Climate Crisis: The Ongoing Case of Big Subsidies

Pollution over Mexico CityOne of the most recurring talking points in the Climate Change debate is the issue of renewable energy. Particularly, those who take issue with proposed changes for dealing with the problem continue to cite how solar, wind and tidal power are not viable replacements at this juncture. While this talking point is a convenient way of dismissing needing reforms, it neglects two self-evident realities.

For one, it ignores the immense amount of progress being made in the fields of renewable energy. Whereas inefficiency and high costs remained as stumbling blocks in previous decades, an exponential drop in costs and a rise in efficiency has made solar increasingly attractive for power companies in recent years. Wind and tidal are in similar situations, with countries like Scotland and the United Arab Emirates leading the way in making them profitable.

airpollutionSecond, it ignores the fact that developed nations continue to stymie growth in renewables by the continued way in which they commit billions to subsidizing oil and coal. According to a new report from the Overseas Development Institute, public subsidies for fossil fuels totaled $523 billion in 2011. That’s six times the level of support for the renewable energy industry, despite those technologies being less mature than oil and coal.

Among richer countries, the top 11 heaviest carbon emitters spent $74 billion in subsidies in 2011, with Russia, the United States, Australia, Germany, and the United Kingdom leading the way. In the U.S., these included a $1 billion fuel tax exemption for farmers, $1 billion for the Strategic Petroleum Reserve, and $500 million for fossil fuel R&D.

oil_slickIn so doing, these governments are:

…shooting themselves in both feet [by subsidizing] the very activities that are pushing the world towards dangerous climate change… [and] creating barriers to investment in low-carbon development.

According to the British think-tank, this works out a spending of $112 per adult in these nations. But of course, the richest nations are not the only offenders, which nations like Pakistan, Egypt, and Indonesia spending more than twice as much on fossil fuel subsidies as on health. The ODI says the poorest 20% of households typically receive just 7% of overall handouts.

pollution_powerplantBut the ODI may be underestimating the true size of the subsidies in the U.S., depending on how you look at it. Earlier this year, the International Monetary Fund calculated subsidies at $502 billion, a figure which includes the true cost of carbon emissions calculated at a price of $25 a ton. By that measure, global subsidies equal $1.9 trillion.

The report also advises that governments should cut handouts to oil and coal as soon as they can and begin looking after the genuinely poor:

Phasing out fossil fuel subsidies would create a win-win scenario. It would eliminate the perverse incentives that drive up carbon emissions, create price signals for investment in a low-carbon transition and reduce pressure on public finances.

solar_cell1A timely and sound recommendation, and one which cuts to the heart of the matter. In order to address the problem of Climate Change, we must not only adopt better methods for meeting our needs, we must acknowledge the truth of the issue. At the same time, we must acknowledge how ending these subsidies, or redistributing them, would alter the current balance of power on the whole issue of energy.

It’s one thing to claim that alternative methods are unviable when the playing field is level, but since it is not, the argument is essentially hypocrisy. By continuing to finance fossil fuels and coal, we are ensuring that clean energy will remain underdeveloped as an alternative, and hence undermining any chance it has at becoming a true alternative.

So the next time someone tells you that solar or other means of renewable energy are at least 50 years away, or that gas and coal are the only economical means of meeting our energy needs, be sure to ask them why we need to spend half a trillion dollars on them annually.

Sources: fastcoexist.com, odi.org.uk

Cyberwars: Stuxnet and Cryptolocker

cyber_security1It’s been quite the year for cybercops, cybercriminals, and all those of us who are caught in between. Between viruses which continue to involve and viruses that target sensitive information in new ways, it seems clear that the information age is fraught with peril. In addition to cyberwars raging between nations, there is also the danger of guerrilla warfare and the digital weapons running amok.

Consider the Stuxnet virus, a piece of programming that made headlines last year by sabotaging the Iranian nuclear enrichment program. At the time, the target – not to mention its source (within the US) – seemed all too convenient to have been unintentional. However, this year, Stuxnet is once again garnering attention thanks to its latest target: the International Space Station.

