Categories
Meteorology

Isaac’s Storm

A Man, a Time and the Deadliest Hurricane in History

Isaac's Storm. A Man, a Time and the Deadliest Hurricane in History
Isaac’s Storm

The book recounts the events surrounding a disaster caused by a major hurricane having taken place in the United States in 1900. The author ensures that the scientific notions connected with meteorology are explained in a simple manner, knowing very well that a big part of his readership has only elementary knowledge on the subject.

I appreciated the way the events were told, since Erik Larson’s book is not limited only to human or material disaster which ensued from the passage of the hurricane on Galveston and the surrounding cities. The reader can learn about the development of Meteorological Offices in the United States, the equipment used at that time as much as the help brought by ship captains with regards to weather observations. It is also interesting to read about all the political and commercial pressures felt by some staff of the US Weather Bureau.

The Galveston disaster was not due to the malfunction of the meteorological instruments nor their limitation. It was rather caused by the disproportionate egos of the forecaster Isaac Cline and some of his managers, as well as pressures of all kinds on Isaac as an observer and forecaster.

Isaac Cline: a disproportionate ego

Isaac had acquired an excellent reputation throughout the years. Little by little, his scientific approach gave way to a certainty of always being right and the desire to be perceived as the leading expert in the field of meteorology. In one of his papers, he refutes openly one hundred years of accumulated knowledge in meteorology.

The Galveston population had asked for a breakwater to be built in order to limit the potential damages caused by a major hurricane. But Isaac wrote an article in which he explained why Galveston was not susceptible to suffer the effects of a major hurricane. The breakwater not being seen any more as a pressing project, the idea of its construction was abandoned.

An ego bigger than nature from some administrators of the US WEATHER BUREAU

On the island of Cuba, in 1900, there were American observers working for the US WEATHER BUREAU and Cuban observers monitoring the weather for their own country. The Cubans, as natural residents of the island, had gradually acquired a huge experience in the prediction of the passage and the trajectory of major meteorological systems. Powerful countries having a natural tendency to underestimate the capacities and experience of inhabitants of smallest nations, warnings coming from the Cubans were regularly brushed aside.

If the US WEATHER BUREAU had been attuned to the Cuban weather observer comments in 1900, the terrible hurricane which destroyed Galveston would have had much less tragic consequences. But, in the “Isaac storm” book, we learn that the communication links were voluntarily cut between both countries by the US WEATHER BUREAU. The Cuban forecasters were considered like poor inhabitants capable of announcing a storm only when it had practically left the island.

The same day that the Weather Bureau published in the newspaper of Havana that the last hurricane had reached the Atlantic, the Belen Observatory (Cuba) said in the same papers that the center had crossed the eastern portion of the island and that it would undoubtedly reach Texas. A few hours later the first telegraphic announcement of the ravages of the cyclone in Galveston was received”. Six days after the Galveston disaster, the War Department revoked the ban on Cuban weather cables and the communication of information was re-established.

Of pressures exercised by the Galveston businessmen on the forecaster and weather observer Isaac Cline

A first type of pressure on the observer was of commercial order: there was a competition between Houston and Galveston to determine which of both cities would become the major commercial center in the South of Texas. Galveston was however more vulnerable to hurricanes, because it is an island while Houston is farther away inland. Isaac Cline, the observer and forecaster based in Galveston, minimized the chances that his city could suffer the devastating effects of a major hurricane. It was out of question to depreciate Galveston in the eyes of potential investors.

Of strong pressures exercised by administrators of the US WEATHER BUREAU on the forecaster and weather observer

Another type of pressure on the observer resulted directly from Isaac’s managers, in the US WEATHER BUREAU. At the time, weather forecasts were only at an elementary stage and the US WEATHER BUREAU wanted to avoid alarming the population by using words like “hurricane”. They did not want to be the laughing stock of the population if the famous hurricane announced ended up to be only a standard storm. Isaac knew that his role consisted in delaying as much as possible the use of the word “hurricane”. Not wanting to go against the orders and to preserve his reputation with the Bureau, he possibly convinced himself that there was no major meteorological system approaching Galveston. He even told the population to stay put.

Galveston has always suffered and still does from an unfavorable geographical position. The hot waters in the Gulf of Mexico have always been an essential ingredient in the recipe of a major hurricane. This is where a storm will draw much of its energy. But, in the 1900 disaster, Galveston was also a victim of the combination of disproportionate egos, lack of judgment and commercial and political pressures exercised on the forecaster and the observer. All in all, approximately 10,000 people died in Galveston while thousands of others suffered the same fate in the surrounding cities.

If the population had been informed correctly, damage to property would nevertheless have been extremely important, but the losses of life would have been negligible.

Author: Erik Larson
Crown Publishers, New York
ISBN 0-609-60233-0
© 1999

Categories
Computer science

Menaces cybernétiques (Cyber threats)

Menaces cybernétiques - Le manuel du combattant
Menaces cybernétiques – Le manuel du combattant

For bilingual readers, here is an excellent book filled with practical information that is not catering only to computer science specialists. It is filled with advice that should help you avoid trouble when using your electronic devices. But, before going any further, here are some facts that may be of some interest to you:

1. The Pentagon has to deal with 250,000 direct threats every hour against its computer systems. Since the attacks may sometimes use as much as one million computers simultaneously, the Pentagon uses seven million computers to protect its different systems.

2. A password using 10 characters (no punctuation signs, no special characters) can be deciphered within ten minutes (and not only by a pro). You must add punctuation and special characters in your password in order to make it more difficult to decode. This password must be at least 10 characters long.

