Addressing SIS Cyber Security: First Or Last

Total Page:16

File Type:pdf, Size:1020Kb

Addressing SIS Cyber Security: First Or Last Vol. 56 No. 5 MAY 2009 Covering control, instrumentation, and automation systems worldwide Addressing SIS Cyber Security: First or Last? When considering integrated control and safety systems, building a strong defense is an investment in ensuring business continuity. Bob Huba and ebruary 2008: A company that boasts it pro- What these and the many other responses you Chuck Miller vides “total fire protection systems” went up hear illustrate is that most people consider security Emerson Process in flames. Smoke was seen coming from the synonymous with defense—defense against unex- Management warehouse-like buildings that house Atlan- pected interruptions to our daily activities. tica Mechanical of Dartmouth, Nova Scotia Frequently, businesses will approach securi- F —a contracting business that oversees the design, instal- ty using a domain-by-domain approach—protect lation and maintenance of fire protection systems. The the perimeter, protect the people, protect the intel- local fire department struck lectual property, protect the envi- the blaze, but the building and ronment, and so forth. However, contents were lost. Workers need when you step back and look at Ask a diverse crowd of better‘ training on it, security is really about ensur- people to define the term ing business continuity and it is “security” and the responses managing backup best achieved by designing a uni- will likely include financial fied defense-in-depth strategy securities; fire protection; systems in case of and architecture that can defend natural disaster protection; attack. against myriad possible business protection against unau- interruptions. thorized access to property, computers, and person- ’Businesses have been aggressively engaged in al I.D.; protection against un-insured motorists; and establishing a strong defense against unauthorized many more similar concepts that tend to center on access to their digital systems for about the last physical things. 20 years. Today we generally refer to these defen- Conduct a similar exercise with business exec- sive efforts as cyber security, and while protecting utives and the responses will likely include cyber against attackers that are using the Internet is an security; protection of intellectual properties; pro- important consideration, cyber security represents tection of critical business information; protection of only one part of a robust strategy that builds a larg- personnel, facilities, assets, and the environment. er sense of defense-in-depth. inside process Devil in the details protection mechanism; It only takes one March 2008: “Workers n Create a torturous path for intruders; operating networks sup- n Understand your company’s entire depth-in- n October 2007, about 1,100 employees porting the nation’s criti- defense architecture and leverage its infrastructure Iat the Oak Ridge National Laboratory cal infrastructure, such as to protect the control and safety system domains; received versions of seven phishing telecommunications and n Apply appropriate protection, including indus- e-mails which appeared legitimate. Rather transportation, need bet- trial grade devices, in control and safety domains; than verify the messages’ authenticity, ter training on how to man- n Connect control- and safety-system domains eleven employees opened the emails’ age backup systems in case using good engineering practices; and attachments, which enabled the hackers cyber-attacks take down n Accept that this is not a one-shot effort; that to infiltrate the Lab’s system and remove main systems,” said a top the sources, goals, and sophistication of attack- data. Later DHS investigations reported DHS (Department of Home- ers and the weapons they use continue to evolve, that the hack originated in China. land Security) official. That’s requiring that you continuously re-evaluate, and, one lesson learned during when necessary, strengthen your protection layers. Cyber Storm II, a DHS sim- ulation of a large-scale coordinated cyber attack on the Closing and locking the doors nation’s infrastructure networks. April 2007: Lonnie Charles Denison, an employee of The underlying premise of a unified depth- Science Application International Corp. in San Diego, in-defense strategy is simple—no single mecha- was working as a contract Unix system administrator nism offers adequate protection against the variety for the California Independent System Operator (ISO) of attackers and their evolving weapons. There- Corp. Frustrated with an unresolved dispute with his fore it is best to create a series of protection layers employer, Denison tried to disrupt an ISO data cen- designed to impede attackers in hopes that they can ter in Folsom, CA, by hammering the safety glass of an be detected and repelled or simply give up and go emergency power shut-off and pushing the button. elsewhere to seek less fortified installations. Even the youngest child understands the need That certainly seems simple enough but, as the to close and lock the doors to keep out the “bad saying goes, “the devil is in