Categories
Blogroll

COVID-19 Timeline

This timeline is an aid to decision-making during the recovery from the pandemic and how to better prepare for outbreaks in the post-COVID-19 pandemic policy environment.

2015

2016

Domestic Resource Mobilization in
Global Health Security

This session will explore the issue of major infectious disease outbreaks as a threat to economic and human security, and the need for domestic resource mobilization for pandemic preparedness. Emphasis will be placed on the situations within lower-middle and low-income countries, which often lack the financial, human, and physical resources required to strengthen their global health security infrastructure. This includes but is not limited to emergency response, health workforce, surveillance, procurement of countermeasures, cold and supply chain management, and adequate health systems.”

2019

October

Event 201: The Johns Hopkins Center for Health Security in partnership with the World Economic Forum and the Bill and Melinda Gates Foundation hosted Event 201, a high-level pandemic exercise on October 18, 2019, in New York, NY.

“The exercise illustrated areas where public/private partnerships will be necessary during the response to a severe pandemic in order to diminish large-scale economic and societal consequences.

Statement about nCoV and our pandemic exercise

In recent years, the world has seen a growing number of epidemic events, amounting to approximately 200 events annually. These events are increasing, and they are disruptive to health, economies, and society. Managing these events already strains global capacity, even absent a pandemic threat. Experts agree that it is only a matter of time before one of these epidemics becomes global—a pandemic with potentially catastrophic consequences. A severe pandemic, which becomes “Event 201,” would require reliable cooperation among several industries, national governments, and key international institutions.”

Human Extinction and the Pandemic Imaginary by Christos Lynteris is published on 8 October 2019 in London (ISBN 9780429322051).

“This book develops an examination and critique of human extinction as a result of the ‘next #pandemic’ and turns attention towards the role of pandemic catastrophe in the renegotiation of what it means to be human.”

The Times: En suite loos, wi-fi and showers . . . but our trains can’t keep up with China’s

“Anyone with a real interest in business and global trade will have been in London last week. To look on as the government tried to enact Brexit legislation? No — to attend the World Chinese Entrepreneurs Convention.”

“… It is 30 years old, but came to Europe for the first time only last week. …

3,000 delegates from Chinese-owned businesses representing a large part of world trade were at the ExCel centre in Docklands for three days.

“What’s a girl to do when she gets an invitation to the key dinner for this event?.”

November

Johns Hopkins University: Pandemic simulation exercise spotlights massive preparedness gap: Event 201, hosted by the Johns Hopkins Center for Health Security, envisions a fast-spreading coronavirus with a devastating impact

“ONCE YOU’RE IN THE MIDST OF A SEVERE PANDEMIC, YOUR OPTIONS ARE VERY LIMITED. THE GREATEST GOOD CAN HAPPEN WITH PRE-PLANNING.” Eric Toner, Senior scholar, Johns Hopkins Center for Health Security

2020

Nature: Two decades of pandemic war games failed to account for Donald Trump

The scenarios foresaw leaky travel bans, a scramble for vaccines and disputes between state and federal leaders, but none could anticipate the current levels of dysfunction in the United States.

January

On January 20, 2020, CDC received a clinical specimen collected from the first reported U.S. patient infected with SARS-CoV-2. CDC immediately placed the specimen into cell culture to grow a sufficient amount of virus for study.

February

March

Independent: Coronavirus: Scientists isolate virus responsible for deadly Covid-19 outbreak: Canadian research team says work will help inform global response to worsening pandemic

“A Canadian team of scientists has successfully isolated a strain of the coronavirus and grown samples in a lab to help study the pathogen responsible for the deadly global pandemic.

“Researchers from Sunnybrook Research Institute, McMaster University and the University of Toronto, all in Canada, isolated the virus from two specimens and then cultivated it in a secure containment facility.”

December

Reuters: Fact check: The virus that causes COVID-19 has been isolated, and is the basis for the vaccines currently in development

2021

Bulletin of the Atomic Scientists: The origin of COVID: Did people or nature open Pandora’s box at Wuhan?

