alexa-tracking

Main Content

1024
1024
KASKUS
51
244
https://www.kaskus.co.id/thread/526f734ff8ce17cd14000002/tukang-intip---jepang-ga-mau-bantu-nsa-mata2in-china
[Tukang Intip] - Jepang ga mau bantu NSA mata2in China
The U.S. National Security Agency sought the Japanese government’s cooperation in 2011 over wiretapping fiber-optic cables carrying phone and Internet data across the Asia-Pacific region, but the request was rejected, sources said Saturday.

The agency’s overture was apparently aimed at gathering information on China given that Japan is at the heart of optical cables that connect various parts of the region. But Tokyo turned down the proposal, citing legal restrictions and a shortage of personnel, the sources said.

The NSA asked Tokyo if it could intercept personal information from communication data passing through Japan via cables connecting it, China and other regional areas, including Internet activity and phone calls, they said.

Faced with China’s growing presence in the cyberworld and the need to bolster information about international terrorists, the United States may have been looking into whether Japan, its top regional ally, could offer help similar to that provided by Britain, according to the sources.

Based on documents leaked by former NSA contractor Edward Snowden, British newspaper The Guardian reported that the agency had been sharing data intercepted by Britain’s spy agency, GCHQ, through transatlantic cables since 2011.

But Tokyo decided it could not do so because under current legislation, it cannot intercept such communications even if the aim is to prevent a terrorist act. Japan also has a substantially smaller number of intelligence personnel, compared with the NSA’s estimated 30,000 employees, the sources said.

A separate source familiar with intelligence activities of major nations said the volume of data that would need to be intercepted from fiber-optic cables would require a massive number of workers and the assistance of the private sector.


http://www.japantimes.co.jp/news/201...ables-in-2011/
=================================================
Jepang menolak jadi antek mata2 NSA kek yg dilakukan Inggris d regional eropa.

Jepang sendiri salah 1 hub penting d dunia per internetan, yg cakupanya seluruh asia pasific, sama kek Inggris yg merupakan hub untuk wilayah Eropa

kalo dilihat dari modus operandi, kekna negara2 "Sekutu" deket uwak sam. yg deket sama Hub Internet dimintain buad mata mata negh emoticon-Cool

untuk asia tengara, hubnya di singapure (80% trafic internet asteng lewat sing).
apakah singapure bantu uwak sam, mata2 in wilayah asia tengara ? emoticon-Bingung (S)

awas yg suka baca aramah.com. ati ati di kuntit agen CIA emoticon-Ngacir
kemarin menhan kan pernah bilang kita tidak bisa disadap
so sapa takut emoticon-Cool
Quote:Original Posted By amsorigame
kemarin menhan kan pernah bilang kita tidak bisa disadap
so sapa takut emoticon-Cool


ya sud, kita aja yg ngintip
kabel bawah laut dr Oz kan lewat selat sunda emoticon-Ngacir
Quote:Original Posted By humus


ya sud, kita aja yg ngintip
kabel bawah laut dr Oz kan lewat selat sunda emoticon-Ngacir

busetemoticon-Matabelo
emang kita beraniemoticon-Malu (S)
paranoid... jadi sukanya ngintipin.. awas ntar jadi penyakit looh.. emoticon-Malu (S)
Quote:Original Posted By wahwibson

busetemoticon-Matabelo
emang kita beraniemoticon-Malu (S)


hahaha
si Edward Snowden aka NSA Leaker. kan bilank ada 5 negara laen yg kerjasama ama NSA selaen UK
Beyond that partnership, there are the other members of the "Five Eyes" -- the Australians, the New Zealanders, and the Canadians -- that also collaborate with the U.S., Snowden said. emoticon-Malu (S)

Quote:Original Posted By humus


ya sud, kita aja yg ngintip
kabel bawah laut dr Oz kan lewat selat sunda emoticon-Ngacir


Mau niru2 Government Communications Headquarters (GCHQ)?
denkoran bawa infoemoticon-Cendol (S)
Quote:Original Posted By kenyot10
Amerika Serikat menyadap telepon dan memonitor jaringan komunikasi dari fasilitas pengawasan elektronik di Kedutaan Besar AS dan konsulat di seluruh Asia timur dan tenggara. Soal ini diungkapkan oleh whistleblower Edward Snowden, seperti dimuat oleh Sidney Morning Herald edisi hari ini, Selasa, 29 Oktober 2013.