the details.” Architect- guys,” yet all around the world businesses essen- ing a unified defense-in-depth strategy is not easy tially ignore this simple security measure and leave and, to be effective, its development and design many of their doors open. demands full engagement and knowledgeable rep- Following 9/11, process industries spent millions resentation from every part of your business. of dollars to install and upgrade perimeter fencing, Later, this article will focus on the control- and dig ditches, add berms, reinforce guard gates and safety-system domains but, as we just indicated, plant entrances, and install double-factor security the most successful defense-in-depth strategies technologies at employee entrances. To a person are those that encompass the entire business and driving by one of these post-9/11 chemical, phar- include the following elements: maceutical, or refining facilities, it appears that they n Close and lock the doors: policies, practices are nearly impenetrable. and enforcement; However, looks can deceive, especially when n Identify the “jewels” that must be protected— you probe a plant’s “back” doors. Vehicles with the why and from whom; correct markings—UPS, FedEx, caterer vans, and n Use what you already know by conducting contractor buses—are often waved through the con- risk assessments, layer of protection analysis, and tractor’s gate. Even if they are stopped, the check developing security assurance levels; by security personnel, who are usually contractors n Ensure that regular tests are conducted to exer- themselves, is often very cursory. cise detection and alert systems, and the actions of A sound defense-in-depth strategy must include persons responsible for responding to alerts; extensive policies, practices, and enforcements. n Establish and test disaster recovery implemen- Certainly one part of such a collection must tation, including reloading saved software; include what is required for visitors, contractor n Recognize and accept that there is no single personnel, vendors, utility personnel, and others, Troy’s lesson bout 1200 BC, the Trojans protected Troy against an invasion by the Greek army for more Athan a decade. However, as the story goes, when traditional tactics failed, the Greeks pen- etrated Troy’s defenses using a wooden horse that hid a handful of soldiers. Troy’s lesson is that committed attackers create their own rules of engagement and will apply innovative technologies to gain access to your business. Ensuring business continuity requires your defense-in-depth implementation provide timely detection, robust prevention, and appropriate and timely reaction/response. to gain plant entrance. It should also address what refineries; and pipe- contactor companies that provide on-site personnel lines and compressors must do before allowing their personnel to enter at gas and oil trans- your plant—including background checks, safety mission companies. training, muster station, evacuation training, per- Alan Paller, the sonal communication, and so much more. director of research at the SANS Institute, Hardware and policies a cyber security edu- November 2006: Federal inspectors confirmed a securi- cation organization, ty breach at the Oak Ridge Y-12 nuclear weapons plant recently revealed a when an unauthorized laptop computer was carried CIA secret: “Accord- into a high-security area. Investigators confirmed that ing to the CIA’s top Y-12’s cyber security personnel did not respond properly cyber security ana- after the breach was discovered and did not report the lyst Tom Donahue, incident to Department of Energy (DOE) headquarters computer hackers in Washington until six days later. DOE policies require tried to infiltrate and that such incidents be reported within 32 hours. The disrupt the electric involved employees’ access privileges have been revoked power grids in sev- and they are awaiting future disciplinary action. eral foreign regions. Eric Byers, CEO of Byres Security, says, And in some places, “Policies and procedures are a quick win area. they succeeded.” Managing something as simple as laptops and Paller says he memory sticks is crucial. All the technology in decided to break his the world won’t help if you don’t have these secrecy agreement procedures in place.” with Donahue and Byers is correct, but even a vault full of policies the CIA, “because the and procedures won’t protect you unless you are heads of utilities get also willing to enforce them strictly. Until you are lied to by their technical people. The technical peo- Medieval concepts of prepared to back your policies and procedures with ple say ‘oh, nobody can get in! We’re not connected defense-in-depth still immediate discharge of employees, contractors, to the Internet.’ But we had three people at that same apply in newer forms. vendors, etc., they are essentially worthless. meeting who, for a living, did penetration testing of Source: Control Policies and procedures help close the doors; utilities, and every one of them said they have never Engineering tough enforcement locks those doors! failed to get in, even when the organization claimed they weren’t connected to the Internet.
