2017 9Th International Conference on Cyber Conflict: Defending the Core

Total Page:16

File Type:pdf, Size:1020Kb

2017 9Th International Conference on Cyber Conflict: Defending the Core 2017 9th International Conference on Cyber Conflict: Defending the Core H. Rõigas, R. Jakschis, L. Lindström, T. Minárik (Eds.) 30 MAY - 02 JUNE 2017, TALLINN, ESTONIA 2017 9TH International ConFerence on CYBER ConFlict: DEFENDING THE CORE Copyright © 2017 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1726N-PRT ISBN (print): 978-9949-9904-0-5 ISBN (pdf): 978-9949-9904-1-2 COPyright AND REPrint Permissions No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, and for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2017 9th International Conference on Cyber Conflict: Defending the Core H. Rõigas, R. Jakschis, L. Lindström, T. Minárik (Eds.) 2017 © NATO CCD COE Publications Printed COPIES OF THIS PUBlication are AVAILABLE From: NATO CCD COE Publications Filtri tee 12, 10132 Tallinn, Estonia Phone: +372 717 6800 Fax: +372 717 6308 E-mail: [email protected] Web: www.ccdcoe.org Head of publishing: Jaanika Rannu Layout: Jaakko Matsalu LEGAL NOTICE: This publication contains opinions of the respective authors only. They do not necessarily reflect the policy or the opinion of NATO CCD COE, NATO, or any agency or any government. NATO CCD COE may not be held responsible for any loss or harm arising from the use of information contained in this book and is not responsible for the content of the external sources, including external websites referenced in this publication. NATO COOPeratiVE CYBER DEFence Centre OF EXcellence The NATO Cooperative Cyber Defence Centre of Excellence is a NATO-accredited knowledge hub, research institution, and training and exercise facility. The Tallinn-based international military organisation focuses on interdisciplinary applied research, consultations, trainings and exercises in the field of cyber security. NATO CCD COE is the home of the Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. The Centre organises the world’s largest and most complex international technical cyber defence exercise Locked Shields and the annual conference on cyber conflict, CyCon. The Centre is a multinational and interdisciplinary hub of cyber defence expertise, uniting practitioners from 20 nations. The heart of the Centre is a diverse group of experts: researchers, analysts, trainers, educators. The mix of military, government and industry backgrounds means the NATO CCD COE provides a unique 360-degree approach to cyber defence. The organization supports its member nations and NATO with cyber defence expertise in the fields of technology, strategy, operations, and law. The Centre is staffed and financed by its sponsoring nations and contributing participants. Belgium, the Czech Republic, Estonia, France, Germany, Greece, Hungary, Italy, Latvia, Lithuania, the Netherlands, Poland, Slovakia, Spain, Turkey, the United Kingdom and the United States are signed on as Sponsoring Nations of the NATO Cooperative Cyber Defence Centre of Excellence. Austria and Finland have become Contributing Participants, Sweden has applied for membership in the same format, a status eligible for non-NATO countries. CYCON 2017 SPonsors TABLE OF Contents Introduction 1 The Coming of Cyber Espionage Norms 7 Martin Libicki Organisational Integration of Offensive Cyber Capabilities: 25 A Primer on the Benefits and Risks Max Smeets Mission Assurance: Shifting the Focus of Cyber Defence 43 Brad Bigelow Core Illumination: Traffic Analysis in Cyberspace 55 Kenneth Geers Trading Privacy for Security in Cyberspace: 73 A Study Across the Dynamics of US Federal Laws and Regulations Between 1967 and 2016 Ido Sivan-Sevilla The Role of International Human Rights Law in the 93 Protection of Online Privacy in the Age of Surveillance Eliza Watt The Misuse of Protected Indicators in Cyberspace: 107 Defending a Core Aspect of International Humanitarian Law Jeffrey Biller Update to Revolving Door 2.0: The Extension 121 of the Period for Direct Participation in Hostilities Due to Autonomous Cyber Weapons Tassilo V. P. Singer From the Vanishing Point Back to the Core: 135 The Impact of the Development of the Cyber Law of War on General International Law Kubo Mačák Control and Capabilities Test: Toward a New 149 Lex Specialis Governing State Responsibility for Third Party Cyber Incidents Peter Z. Stockburger Defending the Grid: Backfitting 163 Non-Expandable Control Systems Robert Koch, Teo Kühn Crowdsourcing Security for 181 Wireless Air Traffic Communications Martin Strohmeier, Matt Smith, Matthias Schäfer, Vincent Lenders, Ivan Martinovic Scalable Architecture for Online Prioritisation of Cyber Threats 199 Fabio Pierazzi, Giovanni Apruzzese, Michele Colajanni, Alessandro Guido, Mirco Marchetti On the Security of the Blockchain BIX Protocol and Certificates 217 Riccardo Longo, Federico Pintore, Giancarlo Rinaldo, Massimiliano Sala Biographies 233 INTRODUCTION The 9th International Conference on Cyber Conflict (CyCon 2017), organised by the NATO Cooperative Cyber Defence Centre of Excellence (NATO CCD COE), once again brings together professionals from governments, the military, academia and the private sector with the aim of discussing and proposing solutions for issues related to cyber security and defence. CyCon continues to serve the cyber security community’s technical experts, strategic thinkers, policymakers and lawyers as an interdisciplinary platform for networking and sharing