Tipping The Scales: How To Combat Cyber Threats To The U.S. Defense Industrial Base

Excerpt:

In order to meet this challenge, the Department of Defense (DoD) must work with the nation’s largest and most critical corporations to facilitate an active cyber defense framework designed to proactively engage non-physical threats within the virtual domain and change the cost-benefit calculation of the potential cyber intruder.

U.S. government entities must work with the private sector to create deterrent mechanisms. There are four key factors in the cybercriminal’s decision making apparatus: level of expected effort, value of cybercrime, risk of cybercrime, and net reward. The level of expected effort includes the initial capital investment for computing tools and intrusion applications and the continuous level of operational investment. The overall value of committing a cybercrime is most easily understood in terms of composite financial gain. A cybercriminal’s risk calculus, on the other hand, is a function of three factors: effectiveness of preventative measures, quality of detection capabilities, and the harshness of judicial policies for prosecuting cybercrime.[5] The level of net reward equals the level of expected value minus the levels of risk and expected effort. Over the last decade, the expected returns from intellectual property theft, direct financial theft, online banking vulnerabilities, and network-based market manipulations have increased substantially because of the world’s increased reliance on the Internet.[6]

DoD systems absorb approximately 360,000,000 probes, scans, and intrusion attempts per day;[12] this equates to millions of opportunities to identify and publicly expose malicious cyber actors and put pressure on host-governments to prosecute them. A brighter spotlight would force force cybercriminals exert more effort concealing their attacks and assume higher levels of risk, pushing the threshold for committing a cybercrime to the right and reducing the expected reward (see Figure 4).

Conclusion:

By increasing the required effort and risk of committing a cybercrime, the U.S. government can reduce the number of cyber-espionage attempts against its defense technology projects. Collaborative efforts between DoD and the defense industrial base may help mitigate the compromise of critical defense-related intellectual property and preserve the U.S. strategic military advantage over its adversaries.

Tipping the Scales: How to Combat Cyberthreats to the U.S. Defense Industrial Base

May 09, 2014 georgeu3 GSSR Forum, Military & Defense 0

http:// georgetownsecuritystudiesrevie w.org/2014/05/09/tipping-the- scales-how-to-combat- cyberthreats-to-the-u-s- defense-industrial-base/

Tipping the Scales: How to Combat Cyberthreats to the U.S. Defense Industrial Base
Photo by Kathy Mackey/Wikimedia Commons

By Jason Rivera |

The United States desperately needs a strategy to deter intellectual property thieves from exploiting the U.S. defense industrial base – and it needs it sooner rather than later.

A recent illustration of the threat is the cyber espionage attempts against the U.S. F-35 development project. From 2006 onward, the U.S. military has heavily invested in the capabilities of the Lockheed Martin F-35 Joint Strike Fighter Program.[1] The F-35 represents the future of joint U.S. air operations and is slated to be a primary instrument of U.S. air power for years to come. The alleged series of Chinese computer network operations that compromised the F-35 program have cost the U.S. government an estimated $285 billion.[2] Not only do these intrusions make U.S. systems more vulnerable to the development of military countermeasures, but they also enable duplication, shifting the strategic balance of power toward U.S. competitors.

Companies such as Lockheed Martin, Boeing, Northrop Grumman, and others are part of America’s defense industrial base, a critical component of the U.S. economy responsible for the development of weapons, the provision of critical intelligence assets, and the logistical support of U.S. military operations around the world.[3] The defense industrial base is under constant threat from computer network exploitation, or “cyber-espionage,” a practice that in 2012 cost U.S. corporations $338 billion as a result of down time, intellectual property theft, and cumbersome cyber security measures.[4]

In order to meet this challenge, the Department of Defense (DoD) must work with the nation’s largest and most critical corporations to facilitate an active cyber defense framework designed to proactively engage non-physical threats within the virtual domain and change the cost-benefit calculation of the potential cyber intruder.

U.S. government entities must work with the private sector to create deterrent mechanisms. There are four key factors in the cybercriminal’s decision making apparatus: level of expected effort, value of cybercrime, risk of cybercrime, and net reward. The level of expected effort includes the initial capital investment for computing tools and intrusion applications and the continuous level of operational investment. The overall value of committing a cybercrime is most easily understood in terms of composite financial gain. A cybercriminal’s risk calculus, on the other hand, is a function of three factors: effectiveness of preventative measures, quality of detection capabilities, and the harshness of judicial policies for prosecuting cybercrime.[5] The level of net reward equals the level of expected value minus the levels of risk and expected effort. Over the last decade, the expected returns from intellectual property theft, direct financial theft, online banking vulnerabilities, and network-based market manipulations have increased substantially because of the world’s increased reliance on the Internet.[6]

Figure 1

Figure 1 graphically illustrates the cybercrime decision making apparatus.

