Active Defense: Definitions

Total Page:16

File Type:pdf, Size:1020Kb

Active Defense: Definitions Moderator: Rhea Siers, Scholar in Residence at the GW Center for Cyber and Homeland Security (CCHS), Special, Counsel – Panel 3 - Controlling Cybersecurity, Zeichner Ellman & Krause LLP, Cyber Senior Advisor, RANE the Troops: "Active Network Panelists: Defense" - Is it Legal David Cass, Chief Information Security Officer, IBM Cloud & SaaS Operational Services Aristedes Mahairas, Special in the US and Agent in Charge of Special Operations/Cyber Division of the New York Office, FBI Abroad? Roland Cloutier, VP, Chief Security Officer, ADP Rhea Siers, David Cass, Aristedes Mahairas, Roland Cloutier, Scholar in Residence at the Chief Information Security Officer, Special Agent in Charge of Vice President, GW Center for Cyber and IBM Cloud & SaaS Special Operations/ Chief Security Officer, Homeland Security (CCHS) Operational Services Cyber Division of the ADP Special Counsel – New York Office, FBI Cybersecurity, Zeichner Ellman & Krause LLP Cyber Senior Advisor, RANE Network (c) Journal of Law & Cyber Warfare. All Rights Reserved. 2 This is not legal advice nor should it be considered legal advice This presentation and the comments contained therein represent only the Disclaimer personal views of the participants, and does not reflect those of their employers or clients This presentation is offered for educational and informational uses only (c) Journal of Law & Cyber Warfare 2017. All Rights Reserved Active Defense: Definitions Dictionary of Military and Associated Terms • The employment of limited offensive actions and counterattacks to deny a contested area or position to the enemy. SANS Institute • The process of analysts monitoring for, responding to, learning from, and applying their knowledge to threats internal to the network. Center for Cyber & Homeland Security | The George Washington University • A spectrum of proactive cybersecurity measures that fall between traditional passive defense and offense, that fall into two categories: (1) technical interactions between defender and attacker, and (2) operations that enables defenders to collect intelligence on threat actors and indicators on the internet, as well as other policy tools (e.g. sanctions, indictments, trade remedies) that can modify the behavior of malicious actors. (c) Journal of Law & Cyber Warfare. All Rights Reserved. 4 Active Defense Spectrum Annoyance Attribution Attack Network protocol Honeynets, honeypots, analyzers, beacons Botnet takedowns, White- tarpits, sandboxes, denial (notification & hat ransomware, asset deception identification), intelligence rescue missions, hack back gathering on the dark web (c) Journal of Law & Cyber Warfare. All Rights Reserved. 5 Domestic Law Governing ‘Active Defense’ (c) Journal of Law & Cyber Warfare. All Rights Reserved. 6 Governing U.S. Law • Wiretap Act • Prohibits interception of wire, oral, or electronic communications without consent. • Federal Law requires one party consent. • Parallel State law may require two party consent. • Cybersecurity Act of 2015 • Establishes a mechanism for cybersecurity information sharing. • Creates an anti-trust law exemption for cybersecurity information sharing. • Computer Fraud and Abuse Act • Prohibits intentional accessing a computer without authorization or exceeding authorized access and obtains information that has been determined to require protection against unauthorized disclosure. • The CFAA prohibits: Obtaining national security information; Accessing a computer and obtaining information; Trespassing in a government computer; Accessing a computer to defraud and obtain value; Intentionally damaging a protected computer by knowing transmission, or recklessly or negligently causing damage and loss by intentional access; Trafficking in passwords; and Extortion involving computers. An ‘Active Defense’ Exception to the CFAA A proposed amendment to the CFAA was released by Rep. Tom Graves on May 25, 2017: “The provisions of [the CFAA] shall not apply with respect to the use of attributional technology in regard to a defender who uses a program code, or command for attributional purposes that beacons or returns locational or attributional data in response to a cyber intrusion in order to identify the source of an intrusion. (c) Journal of Law & Cyber Warfare. All Rights Reserved. 