The Cyber Security of Online Automated Environmental Measurements

Total Page:16

File Type:pdf, Size:1020Kb

The Cyber Security of Online Automated Environmental Measurements The Cyber Security of Online Automated Environmental Measurements Kai Rasmus Master’s thesis November 2020 Technology Master’s Degree Programme in Cyber Security Description Author(s) Type of publication Date Rasmus, Kai Master’s thesis November, 2020 Language of publication: English Number of pages Permission for web 80 publication: Yes Title of publication The Cyber Security of Online Automated Environmental Measurements Degree programme Master ́s Degree Programme in Information Technology, Cyber Security Supervisor(s) Tero Kokkonen, Jari Hautamäki Assigned by Abstract Online automatic measurements are a way of doing cost effective environmental monitoring. The systems consist of a network of remote measurement stations connected to a central dissemination service via some form of backbone connection over which the user has no control. It is important to secure such systems because the measurement results may be connected to large business interests. The 12 most important primary and secondary assets related to these systems were identified from the viewpoint of the user. The most important asset was the measurement data itself and data integrity was identified as a separate asset. A list of 32 security controls were listed to secure these assets after the interconnections between the assets were identified. Protocols were introduced to increase the situational awareness and to help against social engineering. The risks related to connecting measurement stations to a central service were quantitatively analyzed using a Monte Carlo model. It was found that the probability of breaching the central service was independent of the number of nodes connected to the service, but depends on the network layout and on how many stations were directly connected to the central service. Cyber security awareness was increased by developing the superhero model for cyber security. In this method cyber security events were taken from popular culture and analyzed in a descriptive way using thematic content analysis. Even though this is subjective and speculative, it could help in raising cyber security awareness which is not at a high enough level even amongst professionals. Keywords/tags (subjects) Environmental monitoring, online service, quantitative risk assessment, awareness Miscellaneous (Confidential information) 1 Description Tekijä(t) Julkaisun laji Päivämäärä Rasmus, Kai Master’s thesis Marraskuu 2020 Julkaisun kieli Englanti Sivumäärä Verkkojulkaisulupa 80 myönnetty: Kyllä Työn nimi Automaattisten ympäristönmittausasemien kyberturvallisuus Tutkinto-ohjelma Master ́s Degree Programme in Information Technology, Cyber Security Työn ohjaaja(t)) Tero Kokkonen, Jari Hautamäki Toimeksiantaja(t) Tiivistelmä Automaattiset ympäristönmittausasemat antavat mahdollisuuden tehdä ympäristön seurantaa kustannustehokkaasti. Järjestelmät koostuvat etämittausasemista, jotka ovat yhteydessä keskuspalveluun jonkin yhteyskäytävän kautta. Loppukäyttäjillä ei ole vaikutusmahdollisuuksia yhteyskäytävään. Ympäristönmittausjärjestelmien suojaus on tärkeää, koska mittaustulokset voivat olla merkittäviä esimerkiksi liike-elämässä sekä tieteellisessä tutkimuksessa. Opinnäytetyössä listattiin kaksitoista näihin asemiin liittyvää ja käyttäjän näkökulmasta tärkeintä voimavaraa tai ominaisuutta. Tärkein näistä on mittaustulokset, etenkin niiden yhtenäisyys. Asemiin liittyvien tärkeiden voimavarojen ja ominaisuuksien väliset yhteydet määriteltiin ja suojattiin sen jälkeen yhteensä 32 suojausmenetelmällä. Opinnäytetyössä kehitettiin hyviä toimintamalleja hyvän tilannekuvan luomiseen ja suojaamaan sosiaaliselta hakkeroinnilta. Mittausasemien liittäminen keskuspalveluun tuo mukanaan riskin, jonka suuruuden laskemiseen käytettiin määrällistä Monte Carlo -mallinnusta. Riskin eli keskupalvelun murtamistodennäköisyyden huomattiin riippuvan mittausasemaverkon muodosta, ja siitä kuinka monta mittausasemaa oli suoraan kiinni keskuspalvelussa. Kuten monilla muillakin aloilla, myös ympäristönmittausalalla henkilöstön tietoturvallisuustietoisuudessa on puutteita. Opinnäytetyössä käytettiin tietoisuuden lisäämiseen populaarikulttuurin tietoturvatapahtumien analysointia. Tapahtumia etsittiin Batman -televisiosarjasta. Analyysin avulla luotiin supersankarimalli tietoturvallisuustietoisuuden lisäämiseksi. Mallin avulla voidaan tehdä tietoturvallisuus kiinnostavaksi ja saada tietoisuus siitä aiempaa helpommin lisääntymään. Avainsanat (subjects) Ympäristönmittausasema, määrällinen mallinnus, tietoturvatietoisuus 2 Contents List of Abbreviations .............................................................................................. 9 1 Introduction ................................................................................................. 