No sign of 52 missing from sunken trawler, empty lifeboats recovered

December 2, 2014

Fishing boatSeoul, Dec 2: South Korean officials say rescuers have found no trace of 52 people missing after a South Korean fishing boat sank off Russia's far-east coast.

Rescuers have recovered four empty lifeboats from the trawler, a Russian official said, as hope of finding the lost crew members fades.

"Four torn lifeboats were found," said Oleg Karev of the marine rescue centre in the port of Petropavlovsk-Kamchatsky which is participating in the rescue mission.

Rescuers also saw one dead body floating in the area but were not able to recover it due to storm conditions, he said.

The ferry, operated by South Korea's Sajo Industries, went down in the western Bering Sea on Monday.

The trawler was carrying 60 people, including one Russian inspector, 11 South Koreans, 35 Indonesians and 13 Philippine crew members.

One Korean sailor was confirmed dead, while the Russian and six foreign crew members had been rescued.

"Overnight rescue efforts produced no tangible results and 52 people are still missing," a Sajo Industries spokesman said.

Four ships, including two associated with Sajo, had been combing the site, the spokesman said, but the search was hampered by poor weather conditions and rough seas.

"We still don't really know how many may have managed to take to the life boats," he said.

The 36-year-old trawler was fishing for pollock when it sank in stormy weather.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
March 25,2020

Beijing, Mar 25: Around 5,000 people have signed up for the phase I clinical trial of recombinant novel coronavirus vaccine in Chinese city Wuhan where the virus first emerged late last year.

The recruitment for participants ended this week with nearly 5,000 volunteers signing up for the trial, state-run Beijing News reported on Wednesday.

A single-centre, open and dose-escalation phase I clinical trial for recombinant novel coronavirus vaccine (adenoviral vector) will be tested in healthy adults aged between 18 and 60 years, according to the ChiCTR (China Clinical Trial Register).

The trial, led by experts from the Academy of Military Medical Sciences, gained its approval on March 16 and the research is expected to last half a year.

Requiring at least 108 participants, the trial will be conducted in Wuhan, capital of Hubei province, the region worst-affected by the virus in the country, state-run China Daily reported.

Participants will experience 14-day quarantine restrictions after being vaccinated and their health condition will be recorded every day.

Chinese scientists are hastening the development of COVID-19 vaccines through five approaches --- inactivated vaccines, genetic engineering subunit vaccines, adenovirus vector vaccines, nucleic acid vaccines and vaccines using attenuated influenza virus as vectors.

So far, most teams are expected to complete preclinical research in April and some are moving forward faster, Wang Junzhi, an academician with the Chinese Academy of Engineering said.

Wang noted that research and development of COVID-19 vaccines in China is not slower than foreign counterparts and has been carried out in a scientific, standardised and orderly way.

China has stepped up the process to finalise vaccines to counter COVID-19 after Kaiser Permanente research facility in Seattle and Washington stole the march and began human trials.

China lifted tough restrictions on the Hubei province on Wednesday after a months-long lockdown as the country reported no new domestic cases.

But there were another 47 imported infections from overseas, the National Health Commission said. In total, 474 imported infections have been diagnosed in China -- mostly Chinese nationals returning home.

Comments

Y UDAYA CHANDAR
 - 
Monday, 13 Apr 2020

Dear Sir,

 

I am 77 but a very healthy person with remarkable immunity. I contracted Malaria fever in 1994 because of mosquito biting and I have not been sick anytime there after, not even for ordinary fever in the last 26 years.

 

I am sure you would like to conduct the trials on persons of varying criteria. I am sure you don't want to carry out the trials on perfectly healthy young individuals only. 

 

I am certain that  you want to try the vaccine on a 'common man' from 'general public.' I am ready for the trial and you can take me. I will be delighted. 

 

If you are not handling this matter kindly forward this mail to the correct agency.

 

I look forward to hearing from you.

 

Best regards.

 

If you are not moving forward, you are really moving backward.

Y Udaya Chandar

 

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 1,2020

Washington, Mar 1: The US Federal Communications Commission (FCC) has proposed a fine of over $200 million for all major US mobile carriers for selling the location data of customers to some agencies.

The Federal Communications Commission today proposed fines against the nation's four largest wireless carriers for apparently selling access to their customers' location information without taking reasonable measures to protect against unauthorised access to that information. As a result, T-Mobile faces a proposed fine of more than $91 million, AT&T faces a proposed fine of more than $57 million, Verizon faces a proposed fine of more than $48 million, and Sprint faces a proposed fine of more than $12 million, the FCC said in a statement on Friday.

The Enforcement Bureau of FCC opened this investigation after reports surfaced that a Missouri Sheriff, Cory Hutcheson, used a "location-finding service" operated by Securus, a provider of communications services to correctional facilities, to access the location information of the wireless carriers' customers without their consent between 2014 and 2017.

"American consumers take their wireless phones with them wherever they go. And information about a wireless customer's location is highly personal and sensitive. The FCC has long had clear rules on the books requiring all phone companies to protect their customers' personal information. And since 2007, these companies have been on notice that they must take reasonable precautions to safeguard this data and that the FCC will take strong enforcement action if they don't. Today, we do just that," said FCC Chairman Ajit Pai.

"This FCC will not tolerate phone companies putting Americans' privacy at risk."

The FCC also admonished these carriers for apparently disclosing their customers' location information, without their authorisation, to a third party

The four major US carriers mentioned sold access to their customers' location information to "aggregators," who then resold access to such information to third-party location-based service providers (like Securus).

Although their exact practices varied, each carrier relied heavily on contract-based assurances that the location-based services providers (acting on the carriers' behalf) would obtain consent from the wireless carrier's customer before accessing that customer's location information.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

Days after Twitter accounts of several billionaires were hacked to engineer a crypto scam, Twitter on Saturday said it is embarrassed, disappointed and, more than anything, sorry for what happened with some of its high-profile users as attackers successfully manipulated its employees and used their credentials to access internal systems, including getting through the two-factor protections.

In the first detailed summary of the "social engineering attack" via a crypto scam that hit at least 130 users this week, Twitter said for 45 of those accounts, the attackers were able to initiate a password reset, login to the account and send Tweets.

"We are continuing our forensic review of all of the accounts to confirm all actions that may have been taken. In addition, we believe they may have attempted to sell some of the usernames," the micro-blogging platform said in a statement.

For up to eight of the Twitter accounts involved, the attackers took the additional step of downloading the account's information via "Your Twitter Data" tool.

This is a tool that is meant to provide an account owner with a summary of their Twitter account details and activity.

"We are reaching out directly to any account owner where we know this to be true. None of the eight were verified accounts," said Twitter.

The company said the attackers were not able to view previous account passwords, as those are not stored in plain text or available through the tools used in the attack.

"Attackers were able to view personal information including email addresses and phone numbers, which are displayed to some users of our internal support tools," informed Twitter.

In cases where an account was taken over by the attacker, they may have been able to view additional information, Twitter added, saying its forensic investigation of these activities was still ongoing.

"We are actively working on communicating directly with the account-holders that were impacted".

The company said it will soon restore access for all account owners who may still be locked out as a result of the remediation efforts.

The New York Times reported on Friday that the Twitter crypto scam can be traced back to a group of hackers who congregate online at OGusers.com, a username-swapping community where people buy and sell coveted online handles.

The report said that the Twitter hack is not from Russian, Chinese or North Korean hackers but was done by a group of young people, "one of whom says he lives at home with his mother".

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.