08 Cybercrime and Security Policy Issues

Information about 08 Cybercrime and Security Policy Issues

Published on March 18, 2008

Author: GenX

Source: authorstream.com

Content

Cyber-crime and Security Policy Issues:  Cyber-crime and Security Policy Issues Rodolfo Noel S. Quimbo Resource Person Information, Communication and Space Technology Division UNESCAP Two Part Presentation:  Two Part Presentation Cyber-crime Internet and Security Concepts Incidents/Attacks Improving Security Cyberlaw Statutes, Laws, and Policies – Challenges to enforcers Substantive and Procedural Law Efforts to Combat Cybercrime Part I - Cybercrime:  Part I - Cybercrime Internet and Security Concepts:  Internet and Security Concepts The Internet and Its Vulnerabilities When it started as a project of the Advanced Research Project of the US Defense Department in 1969, the system was designed for openness and flexibility, not security The first publicized international security incident was identified in 1986. An attempt was made to use the network to access computers in the US to copy information from them. In 1988, the network had its first automated network security incident courtesy of a worm program Internet and Security Concepts:  Internet and Security Concepts The Internet and Its Vulnerabilities As a response to the worm threat, a computer emergency response team was created (now the CERT Coordination Center) In 1989, the ARPANET Project officially became the Internet. However, it has, for most part retained its inherent openness The Internet being inherently open, extremely dynamic allows attacks, in general, to be quick, easy, inexpensive and often times difficult to detect or trace Important Security Concepts:  Important Security Concepts Confidentiality of Information Confidentiality is lost when someone without authority is able to read or copy information Integrity of Information Modifying information in unexpected ways makes it lose its integrity Availability of Information The erasure of information makes it unavailable when needed. Often, this is the most important attribute in service oriented businesses Elements of a Secured Network Environment:  Elements of a Secured Network Environment Authentication “I am who I Say I am” Authorization “I am allowed to read the file but only He can copy it” Non-repudiation “Yes, I sent the e-mail” Attack Trends vis a vis Internet Growth:  Attack Trends vis a vis Internet Growth Trend 1 – Automation; speed of Attack Tools Scanning for Potential Victims Compromising vulnerable systems Propagate the Attack Coordinated Management of Attack Tools Attack Trends (cont’d.):  Attack Trends (cont’d.) Trend 2 – Increasing Sophistication of Attack Tools Anti-forensics Dynamic behavior Modularity of attack tools Attack Trends (cont’d.):  Attack Trends (cont’d.) Trend 3 – Faster Discovery of vulnerabilities Attack Trends (cont’d.):  Attack Trends (cont’d.) Trend 3 – Faster Discovery of vulnerabilities Total Vulnerabilities reported (1995-Q2, 2006): 26,713 Attack Trends (cont’d.):  Attack Trends (cont’d.) Trend 4 – Increasing Permeability of Firewalls Trend 5- Increasing Asymmetric Threat Attack Trends (cont’d.):  Attack Trends (cont’d.) Trend 6 – Increasing Threat from Infrastructure Attacks Attack 1 – Distributed Denial of Service Attack 2 - Worms Attack Trends (cont’d.):  Attack Trends (cont’d.) Trend 6 – Increasing Threat from Infrastructure Attacks Attack 3 – Attacks on the Internet Domain Name System (DNS) Cache Poisoning Compromised Data Denial of Service Domain Hijacking Attack Trends (cont’d.):  Attack Trends (cont’d.) Trend 6 – Increasing Threat from Infrastructure Attacks Attack 4 – Attacks against or using routers Routers as attack platforms Denial of Service Exploitation of Trust relationship between routers Sources of Incidents/Threats:  Sources of Incidents/Threats Kinds of Incidents:  Kinds of Incidents Probe Attempts to gain access into a system Scan Large number of probes Account Compromise Unauthorized use of an account by someone other than the owner Root Compromise An account compromise where the account has special privileges on the system Kinds of Incidents:  Kinds of Incidents Packet Sniffer A program that captures data as packets travel through the network Denial of Service Preventing authorized users from using the system Exploitation of Trust Forging of identity in order to gain unauthorized access Kinds of Incidents:  Kinds of Incidents Malicious Code Programs that, when executed, cause undesired results such as loss of data, downtime, denial of service Internet Infrastructure Attacks Rare but serious attacks on key components of the Internet structure such as network name servers and large archive sites Improving Security:  Improving Security Recommended Security Practices that can minimize network intrusions: Ensure all accounts have passwords that are difficult to guess. One time passwords are preferred. Use cryptography Use secure programming techniques when writing software Regularly check for updates, fixes and patches Regularly