11 1.1 Online Automatic Environmental Measurements .................................... 11 1.2 Comparison to Traditional Measurements ............................................... 12 1.3 Importance of Online Automatic Measurement Security ......................... 13 1.4 The CIA triad .............................................................................................. 14 1.5 Cyber Security Awareness ......................................................................... 14 1.6 Formal Methodology ................................................................................. 15 1.7 Layout of this thesis ................................................................................... 15 2 Research....................................................................................................... 15 2.1 The Main Research Question: ................................................................... 15 2.2 Methodology ............................................................................................. 16 2.2.1 Multimethod Research ......................................................................... 16 2.2.2 Constructive Methodology ................................................................... 16 2.2.3 Quantitative Methodology ................................................................... 17 2.2.4 Thematic Content Analysis ................................................................... 18 2.3 Research Objectives .................................................................................. 18 2.4 Research Design ........................................................................................ 18 2.5 Ethical Principles and Data Protection ...................................................... 19 3 Theory .......................................................................................................... 20 3.1 Definition of information security ............................................................. 20 3.2 Definitions of Information Security Terms ................................................ 21 3.2.1 Asset ..................................................................................................... 21 3.2.2 Confidentiality ...................................................................................... 21 3.2.3 Integrity ................................................................................................ 22 3 3.2.4 Availability ............................................................................................ 22 3.2.5 Authentication ...................................................................................... 23 3.2.6 Non-repudiation ................................................................................... 23 3.2.7 Security Event and Security Incident .................................................... 24 3.2.8 Physical controls ................................................................................... 24 3.2.9 Information Security Management system (ISMS) .............................. 24 3.2.10 Cyber Security Awareness .................................................................... 25 3.2.11 Situational Awareness .......................................................................... 26 3.3 From Information Security to Cyber security ............................................ 27 3.4 Cyber Security Frameworks ....................................................................... 27 3.5 Intrusion Detection System ....................................................................... 29 3.5.1 Anomaly-Based IDS ............................................................................... 29 3.5.2 Misuse-Based IDS ................................................................................. 29 3.6 Relevant Standards .................................................................................... 30 3.6.1 The ISO/IEC 27000 Set of Standards ..................................................... 30 3.6.2 Other Relevant Standards .................................................................... 30 3.7 Risk as an Abstract Entity .......................................................................... 31 3.8 Network Attacks ........................................................................................ 33 3.8.1 Detection .............................................................................................. 33 3.8.2 Taxonomy ............................................................................................. 33 3.8.3 Mitigation Controls for Attacks ............................................................ 34 3.8.4 Targetting.............................................................................................. 35 3.8.5 AI Based Attacks in the Future
Recommended publications
  • THE MENTOR 77, January 1993
