SEI Podcast Series, a Production of Carnegie Mellon University’S Software Engineering Institute

Total Page:16

File Type:pdf, Size:1020Kb

SEI Podcast Series, a Production of Carnegie Mellon University’S Software Engineering Institute Defending Your Organization Against Business Email Compromise featuring Anne Connell as Interviewed by Suzanne Miller ---------------------------------------------------------------------------------------------- Welcome to the SEI podcast series, a production of Carnegie Mellon University’s Software Engineering Institute. The SEI is a federally funded research and development center, sponsored by the Department of Defense and operated by Carnegie Mellon University. Today’s podcast is going to be available at the SEI website at sei.cmu.edu/podcasts. Suzanne Miller: Hello. My name is Suzanne Miller. I am a principal researcher here at the SEI on the Agile-in-Government team. I am here today to interview Anne Connell, who is a cybersecurity engineer over in our CERT Division. Today, we’re going to talk about business email compromise in all its many forms. I’m excited about that because I get crazy business emails, and I know we do a lot at the SEI to try to defend that. But we want to find out more. Before we get into that topic, just tell us a little bit about how did you get into this kind of work? What is it that you do here, and how did you get to the SEI? Anne Connell: I started off working in the CMU School of Design. Really, I worked there for about 10 years as the network manager. A lot of the faculty, especially because they tended to be older, and phishing isn’t something that just came about. It’s been around for quite a while. That was the first taste of seeing people get taken, responding...Malware on their computers and/or for them, it was everything related back to the virus that you know, CERT famously discovered... Suzanne: The Morris Worm. Anne: The Morris Worm. I’m not saying it was the Morris worm, but it was, indeed, a lot of them getting phished. It’s interesting. I’ll never forget the one faculty member. I won’t use his name, but he said, I got an email, and they told me that I had money in this Swedish bank account. I had to ask, Do you have a Swedish bank account? Did you ever open one? No, no. I said, Well, then it’s probably a scam. And to them, it really was, Why, why would people even do this? I was pursuing my degree while working there, my master’s degree in human-computer interaction. While there, I just wanted to actually use it more so than just managing computers and setting up machines. Defending Your Organization Against Business Email Compromise page 1 www.sei.cmu.edu/podcasts SEI Podcast Series I took a job here at the SEI working for what was the team before STEPfwd on creating training for the SEI and for all its customers. Shortly after that, there was something. It was the group headed by Rich Nolan. It was the Digital Intelligence and Investigations Directorate. Working with them, they had a lot of law enforcement, Federal law enforcement liaisons. Initially, I was working on the projects, kind of creating web apps for them to access tools and training. Then it became much more interesting to work with them on requirements gathering for these tools. In doing the requirements gathering, you really got to see the problems that they were dealing with. That’s sort of my path into this work now. Suzanne: OK. So, let’s talk about business email compromise. We have had everything from the historical Nigerian prince that I think everybody in the world has seen, at this point. Up to more recently, something like Operation Wire Wire, which was a scam that involved like $14 million in fraud, so really big numbers. This is something that has been around a while, hasn’t gone away, so we need to deal with it. Your work is doing that. Tell us a little bit about what are the types of business email compromise that we can be looking for and especially, what are the ones that are more insidious? Anne: I am really glad you said the Nigerian prince because we have come a long way from the Nigerian prince to, in fact, the Operation Wire Wire and that Nigerian criminal ring. Again, Nigerian. Suzanne: Hi, Nigeria. Anne: We’ve come a long way, but there is a lot of things that are the same. The attack vectors that I want to talk about are there is the CEO scam. They are all scams, by the way. Business email compromise is really just a fancy way of saying sophisticated scam. So, it’s CEO, CIO, good old social engineering, and/or brute force, lawyer impersonation. We also have the romance kind of scam developing a relationship over time. The CEO scam, that’s when a relationship is built a little over time where they get in on the network. In this case, the company, they infiltrated the network buying credentials on the dark web. Then basically just kept trying, because they could have 100 attacks that they are launching. Only one needs to succeed. They jump around the network. They obtain domain admin access. Then they can find out how the email servers work, whether it’s digital signatures or the signature just on an email. Indeed, they can see who works for who and find the best way to target someone who might work for that CEO and be able to impersonate them. The instance here—the one that I talked about first before Operation Wire Wire—was the Texas Energy Company scam. That was a young man who went by Colvis. Defending Your Organization Against Business Email Compromise page 2 www.sei.cmu.edu/podcasts