Showing posts with label Leigh Lundin. Show all posts
Showing posts with label Leigh Lundin. Show all posts

22 May 2016

Tapped Out


by Leigh Lundin

In the shadow of John’s popular article yesterday, I’ll add a small footnote about language misunderstandings.

I worked in Europe, mostly in France. I love the country and to clear up a misconception, the French are polite, very polite. Some Parisians may not tolerate fools gladly, but neither do New Yorkers, Londoners, or Romans. There, got that off my chest.

A gentle but all too true joke that goes around:
Q. What do you call a person who speaks three languages?
A. Trilingual
Q. What do you call a person who speaks two languages?
A. Bilingual
Q. What do you call a person who speaks one language?
A. American
French Lesson

During my second or third major stint overseas, I traveled through France with a French colleague, Micheline. (If you read R.T. Lawton’s excellent short historical stories set in France, he consulted with Micheline on at least one occasion.)

One particular day after landing in Lyon, we checked into our respective hotel rooms. If you haven’t noticed (and I know you have), design is important to the French and this was reflected in the fancy bathroom fixtures. The sink didn’t display obvious faucet handles. It’s not uncommon to find taps with photoelectric eyes or motion sensors, but waving my hand under the spout did nothing.

I felt around and finally discovered hidden levers behind the faucet that turned on the water. Mystery solved.

Usually at a destination, we’d rent a car but in Lyon, another coworker, Max, picked us up. Max was possibly the scariest driver I’ve ever ridden with. My grasp of French hovered only a little above zero, so I rode in the back seat and tuned out Max and Micheline as they caught up on gossip and news. Suddenly Max would turn to me– turn his body 180° from watching the road– and chat.

I’d find myself screaming, “Truuuuck,” trying to remember the French word for huge-damn-transport-vehicle-rushing-at-us-oh-God-we’re-going-to-crash (camion). But all in all, Max was a charming host and we had a good time. Especially when…

Max and Micheline were talking and I tuned out of the conversation. Suddenly, Micheline turned to me.
“Leigh, when we get back to the hotel, I want to see your cock.”

“Pardon?”

As you might imagine, this happens frequently, but it was my first request in France.

“When we return to the hotel, I want you to show me your cock.”

“Er, are you sure?”

The denseness of her American friend caused a shadow of doubt to cloud her face.

“Please, when we get back, show me your cock.”
She hadn’t even bought me dinner, but by now, we both realized something was wrong. Micheline handed me her pocket French-English dictionary opened to the entry “robinet”.

wine barrel © Dave Di Biase
I pieced together what happened. As Micheline chatted with Max, she mentioned not figuring out how to operate the water tap in her room… she couldn’t find the handles. Max suggested she ask me, so she looked up the French robinet in her dictionary, which showed cock and spigot (but oddly not faucet, a French derivative). She chose the easier to pronounce and, well, you heard the conversation.

Afterwards, as folks say on the internet, hilarity ensued.



Images © Dave Di Biase, FreePik.com

15 May 2016

The Girl with the Golden Gun


by Leigh Lundin

I’m seeing another woman. She’s stunning, vivacious, rich and generous, and… she can dance.

Miss Fisher’s fan dance

I told my girlfriend. Surprisingly, she doesn’t mind, which is saying a lot given her antipathy towards the Antipodes. Not our Stephen Ross’ New Zealand, mind you, that other country down under that does horrible things vis-à-vis soccer, rugby, and the purported game of (yawn) cricket, but that’s another story.

Anyway, about my new Australian darling…

But wait. First I’ll tell you why I longed to murder Lawrence Welk. I’ll tie this together, trust me.

Ever since I was a little kid, I despised that dastardly big band leader and his insipid Champagne Bubble Music™. His primary talent was outliving the really good musicians of the swing era, Count Basie, the Dorsey brothers, Duke Ellington, Benny Goodman, Lionel Hampton, Glenn Miller, King Oliver… pretty much everyone other than Louis Armstrong and Cab Calloway. Welk’s idea of pop was pap and pablum for the masses. His flaccid phonographic flummery almost ruined the music of the 1920s and 30s for me, one of the most creative eras in the 20th century, and we're not talking Stravinsky, Schoenberg, or Shostakovich. Imagine a modern Clyde McCoy on trumpet, Tommy Dorsey muting a trombone, Viola Smith thumping tom-toms

Listen to this as you read on:


This piece was not written nearly a century ago during the 1920s flapper era… it was written practically yesterday by Greg J Walker for the Australian television production of Miss Fisher’s Murder Mysteries. I wouldn’t normally write about television mysteries when I haven’t read the original books, but I confess I’m doing exactly that. That’s how smitten I am and it’s all Dixon Hill’s fault.
original Phryne

MFMM is, if you haven’t guessed already, a period piece and to my eye… and ear… dazzlingly done. It features wealthy flapper Miss Fisher, christened with the appropriate given name of Phryne. (You may recall the suitably scandalous Phryne (pronounced like Friday with an ’n’ instead of ‘d’) from classical studies.)

The rest of the ensemble includes Phryne’s ever-fluid household, primarily comprised of Mr. Butler, Cecil, her ward Jane, and especially gentle Dot. The police presence includes newly minted Constable Hugh Collins and Inspector Jack Robinson.

The young constable is earnest although inexperienced, but the inspector proves highly intelligent and smart enough to give Phryne her head: Her charm, wit, money, and standing in society allow her to access social circles he can’t. As Phryne gives an entirely new meaning to ‘man eater,’ he’s sufficiently wise to let her do the romantic pursuing.

If you’re guessing characterization is key, you’re dead on. Phryne is engaging and entrancing. She carries a gold-plated revolver and is slightly reminiscent of Emma Peel. Inspector Robinson manages to be both firm and lenient with her and sensibly underplays his rôle. Phryne’s imposing Aunt Prudence– every family needs a matriarch like her– is an old dear who represents old school and old money. And then there’s Phryne’s companion/assistant, little Dot– she steals scenes and everyone’s heart.

Miss Fisher’s logo
Lady Detective

Before I stray too far, I must mention that Dixon Hill wrote the original article that intrigued me a year and a half ago. Curiously, two of my female friends expressed no interest in the series but one of me mates (oops, I've been overdosing) has started watching Miss Fisher from the beginning. Miss Marple she’s not. One review said Phryne ‘sashays’ through the stories, something a guy notices. Clearly we males find Miss Fisher fetching.

The historical detail is impressive. I admire many cars built in the 20s and 30s and Miss Fisher drives a beautiful Hispano-Suiza. Other viewers will applaud the costume of the era and Phryne wears at least a half dozen each episode. Indeed, one of the mysteries takes place in a house of fashion.

Sometimes writers imprint our present-day morals and values on the past, often imbuing a protagonist with a superior outlook. Not much of that shows through here– by nature Phryne is open-minded and the flapper era was daring, progressive, and sexually expressive. Thus Phryne’s physician friend Mac who dresses in men’s clothes comes off as genuine rather than contrived, not so much butch but a don’t-ask-don’t-tell person you’d like to know.

