Crying wolf to a predator: deceptive vocal mimicry by a bird protecting young.

نویسندگان

  • Branislav Igic
  • Jessica McLachlan
  • Inkeri Lehtinen
  • Robert D Magrath
چکیده

Animals often mimic dangerous or toxic species to deter predators; however, mimicry of such species may not always be possible and mimicry of benign species seems unlikely to confer anti-predator benefits. We reveal a system in which a bird mimics the alarm calls of harmless species to fool a predator 40 times its size and protect its offspring against attack. Our experiments revealed that brown thornbills (Acanthiza pusilla) mimic a chorus of other species' aerial alarm calls, a cue of an Accipiter hawk in flight, when predators attack their nest. The absence of any flying predators in this context implies that these alarms convey deceptive information about the type of danger present. Experiments on the primary nest predators of thornbills, pied currawongs (Strepera graculina), revealed that the predators treat these alarms as if they themselves are threatened by flying hawks, either by scanning the sky for danger or fleeing, confirming a deceptive function. In turn, these distractions delay attack and provide thornbill nestlings with an opportunity to escape. This sophisticated defence strategy exploits the complex web of interactions among multiple species across several trophic levels, and in particular exploits a predator's ability to eavesdrop on and respond appropriately to heterospecific alarm calls. Our findings demonstrate that prey can fool predators by deceptively mimicking alarm calls of harmless species, suggesting that defensive mimicry could be more widespread because of indirect effects on predators within a web of eavesdropping.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fork-tailed drongos use deceptive mimicked alarm calls to steal food.

Despite the prevalence of vocal mimicry in animals, few functions for this behaviour have been shown. I propose a novel hypothesis that false mimicked alarm calls could be used deceptively to scare other species and steal their food. Studies have previously suggested that animals use their own species-specific alarm calls to steal food. However none have shown conclusively that these false alar...

متن کامل

Context-dependent vocal mimicry in a passerine bird.

How do birds select the sounds they mimic, and in what contexts do they use vocal mimicry? Some birds show a preference for mimicking other species' alarm notes, especially in situations when they appear to be alarmed. Yet no study has demonstrated that birds change the call types they mimic with changing contexts. We found that greater racket-tailed drongos (Dicrurus paradiseus) in the rainfor...

متن کامل

Monkeys crying wolf? Tufted capuchin monkeys use anti-predator calls to usurp resources from conspecifics.

The use of 'tactical deception' is argued to have been important in the cognitive evolution of the order Primates, but systematic studies of active deception in wild non-human primates are scant. This study tests whether wild tufted capuchin monkeys (Cebus apella nigritus) use alarm calls in a functionally deceptive manner to usurp food resources. If capuchins use alarm calls 'deceptively', it ...

متن کامل

Interspecific social dominance mimicry in birds

Interspecific social dominance mimicry (ISDM) is a proposed form of social parasitism in which a subordinate species evolves to mimic and deceive a dominant ecological competitor in order to avoid attack by the dominant, model species. The evolutionary plausibility of ISDM has been established previously by the Hairy-Downy game (Prum & Samuelson). Psychophysical models of avian visual acuity su...

متن کامل

Evolutionary implications of deception in mimicry and masquerade

Aggressive mimicry occurs when an organism resembles some aspect of another organism (the model) in order to obtain prey through its deceptive resemblance. This may function either through the overt response of the receiver or through the lack of response of the receiver. Reviewing selected examples, I discuss some of the difficulties in ascribing a model for the mimic. I also discuss how a sin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Proceedings. Biological sciences

دوره 282 1809  شماره 

صفحات  -

تاریخ انتشار 2015