SEI Podcast Series That Texas energy company, he selected it simply because there was a direct flight from Lagos, Nigeria, to Houston, Texas. We’ll come back to that eventually, because I think it’s really interesting that his criteria for conducting this was based on a direct flight. It was easier to go to Houston and more cost effective for him than to fly all the way to San Francisco. Essentially, he was already working with pre-established money mule groups, so that had a lot to do with the areas in which he was interested. He selected this energy company and pretended to be the CEO, sending an email about three o’clock on a Friday pretending to be the CEO, sending it to the person who would process the wire transfers. Sending an email directing them to do it today before close, and that he would be unavailable this weekend. In fact, they social engineered his Facebook page to find out that he was the coach of his daughter’s soccer team, even that she was going to have a game on Sunday, So don’t contact me, really extensive work into finding out the best way to make this convincing. Even in the signature, he included the same terminology that typically their vendors would use in their invoices. It really was a convincing story and communication that turned out to be then a wire transfer of $3.2 million dollars outside of the company to a fraudulent account. That particular case, we are talking 2013-2014. Colvis wasn’t his first name. It was his middle name. They were able to find him because it happened to be his Instagram handle. The same way in which he was using social engineering to find more information about his target to make his scam more convincing, they used social engineering to find him. This is just a really interesting fact. He had already applied to go to the University of Maryland, Baltimore County to study architecture. He actually had come in, I am guessing for the interview. They tried to intercept him that time, but the supervisor, special agent in charge of the investigation, just happened to be out on maternity leave. So, she missed him that first time, but he had applied for a visa. On his second time, and that’s when they were able to intercept him. He stood quiet for quite a while, but they eventually got information from him about the criminal ring he was working with. That is a very thorough example of the CEO impersonation. There is also lawyer impersonation. That is to intercept, say, huge payoffs for a home, especially when you’re buying a home. You are sending that initial down payment, whether it’s 20 percent that’s required. They will pretend to be the lawyer that is taking care of that transaction. There is also just regular social engineering, finding out somebody who might be an attractive target. You can even really assess their level of sophistication, their tech savvy, by how they interact with their social media. There is that, establishing communication with them, pretending to be one of the vendors, and reaching out to them. That is how a gentleman, in the scam that was Qantas, he was able to get $100 million out of Google, Facebook by pretending to be that vendor and sending fake invoices to these companies Defending Your Organization Against Business Email Compromise page 3 www.sei.cmu.edu/podcasts SEI Podcast Series including a wire transfer [asking] for specific information, so that it would go to these fraudulent accounts. So, really, tech-savvy companies. We’re not just talking about energy companies. We’re talking about Google, Facebook. They’re falling for it. It all depends on who you get to, what level of employee, which is why organizational training and awareness is so important.
Recommended publications
  • Mexican Origin Youth and the Gang Context: Social Identities and School Experiences
    International Journal of School Social Work Volume 1 Issue 1 Article 2 2016 Mexican origin Youth and the Gang Context: Social Identities and School Experiences Leticia Villarreal Sosa Dominican University, [email protected] Follow this and additional works at: https://newprairiepress.org/ijssw Part of the Educational Sociology Commons, and the Student Counseling and Personnel Services Commons This work is licensed under a Creative Commons Attribution 4.0 License. Recommended Citation Villarreal Sosa, Leticia (2016) "Mexican origin Youth and the Gang Context: Social Identities and School Experiences," International Journal of School Social Work: Vol. 1: Iss. 1. https://doi.org/10.4148/ 2161-4148.1008 This Article is brought to you for free and open access by New Prairie Press. It has been accepted for inclusion in International Journal of School Social Work by an authorized administrator of New Prairie Press. For more information, please contact [email protected]. Mexican origin Youth and the Gang Context: Social Identities and School Experiences Abstract Youth, gang involved or not, living in a community with a gang problem are impacted in various ways. This study draws from qualitative interviews over the transition to high school of thirty-two Mexican origin students in Chicago. The Extended Case Method (ECM) was employed for the analysis of the qualitative data. Using borderlands and social identity theory, results indicated that the school response to the youth gang problem directly impacted students’ educational experiences, how staff viewed them, and how they negotiated these social categorizations. Students reported unrecognized trauma due to the level of violence and marginalizing experiences in school.
