ArticlePDF Available

Educating the enemy: Harnessing learned avoidance behavior in wild predators to increase survival of reintroduced southern corroboree frogs

Wiley
Conservation Science and Practice
Authors:

Abstract and Figures

After decades of near‐complete extirpation, the yellow‐and‐black‐striped Southern Corroboree Frog (Pseudophryne corroboree) is being reintroduced into field enclosures that exclude all but avian predators. The frog's long absence means avian attack risk to reintroduced individuals is unknown, so we asked: does corroboree frog coloration make them vulnerable to predators? First, using painted clay frog models and humans as proxy predators, we found that, surprisingly, striped models were as difficult to detect as control black models, and were far less detectable than yellow models. Second, to quantify attack probabilities, we deployed 2,304 models twice in the species' former range. Of our recovered models, 18% of the striped models were attacked by birds, suggesting they are a significant threat. In our second deployment, we saw a significant reduction in attacks on all model colors with only 10% of striped models attacked. If predators generalize their avoidance learning to real corroboree frogs, strategically timed model deployment near release sites may enhance the probability of survival of reintroduced frogs. Our study suggests that model deployment could be an effective low‐cost technique to increase the survival of reintroduced prey species, including, but not limited to, those potentially conspicuous to their natural enemies.
This content is subject to copyright. Terms and conditions apply.
CONTRIBUTED PAPER
Educating the enemy: Harnessing learned avoidance
behavior in wild predators to increase survival of
reintroduced southern corroboree frogs
Kate D. L. Umbers
1,2
| Julia L. Riley
3
| Michael B. J. Kelly
1,2
|
Griffin Taylor-Dalton
1
| Justin P. Lawrence
4
| Phillip G. Byrne
5
1
School of Science and Health, Western
Sydney University, Richmond, New South
Wales, Australia
2
Hawkesbury Institute for the
Environment, Western Sydney University,
Richmond, New South Wales, Australia
3
Department of Botany & Zoology,
Stellenbosch University, Stellenbosch,
South Africa
4
Department of Biology, University of
Mississippi, Oxford, Mississippi
5
School of Biology, University of
Wollongong, Wollongong, New South
Wales, Australia
Correspondence
Kate Umbers, School of Science and
Health, Western Sydney University,
Richmond, NSW, Australia.
Email: k.umbers@westernsydney.edu.au
Funding information
University of Wollongong, Grant/Award
Number: VC's Fellowship; Australian
Research Council, Linkage Program,
Grant/Award Number: LP170100351
Abstract
After decades of near-complete extirpation, the yellow-and-black-striped
Southern Corroboree Frog (Pseudophryne corroboree) is being reintroduced
into field enclosures that exclude all but avian predators. The frog's long
absence means avian attack risk to reintroduced individuals is unknown, so
we asked: does corroboree frog coloration make them vulnerable to predators?
First, using painted clay frog models and humans as proxy predators, we found
that, surprisingly, striped models were as difficult to detect as control black
models, and were far less detectable than yellow models. Second, to quantify
attack probabilities, we deployed 2,304 models twice in the species' former
range. Of our recovered models, 18% of the striped models were attacked by
birds, suggesting they are a significant threat. In our second deployment, we
saw a significant reduction in attacks on all model colors with only 10% of
striped models attacked. If predators generalize their avoidance learning to
real corroboree frogs, strategically timed model deployment near release sites
may enhance the probability of survival of reintroduced frogs. Our study sug-
gests that model deployment could be an effective low-cost technique to
increase the survival of reintroduced prey species, including, but not limited
to, those potentially conspicuous to their natural enemies.
KEYWORDS
alpine, antipredator, aposematism, Australian Alps, chytrid, clay models, conservation,
reintroduction
1|INTRODUCTION
The success of reintroduction programs can depend on
the depth of scientific knowledge on species' natural his-
tory (Berger-Tal et al., 2011). Understanding predator
prey dynamics and directly measuring the potential
impact of predation on postrelease survival can therefore
help optimize reintroductions (Armstrong & Seddon,
2008). Species' vulnerability to predation largely depends
on the experience predators have with the profitability of
Received: 21 May 2019 Revised: 29 October 2019 Accepted: 6 November 2019
DOI: 10.1111/csp2.139
This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided
the original work is properly cited.
© 2019 The Authors. Conservation Science and Practice published by Wiley Periodicals, Inc. on behalf of Society for Conservation Biology
Conservation Science and Practice. 2020;2:e139. wileyonlinelibrary.com/journal/csp2 1of15
https://doi.org/10.1111/csp2.139
potential prey in combination with the experience prey
have in successfully avoiding their predators. Captive
and/or isolated prey populations can lose protective traits
that are maintained in their wild counterparts through
natural selection (Jolly, Webb, & Phillips, 2018). For
example, over just 13 generations, northern quolls
(Dasyurus hallucatus) descended from populations on a
predator-free island lost protective traits that their main-
land counterparts retained (Jolly et al., 2018). Predator
awareness can be reinstated using conditioning tech-
niques with model predators (Griffin, Blumstein, &
Evans, 2000). For example, captive-raised tammar wal-
labies (Macropus eugenii) that do not exhibit natural
predator-avoidance behaviors can be successfully trained
to avoid foxes (Vulpes vulpes) before release by exposing
them to taxidermy foxes as model predators. Similar con-
ditioning techniques have also been used on El Hierro
giant lizards (Gallotia simonyi) who subsequently change
their behavior when in the presence of cats and kestrels
(Burunat-Pérez, Suárez-Rancel, & Molina-Borja, 2018).
Yet, the outcome of training is not always successful. For
example, similar training techniques have also been used
on greater bilbies (Macrotis lagotis), but whether training
enhances survival in the wild is currently equivocal
(Moseby et al., 2011; Moseby, Cameron, & Crisp, 2012).
An alternative approach to manipulating predation rates
in conservation strategies is to teach the predator population
to avoid prey. In their classic experiment, Nicolaus, Cassel,
Carlson, and Gustavson (1983) showed that crows (Corvus
brachyrhynchos) can be taught to avoid colored eggs con-
taining a toxin, and then generalize to avoid eggs of the
same color in other locations. Learned avoidance condition-
ing has also been a successful technique for teaching some
Australian native predators to avoid eating the invasive cane
toad (Bufo marinus), whose chemical defense is highly toxic
to many Australian species (Ujvari, Mun, et al., 2013;
Ujvari, Oakwood, & Madsen, 2013). For example, survival
of the northern quoll (D. hallucatus) is enhanced when indi-
viduals are trained to avoid eating cane toads by feeding
them toad-flavored sausages laced with thiabendazole
which induces nausea (Indigo, Smith, Webb, & Phillips,
2018). When the prey species is the focus of conservation,
generating or enhancing learned avoidance in the wild
predator population is a logical extension of the learned-
aversion methods so far applied to conservation. Brightly
colored prey species may be particularly susceptible to pred-
ators upon reintroduction, so teaching predators to avoid
them warrants investigation as a powerful tool in their
recovery program.
Understanding the role an imperilled species' colora-
tion plays in protecting them from predation is an impor-
tant aspect of their natural history that should be
incorporated into conservation plans. Predators can be
deterred by prey via protective coloration, a broad term
that includes camouflage (concealing) and aposematism
(warning). Camouflage includes background matching
(crypsis/disruptive coloration), and individuals appearing
to be something they are not (masquerade; Ruxton,
Sherratt, & Speed, 2004). The protective value of camou-
flage lies in predators either failing to detect prey, or
detecting them but misclassifying prey as something
inedible (Guilford & Dawkins, 1991; Skelhorn, Rowland,
Speed, & Ruxton, 2010). Upon reintroduction, extirpated
species that rely on camouflage may experience the same
level of protection as their ancestors if the environment
has not changed in a way that now renders them conspic-
uous. However, this may be less likely for animals with
warning colors (one type of aposematism).
Aposematic animals that use coloration as their signal
are often conspicuous and easy to detect (Mappes,
Marples, & Endler, 2005), but the protective value of
aposematism comes from predators coupling the signal with
unprofitability. Often it is essential that predators learn to
associate a signal with unprofitability through experience
interacting with the prey, sometimes killing the prey in the
process (Endler & Mappes, 2004). Extirpated aposematic
species that require predator learning for effective protection
face a challenge upon reintroduction; if they are conspicu-
ous, they may be fatally attacked if the current generation of
predators is naïve to the meaning of their signal. Thus,
reintroduced aposematic prey may experience high preda-
tion rates as predators learn to avoid them, potentially dev-
astating conservation efforts. However, learned avoidance is
not always required. Predators may have innate aversion to
certain color patternslike black and yellow stripes
(Lindström, Alvtalo, Mappes, Rilpi, & Vertainen, 1999)
and preferentially avoid them in a neophobic response
(Exnerováetal.,2007;Mappesetal.,2005).Inaddition,
avoidance can be socially learned as individual predators
observe each other attempting to subdue prey (Thorogood,
Kokko, & Mappes, 2018). Reintroduced aposematic prey
may thus be protected without predators having to learn
avoidance, or in other cases face high levels of predation as
predators learn about the prey's unprofitability. Thus, the
effect of coloration on prey vulnerability cannot be assumed
and ought to be measured when possible.
The IUCN Global Amphibian Assessment identified
26 Australian frog species needing ex situ intervention
(McFadden et al., 2013). Of these species, several exhibit
striking coloration, including the black-and-yellow striped
southern and Northern Corroboree Frogs (Pseudophryne
corroboree and P. pengellyi, respectively). Their coloration
and the ability of Pseudophyrne sp. frogs' to both acquire
toxins from their diet and generate them de novo
(Pseudaphryinanime, see below) has led to the widely held
assumption that the corroboree frogs are aposematic, though
2of15 UMBERS ET AL.
this hypothesis has not been formally tested. Both species are
threatened, and the Southern Corroboree Frog is critically
endangered. For 40 years, Southern Corroboree Frogs have
experienced a catastrophic population decline due, primarily,
to living in sympatry with a chytridiomycosis reservoir spe-
cies (Crinia signifera; Hunter, Marantelli, et al., 2010; Hunter,
Speare, et al., 2010; Scheele et al., 2017). Southern Corrobo-
ree Frogs are now functionally extinct (Brannelly, Roberts,
Skerratt, & Berger, 2017). Only a small number of individuals
remain in the wild at translocated and reintroduced sites
(McFadden, personal communication). Their survival is
dependent on ex situ breeding and reintroduction (Berger
et al., 2016). Reintroduction enclosures exclude mammalian
and reptilian predators, but do not exclude birds, primarily
visual hunters that have tetrachromatic vision (full color
vision including sensitivity in the ultraviolet; Bennett,
Cuthill, & Norris, 1994; Hart, Partridge, Cuthill, & Bennett,
2000; Brannelly et al., 2015). So, does Southern Corroboree
Frog coloration make them vulnerable to bird attack?
