DIRECTORY of INFOSEC ASSURED PRODUCTS 2001 CESG DIRECTORY 14/5/01 3:48 Pm Page 2

Total Page:16

File Type:pdf, Size:1020Kb

DIRECTORY of INFOSEC ASSURED PRODUCTS 2001 CESG DIRECTORY 14/5/01 3:48 Pm Page 2 CESG DIRECTORY 14/5/01 3:48 pm Page 1 DIRECTORY OF INFOSEC ASSURED PRODUCTS 2001 CESG DIRECTORY 14/5/01 3:48 pm Page 2 CONTENTS INTRODUCTION Page 3-4 IACS Introduction to CESG Infosec Assurance and Certification Services Page 5-8 CLEF Contact Details Page 9 International Certification Body Contact Details Page 9 CC and ITSEC Certified Products • Smart Cards Page 10 • PC Access Control Page 11-13 • Operating Systems Page 14-18 • Networking Page 19-24 • Firewalls Page 24-31 • Communications Page 32-37 • Databases Page 38-43 • Miscellaneous Page 43-44 PROTECTION PROFILES Introduction to Protection Profiles Page 45 List of Protection Profiles products Page 46-49 CAPS Introduction to CESG Approved Products Scheme Page 51-52 CAPS products • Data Encryption Page 53-55 • Communications Security Page 55-57 • Access Control Page 58-61 • Miscellaneous Page 62 TEMPEST Introduction to Tempest Page 63 List of Tempest approved products Page 64-66 Company names and addresses Page 67-68 INDEX Page 69-70 2 CESG DIRECTORY 14/5/01 3:48 pm Page 3 INTRODUCTION This ‘Directory of Infosec Assured Products’ is a new publication that replaces the former UKSP-06. It has been produced as a top-level guide for both product developers, vendors and end-users, and gives details of the means by which security products are approved or certified, an overview of the products’ features, and the context in which they should be used. The Directory will be updated on an annual basis. However, as new products are regularly being approved and certified, these will be reflected on CESG’s websites, accessible via www.cesg.gov.uk, as and when they become available. The first part of the Directory contains an introduction to CESG’s Infosec Assurance and Certification Services [IACS]. IACS has been created to provide The Communications-Electronics a seamless service to customers, and Security Group [CESG] is the UK’s products listed in the sections which National Technical Authority for follow cover the various aspects of IACS. Information Security. As part of this It is recognised that, in practice, remit, CESG works closely with IT customers will require more specific developers and vendors to provide guidance. The IACS management office end users with a choice of products has therefore been created to provide whose security features have been advice and guidance to developers, objectively assessed and which vendors and end-users on the most meet clear standards of security appropriate solution to their specific assurance. assurance requirements. This is followed by a description of the mechanisms by which products are certified under ITSEC or Common Criteria, a list of certified products, and an explanation of ‘protection profiles’. Also contained in the Directory is a brief description of the new ‘Fast Track Assessment’ (FTA) service which has been designed to assess IT security products at the specific behest of customers in government. 3 CESG DIRECTORY 14/5/01 3:48 pm Page 4 The Directory next has a section covering the CESG Assisted Products Scheme [CAPS]. This scheme ensures that government and public sector users have access to a wide range of approved products that employ cryptographic security measures. These products have undergone a thorough investigation of the security offered by the cryptography employed, whether this is through implementation of a CESG algorithm or a public domain algorithm. Finally, there is a section containing an introduction to TEMPEST services and a list of TEMPEST certified products. Inevitably, a directory such as this cannot cover all aspects of approved or certified Infosec products and related services. Customers may need more in-depth guidance and advice, and contact details are therefore provided in each of the relevant sections. For any general queries regarding CESG’s wider range of Infosec services, please contact the marketing office, details for which are given on the back page of this directory. 