You Don’t Deserve Your Privacy

U.S. and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden.

The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that Internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments.

The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of Internet traffic — “the use of ubiquitous encryption across the Internet”.

Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with “brute force”, and — the most closely guarded secret of all — collaboration with technology companies and Internet service providers themselves.

Through these covert partnerships, the agencies have inserted secret vulnerabilities — known as backdoors or trapdoors — into commercial encryption software.

The files, from both the NSA and GCHQ, were obtained by the Guardian, and the details are being published today in partnership with the New York Times and ProPublica. They reveal:

  • A 10-year NSA program against encryption technologies made a breakthrough in 2010 which made “vast amounts” of data collected through Internet cable taps newly “exploitable”.
  • The NSA spends $250 million a year on a program which, among other goals, works with technology companies to “covertly influence” their product designs.
  • The secrecy of their capabilities against encryption is closely guarded, with analysts warned: “Do not ask about or speculate on sources or methods.”
  • The NSA describes strong decryption programs as the “price of admission for the U.S. to maintain unrestricted access to and use of cyberspace”.
  • A GCHQ team has been working to develop ways into encrypted traffic on the “big four” service providers, named as Hotmail, Google, Yahoo and Facebook.

NSA diagram
This network diagram, from a GCHQ pilot program, shows how the agency proposed a system to identify encrypted traffic from its Internet cable-tapping programs and decrypt what it could in near-real time. Photograph: Guardian

The agencies insist that the ability to defeat encryption is vital to their core missions of counter-terrorism and foreign intelligence gathering.

But security experts accused them of attacking the Internet itself and the privacy of all users. “Cryptography forms the basis for trust online,” said Bruce Schneier, an encryption specialist and fellow at Harvard’s Berkman Center for Internet and Society. “By deliberately undermining online security in a short-sighted effort to eavesdrop, the NSA is undermining the very fabric of the Internet.” Classified briefings between the agencies celebrate their success at “defeating network security and privacy”.

“For the past decade, NSA has lead [sic] an aggressive, multi-pronged effort to break widely used Internet encryption technologies,” stated a 2010 GCHQ document. “Vast amounts of encrypted Internet data which have up till now been discarded are now exploitable.”

An internal agency memo noted that among British analysts shown a presentation on the NSA’s progress: “Those not already briefed were gobsmacked!”

The breakthrough, which was not described in detail in the documents, meant the intelligence agencies were able to monitor “large amounts” of data flowing through the world’s fibre-optic cables and break its encryption, despite assurances from Internet company executives that this data was beyond the reach of government.

The key component of the NSA’s battle against encryption, its collaboration with technology companies, is detailed in the U.S. intelligence community’s top-secret 2013 budget request under the heading “Sigint [signals intelligence] enabling”.

NSA Bullrun 1
Classified briefings between the NSA and GCHQ celebrate their success at ‘defeating network security and privacy’. Photograph: Guardian

Funding for the program — $254.9 million for this year — dwarfs that of the Prism program, which operates at a cost of $20 million a year, according to previous NSA documents. Since 2011, the total spending on Sigint enabling has topped $800 million. The program “actively engages U.S. and foreign IT industries to covertly influence and/or overtly leverage their commercial products’ designs”, the document states. None of the companies involved in such partnerships are named; these details are guarded by still higher levels of classification.

Among other things, the program is designed to “insert vulnerabilities into commercial encryption systems”. These would be known to the NSA, but to no one else, including ordinary customers, who are tellingly referred to in the document as “adversaries”.

“These design changes make the systems in question exploitable through Sigint collection… with foreknowledge of the modification. To the consumer and other adversaries, however, the systems’ security remains intact.”

The document sets out in clear terms the program’s broad aims, including making commercial encryption software “more tractable” to NSA attacks by “shaping” the worldwide marketplace and continuing efforts to break into the encryption used by the next generation of 4G phones.

Among the specific accomplishments for 2013, the NSA expects the program to obtain access to “data flowing through a hub for a major communications provider” and to a “major Internet peer-to-peer voice and text communications system”.

Technology companies maintain that they work with the intelligence agencies only when legally compelled to do so. The Guardian has previously reported that Microsoft co-operated with the NSA to circumvent encryption on the Outlook.com email and chat services. The company insisted that it was obliged to comply with “existing or future lawful demands” when designing its products.