Sebuah peta rahasia yang berisi 90 daftar fasilitas pengintaian di seluruh dunia, termasuk fasilitas intelijen komunikasi di kedutaan besar di Jakarta, Kuala Lumpur, Bangkok, Phnom Penh dan Yangon. Pada 13 Agustus 2010, peta itu tidak menunjukkan fasilitas tersebut berada di Australia, Selandia Baru, Inggris, Jepang dan Singapura --negara yang dikenal sebagai sekutu terdekat AS.

Australia sepenuhnya menyadari luasnya spionase elektronik Amerika Serikat melawan tetangga dan mitra dagangnya. Selain itu, Negara Kanguru ini memiliki akses ke banyak data yang dikumpulkan oleh program itu.

Menurut peta yang diterbitkan oleh majalah Der Spiegel Jerman pada hari Selasa, 29 Oktober 2013, satuan tugas bersama dinas intelijen AS, Central Intelligence Agency (CIA) dan National Security Agency (NSA) bernama "Special Collection Service" melakukan sweeping operasi pengawasan serta operasi rahasia terhadap target intelijen khusus.

Peta itu awalnya dipublikasikan secara penuh di website Der Spiegel, tetapi kemudian diganti dengan versi yang disensor. Dalam peta itu terdapat daftar fasilitas Special Collection Service di 90 lokasi di seluruh dunia, termasuk 74 fasilitas yang dioperasikan oleh manusia, 14 fasilitas dioperasikan dari jarak jauh, dan dua pusat dukungan teknis.

Dikeluarkan hanya untuk "FVEY"--sandi untuk Five Eye, empat mitra strategis intelijen Amerika Serikat, termasuk Australia--peta itu mengungkap fasilitas operasi tersembunyi AS di kedutaannya di Jakarta, Kuala Lumpur, Bangkok, Phnom Penh dan Yangon.

http://www.tempo.co/read/news/2013/1...pan-di-Jakarta


In the early 1970's, the U.S. government learned that an undersea cable ran parallel to the Kuril Islands off the eastern coast of Russia, providing a vital communications link between two major Soviet naval bases. The problem? The Soviet Navy had completely blocked foreign ships from entering the region.

Not to be deterred, the National Security Agency launched Operation Ivy Bells, deploying fast-attack submarines and combat divers to drop waterproof recording pods on the lines. Every few weeks, the divers would return to gather the tapes and deliver them to the NSA, which would then binge-listen to their juicy disclosures.

The project ended in 1981, when NSA employee Ronald Pelton sold information about the program to the KGB for $35,000. He's still serving his life prison term.

The operation might have ended, but for the NSA, this underwater strategy clearly stuck around.

In addition to gaining access to web companies' servers and asking for phone metadata, we've now learned that both the U.S. and the U.K. spy agencies are tapping directly into the Internet's backbone -- the undersea fiber optic cables that shuttle online communications between countries and servers. For some privacy activists, this process is even more worrisome than monitoring call metadata because it allows governments to make copies of everything that transverses these cables, if they wanted to.

The British surveillance programs have fittingly sinister titles: "Mastering the Internet" and "Global Telecoms Exploitation," according to The Guardian.

A subsidiary program for these operations -- Tempora -- sucks up around 21 million gigabytes per day and stores the data for a month. The data is shared with NSA, and there are reportedly 550 NSA and GCHQ analysts poring over the information they've gathered from at least 200 fiber optic cables so far.

The scale of the resulting data harvest is tremendous. From The Guardian:

This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites -- all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets.

In an interview with online security analyst Jacob Appelbaum, NSA leaker Edward Snowden called the British spy agency GCHQ "worse than" the NSA, saying it represents the first "full take" system, in which surveillance networks catch all Internet traffic regardless of its content. Appelbaum asked Snowden if "anyone could escape" Tempora:

"Well, if you had the choice, you should never send information over British lines or British servers," Snowden said. "Even the Queen's selfies with her lifeguards would be recorded, if they existed."

The U.S.'s own cable-tapping program, known by the names OAKSTAR, STORMBREW, BLARNEY and FAIRVIEW, as revealed in an NSA PowerPoint slide, apparently functions similarly to Tempora, accessing "communications on fiber cables and infrastructure as data flows past," according to The Washington Post. The slide indicates that Prism and these so-called "upstream" programs work together somehow, with an arrow saying "You Should Use Both" pointing to the two operations.