Miss Fisher’s Mysteries
The plots? They take second place to the characters and costuming, but even when you guess the culprit, you enjoy how Fisher and Robinson get there.

And the music? Most of it’s straight out of the 1920s and early 30s and thoughtfully offered in three albums (thus far). Wonderful stuff. I’ll leave you with Duke Ellington’s dirge, East St. Louis Toodle-oo.




Legendary drummer Viola Smith is still among the living at age 103½!

09 May 2016

That Damn Book


It was 9:30 in the evening, April 25, 2016. I was sitting in front of the computer, staring at that damn book. I couldn't take it any more. I decided to take a break and quickly checked my email. There it was, right there in front of me: an email from Leigh, asking where my post was for tomorrow. Post? What post? OMG, that damn book! I quickly explained to Leigh that I was trying to make a deadline in three days and I was still @#*& words short. He rescued me – at least from the post.

So it was back to the book. That damn book. I'd basically finished the story at @#*& words, which weren't nearly enough. So I added weather: an ice storm. That would be good for a few thousand words, I thought. Wrong. Less than one thousand. Okay, bite the bullet (so to speak) and kill somebody else. Over a thousand words! Yay! Still short.

My hero, Milt Kovak, was the only one of the regulars in the book who'd not been targeted by the bad guy. Okay, let's get Milt. I didn't want to shoot him – the Milt books are basically first person narrative. It would be difficult for him to narrate while dead or even hospitalized. I didn't want to physically hurt his family. A fire! I thought. Scary but not necessarily harmful to anything but his house! And of course Milt's not there because --- because it happens in the middle of the ice storm! Two thousand words! I was on a roll! But I still had @#*& words to go.

Someone suggested a bomb. I'd never done a bomb. Did this book even call for a bomb? Not really. But what the hell! I added a bomb.

The minutes, the hours, the days wore on. And still not enough words for that damn book. But with one day to spare, I finished it. It was ready to go. I didn't want to even think about reading it yet again, but I knew I had to. That damn book! Well, actually, it wasn't half bad. It could be better – every book could be better when you send it off – but it wasn't half bad. But mainly, it was gone.

Now on to the second book in the contract!

P.S. And thanks, Leigh, for the title to this post!

08 May 2016

Professional Tips– S S Van Dine


I’d planned a different column for today, but due to a technical glitch, we were unable to get an important part of the article working, the audio mechanism. We’ll try again at another date. In the meantime, enjoy the following advice by the author of the 1920s-30s Philo Vance series, S.S. Van Dine, pseudonym of Willard Huntington Wright.

Twenty Rules for Writing Detective Stories

by

S. S. Van Dine

Stern Winter loves a dirge-like sound. — Wordsworth
The detective story is a game. It is more– it is a sporting event. And the author must play fair with the reader. He can no more resort to trickeries and deceptions and still retain his honesty than if he cheated in a bridge game. He must outwit the reader, and hold the reader's interest, through sheer ingenuity. For the writing of detective stories there are very definite laws– unwritten, perhaps, but none the less binding: and every respectable and self-respecting concocter of literary mysteries lives up to them.