We aimed to understand predation risk faced by
reintroduced Southern Corroboree Frogs through two
experiments using clay models to quantify the probability
that frogs are detected and attacked by birds. We chose clay
models because (a) real frogs are highly valuable for conser-
vation, and (b) naturally occurring predation events are sel-
dom witnessed in nature (Noonan & Comeault, 2009). In
all experiments we used black, yellow, and black-and-
yellow striped clay frog models. By including plain black
and yellow models we controlled for the relative extremes
of detectability, and the colors themselves influencing
detectability and attack independent of the pattern.
The aim of the first experiment was to measure the
detectability (sensu Guilford & Dawkins, 1991) of our
three types of clay models (Endler, 1991; Guilford &
Dawkins, 1991). When using clay models to measure pre-
dation rates in free-ranging wild predators, it is impossi-
ble to determine when models are detected but ignored
by predators (Rößler, Pröhl, & Lötters, 2018). We thus
used humans as a proxy for predators to measure detect-
ability, as is commonplace in sensory ecology, because
unlike wild bird predators humans can tell us when they
see a model (Bergeron & Fuller, 2017; Mappes, Kokko,
Ojala, & Lindström, 2014; Seddon, Tobias, Eaton, &
Ödeen, 2010). Although human vision differs from bird
vision in that we do not detect ultraviolet, Southern Cor-
roboree Frogs do not reflect in the ultraviolet, so humans
can see the complete reflectance of Corroboree Frog col-
oration (Figure 1, Umbers, Silla, Bailey, Shaw, & Byrne,
2016). Our hypothesis was that the model types differed
in their detectability. We predicted that (a) if stripes cam-
ouflage frogs, then striped models would be detected at a
similar rate to black models, and (b) if stripes make frogs
conspicuous, striped models would be detected at a simi-
lar rate to yellow models.
FIGURE 1 Reflectance of the
yellow coloration of live Southern
Corroboree Frogs (a), the yellow paint
on our clay frog models (b), the black
paint used on the black frog models (c),
and the black stripes on the yellow-and-
black striped frog models (d)
UMBERS ET AL.3of15
The aim of the second experiment was to understand
how coloration influences the avian predation risk to
reintroduced Southern Corroboree Frogs. We deployed
clay models within parts of the Southern Corroboree Frog's
former range and quantified avian attacks. Our hypothesis
was that the model types differed in their probability of
bird attack. We predicted that if corroboree frog coloration
makes them vulnerable, and frogs are attacked by preda-
tors (because they have lost learned avoidance, lost innate
avoidance, or never had innate avoidance), we would see
similarly high attack rates on striped and yellow models,
and low attacks on black models. However, if corroboree
frog stripes are protective through concealing them from
predators (camouflage), or if predators avoid their stripes,
we expected similarly low attack rates on striped and black
models, and higher attack rates on yellow models.
Finally, we aimed to determine whether the unprofit-
able experience of mistaking a clay model for food could
deter predators in future encounters. We deployed our
models a second time and tested for differences in attacks
between the first and second deployments in the same
locations 5 weeks apart. We predicted that predators
would exhibit learned avoidance and be less likely to
attack models in the second deployment after having had
an initial unprofitable experience attacking a clay frog.
2|METHODS
2.1 |Natural history
P. corroboree is a small toadlet endemic to alpine habitats
above 1,200 m elevation in Australia with striking longitudi-
nal black-and-yellow stripes (Figure 2). To people of the
Wolgalu Aboriginal Nation the Southern Corroboree Frog
is known as Gyack (Connolly, Williams, & Williams, 2017).
For Wolgalu people, Gyack's breeding calls herald prepara-
tion for travel to the Australian high country for important
spring seasonal ceremonies and sacred business (Connolly
et al., 2017). Corroboree frog breeding season is a signal of
spring in the Australian Alps because it is triggered by the
snow melt during which males gather in peat bogs to con-
struct a small, dry chamber withinvegetationandsoiland
call to attract females to mate. Females lay their eggs within
the chamber, and the male remains inside it throughout the
breeding season (January and February annually) (Byrne &
Silla, 2017). Embryos develop within the egg until they
reach an advanced stage, at which point they undergo dia-
pause until winter rains stimulate hatching (Anstis, 2014).
After hatching, tadpoles remain in winter pools and meta-
morphose in the following summer (about a year of devel-
opment from egg deposition until metamorphosis) (Anstis,
2014). The frogs become sexually mature around 4 years old
(Hunter, Osborne, Smith, & McDougall, 2009; McFadden
et al., 2013). In general, Pseudophryne frogs possess defen-
sive chemical compounds in the skin (Daly et al., 1990)
derived both from their diet and de novo but it is unclear as
to whether the corroboree frogs possess these toxins (Smith
et al., 2002). Candidate avian predators in the frog's range
probably include: Australian Magpie, Cracticus tibicens;Lit-
tle Raven, Corvus mellori; Pied Currawong, Strepera
graculina; and Laughing Kookaburra, Dacelo novaeguinea.
2.2 |Clay model approach and
construction
The clay model experimental approach uses models to
assess predation risk as an alternative to natural observa-
tion when predation is rarely observed, or individuals are
FIGURE 2 Photographs of
(a) real Southern Corroboree Frog,
and (b) black, (c) black-and-yellow
striped, and (d) yellow frog models
with bird attack impressions
4of15 UMBERS ET AL.
rare. Our clay models were approximately 27 mm in
snout-to-vent (SVL) length, comparable to a mature spec-
imen of P. corroboree (2533 mm SVL) (Anstis, 2014). To
construct models, we heated clay and then poured it into
silicone molds and allowed it to set. We used Monster
Clay, which is an oil-based plasticine clay that sets firm
but does not harden, ensuring the clay remains soft and
can retain evidence of predation attempts (i.e., tooth or
beak impressions). Three color patterns were selected for
model coloration, black,”“yellow,and striped
(Figure 2). Visual comparison with spectrophotometric
measurements using a Jaz spectrophotometer (Ocean
Optics, Dunedin) of live specimens of P. corroboree
viewed at Taronga Zoo, and on eight individuals from a
research colony at the University of Wollongong (see
Umbers et al., 2016), allowed for accurate color matching
of paints used to color over the brown clay used to make
all models (Figure 1). The black treatment (N= 768;
black paint: Derivan Matisse Raw Umber,Series 1) had
a dual function, controlling for the black stripes in the
corroboree pattern and resembling a palatable, compara-
tively sized camouflaged species (e.g., C. signifera) found
sympatrically with P. corroboree. The plain yellow treat-
ment acted as a control for conspicuousness of the yellow
in the corroboree frog pattern (N= 768; yellow paint:
Resene Bird Flower). Black stripes were added to
models painted with the same yellow as above to create
the striped models (N= 768; yellow paint: Resene Bird
Flower; black stripes: Black Uniball Posca PC-3M,
Tokyo). Once the paint dried, clear acrylic gloss spray
(MTN Montana Colors, Barcelona) was applied to all the
models to give them a wet appearance, simulating the
appearance of live frogs.
2.3 |Model detectability
We created a 10 m ×25 m grid of 30 models (10 per treat-
ment) in a grassy field at the Hawkesbury Campus of
Western Sydney University, similar to alpine sites where
the models were deployed. Models were placed on both
sides of a 1 m wide midline that spanned the 25 m length
of the grid. Models were placed at intervals 15 m perpen-
dicular to the midline on a wooden golf tee in the ground
to stabilize them. Models were spaced haphazardly along
the 25 m axis of the grid to ensure observers did not
expect models at particular intervals. Before the trial,
34 observers were independently shown an unpainted
model and were told that models similar to, but not the
same as, the model they were shown could be found per-
pendicular to the midline between 1 and 5 m away. Land-
marks were pointed out to observers to ensure boundaries
of the grid were clear. Observers then followed an
experimenter that walked at a standardized pace (~1 m/s),
and noted each model detected.
We used a generalized linear mixed effect model
(GLMM using the lme4 R package; Bates, Mächler,
Bolker, & Walker, 2015) with a binomial distribution
(logit link) to statistically analyze our data in R version
3.4.0 (R Core Team, 2017). We compared whether a
model was detected (binary response variable: seen = 1,
not seen = 0) between treatments (categorical fixed effect:
black, yellow, or striped), while controlling for distance
the model was from the pathway (continuous fixed effect)
and differences between human subjects (random effect).
Post hoc, to examine comparisons between all treatment
types, we used the R function lsmeans from the lsmeans
R package, and corrected p-values using Tukey's HSD
multiplicity adjustment (Lenth & Lenth, 2018).
2.4 |Model attacks
To assess attack rate by avian predators, we deployed
2,304 frog models (all three colors; N= 768 of each) on
two separate occasions during the 2015/2016 summer in
Kosciuszko National Park, New South Wales, Australia
within the historic range of the Southern Corroboree
Frog. Models were deployed first between December
28, 2015 and January 2, 2016 and, second, February 812,
2016. This was during the Southern Corroboree Frog's
breeding season when predators would most likely
encounter adult frogs gathered together (Hunter et al.,
2009). To measure changes in predator behavior, the
same transects were used in both deployments. Transects
were at four locations >2 km apart each containing
576 models. Transect starting locations were
(a) 3631029.5300S, 14815050.3100E, (b) 3624021.8100 S,
14818046.8400E, (c) 3622036.0000S, 14822012.0000 E, and
(d) 3622036.8100S, 1482901.3100 E. These locations are
more than 30 km from the nearest current Southern Cor-
roboree Frog reintroduction site. To be clear, we are not
providing location information on the current locations
of Southern Corroboree Frogs (only our study's transect
locations) in order to keep the locations of this critically
endangered species secret.
We deployed models in 24 rows of 24 frogs (8 models
of each color in a randomized order 1 m apart) with each
row approximately 100 m apart to maximize the likeli-
hood of independent attacks (that different individual
birds attack the models), which can be a common prob-
lem with clay model experiments (Noonan & Comeault,
2009) (Figure 3). We selected this clumpeddesign
because (a) as predator encounter rate increases, preda-
tors are more likely to learn when prey are clumped
(Endler & Rojas, 2009; Gamberale & Tullberg, 1996; Riipi,
UMBERS ET AL.5of15
Alatalo, Lindström, & Mappes, 2001), and (b) because
Southern Corroboree Frogs had a patchy distribution dur-
ing their breeding season when they were abundant
(Hunter et al., 2009). We pressed models onto golf tees to
minimize the risk that they would be dislodged by forces
other than predators (wind, rain, etc.). Models were not
retrieved until after 96 hr in the field to avoid disturbing
predators in the area while the models were present. We
did not recover all the models that we deployed, as is the
expectation in field-based model experiments of this mag-
nitude (Table 1; Rößler et al., 2018). We excluded all
missing models from our analysis because it is impossible
to know the fate of the missing models, and because their
missing status is not reliable evidence of predation
(Rößler et al., 2018). Therefore, attack marks and subse-
quent statistical analyses were on recovered models only.
