Feeds

ULTRASONIC BOLLOCK BLASTERS help Hawkmoth battle The Bat

Noisy genitals scramble chiropteran sonar

  • alert
  • submit to reddit

Next gen security for virtualised datacentres

In a development whose scientific importance would be difficult to exaggerate, it has been discovered that hawk moths emit powerful ultrasonic pulse beams from their genitals in order to intefere with the sonar senses of predatory bats hunting them.

As any fule kno, bats emit high-frequency sound pulses when hunting in darkness and listen for echoes bouncing back off obstacles, prey etc - an ability often dubbed "echolocation".

“Echolocation research has been focused on porpoises, whales and dolphins," says Akito Kawahara, assistant curator of Lepidoptera at the Florida Museum of Natural History. "We know some insects produce the sounds, but this discovery in an unrelated animal making ultrasound, potentially to jam the echolocation of bats, is exciting.”

Like an electronic-warfare aircraft seeking to jam a hostile radar scanner, it seems that the crafty moths belt out pulses of energy on the same frequency employed by hunting bats and so scramble the chiropterans' readouts. Kawahara and his fellow researcher Jesse Barber explain the deadly aerial battle that plays out every night in such places as the jungles of Borneo and the lower Amazon:

Bats and moths have been engaged in aerial warfare for nearly 65 million years. This arms race has produced a suite of counter-adaptations in moths, including bat-detecting ears. One set of defensive strategies involves the active production of sound ... moths' ultrasonic replies to bat attack have been shown to startle bats, warn the predators of bad taste and jam their biosonar.

It seems that the fluttering insects produce their ultrasonic-warfare pulses from biological transducers located in their gonads. We are told:

Previous research shows tiger moths use ultrasound as a defense mechanism. While they produce the sound using tymbals, a vibrating membrane located on the thorax, hawkmoths use a system located in the genitals.

Specifically, as one really might have expected:

Males do so by grating modified scraper scales on the outer surface of the genital valves against the inner margin of the last abdominal tergum.

Female moths are also thought to engage in jamming and spoofing of batty sonar, but the scientists aren't sure how as their private regions are arranged rather differently.

“We think hawkmoths are a primary food source for bats ... which is why they have evolved anti-bat ultrasound strategies,” Kawahara says. “Hawkmoths have evolved different ways of avoiding bats — I can’t even explain how amazing the system is, it is just fascinating.”

Full details of the bat-bamboozling bollock-blaster boffinry are published in the journal Biology Letters, here. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Our LOHAN spaceplane ballocket Kickstarter climbs through £8000
Through 25 per cent but more is needed: Get your UNIQUE rewards!
LOHAN tunes into ultra long range radio
And verily, Vultures shall speak status unto distant receivers
EOS, Lockheed to track space junk from Oz
WA facility gets laser-eyes out of the fog
Volcanic eruption in Iceland triggers CODE RED aviation warning
Lava-spitting Bárðarbunga prompts action from Met Office
NASA to reformat Opportunity rover's memory from 125 million miles away
Interplanetary admins will back up data and get to work
Major cyber attack hits Norwegian oil industry
Statoil, the gas giant behind the Scandie social miracle, targeted
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.