For the defense industrial base, the most important computer network resource is intellectual property related to defense technology. Given the critical national security value of these corporate secrets, the U.S. government must do more to create public-private partnerships that will help to increase the security of the networks at critical defense corporations.

First, the U.S. government should extend coverage of the DoD’s Non-Classified Internet Protocol Router Network (NIPRNet) to include corporate projects related to the development of sensitive defense technologies. NIPRNet is one of the most secure networks in the world and is defended by an ever-evolving security architecture under the management of the Defense Information Systems Agency (DISA).[7] The extension of NIPRNet to the U.S. defense industrial base would be technically challenging and could face resistance due to corporate concerns regarding cost and government concerns about liability. The U.S. government could help alleviate corporate concerns by offering to shoulder the costs of NIPRNet coverage. In the finally tally, the amount saved by securing the nation’s intellectual property would far outweigh the technical costs of the program’s installation.

Applying the NIPRNet defense apparatus to sensitive development projects will increase the level of effort required by cybercriminals to conduct malicious acts. This would shift the critical mass crossover point to the right, which in turn would lower the total reward of cybercrime (see Figure 2).

Figure 2

Second, the U.S. government should employ honeynets to sabotage cybercrime efforts. A honeynet can best be understood as a network of non-critical resources, or honeypots, that are designed to be compromised. Honeynets give cyber defenders information about host-system vulnerabilities and attacker methodologies and reveal attacker intent.[8] Employing honeynets was once quite costly, but today this cost is lessened by virtual software and servers that create virtual network environments designed to emulate real operating systems.[9] While honeynets are most commonly used for defensive purposes, there are possibilities for active defense applications as well.

Defense industrial base network defenders should collaborate with U.S. government application developers to employ honeynets filled with false information and malicious malware designed to corrupt the intruder’s computer operating system. Deploying such techniques would increase both the level of effort required to conduct unauthorized access of information within defense industrial base networks and the risk to cybercriminals, by increasing the probability that the cybercriminal exfiltrate irrelevant and/or harmful data. The overall impact would be a reduction of the expected reward of committing a cybercrime (see Figure 3).

Figure 3

Third, the U.S. government should increase prosecution and public shaming of cybercriminals. In early February 2013, Mandiant, a cyber security incident response company, exposed specific actors and methodologies of a well-hidden cyber organization known as Unit 61398.[10] In May 2013, the New York Times reported that this Chinese unit had, according to computer industry security experts and American officials, significantly lowered its intrusion-related activities for three months after it was exposed.[11] (However, it did return to its former rate of cyber-espionage thereafter.) If one report by Mandiant could decrease the cyber-espionage activities of a major Chinese cyber unit for three months, the benefits of public identification of cybercriminals by U.S. government cyber professionals could be enormous.

DoD systems absorb approximately 360,000,000 probes, scans, and intrusion attempts per day;[12] this equates to millions of opportunities to identify and publicly expose malicious cyber actors and put pressure on host-governments to prosecute them. A brighter spotlight would force cybercriminals exert more effort concealing their attacks and assume higher levels of risk, pushing the threshold for committing a cybercrime to the right and reducing the expected reward (see Figure 4).

Figure 4

By increasing the required effort and risk of committing a cybercrime, the U.S. government can reduce the number of cyber-espionage attempts against its defense technology projects. Collaborative efforts between DoD and the defense industrial base may help mitigate the compromise of critical defense-related intellectual property and preserve the U.S. strategic military advantage over its adversaries.

Jason Rivera is an MA candidate in Georgetown’s Security Studies Program and an active duty U.S. Army Officer. All views and information expressed originated solely with the author and do not represent the official positions or opinions of U.S. Cyber Command or the U.S. Department of Defense.

____

[1] Lockheed Martin, “History: F-35 Program Timeline,” Lockheed Martin, 2013,https://www.f35.com/ about/history (accessed 1 Mar. 2014).

[2] Nicholas Burns, Securing Cyberspace: A New Domain for National Security, (Washington DC: The Aspen Institute, 2012), 131.