knowledge. The call for papers for CyCon 2017 invited submissions on the topic ‘Defending the Core’. Digitalisation has transformed, often disrupted, our way of life, bringing innumerable social and economic benefits, while at the same time technological dependencies have altered security risks. No future conflict is likely to be fought without a cyber element. However, establishing effective defensive measures is difficult. The cross-border and ever-expanding nature of digital technologies complicates our understanding of critical cyber dependencies, threats and vulnerabilities. The call for papers was thus looking to address questions such as: What are the ‘core’ elements of cyber security? How do they relate to essential assets and principles in the technical, legal and political spheres? How can critical (information) infrastructure be protected? How can critical vulnerabilities be mitigated and the most detrimental threats countered? How can legal frameworks be established and applied in the cyber security realm? What technologies can help nations to counter emerging cyber threats? How can effective cyber security strategies be developed and implemented? What should be the role of the armed forces? How can cyber operations against core (national) assets be deterred? These questions provided inspiration for nearly 200 abstract proposals submitted in October 2016. After many rounds of peer review, 14 articles were accepted for this proceedings book, which form the ‘backbone’ of the conference’s sessions and workshops. CyCon’s interdisciplinary nature is reflected in this collection of articles, which can be broadly categorised into three sections: strategy, law and technology. The publication starts with a focus on strategic cyber security issues, as Martin Libicki provides his perspective on how states can establish effective international norms to limit cyber espionage. This is followed by Max Smeets, who analyses the possible benefits and risks of organisational integration of national offensive cyber capabilities. When discussing the challenges stemming from NATO’s decision to recognise cyberspace as an operational domain, Brad Bigelow highlights the importance of mission assurance and advocates for a clear role for the NATO Command Structure. The strategy section ends with Kenneth Geers, who emphasises the importance and often underestimated value of traffic analysis in cyberspace. Articles devoted to legal issues start with Ido Sivan-Sevilla’s study of the dynamics of United States federal law with regard to the privacy and security debate. Privacy is also addressed by Eliza Watt, who writes about the role of international human rights law in the protection of online privacy, focusing on the extraterritorial application of human rights treaties. 1 Jeffrey Biller’s contribution then looks at a topical issue in international humanitarian law: the misuse of protected indicators in cyberspace. International humanitarian law is also represented by the following article by Tassilo V. P. Singer, who examines the possible extension of the period of direct participation in hostilities due to autonomous cyber weapons. Emerging international law is discussed in the last two legal articles. Kubo Mačák provides his view of how general international law is influenced by the development of the cyber law of war; and finally,Peter Z. Stockburger observes that there may be arising a new lex specialis governing state responsibility for third party cyber incidents: a ‘control and capabilities’ test. The third section of the book covers technical cyber security matters. Focussing on the defence of core infrastructure,
Recommended publications
  • The Vulnerabilities of Developed States to Economic Cyber Warfare
    Working Paper The Vulnerabilities of Developed States to Economic Cyber Warfare Paul Cornish Head, International Security Programme and Carrington Professor of International Security, Chatham House June 2011 The views expressed in this document are the sole responsibility of the author(s) and do not necessarily reflect the view of Chatham House, its staff, associates or Council. Chatham House is independent and owes no allegiance to any government or to any political body. It does not take institutional positions on policy issues. This document is issued on the understanding that if any extract is used, the author and Chatham House should be credited, preferably with the date of the publication. Working Paper: The Vulnerabilities of Developed States to Economic Cyber Warfare INTRODUCTION The central features of the ‘cybered’ world of the early 21st century are the interconnectedness of global communications, information and economic infrastructures and the dependence upon those infrastructures in order to govern, to do business or simply to live. There are a number of observations to be made of this world. First, it is still evolving. Economically developed societies are becoming ever more closely connected within themselves and with other, technologically advanced societies, and all are becoming increasingly dependent upon the rapid and reliable transmission of ideas, information and data. Second, where interconnectedness and dependency are not managed and mitigated by some form of security procedure, reversionary mode or redundancy system, then the result can only be a complex and vitally important communications system which is nevertheless vulnerable to information theft, financial electronic crime, malicious attack or infrastructure breakdown.