8 Gray Zone in the Law (c) Journal of Law & Cyber Warfare. All Rights Reserved. 9 Gray Zone Example • Google “Operation Aurora” hack (2009) • Google retaliated by supporting a mission to operate outside of its network to track down the attackers. • Google’s search lead them to a server in Taiwan, and found out the attacks were likely being controlled from China and involved at least 30 targeted companies. • Google shared its findings with law enforcement, the intelligence community, the companies involved, and the public • To date the government has never prosecuted a single company for engaging in active defense measures similar to Googles, although it does warn of its authority to do so. Legislative Initiative to Allow Limited “Hacking Back”: Active Cyber Defense Certainty Act • Objective: disincentivize criminal hacking • Amends CFAA to allow limited active defense • Allows hacking victims to retaliate & destroy stolen data using specific active defense techniques • Prohibits destruction of data belonging to another person • Reporting requirements • 2 year sunset Other Countries Laws Governing ‘Active Defense’ (c) Journal of Law & Cyber Warfare. All Rights Reserved. 12 Other Nations United Kingdom • Similar to the United States • Ambiguity at the tactical level with some counsel arguing certain measures to gain attacker related information are permissible (e.g. injection code). France • French government has ownership spanning from banking to energy to telecommunication. • France has actively engaged in industrial espionage. Germany • “The Hacker Paragraph” – German Criminal Code. • Acts in preparation for data espionage or phishing are criminalized. (c) Journal of Law & Cyber Warfare. All Rights Reserved. 13 International Law Governing ‘Active Defense’ (c) Journal of Law & Cyber Warfare. All Rights Reserved. 14 International Law Governing the Use of Force & Self Defense Use of Force Under Article 2(4) • “The Organization and its Members, in pursuit of the Purposes stated in Article 1, shall act in accordance with the following Principles. [ . ] • 4. All Members shall refrain in their international relations from the threat or use of force against the territorial integrity or political independence of any state, or in any other manner inconsistent with the Purposes of the United Nations.” International Law Governing the Use of Force & Self Defense Self-Defense Under Article 51 • “Nothing in the present Charter shall impair the inherent right of individual or collective self-defense if an armed attack occurs against a Member of the United Nations…” More detail on these provisions will be discussed in panel 4 (c) Journal of Law & Cyber Warfare. All Rights Reserved. 16 ‘Active Defense’ Can Only be undertaken by Nations, and a Corporation can only rely on past government conduct in its nation as to whether the Government will ‘hack back’ on their behalf. (c) Journal of Law & Cyber Warfare. All Rights Reserved. 17 Questions? (c) Journal of Law & Cyber Warfare. All Rights Reserved. 18 19 © 2017 Law & Forensics. All rights reserved. Appendix (c) Journal of Law & Cyber Warfare. All Rights Reserved. 20 Rhea Siers Scholar in Residence at the GW Center for Cyber and Homeland Security (CCHS) Special Counsel – Cybersecurity, Zeichner Ellman & Krause LLP Cyber Subject Matter Expert, RANE Network Contact: E: [email protected] URL: https://www.linkedin.com/in/rhea-siers-69904255 Rhea Siers has an extensive operational and academic background in cyber activities, policy and research. Ms. Siers retired as a member of the Defense Intelligence Senior Executive Service after over thirty years at the National Security Agency (NSA) including postings at the Federal Bureau of Investigation (FBI) and Department of State. Ms. Siers served in a variety of operational, legal, and policy positions dealing with some of the most critical issues facing the US Intelligence Community including cyber operations, information sharing, sharing, counterterrorism and counterintelligence. She is currently Scholar In Residence at the George Washington University Center for Cyber and Homeland Security, where she is focused on research, education and policy on Cybersecurity threats. Ms. Siers was also honored as a 2015 "Cybersecurity Trailblazer" by The National Law Journal. Ms. Siers is also an adjunct faculty member of George Washington University where she teaches courses on