Herewith, then, is a sort of Credo, based partly on the practice of all the great writers of stories, and partly on the promptings of the honest author's inner conscience. To wit:
  1. The reader must have equal opportunity with the detective for solving the mystery. All clues must be plainly stated and described.
  2. No wilful tricks or deceptions may be played on the reader other than those played legitimately by the criminal on the detective himself.
  3. There must be no love interest in the story. To introduce amour is to clutter up a purely intellectual experience with irrelevant sentiment. The business in hand is to bring a criminal to the bar of justice, not to bring a lovelorn couple to the hymeneal altar.
  4. The detective himself, or one of the official investigators, should never turn out to be the culprit. This is bald trickery, on a par with offering some one a bright penny for a five-dollar gold piece. It's false pretenses.
  5. The culprit must be determined by logical deductions– not by accident or coincidence or unmotivated confession. To solve a criminal problem in this latter fashion is like sending the reader on a deliberate wild-goose chase, and then telling him, after he has failed, that you had the object of his search up your sleeve all the time. Such an author is no better than a practical joker.
  6. The detective novel must have a detective in it; and a detective is not a detective unless he detects. His function is to gather clues that will eventually lead to the person who did the dirty work in the first chapter; and if the detective does not reach his conclusions through an analysis of those clues, he has no more solved his problem than the schoolboy who gets his answer out of the back of the arithmetic.
  7. There simply must be a corpse in a detective novel, and the deader the corpse the better. No lesser crime than murder will suffice. Three hundred pages is far too much pother for a crime other than murder. After all, the reader's trouble and expenditure of energy must be rewarded. Americans are essentially humane, and therefore a tiptop murder arouses their sense of vengeance and horror. They wish to bring the perpetrator to justice; and when “murder most foul, as in the best it is,” has been committed, the chase is on with all the righteous enthusiasm of which the thrice gentle reader is capable.
  8. The problem of the crime must be solved by strictly naturalistic means. Such methods for learning the truth as slate-writing, ouija-boards, mind-reading, spiritualistic séances, crystal-gazing, and the like, are taboo. A reader has a chance when matching his wits with a rationalistic detective, but if he must compete with the world of spirits and go chasing about the fourth dimension of metaphysics, he is defeated ab initio.
  9. There must be but one detective– that is, but one protagonist of deduction– one deus ex machine. To bring the minds of three or four, or sometimes a gang of detectives to bear on a problem is not only to disperse the interest and break the direct thread of logic, but to take an unfair advantage of the reader, who, at the outset, pits his mind against that of the detective and proceeds to do mental battle. If there is more than one detective the reader doesn't know who his co-deductor is. It's like making the reader run a race with a relay team.
  10. The culprit must turn out to be a person who has played a more or less prominent part in the story– that is, a person with whom the reader is familiar and in whom he takes an interest. For a writer to fasten the crime, in the final chapter, on a stranger or person who has played a wholly unimportant part in the tale, is to confess to his inability to match wits with the reader.
  11. Servants– such as butlers, footmen, valets, game-keepers, cooks, and the like– must not be chosen by the author as the culprit. This is begging a noble question. It is a too easy solution. It is unsatisfactory, and makes the reader feel that his time has been wasted. The culprit must be a decidedly worth-while person– one that wouldn’t ordinarily come under suspicion; for if the crime was the sordid work of a menial, the author would have had no business to embalm it in book-form.
  12. There must be but one culprit, no matter how many murders are committed. The culprit may, of course, have a minor helper or co-plotter; but the entire onus must rest on one pair of shoulders: the entire indignation of the reader must be permitted to concentrate on a single black nature.
  13. Secret societies, camorras, mafias, et al., have no place in a detective story. Here the author gets into adventure fiction and secret-service romance. A fascinating and truly beautiful murder is irremediably spoiled by any such wholesale culpability. To be sure, the murderer in a detective novel should be given a sporting chance, but it is going too far to grant him a secret society (with its ubiquitous havens, mass protection, etc.) to fall back on. No high-class, self-respecting murderer would want such odds in his jousting-bout with the police.
  14. The method of murder, and the means of detecting it, must be rational and scientific. That is to say, pseudo-science and purely imaginative and speculative devices are not to be tolerated in the roman policier. For instance, the murder of a victim by a newly found element– a super-radium, let us say– is not a legitimate problem. Nor may a rare and unknown drug, which has its existence only in the author's imagination, be administered. A detective-story writer must limit himself, toxicologically speaking, to the pharmacopoeia. Once an author soars into the realm of fantasy, in the Jules Verne manner, he is outside the bounds of detective fiction, cavorting in the uncharted reaches of adventure.
  15. The truth of the problem must at all times be apparent– provided the reader is shrewd enough to see it. By this I mean that if the reader, after learning the explanation for the crime, should reread the book, he would see that the solution had, in a sense, been staring him in the face– that all the clues really pointed to the culprit– and that, if he had been as clever as the detective, he could have solved the mystery himself without going on to the final chapter. That the clever reader does often thus solve the problem goes without saying. And one of my basic theories of detective fiction is that, if a detective story is fairly and legitimately constructed, it is impossible to keep the solution from all readers. There will inevitably be a certain number of them just as shrewd as the author; and if the author has shown the proper sportsmanship and honesty in his statement and projection of the crime and its clues, these perspicacious readers will be able, by analysis, elimination and logic, to put their finger on the culprit as soon as the detective does. And herein lies the zest of the game. Herein we have an explanation for the fact that readers who would spurn the ordinary "popular" novel will read detective stories unblushingly.
  16. A detective novel should contain no long descriptive passages, no literary dallying with side-issues, no subtly worked-out character analyses, no "atmospheric" preoccupations. Such matters have no vital place in a record of crime and deduction. They hold up the action, and introduce issues irrelevant to the main purpose, which is to state a problem, analyze it, and bring it to a successful conclusion. To be sure, there must be a sufficient descriptiveness and character delineation to give the novel verisimilitude; but when an author of a detective story has reached that literary point where he has created a gripping sense of reality and enlisted the reader’s interest and sympathy in the characters and the problem, he has gone as far in the purely ‘literary’ technique as is legitimate and compatible with the needs of a criminal-problem document. A detective story is a grim business, and the reader goes to it, not for literary furbelows and style and beautiful descriptions and the projection of moods, but for mental stimulation and intellectual activity– just as he goes to a ball game or to a cross-word puzzle. Lectures between innings at the Polo Grounds on the beauties of nature would scarcely enhance the interest in the struggle between two contesting baseball nines; and dissertations on etymology and orthography interspersed in the definitions of a cross-word puzzle would tend only to irritate the solver bent on making the words interlock correctly.
  17. A professional criminal must never be shouldered with the guilt of a crime in a detective story. Crimes by house-breakers and bandits are the province of the police department– not of authors and brilliant amateur detectives. Such crimes belong to the routine work of the homicide bureaus. A really fascinating crime is one committed by a pillar of a church, or a spinster noted for her charities.
  18. A crime in a detective story must never turn out to be an accident or a suicide. To end an odyssey of sleuthing with such an anti-climax is to play an unpardonable trick on the reader. If a book-buyer should demand his two dollars back on the ground that the crime was a fake, any court with a sense of justice would decide in his favor and add a stinging reprimand to the author who thus hoodwinked a trusting and kind-hearted reader.
  19. The motives for all crimes in detective stories should be personal. International plottings and war politics belong in a different category of fiction– in secret-service tales, for instance. But a murder story must be kept gemütlich, so to speak. It must reflect the reader's everyday experiences, and give him a certain outlet for his own repressed desires and emotions.
  20. And (to give my Credo an even score of items) I herewith list a few of the devices which no self-respecting detective-story writer will now avail himself of. They have been employed too often, and are familiar to all true lovers of literary crime. To use them is a confession of the author's ineptitude and lack of originality.
    1. Determining the identity of the culprit by comparing the butt of a cigarette left at the scene of the crime with the brand smoked by a suspect.
    2. The bogus spiritualistic séance to frighten the culprit into giving himself away.
    3. Forged finger-prints.
    4. The dummy-figure alibi.
    5. The dog that does not bark and thereby reveals the fact that the intruder is familiar.
    6. The final pinning of the crime on a twin, or a relative who looks exactly like the suspected, but innocent, person.
    7. The hypodermic syringe and the knockout drops.
    8. The commission of the murder in a locked room after the police have actually broken in.
    9. The word-association test for guilt.
    10. The cipher, or code letter, which is eventually unravelled by the sleuth.
What are your thoughts?

01 May 2016

Mayday, Mayday


by Leigh Lundin

TeleType telex TTY
TeleType – early texting
It’s May Day, which got me thinking about mayday and codes. How did ‘mayday’ come to be a distress signal? It’s a mispronunciation of the French m’aider, from venez m’aider, “Come to my aid,” or “Come help me.”

So, parents and writers, it’s been a long time since we posted SMS codes and acronyms in use by kids, counter-culture, and people in technology. Some mnemonics have faded into obscurity like ROFL (rolling on floor laughing) and others have been truncated like WTF.

But OMG, a number remain with us (LOL). Some not only predate texting, but at least two, BRB and GA, date back to the days of that early messaging system, the telex. I wouldn't be surprised if Samuel Morse used such abbreviations.

I confess to liking ILYSM and 'bae' (short for bae-bae). Yet, as kids search for ever-more-circumspect communication, codes change rapidly.

You may see ‘Kik’ floating around. It’s not an acronym but a messaging phone app, popular with the young and bad guys because its messages evaporate after reading.
code meaning…
AF As ƒ, in context with other words, e.g, “That’s cool as ƒ.”
AFAIK As far as I know.
bae Babe, baby.
BMS Broke my scale, i.e, high marks for looks or deeds.
BRB Be right back.
cook Gang-up, dump on someone.
DOC Drug of choice.
FML ƒ my life, chagrin.
GA Go ahead.
HMU Hit me up, request for phone or message contact.
IDK I don't know.
ILYSM I love you so much.
KOTD Kicks of the day, sneakers.
LMAO Laughing my ass off.
LOL Laughing out loud. (still in use)
OMG Oh my God. (still in use)
OOTD Outfit of the day.
RN Right now.
smash Sexy, want sex.
SO Shout out, give recognition.
TBH To be honest.
TBR To be rude.
TF WTF? (What) the ƒ?
6 Sex, often used in combination with other codes, e.g, IW26U.
9, CD9 Parent in the room, or PIR. Formerly, POS meant parent over shoulder.

What codes are your kids sending?

17 April 2016

RansomWare 3,
Recovery


 WARNING  In part 1, we discussed a nasty type of malware (malicious software) called ransomware and in part 2, we recommended preventive steps. In this final article, we explore options in the event your computer is attacked.

Don’t Pay

That’s the advice of most professionals. Besides filling criminal coffers, a better reason leaps out. FireEye Security and technical advisor Alain Marchant estimate only 60% of payees get their computer back intact. BitDefender estimates even dimmer odds, as few as half of those who pay see their files returned. Symantec hasn’t published figures but they’re also not optimistic about the odds of success.

