Beyond Security Theater

Sam Bowne
Sam BowneInstructor at CCSF
Beyond Cryptography
Theater
Hacker Dojo, Santa Clara California
November 11, 2018
Sam Bowne
PhD, CISSP
like, really smart
Me
All materials freely available
at samsclass.info
Security Theater
Beyond Security Theater
Cisco VPN 

"Encrypted" Password
Public Exposure
Not So Encrypted
Kaiser Permanente
•I found their Cisco password this way
•Disclosure was difficult, but I managed it
privately
•A journalist's consultant told me it didn't
matter, because
"that password is not a security boundary"
Cryptography Theater
PROTECTED BY
ATTACK KITTENS
Cryptography Theater
•Obfuscation
•Makes data difficult to read
•But doesn't prevent a serious attacker from
reading it
Windows Registry
USERASSIST
• Records programs you launch on Windows
• Protects your privacy by storing them in an
obfuscated form
ROT13
• Puebzr
• Chrome
• Q:frghc64.rkr
• D:setup64.exe
Android Apps
TD Ameritrade App
TD Ameritrade App
• Puts password in syslog
• Visible to all apps on the device
• (Fixed in later versions)
Mayo Clinic
Medical Transport
Mayo Clinic Medical Transport
• Pull app from phone with adb
• Unpack with apktool
Mayo Clinic Medical Transport
• grep for secretpassword
• Disclosure
• I notified the developer about this in June
of 2015. He told me to get lost.
GenieMd
Current versions on Nov 9, 2018
GenieMd
• Does not validate 

TLS certificates
• Allows MITM attack
GenieMd
GenieMd
• Notified by CERT in 2014, and by
me in 2015
FTC Lawsuit Settlement
Passwords on a Phone
Persistent Login
•Users remain logged in even after shutting off
their phone
•How does the app remember who you are?
Target == GOOD
Target AU Android App
User Login
Server Response
Random Number, stored in a cookie
THIS IS THE RIGHT WAY
Staples == BAD
Tested in Jan 2017
Locally Stored Password
• Right away this shows a problem
• WHY store the password?
<string name="encryptedPassword">
CT9SVzhhRaufBzCvmwENWQ==
</string>
1. Best way: Don't. Use a cookie
2. Use Android KeyChain
3. Encrypt with with a public key
• Private key is kept secret on a server
4. Encrypt with with a private key
• Private key is "hidden" on the phone (under the mat)
5. Store data unencrypted on the phone
Special Password
• aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaA123
• 32 identical characters at beginning
<string name="encryptedPassword">
5V/uOkjK/Pxnb8yo7OdXzuVf7jpIyvz8Z2/
MqOznV84Chyt5lFv9LDpXXmJq9fUx
</string>
Decode
p = '5V/uOkjK/Pxnb8yo7OdXzuVf7jpIyvz8Z2/
MqOznV84Chyt5lFv9LDpXXmJq9fUx'
>>> p.decode("base64").encode("hex")
'e55fee3a48cafcfc676fcca8ece757cee55fee3a4
8cafcfc676fcca8ece757ce02872b79945bfd2c3a5
75e626af5f531'
e55fee3a48cafcfc676fcca8ece757ce
e55fee3a48cafcfc676fcca8ece757ce
02872b79945bfd2c3a575e626af5f531
Read Smali Code
Constructing the Key
Final Key
Encryption
Test
Notification
• Notified Jan 2, 2017
• Automated response said it would be fixed
• No response to follow-up email
• April 13 -- Staples became homework
Beyond Security Theater
Notification
• Fixed by May 9, 2017
Beyond Security Theater
Plaintext Password Storage
Plaintext Login
Beyond Security Theater
Broken SSL
A Feature, Not a Bug
Password Stored with
Reversible Encryption
Home Depot
Locally stored password is encrypted
Unpack APK
Beyond Security Theater
Beyond Security Theater
Beyond Security Theater
Salt -> Key
Complete Decryption
Beyond Security Theater
Beyond Security Theater
Kroger
Kroger
Safeway
Safeway
Walgreens
Walgreens
Multiple Vulnerabilities
Fixed
Analysis of Stolen Data Dumped by
TEAMGHOSTSHELL on Aug 25, 2012
Beyond Security Theater
Beyond Security Theater
Password Storage:

Awful Beyond Belief
Plaintext, obvious, all the same
Plaintext Passwords, Easily Guessed
Beyond Security Theater
Sparklan Passwords
Beforward Transactions with PII
Plaintext Passwords
Password Storage:

BASE64
Obfuscated, not hashed
Beforward.jp
BASE64 Encoding
Password Storage:

Unsalted MD5 or SHA-1
Real hashing, but very easy to
crack
MIT – MD5 Password Hashes
Beyond Security Theater
Beyond Security Theater
MySQL323 Password Hashes
Cracking Hashes with Cain
SHA-1 Hash
Cracked!
MySQL 5 Password Hashes
Wordpress Password Hashes
Relative Space
Cracked!
Beyond Security Theater
Beyond Security Theater
Password Hashing Algorithms
Beyond Security Theater
The Right Way
Basic Logic Errors
San Francisco
Parking Meters
Beyond Security Theater
Beyond Security Theater
Wut?
https://www.wired.com/2009/07/parking-meters/
https://www.pcworld.com/article/169376/meter_hackers.html
Encrypted Storage
•https://www.theguardian.com/politics/2016/dec/21/at-
least-1000-government-laptops-and-flash-drives-reported-
missing-since-2015
Beyond Security Theater
• https://www.syss.de/fileadmin/dokumente/Publikationen/2009/
SySS_Cracks_SanDisk_USB_Flash_Drive.pdf
"Secure cryptographic algorithms, like AES... are used in an insecure
way."
https://www.theregister.co.uk/2015/10/20/western_digital_bad_hard_drive_encryption/
• https://www.engadget.com/2018/11/06/microsofts-bitlocker-
compromised-by-bad-ssd-encryption/
• https://www.theregister.co.uk/2018/11/05/busted_ssd_encryption/
Math
Learn It
• Management Review
• Do you need this data?
• Is it encrypted?
• What algorithm?
• Where is the key?
All materials freely available at samsclass.info
1 of 111

Recommended

Eset smart security 8 by
Eset smart security 8Eset smart security 8
Eset smart security 8IT Tech Post
39 views9 slides
Why we are getting better at catching nation-state sponsored malware by
Why we are getting better at catching nation-state sponsored malwareWhy we are getting better at catching nation-state sponsored malware
Why we are getting better at catching nation-state sponsored malwarePositive Hack Days
739 views23 slides
อาชญากรรมคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง by
อาชญากรรมคอมพิวเตอร์และกฎหมายที่เกี่ยวข้องอาชญากรรมคอมพิวเตอร์และกฎหมายที่เกี่ยวข้อง
อาชญากรรมคอมพิวเตอร์และกฎหมายที่เกี่ยวข้องSupaporn21
193 views15 slides
Hacking Windows 95 #33c3 by
Hacking Windows 95 #33c3Hacking Windows 95 #33c3
Hacking Windows 95 #33c3Zoltan Balazs
605 views9 slides
Web Application Detection with SNORT by
Web Application Detection with SNORTWeb Application Detection with SNORT
Web Application Detection with SNORTSuwitcha Musijaral CISSP,CISA,GWAPT,SNORTCP
109 views31 slides
Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условиях by
Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условияхSergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условиях
Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условияхDefconRussia
1.4K views36 slides

More Related Content

What's hot

How To Build The Perfect Backtrack 4 Usb Drive by
How To Build The Perfect Backtrack 4 Usb DriveHow To Build The Perfect Backtrack 4 Usb Drive
How To Build The Perfect Backtrack 4 Usb Drivekriggins
2.3K views94 slides
Ransomware - what is it, how to protect against it by
Ransomware - what is it, how to protect against itRansomware - what is it, how to protect against it
Ransomware - what is it, how to protect against itZoltan Balazs
2.2K views40 slides
Caleb Xss Dating Website by
Caleb   Xss   Dating WebsiteCaleb   Xss   Dating Website
Caleb Xss Dating WebsiteCaleb Sima
446 views20 slides
Test & Tea : ITSEC testing, manual vs automated by
Test & Tea : ITSEC testing, manual vs automatedTest & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automatedZoltan Balazs
447 views17 slides
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke by
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeEC-Council
823 views23 slides
How to hide your browser 0-days by
How to hide your browser 0-daysHow to hide your browser 0-days
How to hide your browser 0-daysZoltan Balazs
2.3K views49 slides

What's hot(19)