Counterterrorism Policy, Middle East Intelligence, Intelligence Oversight, Intelligence Operations and Transnational Security issues. She is co-author of “Cyber Warfare and the Law” published by Thomson Reuters. Ms. Siers received her B.A. in Political Science from Barnard College, Columbia University, New York, an MSc in International Relations and Middle East Politics from the London School of Economics and Political Science, a J.D. from the Washington College of Law, American University, and an MIPP in Transnational Security Issues from the Elliott School of International Affairs, George Washington University. (c) Journal of Law & Cyber Warfare. All Rights Reserved. 21 David A. Cass Chief Information Security Officer, IBM Cloud & SaaS Operational Services Contact: M: (929) 237 – 6986 E: [email protected] URL: https://www.linkedin.com/in/dcass001/ Mr. Cass is the
Recommended publications
  • Liquidator's Motion for Approval of Settlement Agreement With
    THE STATE OF NEW HAMPSHIRE MERRIMACK, SS. SUPERIOR COURT Docket No. 217-2003-EQ-00106 In the Matter of the Liquidation of The Home Insurance Company LIQUIDATOR’S MOTION FOR APPROVAL OF SETTLEMENT AGREEMENT WITH CHARLES CASS, BRIAN CASS, DAVID CASS, OHM HOLDINGS, INC., GABBROIC MANAGEMENT, LLC, AND ENVIRONMENTAL FORENSIC INVESTIGATIONS, INC. Christopher R. Nicolopoulos, Insurance Commissioner of the State of New Hampshire, as Liquidator (“Liquidator”) of The Home Insurance Company (“Home”), moves that the Court enter an order in the form submitted herewith approving a Settlement Agreement and Mutual Release (the “Settlement Agreement”), between the Liquidator and Charles Cass, individually and as Trustee of the Charlton E. Cass Revocable Trust u/a/d September 9, 1987, Brian Cass, David Cass, OHM Holdings, Inc., Gabbroic Management, LLC, and Environmental Forensic Investigations, Inc. (each individually a “Claimant” and collectively the “Claimants”). As reasons therefor, the Liquidator states as follows: 1. The Settlement Agreement was negotiated under the supervision of the Special Deputy Liquidator. A copy of the Settlement Agreement is attached hereto as Exhibit A. Affidavit of Peter A. Bengelsdorf, Special Deputy Liquidator, in Support of Motion for Approval of Settlement Agreement with Charles Cass, Brian Cass, David Cass, OHM Holdings, Inc., Gabbroic Management, LLC, and Environmental Forensic Investigations, Inc. (“Bengelsdorf Aff.”) ¶ 2. 2. Home issued six insurance policies for various policy periods between November 1, 1971 and November 1, 1981 to Charles Cass, O.H.M. of Lincoln, Inc., O.H.M. of Wauwatosa, Inc., O.H.M. of Elm Grove, Inc., O.H.M. of Hampton, Inc., O.H.M.
    [Show full text]
  • An Interview with David Cass
    32 Stephen E. Spear and Randall Wright 2 An Interview with David Cass Interviewed by Stephen E. Spear CARNEGIE MELLON UNIVERSITY and Randall Wright UNIVERSITY OF PENNSYLVANIA February 13, 1998 David Cass is undoubtedly one of the central contributors to modern dynamic economics. His fundamental contributions include work on optimal growth problems, overlapping-generations models, sunspot equilibria, and general equilibrium models with incomplete markets. His research has shaped in profound ways the manner in which we do both micro- and macroeconomics. From laying the foundations of real business-cycle theory via the Cass–Koopmans model, to providing us with general tools and techniques to analyze dynamic economic models, to furthering our under- standing of monetary economics, to making fundamental contributions to the economics of extrinsic uncertainty, Cass’s work has played a major part in the development of much of modern macroeconomic theory. In addition to being a first-class scholar, Cass is also truly his own man and a free spirit of the highest order. In this interview, we tried to gain some insights into the story of David Cass and his approach to economic theory. Also, given the title as well as the intended readership of Macroeconomic Dynamics, we made a real Reprinted from Macroeconomic Dynamics, 2, 1998, 533–558. Copyright © 1998 Cambridge University Press. ITEC02 32 8/15/06, 2:59 PM An Interview with David Cass 33 effort to get him to discuss mod- ern macroeconomics and the influence his work has had on its development. We edited out some parts of the discussion in the interests of space, but what re- mains is essentially unedited.