The poor odds of successfully retrieving files has drastically impacted the ‘business’ of extorting stolen files. TeslaCrypt perps have taken two unusual steps.
  1. They set up a secretive TOR ‘dark web’ message center to facilitate payment.
  2. To prove they can actually decrypt files, they offer to decrypt a small (very small) file of the user’s choice.
Yet, as they try to extract payment, their pages hint at the myriad failures and pitfalls: «If step 2 goes wrong, then attempt this and if that goes wrong then try that and maybe try again in 10-12 hours… which may exceed the allotted time… blah, blah.»

Then consider the matter of who reaps the stunning profits from ransomware. It’s tempting to blame ordinary criminals but in fact, ransomware funds terrorist groups like Daesh/ISIS and al-Qaeda. State-sponsored extortionists include the obvious suspects, China, North Korea, and Russia. Technical authors Gregory Fell and Mike Barlow further accuse Iran and Israel of sponsoring attacks at the expense of the rest of us.

Ransomware is an international problem. The Russian security firm Kapersky Lab was reportedly hit with ransomware and thus turned their attention to addressing the problem. French security consultant Alain Marchant, who goes by the name xépée and cheerfully admits Marchant may not be his real name, has developed a client base of victims ranging from individuals to major companies. Here at home, developers of anti-virus products have trained their sights to the problem.

The Costs

Worldwide, malware sucks more than a half-trillion dollars out of the annual economy. Some target individual countries like Japan (TorLocker) and Russia (Kryptovor), but others are indiscriminate. The US alone loses $100-billion annually.

Cyber crime is lucrative and safe. While one or two man operations bring in as little as $1100-5500 daily, Symantec traced one revenue stream that amounted to $35 000 a day, a number consistent with a study by FireEye Security. At the upper end of the scale, Cisco’s Talos Group calculated the Angler exploit (CryptoWall, TeslaCrypt) each day targets more than 90 000 users, pulling in $100 000… every day.

Losing family photos is one thing, but businesses have lost their files, charities their revenue, hospitals their patient records, government agencies their data, and– in at least three cases– people their lives.[1],[2]

Practicalities

Acquaintances of ‘Mark’, a victim mentioned in last week’s article, casually recommended caving to demands and paying off, ignoring the odds and consequences. Those acquaintances may be well-heeled and untouched by ordinary concerns like money and terrorist funding, suggesting if one can afford it, why not? Fortunately, Mark had a friend to help see him through the worst of a bad situation.

If you are a victim, only you understand your circumstances or desperation, but treat pay-offs only as an absolute last resort. Be prepared for the worst– your payment may go for naught.

Easy Pickings

Chances are you’ve seen web pages or pop-up windows that claimed your computer has been damaged or compromised and to call ‘Windows’ or ‘MacOS’ where ‘professionals’ for a fee will help you stamp out this insidious nuisance, one they created, although they don’t tell you that.

These are usually simple browser attacks– JavaScript on a web page seizes control of your Edge browser, or Internet Explorer, Safari, Chrome, FireFox, etc. The good news is they’re relatively easy to defeat, although getting out of the situation can puzzle an average user.

In these cases, don’t panic and don’t call the toll-free number the bad guys so thoughtfully provided. You may want to call a friend for technical assistance, but you may be able to solve it yourself.

The key to recovery is killing the script, the little program abusing your browser. You may be able to simply close the page, and if so, job well done.

Another approach is to open the browser Preferences or Options and disable JavaScript. Once JavaScript if paused, you can close the web page at your leisure, alt-ƒ4 or the more nuanced ctl-w for Windows, cmd-w (⌘-w) for the Mac. Unfortunately, FireFox made the decision to remove the option to disable JavaScript, but add-ons like QuickJS, NoScript and Ghostery give users that option. For the Mac, typing command-comma (⌘,) normally brings up preferences, but the malicious script may thwart that move.

What happens if you can’t close the web page and can’t disable JavaScript? You have no choice but to kill the browser and restart with a goal of stamping out the offending window. Use the Macintosh Force Quit (⌘-opt-pwr) or the venerable Windows Task Manager (win-shft-esc). You may be able to right-click on the program icon to close it. When restarting Safari and Edge, use finger dexterity to close the offending window– you may have to force-quit and restart a couple of times to succeed. FireFox is helpful here: They provide a dialogue box asking which pages you want to reopen (or not).

Note that you may have to smack down more than one browser window. At least one exploit deploys two pages using one to reopen the other if it’s closed. Both pages need to be killed.

Trust Issues

As with other ‘exploits’ (short for exploitations in professional parlance), you can (and should) take the preventive measure of downloading an alternative browser to your computer, say Opera, FireFox or Chrome. If a bad script has nailed your Safari or Edge browser, you can fall back on an alternative until you can get help.

The other key step is not to download anything you don’t trust. Don’t fall for messages claiming your Java or Flash or SilverLight player needs to be updated. Be extremely shy of web mail that offers to upgrade Windows 10. The safe way to update is not to click on the helpful button, but to locate the official web sites and manually download any updates yourself. Make certain the URL says java.com, adobe.com, or microsoft.com (with or without the www.) and no variation like javaupdate.com.

In the past, professionals have disdained automatic updates and that’s fine for them. Let them micromanage if they will, but for the average user, I break with my colleagues and suggest automatic updates might prove safer. The reason is that if you already trust a program, then its updates are reasonably safe as well. At worst, you may get a message saying that FireFox must be restarted, although if you don’t restart immediately, the updates will kick in after you quit your current session.

Apple and Microsoft occasionally check for updates. While I approve of the automatic mode, I suggest running the update check one time manually so you know what to look for.

RansomWare

Thus far we’ve discussed the simplest form of ransomware that merely subverts your browser. At present, you’re more likely to encounter web exploits than the really nasty kind that takes over your computer by encrypting files and user programs.

True ransomware programs demand payments ranging from $200 to over $2300 ($475 appears average) in untraceable digital payments, up to tens of thousands of dollars when targeting hospitals, corporations, and crippled city and county governments. There is no single flavor of ransomware. At least half a dozen strains are extant plus offshoots and variants. Each makes up its own rules and demands. Early models sought cash transfers via Western Union and later Ukash, MoneyPak, and PayPal My Cash, but nearly all now demand payment in anonymous digital money– BitCoin.

The other characteristic found in most ransomware is the imposition of a deadline, after which the bad guys state they’ll refuse to restore your files altogether and at least one variant claims it will permanently ruin your hard drives, not merely beyond recovery but beyond formatting (a highly dubious claim).

The time limit serves one primary purpose, to apply pressure and rattle the victim, to preclude the user from thinking his way out of the dilemma. A time limit makes it difficult to gather information, tools, and help. The target may not have sufficient opportunity to order recovery tools or a second drive to work from or a create a bootable disc.

Besides your backup, you will need a reinstallation disc. These days, few computers come with installation DVDs. Some computers feature a bootable partition that contain tools and recovery programs. In other cases, you must download a so-called ISO file from the internet to burn to an optical drive (Blu-Ray DVD, etc)– but you can’t safely do that from your compromised system– you either need to boot from a trusted drive or ask someone to download a recovery ‘disc image’ for you.

