Categories
Real life stories as a flight service specialist (FSS): Inukjuak FSS

The Inuit who wanted to shoot Whites with a .303 caliber rifle

(Precedent story: the long awaited aircraft)

This is where we worked and lived in Inukjuak in 1982. One of the buildings holds the Transport Canada flight service station.
This is where we worked and lived in Inukjuak in 1982. One of the buildings holds the Transport Canada flight service station.

Note: It is only an out of the ordinary true life story. Normal relations between Whites and Inuit are entirely peaceful. Besides, we all know of situations in the southern cities where whites have tried to shoot people. The following story therefore presents an unusual and rare case.

In a Northern Quebec village named Inukjuak,in 1982-1983, the buildings layout was simple. On top of a nearby hill was the whole village, populated overwhelmingly by Inuit. Down the hill, near the airstrip and Hudson Bay, were the few buildings where Environment Canada employees and Transport Canada flight services specialists (FSS) could be found. There were only Whites living and working in this area.

One evening during winter` 82 -` 83, someone knocked on the door and entered immediately without waiting for an answer. It was the auxiliary police officer. He was an unarmed young man who occasionally helped the unique village policeman. He told us that the policeman was absent from the village and that he must fend for himself. He urged us: “Lock your doors and turn off the lights, do not go out unless it is essential, as there is one Inuit armed with .303 caliber rifle who wants to shoot white people.

It was, of course, a complete surprise for everyone. It was easy to deduce that the shooter looking for Whites would choose the easiest solution and head towards our buildings to shoot somebody at random. Not wanting to be a sitting duck, I went to my room and grabbed a locked suitcase that had been sleeping for months on a shelf. I took out a Remington Classic 700 BDL Bolt Action and loaded the magazine.

We established a plan, with the other two persons in the house. Two of us would have to get out and head toward the flight service station, where there was an unarmed FSS female employee working alone. Chances were that she was not aware of what was going on. One of us would bring her back home and the other one would then complete her night shift at her place, since the station could not be left unattended.

While we would be gone, there would be one person left in the house with a gun to protect himself if necessary. This employee had just arrived in Inukjuak. I still remember his reaction when we were getting ready to leave. I can hear him say: “But what is this crazy place?

We closed the outdoor floodlights and headed to the flight service station with our weapons. Walking in the dark, crouched like soldiers during wartime, we arrived at the Transport Canada building where we found the employee occupied at her normal duties, completely ignoring the possible presence of a nearby shooter. I took her place to complete the night shift while she returned home accompanied by an armed employee.

Once alone in the operating room, I shut the lights while keeping a small lamp to illuminate the console radio frequencies. I lay the rifle flat on a counter, the lock removed for faster use if needed. The radio console was located opposite a large window: it left us totally exposed to anyone who would decide to shoot through it. I therefore had to stay away from the normal working position, except when responding to radio calls, until we received fresh news about the shooter.

Twin Otter inbound for Inukjuak on a very windy day in 1982.
Twin Otter inbound for Inukjuak on a very windy day in 1982.

The improvised night shift ended without incident in the station, but I learned that multiple shots were fired at a vehicle traveling near our facilities. Projectiles pierced doors, but luckily they did not hit the vehicle occupants. Within hours of the event, a tactical response team of the Sûreté du Québec arrived in Inukjuak and controlled the shooter.

Even if this story took place decades ago, I still remember very well the atmosphere on that evening. When untrained civilians must load firearms to potentially use them against another human, it cannot be forgotten.

(Next story: emergency clean-up)

For more real life stories of a FSS in Inukjuak, click on the following link: Flight service specialist (FSS) in Inukjuak

Categories
Computer science

Menaces cybernétiques (Cyber threats)

Menaces cybernétiques - Le manuel du combattant
Menaces cybernétiques – Le manuel du combattant

For bilingual readers, here is an excellent book filled with practical information that is not catering only to computer science specialists. It is filled with advice that should help you avoid trouble when using your electronic devices. But, before going any further, here are some facts that may be of some interest to you:

1. The Pentagon has to deal with 250,000 direct threats every hour against its computer systems. Since the attacks may sometimes use as much as one million computers simultaneously, the Pentagon uses seven million computers to protect its different systems.

2. A password using 10 characters (no punctuation signs, no special characters) can be deciphered within ten minutes (and not only by a pro). You must add punctuation and special characters in your password in order to make it more difficult to decode. This password must be at least 10 characters long.

3. In 2012, there were 250 million zombie computers across the planet. A zombie computer can be your own computer taken over to launch many types of attacks without you knowing. It uses the resources on your computer without your authorization. This book offers a simple method to verify the integrity of your operating system, which can be done in a few seconds. You do not need to hire expert help.

4. 80% of businesses ignore that they are victims of cyber spying. We had a good example with Sony’s movie, “ The Interview” in 2014.

5. The global cost of cyber crimes in Europe, in 2012, was estimated at 750 billion euros. One internet user out of four was a victim of some kind of cyber crime in 2012.

6. At least 100,000 people are working in total secrecy for the United States in order to prepare attacks against external servers. In China, it is estimated that 300,000 employees are working on the same goal. Naturally, many other countries make significant efforts in this endeavor, like Russia, Iran and Israel, to name a few.

The book includes numerous and simple explanations aimed at helping everyone to be aware of the methods used by cyber spies. Politicians and businessmen can certainly benefit from the suggested improvements with regards to the use of personal electronic devices.

Cyber criminality is also discussed, and excellent advice is given to help everyone fight malware programs. You are also provided with a simple method to show you how to react if you ever are victim of ransomware. Some practical information is also provided to help protect your personal data, particularly your confidential banking data.

The author explains the difference between a virus and an IT worm. Few extremely sophisticated IT worms are presented, like STUXNET. This worm was used against Iranian nuclear installations in order to slow down their research program. You can learn about other worms like FLAME, GAUSS and SHAMOON.

The indirect risks resulting out of the use of viruses and IT worms are not negligible. When an IT worm is discovered within a computer system, its architecture becomes accessible to everyone. Criminal networks can then replicate or try to modify the IT worm, through reverse engineering, to new ends.

The reader learns how a classical DDOS attack is performed. There is also information about radio electric attacks that target telecommunications.

The book offers a number of interesting website resources, including:

1. If you think that there is an intrusion in your network: http://sourceforge.net/projects/ipscan
2. To locate an IP address: cut and paste all the source code information included within the e-mail and analyse it through the following site: http://www.iptrackeronline.com/email-header-analysis.php
3. To encrypt your important data: http://www.truecrypt.org/
4. For anonymous use of internet, the book suggests that you use a VPN: http://cyberghostvpn.com/. There is also a possibility to download the TAILS suite at: http://tails.boum.org/about/index.fr.html jointly with Gparted: http://gparted.sourceforge.net/. Tails uses TOR to connect to Internet.

The appropriate way to do back-ups is described in the book. If you are a social network user, you will have access to an entire chapter about Facebook and Twitter and others. The weaknesses in these networks as well as ways to protect yourself and the confidentiality of your personal information are described at length.

IT security within businesses is another important chapter. The author shows how the human factor is often neglected in the design of security strategy. The reader learns about the ways cyber spies manage to steal important data from companies. A few simple modifications of daily habits are sometimes just what is needed to prevent the loss of sensitive information.

In conclusion, this is a very interesting book that will help any reader to protect personal information stored in mobile devices and home or office computers.

Title: Menaces cybernétiques – Le manuel du combattant
Author : Yves-Marie Peyry
Éditions du Rocher, 2013
ISBN : 978-2-268-07513-6
Collection « Lignes de feu » directed by Daniel Hervouët