Feeds

Cyberkiosk assaults Spanish teenager

Rise of the Machines Part II

  • alert
  • submit to reddit

New hybrid storage solutions

It only merited a brief report on Yahoo! yesterday, but the story of the teenager-eating Madrid telephone kiosk further confirms our suspicions that the eventual rise of the machines and the subjugation of humanity is only a matter of time.

The unfortunate victim was trapped by the finger when attempting to get a €1.50 refund from the belligerent booth. The phone's anti-theft system swung into action trapping the eighteen-year-old for over two hours.

She was eventually freed after firefighters completely dismantled the cyberkiosk.

Chillingly, this comes just a couple of years after our report on the shopper-eating cyberloo which ate a middle-aged woman on a trip to Newcastle-uopn-Tyne. On that occasion it also required the violent intervention of the fire brigade to liberate the hostage.

Sadly, the Spanish online media seems oblivious to the threat on its doorstep, with both El Mundo and abc choosing to ignore this terrifying warning. Indeed, we cannot help feeling that changes to the Spanish constitution and the indictment of the former president of Nicaragua will be the least of Spaniards' worries when they are fighting a vicious war of survival against murderous telephonic Terminators over the rubble-strewn remains of Madrid.

Update

In response to those Spaniards who have emailed to point out that the woman in question was trapped by a humble telephone kiosk, and not in fact a malevolent cyberdevice, we'd like to point them and other readers in the direction of 1972 film La Cabina by Antonio Mercero.

The film tells the disturbing story of a man unable to escape from a telephone box which is eventually taken away on the back of a truck, its occupant still inside.

This prophetic work clearly warns of the dark forces which are only now executing their plan for the enslavement of humanity.

And if that doesn't convince you, then try this: when bored, or short of more intellectually rigorous material, journalists will pick on any story which appears to reinforce their own prejudices. In this case, that phone boxes and cybertoilets are the vanguard of a homicidal robot army.

For the record, we concede that Spanish TV has given plenty of coverage to this particular episode. We can only conclude that the "if it bleeds, it leads" principle was applied in this case, in the absence of more pressing material. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Boffins say they've got Lithium batteries the wrong way around
Surprises at the nano-scale mean our ideas about how they charge could be all wrong
Thought that last dinosaur was BIG? This one's bloody ENORMOUS
Weighed several adult elephants, contend boffins
Europe prepares to INVADE comet: Rosetta landing site chosen
No word yet on whether backup site is labelled 'K'
City hidden beneath England's Stonehenge had HUMAN ABATTOIR. And a pub
Boozed-up ancients drank beer before tearing corpses apart
'Duck face' selfie in SPAAAACE: Rosetta's snap with bird comet
Probe prepares to make first landing on fast-moving rock
Archaeologists and robots on hunt for more Antikythera pieces
How much of the world's oldest computer can they find?
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.