Feeds

9/11 hero mutt cloned

Ground Zero rescue dog honoured fivefold

SANS - Survey on application security programs

The teary-eyed owner of 9/11 hero Trakr - the dog who pulled the last survivor from the rubble of the World Trade Center - has been presented with five clones of his beloved mutt, AFP reports.

Former Canadian cop James Symington and Trakr arrived at Ground Zero on 12 September 2001, among the first "K9" search and rescue teams to offer assistance. Symington said: "Trakr was an extraordinary search and rescue dog. His work at Ground Zero was the culmination of his career."

Sadly, the sharp-nosed canine popped his paws back in April, but not before his master entered him in California cloning outfit BioArts International's "Golden Clone Giveaway" competition. BioArts chief exec Lou Hawthorne said of the winner: "We received many very touching submissions to our contest, describing some truly amazing dogs. But Trakr's story blew us away."

BioArts International tasked its partner SooAm Biotech Research Foundation of South Korea with knocking up a few copies of Trakr, and the result is five puppies named Trustt, Valor, Prodigy, Solace and Deja Vu.

Symington told reporters at the Los Angeles hand-over ceremony: "We're here to celebrate that Trakr's legacy lives on in these five beautiful puppies. If they have the same attributes Trakr did, then hopefully they'll develop into world class search and rescue dogs."

Of the puppy quintet, Symington noted that Trustt was most like his, er, dad. He explained: "The physical similarities are uncanny. He's the spitting image of the Trakr that I first met in 1995. He has exactly the same markings, the way he moves, everything. Very alert, very intelligent and intuitive."

The proud clone mutt owner concluded: "I respect that cloning's not for everyone. But there are few dogs that are born with extraordinary abilities and Trakr was one of those dogs."

That dog cloning might not be for everyone is evidenced by the fact that Hawthorne set the price of a single canine copy at $144K. ®

Bootnote

Those of you who are not already weeping into your coffee and who fancy having your hearts' cockles further warmed are directed to AFP, which has a lovely snap of the cloned hounds here. Bless.

Top three mobile application threats

More from The Register

next story
Fancy joining Reg hack on quid-a-day challenge?
Recruiting now for charity starvation diet
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.