Following Low, Sam, McArthur, Posa, and Hochuli
(2014), we categorized the attacks on recovered models as
avian, mammalian, or unidentified. We attributed models
showing deep U- or V-shaped marks to birds, whereas
models exhibiting teeth impressions, such as incisor marks,
were attributed to mammals (McElroy, 2016). Models that
could not be confidently categorized by three independent
observers were excluded from analysis (N= 80), and statis-
tical analysis focused exclusively on avian attacks because
they are motivated by visual cues, and because other preda-
tors are excluded from reintroduction enclosures.
We used G-tests to examine differences in the propor-
tion of models recovered for each treatment. We used a
GLMM with a binomial distribution (logit link; Bates
et al., 2015) to statistically compare whether or not a
model was attacked (binary response variable;
attacked = 1, no attack = 0) between the first and second
deployments. This model included the fixed effects of
model treatment (categorical fixed effect: black, yellow,
or striped), deployment (categorical fixed effect: first or
second), and the interaction between these two variables.
It also included the random effect of location and row, to
control for dependencies in our data due to the specific
positions of deployment. We conducted post hoc compar-
isons between deployments and all treatment types using
the same method as detailed in our analysis of the detect-
ability study above (Lenth & Lenth, 2018).
3|RESULTS
3.1 |Model detectability
Out of a possible 1,020 observations, our observers
detected models 75 times (10 black, 3 striped, 62 yellow;
Figure 4). Yellow models were more likely to be detected
than black or striped models, and there was no difference
in detectability between black and striped models
(Table 2). As predicted by our GLMM, the mean proba-
bility of detection was 0.148 (SE = 0.027) for yellow
models, 0.022 (SE = 0.008) for black models, and 0.006
(SE = 0.004) for striped models.
3.2 |Model attacks
3.2.1 |Comparing attacks between
deployments
The proportion of models attacked by birds (of those
recovered) was higher in the first deployment (21.7%,
314/1445) than the second (9.4%; 211/2236). As a propor-
tion of recovered models for each treatment in the first
deployment, birds attacked 27.9% (123/440) of black,
17.6% (86/489) of striped, and 20.3% (105/516) of yellow
models (Figure 5). In the second deployment birds
attacked 12.2% of black (88/723), 9.9% of striped (75/759),
and 6.4% of yellow (48/754) recovered models (Figure 5).
FIGURE 3 Experimental
setup of each transect within
Kosciuszko National Park
(KNP), New South Wales
(NSW), Australia. Models were
placed 1 m apart separated into
24 per row, with 24 rows per
transect that were separated
by ~100 m
6of15 UMBERS ET AL.
TABLE 1 A summary of 13, haphazardly chosen, clay model studies completed since 2000 to provide rough guidelines on the number
of models and treatments typical for clay model design, and on which to base expectations of the percentage of models attacked. This is not
intended to be a complete summary of all clay model studies. It is presented with the aim that it can put our study (Row 1) in context, as
well as direct experimental design of future studies
Citation Species Treatments
Number of
models
deployed
Number of
recovered
models
Method for
dealing with
unrecovered
models
Number of
models
attacked
Percentage
of models
attacked
Present study Southern Corroboree
Frog
Pseudophryne
corrboree
3 4,608 3,681 Excluded from
analysis
525 14.3
McLean, Moussalli,
and Stuart-Fox
(2010)
Lake Eyre dragon
Ctenophorus
maculosus
4 2,800 2,400 Not reported 20 0.8
Richards-Zawacki,
Yeager, and Bart
(2013)
Strawberry poison
frog
Oophaga pumilio
4 1,600 <1,600 Excluded from
analysis
202 12.6
Comeault and
Noonan (2011)
Dyeing poison frog
Dendrobates
tinctorius
3 1,891 1874 Excluded from
analysis
49 2.6
Howe, Lövei, and
Nachman (2009)
Cotton bollworm
Helicoverpa armigera
1 1,802 Unclear Unclear Not reported 3.9
Stuart, Dappen, and
Losin (2012)
Strawberry poison
frog
Oophaga pumilio
4 2,400 2,335 Excluded from
analysis
108 5.0
Vignieri, Larson,
and Hoekstra
(2010)
Deer mice
Peromyscus sp.
4 250 238 Excluded from
analysis
28 8.5
Bittner (2003) Common garter
snake
Thammophis sirtalis
4 480 480 Not applicable 50 10.4
Noonan and
Comeault (2009)
Dyeing poison frog
Dendrobates
tinctorius
3 1,260 1,260 Not applicable 139 11.0
Stuart-Fox,
Moussalli,
Marshall, and
Owens (2003)
Tawny dragon and
red-barred dragon
Ctenophorus decressii
and C. vadnappa
4 2,200 2,200 Not applicable 113 5.0
Saporito, Zuercher,
Roberts, Gerow,
and Donnelly
(2007)
Strawberry poison
frog
Oophaga pumilia
4 800 776 Analyzed twice,
assuming attacked
and not attacked
99 12.4
Chouteau and
Angers (2011)
Mimic poison frog
Ranitomeya imitator
3 1,800 1,580 Excluded from
analysis
229 14.5
Amézquita, Castro,
Arias, González,
and Esquivel
(2013)
Harlequin poison
frog
Oophaga histrionica
4 800 679 Excluded from
analysis
150 22.0
Watson, Roelke,
Pasichnyk, and
Cox (2012)
Juvenile skinks with
blue tails
(multiple species)
4 180 Unclear Unclear Not reported 70.6
UMBERS ET AL.7of15
For all model treatments there was a significant reduc-
tion in probability of attack between the first and second
deployments (Table 3). As summarized from raw data, the
reduction in proportion of models attacked relative to
those recovered was 15.7% for black (Tukey HSD compari-
son: β= 1.308, SE = 0.190, z= 6.898, p
corr
< .001), 7.7%
for striped (β= 0.501, SE = 0.204, z= 2.449, p
corr
= .014),
and 13.9% for yellow models (β= 1.344, SE = 0.214,
z= 6.279, p
corr
< .001).
3.2.2 |Summary of attacks from the first
deployment
From the first deployment, 1,445 (62.7%) models were
recovered. The recovery rate of this deployment was
likely affected by an unexpected rainstorm that occurred
on the last day of our model deployment. However, the
proportion of models recovered did not significantly differ
among treatments (57.3% black, 67.2% yellow, and 63.6%
striped models; G
2
= 3.83, p= .15). Of the recovered
models, a total of 383 (26.5%) models were attacked, and
the majority of attacks (82%) were from birds (4% mam-
mals and 14% unknown). Bird attacks (N= 314, 21.7% of
recovered models) were split between 123 (39.2%) on
black, 105 (33.4%) on yellow, and 86 (27.4%) on striped
models (Figure 5).
Within the first deployment the mean probability of
attack, as predicted from our GLMM, was 0.220
0
20
40
60
Black Striped Yellow
Treatment
Number Seen
FIGURE 4 The number of models seen in each treatment by
humans during our detectability experiment
TABLE 2 (a) Outcome of the generalized linear mixed effect model examining differences in the probability of detection by a human
between model colors. Model estimates (β) of fixed effects presented are on the latent (logit link) scale with their corresponding SEs, variance
estimates (σ
2
) are supplied for residuals and random effects, and all significant values (p< .05) are presented in bold. (b) We also present
comparisons of detection probability between all model colors, and in this case, p-values (p
corr
) were corrected using Tukey's HSD
multiplicity adjustment
(a) Output from the GLMM
Variable names
Fixed effects βSE z p
Intercept (black) 2.786 0.430 6.475 <.001
Treatment (striped) 1.303 0.667 1.954 .051
Treatment (yellow) 2.053 0.360 5.697 <.001
Distance 0.327 0.094 3.468 .001
Random effects σ
2
Observer 0.512
Residuals 1.000
(b) Multiple comparisons between model colors
Model colors βSE t p
corr
Black vs. yellow 2.053 0.360 5.697 <.001
Striped vs. yellow 3.356 0.603 5.561 <.001
Black vs. striped 1.303 0.667 1.954 .124
8of15 UMBERS ET AL.
(SE = 0.125) for black, 0.104 (SE = 0.068) for yellow, and
0.088 (SE = 0.059) for striped models. The probability of
bird attack was significantly higher for black models than
yellow (β= 0.887, SE = 0.181, z= 4.890, p
corr
< .001) and
striped models (β= 1.076, SE = 0.190, z= 5.667,
p
corr
< .001; Figure 5). There was no difference in the
probability of bird attack between yellow and striped
models (β=0.188, SE = 0.186, z=1.012, p
corr
= .569;
Figure 5).
3.2.3 |Summary of attacks from the
second deployment
Thirty-seven days later, we deployed a further 2,304
models. During this second deployment the weather was
mild, and we recovered 2,236 models (97%). The propor-
tion recovered did not significantly differ among colors
(G
2
= 0.52, p= .77); we recovered 94% of black, 98% of
yellow, and 99% of striped models. In total 239 (11%)
models were attacked, and the majority of attacks (88%)
were from birds (5% were from mammals and 7% were
unknown). Bird attacks (N= 211 or 9% of recovered
models) were on 88 (41.7%) black, 75 (35.5%) striped, and
48 (22.8%) yellow models.
Within the second deployment the mean probability
of attack, as predicted from our GLMM, was 0.071
(SE = 0.048) for black, 0.055 (SE = 0.038) for striped, and
0.029 (SE = 0.021) for yellow models. Probability of
attack was not different between striped and black
models (β= 0.269, SE = 0.182, z= 1.480, p
corr
= .301),
but was significantly higher for black (β= 0.923,
SE = 0.203, z= 4.551, p
corr
< .001) and striped
(β= 0.655, SE = 0.206, z= 3.181, p
corr
= .004) than yel-
low models (Figure 5).
4|DISCUSSION
We aimed to understand the predation risk facing
reintroduced Southern Corroboree Frogs and explore the
application of clay model deployment as a conservation
tool that exploits learned predator aversion to increase the
likelihood of survival in reintroduced prey species. We
0.0
0.1
0.2
0.3
Black Striped Yellow
Treatment
Proportion Attacked by Birds
0.00
0.25
0.50
0.75
1.00
Black Striped Yellow
Treatment
Probability of Bird Attack
0.0
0.1
0.2
0.3
Black Striped Yellow
Treatment
Proportion Attacked by Birds
0.00
0.25
0.50
0.75
1.00
Black Striped Yellow
Treatment
Probability of Bird Attack
FIGURE 5 The proportion of recovered models that were attacked by birds (left panels), and the predicted probability of bird attack
(right panels) for each model treatment from the first (top) and second deployments (bottom). The predicted probability of bird attack is
depicted with a split violin plot, dot plot, and a simplified boxplot showing the mean and 95% confidence intervals. Lines connecting the
model treatments with an asterisk above them indicate significant differences
UMBERS ET AL.9of15
found that Southern Corroboree Frog black-and-yellow
striped coloration does not make them conspicuous, but
instead makes them as difficult to detect as black cryptic
models (by humans). This suggests that from a distance at
least, corroboree frogs are camouflaged by their stripes.
