Quotulatiousness

September 3, 2011

US troops allegedly handcuffed and executed children in 2006

Filed under: Middle East, Military, USA — Tags: , , , , , — Nicholas @ 11:05

Wikileaks may have been sitting on a particularly disturbing report:

A U.S. diplomatic cable made public by WikiLeaks suggests that U.S. troops executed at least 10 Iraqi civilians, including a woman in her 70s and a 5-month-old infant, then called in an airstrike to destroy the evidence, during a controversial 2006 incident in the central Iraqi town of Ishaqi.

The unclassified cable, which was posted on WikiLeaks’ website last week, contained questions from a United Nations investigator about the incident, which had angered local Iraqi officials, who demanded some kind of action from their government. U.S. officials denied at the time that anything inappropriate had occurred.

But Philip Alston, the UN’s special rapporteur on extrajudicial, summary or arbitrary executions, said in a communication to American officials dated 12 days after the March 15, 2006, incident that autopsies performed in the Iraqi city of Tikrit showed that all the dead had been handcuffed and shot in the head. Among the dead were four women and five children. The children were all 5 years old or younger.

Claims of American troops committing atrocities were very common, but few of them appear to have been anything other than Al Qaeda propaganda exercises. This may well be another case of this, but the initial investigation implied otherwise:

The original incident report was signed by an Iraqi police colonel and made even more noteworthy because U.S.-trained Iraqi police, including Brig. Gen. Issa al Juboori, who led the coordination centre, were willing to speak about the investigation on the record even though it was critical of American forces.

Throughout the early investigation, U.S. military spokesmen said that an Al Qaeda in Iraq suspect had been seized from a first-floor room after a fierce fight that had left the house he was hiding in a pile of rubble.

But the diplomatic cable provides a different sequence of events and lends credence to townspeople’s claims that American forces destroyed the house after its residents had been shot.

June 28, 2011

Government attempts to censor and control the internet spawn opposition

Filed under: Government, Liberty, Media, Technology — Tags: , , , , , , — Nicholas @ 12:06

Loz Kaye makes the point that the recent ratcheting-up of freelance subversion of government and corporate web sites and online communities is a direct reaction to attempts to control the internet:

LulzSec wasn’t an isolated or unique phenomenon. People with passionate beliefs have been using new technological tools to effect change out of a sense of powerlessness. In the last year, I’ve watched 38 Degrees using the strength of association online to change government policy, WikiLeaks force transparency on those who’d rather run from it, even the amorphous mass that is Anonymous taking a stand on whatever issue they feel deserves their attention.

These tools are now themselves under attack. Lord Mandelson’s last gift to us, the Digital Economy Act, is just one of a raft of “three strikes laws” worldwide that threaten to cut off households from the web. Buried in the coalition’s Prevent strategy is the assertion that “internet filtering across the public estate is essential”. Nor is it solely a British issue; Nicolas Sarkozy called for global online governance at the eG8 in his attempt to civilise the “wild west” of the web.

We’re starting to see what this civilising process entails. Open Rights Group revealed that Ed Vaizey and lobbyists held a secret meeting discussing the future of web blocking powers. There was no public oversight and no one asked the net natives. Vaizey has relented a little via Twitter, consenting to open up the discussion — the Pirate Party and I welcome that invitation. It will take more, however, than getting a few NGOs around a table to ease the real sense of anger poisoning the online community.

We’re quickly coming up on a time when we’ll need to enshrine access to the internet (or equivalent data sources) as a formal constitutional right. If we don’t, we will always have this urge to control and to censor on the part of petty authoritarians and bureaucrats.

June 17, 2011

DARPA’s “National Cyber Range” on schedule

Filed under: Government, Technology, USA — Tags: , , , , — Nicholas @ 10:07

In order to determine ways to fend off or prevent attacks on the internet, DARPA is hoping to have their scale model of the internet ready sometime next year for testing:

The US defence agency that invented the forerunner to the internet is working on a “virtual firing range” intended as a replica of the real internet so scientists can mimic international cyberwars to test their defences.

Called the National Cyber Range, the system will be ready by next year and will also help the Pentagon to train its own hackers and refine their skills to guard US information systems, both military and domestic.

The move marks another rise in the temperature of the online battlefield. The US and Israel are believed to have collaborated on a sophisticated piece of malware called Stuxnet that targeted computers controlling Iran’s nuclear centrifuge scheme. Government-authorised hackers in China, meanwhile, are suspected to have been behind a number of attacks on organisations including the International Monetary Fund, French government and Google.