The documents show that the agency has already achieved another of the goals laid out in the budget request: to influence the international standards upon which encryption systems rely.

Independent security experts have long suspected that the NSA has been introducing weaknesses into security standards, a fact confirmed for the first time by another secret document. It shows the agency worked covertly to get its own version of a draft security standard issued by the US National Institute of Standards and Technology approved for worldwide use in 2006.

“Eventually, NSA became the sole editor,” the document states.

The NSA’s codeword for its decryption program, Bullrun, is taken from a major battle of the American civil war. Its British counterpart, Edgehill, is named after the first major engagement of the English civil war, more than 200 years earlier.

A classification guide for NSA employees and contractors on Bullrun outlines in broad terms its goals.

“Project Bullrun deals with NSA’s abilities to defeat the encryption used in specific network communication technologies. Bullrun involves multiple sources, all of which are extremely sensitive.” The document reveals that the agency has capabilities against widely used online protocols, such as HTTPS, voice-over-IP and Secure Sockets Layer (SSL), used to protect online shopping and banking.

The document also shows that the NSA’s Commercial Solutions Center, ostensibly the body through which technology companies can have their security products assessed and presented to prospective government buyers, has another, more clandestine role.

It is used by the NSA to “to leverage sensitive, co-operative relationships with specific industry partners” to insert vulnerabilities into security products. Operatives were warned that this information must be kept top secret “at a minimum”.

A more general NSA classification guide reveals more detail on the agency’s deep partnerships with industry, and its ability to modify products. It cautions analysts that two facts must remain top secret: that NSA makes modifications to commercial encryption software and devices “to make them exploitable”, and that NSA “obtains cryptographic details of commercial cryptographic information security systems through industry relationships”.

The agencies have not yet cracked all encryption technologies, however, the documents suggest. Snowden appeared to confirm this during a live Q&A with Guardian readers in June. “Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on,” he said before warning that NSA can frequently find ways around it as a result of weak security on the computers at either end of the communication.

The documents are scattered with warnings over the importance of maintaining absolute secrecy around decryption capabilities.

NSA Bullrun 2
A slide showing that the secrecy of the agencies’ capabilities against encryption is closely guarded. Photograph: Guardian (insert as caption)

Strict guidelines were laid down at the GCHQ complex in Cheltenham, Gloucestershire, on how to discuss projects relating to decryption. Analysts were instructed: “Do not ask about or speculate on sources or methods underpinning Bullrun.” This informaton was so closely guarded, according to one document, that even those with access to aspects of the program were warned: “There will be no ‘need to know’.”

The agencies were supposed to be “selective in which contractors are given exposure to this information”, but it was ultimately seen by Snowden, one of 850,000 people in the U.S. with top-secret clearance. A 2009 GCHQ document spells out the significant potential consequences of any leaks, including “damage to industry relationships”.

“Loss of confidence in our ability to adhere to confidentiality agreements would lead to loss of access to proprietary information that can save time when developing new capability,” intelligence workers were told. Somewhat less important to GCHQ was the public’s trust which was marked as a moderate risk, the document stated.

“Some exploitable products are used by the general public; some exploitable weaknesses are well known eg possibility of recovering poorly chosen passwords,” it said. “Knowledge that GCHQ exploits these products and the scale of our capability would raise public awareness generating unwelcome publicity for us and our political masters.”

The decryption effort is particularly important to GCHQ. Its strategic advantage from its Tempora program — direct taps on transatlantic fibre-optic cables of major telecommunications corporations — was in danger of eroding as more and more big Internet companies encrypted their traffic, responding to customer demands for guaranteed privacy.

Without attention, the 2010 GCHQ document warned, the UK’s “Sigint utility will degrade as information flows changes, new applications are developed (and deployed) at pace and widespread encryption becomes more commonplace.” Documents show that Edgehill’s initial aim was to decode the encrypted traffic certified by three major (unnamed) Internet companies and 30 types of Virtual Private Network (VPN) — used by businesses to provide secure remote access to their systems. By 2015, GCHQ hoped to have cracked the codes used by 15 major Internet companies, and 300 VPNs.