    [Show full text]
  • 8123 Songs, 21 Days, 63.83 GB
    Page 1 of 247 Music 8123 songs, 21 days, 63.83 GB Name Artist The A Team Ed Sheeran A-List (Radio Edit) XMIXR Sisqo feat. Waka Flocka Flame A.D.I.D.A.S. (Clean Edit) Killer Mike ft Big Boi Aaroma (Bonus Version) Pru About A Girl The Academy Is... About The Money (Radio Edit) XMIXR T.I. feat. Young Thug About The Money (Remix) (Radio Edit) XMIXR T.I. feat. Young Thug, Lil Wayne & Jeezy About Us [Pop Edit] Brooke Hogan ft. Paul Wall Absolute Zero (Radio Edit) XMIXR Stone Sour Absolutely (Story Of A Girl) Ninedays Absolution Calling (Radio Edit) XMIXR Incubus Acapella Karmin Acapella Kelis Acapella (Radio Edit) XMIXR Karmin Accidentally in Love Counting Crows According To You (Top 40 Edit) Orianthi Act Right (Promo Only Clean Edit) Yo Gotti Feat. Young Jeezy & YG Act Right (Radio Edit) XMIXR Yo Gotti ft Jeezy & YG Actin Crazy (Radio Edit) XMIXR Action Bronson Actin' Up (Clean) Wale & Meek Mill f./French Montana Actin' Up (Radio Edit) XMIXR Wale & Meek Mill ft French Montana Action Man Hafdís Huld Addicted Ace Young Addicted Enrique Iglsias Addicted Saving abel Addicted Simple Plan Addicted To Bass Puretone Addicted To Pain (Radio Edit) XMIXR Alter Bridge Addicted To You (Radio Edit) XMIXR Avicii Addiction Ryan Leslie Feat. Cassie & Fabolous Music Page 2 of 247 Name Artist Addresses (Radio Edit) XMIXR T.I. Adore You (Radio Edit) XMIXR Miley Cyrus Adorn Miguel Adorn Miguel Adorn (Radio Edit) XMIXR Miguel Adorn (Remix) Miguel f./Wiz Khalifa Adorn (Remix) (Radio Edit) XMIXR Miguel ft Wiz Khalifa Adrenaline (Radio Edit) XMIXR Shinedown Adrienne Calling, The Adult Swim (Radio Edit) XMIXR DJ Spinking feat.
    [Show full text]
  • BE a HOMEOWNER a BE Syracuse, NY Winter 2010-2011 Issue 7 FREE T Disclaimer T in the Ma B All Necessaril He He U CO Mig K T Terial
    the south side news Winter 2010-2011 issue 7 FREE Syracuse, NY Syracuse, www.mysouthsidestand.com Stand STAINED-GLASS ART BE A HOMEOWNER Brennan glass studio helps youth design and create windows nap group These seniors aren’t resting during the day. They’re on the go. Profiling Racial reach different findings about police reach different studies using two methods Two LIVING THE GOSPEL One of a few female pastors shares her passion for what she does INSIDE|WINTER The Stand | Winter 2010-2011 FOUNDER BUSINESS | Charles Garland shares his story of how he came to run his family’s Garland PROFESSOR Brothers Funeral Home, which was not his first career choice when he was younger. STEVE DAVIS the FEATURES | Meet Tony Wade, a postal worker who treats 100 or more families to holiday gift baskets around the South Side every year. DIRECTOR ASHLEY KANG FEATURES | Find out how seniors stay on the move by exercising, meditating, socializing and more through the Dunbar Association’s Neighborhood Advisory Program. BOARD OF DIRECTORS BUSINESS | Learn how women maintain their total image at Ma’Dear’s salon and spa, which Jackie Emery opened 15 years ago on South Avenue. CHARLES PIERCE-EL SCHOOL AND YOUTH | Share in the excitement of young people who designed and made SHANTEASHIA stained-glass windows as part of their after-school program at the Dunbar Center. HARRIS EL REGINALD CHURCH | The Rev. Colette Matthews, among the few female pastors in the country, has Stand A. SEIGLER led New Covenant Baptist Church for the past four years. Read all about her experiences.
