Southeast Minnesota cleans up Friday's tornado damage



A house is missing its roof and debris is piled up in the front yard.

Ashley Miller said she was planting flowers in her backyard last Friday afternoon when the tornado warning sirens went off.

She dashed inside her house and down to the basement to shelter from the tornado with her mother and their pets. The nearing twister sounded like a train rushing past. And Miller said it felt like all the air was being sucked out of her house. She described feeling like she was on “the UFO fair ride, you know, the little one that goes in circles, and you’re just like, against the wall.”

Miller, 40, starts tearing up standing in front of her home in Marion Township on the southeastern edge of Rochester, recalling those moments.

“You just hold yourself,” Miller said. “You don’t really know what’s going on around you. And you come out your front door and your neighbors’ houses are just gone. You feel guilty and grateful at the same time. It’s hard to explain.”

Debris and aluminum siding are spread across a yard.
Clean up crews have begun to make piles of debris and chop wood from fallen trees following the tornadoes Friday in Marion Township, seen Monday.
Molly Castle Work | MPR News

Olmsted County Sheriff Kevin Torgerson said 60 to 70 structures were damaged or destroyed as at least five tornadoes swept through parts of Marion Township and neighboring Stewartville, and elsewhere in southeastern Minnesota Friday afternoon.

Torgerson told MPR’s Nina Moini Monday that since the twisters barreled through, the county has identified two people with injuries. They were living in a trailer home that sustained significant damage, but Torgerson said the injuries don’t seem serious, something he said is incredible given the scope and scale of the damage.

“With what we had, with homes that are completely destroyed, roofs pulled off, sides of houses, windows exploding all over the place, [it’s] just remarkable,” Torgerson said. “When you drive through those neighborhoods, you just can’t believe that nobody got hurt.”

Piles of debris are stacked next to a house.
Clean up crews have begun to make piles of debris and chop wood from fallen trees following the tornadoes Friday in Marion Township, seen Monday.
Molly Castle Work | MPR News

But the property damage is substantial and some families are reeling from the devastation as they assess the damage and take on the daunting task of cleaning up. The buzz of chain saws can be heard almost constantly as hundreds of downed trees lay scattered about as if they were small sticks thrown about. Clean up crews have tried to organize piles of debris that include mangled metal siding, shredded chunks of sheds, and ripped off roofing.

Dennis Miller (no relation to Ashely Miller) was with his family at his cabin Friday afternoon when they began getting calls from friends about the tornado. They rushed down to find their home almost completely demolished — roof ripped off, windows broken, sideboard peeling.

Asked how he was feeling as he looked over what’s left of his home, Miller said he’s "depressed,” and he then broke down into tears. “It’s very hard,” he added.

Debris is strewn around a field after a storm.
Clean up crews have begun to make piles of debris and chop wood from fallen trees following the tornadoes Friday in Marion Township, seen Monday.
Molly Castle Work | MPR News

Torgerson said insurance should cover most of the property damage, but he has concerns about how long it’ll take to assess all the damage and then rebuild.

“[There’s a huge] amount of construction going on in our area, here in the Rochester and the Olmsted County area — all the construction companies are super busy,” Torgerson explained. “So it’s just another factor that we have to deal with. The competition [timeline] for getting that work done is going to be tremendous.”

Torgerson says the Red Cross and other disaster recovery groups are stepping in to help alongside county and state emergency response agencies, but he says he’s touched by the outpouring of community support as neighbors are helping neighbors.

Caroline Dahley said that her friends came over to help put tarp over top of her house after the twister ripped the roof off. They weren’t able to leave the house afterwards because her husband is on oxygen, so neighbors brought over a generator for his breathing machine since the electricity was out.

A group of about 30 volunteers came from a nearby church Saturday to help out. Toppers donated pizza. Ashley Miller set up an impromptu donation center in front of her house. She’s filled a long table with all sorts of snacks and drinks for people to take — even hot coffee.

A table in a driveway is filled with food with a cardboard sign reading "FOOD HERE" in front.
Ashely Miller, 40, set up a food donation spot this weekend after the tornado whipped through her Marion Township neighborhood, destroying several homes.
Molly Castle Work | MPR News

She’s arranged picnic tables in her yard so that volunteers and cleaning crews can sit down to rest and eat after long days.

Rose Scrabeck, 72, has been helping out Ashley since Friday — the neighbors had never met until this weekend.

She said it’s been heartwarming to see all the support their community has received from complete strangers.

Three women pose for a photo in a driveway.
Neighbors Rose Scrabeck, 72, Ashely Miller, 40, and Miller's mother stand outside Miller's home in Marion Township on Monday.
Molly Castle Work | MPR News

“We’re a tight community here, and everybody, you know, we’re not nosy, but everybody watches out for everybody, and we take care of each other. There’s a lot of humanity left in this world.”



Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


cyber security technologies – Table of Content

As we journey through the digital age, the omnipresence of cyber technology has become a double-edged sword. It is indicating not only advancements but also escalating the risks of cyber attacks. This inevitable parallel evolution of technology and cyber security demands a proactive stance in identifying and integrating emerging Cyber Security solutions to bolster our defenses. This blog delves into the forefront of cybersecurity technologies.