Another program, codenamed Cheesy Name, was aimed at singling out encryption keys, known as “certificates”, that might be vulnerable to being cracked by GCHQ supercomputers.

Analysts on the Edgehill project were working on ways into the networks of major webmail providers as part of the decryption project. A quarterly update from 2012 notes the project’s team “continue to work on understanding” the big four communication providers, named in the document as Hotmail, Google, Yahoo and Facebook, adding “work has predominantly been focused this quarter on Google due to new access opportunities being developed”.

To help secure an insider advantage, GCHQ also established a Humint Operations Team (HOT). Humint, short for “human intelligence” refers to information gleaned directly from sources or undercover agents.

This GCHQ team was, according to an internal document, “responsible for identifying, recruiting and running covert agents in the global telecommunications industry.”

“This enables GCHQ to tackle some of its most challenging targets,” the report said. The efforts made by the NSA and GCHQ against encryption technologies may have negative consequences for all Internet users, experts warn.

“Backdoors are fundamentally in conflict with good security,” said Christopher Soghoian, principal technologist and senior policy analyst at the American Civil Liberties Union. “Backdoors expose all users of a backdoored system, not just intelligence agency targets, to heightened risk of data compromise.” This is because the insertion of backdoors in a software product, particularly those that can be used to obtain unencrypted user communications or data, significantly increases the difficulty of designing a secure product.”

This was a view echoed in a recent paper by Stephanie Pell, a former prosecutor at the U.S. Department of Justice and non-resident fellow at the Center for Internet and Security at Stanford Law School.

“[An] encrypted communications system with a lawful interception back door is far more likely to result in the catastrophic loss of communications confidentiality than a system that never has access to the unencrypted communications of its users,” she states.

Intelligence officials asked The Guardian, New York Times and ProPublica not to publish this article, saying that it might prompt foreign targets to switch to new forms of encryption or communications that would be harder to collect or read.

The three organisations removed some specific facts but decided to publish the story because of the value of a public debate about government actions that weaken the most powerful tools for protecting the privacy of Internet users in the U.S. and worldwide.

— James Ball, Julian Borger, and Glenn Greenwald

Article originally appeared at The Guardian

  • SPACE: The Final Frontier Begins

    SPACE: The Final Frontier Begins

    Chris Campbell

    by Chris Campbell
    On Nov 18, 2014

    Would you leave Earth to help colonize another planet? This might sound like an absurd question, but, according to many leaders of thought, its one we might have to confront sooner than later. Chris Campbell explores our journey from air to space, and ponders where we’re off to next. Read on…

  • How to Blow the Whistle (and Not Live to Tell the Tale)

    How to Blow the Whistle (and Not Live to Tell the Tale)

    Chris Campbell

    by Chris Campbell
    On Sep 29, 2014

    If you’ve ever wanted to expose some heinous crime against humanity, here’s your chance. In today’s Laissez Faire Today, Chris Campbell shows you how to make sure the world accesses to your leaks, even if something happens to you. Chris also shares why this is probably a terrible idea. Read on…

  • Edison’s Secret Energy War is Back (Here’s How to Cash in)

    Edison’s Secret Energy War is Back (Here’s How to Cash in)

    Chris Campbell

    by Chris Campbell
    On Sep 23, 2014

    Over a century ago, a hidden energy war began. The bad guys won. For 100 years, man has been a slave to the energy monopolies. But now, miraculously, the good guys are throwing a punch -- and they’re inviting you to fight the good fight. Even promising riches if you do. Chris Campbell fills you in on the full story. Read on…

  • Thrive in Chaos: The Ancient Secret to Self-Sufficiency

    Thrive in Chaos: The Ancient Secret to Self-Sufficiency

    Chris Campbell

    by Chris Campbell
    On Sep 22, 2014

    An ancient guide has been in hiding… until now. As it dusts itself off, some early adopters are calling it “the definitive text on self-discipline, personal ethics, humility, self-actualization and strength.” And, according to Chris Campbell, it could be the only thing you need to thrive in our day-to-day life of modern chaos. Embrace it, and become the hero of your own story. Ignore it, and risk living a whimper of a life on someone else’s terms. Read on…

  • The 3-D Printing Story You Weren’t Told (and How it Ruined My Face)