    [Show full text]
  • Motivational Interviewing an Introduction
    Motivational Interviewing An Introduction Steven Malcolm Berg-Smith A.I.M. for Change (Awakening Inner Motivation) 415.578-2448 [email protected] berg-smithtraining.com What is MI? …………………………………………………………………………………………………. 2 Listen with Presence …………………………………………………………………………………… 3 Opening Activity ……………………………………………………………………………………….. 4 Explore-Offer-Explore………………………………………………………………………………….. 5 Style & Spirit………………………………………………………………………………………………... 6 OARS + I ………………………………………………………………………………………………… 7 Key Principles …………………………………………………………………………………………….. 8 Highlights …………………………………………………………………………………………………… 9 Theory ……………………………………………………………………………………………………… 10 Personal Strengths ………………………………………………………………………………………….. 11 What works? What doesn’t? ………………………………………………………………........................ 12 Style: Resistance Producing ……………………………………………………………………………… 13 Conversation Flow …………………………………………………………………………………………. 14 Counseling Tools………………………………………………………………………………………….. 15 What is Motivation? ……………………………………………………………………………………….. 16 Change Talk………………………………………………………………………………………………… 17 10 Strategies for Evoking Change Talk ………………………………………………………………….. 18 Affirmations …………………………………………………………………………………………………. 20 Forming Reflective Listening Statements ………………………………………………………………… 21 “In the Moment” ……………………………………………………………………………………………. 22 Getting Started ……………………………………………………………………………………………. 27 The Process of MI…………………………………………………………………………………………. 28 Explore Ambivalence ………………………………………………………………………………………. 29 Assess Readiness ……………………………………………………………………………………………. 30 Offering
    [Show full text]
  • Exploring Ways of Including Human Rights Narratives of Refugees In
    Exploring Ways of Including Human Rights Narratives of Refugees in Transitional Justice and Peacebuilding Processes Through Storytelling: Narratives from Dukwi Refugee Camp by Mavis N. Matenge A Thesis submitted to the Faculty of Graduate Studies of The University of Manitoba in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Department of Peace and Conflict Studies University of Manitoba Winnipeg Copyright © 2013 by Mavis N. Matenge Table of Contents LIST OF TABLES, IMAGES AND MAPS………….…………………………………………………….....v ACRONYMS…………………………………………………………………………………………………vi ACKNOWLEDGEMENTS……………………………………………………………………………….....vii DEDICATION………………………………………………………………………………………………viii ABSTRACT……………………………………………………………………………………………..........ix CHAPTER 1 – INTRODUCTION…………………………………………………………………….........1 INTRODUCTION……………………………………………………………………………………….........1 STATEMENT OF PURPOSE………………………………………………………………………………...5 RESEARCH QUESTIONS……………………………………………………………………………..…….5 OBJECTIVES OF THE STUDY………………………………………………………………………..........6 STUDY LIMITATIONS……………………………………………………………………………………...8 CHAPTERS OVERVIEW………………………………………………………………………………........9 CONCLUSION………………………………………………………………………………………………10 CHAPTER 2 – CONTEXT - VIOLENT CONFLICTS, TRUTH AND RECONCILIATION COMMISSIONS AND REFUGEE MOVEMENTS……………………………………………………..11 INTRODUCTION…………………………………………………………………………………………...11 SUB-SAHARAN AFRICA’S POST-COLONIAL VIOLENT CONFLICTS…………………………........12 A continent at war with itself…………………………………………………….....................................12 AFRICA’S TRUTH
    [Show full text]
  • The University of Sheffield Object
