|By PR Newswire||
|January 7, 2014 12:30 PM EST||
Consumers Can Take Action & U.S. Can Protect Endangered Marine Mammals by Cracking Down on Foreign Fisheries Supplying Some of America's Favorite Wild-Caught Seafood Like Shrimp, Tuna, Crab, Lobster, and Salmon.
LOS ANGELES, Jan. 7, 2014 /PRNewswire-USNewswire/ -- In order to put wild-caught seafood on dinner tables, more than 650,000 marine mammals are killed or seriously injured every year in foreign fisheries after being hooked, entangled or trapped in fishing gear, and enforcement of a U.S. law to protect marine mammals could help prevent tens of thousands of these deaths, according to a new report issued today by the Natural Resources Defense Council.
Net Loss: The Killing of Marine Mammals in Foreign Fisheries finds that 91% of seafood consumed in the United States is imported and nearly every foreign fish product sold in the U.S. violates a federal marine mammal protection law. The wild-caught seafood most enjoyed by Americans – shrimp, tuna, crab, lobster, and salmon – present a particularly significant risk to marine mammals due to the dangerous fishing practices associated with them abroad. Until the U.S. enforces the law, which requires importing countries to prove they are meeting American standards, consumers can play a role in protecting whales, dolphins and sea lions by choosing American-caught seafood.
"No one wants their shrimp cocktail to come with a side of dolphin, but that's essentially what's happening when we eat imported fish that isn't held to the same standard as American seafood," said Zak Smith, attorney with NRDC and co-author of the report. "For 40 years, federal watchdogs have failed to enforce a law that could save thousands of whales and dolphins from negligent foreign fishing practices. At the same time, well-meaning U.S. fishermen are being undermined by their own government, which holds them accountable, but not their foreign counterparts."
This report examines the failure of the U.S. government to enforce protections under the Marine Mammal Protection Act, which requires countries exporting fish products to prove the fish were not caught in violation of U.S. standards that limit serious injury and death of marine mammals. It identifies the primary species and populations at risk of extinction that would be helped by enforcement of the U.S. import protections law, the key fishing practices that endanger marine mammals, and regions of the world where bycatch is a critical concern. The unintentional capture of animals in fishing gear, or bycatch, is pushing some marine mammal populations to the brink of extinction.
Species most affected by seafood exports for American markets:
- North Atlantic right whale: at risk from Canada's lobster and crabbing practices
- New Zealand sea lion: at risk from New Zealand's squid industry
- Mediterranean sperm whale: at risk from Italy & Turkey's lack of enforcement
- Vaquita: at risk from shrimp fisheries not complying with Mexico's regulations
- Spinner dolphins: at risk from India and Sri Lanka's tuna industry
- Baltic and Black Sea harbor porpoises: at risk from inadequate regulatory measures
- J-Stock minke whale: at risk from a range of Japanese and South Korean fishing practices
- False killer whale: at risk from Pacific Ocean tuna, swordfish and marlin fishing practices
"Bycatch isn't just a moral issue, it's simple economics," said Acy Cooper, vice president of the Louisiana Shrimpers Association. "Foreign fishing companies can undercut our prices because they don't have to invest in ensuring that their exports to the U.S. were caught in a manner that protects marine mammals. Until foreign fleets see real consequences for failing to abide by the law, marine mammals will continue to be harmed around the world and American fishermen will be disadvantaged."
The key types of fishing gear that threaten marine mammals around the world include:
- Gillnets: mesh nets that can be set on the sea floor or floated in the water column depending on the targeted species. Marine mammals that dive for food around gillnets tend to become entangled and drown when they are unable to surface for air.
- Purse seines: nets that hang vertically in the water column using weights at the bottom and buoys at the top. They can enclose marine mammals in the nets, along with fish.
- Trawls: funnel-shaped nets that are dragged behind boats at different depths, depending on target species. Marine mammals are attracted to trawls, which they become entangled in, because they often target the species that mammals prey upon.
- Bottom-set traps: (commonly called "pots") crustacean traps with ropes that connect them to surface buoys and to one another. Large whales are particularly prone to getting entangled in the ropes, which wrap around their bodies, making it difficult for them to move or feed.
