Feeds

American-German biometric database share deal inked

No word on US access to polizei pong-print BO bank

Intelligent flash storage arrays

The United States and Germany have announced they will share access to national criminal biometrics databases. A bilateral agreement between the two nations was intialled in Berlin yesterday.

"Terrorists who threaten our way of life see no barriers in borders between countries, neither should our efforts to stop them," said US Attorney General Michael B Mukasey.

Under the plans, police or other security officials in both countries will be able to swiftly determine whether a given fingerprint is in the other nation's database. In the event of getting a hit, they will be able to apply for the relevant information "through lawful processes that also ensure appropriate protection for personal data", according to Mukasey.

There will also be arrangements for sharing databases of "known or suspected terrorists, so we can prevent them from entering our countries and attacking on our people".

There was no word on any plan for transatlantic exchange of the famous German "scent profile" BO database, in which the personal smell signatures of known troublemakers and malcontents are stored in vials for future reference. This allows specially-trained German pong-print police sniffer dogs to identify villains merely by odour, needing no fingerprints, DNA, retinal scans, or whatever.

In the run-up to last year's G8 summit, Bundesrepublik stink-plods reportedly added large numbers of potential crusty capitalism-bashers to this aromatic database. However, there would no doubt be technical difficulties involved in any automated international niff-network hookup.

Mukasey hinted that the US-German biometric agreement could serve as a model for similar deals with other European countries. In particular, access to the UK's enormous police DNA database - much bigger than the American equivalent - would be very desirable to the US authorities.

Speculative discussions regarding a UK-US-Australia-Canada-NZ biometric hookup have been held, but there are as yet no firm plans. ®

Internet Security Threat Report 2014

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.