Recommended publications
  • Warfare in a Fragile World: Military Impact on the Human Environment
    Recent Slprt•• books World Armaments and Disarmament: SIPRI Yearbook 1979 World Armaments and Disarmament: SIPRI Yearbooks 1968-1979, Cumulative Index Nuclear Energy and Nuclear Weapon Proliferation Other related •• 8lprt books Ecological Consequences of the Second Ihdochina War Weapons of Mass Destruction and the Environment Publish~d on behalf of SIPRI by Taylor & Francis Ltd 10-14 Macklin Street London WC2B 5NF Distributed in the USA by Crane, Russak & Company Inc 3 East 44th Street New York NY 10017 USA and in Scandinavia by Almqvist & WikseH International PO Box 62 S-101 20 Stockholm Sweden For a complete list of SIPRI publications write to SIPRI Sveavagen 166 , S-113 46 Stockholm Sweden Stoekholol International Peace Research Institute Warfare in a Fragile World Military Impact onthe Human Environment Stockholm International Peace Research Institute SIPRI is an independent institute for research into problems of peace and conflict, especially those of disarmament and arms regulation. It was established in 1966 to commemorate Sweden's 150 years of unbroken peace. The Institute is financed by the Swedish Parliament. The staff, the Governing Board and the Scientific Council are international. As a consultative body, the Scientific Council is not responsible for the views expressed in the publications of the Institute. Governing Board Dr Rolf Bjornerstedt, Chairman (Sweden) Professor Robert Neild, Vice-Chairman (United Kingdom) Mr Tim Greve (Norway) Academician Ivan M£ilek (Czechoslovakia) Professor Leo Mates (Yugoslavia) Professor
    [Show full text]
  • A Historical Assessment of Amphibious Operations from 1941 to the Present
    CRM D0006297.A2/ Final July 2002 Charting the Pathway to OMFTS: A Historical Assessment of Amphibious Operations From 1941 to the Present Carter A. Malkasian 4825 Mark Center Drive • Alexandria, Virginia 22311-1850 Approved for distribution: July 2002 c.. Expedit'onaryyystems & Support Team Integrated Systems and Operations Division This document represents the best opinion of CNA at the time of issue. It does not necessarily represent the opinion of the Department of the Navy. Approved for Public Release; Distribution Unlimited. Specific authority: N0014-00-D-0700. For copies of this document call: CNA Document Control and Distribution Section at 703-824-2123. Copyright 0 2002 The CNA Corporation Contents Summary . 1 Introduction . 5 Methodology . 6 The U.S. Marine Corps’ new concept for forcible entry . 9 What is the purpose of amphibious warfare? . 15 Amphibious warfare and the strategic level of war . 15 Amphibious warfare and the operational level of war . 17 Historical changes in amphibious warfare . 19 Amphibious warfare in World War II . 19 The strategic environment . 19 Operational doctrine development and refinement . 21 World War II assault and area denial tactics. 26 Amphibious warfare during the Cold War . 28 Changes to the strategic context . 29 New operational approaches to amphibious warfare . 33 Cold war assault and area denial tactics . 35 Amphibious warfare, 1983–2002 . 42 Changes in the strategic, operational, and tactical context of warfare. 42 Post-cold war amphibious tactics . 44 Conclusion . 46 Key factors in the success of OMFTS. 49 Operational pause . 49 The causes of operational pause . 49 i Overcoming enemy resistance and the supply buildup.
