A Theory of Cyber Deterrence

facebooktwittergoogle_plusredditpinterestlinkedinmail

Image: Kathreen-Elaine Mangaluz, GJIA Staff

People grow weary of the endless clichés about how inter-connected the world has become. The observation of globalization has become pervasive to the point of irrelevance. Yet behind the clichés are critically important implications, not least for national security. The danger of virtual assault or espionage increases daily as network integration becomes ubiquitous. Thousands of cyber-attacks occur per day, suggesting great difficulty in distinguishing serious threats from minor ones.[i] Worst of all for national security, the U.S. is particularly vulnerable to these types of attacks given the pervasiveness of advanced technology in every aspect of its citizens’ lives, as well as the American tendency to value freedom over security and innovation over regulation.


 


Deterrence is an example of a traditional security theory that could be superimposed on the cyber realm. Richard L. Kugler, a well-regarded analyst of national security policy, argues for deterrence given the limitations of a purely defensive posture.[ii] Will Goodman, who has served as an adviser on defense and veterans issues to Senator Patrick Leahy, and as assistant for plans to the assistant secretary of defense for homeland defense and America’s security affairs, heralds the strategy for cutting costs by evading the need for continuous warfare.[iii] Patrick M. Morgan, Tierney Chair for Peace and Conflict and Political Science at the University of California – Irvine, adds that traditional deterrence analysts are puzzled that the U.S. has not done more to apply the valuable tools of deterrence to the cyber arena.[iv] All of these arguments have merit. Thus the question must be asked: What would an effective cyber deterrence theory look like for a powerful state?

From Nuclear to Cyber: Deterrence for a Modern World

In deterrence theory, the objective is to eliminate attacks by making costs and consequences outweigh benefits. There are two parts to implementing this strategy. The first is to have a strong defense; if a country’s defense is sufficient to make an attack exceedingly difficult, an attacker might choose to stand down. In the cyber realm, this goal is a practical solution to the majority of attacks. The second part is focused on retaliation. If some successful attackers face severe retribution following their actions, other aspirants may choose not to attack at all.

Lacking from traditional deterrence theory is the problem of identifying the source of an attack. In the cyber realm, this challenge looms large as an obstacle to intelligent retaliation, since the nature of the digital domain lends itself to anonymity. Therefore, this introduces a third component of cyber deterrence: attribution.

This suggests a three-pronged approach, with an understanding that responses will vary between state and non-state actors. In order to limit the scope of our analysis, we will focus on countries such as the U.S. where power relative to one’s opponent is not a serious concern. The prongs of the approach are as follows:

  • Defense – A powerful cyber defense is the first step in protecting against the vast majority of aggressors and dissuading some from attacking at all.
  • Attribution – The ability to attribute an attack to a specific source is important for maintaining credibility and ensuring legitimacy at home and abroad.
  • Retaliation – The willingness and capability to retaliate against any (but not necessarily every) attack from any source under any circumstances must be assured.

Defense

In order to build a theoretical framework for an effective defense in the cyber realm, one must first appreciate its characteristics. Franklin D. Kramer, former Assistant Secretary of Defense and editor and joint author of Cyberpower and national security,  provides some useful insight by suggesting that cyber is similar to land in three important respects: players are numerous, barriers to entry are minimal, and there is ample opportunity for concealment.[v] Unlike land, however, there can be significant geographic separation between aggressors and their targets in the cyber realm. This, combined with the perception of concealment (a result of the difficulty of attribution), may diminish fear of retaliation in the cyber domain. For instance, an armed assailant attacking a federal building faces almost certain punishment and high risk of death. A college student sipping coffee in an internet café in Moscow while infiltrating the computer network of that same building is less concerned about the immediate consequences of his actions.

No country on earth could possibly muster the resources to attribute and retaliate against thousands of attacks per day.[vi] Therefore, the first component of deterrence theory must be a strong defense; a robust combination of hardware and software components intended to make unauthorized access nearly impossible. This will serve two purposes. First, it will completely prevent most intruders from gaining entry into the system. Second, it may keep potential intruders from even trying, due to the very low probability of successfully breaking into the system relative to the very high costs to of doing so.[vii] This form of defense must block or dissuade the majority of aspiring attackers, so that the remaining ones can be dealt with through retaliatory methods.

This has clear implications for a US policy of cyber deterrence. A strong defense must leverage a combination of physical infrastructure and human capital. The need for physical security is obvious; beneath the virtual world of the internet is a vast network of glass tubes, copper wires, routers, switches, firewalls, and satellites. This physical infrastructure must be protected as part of any strategic defense.

