Feeds

Qinetiq named as nation mourns end of whale's flotation

Boffins, RN deny 'friendly-fire' depth-charging

Combat fraud and increase customer satisfaction

Fate can be a dreadful thing. Gravy train... er, defence contractor Qinetiq is poised to float with uncountable squillions expected for all concerned, and - purely coincidentally - the marketing bunnies have been busy over the past year or twain enhancing the outfit's imagery as a purveyor of shiny high tech Q-type secret weaponry. But now - argh! - could it be planet-despoiling wildlife-terminating whale depth-charging Q-type weaponry?

And if the late Thames Whale was indeed depth-charged, then legal experts reckon that it was the Queen's whale at time of depth-charging. Cripes...

According to today's Times, sonar and "military explosions" may be to blame for disorientating London's best-loved marine mammal. Sonar (usually, the US Navy's sonar) is frequently accused of responsibility for whale beachings, so it's by no means unusual that it should figure in the nation's agonised inquest. But as culprits, "military explosions" are less usual.

The Times claims Kent coast residents and marine scientists have suggested that the whale could have been confused by "huge explosions" from a Qinetiq operated MoD site at Shoeburyness range last week. "On Tuesday, Wednesday and Thursday last week, it was like being in the middle of a war zone," said Herne Bay resident Tony Wilkinson, 65. And he's not even a whale.

And if the whale was the subject of military action, then it seems probable that this was a 'friendly fire' incident. The Guardian''s redoubtable legal correspondent Marcel Berlins tells us that live whales, under a statute of 1324, are classed as 'fishes royal', so are the Queen's property, if not quite family. Dead whales, Berlins continues, are the property of the Receiver of Wrecks, and this not being the usual protocol followed for royal funerals, we feel sure that the whale wasn't family.

Any explosions at Shoeburyness could not possibly have affected the whale, said a Qinetiq spokeswoman, describing the claims as "opportunistic" (much like this story, indeed). The Royal Navy also appears to be denying responsibility. Nevertheless, there should surely be a finquest. ®

* A public-spirited well wisher draws our attention to British Divers Marine Life Rescue (BDMLR), which didn't quite succeed in saving the whale, but which did incur substantial costs, including a £300 parking fine, while trying. BDMLR is trying to recoup costs by auctioning the watering can used to douse the whale on eBay. The link above or an eBay search for "whale watering can" should see you alright. At least it's not the water...

Top three mobile application threats

More from The Register

next story
Och aye! It's the Loch Ness Monster – but only Apple fanbois can see it
Fondleslab-friendly beastie's wake spotted... OR WAS IT?
Spanish village called 'Kill the Jews' mulls rebranding exercise
Not exactly attractive to the Israeli tourist demographic
Sleuths find nosy NORKS drones on the Chinternet
UAVs likely to have been made in the Middle Kingdom
Dorian Nakamoto gets $23,000 payout over Bitcoin invention saga
Maintains he didn't create cryptocurrency, but will join community
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
Japanese boffin EYES up big bucks with strap-on digi-glasses
AgencyGlass saddles user with creepy OLED display
Pirate Bay's 10 millionth upload: Colour us shocked, a SMUT FLICK
P2P badboys show online piracy is alive and humping
Forget the beach 'n' boardwalk, check out the Santa Cruz STEVE JOBS FOUNTAIN
Reg reader snaps shot of touching tribute to Apple icon
Happy 40th Playmobil: Reg looks back at small, rude world of our favourite tiny toys
Little men straddle LOHAN, attend tiny G20 Summit... ah, sweet memories...
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.