Language Selection

English French German Italian Portuguese Spanish

Robotic aid arrives in rush to rescue 7 from Russian sub

Filed under
Sci/Tech

U.S. and British planes carrying robotic undersea vehicles landed in Russia's far east Saturday to help rescue seven sailors trapped in a mini-submarine 600 feet below the Pacific.

Both the U.S. Navy and Britain's military sent so-called Super Scorpios, and workers labored to deploy the vehicles as concerns rose over how much oxygen remained for the seven trapped men.

The Scorpios and their equipment will have to be loaded aboard a vessel and taken to the stricken mini-sub's location.

Moscow asked for outside assistance within hours of news breaking about the sub's plight--a speedy request that was a marked change since the Kursk nuclear submarine disaster in 2000, when Russian officials waited until hope was all but exhausted. All 118 died aboard the Kursk.

The mini-sub snagged on an underwater antenna on Thursday and was the subject of desperate rescue efforts and widely varying estimates of how much oxygen remained on board.

The commander of the Russian Pacific Fleet, Adm. Viktor Fyodorov, said early Saturday that there was oxygen for "at least 18 hours," a distinctly less optimistic statement than his earlier assertion that the air would last into Monday. Later Saturday, however, news agencies quoted him as saying there was air for "more than 24 hours."

The confusion over the air supply darkly echoed the sinking of the Kursk almost exactly five years ago. That disaster shocked Russians and deeply embarrassed the country by demonstrating how Russia's once-mighty navy had deteriorated as funding dried up following the 1991 Soviet collapse.

The new crisis is also highly embarrassing for Russia, which will hold an unprecedented joint military exercise with China later this month, including the use of submarines to settle an imaginary conflict in a foreign land. In the exercise, Russia is to field a naval squadron and 17 long-haul aircraft.

No comment from Putin

Navy spokesman Capt. Igor Dygalo told The Associated Press that rescuers had managed to move the sub about 60 yards toward shore with the help of a Russian remote vehicle that was transmitting pictures. Fyodotov, however, was quoted by Russian news agencies as saying that the process was taking too long and rescuers would try to attach a tow line.

The rescue effort underscores that promises by President Vladimir Putin to improve the navy's equipment have apparently had little effect. Authorities initially said a mini-sub would be sent to try to aid the stranded one, but the navy later said it was not equipped to go that deep.

Putin was criticized for his slow response to the Kursk crisis and reluctance to accept foreign assistance. By early Saturday, Putin had made no public comment on the latest sinking.

Too deep to escape

The sailors were in contact with authorities and were not hurt initially, Pacific Fleet spokesman Capt. Alexander Kosolapov said. Their mini-submarine was trapped in Beryozovaya Bay, about 45 miles south of Petropavlovsk-Kamchatsky, the capital of the peninsular region in Russia's far east.

The mini-sub, which became disabled after it was launched from a ship in a combat training exercise, was too deep to allow the sailors to swim to the surface on their own or for divers to reach it, Russian officials said.

Although the Russian navy reportedly ended its deep-sea diving training programs a decade ago because of funding shortages, it does have a device called the Kolokolchik, essentially an updated diving bell, that can be used for some underwater rescues.

However, the mini-sub lies so deep that the device apparently would be useless.

U.S. divers, presumably with better equipment, rushed to the scene to help if necessary. In Belle Chasse, La., a marine services company sent sophisticated deep sea diving suits and a diving crew on board a military plane.

The Japanese ships were not expected to arrive until early next week.

Tangled up in `coastal object'

Dygalo, the navy spokesman, initially said on state-run Rossiya Television that the sub got trapped when its propeller became entangled in a fishing net Thursday. But Fyodorov later said the sub was stuck on an antenna, and Dygalo described the antenna as a "Pacific Fleet coastal infrastructure object."

The trapped AS-28, which looks like a small submarine, was built in 1989. It is about 44 feet long and more than 18 feet high. A vessel of the same type was used in the rescue efforts that followed the Kursk disaster.

Since Soviet times, the Kamchatka Peninsula has housed several major submarine bases and numerous other military facilities, and large areas of it remain closed to outsiders.

