Feeds

US spooks want 'stand off' biometrics-harvesting iPhones

Jesus mobe turns to service of darkness

Eight steps to building an HP BladeSystem

Sinister government agencies will soon be able to harvest our biometrics from afar without us even realising it has happened, according to reports. Even worse, one of the main tools of the coming surveillocracy is expected to be the beloved Jesus Phone, evilly twisted from its intended purpose of bringing peace and wellbeing to humanity.

Wired magazine reports on the new biometrics push, which is being spearheaded by IARPA, the new US spooktech agency modelled on the famed military loonybin-laboratory DARPA. It seems that the American Q-branch people want to be able to scan face, eye and/or voice prints "at standoff distance under uncontrolled acquisition conditions".

Present-day biometric tech generally requires a subject to look or speak into a sensor under friendly ambient conditions. This means that on the whole, you're going to know if someone has taken your prints, either to file them away or to check you against a database.

But now, if the IARPA Biometrics Exploitation Science and Technology (BEST) programme comes to fruition, watchers across the street - or perhaps using a concealed camera or a prowling robot aircraft overhead - could scan your eyes or face without you knowing it had happened. Such technology might be used to track everyone in the land automatically, as in the Tom Cruise flick Minority Report. (In the movie, cop-on-the-edge Cruise evades the misguided minions of the state by having a backstreet surgeon pull out his own peepers and replace them with a set of bootleg eyeballs.)

According to the Wired article, one of the companies which may be working with IARPA on the standoff biometrics tech is Animetrics. It is this firm which has corrupted all that is good and holy in the tech world - namely the iPhone - into the service of evil, by writing a faceprinting app for the Jesus mobe.

According to Animetrics:

With the simplicity of the iPhone user interface, operators are able to quickly and easily capture high quality images of people for identification purposes. The MultiTouch interface of the iPhone enables users to isolate faces and provide virtual zooming, optimizing the identification capabilities... The iPhone's integrated networking allows the use of standard protocols and a streamlined process for performing facial identification.

The combination of the iPhone and Animetrics iFace offers new and powerful tools for a variety of mobile applications including shoplifting prevention, law enforcement and military security. iFace is currently undergoing evaluation... for use by the military, receiving rave reviews for usability by military personnel.

So there you have it. Jesus-mobe-toting spooks will shortly be able to covertly harvest your face using Multitouch and put it into a secret government database for use by council bin nazis, special-powers police, moralistic smut crusaders etc.

Don't say you weren't warned. ®

Securing Web Applications Made Simple and Scalable

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.