Feeds

Evangelical apocalyptic schlockfest 'snoops' on gamers

Spyware Revelations

Intelligent flash storage arrays

Watchers of right-wing Christian groups in the States say a new apocalyptic videogame released by cultish Revelations-based fiction series Left Behind is riddled with spyware.

Developers have incorporated software from an Israeli firm called Double Fusion. It incorporates video advertising and product placement into the game, and reportedly records players' behaviour, location, and other data to be uploaded to Left Behind's Bible-powered marketing machine.

Aimed at 13 to 34-year-old males, Left Behind: Eternal Forces casts the player as a director of God's Earthly militia, left behind in the Rapture to roam the streets of New York, battling Satan's minions and shooting unbelievers.

With plans to distribute 1 million copies in evangelical "megachurches" nationwide pre-Christmas, Eternal Forces has attracted criticism from religious and secular commentators for its pushing of a violent brand of Christian supremacy. Christian anti-videogame violence campaigner Jack Thompson said: "It's absurd. You can be the Christians blowing away the infidels, and if that doesn't hit your hot button, you can be the Antichrist blowing away the Christians."

In an interview on the series' website Greg Bauman of Left Behind Games explains: "Left Behind: Eternal Forces will help readers get a sense of the conflict and chaos of the time period portrayed in Left Behind and live out how they would defend themselves and their faith from the Antichrist and his Global Peace Keeping Forces." The United Nations, already organ of satanic machinations for many on the Christian far-right, features strongly in the game. Goat-footed demons reportedly emerge from UN peacekeeping humvees.

One reviewer noted: "The only way to accomplish anything positive in the game is to 'convert' nonbelievers into faithful believers, and the only alternative to this is outright killing them."®

Intelligent flash storage arrays

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.