- Longlines: baited hooks on lines varying in length from 15 to 100 kilometers set with floating buoys or sunk with weights depending on the targeted species. Sea lions, fur seals, toothed whales, and other marine mammals can get caught on the hooks or tangled in the lines.
However, there are smart and targeted methods that can be employed to reduce risk and harm to marine mammals from dangerous gear, including time and area exclusions, warning systems, and gear modifications that make escaping entanglement more likely. An aggressive, science-based plan adopted by the U.S. in 1994 has reduced marine mammal bycatch by nearly 30% over 20 years and put special measures in place to save populations at highest risk.
"In many parts of the world, poor fishing practices are driving populations and species of marine mammals to extinction," said Dr. Andrew J. Read, Stephen Toth Professor of Marine Biology, Division of Marine Science & Conservation, Nicholas School of the Environment, Duke University. "We have lost one species already and several others are in imminent danger. Most Americans would be shocked to learn of the hundreds of thousands of whales, dolphins, and porpoises killed each year in bringing wild seafood to our tables."
For other countries to take action, the National Marine Fisheries Service (NMFS), the federal agency with jurisdiction over the interpretation and enforcement of the MMPA, needs to hold other nations to the same bycatch standards. These include requiring all imported fish or fish products be accompanied by information on the status of affected marine mammal populations, proof that protective measures were utilized, and proof that fisheries were monitored for their compliance and are working towards a goal of zero marine mammal deaths. In response to petitions and comments filed years ago by NRDC and other environmental groups, the administration began preparing regulations to enforce the law, but has not released them.
Until the U.S. enforces the law, consumers can also play a role in protecting marine mammals by purchasing American-caught seafood that abides by U.S. safety standards. It is critical to identify wild-caught seafood as American, due to the significant threat posed to marine mammals by imported shrimp, tuna, crab, lobster, and salmon. Federal law requires seafood be clearly marked with the country of origin, but consumers should also ask the retailer, restaurant and producer for more information about where the fish was caught.
"It is time to enforce our laws protecting the world's marine mammals," said Smith. "American consumers and fishers as well as some of the world's most unique and captivating creatures deserve no less. Fortunately, after years of neglect, the federal government is developing rules to enforce the provision. We need to hold them to it."
The Natural Resources Defense Council (NRDC) is an international nonprofit environmental organization with more than 1.4 million members and online activists. Since 1970, our lawyers, scientists, and other environmental specialists have worked to protect the world's natural resources, public health, and the environment. NRDC has offices in New York City, Washington, D.C., Los Angeles, San Francisco, Chicago, Bozeman, MT, and Beijing. Visit us at www.nrdc.org and follow us on Twitter @NRDC.
MEDIA CONTACT: Jessica Lass, (415) 875-6143 (office), (202) 468-6718 (cell), [email protected].
EDITOR'S NOTE: Broadcast quality video, slideshow, and infographics available.
SOURCE Natural Resources Defense Council
The Workspace-as-a-Service (WaaS) market will grow to $6.4B by 2018. In his session at 16th Cloud Expo, Seth Bostock, CEO of IndependenceIT, will begin by walking the audience through the evolution of Workspace as-a-Service, where it is now vs. where it going. To look beyond the desktop we must understand exactly what WaaS is, who the users are, and where it is going in the future. IT departments, ISVs and service providers must look to workflow and automation capabilities to adapt to growing ...
Mar. 4, 2015 04:00 AM EST Reads: 1,067
Docker is becoming very popular--we are seeing every major private and public cloud vendor racing to adopt it. It promises portability and interoperability, and is quickly becoming the currency of the Cloud. In his session at DevOps Summit, Bart Copeland, CEO of ActiveState, discussed why Docker is so important to the future of the cloud, but will also take a step back and show that Docker is actually only one piece of the puzzle. Copeland will outline the bigger picture of where Docker fits a...
Mar. 4, 2015 04:00 AM EST Reads: 3,109
Sensor-enabled things are becoming more commonplace, precursors to a larger and more complex framework that most consider the ultimate promise of the IoT: things connecting, interacting, sharing, storing, and over time perhaps learning and predicting based on habits, behaviors, location, preferences, purchases and more. In his session at @ThingsExpo, Tom Wesselman, Director of Communications Ecosystem Architecture at Plantronics, will examine the still nascent IoT as it is coalescing, includin...