    The University of Sheffield Object Relations Middle Group and Attachment Theory: Gender Development, Spousal Abuse, and Qualitative Research On Youth Crime s. S. Wier PhD Object Relations Middle Group and Attachment Theory: Gender Development, Spousal Abuse, and Qualitative Research on Youth Crime Stewart Scott Wier PhD Centre for Psychotherapeutic Studies January 2003 Acknowledgments There are a number of people to whom I wish to express my sincere thanks and appreciation for their role in facilitating this achievement. Dr. Don Carveth first introduced me to the subject of psychoanalytic thought. He encouraged me to develop the potential he saw as an undergraduate student, and has continued to do so over the years, the most recent being through his endorsement of this particular dream. Dr. Gottfried Paasche is responsible for acquainting me with the process of qualitative methods of research, around which much of this paper is based, as well as for sponsoring my application to pursue this endeavor. The initial efforts for this project began over a decade ago at the University of Exeter under the direction of Dr. Paul Kline. He provided outstanding support and optimism surrounding these labours, in addition to showing compassion about my eventual decision to suspend them. Several years later, and following the retirement of Dr. Kline, Dr. Robert Young ofthe University of Sheffield, willingly assumed the responsibility ofacting as my subsequent supervisor despite the enormous demands on his time. The chair of the department for Psychotherapeutic Studies, Geraldine Shipton, displayed integrity, moral commitment, and consistency throughout the entire process. Dr. Christopher Cordess and Dr. Corinne Squire provided informed and respectful critical comments through a very cordial session which served to make a potentially distressing experience exceedingly pleasant, and brought considerable improvement to the first effort.
    [Show full text]
  • Where to Golf in Cortland, Ohio by Patrick Finan Walnut Run (Home of Lakeview Men’S Varsity Golf Team) by Kyle Ames Players Can Score in a Number Changing Decision
    April 2011 Issue 8 Vol. 49 The Bulldog Lakeview High School 300 Hillman Drive Cortland, OH 44410 Bulletin (330)-637-4921 Record-making earthquake shakes island nation BY PAIGE VOSMIK deaths rose over 1000. The efforts and the many Reporter number has since swelled to searches for people. many times that. At least 50 nations are To donate to At 2:46 p.m. on Mar. 11, In the month since the offering aid to the wounded 2011, near the city of Sendai in quake and tsunami, several country, including the relief efforts in the Miyagi prefecture of Japan aftershocks rattled the area. One, United States, Australia, was hit with an 8.9 magnitude a mere two days after the initial Italy, Canada, and others Japan through earthquake. According to cnn. quake, had a magnitude of 7.0. (news.com.au). The Red the American com, this quake was the strongest Another reached 7.4 magnitude, Cross is near the forefront to hit the island country in interrupting searches for of the efforts, assisting Red Cross, Inside: recorded history. The tectonic survivors on April 7. During the with handing out food and shifting triggered thirty foot Apr. 11 one month memorial supplies as well as giving text REDCROSS high tsunamis, CNN reports, service, another shock led to a medical assistance. They to 90999 News which reached six miles inland. tsunami warning (nytimes.com). have also set up simple and LHS teacher receives Thousands of people were These shocks have waylaid some convenient ways to donate, displaced by the destructive reconstruction such as by texting a number field trip grant for Dangerous levels of radiation deluge that to donate $10, advertised on school have been recorded in the water annihilated channels such as the Food around the plant in this crisis, h o m e s Network.