    [Show full text]
  • Democracies Waging Counterinsurgency in a Foreign Context: the Past and Present
    Utah State University DigitalCommons@USU All Graduate Theses and Dissertations Graduate Studies 5-2015 Democracies Waging Counterinsurgency in a Foreign Context: The Past and Present Scott J. Winslow Utah State University Follow this and additional works at: https://digitalcommons.usu.edu/etd Part of the Political Science Commons Recommended Citation Winslow, Scott J., "Democracies Waging Counterinsurgency in a Foreign Context: The Past and Present" (2015). All Graduate Theses and Dissertations. 4475. https://digitalcommons.usu.edu/etd/4475 This Thesis is brought to you for free and open access by the Graduate Studies at DigitalCommons@USU. It has been accepted for inclusion in All Graduate Theses and Dissertations by an authorized administrator of DigitalCommons@USU. For more information, please contact [email protected]. DEMOCRACIES WAGING WAR IN A FOREIGN CONTEXT: THE PAST AND PRESENT by Scott J. Winslow A thesis submitted in partial fulfillment of the requirement for the degree of MASTER OF ARTS in Political Science Approved: ________________________ _______________________ Dr. Veronica Ward Dr. Jeannie Johnson Major Professor Committee Member ________________________ ________________________ Dr. Abdulkafi Albirini Dr. Mark McLellan Committee Member Vice President for Research and Dean of the School of Graduate Studies UTAH STATE UNIVERSITY Logan, Utah 2015 ii Copyright © Scott Winslow 2015 All Right Reserved iii ABSTRACT Democracies Waging Counterinsurgency in a Foreign Context: The Past and Present by Scott J. Winslow, Master of Arts Utah State University, 2015 Major Professor: Dr. Veronica Ward Department: Political Science Why have Western democracies been successful in conducting external counterinsurgency operations in the past and unsuccessful recently? This thesis conducts a comparison between two successful past interventions, and a recent unsuccessful one using three variable groupings.
    [Show full text]
  • Defense Primer: 75Th Anniversary of D-Day, June 6, 1944
    May 28, 2019 Defense Primer: 75th Anniversary of D-Day, June 6, 1944 June 6, 2019, marks the 75th anniversary of the historic manned by Germans), as the main barrier to the invasion amphibious landing by Allied Forces on the coast of force. Allied leaders initially set June 5, 1944, as D-Day but Normandy, France, on June 6, 1944, during World War II on the morning of June 4, stormy weather over the English (1939-1945). D-Day marked the beginning of the Allied Channel forced Gen. Eisenhower to postpone the attack for campaign to liberate Europe from Nazi Germany. 24 hours to June 6 when a break in the weather was expected. Operation NEPTUNE was the code name given What is the “D” in D-Day? to the seaborne assault phase. See Figure 1. The “D” in D-Day is the designation for the first day of any important invasion or military operation. The days before Allied Landings on June 6, 1944 and after a D-Day are indicated using minus and plus signs, Before dawn on June 6, 1944, 13,000 paratroopers from (i.e., D-1 means one day before (June 5) while D+7 means three airborne divisions—the U.S. 82nd and 101st and the seven days after D-Day (June 13)). British 6th—parachuted and landed by glider behind targeted beaches. See Figure 2. Over 1,200 aircraft were D-Day Preparation and Operations used in the pre-landing drop. Allied naval forces, including At the Tehran Conference in August 1943, Allied leaders the U.S.
    [Show full text]
  • Gettysburg Campaign
    MARYLAND CIVIL WAR TRAILS How to Use this Map-Guide This guide depicts four scenic and historic driving tours that follow the routes taken by Union and Confederate armies during the June-July 1863 Gettysburg Campaign. Information contained here and along the Trail tells stories that have been hidden within the landscape for more than 140 years. Follow the bugle trailblazer signs to waysides that chronicle the day-to-day stories of soldiers who marched toward the Civil War’s most epic battles and civilians who, for a second time in nine months, watched their countryside trampled by the boots of the “Blue and Gray.” The Trail can be driven in one, two or three days depending on traveler preference. Destinations like Rockville, Westminster, Frederick, Hagerstown and Cumberland offer walking tours that can be enjoyed all-year long. Recreational activities such as hiking, biking, paddling and horseback riding add a different, yet powerful dimension to the driving experience. Amenities along the Trail include dining, lodging, shopping, and attractions, which highlight Maryland’s important role in the Civil War. For more detailed travel information, stop by any Maryland Welcome Center, local Visitor Center or contact any of the organizations listed in this guide. For additional Civil War Trails information, visit www.civilwartrails.org. For more travel information, visit www.mdwelcome.org. Tim Tadder, www.tadderphotography.com Tadder, Tim Biking through C&O Canal National Historical Park. Follow these signs to more than 1,000 Civil War sites. Detail of painting “Serious Work Ahead” by Civil War Artist Dale Gallon, www.gallon.com, (717) 334-0430.