Despite strong criticism for Putin's response to the Kursk disaster, he was re-elected in 2004 and his supporters command an overwhelming majority in parliament, making the political fallout of the latest sinking likely minimal.

By Vladimir Isachenkov
Associated Press

More in Tux Machines

Debian and Ubuntu

Development: JavaScript, PHP, and GCC

  • 10 JavaScript concepts every Node.js programmer must master
    With JavaScript and the V8 engine at the core, an event-driven architecture, and scalability out of the box, Node.js has quickly become the new de facto standard for creating web applications and SaaS products. Many frameworks like Express, Sails, and Socket.IO enable users to quickly bootstrap applications and focus only on the business logic.
  • PHP Tour - Nantes 2017
    As for every AFUP event, organization was perfect, and I was able to meet a lot of developers and PHP users.
  • More OpenACC 2.5 Code Lands In GCC
    More code for supporting the OpenACC 2.5 specification has been landing in mainline GCC.
  • D Language Front-End Proposed For GCC 8, 800k Lines of Code
    A set of 13 patches amounting to nearly 800k lines of new code were sent out Sunday morning for adding a D language front-end to the GNU Compiler Collection (GCC).

Security Leftovers

  • Researchers find Android design defects that allow attacks

    The researchers — Yanick Fratantonio of the University of California, and Chenxiong Qian, Simon Pak Ho Chung and Wenke Lee, all from the Georgia Institute of Technology — called it a Cloak and Dagger attack as it happened without the owner of the smartphone being aware that any attack had taken place.

    The attack does not exploit any vulnerability, but takes advantage of two permissions that are allowed for apps to use certain features on Android.

  • The internet of unreliable and broken things
    Fine, the current process is rocky. Some of that is that it’s not matured yet (Alexa, when did Vincent Price die? No, not “play vincent price die”, not “christ die”, not “do you speak some price dead”, you stupid pile of undocumented microchips!) Some of it is that basically every large company underestimates how much people’s accounts are set up incorrectly or incompletely; after all, employees have everything set up right, because they know what they’re doing, and so this never comes up in testing. Some of it is because I’m joining dots on three or four very different puzzles: I’m sure if I were to get a Google Home and use Google Mail to send my shopping list to Google Keep and then buy things from Google Shopping, or if I were to get some theoretical Home Siri device and play music from my Apple account and put things in my Apple iCloud account… then all this would be a lot more seamless. But you should beware people who proclaim that technology would be easy if all us heathens were just to renounce our diverse needs and join their true faith. Mastery goes to the designer who can cope with us real people, in all our glittering and varied patterns and colours and desires. Not just the ones who take the easy way out and block you if you haven’t already bought all the rest of your stuff from them too.
  • 9 Ways Organizations Sabotage Their Own Security: Lessons from the Verizon DBIR
    Datasets from the recent Verizon 2017 Data Breach Investigations Report (DBIR) show that some security teams still may be operating under false assumptions regarding what it takes to keep their organizations secure. For starters, the same security standards don't apply across all vertical industries, says Suzanne Widup, a senior consultant for the Verizon RISK Team and co-author of the Verizon DBIR.
  • “Yahoobleed” flaw leaked private e-mail attachments and credentials
  • Web Developer Security Checklist
    If you have drunk the MVP cool-aid and believe that you can create a product in one month that is both valuable and secure — think twice before you launch your “proto-product”. After you review the checklist below, acknowledge that you are skipping many of these critical security issues. At the very minimum, be honest with your potential users and let them know that you don’t have a complete product yet and are offering a prototype without full security.
  • Obstacles to the Adoption of Secure Communication Tools

    [...] we interviewed 60 participants about their experience with different communication tools and their perceptions of the tools' security properties. We found that the adoption of secure communication tools is hindered by fragmented user bases and incompatible tools. Furthermore, the vast majority of participants did not understand the essential concept of end-to-end encryption, limiting their motivation to adopt secure tools

  • VMware Patches Multiple Security Issues in Workstation
    VMware fixed two bugs in its VMware Workstation late Thursday night, including an insecure library loading vulnerability and a NULL pointer dereference vulnerability. The virtualization software company warned of the issues Thursday night in a security advisory VMSA-2017-0009.

Linux Devices, Tizen, and Android