How To Build The Perfect Backtrack 4 Usb Drive by kriggins
How To Build The Perfect Backtrack 4 Usb DriveHow To Build The Perfect Backtrack 4 Usb Drive
How To Build The Perfect Backtrack 4 Usb Drive
kriggins2.3K views
Ransomware - what is it, how to protect against it by Zoltan Balazs
Ransomware - what is it, how to protect against itRansomware - what is it, how to protect against it
Ransomware - what is it, how to protect against it
Zoltan Balazs2.2K views
Caleb Xss Dating Website by Caleb Sima
Caleb   Xss   Dating WebsiteCaleb   Xss   Dating Website
Caleb Xss Dating Website
Caleb Sima446 views
Test & Tea : ITSEC testing, manual vs automated by Zoltan Balazs
Test & Tea : ITSEC testing, manual vs automatedTest & Tea : ITSEC testing, manual vs automated
Test & Tea : ITSEC testing, manual vs automated
Zoltan Balazs447 views
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke by EC-Council
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
EC-Council823 views
How to hide your browser 0-days by Zoltan Balazs
How to hide your browser 0-daysHow to hide your browser 0-days
How to hide your browser 0-days
Zoltan Balazs2.3K views
MMW Anti-Sandbox Techniques by Cyphort
MMW Anti-Sandbox TechniquesMMW Anti-Sandbox Techniques
MMW Anti-Sandbox Techniques
Cyphort3K views
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A... by Mazin Ahmed
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Mazin Ahmed651 views
Bug Bounty - Play For Money by Shubham Gupta
Bug Bounty - Play For MoneyBug Bounty - Play For Money
Bug Bounty - Play For Money
Shubham Gupta1.8K views
A tale of a rouge router firmware by Bijay Senihang
A tale of a rouge router firmwareA tale of a rouge router firmware
A tale of a rouge router firmware
Bijay Senihang635 views
Sandbox detection: leak, abuse, test - Hacktivity 2015 by Zoltan Balazs
Sandbox detection: leak, abuse, test - Hacktivity 2015Sandbox detection: leak, abuse, test - Hacktivity 2015
Sandbox detection: leak, abuse, test - Hacktivity 2015
Zoltan Balazs3.7K views
Defend your organisation from Cyber Attacks by begmohsin
Defend your organisation from Cyber AttacksDefend your organisation from Cyber Attacks
Defend your organisation from Cyber Attacks
begmohsin23 views
NIC 2017 - Attack and detection in Windows Environments by Oddvar Moe
NIC 2017 - Attack and detection in Windows EnvironmentsNIC 2017 - Attack and detection in Windows Environments
NIC 2017 - Attack and detection in Windows Environments
Oddvar Moe669 views
Listar rpm installados_linux by James Jara
Listar rpm installados_linuxListar rpm installados_linux
Listar rpm installados_linux
James Jara187 views
Tower defense for hackers: Layered (in-)security for microcontrollers by Milosch Meriac
Tower defense for hackers: Layered (in-)security for microcontrollersTower defense for hackers: Layered (in-)security for microcontrollers
Tower defense for hackers: Layered (in-)security for microcontrollers
Milosch Meriac388 views
העתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היום by Ronny Orbach
העתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היוםהעתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היום
העתיד כבר כאן - שימוש בטכנולוגיות החדשות כבר היום
Ronny Orbach1.9K views
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards by SecuRing
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standardsWebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
WebApps vs Blockchain dApps (SmartContracts): tools, vulns and standards
SecuRing290 views

Similar to Beyond Security Theater

Beyond Security Theater -- With a CTF by
Beyond Security Theater -- With a CTFBeyond Security Theater -- With a CTF
Beyond Security Theater -- With a CTFSam Bowne
268 views122 slides
[OWASP Poland Day] Saving private token by
[OWASP Poland Day] Saving private token[OWASP Poland Day] Saving private token
[OWASP Poland Day] Saving private tokenOWASP
332 views23 slides
BSides London 2015 - Proprietary network protocols - risky business on the wire. by
BSides London 2015 - Proprietary network protocols - risky business on the wire.BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.Jakub Kałużny
395 views79 slides
Harbin clinic iot-mobile-no-vid by
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidErnest Staats
515 views38 slides
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014 by
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014Jakub Kałużny
346 views49 slides
Defcon Crypto Village - OPSEC Concerns in Using Crypto by
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using CryptoJohn Bambenek
1.5K views40 slides

Similar to Beyond Security Theater(20)