So how does one tap into an underwater cable?

The process is extremely secretive, but it seems similar to tapping an old-fashioned, pre-digital telephone line -- the eavesdropper gathers up all the data that flows past, then deciphers it later.

More than 550,000 miles of flexible undersea cables about the size of garden watering hoses carry all the world's emails, searches, and tweets. Together, they shoot the equivalent of several hundred Libraries of Congress worth of information back and forth every day.

In 2005, the Associated Press reported that a submarine called the USS Jimmy Carter had been repurposed to carry crews of technicians to the bottom of the sea so they could tap fiber optic lines. The easiest place to get into the cables is at the regeneration points -- spots where their signals are amplified and pushed forward on their long, circuitous journeys. "At these spots, the fiber optics can be more easily tapped, because they are no longer bundled together, rather laid out individually," Deutsche Welle reported.

But such aquatic endeavors may no longer even be necessary. The cables make landfall at coastal stations in various countries, where their data is sent on to domestic networks, and it's easier to tap them on land than underwater. Britain is, geographically, in an ideal position to access to cables as they emerge from the Atlantic, so the cooperation between the NSA and GCHQ has been key. Beyond that partnership, there are the other members of the "Five Eyes" -- the Australians, the New Zealanders, and the Canadians -- that also collaborate with the U.S., Snowden said.

The tapping process apparently involves using so-called "intercept probes." According to two analysts I spoke to, the intelligence agencies likely gain access to the landing stations, usually with the permission of the host countries or operating companies, and use these small devices to capture the light being sent across the cable. The probe bounces the light through a prism, makes a copy of it, and turns it into binary data without disrupting the flow of the original Internet traffic.

"We believe our 3D MEMS technology -- as used by governments and various agencies -- is involved in the collection of intelligence from ... undersea fibers," said a director of business development at Glimmerglass, a government contractor that appeared, at least according to a 2010 Aviation Week article, to conduct similar types of interceptions, though it's unclear whether they took part in the British Tempora or the U.S. upstream programs. In a PowerPoint presentation, Glimmerglass once boasted that it provided "optical cyber solutions" to the intelligence community, offering the ability to monitor everything from Gmail to Facebook. "We are deployed in several countries that are using it for lawful interception. They've passed laws, publicly known, that they will monitor all international traffic for interdiction of any kind of terrorist activity."

Once it's gathered, the data gets sifted. Most of it is discarded, but the filters pull out material that touches on one of the 40,000 search terms chosen by the NSA and GCHQ -- that's the content the two agencies inspect more closely.

The British anti-surveillance group Privacy International has filed a lawsuit against the U.K. government, arguing that such practices amount to "blanket surveillance" and saying that British courts do "not provide sufficiently specific or clear authorization for such wide-ranging and universal interception of communications." Their argument is that the existing surveillance laws are from the phone-tapping days and can't be applied to modern, large-scale electronic data collection.

"If their motivation is to catch terrorists, then are there less intrusive methods than spying on everyone whose traffic happens to transverse the U.K.?" said Eric King, head of research at Privacy International.

Meanwhile, the British agency, the GCHQ, has defended their practices by saying that they are merely looking for a few suspicious "needles" in a giant haystack of data, and that the techniques have allowed them to uncover terrorist plots.

If groups like Privacy International are successful, it may put an end to the capture of domestic Internet data within the U.K., but as NSA expert Matthew Aid recently told me, since 80 percent of the fiber optic data flows through the U.S., it wouldn't stop the massive surveillance operations here or in other countries -- even if the person on the sending end was British.

It's also worth noting that this type of tapping has been going on for years -- it's just that we're now newly getting worked up about it. In 2007, the New York Times thus described President Bush's expansion of electronic surveillance: "the new law allows the government to eavesdrop on those conversations without warrants -- latching on to those giant switches -- as long as the target of the government's surveillance is 'reasonably believed' to be overseas."

Want to avoid being a "target" of this "switch-latching"? A site called "Prism-break" recently released a smorgasbord of encrypted browsing, chat, and email services that supposedly allow the user to evade government scrutiny.

The only platform for which there is no encrypted alternative is Apple's iOS, a proprietary software, for which the site had this warning:

"You should not entrust neither your communications nor your data to a closed source device."