check for security alerts Improving Security:  Improving Security Available technologies One time passwords Firewalls Monitoring Tools Security Analysis Tools Cryptography PART II: Cyberlaw:  PART II: Cyberlaw Countries with Cybercrime Statutes:  Countries with Cybercrime Statutes Countries with Cybercrime Statutes:  Countries with Cybercrime Statutes Countries with Cybercrime Statutes:  Countries with Cybercrime Statutes Countries with Cybercrime Statutes:  Countries with Cybercrime Statutes Challenges to Cyberlaw Enforcers:  Challenges to Cyberlaw Enforcers Technological Challenges Technology allows for near absolute anonymity of culprits Legal Challenges Laws lag behind the changes in technology Resource Challenges Lack of sufficient experts/budget Substantive Aspects of the Proposed Cybercrime Prevention Act :  Substantive Aspects of the Proposed Cybercrime Prevention Act Drafting Comprehensive Laws to Combat Cybercrime Slide29:  “Cyberspace consists of transactions, relationships, and thought itself, arrayed like a standing wave in the web of our communications. Ours is a world that is both everywhere and nowhere, but it is not where bodies live.   We are creating a world where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity.   Your legal concepts of property, expression, identity, movement, and context do not apply to us. They are all based on matter, and there is no matter here.   Our identities have no bodies, so, unlike you, we cannot obtain order by physical coercion. We believe that from ethics, enlightened self-interest, and the commonweal, our governance will emerge. Our identities may be distributed across many of your jurisdictions. The only law that all our constituent cultures would generally recognize is the Golden Rule. We hope we will be able to build our particular solutions on that basis. But we cannot accept the solutions you are attempting to impose.”    John Perry Barlow Declaration of Independence of Cyberspace Outline:  Outline Current Legal Set-Up Why a New Cybercrime Bill? Status Salient Substantive Features of Cybercrime Bill Punishable Acts Liabilities and Penalties Slide31:  E-Commerce Act (Republic Act No. 8792) Signed into law on 14 June 2000 Aims to supplement the applicability of existing laws to electronic transactions & documents by extending legal validity & recognition to the same Non-discrimination principle Functional equivalence rule The Current Legal Set-Up Slide32:  The E-Commerce Act (R.A. 8792) Has placed RP in the map of e-ready countries §33 of the ECA is most comprehensive definition of cybercrime (McConnell International survey report, December 2000) Punishable Acts under §33 of the ECA 1. Hacking/cracking a. Unauthorized access into a computer system b. Interference in a computer system/server or information/communication system The Current Legal Set-Up Slide33:  c. Authorized access, but with intent to corrupt, alter, or destroy, without the owner’s knowledge & consent d. Introduction of viruses, resulting in destruction or loss of electronic data/messages 2. Piracy of protected works through the use of telecommunication networks such as the internet in a manner that infringes intellectual property rights 3. Violations of Consumer Act & other relevant laws through transactions covered by or using electronic data/messages The Current Legal Set-Up The Current Legal Set-Up:  The Current Legal Set-Up Rules on Electronic Evidence Effective 01 August 2001 Makes electronic documents admissible in evidence pursuant to the non-discrimination and functional equivalence principles of the ECA. Applicable in criminal cases. Slide35:  ECA is seen as a mere “reactionary” law A reaction to the “I Love You” virus incident Does not cover all aspects Lack of “teeth” (need for framework for enforcement) - “It’s one thing to have a ‘complete’ definition; implementation & enforcement is another matter”. - Need to institutionalize a continuing training program for law enforcers Why a New Cybercrime Legislation? Slide36:  New ways of committing cybercrimes crop up every moment Need to factor in international efforts to combat cybercrimes ECA lacks framework that takes into account the “international facet” of cybercrimes Why a New Cybercrime Legislation? The Proposed Cybercrime Prevention Act:  Full title: “An Act Preventing and Penalizing Computer-Related Crimes, Further Amending for the Purpose Certain Provisions of Act No. 3815, as Amended, Otherwise Known as the Revised Penal Code” Aims at harmonizing existing penal laws/measures & pending cybercrime bills with the current cybercrime measures in the U.S. and the European Union. Models: 1. Budapest Convention on Cybercrime 2. US Computer Fraud & Abuse Act of 1986 3. Philippine E-Commerce Act 4. Pending cybercrime bills The Proposed Cybercrime Prevention Act What is Cybercrime?:  What is Cybercrime? Criminal Justice Cybercrime Categories (Professor David L. Carter – 1979) Computer as the Target Computer intrusion, data theft, techno-vandalism / trespass Computer as the instrumentality of