We also found that although similar in detectability,
striped models were less likely to be attacked than black
models in the wild when avian predators first encountered
them. Consistent with other clay model studies, the char-
acteristic V- and U-shaped impressions on our models
indicated that birds were the most common predators
(Chouteau & Angers, 2011; Comeault & Noonan, 2011;
Hegna, Saporito, & Donnelly, 2012; Rößler et al., 2018).
Birds attacked about 18% of striped models in our first
deployment, and when we deployed the models a second
time, around 5 weeks later, about 10% of striped models
were attacked. Our interpretation of this result is that
corroboree frog coloration has some protective value
against avian predators, but that birds are still a signifi-
cant threat if 1 in 5 reintroduced individuals are vulnera-
ble to attack and that a reduction to a 1 in 10 chance of
attack is a worthwhile improvement. A similar significant
reduction in avian attack rate was seen in the other
model colors, specifically 16% fewer black and 14% fewer
yellow models were attacked in the second deployment.
The drop in attack rates between deployments is consis-
tent with aposematism theory, which posits that encoun-
ters with unprofitable preyconspicuous or notare
efficiently learned and remembered and subsequently,
similar prey are avoided in the future (Roper & Redston,
1987). Our results thus suggest that birds learned to avoid
unprofitable clay models in repeat encounters (Dell'aglio,
Stevens, & Jiggins, 2016). If birds generalize from models
to real frogs, it should be possible to condition birds to
avoid real frogs based on a previous unprofitable experi-
ence with clay models.
4.1 |The disparity between detectability
and attack rates for model types
The detectability of our frog models to humans did not
match their likelihood of being attacked by birds in the
first deployment. The first deployment in our study is
most likely to represent the predator population's natural
response to Southern Corroboree Frogs upon their
reintroduction (i.e., their behavior without any prior
interaction with our clay models). Black models were dif-
ficult for humans to detect, but, in the first deployment,
the most likely to be attacked by birds. Striped models
were also difficult for humans to detect, but had a lower
probability of bird attack than black models. On the other
hand, yellow models were highly detectable by humans,
but were less likely to be attacked than black models.
It is impossible to know whether birds detected but
ignored models, as opposed to not detecting them at all.
Yet, if we assume that humans are suitable proxies for
bird vision (given the lack of UV in the coloration of
Southern Corroboree Frogs), then we can generate a few
hypotheses for further testing: (a) the disparity between
low detectability and relatively higher attack rates on
black models may reflect bird preference for a similar-
sized frog species sympatric to Southern Corroboree
Frogs, the common eastern froglet (C. signifera); (b) the
high detectability of yellow models, but subsequent low
attack rate may suggests that yellow frogs were detected
TABLE 3 Outcome of the
generalized linear mixed effect model
examining differences between
deployments and model colors in the
probability of bird attack. Model
estimates (β) of fixed effects presented
are on the latent (logit link) scale with
their corresponding SEs, variance
estimates (σ
2
) are supplied for residuals
and random effects, and all significant
values (p< .05) are presented in bold.
Post hoc multiple comparisons between
model treatments across and between
deployments can be found in the
Results section
Variable names Model output
Fixed effects βSE z p
Intercept (black, 1) 1.263 0.727 1.737 .082
Treatment (striped) 1.076 0.190 5.667 <.001
Treatment (yellow) 0.887 0.181 4.890 <.001
Deployment (2) 1.308 0.190 6.898 <.001
Treatment (striped): deployment (2) 0.807 0.263 3.067 .002
Treatment (yellow): deployment (2) 0.036 0.271 0.133 .894
Random effects σ
2
Row 1.007
Location 1.868
Residuals 1.000
10 of 15 UMBERS ET AL.
but avoided, which may shed some light on why some
frog species turn yellow in the breeding season
(i.e., Lesuer's frog, Ranoidea lesueuri; Bell & Zamudio,
2012); and (c) if birds detect striped models as frequently
as black models, that striped models are less likely to be
attacked after detection than black models.
4.2 |The protective mechanism of
Southern Corroboree Frog coloration
Striped and black models were similarly detectable to
humans, and both these color patterns were less detect-
able than yellow models. During the first deployment,
black models had a higher probability of bird attack than
both striped and yellow models. Our data invoke two
nonmutually exclusive hypotheses to explain the mecha-
nism by which corroboree frog coloration influences
predator behavior: (a) that the Southern Corroboree Frog
color pattern may hinder predator detection by disruptive
camouflage or (b) that birds may detect, but preferen-
tially avoid the striped pattern on first encounter because
innately they associate the coloration with unprofitability
(i.e., aposematism) (Lindström et al., 1999; Mappes et al.,
2005; Rojas, 2017). Future experiments should test
whether the stripes have a deterring function at close dis-
tance, but a concealing effect at long distance (Tullberg,
Merilaita, & Wiklund, 2005). Our detectability study sug-
gests that at a long distance, to a human viewer, South-
ern Corroboree Frog coloration is camouflaging. Yet, we
advise careful interpretation of our detection experiment
results, and stress that they be viewed independently
from the results of the field deployment. We present
them as indirect evidence toward understanding how
Southern Corroboree Frog coloration influences predator
behavior. To definitively test detectability of Southern
Corroboree Frog coloration, future studies should iden-
tify bird predators and train captive birds to indicate
detection in experiments with real corroboree frogs.
Given the critically endangered status of these frogs, this
approach would need to take place using animals in cap-
tive colonies.
4.3 |Could seasonal changes have
affected our results?
We cannot rule out that a time-in-season effect explains
the difference in attacks between deployments. Perhaps,
for example, predators avoid frogs later in the season
because insects provide more palatable alternative prey
(Mappes et al., 2014). However, this is unlikely to influ-
ence our results because insect prey is abundant from
November to April, and our entire study occurred in the
middle of this period. Also, we cannot be sure that the
same individual predators attacked models in both
deployments, though overlap is likely because many local
predator species have stable territories and small home
ranges (i.e., 2 km
2
in Australian Magpies, C. tibicen).
Finally, although unlikely, local avian predators may
have experience with Southern Corroboree Frog colora-
tion through traveling to areas where Southern Corrobo-
ree Frog (about 30 km away), or its sister species,
Northern Corroboree Frog, still persist (about 200 km
away). For example, Little Ravens travel great distances
(>50 km per day; Whisson, Weston, & Shannon, 2015).
Even if predators do have experience with corroboree
frogs through the above mechanisms, or others like social
learning (Thorogood et al., 2018), the reduction in attack
rates in the second deployment suggests model decoys
promote learned avoidance.
4.4 |Clay model deployment in species
reintroduction and recovery plans
An important part of the Southern Corroboree Frog
recovery plan is to consider the behavior of local preda-
tors and minimize the risk they pose during
reintroduction (Moseby et al., 2011). Including model
deployment as a predator aversion technique in the
reintroduction program may enhance the success of
Southern Corroboree Frogs reintroduction in the
Australian Alps. Habitats are constantly in flux and when
long-extirpated species are reintroduced they may
encounter changes in the behavior, like the loss of aver-
sive behaviors, or a seasonal change in demography of
the predator population, like a higher proportion of naïve
fledgling predators (Armstrong & Seddon, 2008; Mappes
et al., 2005, 2014; Thorogood et al., 2018). Our data sug-
gest that Southern Corroboree Frog coloration provides
some protection against current local avian predators,
but that birds still pose a risk worth mitigating. One such
mitigation technique could include strategically timed
deployment of clay models near reintroduction siteswe
suggest timing the deployment so that it would train
predators that are most likely to encounter real frogs, but
not so similar in time to the release of reintroduced frogs
as to attract predators to field enclosures (see below).
Additionally, deployment of models with particularly dis-
tasteful substances may be considered to expedite preda-
tor avoidance learning, although, our study seems to
suggest that unprofitable interactions with clay models
alone is enough to deter predators (Rößler et al., 2018).
More generally, we suggest that clay models could
also be used across the world in reintroductions of other
UMBERS ET AL.11 of 15
imperilled, potentially conspicuous prey species. There
are two obvious applications. First, clay model studies
can be used to understand how a reintroduced species'
coloration affects their predation rate in the wild. This is
important knowledge about the predation risk that pre-
cious individuals from breeding programs may face once
reintroduced. Second, predator conditioning via clay
model deployment could be used to reduce predation risk
from visual predators. Other bright-colored frogs, like the
Panamanian golden frog (Atelopus zeteki) and the red-
banded poison frog (Oophaga lehmanni), that are cur-
rently under-going ex situ breeding programs, may be
good candidates. We recommend a case-by-case approach
in model and deployment design (for review see Rößler
et al., 2018). Briefly, there are six main considerations:
1. Number and design of modelsThe number of models
should be large enough to ensure predators encounter
and attack a sufficient number. Most clay model
experiments receive attacks on between 5 and 30% of
recovered models (Table 1). Depending on the
research question, the number of treatments should
be as small as possible (commonly four; Table 1) to
ensure statistical power. Inclusion of a negative con-
trol should be consideredwhich would comprise all
the model materials in a nonvisually similar presenta-
tion to control for attacks driven by novelty or non-
visual senses. Consideration should be made as to the
addition of a distasteful compound to the models
(such as quinine), which may expedite any learning
but is a trade-off as an additional factor to account for
in the experimental design. The size, shape, and colors
used for making the models require close quantitative
scrutiny to ensure they match those of the real
animals.
2. Proximity to the threatened populationsIn the
absence of direct evidence about the effect of models
on predator behavior, models should not initially be
deployed close to the threatened population in case
they attract predators to the area. However, under-
standing the natural history of possible predators is
important (i.e., home range size, seasonal movement
patterns, spatial ecology, etc.) because predators may
be highly localized and any learned response to the
clay could break down with distance (Comeault &
Noonan, 2011).
3. Deployment durationModels should be deployed for
a period long enough to ensure a sufficient number of
attacks are recorded. Some studies check models each
day for attacks to determine when to retrieve models,
yet this may affect the presence of predators within
the study area. Models should therefore be deployed
long enough to be detected but not checked too often.
4. Deployment timingSeasonal timing should be con-
sidered. One aspect to consider is that it would be ben-
eficial to minimize encounters with adverse weather
events. In the case of protecting species set to be
reintroduced, models should obviously be deployed
before reintroduction. More subtly, though, it is
important to consider the life cycle of the predator.
For example, fledglings may pose a big threat to spe-
cies every spring. Longitudinal clay model studies that
are repeated throughout a target species' active season
may be able to give insight into the diversity of preda-
tor species over time, however, as our data show, mul-
tiple deployments can also affect predator behavior.
Regardless, longitudinal clay model studies could
yield data that would be useful information for timing
of deployments to afford protection for species.
5. Human resourcesThe main costs of this approach
are in making and deploying the models. Clay model
studies often aim to identify attacking predators, so
models are made of soft clay. In this approach 3D
printing is often not appropriate, so models are often
made by pouring soft-set clay into molds and then
painting them by hand. This process can be laborious.
Placing the models in the field one-by-one and retriev-
ing them is also laborious but unavoidable.