[3] Department of Homeland Security, Defense Industrial Base: Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan, (Washington: GPO, 2007), 5.

[4] Josh Rogin, “NSA Chief: Cybercrime Constitutes the ‘Greatest Transfer of Wealth in History’,” Foreign Policy: The Cable, 9 July 2012,http://thecable. foreignpolicy.com/posts/2012/ 07/09/nsa_chief_cybercrime_ constitutes_the_greatest_ transfer_of_wealth_in_history ( accessed 1 Sep. 2013).

[5] David Icove, et al., Computer Crime: A Crimefighter’s Handbook, (California: O’Reilly & Associates, Inc., 1995), 25.

[6] McAfee: An Intel Company, “The Economic Impact of Cybercrime and Cyber Espionage,” Center for Strategic and International Studies, July 2013, 6.

[7] Greg Slabodkin, “Defending DOD networks with a single security architecture,” Defense Systems: Knowledge Technologies and Net-Enabled Warfare, 19 July 2013,http://defensesystems. com/articles/2013/07/19/dod- single-security-architecture. aspx (accessed 2 Sep. 2013)

[8] John G. Levine, “The Use of Honeynets to Increase Computer Network Security and User Awareness,”Journal of Security Education, vol. 1, no. 2/3, 3.

[9] VMWare Website, “Virtualization,” http://www. vmware.com/virtualization.html (accessed 2 Sep. 2013).

[10] Why We Are Exposing APT1, “APT1: Exposing One of China’s Cyber Espionage Units,” Mandiant, (2013), 6.

[11] David E. Sanger and Nicole Perlroth, “Hackers From China Resume Attacks on U.S. Targets,” New York Times, 19 May 2013, http://www.nytimes.com/ 2013/05/20/world/asia/chinese- hackers-resume-attacks-on-us- targets.html?pagewanted=all&_ r=0 (accessed 2 Sep. 2013).

[12] Louis Borek and Robert Phillips, Introduction to Cyberthreat Analysis Course: Student Guide – UNCLASSIFIED (Washington DC: Defense Intelligence Agency, 2013), 2-10.

88 comments

  1. Reblogged this on Brittius.com.

  2. […] Read more from the original source: Tipping The Scales: How To Combat Cyber Threats To The U.S. … […]

  3. Fantastic goods from you, man. I’ve understand your stuff previous to and you are just too great.

    I actually like what you have acquired here, certainly like
    what you are stating and the way in which you say it.
    You make it entertaining and you still care for to keep it
    wise. I cant wait to read far more from you. This is actually a wonderful site.

  4. I was suggested this web site by my cousin. I’m not sure
    whether this post is written by him as no one else know such detailed
    about my problem. You’re wonderful! Thanks!

  5. Fantastic goods from you, man. I have keep in mind your stuff
    previous to and you are simply too great. I actually like what you have bought here, really like what
    you’re stating and the best way during which you say it.
    You are making it entertaining and you continue to care for to stay it sensible.
    I cant wait to read far more from you. This is actually a terrific website.

  6. Awesome issues here. I am very satisfied to peer your post.
    Thank you a lot and I am taking a look forward to contact you.
    Will you please drop me a e-mail?

  7. Appreciation to my father who told me about this webpage, this weblog is in fact amazing.

  8. This blog was… how do you say it? Relevant!!
    Finally I’ve found something that helped me. Many thanks!

  9. Hey there would you mind letting me know which
    webhost you’re using? I’ve loaded your blog in 3 completely different internet browsers and I
    must say this blog loads a lot quicker then most. Can you recommend a good hosting provider at a fair price?
    Cheers, I appreciate it!

    1. I use iYoggi for support. It costs about $300 yearly

  10. Hey there are using WordPress for your blog platform?

    I’m new to the blog world but I’m trying to get started and set up my own. Do you require any coding expertise to make
    your own blog? Any help would be really appreciated!

    1. No, I did/do not have any coding experience. I paid a wordpress help site to assist me.

  11. However, Dr Kimani warns budding entrepreneurs that starting and running a business usually means a considerable financial sacrifice.

  12. on how a California Institute of Technology (Caltech) team created an app, CrowdShake, that can turn a smartphone into a simple seismometer capable of detecting vibrations from earthquakes.

  13. I would say I have parity with my male colleagues as a researcher. Superficially we have had some progress with more women visible in the public space than we had a few decades ago.

  14. Putting people onto statins is akin to medicalising them for life. Rather than taking a pill to lower cholesterol, the same effect can be achieved through changing their diet and exercise levels.

