Feeds

'Mount Doom' rumbling ominously

Did someone toss a ring into the Kiwi volcano used as LoTR movies' Mordor?

High performance access to file storage

Mount Ruapehu, the mountain in New Zealand used as a location for many of the Mordor scenes in the three Lord of The Rings films, is rumbling ominously.

New Zealand's Department of Conservation has issued a warning to folks contemplating a trip to the mountain not to go, as “recent measurements at Ruapehu indicates the likelihood of eruptions from the mountain has increased.”

Ruapehu is located on New Zealand's North Island and hosts a ski resort and parts of the Tongariro Alpine Crossing one of the nation's most famous walks. The mountain has a long history of eruptions, infamously killing 151 people in 1953 when a natural dam formed by an earlier eruption failed and sent enough water coursing down the mountain to wash away a nearby railway bridge.

Other eruptions have closed the ski field on the mountain, after ash covered the snow and made skiing impossible.

The flanks of Ruapehu and neighbouring Mount Ngauruhoe were used as locations in the Lord of the Rings trilogy. The presence of a large car park at Ruapehu saw it used as the location for scenes involving massed orcs going into battle, as the distinctive jagged rocks of the region look particularly inhospitable and Mordor-like.

Kiwi authorities recommend visitors stay away from the “Summit Hazard Zone”, an area defined as covering a two kilometre radius from the mountain's crater lake, as eruptions could result in nasty things happening rather quickly. In typical New Zealand style, the warning suggests walkers use their GPS systems to check if they're near the danger zone, and head in the other direction if they find they're about to cross the threshold.

Scientists don't know if Ruapehu's current rumblings are the beginning of something bigger, or just the kind of thing one should expect from an active volcano.

But the volcanic zone the moutain inhabits has been the scene of some of the most violent events in recent history. Nearby Lake Taupo, now a charming and very busy resort town and adventure tourism centre, was formed about 25,000 years ago.

On a 2008 visit, your correspondent was informed by locals that a later eruption, said to have taken place around 200 AD, altered global weather patterns to such an extent Roman literature noted an unusually cold period. ®

High performance access to file storage

More from The Register

next story
IBM Hursley Park: Where Big Blue buries the past, polishes family jewels
How the internet of things has deep roots in the English countryside
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Honeybee boffin STINGS OWN WEDDING TACKLE... for SCIENCE
Not the worst place to be stung, says one man
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.