Beyond Security Theater -- With a CTF by Sam Bowne
Beyond Security Theater -- With a CTFBeyond Security Theater -- With a CTF
Beyond Security Theater -- With a CTF
Sam Bowne268 views
[OWASP Poland Day] Saving private token by OWASP
[OWASP Poland Day] Saving private token[OWASP Poland Day] Saving private token
[OWASP Poland Day] Saving private token
OWASP332 views
BSides London 2015 - Proprietary network protocols - risky business on the wire. by Jakub Kałużny
BSides London 2015 - Proprietary network protocols - risky business on the wire.BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.
Jakub Kałużny395 views
Harbin clinic iot-mobile-no-vid by Ernest Staats
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
Ernest Staats515 views
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014 by Jakub Kałużny
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Jakub Kałużny346 views
Defcon Crypto Village - OPSEC Concerns in Using Crypto by John Bambenek
Defcon Crypto Village - OPSEC Concerns in Using CryptoDefcon Crypto Village - OPSEC Concerns in Using Crypto
Defcon Crypto Village - OPSEC Concerns in Using Crypto
John Bambenek1.5K views
BSides Hannover 2015 - Shell on Wheels by infodox
BSides Hannover 2015 - Shell on WheelsBSides Hannover 2015 - Shell on Wheels
BSides Hannover 2015 - Shell on Wheels
infodox2.4K views
Security challenges for IoT by WSO2
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
WSO23.4K views
Security Training: #4 Development: Typical Security Issues by Yulian Slobodyan
Security Training: #4 Development: Typical Security IssuesSecurity Training: #4 Development: Typical Security Issues
Security Training: #4 Development: Typical Security Issues
Yulian Slobodyan4.6K views
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017 by FRSecure
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
FRSecure829 views
Bsidesnova- Pentesting Methodology - Making bits less complicated by Octavio Paguaga
Bsidesnova- Pentesting Methodology - Making bits less complicatedBsidesnova- Pentesting Methodology - Making bits less complicated
Bsidesnova- Pentesting Methodology - Making bits less complicated
Octavio Paguaga238 views
Personal Internet Security System by Matthew Bricker
Personal Internet Security SystemPersonal Internet Security System
Personal Internet Security System
Matthew Bricker306 views
LISA18 - How to be your Security Team's Best Friend by EmilyGladstoneCole
LISA18 - How to be your Security Team's Best FriendLISA18 - How to be your Security Team's Best Friend
LISA18 - How to be your Security Team's Best Friend
EmilyGladstoneCole250 views
Peter Gutmann Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015 by CSO_Presentations
Peter Gutmann Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015Peter Gutmann Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Peter Gutmann Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
CSO_Presentations743 views
Network Security Presentation by Allan Pratt MBA
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA80.2K views

More from Sam Bowne

Cyberwar by
CyberwarCyberwar
CyberwarSam Bowne
14 views22 slides
3: DNS vulnerabilities by
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities Sam Bowne
40 views40 slides
8. Software Development Security by
8. Software Development Security8. Software Development Security
8. Software Development SecuritySam Bowne
22 views85 slides
4 Mapping the Application by
4 Mapping the Application4 Mapping the Application
4 Mapping the ApplicationSam Bowne
62 views88 slides
3. Attacking iOS Applications (Part 2) by
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)Sam Bowne
33 views45 slides
12 Elliptic Curves by
12 Elliptic Curves12 Elliptic Curves
12 Elliptic CurvesSam Bowne
51 views50 slides

More from Sam Bowne(20)

3: DNS vulnerabilities by Sam Bowne
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
Sam Bowne40 views
8. Software Development Security by Sam Bowne
8. Software Development Security8. Software Development Security
8. Software Development Security
Sam Bowne22 views
4 Mapping the Application by Sam Bowne
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
Sam Bowne62 views
3. Attacking iOS Applications (Part 2) by Sam Bowne
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
Sam Bowne33 views
12 Elliptic Curves by Sam Bowne
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
Sam Bowne51 views
11. Diffie-Hellman by Sam Bowne
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
Sam Bowne58 views
2a Analyzing iOS Apps Part 1 by Sam Bowne
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
Sam Bowne41 views
9 Writing Secure Android Applications by Sam Bowne
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
Sam Bowne31 views
12 Investigating Windows Systems (Part 2 of 3) by Sam Bowne
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
Sam Bowne30 views
12 Investigating Windows Systems (Part 1 of 3 by Sam Bowne
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
Sam Bowne59 views
9. Hard Problems by Sam Bowne
9. Hard Problems9. Hard Problems
9. Hard Problems
Sam Bowne43 views
8 Android Implementation Issues (Part 1) by Sam Bowne
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
Sam Bowne23 views
11 Analysis Methodology by Sam Bowne
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
Sam Bowne12 views
8. Authenticated Encryption by Sam Bowne
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
Sam Bowne70 views
7. Attacking Android Applications (Part 2) by Sam Bowne
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
Sam Bowne35 views
7. Attacking Android Applications (Part 1) by Sam Bowne
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
Sam Bowne26 views
5. Stream Ciphers by Sam Bowne
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
Sam Bowne103 views
6 Scope & 7 Live Data Collection by Sam Bowne
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
Sam Bowne120 views