December

What the Wuhan ‘lab leak’ tells us about the future of biowarfare

As it’s declared ‘more likely than not’ Covid came from a lab leak, what are the implications for those seeking to use viruses as weapons

Further Reading:

Global health and the new world order: Historical and anthropological approaches to a changing regime of governance Edited by Jean-Paul Gaudillière, Claire Beaudevin, Christoph Gradmann, Anne M. Lovell and Laurent Pordié

“The phrase ‘global health’ appears ubiquitously in contemporary medical spheres, from academic research programs to websites of pharmaceutical companies. In its most visible manifestation, global health refers to strategies addressing major epidemics and endemic conditions through philanthropy, and multilateral, private-public partnerships. This book explores the origins of global health, a new regime of health intervention in countries of the global South born around 1990, examining its assemblages of knowledge, practices and policies.

The volume proposes an encompassing view of the transition from international public health to global health, bringing together historians and anthropologists to analyse why new modes of “interventions on the life of others” recently appeared and how they blur the classical divides between North and South. The contributors argue that not only does the global health enterprise signal a significant departure from the postwar targets and modes of operations typical of international public health, but that new configurations of action have moved global health beyond concerns with infectious diseases and state-based programs.

The book will appeal to academics, students and health professionals interested in new discussions about the transnational circulation of drugs, bugs, therapies, biomedical technologies and people in the context of the “neo-liberal turn” in development practices.”

Global health and the new world order: Historical and anthropological approaches to a changing regime of governance Edited by Jean-Paul Gaudillière, Claire Beaudevin, Christoph Gradmann, Anne M. Lovell and Laurent Pordié

My background:

CASE STUDY 7: UNOSSC + UNDP | 2007 – 2016

CASE STUDY 5: GOSH/ICH Child Health Portal | 2001 – 2003

CASE STUDY 4: UN + UNDP Mongolia | 1997 – 1999

Hannah Institute For The History Of Medicine | 1992 – 1994

Lamas Against AIDS

Mongolian AIDS Bulletin

Philippine Conference Tackles Asia’s AIDS Crisis

Taking Medicine To The People: Four Innovators In Community Health

Take Two Big Doses Of Humanity And Call Me In The Morning

Women scientists prove potency of Mongolian beverage

ORCID iD: https://orcid.org/0000-0001-5311-1052.

© David South Consulting 2021

Categories
Blogroll

What is the UN doing with your data?

If you allow another country to gain access to really critical data about your society, over time that will erode your sovereignty, you no longer have control over that data.

MI6 chief Richard Moore to BBC News (30 November 2021).

Are the Chinese secret services now the most powerful in the world?

Roger Faligot, Chinese Spies: From Chairman Mao to Xi Jinping (2019).
In 2015 the Federal Bureau of Investigation (FBI) busted UN-based South-South News for being a “conduit” for bribery and money laundering at the United Nations. It participated in an audacious scheme to build a new UN centre in Macau, China for the United Nations Office for South-South Cooperation’s (UNOSSC) GSSD Expo.

Introduction

Data. The United Nations (UN) has always gathered data and published it. But since the advent of the digital revolution, data collection has taken on new forms. It is now gathered 24/7 and sits in databases – or on somebody’s smartphone. It flows in, and flows out. Some call it a ‘data deluge’. Since 2000, despite various initiatives (irritating ‘cookies’ warnings before you can interact with a web page, or the more legalistic General Data Protection Regulation (GDPR) – a regulation in EU law on data protection and privacy in the European Union and the European Economic Area) data has become incontinent: it leaks out everywhere.

An orgy of cross-border data collection and harvesting has only increased in its intensity in the past 20 years. And the UN and other international organisations have played their part.

But what most of us do not want to think about is this: that data is power and when it is parsed and sifted by algorithms and AI (artificial intelligence), it allows the entity doing this to engage in event-shaping. How much of our lives is being shaped by digital ‘voodoo dolls’ in a cyber centre somewhere?

