Brain-scans can defeat terrorism, InfoSeek founder claims

Phrenology to the rescue

  • alert
  • submit to reddit

Using blade systems to cut costs and sharpen efficiencies

Just when you thought crowd surveillance with facial recognition gear was the sickest idea circulating, some naive do-gooder comes along with 'brain fingerprinting' to detect evil memories, loudly urging its use as a public security measure in the wake of the 11 September tragedies.

Steve Kirsch, founder of InfoSeek and current CEO of data management outfit Propel Software, reckons that the relevant technology companies could deliver a working system of brain fingerprinting databases and a companion iris scanning system for (supposedly anonymous) identification reference in something like ninety days' time. And this will "infallibly" defeat terrorists, he fervently believes.

How it works

Kirsch's mental intrusion scheme is based on 'multifaceted electroencephalographic response analysis' (MERA), an electronic form of phrenology promoted by BrainWave Science company President Larry Farwell, whose Gibson-esque self-promoting Web site appears to be little more than a gallery of all the dupes he's taken in. These include US Senator Charles Grassley (Republican, Iowa), 60 Minutes correspondent Mike Wallace, and a slew of newspapers, magazines, and TV and radio producers -- along with our Kirsch.

The technique has "a record of one-hundred per cent accuracy in research on FBI agents, research with US government agencies, and field applications," Farwell gushes.

He neglects to mention that the FBI trial involved a scant twenty-one test subjects, however -- hardly the makings of anything approaching statistical significance.

Farwell also exhibits a Gibson-esque fascination with polysyllabic techno-gobbledygook.

"Words or pictures relevant to a crime are flashed on a computer screen, along with other, irrelevant words or pictures. Electrical brain responses are measured non-invasively through a patented headband equipped with sensors. A specific brain-wave response called a MERMER (memory and encoding related multifaceted electroencephalographic response) is elicited when the brain processes noteworthy information it recognizes. (The MERMER contains another, well known and scientifically established brain response known as a P300.)," he tells us.

"When details of the crime that only the perpetrator would know are presented, a MERMER is emitted by the brain of a perpetrator, but not by the brain of an innocent suspect. In Farwell Brain Fingerprinting, a computer analyzes the brain response to detect the MERMER, and thus determines scientifically whether or not the specific crime-relevant information is stored in the brain of the suspect."

Note the repeated use of the adverb 'scientifically' -- a mannerism much in evidence among marketing copywriters, and charlatans.

Air travel redeemed

To make the skies safe for Democracy with this kit, Kirsch proposes that "once every few years, each person who wishes to travel puts on a headset and watches video images for ten minutes. This action allows us to establish a 'security risk profile' and tie that profile to his iris data."

The video images in question would be related to information only praticing terrorists would have on file within their brains. The subject's resulting 'security risk profile' would be associated with his or her iris image so that a quick eyeball scan at the airport check in, or the sport stadium turnstile, would blow the whistle and they'd be forbidden to enter.

Poor Kirsch; he seems unable to imagine the diabolical uses to which such technology can be put.

"It's....private because you can control who accesses your data and your data is not released to anyone. You just permit your knowledge area to be judged against the profile of the place you wish to enter. You get to choose whether or not you want to associate your security screening with your name, i.e., you can take the test anonymously without providing any identification," he chirps.

Sure, it can be set up that way (assuming it works as advertised, which we kinda doubt); and if that was the limit, it probably wouldn't be all that bad. But nothing's going to prevent the government or big business from associating personally-identifying data with these profiles one day down the road.

And nothing's going to prevent other, related applications from emerging. How about a tool for employment pre-screening?

   -- Microsoft human resources manager: "We're just going to read you a few lines of text and watch how your brain responds:
1.) 'Bill Gates blows goats'"
   -- Applicant: "I...uh..."
[Cue siren and dim/raise stage lights once per second]
   -- Microsoft human resources manager: "Thank you so much for your interest...."

Amusing? Not really: how about something extremely nasty, like an interrogation tool for penal institutions or in the hands of a repressive government? The possibilities are endless, and grotesque.

Kirsch's grand scheme for your protection and Farwell's enrichment is elaborated in excruciating detail here. ®

Boost IT visibility and business value

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story


Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.