Feeds

Dolphin assassins menace Gulf of Mexico

Rogue cetacean death squad may be armed

The Power of One Brief: Top reasons to choose HP BladeSystem

Heavily-armed, frightened, and confused. No, we don't mean the Bush Administration, but a group of killer dolphins trained by the US Navy and lately washed into the Gulf of Mexico by Hurricane Katrina, if The Guardian is to be believed.

According to an Observer report by Mark Townsend Houston, Navy dolphins trained to shoot suspected terrorist frogmen with narcotic dart guns mounted on their heads have gone over the top, and may be menacing divers, and perhaps nice dolphins like the ones recently found cowering near their former pens at the Marine Life Oceanarium in Gulfport, Mississippi. No wonder they were so frightened.

The evidence for this report is the loose speculation of one Leo Sheridan - "a respected accident investigator who has worked for government and industry" - who, we are told, "had received intelligence from sources close to the US government's marine fisheries service confirming that dolphins had escaped."

"If divers or windsurfers are mistaken for a spy or suicide bomber, and if [the animals are] equipped with special harnesses carrying toxic darts, they could fire," Sheridan told the Observer. "The darts are designed to put the target to sleep so they can be interrogated later, but what happens if the victim is not found for hours?" he fretted.

Worrying to be sure. We find, however, that Sheridan has made sport of gullible reporters in the past. In 2003, he was confident that he and a team of divers he advised had located the site where English aviator Amy Johnson died, after her plane went into the sea off Kent in 1941. The Guardian carried that item too. Not surprisingly, there has been little news about Johnson's plane since the announcement.

He also appears to have been confident, back in 1998, that a group of US Navy killer dolphins had come to grief off the French Mediterranean coast when they got loose and their handlers detonated a "radio-controlled explosion of their signal collars, so that no one could find out their missions." (Find out their missions?)

Now, admittedly, the US Navy does use trained dolphins, by its own admission. They're useful for mine detection and for locating suspected enemy swimmers, rescuing friendly swimmers, and the like. But we find ourselves persuaded by the Navy's explanation that dolphins, being an alien species with an entirely different sensory and cognitive apparatus, are ill equipped to detect and process the subtle signals that humans use to distinguish between friend and foe, and are therefore unsuited to search-and-destroy missions.

But dolphin assassins would make great fodder for a B-movie suspense script.

Oops, sorry; that's been done. ®

Seven Steps to Software Security

More from The Register

next story
NSA man: 'Tell me about your Turkish connections'
Spooks ask Dabbsy to suggest a nice hotel with pool
Russia sends SEX-CRAZED GECKOS to SPAAAAACE!
In space... no one can hear you're green...
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Yahoo! Japan! launches! service! for! the! dead!
If you're reading this email, I am no longer alive
Plucky Rockall podule man back on (proper) dry land
Bold, barmy Brit adventurer Nick Hancock escapes North Atlantic islet
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.