And, as the head of the UK’s MI6 intelligence service says, “over time that will erode your sovereignty, you no longer have control over that data.” In short, you’ve been hacked.

2011

France24: UN among victims of massive cyber-spying campaign

“Cyber-security experts have unveiled one of the biggest computer hacking campaigns to date, releasing a list of 72 organisations whose networks were attacked over a five-year period. Victims include the UN and several governments.

REUTERS – Security experts have discovered the biggest series of cyber attacks to date, involving the infiltration of the networks of 72 organizations including the United Nations, governments and companies around the world. … 

In the case of the United Nations, the hackers broke into the computer system of its secretariat in Geneva in 2008, hid there for nearly two years, and quietly combed through reams of secret data, according to McAfee.”

2017

June

BBC: Accenture and Microsoft plan digital IDs for millions of refugees

Guardian: Secret aid worker: we don’t take data protection of vulnerable people seriously

“Personal information leaked in sensitive contexts can spark violence, discrimination, exclusionary policies. Yet my NGO shares confidential data freely.”

December

UNHCR: ID2020 and UNHCR Host Joint Workshop on Digital Identity

2019

June

Xinhua: China, UN to build big data research institute in Hangzhou

2020

January

The New Humanitarian: EXCLUSIVE: The cyber attack the UN tried to keep under wraps

“If there are no consequences for the [UN] agencies for failures like these … there will be more breaches.”

About this investigation:
While researching cybersecurity last November, we came across a confidential report about the UN. Networks and databases had been severely compromised – and almost no one we spoke to had heard about it. This article about that attack adds to The New Humanitarian’s previous coverage on humanitarian data. We look at how the UN got hacked and how it handled this breach, raising questions about the UN’s responsibilities in data protection and its diplomatic privileges.

https://www.forbes.com/sites/daveywinder/2020/01/30/united-nations-confirms-serious-cyberattack-with-42-core-servers-compromised/?sh=4cb9c05d633d

UN confirms it suffered a ‘serious’ hack, but didn’t inform employees

Approximately 4,000 employees may have had their data compromised.

XDR Report: UN hacked: Attackers got in via SharePoint vulnerability

“In summer 2019, hackers broke into over 40 (and possibly more) UN servers in offices in Geneva and Vienna and downloaded “sensitive data that could have far-reaching repercussions for staff, individuals, and organizations communicating with and doing business with the UN,” The New Humanitarian reported on Wednesday.”

Oz Alashe, CEO of CybSafe, says that the unintentional disclosure of this cyber attack on such an important institution last year is concerning.

“This delay, and the fact that the UN did not report this attack to any governing authority – or even their own staff – may have put victims at unnecessary risk. Not only were staff passwords stolen, system controls and security firewalls were compromised too which could have led to the critical confidential reports falling into criminal hands,” he pointed out.

This attack could end up undermining trust in the UN – trust that they are able to keep sensitive information safe and trust that they will notify affected individuals when they fail.”

April

Quartz: The UN is partnering with China’s biggest surveillance software company

Foreign Policy: EXCLUSIVE U.N.: Backs Down on Partnership With Chinese Firm for 75th Anniversary: The decision comes after U.S. officials and human rights advocates complained that Tencent aids Beijing in surveillance.

October

WSJ Opinion: China Uses the U.N. to Expand Its Surveillance Reach | In the name of ‘sustainable development,’ Beijing takes the lead in data collection efforts.

December

United Nations: Inauguration Ceremony Regional Hub for Big Data in China in support of the United Nations Global Platform

“I am very honoured to join you today in this inauguration ceremony of the Regional Hub for Big Data in China, in support of the United Nations Global Platform. The inauguration of this Regional Hub is most important, and timely. 

The demand for data, especially during the COVID-19 pandemic, is greater than ever.  Governments are in need of detailed data on the spread of the virus and its impacts on society. Under these challenging circumstances, statistical institutes have had to respond urgently to the demand for data, and to present innovative solutions. Consequently, in these times of need, the statistical community is now able to effectively use Big Data and advanced technologies. 

