- Source: Ghost net
- Source: GhostNet
Ghost nets are fishing nets that have been abandoned, lost, or otherwise discarded in the ocean, lakes, and rivers. These nets, often nearly invisible in the dim light, can be left tangled on a rocky reef or drifting in the open sea. They can entangle fish, dolphins, sea turtles, sharks, dugongs, crocodiles, seabirds, crabs, and other creatures, including the occasional human diver. Acting as designed, the nets restrict movement, causing starvation, laceration and infection, and suffocation in those that need to return to the surface to breathe.
It's estimated that around 48 million tons (48,000 kt) of lost fishing gear is generated each year, not including those that were abandoned or discarded and these may linger in the oceans for a considerable time before breaking-up.
Description
Some commercial fishermen use gillnets. These are suspended in the sea by flotation buoys, such as glass floats, along one edge. In this way they can form a vertical wall hundreds of metres long, where any fish within a certain size range can be caught. Normally these nets are collected by fishermen and the catch removed.
If this is not done, the net can continue to catch fish until the weight of the catch exceeds the buoyancy of the floats. The net then sinks, and the fish are devoured by bottom-dwelling crustaceans and other fish. Then the floats pull the net up again and the cycle continues. Given the high-quality synthetics that are used today, the destruction can continue for a long time.
The problem is not just nets but ghost gear in general; old-fashioned crab traps, without the required "rot-out panel", also sit on the bottom, where they become self-baiting traps that can continue to trap marine life for years. Even balled-up fishing line can be deadly for a variety of creatures, including birds and marine mammals. Over time the nets become more and more tangled. In general, fish are less likely to be trapped in gear that has been down a long time.
Fishermen sometimes abandon worn-out nets because it is often the easiest way to get rid of them.
The French government offered a reward for ghost nets handed in to local coastguards along sections of the Normandy coast between 1980 and 1981. The project was abandoned when people vandalized nets to claim rewards, without retrieving anything at all from the shoreline or ocean.
In September 2015, the Global Ghost Gear Initiative (GGGI) was created by the World Animal Protection to give a unique and stronger voice to the cause.
The term ALDFG means "abandoned, lost and discarded fishing gear".
Environmental impact
From 2000 to 2012, the National Marine Fisheries Service reported an average of 11 large whales entangled in ghost nets every year along the US west coast. From 2002 to 2010, 870 nets were recovered in Washington (state) with over 32,000 marine animals trapped inside. Ghost gear is estimated to account for 10% (640,000 tonnes) of all marine litter.
An estimated 46% of the Great Pacific Garbage Patch consists of fishing related plastics. Fishing nets account for about 1% of the total mass of all marine macroplastics larger than 200 millimetres (7.9 in), and plastic fishing gear overall constitutes over two-thirds of the total mass.
According to the SeaDoc Society, each ghost net kills $20,000 worth of Dungeness crab over 10 years. The Virginia Institute of Marine Science calculated that ghost crab pots capture 1.25 million blue crabs each year in the Chesapeake Bay alone.
In May 2016, the Australian Fisheries Management Authority (AFMA) recovered 10 tonnes of abandoned nets within the Australian Exclusive Economic Zone and Torres Strait protected zone perimeters. One protected turtle was rescued.
The northern Australian olive ridley sea turtle Lepidochelys olivacea, is a genetically distinct variation of the olive ridley sea turtle. Ghost nets pose a threat to the continued existence of the northern Australian variety. Without further action to preserve the northern Australian olive ridley sea turtle, the population could face extinction.
Researches in Brazil used social media to estimate how ghost nets have negatively affected the Brazilian marine biota. Footage of ghost nets found on Google and YouTube were obtained and analyzed to arrive at the results of the study. They found that ghost nets have an adverse effect on several marine species, including large marine animals, such as the Bryde's whale and Guiana dolphin.
Solutions
= Alternative materials and practice
=Unlike synthetic fishing nets, biodegradable fishing nets decompose naturally under water after a certain period of time. Coconut fibre (coir) fishing nets are commercially made and are hence a practical solution that can be taken by fishermen.
Technology systems for marking and tracking fishing gear, including GPS tracking, are being trialled to promote greater accountability and transparency.
= Collection and recycling
=Legalizing gear retrievals and establishing waste management systems is required to manage and mitigate abandoned, lost, and discarded fishing gear at-sea. The company Net-works worked out a solution to turn discarded fishing nets into carpet tiles.
Between 2008 and 2015, the US Fishing for Energy initiative collected 2.8 million pounds of fishing gear, and in partnership with Reworld turned this into enough electricity to power 182 homes for one year by incineration.