As far as the threat to permanently wreck a hard drive, it’s hypothetically possible but unlikely. Black hats may alter your boot tracks or drivers, but those can be repaired with a disc formatting program. In the unlikely case that bad guys were to zap your drive’s firmware, they’d have to strike after the time limit they imposed. Long before then, an aware user should have powered down his computer.

Demanding Money with Menaces

British use the term “demanding money with menaces” regarding blackmail, extortion, and kidnapping for ransom. The threat of ransomware is clear: If you don’t pay, you lose your files. But if you do pay, you may still lose your files. Damned if you do, damned if you don’t, the track record is not good.

Beyond the substantial risk a victim will never see his files after payment, there are sound reasons for not paying or attempting to communicate in any way. The victimized may inadvertently expose more information than realized such as passwords and bank account information. My colleague Thrush says paying or trying to reach out tells the bad guys “they have a live fish on their line.”

If a victim attempts to reach his bank on-line, an infected computer can forward passwords and account information to the miscreants. Because the bad guys have control of their subject’s computer, they may be able to extract injurious information. A wise solution is to quickly disconnect from the internet to interrupt the outflow of information.

One-Way Communication

Security consultant Alain Marchant says about 12½% of victims opt to pay, but less than ⅗ of those cases see the return of their files even after payment. He suspects the percentage may be considerably worse because of under-reporting.

Marchant’s stats are highly consistent with FireEye reports. He attributes failures to restore hostage files to a number of factors.
  • There may be no hidden server that can unlock the files. The victim has only the criminal’s word such a server exists. Maintaining servers exposes the bad guys to risks they may not be willing to take.
  • Perpetrators may simply not bother. A one-man operation can easily bring in a minimum of thousands of dollars (or euros or pounds) a day, millions a year without lifting a mouse-finger. An extortionist whose biggest problem is hiding money from authorities may feel no obligation to release hostage files.
  • Hidden servers, if existing at all, may be taken down by its ISP, by government raid, by weather, by a denial-of-service (DoS) attack, by power failure or other outage, or by the bad guys themselves to evade detection. Perpetrators, particularly those on the move, may rely on laptops that are on-line only for brief periods. A perpetrator who can’t connect can’t repair the damage.
  • Because of a restricted ability to test malware, perpetrators’ programs may be bug-ridden and unable to recover the data. FireEye reports that files encrypted and then decrypted by TeslaCrypt turn out corrupted.
  • Perpetrators may not have the sharpest grasp of time zones, which may cause a premature trashing. Problems are exacerbated within one time zone of the Greenwich meridian and worldwide during daylight savings time changes. Ransomware does not take into account weekends, holidays, and banking hours.
  • Perpetrators may not have the sharpest grasp of exchange rates. For example, a ransom page may demand $300, but with worldwide reach, may receive $300 Canadian instead of US dollars and therefore not release the files.
  • Victims’ machines may be knocked off-line by the same problems above that affect perpetrators’ servers.
  • Victims’ drives may be so badly damaged, that recovery becomes impossible. Moreover, perpetrators may encrypt the very keys or tokens victims need to communicate with their bank.
  • Victims usually don’t possess a clear understanding of bitcoins. Some attacks require users to install modified TOR browsers to arrange payments. While these measures help perpetrators hide from authorities, victims lose time and possibly their files while trying to figure out the process.
  • Victims’ anti-virus software may belatedly catch and delete the ransomware program making recovery impossible.
  • Multiple malware infections may collectively interfere with each other. Victims may inadvertently exacerbate the problem by researching malware on the internet, triggering secondary infections that make recovery impossible.
  • Victim’s computers may reinfect themselves as drives are brought on-line.

Recovery

Clearly the odds of recovery are better with anti-ransomware programs, assuming data hasn’t been deliberately damaged beyond encryption. If at all possible, create and work from an external drive. You may find better success removing the computer’s hard drive and hooking it up to a clean computer. The idea is to keep the virus dormant while attempting to remove it and correct the damaged files.

At the end of the countdown period (typically 72 or 96 hours), some malware strains sabotage the rest of the hard drive, erasing boot tracks and directories. Marchant suggests it might be possible to turn back the clock in a PC BIOS by several hours to extend the period of analysis and recovery. For this to work, the computer must remain disconnected from the internet.

If there is an extant key, it may not reside in a remote server at all but could be buried in your machine. That can help assist programs in decryption.

Following are a few Mac and Windows resources to help in preventing and recovering from ransomware.

Be safe out there!

10 April 2016

RansomWare 2,
Vampires and Zombies


 WARNING  Last week, we discussed a particularly vicious type of virus, one that poses a severe risk to your computer’s contents. It’s called RansomWare and it’s coming to a computer or cell phone near you. This week, we offer specific steps to protect yourself.

Zombies vs Vampires
To infest and infect, one of the givens of vampires is that they must be invited into one’s home. Dracula and his ilk may mesmerize or seduce, but only when a victim throws open the window can the creature waft in.

Viruses– and more typically a variant called Trojan horses– work the same way. A colleague hands the victim a flash drive, or she (or he) clicks a disguised download button or the attachment of an email. Voilà, she’s unknowingly invited the devil into her life.

Sometimes the effects are relatively minor– they may quietly turn the target into a zombie server, a computer that sends out spam, illicit files, and even malware without the owner’s knowledge. The truly bad infections can suck the lifeblood out of the system. Ransomware falls into this latter category.

Recently, Dale Andrews received an apparent email from Velma with an attachment. Strange… she rarely emails and I knew our secretary hadn’t emailed anything since the beginning of the year. Fortunately Dale didn’t open the attached payload. It may have been nothing more than a Nigerian scam letter… or it could have been considerably worse.

Pleadings

My colleague Thrush keeps enough computers to power Bulgaria, nearby Serbia and Romania. He thinks like a pro; he takes security very seriously.

His friend Mark phoned– he’d been hit with ransomeware. Arriving home in the evening, Mark had sat down at his computer, tired and less than alert. One of his emails raised the spectre of a lawsuit; it included attached court documents.

He downloaded them and… innocently unleashed the wolves. Whatever had been attached, they weren’t pleading papers. A screen popped up… his computer had been encrypted by ransomware, demanding a few hundred dollars to return his goods.

The man immediately detached his computer from his local network (LAN), one that included his backup mechanism and his wife’s computer, which fortunately contained their most critical files. His desktop was done for, but quick action saved their most important files.

Defense

The best protection against malware (malicious software) and ransomware in particular is to prepare your fortress now.

I. Backups

Back up, back up often. I previously mentioned it’s critical to back up to drives or discs that can be detached. The reason is that if your backup drive is on-line when malware strikes, you could lose your backup and everything on it.

A simple strategy used in the early days of computing is to make grandfather-father-son backups: You cycle through your discs (or tapes or other media) reusing your oldest backup each time. This includes one vulnerability in that you may back up defective or damaged files without realizing it. For that reason, archive a backup each month or so. Tuck it in a drawer or bank vault and exclude it from the recycling.

