Hakin9.Org Paradox” Is? Read the First Artcile and You Will Know The

Total Page:16

File Type:pdf, Size:1020Kb

Hakin9.Org Paradox” Is? Read the First Artcile and You Will Know The 04/2012 (52) PRACTICAL PROTECTION IT SECURITY MAGAZINE Dear all, I hope you are all good. This issue is about Cyberwarfare. Let’s have a look what’s inside! First article „What is Cyber War?”. Keith DeBus is talking team about basic information on Cyberwarfare. Why it is so hard to Editor in Chief: Grzegorz Tabaka define cyber warfare? What the „Cyber Warfare Asymmetric [email protected] Paradox” is? Read the first artcile and you will know the Managing Editor: Marta Jabłońska answer for those and many more questions. [email protected] Would you like to learn how to develop an understand Editorial Advisory Board: Keith DeBus, Benjamin different types of attackers and methods to protect your Vanheuverzwijn, Pierre-Marc Bureau, Christopher Pedersen, network from inside and outside intruders? If yes, then you Yury Chemerkin, Daniel Lohin, Daniel Dieterle, Gary S. Milefsky, Julian Evans, Aby Rao have to read Christopher’s Pedersen article entilted „Cyber Warfare - Computer Network Defense”. DTP: Ireneusz Pogroszewski Art Director: Ireneusz Pogroszewski Cyberwar is all the rage now. Just turn on the news and you [email protected] will hear terms like cyber espionage, power grid vulnerabilities, SCADA systems and cyber-attacks. But what does all this mean? What can be and what has been done with electronic Proofreaders: Donald Iverson, Michael Munt, Elliott Bujan, Bob Folden, Steve Hodge, Jonathan Edwards, Steven Atcheson cyber-attacks? Daniel Dieterle will answer these questionsin his „Cyber Warfare Network Attacks” article. Top Betatesters: Ivan Burke, John Webb, Nick Baronian, Felipe Martins, Alexandre Lacan, Rodrigo Rubira Branco Also Drake in his (IL)Legal column talks about Pirates Special Thanks to the Beta testers and Proofreaders who helped and Cyber Marines. Very interesting piece of work, we highly us with this issue. Without their assistance there would not be a recommend it! Hakin9 magazine. Our long contributor, Yury Chemerkin wrote an article „Social Senior Consultant/Publisher: Paweł Marciniak Network Privacy Guide”. So if you have basic knowledge how CEO: Ewa Dudzic to find and setup security setting on social networks and you [email protected] have clear understanding of your goal when you start to use a Production Director: Andrzej Kuca new social network, go on to page 22 and read! [email protected] At the end of the magazine you will find special report from Publisher: Software Press Sp. z o.o. SK RSA Conference. 02-682 Warszawa, ul. Bokserska 1 Phone: 1 917 338 3631 We wish you good reading! www.hakin9.org/en Marta & Hakin9 Team Whilst every effort has been made to ensure the high quality of the magazine, the editors make no warranty, express or implied, concerning the results of content usage. All trade marks presented in the magazine were used only for informative purposes. All rights to trade marks presented in the magazine are reserved by the companies which own them. To create graphs and diagrams we used program by Mathematical formulas created by Design Science MathType™ DISCLAIMER! The techniques described in our articles may only be used in private, local networks. The editors hold no responsibility for misuse of the presented techniques or consequent data loss. 4 04/2012 �������������� ������������������������������������������������� ��������������������������������������������� ��������������� ��������������� �������������������������������������������� ���������������������������������������������� ���������������������������� ������������������������������������������������������������������������� ���������������������������������� 5 � CONTENTS BASICS its own section of a building. To enter the room would require multiple smart cards, pass-codes, and Biometrics, 8 What is Cyber War? such as hand scanners, retinal scanners, weight scales, by Keith DeBus and height measurement. Within these walls the most In just a brief fifteen years, our communication, advanced technology is being created to overtake commercial and social lives have been dramatically altered world markets. Just as the company thinks they have it by the development and growth of the Internet. With the all figured out, a press release comes out stating their convenience and bounty of this medium, has also come competition is releasing the very same product that they a dark side. Just as the famous bank robber, Willy Sutton, have had in secret development for months. Sounds like once said when asked why he robbed banks, „That’s where a good plot from a book or movie doesn’t it? In fact, it the money is”, crime has migrated to the Internet following could be a real situation. These situations happen all the the money. As e-commerce has growth, so has e-crime. In time around the world with companies in every aspect a few short years, cyber crime has become a leading crime of business: Agriculture, IT, Retail, the