[. . .]

Darpa is also working on other plans to advance the US’s cyber defences. A program known as Crash — for Clean-slate design of Resilient, Adaptive, Secure Hosts — seeks to design computer systems that evolve over time, making them harder for an attacker to target.

The Cyber Insider Threat program, or Cinder, would help monitor military networks for threats from within by improving detection of threatening behaviour from people authorised to use them. The problem has loomed large since Bradley Manning allegedly passed confidential state department documents to WikiLeaks, the anti-secrecy website.

Another is a Cyber Genome, aimed at automating the discovery, identification and characterisation of malicious code. That could help figure out who was behind a cyber-strike.

May 3, 2011

Michael Geist on what the Conservative majority means for digital policies

In short, he sees it as a mixed bag:

For example, a majority may pave the way for opening up the Canadian telecom market, which would be a welcome change. The Conservatives have focused consistently on improving Canadian competition and opening the market is the right place to start to address both Internet access (including UBB) and wireless services. The Conservatives have a chance to jump on some other issues such as following through on the digital economy strategy and ending the Election Act rules that resulted in the Twitter ban last night. They are also solidly against a number of really bad proposals — an iPod tax, new regulation of Internet video providers such as Netflix — and their majority government should put an end to those issues for the foreseeable future.

On copyright and privacy, it is more of a mixed bag.

The copyright bill is — as I described at its introduction last June — flawed but fixable. I realize that it may be reintroduced unchanged (the Wikileaks cables are not encouraging), but with the strength of a majority, there is also the strength to modify some of the provisions including the digital lock rules. Clement spoke regularly about the willingness to consider amendments and the Conservative MPs on the Bill C-32 committee were very strong. If the U.S. has exceptions for unlocking DVDs and a full fair use provision, surely Canada can too.

The Conservatives are a good news, bad news story on privacy. A fairly good privacy bill died on the order paper that will hopefully be reintroduced as it included mandatory security breach notification requirements. There will be a PIPEDA review this year and the prospect of tougher penalties for privacy violations is certainly possible. Much more troubling is the lawful access package which raises major civil liberties concerns and could be placed on the fast track.

April 19, 2011

WikiLeaks exposes Chinese espionage unit

Filed under: China, Military, Technology, USA — Tags: , , — Nicholas @ 09:15

Strategy Page points out that it’s not just American and allied secrets that have been exposed by WikiLeaks:

Chinese Cyber War units have been plundering foreign government and military online data for over five years now. But thanks to Wikileaks, and several other sources, the identity and location of the main Chinese Cyber War operation is now known. The Chinese Chengdu Province First Technical Reconnaissance Bureau (1st TRB) is a Chinese Army electronic warfare unit located in central China (Chengdu), and is the most frequent source of hacking attacks traced back to their source. The servers used by the 1st TRB came online over five years ago, and are still used. The Chinese government flatly refuses to even discuss the growing pile of evidence regarding operations like the 1st TRB.

The 1st TRB is part of the Chinese Army’s Third Department, which is responsible for all sorts of electronic eavesdropping. But given the praise showered on the 1st TRB, a lot of valuable data has apparently been brought to Chengdu, and then distributed to the appropriate industrial, diplomatic or military operations. The hacking operation has been so successful, that it has obtained more staff and technical resources. As a result, in the last five years, detected hacking attempts on U.S. government and corporate networks has increased by more than six times. Most of these hacks appear to be coming from China. Not all the hacking is done by 1st TRB personnel. A lot of it appears to be the work of Chinese freelancers, often working for pay, but sometimes just to “serve the motherland.”

Reuters has a special report on “Byzantine Hades”:

According to U.S. investigators, China has stolen terabytes of sensitive data — from usernames and passwords for State Department computers to designs for multi-billion dollar weapons systems. And Chinese hackers show no signs of letting up. “The attacks coming out of China are not only continuing, they are accelerating,” says Alan Paller, director of research at information-security training group SANS Institute in Washington, DC.

Secret U.S. State Department cables, obtained by WikiLeaks and made available to Reuters by a third party, trace systems breaches — colorfully code-named “Byzantine Hades” by U.S. investigators — to the Chinese military. An April 2009 cable even pinpoints the attacks to a specific unit of China’s People’s Liberation Army.

