Feeds

German bomber crashes on Moon Google Earth

Alleged Ju88 in reservoir eludes Reg dragnet, however

The Power of One Infographic

Scotland's Daily Record is running an interesting piece on the apparent remains of a crashed WWII German bomber which ended its days over Greenock in 1941, and which has now surfaced on Google Earth.

The Junkers 88 was allegedly downed by anti-aircraft fire during the "Greenock Blitz" in May of that year, a two-night assault which flattened 1,000 houses and claimed around 280 lives.

The Record says locals "recall a bomber crashing in the area but no wreck was ever found".

Now, though, Google Earth imagery has revealed "what looks like the skeleton of a plane lying at the bottom of the dam next to Whinhill golf course in the Renfrewshire town".

Air crash expert Gordon Lyons told the Record: "Crash spotters have walked by the reservoir thousands of times and never once seen a thing. However, the lake is quite deep, so it could well be that the sunken wreckage has been overlooked until now. It has taken a bird's-eye view of the site to solve the mystery. This is a very exciting discovery."

Local resident Paul Campbell said: "There was always talk of hidden war planes in the dam but no one was ever sure. I grew up thinking it was one of those stories you hear as a child but this image looks uncannily like the skeleton of a plane."

Sadly, the Record isn't treating readers to "this image", so we went and had a bit of a shufti at the most likely site next to said golf club (.kmz here):

A reservoir next to Whinhill golf club, seen on Google Earth

No joy, but we did turn up this rather unconvincing object just to the east (.kmz here):

Mystery object in Greenock lake caught on Google Earth

Whether that looks like a Junkers 88 we'll leave to you, and of course if anyone finds something more solid, give us a shout.

Ministry of Defence aviation historians are "investigating whether or not the object is indeed a World War II aircraft", so presumably they have something a bit more interesting to look at. ®

Seven Steps to Software Security

More from The Register

next story
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Yahoo! Japan! launches! service! for! the! dead!
If you're reading this email, I am no longer alive
Plucky Rockall podule man back on (proper) dry land
Bold, barmy Brit adventurer Nick Hancock escapes North Atlantic islet
NSA man: 'Tell me about your Turkish connections'
Spooks ask Dabbsy to suggest a nice hotel with pool
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.