list goes on. This category in the wired world, costing the global economy scenario describes a case of cyber warfare; they thought $338 billion in 2011. This is approximately equivalent to the that they had their security locked down, but they get entire GDP of Austria, the world’s 27th largest economy. hacked. How could this have happened? Now, a new, darker frontier in the history of the Internet is being breached and its impact is likely to even larger than cyber crime on the global economy and global geo- DEFENSE politics, cyber warfare. This short article will attempt to 22 Social Network Privacy Guide define and elaborate on what cyber war is and the key by Yury Chemerkin issues all nations state must address before responding Social networking services are kind of online service that and retaliating to a cyber war attack. focuses on building social relations among people shared their information about themselves. This information 12 Reverse Engineering C++, a case study filled their profiles makes users possible to search and with the Win32/Kelihos malware family extract necessary information. It means the search will by Benjamin Vanheuverzwijn, Pierre-Marc Bureau analyze only the actual contents you want (images, video, The C++ programming language is a popular one. It text, calendar events). Such representation is often based is also gaining in popularity among malware writers. on each user profile as set of social links, interests, The object-oriented programming paradigm can make public data, and other linked services. Current trend has binary disassembly more difficult to understand when fast been growing to control mechanism unification for a performing analysis through reverse engineering. In long time. Each of these social services meets with users this paper, we go over the basic principles needed by a desires to less inputting about them. That’s why you are reverse engineer to analyze C++ binary files. Furthermore, allowed to be sign up/in by Facebook button or Twitter we show how we applied this knowledge when analyzing button following which you can start to organization the Win32/Kelihos malware family, a peer-to-peer botnet your own networks groups by involving others friends believed to be the successor of the Storm Worm (…) via email, social address book or switching your profile When analyzing a binary file and trying to understand into public zone indexed by search engines like Google, C++ disassembly, one is faced with some interesting Yahoo or Bing. This is so-called individual-centered characteristics that are very different from standard C service whereas online community services are group- compiled code. In this section, we go over some of these centered based on user abilities to share ideas, activities, features that need to be understood to properly analyze a events, and interests within their individual networks. C++ compiled program. 40 What is PAM and why do I care? 18 Cyber Warfare – Computer Network by Daniel Lohin Defense Pluggable Authentication Modules (PAM) is the main by Christopher Pedersen mechanism for Linux (as well as other Unix systems) that Imagine this scenario: A company’s best kept secret, performs the authentication of the user every time they a new technology that will redefine the IT business log in. PAM can be configured in a number of ways in worldwide, has been in secret development with some of order to authenticate the user in a variety of means such the best security measures in place. The secret computer as using passwords, SSH keys, smart cards, etc. PAM can system is cut off from the outside world, with firewalls be used to authenticate users not only when logging on and other authentication methods built-in, all located in to the system from the traditional logon screen, but also 6 04/2012 www.hakin9.org/en CONTENTS through services such as FTP, HTTP, SAMBA and other services can use the PAM. If an attacker is able to modify the integrity of the PAM system, then they are given the ability to modify the method for PAM to authenticate users which is a perfect situation for creating a back door that will be used to establish a path with which they can access systems again. This article will detail how a simple PAM module can be created that could be placed on a system to allow an attacker to access a system in the future. This would be useful if an attacker has already gained root access to a system and wants to ensure that they are able to access again if their original path in is corrected. This article will also be useful for anyone in charge of defending systems as it will give the reader an understanding of what to monitor on their systems to detect compromise as well as help in investigations. 44 Cyber Warfare Network Attacks by Daniel Dieterle Internet connected devices like SCADA systems are also vulnerable to cyber-attack. Public utilities use SCADA systems to control power generation devices, pumps, gates and motors. This is where a lot of media attention has focused on when you hear about cyber-war in the news.
