13Th International Conference on Cyber Conflict: Going Viral 2021

Total Page:16

File Type:pdf, Size:1020Kb

13Th International Conference on Cyber Conflict: Going Viral 2021 2021 13th International Conference on Cyber Confict: Going Viral T. Jančárková, L. Lindström, G. Visky, P. Zotz (Eds.) 2021 13TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT: GOING VIRAL Copyright © 2021 by NATO CCDCOE Publications. All rights reserved. IEEE Catalog Number: CFP2126N-PRT ISBN (print): 978-9916-9565-4-0 ISBN (pdf): 978-9916-9565-5-7 COPYRIGHT AND REPRINT PERMISSIONS No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, or for personal or educational use when for non-proft or non-commercial purposes, providing that copies bear this notice and a full citation on the frst page as follows: [Article author(s)], [full article title] 2021 13th International Conference on Cyber Confict: Going Viral T. Jančárková, L. Lindström, G. Visky, P. Zotz (Eds.) 2021 © NATO CCDCOE Publications NATO CCDCOE Publications LEGAL NOTICE: This publication contains the opinions of the respective authors only. They do not Filtri tee 12, 10132 Tallinn, Estonia necessarily refect the policy or the opinion of NATO Phone: +372 717 6800 CCDCOE, NATO, or any agency or any government. NATO CCDCOE may not be held responsible for Fax: +372 717 6308 any loss or harm arising from the use of information E-mail: [email protected] contained in this book and is not responsible for the Web: www.ccdcoe.org content of the external sources, including external websites referenced in this publication. Layout: JDF NATO COOPERATIVE CYBER DEFENCE CENTRE OF EXCELLENCE The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) is a NATO- accredited cyber defence hub focusing on research, training, and exercises. Experts from most NATO nations and many partners of the Alliance across the globe work at the Centre, which is based in Tallinn, Estonia. The Centre provides a comprehensive cyber defence capability, with expertise in the areas of technology, strategy, operations, and law. At the core of the CCDCOE is a diverse group of international experts including legal scholars, policy, and strategy experts, as well as technology researchers with military, government, and industry backgrounds. The Centre is staffed and fnanced by the following NATO nations and partners of the Alliance – Austria, Belgium, Bulgaria, Canada, Croatia, the Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Japan, Latvia, Lithuania, Luxembourg, Montenegro, the Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, South Korea, Spain, Sweden, Switzerland, Turkey, the United Kingdom and the United States. CYCON 2021 SPONSORS TABLE OF CONTENTS Introduction 1 Covid-19 and the Cyber Pandemic: A Plea for 9 International Law and the Rule of Sovereignty in Cyberspace François Delerue Impact of Good Corporate Practices for 25 Security of Digital Products on Global Cyber Stability Vladimir Radunović, Jonas Grätz-Hoffmann and Marilia Maciel The Role of Artifcial Intelligence in Kinetic Targeting 43 from the Perspective of International Humanitarian Law Anastasia Roberts and Adrian Venables Limiting Viral Spread: Automated Cyber Operations 59 and the Principles of Distinction and Discrimination in the Grey Zone Monica Kaminska, Dennis Broeders and Fabio Cristiano Epidemic? The Attack Surface of German 73 Hospitals during the COVID-19 Pandemic Johannes Klick, Robert Koch and Thomas Brandstetter The Vulnerability of the Financial System 95 to a Systemic Cyberattack Bobby Vedral Strategic Cyber Effects in Complex Systems: 111 Understanding the US Air Transportation Sector Charles Harry and Skanda Vivek Adversary Targeting of Civilian 133 Telecommunications Infrastructure Keir Giles and Kim Hartmann In the Same Boat: On Small Satellites, 151 Big Rockets, and Cyber Trust James Pavur, Martin Strohmeier, Vincent Lenders and Ivan Martinovic Possibilities and Limitations of Cyber 171 Threat Intelligence in Energy Systems Csaba Krasznay and Gergő Gyebnár Building a National Cyber Strategy: 189 The Process and Implications of the Cyberspace Solarium Commission Report Brandon Valeriano and Benjamin Jensen The Cyberspace ‘Great Game’. 