For example, census data – together with detailed geospatial information – can help identify the most vulnerable populations during the pandemic. And, real-time data on the position and movement of ships, for example, can estimate the volume of cargo being transported, and thus help produce estimates on the state of the economy. These real-time shipping data are available as a global data set on the United Nations Global Platform, and can be accessed by the whole statistical community.”

Foreign Policy: CHINA USED STOLEN DATA TO EXPOSE CIA OPERATIVES IN AFRICA AND EUROPE: The discovery of U.S. spy networks in China fueled a decadelong global war over data between Beijing and Washington.

“Around 2013, U.S. intelligence began noticing an alarming pattern: Undercover CIA personnel, flying into countries in Africa and Europe for sensitive work, were being rapidly and successfully identified by Chinese intelligence, according to three former U.S. officials. The surveillance by Chinese operatives began in some cases as soon as the CIA officers had cleared passport control. Sometimes, the surveillance was so overt that U.S. intelligence officials speculated that the Chinese wanted the U.S. side to know they had identified the CIA operatives, disrupting their missions; other times, however, it was much more subtle and only detected through U.S. spy agencies’ own sophisticated technical countersurveillance capabilities.”

2021

January

ITPro: United Nations suffers potential data breach: Hackers could have breached the database long before the UN applied a patch

Japan Forward: China Strengthens Influence on the U.N. Through Big Data Collection

A United Nations research institute is being set up in China that will amass and analyze huge amounts of data from around the world on sustainable development goals. Chinese researchers are expressing the need for data in order to analyze human behavior.

“China’s influence is undoubtedly growing in the United Nations, with four of the 15 specialized agencies of the intergovernmental organization being led by Chinese nationals. Beijing seized the “absence” of the United States, accelerated by the Trump administration’s disdain for the U.N., to extend its tentacles to unexpected places.

A plan to set up the first U.N. big data research institute is underway in Hangzhou, Zhejiang Province, China. Officially, it would facilitate U.N. operations by amassing and analyzing huge amounts of data from around the world on sustainable development goals (SDGs) to tackle global issues such as starvation and climate change.

One cause for concern is that Chinese researchers are expressing the need for data in order to analyze human behavior. The United States, which is wary of any data leaks to China, is raising alarms against the plan. In an October 7, 2020, article in The Wall Street Journal,Hudson Institute fellow Claudia Rosett warned that the plan would enable China to collect data from U.N. member states and set the standards for data collection.” 

March

Financial Times: Opinion Technology sector: As digital trade grows, so does western distrust of Beijing: China is moving to the forefront of global innovation but governments fear privacy breaches

April

Nikkei Asia: Comment: Data suspicions threaten to tear China and west apart: Applications by Chinese companies see 200-fold increase since 1999

May

UNHCR: Government of Pakistan delivers first new biometric identity smartcards to Afghan refugees

July

ODI: Although shocking, the Rohingya biometrics scandal is not surprising and could have been prevented

“The data privacy and security of Rohingya refugees in Bangladesh has reportedly been jeopardised by the UN Refugee Agency. In an exposé published on 15 June by Human Rights Watch (HRW), UNHCR stands accused of improperly collecting the Rohingya’s biometric information and later sharing it with the Myanmar government without the Rohingya’s consent. Refugees said they had been told to register to receive aid, but the risks of sharing their biometrics had not been discussed, and the possibility this information would be shared with Myanmar was not mentioned.

The potential harm of sharing information with a regime that has a long history of manipulating registration systems to exclude and marginalise Rohingya populations is obvious. That biometrics are involved makes it worse. Unlike names or other personal information, biometrics are sticky – it’s not something you can change or escape.”

August

Reuters: ANALYSIS-Afghan panic over digital footprints spurs call for data collection rethink

Biometric Update: Concerns over Taliban accessing aid agency biometric data

“People in Afghanistan are fearful of the Taliban accessing personal information captured and stored by aid agencies including biometric data which could be used to identify individuals. Experts have raised concern that approaches used by security firms and United Nations development agencies could prove problematic for refugees and vulnerable groups, reports the Thomson Reuters Foundation, the charitable trust of Thomson Reuters.