Privately, U.S. officials have long suspected that the Chinese government and in particular the military was behind the cyber-attacks. What was never disclosed publicly, until now, was evidence.

U.S. efforts to halt Byzantine Hades hacks are ongoing, according to four sources familiar with investigations. In the April 2009 cable, officials in the State Department’s Cyber Threat Analysis Division noted that several Chinese-registered Web sites were “involved in Byzantine Hades intrusion activity in 2006.”

April 18, 2011

Happy thought of the day

Filed under: Law, Liberty, Media, Technology, USA — Tags: , , , , — Nicholas @ 15:43

Darlene Storm offers this cheery little nugget of information (from a post back in December):

Dear Americans: If you are not “authorized” personnel, but you have read, written about, commented upon, tweeted, spread links by “liking” on Facebook, shared by email, or otherwise discussed “classified” information disclosed from WikiLeaks, you could be implicated for crimes under the U.S. Espionage Act — or so warns a legal expert who said the U.S. Espionage Act could make “felons of us all.”

As the U.S. Justice Department works on a legal case against WikiLeak’s Julian Assange for his role in helping publish 250,000 classified U.S. diplomatic cables, authorities are leaning toward charging Assange with spying under the Espionage Act of 1917. Legal experts warn that if there is an indictment under the Espionage Act, then any citizen who has discussed or accessed “classified” information can be arrested on “national security” grounds.

H/T to Bruce Schneier for the link.

April 5, 2011

The Wikileaks view of Indian politics

Filed under: Government, India, Media, Politics — Tags: , — Nicholas @ 09:03

Pankaj Mishra talks about the ongoing release of information on India and the political and mercantilist string-pullers who infest every government function:

Food prices become intolerable for the poor. Protests against corruption paralyse the national parliament for weeks on end. Then a series of American diplomatic cables released by WikiLeaks exposes a brazenly mendacious and venal ruling class; the head of government adored by foreign business people and journalists loses his moral authority, turning into a lame duck.

This sounds like Tunisia or Egypt before their uprisings, countries long deprived of representative politics and pillaged by the local agents of neoliberal capitalism. But it is India, where in recent days WikiLeaks has highlighted how national democratic institutions are no defence against the rapacity and selfishness of globalised elites.

Most of the cables — being published by the Hindu, the country’s most respected newspaper in English — offer nothing new to those who haven’t drunk the “Rising India” Kool-Aid vended by business people, politicians and their journalist groupies. The evidence of economic liberalisation providing cover for a wholesale plunder of the country’s resources has been steadily mounting over recent months. The loss in particular of a staggering $39bn in the government’s sale of the telecom spectrum has alerted many Indians to the corrupt nexuses between corporate and political power.

January 26, 2011

Is Julian Assange a modern Senator Joe McCarthy?

Filed under: Law, Liberty, Media, Politics — Tags: , , , , — Nicholas @ 12:42

Jim Goad asks if the actions of WikiLeaks are the modern-day equivalent of Senator Joe McCarthy’s anti-communist crusade:

Upon superficial inspection, still-living superstar hacker Julian Assange and long-dead commie-stalker Joseph McCarthy seem like natural-born enemies and political polar opposites. Technically, the Arctic and Antarctica are polar opposites, too, but are they really that different?

Comparing anyone to infamous anti-communist zealot Joseph McCarthy, as he is popularly understood in pop culture, is to accuse them of being a torch-carrying megalomaniac with a sociopathic disregard for the damage wrought by their ruthless, Spanish Inquisition-style paranoid purges, persecutions, pogroms, and perennial pickin’ on people. “McCarthyism” is considered a smear because we all must admit it was a shameful moment in American history when some upstart cheesehead Senator dared to suggest the American government was being infiltrated with communist sympathizers. Blot from your minds forever the fact that certain Soviet “cables” decrypted after McCarthy’s death seem to have at least partially vindicated him, and let us never teach in our public schools that communist governments murdered at least a hundred million human beings.

H/T to Ilkka for the link.

January 18, 2011

Singapore diplomats caught speaking very undiplomatically

Filed under: Asia, China, India, Japan — Tags: , , , , — Nicholas @ 08:15

Sometimes, the information in the various WikiLeaks releases shocks and surprises. Other times, it merely confirms common beliefs:

Singaporean officials are putting up a brave face after highly embarrassing Wikileaks’ disclosures. They have rubbished the leaked cables as “cocktail talk” and accused the media of blowing the casual remarks out of context. Singapore-specific cables have shown that diplomats and officials of this tiny but prosperous city state have scant regard for leaders of neighboring countries and have insulted their neighbors with disparaging remarks.