    THE MENTOR Australian Science Fiction CONTENTS #77 - COLUMNISTS: 9 - FANTASY DOWNUNDER by Bill Congreve 22 - WARRIORS OF ANCIENT WORLDS by Andrew Darlington 36 - ARGENTINE SF HISTORY 2 by Claudio Omar Noguerol 44 - OUT OF OZ by Ron Clarke COMIC SECTION: 47 - FERAL KILLERS by Carter & Carcinogen FICTION: 2 - OBUNAGA'S FINGER by Mustafa Zahirovic 15 - GODDESS OF STONE by Sean Williams 31 - THE SALE OF YOUTH by George Ivanoff DEPARTMENTS: 56 - THE R&R DEPT. - Reader's Letters. 75 - REVIEWS by Ron Clarke Front Cover Art by Peggy Ranson. Interior Illos: Peggy Ranson p. 8, 21, 30, 74 Jozef Szekeres p. 14, 55. Kerrie Hanlon p.1 THE MENTOR 77, January 1993. ISSN 0727-8462. Edited, printed and published by Ron Clarke, 6 Bellevue Road, Faulconbridge, NSW 2776, Australia. THE MENTOR is published at intervals of roughly three months. It is available for published contribution (fiction [science fiction or fantasy]), poetry, article, trade ( not with an APAzine), or substantial letter of comment on a previous issue. It is not available for subscription, but is available for $5 for a sample issue (posted) Contributions may be on an IBM ascii file or a known-brand world processor on disc or typed, single or double-spaced, preferably a good photocopy (and if you want it returned, please send a Stamped, Self Addressed Envelope of the appropriate size)! Contributions are not paid; THE MENTOR 77 page 1 however they receive a free copy of the issue their contribution is in, and any future issue containing comments on their contribution. Contents (C) Copyright 1992 for the Contributors THE MENTOR 77 page 2 OBUNAGA'S FINGER by Mustafa Zahirovic The first breath of life is the best breath.
    [Show full text]
  • {PDF} Batman Vol. 1 the Court of Owls
    BATMAN VOL. 1 THE COURT OF OWLS (THE NEW 52) Author: Scott Snyder Number of Pages: 176 pages Published Date: 01 Apr 2013 Publisher: DC Comics Publication Country: New York, United States Language: English ISBN: 9781401235420 DOWNLOAD: BATMAN VOL. 1 THE COURT OF OWLS (THE NEW 52) Batman Vol. 1 The Court Of Owls (The New 52) PDF Book Stanislawski takes up the tantalizing question of why Zionism, at a particular stage in its development, became so attractive to certain cosmopolitan intellectuals and artists. Now for the first time, these high-quality digital scans of original works are available via print-on-demand, making them readily accessible to libraries, students, independent scholars, and readers of all ages. This final report primarily focuses on the Phase 2 charge. 99] Cover: Tough matte black white paperback with high resolution authentic marble design. He is the author of The Rhine: An Eco-Biography, 1815-2000. The book provides you with fascinating case studies that highlight symptoms and illness patterns as well as treatment options and techniques for coordinating pastoral counseling with the mental health team. Walking Out on the BoysThe 'Pocket Guide to Health Promotion' is a short, punchy and practical guide aimed at students and practitioners. Just do it. It describes how autointoxication can have repercussions on the entire body which today can be profiled through iridology. Then, slowly but deliberately, Bascom unfreezes this picture, ratcheting each moment from one to the next, showing us how and why quantum particles are constantly in contact with the Big Bang and why that allows the particles to pop in and out of existence from moment to moment, what a photon is, and what exactly we mean when we say that free space has energy.
    [Show full text]
  • Proquest Dissertations
    WAKING UP DEAD By Kaitlyn Andrews-Rice Submitted to the Faculty of the College of Arts and Sciences of American University in Partial Fulfillment of the Requirements for the Degree of Master of Fine Arts In Creative Writing Chair: a )1 ce.~~J /d-rtell~'!c-·c ··~ Andrew Holleran /~/~ Cfiuzr:!-u:.__, Denise Orenstein Date 2008 American University Washington, D.C. 20016 AMERICAN UNIVERSITY LIBRARY Cl ~00 UMI Number: 1460429 INFORMATION TO USERS The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleed-through, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. ® UMI UMI Microform 1460429 Copyright 2008 by ProQuest LLC. All rights reserved. This microform edition is protected against unauthorized copying under Title 17, United States Code. ProQuest LLC 789 E. Eisenhower Parkway PO Box 1346 Ann Arbor, Ml 48106-1346 WAKING UP DEAD BY Kaitlyn Andrews-Rice ABSTRACT Waking Up Dead is a novel organized around three generations of women affected both directly and indirectly by the Iraq war. Taylor, an aspiring singer with an independent streak, and Steve, a young Marine about to deploy to Iraq, make the rash decision to marry. The novel explores the consequences of their decision and the notion that history may repeat itself. ii TABLE OF CONTENTS ABSTRACT ...................................................................................................................