the Crime Credit card fraud, telecommunications fraud, theft Computer as Incidental to other Crimes Drug trafficking, money laundering, child pornography Crimes associated with the Prevalence of Computers Copyright violation, software piracy, component theft Slide39:  Illegal access (§4.1, proposed bill) Punishable Acts Unauthorized access to a computer system/network for the purpose of obtaining or using a computer data or program or in pursuit of a dishonest intent. Example: Hacking/cracking, computer trespass Source: Art. 2, Budapest Convention The Computer as Target Slide40:  Illegal interception (§4.2, proposed bill) Punishable act: Unauthorized interception through technical means of any non-public transmission of computer data to, from, or within a computer system or network Exception: Interception deemed necessary for the maintenance/protection of facilities of service providers (i.e., service observing or random monitoring for mechanical or service control quality checks) Example: Using electronic eavesdropping devices in obtaining data Source: Art. 3, Budapest Convention The Computer as Target Slide41:  System interference (§4.4, proposed bill) Punishable acts: Intentional & unlawful hindering with the proper functioning of a computer system or network by using or influencing computer data/program, electronic document or data message, including the introduction or transmission of viruses; also known as computer sabotage Example: Virus dissemination, denial-of-service attacks Source: Art. 5, Budapest Convention The Computer as Target The Computer as Target:  Data interference (§4.3, proposed bill) Punishable acts: Intentional & unauthorized damaging, deletion, deterioration, alteration or suppression of computer data, electronic document, or electronic data message, including the introduction or transmission of viruses Example: Inputting malicious codes, such as viruses, resulting in modification of data Source: Art. 4, Budapest Convention The Computer as Target Slide43:  Misuse of devices (§4.5, proposed bill) Punishable acts: Use, production, sale, procurement, importation, distribution, or making available, without right, or possession of any of the following: 1. Device primarily designed/adapted primarily for committing the crimes of (a) illegal access; (b) illegal interception; (c) data interference; and (d) system interference, defined under the Act; 2. Computer password, access code, or similar data by which a whole or part of a computer system or network is capable of being accessed. The Computer as Instrumentality of the Crime Slide44:  Possession of any of the foregoing items with intent to use them for the purpose of committing the crimes of (a) illegal access; (b) illegal interception; (c) data interference; and (d) system interference, defined under the Act; The Computer as Instrumentality of the Crime Slide45:  Exceptions: 1. Device, used for authorized testing of a computer system, program, or network 2. Production/creation of any of the devices is for purely academic purposes Note: In both instances, prior consent is obtained from the owner of the computer system or network on which the device is to be used. Source: Art. 6, Budapest Convention The Computer as Instrumentality of the Crime Slide46:  Computer forgery (§4.6, proposed bill) Punishable acts: 1. Input, alteration, suppression, erasure or suppression of computer data/program or electronic document in a manner that would constitute the offense of forgery under the Revised Penal Code 2. Knowingly using a computer or electronic data which are products of computer forgery for purposes of perpetuating fraudulent design. Source: Art. 7, Budapest Convention The Computer as Instrumentality of the Crime The Computer as Instrumentality of the Crime :  Computer fraud (§4.7, proposed bill) Punishable acts: 1. Intentional/unauthorized input, alteration, suppression, etc. of computer data/programs or electronic document or data message, or 2. Interference in the functioning of computer system or network. Elements 1. One of the punishable acts committed; 2. Act is committed with intent of procuring economic benefit for one self or for another, or for the perpetuation of a fraudulent activity 3. Damage is caused thereby The Computer as Instrumentality of the Crime The Computer as Instrumentality of the Crime:  The Computer as Instrumentality of the Crime Examples: Credit card fraud, identity theft/fraud Source: Art. 8, Budapest Convention The Computer as Instrumentality of the Crime:  Offenses related to child pornography (§5, proposed bill) Child pornography - materials which visually depict a minor engaged in a sexually explicit conduct or a person appearing to be a minor engaged in sexually explicit conduct Punishable Acts Producing child pornography for distribution Offering/making available child pornography Distributing/transmitting child pornography all through the medium of a computer system or network The Computer as Instrumentality of the Crime The Computer as Instrumentality of the Crime:  - Criminal