215 The Five Eyes, the Sino-Russian Bloc and the Growing Competition to Shape Global Cyberspace Norms Nikola Pijović The Global Spread of Cyber Forces, 2000–2018 233 Jason Blessing Windmills of the Mind: Higher-Order Forms 257 of Disinformation in International Politics James Shires Cyber Personhood 275 Neal Kushwaha, Keir Giles, Tassilo Singer and Bruce Watson Explainable AI for Classifying 291 Devices on the Internet Artūrs Lavrenovs and Roman Graf Towards an AI-powered Player 309 in Cyber Defence Exercises Roland Meier, Artūrs Lavrenovs, Kimmo Heinäaro, Luca Gambazzi and Vincent Lenders Threat Actor Type Inference and Characterization 327 within Cyber Threat Intelligence Vasileios Mavroeidis, Ryan Hohimer, Tim Casey and Audun Jøsang Self-Aware Effective Identifcation and 353 Response to Viral Cyber Threats Pietro Baroni, Federico Cerutti, Daniela Fogli, Massimiliano Giacomin, Francesco Gringoli, Giovanni Guida and Paul Sullivan Quantum Communication for 371 Post-Pandemic Cybersecurity Martin C. Libicki and David C. Gompert Biographies 387 INTRODUCTION hen preparing the CyCon 2020 proceedings last year, the editors were confdent that by the time of CyCon 2021, the COVID-19 pandemic would be over and Estonia’s capital Tallinn would again welcome cyber enthusiasts from the four corners of the world to discuss cyber defence and security through the lens of policy, strategy, law and technology. Developments have proven us wrong, however, and we continue learning how to work and meaningfully exchange ideas in the virtual world. In that vein, CyCon 2021 – Going Viral – has also gone virtual. This year’s central theme alludes not only to the immediate implications of human crises for cyberspace; it also sets out to encourage discussion on the impact of the rapid proliferation and high unpredictability that processes in cyberspace are prone to, and the real-life implications these phenomena have. We need to acknowledge these, study them and strive to use them for our common beneft. To our satisfaction, CyCon authors were not intimidated by the circumstances and have responded richly to the call for papers. It would also seem that the extraordinary times have inspired a good deal of unconventional thinking about cyberspace. Some papers even look boldly into the distant cyber future. We all know, however, that what may sound far-fetched today, may become a reality within a generation. As usual, articles in this book refect the three tracks of CyCon. Of a total of 20 articles, there are four legal, six technical and ten strategy papers. On the legal track, the discussion revolves around norms of behaviour in cyberspace and innovative applications of principles of international humanitarian law to cyber operations. François Delerue opens with the queen of international law rules and principles and calls upon States to be bolder on sovereignty in cyberspace. Vladimir Radunović, Jonas Grätz-Hoffmann and Marilia Maciel add a private sector perspective to the implementation of norms in cyberspace. Anastasia Roberts and Adrian Venables then attempt to alleviate legal concerns stemming from the use of artifcial intelligence in the targeting process. Monica Kaminska, Dennis Broeders and Fabio Cristiano take more of a policy approach and conclude the legal bloc by examining whether principles of distinction, precaution and discrimination could inspire a new norm regulating under-the-threshold cyber operations. This year, policy considerations are not foreign to technical papers either, and vice versa, technical aspects serve as a springboard for conclusions on the strategy track. 