    [Show full text]
  • In Re Equifax Inc. Securities Litigation 17-CV-03463-Consolidated Class
    Case 1:17-cv-03463-TWT Document 49 Filed 04/23/18 Page 1 of 198 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF GEORGIA ATLANTA DIVISION IN RE EQUIFAX INC. SECURITIES Consolidated Case No. LITIGATION 1:17-cv-03463-TWT CONSOLIDATED CLASS ACTION COMPLAINT FOR VIOLATIONS OF THE FEDERAL SECURITIES LAWS Case 1:17-cv-03463-TWT Document 49 Filed 04/23/18 Page 2 of 198 TABLE OF CONTENTS Page I. PRELIMINARY STATEMENT .....................................................................2 II. PARTIES .......................................................................................................10 A. Lead Plaintiff ...................................................................................... 10 B. Defendants .......................................................................................... 10 1. Equifax, Inc. ............................................................................. 10 2. Individual Defendants .............................................................. 12 III. JURISDICTION AND VENUE ....................................................................13 IV. SUMMARY OF THE FRAUD .....................................................................13 A. Equifax’s Business is to Collect and Sell Sensitive Personal Information About Global Consumers ............................................... 13 B. Defendants Knew that Securing the Information Equifax Collected Was Critical to the Company’s Business ........................... 16 C. Defendants Issue Statements Touting Cybersecurity, Compliance with
    [Show full text]
  • View Final Report (PDF)
    TABLE OF CONTENTS TABLE OF CONTENTS I EXECUTIVE SUMMARY III INTRODUCTION 1 GENESIS OF THE PROJECT 1 RESEARCH QUESTIONS 1 INDUSTRY SITUATION 2 METHODOLOGY 3 GENERAL COMMENTS ON INTERVIEWS 5 APT1 (CHINA) 6 SUMMARY 7 THE GROUP 7 TIMELINE 7 TYPOLOGY OF ATTACKS 9 DISCLOSURE EVENTS 9 APT10 (CHINA) 13 INTRODUCTION 14 THE GROUP 14 TIMELINE 15 TYPOLOGY OF ATTACKS 16 DISCLOSURE EVENTS 18 COBALT (CRIMINAL GROUP) 22 INTRODUCTION 23 THE GROUP 23 TIMELINE 25 TYPOLOGY OF ATTACKS 27 DISCLOSURE EVENTS 30 APT33 (IRAN) 33 INTRODUCTION 34 THE GROUP 34 TIMELINE 35 TYPOLOGY OF ATTACKS 37 DISCLOSURE EVENTS 38 APT34 (IRAN) 41 INTRODUCTION 42 THE GROUP 42 SIPA Capstone 2020 i The Impact of Information Disclosures on APT Operations TIMELINE 43 TYPOLOGY OF ATTACKS 44 DISCLOSURE EVENTS 48 APT38 (NORTH KOREA) 52 INTRODUCTION 53 THE GROUP 53 TIMELINE 55 TYPOLOGY OF ATTACKS 59 DISCLOSURE EVENTS 61 APT28 (RUSSIA) 65 INTRODUCTION 66 THE GROUP 66 TIMELINE 66 TYPOLOGY OF ATTACKS 69 DISCLOSURE EVENTS 71 APT29 (RUSSIA) 74 INTRODUCTION 75 THE GROUP 75 TIMELINE 76 TYPOLOGY OF ATTACKS 79 DISCLOSURE EVENTS 81 COMPARISON AND ANALYSIS 84 DIFFERENCES BETWEEN ACTOR RESPONSE 84 CONTRIBUTING FACTORS TO SIMILARITIES AND DIFFERENCES 86 MEASURING THE SUCCESS OF DISCLOSURES 90 IMPLICATIONS OF OUR RESEARCH 92 FOR PERSISTENT ENGAGEMENT AND FORWARD DEFENSE 92 FOR PRIVATE CYBERSECURITY VENDORS 96 FOR THE FINANCIAL SECTOR 96 ROOM FOR FURTHER RESEARCH 97 ACKNOWLEDGEMENTS 98 ABOUT THE TEAM 99 SIPA Capstone 2020 ii The Impact of Information Disclosures on APT Operations EXECUTIVE SUMMARY This project was completed to fulfill the including the scope of the disclosure and capstone requirement for Columbia Uni- the disclosing actor.