======================================================
41 juta Gigabyte Data per hari emoticon-Big Grin hanya buad wilayah eropa.
analis seluruh Data stream dr sluruh dunia, butuh brp manpower emoticon-Bingung (S)

atau apakah NSA berhasil bikin supercomputer buad bantu analisis kek di scifi series ( atau ud bukan scifi lagi emoticon-Big Grin) Person of Interest
youtube-thumbnail

You are being watched.
The government has a secret system: a machine that spies on you every hour of every day.....
Quote:Original Posted By humus
In the early 1970's, the U.S. government learned that an undersea cable ran parallel to the Kuril Islands off the eastern coast of Russia, providing a vital communications link between two major Soviet naval bases. The problem? The Soviet Navy had completely blocked foreign ships from entering the region.

Not to be deterred, the National Security Agency launched Operation Ivy Bells, deploying fast-attack submarines and combat divers to drop waterproof recording pods on the lines. Every few weeks, the divers would return to gather the tapes and deliver them to the NSA, which would then binge-listen to their juicy disclosures.

The project ended in 1981, when NSA employee Ronald Pelton sold information about the program to the KGB for $35,000. He's still serving his life prison term.

The operation might have ended, but for the NSA, this underwater strategy clearly stuck around.

In addition to gaining access to web companies' servers and asking for phone metadata, we've now learned that both the U.S. and the U.K. spy agencies are tapping directly into the Internet's backbone -- the undersea fiber optic cables that shuttle online communications between countries and servers. For some privacy activists, this process is even more worrisome than monitoring call metadata because it allows governments to make copies of everything that transverses these cables, if they wanted to.

The British surveillance programs have fittingly sinister titles: "Mastering the Internet" and "Global Telecoms Exploitation," according to The Guardian.

A subsidiary program for these operations -- Tempora -- sucks up around 21 million gigabytes per day and stores the data for a month. The data is shared with NSA, and there are reportedly 550 NSA and GCHQ analysts poring over the information they've gathered from at least 200 fiber optic cables so far.

The scale of the resulting data harvest is tremendous. From The Guardian:

This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites -- all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets.

In an interview with online security analyst Jacob Appelbaum, NSA leaker Edward Snowden called the British spy agency GCHQ "worse than" the NSA, saying it represents the first "full take" system, in which surveillance networks catch all Internet traffic regardless of its content. Appelbaum asked Snowden if "anyone could escape" Tempora:

"Well, if you had the choice, you should never send information over British lines or British servers," Snowden said. "Even the Queen's selfies with her lifeguards would be recorded, if they existed."

The U.S.'s own cable-tapping program, known by the names OAKSTAR, STORMBREW, BLARNEY and FAIRVIEW, as revealed in an NSA PowerPoint slide, apparently functions similarly to Tempora, accessing "communications on fiber cables and infrastructure as data flows past," according to The Washington Post. The slide indicates that Prism and these so-called "upstream" programs work together somehow, with an arrow saying "You Should Use Both" pointing to the two operations.

So how does one tap into an underwater cable?

The process is extremely secretive, but it seems similar to tapping an old-fashioned, pre-digital telephone line -- the eavesdropper gathers up all the data that flows past, then deciphers it later.

More than 550,000 miles of flexible undersea cables about the size of garden watering hoses carry all the world's emails, searches, and tweets. Together, they shoot the equivalent of several hundred Libraries of Congress worth of information back and forth every day.

In 2005, the Associated Press reported that a submarine called the USS Jimmy Carter had been repurposed to carry crews of technicians to the bottom of the sea so they could tap fiber optic lines. The easiest place to get into the cables is at the regeneration points -- spots where their signals are amplified and pushed forward on their long, circuitous journeys. "At these spots, the fiber optics can be more easily tapped, because they are no longer bundled together, rather laid out individually," Deutsche Welle reported.

But such aquatic endeavors may no longer even be necessary. The cables make landfall at coastal stations in various countries, where their data is sent on to domestic networks, and it's easier to tap them on land than underwater. Britain is, geographically, in an ideal position to access to cables as they emerge from the Atlantic, so the cooperation between the NSA and GCHQ has been key. Beyond that partnership, there are the other members of the "Five Eyes" -- the Australians, the New Zealanders, and the Canadians -- that also collaborate with the U.S., Snowden said.

The tapping process apparently involves using so-called "intercept probes." According to two analysts I spoke to, the intelligence agencies likely gain access to the landing stations, usually with the permission of the host countries or operating companies, and use these small devices to capture the light being sent across the cable. The probe bounces the light through a prism, makes a copy of it, and turns it into binary data without disrupting the flow of the original Internet traffic.