[. . .]

Tommy Koh, a senior diplomat of Singapore, took pot shots at Japan and said that Japan was “the big fat loser” in the larger strategic matrix as China’s relations with ASEAN nations continued to improve. This is not insulting had Koh stopped at that only. However, the Singaporean diplomat blabbed on and blamed Japan’s “stupidity, bad leadership, and lack of vision.” Koh dragged in the Indians as well and called India “stupid” for being “half-in, half-out” of ASEAN.

Another leaked cable quotes Peter Ho, Singapore’s former Minister of Foreign Affairs and Permanent Secretary, telling a U.S. official in March 2008 that Malaysian Prime Minister Najib Razak was an “opportunist”. Another Singapore diplomat remarked senior colleague in Singapore’s foreign ministry, Bilahari Kausikan, told US Deputy Secretary of Defence for South that ousted Thailand leader Thaksin Shinawatra was ‘corrupt’, along with “everyone else, including the opposition.”

The art of diplomacy is saying in public what your government wants everyone to believe, while saying to your government what is really happening.

December 15, 2010

Scott Adams on Sweden

Filed under: Europe, Humour, Law — Tags: , , — Nicholas @ 07:33

Michael O’Connor Clarke linked to Scott Adams’ thoughts on Sweden:

I am always amused by the strange impact of unintended consequences. Julian Assange simply wanted to release some embarrassing information, have hot sex with a Swedish babe then have hot sex with an acquaintance of that same babe one day later. That’s just one example of why the Swedish language has 400 words that all mean “and your cute friend is next.”

But things didn’t turn out as Assange hoped. The unintended consequence of his actions is that he managed to make Sweden look like a country that’s governed by congenital idiots and populated with nothing but crazy sluts and lawyers. And don’t get me started about the quality of their condoms.

To be fair, I don’t know if Assange’s alleged broken condom is because the product was defective. We have good evidence that Assange has the world’s biggest set of nuts, so assuming some degree of proportionality, he’d put a strain on any brand of condom that didn’t have rebar ribs.

Assange had a lot of help making Sweden look like the last place on Earth that you would want to take your penis. [. . .]

If you haven’t read any background about the so-called rape charges against Assange, you really should. Apparently Swedish laws are unique. If you have a penis, you’re half a rapist before you even get through customs. And if your condom breaks, that’s jail time. What I’m saying is that the Club Med in Sweden is a nervous place.

I was having a hard time making up my mind about Assange. On one hand, he might be hurting the interests of my country and putting people in danger. Death to him! On the other hand, a little extra government transparency might prevent more problems than it causes. Hero! It was a toss-up. Then Sweden turned Assange from a man-whore publicity hound into Gandhi. Advantage: Assange.

December 13, 2010

The impossible balance of security and utility

Filed under: Military, Technology — Tags: , , , — Nicholas @ 12:35

Strategy Page looks at the mechanic that PFC Bradley Manning is reported to have used to grab copies of all the information now being released by WikiLeaks:

A bit late, the U.S. military has finally forbidden the use of all removable media (thumb drives, read/write DVD and CD drives, diskettes, memory cards and portable hard drives) from SIPRNet. Thumb drives had earlier been banned. The motivation for this latest action was Wikileaks, which obtained hundreds of thousands of secret American military and diplomatic documents from a U.S. soldier (PFC Bradley Manning). As an intel specialist, Manning had a security clearance and access to SIPRNet (Secret Internet Protocol Router Network). This was a private Department of Defense network established in 1991, using Internet technology and able to handle classified (secret) documents. But Manning got access to a computer with a writable CD drive, and was able to copy all those classified documents to a CD (marked as containing Lady Gaga tracks) and walk out of his workplace with it. The big error here was having PCs available with writable media. You need some PCs with these devices, but they should be few, and carefully monitored. Normally, you would not need to copy anything off SIPRNet. Most of the time, if you want to share something, it’s with someone else on SIPRNet, so you can just email it to them, or tell them what it is so they can call it up themselves. A network like SIPRNet usually (in many corporations, and some government agencies) has software that monitors who accesses, and copies, documents, and reports any action that meets certain standards (of possibly being harmful). SIPRNet did not have these controls in place, and still does not on over a third of the PCs connected.

