Feeds

Captain Cyborg pushes kid chipping via Maddy abduction case

'It would not be difficult'

Choosing a cloud hosting partner with confidence

It is with heavy heart and grim sense of inevitability that The Register and its long-time readers note the attachment of the Captain Cyborg agenda to the McCann abduction investigation.

Under the headline "Would an implanted chip help to keep my child safe?", The Times reports that laughable Reading University Professor Kevin Warwick has been "bombarded with emails over the past few days from parents desperate to keep tabs on their children".

Warwick last entered a missing child media scrum after the Soham murders of Holly Wells and Jessica Chapman. Back then he was slammed by charities, the sane, and us, and powered down his robotic claws, but not before he'd recruited unfortunate 11-year-old Danielle Duval as a volunteer.

The tweenage guinea pig never went through with Warwick's child-tracking experiment. Her parents didn't want to comment this time.

The borg's unrepentant earthly advance party opined: "There were ethical concerns, and as a scientist you have to listen."

But after "listening" it seems Britain's numero uno cybernetic heretic thinks events in Portugal mean 2007 could be the year of the kiddie chip.

He reckons that if public hysteria can be fermented to the right level, it would "not be difficult" to make implants available nationally "in a relatively short period of time".

Indeed, The Times agrees that child-tracking devices will "almost certainly have a surge in sales over the next few weeks". Look out, eBay.

We'll leave it to Michelle Elliot, director of the child protection charity Kidscape, to have the last word: "We have 11 million children in the UK. For the past 25 years between five and seven children have been abducted and killed by a stranger each year, and that has not changed. Are we becoming paranoid to the point where we give children the message that life is so dangerous that they have to be tagged?" ®

Bootnote

Newcomers to the wonderful world of Kevin Warwick are welcome to peruse the history of Captain Cyborg versus El Reg below in related stories, going as far back as we can stomach.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Apple CEO Tim Cook: My well-known gayness is 'a gift from GOD'
'I have benefited from the sacrifice of others'
MEN: For pity's sake SLEEP with LOTS of WOMEN - and avoid Prostate Cancer
And, um, don't sleep with other men. If that's what worries you
Jim Beam me up, Scotty! WHISKY from SPAAACE returns to Earth
They're insured for $1m, before you thirsty folks make plans
Now: The REAL APPLE NEWS you need to know
OMG! Gravity's totes amazeballs. Calm down, George Clooney, not your film
Boffins who stare at goats: I do believe they’re SHRINKING
Alpine chamois being squashed by global warming
Let's make an app that POSTS your POO to APPLE HQ
Plus: It's OPEN WARFARE in the Linux greybeard world
Adorkable overshare of words like photobomb in this year's dictionaries
And hipsters are finally defined as self-loathing. Sort of
Not a loyal follower of @BritishMonarchy? You missed The QUEEN*'s first Tweet
Her Maj opens 'Information Age' at the Science Museum
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.