4 CESG DIRECTORY 14/5/01 3:48 pm Page 5 (IACS) Infosec Assurance and Certification Services IACS The IACS approach For Developers… Technical assessors from IACS will work with developers or end users to define the best solution to their assurance requirements. By understanding the developer’s goals, IACS can define the most effective assessment package to achieve them. An assessment package could include: I Internationally recognised CC or ITSEC Certification I Cryptographic approval for HMG and the CNI (usually carried out under CAPS) I Fast Track assessment of products for HMG and the CNI I Systems assessments at all levels for IT products and systems evolve HMG and commerce rapidly and are increasingly diverse and complicated. Similarly, customer For End Users… requirements change and expand to Products which have been certified by counter new threats and to adapt us, or by our partners around the world, to new ways of working. CESG has offer end users ready-made assurance. brought together its assurance Where a Government or CNI customer services under IACS to offer has a requirement for assurance in an bespoke solutions to these uncertified product, we can perform a new security challenges. Fast Track Assessment. This allows the customer to determine whether the product is appropriate for his needs. If assurance is required in a system, then a range of packages, including IT Health Check, is available. www.cesg.gsi.gov.uk e-mail: [email protected] IACS Management Office PO Box 152 Cheltenham Gloucestershire GL52 5UF Tel. +44 (0)1242 238739 Fax: +44 (0)1242 235233 5 CESG DIRECTORY 14/5/01 3:48 pm Page 6 Formal Evaluation and Certificate Maintenance Scheme Certification Evaluation results only apply to a The products within this section have specific version of a product, and any been certified against either Common subsequent changes (including patches, Criteria or IT Security Evaluation Criteria hot fixes and service packs) to that (ITSEC). Certificates are awarded product may invalidate those results following extensive testing of the and, therefore, the Certificate. Because product’s IT security features to ensure the evolution of products is so rapid, that those features meet an agreed the Certificate Maintenance Scheme Security Target. Results of a successful (CMS) has been devised in response. evaluation are published in a CMS provides a means of maintaining Certification Report. This contains the same level of assurance in a product additional information and advice on after certification without the need for how the certified product should be re-evaluation. used and any restrictions that may apply in its configuration or use on specific ITSEC platforms. Prospective purchasers of ITSEC is the set of criteria used for the certified products should read both the past decade by Europe and Australasia ST and the CR to ensure that the for the evaluation of products and product is suitable. STs and CRs are systems. ITSEC was a major building available from the developers and, in block in the formulation of the addition, can usually be downloaded Common Criteria. from the CESG web site. Common Criteria What is a Security Target? CC represents the outcome of international efforts to align and This is a document specifying the develop the existing European and security functionality of a product and North American criteria and has been the assurance level against which it is ratified as ISO standard 15408. The evaluated as well as a description approximate assurance correspondence relating the product to the environment between ITSEC and CC is shown below. in which it will operate. A fuller description of the testing carried out at each assurance level is contained Vulnerabilities on the web site. Certification is not a guarantee of freedom from security vulnerabilities; Common Criteria ITSEC there remains a possibility that exploitable vulnerabilities may be EAL1 – discovered after a Certificate has been EAL2 E1 awarded. Users and prospective EAL3 E2 purchasers should check regularly whether any security vulnerabilities have EAL4 E3 been discovered since certification and, EAL5 E4 if appropriate, should check with the EAL6 E5 vendor to see if any patches exist for the product. EAL7 E6 6 CESG DIRECTORY 14/5/01 3:48 pm Page 7 International Mutual Recognition on products which have been assessed Developers whose products are certified elsewhere. Links are available from the against ITSEC or CC enjoy the benefits