    [Show full text]
  • Escribe Agenda Package
    TOWNSHIP OF CHAMPLAIN REGULAR MEETING October 8, 2020 Electronic Participation 1. OPENING - 7:00 P.M. Call to order. 2. DISCLOSURE OF PECUNIARY INTEREST (on any items that appear on the agenda) 3. ADOPTION OF AGENDA 4. PRESENTATION BY COUNCIL 5. PRESENTATION − COMMITTEES / CONSULTANTS 6. DEPUTATION 7. STAFF REPORTS 7.1. Planning 7.1.1. On-Going Planning Projects 7.1.2. Zoning By-Law Amendment Application - Removal of "Holding" zone (h) - Habitations Robert Inc. 7.1.3. Land Severance Application B-053-2020 - 853853 Ontario Inc. / Andre Desjardins 7.1.4. Land Severance Application B-054-2020 and B-055-2020 - Voith Canada Inc. 7.1.5. Land Severance Application B-056-2020, B-057-2020 et B-058-2020 - Ridge Holdings Inc. / John Russell 7.2. ADOPTION OF PLANNING BY-LAWS 7.2.1. By-Law 2020-62 - to amend Zoning By-Law 2000-75 - Habitations Robert Inc. 7.3. Administration 7.3.1. Administration Report AD-18-2020 - Update on COVID-19 7.3.2. Administration Report AD-19-2020 - Bill 197 - Proxy Voting 7.3.3. Integrity Commissioner's Report 7.4. Finance 7.4.1. Accounts 7.4.2. Finance Report FIN-10-2020 - Water and Sewer Billing Period 7.4.3. Finance Report FIN-11-2020 - User Fees for 2021-2025 7.4.4. Finance Report FIN-12-2020 - 2020 Annual Repayment Limit (ARL) 7.5. Fire Department 7.5.1. District 1 - Monthly Report - September 2020 7.5.2. District 2 - Monthly Report - September 2020 7.6. Parks & Recreation 7.6.1. REC Monthly Report - September 2020 7.7.