    [Show full text]
  • Biological Invasions of Fresh Water: Empirical Rules and Assembly Theory
    Biological Conservation 78 (1996) 149-161 Copyright © 1996 Elsevier Science Limited Printed in Great Britain. All rights l~served PII: S0006-3207(96)00024-9 0006-3207/96/$15.00 +.00 ELSEVIER BIOLOGICAL INVASIONS OF FRESH WATER: EMPIRICAL RULES AND ASSEMBLY THEORY Peter B. Moyle & Theo Light Department of Wildlife and Fisheries Biology, University of California, Davis, CA 95616, USA Abstract biotic invasions into aquatic systems is still limited Because the integrity of aquatic ecosystems is being chal- (Li & Moyle, 1981; Lodge, 1993a,b). The general result lenged worldwide by invading species, there is a growing of deliberate introductions has been termed the need to understand the invasion process and to predict 'Frankenstein Effect' because so many well-intentioned the success and effects of invading species. Case histories introductions have had unexpected consequences, usually offish invasions in streams, lakes, and estuaries indicate negative (Moyle et al., 1986). The need to increase our that invading species and systems being invaded interact ability to predict the consequences of invasions and to in idiosyncratic ways that are often hard to predict, understand invasion processes has been emphasized by largely because of the role of environmental variability in the enormous economic and social costs of some recent determining the outcomes of invasions. We nevertheless invasions, the growing interest in halting biodiversity loss, present a conceptual model of aquatic invasions and a and the increased difficulty of managing ecosystems dozen empirically-derived rules that seem to govern most subjected to repeated invasions. aquatic invasions. While these rules are limited in their Recently, generalizations about aquatic invasions usefulness, they do seem to have more predictive value than have been coming from two main approaches, analyses rules derived from community assembly theory.
    [Show full text]
  • D-Day: the Invasion of Normandy and Liberation of France Spring and Fall 2020
    Book early and save $1,000 per couple! See page 10 for details. Bringing history to life D-Day: The Invasion of Normandy and Liberation of France Spring and Fall 2020 Normandy Beaches • Arromanches • Sainte-Mère-Église Bayeux • Caen • Pointe du Hoc • Falaise NORMANDY CHANGES YOU FOREVER Dear Friend of the Museum, One of the most inspiring moments during my 17 years with the Museum was visiting Omaha Beach in 2005 with WWII veteran Dr. Hal Baumgarten, who landed there with the 116th Infantry Regiment as part of the first wave on D-Day and was wounded five times in just 32 hours. Nothing can match learning about the Normandy landings as you visit the very places where these events unfolded and hear the words of those who fought there. The story of D-Day and the Allied invasion of Normandy have been at the heart of this Museum since we first opened our doors on June 6, 2000, and while our mission has expanded to cover the entire American experience in World War II, we still hold our Normandy travel programs in special regard—and consider them the very best in the market. Drawing on our historical expertise and extensive archival collection, the Museum’s highly regarded D-Day tours take visitors back to June 6, 1944, through a memorable journey from Pegasus Bridge and Sainte-Mère-Église to Omaha Beach and Pointe du Hoc. Along the way, you’ll learn the timeless stories of those who sacrificed so much to pull off the greatest amphibious attack in history and ultimately secure the freedom we enjoy today.
