Categories
Geopolitics

Books : “Passer par le Nord” – La nouvelle route maritime

« Passer par le Nord » (Northern Sea Route), by Isabelle Autissier and Érik Orsenna, is an essential book for the reader who wishes to learn more about the profound transformations brought on by global warming, with regards to geopolitical, economic and ecological issues in the Arctic.

The book is at the same time a lesson in geography, history, politics, ecology and economy. It will certainly captivate those who are interested in maritime traffic and the development of new maritime routes, as well as the race towards the appropriation and exploitation of the immense oil and gas resources of the North.

Book cover of "Passer par le Nord" by Isabelle Autissier and Érik Orsenna
Book cover of “Passer par le Nord” by Isabelle Autissier and Érik Orsenna

In order to sustain the reader’s interest, several maps are included in the book. They are very useful when comes the time to better understand the history and different uses, past and present, of the seas, islands and territories like: Kara Sea, Barents Sea, Laptev Sea, Franz Josef Land, Novaya Zemlya, Aleutian Islands, New Siberian Islands, North Land, Wrangel, Bering Strait, Svalbard, Spitzberg, Oslo, Tromsö, Kirkenes, Murmansk, etc.

Some of the seaways of Russia, which are among the longest in the world, are equally presented: Ob, Yenisei, Lena and Kolyma.

Numerous geographical maps are available at the following site : http://www.lib.utexas.edu/maps/polar.html

The numbers talk for themselves:  to go from Rotterdam to Yokohama, a ship must travel 20,600 kilometers when passing through the Suez Canal. Only 12,800 kilometers are needed when using the northeast passage along the Siberian coast and 11,800 kilometers when traveling across the pole in the absence of ice during summer (this new transpolar route could be usable as soon as 2025). The need of resources by China and India, associated with melting ice in the poles, are rapidly taking Siberia out of its isolation.

Important people

The reader will certainly be interested by the information on the people who played a significant role in the discovery and exploitation of seas, islands and lands bordering the Northeast maritime route. Here are few of those names: the Viking Otar, Willem Barents, Simon Dejnev, Vitus Bering, Peter the Great, Alexander Baranov, Ivan Veniaminov, Adolf Erik Nordenskjöld, Ada Blackjack, etc.

The first northern crossing from the Atlantic to the Pacific belongs to a Swedish named Adolf Erik Nordenskjöld in 1879. Thirty-six years (1915) were needed to witness the second complete crossing, this time by Russian icebreakers under the command of Boris Vilkitski.

The importance of icebreakers

Icebreakers are extremely important for Russia, so much for protecting its recognized sovereignty and defending its new territorial claims than for economic reasons (insure the usability of the Northeast Passage and the continuous exploitation of the oil and gas resources along the Siberian coast).

The United States must also build icebreakers, so much for geopolitical and economic reasons than to insure the protection of a growing number of cruise ships that are about to use the narrow and risky channels of the Arctic.

Arctic geographic map (Source: www.arcticcenter.org)
Arctic geographic map (Source: www.arcticcenter.org)

Collaboration and obstacles in the Barents Sea

An obvious collaboration exists between Russia and Norway with regards to fishing in the Barents Sea and in the south of Svalbard, a sector rapidly becoming more strategic with the northern migration of several fish species caused by the climatic changes. Ecosystems are nonetheless in danger due to the rapidly warming waters and insufficient time to adapt.

What are the obstacles presented by the Barents Sea towards tankers, ships and platforms? First the fog, which can last for weeks, than the “lows” which destroy vessels and twist superstructures. Finally, freezing spray adds excessive weight and freezes every crank on ships and platforms. In the event of an accident caused by oil or gas exploitation, the extreme meteorological conditions will present very important challenges.

One note on Siberia

The exploitation of mineral resources in Siberia was initially made possible, under Lenin, through work camps (gulags), since there were no volunteers ready to exile themselves in that hostile region.

The authors suggest, for whoever is interested in Siberia, the soon to be published book by Éric Hoesli. He has already published, in 2006, a very well documented book on the Caucasus: À la conquête du Caucase.

Oslo: Tschudi and Aker Solutions

The authors present two Norwegian companies based in Oslo which deal with logistics at sea: TSCHUDI and Aker Solutions.

Back cover of the book " Passer par le Nord " by Isabelle Autissier and Érik Orsenna
Back cover of the book ” Passer par le Nord ” by Isabelle Autissier and Érik Orsenna

Shtokman and Yuzhno-Tambeyskoye natural gas reserves

The reader will certainly appreciate the chapter on the “eldorados glacés” (iced eldorados) which develops on the Shtockman and Yuzhno-Tambeyskoyenatural gas reserves fields (the latter holds 25% of the world reserve of natural gas). There are numerous challenges with regards to the exploitation of those fields: investments of twenty billion dollars, a necessary alliance between Russia, France (TOTAL) and China (CNPC), gigantic infrastructures to be built, the stabilization of all installations using thousands of posts, a constant fight against ice, the construction of thirty tankers (among them sixteen icebreakers), and the obligation to use the Northern maritime route.