    The 3-D Printing Story You Weren’t Told (and How it Ruined My Face)

    Chris Campbell

    by Chris Campbell
    On Sep 18, 2014

    “What… is… that?!”That’s what one colleague asked when she saw this on my desk…My face, according to 3-D printing“My face,” I said. “What does it look like?”“Uh…”OK, sure. It’s a rough depiction. Eh. It’s pretty choppy…And, as you can see, the glasses didn’t really take well… making for an eerie sunken eye look.Didn’t really turn […]

  • shutterstock_83366287

    The Story of a Reluctant Winemaker

    Joe Maga

    by Joe Maga
    On Dec 15, 2014

    Sometimes life deals you lemons. It’s up to you to make lemonade. This month’s Insider Cellar recommended winemaker had no intention of making wine when his family settled just north of Santa Barbara. When our reluctant winemaker’s father walked his land in the early 1980s, he was probably disappointed when he discovered the soil did not have the nutrients to support his strawberry crop

     

  • Bitcoin: Buy Now or Forever Hold Your Peace

    Bitcoin: Buy Now or Forever Hold Your Peace

    Chris Campbell

    by Chris Campbell
    On Sep 17, 2014

    Bitcoin has been pretty quiet lately. But that doesn’t mean big things aren’t taking place behind-the-scenes for the digital currency. In today’s Laissez Faire Today, Chris Campbell pulls back the curtain and shows you how Bitcoin is quietly slipping into the mainstream. He also shows you why now could be the time to buy now, or forever hold your peace. Read on…

  • Net Neutrality: The Story Not Being Told

    Net Neutrality: The Story Not Being Told

    Chris Campbell

    by Chris Campbell
    On Sep 12, 2014

    In an odd mix of fate, protesters and corporations are holding hands. They both have one common goal: save the Internet from the evil cable companies. We all have a common hate for them. But what if the cable companies aren’t as evil as once thought? What if there’s an even bigger evil lurking behind them? There is. Read on…

  • The Only Way to Get Rich: A Zen Proverb

    The Only Way to Get Rich: A Zen Proverb

    Chris Campbell

    by Chris Campbell
    On Sep 10, 2014

    Want to get rich? Don’t listen to financial “gurus,” says Chris Campbell. In today’s Laissez Faire Today, Chris shares a Zen proverb and shows how understanding it is the only real way to get rich (and live a rich life). Read on…

  • HappyFamily

    One Free Website to Keep Your Family Safe

    Chris Campbell

    by Chris Campbell
    On Sep 9, 2014

    Ben Franklin once said, “An ounce of prevention is worth a pound of cure.” In today’s Laissez Faire Today, you’ll learn about one FREE website that has the potential to not only keep your family safe – but also open your eyes to what’s happening in your own neighborhood. Chris Campbell has all the details. Read on…

  • SHI0115

    The Only Path to the American Dream

    Ryan Cole

    by Ryan Cole
    On Dec 10, 2014

    This month, I’m going to tell you a hard truth. It’s one that Wall Street brokers and financial analysts try to hide. It’s one that most newsletter writers choose to ignore. In fact—when it comes to the financial world—this is a “secret” that everyone knows… but no one will mention.

     

  • Youre_Incredible

    Use “Power Gaps” to Build Your Own Empire

    Chris Campbell

    by Chris Campbell
    On Sep 8, 2014

    All over the world, power is dying. The dictators and tyrants of the world are no longer able to wield it like they once used to. And they’re losing it to the “little guy.” Chris Campbell shows you how to be the king of your castle by taking advantage of this fact. Today, you’ll learn how to grab “power gaps” in the market and channel them into your product idea or project. Read on…

  • http://pro1.lfb.org/257033?email={emailaddress}

    Cash in on the Hidden Sex Boom

    Chris Campbell

    by Chris Campbell
    On Sep 5, 2014

    Chris Campbell got more than he bargained for during Sunday brunch. In a packed restaurant, he learned about a hidden sex boom that’s taking the world by storm. You won’t believe how much money ordinary Americans are making in this boom. It’s so much…you may even consider cashing in yourself.