Recommended publications
  • Pirate Utopias: Moorish Corsairs & European Renegadoes Author: Wilson, Peter Lamborn
    1111111 Ullllilim mil 1IIII 111/ 1111 Sander, Steven TN: 117172 Lending Library: CLU Title: Pirate utopias: Moorish corsairs & European Renegadoes Author: Wilson, Peter Lamborn. Due Date: 05/06/11 Pieces: 1 PLEASE DO NOT REMOVE TIDS LABEL ILL Office Hours: Monday-Friday, 8am to 4:30pm Phone: 909-607-4591 h«p:llclaremontmiad.oclc.org/iDiadllogon.bbnl PII\ATE UTOPIAS MOORISH CORSAIRS & EUROPEAN I\ENEGADOES PETER LAMBOl\N WILSON AUTONOMEDIA PT o( W5,5 LiaoS ACK.NOWLEDGEMENTS The author wishes to thank the New York Public Library, which at some time somehow acquired a huge pirate-lit col­ lection; the Libertarian Book Club's Anarchist Forums, and T A8LE OF CONTENTS the New York Open Center. where early versions were audi­ ence-tested; the late Larry Law, for his little pamphlet on Captain Mission; Miss Twomey of the Cork Historical I PIl\ATE AND MEl\MAlD 7 Sociel;y Library. for Irish material; Jim Koehnline for art. as n A CHl\ISTIAN TUl\N'D TUl\K 11 always; Jim Fleming. ditto; Megan Raddant and Ben 27 Meyers. for their limitless capacity for toil; and the Wuson ill DEMOCI\.ACY BY ASSASSINATION Family Trust, thanks to which I am "independently poor" and ... IV A COMPANY OF l\OGUES 39 free to pursue such fancies. V AN ALABASTEl\ PALACE IN TUNISIA 51 DEDlCATION: VI THE MOOI\.ISH l\EPU8LlC OF SALE 71 For Bob Quinn & Gordon Campbell, Irish Atlanteans VII MUI\.AD l\EIS AND THE SACK OF BALTIMOl\E 93 ISBN 1-57027-158-5 VIII THE COI\.SAIl\'S CALENDAl\ 143 ¢ Anti-copyright 1995, 2003.
    [Show full text]
  • Bernadette Ni Chonghaile, MI, Ireland
    EUROFLEETS+ Presenter Name: Bernadette Ní Chonghaile This project has received funding from the EU H2020 research and innovation programme under Grant Agreement No 824077 42 Partners This project has received funding from the EU H2020 research and innovation programme 9.9M € Budget under Grant Agreement No 824077 27 Research Vessels, 7 ROVs, 5 AUV’s and 1 Mobile telepresence unit Coordinator: Marine Institute Duration: 48 Months 2019 -2023 Web: www.Eurofleets.eu Email: [email protected] 97 Deliverables 25 Milestones EUROFLEETS+ Kick Off Meeting March 2019 EUROFLEETS+PARTNERS • Ireland • Estonia • France • Faroe Islands • Spain • Germany • Portugal • Greece • Canada • Greenland • USA • Iceland • Bermuda • The Netherlands • United Kingdom • Poland • Finland • Italy • Sweden • Turkey • Romania • Norway • Belgium • Denmark Eurofleets+ website www.eurofleets.eu Joint Research Activities CSIC Training Innovation and Management Key & Education Exploitation Activity OGS RBINS Transnational Access & Call Areas Management MI/AWI Communication Stakeholder & Engagement Dissemination EMSO ERIC Eurocean Legacy & Roadmap CNR Eurofleets+ Objectives • Open access to an integrated and advanced research vessel fleet 27 research vessels (13 Global/Ocean and 14 Regional), 7 ROVs, 5 AUVs, and a telepresence unit • Enabling researchers to access the North Atlantic, Mediterranean, Black, North & Baltic Seas, Pacific Southern Ocean and Ross Sea • Priority given to research on sustainable, clean and healthy oceans • Linking with existing ocean observation
    [Show full text]
  • Blue Whiting Acoustic Survey Cruise Report March 22- April 11, 2014
    FSS Survey Series: 2014/01 Blue Whiting Acoustic Survey Cruise Report March 22- April 11, 2014 Ciaran O’Donnell 1, Eugene Mullins 1, Graham Johnston 1, Niall Keogh², Machiel Oudejans 3 1The Marine Institute, Fisheries Ecosystems Advisory Services, Ireland ² BirdWatch Ireland, Ireland 3Irish Parks and Wildlife Service (NPWS) and Dulra Research, the Netherlands Blue whiting Acoustic Survey Cruise Report, 2014 Table of Contents 1 Introduction ................................................................................................. 3 2 Materials and Methods ............................................................................... 4 2.1 Scientific Personnel ..................................................................................... 4 2.2 Survey Plan ................................................................................................... 4 2.2.1 Survey objectives ................................................................................. 4 2.2.2 Survey design and area coverage ....................................................... 4 2.3 Equipment and system details and specifications ................................. 5 2.3.1 Acoustic array ...................................................................................... 5 2.3.2 Calibration of acoustic equipment ........................................................ 5 2.3.3 Inter-vessel calibration ......................................................................... 5 2.3.4 Acoustic data acquisition ....................................................................