Mar. 4, 2015 03:30 AM EST Reads: 2,711
The Internet of Things (IoT) promises to evolve the way the world does business; however, understanding how to apply it to your company can be a mystery. Most people struggle with understanding the potential business uses or tend to get caught up in the technology, resulting in solutions that fail to meet even minimum business goals. In his session at @ThingsExpo, Jesse Shiah, CEO / President / Co-Founder of AgilePoint Inc., showed what is needed to leverage the IoT to transform your business. ...
Mar. 4, 2015 02:45 AM EST Reads: 3,811
Hadoop as a Service (as offered by handful of niche vendors now) is a cloud computing solution that makes medium and large-scale data processing accessible, easy, fast and inexpensive. In his session at Big Data Expo, Kumar Ramamurthy, Vice President and Chief Technologist, EIM & Big Data, at Virtusa, will discuss how this is achieved by eliminating the operational challenges of running Hadoop, so one can focus on business growth. The fragmented Hadoop distribution world and various PaaS soluti...
Mar. 4, 2015 02:30 AM EST Reads: 1,156
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impac...
Mar. 4, 2015 02:00 AM EST Reads: 3,124
Advanced Persistent Threats (APTs) are increasing at an unprecedented rate. The threat landscape of today is drastically different than just a few years ago. Attacks are much more organized and sophisticated. They are harder to detect and even harder to anticipate. In the foreseeable future it's going to get a whole lot harder. Everything you know today will change. Keeping up with this changing landscape is already a daunting task. Your organization needs to use the latest tools, methods and ex...
Mar. 4, 2015 01:30 AM EST Reads: 3,513
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...
Mar. 4, 2015 01:00 AM EST Reads: 4,387
Disruptive macro trends in technology are impacting and dramatically changing the "art of the possible" relative to supply chain management practices through the innovative use of IoT, cloud, machine learning and Big Data to enable connected ecosystems of engagement. Enterprise informatics can now move beyond point solutions that merely monitor the past and implement integrated enterprise fabrics that enable end-to-end supply chain visibility to improve customer service delivery and optimize sup...
Mar. 4, 2015 12:30 AM EST Reads: 3,534
Wearable devices have come of age. The primary applications of wearables so far have been "the Quantified Self" or the tracking of one's fitness and health status. We propose the evolution of wearables into social and emotional communication devices. Our BE(tm) sensor uses light to visualize the skin conductance response. Our sensors are very inexpensive and can be massively distributed to audiences or groups of any size, in order to gauge reactions to performances, video, or any kind of present...
Mar. 4, 2015 12:00 AM EST Reads: 3,087
Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data security. Keeping data safe is an issue in any computing environment, and it has been a focus since the earliest days of the cloud revolution. Understandably so: a lot can go wrong when you allow valuable information to live outside the firewall. Recent revelations about government snooping, along...
Mar. 3, 2015 11:15 PM EST Reads: 743
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet conditions, Dyn ensures...
Mar. 3, 2015 09:15 PM EST Reads: 863
Business and IT leaders today need better application delivery capabilities to support critical new innovation. But how often do you hear objections to improving application delivery like, “I can harden it against attack, but not on this timeline”; “I can make it better, but it will cost more”; “I can deliver faster, but not with these specs”; or “I can stay strong on cost control, but quality will suffer”? In the new application economy, these tradeoffs are no longer acceptable. Customers will ...
Mar. 3, 2015 07:30 PM EST Reads: 947
Red Hat has launched the Red Hat Cloud Innovation Practice, a new global team of experts that will assist companies with more quickly on-ramping to the cloud. They will do this by providing solutions and services such as validated designs with reference architectures and agile methodology consulting, training, and support. The Red Hat Cloud Innovation Practice is born out of the integration of technology and engineering expertise gained through the company’s 2014 acquisitions of leading Ceph s...
Mar. 3, 2015 06:30 PM EST Reads: 708
The free version of KEMP Technologies' LoadMaster™ application load balancer is now available for unlimited use, making it easy for IT developers and open source technology users to benefit from all the features of a full commercial-grade product at no cost. It can be downloaded at FreeLoadBalancer.com. Load balancing, security and traffic optimization are all key enablers for application performance and functionality. Without these, application services will not perform as expected or have the...
Mar. 3, 2015 05:30 PM EST Reads: 623