of CESG web site and contact details for an internationally recognised Certificate. the other recognised Certification Bodies In this brochure we detail only those appear on page 9. products which have been evaluated in HMG Departments wishing to use the UK, but end users should access the foreign certified products in other relevant national web sites to environments where national security is obtain the most up to date information an issue are advised to consult CESG. Our Certificates are currently recognised as follows: Assurance Levels Recognised Evaluation – CESG working Australia & ITSEC E1-E6 with industry New Zealand CC EAL1-4 Formal evaluation in the UK is carried Canada out by independent testing laboratories Israel CC EAL1-4 known as CLEFs which are appointed by USA the Certification Body in CESG. CLEFs meet rigorous security and ISO/IEC France 17025 quality standards. The UK has 5 Finland CLEFs, which can be contracted to carry out both evaluation and preparatory Germany consultancy work. CLEF contact details Greece are on page 9. Italy ITSEC E1-E6 The results of the testing of the product Netherlands
Recommended publications
  • University Microfilms International 300 North Zeeb Road Ann Arbor, Michigan 48106 USA St
    ISOLATION AND COMMUNITY: THE THEME AND FORM OF WILLIAM MORRIS' POETRY AND PROSE Item Type text; Dissertation-Reproduction (electronic) Authors Balch, Dennis Robert, 1949- Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 09/10/2021 07:25:50 Link to Item http://hdl.handle.net/10150/289550 INFORMATION TO USERS This material was produced from a microfilm copy of the original document. While the most advanced technological means to photograph and reproduce this document have been used, the quality is heavily dependent upon the quality of the original submitted. The following explanation of techniques is provided to help you understand markings or patterns which may appear on this reproduction. 1.The sign or "target" for pages apparently lacking from the document photographed is "Missing Page(s)". If it was possible to obtain the missing page(s) or section, they are spliced into the film along with adjacent pages. This may have necessitated cutting thru an image and duplicating adjacent pages to insure you complete continuity. 2. When an image on the film is obliterated with a large round black mark, it is an indication that the photographer suspected that the copy may have moved during exposure and thus cause a blurred image. You will find a good image of the page in the adjacent frame. 3. When a map, drawing or chart, etc., was part of the material being photographed the photographer followed a definite method in "sectioning" the material.
    [Show full text]
  • The World's Show, 1851, Or, the Adventures of Mr. and Mrs
    I < ' ' 6 i-o / Digitized by the Internet Archive in 2017 with funding from Getty Research Institute https://archive.org/details/worldsshow1851or00mayh ^0 mt (S’SS.m : on -n ft mrnfrTTTK^LLuj *t^P^YfTYfTTfM TTTTTjif 111 Hli)HOR, IthfAdvInturesvi V AND M TS SANDBOYS AND FAMILY,, ;0 CAME UP TO TOENJOY THEMSEEVEiS. AND TO SEE THE GREAT BY HENMYMA¥H E.W/MEDI GEORCECrUBCS MANIC. LONDON: GEORGE NEWBOLD, 303 & 304, STRAND, Vv.C. — LIST OF ILLUSTRATIONS DESIGNED AND ETCHED BY GEORGE CRUIKSHANK. ALL THE WORLD GOING TO THE GREAT EXHIBITION Frontispiece LOOKING FOR LODGINGS 54 LONDON CRAMMED AND MANCHESTER DESERTED 2 PLATES . 59 THE OPERA BOXES DURING THE TIME OF THE GREAT EXHIBI- TION 117 THE OPENING OF THE GREAT BEE-HIVE 136 THE FIRST SHILLING DAY 153 SOME OF THE DROLLERIES OF THE GREAT EXHIBITION ... 160 ODDS AND ENDS, IN, OUT, AND ABOUT THE GREAT EXHIBITION . 162 DISPERSION OF THE WORKS OF ALL NATIONS 238 ludia Proof impressions of the above Ten Plates may be had, all printed on paper of uniform size (23^ by 17^ inches), quite perfect, and free from folds, price 15s. per set. ENGRAVINGS. THE CHEAPEST HOUSE FOR ENGRAVINGS OF EVERY DESCRIPTION is GEORGE NEWBOLD’S, 303 & 304, STRAND, LONDON, W.C. (back of st. mart’s chukch.) A Clearance Sale Catalogue, 54 Svo pp., Post Free on receipt of Four Stamps. ; ; 1851 : OB, THE ADVENTURES OF MR. AND MRS. CURSTY SANDBOYS. CHAPTER I. ‘ 1 Come, Nicliol, and gi’e us thy cracks, I seed te gang down to the smiddy, I’ve fodder’d the naigs and—the nowt, And wanted to see thee ’at did e.