    [Show full text]
  • Working Document
    Working Document Working Group on International Pelagic Surveys Reykjavík, Iceland, January 2017 Working Group on Widely Distributed Stocks Copenhagen, Denmark, September 2016 INTERNATIONAL BLUE WHITING SPAWNING STOCK SURVEY (IBWSS) SPRING 2016 Ebba Mortensen4^*, Jan Arge Jacobsen4*, Leon Smith4*, Regin Kristiansen4, Poul Vestergaard4 R/V Magnus Heinason Ben Scoulding1*, Kees Bakker1, Thomas Pasterkamp1, Dirk Burggraaf1, Eric Armstrong6, Dirk Thijssen8, Felix Muller7, Laila Higgins5, Bram Couperus1* R/V Tridens Graham Johnston5, Ciaran O’Donnel5*, Eugene Mullins5, Niall Keogh9, Rossa Meade10 R/V Celtic Explorer Valery Ignashkin3* Russian Federation Åge Høines2*, Are Salthaug2*, Espen Johnsen2*, Valantine Anthonypillai2* M/S Brennholm 1 Institute for Marine Resources & Ecosystem Studies, IJmuiden, The Netherlands 2 Institute of Marine Research, Bergen, Norway 3 PINRO, Murmansk, Russia 4 Faroe Marine Research Institute, Tórshavn, Faroe Islands 5 Marine Institute, Galway, Ireland 6 Marine Scotland Marine Laboratory, Aberdeen, Scotland, United Kingdom 7 Johann Heinrich von Thünen-Institut, Hamburg, Germany 8 Danish Institute for Fisheries Research, Denmark 9 BirdWatch, Ireland 10 Galway/Mayo Institute of technology * Participated in post cruise meeting, ^ Survey coordinator Material and methods Survey planning and Coordination Coordination of the survey was initiated in the meeting of the Working Group on International Pelagic Surveys (WGIPS) and continued by correspondence until the start of the survey. During the survey effort was refined
    [Show full text]
  • Corsarios Y Piratas Ingleses Y Holandeses En El Sureste Espa- Ñol Durante El Reinado De Felipe III (1598-1621)
    Corsarios y piratas ingleses y holandeses en el Sureste espa- ñol durante el reinado de Felipe III (1598-1621) English and Dutch corsairs and pirates in the South-East of Spain during the reign of Philip III (1598-1621) Francisco VELASCO HERNÁNDEZ Universidad de Murcia Resumen: En las primeras décadas del siglo XVII, y al calor del próspero comercio y la intensa circulación de embarcaciones mercantes en los puertos de Alicante y Cartagena, acudieron diferentes piratas de los países protestantes del Atlántico, una vez concluidas por éstos paces o treguas con España. Fueron militares reconvertidos en piratas, como los ingleses John Ward, Henry Mainwaring, Robert Walsingham y Peter Easton, o el famoso corsario flamenco Simon de Danser al que acompañaron algunos compatriotas suyos como Salomo de Veenboer y Jan Janszoon, los cuales entraron en connivencia con los corsarios de Argel y Túnez, formado escuadras mixtas o aliadas que hicieron mucho daño a la actividad mercantil desplegada desde el Sureste español, sin que encontraran la adecuada réplica por parte española. Palabras clave: piratería inglesa y holandesa; Sureste español; Felipe III; siglo XVII. Abstract: In the first decades of the 17th century, and due to the prosperous trade and the intensive traffic of merchant ships in the ports of Alicante and Cartagena, different pirates of the Protestant countries of the Atlantic came, once they had signed a peace agreement or agreed to a truce with Spain. They were military men who became pirates, such as the English John Ward, Henry Mainwaring, Robert Walsingham and Peter Easton, or the well-known Flemish corsair Simon de Danser, whom some compatriots such as Salomo de Veenboer and Jan Janszoon accompanied.