Just like their civilian counterparts, soldiers have been very eager to get and keep connected, both for personal and professional reasons. Data not shared can’t be useful.

For the last decade, the Pentagon has had increasing security problems with its internal Internet networks. The Department of Defense has two private Internets (using Internet technology, but not connected to the public Internet). NIPRNet is unclassified, but not accessible to the public Internet. SIPRNet is classified, and all traffic is encrypted. You can send secret stuff via SIPRNet. However, some computers connected to SIPRNet have been infected with computer viruses. The Pentagon was alarmed at first, because the computers only used SIPRNet. As a result, they did not have any anti-virus software installed. It turned out that worm type hackware was the cause of infection, and was installed when someone used a memory stick or CD, containing the worm, to work and, well, you know the rest.

[. . .]

It’s easy for troops to be doing something on SIPRNET, then switch to the Internet, and forget that they are now on an unsecure network. Warnings about that sort of thing have not cured the problem. The Internet is too useful for the troops, especially for discussing technical and tactical matters with other soldiers. The army has tried to control the problem by monitoring military accounts (those ending in .mil), but the troops quickly got hip to that, and opened another account from Yahoo or Google, for their more casual web surfing, and for discussions with other troops. The Internet has been a major benefit for combat soldiers, enabling them to share first hand information quickly, and accurately. That’s why the troops were warned that the enemy is actively searching for anything G.I.s post, and this stuff has been found at terrorist web sites, and on captured enemy laptops. In reality, information spreads among terrorists much more slowly than among American troops. But if soldiers discuss tactics and techniques in an open venue, including posting pictures and videos, the enemy will eventually find and download it. The terrorists could speed up this process if they could get the right hackware inside American military computers.

December 10, 2010

The Economist: “America … should learn from its mistakes in the past decade and stick to its own rules”

Filed under: Bureaucracy, Law, USA — Tags: , , , , , — Nicholas @ 08:23

A very good column in The Economist seems to cover the issues quite well:

BIG crimes deserve tough responses. In any country the theft and publication of 250,000 secret government documents would deserve punishment. If the leak costs lives, let alone the careers and trust that have already perished amid the WikiLeaks disclosures, the case for action is even stronger.

[. . .]

For the American government, prosecution, not persecution, offers the best chance of limiting the damage and deterring future thefts. The blustering calls for the assassination of Julian Assange, the WikiLeaks founder now in custody in London awaiting extradition to Sweden on faintly mysterious charges of sexual assault, look both weak and repellent. If Mr Assange has broken American law, it is there that he should stand trial, just like Bradley Manning, the alleged source of the stolen documents. If not, it may be some consolation that the cables so far reveal a largely flattering picture of America’s diplomats: conscientious, cool-headed, well-informed, perceptive and on occasion eloquent.

[. . .]

If America sticks to those standards now it will display a strength and sanity that contrasts with the shrill absolutism and cyber-vandalism of the WikiLeaks partisans. Calling Mr Assange a terrorist, for example, is deeply counterproductive. His cyber-troops do not fly planes into buildings, throw acid at schoolgirls or murder apostates. Indeed, the few genuine similarities between WikiLeaks and the Taliban — its elusiveness and its wide base of support — argue against ill-judged attacks that merely broaden that support. After a week of clumsy American-inspired attempts to shut WikiLeaks down, it is now hosted on more than 700 servers around the world.

The big danger is that America is provoked into bending or breaking its own rules, straining alliances, eroding credibility and — because it will not be able to muzzle WikiLeaks — ultimately seeming impotent. In recent years America has promoted the internet as a menace to foreign censorship. That sounds tinny now. So did its joy of hosting next year’s World Press Freedom Day this week. Chinese and Russian glee at American discomfort are a sure sign of such missteps.

H/T to John Perry Barlow for the link.

Update: This certainly matches what I expected Julian Assange’s personality to be like:

Defectors include Daniel Domscheit-Berg, otherwise known as Daniel Schmitt, who made a high-profile exit from WikiLeaks in September, and Herbert Snorrason, an Icelandic student. Both resigned in September. Snorrason is quoted as telling Assange, in an online chat log acquired by WiReD:

And you’re not even fulfilling your role as a leader right now. A leader communicates and cultivates trust in himself. You are doing the exact opposite. You behave like some kind of emperor or slave trader.

