Categories
Graphic novels and comics

Accidental Czar

The graphic novel "Accidental Czar: The life and lies of Vladimir Putin".
The graphic novel “Accidental Czar: The life and lies of Vladimir Putin”.

Note: The excerpts are taken from the French version of “Tsar par accident” and re-translated into English using DeepL.

Author Andrew S. Weiss has worked at the White House, the Pentagon, the State Department, and so on. He points out: “If someone had told me at the time that a former KGB non-commissioned officer – who had never really shone – a certain Vladimir Putin […] – would be promoted from the back rooms of the Kremlin directly to the head of the country, I would have told you to get yourself treated”. He adds: “What we think we know about him is often a clever mix of counter psychology and misinterpretations of Russia‘s thousand-year-old history “. His staging as a tough guy “allows him to come across as more intelligent – and more competent – than he really is. […] “.

The graphic novel “Accident Czar” tells the story of how Vladimir Putin found himself in power at a time when his rather lacklustre career was destined for a lesser position. But the same could be said of some of the world’s dictators, presidents, kings and ministers over the ages who have been blessed with good fortune. They too have taken advantage of favorable opportunities to climb the ladder too high for their natural talent. The nation then pays the price until the person’s overthrow, exile or death.

Still, we have to give Putin credit for persisting, for hanging on, despite setbacks and rejections. To join the KGB, he was told to study or join the army. He did so and received his diploma.

In 1975, he joined the KGB. But it wasn’t the big missions he had dreamed of that awaited him, but local fieldwork. He failed to impress his superiors with the results he achieved. Following a brawl in the subway, he was transferred to Dresden in 1985, where his missions were meaningless due to lack of budget. In 1999, President Clinton was told that Putin would be the next Russian president. What had happened between 1985 and 1999 for Putin to suddenly emerge from obscurity and become President of Russia?

Credit must be given to his work ethic, but above all to his loyalty to his bosses in an organization that favors personal ties. Yeltsin, the president at the time, sensed his end was coming and offered Putin a deal. The author writes: “He would make him president if he agreed to protect him and his family“.

Just as Hindenburg believed he could manipulate Hitler by giving him access to the highest echelons of government, so Yeltsin thought he could do the same with Putin. In both cases, it was a costly mistake for Europe and the world.

The book reviews the rise of the Russian oligarchs, and the rapprochement of power for Putin’s friends. Andrew Weiss points out: “One of the points that foreigners don’t always grasp is that Russia is a society that operates on the basis of personal ties, rather than within the framework of institutions or the rule of law.

In the years following the fall of the Berlin Wall, important sectors of the Russian economy were taken over by corrupt officials and KGB agents, as well as by the mafia. As the author writes: “Vladimir Kumarin, all-powerful boss of the notorious Tambov gang, ruled the country“.

Vladimir Putin’s support for the United States after the attacks of September 11, 2001 brought him closer to George W. Bush and his father George H. W. Bush, with whom he even went fishing in Kennebunkport. He hoped to revive the moribund Russian economy and gain the freedom to control the Russian media.

What’s most astonishing to me is that, during this period, Putin approved the highly controversial establishment of American and NATO bases across the former Soviet Union (Uzbekistan,Tajikistan, Kyrgyzstan). With this gesture, he was seeking stabilization with the West. With the causes of the September 11th 2001 attacks still being debated around the world today, especially in the most informed circles, Putin was later forced to reflect on the relevance and consequences of his decision to authorize new American and NATO bases near Russia.

The Russian president quickly realizes that he doesn’t carry much weight in the diplomatic balance against a superpower like the United States. He is not recognized as a player to be reckoned with. With a view to better understanding between the West and Russia, the author stresses the importance of better understanding the grievances of both sides. He points out that this is sorely lacking.

Especially since the Kremlin is convinced that “demands for political change are always the result of Western-backed conspiracies“. All the major nations, by dint of monitoring each other and trying to influence the internal management of other countries, are projecting their intentions and no longer believe that a protest can come from the bottom up, based on a serious desire to improve certain detestable policies.

The author takes a look back at the problems surrounding Russia’s territorial security through the ages, invaded in turn by the Mongols, Napoleon and Hitler: “[Russia] traditionally relies on annexed territories to act as a buffer between the motherland and any external threat“. He also discusses the Chechen conflict, the fight against terrorism, political interference in neighboring states and Russian involvement in the 2016 US elections.

Andrew S. Weiss covers a lot of ground, and other themes find their way into the book: the history of the Cold War, Trump, Snowden, Wikileaks, the Sochi Olympics and the work of Maria Butina, a Russian agent who managed to penetrate the upper circles of the American Republican Party.

It was his belief in the irreversible decline of the West that enabled Vladimir Putin to invade Ukraine.