Consider using Blu-Ray discs with write-once technology. Those discs are not only less expensive than rewritable discs, they’re safer in that they cannot be later altered and their life span could last for decades.

The Macintosh includes a backup program called Time Machine. It can operate in manual mode, which is useful for detachable drives. It also offers a continuous mode in which changed files are backed up every hour to an attached drive, the cloud, or a NAS (network area storage) unit. Continuous backing up is great unless ransomware attacks the backup files.

A method of safe continuous backup is possible for desktop computers using these steps:
  1. Ensure files you want backed up are either in your public folder or outside your home folder altogether. In other words, make sure items to be backed up are visible beyond the confines of your user folder.
  2. W-D USB back-up drive
    W-D My Passport back-up USB drive
    Establish another user account called Backup. If set up properly, it should be able to see the files and folders you want backed up. Keep things pure. Do not use this account to surf, read email, or shop on-line.
  3. Attach a back-up drive, cloud storage, or NAS using a password. Only the Backup account should have the passwords readily available. Don’t access these drives from your main user account(s). (Western Digital external drives not only provide good back-up programs, they also allow the drive to be password protected.)
  4. Start the back-up program, providing its security services with passwords if needed. Don’t log off the Backup account when returning to the main user account.

While you’re working, the Backup account will quietly save your data. If you are attacked, malware won’t be able to get at the back-up drive. You need only consider this for continuous automatic back-up programs like Time Machine.

II. Modems, Routers, and Firewalls

The Backup account acts as a sort of firewall to seal off back-up drives from the rest of the machine. Chances are your router as well as your computer contain software firewalls. Because of the variety of manufacturers, I won’t attempt to address specifics other than to suggest learning how or seeking help in using them.

With the router, keep open ports to a minimum. Use long passwords for both your modem and your router. Be careful whom you let into your network. Some wireless routers allow ‘guests’ with imposed limitations. If both your router and your guest’s computer, tablet, or phone features a WPS button, you can permit guests to connect without giving out a password.

III. Computer Settings


Besides judicious sharing and firewall settings, a seemingly minor option offers major potential. By default, both Windows and the Mac don’t display common extensions (.doc, .rtf, .gif, .mp3, .exe, .app, etc.) An invisible extension might look a little prettier, but that extra piece of information might help you save your computer.

Say you get a breezy email purportedly from a friend containing an attachment called FamilyFotos.jpg. You start to open it but, if you’ve activated the showing of extensions, you’ll see the full name is FamilyFotos.jpg.app … uh oh!

Or, say you visit SexyBuns.com, download HunkyGuys.mp4 (yes, I’m talking about you, Jan Barrow Grape of 103 Rodekyl Lane, Armadillo, Tx 78657) and spot that the complete file name is hunkyguys.mp4.exe

These are big clues that those files are not friendly.

Show extensions by visiting Control Panels Files and Folder Options (Windows) or Finder Preferences (Mac) and checking the appropriate box. Now you can have more confidence that LegalPapers.pdf is truly what it claims.

MacOS Finder prefs
MacOS X show extensions
Use extra caution with .doc and .docx files. Unknown files may contain malicious macros and may even suggest you turn macro support on if it’s not. More recent variants reportedly can leap the divide from MS Word to infecting the rest of your computer.

If you wish to peek at unknown Word files, use WordPad (Windows) or TextEdit (Macintosh) or equivalent text processors that ignore embedded macros. Whenever possible, use .rtf instead of .doc as a far safer alternative.

Windows File and Folder Options
Windows hide extensions
Email filtering not only keeps annoying mail out of your in-box, but it can also provide a line of defense against malware. Even if you blacklist/whitelist, keep in mind that bad guys may have hijacked a friend’s contacts list and try to spoof their address relying upon your trust.

IV. Too Helpful

Be wary of too-helpful emails and pop-up windows that offer updates to Flash, Silver Light, or Java, and especially shortcut links to your banking web site. If you receive an email supposedly from PayPal, your financial institution, HealthVault, IRS, Social Security, or other site containing personal and financial information, don’t click on any embedded links. Instead, type in the URL address yourself to be assured you’re not accessing a ‘spoof’ site trying to trick personal information from you.

virus infection irony
Consider the irony
Notices urging upgrades– usually employing pop-up menus– can serve as fronts for malware. Don’t fall for the false convenience. Be cautious of notices your computers has been infected with a virus. If your browser screen locks up, get help. Don't call the toll-free number on the screen.

Such notices may try to trick you into installing nasty stuff. If you think you might need a newer Flash player or Java component, then hie directly to their web sites and check for download versions.

V. AntiVirus Protection

Obtain a good anti-malware suite, either free (like AVG) or from Kaspersky Lab, Symantec/Norton, BitDefender, Malwarebytes, or WinPatrol. They each take different approaches. BitDefender’s defense works as a sort of vaccine. The free Panda Ransomware Decrypt Tool tries to restore deliberately damaged files.

If at all possible, remove the wounded drive from its computer, or create and boot from an external drive to work on the damaged device. It’s possible the infection has altered the boot sectors of your hard drive. If you’re able to decrypt your damaged files, move them to a safe place and totally reformat the damaged drive.

The Myth of Customer Service

One of the internet ‘memes’ floating around the web speaks of ransomware ‘customer service’. This irresponsible wording is tantamount to insisting a rapist gives good customer service if he doesn’t kill the victim. Even professional developers who should know better use this expression, an indication of naïveté rather than an expert opinion. A paid criminal that restores files only 50-60% of the time does not exhibit good customer service.

More on that next week. In the meantime, avoid zombies, vampires, and malware.

03 April 2016

RansomWare 1,
The Threat


 WARNING  A particularly vicious type of virus poses a severe risk to your computer’s contents. It’s called RansomWare and it’s coming to a computer or cell phone near you.

Although no longer engaged in software design, I enjoy keeping an eye on technology. RansomWare had risen on my radar as an up-and-coming annoyance, but I hadn’t appreciated the level of threat it’s become.

Virus sophistication has risen from the early cutesy messages to vandalism to zombie-bots… hidden programs that turn your computer into a secret spam server. In the past, viruses were largely preventable and recoverable.

That’s changed. Bad guys have figured out how to monetize infections that can wipe out your photos, movies, letters, tax records, your home and work content. They can obliterate your recorded life.

The viciousness doesn’t stop at the personal level. We know only of attacks made public, but ransomware has assailed small businesses and large, county offices, schools, charities and non-profits.

The criminals behind the scenes have no compunctions. A favorite soft target has been hospitals where lives hang in the balance. Forensic experts believe some of those penetrations were deliberate attacks from the inside. To wit, someone deliberately hand-planted a ransom virus in hospital computers.

Even police agencies have been hit and– to the disgust of many– they paid the ransom. How can criminals be stopped if police dump public money into their coffers? For all anyone knows, the attackers may have been terrorists or state-sponsored Daesh/ISIS or al-Qaeda, China or North Korea, all badly in need of euros and dollars.

Destroying a victim’s computer’s contents can ruin years, even decades of work and study, crucial research and development. RansomWare can devastate careers and ruin lives. It even takes lives, at least three known victims, father-son deaths and a student suicide.