    [Show full text]
  • Holy Stitches Batman, Or, Performative Villainy in Gothic/Am
    Old Dominion University ODU Digital Commons English Theses & Dissertations English Fall 12-2020 Holy Stitches Batman, or, Performative Villainy in Gothic/am A. Luxx Mishou Old Dominion University, [email protected] Follow this and additional works at: https://digitalcommons.odu.edu/english_etds Part of the English Language and Literature Commons, and the Feminist, Gender, and Sexuality Studies Commons Recommended Citation Mishou, A. L.. "Holy Stitches Batman, or, Performative Villainy in Gothic/am" (2020). Doctor of Philosophy (PhD), Dissertation, English, Old Dominion University, DOI: 10.25777/q5jq-4c76 https://digitalcommons.odu.edu/english_etds/110 This Dissertation is brought to you for free and open access by the English at ODU Digital Commons. It has been accepted for inclusion in English Theses & Dissertations by an authorized administrator of ODU Digital Commons. For more information, please contact [email protected]. HOLY STITCHES, BATMAN, OR, PERFORMATIVE VILLAINY IN GOTHIC/AM by A. Luxx Mishou B.A. May 2005, Washington College M.A. December 2007, University of Maryland College Park A Dissertation Submitted to the Faculty of Old Dominion University in Partial Fulfillment of the Requirements for the Degree of DOCTOR OF PHILOSOPHY ENGLISH OLD DOMINION UNIVERSITY December 2020 Approved by: Manuela Mourão (Director) Edward Jacobs (Member) Avi Santo (Member) ABSTRACT HOLY STITCHES, BATMAN, OR, PERFORMATIVE VILLAINY IN GOTHIC/AM A. Luxx Mishou Old Dominion University, 2020 Director: Dr. Manuela Mourão Holy Stitches, Batman, or, Performative Villainy in Gothic/am is an interdisciplinary examination of gothic affect and deviant fashion in the narrative construction of villainy. It asks not just what a villain looks like, but what it means to look like a villain.
    [Show full text]
  • Superheroes Star Date 3322 FINAL SPEC SCRIPT
    SUPERHEROES Star Date 3322 Written by; Barry John Terblanche Spec draft; 1st Write October 2017 Spec draft; 9th Re-write November 2018 Copywrite © TERBLANCHE 2018. All rights reserved. This screenplay may not be used or reproduced for any purpose including educational purpose without the expressed written permission of the Author. 1 INT. MOVIE HOUSE - DAY MONTAGE. STOCK SHOTS: Short clips from various Superhero movies showing them doing good, saving lives to the cheering / praising humans. Slows down.... slower, to show the scene from Superman 1 movie, of Superman rescuing the little girl’s cat from the tree. ZOOM-OUT: Revealing it's been shown in a movie house on the silver screen. PAN OUT: To a packed movie house watching the Superman cat scene. V.O: A young child in the movie house; GO SUPERMAN. V.O: HANCOCK shouting over the Superman movie sound. STOP! STOP! CUT! HOLD IT!.... Hancock, dressed like the drunk hobo from the movie HANCOCK. Bottle of Jack in his hand he walks from the side of the stage to the middle of it. The big silver screen above him is now paused where the little girl waves Superman good buy. The movie house is silent to the audience now looking at Hancock. HANCOCK (He points up to the paused screen) Superman TO THE RESCUE! You know he told me the true story of what happened that night. You guys, humans, and your; Superman saves the day... Go Batman... Spiderman you the man... Wonderwoman you rock... SHOOO.. Got to admit she sure does have a pair of legs on her.
