Feeds

Copenhagen talks stalled by green puppeteers

DONGers' cars burnt in protests

High performance access to file storage

International climate negotiations in Copenhagen were reportedly stalled today, as delegates from developing nations - some working hand-in-glove with Western environmental activists - expressed their objections to rumoured plans by rich nations to replace the established Kyoto Protocol with a new framework.

The BBC reports that the so-called G77-China bloc, composed of 130 mostly poor nations, has "suspended cooperation" with the Conference of the Parties to the UN Framework Convention on Climate Change, aka COP15.

Many of the poorer G77-China nations have only the minimum UN-funded two person delegations at the conference, and it is well known that such delegations are "assisted" by comparatively well-funded Western environmental activist groups. In many ways, the current argument is between two groups in Western society, rather than between the poor world and the rich.

According to the BBC, the activists who throng the conference chanted "we stand with Africa - Kyoto targets now" earlier today.

The greens and the poor countries want a continuation of carbon controls under the Kyoto model, under which developed nations cut their emissions and large green subsidies flow to the developing world - which is still allowed to increase emissions from their current low levels. Fast-growing nations like China and India also prefer this plan, as they can continue to increase their emissions too.

British climate secretary Ed Miliband has said that continuing with the Kyoto model would be "irresponsible for the climate", as it would leave major emitters such as China without targets for cuts.

A draft text of a new agreement more to the richer countries' liking, which incidentally would sideline the UN at future negotiations and remove its control of climate aid payments, was leaked to the media last week, causing much of the present furore.

As delegates and activists wrangled, street protests took place in the city outside. Reuters reports that nine cars, including some belonging to Danish state-owned energy utility DONG Energy, were torched by unknown arsonists overnight. ®

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
Get your MOON GEAR: Auction to feature Space Race memorabilia
Keepsakes from early NASA, Soviet programs up for bids
New FEMTO-MOON sighted BIRTHING from Saturn's RING
Icy 'Peggy' looks to be leaving the outer rings
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.