In the balance between efficiency and security, mission-critical systems must lean heavily towards the latter. Kramer discusses the need for “high-end” and “low-end” systems, which could be dealt with differently when considering security needs.[viii] The same should be required through regulation of any non-profit or private organizations working with or retaining confidential information. This need is accentuated by the identity of the U.S. government; its iconic status as the most powerful organization in the world makes it the crown jewel of hackers worldwide.

Redundancy is imperative. The US should ensure that no single point of failure exists on any piece of hardware or software where a loss of functionality would have serious national security implications.[ix] Backups should be automated and maintained in order to protect against corruption and loss. Redundancy and disaster recovery add enormous complexity and significant costs to the maintenance of any system, but like an insurance policy, their absence is devastating during a crisis.

Human capital is no less critical. Complex systems diminish in value without the personnel and knowledge to monitor, maintain, and improve them. The backups and redundancy discussed above require talented and knowledgeable staff to manage, as do the periodic updates required by all code-based technology. Furthermore, no system that allows entry to required personnel can be flawlessly secured, which necessitates constant evolution through reassessment and enhancement.

Defense concerns cannot be limited to the public sector. Some might argue the U.S. government does not have an obligation to protect private companies, or that this is outside the scope of a cyber deterrence framework. But this view is mistaken. U.S. led multi-national companies work across the globe, and even if this were not the case, cyber attacks are unhindered by state borders. Furthermore, U.S. interests are harmed by intellectual property theft and U.S. citizens are directly hurt when their information is stolen from company databases. For these reasons, a comprehensive cyber-deterrence policy needs to take private companies into consideration.

The lack of direct government control makes the complexity of cyber protection for private companies greater. Although the government could create regulations defining requirements for an effective cyber defense, this would stifle innovation and development while failing to keep up with evolving security needs. Alternatively, the government could provide cyber security infrastructure and software to companies, but this would be outrageously expensive, complex, and wasteful. The most reasonable option is to let private companies secure themselves, but step in if a breach occurs to provide attribution and retaliation services.

This may sound untenable, but is no different than the physical domain of security. Companies take steps to defend themselves with locked doors, gates, and alarm systems. In the event that these systems fail, and theft, property damage, or violence occurs, some form of government agency (local police, FBI, or other) is expected to take the next steps to bring the perpetrators to task and ensure justice is done. While the policing method would be similarly structured, the virtual nature of the cyber domain would be better served by a highly talented and centralized team rather than a local police force.

These aforementioned measures, which included physical security, redundancy, human capital for the public sector, and expectations of a reasonable degree of security for private sector systems, are the first step of a US cyber deterrence strategy. Their theoretical importance lies in reducing the number of high-risk attacks to a minimum, thus paving the way for successful attribution and retaliation against the most malicious of assailants. Though this is a critical first step, some aggressors will penetrate the defenses. For these cases, a second element of cyber-deterrence theory is required.

Attribution

The problem of attribution is universally acknowledged in the context of cyber deterrence.[x] The massive number of users and relatively anonymous nature of the cyber domain makes attribution far more difficult than it is for nuclear deterrence.[xi] Governments can launder their actions through individual users or groups, achieving their objectives while maintaining plausible deniability. Individuals can also launch formidable attacks on governments or private companies with relatively minimal financial support, making it infeasible to assume government complicity based solely on the success or scale of an attack. Malicious individuals can also achieve concealment by breaking into the computers of the technologically vulnerable and directing their attacks from there.

This does not mean that attribution is impossible. Goodman points out that when Estonian websites were damaged in 2007 through[tooltip title=”” content=”A denial of service attack is a cyber attack whereby servers are bombarded with more requests for information than they can handle, thus rending the server essentially unusable.” type=”info” ] denial of service attacks[/tooltip], and when Georgia had their network assaulted in 2008, both countries were able to attribute the attacks to Russian hackers with a high degree of certainty. More recently the New York Times, with the help of hired cyber experts, was able to attribute stolen passwords and other illegal online activity to the work of Chinese hackers.[xii] These examples demonstrate that the challenges of attribution are not insurmountable in the real world.[xiii]Indeed many attacks have been traced to their sources, even if some attackers have escaped prosecution. It is not unrealistic to think that greater investment in personnel and technology could improve the success rate.

Furthermore, despite the challenges faced by attribution efforts, they remain a critical part of cyber deterrence theory. Attribution helps guarantee that retaliation efforts will bear fruit, since they will eliminate the true threat rather than a scapegoat. Successful attribution also builds legitimacy and credibility at home and in the eyes of the international community.

Credibility and legitimacy are poignant within the context of US strategy. Congress would be extremely hesitant to impose harsh economic sanctions on a Chinese government that appeared circumstantially to be responsible for an attack. If there was undeniable forensic evidence, however, that hesitation would be reduced. If the evidence pointed to a terrorist cell in Shanghai rather than the Chinese government, the response would be different, and a dangerous diplomatic spat could be avoided. If, however, the government were proven responsible, then other actions could be pursued.