    [Show full text]
  • Alan Mcmonagle
    WALKING AMONG RUINS IN BABYLON Alan McMonagle ‘Help,’ said the person at the end of the line. ‘There is blood everywhere.’ ‘Right,’ I said. I was still more or less asleep. ‘Do you hear me?’ came the voice. ‘I am sitting in a pool of blood.’ ‘I think you have the wrong number,’ I said. ‘For God’s sake,’ the voice said to me. Then the line went dead. ‘Who was it?’ Marian asked as soon as I set down the phone on the bedside locker. ‘I’m not sure. I think it was a crackpot,’ I said, sitting up a little in the bed. ‘A crackpot? What’s a crackpot doing ringing us?’ ‘I’m not sure. Something about blood. It sounded like there was lots of blood.’ ‘What? Whose blood? I don’t like the sound of this.’ 60 WALKING AMONG RUINS IN BABYLON 61 ‘Me neither. I’m fairly sure it was a crackpot.’ We then looked at each other, and as soon as we did, the phone started ringing again. ‘Jesus Christ,’ said Marian. ‘I’m not answering it,’ I said. ‘Answer it, for God’s sake,’ Marian said—just like the caller had—and I leaned over and lifted the phone. ‘You’ve got to help me,’ the voice said. ‘That’s enough out of you,’ I said and hung up. We both sat up in the bed. Marian had one hand covering part of her face. I was frowning at the phone. ‘One of these days we need to think about changing our phone number.
    [Show full text]
  • Don't Fear the Joker
    CAT-TALES DDON’’T FFEAR THE JJOKER CAT-TALES DDON’’T FFEAR THE JJOKER By Chris Dee COPYRIGHT © 2010, CHRIS DEE ALL RIGHTS RESERVED. BATMAN, CATWOMAN, GOTHAM CITY, ET AL CREATED BY BOB KANE, PROPERTY OF DC ENTERTAINMENT, USED WITHOUT PERMISSION catwoman-cattales.com facebook.com/cattales.by.chris.dee ISBN: 978-1517197902 DON’T FEAR THE JOKER Germs. The worst thing about winter. Marty Parks started the day with a hot shower—his showers were a lot hotter and a lot longer than they had been a week ago—and he scrubbed his skin raw with the scratchy new loofah. He’d always considered the loofah one of those silly, new agey things, but lately, he really didn’t feel like a washcloth got him clean. He wanted something that would SCRUB. He wondered how sanitary they were though. He knew the loofah was some kind of fishy plant thing. It might not be that hygienic after you used it a couple times and then left it there, all wet, in the steamy bathroom. There was no telling what kind of mold or mildew might start growing in there. Impulsively, Marty threw his new loofah away once he had toweled off. They were cheap enough; he could get a new one. He was a working man, not made of money, but it was cold and flu season. You couldn’t be too careful. If he got sick, he’d lose a lot more than the cost of buying a new loofah every week, that was for sure. He checked to see that the iron was hot and laid out his uniform on the bed, giving the shirt and pants a good pressing before he put them on.
    [Show full text]
  • The Essential Cult TV Reader
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Kentucky University of Kentucky UKnowledge American Popular Culture American Studies 2010 The Essential Cult TV Reader David Lavery Middle Tennessee State University Click here to let us know how access to this document benefits ou.y Thanks to the University of Kentucky Libraries and the University Press of Kentucky, this book is freely available to current faculty, students, and staff at the University of Kentucky. Find other University of Kentucky Books at uknowledge.uky.edu/upk. For more information, please contact UKnowledge at [email protected]. Recommended Citation Lavery, David, "The Essential Cult TV Reader" (2010). American Popular Culture. 2. https://uknowledge.uky.edu/upk_american_popular_culture/2 THE ESSENTIAL CULT TV READER Essential Readers in Contemporary Media and Culture This series is designed to collect and publish the best scholarly writing on various aspects of television, fi lm, the Internet, and other media of today. Along with providing original insights and explorations of critical themes, the series is intended to provide readers with the best available resources for an in-depth understanding of the fundamental issues in contemporary media and cultural studies. Topics in the series may include, but are not limited to, critical-cultural examinations of creators, content, institutions, and audiences associated with the media industry. Written in a clear and accessible style, books in the series include
    [Show full text]
  • Read Ebook {PDF EPUB} the Last True Knight by Janet Fox the Last True Knight by Janet Fox
    Read Ebook {PDF EPUB} The Last True Knight by Janet Fox The Last True Knight by Janet Fox. Completing the CAPTCHA proves you are a human and gives you temporary access to the web property. What can I do to prevent this in the future? If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware. If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices. Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the Chrome Web Store. Cloudflare Ray ID: 657f6ef03bdd8498 • Your IP : 188.246.226.140 • Performance & security by Cloudflare. The Last True Knight by Janet Fox. Completing the CAPTCHA proves you are a human and gives you temporary access to the web property. What can I do to prevent this in the future? If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware. If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices. Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the Chrome Web Store.