    [Show full text]
  • Encryption Block Cipher
    10/29/2007 Encryption Encryption Block Cipher Dr.Talal Alkharobi 2 Block Cipher A symmetric key cipher which operates on fixed-length groups of bits, termed blocks, with an unvarying transformation. When encrypting, a block cipher take n-bit block of plaintext as input, and output a corresponding n-bit block of ciphertext. The exact transformation is controlled using a secret key. Decryption is similar: the decryption algorithm takes n-bit block of ciphertext together with the secret key, and yields the original n-bit block of plaintext. Mode of operation is used to encrypt messages longer than the block size. 1 Dr.Talal Alkharobi 10/29/2007 Encryption 3 Encryption 4 Decryption 2 Dr.Talal Alkharobi 10/29/2007 Encryption 5 Block Cipher Consists of two algorithms, encryption, E, and decryption, D. Both require two inputs: n-bits block of data and key of size k bits, The output is an n-bit block. Decryption is the inverse function of encryption: D(E(B,K),K) = B For each key K, E is a permutation over the set of input blocks. n Each key K selects one permutation from the possible set of 2 !. 6 Block Cipher The block size, n, is typically 64 or 128 bits, although some ciphers have a variable block size. 64 bits was the most common length until the mid-1990s, when new designs began to switch to 128-bit. Padding scheme is used to allow plaintexts of arbitrary lengths to be encrypted. Typical key sizes (k) include 40, 56, 64, 80, 128, 192 and 256 bits.
    [Show full text]
  • Autumn 99 President: Eric Mitchell
    Auiunui vy DARK PEAK NEWS Autumn 99 President: Eric Mitchell Chairman Cub Captain 3 News Dave Holmes Vacant 615 Loxley Road Loxley 5 Coining Events Sheffield S6 6RR Tel. (0114) 2344186 8 More News Secretary Treasurer Paul Sanderson Jeff Harrison 19 Findon Street 118 Lydgate Lane Hillsborough Crookes 9 Letters Sheffield Sheffield S6 4FG S10 5FP Tel. (0114) 2206353 Tel. (0114) 2687114 11 Features - Warts winter 98/99 Clothing & Equipment Membership - Training weekend Richard Hakes Tim Tett - Getting the Horns 454A Loxley Road 68 Roebuck Road - Thoughts on Access Loxley Sheffield S6 2XA Sheffield S6 6RS Tel.(0114) 2667922 Tel. (0114) 2339912 18 Going the Distance - Central Fells in a day Cross Country - Bob Graham 99 Pete Dyke 13 Falkland Road Sheffield Sll 7PL 21 Reports and Results Tel. (0114) 266280 41 Fell Off Editor Mike Pedley 43 In Press Frost Hole Farm - Inside the New Map Cragg Vale Hebden Bridge HX7 5RU 43 In Gear Tel. (01422) 886195 email: [email protected] .co. uk 44 The-bit-at-the-end 2 Autumn 99 Club Hut Condemmed Plans to renovate the club hut were stopped in their tracks when serious structural problems were discovered during a close inspection of the building. The findings suggested the hut could collapse at any time and left club officials with no option other than declare a return to the car park changing at the Sportsman on a Wednesday night. Roy Small and Hugh Cotton's appeal for funds has been put on hold whilst discussion are held into possibilities for a replacement. The hut was moved following the closure of the nearby prisoner of war camp in 1945 and is possibly the last remaining building from the site.
    [Show full text]
  • The GCHQ Protocol and Its Problems
    The GCHQ Protocol and Its Problems Ross Anderson, Michael Roe Cambridge University Computer Laboratory Pembroke Street, Cambridge CB2 3QG Email: (rjal4,mrr)@cl. cam.ac .uk Abstract. The UK government is fielding an architecture for secure electronic mail based on the NSA’s Message Security Protocol, with a key escrow scheme inspired by Diffie-Hellman. Attempts have been made to have this protocol adopted by other governments and in various do- mestic applications. The declared policy goal is to entrench commercial key escrow while simultaneously creating a large enough market that software houses will support the protocol as a standard feature rather than charging extra for it. We describe this protocol and show that, like the ‘Clipper’ proposal of a few years ago, it has a number of problems. It provides the worst of both secret and public key systems, without delivering the advantages of ei- ther; it does not support nonrepudiation; a.nd there are serious problems with the replacement of compromised keys, the protection of security la- bels, and the support of complex or dynamic administrative structures. 1 Introduction Over the last two years, the British government’s crypto policy has changed completely. Whereas in 1994 the Primc Minister assured the House of Com- mons that no further restrictions on encryption were envisaged, we now find the government proposing to introduce a licensing scheme for ‘trusted third par- ties’, and licenses will only be granted to operators that escrow their customers’ confidentiality keys to the government’s satisfaction [ll,211. In March 1996, a document describing the cryptographic protocols to he used in government electronic mail systems was issued by CESG, the department of GCHQ concerned with the protection of government information; it has since been made available on the worldwide web [4].