The U.S. should take leadership in establishing norms for collaboration on cyber attribution efforts in regards to crime. This necessitates proactive behavior; the sooner the U.S. defines illegal cyber behavior in the international community, the more likely it is those norms will become globally recognized. Even if disagreement arises over time, these norms will be difficult to overturn once they are firmly entrenched in the international system.

One final note on attribution is that countries should take responsibility for attributing major attacks on domestic companies. This may be costly, but far less so than sending the message that attacks on companies will go unpunished. If countries fail to do this, companies will likely take matters into their own hands as cyber crimes increase in frequency and their cost grows unacceptably high. The U.S. and other large countries would come to regret the chaos encouraged by lawlessness in the cyber domain if they fail to act in support of their corporations’ interests. Additionally, the U.S. and other countries will benefit from economies of scale by building their ability to attribute not only government attacks but private sector attacks as well.

None of the above guarantees the ability to attribute every cyber attack to a specific person or entity, but it does accentuate the importance of attribution efforts. Though not absolutely necessary for every attack, frequent attribution paves the path for the final pillar of cyber deterrence theory.

Retaliation

No deterrence theory could succeed without retaliation. In the absence of retaliation, there is no incentive for opponents to refrain from attacking. Morgan says to maximize the effectiveness of retaliation, it should fall in the intersection of three criteria: unacceptable to one’s opponents, feasible, and acceptable to the retaliating party and the international community.[xiv]

For dealing with attributed non-state actors, appropriate punishment presents some difficulty due to lack of established international law. As discussed above, the U.S. should work to proactively define illegal behavior for exactly this reason. Though challenges arise with enforcement and the judicial process, setting a precedent at least sends a clear message of actions that are deemed inappropriate and what retaliatory action may be taken.

Despite the legal concerns, it is vital to retaliate against non-state actors. The large number of daily cyber attacks speaks to an absence of fear of retaliation. If these attacks are to be reduced, aspiring cyber criminals need to observe punishments being administered to those who break rules. This retaliation would not need to be in kind; once illegal activity has been defined, then arrest and imprisonment are on the table as appropriate responses.

States pose a different challenge when dealing with retaliation, both due to the magnitude of the potential consequences and the complexity of inter-state relations. In retaliating against attributed state actors, as with individuals, states need not constrain themselves to responding only in kind to cyber attacks. In order to maximize the effectiveness of deterrence, states should demonstrate credible willingness to respond through a variety of measures, including economic sanctions, seizure of state resources, diplomatic and political maneuvers, or even military attack.

Retaliations against states need not be proportional to the offense, but should reflect geopolitical realities. Leaders need the leeway to exercise judgment when deciding what measures best deter future attacks. The measures pursued must be strong enough to arouse fear in other aspiring assailants, but should also attempt to maintain legitimacy or rally support for future retaliations.

Most challenging is when an attack cannot be attributed to a specific source. Morgan argues that in classic deterrence theory, attribution is unnecessary, and that states can be held accountable for any attack that comes from within its borders.[xv] But he goes on to note this might only be acceptable for severe attacks. Goodman seconds this opinion, stating that attribution can be unnecessary if culpability can be shifted to a state[xvi].

This option may sometimes be necessary, but does not represent a consistent guideline for action; the decision to punish a state for attacks would certainly depend upon the geopolitical, economic, and diplomatic circumstances.[xvii] Countries should also be reluctant to establish a norm of blaming states for citizens’ actions in the realm of cyber security for fear that these norms might work against them in the future. The characteristics of cyber security lend themselves to a lack of control, so if the U.S. were to blame China for independently operating hackers, it might later need to accept responsibility and prosecute Google or another company for defying local laws in a foreign country.

The underlying message is that U.S. policy-makers should not feel obligated to follow a particular course of action after an attack occurs. Retaliation can vary according to the source, the magnitude, and the political environment.  Nevertheless, the U.S. should establish precedent by retaliating against attacks in consistent ways, thus showing the world the consequences of a given action. As Kugler rightly argues, these precedents need to be built prior to a crisis situation to avoid ad-hoc behavior when responding to attacks. For this reason, he argues for a “strong declaratory policy” to broadcast punishments for given situations to maximize impact on aspiring assailants.[xviii]

Conclusion

Deterrence is not the final solution to crime, espionage, and attacks in the cyber realm. Cyber deterrence differs from the nuclear variety in many key ways, and as such is highly unlikely to eliminate the occurrence of all attacks no matter how effective the implementation. Nevertheless, deterrence can play a critical role in reducing the total number of attacks to a manageable level at a relatively low cost. This should free up resources to pursue and prosecute the attacks that do slip through.