    [Show full text]
  • Autumn Spawning Herring Around Faroes During Summer 1991
    ICES 1991 PAPER C.M. 19911H:50 Pelagic Fish Cttee AUTUMN SPAWNING HERRING AROUND FAROES DURING SUMMER 1991 by Jan Arge Jacobsen Fiskiranns6knarstovan N6at6n, FR-IOD T6rshavn Faroe Islands • ABSTRACT Investigations in 1990 indicated that concentrations of herring feeding in the Faroese area from May through July were similar to North Sea herring. Again in 1991 North Sea type herring was distributed in Faroese waters in May-July and approximately 16.000 tonnes fished. Results from an exploratory fishery and a research vessel survey showed, as in 1990, that the herring might be an adult part of the auturnn spawning herring in the north-western North Sea migrating into the Faroese area to feed from May to late July. However, in 1991 more by-catch of herring was reported from the mixed industrial fishery than previous years. • 2 INTRonucnoN At prcsent two different groups of hcrring can be id~ntified as occurring at Faroes, one group of Iocal summer spawners found in the fjords', (Täning 1943), and one group of autimm spawners migrating into the Faroese area from May to late July, probably from the north-western North Sea around Shetland isles (Jacobsen 1990). A new fishery on this herring has been established south-east of the isles. The catch figure for 1990 was 5.500 tonnes and the preliminary catch in 1991 amounted to 'over 16.000 tonnes. ,' , ,I".' • In 1991 Fiskiranns6knarstovan received several re ports' on by-ciltches of herring in various fisheries for othcr species arourid the Faroes during the 'spring, and the reported herring was all of the Nortll-Sea type.
    [Show full text]
  • Report of the Planning Group on Northeast Atlantic Pelagic Ecosystem Surveys (Pgnapes)
    ICES PGNAPES REPORT 2007 ICES RESOURCE MANAGEMENT COMMITTEE ICES CM 2007/RMC:07 Ref. LRC, ACFM, ACE REPORT OF THE PLANNING GROUP ON NORTHEAST ATLANTIC PELAGIC ECOSYSTEM SURVEYS (PGNAPES) 14-17 AUGUST 2007 IJMUIDEN, THE NETHERLANDS International Council for the Exploration of the Sea Conseil International pour l’Exploration de la Mer H. C. Andersens Boulevard 44–46 DK-1553 Copenhagen V Denmark Telephone (+45) 33 38 67 00 Telefax (+45) 33 93 42 15 www.ices.dk [email protected] Recommended format for purposes of citation: ICES. 2007. Report of the Planning Group on Northeast Atlantic Pelagic Ecosystem Surveys (PGNAPES), 14-17 August 2007, IJmuiden, the Netherlands. ICES CM 2007/RMC:07. 9 8 pp. For permission to reproduce material from this publication, please apply to the General Secretary. The document is a report of an Expert Group under the auspices of the International Council for the Exploration of the Sea and does not necessarily represent the views of the Council. © 2007 International Council for the Exploration of the Sea ICES PGNAPES Report 2007 | i Contents Contents ............................................................................................................................. i Executive Summary ......................................................................................................... 1 1 Introduction ............................................................................................................. 2 1.1 Terms of Reference 2007................................................................................