Global warming

The book covers at length the accumulated effects of military, industrial and commercial activities on animal life and the environment. The fragility of the Arctic is well demonstrated. The reader will be surprised by the extent of nuclear wastes spread around the Novaya Zemlya.

The global warming favors the migration of species northward, an increase in the number of fishing vessels in the Arctic and political tensions between nations related to the ownership of the zone located between 12 and 200 miles along the different coasts. The native species are losing ground to the profit of the invasive species.

“[My translation] The diminishing polar ice will favor an increase in the number of ships in the Arctic with the added risk of collisions and the emission of all kind of noises that disrupt animals and prevent them from feeding correctly and communicate properly between them or with their offspring. Seismic tests or low-frequency sonars used by fishermen and militaries are particularly devastating.” (p.203)

With few exceptions (Norway, Japan, Iceland), the moratorium on whale hunting is respected. The official predation by Inuit and the Russian poaching are limited.” (p.203)

Map showing the links behind the accelerated warming of the Arctic (Source: http://arctic-news.blogspot.ca/2012/09/storm-enters-arctic-region.html)
Map showing the links behind the accelerated warming of the Arctic (Source: http://arctic-news.blogspot.ca/2012/09/storm-enters-arctic-region.html)

Increase in extreme weather events

“[My translation] The diminishing pack ice will act on the oceanic currents, but also on the atmosphere by slowing down the higher jet streams. This phenomenon will favor an increase in extreme [weather] events (cold spells or heat waves, droughts or floods) at our mid-latitudes.”(p.219)

Response time when faced with an ecological disaster in the Arctic

The Bureau of Ocean Energy Management (USA) “[my translation] estimates that 61 000 barrels [of oil] would spill in the sea every day if a well exploded. The Shell Company indicates that it would need thirty-eight days to drill a relief well while it needed eighty-five in the Gulf of Mexico, infinitely more accessible and less dangerous. Admitting that it would show the same celerity as for Deepwater Horizon , which in itself would be a feat, more than 800 000 tons of oil would spill in the Arctic.

More likely, operating conditions in ice, fog and storms would prevent the realization of the work within only one summer. Once the polar night would set, a decision to let the well spill all winter would have to be taken, if not for many years in a row.” (p.229)

Methane

“[My translation] Methane has a greenhouse effect that is twenty-three time superior to that of the CO2, that is already presented as our worst enemy” (p.216)

In the Laptev Sea, what looks like real fountains of several hundred of meters in diameter spew out methane. One can see the sea boil like if it was in a gigantic cauldron. 80% of surface waters and 50% of deep waters present methane concentrations varying from 8 to … 1 400 times the oceanic average!”(p.216)

Mammoth’s tusks poaching

There is a short passage in the book on the poaching of mammoth’s tusks buried in the ground on Liakhov Island. The operation is financed by Mafiosi. The tusks are carved then resold to Chinese collectors for a very good profit.

Global warming, and the thaw it provokes in Siberia, would indirectly protect the African elephant by allowing access to mammoth’s tusks. The new and important stock of ivory in Siberia drives the price down by increasing the offer, thus making the African elephant’s tusks less interesting financially.

Some names to remember

The Port of Kirkenes, in Norway, is one of the main ports of the new northern sea route. It has an ideal geographical position and its harbour is protected against storms. The city favors the development of the port. The efficiency of Norwegian employees is recognized. The Norwegians are used to deal with Russians, their immediate neighbours.

Murmansk, in Russia, is also expected to benefit from global warming. There are already dozens of mines in exploitation, with several of those mines producing rare earths which are vital for modern technology applications.

In the Arctic, the disappearance of the summer ice pack is expected between 2020 and 2030. The Northeast Passage could be accessible beyond the EEZ 200 miles, “which will favor Iceland “which could become a transport hub between America and Europe.”(p.218). “And it is said that some Beijing investors would be ready to offer 5 billion dollars to take control of the future Port of Reykjavik, the one that aims to be the hub of the North.” (p.245)

The Arctic Council

For a long time now, the Arctic has been a strategic area where numerous countries, among them few superpowers, claim an important part of the territory and resources. With the acceleration of the melting process, things get even more complicated.

In 1996, the Arctic Council was created to ease communications and reduce political tensions between the countries pretending to part of the Arctic territory and resources. These countries include Canada, Denmark, United States, Finland, Iceland, Norway, Sweden and Russia. Associations of indigenous population are also part of the group, but as “permanent members”.

Militarization of the North

The Cold War between Russia and United States forced the construction of the DEW line by Americans and Canadians, a line that was eventually replaced by the North Warning System.

