Feeds

Lifelike, sexy robot infiltrators influence Belgian mobs

And so it begins

Intelligent flash storage arrays

Brussels boffins have finally cracked one of the most elusive and long-sought of all technology achievements - that of deploying lifelike robot agent provocateur infiltrators using realistic sex pheromones to influence mass psychology.

In this case, the population to be manipulated by droid love agents was a group of cockroaches residing at the Free University of Brussels, rather than the inhabitants of present-day Los Angeles*. For now.

Apparently Dr José Halloy, a top Belgian robot cockroach sex pheromone mob-psychology researcher, wanted to see if a few droid impostors could influence large groups living in democratic societies. (According to the New York Times.) Seemingly he had little interest in stratified, hierarchical polities like those of ants, bees, communist China, Britain etc.

“Cockroaches are not like that,” said the robo-roach quisling boffin overlord.

“They live all together.”

Halloy and his team figured to mould the opinion of the meritocratic, classless arthropod disease-carrying pests. To this end, they fashioned a force of facsimile droid sleeper agents.

Fortunately cockroach eyesight isn't good, and the refuse-gobbling multilegged rabble were easily taken in by undercover mechanoids more reminiscent of small golf buggies than actual bugs. The only thing necessary to complete the imposture, according to the Times, was a quick squirt of "eau de cockroach sex hormones".

Having been welcomed by the roach hordes, Halloy's mechanical traitors were soon able to influence their unsuspecting insect dupes into doing things obviously contrary to their own welfare. The Belgian fifth-columnist puppetmasters didn't push it too hard - they weren't able to get the roaches to commit suicide, for instance - but it was easy to make them do things they found uncomfortable and worrying, like a human being voting for an obviously insane megalomaniac.

According to the Times, Halloy now plans to see if he can subvert chickens using larger droids.

Sure - chickens.

“We are not interested in people,” he added, unconvincingly.

The research paper can be read here (subscription required). ®

*Memorably penetrated by saucy yet murderous mechanoid sexpot assassin Kristanna Loken in Terminator III, which now turns out to be a documentary film.

Providing a secure and efficient Helpdesk

More from The Register

next story
GRAV WAVE DRAMA: 'Big Bang echo' may have been grit on the scanner – boffins
Exit Planet Dust on faster-than-light expansion of universe
Mine Bitcoins with PENCIL and PAPER
Forget Sudoku, crunch SHA-256 algos
SpaceX Dragon cargo truck flies 3D printer to ISS: Clawdown in 3, 2...
Craft berths at space station with supplies, experiments, toys
That glass of water you just drank? It was OLDER than the SUN
One MEELLION years older. Some of it anyway
NASA rover Curiosity drills HOLE in MARS 'GOLF COURSE'
Joins 'traffic light' and perfect stony sphere on the Red Planet
'This BITE MARK is a SMOKING GUN': Boffins probe ancient assault
Tooth embedded in thigh bone may tell who pulled the trigger
Big dinosaur wowed females with its ENORMOUS HOOTER
That's right, Doris, I've got biggest snout in the prehistoric world
Japanese volcano eruption reportedly leaves 31 people presumed dead
Hopes fade of finding survivors on Mount Ontake
Canberra drone team dances a samba in Outback Challenge
CSIRO's 'missing bushwalker' found and watered
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.