Snorrason’s departure was fomented by this declaration from Assange:

I am the heart and soul of this organization, its founder, philosopher, spokesperson, original coder, organizer, financier and all the rest. If you have a problem with me, piss off.

And he did.

December 9, 2010

Bruce Schneier on the WikiLeaks situation

Filed under: Bureaucracy, Media, USA — Tags: , , , , — Nicholas @ 07:48

Bruce Schneier has some useful observations about the ongoing WikiLeaks document release:

4. This has little to do with WikiLeaks. WikiLeaks is just a website. The real story is that “least trusted person” who decided to violate his security clearance and make these cables public. In the 1970s he would have mailed them to a newspaper. Today he uses WikiLeaks. Tomorrow he will have his choice of a dozen similar websites. If WikiLeaks didn’t exist, he could have put them up on BitTorrent.

5. I think the government is learning what the music and movie industries were forced to learn years ago: it’s easy to copy and distribute digital files. That’s what’s different between the 1970s and today. Amassing and releasing that many documents was hard in the paper and photocopier era; it’s trivial in the Internet era. And just as the music and movie industries are going to have to change their business models for the Internet era, governments are going to have to change their secrecy models. I don’t know what those new models will be, but they will be different.

December 7, 2010

Chinese official acknowledged that official data is unreliable

Filed under: Bureaucracy, China, Economics, Railways — Tags: , , , , — Nicholas @ 07:32

I’ve been saying this for years now: China’s official GDP and associated economic numbers are just not reliable:

A senior Chinese official said in 2007 that much of the country’s local economic data are unreliable, according to a leaked diplomatic cable published by the WikiLeaks website.

The official, Li Keqiang, was at the time Communist Party secretary of the northeastern province of Liaoning, and has since been promoted to vice premier. Since landing that position, he has overseen many of the central government’s efforts to improve the quality of its economic statistics, which continue to face many questions over their accuracy and consistency.

[. . .]

China’s Foreign Ministry has said it will not comment on the content of the diplomatic cables published by WikiLeaks. The leaked cable reports comments Mr. Li made in a dinner in Beijing with then-U.S. Ambassador Clark Randt on March 12, 2007. His remarks focused on the challenges of administering the province of Liaoning, which because of its legacy of failed state-owned enterprises was burdened with a large number of unemployed workers.

“When evaluating Liaoning’s economy, he focuses on three figures: 1) electricity consumption, which was up 10% in Liaoning last year; 2) volume of rail cargo, which is fairly accurate because fees are charged for each unit of weight; and 3) amount of loans disbursed, which also tends to be accurate given the interest fees charged,” the cable says.

“By looking at these three figures, Li said he can measure with relative accuracy the speed of economic growth. All other figures, especially GDP statistics, are ‘for reference only,’ he said smiling,” the cable reads. “GDP figures are ‘man-made’ and therefore unreliable,” the cable paraphrases Mr. Li as saying.

As I said back in February, the reason for the made up numbers is inherent in the Chinese system:

In this way, the PLA stopped being just the customer/end user. They cut out the middleman and absorbed the entire supply chain. The PLA became a significant economic player in the Chinese industrial economy . . . and this is still true today. The generals aren’t formally in charge, but they own the companies that do military production.

So what? So let’s look at how a civilian corporation’s incentives differ from one owned directly by the army. In a civilian corporation, the CEO runs the business with an eye to generating the largest profit possible while staying (for the most part) within the law. A CEO who deviates from this to ride a favourite hobby horse will eventually face the wrath of the stockholders who want that maximized profit. There are natural limits on how much freedom to invest in uneconomic activity any CEO will be given. Sensible stockholders don’t try to micromanage the firm, but do raise questions if too much of the company’s efforts are devoted to things clearly not related to the company’s long term benefit. Company accounts can be rigged, for a time, to show misleading results, but eventually (Enron, Worldcom, etc.) the truth will out.

A Chinese firm that’s owned by the army? Profit may be nice, but the “CEO” reports to a different master: the guys with the guns. The company accounts will show exactly what the guys with the guns want them to show . . . and the oversight and auditing committee members carry submachine guns. You’re told that your target is 10% growth? Don’t you think that the reported result will be at least 10%? Because your life may depend on the reported results being acceptable.