Today, the militarization of the area still goes on: “[my translation] Russia multiplies the signs and acts of militarization in the zone. Military exercises (parachuting, air patrols), reconstruction of installations in all of the islands (Wrangel, New Siberian, Novaya Zemlya, Franz Josef Land), orders of numerous ships among them new generation submarines (attack submarines and missile launchers), a complete program for the upgrading of the Boulava missiles … The [Northern Fleet] underwater base, near Murmansk (Severomorsk), seems to be in a state of complete reactivation.”(p.238)

Russia fortifying bases in Arctic region (Source: Heritage.org)
Russia fortifying bases in Arctic region (Source: Heritage.org)

The transpolar maritime route

Geographic map showing the potential northern maritime routes (Source: www.businessinsider.com)
Geographic map showing the potential northern maritime routes (Source: www.businessinsider.com)

The Northeast Passage maritime route along the Siberian coast will be favored until the ice pack has melted at the pole (expected for 2025 instead of 2060 initially forecasted). So, in 2025, a new transpolar maritime route will be available to ship-owners. They will then be able to decide if they avoid the Siberian coast and the associated administrative hassle while they save an additional one thousand kilometers for a route from Rotterdam to Yokohama.

For more articles on geopolitics on my web site, click on the following link : Geopolitics

Title: Passer par le Nord – La nouvelle route maritime
Authors: Isabelle Autissier and Érik Orsenna
Editions: Paulsen
©2014
ISBN: 978-2-916-552-35-4

Categories
Aviation photography

Viking’s Twin Otter Series 400 in Victoria, British Columbia

Twin Otter Series 400 parked in Victoria, British-Columbia, in 2016
Twin Otter Series 400 parked in Victoria, British-Columbia, in 2016

Knowing I would spend some time in Victoria in 2016, I planned a visit of the Viking Air Ltd installations, the Canadian company who now builds the famous Twin Otter Series 400. This company is unknown from a majority of Canadians since its production is essentially exported. Out of one hundred aircrafts produced so far, only two were bought by a Canadian company. Viking also offers maintenance service for the Twin Otter Series 100 to 300 in activity around the world.

In the foreground, a Twin Otter Series 400 built by Viking in Victoria, British-Columbia. In the background, a CL-215 water bomber recently acquired by Viking. It will possibly be modified into the more powerful CL-415 version .
In the foreground, a Twin Otter Series 400 built by Viking in Victoria, British-Columbia. In the background, a CL-215 water bomber recently acquired by Viking. It will possibly be modified into the more powerful CL-415 version .

In the beginning of 2016, Bombardier and Viking sealed a commercial deal that now makes Viking the new owner of the patents and designs for the CL-215 and CL-415 water bombers. Viking not only services the existing Twin Otters but is evaluating the possibility of restarting the production of the CL-415 water bombers. All is resting on the demand. But with more extreme meteorological conditions fueling a growing number of major forest fires, one can expect that within the next few years Viking will reactivate the production.

In Victoria, a Twin Otter Series 400 on floats built by Viking has been bought by Reignwood Air. It is ready for delivery to China (2016).
In Victoria, a Twin Otter Series 400 on floats built by Viking has been bought by Reignwood Air. It is ready for delivery to China (2016).

With the on-going regulatory changes actually taking place in China, Viking is confident to see an increase in its orders for the Twin Otter Series 400 on floats. The company will receive, at their Victoria installations in 2016, the first flight simulator essentially dedicated to training pilots on the Twin Otter on floats.

A Viking's Twin Otter Series 400 in Victoria ready for delivery to Russia
A Viking’s Twin Otter Series 400 in Victoria ready for delivery to Russia

For now, Russia is Viking’s most important customer despite the ups and downs linked to the political crisis between that country and Ukraine combined with a ruble devaluation that have forced a slowdown in the production of aircrafts destined to Russian companies. With the recent stabilization in the political situation, Viking has been able to hire back numerous workers which now brings the count to at least 350 employees, if my memory does not fail me.

Turbo Otter DHC-3T C-GVTO in Victoria, Canada, in 2016
Turbo Otter DHC-3T C-GVTO in Victoria, Canada, in 2016

Nowadays, most Canadians ignore that a Canadian company has restarted the production of the Twin Otters and is evaluating the possibility of also relaunching the production of the CL-415 water bombers. In the meantime, some CL-215s recently acquired by Viking will possibly be transformed into the more powerful CL-415 version. The only thing now missing for Viking is an important order from a Canadian company: that would make its name as well-known as Bombardier or De Havilland.

For other articles on aviation and photography, click on the following link: Aviation photography

Categories
Updates

The Chinese junks of Taï Po

Photo of Chinese junks taken near Tai Po with a Pentax SF1 during summer 1990. Originally on a slide and then digitalized.
Photo of Chinese junks taken near Tai Po with a Pentax SF1 during summer 1990. Originally on a slide and then digitalized.