For deterrence to be effective, it is imperative to utilize a framework of defense, attribution, and retaliation. Without an effective defense, the number of successful attacks would be far too great to source and pursue. Attribution techniques, though not an absolute necessity in every circumstance, will need to identify the source of attacks often enough to convince aspiring attackers that the odds are against them escaping unscathed. Retaliation is crucial for demonstrating that breaking the law or attacking a nation will not go unpunished.

Given the vast amount of cyber attacks the U.S. endures on a daily basis, a policy of cyber deterrence should be aggressively pursued. The defensive mechanisms of redundancy and data protection as well as the necessary investment in education and training may be expensive, but these costs will yield large dividends as the cyber realm becomes increasingly important. The U.S. has always been a country of innovators and entrepreneurs and there is no reason for the U.S. to not be the dominant cyber power in the world for decades to come, with cyber deterrence policy as a foundation of that power.


[1] A denial of service attack is a cyber attack whereby servers are bombarded with more requests for information than they can handle, thus rending the server essentially unusable.


[i] Franklin D. Kramer, “Policy Recommendations for a Strategic Framework,” in Cyberpower and National Security, ed. Franklin D. Kramer et al. (Dulles: National Defense University Press and Potomac Books, Inc., 2009), 15.

[ii] Richard L. Kugler, “Deterrence of Cyber Attacks,” in Cyberpower and National Security, ed. Franklin D. Kramer et al. (Dulles: National Defense University Press and Potomac Books, Inc., 2009), 309.

[iii] Will Goodman, “Cyber Deterrence: Tougher in Theory than in Practice,” Strategic Studies Quarterly 4(3) (2010): 103

[iv] Patrick M. Morgan, “Applicability of Traditional Deterrence Concepts and Theory to the Cyber Realm,” (paper presented at a workshop on deterring cyberattacks, Washington, DC, 2010). 57

[v] Kramer, “Policy Recommendations for a Strategic Framework,” 12

[vi] Morgan, “Applicability of Traditional Deterrence Concepts and Theory to the Cyber Realm,” 58-59

[vii] Kugler, “Deterrence of Cyber Attacks,” 334

[viii] Kramer, “Policy Recommendations for a Strategic Framework,” 15

[ix] Morgan, “Applicability of Traditional Deterrence Concepts and Theory to the Cyber Realm,” 75-76

[x] Joseph S. Nye, The Future of Power (New York: PublicAffairs, 2011), 123; Goodman, “Cyber Deterrence: Tougher in Theory than in Practice,” 128; Morgan, “Applicability of Traditional Deterrence Concepts and Theory to the Cyber Realm,” 59

[xi] Kramer, “Policy Recommendations for a Strategic Framework,” 12

[xii] “Hackers in China Attacked the Times for Last 4 Months.” last modified January 31, 2013, http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?pagewanted=all.

[xiii] Goodman, “Cyber Deterrence: Tougher in Theory than in Practice,” 105

[xiv] Morgan, “Applicability of Traditional Deterrence Concepts and Theory to the Cyber Realm,” 56

[xv] Morgan, “Applicability of Traditional Deterrence Concepts and Theory to the Cyber Realm,” 70

[xvi] Goodman, “Cyber Deterrence: Tougher in Theory than in Practice,” 109

[xvii] Kugler, “Deterrence of Cyber Attacks,” 328

[xviii] Kugler, “Deterrence of Cyber Attacks,” 320

facebooktwittergoogle_plusredditpinterestlinkedinmail
Christopher Haley

Christopher Haley was a Project Manager for Cerner Corporation and served in the United States Marine Corps reserves, deploying once to Iraq. He is pursuing an M.S. in Foreign Service from Georgetown University, with a concentration in International Relations and Security, and a B.S. in Computer Science from the University of Illinois in Champaign-Urbana.

99 Comments

  • February 16, 2017

    seo plugin

    Hello Web Admin, I noticed that your On-Page SEO is is missing a few factors, for one you do not use all three H tags in your post, also I notice that you are not using bold or italics properly in your SEO optimization. On-Page SEO means more now than ever since the new Google update: Panda. No longer are backlinks and simply pinging or sending out a RSS feed the key to getting Google PageRank or Alexa Rankings, You now NEED On-Page SEO. So what is good On-Page SEO?First your keyword must appear in the title.Then it must appear in the URL.You have to optimize your keyword and make sure that it has a nice keyword density of 3-5% in your article with relevant LSI (Latent Semantic Indexing). Then you should spread all H1,H2,H3 tags in your article.Your Keyword should appear in your first paragraph and in the last sentence of the page. You should have relevant usage of Bold and italics of your keyword.There should be one internal link to a page on your blog and you should have one image with an alt tag that has your keyword….wait there’s even more Now what if i told you there was a simple WordPress plugin that does all the On-Page SEO, and automatically for you? That’s right AUTOMATICALLY, just watch this 4minute video for more information at. Seo Plugin

  • February 16, 2017

    butlerPa

    What would you began to do on my place?
    butlerPa

  • February 17, 2017

    Peruvian deep wave

    Those Peruvian deep wave https://www.youtube.com/watch?v=k1oaz7n0ILk retained my vision trendy and therefore dry sounding inside my shuttle. Soft down within in addition to rainproof!