The Intercept reported that equipment used by the U.S. army for biometric collection has already been seized by the Taliban. Biometric data on Afghans who assisted the U.S. were widely collected, making anybody identified vulnerable to persecution from the Taliban.

Sources told the Intercept that there was little planning for such an event, while the U.S. Army plans to continue to spend another $11 million on biometrics capture equipment including 95 more devices.

The UNHCR has been using biometrics in the region since 2002 when it tested iris recognition technology on Afghan refugees in the Pakistani city of Peshawar. Aid agencies praise biometric technology’s anti fraud and contactless capabilities.”

September

Bloomberg: Cybersecurity

UN Computer Networks Breached by Hackers Earlier This Year

“Hackers breached the United Nations’ computer networks earlier this year and made off with a trove of data that could be used to target agencies within the intergovernmental organization. 

The hackers’ method for gaining access to the UN network appears to be unsophisticated: They likely got in using the stolen username and password of a UN employee purchased off the dark web.”

“Organizations like the UN are a high-value target for cyber-espionage activity,” Resecurity Chief Executive Officer Gene Yoo said. “The actor conducted the intrusion with the goal of compromising large numbers of users within the UN network for further long-term intelligence gathering.”

CPO Magazine: United Nations Data Breach: Hackers Obtained Employee Login From Dark Web, Are Executing Ongoing Attacks on UN Agencies

“A spokesperson for the United Nations has confirmed that the organization was breached by hackers in early 2021, and that attacks tied to that breach on various branches of the UN are ongoing. The data breach appears to stem from an employee login that was sold on the dark web. The attackers used this entry point to move farther into the UN’s networks and conducted reconnaissance between April and August. Information gleaned from this activity appears to have been put to use in further attacks, with attempts made on at least 53 accounts.”

UN data breach creates long-term havoc for organization

“The UN has a unique need for cutting-edge cybersecurity given that it is one of the world’s prime targets for hackers, and that it fields regular attacks from advanced operators. Many of these go unrecorded, but the organization has weathered some high-profile attacks in recent years.”

2022

January

The Hub: China’s influence at the UN is growing—how, why, and what it means with Rosemary Foot

ABC News: Security scanners across Europe tied to China govt, military

At some of the world’s most sensitive spots, authorities have installed security screening devices made by a single Chinese company with deep ties to China’s military and the highest levels of the ruling Communist Party

The Diplomat:

China’s Espionage Plans for the 2022 Winter Olympics: What Athletes Should Expect

Yes, China is going to spy on the Olympic athletes. Its mandatory app is just the tip of the iceberg.

Why the US Must Take China’s Disinformation Operations Seriously

China has barely scratched the surface of its potential to carry out a “people’s war” on global public opinion.

“China’s propaganda machine also has over 1 million journalists and reporters tasked with the mission to “tell China’s story well.” Armed with AI and bots, China’s huge internet army could hobble global social media platforms with a large-scale flooding attack to win the CCP’s public opinion war.”

February

FBI Director Wray says scale of Chinese spying in the U.S. ‘blew me away’

The FBI opens a new China-related counterintelligence investigation every 12 hours on average, and it now has over 2,000 such cases.

“Unique Identity for All”: Biometric identity is being rolled out across the planet. HSB is one of the many players in this fast-growing data collection sector. Companies such as HSB collect data on behalf of international organisations.

Facial recognition AI software triangulates facial features to produce a recognition match.

This story is from 1992 and is a rare glimpse into Canada’s data sharing agreements with the US and other countries.

Data integrity and cross-border data sharing have been concerns for a very long time. False Data Makes Border Screening Corruptible

Further Reading:

There’s a War Going On But No One Can See It by Huib Modderkolk, Bloomsbury, 02 Sept. 2021

“Based on the cases he investigated over a period of six years, award-winning Dutch journalist Huib Modderkolk takes the reader on a tour of the corridors and back doors of the globalised digital world. He reconstructs British-American espionage operations and reveals how the power relationships between countries enable intelligence services to share and withhold data from each other.”  