6. Molecular techniquesRecently molecular techniques
have been applied to clay model studies to identify
predators by sampling saliva from the clay model,
extracting DNA, and using this to identify predator
species (Rößler et al. unpublished data). While the
addition of this approach would add time and cost, it
may also provide novel and critical data about the
predator species targeting prey species during
reintroductions.
5|CONCLUSION
Habitats are constantly in flux and long-extirpated spe-
cies may encounter changes in predators when
reintroduced (Armstrong & Seddon, 2008). Our data sug-
gest that corroboree frog coloration provides some protec-
tion against current local avian predators, but that birds
still pose a risk worth mitigating. Contrary to expecta-
tions for a black-and-yellow striped frog, our data suggest
that corroboree frog coloration makes them difficult to
detect. Perhaps they are camouflaged and toxicor per-
haps they are camouflaged at a distance, but the yellow
and black coloration renders them aposematic when
viewed up close (Rojas, 2017). Such hypotheses are for
future work in sensory ecology. For applied conservation
research, our findings suggest that a strategically timed
and strategically placed deployment of clay models could
12 of 15 UMBERS ET AL.
be an effective predator mitigation technique. Deploy-
ment of models with particularly distasteful substances
may be considered to expedite predator avoidance learn-
ing. Application of this technique into reintroduction
programs might enhance the success of corroboree frog
reintroduction within the Australian Alps and could also
be applied to imperilled prey animals globally.
ACKNOWLEDGMENTS
We thank J. O'Hanlon, S. Knox, M. Duncan, S. Samuel,
M. Humphries, and F. Andrews for help with model con-
struction, G. Bourke, T. Kahlke, J. Ryeland, and
E. Drinkwater for assistance during fieldwork. Taronga
Zoo for access to specimens for photos and J. Van Dyke,
B. Rojas, and J. Mappes for manuscript reviews. We also
thank all anonymous reviewers for their helpful sugges-
tions on our earlier manuscript drafts. Data in KU's
GitHub Repository. Study approved by University of Wol-
longong Animal Ethics Committee (permit 14/08), and
NSW National Parks and Wildlife Service (License
SL101674).
CONFLICT OF INTEREST
The authors declare no conflict of interest.
AUTHOR CONTRIBUTIONS
K.D.L.U. and P.G.B. conceived the study, M.B.J.K., G.T-
D., and K.D.L.U. constructed models, M.B.J.K., G.T-D.,
and J.P.L. conducted the field work in Kosciuszko,
K.D.L.U. and J.L.R. conducted the field work in Sydney,
M.B.J.K. wrote the first draft, J.L.R. and
K.D.L.U. conducted the statistical analyses, and K.D.L.U.,
J.L.R., and P.G.B. honed the manuscript for publication
with input from all authors.
ORCID
Kate D. L. Umbers https://orcid.org/0000-0002-9375-
4527
REFERENCES
Amézquita, A., Castro, L., Arias, M., González, M., & Esquivel, C.
(2013). Field but not lab paradigms support generalisation by
predators of aposematic polymorphic prey: The Oophaga
histrionica complex. Evolutionary Ecology,27, 769782.
Anstis, M. (2014). Tadpoles and frogs of Australia. Australia: CSIRO
Publishing.
Armstrong, D. P., & Seddon, P. J. (2008). Directions in
reintroduction biology. Trends in Ecology & Evolution,23,
2025.
Bates, D., Mächler, M., Bolker, B., & Walker, S. (2015). Fitting lin-
ear mixed-effects models using {lme4}. Journal of Statistical
Software,67,148.
Bell, R. C., & Zamudio, K. R. (2012). Sexual dichromatism in frogs:
Natural selection, sexual selection and unexpected diversity.
Proceedings of the Royal Society B: Biological Sciences,279,
46874693.
Bennett, A. T. D., Cuthill, I. C., & Norris, K. J. (1994). Sexual selec-
tion and the mismeasure of color. The American Naturalist,
144, 848860.
Berger, L., Roberts, A. A., Voyles, J., Longcore, J. E.,
Murray, K. A., & Skerratt, L. F. (2016). History and recent pro-
gress on chytridiomycosis in amphibians. Fungal Ecology,19,
8999.
Bergeron, Z. T., & Fuller, R. C. (2017). Using human vision to detect
variation in avian coloration: How bad is it? The American Nat-
uralist,191(2), 269276.
Berger-Tal, O., Polak, T., Oron, A., Lubin, Y., Kotler, B. P., &
Saltz, D. (2011). Integrating animal behavior and conservation
biology: A conceptual framework. Behavioral Ecology,22,
236239.
Bittner, T. D. (2003). Polymorphic clay models of Thamnophis
sirtalis suggest patterns of avian predation. Ohio Journal of Sci-
ence,103(3), 6266.
Brannelly, L. A., Hunter, D. A., Lenger, D., Scheele, B. C.,
Skerratt, L. F., & Berger, L. (2015). Dynamics of
Chytridiomycosis during the breeding season in an Australian
alpine amphibian. PLoS One,10, e0143629.
Brannelly, L. A., Roberts, A. A., Skerratt, L. F., & Berger, L. (2017).
Epidermal cell death in frogs with chytridiomycosis. PeerJ,5,
e2925.
Burunat-Pérez, G., Suárez-Rancel, M., & Molina-Borja, M. (2018).
Predator avoidance training of the endangered lizard from El
Hierro (Canary Islands): A new management strategy before
reintroduction into the wild. Behavioural Processes,157,
192198.
Byrne, P. G., & Silla, A. J. (2017). Testing the effect of dietary carot-
enoids on larval survival, growth and development in the criti-
cally endangered southern corroboree frog. Zoo Biology,36,
161169.
Chouteau, M., & Angers, B. (2011). The role of predators in
maintaining the geographic organization of aposematic signals.
The American Naturalist,178, 810817.
Comeault, A. A., & Noonan, B. P. (2011). Spatial variation in the fit-
ness of divergent aposematic phenotypes of the poison frog,
Dendrobates tinctorius.Journal of Evolutionary Biology,24,
13741379.
Connolly, D., Williams, A., & Williams, S. (2017). Recognition of the
cultural significance of water to the Wolgalu Aboriginal nation in
the upper Murrumbidgee River catchment. Snowy flow response
modelling and modelling program. Sydney: NSW DPI Water.
Daly, J. W., Garraffo, H. M., Pannell, L. K., Spande, T. F.,
Severini, C., & Erspamer, V. (1990). Alkaloids from Australian
frogs (Myobatrachidae): Pseudophrynamines and
pumiliotoxins. Journal of Natural Products,53, 407421.
Dell'aglio, D. D., Stevens, M., & Jiggins, C. D. (2016). Avoidance of
an aposematically coloured butterfly by wild birds in a tropical
forest. Ecological Entomology,41, 627632.
Endler, J. A. (1991). Interactions between predators and prey. In
Behavioural ecology: An evolutionary approach (pp. 169196).
London, UK: Wiley-Blackwell.
Endler, J. A., & Mappes, J. (2004). Predator mixes and the conspicu-
ousness of aposematic signals. The American Naturalist,163,
532547.
UMBERS ET AL.13 of 15
Endler, J. A., & Rojas, B. (2009). The spatial pattern of natural selec-
tion when selection depends on experience. The American Nat-
uralist,173, E62E78.
Exnerová, A., Štys, P., Fucˇíková, E., Veselá, S., Svádová, K.,
Prokopová, M., Landová, E. (2007). Avoidance of aposematic
prey in European tits (Paridae): Learned or innate? Behavioral
Ecology,18, 148156.
Gamberale, G., & Tullberg, B. S. (1996). Evidence for a more effec-
tive signal in aggregated aposematic prey. Animal Behaviour,
52, 597601.
Griffin, A. S., Blumstein, D. T., & Evans, C. S. (2000). Training
captive-bred or translocated animals to avoid predators. Conser-
vation Biology,14, 13171326.
Guilford, T., & Dawkins, M. S. (1991). Receiver psychology and the
evolution of animal signals. Animal Behaviour,42,114.
Hart, N. S., Partridge, J. C., Cuthill, I. C., & Bennett, A. T. (2000).
Visual pigments, oil droplets, ocular media and cone photore-
ceptor distribution in two species of passerine bird: The blue tit
(Parus caeruleus L.) and the blackbird (Turdus merula L.). Jour-
nal of Comparative Physiology. A,186, 375387.
Hegna, R. H., Saporito, R. A., & Donnelly, M. A. (2012). Not all
colors are equal: Predation and color polytypism in the apose-
matic poison frog Oophaga pumilio.Evolutionary Ecology,27
(5), 831845.
Howe, A., Lövei, G. L., & Nachman, G. (2009). Dummy caterpillars
as a simple method to assess predation rates on invertebrates in
a tropical agroecosystem. Entomologia Experimentalis et Appli-
cata,131, 325329.
Hunter, D., Marantelli, G., McFadden, M., Harlow, P.,
Scheele, B., & Pietsch, R. (2010). Assessment of re-introduction
methods for the southern corroboree frog in the snowy moun-
tains region of Australia. In P. S. Soorae (Ed.), Global
reintroduction perspectives 2010: Additional case-studies from
around the globe (pp. 7276). Gland, Switzerland: IUCN
Reintroduction Specialist Group.
Hunter, D., Osborne, W., Smith, M., & McDougall, K. (2009). Breed-
ing habitat use and the future management of the critically
endangered southern corroboree frog. Ecological Management
and Restoration,10, S103S109.
Hunter, D. A., Speare, R., Marantelli, G., Mendez, D., Pietsch, R., &
Osborne, W. (2010). Presence of the amphibian chytrid fungus
Batrachochytrium dendrobatidis in threatened corroboree frog
populations in the Australian Alps. Diseases of Aquatic Organ-
isms,92, 209216.
Indigo, N., Smith, J., Webb, J. K., & Phillips, B. (2018). Not such
silly sausages: Evidence suggests northern quolls exhibit aver-
sion to toads after training with toad sausages. Austral Ecology,
43, 592601.
Jolly, C. J., Webb, J. K., & Phillips, B. L. (2018). The perils of paradise:
An endangered species conserved on an island loses antipredator
behaviours within 13 generations. Biology Letters,14, 20180222.
Lenth, R., & Lenth, M. R. (2018). Package lsmeans.The American
Statistician,34, 216221.
Lindström, L., Alvtalo, R. V., Mappes, J., Rilpi, M., & Vertainen, L.
(1999). Can aposematic signals evolve by gradual change?
Nature,397, 249251.
Low, P. A., Sam, K., McArthur, C., Posa, M. R. C., & Hochuli, D. F.
(2014). Determining predator identity from attack marks left in
model caterpillars: Guidelines for best practice. Entomologia
Experimentalis et Applicata,152, 120126.
Mappes, J., Kokko, H., Ojala, K., & Lindström, L. (2014). Seasonal
changes in predator community switch the direction of selec-
tion for prey defences. Nature Communications,5, 5016.
Mappes, J., Marples, N., & Endler, J. A. (2005). The complex busi-
ness of survival by aposematism. Trends in Ecology & Evolution,
20, 598603.
