Feeds

DNA 'tagging' powder combats unwanted intrusions

Get i-powdered, go to jail

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

A UK firm has developed a DNA "tagging" product which it reckons will see Britain's jails packed to bursting with those burglars foolish enough to mess with Redweb Security's biosyntethic "i-powder".

The concept is pretty simple. The "i-powder", which carries a "uniquely-traceable DNA code" registered to the owner, is projected onto the perpetrator from a device which can be mounted in the ceiling, front door or on the wall. The powder - suspended in a red dye - sticks like glue to clothes and skin and cannot be removed for several weeks, allowing the long arm of the law to do a bit of collar feeling.

Redweb supremo Clive Smith explained: "The key feature of our technology is that it irrefutably identifies a criminal with the scence of the crime. Each device containing i-powder is registered either to its owner or a precise location, and the unique DNA code contained within the substance remains detectable for several weeks. In this way, RedWeb presents law enforcement agencies with a weight of forensic evidence to assist in securing a conviction."

Indeed, according to law enforcement agencies (aka police) in north Wales, Dorset and London, trials have resulted in a 100 per cent conviction rate, reports the Telegraph.

The i-powder deterrent is at present being marketed to the retail industry, but Redweb has a front-door-mounted domestic application in the pipeline, aimed at "protecting vulnerable people".

Good plan. For those of us who are less vulnerable, though, we suggest a "top-up" system utilising personal DNA which involves punching the i-powdered rascal in the chops, and then spitting and urinating on him until law enforcement operatives attend the scene - usually within 8-10 hours, Gatso duties permitting. ®

Related stories

Burgled mum finds stolen iPod on eBay
Chav burglar collared by webcam
UK street scum face wrath of shouting lamppost

Remote control for virtualized desktops

More from The Register

next story
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
Bible THUMP: Good Book beats Darwin to most influential tome title
Folio Society crowns fittest of surviving volumes
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
U wot? Silicon Roundabout set to become Silicon U-BEND
Crap-spouting London upstarts to get permanent road closure
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Getting ahead of the compliance curve
Learn about new services that make it easy to discover and manage certificates across the enterprise and how to get ahead of the compliance curve.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.