Feeds

Qinetiq named as nation mourns end of whale's flotation

Boffins, RN deny 'friendly-fire' depth-charging

The Power of One Brief: Top reasons to choose HP BladeSystem

Fate can be a dreadful thing. Gravy train... er, defence contractor Qinetiq is poised to float with uncountable squillions expected for all concerned, and - purely coincidentally - the marketing bunnies have been busy over the past year or twain enhancing the outfit's imagery as a purveyor of shiny high tech Q-type secret weaponry. But now - argh! - could it be planet-despoiling wildlife-terminating whale depth-charging Q-type weaponry?

And if the late Thames Whale was indeed depth-charged, then legal experts reckon that it was the Queen's whale at time of depth-charging. Cripes...

According to today's Times, sonar and "military explosions" may be to blame for disorientating London's best-loved marine mammal. Sonar (usually, the US Navy's sonar) is frequently accused of responsibility for whale beachings, so it's by no means unusual that it should figure in the nation's agonised inquest. But as culprits, "military explosions" are less usual.

The Times claims Kent coast residents and marine scientists have suggested that the whale could have been confused by "huge explosions" from a Qinetiq operated MoD site at Shoeburyness range last week. "On Tuesday, Wednesday and Thursday last week, it was like being in the middle of a war zone," said Herne Bay resident Tony Wilkinson, 65. And he's not even a whale.

And if the whale was the subject of military action, then it seems probable that this was a 'friendly fire' incident. The Guardian''s redoubtable legal correspondent Marcel Berlins tells us that live whales, under a statute of 1324, are classed as 'fishes royal', so are the Queen's property, if not quite family. Dead whales, Berlins continues, are the property of the Receiver of Wrecks, and this not being the usual protocol followed for royal funerals, we feel sure that the whale wasn't family.

Any explosions at Shoeburyness could not possibly have affected the whale, said a Qinetiq spokeswoman, describing the claims as "opportunistic" (much like this story, indeed). The Royal Navy also appears to be denying responsibility. Nevertheless, there should surely be a finquest. ®

* A public-spirited well wisher draws our attention to British Divers Marine Life Rescue (BDMLR), which didn't quite succeed in saving the whale, but which did incur substantial costs, including a £300 parking fine, while trying. BDMLR is trying to recoup costs by auctioning the watering can used to douse the whale on eBay. The link above or an eBay search for "whale watering can" should see you alright. At least it's not the water...

Seven Steps to Software Security

More from The Register

next story
NSA man: 'Tell me about your Turkish connections'
Spooks ask Dabbsy to suggest a nice hotel with pool
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
Yahoo! Japan! launches! service! for! the! dead!
If you're reading this email, I am no longer alive
Plucky Rockall podule man back on (proper) dry land
Bold, barmy Brit adventurer Nick Hancock escapes North Atlantic islet
Russia sends SEX-CRAZED GECKOS to SPAAAAACE!
In space... no one can hear you're green...
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.