    [Show full text]
  • Gettysburg 8X11.Pub
    Fauquier County in the Civil War From 1861-1865, Fauquier County’s “hallowed grounds” were the site of twelve battles and count- less troop movements, raids, skirmishes, and en- Gettysburg campments. With its proximity to Wash- ington, DC, the county was key terri- Campaign tory in Union and Confederate strategy. In 1862 and 1863, General Robert E. Lee used Fauquier County to his advan- tage. The engage- Warrenton Courthouse,1862. ments at Rappahan- Photo by Timothy O’Sullivan. New nock Station I and York Historical Society collection. Thoroughfare Gap were indispensable to his victory at Second Manas- sas in August 1862, while the cavalry battles at Brandy Station, Aldie, Middleburg, and Upperville shielded Lee’s infantry as he commenced his sec- ond invasion of the North during the spring of 1863. After a fateful engagement in Gettysburg, Pennsyl- vania, Fauquier County’s role in the war changed. No longer the cradle of Confederate invasion, the battle lands of Manassas Gap, Auburn, Buckland Mills, and Rappahannock Station II were Lee’s path of retreat. Yet, much as Gettysburg did not end the war, Lee’s retreat was not the last that Fauquier County saw of Civil War soldiers. Throughout the Civil War, the “hallowed grounds” of Fauquier County were con- tested fields of battle. ■ June-July 1863 Goose Creek Bridge in 2008. Photograph by Garry Adelman. Gettysburg Campaign June-July 1863 Following a brilliant yet costly victory at Chancellorsville in May 1863, Confederate General Robert E. Lee set his sights, and his army, on a second invasion of the North. In June 1863, Lee moved his army north toward Pennsylvania.
    [Show full text]
  • The Contributions of Warfare with Revolutionary and Napoleonic France to the Consolidation and Progress of the British Industrial Revolution
    CORE Metadata, citation and similar papers at core.ac.uk Provided by LSE Research Online Economic History Working Papers No: 264/2017 The Contributions of Warfare with Revolutionary and Napoleonic France to the Consolidation and Progress of the British Industrial Revolution Revised Version of Working Paper 150 Patrick O’Brien London School of Economics St Anthony’s College, Oxford Economic History Department, London School of Economics and Political Science, Houghton Street, London, WC2A 2AE, London, UK. T: +44 (0) 20 7955 7084. F: +44 (0) 20 7955 7730 LONDON SCHOOL OF ECONOMICS AND POLITICAL SCIENCE DEPARTMENT OF ECONOMIC HISTORY WORKING PAPERS NO. 264 – JUNE 2017 The Contributions of Warfare with Revolutionary and Napoleonic France to the Consolidation and Progress of the British Industrial Revolution Patrick Karl O’Brien London School of Economics St Anthony’s College, Oxford “Great Britain is under weightier obligation to no mortal man than to this very villain. For whereby the occurrences whereof he is the author, her greatness prosperity, and wealth, have attained their present elevation.” A Prussian General’s reference to Napoleon at the Congress of Vienna, 18151 Abstract This revised and reconfigured essay surveys a range of printed secondary sources going back to publications of the day (as well as includes research in primary sources) in order to revive a traditional and unresolved debate on economic connexions between the French and Industrial Revolutions. It argues that the costs flowing from the reallocation of labour, capital
    [Show full text]
  • D-Day: the Beaches
    D-Day: The Beaches. he armed forces used code- D-Day by the Numbers names to refer to planning and execution of specific mili- Total Allied troops who landed in T Normandy: 156,115 tary operations to prepare for D-Day. Operation Overlord was the code- name for the Allied invasion of north- Total Allied airborne troops west Europe. The assault phase of (included in figures above): 23,400 Operation Overlord was known as American: 73,000 Operation Neptune. This operation, (Omaha and Utah beaches + airborne) which began on June 6, 1944, and ended on June 30, 1944, involved landing troops British: 61,715 on beaches and all other associated sup- (Gold and Sword beaches + airborne) porting operations required to establish a Gold Beach. This beach ranged from Canadian: 21,400 beachhead in France. By June 30th, the Longues-sur-Mer to La Rivière, five miles (Juno Beach) Allies had established a firm foothold in long and included Arromanches where Mul- Normandy — 850,279 men, 148,803 vehi- berry Harbor was established. British 2nd Total Allied aircraft that cles and 570,505 tons of supplies had been Army, 30th Corps landed here and by night- supported landings: 11,590 landed. Operation Overlord also began on fall, 25,000 troops had landed and pushed the D-Day, and continued until Allied forces Germans six Naval combat ships: 1,213 crossed the River Seine on August 19th. miles inland. Landing ships / craft: 4,126 The Battle of Normandy is the name given The Brits had Ancillary craft: 736 to the fighting in Normandy between D- just 400 casual- Day and the end of August 1944.