One retrieval initiative in Southwest Nova Scotia in Canada conducted 60 retrieval trips, searched ~1523 square kilometers of the seafloor and removed 7064 kg of abandoned, lost, and discarded fishing gear (ALDFG) (comprising 66% lobster traps and 22% dragger cable). Lost traps continued to capture target and non-target species. A total of 15 different species were released from retrieved ALDFG, including 239 lobsters (67% were market-sized) and seven groundfish (including five species-at-risk). The commercial losses from ALDFG in Southwest Nova Scotia were estimated at $175,000 CAD annually.
In 2009 world-renowned Dutch technical diver Pascal van Erp started to recover abandoned ghost fishing gear entangled on North Sea wrecks. He soon inspired others. Organised teams of volunteer technical divers recovered tons of ghost fishing gear off the Netherlands coastline. The loop was then closed - after a season's diving 22 tons of fishing gear was sent to the Aquafil Group for recycling back into new Nylon 6 material. In 2012 Pascal van Erp formally founded the not-for-profit Ghost Fishing organisation. In 2020 the Ghost Fishing Foundation rebranded as the Ghost Diving Foundation.
A plan to protect UK seas from ghost fishing was backed by the European Parliament Fisheries Committee in 2018. Mr. Flack, who led the committee, said: "Abandoned fishing nets are polluting our seas, wasting fishing stocks and indiscriminately killing whales, sea lions or even dolphins. The tragedy of ghost fishing must end".
Net amnesty schemes such as Fishing for Litter create incentives for the collection and responsible disposal of end of life fishing gear. These schemes address the root cause for many net abandonments, which is the financial cost of their disposal.
Fishing nets are often made from extremely high quality plastics to ensure suitable strength, which makes them desirable for recycling. Initiatives like Healthy Seas are connecting environmental cleanup projects to manufacturers to re-use these materials. Recycled waste nets can be made into yarn and consumer products, such as swimwear.
In Australia, the Carpentaria Ghost Nets Program has collaborated with indigenous communities to increase awareness of ghost nets and to foster long term solutions. The program has trained indigenous northern Australians in scouting for ghost nets and in removing ghost nets and other plastic pollution.
See also
Drift netting
Monofilament fishing line#Environmental impact
The Derelict Crab Trap Program
Plastic pollution
General:
Marine debris
List of environmental issues
Notes
1
References
External links
Film on Ghost nets in the Indian Ocean
Ghost nets in the Indian Ocean
Ghost Diving - International cleanup projects
Ghost Net Project
Carpentaria Ghost Net Programme
Team Hunts Deadly 'Ghost Nets' in the Pacific
Tracking Down Ghost Nets
Ghost nets kill sea turtles
Ghost nets hurting marine environment: UN report Archived 2018-08-01 at the Wayback Machine
GhostNet (simplified Chinese: 幽灵网; traditional Chinese: 幽靈網; pinyin: YōuLíngWǎng) is the name given by researchers at the Information Warfare Monitor to a large-scale cyber spying operation discovered in March 2009. The operation is likely associated with an advanced persistent threat, or a network actor that spies undetected. Its command and control infrastructure is based mainly in the People's Republic of China and GhostNet has infiltrated high-value political, economic and media locations in 103 countries. Computer systems belonging to embassies, foreign ministries and other government offices, and the Dalai Lama's Tibetan exile centers in India, London and New York City were compromised.
Discovery
GhostNet was discovered and named following a 10-month investigation by the Infowar Monitor (IWM), carried out after IWM researchers approached the Dalai Lama's representative in Geneva suspecting that their computer network had been infiltrated. The IWM is composed of researchers from The SecDev Group and Canadian consultancy and the Citizen Lab, Munk School of Global Affairs at the University of Toronto; the research findings were published in the Infowar Monitor, an affiliated publication. Researchers from the University of Cambridge's Computer Laboratory, supported by the Institute for Information Infrastructure Protection, also contributed to the investigation at one of the three locations in Dharamshala, where the Tibetan government-in-exile is located. The discovery of the 'GhostNet', and details of its operations, were reported by The New York Times on March 29, 2009. Investigators focused initially on allegations of Chinese cyber-espionage against the Tibetan exile community, such as instances where email correspondence and other data were extracted.
Compromised systems were discovered in the embassies of India, South Korea, Indonesia, Romania, Cyprus, Malta, Thailand, Taiwan, Portugal, Germany and Pakistan and the office of the Prime Minister of Laos. The foreign ministries of Iran, Bangladesh, Latvia, Indonesia, Philippines, Brunei, Barbados and Bhutan were also targeted. No evidence was found that U.S. or U.K. government offices were infiltrated, although a NATO computer was monitored for half a day and the computers of the Indian embassy in Washington, D.C., were infiltrated.
Since its discovery, GhostNet has attacked other government networks, for example Canadian official financial departments in early 2011, forcing them off-line. Governments commonly do not admit such attacks, which must be verified by official but anonymous sources.
