Feeds

BBC mulls database of kids

Blue Peter's got your number

Using blade systems to cut costs and sharpen efficiencies

Still plotting ways to root out Blue Peter benefits cheats, puritanical BBC producers are chewing over plans for an intelligence database that petty officials can use to keep an eye on pesky kids.

Producers of Blue Peter, the hit children's TV magazine show, have been considering options to prevent imposters from buying the privileges conferred to Blue Peter badge winners (such as free entry to tourist attractions), since discovering the badges were being sold on eBay.

A BBC spokeswoman said the original idea, for a Blue Peter ID card to be given to badge winners, might not be easy to do in practice. A card might require participating tourist attractions to invest in scanners that could read the cards and distinguish between genuine Blue Peter badges and those from the other side of the tracks.

Alternatives being considered include a card with a hologram, "or some sort of database they can check", she said.

"I can't give you dates yet because they are still working on proposals, but it will definitely be before the end of the series so they can get the system up and running over the summer."

As about 50,000 Blue Peter badges are awarded to kids every year, the turn of a generation could pass with the details half a million kids being captured on a database. ®

Boost IT visibility and business value

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.