Feeds

9/11 hero mutt cloned

Ground Zero rescue dog honoured fivefold

Intelligent flash storage arrays

The teary-eyed owner of 9/11 hero Trakr - the dog who pulled the last survivor from the rubble of the World Trade Center - has been presented with five clones of his beloved mutt, AFP reports.

Former Canadian cop James Symington and Trakr arrived at Ground Zero on 12 September 2001, among the first "K9" search and rescue teams to offer assistance. Symington said: "Trakr was an extraordinary search and rescue dog. His work at Ground Zero was the culmination of his career."

Sadly, the sharp-nosed canine popped his paws back in April, but not before his master entered him in California cloning outfit BioArts International's "Golden Clone Giveaway" competition. BioArts chief exec Lou Hawthorne said of the winner: "We received many very touching submissions to our contest, describing some truly amazing dogs. But Trakr's story blew us away."

BioArts International tasked its partner SooAm Biotech Research Foundation of South Korea with knocking up a few copies of Trakr, and the result is five puppies named Trustt, Valor, Prodigy, Solace and Deja Vu.

Symington told reporters at the Los Angeles hand-over ceremony: "We're here to celebrate that Trakr's legacy lives on in these five beautiful puppies. If they have the same attributes Trakr did, then hopefully they'll develop into world class search and rescue dogs."

Of the puppy quintet, Symington noted that Trustt was most like his, er, dad. He explained: "The physical similarities are uncanny. He's the spitting image of the Trakr that I first met in 1995. He has exactly the same markings, the way he moves, everything. Very alert, very intelligent and intuitive."

The proud clone mutt owner concluded: "I respect that cloning's not for everyone. But there are few dogs that are born with extraordinary abilities and Trakr was one of those dogs."

That dog cloning might not be for everyone is evidenced by the fact that Hawthorne set the price of a single canine copy at $144K. ®

Bootnote

Those of you who are not already weeping into your coffee and who fancy having your hearts' cockles further warmed are directed to AFP, which has a lovely snap of the cloned hounds here. Bless.

Intelligent flash storage arrays

More from The Register

next story
Antarctic ice THICKER than first feared – penguin-bot boffins
Robo-sub scans freezing waters, rocks warming models
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Your PHONE is slowly KILLING YOU
Doctors find new Digitillnesses - 'text neck' and 'telepressure'
SEX BEAST SEALS may be egging each other on to ATTACK PENGUINS
Boffin: 'I think the behaviour is increasing in frequency'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
The next big thing in medical science: POO TRANSPLANTS
Your brother's gonna die, kid, unless we can give him your, well ...
NASA launches new climate model at SC14
75 days of supercomputing later ...
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.