As my former virtual landlord says, this is one of my hobbyhorses:

December 6, 2010

A qualified list of terror targets in Canada

Filed under: Cancon, Economics, Military, USA — Tags: , , , — Nicholas @ 12:25

Norman Spector goes where US federal government employees are forbidden to go:

In February of last year, U.S. diplomatic posts were given one month by Washington to compile and forward an inventory of critical infrastructure and key resources in their respective reporting areas “whose loss could critically impact the public health, economic security, and/or national and homeland security of the United States.” The U.S. embassy in Ottawa — and the string of American consulates across Canada — were included in this “action request.”

[. . .]

Not surprisingly given that we share a continent, the U.S. compilation of critical infrastructure and key resources in foreign countries includes many sites and undertakings in Canada, from Nova Scotia to British Columbia. Dams; undersea cables; oil and gas pipelines; border crossings, including bridges; nuclear power plants; defence production factories; mines; and, last but not least, pharmaceutical and vaccine production plants.

While, there has been considerable sympathy to date for WikiLeaks and for Mr. Assange, I suspect that some of this might erode once Canadians get a look at this latest cable, which is now widely available, and which sets out the juiciest targets in Canada for those looking to do harm to the United States. Moreover, once Canadians have had a chance to examine the list of sites it includes, I doubt that many of our compatriots will conclude that its compilation by U.S. diplomats serving in this country amounts to anything remotely connected to what we understand to constitute espionage:

Canada: Hibernia Atlantic undersea cable landing Halifax, Nova Scotia, Canada
James Bay Power Project, Quebec: monumental hydroelectric power development
Mica Dam, British Columbia: Failure would impact the Columbia River Basin.
Hydro Quebec, Quebec: Critical irreplaceable source of power to portions of Northeast
U. S. Robert Moses/Robert H. Saunders Power, Ontario: Part of the St. Lawrence Power Project, between Barnhart Island, New York, and Cornwall, Ontario
Seven Mile Dam, British Columbia: Concrete gravity dam between two other hydropower dams along the Pend d’Oreille River
Pickering Nuclear Power Plant, Ontario, Canada
Chalk River Nuclear Facility, Ontario: Largest supplier of medical radioisotopes in the world
Hydrofluoric Acid Production Facility, Allied Signal, Amherstburg, Ontario
Enbridge Pipeline Alliance Pipeline: Natural gas transmission from Canada
Maritime and Northeast Pipeline: Natural gas transmission from Canada
Transcanada Gas: Natural gas transmission from Canada
Alexandria Bay POE, Ontario: Northern border crossing
Ambassador Bridge POE, Ontario: Northern border crossing
Blaine POE, British Columbia: Northern border crossing
Blaine Washington Rail Crossing, British Columbia
Blue Water Bridge POE, Ontario: Northern border crossing
Champlain POE, Quebec: Northern border crossing
CPR Tunnel Rail Crossing, Ontario (Michigan Central Rail Crossing)
International Bridge Rail Crossing, Ontario International Railway Bridge Rail Crossing
Lewiston-Queenstown POE, Ontario: Northern border crossing
Peace Bridge POE, Ontario: Northern border crossing
Pembina POE, Manitoba: Northern border crossing
North Portal Rail Crossing, Saskatchewan
St. Claire Tunnel Rail Crossing, Ontario
Waneta Dam, British Columbia: Earthfill/concrete hydropower dam
Darlington Nuclear Power Plant, Ontario, Canada.
E-ONE Moli Energy, Maple Ridge, Canada: Critical to production of various military application electronics
General Dynamics Land Systems – Canada, London Ontario, Canada: Critical to the production of the Stryker/USMC LAV Vehicle Integration
Raytheon Systems Canada Ltd. ELCAN Optical Technologies Division, Midland, Ontario, Canada: Critical to the production of the AGM-130 Missile
Thales Optronique Canada, Inc., Montreal, Quebec: Critical optical systems for ground combat vehicles
Germanium Mine Graphite Mine Iron Ore Mine Nickel Mine Niobec Mine, Quebec, Canada
Niobium Cangene, Winnipeg, Manitoba: Plasma
Sanofi Pasteur Ltd., Toronto, Canada: Polio virus vaccine
GlaxoSmithKile Biologicals, North America, Quebec, Canada: Pre-pandemic influenza vaccines.

As Colby Cosh notes on Twitter, “That scary list of Cdn targets in the Wikileaks cable on security installations? You could have written it after a morning in the library.”

« Newer PostsOlder Posts »

Powered by WordPress