McElroy, M. T. (2016). Teasing apart crypsis and aposematism
Evidence that disruptive coloration reduces predation on a nox-
ious toad. Biological Journal of the Linnean Society,117,
285294.
McFadden, M., Hobbs, R., Marantelli, G., Harlow, P., Banks, C., &
Hunter, D. (2013). Captive management and breeding of the
critically endangered southern corroboree frog (Pseudophryne
corroboree) (Moore 1953) at Taronga and Melbourne Zoos.
Amphibian and Reptile Conservation,5,7087.
McLean, C. A., Moussalli, A., & Stuart-Fox, D. (2010). The preda-
tion cost of female resistance. Behavioral Ecology,21, 861867.
Moseby, K. E., Cameron, A., & Crisp, H. A. (2012). Can predator
avoidance training improve reintroduction outcomes for the
greater bilby in arid Australia? Animal Behaviour,83,
10111021.
Moseby, K. E., Read, J. L., Paton, D. C., Copley, P., Hill, B. M., &
Crisp, H. A. (2011). Predation determines the outcome of
10 reintroduction attempts in arid South Australia. Biological
Conservation,144, 28632872.
Nicolaus, L. K., Cassel, J. F., Carlson, R. B., & Gustavson, C. R.
(1983). Taste-aversion conditioning of crows to control preda-
tion on eggs. Science,220, 212214.
Noonan, B. P., & Comeault, A. A. (2009). The role of predator selec-
tion on polymorphic aposematic poison frogs. Biology Letters,5,
5154.
Richards-Zawacki, C. L., Yeager, J., & Bart, H. P. S. (2013). No evi-
dence for differential survival or predation between sympatric
color morphs of an aposematic poison frog. Evolutionary Ecol-
ogy,27, 783795.
Riipi, M., Alatalo, R. V., Lindström, L., & Mappes, J. (2001). Multi-
ple benefits of gregariousness cover detectability costs in apose-
matic aggregations. Nature,413, 512514.
R Core Team. (2017). R: A language and environment for statistical
computing. Vienna, Austria: R Foundation for Statistical
Computing.
Rojas, B. (2017). Behavioural, ecological, and evolutionary aspects
of diversity in frog colour patterns. Biological Reviews,92,
10591080.
Roper, T. J., & Redston, S. (1987). Conspicuousness of distasteful
prey affects the strength and durability of one-trial avoidance
learning. Animal Behaviour,35, 739747.
Rößler, D. C., Pröhl, H., & Lötters, S. (2018). The future of clay
model studies. BMC Zoology,3,6.
Ruxton, G. D., Sherratt, T. N., & Speed, M. P. (2004). Avoiding
attack: The evolutionary ecology of crypsis, warning signals, and
mimicry. Oxford, England: Oxford University Press.
Saporito, R. A., Zuercher, R., Roberts, M., Gerow, K. G., &
Donnelly, M. A. (2007). Experiemtnal evidence for
aposematism in the Dendrobatid poison frog Oophaga pumilio.
Copeia,2007(4), 10061011.
14 of 15 UMBERS ET AL.
Scheele, B. C., Skerratt, L. F., Grogan, L. F., Hunter, D. A.,
Clemann, N., McFadden, M., Berger, L. (2017). After the epi-
demic: Ongoing declines, stabilizations and recoveries in
amphibians afflicted by chytridiomycosis. Biological Conserva-
tion,206,3746.
Seddon, N., Tobias, J. A., Eaton, M., & Ödeen, A. (2010). Human
vision can provide a valid proxy for avian perception of sexual
dichromatism [La Visión Humana puede Proveer una
Aproximación Válida a la Percepción del Dicromatismo Sexual
por parte de las Aves]. The Auk,127, 283292.
Skelhorn, J., Rowland, H. M., Speed, M. P., & Ruxton, G. D. (2010).
Masquerade: Camouflage without crypsis. Science,327,5151.
Smith, B. P., Tyler, M. J., Kaneko, T., Garraffo, H. M.,
Spande, T. F., & Daly, J. W. (2002). Evidence for biosynthesis of
pseudophrynamine alkaloids by an Australian myobatrachid
frog (Pseudophryne) and for sequestration of dietary
pumiliotoxins. Journal of Natural Products,65, 439447.
Stuart, Y. E., Dappen, N., & Losin, N. (2012). Inferring predator
behavior from attack rates on prey-replicas that differ in con-
spicuousness. PLoS One,7, e48497.
Stuart-Fox, D., Moussalli, A., Marshall, N. J., & Owens, I. P. F.
(2003). Conspicuous males suffer higher predation risk: Visual
modelling and experimental evidence from lizards. Animal
Behaviour,66, 541550.
Thorogood, R., Kokko, H., & Mappes, J. (2018). Social transmission
of avoidance among predators facilitates the spread of novel
prey. Nature Ecology and Evolution,2, 254261.
Tullberg, B. S., Merilaita, S., & Wiklund, C. (2005). Aposematism
and crypsis combined as a result of distance dependence: Func-
tional versatility of the colour pattern in the swallowtail butter-
fly larva. Proceedings of the Royal Society of London Series B:
Biological Sciences,272, 13151321.
Ujvari, B., Mun, H., Conigrave, A. D., Bray, A., Osterkamp, J.,
Halling, P., & Madsen, T. (2013). Isolation breeds naivety:
Island living robs Australian Varanid lizards of toad-toxin
immunity via four-base-pair mutation. Evolution,67, 289294.
Ujvari, B., Oakwood, M., & Madsen, T. (2013). Queensland north-
ern quolls are not immune to cane toad toxin. Wildlife
Research,40, 228231.
Umbers, K. D. L., Silla, A. J., Bailey, J. A., Shaw, A. K., &
Byrne, P. G. (2016). Dietary carotenoids change the colour of
southern corroboree frogs. Biological Journal of the Linnean
Society,119, 436444.
Vignieri, S. N., Larson, J. G., & Hoekstra, H. E. (2010). The selective
advantage of crypsis in mice. Evolution,64, 21532158.
Watson, C. M., Roelke, C. E., Pasichnyk, P. N., & Cox, C. L. (2012).
The fitness consequences of the autotomous blue tail in lizards:
An empirical test of predator response using clay models. Zool-
ogy,115, 339344.
Whisson, D. A., Weston, M. A., & Shannon, K. (2015). Home range,
habitat use and movements by the little raven (Corvus mellori)in
a coastal peri-urban landscape. Wildlife Research,42, 500508.
SUPPORTING INFORMATION
Additional supporting information may be found online
in the Supporting Information section at the end of this
article.
How to cite this article: Umbers KDL, Riley JL,
Kelly MBJ, Taylor-Dalton G, Lawrence JP,
Byrne PG. Educating the enemy: Harnessing
learned avoidance behavior in wild predators to
increase survival of reintroduced southern
corroboree frogs. Conservation Science and Practice.
2020;2:e139. https://doi.org/10.1111/csp2.139
UMBERS ET AL.15 of 15
... corroboree and P. pengilleyi). These conspicuous colors may have a dual function being cryptic from a distance and aposematic from close range (Lawrence et al. 2018;Umbers et al. 2019) and in general follow a common trait in poison frogs in which alkaloid defenses are associated with conspicuous coloration (Williams et al. 2000;Santos et al. 2003;Bonansea and Vaira 2012;Roberts et al. 2022). Notably, while Lawrence et al. 2018 did examine aposematic signaling, further testing is necessary to confirm aposematic function of this conspicuous coloration given the apparent paradox of conspicuous coloration being associated with nocturnal and fossorial frogs. ...
... Considerable efforts have been made to breed these frogs in captivity for eventual reintroduction into the highlands of eastern Australia (Hunter et al. 2009;OEH NSW 2012;Skerratt et al. 2016;Rojahn et al. 2018). The conspicuous yellow-and-black coloration of these frogs could be a beacon to predators, warning them of alkaloid defenses (but see Umbers et al. 2019 which posits that this coloration could be cryptic). Our research, coupled with previous work (Daly et al. 1990;Smith et al. 2002), suggests that these frogs may be defended despite not being raised on diets containing alkaloid-producing invertebrates. ...
Article
Full-text available
Poison frogs are well known for their ability to sequester alkaloids from their diet of leaf-litter arthropods for use in defense against predators and pathogens. Australian frogs in the genus Pseudophryne (Myobatrachidae) represent an understudied lineage of poison frogs, with a unique ability to both sequester dietary alkaloids and synthesize pseudophrynamine alkaloids. Herein, we describe the alkaloid profiles and diet of six species of Pseudophryne (P. guentheri [Boulenger, 1882], P. occidentalis [Parker, 1940], P. semimarmorata [Lucas, 1892], P. dendyi [Lucas 1892], P. bibronii [Günther, 1859], and P. coriacea [Keferstein, 1868]) to gain a better understanding of how alkaloid defenses and diet are related within and among species. We characterized and quantified alkaloids using Gas Chromatography-Mass Spectrometry (GC-MS), and assessed diet by way of dissection and examination of stomach contents using light microscopy. We found that alkaloid profiles varied significantly among species, with pumiliotoxins (dietary-derived) and pseudophrynamines (biosynthesized) being the most abundant alkaloids. Pseudophryne bibronii and P. dendyi contained mostly dietary-derived alkaloids, whereas P. coriacea, P. guentheri, P. semimarmorata, and P. occidentalis possessed mostly biosynthesized alkaloids. The stomachs of all the studied species were largely empty, containing mostly soil and few partially digested insects. Our data suggest that frogs eat minimally during the breeding season. Therefore, a decrease in dietary alkaloids may be compensated by the biosynthesized pseudophrynamines, which could allow Australian poison frogs to remain defended from predators during this vulnerable time period.
... While a recent experimental approach did not find support for striped patterns to get increased protection from predators in comparison to interrupted patterns, the authors found that patterned prey are harder to catch than their pattern-less counterparts (Hämäläinen et al. 2015). Similarly, the brightly-colored yellow-and-black striped southern corroboree frog (Pseudophryne corroboree) was originally thought to be aposematic, but recent evidence suggests that the pattern may actually be cryptic, particularly from a distance, in the alpine grasses in which they are typically found (Umbers et al. 2020). Notably, Umbers et al. (2020) proposed the potential crypsis of corroboree frog (Fig. 3F) patterns using stationary models. ...
... Similarly, the brightly-colored yellow-and-black striped southern corroboree frog (Pseudophryne corroboree) was originally thought to be aposematic, but recent evidence suggests that the pattern may actually be cryptic, particularly from a distance, in the alpine grasses in which they are typically found (Umbers et al. 2020). Notably, Umbers et al. (2020) proposed the potential crypsis of corroboree frog (Fig. 3F) patterns using stationary models. Given the longitudinal dorsal stripes of this species, however, it could be that such a pattern allows for a visual illusion. ...
