Feeds

Exploding turnip threat menaces Indiana town

UK's 'Baldrick' bomb-squad tool may be rushed in

Boost IT visibility and business value

Terror came to Fort Wayne, Indiana, late last week as a suspicious package arrived at the offices of a local law firm in a move that seemed to presage a deadly bomb outrage slaughter campaign.

After a tense operation by robot and human bomb-disposal operatives, however, it was discovered that the infernal device was in fact - in the judgement of the local bomb squad - a potentially exploding turnip.

The threatening vegetable was despatched in a "bluish gift bag" contained within a box slightly smaller than a baseball, according to Fort Wayne Journal-Gazette reporter Abby Slutsky.

The bomb squad was summoned at once, naturally, and used "a robot, fondly known as 'Bob'" to move the gift-bagged turnip of death into the car park. At this point an officer in full armour bravely approached the vegetable and X-rayed it.

According to remarks by Fort Wayne police spokesman Michael Joyner, as reported by Slutsky, the bomb technicians - having had a look at the X-ray - "were certain the package did not contain an [ordinary] explosive device". Nonetheless, they "opted to err on the side of caution and decided to try to detonate [the turnip] with a water cannon".

The only possible interpretation of this is that the bomb squad had received definitive warning of mutant/genetically-tampered-with EXPLODING TURNIPS (or maybe that the X-ray didn't come out)

We here on the Reg bomb-disposal desk, however, would never have used a water disruptor in a case of this type. The obvious technique for use against a exploder-turnip-based bomb (based on the UK's much broader perspective in this field) would clearly be the use of the "Baldrick" penetration attack. (We are not making the Baldrick up.)

"I'm now on constant alert against this and other rooted vegetables," said Fort Wayne lawyer Mark GiaQuinta, to whom the package was addressed.

He theorised that the explosive-esque yet nourishing gift had been sent to him by a disgruntled individual against whom GiaQuinta had acted in court. This person, described by the attorney as "volatile", had perhaps been trying to send the message "you can't get blood from a turnip".

Or something. Read the extensive - and excellent - Journal-Gazette coverage here and here. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
MEN WANTED to satisfy town full of yearning BRAZILIAN HOTNESS
'Prettier, better organised, more harmonious than if men were in charge'
Cops baffled by riddle of CHICKEN who crossed ROAD
'Officers were unable to determine Chicken's intent'
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Drunkards warned: If you can't walk in a straight line, don't shop online, you fool!
Put it away boys. Cover them up ladies. Your credit cards, we mean
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
Murder accused DIDN'T ask Siri 'how to hide my roommate'
US court hears of cached browser image - not actual request
Chomp that sausage: Brits just LOVE scoffing a Full Monty
Sales of traditional brekkie foods soar as hungry folk get their mitts greasy
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.