    [Show full text]
  • An Historic Haskell Day!
    An Historic Sunday, August 2, 2015 Haskell Day! SUNDAY, AUGUST 2, 2015 732-747-8060 $ TDN Home Page Click Here FEATURE PRESENTATION • GI WILLIAM HILL HASKELL INV. >TEXAS= HOLDS >EM IN JIM DANDY Saturday=s GII Jim Dandy S. at Saratoga was the loser--numerically speaking, anyways--in the confluence of sophomore stakes events carded for this always busy weekend of racing. With Tekton (Bernardini) having scratched in favor of Friday=s Curlin S. and with Upstart (Flatter) and >TDN Rising Star= Competitive Edge (Super Saver) traveling the NJ Turnpike for Sunday=s GI Haskell Invitational S., just four horses faced the starter in the main local prep for the GI Travers S. Aug. 29, but the race did not lack for excitement, as PHAROAH IMPOSING, BUT NO >SHORE= THING GI Breeders= Cup Juvenile hero Texas Red (Afleet Alex) Zayat Stable=s American Pharoah (Pioneerof the Nile) outfooted odds-on Frosted (Tapit) by a measured half- already cemented his name in history when he became length. Cont. p9 only the 12th horse to win the Triple Crown, but the bay looks to add to his legacy Sunday in the GI William >LEGA= EAGLE Hill Haskell Invitational Probably below her best last time when second in S. at Monmouth Park, a The Curragh=s G1 Pretty Polly S., Michael Tabor=s AWin and You=re In@ G1 1000 Guineas heroine Legatissimo (Ire) (Danehill qualifier for the GI Dancer {Ire}) bounced back to her formidable best at Breeders= Cup Classic. Goodwood on Saturday when storming to success in This will be the Bob the G1 Qatar Nassau S.
    [Show full text]
  • Expertise As an Object: an Ontological Study of Cryptology Research in the United Kingdom from 1970 to 2000
    UNIVERSITY OF SURREY Expertise as an Object: An Ontological Study of Cryptology Research in the United Kingdom from 1970 to 2000 by Richard Fletcher Submitted for the degree of Doctor of Philosophy Faculty of Arts and Human Sciences Department of Sociology Supervisors: Dr Christine Hine and Dr Nicola Green ©Richard Fletcher Words: 95,698 Declaration of Authorship This thesis and the work to which it refers are the results of my own efforts. Any ideas, data, images or text resulting from the work of others (whether published or unpublished) are fully identified as such within the work and attributed to their originator in the text, bibliography or in footnotes. This thesis has not been submitted in whole or in part for any other academic degree or professional qualification. I agree that the University has the right to submit my work to the plagiarism detection service TurnitinUK for originality checks. Whether or not drafts have been so-assessed, the University reserves the right to require an electronic version of the final document (as submitted) for assessment as above. Signature: Date: i \Quis custodiet ipsos custodes?" Juvenal (Satire VI, lines 347-8) Abstract Recent research carried out under the `third wave of science studies' has produced robust categories of expertise, and has developed normative ideas about how it should be used during controversies over technological decision-making. Though separate in the literature, third wave ideas about contributory expertise appear to be compatible with the recent `turn to ontology'. Both sets of ideas focus on what it is that practices are able to produce, and consider the results of those practices to be real.
