Feeds

'Crazy rasberry ants' target Texan tech

Electronics on the menu for rampaging nutter insects

High performance access to file storage

Texans in the Houston area are battling rampaging hordes of "voracious swarming ants" which have inexplicably developed a taste for electronic equipment, Chicago Tribune reports.

The "crazy rasberry ants" - which apparently arrived aboard a cargo ship in the port of Houston back in 2002 - got their common name "because they wander erratically instead of marching in regimented lines" added to the surname of Tom Rasberry, an exterminator who crossed swords with the invaders early in their attempted conquest of Texas.

While the insects have a traditional penchant for the "sweet juices" of plants, they have also "ruined pumps at sewage pumping stations, fouled computers and at least one homeowner's gas meter, and caused fire alarms to malfunction".

Ominously, the critters have been sighted at NASA's Johnson Space Center and close to Houston's Hobby Airport, although they "haven't caused any major problems there yet".

Indeed, homeowners are currently bearing the brunt of the assault, as a shaken Patsy Morphew of the Pearland suburb of Houston explained. "They're itty-bitty things about the size of fleas, and they're just running everywhere. There's just thousands and thousands of them. If you've seen a car racing, that's how they are. They're going fast, fast, fast. They're crazy."

The ants "appear to be resistant to over-the-counter ant killers", and hard-pressed exterminators want the Environmental Protection Agency (EPA) to "loosen restrictions on the use of more powerful pesticides".

The Texas Department of Agriculture, meanwhile, is collaborating with Texas A&M University researchers and the EPA on how to stop the ants. However, A&M entomologist Roger Gold admitted: "At this point, it would be nearly impossible to eradicate the ant because it is so widely dispersed." ®

Bootnote

The crazy rasberry ant - a newly-recognised species - is known to science as Paratrenicha species near pubens. Scientists are uncertain where they originally came from, but they are seemingly related to Paratrechina longicornis, aka "crazy ant" - another non-native which has spread across the eastern US and is also found in California and Arizona.

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
Get your MOON GEAR: Auction to feature Space Race memorabilia
Keepsakes from early NASA, Soviet programs up for bids
New FEMTO-MOON sighted BIRTHING from Saturn's RING
Icy 'Peggy' looks to be leaving the outer rings
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.