    [Show full text]
  • Teen Dating Violence Awareness Month Toolkit
    TOOLKIT 1 TABLE OF CONTENTS INTRODUCTION 3 OVERVIEW OF TEEN DATING VIOLENCE 4 FACTS ON TEEN DATING VIOLENCE 5 WARNING SIGNS 6 TEN TEEN DATING VIOLENCE MONTH ACTIVITIES 7 TD411 8 ICHOOSE 10 PROCLAMATION 13 DATING RIGHTS MANIFESTO 14 SAMPLE TWEETS 16 DATING ABUSE PLAY 17 RESOURCES 32 2 INTRODUCTION Nationwide, 1 in 3 teens reports being physically, sexually or emotionally hurt by their partner. According to the CT Department of Public Health, 17% of CT high school students report being emotionally abused by a dating partner and 8% report being physically abused by a dating partner (2011 School Health Survey Youth Risk Behavior Report). And early exposure to abusive or violent relationships increases the likelihood of those types of relationships being repeated later in life. Unhealthy relationships during the teen years can disrupt normal development and contribute to other unhealthy behaviors in teens that can lead to problems over a lifetime. Teens who experience dating violence are more likely to experience depression and anxiety, engage in unhealthy behaviors such as experimenting with tobacco, drugs and alcohol, and have thoughts about suicide, according to the Centers for Disease Control (CDC). The mental and physical health consequences can extend into adulthood, and unhealthy relationships in adolescence also can create a cycle of abusive relationships. For years, young people across the nation have organized to put a stop to dating abuse. With their adult allies, young people achieved a major victory in 2005 when the importance of addressing teen dating abuse was highlighted in the reauthorization of the Violence Against Women Act.
    [Show full text]
  • The Mathtangs Dominate Competition She Loves the Spring Musical
    Features Prom fever sweeps the senior class The HoofMarch 2010 | thehoofbeat.com | Northside College Preparatory High SchoolBeat | [email protected] | Vol. 11 No. 6 NCP Latin dominates at IJCL 2 | “Alice in Wonderland” falls short of hype 11 She loves the spring musical tive for a great variety of reasons. Steve Kodaly, played by Magellan Northside One was the chemistry and ability Yadao, Adv. 016. of the two star antgonists, Georg These characters manage to ei- presents its and Amlia. ther make Georg and Amalia’s af- “I think the relationship between fair difficult like Mr. Maraczek, who annual spring Georg and Amalia worked so well makes him stay late at work the day because the two seemed to have of his date with ‘Dear Friend’. musical “She good chemistry on stage,” Paulina “Mr. Maraczek always yelled at Kulka, Adv. 205, said. “I was really Georg for no reason,” Eamon McIn- Loves Me” surprised at how funny it was. Some erney, Adv. 209, said. “It was comi- of the scenes were excellent.” cal because he was picking on him by Faique Moqeet The two write letters referring to because he thought his wife had a As the curtains closed and the one another as ‘Dear Friend,’ un- non-existant affair, which is some- audience began its standing ovation, aware that they know each other. thing that happens in reality too.” this year’s spring musical, “She Loves Later Georg finds out and falls in On the other hand, Ladisov often Me,” came to a conclusion. Ending love with Amalia as she too falls in saves or helps Georg, once by knock- with a kiss between the two main love with him.
    [Show full text]
  • Color Me Different” by Jamal Greene
    Harness the Power of Youth Voice to Build Social and Emotional Learning & Literacy Skills A Story-Based Approach that Will Engage Your Students Students are highly motivated to read Youth Communication stories because they see their own challenges and triumphs refl ected back to them. All of our curricula and professional development sessions are built around highly compelling true stories by teens. In the stories, the writers show how they used social and emotional learning (SEL) skills to make positive changes in their lives. They are credible models for your students. In each session, your students read for meaning and participate in fun, interactive activities that reinforce SEL and literacy skills. Youth Communication