1 Several papers explore cyber threats in the context of a specifc industry or category of services. Johannes Klick, Robert Koch and Thomas Brandstetter provide a topical and practical study of the attack surface of the German healthcare sector. Bobby Vedral examines the vulnerability of the fnancial system to a systemic cyber attack. Charles Harry and Skanda Vivek, in their turn, look into cyber threat implications for the US commercial air sector, while Keir Giles and Kim Hartmann focus on and explore the critical dependencies in the communications sector. James Pavur, Martin Strohmeier, Vincent Lenders and Ivan Martinovic sound the alarm with regard to technologies used to launch space missions and the policy implications of their vulnerabilities. Csaba Krasznay and Gergő Gyebnár offer a case study illustrating the challenges of cyber threat intelligence sharing in the energy sector. Of course, pure policy papers cannot be absent from this year’s selection. Brandon Valeriano and Benjamin Jensen present a unique insight into the work of the US Cyberspace Solarium Commission and identify the lessons learned. Nikola Pijović evokes the 19th-century Great Game and examines how modern powers compete to shape global cyberspace norms. Jason Blessing documents the growth in institutionalised cyber capabilities across the globe, thus helping us realise the evolving paradigm in states’ cyber defence policies in and beyond NATO. James Shires takes an innovative look at disinformation operations
Recommended publications
  • Advanced Persistent Threats
    THREAT RESEARCH Defending Against Advanced Persistent Threats Introduction As the name “Advanced” suggests, APT (advanced persistent threat) is one of the most sophisticated and organized forms of network attacks that keep cybersecurity professionals up at night. Unlike many hit & run traditional cyberattacks, an APT is carried out over a prolonged period of time by skilled threat actors who strategize multi-staged campaigns against their targets, employing clandestine tools & techniques such as Remote Administration Tools (RAT), Toolkits, Backdoor Trojans, Social Engineering, DNS Tunneling etc. These experienced cybercriminals are mostly backed & well-funded by nation states and corporation-backed organizations to specifi cally target high value organizations with the following objectives in mind: a Theft of Intellectual Property & classifi ed data i.e. Cyber Espionage a Access to critical & sensitive communications a Access to credentials of critical systems a Sabotage or exfi ltration of databases a Theft of Personal Identifi able Information (PII) a Access to critical infrastructure to perform internal reconnaissance To achieve the above goals, APT Groups use novel techniques to obfuscate their actions and easily bypass traditional security barriers that are not advancing at the same rate as the sophisticated attack patterns of cybercriminals. To understand the evolved behavioral pattern of APT Groups in the year 2020, a review of their latest activities revealed interesting developments and a few groundbreaking events¹: a Southeast Asia
    [Show full text]
  • Scena 3-2011 Layout 1
    3 Scena, YU ISSN 0036‐5734 Časopis za pozorišnu umetnost NOVI SAD 2011. Broj 3 Godina XLVII Jul–septembar Festivali TAMARA BARAČKOV 56. Sterijino pozorje IZVAN GRANICA – 6 VANJA NIKOLIĆ REDITELJSKO POZORJE – 14 LUKA KURJAČKI TRANSFER OD FRLJIĆA DO METAMORFOZA – 20 NIKOLA STEPIĆ RADOST IGRE – 40 45. Bitef LUKA KURJAČKI KAKO JE FRANK KASTORF SPOJIO ČEHOVA, VODVILJ I BEKETA – 45 TAMARA BARAČKOV IZMEĐU TEATRA I STVARNOSTI – 56 VANJA NIKOLIĆ NA ELIJAHOVOJ STOLICI – 61 Prenošenje plamena ANA TASIĆ – DIJANA MILOŠEVIĆ – 20 godina DAH teatra MI ŽIVIMO SVOJU UTOPIJU – 68 38. Infant NATAŠA PEJČIĆ OD INTRIGANTNE JAVNE (PSIHO) ANALIZE DO GOVORA U PLESU – 78 Wiener Festwochen ANA TASIĆ KRAJ SVETA SA RAZLIČITIH KRAJEVA SVETA – 86 12. praški kvadrijenale ANA TASIĆ TEATAR I (SAMO)ANALIZA – 95 10. Šumes PREDSTAVA TRAJE 120 SATI – 100 > 2 Beleške o pozorišnoj SVETISLAV JOVANOV sezoni 1900 – 2000 (V) OPSADA I POSLEDNJI DANI – 103 Refresh JOVAN HRISTIĆ ČEMU TRAGEDIJA? – 111 Sinteze SVETISLAV JOVANOV EGMONT: OD DEMONA DO UTOPIJE – 119 Diskursi DRAGAN KLAIĆ RESETOVANJE SCENE – 130 IN MEMORIAM – 134 OLIVERA MARKOVIĆ (1925–2011) DRAGAN KLAIĆ (1950–2011) STEVAN GARDINOVAČKI (1936–2011) MUHAREM PERVIĆ (1934–2011) MILUTIN MIŠIĆ (1936–2011) KNJIGE – 153 VESTI – 161 Drama MATJAŽ ZUPANČIČ SHOCKING SHOPPING – 165 VLADIMIR ĐURĐEVIĆ DNEVNA ZAPOVEST – 191 3> Festivali Stevan–Baja Gardinovački otvara 56. Sterijino pozorje 56. Sterijino pozorje TAMARA BARAČKOV IZVAN GRANICA Nakon prošlogodišnje, raznolike i haotične selekcije, od 56. zuje da je ove godine na Pozorju dominiralo drugačije pozo‐ Sterijinog pozorja dosta se očekivalo. Pogotovo što su dolazak rište koje se direktno obračunava s političkim pitanjima i isto‐ novog selektora i najavljene promene u koncepciji nagovesti‐ rijskim nasleđem.