What is RansomWare?

A type of virus or infectious malware, ransomware invades a computer, renames and encrypts your files with mathematical, non-reversible encoding. The malicious program then offers to reverse the damage in exchange for a demand ransom ranging from two- or three-hundred in dollars, euros, pounds sterling, or the equivalent in untraceable bitcoin, into thousands. If the black hats recognize a high-value target like a hospital or government agency, they may demand tens of thousands of dollars. Some programs set a three-day deadline after which they promise to wreck the machine beyond repair.

The ransom virus lingers in the target machine long after the damage is done. Worst of all, victims face a substantial probability that even if they pay the ransom, they won’t get their files back.

At present, the worst of ransomware mainly attacks Windows computers, but Macintosh and Unix/Linux users shouldn’t grow complacent. One Mac malware program contains no mechanism to restore files after payment. Black hats have already breached a major Java component (JBoss) and some ƒ-head will figure out how to devise a devastating Unix-based attack. It takes little more than catching a human in a weak or distracted moment.

W-D USB back-up drive
W-D My Passport back-up USB drive
Now is the time for all good men and women…

Kindly accept today’s article as a heads-up, a wake-up call to take steps now to deal with this eventuality. Writers among us may be able to glean facts for a fine techno-thriller, but safety comes first. We’ll be discussing
  • backup, backup, backup
  • computer settings
  • modems, routers, firewalls
  • virus prevention and ransom software
  • pop-up and email software ‘updates’
Back-up

Next week I’ll share more detail but consider immediately buying one or more external drives for backing up your important files:
  • Western Digital USB Passport series starts about $45 including Mac and Windows back-up programs.
  • Flash drives are conveniently small although speed ratings of larger capacity drives can prove excruciatingly slow. These are convenient if you concentrate on backing up your data rather than your operating system or programs, which you can presumably otherwise recover.
  • Safest and cheapest of all, you can toast a permanent copy of your data to a Blu-Ray DVD if you limit your back-up to data only. Prices start around $120 for single-layer 25gig drives and increase for dual, triple, and quad-layer models. Single-sided media cost less than a dollar a disc; dual-layered discs run less than three dollars.
The key factor is to backup weekly or as frequently as your willingness to risk your most recent data allows. Then, once you’ve taken a backup, disconnect that drive from your system so it won’t fall victim to a ransomware infection.

Take an extra moment and visit your Control Panels (Windows) or Finder Preferences (Mac). Change the default setting to show all file-name extensions. I’ll explain why next week, but it may help you catch malware masquerading as innocent files.

Stay safe. See you next week with malware vampires and zombies.

20 March 2016

Duping Delight


He lied for pleasure,” Fuselier said— Supervisory Special Agent Dwayne Fuselier, a clinical psychologist and an FBI investigator.
In this case, he was talking about Eric Harris of Columbine notoriety. But millions of people who aren’t mass murderers also lie for pleasure. They tread beyond compulsive, they go beyond obsessive– they lie for enjoyment, gratification, and amusement.

Telling Lies by Paul Ekman
Psychologist Paul Ekman says lying represents a key characteristic of the psychopathic profile. He calls it ‘duping delight’.

It’s rare for the average person to get to know a criminal mind. I’m not talking about the desperate committer of crimes or those who’ve lost their way, but people who deliberately set out to steal or defraud for no other reason than they wish to.

Oddly enough, most fraudsters I’ve personally known have been disbarred lawyers. Truly. Wait, I’m not picking on lawyers as a class nor am I providing fodder for lawyer jokes– we can do that another time if my friend Dale turns a blind eye. But for unexplained reasons that seem beyond coincidence, the major swindlers I’ve encountered have been former attorneys and one a former judge. They all hail from Florida as well, formerly a haven for con artists and scammers selling underwater parcels of land.

My friend Sharon sent me an Orlando Sentinel article titled “Husband of disbarred attorney sues her, alleging fraud, forgery.” Strange as that sounds, it barely hints at the machinations involved… you’ve got to read the article.

It put me in mind of another lawyer whom I’ll call Dr. Bob Black.

Judge Not Lest… an opinion piece

I met ‘Dr. Black’ at a local college campus. We chatted between breaks. He failed to let on he’d been disbarred, although he mentioned numerous times he’d been a judge. He shared he was raised in financial comfort and had been well educated. His relationship with his parents, especially Bob Sr, sounded complex and later left me wondering about the residual effects.

Black had bought a minor mansion in an Orlando historical district. He’d gutted it and was in the process of slicing its interior into small apartments when the Historical Society called a halt, pointing out that ruining a historical building and establishing multi-family residences in a single-family zone was forbidden. Unfazed, Black put it up for sale, advertising it as partially converted to apartments but possibly not mentioning the legal stumbling blocks.

At the time of his real estate ventures, Bob was also hawking a computer he called the Macintosh XLS. I recognized the machine as an Apple Lisa, the forerunner to the Mac, although Black claimed it was not a Lisa but a super-advanced product that outclassed other computers— especially its price of $10 000, about five times the price of a Mac at the time.

A little research showed he was buying refurbished units from a company in Shreveport, bundling them with freeware and shareware, and offering training worth “thousands of dollars.” As it happened, he was paying less than $40 for adult classes at Winter Park Tech where my friend Geri taught. Geri found herself with more than one of his victims in her classes, including one man whose wife was dying of cancer and was barely holding together emotionally.

The Scheme

Black was buying outdated, refurbished computers for a few hundred dollars, adding freeware (free software) and $40 worth of classes, and then selling them as high-end products to the unsuspecting.

Dr. Black was a snappy dresser. Even at casual gatherings he wore suits, and under his suits he wore sweater vests, not a common sight in Florida.

He liked talking to me, even when I’d call him on some of his shenanigans. When I asked barbed questions, he showed a politely bland face, no anger or irritation at all. I wondered if he masked his feelings or felt nothing at all. Did he choose me just to have one person to talk to?

He claimed to have been a judge, and apparently that was true. The ‘Dr’ part he tacked onto his name– He liked the sound of it. Beyond the connotation of ‘juris’, it had no more meaning than the ‘Dr’ in Dr. Pepper.

Judgment-Proof

Black confided he was ‘judgment-proof’ and explained he maintained real property in his wife’s name and kept all his other assets offshore. The topic of disbarment didn’t disturb him… he simply acted as if he didn’t hear those questions, although once he hinted at a political misunderstanding.

One of his controlling peculiarities was to arrange meetings with clients at odd minutes on the clock, say 9:42 or 10:13. Black claimed he was too tightly scheduled to waste appointments on the half or quarter hour.

His attitude toward ripping off people was entirely incomprehensible to most observers. Black exhibited zero contrition but especially no shame whatsoever. He displayed a bullying arrogance toward anyone he could. He may have fancied himself superior to lesser people; others were merely ants that he righteously stepped on if they got in his way. Bob seemed to typify a sociopath in every sense of the word.