List of cyber security technologies :

  1. Artificial Intelligence & Machine Learning
  2. Internet of Things
  3. Blockchain
  4. Cloud computing
  5. Web security 
  6. Application Security
  7. Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
  8. Data Loss Prevention (DLP) & Data encryption
  9. Firewalls
  10. Social engineering or insider threat 

Wish to make a career in the world of Cyber Security? Start with Cyber Security training!

Cyber Security Training

  • Master Your Craft
  • Lifetime LMS & Faculty Access
  • 24/7 online expert support
  • Real-world & Project Based Learning

1. Artificial Intelligence & Machine Learning: 

Artificial Intelligence

AI embodies the replication of human intelligence within machines designed to mimic human thought processes and behaviors. Central to AI is its capability to autonomously perform tasks to achieve specific objectives, leveraging its capacity to learn from experiences and adjust to new scenarios.

Machine Learning (ML)

As a subset of AI, ML highlights the development of intelligent systems through statistical learning. It involves intricate algorithms analyzing vast datasets to identify patterns, enhancing machine responsiveness in unfamiliar situations.

Secure Your Future with Cyber Security Training in Hyderabad!

2. Internet of Things:

IoT connects devices across the internet, creating a vast network of interconnected digital entities. It ranges from smart home appliances to advanced self-driving vehicles. These devices, equipped with sensors, feed data into IoT platforms, which then analyze and utilize this data to enhance user experience and efficiency.
Example: Smart homes epitomize IoT’s convenience, allowing remote control over home appliances for improved lifestyle automation.

If you have any doubts on Cyber Security, then get them clarified from Industry experts on our Cyber Security Tutorial !

3. Blockchain:

Blockchain, a digital transaction ledger, is eminent by its robust security features. Its decentralized and transparent design makes it a formidable tool against data tampering and cyber threats. In cyber security, blockchain’s decentralized nature and transparent, immutable ledgers provide a solid base for securing data integrity and secrecy.

How is blockchain helping cyber security?

Blockchain has in-built transparency immutable and DTL features that can help solve today’s cybersecurity problems. These features of blockchain help to handle the integrity, confidentiality, and availability of the information. Moreover, Blockchain systems are decentralized. So, the failure of one node does not affect the whole network.

4.Cloud Computing:

Cloud Computing delivers various services through the internet, including storage, databases, servers, and software. It offers significant benefits such as scalability, cost-effectiveness, and enhanced performance but also brings potential risks like data loss, reduced control, and dependency on third-party services.

5. Web security:

In an era where the internet connects globally, web security becomes crucial. It protects data, users, and systems from cyber threats through various means, such as vulnerability management and secure web applications.

6. Application Security:

This aspect focuses on securing apps from threats by integrating security features during development. It addresses data leakage and software bugs to safeguard sensitive information and maintain application integrity.

Wish to make a career in the world of Cyber Security? Start with Cyber Security training in Kolkata!

hkr trainings logo

Subscribe to our YouTube channel to get new updates..!

7. Intrusion Detection System (IDS) and Intrusion Prevention System

IDS monitors network traffic for suspicious activities requiring human or automated response, while IPS actively blocks potential threats based on predefined rules. Both systems play a critical role in maintaining network security.

How can IDS & IPS avoid potential risks?

Any company with an Internet connection has the potential to be vulnerable to network intruders. The easiest way to stop them is for blocking the services you don’t need, neither at the entry point of your network nor on your computer. 

An IPS will prevent attacks by depositing malicious packets, blocking offensive IP addresses, and alerting security staff to potential threats. Such a system typically uses an existing database for signature recognition and may be programmed to recognize traffic-based attacks and behavioral anomalies.

When a security policy breach, virus, or configuration error is detected, an IDS may remove an offensive user from the network and send an alert to security staff. In addition, an IDS detects only continuous attacks and not incoming aggressions. In order to prevent them, an intrusion prevention system is needed.

8. Data loss prevention (DLP) & Data encryption:

Data loss and encryption protect sensitive information from unknown access or corruption. Encryption is key in securing data, using techniques like AES, RSA, and DES to encrypt and secure data.

9. Firewalls:

Firewalls are pivotal in network security, monitoring and controlling incoming and outgoing traffic based on security rules. They can be software-based, hardware-based, or a combination of both and are essential in defending against external cyber threats.

10. Social engineering or insider threat:

It refers to manipulating individuals to gain unauthorized access to sensitive information. It highlights the human aspect of cybersecurity, enhancing the need for awareness and training to combat such threats.

Enroll in our Fortigate ii Training program today and elevate your skills!

Cyber Security Training

Weekday / Weekend Batches

Conclusion

Exploring these diverse cyber security technologies offers insights into the multifaceted approach required to safeguard our digital landscape. Each technology plays a pivotal role in fortifying our cyber defenses, from AI and IoT to blockchain and cloud computing. Stay connected with HKR Trainings for more informative content on cyber security and beyond.

Related articles:

Cybersecurity framework



Source link