    [Show full text]
  • Advanced Community College ESL Composition: an Integrated Skills Approach ADVANCED COMMUNITY COLLEGE ESL COMPOSITION: an INTEGRATED SKILLS APPROACH
    Advanced Community College ESL Composition: An Integrated Skills Approach ADVANCED COMMUNITY COLLEGE ESL COMPOSITION: AN INTEGRATED SKILLS APPROACH JENELL RAE, JACOB SKELTON, EDGAR PEREZ, AND SARA BESETA Los Angeles Advanced Community College ESL Composition: An Integrated Skills Approach by Jenell Rae, Jacob Skelton, Edgar Perez, and Sara Beseta is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted. CONTENTS Introduction 1 To the Instructor 2 To the Student 3 Acknowledgements 4 Part I. The Writing Process Introduction to Academic Writing 6 Methods of Organizing Your Writing 21 Writing Thesis Statements 25 Writing Paragraphs 30 The Writing Process 46 Comparison and Contrast 91 The Cause and Effect Essay 98 Elements of Fiction Writing 105 Joe Moxley The Persuasive Essay 112 The Research Paper 123 Part II. Sentence Structure Grammar 182 Subject-Verb Agreement 199 Avoiding Fragments 204 Subordination and Coordination 207 Comma Splices and Fused Sentences 211 Parallelism 215 Verb Tenses 222 Part III. Literary Analysis Literary Analysis 229 Short Story Analysis 235 Glossary of Literary Terms 241 Part IV. Critical Thinking and Reading Annotating a Text 248 Critical Thinking: A Must! 250 Time Management 261 Appendix A 273 Appendix B 277 Sample comparison-contrast essay Appendix C 279 Sample comparison-contrast outline and essay Appendix D 283 Synthesis essay by Malvina Torbay (E.S.L. 8) Appendix E 285 Appendix F 290 Introduction Advanced Community College ESL Composition: An Integrated Skills Approach (2019) is a textbook adapted under a grant from the Academic Senate for California Community Colleges (ASCCC) under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License without attribution as requested by the work’s original creator or licensee.
    [Show full text]
  • Klaudette's Karaoke Songbook
    Klaudette's Karaoke SongBook #1 Crush 1, 2, 3, 4, Sumpin' New Garbage Coolio #selfie 1,2 Step Chainsmokers, The Ciara & Missy Elliott (Kissed You) Good Night 1,2,3,4 Gloriana Plain White T's (Medley) Blue Hawaii 1-2-3 Presley, Elvis Estefan, Gloria (Medley) Can't Help Falling In Love 10 Out of 10 Presley, Elvis Louchie Lou (Medley) Good Luck Charm 10 Seconds Presley, Elvis Jazmine Sullivan (Medley) It's Now Or Never 10 Seconds (Mpx) Presley, Elvis Jazmine Sullivan (Medley) Love Letters 10 Seconds Down Presley, Elvis Sugar Ray (Medley) One Night 10 You Might Think Presley, Elvis Cars, The (Medley) Such A Night 10,000 Nights Presley, Elvis Alphabeat (Medley) Surrender 100 Years Presley, Elvis Five For Fighting (Medley) Suspicion 100% Cowboy Presley, Elvis Meadows, Jason (Medley) Teddy Bear 100% Pure Love Presley, Elvis Crystal Waters (You Drive Me) Crazy 10Th Ave Freeze Out Britney Spears Springsteen, Bruce 03 Bonnie & Clyde 112 Beyonce & Jayz Peaches & Cream Jay-Z & Beyonce Knowles 12-51 P.M. 1 2 3 4 The Strokes Feist 121661-01 - Lover For Life 1 Thing Houston, Whitney Amerie 123 1+1 Gloria Estefan Beyonce 1234 1, 2 Step Feist Ciara 1251 Ciara & Missy Elliott Strokes 1, 2, 3 Red Light 125100 Pm 1910 Fruitgum Co. Strokes 1, 2, 3, 4 12Th of Never Feist Mcdonald, Jane Rev:11/15/18 Please Join Me On Facebook.Com/Klaudette Page 1 Klaudette's Karaoke SongBook 13 Is Uninvited 1979 Morissette, Alanis Smashing Pumpkins 15 Minutes The Smashing Pumpkins Atkins, Rodney 1982 Rodney Atkins Travis, Randy 15 Minutes of Shame 1983 Cook, Kristy Lee Neon Trees Kristy Lee Cook 1983 (Mpx) 16 @ War Neon Trees Karina 1985 16 @ War(Mpx) Bowling For Soup Karina 1994 16Th Avenue Aldean, Jason Dalton, Lacy J.