  • February 17, 2017

    hotel oceanside

    Interestingly, the costs of the vast majority of the eateries in Bay are hardly unreasonable your wallet won’t separate eating dinner out for
    each dinner you have.

  • February 17, 2017

    boca raton pressure cleaning

    Hello, Neat post. There’s a problem along with your site
    in internet explorer, may test this? IE still is the market leader and a huge section of people will omit your
    great writing due to this problem.

  • February 17, 2017

    stopcreditfraud.net

    Hi there mates, its fantastic post concerning tutoringand
    entirely explained, keep it up all the time.

  • February 23, 2017

    nine stepped back

    I don’t even know how I ended up here, but I
    thought this post was good. I do not know who you are but certainly you’re going to
    a famous blogger if you are not already 😉 Cheers!

  • February 23, 2017

    social security office

    Wow, that’s what I was looking for, what
    a data! present here at this blog, thanks admin of this web site.

  • February 23, 2017

    Abbey

    I think other website owners should take this
    web site as an model, very clean and great user genial design.

  • February 24, 2017

    ig

    I’ve read a few good stuff here. Certainly worth bookmarking for revisiting.

    I surprise how a lot attempt you place to make this kind of
    fantastic informative website.

  • February 24, 2017

    monitor services

    Hi to all, how is all, I think every one is getting more from this web page, and your views
    are fastidious designed for new viewers.

  • Hello there, just became alert to your blog through Google, and found that it’s truly informative.
    I’m going to watch out for brussels. I’ll appreciate if you continue this in future.
    Numerous people will be benefited from your writing. Cheers!

  • February 25, 2017

    credit monitoring service

    It’s actually a cool and useful piece of info.
    I’m glad that you shared this useful info with us.
    Please stay us informed like this. Thanks for sharing.

  • February 25, 2017

    Maryellen

    I don’t usually comment but I gotta admit appreciate it for the post
    on this one :D.

  • February 25, 2017

    ig

    Does your blog have a contact page? I’m having problems locating it
    but, I’d like to send you an email. I’ve got some recommendations for your blog you
    might be interested in hearing. Either way, great site and I look forward to seeing
    it expand over time.

  • February 25, 2017

    Robert

    I really wanted to develop a small remark to say thanks to you for these amazing tactics you
    are placing at this website. My incredibly long internet search has now been paid with wonderful points to talk about with
    my co-workers. I ‘d mention that we site visitors actually are definitely
    endowed to live in a perfect community with many wonderful professionals with insightful tactics.

    I feel quite privileged to have come across your entire webpage and look forward to plenty of
    more exciting times reading here. Thanks once again for a
    lot of things.

  • February 25, 2017

    betterscooter.com

    i really csnt beleive that will a number of people actually enjoyed a thing unfavorable to say of these! i’d been getting rare metal in the beginning nevertheless i have been getting your african american , however , i will enjoy sometimes coloring. they even usually are not similar to superb girly, i seemed to be satisfied around. setting up i’m your james kid, nonetheless adore betterscooter.com http://adf.ly/6249830/banner/www.scamadviser.com/is-betterscooter.com-a-fake-site.html!

  • February 26, 2017

    how long fha loan approval

    While the majority of FHA home mortgage borrowers choose to acquire a stick constructed residence by
    itself lot, FHA will certainly enable people to acquire
    a condominium unit.

  • February 26, 2017

    fha loan how to apply

    An additional program, the Solitary Household Assured Funding Program, permits up to moderate-income buyers.

  • February 26, 2017

    oceanside storage unit

    In Alta California more objectives were launched within the years that were coming until there have been twenty-one by
    1823.

  • February 26, 2017

    how get fha loan

    The program’s popularity, partially, is since buyers can make
    downpayments of just 3.5 percent using the FHA.

  • February 26, 2017

    Dorothea

    Ahaa, its good dialogue about this paragraph here at this web
    site, I have read all that, so at this time me also commenting here.

  • February 27, 2017

    credit fraud alert transunion

    Yes! Finally someone writes about chase bank identity theft protection.