... Although reintroduction success is yet to be formally quantified, it is logical to presume that individuals that do not find suitable overwintering refugia are unlikely to survive the harsh winter conditions (D. Hunter, personal observation). In regard to predation, although P. corroboree possess bright coloration that is expected to serve an aposematic function, a recent study using model frogs indicated that naïve predators that haven't been exposed to P. corroboree following local extirpation may attack frogs (Umbers et al., 2020). Thus, in this context where warning coloration is expected to be less effective, individuals that disperse quickly after release can be expected to have a greater chance of finding hibernacula and surviving their first winter post release. ...
... The species is distinguished by striking black and bright yellow longitudinal stripes located on its dorsal surface ( Figure 1A). This coloration appears to function as an aposematic warning signal to predators (Umbers et al., 2020), as the skin of both males and females contains toxic lipophilic alkaloids (pumiliotoxins and pseudophrynamines; Daly et al., 2005). P. corroboree breeds annually during the Austral summer months (December -February) and undergoes a period of hibernation during the winter months (June-August) (Osborne, 1991). ...
Article
Full-text available
Exploration behavior can have profound effects on individual fitness. Consequently, knowledge of the proximate mechanisms underpinning exploration behavior may inform conservation breeding programs (CBPs) for threatened species. However, the environmental factors that influence exploration behavior in captivity and during the reintroduction process remain poorly understood. Dietary micronutrients, such as carotenoids, are known to affect the expression of energetically costly behavioral traits, and theoretically may also influence the degree of exploration behavior in various contexts. Here, we investigate whether dietary β-carotene supplementation in captivity influences exploration behavior upon reintroduction to the wild in the critically endangered southern corroboree frog, Pseudophryne corroboree. We conducted a manipulative dietary experiment where captive bred P. corroboree were supplemented with different doses of β-carotene for 40 weeks prior to release. Frogs (n = 115) were reintroduced to the wild using a soft-release approach, where they were released into field enclosures specifically designed for this species. Upon reintroduction, the frogs’ initial exploration behavior was measured using a standardized behavioral assay. There was no effect of diet treatment on any measure of exploration behavior (mean latency to leave the initial refuge, time spent mobile within the release apparatus and latency to disperse into the field enclosure). However, there was a significant relationship between individual body size and latency to leave the refuge, whereby smaller individuals left the refuge more rapidly. While these findings provide no evidence that β-carotene at the dosages tested influences P. corroboree exploration behavior in a reintroduction context, the effect of body size draws attention to the potential for bodily state to influence exploration behavior. We discuss the need for ongoing research investigating the influence of captive diet on post release behavior, and highlight how knowledge concerning state-dependent behavior might help to inform and direct reintroduction programs.
... Recently, 3D replicas of animals have been employed to train potential predators to avoid focal species of interest to aid in conservation efforts. Prior to the reintroduction of the endangered Southern Corroboree frog (Pseudophryne corroboree), for example, Umbers et al. (2020) conducted serial deployments of 3D clay frog replicas and found that the number of attacks between replica deployments decreased, thereby teaching predators that the 3D replicas, and potentially the live frogs, are not a viable food source. Additionally, replicas like those used in our study are being used in combination with avian irritants to deter raven predators (Hardshell Labs, Inc. Joshua Tree, CA; Peebles and Spencer, 2020). ...
... Research on the evolutionary ecology of groups of poison frogs other than dendrobatids, such as mantellids, brachycephalids, bufonids, and myobatrachids, has also increased in recent years (e.g., Jeckel et al. 2015;Laufer et al. 2015;Umbers et al. 2016;Rocha Usuga et al. 2017;Rodríguez et al. 2017;Bordignon et al. 2018;Moskowitz et al. 2018;Klonoski et al. 2019;Bardier et al. 2020;Umbers et al. 2020;Chimetto Tonon et al. 2021;Pearson and Tarvin 2022;Rueda-Solano et al. 2022), albeit not at the same pace, and has commonly focused on understanding the convergence with dendrobatids in the possession of skin toxins and the evolution of warning signals (Daly et al. 1996;Brodie et al. 1998;Schaefer et al. 2002;Clark et al. 2005), and in their reproductive strategies and parental care behaviours (Heying 2001;Lehtinen et al. 2004;Andreone et al. 2010;Fischer et al. 2019b). The cane toad, Rhinella marina, for example, has become a textbook example of a successful invasive species, particularly in Australia (Shine 2010;Lever 2001), where aspects of their reproduc-tive behaviour, life-history evolution, and dispersal patterns (Phillips 2009;Bruning et al. 2010;Shine et al. 2021) have been extensively studied. ...
Article
Full-text available
Poison frogs of the superfamily Dendrobatoidea have fascinated researchers since the 19th century, which is reflected in multiple studies on their natural history, taxonomy, toxicity, colour pattern diversity, and elaborate territorial, reproductive and parental care behaviours. Broadly speaking, however, the term “poison frogs” may apply as well to other taxa which also possess skin toxins. Hereon, we refer to poison frogs as this extended group involving, besides Dendrobatoidea (Dendrobatidae + Aromobatidae), a few genera in families such as Bufonidae and Mantellidae (among others). Most studies on poison frogs have focused on species considered charismatic due to their bright and flashy colours, limiting possible generalisations of patterns and mechanisms explaining the high morphological, ecological, and behavioural differentiation, but also convergence, among these groups. Furthering our understanding of the evolutionary ecology of poison frogs requires increasing not only the scope and depth of our own questions, but also the number and diversity of study systems. Inspired by the special issue on dendrobatid and aromobatid poison frogs published ten years ago in this same journal, we have put together the present special issue aiming to broaden both the topics and the coverage of poison frog clades. This first part consists of 15 manuscripts covering topics ranging from larval behavioural ecology and parental care to space use and its environmental determinants, along with conservation implications.
... For example, attack rates can be inflated for treatments that were easy to detect in comparison to those that were difficult to detect. We, therefore, estimated the detectability of our models using human observers, which is a common approach in behavioural ecology and has shown matching results in field predation trials with both bird and human detectors (Kjernsmo et al., 2020;Mappes et al., 2014;Myette et al., 2019;Umbers et al., 2020;Xiao & Cuthill, 2016). We used human observers for two reasons: the colours of the katydid models are visible by both bird and human visual systems (Bergeron & Fuller, 2018), and humans can easily indicate when they have detected an object by telling us. ...
Article
Deimatic behaviour is performed by prey when attacked by predators as part of an antipredator strategy. The behaviour is part of a sequence that consists of several defences, for example they can be preceded by camouflage and followed by a hidden putatively aposematic signal that is only revealed when the deimatic behaviour is performed. When displaying their hidden signal, mountain katydids (Acripeza reticulata) hold their wings vertically, exposing striking red and black stripes with blue spots and oozing an alkaloid-rich chemical defence derived from its Senecio diet. Understanding differences and interactions between deimatism and aposematism has proven problematic, so in this study we isolated the putative aposematic signal of the mountain katydid's antipredator strategy to measure its survival value in the absence of their deimatic behaviour. We manipulated two aspects of the mountain katydid's signal, colour pattern and whole body shape during display. We deployed five kinds of clay models, one negative control and four katydid-like treatments, in 15 grids across part of the mountain katydid's distribution to test the hypothesis that their hidden signal is aposematic. If this hypothesis holds true, we expected that the models, which most closely resembled real katydids would be attacked the least. Instead, we found that models that most closely resembled real katydids were the most likely to be attacked. We suggest several ideas to explain these results, including that the deimatic phase of the katydid's display, the change from a camouflaged state to exposing its hidden signal, may have important protective value. Abstract Deimatic behavior is part of a sequence that consists of several defenses. For example, mountain katydids display a hidden antipredator signal by opening their wings and holding them vertically. This exposes red and black stripes with blue spots on their abdomen. In this study, we isolated the colour and shape aspects of the katydid’s antipredator display to measure its survival value in the absence of deimatic behavior. We deployed five types of clay models across part of the katydid’s distribution and found that models resembling real katydids were the most likely to be attacked. This may indicate that the deimatic phase of their display may have important protective value.
... Olfactory pre-exposure acts to habituate foragers to the food odor before the target resource is available (Figures 3 and 4). Exposing foragers repeatedly to unrewarded food odor over weeks or months generates innate habituation (Rankin et al. 2009), offering a temporal window of protection to target food types (Latham et al. 2019; see also Umbers et al. [2020] for use in visual systems). Initially, foragers habituate to the consistently unrewarded food odor cues and then continue to ignore the odor for a period of time despite food becoming available. ...
Article
Full-text available
Finding food is a key motivator of animal behavior and underpins an increasing number of conservation and wildlife management challenges. Introduced predators threaten many vulnerable native species, and some native predators are problematic for declining prey species. Likewise, browsing by native and introduced herbivores threatens endangered plant species, undermines habitat restoration efforts, and alters plant communities. Mammalian predators and herbivores use olfactory information to forage efficiently, pursuing cues that are useful and ignoring those that are not. Here, we present the theoretical basis for why olfactory misinformation should alter foraging decisions and provide compelling evidence that supports the theory. Drawing on this theory and evidence of the success of olfactory misinformation where it has been applied to date, we propose that there is enormous scope for its application more broadly in conservation and wildlife management. Such an approach offers a robust behavioral alternative for protecting valued plants and prey species that are otherwise vulnerable to foraging mammals.
Article
Full-text available
The role of skin colour variations in the survival of European tree frogs is unknown. We presumed that green frogs become more noticeable to predators in the autumn when the colour of the leaves changes. For the study of their survival chance, we made plasticine models of European tree frogs with the same shape and the same dominant colour spectrum of 550 nm. The experiment was conducted in autumn 2018 in three vegetation types with varied backgrounds (vineyard, bulrush belts and reed bed) and in the habitat with a permanent background (concrete wall). In our experiment lasting more than a month we used 50 green coloured tree frog plasticine models in every habitat. Only 10% of the models were damaged by predators. Daily survival rates were high in all habitats (above 99%), and predation pressure on the concrete wall was significantly higher than in the different vegetation types. This was caused by the fact that the colour contrast of frog models on concrete walls (13.3) was twice as high as on grape (6.8), bulrush (4.2), or reed (5.0) leaves. Predators in the vineyard, bulrush belts and reed bed were mostly birds which left traces primarily on the heads of the models, while on the models displayed on the wall most of the traces (on the trunk and limbs) were left by mammals (small mammals, red foxes, and domestic cats). The colour spectrum of the vegetation background of the European tree frog models changed to brownish in autumn, but predation pressure did not increase. The constant green colour of the European tree frog models in natural habitats did not affect predation, from which we conclude that the colour variants may have other functions besides camouflage.