"We believe our 3D MEMS technology -- as used by governments and various agencies -- is involved in the collection of intelligence from ... undersea fibers," said a director of business development at Glimmerglass, a government contractor that appeared, at least according to a 2010 Aviation Week article, to conduct similar types of interceptions, though it's unclear whether they took part in the British Tempora or the U.S. upstream programs. In a PowerPoint presentation, Glimmerglass once boasted that it provided "optical cyber solutions" to the intelligence community, offering the ability to monitor everything from Gmail to Facebook. "We are deployed in several countries that are using it for lawful interception. They've passed laws, publicly known, that they will monitor all international traffic for interdiction of any kind of terrorist activity."

Once it's gathered, the data gets sifted. Most of it is discarded, but the filters pull out material that touches on one of the 40,000 search terms chosen by the NSA and GCHQ -- that's the content the two agencies inspect more closely.

The British anti-surveillance group Privacy International has filed a lawsuit against the U.K. government, arguing that such practices amount to "blanket surveillance" and saying that British courts do "not provide sufficiently specific or clear authorization for such wide-ranging and universal interception of communications." Their argument is that the existing surveillance laws are from the phone-tapping days and can't be applied to modern, large-scale electronic data collection.

"If their motivation is to catch terrorists, then are there less intrusive methods than spying on everyone whose traffic happens to transverse the U.K.?" said Eric King, head of research at Privacy International.

Meanwhile, the British agency, the GCHQ, has defended their practices by saying that they are merely looking for a few suspicious "needles" in a giant haystack of data, and that the techniques have allowed them to uncover terrorist plots.

If groups like Privacy International are successful, it may put an end to the capture of domestic Internet data within the U.K., but as NSA expert Matthew Aid recently told me, since 80 percent of the fiber optic data flows through the U.S., it wouldn't stop the massive surveillance operations here or in other countries -- even if the person on the sending end was British.

It's also worth noting that this type of tapping has been going on for years -- it's just that we're now newly getting worked up about it. In 2007, the New York Times thus described President Bush's expansion of electronic surveillance: "the new law allows the government to eavesdrop on those conversations without warrants -- latching on to those giant switches -- as long as the target of the government's surveillance is 'reasonably believed' to be overseas."

Want to avoid being a "target" of this "switch-latching"? A site called "Prism-break" recently released a smorgasbord of encrypted browsing, chat, and email services that supposedly allow the user to evade government scrutiny.

The only platform for which there is no encrypted alternative is Apple's iOS, a proprietary software, for which the site had this warning:

"You should not entrust neither your communications nor your data to a closed source device."

======================================================
41 juta Gigabyte Data per hari emoticon-Big Grin hanya buad wilayah eropa.
analis seluruh Data stream dr sluruh dunia, butuh brp manpower emoticon-Bingung (S)

atau apakah NSA berhasil bikin supercomputer buad bantu analisis kek di scifi series ( atau ud bukan scifi lagi emoticon-Big Grin) Person of Interest
youtube-thumbnail

You are being watched.
The government has a secret system: a machine that spies on you every hour of every day.....

kok kayak jormungandemoticon-Matabelo
Quote:Original Posted By humus


hahaha
si Edward Snowden aka NSA Leaker. kan bilank ada 5 negara laen yg kerjasama ama NSA selaen UK
Beyond that partnership, there are the other members of the "Five Eyes" -- the Australians, the New Zealanders, and the Canadians -- that also collaborate with the U.S., Snowden said. emoticon-Malu (S)



negara2 anglo dipimpin mordoremoticon-Ngakak


bahkan jerman dan french aja kagak dapatemoticon-Malu (S)
Quote:Original Posted By Pitung.Kw


negara2 anglo dipimpin mordoremoticon-Ngakak


bahkan jerman dan french aja kagak dapatemoticon-Malu (S)


maklumm posisinya kan gituemoticon-Cendol (S)
brutus setara, prancis dianggap orang luar, jerman di bawahemoticon-Malu (S)
Quote:Original Posted By Pitung.Kw


negara2 anglo dipimpin mordoremoticon-Ngakak


bahkan jerman dan french aja kagak dapatemoticon-Malu (S)


ktnya plg parah British emoticon-Ngakak
jadi Inget felm V for Vendeta
digambarin British, mass survelance state, negri 1001 CCTV emoticon-Ngakak