liability is without prejudice to prosecution under RA 9208 (Anti- Trafficking in Persons Act of 2003) & RA 7610 (Special Protection of Children Against Child Abuse, Exploitation and Discrimination Act) Source: Art.9, Budapest Convention The Computer as Instrumentality of the Crime The Computer as an Incident to the Commission of the Crime:  The Computer as an Incident to the Commission of the Crime Violations of the Revised Penal Code & other existing penal laws (§7, proposed bill) - Should an act punishable under the Revised Penal Code, the Consumer Act, or other existing penal laws be committed “through the use of, aided by, or involving computer systems or networks or through transactions covered by or using electronic documents or electronic data messages”, said act shall be punishable and prosecuted under those laws . - Purpose: Fill in the gaps in existing penal laws & eradicate preconceived notions that our existing laws only punishes crimes committed in real world. - Source: §33(c), Philippine E-Commerce Act Slide52:  Infringement of Intellectual Property Rights (§6, proposed bill) Punishable acts: Intentional copying, reproduction, dissemination, distribution, or making available online by means of a computer system or network Of protected works (e.g., computer programs, systems and designs), without the knowledge and consent of the owners thereof for his or another person’s benefit Liability without prejudice to prosecution under RA 8293 (IP Code) Exception: Fair use, as defined in RA 8293 (IP Code) Source: Art.10, Budapest Convention Crimes Associated with the Prevalence of Computers Slide53:  Unsolicited commercial communications (§4.8, proposed bill) Punishable acts: Unconsented transmission of voice or data messages which seek to advertise, sell, or offer for sale products and services Example: Spam e-mail Crimes Associated with the Prevalence of Computers Slide54:  Prosecution under the proposed bill does not bar prosecution under: Revised Penal Code Consumer Act Other Relevant Laws Liabilities and Penalties Slide55:  Who are liable: Persons who directly committed any of the punishable acts (§8, proposed bill) Co-conspirator(s) in the commission of any of the punishable acts (§10, proposed bill) Persons who aid/abet in the commission of any of the punishable acts (§11, proposed bill) Liabilities and Penalties Slide56:  Who are liable: In case of juridical entities (§9, proposed bill) a. Officers, board members, & employee(s) who directly participated or knowingly authorized the commission of the unlawful act in behalf & for the benefit of the juridical entity b. Officers & board members if the commission of the offense was due to lack of supervision control, either willfully or through gross negligence Liabilities and Penalties Slide57:  Imposable penalties (§8, proposed bill) - Prision correccional (6 months & 1 day to 6 years) or fine (PhP100,000.00 – PhP600,000.00), or both fine & imprisonment - Offenses related to child pornography: Prision mayor (6 years & 1 day to 12 years) or fine (PhP200,000.00 – PhP800,000.00), or both fine & imprisonment - Subsidiary penalty of imprisonment in case the offender does not have enough property to satisfy the fine. Civil liabilities for loss or damage Liabilities and Penalties Procedural Aspects of the Proposed Cybercrime Prevention Act :  Procedural Aspects of the Proposed Cybercrime Prevention Act Drafting Comprehensive Laws to Combat Cybercrime Outline:  Outline Jurisdiction Joint Cybercrime Investigation Unit Functions Composition Powers Enforcement and Implementation Collection of Computer Data Search and Seizure of Computer Data International Cooperation Remedies Some Issues Extra-Territorial Application of the Proposed Cybercrime Prevention Act:  Jurisdiction - Sec. 21, proposed bill: “The Regional Trial Court shall have jurisdiction over any violation of the provisions of this Act committed within the territory of the Philippines. In case any of the offenses herein defined is committed outside the territorial limits of the Philippines, and by such commission any damage is caused to a computer system or network situated in the Philippines, or to a natural or juridical person who, at the time the offense was committed, is in the Philippines, the proper Regional Trial Court in the Philippines shall have jurisdiction.” Extra-Territorial Application of the Proposed Cybercrime Prevention Act Extra-Territorial Application of the Proposed Cybercrime Prevention Act:  Jurisdiction - Two approaches in establishing jurisdiction: 1. Where the crime is committed 2. Where the effects of the crime are felt - If the answer to any of the foregoing is the Philippines, then the proper RTC may take cognizance of the cybercrime case. Extra-Territorial Application of the Proposed Cybercrime Prevention Act Slide62:  Jurisdiction - This is without prejudice to the filing appropriate actions in courts/tribunals of other countries which, under their respective laws, may properly acquire jurisdiction . Extra-Territorial Application of the