Feeds

Naked scans: Net cries nude-o-geddon

If gov says 'pants to terrorism', will you feel the breeze?

The Essential Guide to IT Transformation

The proliferation of airport body scanners will spark a flurry of low-grade porn, internet conspiracy theorists claimed last week.

But officials at Manchester Airport, where full body scanning is already due to be tested, have been quick to dismiss this as urban myth. Who to ignore?

A number of websites have suggested it is a simple enough matter to transform the slightly abstract, solarised images currently taken by airport scanners and turn them into slightly fuzzed smut.

This was the story that started to appear last week on sites such as Prison Planet, and which has been gaining ground across the world by the usual process of internet osmosis.

Manchester's officials have countered, pointing out that the images being bounced around the net as examples of the alleged threat to personal privacy are nothing like the images created by scanning – and that no images are ever saved within the system.

"There is simply no potential for images captured by the scanners to be reversed," a spokesman stated. "This very much looks to be a scare story.

"Besides, images taken by the scanners are not ever saved to any form of permanent medium, so there is no scope for images to be played with in this way."

The spokesman also confirmed that the scheme currently being piloted at Manchester airport will not involve the scanning of any children under the age of 18.

Barring further evidence to the contrary, then, it does look like the internet whipping itself into a frenzy about nothing very much - privacy and nudity were always going to be a dream combination for the paranoid contingent. As you were. However, that doesn't mean that the introduction of full-body scanners - particularly with regard to younger travellers - isn't going to raise some uncomfortable issues; not least for Gordon Brown.

The Prime Minister's immediate response to the apprehension of Umar 'Pants Bomber' Abdulmutallab was to give the go-ahead for full-body scanners to be introduced at all of Britain's airports. These may be used in future not only on departing passengers, but also on passengers in transit through an airport.

This latest instance of "policy by Prime Ministerial decree" may yet fall foul of other safety laws put in place by this government, though, as lawyers continue to ponder whether the scanning of under-18s contravenes recently passed child protection legislation. Perhaps some arse-covering is in order... ®

Build a business case: developing custom apps

More from The Register

next story
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.