    [Show full text]
  • What Every CEO Needs to Know About Cybersecurity
    What Every CEO Needs to Know About Cybersecurity Decoding the Adversary AT&T Cybersecurity Insights Volume 1 AT&T Cybersecurity Insights: Decoding the Adversary 1 Contents 03 Letter from John Donovan Senior Executive Vice President AT&T Technology and Operations 04 Executive Summary 05 Introduction 07 Outsider Threats 15 Looking Ahead: Outsider Threats 16 Best Practices: Outsiders 18 Insider Threats 24 Looking Ahead: New Potential Threats 25 Looking Ahead: Emerging Risks 26 Best Practices: Malicious Insiders 27 Best Practices: Unintentional Insiders 28 Moving Forward 32 Conclusion 33 Know the Terms For more information: Follow us on Twitter @attsecurity 35 End Notes and Sources Visit us at: Securityresourcecenter.att.com © 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T Globe logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. The information contained herein is not an offer, commitment, representation or warranty by AT&T and is subject to change. 2 ATT.com/network-security Business leader, Welcome to the inaugural issue of AT&T Cybersecurity Insights, a comprehensive look at our analysis and findings from deep inside AT&T’s network operations groups, outside research firms, and network partners. This first issue, “Decoding the Adversary,” focuses on whether or not you and your board of directors are doing enough to protect against cyber threats. Security is not simply a CIO, CSO, or IT department issue. Breaches, leaked documents, and cybersecurity attacks impact stock prices and competitive edge. It is a responsibility that must be shared amongst all employees, and CEOs and board members must proactively mitigate future challenges.
    [Show full text]
  • Giants: the Global Power Elite
    Secrecy and Society ISSN: 2377-6188 Volume 2 Number 2 Teaching Secrecy Article 13 January 2021 Giants: The Global Power Elite Susan Maret San Jose State University, [email protected] Follow this and additional works at: https://scholarworks.sjsu.edu/secrecyandsociety Part of the Civic and Community Engagement Commons, Other Sociology Commons, Politics and Social Change Commons, and the Public Affairs, Public olicyP and Public Administration Commons Recommended Citation Maret, Susan. 2021. "Giants: The Global Power Elite." Secrecy and Society 2(2). https://doi.org/10.31979/2377-6188.2021.020213 https://scholarworks.sjsu.edu/ secrecyandsociety/vol2/iss2/13 This Book Review is brought to you for free and open access by the School of Information at SJSU ScholarWorks. It has been accepted for inclusion in Secrecy and Society by an authorized administrator of SJSU ScholarWorks. For more information, please contact [email protected]. This work is licensed under a Creative Commons Attribution 4.0 License. Giants: The Global Power Elite Keywords human rights, C. Wright Mills, openness, power elite, secrecy, transnational corporations, transparency This book review is available in Secrecy and Society: https://scholarworks.sjsu.edu/ secrecyandsociety/vol2/iss2/13 Maret: Giants: The Global Power Elite Review, Giants: The Global Power Elite by Peter Philips Reviewed by Susan Maret Giants: The Global Power Elite, New York: Seven Stories Press, 2018. 384pp. / ISBN: 9781609808716 (paperback) / ISBN: 9781609808723 (ebook) https://www.sevenstories.com/books/4097-giants The strength of Giants: The Global Power Elite lies in its heavy documentation of the "globalized power elite, [a] concept of the Transnationalist Capitalist Class (TCC), theorized in the academic literature for some twenty years" (Phillips 2018, 9).