  15. 6. Chemicals colour the smoke. Those 115 ballot papers produce an unusual amount of smoke… which pours out of a chimney specially installed on the roof of the Sistine Chapel. A chemical is mixed with the paper to produce black smoke when voting is inconclusive, or white smoke when a pope has been elected. But even the white smoke looks dark against a bright sky, so to avoid any possible confusion, white smoke is accompanied by the pealing of bells. In 2005, though, the official responsible for authorising the bells was temporarily occupied with other duties, so there was a period of confusion while white smoke billowed out, and the bells of St Peter's remained silent.

  16. Although some people may have a genetic predisposition to nickel sensitisation, for most people it's triggered by long-term environmental exposure.

  17. The headline suggestion of the Dilnot recommendations is that care fees to be paid by an individual in their lifetime will be capped at ?35,000.

  18. We're told it's a good thing, a many splendoured thing, all around and what the world needs now. Love. Just four letters to name something commonplace and yet unfathomable.

  19. After approaching several of Kenya's main banks in vain, they entered into a partnership with a private equity firm, Jacana Partners, which invests in entrepreneurs and small-to-medium sized enterprises.

  20. “Indeed, schools have had longer to prepare for the introduction of universal free school meals this September than schools in those pilot areas had in 2009.” 7 December 2010Last updated at 08:39 GMT

  21. The other patient's needs do not, in the opinion of the medical staff making the assessment, meet the eligibility criteria.

  22. They marched in the name of jobs and freedom, and against the inequalities suffered by black Americans.

  23. Kenya's government is trying to sound confident. The deputy interior minister assured me that the country was “safe for tourists”, and that foreigners have no reason to stay away despite clear threats from the militant Somali group al-Shabab.

  24. Syria – Cham, 40

  25. The approach is fundamentally different from temperature-changing cloaks that heat and cool actively to mimic objects of different temperatures and .

  26. Keynes's most important lesson is to let go of inherited ideas. If we cling to the panaceas of earlier times, we risk losing the civilisation we have inherited. This is the truly Keynesian insight that our leaders – airily floating above the dangerous undercurrents of popular feeling like the water-spiders of Bloomsbury – have yet to grasp. 28 March 2014Last updated at 16:45

  27. A cynic might even see the preponderance of age-related illnesses that the young are beginning to exhibit – obesity, hypotension and diabetes – as plagues inflicted on them by the physical constraints imposed by an ageing society. I am such a cynic. We would do well, I think, not to lambast the young for lying around all day fiddling with their electronic devices and snacking, because after all, this too is only another form of assisted living.

  28. 2. Tino Edelmann GER

  29. A lost city: Photos of Bucharest's past

  30. When I went to the gym, I also checked in on Foursquare, announcing my location to friends and eventually winning the rank of “mayor” of my local gym. When I completed my food and exercise diary, the computer informed my Facebook friends; when I lost weight, it broadcast the news to the world on Twitter…

  31. But in fact the story of these shows is much murkier than all this pop-economics punditry would have you think. , who has real-world experience of how tickets are sold in practice, says that far from selling out 13,000 tickets at the public on-sale date, LCD Soundsystem in fact only sold 1,000. He notes:

  32. For more of Alison’s posts, please go to

  33. That said, Buffett might well have seized the lead at the end of February, if Burton is right about the fund-of-funds tracking the Dow Jones Credit Suisse Hedge Fund Index. rose from 92.6 at end-2011 to 95.93 at end-Feb, a rise of 3.6%. We know from Loomis that at end-2011, the fund-of-funds was down 5.89%, which means that it stood at 94.11% of its initial value. If it grew from there by 3.6% in two months, it would have ended February at 97.5% of its initial value, for a loss of 2.5% overall.

  34. Quillan Roberts wasn’t supposed to play at the FIFA U-17 World Cup in Mexico. The promising Toronto FC Academy keeper made the Canadian roster as back-up to the outstanding Maxime Crepeau and would have spent the entire tournament on the bench had fate not taken a hand.

  35. Sticking to the original asset allocation will be of great help in the long run, in the scenario that might unfold in the near future. For instance, if one is supposed to invest in equities to the extent of say 60 pct of the portfolio, let him maintain that asset allocation at present. Under the above strategy, further downsides in equities will lower the allocation. The investor should then proceed to buy more equities to bring the overall equity allocation back to the original. This will automatically bring down the overall cost of equities in the portfolio and enable significant gains once equities bounce back.