Waktu ditulis masih Sci Fi, kalo sekarang ud jadi bassed on true story emoticon-Ngakak
Quote:Original Posted By amsorigame
kemarin menhan kan pernah bilang kita tidak bisa disadap
so sapa takut emoticon-Cool


emoticon-Big Grin
percaya gw sama menhan, kan komunikasi penting indonesia dilakukan dgn menggunakan jasa paranormal yg berlimpah ruah di indonesia emoticon-Stick Out Tongue
btw yg rahasia di negara ini selain asal duit korupsi apa sih?emoticon-Bingung
makanya kemarin pas fbi mau bantu kpk geger dunia persilatan emoticon-Big Grin
Quote:Original Posted By humus


ktnya plg parah British emoticon-Ngakak
jadi Inget felm V for Vendeta
digambarin British, mass survelance state, negri 1001 CCTV emoticon-Ngakak

Waktu ditulis masih Sci Fi, kalo sekarang ud jadi bassed on true story emoticon-Ngakak


ho oh, ane pun ndak nyangka UK jadi gituemoticon-Big Grin

btw, ane juga baru tau kalo negara2 anglo ini punya perjanjian untuk tidak saling memata2i dengan amrik. Jerman katanya sudah lama minta perjanjian yg sama dengan amrik, tapi ditolak terus (konon katanya karena tak ingin negara lain ikut2an minta, terutama french yg katanya banyak mencuri teknologi mamarica) Setelah ini, gimana kelanjutannya hub jerman-mamarica ya?emoticon-Ngakak (S)
Quote:Original Posted By Pitung.Kw


ho oh, ane pun ndak nyangka UK jadi gituemoticon-Big Grin

btw, ane juga baru tau kalo negara2 anglo ini punya perjanjian untuk tidak saling memata2i dengan amrik. Jerman katanya sudah lama minta perjanjian yg sama dengan amrik, tapi ditolak terus (konon katanya karena tak ingin negara lain ikut2an minta, terutama french yg katanya banyak mencuri teknologi mamarica) Setelah ini, gimana kelanjutannya hub jerman-mamarica ya?emoticon-Ngakak (S)


gw rasa hubungan us-german nga banyak pengaruh, yg bakalan rame di 3 besar UE..
bakalan makin jadi ribut antara jerma-inggris-prancis, bukan nga mungkin jerman-prancis bakalan join buat jegal kemauan inggris emoticon-Big Grin
Quote:Original Posted By Pitung.Kw


ho oh, ane pun ndak nyangka UK jadi gituemoticon-Big Grin

btw, ane juga baru tau kalo negara2 anglo ini punya perjanjian untuk tidak saling memata2i dengan amrik. Jerman katanya sudah lama minta perjanjian yg sama dengan amrik, tapi ditolak terus (konon katanya karena tak ingin negara lain ikut2an minta, terutama french yg katanya banyak mencuri teknologi mamarica) Setelah ini, gimana kelanjutannya hub jerman-mamarica ya?emoticon-Ngakak (S)

paling cuma ribut sesama eropa doang omemoticon-Ngakak

hubungan sama mama rika gak terpengaruhemoticon-Ngakak
Quote:Original Posted By humus

atau apakah NSA berhasil bikin supercomputer buad bantu analisis kek di scifi series ( atau ud bukan scifi lagi emoticon-Big Grin) Person of Interest


Itu Utah data center, katanya punya kapasitas penyimpanan data terbesar di dunia, satuannya sampe exabyte emoticon-Big Grin
tapi kekna lagi ada technical problem jadi masih belum aktif.
Quote:Original Posted By dika160507


emoticon-Big Grin
percaya gw sama menhan, kan komunikasi penting indonesia dilakukan dgn menggunakan jasa paranormal yg berlimpah ruah di indonesia emoticon-Stick Out Tongue
btw yg rahasia di negara ini selain asal duit korupsi apa sih?emoticon-Bingung
makanya kemarin pas fbi mau bantu kpk geger dunia persilatan emoticon-Big Grin


jangan lupakan juga mesin tik atau seengaknya komputer offline.
Quote:Original Posted By humus


ya sud, kita aja yg ngintip
kabel bawah laut dr Oz kan lewat selat sunda emoticon-Ngacir


buset baru tau om, kirain selama ini liwat samudra hindia emoticon-Ngacir