    [Show full text]
  • CV Jóhannis Danielsen
    CV Jóhannis Danielsen Faroe Marine Research Institute Nóatún 1, P.O. Box 3051 FO 110 Tórshavn Faroe Islands Tel. +298 35 39 00 Tel. dir. +298 35 39 50 Mob. +298 25 46 73 E-mail: [email protected] Profession Biologist, Ph.D. Current position Senior Scientist, Head of Seabird Department, Faroe Marine Research Institute Education 1990 High-School from Felagsskúlanum á Oyrabakka. 1992 Støðisútbúgving Innan Tøkni (S.I.T.) at The School of Technology in Tórshavn. 1993 Studied the first part of ”Dyreassistent” (animal park-assistant) at The School of Technology in Kolding, Denmark. 1996 HF (Collage) from HF- og studentaskúlin í Hoydølum in Tórshavn, Faroe Islands. 2000 B. Sc. From the Faroese University, Faroe Islands on the thesis: Distribution in space and time of the Coleoptera Beatles on the Faroe Islands. 2001 M. Sc. From Lunds University, Sweden on the thesis: Reproductive performance in a population of individually marked Oystercatchers (Haematopus Ostralegus) on the Faroe Islands. 2009 Licentiate from Lunds University, Sweden titled: Peeps into the life of Faroese Northern Fulmars Fulmarus glacialis: dietary habits and annual cycle of nest-site attendance as revealed by video surveillance. 2011 PhD, Lunds University, Sweden titled: Nest-site attendance and foraging ecology of the Northern Fulmar (Fulmarus glacialis) on the Faroe Islands. Sub-title: Is the Northern Fulmar a useful indicator of ecosystem productivity and pollution? Language capacity Faroese Mother tongue Danish Fluent Swedish Fluent English Good Relevant experiences • Experienced in using the statistical programs SPSS and to some extent PAST. • Have some experience working with GIS and databases (Access). • Proficient in Word and Excel.
    [Show full text]
  • Morocco in the Early Atlantic World, 1415-1603 A
    MOROCCO IN THE EARLY ATLANTIC WORLD, 1415-1603 A Dissertation submitted to the Faculty of the Graduate School of Arts and Sciences of Georgetown University in partial fulfillment of the requirements for the degree of Doctor of Philosophy in History By Earnest W. Porta, Jr., J.D. Washington, DC June 20, 2018 Copyright 2018 by Earnest W. Porta, Jr. All Rights Reserved ii MOROCCO IN THE EARLY ATLANTIC WORLD, 1415-1603 Earnest W. Porta, Jr., J.D. Dissertation Advisor: Osama Abi-Mershed, Ph.D. ABSTRACT Over the last several decades, a growing number of historians have conceptualized the Atlantic world as an explanatory analytical framework, useful for studying processes of interaction and exchange. Stretching temporally from the 15th into the 19th century, the Atlantic world framework encompasses more than simply the history of four continents that happen to be geographically situated around what we now recognize as the Atlantic basin. It offers instead a means for examining and understanding the transformative impacts that arose from the interaction of European, African, and American cultures following the European transatlantic voyages of the 15th and 16th centuries. Though it has not been extensively studied from this perspective, during the fifteenth and sixteenth centuries Morocco possessed geopolitical characteristics that uniquely situated it within not only the Islamic world, but the developing Atlantic world as well. This study considers Morocco’s involvement in the early Atlantic world by examining three specific phases of its involvement. The first phase lasts approximately one hundred years and begins with the Portuguese invasion of Ceuta in 1415, considered by some to mark the beginning of European overseas expansion.
    [Show full text]
  • Faroe Business Report 2010 • 3
    In cooperation with the Ministry of Foreign Affairs and the Ministry of Trade and Industry FaroeBusinessreport THE INTERNATIONAL REVIEW OF FAROE ISLANDS INDUSTRY AND TRADE Faroe Business r eport 2010 2010 Faroe Business Report — 2010 The International Review of Faroe Islands Industry and Trade ISBN 978-99918-998-4-8 Need a car in ISSN 1903-1173 Published and produced by PRnewsMedia.com North Atlantic Information Services Spf PO Box 3283 FO-110 Tórshavn Faroe Islands Tel.: +298 449 627 the Faroes? In cooperation with The Ministry of Foreign Affairs OpenEye.biz Editor in Chief: Búi Tyril WELCOME TO THE Get it here at Photo Editor: Maria Olsen 2010 EDITION OF THE Contributors: FAROE BUSINESS REPORT >>> www.rentacar.fo Jeremy Cresswell Alex Cross Stephen Metcalf T’S A GREAT PLEASURE to present to you the fifth volume —with a personal service, Jørgen Niclasen in this series—the 2010 edition of the Faroe Business Report. For at an unbeatable price. Editorial Office: Faroe Business Report certain reasons there was no 2009 edition; we did promise, however, c/o GlobalOne Press Ltd that the Report would be back this year and that we would bring And free kilometers. Enterprise Business Centre Admiral Court, Poynernook Road further improvements to the unique service that it already represents. Aberdeen AB11 5QX Frankly, I do believe this one is the best edition to date and I hope United Kingdom Tel. +44 (0)845 052 3422 you’ll share my enthusiasm once you’ve had a moment to check it. Fax +44 (0)845 053 1842 In tough times, some tend to be reluctant to engage in any communication www.FaroeBusinessReport.com that goes beyond what is considered an absolute minimum required for normal rentacar.fo rentacar.fo E-Mail: [email protected] functioning.