The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power by Shoshana Zuboff, Profile Books, 2019

“Surveillance Capitalism: A new phase in economic history in which private companies and governments track your every move with the goal of predicting and controlling your behaviour. Under surveillance capitalism you are not the customer or even the product: you are the raw material.”

BBC News: MI6 boss warns of China ‘debt traps and data traps’

“In a wide-ranging interview ahead of his first major public speech since taking on the role as head of MI6, Mr Moore:

  • warned China has the capability to “harvest data from around the world” and uses money to “get people on the hook” …

“Speaking about the threat posed by China, Mr Moore described its use of “debt traps and data traps”.

He said Beijing is “trying to use influence through its economic policies to try and sometimes, I think, get people on the hook”.

Explaining the “data trap”, he said: “If you allow another country to gain access to really critical data about your society, over time that will erode your sovereignty, you no longer have control over that data.

“That’s something which, I think, in the UK we are very alive to and we’ve taken measures to defend against.”

Creative Commons License

This work is licensed under a
Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License.

ORCID iD: https://orcid.org/0000-0001-5311-1052.

© David South Consulting 2021

Categories
Archive Blogroll

Wild East 17 Years Later | 2000 – 2017

Published in 2000 (ECW Press: Toronto), Wild East: Travels in the New Mongolia is 17 years old. It is also 100 years since the 1917 October Revolution in Russia that began the long experiment of the Soviet Union. Mongolia was the second country after Russia to adopt Communism.

“Engaging…a revealing and often amusing account of her journeys through a beautiful country awakening from a tumultuous era.”

Wild East author and foreign correspondent Jill Lawless.

“One of the top 10 Canadian travel books of 2000.” The Globe and Mail

The world has changed considerably since then; and so has Mongolia. The digital revolution has rolled across the planet, the attacks of 9/11 unleashed a wave of violence and wars, and Mongolia even became the fastest-growing economy in the world a few years ago (2012). But back when this book was researched, Mongolia was just coming out of decades of isolation within the Soviet orbit under Communism, and the country experienced in the 1990s “one of the biggest peacetime economic collapses ever” (Mongolia’s Economic Reforms: Background, Content and Prospects, Richard Pomfret, University of Adelaide, 1994). 

“The years 1998 and 1999 have been volatile ones for Mongolia, with revolving door governments, the assassination of a minister, emerging corruption, a banking scandal, in-fighting within the ruling Democratic Coalition, frequent paralysis within the Parliament, and disputes over the Constitution. Economically, the period was unstable and rife with controversies.” Mongolia in 1998 and 1999: Past, Present, and Future at the New Millennium by Sheldon R. Severinghaus, Asian Survey, Vol. 40, No. 1, A Survey of Asia in 1999 (Jan. – Feb., 2000), pp. 130-139 (Publisher: University of California)

That collapse made for some crazy times, as Wild East shows. 

Wild East was called one of the top 10 Canadian travel books of 2000 by The Globe and Mail. 

Reviews for Wild East: Travels in the New Mongolia by Jill Lawless:

The Globe and Mail

“Engaging…a revealing and often amusing account of her journeys through a beautiful country awakening from a tumultuous era.”

The Georgia Straight, Vancouver

“This readable and reportorial book is the perfect antidote to … those tiresomely difficult, pointlessly dangerous, and essentially fake expedtions undertaken against the advice of local people who know better.”

Toronto Star

“Lawless introduces us to Mongolia’s tabloid press, to teenage mineworkers, sharp-eyed young hustlers, nomads whose only possessions are their livestock, Mongolian wrestlers and Mongolian horse races.”