    [Show full text]
  • Security News Digest July 25, 2017
    Security News Digest July 25, 2017 Canada will remain where it is for a long time to come, but the Canada’s Security Scene Quiz will move to the Information Security Awareness previous quizzes page at the end of July. Watch this space for the August feature! August 1st is acknowledged across the globe as World Wide Web Day! World Wide Web Day, marks the birth of the Web in August 1990 at the Europe Laboratory for Particle Physics (CERN) in Switzerland. Tim Berners-Lee and Robert Cailliau developed a prototype Web browser and introduced Hypertext Markup Language, HTML. The first ever website was published on August 6, 1991 and served up a page explaining the World Wide Web project and giving information on how users could setup a web server and how to create their own websites and web pages, as well as how they could search the web for information. The URL for the first ever web page put up on the first ever website was http://info.cern.ch/hypertext/WWW/TheProject.html The World Wide Web ('WWW' or simply the 'Web') is a global information medium which users can read and write via computers connected to the Internet. The term [web] is often mistakenly used as a synonym for the Internet itself, but the Web is a service that operates over the Internet, just as e-mail also does. The history of the Internet dates back significantly further than that of the World Wide Web. On July 21st, the Google “Doodle” honoured Canadian Marshall McLuhan! [“the Medium is the Message”] Who is Marshall McLuhan? Meet the Canadian Media Theorist Who Predicted the Internet http://nationalpost.com/news/canada/who-is-marshall-mcluhan-how-a-canadian-media-theorist-predicted-the- internet/wcm/194cb7e2-e778-4780-9aba-6eb94831fcc5 Canadian professor Marshall McLuhan rose to prominence as a media theorist while teaching at the University of Toronto in the 1960s.
    [Show full text]
  • View / Download
    www.arianespace.com www.starsem.com www.avio Arianespace’s eighth launch of 2021 with the fifth Soyuz of the year will place its satellite passengers into low Earth orbit. The launcher will be carrying a total payload of approximately 5 518 kg. The launch will be performed from Baikonur, in Kazakhstan. MISSION DESCRIPTION 2 ONEWEB SATELLITES 3 Liftoff is planned on at exactly: SOYUZ LAUNCHER 4 06:23 p.m. Washington, D.C. time, 10:23 p.m. Universal time (UTC), LAUNCH CAMPAIGN 4 00:23 a.m. Paris time, FLIGHT SEQUENCES 5 01:23 a.m. Moscow time, 03:23 a.m. Baikonur Cosmodrome. STAKEHOLDERS OF A LAUNCH 6 The nominal duration of the mission (from liftoff to separation of the satellites) is: 3 hours and 45 minutes. Satellites: OneWeb satellite #255 to #288 Customer: OneWeb • Altitude at separation: 450 km Cyrielle BOUJU • Inclination: 84.7degrees [email protected] +33 (0)6 32 65 97 48 RUAG Space AB (Linköping, Sweden) is the prime contractor in charge of development and production of the dispenser system used on Flight ST34. It will carry the satellites during their flight to low Earth orbit and then release them into space. The dedicated dispenser is designed to Flight ST34, the 29th commercial mission from the Baikonur Cosmodrome in Kazakhstan performed by accommodate up to 36 spacecraft per launch, allowing Arianespace and its Starsem affiliate, will put 34 of OneWeb’s satellites bringing the total fleet to 288 satellites Arianespace to timely deliver the lion’s share of the initial into a near-polar orbit at an altitude of 450 kilometers.