Recently uploaded

11.30.23 Poverty and Inequality in America.pptx by
11.30.23 Poverty and Inequality in America.pptx11.30.23 Poverty and Inequality in America.pptx
11.30.23 Poverty and Inequality in America.pptxmary850239
144 views33 slides
Narration lesson plan.docx by
Narration lesson plan.docxNarration lesson plan.docx
Narration lesson plan.docxTARIQ KHAN
104 views11 slides
Structure and Functions of Cell.pdf by
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdfNithya Murugan
368 views10 slides
Classification of crude drugs.pptx by
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptxGayatriPatra14
77 views13 slides
Ch. 7 Political Participation and Elections.pptx by
Ch. 7 Political Participation and Elections.pptxCh. 7 Political Participation and Elections.pptx
Ch. 7 Political Participation and Elections.pptxRommel Regala
72 views11 slides
Create a Structure in VBNet.pptx by
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptxBreach_P
70 views8 slides

Recently uploaded(20)

11.30.23 Poverty and Inequality in America.pptx by mary850239
11.30.23 Poverty and Inequality in America.pptx11.30.23 Poverty and Inequality in America.pptx
11.30.23 Poverty and Inequality in America.pptx
mary850239144 views
Narration lesson plan.docx by TARIQ KHAN
Narration lesson plan.docxNarration lesson plan.docx
Narration lesson plan.docx
TARIQ KHAN104 views
Structure and Functions of Cell.pdf by Nithya Murugan
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan368 views
Classification of crude drugs.pptx by GayatriPatra14
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptx
GayatriPatra1477 views
Ch. 7 Political Participation and Elections.pptx by Rommel Regala
Ch. 7 Political Participation and Elections.pptxCh. 7 Political Participation and Elections.pptx
Ch. 7 Political Participation and Elections.pptx
Rommel Regala72 views
Create a Structure in VBNet.pptx by Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P70 views
Class 10 English notes 23-24.pptx by TARIQ KHAN
Class 10 English notes 23-24.pptxClass 10 English notes 23-24.pptx
Class 10 English notes 23-24.pptx
TARIQ KHAN107 views
Education and Diversity.pptx by DrHafizKosar
Education and Diversity.pptxEducation and Diversity.pptx
Education and Diversity.pptx
DrHafizKosar118 views
Solar System and Galaxies.pptx by DrHafizKosar
Solar System and Galaxies.pptxSolar System and Galaxies.pptx
Solar System and Galaxies.pptx
DrHafizKosar85 views
Drama KS5 Breakdown by WestHatch
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 Breakdown
WestHatch71 views
The basics - information, data, technology and systems.pdf by JonathanCovena1
The basics - information, data, technology and systems.pdfThe basics - information, data, technology and systems.pdf
The basics - information, data, technology and systems.pdf
JonathanCovena188 views
Use of Probiotics in Aquaculture.pptx by AKSHAY MANDAL
Use of Probiotics in Aquaculture.pptxUse of Probiotics in Aquaculture.pptx
Use of Probiotics in Aquaculture.pptx
AKSHAY MANDAL89 views
Narration ppt.pptx by TARIQ KHAN
Narration  ppt.pptxNarration  ppt.pptx
Narration ppt.pptx
TARIQ KHAN119 views
Scope of Biochemistry.pptx by shoba shoba
Scope of Biochemistry.pptxScope of Biochemistry.pptx
Scope of Biochemistry.pptx
shoba shoba124 views
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx by ISSIP
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxEIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
ISSIP317 views
Sociology KS5 by WestHatch
Sociology KS5Sociology KS5
Sociology KS5
WestHatch64 views

Beyond Security Theater