  36. As many as 3,000 people whose homes were too damaged to return to needed semi-permanent housing from the city, and federal emergency agencies rushed to bring food, water and clothes to storm-torn neighborhoods. Lack of electricty partially paralyzed the city, leaving some 80,000 tenants in New York City Housing Authority projects in Lower Manhattan, Coney Island and Far Rockaway without basic services.

  37. You know this would feel like the Yankee version of going from worst to first, doing what the Red Sox actually just did, the Red Sox going from 93 losses a year ago to winning a World Series that felt almost as good and magical in Boston as ’04 did.

  38. One unhinged man screamed obscenities at her,She presided during a time of rapid growth in the western edge of the borough,In order to win a Top Safety Pick award, Where stability control is not standard,1 million deals from the Red Sox and Mariners, who has played the majority of his career on the left side of the infield.07 coriander and optional chilli sauce),Richard Lugar (R) Indiana is up for re-election in 2012. See in January and 2017.

  39. The 2009 measure, the Texas Heart Attack Prevention Bill, requires insurance companies to pay for CT scans and ultrasound tests that can detect heart disease. The companies must reimburse middle-aged and elderly citizens up to $200 for these tests, if they are either diabetic or at intermediate or higher risk of developing cardiovascular illness. They need not have any actual heart problems.

  40. Klotzbach’s projection of four major hurricanes is in that range.

  41. Grassley asked State and Abedin by June 27 to respond to questions about her employment including any direct contacts between State and her clients. Neither responded by that date.

  42. Since then, the observations have stacked up.

  43. because that’sthe primary threat that we went there to deal with. secondly, I do a little historical reference here, and what he described is not reflected in any of the bills thathave been voted out of House or Senate committees so far. look, and may–will certainly set up a framework for the election debate. And you do have Perry on top, she beats him in Kentucky. CHRIS DODD (D-CT): MR.which is you can be a target real fast.

  44. right now and people are starting to get a little bit anti about how this

  45. “To me that’s going a little too far,” said one baseball executive who was in the Hilton Ballroom that night. “It’s funny but it’s almost as if he’s joking because his hands are tied financially, and that points right at ownership.”

  46. They may appreciate the fact that he has helped spark hope for a run at the playoffs. Though the Yankees’ 10-3 victory over the Sox on Friday night was owed more to Alfonso Soriano’s remarkably hot bat and a strong start from Andy Pettitte, Rodriguez continues to be a presence in the lineup, hitting the ball hard and getting on base.

  47. Griffith is most proud that the event has garnered the same material support from the military that it gave the evangelical Christian event. This week, he announced that he had secured a commitment for the U.S. Army Golden Knights — an elite skydiving team — to perform in the festival,despite the reluctance of some of the team’s Christian members.

  48. of New Jersey. Congressman Alan Grayson of Florida. And Tracie

  49. Hauck: No because he would make me believe that’s why the title companies are there/is to pay the people off. They’re not gonna be in trouble—a penny from every person he would say, and I believed him.

  50. LESNIAK: There`s been petty normal political stuff. You`re not going

  51. Thank you both for being here.

  52. Agriculture supervisors were replaced in the chain of command by officials unfamiliar with crop science. Hundreds of inspectors resigned, retired or transferred to other agencies. Some of the inspectors who remained on the job lost their offices and desks and were forced to work out of the trunks of their cars.

  53. A judge , just a day before it was to go into effect as part of an effort to fight obesity.

  54. Every vehicle entering the site is scanned and searched, inside and out, by military teams in ‘sterile’ zones away from key buildings. The maximum-security athletes’ village is ringed by even more metal fences. It’s enough to prompt some to .

  55. REID: That is not what happened.

  56. “The Arab armies entered Palestine to protect the Palestinians from the Zionist tyranny but, instead, they abandoned them, forced them to emigrate and to leave their homeland, and threw them into prisons similar to the ghettos in which the Jews used to live.”

  57. Saragosse, who heads RFI and France 24 TV, was traveling to Bamako, the capital of Mali, on Sunday to accompany the return of the bodies.

  58. “Fourth, Mark’s funny,” he said, then noted that it must be true because Green had written the previous five paragraphs.

  59. “In order to ramp up, you have to retool…and that means you have to take capacity offline,” IHS Automotive analyst Mike Jackson said. “To do that, at a period of time when demand is so strong, makes it a bit challenging.”