Proposed Cybercrime Prevention Act Joint Cybercrime Investigation Unit (“JCIU”):  Main functions (§13, proposed bill): 1. To combat cybercrimes and computer-related offenses 2. To investigate, prosecute, and coordinate efforts of all law enforcement agencies in combating cybercrimes and computer-related offenses Joint Cybercrime Investigation Unit (“JCIU”) Joint Cybercrime Investigation Unit (“JCIU”):  Composition of the JCIU §14, proposed bill: 1. National Bureau of Investigation – Anti-Fraud and Computer Crimes Division 2. Philippine Center for Transnational Crime 3. Philippine National Police – Crimes Investigation and Detection Group Headed by an Executive Director to be appointed by the respective member organizations. Joint Cybercrime Investigation Unit (“JCIU”) Slide65:  §15, proposed bill: Prepare/implement measures to suppress cybercrimes Investigate & conduct info gathering activities to identify & prosecute cyber-offenders Effect searches/seizures Refer cases to proper gov’t agency for prosecution Formulate programs for int’l cooperation Solicit/coordinate private sector participation Recommend enactment of appropriate laws & measures §29, proposed bill: - Formulate/implement special & continuing training course for law enforcers Joint Cybercrime Investigation Unit (“JCIU”) Powers Slide66:  Role of service providers (§17 & 19, proposed bill): 1. Preserve computer data & traffic record up to a maximum period of 6 months from date of transaction - 6-month period, extendible upon JCIU’s order (reasonable belief that the computer data may have been used in committing cybercrime) 2. Cooperate in the disclosure of computer data & traffic record covered by a lawful court order/writ, and to keep confidential info regarding the execution by JCIU of such court order/writ Enforcement & Implementation Slide67:  Search, Seizure, & Collection of Computer Data (§16, 18, & 19, proposed bill): - Can only be done by virtue of a court order/writ, upon finding probable cause - JCIU, by virtue of a court order/writ, can require a person/service provider to submit specified computer data & subscriber info, & to collect and record traffic data associated with specified communications Enforcement & Implementation Slide68:  Search, Seizure, & Collection of Computer Data (§16, 18, & 19, proposed bill): - JCIU can perform/require the following by virtue of a warrant: Enforcement & Implementation Conduct surveillance operations Secure computer system/network or portions thereof Make/retain copy of computer data secured Maintain integrity of the relevant stored computer data Remove/render in accessible those computer data in the accessed computer system/network Slide69:  Treaty/International Agreement (§22 to 26, proposed bill) Philippine gov’t undertakes to cooperate with other nations in the detection, investigation, & prosecution of cyber-offenses & also in the collection of evidence relating thereto. - Condition: Formal request for cooperation or assistance, made by a duly authorized representative of the foreign gov’t pursuant to a treaty/agreement Reciprocity In the absence of treaty/agreement, mutual assistance or cooperation shall be based on the principle of reciprocity. International Cooperation (§22 to 26, proposed bill) Slide70:  Grounds for refusal to cooperate: 1. Offense punishable under RP laws & RP courts have acquired jurisdiction over the person of the accused 2. Info requested is privileged/protected under RP laws or that which affects national security 3. Production of requested info, unreasonable 4. Requesting gov’t previously refused similar request by RP without justifiable reason 5. Prior breach by the requesting gov’t International Cooperation (§22 to 26, proposed bill) Efforts to Combat Cybercrimes:  Efforts to Combat Cybercrimes Innovative Practices to Combat Cybercrimes:  Innovative Practices to Combat Cybercrimes Antiphishing Japan OnGuard Online in the US Video Campaigns to educate consumers International Cooperation:  International Cooperation Council of Europe Convention on Cybercrime criminalizes: Offenses against confidentiality, integrity and availability of computer data Computer related offenses like computer related forgery Content related offenses like child pornography; and Copyright related offenses International Cooperation:  International Cooperation The Asia Pacific Economic Cooperation endorses the following action items to combat Cybercrime: Immediate enactment of substantive, procedural and mutual assistance laws; Making cybercrime laws as comprehensive as those proposed in the Council of Europe; Assistance between and among economies; Security and Technical guidelines that can be used by governments and corporations vs cybercrime Outreach programs to economies and consumers regarding cybersecurity and cyber ethics International Cooperation:  International Cooperation ASEAN Network Security Coordination Center Early warning systems against viruses and illegal network intrusions Asia Pacific Computer Emergency Response Team Thank You:  Thank You