    [Show full text]
  • Hacks, Leaks and Disruptions | Russian Cyber Strategies
    CHAILLOT PAPER Nº 148 — October 2018 Hacks, leaks and disruptions Russian cyber strategies EDITED BY Nicu Popescu and Stanislav Secrieru WITH CONTRIBUTIONS FROM Siim Alatalu, Irina Borogan, Elena Chernenko, Sven Herpig, Oscar Jonsson, Xymena Kurowska, Jarno Limnell, Patryk Pawlak, Piret Pernik, Thomas Reinhold, Anatoly Reshetnikov, Andrei Soldatov and Jean-Baptiste Jeangène Vilmer Chaillot Papers HACKS, LEAKS AND DISRUPTIONS RUSSIAN CYBER STRATEGIES Edited by Nicu Popescu and Stanislav Secrieru CHAILLOT PAPERS October 2018 148 Disclaimer The views expressed in this Chaillot Paper are solely those of the authors and do not necessarily reflect the views of the Institute or of the European Union. European Union Institute for Security Studies Paris Director: Gustav Lindstrom © EU Institute for Security Studies, 2018. Reproduction is authorised, provided prior permission is sought from the Institute and the source is acknowledged, save where otherwise stated. Contents Executive summary 5 Introduction: Russia’s cyber prowess – where, how and what for? 9 Nicu Popescu and Stanislav Secrieru Russia’s cyber posture Russia’s approach to cyber: the best defence is a good offence 15 1 Andrei Soldatov and Irina Borogan Russia’s trolling complex at home and abroad 25 2 Xymena Kurowska and Anatoly Reshetnikov Spotting the bear: credible attribution and Russian 3 operations in cyberspace 33 Sven Herpig and Thomas Reinhold Russia’s cyber diplomacy 43 4 Elena Chernenko Case studies of Russian cyberattacks The early days of cyberattacks: 5 the cases of Estonia,
    [Show full text]
  • INNOVATION Under Austerity
    Issue 68, 1st Quarter 2013 INNOVATION Under Austerity European Missile Defense Military Values JOINT FORCE QUARTERLY Inside Issue 68, 1st Quarter 2013 Editor Col William T. Eliason, USAF (Ret.), Ph.D. JFQ Dialogue Executive Editor Jeffrey D. Smotherman, Ph.D. Supervisory Editor George C. Maerz Letters 2 Production Supervisor Martin J. Peters, Jr. From the Chairman Senior Copy Editor Calvin B. Kelley 4 Copy Editor/Office Manager John J. Church, D.M.A Bridging the Basics By Bryan B. Battaglia 6 Internet Publications Editor Joanna E. Seich Director, NDU Press Frank G. Hoffman Forum Design Chris Dunham, Guy Tom, and Jessica Reynolds U.S. Government Printing Office Executive Summary 8 Printed in St. Louis, Missouri by 10 Russia and European Missile Defenses: Reflexive Reset? By Stephen J. Cimbala Military Wisdom and Nuclear Weapons By Ward Wilson 18 NDU Press is the National Defense University’s Managing Foreign Assistance in a CBRN Emergency: The U.S. Government cross-component, professional military and 25 academic publishing house. It publishes books, Response to Japan’s “Triple Disaster” By Suzanne Basalla, William Berger, journals, policy briefs, occasional papers, and C. Spencer Abbot monographs, and special reports on national security strategy, defense policy, interagency 32 Operationalizing Mission Command: Leveraging Theory to Achieve cooperation, national military strategy, regional Capability By Kathleen Conley security affairs, and global strategic problems. Special Feature This is the official U.S. Department of Defense edition of JFQ. Any copyrighted portions of this The 600-pound Gorilla: Why We Need a Smaller Defense Department journal may not be reproduced or extracted without 36 permission of the copyright proprietors.
    [Show full text]
  • Chapter 4 Procedural Rules and Orders
    Chapter 4 Procedural Rules and Orders 4.1 Introduction 4-3 A. Applicability of Rules of Civil Procedure in Juvenile Proceedings 1. Rules apply when explicitly required by the Juvenile Code 2. A rule or part of a rule will not apply where the Juvenile Code provides a different procedure 3. Rules or parts of rules apply when required to fill procedural gaps 4. Rules may not be used to confer rights B. Rule Application Analysis 4.2 Procedures Regarding the Petition 4-8 A. Contents of Petition B. Signature of Attorney or Party C. Amended and Supplemental Pleadings 1. Amendments in abuse, neglect, or dependency proceedings 2. Amendments in termination of parental rights proceedings 3. Supplemental pleadings D. Responsive Pleadings 4.3 Summons 4-11 A. Content and Issuance of Summons 1. Signature of clerk 2. Timing 3. Who receives summons 4. Service requirements when summons is not required B. Expiration of Summons 4.4 Service 4-13 A. The Impact of Service B. Summons 1. Service by delivery 2. Service by publication 3. Service in a foreign country C. Notice and Motions 4.5 Continuances 4-21 A. Continuances Disfavored B. Abuse, Neglect, Dependency Proceedings C. Termination of Parental Rights Proceedings D. Considerations 1. Party’s own actions 2. Absence of witness 3. Heavy dockets 4-1 Ch. 4: Procedural Rules and Orders (Dec. 31, 2019) 4-2 4. Time to prepare 5. Delay, prejudice, and the remedy of mandamus 4.6 Discovery 4-24 A. Discovery Generally B. The Juvenile Code and Discovery 1. DSS sharing of information 2.