    [Show full text]
  • Volume Xiv • Issue Iii
    Z cgai.ca CANADA’S CYBER SECURITY STRATEGY [P.12] PEACEKEEPING, PREPARE FOR WAR [P.16] DispatchThe FALL 2016 • VOLUME XIV • ISSUE III [P.6] FEATURED ARTICLE Source: Macleans ARE CANADA’S DIGITAL SECURITY POLICIES BEING DECIDED IN WASHINGTON? [P.10] September 2016 The Dispatch | 1 Published by the Canadian Global Affairs Institute Contributing Fellows: John Adams Jack Granatstein David Perry Stuart Beare Marius Grinius George Petrolekas David Bercuson Stéphanie von Hlatky Joël Plouffe Serge Bertrand Rolf Holmboe Andrew Rasiulis Jean-Christophe Boucher Rob Huebert Roy Rempel David Carment Thomas Juneau Colin Robertson Anthony Cary Tom Keenan Stephen Saideman Mark Collins Ferry de Kerckhove Hugh Segal Barry Cooper Whitney Lackenbauer Elinor Sloan Daryl Copeland Julian Lindley-French Gary Soroka Glenn Davidson Candice Malcolm Hugh Stephens Mike Day Randolph Mank Alan Stephenson Neil Desai Kyle Matthews Charity Weeden Paul Dewar David McLaughlin Chris Westdal Paul Durand Eric Miller Frédérick Gagnon Robert Muggah Prepared for the Canadian Global Affairs Institute 1600, 530 – 8th Avenue S.W. Calgary, Alberta T2P 3S8 www.cgai.ca ©2016 Canadian Global Affairs Institute| ISBN: 978-1-988493-04-6 2 | The Dispatch Volume XIV • Issue III September 2016 The Dispatch | 3 • Message from the Editor by DAVID BERCUSON COVER STORY Brexit, the Anglosphere and Canada by JULIAN LINDLEY-FRENCH The Obama Moment—Defence Spending Does Matter, eh! by ALAN STEPHENSON Are Canada’s Digital Security Policies Being Decided in Washington? by NEIL DESAI Canada’s Cyber Security
    [Show full text]
  • Being Lord Grantham: Aristocratic Brand Heritage and the Cunard Transatlantic Crossing
    Being Lord Grantham: Aristocratic Brand Heritage and the Cunard Transatlantic Crossing 1 Highclere Castle as Downton Abbey (Photo by Gill Griffin) By Bradford Hudson During the early 1920s, the Earl of Grantham traveled from England to the United States. The British aristocrat would appear as a character witness for his American brother-in-law, who was a defendant in a trial related to the notorious Teapot Dome political scandal. Naturally he chose to travel aboard a British ship operated by the oldest and most prestigious transatlantic steamship company, the Cunard Line. Befitting his privileged status, Lord Grantham was accompanied by a valet from the extensive staff employed at his manor house, who would attend to any personal needs such as handling baggage or assistance with dressing. Aboard the great vessel, which resembled a fine hotel more than a ship, passengers were assigned to accommodations and dining facilities in one of three different classes of service. Ostensibly the level of luxury was determined solely by price, but the class system also reflected a subtle degree of social status. Guests in the upper classes dressed formally for dinner, with men wearing white or black tie and women wearing ball gowns. Those who had served in the military or diplomatic service sometimes wore their medals or other decorations. Passengers enjoyed elaborate menu items such as chateaubriand and oysters Rockefeller, served in formal style by waiters in traditional livery. The décor throughout the vessel resembled a private club in London or an English country manor house, with ubiquitous references to the British monarchy and empire.