    [Show full text]
  • Invasion of the Exotics: the Siege of Western Washington
    PNW Pacific Northwest Research Station INSIDE The Man-Made Heritage in Forests . .2 Soil Seed Banking on the Olympic Peninsula . .3 Bad News for Small Mammals . .4 Broom and Doom in the Puget Trough? . .4 Variable-Density Thinning: Deliberate Fragments . .4 Reserves Versus True Complexity . .5 FINDINGS issue thirty-eight / october 2001 “Science affects the way we think together.” Lewis Thomas INVASION OF THE EXOTICS: THE SIEGE OF WESTERN WASHINGTON IN SUMMARY Settlement of the Pacific Northwest by immigrants from the Eastern United States changed the composition of lowland landscapes from dominance by forests and prairie to dominance by cities, suburbs, agriculture, and trans- portation infrastructure. Historical disturbance regimes imposed by English ivy is spreading throughout Holly is becoming widespread throughout nature and by indigenous people were ➢ forests in the Puget Trough, and even ➢ forest understories in the Puget Trough, large, dominant trees within the forest crowding out native, less aggressive disrupted. In the uplands, timber are not immune from their stranglehold. species. management activities replaced natu- ral disturbance regimes, often with Described by some as a form of plant and planted to beautify median strips, this well-known shrub now threatens some simplifying effects on ecosystems. biological pollution, these parts of Washington and Oregon with its People intentionally and unintention- species have been introduced— own pretty form of biological desert. sometimes by accident, but ally imported exotic species of plants It is not alone. Weedy exotics such as often with the best intentions— English ivy, Himalayan blackberry, holly, and animals. into systems where they thrive sweet cherry, and many others are spread- at the expense of native species.
    [Show full text]
  • The Metamorphosis of Armored Cavalry in Vietnam
    University of Louisville ThinkIR: The University of Louisville's Institutional Repository Electronic Theses and Dissertations 8-2005 "Jack of all trades" : the metamorphosis of armored cavalry in Vietnam. Robert Manson Peters 1966- University of Louisville Follow this and additional works at: https://ir.library.louisville.edu/etd Recommended Citation Peters, Robert Manson 1966-, ""Jack of all trades" : the metamorphosis of armored cavalry in Vietnam." (2005). Electronic Theses and Dissertations. Paper 1119. https://doi.org/10.18297/etd/1119 This Master's Thesis is brought to you for free and open access by ThinkIR: The University of Louisville's Institutional Repository. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of ThinkIR: The University of Louisville's Institutional Repository. This title appears here courtesy of the author, who has retained all other copyrights. For more information, please contact [email protected]. "JACK OF ALL TRADES:" THE METAMORPHOSIS OF ARMORED CAVALRY IN VIETNAM By Robert Manson Peters B.A., Randolph-Macon College, 1989 A Thesis Submitted to the Faculty of the Graduate School of the University of Louisville in Partial Fulfillment of the Requirements for the Degree of Master of Arts Depm1ment of History University of Louisville Louisville, Kentucky August 2005 “Jack of All Trades:” The Metamorphosis of Armored Cavalry in Vietnam By Robert Manson Peters B.A., Randolph-Macon College, 1989 A Thesis Approved on June 10, 2005 by the following Thesis Committee: Thesis Director ii ACKNOWLEDGEMENTS I would first like to thank Dr. Wayne Lee for all his help with this project. I could not have done this without his guidance, patience, and professionalism.
    [Show full text]