    [Show full text]
  • Making Sure Money Is Available When We Need It Protecting Household Assets Must Become an Integral Part of U.S
    AP PHOTO/RIC FRANCIS PHOTO/RIC AP Making Sure Money Is Available When We Need It Protecting Household Assets Must Become an Integral Part of U.S. Savings Policies Christian E. Weller March 2013 WWW.AMERICANPROGRESS.ORG Making Sure Money Is Available When We Need It Protecting Household Assets Must Become an Integral Part of U.S. Savings Policies Christian E. Weller March 2013 Contents 1 Introduction and summary 5 Greater wealth volatility has led to rising risk exposure 11 Risk exposure has increased over time and across groups 16 Detailed data show that risk exposure has become excessive 24 Conclusion and policy implications 28 About the author 29 Appendix A: Review of the relevant literature on wealth and risk exposure 31 Appendix B: High wealth went along with high insecurity before the crisis 32 Appendix C: Indicators of individual risk exposure 36 Appendix D: Rising risk exposure over time and changing risk exposure during crises 38 Endnotes Introduction and summary Household wealth—the difference between a household’s assets and its debt—is a crucial aspect of economic security. It allows households to pay for necessities during an economic emergency, and it permits families to invest in their future— pay for their children’s or their own education, start a business, switch jobs, move to advance their careers, and plan for a secure retirement. For a family to benefit from it, household wealth has to actually be there when households need the economic security that comes from having wealth. Over the past few decades, however, household wealth has become increasingly volatile, meaning that wealth has swung up and down much more widely over the past two decades than it did in the preceding decades after World War II.1 Macroeconomic instability due to the housing and stock market bubbles—and bursts—is one of the contributing factors, but so is greater household-wealth risk exposure due to more investments in the housing and stock markets and greater household debt than in the past.
    [Show full text]
  • Equilmrium and DYNAMICS David Gale, 1991 Equilibrium and Dynamics
    EQUILmRIUM AND DYNAMICS David Gale, 1991 Equilibrium and Dynamics Essays in Honour of David Gale Edited by Mukul Majumdar H. T. Warshow and Robert Irving Warshow Professor ofEconomics Cornell University Palgrave Macmillan ISBN 978-1-349-11698-0 ISBN 978-1-349-11696-6 (eBook) DOI 10.1007/978-1-349-11696-6 © Mukul Majumdar 1992 Softcover reprint of the hardcover 1st edition 1992 All rights reserved. For information, write: Scholarly and Reference Division, St. Martin's Press, Inc., 175 Fifth Avenue, New York, N.Y. 10010 First published in the United States of America in 1992 ISBN 978-0-312-06810-3 Library of Congress Cataloging-in-Publication Data Equilibrium and dynamics: essays in honour of David Gale I edited by Mukul Majumdar. p. em. Includes bibliographical references (p. ). ISBN 978-0-312-06810-3 1. Equilibrium (Economics) 2. Statics and dynamics (Social sciences) I. Gale, David. II. Majumdar, Mukul, 1944- . HB145.E675 1992 339.5-dc20 91-25354 CIP Contents Preface vii Notes on the Contributors ix 1 Equilibrium in a Matching Market with General Preferences Ahmet Alkan 1 2 General Equilibrium with Infinitely Many Goods: The Case of Separable Utilities Aloisio Araujo and Paulo Klinger Monteiro 17 3 Regular Demand with Several, General Budget Constraints Yves Balasko and David Cass 29 4 Arbitrage Opportunities in Financial Markets are not Inconsistent with Competitive Equilibrium Lawrence M. Benveniste and Juan Ketterer 45 5 Fiscal and Monetary Policy in a General Equilibrium Model Truman Bewley 55 6 Equilibrium in Preemption Games with Complete Information Kenneth Hendricks and Charles Wilson 123 7 Allocation of Aggregate and Individual Risks through Financial Markets Michael J.