    [Show full text]
  • Cyber Threat Data Model and Use Cases Final Report
    CAN UNCLASSIFIED TA-35—Cyber Threat Data Model and Use Cases Final Report Dr. Antoine Lemay International Safety Research (ISR) Prepared by: ISR 38 Colonnade Road North Ottawa, Ontario Canada K2E 7J6 Contractor's document number: ISR Report 6099-01-03 Version 2.0 PSPC Contract Number: W7714-156105-T35 Technical Authority: Melanie Bernier, Defence Scientist Contractor's date of publication: September 2017 Defence Research and Development Canada Contract Report DRDC-RDDC-2017-C290 November 2017 CAN UNCLASSIFIED CAN UNCLASSIFIED IMPORTANT INFORMATIVE STATEMENTS The information contained herein is proprietary to Her Majesty and is provided to the recipient on the understanding that it will be used for information and evaluation purposes only. Any commercial use including use for manufacture is prohibited. Disclaimer: This document is not published by the Editorial Office of Defence Research and Development Canada, an agency of the Department of National Defence of Canada, but is to be catalogued in the Canadian Defence Information System (CANDIS), the national repository for Defence S&T documents. Her Majesty the Queen in Right of Canada (Department of National Defence) makes no representations or warranties, expressed or implied, of any kind whatsoever, and assumes no liability for the accuracy, reliability, completeness, currency or usefulness of any information, product, process or material included in this document. Nothing in this document should be interpreted as an endorsement for the specific use of any tool, technique or process examined in it. Any reliance on, or use of, any information, product, process or material included in this document is at the sole risk of the person so using it or relying on it.
    [Show full text]
  • Armageddon and Beyond
    Armageddon and Beyond by Richard F. Ames Mankind is developing newer and more frightening technologies with which to destroy itself, while political and social tensions increase around the world. Will the years just ahead of us bring worldwide nuclear devastation, or usher in an era of lasting peace? Will the prophesied “Battle of Armageddon” soon bring destruction and death to our planet? What will “Armageddon” mean to you and your loved ones? And what will come afterward? Your Bible reveals a frightening time ahead—but there is ultimate hope! Read on, to learn the amazing truth! AB Edition 1.0, December 2007 ©2007 LIVING CHURCH OF GODTM All rights reserved. Printed in the U.S.A. This booklet is not to be sold! It has been provided as a free public educational service by the Living Church of God Scriptures in this booklet are quoted from the New King James Version (©Thomas Nelson, Inc., Publishers) unless otherwise noted. Cover: Tomorrow’s World Illustration n the first decade of the 21st century, most of us realize we live in a very dangerous world. It was just six decades ago that a I new weapon of unprecedented capacity was first unleashed, when the United States dropped atomic bombs on the cities of Hiroshima and Nagasaki in Japan on August 6 and 9, 1945. A new era of mass destruction had begun. At the end of World War II, General Douglas MacArthur, Supreme Commander of the Allied Powers, accepted Japan’s uncondi- tional surrender. Aboard the battleship U.S.S. Missouri, General MacArthur summarized the danger and the choice facing humanity in this new era: “Military alliances, balances of power, leagues of nations, all in turn failed, leaving the only path to be the way of the crucible of war.
    [Show full text]
  • Wild Abandon: Postwar Literature Between Ecology and Authenticity
    University of Kentucky UKnowledge Theses and Dissertations--English English 2018 WILD ABANDON: POSTWAR LITERATURE BETWEEN ECOLOGY AND AUTHENTICITY Alexander F. Menrisky University of Kentucky, [email protected] Author ORCID Identifier: https://orcid.org/0000-0003-1241-8415 Digital Object Identifier: https://doi.org/10.13023/ETD.2018.150 Right click to open a feedback form in a new tab to let us know how this document benefits ou.y Recommended Citation Menrisky, Alexander F., "WILD ABANDON: POSTWAR LITERATURE BETWEEN ECOLOGY AND AUTHENTICITY" (2018). Theses and Dissertations--English. 66. https://uknowledge.uky.edu/english_etds/66 This Doctoral Dissertation is brought to you for free and open access by the English at UKnowledge. It has been accepted for inclusion in Theses and Dissertations--English by an authorized administrator of UKnowledge. For more information, please contact [email protected]. STUDENT AGREEMENT: I represent that my thesis or dissertation and abstract are my original work. Proper attribution has been given to all outside sources. I understand that I am solely responsible for obtaining any needed copyright permissions. I have obtained needed written permission statement(s) from the owner(s) of each third-party copyrighted matter to be included in my work, allowing electronic distribution (if such use is not permitted by the fair use doctrine) which will be submitted to UKnowledge as Additional File. I hereby grant to The University of Kentucky and its agents the irrevocable, non-exclusive, and royalty-free license to archive and make accessible my work in whole or in part in all forms of media, now or hereafter known.
