2/ Looking at charts, #EVERFORWARD may have slightly deviated from dredged navigation channel into shallower waters after departing Baltimore.
And got stuck.
She's apparently not blocking the navigation channel, but is quite close to it.
3/ The #EverForward's AIS track is... interesting.
People may read it as: she missed a waypoint (didn't make a turn) heading from Craighill Angle into Craighill Channel.
Caveat: accidents = complicated & AIS tracks can be *imprecise* so take all guesses w/big grain of salt!
4/ UPDATE: was going through wind records (not substantial), speed (she kept speed), draught (lot of empty containers), load condition.. when... @mercoglianos with a video!
Takeaway: he also thinks #EverForward missed the turn!
Now, here's the thing...
5/ The #EverForward is aground in a shoal area of ~24 feet of water.
She lists as 42.6 feet of draught (depth below waterline).
Takeaway: VERY stuck. Getting her un-stuck & back into the 51 foot deep Craighill Channel is likely to be a *big production.*
6/ When you talk about ships aground, tides come up.
IMPORTANT: has @Apple sent you a mercenary spyware threat notification?
Latest round just went out.
Take them seriously. Get expert help.
If you a journalist, activist, dissident etc. I suggest you ✅contact @accessnow's helpline. 1/ accessnow.org/help/
2/ In my experience, @Apple's mercenary spyware threat notifications do several things:
✅ Help users take action to secure themselves
✅ Impose cost on spyware companies & customers
✅ Keep us researchers busy investigating cases
They can also have a✅deterrent effect.
@Apple 3/ I never tire of saying that @apple threat notifications have helped to change the information balance between spyware victims & those that target them.
They have also kicked off waves of scandals & discoveries of spyware abuses. Like in #Poland👇
2/ The investigation behind this Russian political interference takedown is interesting.
First, the @FBI got account registration info for a slice of fake accounts on @X
They found a lot of email accounts registered on the same server.
So they went to the registrar...
@FBI @X 3/ While the domain registrar (Namecheap) had a bunch of account registration information for the @FBI, the info was a fake name and some alias information.
Strike out? No. The FBI began a subpoena cascade, starting with the Google account used to register the domain.