    [Show full text]
  • 2013 Complex Adaptive Systems Program
    Emerging Technologies Baltimore, Maryland for Evolving Systems: November I3 - I5, 20I3 Socio-technical, Cyber and Big Data 20I3 Conference Program Organizing Committee Welcome Welcome to this year’s Complex Adaptive Systems Conference. Over the next three General Conference Chair days, we will share our ideas, tools, methodologies and research results in the Cihan H. Dagli, Missouri University of Science & Technology, USA domains of cyberspace physical systems, socio-technical systems and healthcare. Contributions to this conference, in the form of paper presentations, plenary Conference Co-Chairs sessions and panel discussions, will cultivate new ideas and advance all of our understanding of complex systems of today. David Enke, Missouri University of Science & Technology, USA Walker Land, Binghamton University, USA We are pleased to announce that we have authors from 16 countries presenting Rosemary Paradis, Lockheed Martin, USA Cihan H. Dagli, Ph.D. 83 papers. On behalf of the organizing committee, I wish to thank all our authors for Mika Sato-Ilic, University of Tsukuba, Japan Conference Chair their contributions to the proceedings and to this conference. Professor Engineering Management A special recognition goes to our distinguished plenary speakers, and those who Organizing Committee Members and Systems Engineering serve as panelists during the discussion sessions. Director of S&T’s Systems Haden A. Land, Lockheed Martin, USA Engineering Graduate Program Further, I want to mention our conference sponsors, whose financial contributions INCOSE and IIE Fellow Iveta Mrazova, Charles University, Czech Republic International Journal and support allow us to continue to offer this annual conference. Their involvement Alper E. Murat, Wayne State University, USA of General Systems enhances the collaboration between industry and academia.
    [Show full text]
  • PIER Working Paper 07-036
    Penn Institute for Economic Research Department of Economics University of Pennsylvania 3718 Locust Walk Philadelphia, PA 19104-6297 [email protected] http://www.econ.upenn.edu/pier PIER Working Paper 07-036 “Utility-Based Utility” by David Cass http://ssrn.com/abstract=1077131 Utility-Based Utility∗ David Cass Department of Economics University of Pennsylvania First Version: December 15, 2007 Abstract A major virtue of von Neumann-Morgenstern utilities, for example, in the the- ory of general financial equilibrium (GFE), is that they ensure time consistency: consumption-portfolio plans (for the future) are in fact executed (in the future) — assuming that there is perfect foresight about relevant endogenous variables. This paper proposes an alternative to expected utility, one which also delivers consistency between plan and execution — and more. In particular, the formulation affords an extremely natural setting for introducing extrinsic uncertainty. The key idea is to divorce the concept of filtration (of the state space) from any considerations involv- ing probability, and then concentrate attention on nested utilities of consumption looking forward from any date-event: utility today depends only on consumption today and prospective utility of consumption tomorrow, utility tomorrow depends only on consumption tomorrow and prospective utility of consumption the day after tomorrow, and so on. JEL classification: D61, D81, D91 Key words: Utility theory, Expected utility, Time consistency, Extrinsic uncer- tainty, Cass-Shell Immunity Theorem ∗Interaction with the very able TA’s helping me with (carrying?) the first year equilibrium theory course at Penn during the fall of 2007 — Matt Hoelle and Soojin Kim — spurred me into pursuing this research.