    [Show full text]
  • Where's Crypto?: Automated Identification and Classification Of
    Where’s Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code Carlo Meijer Veelasha Moonsamy Jos Wetzels Radboud University Ruhr University Bochum Midnight Blue Labs The Netherlands Germany The Netherlands [email protected] [email protected] [email protected] Abstract procurement or individual research since it requires resorting to highly labor-intensive reverse-engineering in order to deter- The continuing use of proprietary cryptography in embed- mine the presence and nature of these algorithms before they ded systems across many industry verticals, from physical can be evaluated. In addition, when a proprietary algorithm access control systems and telecommunications to machine- gets broken, details might not be published immediately as to-machine authentication, presents a significant obstacle a result of NDAs or court injunctions [5] leaving other po- to black-box security-evaluation efforts. In-depth security tentially affected parties to repeat such expensive efforts and analysis requires locating and classifying the algorithm in hampering effective vulnerability management. As such, there often very large binary images, thus rendering manual inspec- is a real need for practical solutions to automatically scan bi- tion, even when aided by heuristics, time consuming. naries for the presence of as-of-yet unknown cryptographic In this paper, we present a novel approach to automate algorithms. the identification and classification of (proprietary) crypto- graphic primitives within binary code. Our approach is based Criteria In order to support the analysis of closed-source on Data Flow Graph (DFG) isomorphism, previously pro- embedded systems for the use of proprietary cryptography, posed by Lestringant et al.
    [Show full text]
  • 1986 1987 Page 2
    ROTAR{ CLUB of Nonh Balwyn CLUB REPORT 1986-87 DISTRICT 980 "Rotury Brings Hope" \ ROTARr CLUB OF NORTT!- BALWYN t-e 86 / 87 s SEVENTH ANNUAL REPORT OFYICE BEARERS President Geoff Steinlcke President El_ect John Robson Vice President Geoff Cfark PP past president Immediate PauL t'itz PP Secretarg Ron CarneLL Treasurer Geoff Perdriau DIRECTORS CLub Service John Tltwaites Communitq Service Gerrg Spencer Fellowship MarcE:1 Mutttwql_er fnternatianaL Roger Wj <lqi11 VocationaL Davi.d Ltrornel_7 Youth Peter Cctok CHAIRMEN Attendance Ron CarneLL Grapevine Editor Rc;n PhiJJips Rotarg fnformatjon Rob.Ilead PubLic Re-Zat:ons fan Lucas Sergeant At Arms fan Col_Lins Program David Dogle Fund Raising PauL f'itz pp Membe r s hi p / C I as s i f i c at i on John Robson On to Conference John Robson ALmoner l'red Pike Rotarg Foundation Jc;ltn Etki.ns pp Poet Laureate & Cfub Historg Jrs)tn iltkins PP Auditor Ron Phi171ps pISrRreT 980 REPRESENTATr2N District Governor,s Representative PP PauL ]?itz Presidents El_ect Seminar Committe:e PP Joltn Etkins PubLic Re-7.atrons Committee PP Stan l-libbert Presidents ELect Seminar Conmitte:e PP Kevin Maunder Assr.stant District Secretarq Ken Proposch Rotaract Committee PP David GoLdsmith '.. youth i Chairman R.f. Art Exchange Roger WiggilJ Youth Committee PP John Reddrsh ':; p]'srRrer GoyaRjvoR PP John King GROUP REPRESENTA TIVE PP Peter parkin COMMITTEES COMMUNIIY SERViCE I NTERNAT I ONAL Gerry S pencer (C ) Roger W iggill ( C) Don Hay c raft Roger B enna I I ac k Stan Hi bbert John Et kins, Fo undation Don P i I grim David G oldsmith Morry R ubenstein Ron L i n er David S toc kma n Greg.
    [Show full text]
  • August 2008: the Sun Has Got His Hat on Issue. Editor’S Obvious Filler
    NewsieBlack Combe Runners August 2008: the sun has got his hat on issue. Editor’s obvious filler Another newsie limps off the presses and it’s been such a long time since the last one that nobody can remember what happened. The editor is very sorry about that. Next one will be quicker and thinner. And so will he. Meanwhile: Pete went for a long run with some friends. Sue and James had very different marathon experiences. The Black Combe race was frozen, the Duddon roasted, and the Great Lakes drowned. The superlongs plodded by and it seemed that nothing would stop Sue from completing the full classics series and probably getting all sorts of prizes, but then she made the fatal pre-race mistake of ordering a seafood dish at the Newfield. At Ennerdale I knocked an hour and 20 minutes off my PB. I still think you should get a prize for that, even if your You’d take a long time to get round Ennerdale if you hopped, too. old PB was the result of doing the last half of the race on hands and knees while hallucinating caterpillars. Sue and Impassable Bog, the (probably very similar) one mile Follow Andy weren’t far behind and a tired but very happy picnic Parmy, the Up Great Stickle, the Down Great Stickle and followed. the 110m sheepfold hurdles. Some of these may come with alcohol-related handicapping, and there will be style and The summer Black Combe race was another happy difficulty points for all falls. shambles. The Summer Relay on the other hand was a great disappointment to everybody: due to an oversight by the As I write this I’m wondering how much red bull I will organiser, James and I were not given the same leg to run have to drink to beat Pete in the Grasmere Senior Guides and as a result the whole thing went like clockwork.