    [Show full text]
  • Lot 430 in History the AZARIAN COLLECTION AUCTION 119 Auction Tuesday, December 17, 2019 at 11:00 AM PST Day 1: Tuesday Dec
    Lot 430 IN HISTORY THE AZARIAN COLLECTION AUCTION 119 Auction Tuesday, December 17, 2019 at 11:00 AM PST Day 1: Tuesday Dec. 17......Lots 1 - 216 The Azarian Collection Auction Immediately following this spectacular auction is the Hollywood: A Collector’s Ransom Auction Day 1: Tuesday, Dec. 17..Lots 1 - 422 Immediately following The Azarian Collection Auction Day 2: Wednesday, Dec. 18....Lots 423 - 1065 11AM PST Day 3: Thursday, Dec. 19.......Lots 1066 - 1606 11AM PST LIVE • MAIL • PHONE • FAX • INTERNET PLACE YOUR BID OVER THE INTERNET! PROFILES IN HISTORY WILL BE PROVIDING INTERNET-BASED BIDDING TO QUALIFIED BIDDERS IN REAL-TIME ON THE DAY OF THE AUCTION. FOR MORE INFORMATION VISIT US @ WWW.PROFILESINHISTORY.COM AUCTION LOcaTION PRESIDENT/CHIEF EXECUTIVE OFFICER PROFILES IN HISTORY JOSEPH M. MADDALENA 26662 AGOURA ROAD CALABASAS, CA 91302 ACQUISITIONS/CONSIGNMENT RELATIONS BRIAN R. CHANES AUCTION PREVIEW BY appOINTMENT ONLY CALL: 310-859-7701 GENERAL MANAGER/CREATIVE DIRECTOR PROFILES IN HISTORY LOU BUSTAMANTE 26662 AGOURA ROAD CALABASAS, CA 91302 AUCTIONEER: STACEY ROMAN TELEphONE EDITOR: JOE MOE 1-310-859-7701 EDITOR: ZACH POGEMILLER FAX 1-310-859-3842 PHOTOGRAPHY/AUCTION SPECIALIST: MICHAEL MANSFIELD E-MAIL ADDRESS AUCTION ASSOCIATE: CATHERINE MANSFIELD [email protected] AUCTION ASSOCIATE: MARLENE ESCALERA WEBSITE WWW.PROFILESINHISTORY.COM ASSISTANT EDITOR: ALISON MACINNIS PUBLICIST: NANCY SELTZER & ASSOCIATES SOCIAL MEDIA: BRIGHTAGE DIGITAL CREATIVE AGENCY Find us on @ twitter.com/pihauctions Find us on @ www.facebook.com/ProfilesInHistory The Azarian Collection Auction s the founder and curator of the Azarian Collection (theazariancollection.com) and a child of the 1960s,A and also a fan of nostalgia, I have amazing childhood memories including the superb television shows of the 1960s...and beyond! As a child, my favorite TV show was Batman starring Adam West and Burt Ward.
    [Show full text]