    [Show full text]
  • "Rethinking Pension Reform: Ten Myths About Social Security Systems"
    "Rethinking Pension Reform: Ten Myths About Social Security Systems" Peter R. Orszag (Sebago Associates, Inc.) Joseph E. Stiglitz (The World Bank) Presented at the conference on "New Ideas About Old Age Security" The World Bank Washington, D.C. September 14-15, 1999 1 EXECUTIVE SUMMARY In 1994, the World Bank published a seminal book on pension reform, entitled Averting the Old Age Crisis. The book noted that "myths abound in discussions of old age security."1 This paper, prepared for a World Bank conference that will revisit pension reform issues five years after the publication of Averting the Old Age Crisis, examines ten such myths in a deliberately provocative manner. The problems that have motivated pension reform across the globe are real, and reforms are needed. In principle, the approach delineated in Averting the Old Age Crisis is expansive enough to reflect any potential combination of policy responses to the pension reform challenge. But in practice, the "World Bank model" has been interpreted as involving one specific constellation of pension pillars: a publicly managed, pay-as- you-go, defined benefit pillar; a privately managed, mandatory, defined contribution pillar; and a voluntary private pillar. It is precisely the private, mandatory, defined contribution component that we wish to explore in this paper. The ten myths examined in the paper include: Macroeconomic myths • Myth #1: Individual accounts raise national saving • Myth #2: Rates of return are higher under individual accounts • Myth #3: Declining rates of return
    [Show full text]
  • Curriculum Vitae July 2021 PAOLO
    1 Curriculum Vitae July 2021 PAOLO SICONOLFI PERSONAL: Academic Address: Graduate School of Business Uris Hall Columbia University New York, NY 10027 Phone: (212) 854-3474 E-mail: [email protected] EDUCATION 1987: Ph.D. in Economics, University of Pennsylvania, Philadelphia, PA. 1983: M.A. in Economics, University of Pennsylvania, Philadelphia, PA. 1981: Laurea in Statistics, summa cum laude, University of Rome, Rome, Italy. Fellowships and Prizes July 2011: Economic Theory Fellow Fall 2012, fall 2011, fall 2006, fall 2004 and fall 2000: Association of Graduate Students; Economics Department: Excellence in First Year Teaching Fall 2004, Association of Graduate Students; Economics Department: Best Advisor Fall 2001: Dean’s Award for Teaching Excellence for a Core Course. 1986-87: Center for Analytic Research in Economics and the Social Sciences, University of Pennsylvania. 1984-85: University of Pennsylvania Teaching Fellow. 1984-85: Fellowship, Ente "Luigi Einaudi", Rome, Italy. 1982-83, 1983-84: Istituto Bancario San Paolo di Torino, "L. Jona" Scholarship, Turin, Italy. 2 1982-83: Consiglio Nazionale delle Ricerche, Rome, Italy. PROFESSIONAL EXPERIENCE 2017- 2020: PhD Program Faculty Director 2011-present: Franklin Pitcher Johnson Professor of Finance and Economics, Graduate School of Business, Columbia University. 1998 - Present: Professor, Graduate School of Business, Columbia University. 1996 - 1998: Associate Professor with tenure, Graduate School of Business, Columbia University. 2003 - Present: Affiliated faculty member, Department
    [Show full text]
  • Multiplicity in General Financial Equilibrium with Portfolio Constraints
    DISCUSSION PAPER SERIES No. 5804 MULTIPLICITY IN GENERAL FINANCIAL EQUILIBRIUM WITH PORTFOLIO CONSTRAINTS Suleyman Basak, David Cass, Juan Manuel Licari and Anna Pavlova FINANCIAL ECONOMICS ABCD www.cepr.org Available online at: www.cepr.org/pubs/dps/DP5804.asp www.ssrn.com/xxx/xxx/xxx ISSN 0265-8003 MULTIPLICITY IN GENERAL FINANCIAL EQUILIBRIUM WITH PORTFOLIO CONSTRAINTS Suleyman Basak, London Business School (LBS) and CEPR David Cass, University of Pennsylvania Juan Manuel Licari, University of Pennsylvania Anna Pavlova, London Business School (LBS) and CEPR Discussion Paper No. 5804 August 2006 Centre for Economic Policy Research 90–98 Goswell Rd, London EC1V 7RR, UK Tel: (44 20) 7878 2900, Fax: (44 20) 7878 2999 Email: [email protected], Website: www.cepr.org This Discussion Paper is issued under the auspices of the Centre’s research programme in FINANCIAL ECONOMICS. Any opinions expressed here are those of the author(s) and not those of the Centre for Economic Policy Research. Research disseminated by CEPR may include views on policy, but the Centre itself takes no institutional policy positions. The Centre for Economic Policy Research was established in 1983 as a private educational charity, to promote independent analysis and public discussion of open economies and the relations among them. It is pluralist and non-partisan, bringing economic research to bear on the analysis of medium- and long-run policy questions. Institutional (core) finance for the Centre has been provided through major grants from the Economic and Social Research Council, under which an ESRC Resource Centre operates within CEPR; the Esmée Fairbairn Charitable Trust; and the Bank of England.