    [Show full text]
  • A TWIN CITIES CAMPUS I 1 I Emergency Numbers Contents
    PREGNANT? ABORTION SERVICES - CONFIDENTIAL • Non-Surgical Abortion • Board Certified Physicians in If Less Than 8 Weeks OB/GYN •Surgical Abortion to 21 Weeks •Serving Women Since 1973 • Free Pregnancy Testing • Located Close to U of M • Private Clinic • Most Insurance Accepted Meadowbrook Women's Clinic Call For Information 825 S 8th St #1018 612-376-7708 7am - 6pm M-F Minneapolis, MN www.meadowbrookclinic.com gam - 3pm Saturday Leasing: Office and Maintenance: 612-366-4659 612-331-8369 Espanol: Property Manager: 612-282-8749 TWIN CITIES 651-208-4680 1229 E Minneapolis Hennepin Ave HOUSING AND REALTY, LLC MN 55414 OnThe6oPC. com ~ 100% Satisfaction 6uaranteedl ill low ilL. 121m MLL COMPAQ. SONY. IBM Man - Thurs 7am - 11 pm Friday 7am - 8pm Saturday 12pm - 11 pm 612-378-3787 212 Ontario Street SE On ThelioPC. com q' . ",rr1IItrMs. Located on Ontario Street iust off Washington Ave, in Stadium Village. l "m,", LCD Mlflilltr, 612--379 2127 1OAt, Ii,,.,,,"m"., • All New Beds • Mystic Tan, UV-Free Tanning CJ nthe L 0 f \I [am p[/., ! 1l,ifJ/pttt Drim,S",fMf • On-Site Licensed Aesthetician MDAlti3 dU-D r UNIVERSITY OF MINNESOTA TWIN CITIES CAMPUS I 1 I Emergency Numbers Contents Directory of Services 2 TTYfTDD Calling Info & Pay Phone Locations, Campus Mail 3 To report fire, serious injury, illness, Phone Information & Instructions .4 or major utility failure University Organization ; 5 Board of Regents 5. From all locations 911 Administration 5 Regents Professors 6 Other Emergency Numbers (area code 612 Distinguished McKnight University Professors .•... 6 unless otherwise noted) Senate Members 6 Crisis Connection..................................
    [Show full text]
  • NANORACKS, LLC 555 Forge River Rd., Suite 120 Webster, TX 77598 4369 Phone: 832-632-7754 Fax: 832-575-4767
    NANORACKS, LLC 555 Forge River Rd., Suite 120 Webster, TX 77598 4369 Phone: 832-632-7754 Fax: 832-575-4767 www.nanoracks.com Contract Administrator: Christopher Cummins Email Address: [email protected] Business Size: Small For more information on ordering from Federal Supply Schedules click on the FSS Schedules button at fss.gsa.gov. TABLE OF CONTENTS COMPANY OVERVIEW ...............................................................................................................3 CUSTOMER INFORMATION .......................................................................................................5 GSA PRICELIST .............................................................................................................................8 SERVICE DESCRIPTIONS ..........................................................................................................13 NanoRacks, LLC 47QRAA18D004R 2 About NanoRacks NanoRacks was founded on the vision of building a business ecosystem in space. Our company has been integrating customer payloads for the International Space Station since our first launch in 2010. As of February 2018, we have integrated and operated over 600 payloads on 32 launches to the Space Station, including Shuttle, Antares/Cygnus, Atlas V/Cygnus, Falcon/Dragon, HTV, ATV, and Soyuz. To date, we have also deployed over 200 satellites into low-Earth orbit. NanoRacks comes with a team that has real hands on experience with payloads ranging from professional grade research to DOD to high school experiments. NanoRacks
    [Show full text]
  • Slovenski Gledališki Letopis ( SLOVENE THEATRE ANNUAL