  • March 3, 2017

    www.instapaper.com

    Its like you read my mind! You seem to know a lot about this, like you wrote the book in it or something.
    I think that you can do with some pics to drive the
    message home a bit, but other than that, this is excellent blog.
    A great read. I will certainly be back.

  • March 4, 2017

    augustaairconditioning

    I’ll immediately take hold of your rss as I can’t
    to find your e-mail subscription hyperlink or newsletter service.
    Do you’ve any? Please allow me understand so that I may subscribe.
    Thanks.

  • March 5, 2017

    Nan

    Ahaa, its pleasant conversation concerning this post at this place at
    this weblog, I have read all that, so at this time me also commenting here.

  • March 5, 2017

    Shelton

    Greetings! Very useful advice within this article!

    It’s the little changes that will make the most significant changes.
    Thanks for sharing!

  • March 5, 2017

    url.org

    Hola! I’ve been following your site for a long time now and
    finally got the bravery to go ahead and give you a shout out from Kingwood Texas!

    Just wanted to tell you keep up the good work!

  • March 6, 2017

    Mitchel Gun

    “Best Blogpost! Hello Admin! Thanks for this article, very good information, I will be_ forwarding this to some friends, if you’re ok with that. Greetings from Germany!”

  • March 7, 2017

    expensive tents

    After study a couple of of the weblog posts in your web site now, and I truly like your method of blogging. I bookmarked it to my bookmark web site checklist and shall be checking again soon. Pls try my website online as properly and let me know what you think.

  • Thanks for the article. I have constantly seen that a majority of people are desirous to lose weight simply because wish to look slim and attractive. Nevertheless, they do not continually realize that there are other benefits for you to losing weight as well. Doctors declare that fat people suffer from a variety of disorders that can be directly attributed to their own excess weight. The great thing is that people who definitely are overweight as well as suffering from various diseases are able to reduce the severity of their own illnesses by simply losing weight. It is easy to see a steady but identifiable improvement with health whenever even a slight amount of weight-loss is accomplished.

  • March 7, 2017

    oceanside california

    Tennant will be increasing against 23 year-aged Jesus Lopez (2-0-0) of
    Tanos Boxing in Oceanside, CA. The two unanimous decision advantages of Lopez
    came the hard way.

  • March 7, 2017

    Michell

    I’ve been exploring for a little for any high quality articles
    or weblog posts on this sort of house . Exploring
    in Yahoo I ultimately stumbled upon this web site. Studying this information So i
    am glad to exhibit that I’ve a very excellent uncanny feeling
    I came upon exactly what I needed. I such a lot certainly will
    make certain to do not forget this website and provides it a glance regularly.

  • What a information of un-ambiguity and preserveness of valuable knowledge about unpredicted emotions.

  • I think the admin of this web page is actually working hard in favor of his web page,
    because here every data is quality based information.

  • March 9, 2017

    Michelle

    It’s an amazing paragraph designed for all the internet viewers; they will get advantage from it I am sure.

  • March 9, 2017

    Sofia

    Greetings from Idaho! I’m bored to death at work so I decided to browse your blog on my iphone during
    lunch break. I enjoy the information you present here and can’t wait to take a look when I get
    home. I’m shocked at how quick your blog loaded on my
    cell phone .. I’m not even using WIFI, just 3G .. Anyhow, excellent site!

  • March 11, 2017

    Augusto de Arruda Botelho

    I’ve been browsing online more than 2 hours today, yet I
    never found any interesting article like
    yours. It is pretty worth enough for me. In my opinion, if all web owners and
    bloggers made good content as you did, the internet will be
    much more useful than ever before.

  • March 15, 2017

    weight loss diet

    Hello! Someone in my Myspace group shared this website with us so I came to
    take a look. I’m definitely loving the information. I’m bookmarking and will
    be tweeting this to my followers! Wonderful blog and great design and
    style.

  • March 16, 2017

    love bracelet men replica

    cartierlovejesduas Great, Sarah! Thanks for stopping by and pinning!
    love bracelet men replica http://www.beauty-bracelet.com/category/imitation-cartier-love-bracelet-stainless-steel/page/7

  • March 17, 2017

    Goi cuoc 4G Mobifone

    Have you ever thought about writing an ebook or guest
    authoring on other sites? I have a blog based upon on the same
    subjects you discuss and would love to have you share
    some stories/information. I know my visitors would appreciate
    your work. If you are even remotely interested, feel free to send me an e
    mail.