    [Show full text]
  • Manual of Patent Practice and Procedure the Patent Office, India
    INTELLECTUAL PROPERTY INDIA PATENTS || DESIGNS || TRADEMARKS || GEOGRAPHICAL INDICATIONS MANUAL OF PATENT PRACTICE AND PROCEDURE THE PATENT OFFICE, INDIA Intellectual Property Office, Mumbai Intellectual Property Office, Delhi Intellectual Property Office, Chennai Intellectual Property Office, Kolkata Office of the Controller General of Patents, Designs & Trade Marks Boudhik Sampada Bhawan S.M. Road, Antop Hill Mumbai – 400 037. Patent Office, Kolkata (Head Office) Boudhik Sampada Bhawan CP-2, Sector V, Salt Lake City Kolkata – 700 091. Patent Office, Chennai Intellectual Property Building G.S.T. Road, Guindy Chennai – 600 032. Patent Office, Delhi Boudhik Sampada Bhawan Plot No.32, Sector-14, Dwarka New Delhi – 110 075. Patent Office, Mumbai Boudhik Sampada Bhawan S.M. Road, Antop Hill Mumbai – 400 037. Third Edition – 2008 Manual of Patent Practice & Procedure © Controller General of Patents, Designs & Trade Marks, India. 2 PREFACE This Manual is intended to provide detailed information to the public and users of Patent System on the practices and procedures followed by Patent Office for processing of patent applications. The Manual incorporates provisions of the Patents Act, 1970 as amended by the Patents (Amendment) Act, 2005 and the Patents Rules, 2003 as amended by the Patents (Amendment) Rules, 2006. The format of the Manual is to reproduce successive sections and relevant rules of the Patents Act and Patents Rules followed by explanation and past decisions of the Patent Office, wherever available. References to decisions of the courts of India and other countries have been included to provide guidance and help the users. The Manual does not constitute rule making and hence do not have the force and effect of law.
    [Show full text]
  • Armageddon Usa? America at the Crossroads Dr Tim Morgan Global Head of Research
    armageddon usa? america at the crossroads Dr Tim Morgan Global Head of Research strategy insights | issue eight armageddon usa? america at the crossroads contents armageddon usa? america at the crossroads 5 introduction: powers of darkness 7 part one: what is the American problem? 11 economic data – pollyanna creep 13 what growth, what jobs? 18 “another day older, deeper in debt…..” 20 part two: why did this happen? 25 a failed paradigm 25 un-american activities: have competitor strategies undermined the US? 26 domestic errors – the follies of ideological extremes 28 capital sink investment: betting the house 28 part three: how should america respond? 33 strategy insights | issue eight 3 armageddon usa? | america at the crossroads “The US and China are carrying out competition unprecedented in history. The US must realize that it cannot stop the rise of China” The Global Times, 6th January 20121 4 strategy insights | issue eight 1 http://www.globaltimes.cn/NEWS/tabid/99/ID/691074/Pentagon-plan-changes-game-in-Asia.aspx armageddon usa? america at the crossroads Commenting on President Obama’s is wrestling with the ending of a In addition to cutting waste, ditching new defence strategy, the Chinese quarter-century “credit super-cycle”. unaffordable federal programmes and newspaper Global Times lambasted the Americans have borrowed, not for owning up about un-payable pension new emphasis reportedly being placed productive investment, but to inflate and welfare promises, the United by the US on South East Asia, and the value of the nation’s housing States needs to take immediate action concluded that America “cannot stop stock.
    [Show full text]