    K JOLBKQBL)BKOÄLPWB LJLPNFOUBSKFVWBKB pa NikaŠvabinJuvanovaMaia, PUFNQPSPÀBKPH,MFNFOJOHPTQB#FSDF LBKVTQFMPKFOBPESJIJOLBKQBÀOF v teatrihinnavseslovenskisceni; QBLBKWTFÄUFWLJIWTFQPNFOJ LBNLEPÄFMOBHPTUPWBOKF kdo jekjedobilpriznanje, PWFMJLJI UVEJNBMJI pa ševseofestivalih, še predenjenaodrušlozares; BMJCJMÇFQSFKQPTWPKFWNFT pel, plesalalilestatiral, ,EPWTFWUFBUSVKFJHSBM SFÇJSBM do v se SLOEV NSGKI EL DEALIŠKI L TOPIS 18_19 SLOEV NHE T EART NE A NUAL oSl venski gledališki letopis ( 20 SLOEV NHE T EART NE A NUAL ) 18_ 20 19 Slovenski gledališki letopis 2 SLOVENE THEATRE ANNUAL ( 0 ) 18_2 0 19 Sestavil in uredil ŠTEFAN VEVAR Spremna beseda: Melita Forstnerič Hajnšek (dramsko in postdramsko gledališče) Nataša Berce (balet in ples) Maia Juvanc (operno gledališče) Nika Švab (lutkovno gledališče) Klemen Markovčič (radijska igra) Sodelavci za posamezna gledališča: Tatjana Ažman (SNG Opera in balet Ljubljana), Barbara Briščik (SSG Trst), Darja Čižek (Opera in balet SNG Maribor), Lidija Franjić (Lutkovno gledališče Ljubljana), Oriana Girotto (Mini teater), Alen Jelen (ŠKUC gledališče), Robert Kavčič (Prešernovo gledališče Kranj), Srečko Kermavner (Šentjakobsko gledališče), Alenka Klabus Vesel (Mestno gledališče ljubljansko), Mojca Kranjc (SNG Drama Ljubljana), Tina Kren Mihajlović (Lutkovno gledališče Maribor), Tina Malič (Slovensko mladinsko gledališče), Staša Mihelčič (Cankarjev dom), Martina Mrhar (SNG Nova Gorica), Anja Pirnat (Gledališče Glej), Sandra Požun (Drama SNG Maribor), Mitja Sočič (Anton Podbevšek teater), Katja Somrak (Plesni teater Ljubljana),
    [Show full text]
  • The Creek "Migration Legend"
    UCLA UCLA Electronic Theses and Dissertations Title Dancing Breath: Ceremonial Performance Practice, Environment, and Personhood in a Muskogee Creek Community Permalink https://escholarship.org/uc/item/2qm3x2bd Author Koons, Ryan Abel Publication Date 2016 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Los Angeles Dancing Breath: Ceremonial Performance Practice, Environment, and Personhood in a Muskogee Creek Community A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Ethnomusicology by Ryan Abel Koons 2016 © Copyright by Ryan Abel Koons 2016 ABSTRACT OF THE DISSERTATION Dancing Breath: Ceremonial Performance Practice, Environment, and Personhood in a Muskogee Creek Community by Ryan Abel Koons Doctor of Philosophy in Ethnomusicology University of California, Los Angeles, 2016 Professor Tara Browner, Chair This dissertation presents an ethnography utilizing a multispecies perspective of the "busk" ritual cycle as performed by the southeastern Muskogee Creek American Indian community, Pvlvcekolv (Apalachicola). Humans construct humanity and personhood partially via interactions with other-than-human persons, such as animals, plants, and objects. I examine ritualized interactions between humans and others-than-human in a southeastern Indigenous "natureculture," exploring the intersections of ontology, personhood, and performance practice. Pvlvcekolv, an animistic Florida-based tribal town with a ceremonial Fire that pre-dates European Contact, maintains a centuries-old ritual tradition, the busk. Sometimes known as "Green Corn Ceremonialism," many Native communities share this tradition, including ii Cherokee, Chickasaw, Seminole, Yuchi, and other Creek peoples historically and in the present day. Performing the songs, dances, and ritual actions of the busk places participants into dialogue with other-than-human persons.
    [Show full text]