Related presentations


Other presentations created by GenX

emailett
19. 06. 2007
0 views

emailett

Presentations Tips
04. 10. 2007
0 views

Presentations Tips

environment
09. 04. 2008
0 views

environment

Final for printing
22. 04. 2008
0 views

Final for printing

AirCanadaJacquesCher rier
17. 04. 2008
0 views

AirCanadaJacquesCher rier

FedFundsRate
14. 04. 2008
0 views

FedFundsRate

020523 Ryanair
13. 04. 2008
0 views

020523 Ryanair

alicia
10. 04. 2008
0 views

alicia

2003fslj
30. 03. 2008
0 views

2003fslj

Dr Cheung Powerpoint
28. 03. 2008
0 views

Dr Cheung Powerpoint

TravelMedicine
27. 03. 2008
0 views

TravelMedicine

3GPP Beijing FMC challenges
24. 09. 2007
0 views

3GPP Beijing FMC challenges

vesterynodocritico
01. 10. 2007
0 views

vesterynodocritico

Beautifulthoughts
03. 10. 2007
0 views

Beautifulthoughts

jt email security tutorial
07. 10. 2007
0 views

jt email security tutorial

Nervoussystem
12. 10. 2007
0 views

Nervoussystem

eruhimov
12. 10. 2007
0 views

eruhimov

mexico ft3 17 al 5 maroc r
23. 10. 2007
0 views

mexico ft3 17 al 5 maroc r

one
29. 08. 2007
0 views

one

wong
29. 08. 2007
0 views

wong

3 Tourtellot partnersday
01. 11. 2007
0 views

3 Tourtellot partnersday

1b bhopal
07. 11. 2007
0 views

1b bhopal

bulent kilincarslan
15. 11. 2007
0 views

bulent kilincarslan

1c Peacehaven Community School
22. 11. 2007
0 views

1c Peacehaven Community School

Single Issue Bargaining 3
24. 11. 2007
0 views

Single Issue Bargaining 3

PersonalityTraits
11. 08. 2007
0 views

PersonalityTraits

personality disorders AETC
11. 08. 2007
0 views

personality disorders AETC

Water and Mantle Melting
30. 12. 2007
0 views

Water and Mantle Melting

lecture 8 predation
01. 01. 2008
0 views

lecture 8 predation

millionaire Rain Forest
03. 01. 2008
0 views

millionaire Rain Forest

Security and SDLC May 2006
11. 08. 2007
0 views

Security and SDLC May 2006

SCN Obesity poverty SEA Mar 2006
11. 08. 2007
0 views

SCN Obesity poverty SEA Mar 2006

story davis
11. 08. 2007
0 views

story davis

Sally Wilkins presentation
11. 08. 2007
0 views

Sally Wilkins presentation

SORB
11. 08. 2007
0 views

SORB

The Burden of Asthma PowerPoint
11. 08. 2007
0 views

The Burden of Asthma PowerPoint

Student Life
11. 08. 2007
0 views

Student Life

Personality Student Presentation
11. 08. 2007
0 views

Personality Student Presentation

Legal farm lease laws May 23
29. 12. 2007
0 views

Legal farm lease laws May 23

OAC Online Power Point
08. 08. 2007
0 views

OAC Online Power Point

MBTI
08. 08. 2007
0 views

MBTI

lecture5 ERD
08. 08. 2007
0 views

lecture5 ERD

Nutritional Labeling Loureiro
08. 08. 2007
0 views

Nutritional Labeling Loureiro

obesity epidemic
08. 08. 2007
0 views

obesity epidemic

Case10 Film
09. 10. 2007
0 views

Case10 Film

verbs gone wild
10. 10. 2007
0 views

verbs gone wild

Sound and Sense ch4
11. 08. 2007
0 views

Sound and Sense ch4

personage
11. 08. 2007
0 views

personage

19 CPH submm 2
29. 08. 2007
0 views

19 CPH submm 2

mutunga
29. 08. 2007
0 views

mutunga

sxu 4 05 06
11. 08. 2007
0 views

sxu 4 05 06

Agency brief Event
14. 12. 2007
0 views