  • Hacker

    Celebgate: Your Pictures Are Next

    Chris Campbell

    by Chris Campbell
    On Sep 4, 2014

    Hundreds of pictures of nude celebrities were leaked onto the Internet last week. The mainstream is blaming twenty-something hackers, but according to Chris Campbell, everyone must’ve already forgotten what we learned about the NSA only a year ago. Read on…

  • Free Markets and Malaysian Fireflies

    Free Markets and Malaysian Fireflies

    Chris Campbell

    by Chris Campbell
    On Sep 3, 2014

    The fireflies along the tidal rivers of Malaysia show "feats of synchrony that occur spontaneously, almost as if nature has an eerie yearning for order." Chris Campbell tells you where else this might occur in the world. Also, new technology may revolutionize the agriculture industry and what we think of as a farm.

  • TimeBomb

    Three Time Bombs in Your 401(k)

    Dave Gonigam

    by Dave Gonigam
    On Dec 4, 2014

    They lurk somewhere in everyone’s 401(k) program. Tick, tick… And it might be years before you discover them. Tick, tick… By the time you do… Kaboom! It’s too late. They’ve already blown up your retirement.

     

  • Smoking Pot in the Governor’s Mansion

    Smoking Pot in the Governor’s Mansion

    Chris Campbell

    by Chris Campbell
    On Sep 2, 2014

    Jeff Davis is running for Governor in Hawaii and has an interesting campaign strategy. Also, what motivates hackers is revealed and the findings might surprise you. Finally, Ferguson is discussed in a new light. Chris Campbell has more...

  • The End of Money

    The End of Money

    Bill Bonner

    by Bill Bonner
    On Aug 22, 2014

    When the government pumps trillions of dollars into the economy, they’re not actually printing the money. It enters as digital entries in banks across the country. It’s made the system fast, responsive, and, unfortunately, vulnerable. Now our money is no longer something we hold in our hands, but something that exists on a very susceptible network.

    An article in , ,

  • Time to Take the Plunge in Juniors

    Time to Take the Plunge in Juniors

    Doug French

    by Doug French
    On Aug 19, 2014

    When’s the best time to invest in something? When everyone else is trying to get their money out of it. It might go against conventional thinking, but following the crowd usually makes you miss the real opportunities. At one monetary metal conference recently, the smartest guys in the industry sat down to discuss where these real hidden gems lay.

  • The Moral Case for Self-Driving Cars

    The Moral Case for Self-Driving Cars

    Ronald Bailey

    by Ronald Bailey
    On Aug 18, 2014

    Say goodbye to your boring morning commute. New technologies are changing the way people drive their cars. It’s making them safer, more fuel efficient, and could reshape the way America builds its roads and cities. The only thing that could stand in the way...

  • SHI_December2014

    This Sector Is Ready to Explode 1,000% Higher

    Ryan Cole

    by Ryan Cole
    On Dec 1, 2014

    One industry is expected to grow from an estimated $77 billion sector by the end of 2014… to around $700 billion in 2024. And that, frankly, is a conservative estimate, as you’ll see below. This isn’t because of some resource boom or new discovery. This isn’t because of funny business or a trader play. This is real spending, done by real companies to combat a very real threat. It’s already an established industry but poised for exponential growth. Because the problem it combats is growing exponentially.

     

  • Central Planning by Central Bankers

    Central Planning by Central Bankers

    Gary North

    by Gary North
    On Aug 15, 2014

    In a 2009 article, the Huffington Post went into considerable detail about the number of people with PhD degrees in economics employed by the Board of Governors of the Federal Reserve System. This is the government’s branch of the Federal Reserve. It is not one of the 12 regional Federal Reserve banks, all of which […]

  • The Only Email System the NSA Can’t Access

    The Only Email System the NSA Can’t Access

    Hollie Slade

    by Hollie Slade
    On Aug 11, 2014

    When the NSA surveillance news broke last year it sent shockwaves through CERN, the particle physics laboratory in Switzerland. Andy Yen, a PhD student, took to the Young at CERN Facebook group with a simple message: “I am very concerned about the privacy issue, and I was wondering what I could do about it.”There was […]

  • Don’t Ignore These 3 Big Sells

    Don’t Ignore These 3 Big Sells

    Greg Guenthner

    by Greg Guenthner
    On Aug 1, 2014

    Remember that correction we’ve been quietly talking about over the past couple of months?Well, it might be right around the corner. Stocks waited until the last day of the month to nose-dive. The S&P 500 posted its first 2% down day since April — and the Dow wasn’t far behind. Early this morning, futures continue […]