  • March 17, 2017

    Yasmin

    PF

  • March 18, 2017

    twitter.com

    This design iѕ wicked! Yoou ⲟbviously knkw how tօ kedep ɑ reader entertained.
    Betweedn your wit and your videos, I was almost moved tⲟ start mу own blog (ѡell,
    аlmost…HaHa!)Ꮐreat job. I гeally lovged ԝhat
    yoou ɦad to say, and mⲟre thаn that, hoԝ you presenteɗ it.
    Too cool!

  • No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    Furniture From Home

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    BRIAN WILLIS Brockstar

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    Beverly Diamonds

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    Beverly Diamonds

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    Beverly Diamonds

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    Beverly Diamonds

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    BEVERLY DIAMONDS

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    Beverly diamonds

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • March 18, 2017

    Beverly Diamonds

    No better a kook bigger than the internet from Furniture From Home, BRIAN WILLIS Brockstar, BROCKSTAR BY BRIAN NELSON WILLIS, Richard Ellenbogen – Beverly Hills Body,LuxSauna, Alan Symons, park ward, nationwide home comfort, AGS Capital and kaonsoftware and the kind. Poggi, Michael Michael Poggi Poggi’s Animal House like.Elite Client Services – Private Client Management Group TRUSTED as well. Furniture From Home Beverly Diamonds Elite Client Services – Private Client Management Group TRUSTED Mountain Business Center LLC, Rebecca Bextel

  • hello!,I like your writing very much! share we keep up a correspondence extra about
    your post on AOL? I need a specialist in this house to resolve
    my problem. Maybe that is you! Having a look forward to see you.

  • BROCKSTAR BY BRIAN NELSON WILLIS SFO probes US lender over missing millions Brockstar Finance

  • March 19, 2017

    Brockstar

    BROCKSTAR BY BRIAN NELSON WILLIS SFO probes US lender over missing millions Brockstar Finance

  • March 19, 2017

    Nancee

    Pretty nice post. I just stumbled upon your blog and wanted to mention that I have really enjoyed browsing your weblog posts.
    After all I will be subscribing in your feed and I am hoping
    you write once more very soon!

  • March 19, 2017

    Nighttuna8.blogdon.net

  • March 19, 2017

    Armenteros1750@gmail.com

    Great article. Thank you for your time in helping me get educated about this.

  • March 20, 2017

    Eliseo

    I am usually to running a blog and i actually respect your content. The article has actually peaks my interest. I am going to bookmark your web site and keep checking for brand new information.

  • March 20, 2017

    www.dsl.windham.vt.us

    It’s an amazing paragraph in support of all the web
    users; they will take benefit from it I am sure.

  • March 20, 2017

    Boyd

    Thank you for any other fantastic article. The place else may anybody get that type of info in such an ideal approach of writing? I’ve a presentation next week, and I’m on the search for such information.

  • March 20, 2017

    Deck builder Lincoln NE

    Great article. Thank you for your time in helping me understand on the matter.

  • I seriously love your website.. Pleasant
    colors & theme. Did you make this web site yourself? Please reply back as I’m trying to create my own personal blog and
    would love to find out where you got this from or what the theme is called.
    Cheers!

  • March 20, 2017

    Caitlin

    As a Newbie, I am continuously searching online for articles that
    can benefit me. Thank you

  • March 20, 2017

    laser treatments

    After I originally left a comment I appear to have clicked the -Notify me when new comments are added- checkbox and now every time a comment is added I recieve 4 emails with the same comment.

    There has to be a means you are able to remove me from that service?
    Appreciate it!

  • March 20, 2017

    laser cellulite treatment

    Do you have any video of that? I’d love to find out more
    details.

  • March 20, 2017

    Itamar Serpa Fernandes

    Ahaa, its nice dialogue concerning this article at this place at this webpage, I have read
    all that, so now me also commenting at this place.

  • I don’t unremarkably comment but I gotta tell appreciate it
    for the post on this perfect one :D.

  • March 21, 2017

    Darcy

    Great web site you have here.. It’s difficult to find quality
    writing like yours these days. I honestly appreciate individuals like you!
    Take care!!

  • March 21, 2017

    Josefina

    I read this post fully regarding the comparison of hottest and preceding technologies, it’s awesome article.

  • March 21, 2017

    Itamar Serpa Fernandes

    For most recent information you have to go to see world wide web and on web I found this site as
    a finest web page for newest updates.

  • March 21, 2017

    flawed trading

    I’m extremely impressed with your writing skills
    as well as with the layout on your weblog. Is this a paid theme or did you customize it yourself?
    Anyway keep up the nice quality writing, it is rare to see a nice blog like this
    one these days.

  • March 21, 2017

    Rhoda

    I do not even know how I ended up here, but
    I thought this post was good. I do not know who you are but definitely you’re going
    to a famous blogger if you aren’t already 😉 Cheers!