Agency brief Event

Phyllis Reed
11. 08. 2007
0 views

Phyllis Reed

A 3 Alejandro Perez de Cardenas
24. 02. 2008
0 views

A 3 Alejandro Perez de Cardenas

Cdr Hazard
26. 02. 2008
0 views

Cdr Hazard

2003 surface coal Fatalities
28. 02. 2008
0 views

2003 surface coal Fatalities

chinasiamauto
12. 10. 2007
0 views

chinasiamauto

20031024164648 redcross
22. 10. 2007
0 views

20031024164648 redcross

porciano kyoto
29. 08. 2007
0 views

porciano kyoto

BK
12. 03. 2008
0 views

BK

AAS Science RolfK
29. 08. 2007
0 views

AAS Science RolfK

marmur presentation
24. 09. 2007
0 views

marmur presentation

07 China Qing Dynasty
25. 03. 2008
0 views

07 China Qing Dynasty

MN final1
24. 09. 2007
0 views

MN final1

Willman irvine
29. 08. 2007
0 views

Willman irvine

WW II
09. 10. 2007
0 views

WW II

dorsdl2006 arrow
19. 06. 2007
0 views

dorsdl2006 arrow

DogacIHC
19. 06. 2007
0 views

DogacIHC

Global HIV 1
19. 06. 2007
0 views

Global HIV 1

gepo2 1
19. 06. 2007
0 views

gepo2 1

gautron egsr2004 hemispherical
19. 06. 2007
0 views

gautron egsr2004 hemispherical

Funktionalismus
19. 06. 2007
0 views

Funktionalismus

front2
19. 06. 2007
0 views

front2

Feynman Diagram Tool Kit5
19. 06. 2007
0 views

Feynman Diagram Tool Kit5

etd2004open
19. 06. 2007
0 views

etd2004open

etd2004close
19. 06. 2007
0 views

etd2004close

ERM COSO Presentation
19. 06. 2007
0 views

ERM COSO Presentation

engineering review
19. 06. 2007
0 views

engineering review

embrace WP3 july 2005
19. 06. 2007
0 views

embrace WP3 july 2005

Egee VicoEquense
19. 06. 2007
0 views

Egee VicoEquense

efum050928payette
19. 06. 2007
0 views

efum050928payette

liu cgi06 talk
12. 10. 2007
0 views

liu cgi06 talk

haplotyping
19. 02. 2008
0 views

haplotyping

folleto adefa sonrisas 0km
16. 11. 2007
0 views

folleto adefa sonrisas 0km

Steady State Revolution Only
07. 12. 2007
0 views

Steady State Revolution Only

AAS Kalogera
29. 08. 2007
0 views

AAS Kalogera

Cherese and Kristy ppt
22. 10. 2007
0 views

Cherese and Kristy ppt

PP Modul Ausstattung WMV
20. 02. 2008
0 views

PP Modul Ausstattung WMV

478
16. 06. 2007
0 views

478

TEEN Final
11. 08. 2007
0 views

TEEN Final

17 Marel
14. 03. 2008
0 views

17 Marel

Stamatiou
29. 10. 2007
0 views

Stamatiou

Let No Deed Go Unpunished
24. 09. 2007
0 views

Let No Deed Go Unpunished

Purity 2
11. 08. 2007
0 views

Purity 2

McKenzie1
08. 08. 2007
0 views

McKenzie1

The Song Of Solomon
11. 08. 2007
0 views

The Song Of Solomon

rhileman
07. 11. 2007
0 views

rhileman

eales
19. 06. 2007
0 views

eales

simmons
12. 10. 2007
0 views

simmons

SA Articulation 2006 01 20
24. 09. 2007
0 views

SA Articulation 2006 01 20

Lect12S07
08. 08. 2007
0 views

Lect12S07

Agris Koppel
20. 11. 2007
0 views

Agris Koppel

Odyssey 000
29. 02. 2008
0 views

Odyssey 000

Femi April20
24. 09. 2007
0 views

Femi April20

Recruit Adults
11. 08. 2007
0 views

Recruit Adults

enso evolution status fcsts web
19. 06. 2007
0 views

enso evolution status fcsts web

kinsingerl
08. 08. 2007
0 views

kinsingerl

mark fowler
06. 03. 2008
0 views

mark fowler

resseccoes
28. 12. 2007
0 views

resseccoes