ISSApparently, this has been the result of the virus having gone rogue, or at least become too big for its creators to control. In addition to the ISS, the latest reports state that Stuxnet is hitting nuclear plants in countries for which the virus was not originally intended. In one case, the virus even managed to infect an internal network at a Russian power planet that wasn’t even connected to the internet.

According to Eugene Kaspersky, famed head of IT security at Kaspersky Labs, the virus can travel through methods other than internet connectivity, such as via optical media or a USB drive. Kaspersky claims that this is apparently how it made its way aboard the ISS, and that it was brought aboard on more than one occasion through infected USB drives.

computer-virus.istockFor the moment, it is unclear how this virus will be taken care of, or whether or not it will continue to grow beyond any single organization’s ability to control it. All that is clear at this point is that this particular virus has returned to its original handlers. For the time being, various nations and multinational corporations are looking to harden their databases and infrastructure against cyber attack, with Stuxnet in mind.

And they are not the only ones who need to be on their guard about protecting against intrusion. Average consumers are only at risk of having their databases being accessed by an unwanted digital visitor, one that goes by the name of Cryptolocker. Designed with aggressive salesmanship – and blackmail – in mind, this virus is bringing fears about personal information being accessed to new heights.

cryptolockerBasically, the Cryptolocker works by finding people’s most important and sensitive files and selling it back to them. After obtaining the files its needs, it then contacts a remote server to create a 2048-bit key pair to encrypt them so they cannot be recovered, and then contacts the owner with an ultimatum. People are told to pay up, or the virus will begin deleting the info.

When the virus first emerged in October of this year, victims were given three days to cough up roughly $200 via BitCoin or MoneyPak currency transfer. If the virus’ authors did not receive payment within 72 hours, they said, a single line would be deleted from a text file on some hidden foreign server, forever erasing the only string of numbers that could ever bring the affected files back from the dead.

cyber_virusSome users responded by simply setting their system’s internal clock back. A temporary measure, to be sure, but one which worked by tricking the virus into thinking the deadline had not expired. In addition, the three-day deadline worked against the viruses makers, since it’s proven restrictive to the types of people who mostly contract a virus like this – i.e. senior citizens and people working on corporate networks.

Such people are more vulnerable to such scams, but seldom have the computer-savvy skills to to set up BitCoin or other such accounts and transfer the money in time. Meanwhile, infecting a corporate server means that a bloated corporate bureaucracies will be responsible for making the decision of whether or not to pay, not an individual who can decide quickly.

virus-detected-640x353So basically, the designers of Cryptolocker were facing a catch-22. They could not extend the deadline on the virus without diminishing the sense of panic that makes many people pay, but would continue to lose money as long as people couldn’t pay. Their solution: If a victim does not pay up in time, the hackers simply raise the ransom – by a factor of 10!

This allows people more time to mull over the loss of sensitive data and make a decision, but by that time – should they decide to pay up – the price tag has gone up to a bloated $2000. Luckily, this has revealed a crucial bluff in the virus’s workings by showing that all the keys to the encrypted files are in fact not deleted after the three day time limit.

???????????????As such, the security industry is encouraging people to hold on to the useless, encrypted files and waiting for the criminal server to be someday seized by the authorities. Since any ransom paid is a de-facto encouragement to hackers to write a similar virus again — or indeed to re-infect the same companies twice – people are currently being told to simply hold out and not pay up.

What’s more, regular backups are the key to protecting your database from viruses like Cryptolocker. Regular backups to off-network machines that do not auto-sync will minimize the virus’ potential for damage. The best defense is even simpler: Cryptolocker infects computers via a bogus email attachment disguised as a PDF file, so simple email safety should keep you immune.

Alas, its a world of digital warfare, and there there are no discernible sides. Just millions of perpetrators, dozens of authorities, and billions of people fearing for the safety and integrity of their data. One can only wonder what an age of quantum computers, graphene and nanotube processors will bring. But more on that later!

Sources: extremetech.com, (2), fastcoexist.com