    [Show full text]
  • Faroe Islands Queen Scallop Fishery
    Vottunarstofan Tún ehf. Sustainable Fisheries Scheme Marine Stewardship Council Fisheries Assessment Faroe Islands Queen Scallop Fishery Public Comment Draft Report Client: O.C. Joensen Page | 1 Faroe Islands Queen Scallop Fishery PCDR May 2013 Assessment Team Members: Gudrun G. Thorarinsdottir Ph.D. Gunnar Á. Gunnarsson Ph.D. Kjartan Hoydal Cand.Scient. Louise le Roux M.Sc., Assessment Coordinator, Team Leader Assessment Secretaries: Gunnar Á. Gunnarsson Ph.D. Louise le Roux M.Sc. Certification Body: Client: Vottunarstofan Tún ehf. O.C. Joensen Tharabakki 3 P.O. Box 40 IS-109 Reykjavík FO-450 Oyri Iceland Faroe Islands Tel.: +354 511 1330 Tel: +298 585 825 E-mail: [email protected] E-mail: [email protected] This Public Comment Draft Report is submitted for review. Stakeholders who wish to make comments are expected (a) to provide objective evidence in support of any claims or claimed errors of fact and (b) to use relevant template for available for download on MSC´s website: http://www.msc.org/documents/get-certified/stakeholders/template_for_stakeholder_input . Page | 2 Faroe Islands Queen Scallop Fishery PCDR Table of Contents Glossary of Terms Used in the Report ........................................................................................... 5 1. Executive summary ............................................................................................................... 7 1.1 Assessment Team and Background to the Assessment .......................................................... 7 1.2 The Main Strengths and Weaknesses of the Assessed
    [Show full text]
  • Paradise Lost
    Durham E-Theses Tales from the Levant: The Judeo-Arabic Demonic `Other' and John Milton's Paradise Lost AL-AKHRAS, SHARIHAN,SAMEER,ATA How to cite: AL-AKHRAS, SHARIHAN,SAMEER,ATA (2017) Tales from the Levant: The Judeo-Arabic Demonic `Other' and John Milton's Paradise Lost, Durham theses, Durham University. Available at Durham E-Theses Online: http://etheses.dur.ac.uk/12614/ Use policy The full-text may be used and/or reproduced, and given to third parties in any format or medium, without prior permission or charge, for personal research or study, educational, or not-for-prot purposes provided that: • a full bibliographic reference is made to the original source • a link is made to the metadata record in Durham E-Theses • the full-text is not changed in any way The full-text must not be sold in any format or medium without the formal permission of the copyright holders. Please consult the full Durham E-Theses policy for further details. Academic Support Oce, Durham University, University Oce, Old Elvet, Durham DH1 3HP e-mail: [email protected] Tel: +44 0191 334 6107 http://etheses.dur.ac.uk 2 Tales from the Levant: The Judeo-Arabic Demonic ‘Other’ and John Milton’s Paradise Lost By Sharihan Al-Akhras A Thesis Submitted in Fulfilment of the Requirements for the Degree of Doctor of Philosophy School of English Studies Durham University 2017 Abstract This thesis revisits Milton’s employment of mythology and the demonic, by shedding a light on a neglected, yet intriguing possible presence of Middle-Eastern mythology – or as identified in this thesis – Judeo-Arabic mythology in Paradise Lost.
    [Show full text]