Mongolian Buryat Civilisation Bookstore

“Wryly funny and wide-spectrum account of Mongolia’s tumultuous rebirthing into the 21st century. Half the population lives in Soviet apartment blocks and watches satellite TV but the other half still eek a living from the exquisite, barren hills while living in nomadic felt tents. Of course, I’d much rather be in the tents… but whatever your preference, you will definitely enjoy Ms. Lawless’ writing. She was editor of an Ulaan Baator newspaper for two years, and she tells it like it is. Very highly recommended.”

Alicia J. Campi in Mongolian Studies

“Jill Lawless’ book is not a scholarly tome per se, yet it is of definite value to the contemporary Mongolian scholar … Lawless’ period is 1997-1999, the heart of the tumultuous and ill-spent years of Democratic Coalition Government… a period of great hopes for democratic flowering and free market enterprise leading the nation to prosperity and progress.” 

Join the conversation about Wild East: Travels in the New Mongolia at goodreads and post reviews: https://www.goodreads.com/book/show/773080.Wild_East

Read a story by Jill in The Guardian (9 June 1999): Letter from Mongolia | Herding instinct .

Copies of Wild East: Travels in the New Mongolia by Jill Lawless are still available in various editions and languages.
A promotional poster for Wild East from 2003.

Explore further Jill Lawless’ work here: https://muckrack.com/jilllawless

UK edition (Summersdale Travel: 2002). Front cover images © David South and Liz Lawless.

The New York Post called Wild East: Travels in the New Mongolia “harrowing, hilarious” (April 26, 2016).
New brand sites for Jill Lawless and Wild East on the way for 2021.
“This is a good, fun book about life in Mongolia. … it’s an interesting and often amusing series of stories loosely connected.”

On the difference between Wild East: Travels in the New Mongolia and other travel writing on contemporary Mongolia: 

“Others sent me Jill Lawless’s Wild East: The New Mongolia, a compilation of pieces she wrote when she was editor of Mongolia’s English-language newspaper, the UB Post, during Mongolia’s transition from a socialist people’s republic to young democracy. With the wind shaking the frame of my ger, I lit the stove and read what these and other writers claimed to have found just outside my flapping felt walls.

“By the time veteran journalist Jasper Becker’s Mongolia: Travels in an Untamed Land arrived, I had put aside books written since Mongolia opened up to the West in the early 1990s. Most Western travellers and writers discovered the same sights from the back of a borrowed horse. Only Lawless had investigated the place over time on its own terms. The others, full of pith and vinegar and a standard set of assumptions about what they would find, built books on flights of fancy – golfing across Mongolia, following the path of medieval monks, ‘rediscovering shamanism’ – that were flimsier even than those that had set me in motion. The books were as exciting as museum diorama, papier-mâché models of their ‘medieval’ travels and capitalist fantasies.” Three Years in Mongolia: Trying to be a Travel Writer, Luke Meinzen, Kill Your Darlings, 10 April 2012

“I put Becker away and pulled out Wild East by Jill Lawless. She was heaps better than Becker, which wasn’t hard.” MÖRÖN TO MÖRÖNTwo Men, Two Bikes, One Mongolian Misadventure, Tom Doig, Allen & Unwin, 2013

“In the early 2000s, Canadian journalist Jill Lawless accepted a correspondent position at a news outlet in the remote and isolated foreign capital of Ulaanbaatar, Mongolia. At that time, Mongolia’s media was newly privatized from beneath Communist oversight, and her role was as much a consultant for how to run a newspaper under freedom of the press, as she was a journalist with the UB Post.

Lawless was in Mongolia during a time of exciting political and cultural transition. Wild East is less of a travel memoir, but rather essays and shorter narratives of creative non-fiction that describe her adventures in reporting. Even so, it provides a compelling narrative into the historical moment when Mongolia dropped its isolation and began to connect to China and Europe on its journey toward modernization.” Three Works of Travel Writing to Ignite Your Imagination (while we patiently wait for the pandemic to run its course), Barefoot Journey with Amanda, 10 Nov 2020.

Creative Commons License

This work is licensed under a
Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License.

ORCID iD: https://orcid.org/0000-0001-5311-1052.

© David South Consulting 2022