If for some reason the #SuezCanal blockage persists, shipping can divert.
Some oil will still flow through SUMED, but for everything else: global logistics madness. For example, US EIA calculates that a US tanker from KSA would add ~2,700 miles.
INBOX: seeking expert for media thing about #EVERGIVEN
ME: I'm not the maritime industry insider you need.
DETAIL: In college I briefly had the ambition to become a captain. Read the materials & crewed summers (e.g. tall ships) to build sea time for a license. Then moved on.
Geospatial companies have begun flexing on the #EVERGIVEN..
Curious? A Synthetic Aperture Radar (SAR) satellite zips along, beaming down radio waves. Some stuff reflects them (🚢 = bling), water not so much (🌊= dark). Classic radar.
Then antenna movement is leveraged to make a longer 'synthetic' antenna, getting you detail & dimension.
NEW: clearest-yet image of the #EVERGIVEN from @Maxar's WorldView-2 satellite.
The @Maxar image features the dredge. Doing what beyond trying to free the #EVERGIVEN's bow?
Likely opening up the not-usually-dredged & super shallow (blue) part of the canal by the vessel's bow.
NICE: friends @bellingcat have put together a neat little OSINT synthesis!
The moon is full & the tides are high, but Italian tug Carlo Magno is late for her date with #EVERGIVEN tonight.
Re-floating attempt postponed. Another will be made tomorrow.
(Dutch tug Alp Guard arrived on time)
Sources: SCA, vessel tracking. Pic: Reuters.
BREAKING: SERIOUS MOVEMENT HAPPENING NOW.
Latest AIS data shows that the #EVERGIVEN's stern has been dramatically pivoted off the #Suez Canal's Western wall.
Stern now appears to be in the channel.
I count 17 tugs & support vessels on scene right now.
If you want to see how hard they have strained on the #EVERGIVEN I've included some of their tracks here.
Nice indirect illustration of how much the ship has shifted.
Made a quick diagram. This is a big change from the initial stuck situation...but the navigation channel is still partially obstructed by the #EVERGIVEN
The #Suez Canal is not opening to vessel traffic just yet...
So @AP now has the “partially refloated” report about this movement.
But... I think it was the wise @mercoglianos who said "partially refloated" means still "partially stuck"
NEW: When Kenyan cops arrested activist & presidential candidate @bonifacemwangi they took his devices.
When he got his personal phone back, the password was gone.
We @citizenlab found they'd abused @cellebrite to break into it.
Here's why this abuse matters 1/
2/ Your phone holds the keys to your life, and governments shouldn’t be able to help themselves to the contents just because they don’t like what you are saying.
But everywhere you look, cops are getting phone cracking technology from companies like @cellebrite.
Many abuse it.
3/ @Cellebrite's abuse potential is clear.
Now, Cellebrite says that they have a human rights committee & do due diligence...
Because even Cellebrite knows that if you sell phone cracking tech to security services with bad oversight, you have a problem.
So why are there so many sales to questionable security services?
2/ Companies like Paragon (founded in Israel, former Israeli intelligence ppl, recently sold to a US owner) make hacking American technology companies their business model.
And then selling these capabilities to foreign governments.
How can this be?
3/ Honestly it is astonishing that a company that works tirelessly to hack & undermine the security of American products is now US-owned.
The missing factor: building contracts with the US government & lobbying.
The goal of these contracts, I believe, isn't just profit. It's getting protection & building government dependency on their technology.
Here are some more damming revelations as Intellexa, the shady, sanctioned spyware supplier gets exposed by @AmnestyTech & partners.. /1
2/ First, a mercenary spyware myth has just been busted.
Because the leak shows an Intellexa employee directly accessing a customer deployment.
Prior to the #PredatorFiles leak, spyware companies basically always claimed they couldn't access customer deployments & didn't know what was going on there.
They used this to avoid responsibility & claim ignorance when faced with abuses.
3/ And it gets crazier. The leak shows Intellexa casually accessing a core backbone of Predator deployment of a government customer.
Seemingly without the gov's knowledge.
Suggests that Intellexa can look over their shoulder & watch their sensitive targeting.