Feeds

Modern-day ninja in epic battle with riot police, robot

Swordsman who laughed at bot, gas, baton rounds felled by Taser

High performance access to file storage

A man who was plainly an invincible ninja warrior or similar tangled with police in Maryland recently. The sword-wielding scofflaw successfully resisted ordinary meatbag cops, a police robot, gassing with a "chemical agent" and a volley of low-velocity cosh projectiles from a SWAT team before finally succumbing to the crippling electric current of a Taser stun weapon.

The Washington Post reports on the remarkable eight-hour standoff between local lawmen and Michael R Beach, 44, of Edgewater in Maryland. Apparently a sheriff's deputy attempting to serve a court order on Beach was "lunged at" with a sword on arrival, after which Beach retreated into his home.

The traditional gathering of specialist units and SWAT teams ensued, and in due course the plods tried the standard next move – send in the robots. However the tin cop deployed on this occasion "didn't work".

The lawmen then gassed the troubled swordsman with an unspecified "chemical agent" before forcibly entering his stronghold. Here the SWAT team encountered the testy resident, apparently unaffected by the gas, still "clutching his sword". The assault cops then fired "beanbag" non/less-lethal impact rounds at him from riot guns "but he was unaffected" and managed to beat a fighting retreat into his bathroom.

Only two hours later did the cops manage to finally bust into the bathroom and subdue the obstreperous Beach, whose evident proficiency with a sword and ability to shrug off the effects of robots, gas and riot-gun projectiles could easily be ascribed to mastery of one or more exotic Oriental combat philosophy disciplines. The dauntless swordsman was felled by a Taser electrical stun weapon, which uses twin darts to pass a crippling 20,000-volt pulsed electrical current through a victim's body.

The Post reports that after finally being braceleted, Beach was charged with intent to murder in the second degree, assault, reckless endangerment "and related counts". Apparently the only person hurt during the takedown was Beach, who at one point inflicted a slight wound on himself with his sword. ®

Bootnote

We know this story actually happened a couple of weeks ago. But it involves robots, tasers, chemical weapons and a probable ninja, so we couldn't resist it.

High performance access to file storage

More from The Register

next story
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
Forget the beach 'n' boardwalk, check out the Santa Cruz STEVE JOBS FOUNTAIN
Reg reader snaps shot of touching tribute to Apple icon
Happy 40th Playmobil: Reg looks back at small, rude world of our favourite tiny toys
Little men straddle LOHAN, attend tiny G20 Summit... ah, sweet memories...
Lego is the TOOL OF SATAN, thunders Polish priest
New minifigs like Monster Fighters are turning kids to the dark side
Dark SITH LORD 'Darth Vader' joins battle to rule, er, Ukraine
Only I can 'make an empire out of a republic' intones presidential candidate
Chinese company counters pollution by importing fresh air
Citizens line up for bags of that sweet, sweet mountain air
Google asks April Fools: Want a job? Be our 'Pokemon Master'
Mountain View is prankin' like it's 1999...
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.