Feeds

US spooks want 'stand off' biometrics-harvesting iPhones

Jesus mobe turns to service of darkness

Designing a Defense for Mobile Applications

Sinister government agencies will soon be able to harvest our biometrics from afar without us even realising it has happened, according to reports. Even worse, one of the main tools of the coming surveillocracy is expected to be the beloved Jesus Phone, evilly twisted from its intended purpose of bringing peace and wellbeing to humanity.

Wired magazine reports on the new biometrics push, which is being spearheaded by IARPA, the new US spooktech agency modelled on the famed military loonybin-laboratory DARPA. It seems that the American Q-branch people want to be able to scan face, eye and/or voice prints "at standoff distance under uncontrolled acquisition conditions".

Present-day biometric tech generally requires a subject to look or speak into a sensor under friendly ambient conditions. This means that on the whole, you're going to know if someone has taken your prints, either to file them away or to check you against a database.

But now, if the IARPA Biometrics Exploitation Science and Technology (BEST) programme comes to fruition, watchers across the street - or perhaps using a concealed camera or a prowling robot aircraft overhead - could scan your eyes or face without you knowing it had happened. Such technology might be used to track everyone in the land automatically, as in the Tom Cruise flick Minority Report. (In the movie, cop-on-the-edge Cruise evades the misguided minions of the state by having a backstreet surgeon pull out his own peepers and replace them with a set of bootleg eyeballs.)

According to the Wired article, one of the companies which may be working with IARPA on the standoff biometrics tech is Animetrics. It is this firm which has corrupted all that is good and holy in the tech world - namely the iPhone - into the service of evil, by writing a faceprinting app for the Jesus mobe.

According to Animetrics:

With the simplicity of the iPhone user interface, operators are able to quickly and easily capture high quality images of people for identification purposes. The MultiTouch interface of the iPhone enables users to isolate faces and provide virtual zooming, optimizing the identification capabilities... The iPhone's integrated networking allows the use of standard protocols and a streamlined process for performing facial identification.

The combination of the iPhone and Animetrics iFace offers new and powerful tools for a variety of mobile applications including shoplifting prevention, law enforcement and military security. iFace is currently undergoing evaluation... for use by the military, receiving rave reviews for usability by military personnel.

So there you have it. Jesus-mobe-toting spooks will shortly be able to covertly harvest your face using Multitouch and put it into a secret government database for use by council bin nazis, special-powers police, moralistic smut crusaders etc.

Don't say you weren't warned. ®

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
Scotland's BIG question: Will independence cost me my broadband?
They can take our lives, but they'll never take our SPECTRUM
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
NBN Co adds apartments to FTTP rollout
Commercial trial locations to go live in September
Samsung Z Tizen OS mobe is post-phoned – this time for good?
Russian launch for Sammy's non-droid knocked back
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
What FTC lawsuit? T-Mobile US touts 10GB, $100 family-of-4 plan
Folks 'could use that money for more important things' says CEO Legere
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.