Category Archives: Security

Cadillac CTS Diesel SuperWagon

Oooooh, be still my beating heart. I’ve never been a Cadillac fan, since they seem to prefer excess and flash to function and efficiency, but I have to give them props for trying to step up and follow the European lead in diesel performance vehicles. Have a look at the Cadillac CTS Wagon:

GM says the 4.5L Duramax, which features aluminum cylinder heads with integrated manifolding and a variable-vane turbocharger mounted in the vee, is capable of delivering more than 310 hp and in excess of 520 lb-ft of torque. It also claims the engine meets the tough 2010 emissions standards, making it legal in all 50 states.

This diesel engine is said to get 20-25% better mileage than the Ultra V-8 engine and you know it will totally kill the numbers on the absurd supercharged V-8 CTS-v. In fact, I think they should just deploy the V-6 diesel in both America and Europe.

Why do it? While the CTS is due to get a 2.9L V-6 diesel in Europe, the 4.5L diesel V-8 would most likely be seen as a way of filling the obvious gap between the 304-hp direct-injection V-6 of the regular CTS and the 556-hp supercharged V-8 of the CTS-v here in the U.S.

What they should really do is can the gasoline V-6 version and offer the same diesel option as in Europe. It will have more power and better mileage. I would be more than happy with a 2.9L V-6 diesel. Who needs anything bigger? Oh, right, it’s Cadillac. Well, I guess better to have a massive V-8 diesel option than none at all. Either way, this would be a fantastic regatta/tow vehicle.

Disclaimer: I already own a VW version of this car, manufactured four years ago

2004 VW Passat TDI

…but I am sure I could be talked into updating to an American made V-6 diesel Cadillac SuperWagon.

Edith Wharton

I just ran across a few quotes by Edith Wharton, all of which are quite good. This one seemed most appropriate to security:

Misfortune had made Lily supple instead of hardening her, and a pliable substance is less easy to break than a stiff one.

Oh, how we always used to talk about hardening boxes.

PK Death Penalty for Electronic Crimes

Pakistan has promulgated the Prevention of Electronic Crimes Ordinance, 2008 (Ordinance No. IX of 2008). Note the death penalty is specifically mentioned for certain electronic crimes, such as terroristic acts, as explained here:

Explanation 2.- For the purposes of this section the expression “terroristic act” includes, but is not limited to,-

(a) altering by addition, deletion, or change or attempting to alter information that may result in the imminent injury, sickness, or death to any segment of the population;

(b) transmission or attempted transmission of a harmful program with the purpose of substantially disrupting or disabling any computer network operated by the Government or any public entity;

(c) aiding the commission of or attempting to aid the commission of an act of violence against the sovereignty of Pakistan, whether or not the commission of such act of violence is actually completed; or

(d) stealing or copying, or attempting to steal or copy, or secure classified information or data necessary to manufacture any form of chemical, biological or nuclear weapon, or any other weapon of mass destruction.

(2) Whoever commits the offence of cyber terrorism and causes death of anyperson shall be punishable with death or imprisonment for life, and with fine and in any other case he shall be punishable with imprisonment of either description for a term which may extend to ten years, or with fine not less than ten-million rupees, or with both.

This is the first time I have seen death as a penalty for committing electronic crime. One might think that the existing laws would cover maximum penalties for causing death, but apparently Pakistan wanted to write it into the text itself.

Bush authorized secret attacks

NYTimes.com highlights a secret mission authorized by Bush to attack Al Qaeda anywhere in the world:

These military raids, typically carried out by Special Operations forces, were authorized by a classified order that Defense Secretary Donald H. Rumsfeld signed in the spring of 2004 with the approval of President Bush, the officials said. The secret order gave the military new authority to attack the Qaeda terrorist network anywhere in the world, and a more sweeping mandate to conduct operations in countries not at war with the United States.

This immediately begs a question of why full-scale conventional war is still being pursued as the primary option if covert operations are more effective at eliminating the enemy. Even more to the point, this is exactly what many people (even Tom Clancy, if you follow Rogue Spear) advocated as the next natural order of international security.

Perhaps most interesting, however, is the obvious connection to the Ethiopian invasion of Somalia. I speculated at the time that the US was destabilizing the Somali government specifically to ensure America would able to continue military operations there without requiring approval or facing political resistance (e.g. pesky laws and notions of sovereignty). This seemed eerily similar to French and South African military strategy in Africa. The NY Times has confirmed this:

For example, shortly after Ethiopian troops crossed into Somalia in late 2006 to dislodge an Islamist regime in Mogadishu, the Pentagon’s Joint Special Operations Command quietly sent operatives and AC-130 gunships to an airstrip near the Ethiopian town of Dire Dawa. From there, members of a classified unit called Task Force 88 crossed repeatedly into Somalia to hunt senior members of a Qaeda cell believed to be responsible for the 1998 American Embassy bombings in Kenya and Tanzania.

At the time, American officials said Special Operations troops were operating under a classified directive authorizing the military to kill or capture Qaeda operatives if failure to act quickly would mean the United States had lost a “fleeting opportunity” to neutralize the enemy.

Occasionally, the officials said, Special Operations troops would land in Somalia to assess the strikes’ results. On Jan. 7, 2007, an AC-130 struck an isolated fishing village near the Kenyan border, and within hours, American commandos and Ethiopian troops were examining the rubble to determine whether any Qaeda operatives had been killed.

Although a stable Somalia would be good for the people living there, good for the stability of the Horn of Africa, and even good for the safety and security of the shipping trades along the coast including petroleum from the Gulf, the current US administration clearly preferred the option of extra-legal and covert control of the region to eliminate a few operatives.