Technical functionality
Emails are sent to target organizations that contain contextually relevant information. These emails contain malicious attachments, that when opened, enable a Trojan horse to access the system. This Trojan connects back to a control server, usually located in China, to receive commands. The infected computer will then execute the command specified by the control server. Occasionally, the command specified by the control server will cause the infected computer to download and install a Trojan known as Gh0st Rat that allows attackers to gain complete, real-time control of computers running Microsoft Windows. Such a computer can be controlled or inspected by attackers, and the software even has the ability to turn on camera and audio-recording functions of infected computers, enabling attackers to perform surveillance.
Origin
The researchers from the IWM stated they could not conclude that the Chinese government was responsible for the spy network. However, a report from researchers at the University of Cambridge says they believe that the Chinese government is behind the intrusions they analyzed at the Office of the Dalai Lama.
Researchers have also noted the possibility that GhostNet was an operation run by private citizens in China for profit or for patriotic reasons, or created by intelligence agencies from other countries such as Russia or the United States. The Chinese government has stated that China "strictly forbids any cyber crime."
The "Ghostnet Report" documents several unrelated infections at Tibetan-related organizations in addition to the Ghostnet infections. By using the email addresses provided by the IWM report, Scott J. Henderson had managed to trace one of the operators of one of the infections (non-Ghostnet) to Chengdu. He identifies the hacker as a 27-year-old man who had attended the University of Electronic Science and Technology of China, and currently connected with the Chinese hacker underground.
Despite the lack of evidence to pinpoint the Chinese government as responsible for intrusions against Tibetan-related targets, researchers at Cambridge have found actions taken by Chinese government officials that corresponded with the information obtained via computer intrusions. One such incident involved a diplomat who was pressured by Beijing after receiving an email invitation to a visit with the Dalai Lama from his representatives.
Another incident involved a Tibetan woman who was interrogated by Chinese intelligence officers and was shown transcripts of her online conversations. However, there are other possible explanations for this event. Drelwa uses QQ and other instant messengers to communicate with Chinese Internet users. In 2008, IWM found that TOM-Skype, the Chinese version of Skype, was logging and storing text messages exchanged between users. It is possible that the Chinese authorities acquired the chat transcripts through these means.
IWM researchers have also found that when detected, GhostNet is consistently controlled from IP addresses located on the island of Hainan, China, and have pointed out that Hainan is home to the Lingshui signals intelligence facility and the Third Technical Department of the People's Liberation Army. Furthermore, one of GhostNet's four control servers has been revealed to be a government server.
See also
Advanced persistent threat
Chinese intelligence activity abroad
Chinese cyberwarfare
Chinese espionage in the United States
Cyber-warfare
Economic and industrial espionage
Honker Union
Internet censorship in China
Operation Aurora
RedHack (from Turkey)
Titan Rain
Shadow Network
14th Dalai Lama
References
External links
The SecDev Group
Citizen Lab at the University of Toronto
Tracking GhostNet: Investigating a Cyber Espionage Network (Infowar Monitor Report (SecDev and Citize Lab), March 29, 2009)
F-Secure Mirror of the report PDF
Information Warfare Monitor - Tracking Cyberpower (University of Toronto, Canada/Munk Centre)
Twitter: InfowarMonitor
Kelly, Cathal (March 31, 2009). "Cyberspies' code a click away - Simple Google search quickly finds link to software for Ghost Rat program used to target governments". Toronto Star (Canada). Toronto, Ontario, Canada. Retrieved April 4, 2009.
Lee, Peter (April 8, 2009). "Cyber-skirmish at the top of the world". Asia Times Online. Archived from the original on April 10, 2009. Retrieved April 9, 2009.{{cite web}}: CS1 maint: unfit URL (link)
Bodmer, Kilger, Carpenter, & Jones (2012). Reverse Deception: Organized Cyber Threat Counter-Exploitation. New York: McGraw-Hill Osborne Media. ISBN 0071772499, ISBN 978-0071772495
Kata Kunci Pencarian:
- Daftar acara NET.
- Let's Fight Ghost
- Ghost Doctor
- Ghost Thing
- Shinbi's House
- Tora Sudiro
- Deva Mahenra
- Ghost in the Shell
- Berlliana Lovell
- Kapten Tsubasa
- Ghost net
- GhostNet
- Bring It On, Ghost
- Ghost (Swedish band)
- Ghost
- Fishing net
- Palantir Technologies
- Ghost Reveries
- Ghost in the Shell: SAC 2045
- Ghost in the Shell
Mission: Impossible – Ghost Protocol (2011)
A View to a Kill (1985)
Parasite (2019)
The Last Rifleman (2023)
No More Posts Available.
No more pages to load.