews are often described as “devastating”), but the most compelling passages in To Save Everything follow a more measured tack, building bridges among the academic and popular literatures on technology in society. To understand the limitations of technocratic approaches to social problems, he reads in communication studies and political philosophy. To provide a context for his interpretation of the dominant Internet myth, Morozov draws on key works in the history, sociology, and anthropology of science and technology. The bibliography is diverse, ranging from the canonical debate between John Dewey and Walter Lippman on the role of expertise in democracy, to Bruno Latour’s more recent invitation to consider the agency of “non-human” actors. This type of synthetic work is all too rare in cultural criticism, and there is an excellent reading list embedded in the endnotes of To Save Everything, Click Here. If Morozov’s argument rings true — and, for the most part, it does — it is due to the strong philosophical foundation on which he stands.
To Save Everything is animated by a thoroughgoing critique of two central ideas that Morozov terms “solutionism” and “Internet-centrism.” The first describes an instrumental engagement with public life that regards all social and political issues as problems to be solved. The second refers to a fascination with the Internet as a wholly novel sociotechnical phenomenon (which Morozov first diagnosed in his 2011 book The Net Delusion). Solutionism and Internet-centrism are both worldviews infused with the technocratic values of efficiency, cleanliness, and productivity, values that are poorly suited, in Morozov’s view, to life in a pluralistic liberal democracy. [Continue reading…]