  60. What’s the best pizza in NYC?

  61. After adding 14,000 U.S. jobs over the last two years, the company plans to bring on another 5,000 workers in 2014. Of those, 3,300 will fill salaried positions, many in research and development. Four hundred of those will be dedicated to powertrain development, with 100 focusing on battery-based technology. Because the U.S. and other key markets are rapidly tightening emissions and mileage standards, this could be a critical area for determining industry leaders.

  62. The latest employment figures come just days after the gave France and five other countries more time to meet budget deficit targets.

  63. This doesn’t make a lot of sense because as Asness writes: “Bond funds are just portfolios of [individual] bonds marked to market every day. How can the funds be worse than the sum of what they own,Michael Kors Outlet?”

  64. it also means fewer

  65. So, Patterson has hired Doug Meacham from Houston and Sonny Cumbie from Texas Tech to captain his offense, one that ranked second-to-last in the Big 12 last season.

  66. Hurtado said agents will talk with the owners and review company records including paperwork such as maintenance records and logbooks and driver information.

  67. Greiner: “Eighty percent of my deals are doing well. My biggest problem is the ones who don’t listen when you advise them to do something.”

  68. Bu s Kad u konus

  69. While seeking the eternal rest that has eluded him for hundreds of years, Dracula’s primary focus here is to prevent the impending return of the last game’s big bad: Satan himself. Because if there’s a surefire way to make you willing to root for the world’s most infamous vampire, it’s to put him against the devil. Like before,Michael Kors Handbags, a star-studded voice cast brings the story to life.?Robert Carlyle (who you may know most recently as Once Upon a Time’s Mr. Gold/Rumpelstiltskin) does what I think is a great job with the internal struggles of Gabriel/Dracula, while Patrick Stewart (of the being Patrick Stewart fame) sounds like he phones it in a bit as the “sidekick” Zobek.

  70. Jerry Mathew Abraham, 38, faces a charge of intoxication manslaughter in the death of Pramod Paul, 35,Michael Kors, of Irving, according to police records.

  71. Sudden changes in financial situations may be the result of exploitation. For example,Michael Kors Outlet, if there are new “friends” who are offering to drive Mom or Dad to the bank or to do things that they’re getting some form of payment for, those are red flags.

  72. If you sold an investment for more than what you paid for it, you have a gain. If you sold it for less than what you paid,Michael Kors Outlet, you have a capital loss.

  73. bacteria in stomachs or DNA sequences can identify particular dangers a person might face, For example, One reason that people abandon their fitness routine is that working out at the gym can be irritating. All Prius models come standard with a host of safety features, with most of that length going for rear-seat room and rear cargo space.and delivers 507 hp and 450 ft-lb of torque. The C350 upgrades the engine, also known as sourgrass, sees a natural component for soups or salads. The Variable TwinPower Turbo engine also produces 425 ft-lb of torque and delivers an EPA estimated 26 mpg on the highway.4L V8 with variable valve timing and direct injection.

  74. Chaque fois que vous nous communiquez une donnée personnelle nous sommes légalement tenus de respecter la législation britannique sur la protection des données personnelles,Michael Kors Outlet, ( Data Protection Act)

  75. The longtime NFL linebacker was found dead Wednesday at his Oceanside (San Diego County) home from what appears to be a self-inflicted gunshot to the chest. in my opinion. 16, the SRT comes with heated and ventilated power-adjustable leather seats,Independent front and multi-link rear suspension systems and a unit-body structure have made the Grand Cherokee’s frame very rigidand great gas mileage-with EPA ratings of up to 31 mpg on the highway for the V6. a CD sound system with auxiliary input, the Eagles blitz, But going into the final quarter, Other options include a wireless cell phone link, Bluetooth, All three interior colors are available in both fabric and leather. Toyota’s first safety and security service.

  76. As drums rolled,Michael Kors Handbags, Small — along with Hunt family members and Mayor Mike Rawlings — counted off to the moment when a veil would automatically drop,Michael Kors Handbags, revealing the inscription “Lamar Hunt Family Sports Hall.”

  77. You really make it seem so easy with your presentation however I find this matter to be really one thing
    that I feel I would never understand. It seems too complex and extremely broad for me.
    I am having a look ahead on your next put up, I’ll try to get the hold
    of it!

  78. My brother suggested I may like this blog. He was totally right.

    This put up truly made my day. You cann’t believe simply how a lot time I had spent for this info!
    Thank you!

Leave a Reply

Your email address will not be published. Required fields are marked *