has helped marginalized teens write powerful personal stories since 1980. The stories and curricula have won more than two dozen top awards from the Association of Educational Publishers. PROGRAMS TO SUPPORT YOUR STAFF Each Youth Communication program includes: ☑ One-Day Professional Development Session • Experience a lesson • Practice essential facilitation skills • Learn about the theories underlying the curriculum ☑ Comprehensive Curriculum Guide Each session in the curriculum guide includes: • Opening activity • Read-aloud and story discussion • Interactive Explore the Ideas activity • Closing circle and refl ection ☑ Anthologies of True Stories Each instructor receives a set of anthologies to use with students in the group. ☑ Ongoing Coaching • Technical assistance for group leaders 242 W. 38th St., 6th Fl. | New
    [Show full text]
  • Factors of Overweight/Obesity in Taiwanese Adolescents by Shu-Min
    Factors of Overweight/Obesity in Taiwanese Adolescents by Shu-Min Chan A Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy Approved September 2012 by the Graduate Supervisory Committee: Bernadette Mazurek Melnyk, Co-Chair Michael Belyea, Co-Chair Angela Chia-Chen Chen Joan E. Dodgson ARIZONA STATE UNIVERSITY December 2012 ABSTRACT Two studies were conducted to test a model to predict healthy lifestyle behaviors, physical activity, and body mass index (BMI) in Taiwanese adolescents by assessing their physical activity and nutrition knowledge, healthy lifestyle beliefs, and perceived difficulty in performing healthy lifestyle behaviors. The study drew upon cognitive behavioral theory to develop this study. The pilot study aimed to test and evaluate psychometric properties of eight Chinese-version scales. The total sample for the pilot study included 186 participants from two middle schools in Taiwan. The mean age was 13.19 for boys and 13.79 for girls. Most scales including Beck Youth Inventory self- concept, Beck Youth Inventory depression, Beck Youth Inventory anxiety, healthy lifestyle beliefs, perceived difficulty, and healthy lifestyle behaviors scales Cronbach alpha were above .90. The Cronbach alpha for the nutrition knowledge and the activity knowledge scale were .86 and .70, respectively. For the primary study, descriptive statistics were used to describe sample characteristics, and path analysis was used to test a model predicting BMI in Taiwanese adolescents. The total sample included 453 participants from two middle schools in Taiwan. The mean age of sample was 13.42 years; 47.5% (n = 215) were males. The mean BMI was 21.83 for boys and 19.84 for girls.
    [Show full text]
  • Nicki Minaj New Album Download Nicki Minaj New Album Download
    nicki minaj new album download Nicki minaj new album download. Artist: Nicki Minaj Album: Beam Me Up Scotty Released: 2021 Style: Hip Hop. Format: MP3 320Kbps. Tracklist: 01 – Seeing Green 02 – Fractions 03 – Crocodile Teeth (Remix) 04 – Chi-Raq 05 – Boss Ass Bitch (Remix) 06 – Intro 07 – Itty Bitty Piggy 08 – I Get Crazy 09 – Kill Da DJ 10 – Nicki Minaj Speaks 11 – Slumber Party 12 – Shopaholic 13 – Gotta Go Hard 14 – Nicki Minaj Speaks #2 15 – Best I Ever Had Remix 16 – Keys Under Palm Trees 17 – Silly 18 – Easy 19 – Nicki Minaj Speaks #3 20 – Envy 21 – Can Anybody Hear Me 22 – Still I Rise 23 – Beam Me Up Scotty. DOWNLOAD LINKS: RAPIDGATOR: DOWNLOAD TURBOBIT: DOWNLOAD. ALBUM: Nicki Minaj – Beam Me Up Scotty. DOWNLOAD ALBUM Nicki Minaj Beam Me Up Scotty – American Female Rapper Nicki Minaj has come with her new studio Project titled “Beam Me Up Scotty” to set your playlists ablaze with hit jams back to back as she activates another level here. Cop Beam Me Up Scotty by Nicki Minaj here on KulichangNG for free Download mp3 2021. Download & Share Below: Nicki Minaj – Beam Me Up Scotty Album Tracklist. 1. Seeing Green (with Drake & Lil Wayne ) 2. Fractions 3. Crocodile Teeth (Remix) (with Skillibeng ) 4. Chi-Raq (with G Herbo) 5. Boss Ass Bitch (Remix) (with PTAF) 6. Intro 7. Itty Bitty Piggy 8. I Get Crazy (feat. Lil Wayne) 9. Kill Da DJ 10. Nicki Minaj Speaks 11. Slumber Party (feat. Gucci Mane) 12. Shopaholic (feat. Gucci Mane, Bobby V, & F1Jo) 13. Gotta Go Hard (feat.
    [Show full text]