Feeds

ULTRASONIC BOLLOCK BLASTERS help Hawkmoth battle The Bat

Noisy genitals scramble chiropteran sonar

  • alert
  • submit to reddit

SANS - Survey on application security programs

In a development whose scientific importance would be difficult to exaggerate, it has been discovered that hawk moths emit powerful ultrasonic pulse beams from their genitals in order to intefere with the sonar senses of predatory bats hunting them.

As any fule kno, bats emit high-frequency sound pulses when hunting in darkness and listen for echoes bouncing back off obstacles, prey etc - an ability often dubbed "echolocation".

“Echolocation research has been focused on porpoises, whales and dolphins," says Akito Kawahara, assistant curator of Lepidoptera at the Florida Museum of Natural History. "We know some insects produce the sounds, but this discovery in an unrelated animal making ultrasound, potentially to jam the echolocation of bats, is exciting.”

Like an electronic-warfare aircraft seeking to jam a hostile radar scanner, it seems that the crafty moths belt out pulses of energy on the same frequency employed by hunting bats and so scramble the chiropterans' readouts. Kawahara and his fellow researcher Jesse Barber explain the deadly aerial battle that plays out every night in such places as the jungles of Borneo and the lower Amazon:

Bats and moths have been engaged in aerial warfare for nearly 65 million years. This arms race has produced a suite of counter-adaptations in moths, including bat-detecting ears. One set of defensive strategies involves the active production of sound ... moths' ultrasonic replies to bat attack have been shown to startle bats, warn the predators of bad taste and jam their biosonar.

It seems that the fluttering insects produce their ultrasonic-warfare pulses from biological transducers located in their gonads. We are told:

Previous research shows tiger moths use ultrasound as a defense mechanism. While they produce the sound using tymbals, a vibrating membrane located on the thorax, hawkmoths use a system located in the genitals.

Specifically, as one really might have expected:

Males do so by grating modified scraper scales on the outer surface of the genital valves against the inner margin of the last abdominal tergum.

Female moths are also thought to engage in jamming and spoofing of batty sonar, but the scientists aren't sure how as their private regions are arranged rather differently.

“We think hawkmoths are a primary food source for bats ... which is why they have evolved anti-bat ultrasound strategies,” Kawahara says. “Hawkmoths have evolved different ways of avoiding bats — I can’t even explain how amazing the system is, it is just fascinating.”

Full details of the bat-bamboozling bollock-blaster boffinry are published in the journal Biology Letters, here. ®

3 Big data security analytics techniques

More from The Register

next story
Most Americans doubt Big Bang, not too sure about evolution, climate change – survey
Science no match for religion, politics, business interests
So, just how do you say 'the mutt's nuts' in French?
Vital linguistic question interrupts LOHAN spaceplane mission
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
LOHAN and the amazing technicolor spaceplane
Our Vulture 2 livery is wrapped, and it's les noix du mutt
Liftoff! SpaceX Falcon 9 lifts Dragon on third resupply mission to ISS
SpaceX snaps smartly into one-second launch window
STEALTHY NANOROBOTS dress up as viruses, prepare to sneak into YOUR BODY
Cloaking techniques nicked from viruses tackle roadblocks on way to medical frontier
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.