Feeds

Huge 'vampyrus' bats being hunted to extinction

Tagged aerial scrumper study: Batshit crisis looming

Intelligent flash storage arrays

Scientists say that the world's largest bat, the six-foot Pteropus vampyrus, is threatened with extinction at the hands of bat hunters across the Far East. They have called for fewer bat-hunting permits to be issued by local governments.

Despite the name, P vampyrus is not a blood-drinking bat like some South American species, and isn't even carnivorous. It mainly lives on fruit, and is also known as a "flying fox". Fruitbat meat is considered a tasty treat by many in southeast Asia, and some also believe that it cures asthma.

P vampyrus is thus hunted, typically using shotguns, for food, medicinal purposes and just for sport. Fruit farmers also kill the winged scrumpers to stop them eating crops.

Dr Jonathan Epstein of the Wildlife Trust and his colleagues have now carried out a four-year study of P vampyrus in Malaysia. This involved carrying out a regular census at popular bat roosting sites, and also the tagging-up of seven selected bats with convict-style satellite tracking devices.

The batty boffins also considered the numbers of bat-hunting licences issued by the Malaysian government each year during the study. All Malaysian states except Sarawak in Borneo allow vampyrus hunting, as do other nearby nations such as Indonesia. Some 22,000 vampyrus death-warrants are issued each year just in peninsular Malaysia.

"Our models suggest that hunting activity over the period between 2002 and 2005 in Peninsular Malaysia is not sustainable, and that local populations of Pteropus vampyrus are vulnerable to extinction," says Epstein.

According to the doc, disappearance of the big bats would also have negative effects on the region's rainforests as they distribute seeds through the medium of batshit.

"They are critical to the propagation of rainforest plants," he told the BBC.

Epstein and his colleagues say that at least a temporary ban on bat-shooting should be considered, and that all the countries where they live should cooperate on protecting them.

The scientists' research is published in detail in the Journal of Applied Ecology. ®

Providing a secure and efficient Helpdesk

More from The Register

next story
GRAV WAVE DRAMA: 'Big Bang echo' may have been grit on the scanner – boffins
Exit Planet Dust on faster-than-light expansion of universe
Mine Bitcoins with PENCIL and PAPER
Forget Sudoku, crunch SHA-256 algos
SpaceX Dragon cargo truck flies 3D printer to ISS: Clawdown in 3, 2...
Craft berths at space station with supplies, experiments, toys
NASA rover Curiosity drills HOLE in MARS 'GOLF COURSE'
Joins 'traffic light' and perfect stony sphere on the Red Planet
'This BITE MARK is a SMOKING GUN': Boffins probe ancient assault
Tooth embedded in thigh bone may tell who pulled the trigger
Big dinosaur wowed females with its ENORMOUS HOOTER
That's right, Doris, I've got biggest snout in the prehistoric world
DOLPHINS SMELL MAGNETS – did we hear that right, boffins?
Xavier's School for Gifted Magnetotaceans
Japanese volcano eruption reportedly leaves 31 people presumed dead
Hopes fade of finding survivors on Mount Ontake
That glass of water you just drank? It was OLDER than the SUN
One MEELLION years older. Some of it anyway
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.