Feeds

German bomber crashes on Moon Google Earth

Alleged Ju88 in reservoir eludes Reg dragnet, however

Remote control for virtualized desktops

Scotland's Daily Record is running an interesting piece on the apparent remains of a crashed WWII German bomber which ended its days over Greenock in 1941, and which has now surfaced on Google Earth.

The Junkers 88 was allegedly downed by anti-aircraft fire during the "Greenock Blitz" in May of that year, a two-night assault which flattened 1,000 houses and claimed around 280 lives.

The Record says locals "recall a bomber crashing in the area but no wreck was ever found".

Now, though, Google Earth imagery has revealed "what looks like the skeleton of a plane lying at the bottom of the dam next to Whinhill golf course in the Renfrewshire town".

Air crash expert Gordon Lyons told the Record: "Crash spotters have walked by the reservoir thousands of times and never once seen a thing. However, the lake is quite deep, so it could well be that the sunken wreckage has been overlooked until now. It has taken a bird's-eye view of the site to solve the mystery. This is a very exciting discovery."

Local resident Paul Campbell said: "There was always talk of hidden war planes in the dam but no one was ever sure. I grew up thinking it was one of those stories you hear as a child but this image looks uncannily like the skeleton of a plane."

Sadly, the Record isn't treating readers to "this image", so we went and had a bit of a shufti at the most likely site next to said golf club (.kmz here):

A reservoir next to Whinhill golf club, seen on Google Earth

No joy, but we did turn up this rather unconvincing object just to the east (.kmz here):

Mystery object in Greenock lake caught on Google Earth

Whether that looks like a Junkers 88 we'll leave to you, and of course if anyone finds something more solid, give us a shout.

Ministry of Defence aviation historians are "investigating whether or not the object is indeed a World War II aircraft", so presumably they have something a bit more interesting to look at. ®

Internet Security Threat Report 2014

More from The Register

next story
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
Bible THUMP: Good Book beats Darwin to most influential tome title
Folio Society crowns fittest of surviving volumes
U wot? Silicon Roundabout set to become Silicon U-BEND
Crap-spouting London upstarts to get permanent road closure
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.