    [Show full text]
  • Status of Non-CITES Listed Anguillid Eels
    Status of non-CITES listed anguillid eels Matthew Gollock, Hiromi Shiraishi, Savrina Carrizo, Vicki Crook and Emma Levy Delivered by the Zoological Society of London 1 Acknowledgments This report was made possible with financial support from the CITES Secretariat. The authors would like to thank Karen Gaynor in the CITES Secretariat for support during the drafting of the report. We thank from TRAFFIC, Joyce Wu for supporting the study and James Compton and Richard Thomas for reviewing elements of the draft report. Camilla Beevor and Aaron Foy at ZSL are thanked for their legal and operational support, Kristen Steele for translation of documents, Joanna Barker for creating the range maps and David Curnick for editing a draft of the report. Kenzo Kaifu and Céline Hanzen are acknowledged for technical input. Parties are thanked for completing the questionnaires that informed this report and for reviewing a draft to ensure it is as accurate and up to date as possible. We also thank the individuals who responded to specific requests for information and clarification. Author affiliations Matthew Gollock and Emma Levy, Zoological Society of London, Regent’s Park, London, NW1 4RY, United Kingdom. Hiromi Shiraishi, TRAFFIC, The David Attenborough Building, Pembroke Street, Cambridge CB2 3QZ, United Kingdom. Savrina Carrizo - Independent consultant. Vicki Crook – Independent consultant. 2 Table of Contents Executive summary ...............................................................................................................................
    [Show full text]
  • Ag Industry Posted 2020 Estimated Value of $7.35B by Bonnie Coblentz in the Latter Portion of the Year.” Lion for Cotton Lint and Cottonseed
    MISSISSIPPI DEPARTMENT OF AGRICULTURE & COMMERCE • ANDY GIPSON, COMMISSIONER VOLUME 93 NUMBER 2 JANUARY 15, 2021 JACKSON, MS Ag Industry Posted 2020 Estimated Value of $7.35B By Bonnie Coblentz in the latter portion of the year.” lion for cotton lint and cottonseed. MSU Extension Service Josh Maples, an agricultural “Cotton prices were not great at economist with the MSU Extension planting, and that led to lower acres,” Mississippi farmers generated an Service, said poultry took a hit from Will Maples said. “Worldwide supply estimated agricultural value of $7.35 COVID-19-related issues and chain disruptions this spring and de- billion in 2020, a 5% increase from dropped 16% in value. But row crops mand concerns due to the COVID-19 2019 that saw soybeans top forestry were strong, posting a combined pandemic and shutdowns suppressed for the No. 2 spot behind poultry. $2.6 billion estimated value. cotton prices at planting, which led The predicted total ag value ex- “This was a turbulent year for all to lower acres. ceeds 2019’s production value of agricultural producers due to the “As the year progressed, though, $7.01 billion, marking the ninth market upheaval caused by the pan- cotton prices recovered as econo- demic,” he said. “Poultry production mies opened back up, and that led consecutive year that agriculture was especially impacted during the to farmers receiving higher returns topped $7 billion in the state. spring by demand disruptions. Row than were expected this spring,” he Keith Coble, head of the Missis- crop markets also faced low prices said. sippi State University Department and uncertainty early in the year be- While the pandemic put a new of Agricultural Economics, said the fore stronger prices in the fall helped twist into ag markets, weather is year did not start out looking good.
    [Show full text]