3. In 2012, there were 250 million zombie computers across the planet. A zombie computer can be your own computer taken over to launch many types of attacks without you knowing. It uses the resources on your computer without your authorization. This book offers a simple method to verify the integrity of your operating system, which can be done in a few seconds. You do not need to hire expert help.

4. 80% of businesses ignore that they are victims of cyber spying. We had a good example with Sony’s movie, “ The Interview” in 2014.

5. The global cost of cyber crimes in Europe, in 2012, was estimated at 750 billion euros. One internet user out of four was a victim of some kind of cyber crime in 2012.

6. At least 100,000 people are working in total secrecy for the United States in order to prepare attacks against external servers. In China, it is estimated that 300,000 employees are working on the same goal. Naturally, many other countries make significant efforts in this endeavor, like Russia, Iran and Israel, to name a few.

The book includes numerous and simple explanations aimed at helping everyone to be aware of the methods used by cyber spies. Politicians and businessmen can certainly benefit from the suggested improvements with regards to the use of personal electronic devices.

Cyber criminality is also discussed, and excellent advice is given to help everyone fight malware programs. You are also provided with a simple method to show you how to react if you ever are victim of ransomware. Some practical information is also provided to help protect your personal data, particularly your confidential banking data.

The author explains the difference between a virus and an IT worm. Few extremely sophisticated IT worms are presented, like STUXNET. This worm was used against Iranian nuclear installations in order to slow down their research program. You can learn about other worms like FLAME, GAUSS and SHAMOON.

The indirect risks resulting out of the use of viruses and IT worms are not negligible. When an IT worm is discovered within a computer system, its architecture becomes accessible to everyone. Criminal networks can then replicate or try to modify the IT worm, through reverse engineering, to new ends.

The reader learns how a classical DDOS attack is performed. There is also information about radio electric attacks that target telecommunications.

The book offers a number of interesting website resources, including:

1. If you think that there is an intrusion in your network: http://sourceforge.net/projects/ipscan
2. To locate an IP address: cut and paste all the source code information included within the e-mail and analyse it through the following site: http://www.iptrackeronline.com/email-header-analysis.php
3. To encrypt your important data: http://www.truecrypt.org/
4. For anonymous use of internet, the book suggests that you use a VPN: http://cyberghostvpn.com/. There is also a possibility to download the TAILS suite at: http://tails.boum.org/about/index.fr.html jointly with Gparted: http://gparted.sourceforge.net/. Tails uses TOR to connect to Internet.

The appropriate way to do back-ups is described in the book. If you are a social network user, you will have access to an entire chapter about Facebook and Twitter and others. The weaknesses in these networks as well as ways to protect yourself and the confidentiality of your personal information are described at length.

IT security within businesses is another important chapter. The author shows how the human factor is often neglected in the design of security strategy. The reader learns about the ways cyber spies manage to steal important data from companies. A few simple modifications of daily habits are sometimes just what is needed to prevent the loss of sensitive information.

In conclusion, this is a very interesting book that will help any reader to protect personal information stored in mobile devices and home or office computers.

Title: Menaces cybernétiques – Le manuel du combattant
Author : Yves-Marie Peyry
Éditions du Rocher, 2013
ISBN : 978-2-268-07513-6
Collection « Lignes de feu » directed by Daniel Hervouët

Categories
Screen captures

The F14 Tomcat (FSX) and the Palm Springs (KPSP) virtual airport, USA

F14 Tomcat inbound to the Palm Springs airport (FSX), USA (KPSP)
F14 Tomcat inbound to the Palm Springs airport (FSX), USA (KPSP)

Here is an edited screen capture that was added recently in the “flight simulation” section above, under “virtual pictures”. This virtual flight was made using Microsoft Flight Simulator (FSX). The scenery, very well executed by Orbx, represents the Palm Springs region, in United States. It is the most recent addition to the collection of virtual airports available for the California region. The F-14, made by Dino Cattaneo, is a freeware (check the free download links that is provided). This combination of plane and airport is certainly going to please the virtual flight enthousiast!

Categories
Updates

Update October 19, 2014

Hi everybody!

Many pictures and articles have been added during the past few weeks. The last addition to this site can be found in the “flight simulation” section, under “standard virtual flights”. It’s a flight using FSX from  Redding (California) toward Sekiu (Washington State). To make it easier for those of you who would like to try it, I’ve added the approach and stall speeds. The Phenom 100 is surprisingly easy to fly because it is a light jet with a low approach speed. It constitutes an excellent small jet for the pilot who wishes to transfer from piston engine aircraft toward jets. The virtual Phenom 100 is made by Carenado and the scenery by Orbx.

François

Phenom 100 turning toward Clallam Bay, inbound for the Sekiu airport
Phenom 100 turning toward Clallam Bay, inbound for the Sekiu airport
Categories
Screen captures

The Pitts Special in action at Monterey, California

A Pitts Special on an inverted flight over the Monterey airport, California (FSX
A Pitts Special on an inverted flight over the Monterey airport, California (FSX)

Here is a screen capture added recently to the flight simulation section, under “virtual pictures”. The Pitts Special was designed in Wyoming and the first one was built in 1971. This aircraft has won more open competitions in United States than any other type. Everyone who has flown the Pitts Special praise its quick reactions at the slightest pressure on the controls. In the actual scene, the aircraft is over the Monterey airport, a creation of Orbx for the FSX platform.