This photo was taken during a one month trip around Hong-Kong in 1990. The average quality of the picture is due to multiple processings necessary to show it on the web. Few other chosen photos about that trip have been posted in the “Photo galleries” section, under “Asia”.

The period when those junks were taken was exactly one year after the Tiananmen Square massacre. The South China Morning Post wrote that 100,000 people walked near Victoria Park to commemorate the tragedy. It was possible to see the crowd from the window of our Cathay Pacific Boeing 747-200 while flying over Hong-Kong for the final approach towards the Kaï Tak airport.

Categories
Computer science

Menaces cybernétiques (Cyber threats)

Menaces cybernétiques - Le manuel du combattant
Menaces cybernétiques – Le manuel du combattant

For bilingual readers, here is an excellent book filled with practical information that is not catering only to computer science specialists. It is filled with advice that should help you avoid trouble when using your electronic devices. But, before going any further, here are some facts that may be of some interest to you:

1. The Pentagon has to deal with 250,000 direct threats every hour against its computer systems. Since the attacks may sometimes use as much as one million computers simultaneously, the Pentagon uses seven million computers to protect its different systems.

2. A password using 10 characters (no punctuation signs, no special characters) can be deciphered within ten minutes (and not only by a pro). You must add punctuation and special characters in your password in order to make it more difficult to decode. This password must be at least 10 characters long.

3. In 2012, there were 250 million zombie computers across the planet. A zombie computer can be your own computer taken over to launch many types of attacks without you knowing. It uses the resources on your computer without your authorization. This book offers a simple method to verify the integrity of your operating system, which can be done in a few seconds. You do not need to hire expert help.

4. 80% of businesses ignore that they are victims of cyber spying. We had a good example with Sony’s movie, “ The Interview” in 2014.

5. The global cost of cyber crimes in Europe, in 2012, was estimated at 750 billion euros. One internet user out of four was a victim of some kind of cyber crime in 2012.

6. At least 100,000 people are working in total secrecy for the United States in order to prepare attacks against external servers. In China, it is estimated that 300,000 employees are working on the same goal. Naturally, many other countries make significant efforts in this endeavor, like Russia, Iran and Israel, to name a few.

The book includes numerous and simple explanations aimed at helping everyone to be aware of the methods used by cyber spies. Politicians and businessmen can certainly benefit from the suggested improvements with regards to the use of personal electronic devices.

Cyber criminality is also discussed, and excellent advice is given to help everyone fight malware programs. You are also provided with a simple method to show you how to react if you ever are victim of ransomware. Some practical information is also provided to help protect your personal data, particularly your confidential banking data.

The author explains the difference between a virus and an IT worm. Few extremely sophisticated IT worms are presented, like STUXNET. This worm was used against Iranian nuclear installations in order to slow down their research program. You can learn about other worms like FLAME, GAUSS and SHAMOON.

The indirect risks resulting out of the use of viruses and IT worms are not negligible. When an IT worm is discovered within a computer system, its architecture becomes accessible to everyone. Criminal networks can then replicate or try to modify the IT worm, through reverse engineering, to new ends.

The reader learns how a classical DDOS attack is performed. There is also information about radio electric attacks that target telecommunications.

The book offers a number of interesting website resources, including:

1. If you think that there is an intrusion in your network: http://sourceforge.net/projects/ipscan
2. To locate an IP address: cut and paste all the source code information included within the e-mail and analyse it through the following site: http://www.iptrackeronline.com/email-header-analysis.php
3. To encrypt your important data: http://www.truecrypt.org/
4. For anonymous use of internet, the book suggests that you use a VPN: http://cyberghostvpn.com/. There is also a possibility to download the TAILS suite at: http://tails.boum.org/about/index.fr.html jointly with Gparted: http://gparted.sourceforge.net/. Tails uses TOR to connect to Internet.

The appropriate way to do back-ups is described in the book. If you are a social network user, you will have access to an entire chapter about Facebook and Twitter and others. The weaknesses in these networks as well as ways to protect yourself and the confidentiality of your personal information are described at length.

IT security within businesses is another important chapter. The author shows how the human factor is often neglected in the design of security strategy. The reader learns about the ways cyber spies manage to steal important data from companies. A few simple modifications of daily habits are sometimes just what is needed to prevent the loss of sensitive information.

In conclusion, this is a very interesting book that will help any reader to protect personal information stored in mobile devices and home or office computers.

Title: Menaces cybernétiques – Le manuel du combattant
Author : Yves-Marie Peyry
Éditions du Rocher, 2013
ISBN : 978-2-268-07513-6
Collection « Lignes de feu » directed by Daniel Hervouët