The author concludes with a remark on the invasion of that country and the indiscriminate bombing of civilian targets: “The world is beginning to understand that Putin was never the strategist he claimed to be. He is an improviser caught in his own trap”.

Allow me to make a comment about the invasion of Ukraine. This country is to receive fighter planes from the Allied States to protect its territory, which deeply offends Russia. However, I would like to remind you that during the Second World War, the Soviet Union accepted a great deal of outside help for its defense on the Eastern Front. To name just one aircraft and country, the Soviet Union obtained 877 B-25 Mitchell bombers from the USA.

Click on the link for more graphic novels and comics on my blog.

Title: Accidental Czar: The life and lies of Vladimir Putin.

Author: Andrew S. Weiss. Illustrator: Brian « Box » Brown

Edition: Macmillan Publishers

ISBN: 9781250760753

© 2022

Categories
Computer science

Menaces cybernétiques (Cyber threats)

Menaces cybernétiques - Le manuel du combattant
Menaces cybernétiques – Le manuel du combattant

For bilingual readers, here is an excellent book filled with practical information that is not catering only to computer science specialists. It is filled with advice that should help you avoid trouble when using your electronic devices. But, before going any further, here are some facts that may be of some interest to you:

1. The Pentagon has to deal with 250,000 direct threats every hour against its computer systems. Since the attacks may sometimes use as much as one million computers simultaneously, the Pentagon uses seven million computers to protect its different systems.

2. A password using 10 characters (no punctuation signs, no special characters) can be deciphered within ten minutes (and not only by a pro). You must add punctuation and special characters in your password in order to make it more difficult to decode. This password must be at least 10 characters long.

3. In 2012, there were 250 million zombie computers across the planet. A zombie computer can be your own computer taken over to launch many types of attacks without you knowing. It uses the resources on your computer without your authorization. This book offers a simple method to verify the integrity of your operating system, which can be done in a few seconds. You do not need to hire expert help.

4. 80% of businesses ignore that they are victims of cyber spying. We had a good example with Sony’s movie, “ The Interview” in 2014.

5. The global cost of cyber crimes in Europe, in 2012, was estimated at 750 billion euros. One internet user out of four was a victim of some kind of cyber crime in 2012.

6. At least 100,000 people are working in total secrecy for the United States in order to prepare attacks against external servers. In China, it is estimated that 300,000 employees are working on the same goal. Naturally, many other countries make significant efforts in this endeavor, like Russia, Iran and Israel, to name a few.

The book includes numerous and simple explanations aimed at helping everyone to be aware of the methods used by cyber spies. Politicians and businessmen can certainly benefit from the suggested improvements with regards to the use of personal electronic devices.

Cyber criminality is also discussed, and excellent advice is given to help everyone fight malware programs. You are also provided with a simple method to show you how to react if you ever are victim of ransomware. Some practical information is also provided to help protect your personal data, particularly your confidential banking data.

The author explains the difference between a virus and an IT worm. Few extremely sophisticated IT worms are presented, like STUXNET. This worm was used against Iranian nuclear installations in order to slow down their research program. You can learn about other worms like FLAME, GAUSS and SHAMOON.

The indirect risks resulting out of the use of viruses and IT worms are not negligible. When an IT worm is discovered within a computer system, its architecture becomes accessible to everyone. Criminal networks can then replicate or try to modify the IT worm, through reverse engineering, to new ends.

The reader learns how a classical DDOS attack is performed. There is also information about radio electric attacks that target telecommunications.

The book offers a number of interesting website resources, including:

1. If you think that there is an intrusion in your network: http://sourceforge.net/projects/ipscan
2. To locate an IP address: cut and paste all the source code information included within the e-mail and analyse it through the following site: http://www.iptrackeronline.com/email-header-analysis.php
3. To encrypt your important data: http://www.truecrypt.org/
4. For anonymous use of internet, the book suggests that you use a VPN: http://cyberghostvpn.com/. There is also a possibility to download the TAILS suite at: http://tails.boum.org/about/index.fr.html jointly with Gparted: http://gparted.sourceforge.net/. Tails uses TOR to connect to Internet.

The appropriate way to do back-ups is described in the book. If you are a social network user, you will have access to an entire chapter about Facebook and Twitter and others. The weaknesses in these networks as well as ways to protect yourself and the confidentiality of your personal information are described at length.

IT security within businesses is another important chapter. The author shows how the human factor is often neglected in the design of security strategy. The reader learns about the ways cyber spies manage to steal important data from companies. A few simple modifications of daily habits are sometimes just what is needed to prevent the loss of sensitive information.

In conclusion, this is a very interesting book that will help any reader to protect personal information stored in mobile devices and home or office computers.

Title: Menaces cybernétiques – Le manuel du combattant
Author : Yves-Marie Peyry
Éditions du Rocher, 2013
ISBN : 978-2-268-07513-6
Collection « Lignes de feu » directed by Daniel Hervouët