  • I read this article fully about the resemblance of most recent and preceding technologies, it’s remarkable article.

  • March 21, 2017

    details

    First off I want to say superb blog! I had a quick question which I’d
    like to ask if you do not mind. I was interested to know how you
    center yourself and clear your head prior
    to writing. I have had difficulty clearing my thoughts in getting my thoughts out.
    I truly do take pleasure in writing but it just seems like the first 10 to 15
    minutes are wasted just trying to figure out how to
    begin. Any ideas or hints? Many thanks!

  • March 22, 2017

    www.furniturefromhome.com

  • March 22, 2017

    Brandea

    I couldn’t resist commenting. Exceptionally well written!

  • March 22, 2017

    黒にんにく効果

    身体にいいと最近話題な黒にんにく。いつものにんにくはダメだけど、黒にんにくなら大丈夫という方もよく見かけます。

    そんな黒にんにくの基本的なことから根本的なことまで、情報満載に載っているのがこのサイトです。

    黒にんにくを食べる本人の体に「合う・合わない」ということがあるかもしれませんが、何よりもまず、黒にんにくの効果や効能はどういったものがあるのか…要点だけを知っておくだけでも、これからのためになると思いますよ。

  • March 22, 2017

    sales skills finding

    Thank you for the good writeup. It in fact was a amusement account it.
    Look advanced to more added agreeable from you! By the way, how can we communicate?

  • March 22, 2017

    web company

    Your way of describing the whole thing in this post is truly nice,
    every one can effortlessly know it, Thanks a lot.

  • March 22, 2017

    89Deloras

    I must say you have very interesting articles
    here. Your website can go viral. You need initial traffic only.
    How to get it? Search for; Etorofer’s strategies

  • March 23, 2017

    money transfer online-

    Piece of writing writing is also a fun, if you be acquainted with then you can write
    or else it is difficult to write.

  • March 23, 2017

    click here

    Hello there! This is kind of off topic but I
    need some guidance from an established blog. Is it very hard to set up
    your own blog? I’m not very techincal but I can figure things out
    pretty quick. I’m thinking about making my own but
    I’m not sure where to start. Do you have any points or suggestions?
    Appreciate it

  • hey there and thank you for your information – I have
    definitely picked up something new from right here.

    I did however expertise some technical issues using this website, since I experienced to
    reload the web site lots of times previous to I could get it to load
    properly. I had been wondering if your web hosting is OK?

    Not that I’m complaining, but sluggish loading instances
    times will often affect your placement in google and could damage your quality score if ads and marketing with Adwords.

    Well I’m adding this RSS to my email and could look out for much more of your respective interesting content.
    Make sure you update this again very soon.

  • March 23, 2017

    antibiotics called

    What’s up to every body, it’s my first pay a visit of this weblog;
    this webpage includes remarkable and in fact excellent stuff in favor of readers.

  • March 23, 2017

    bought meat contains

    I have learn some excellent stuff here. Certainly value bookmarking for revisiting.
    I surprise how much effort you set to make this type of great informative website.

  • March 23, 2017

    print a poster

    I do enjoy the manner in which you have framed this particular issue and it does indeed offer me personally some fodder for consideration. Nevertheless, through everything that I have personally seen, I simply wish when other feed-back pile on that people continue to be on point and in no way get started upon a soap box of some other news of the day. All the same, thank you for this exceptional point and while I can not concur with the idea in totality, I respect your standpoint.

  • March 23, 2017

    www.youtube.com

    Αt this moment Ӏ am ready tоo ⅾߋ my breakfast, οnce
    having mʏ breakfast comjing оver аgain to reɑⅾ
    furthᥱr news.

  • March 24, 2017

    Raina

    Wonderful work! That is the type of info that are meant to be
    shared across the net. Disgrace on the search engines for
    now not positioning this post higher! Come on over
    and seek advice from my website . Thank you =)

  • March 24, 2017

    Rickey

    Great beat ! I would like to apprentice while
    you amend your site, how can i subscribe for a
    blog site? The account helped me a acceptable deal.
    I had been tiny bit acquainted of this your broadcast
    offered bright clear concept

  • March 24, 2017

    Aurora

    Hi Dear, are you really visiting this website daily, if
    so after that you will definitely get nice experience.

  • March 24, 2017

    Theresa

    What’s up i am kavin, its my first time
    to commenting anyplace, when i read this article i thought i could also make comment due to this good
    post.

  • March 25, 2017

    Hassie

    Awsome info and straight to the point. I don’t know if this is in fact the best place to ask but do you people have any thoughts on where to get some professional writers?
    Thanks in advance 🙂

  • The downtown shopping district is reflective of 50’s-style structure,
    financing it a sentimental classic California flair.

Leave a Reply