Book
Full-text available
Our Changing Snowscapes reviews the current state of climate change impacts on the Australian Alps and puts forward recommendations for a better path forward. This report summarises a broad expanse of literature about current and projected climate change impacts on the Australian Alps and presents new Australia-first modelling of climate change impacts on the Australian ski industry. The report highlights a cascading series of interconnected impacts across alpine tourism, regional communities, hydroelectricity, high country water flows to the Murray-Darling Basin, carbon sequestration, high country ecosystems, and First Nations impacts and makes recommendations on how best to respond to these impacts. The spectacular Australian Alps extend over 1.6 million hectares of public land contained in 11 national parks and nature reserves across New South Wales (NSW), Victoria (VIC), and the Australian Capital Territory (ACT). They are home to nationally significant winter-tourism sectors, thriving and passionate regional communities and some of Australia's most unique and fragile landscapes. The impact of climate change on temperature, precipitation, and snow conditions in the Australian Alps is stark and has been heralded for more than three decades. In 1988, it was predicted that climate change will drastically impact the Australian Alps, and that even small temperature increases would have a catastrophic impact on the Australian winter tourism industry. The Australian snowpack is now at a 2,000-year low. Snow cover between 1954 and 2012 has reduced by 30% and the length of the ski season has already contracted by 17% - 28% across most Australian alpine resorts. Businesses and regional communities at present are experiencing the impacts of climate change and these impacts are projected to worsen rapidly without decisive climate mitigation.
Preprint
Full-text available
Poison frogs are well known for their ability to sequester alkaloids from their diet of leaf-litter arthropods for use in defense against predators and pathogens. Australian frogs in the genus Pseudophryne represent an understudied lineage of poison frogs, which have the unique ability to both sequester dietary alkaloids and synthesize pseudophrynamine alkaloids. Herein, we describe the alkaloid profiles and diet of six species of Pseudophryne ( P. guentheri , P. occidentalis , P. semimarmorata , P. dendyi , P. bibronii , and P. coriacea ) to gain a better understanding of how alkaloid defenses and diet are related within and among species. We characterized and quantified alkaloids using Gas Chromatography-Mass Spectrometry (GC-MS), and assessed diet by way of dissection and examination of stomach contents using light microscopy. Our results found that alkaloid profiles varied significantly among species, with pumiliotoxins (dietary-derived) and pseudophrynamines (biosynthesized) being the most abundant alkaloids. Pseudophryne bibronii and P. dendyi contained mostly dietary derived alkaloids, whereas P. coriacea , P. guentheri , P. semimarmorata , and P. occidentalis possessed mostly biosynthesized alkaloids. The stomachs of each species were largely empty, containing mostly soil and few partially digested insects. Our data suggest that frogs eat minimally during the breeding season and therefore a decrease in dietary alkaloids may be compensated for by the biosynthesized pseudophrynamines, which could allow Australian poison frogs to remain defended from predators during this vulnerable time period.
Article
Full-text available
Background: Many intriguing questions about predator-prey interactions can be addressed by using clay models of prey animals. These are placed in the field to test predators’ avoidances or preferences (testing e.g. color or shape) or to gain insights into predator identity. Modeling clay allows teeth, beak and jaw marks to remain on the model for identification. First used 30 years ago, clay models are now widely deployed. Ever since, the complexity of hypotheses, modeled species as well as the number of clay models used per study has increased. Although clay models are a valuable research tool, the method has limitations. Some questions cannot be addressed with these experiments, yet there is potential for improvement. Main body: We focus on the following aspects that need attention for clay model studies (CMS) in the future: (1) Use of proper clay materials, (2) how to standardize attack identification, (3) limitations of clay model studies, (4) use of clay models beyond predation experiments and (5) the next generation of clay model studies. Conclusion: We conclude that certain aspects of the clay model paradigm urgently need greater standardization. We advocate the use of harmless clay products and non-toxic inks, as well as having a neutral person to evaluate the marks left in the clay against pre-defined inclusion criteria. Further we suggest to use experimental data more cautiously in respect to evolutionary explanations, to use clay studies in detection experiments and to develop methods for attacker identification based on predator salivary DNA. Keywords: Ecological studies, Predator-prey interactions, Predator salivary DNA
Article
Full-text available
When imperilled by a threatening process, the choice is often made to conserve threatened species on offshore islands that typically lack the full suite of mainland predators. While keeping the species extant, this releases the conserved population from predator-driven natural selection. Antipredator traits are no longer maintained by natural selection and may be lost. It is implicitly assumed that such trait loss will happen slowly, but there are few empirical tests. In Australia, northern quolls (Dasyurus hallucatus) were moved onto a predator-free offshore island in 2003 to protect the species from the arrival of invasive cane toads on the mainland. We compared the antipredator behaviours of wild-caught quolls from the predator-rich mainland with those from this predator-free island. We compared the responses of both wild-caught animals and their captive-born offspring, to olfactory cues of two of their major predators (feral cats and dingoes). Wild-caught, mainland quolls recognized and avoided predator scents, as did their captive-born offspring. Island quolls, isolated from these predators for only 13 generations, showed no recognition or aversion to these predators. This study suggests that predator aversion behaviours can be lost very rapidly, and that this may make a population unsuitable for reintroduction to a predator-rich mainland.
Article
Full-text available
Warning signals are an effective defence strategy for aposematic prey, but only if they are recognized by potential predators. If predators must eat prey to associate novel warning signals with unpalatability, how can aposematic prey ever evolve? Using experiments with great tits (Parus major) as predators, we show that social transmission enhances the acquisition of avoidance by a predator population. Observing another predator’s disgust towards tasting one novel conspicuous prey item led to fewer aposematic than cryptic prey being eaten for the predator population to learn. Despite reduced personal encounters with unpalatable prey, avoidance persisted and increased over subsequent trials. Next we use a mathematical model to show that social transmission can shift the evolutionary trajectory of prey populations from fixation of crypsis to fixation of aposematism more easily than was previously thought. Therefore, social information use by predators has the potential to have evolutionary consequences across ecological communities.
Article
Full-text available
Warning signals are an effective defence strategy for aposematic prey, but only if they are recognized by potential predators. If predators must eat prey to associate novel warning signals with unpalatability, how can aposematic prey ever evolve? Using experiments with great tits (Parus major) as predators, we show that social transmission enhances the acquisition of avoidance by a predator population. Observing another predator's disgust towards tasting one novel conspicuous prey item led to fewer aposematic than cryptic prey being eaten for the predator population to learn. Despite reduced personal encounters with unpalatable prey, avoidance persisted and increased over subsequent trials. Next we use a mathematical model to show that social transmission can shift the evolutionary trajectory of prey populations from fixation of crypsis to fixation of aposematism more easily than was previously thought. Therefore, social information use by predators has the potential to have evolutionary consequences across ecological communities.
Book
The book discusses the diversity of mechanisms by which prey can avoid or survive attacks by predators, both from ecological and evolutionary perspectives. There is a particular focus on sensory mechanisms by which prey can avoid being detected, avoid being identified, signal (perhaps sometimes dishonestly) to predators that they are defended or unpalatable. The book is divided into three sections. The first considers detection avoidance through, for example, background matching, disruptive patterning, countershading and counterillumination, or transparency and reflective silvering. The second section considers avoiding or surviving an attack if detection and identification by the predator has already taken place (i.e., secondary defences). The key mechanism of this section is aposematism: signals that warn the predator that a particular prey type is defended. One particularly interesting aspect of this is the sharing of the same signal by more than one defended species (the phenomenon of Mullerian mimicry). The final section considers deception of predators. This may involve an undefended prey mimicking a defended species (Batesian mimicry), or signals that deflect predator’s attention or signals that startle predators. The book provides the first comprehensive survey of adaptive coloration in a predator-prey context in thirty years.
Article
Animals raised in captivity during several generations may not express appropriate antipredator behaviour when reintroduced into the wild. Here we present the results of experiments to enhance behavioural responses to predators in adult males of the endangered lizard Gallotia simonyi (El Hierro, Canary Islands). Individuals were subjected to a training procedure (control, pre-training, training and post-training phases) using stuffed specimens of a kestrel and a cat as predators. We filmed all trials and compared relative durations of the more common behaviour patterns shown by lizards, both among experimental phases and before and after presentation of the stuffed predator. Locomotion and Basking were significantly reduced in the training and post-training trials and also after stimulus presentation, suggesting that the training protocol induced lizard avoidance over both predator models. To our knowledge, this is the first time lizards have been trained to show antipredator avoidance and our results provide the basis for a new management strategy that could be useful for reintroduction of captive-bred individuals of endangered species.
Book
Avoiding Attack discusses the diversity of mechanisms by which prey avoid predator attacks and explores how such defensive mechanisms have evolved through natural selection. It considers how potential prey avoid detection, how they make themselves unprofitable to attack, how they communicate this status, and how other species have exploited these signals. Using carefully selected examples of camouflage, mimicry, and warning signals drawn from a wide range of species and ecosystems, the authors summarise the latest research into these fascinating adaptations, developing mathematical models where appropriate and making recommendations for future study. This second edition has been extensively rewritten, particularly in the application of modern genetic research techniques which have transformed our recent understanding of adaptations in evolutionary genomics and phylogenetics. The book also employs a more integrated and systematic approach, ensuring that each chapter has a broader focus on the evolutionary and ecological consequences of anti-predator adaptation. The field has grown and developed considerably over the last decade with an explosion of new research literature, making this new edition timely.
Article
The invasion of toxic cane toads (Rhinella marina) is a major threat to northern quolls (Dasyurus hallucatus) which are poisoned when they attack this novel prey item. Quolls are now endangered as a consequence of the toad invasion. Conditioned taste aversion can be used to train individual quolls to avoid toads, but we currently lack a training technique that can be used at a landscape scale to buffer entire populations from toad impact. Broad-scale deployment requires a bait that can be used for training, but there is no guarantee that such a bait will ultimately elicit aversion to toads. Here, we test a manufactured bait – a ‘toad sausage’ – in a small captive trial, for its ability to elicit aversion to toads in northern quolls. To do this, we exposed one group of quolls to a toad sausage and another to a control sausage and compared the quolls' predatory responses when presented with a dead adult toad. Captive quolls that consumed a single toad sausage showed a reduced interest in cane toads, interacting with them for less than half the time of their untrained counterparts and showing reduced Attack behaviour. We also quantified bait uptake in the field, by both quolls and non-target species. These field trials showed that wild quolls were the most frequent species attracted to the baits, and that approx. 61% of quolls consumed toad-aversion baits when first encountered. Between 40% and 68% of these animals developed aversion to further bait consumption. Our results suggest that toad-aversion sausages may be used to train wild quolls to avoid cane toads. This opens the possibility for broad-scale quoll training with toad aversion sausages: a technique that may allow wildlife managers to prevent quoll extinctions at a landscape scale.
Article
Assessing variation in animal coloration is difficult, as animals differ in their visual system properties. This has led some to propose that human vision can never be used to evaluate coloration, yet many studies have a long history of relying on human vision. To reconcile these views, we compared the reflectance spectra of preserved avian plumage elements with two measures that are human biased: RGB values from digital photographs and the corresponding reflectance spectra from a field guide. We measured 73 plumage elements across 14 bird species. The field guide reflectance spectra were drastically different from that of the actual birds, particularly for blue elements. However, principal component analyses on all three data sets indicated remarkably similar data structure. We conclude that human vision can detect much of the variation in coloration in the visible range, providing fodder for subsequent studies in ecology, evolution, behavior, and visual ecology.