Feeds

Dolphin assassins menace Gulf of Mexico

Rogue cetacean death squad may be armed

Top 5 reasons to deploy VMware with Tegile

Heavily-armed, frightened, and confused. No, we don't mean the Bush Administration, but a group of killer dolphins trained by the US Navy and lately washed into the Gulf of Mexico by Hurricane Katrina, if The Guardian is to be believed.

According to an Observer report by Mark Townsend Houston, Navy dolphins trained to shoot suspected terrorist frogmen with narcotic dart guns mounted on their heads have gone over the top, and may be menacing divers, and perhaps nice dolphins like the ones recently found cowering near their former pens at the Marine Life Oceanarium in Gulfport, Mississippi. No wonder they were so frightened.

The evidence for this report is the loose speculation of one Leo Sheridan - "a respected accident investigator who has worked for government and industry" - who, we are told, "had received intelligence from sources close to the US government's marine fisheries service confirming that dolphins had escaped."

"If divers or windsurfers are mistaken for a spy or suicide bomber, and if [the animals are] equipped with special harnesses carrying toxic darts, they could fire," Sheridan told the Observer. "The darts are designed to put the target to sleep so they can be interrogated later, but what happens if the victim is not found for hours?" he fretted.

Worrying to be sure. We find, however, that Sheridan has made sport of gullible reporters in the past. In 2003, he was confident that he and a team of divers he advised had located the site where English aviator Amy Johnson died, after her plane went into the sea off Kent in 1941. The Guardian carried that item too. Not surprisingly, there has been little news about Johnson's plane since the announcement.

He also appears to have been confident, back in 1998, that a group of US Navy killer dolphins had come to grief off the French Mediterranean coast when they got loose and their handlers detonated a "radio-controlled explosion of their signal collars, so that no one could find out their missions." (Find out their missions?)

Now, admittedly, the US Navy does use trained dolphins, by its own admission. They're useful for mine detection and for locating suspected enemy swimmers, rescuing friendly swimmers, and the like. But we find ourselves persuaded by the Navy's explanation that dolphins, being an alien species with an entirely different sensory and cognitive apparatus, are ill equipped to detect and process the subtle signals that humans use to distinguish between friend and foe, and are therefore unsuited to search-and-destroy missions.

But dolphin assassins would make great fodder for a B-movie suspense script.

Oops, sorry; that's been done. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
Bible THUMP: Good Book beats Darwin to most influential tome title
Folio Society crowns fittest of surviving volumes
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.