  • Why You’re Probably on an NSA Watchlist

    Why You’re Probably on an NSA Watchlist

    Mike Leahy

    by Mike Leahy
    On Jul 30, 2014

    I was talking with one of my colleagues the other day, and he raised a very interesting question, one that deserves consideration by anyone worried about their digital privacy. He read an article that championed the idea that the more steps one took to protect their privacy by using anonymous Web-browsing tools like Tor, the […]

    An article in ,

  • EightUnusual

    8 Unusual Rules for Investing

    Chris Mayer

    by Chris Mayer
    On Nov 4, 2014

    Where do great investors come from?I’m not sure what the hurdle rate for greatness is, but Guy Spier has put up impressive results. His Aquamarine Fund has returned 463% since inception in 1997, versus just 167% for the S&P 500 (a broad proxy for the market). Put another way, $1 million invested at inception is […]

     

  • Smart Apps vs. Obamacare

    Smart Apps vs. Obamacare

    Greg Beato

    by Greg Beato
    On Jul 23, 2014

    Health care costs in the U.S. have been rising so steadily for so long that containment barely seems possible. Even optimists don’t dream of cutting the price tag. As its official name — the Patient Protection and Affordable Care Act — suggests, Obamacare aims for affordability, not radical reduction.But at a time when we’re all […]

  • The Bitcoin Billion-Dollar Discount

    The Bitcoin Billion-Dollar Discount

    Dominic Frisby

    by Dominic Frisby
    On Jul 17, 2014

    When you type a website address into a browser, you might have noticed that the letters “http” appear at the front. “HTTP” stands for Hypertext Transfer Protocol. In typing a Web address, you are actually sending an HTTP command to transmit that website to you. Hypertext Transfer Protocol is the means by which information is […]

  • Predicting A Future Free Of Dollar Bills

    Predicting A Future Free Of Dollar Bills

    Simon Black

    by Simon Black
    On Jul 14, 2014

    Picture the scene. It’s 2020. You’re at the checkout in a convenience store with a carton of milk. But you’ve got no cash and you’ve left your cards at home. No problem. You scan your right index finger; the green light flashes. Purchase approved and you leave. Easy.Is this a realistic vision of the future, […]

    An article in , ,

  • Look Who's Taking Credit for the U.S. Shale Boom

    Look Who’s Taking Credit for the U.S. Shale Boom

    Matt Insley

    by Matt Insley
    On Jul 8, 2014

    After a week of reckoning about the American oil and gas boom… I’ve got to get something off my chest.I can’t stand it when a coworker takes credit for something I did.Whether it’s a special report I wrote or just a little investing trick I found on my own — if someone takes it and […]

  • SHI_November2014

    A Double-Digit Winner That’s Attacking America’s No. 1 Killer

    Ryan Cole

    by Ryan Cole
    On Nov 1, 2014

    I made a choice five months ago. And that choice has saved my life. This wasn’t some instantaneous decision, with danger near. It wasn’t some great “eureka” moment, either. There probably isn’t a person out there who would question what I did. In fact, more and more people are making the exact same choice every day. And each one does it to the sound of applause.

     

  • The Real Forgotten Man

    The Real Forgotten Man

    Chris Mayer

    by Chris Mayer
    On Jul 2, 2014

    Franklin Delano Roosevelt famously used the term “forgotten man” in a 1932 speech to describe those at the bottom of the economic pyramid who, he felt, government should aid.But the originator of the phrase “forgotten man” had a whole different meaning in mind. He aimed to expose the seeming good intentions of government to reveal […]

  • Join 200 Other Wildcatters Plotting a Course for the Baby Bakken

    Join 200 Other Wildcatters Plotting a Course for the Baby Bakken

    Matt Insley

    by Matt Insley
    On Jun 27, 2014

    I want to share some insight and give you a front-row seat to America’s next big shale play.Let’s get to it…Over the past 10 years, the U.S. has turned the ship around, quite literally.We’ve gone from a country that was expecting to import massive amounts of oil and gas — to a country that’s sitting […]