    [Show full text]
  • From Overlapping Generations to Infinite-Lived Agent Models
    A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Assous, Michaël; Duarte, Pedro Garcia Working Paper Challenging Lucas: From overlapping generations to infinite-lived agent models CHOPE Working Paper, No. 2017-05 Provided in Cooperation with: Center for the History of Political Economy at Duke University Suggested Citation: Assous, Michaël; Duarte, Pedro Garcia (2017) : Challenging Lucas: From overlapping generations to infinite-lived agent models, CHOPE Working Paper, No. 2017-05, Duke University, Center for the History of Political Economy (CHOPE), Durham, NC This Version is available at: http://hdl.handle.net/10419/155468 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents have been made available under an Open gelten abweichend von diesen Nutzungsbedingungen die in der dort Content Licence (especially Creative Commons Licences), you genannten Lizenz gewährten Nutzungsrechte. may exercise further usage rights as specified in the indicated licence. www.econstor.eu Challenging Lucas: from overlapping generations to infinite-lived agent models by Michaël Assous and Pedro Garcia Duarte CHOPE Working Paper No.
    [Show full text]
  • On the Phelps-Koopmans Theorem
    A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Mitra, Tapan; Ray, Debraj Working Paper On the Phelps-Koopmans theorem CAE Working Paper, No. 09-04 Provided in Cooperation with: Center for Analytical Economics (CAE), Cornell University Suggested Citation: Mitra, Tapan; Ray, Debraj (2009) : On the Phelps-Koopmans theorem, CAE Working Paper, No. 09-04, Cornell University, Center for Analytical Economics (CAE), Ithaca, NY This Version is available at: http://hdl.handle.net/10419/70464 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents have been made available under an Open gelten abweichend von diesen Nutzungsbedingungen die in der dort Content Licence (especially Creative Commons Licences), you genannten Lizenz gewährten Nutzungsrechte. may exercise further usage rights as specified in the indicated licence. www.econstor.eu ISSN 1936-5098 CAE Working Paper #09-04 On the Phelps-Koopmans Theorem by Tapan Mitra and Debraj Ray February 2009 On the Phelps-Koopmans Theorem Tapan Mitra Cornell University and Debraj Ray New York University August 2008 Abstract We examine whether the Phelps-Koopmans theorem is valid in models with nonconvex production technologies.
    [Show full text]
  • Fiscal Report | 1 You Can Start Something Big
    Start Something FISCAL2016 REPORT to the community 2016 BBBSPGH Fiscal Report | 1 You Can Start Something Big Meetings that sometimes begin with awkward introductions same time, we are dedicated to being responsible stewards of and hesitant conversations turn into friendships that last for agency resources. years. In 2015, we served a record 1,400 children from across the Imagine Big Brother Matt on his way to meet his Little Brother Pittsburgh area and we are on target to reach an additional Xavier. Matt is nervous and hopes Xavier will like him. Xavier is 100 children in 2016. Despite our progress, the demand for our just as excited to finally meet his Big Brother. He was told that services exceeds our capacity, with a waiting list of more than Matt loves basketball and Star Wars—what could be better than 300 children seeking mentors. Your support throughout the year that? enables us to expand our services to reach more kids in need, Xavier’s mom, Teresa, was silently hoping Matt would be without compromising our superior quality. the mentor her 8-year-old son has needed for so long. She has Whether it is finding the perfect match between a Big and been doing a great job raising Xavier, but he recently started to Little, creating a custom partnership package for a corporation, experience difficulties in school. Xavier never met his biological or developing a special match activity to engage our mentors father and has no consistent male role model in his life. Teresa and mentees, we work to create results that benefit our made the decision to call Big Brothers Big Sisters of Greater children, families, volunteers, and supporters—and in turn, our Pittsburgh to begin the journey.
    [Show full text]