The Detective and the Reporter

A pair of related calls came in on my consulting line. Geri had referred one caller, a former New York City homicide detective who’d been defrauded by Black. The other was from our local WCPX star consumer crusader, Ellen MacFarlane. The detective happened to know Ellen’s mother, a NYC judge, and her sister, a force within the New York Department of Consumer Affairs. They asked me if I would provide technical knowledge for an exposé of Dr. Bob Black.

Ellen suffered from multiple sclerosis, but she was a fighter. I sat in on the interviews, sometimes feeding her questions. Black’s strategy was to answer no question directly. If she asked him about reselling obsolete equipment, he would respond with a rambling discourse on Steve Jobs, Reaganomics, and local gardening regulations. He exhausted the lady, but Ellen managed to air the segment.

The detective wasn’t done. He sued Black and called me as a witness.

We sat waiting for Black in the judge’s chambers. At nearly half-past the hour, the phone rang. The judge put it on speaker phone: A whimpering Black claimed he was deathly ill.

The judge said, “Frankly, Mr. Black, you don’t have much credibility around this court. However, I’ll continue this case if you get a doctor’s note to me within three days.”

Upon my return to court, I bumped into Black. He always acted polite to me and he did so this time, impervious to my cool nod. This time, the parties indicated they were considering a settlement. I wasn’t called to court again so I don’t know what, if any, judgment or restitution was involved.

To say Black was a scoundrel or a rascal is to diminish the impact he had on others. The Yiddish word ‘gonif’ comes close, implying a thief and a cheat.

Most of us would like to leave the world a better place. Besides social currency, reputation is a reflection of future self, the part that remains after we’re gone. We can’t all be great authors, musicians, artists, nurses, and teachers, but we can be good people. People who don’t care are alien to the rest of us.

I’ll bracket this article with “in my opinion,” but Black made a living from cheating people. He could argue he gave naïve people what they asked for (“They should have done their homework”) and what he promised (“So what if I sold them free software and who’s to say the $40 course isn’t worth thousands”).

For all that, my greatest astonishment centered around his lack of shame. I used to attend LegalSIG, a special interest group run by a local law firm concerning matters of business and law. Black would attend, showing no chagrin, no humiliation, not the least discomfort. Most people would not put themselves through such mortification, but Black felt no discomposure. He was internally ‘judgement-proof’ emotionally as well as financially.

Friends asked why ‘Black’ singled me out to talk. Partly, people found it easy to chat with me, even confide, but also I could listen without hating him, which I suspect many of his colleagues and victims must have done. From him, of course, I heard only fragments of his exploits. He never mentioned the word ‘victims’, but hinted those who’d fallen for his schemes were weak-minded. He sometimes suggested when his prey rose up, they were unfairly trying to victimize him for being the more clever.

I can’t read a mind like his, but I began to suspect that if he dealt with emotions at all, he might have felt no wrong. He might even have believed himself entitled, that he had the right to exploit lesser humans, those who could not harm others. If so, I feel sorry for him. But I'll never know for sure.

13 March 2016

The Boorn Brothers


Leigh Lundin Last month, we brought you stories by Abraham Lincoln and Wilkie Collins about actual cases of wrongful conviction that nearly resulted in hangings. As mentioned in the articles, a few critics assumed the Collins novella, The Dead Alive, might have been based upon Lincoln’s own defense as a young lawyer. However, Collins premised his story on another American murder trial that took place in Vermont, 1819-1820.

The Boorn Brothers
Boorn Brothers
PDF
I stumbled upon the case in an interesting book published in 1932 by Yale University, Convicting the Innocent. Whatever your views regarding capital punishment, the chapters read like fiction and, apart from footnotes, don’t come off the least bit academic.

Here now is the actual case that Wilkie Collins fictionalized into his own story.

06 March 2016

WiTchcraFt


by Leigh Lundin

So Tuesday, friends invited me to celebrate a birthday with dining and a movie. Our birthday girl selected a film applauded at Sundance, a ‘Christian horror’ flick that supposedly “terrified” Stephen King– she chose The Witch.

The Witch
Critics praised it with adjectives– thought-provoking, visually compelling, deeply unsettling, intelligent, meticulously researched, historically accurate, carefully crafted, detailed, brooding, numinous, magnificent, smart, artful, gut-wrenching, creepy, atmospheric, beautifully crafted– an immense atmosphere, a little gem.

And yet, friends and I literally struggled to stay awake.

Movie audiences often regard films more positively than reviewers, or rather they side with critics who give higher ratings, but are more reluctant to agree when professionals pan movies. Rotten Tomatoes calculated an 89% approval from 160 reviewers. It’s especially beloved by the Satanic Temple, which endorsed The Witch and hosted screenings. Meanwhile, only half of 22 000 audience members liked it.

Stirring the Pot

Is The Crucible still required reading in high school? We not only read Arthur Miller’s play, we studied the history of Salem witch trials. My girlfriend lived a short oxcart ride from Plimoth Plantation, where the story begins. She suggested a tour of Salem and the nearby cemetery with its slate headstones. I entered the movie theatre looking forward to the story and its history.

Puritans were singularly unpleasant people. The English could not abide them; the Puritans could barely tolerate themselves. They detested other brands of Christians. Once, they hanged two Quaker women– as inoffensive humans as ever one might encounter– passers-by in the wrong place at the wrong time. To take them in, the local Indians must have been saints.

The film commences in 1630, ten years after the Pilgrims landed at Plymouth Rock. For context, the Salem witch trials wouldn’t come until much later, 1692.

Family Portrait

The Witch features surprisingly few Indians… zero, by my count. Instead, the film focuses on one family: husband William, wife Katherine, baby Samuel, Katzenjammer-like twins Mercy and Jonas, coming-of-age son Caleb, and beautiful, ethereal daughter Thomasin. These are the children all parents want.

Caleb follows his father, learning how to build, plant, hunt, and the work that makes a man. Sexual awakenings confuse him. He shares with his older sister a protectiveness toward the baby in the family.


 Witch language: Enochian.

The focus soon shifts to gentle Thomasin and the remainder of the story plays out through her eyes. She seems too delicate for hardscrabble pioneering, yet she works uncomplainingly.

The characters are portrayed well enough, although growing to like people only to see them destroyed is always difficult.

Double, Double Toil and Trouble

Plimoth Plantation
Plimoth Plantation
What was wrong with the movie?

Our David Dean knows something about Christian horror as evidenced by his novel, The Thirteenth Child. That atmosphere builds, mystifies, intimidates and terrifies. In comparison, The Witch merely disappoints.

To writer-director Robert Eggers’ credit, he didn’t belabor the portrayal of witches, wisely choosing to understate. Unfortunately, his deft hand lacked in other ways. My overwhelming feeling was sadness for a likeable, struggling family unraveling through little fault of their own except, you know, they weren’t Puritan enough. Sadness and boredom… and I usually admire historical detail.

Eggers would have been well-served to study writings of New England horror by H.P. Lovecraft, Charlotte Perkins Gilman, and Edgar Allan Poe. Lovecraft especially turned environment into atmosphere, forged words into weapons, nay, gnashing teeth that rend a reader’s imagination and devour hope.

Cauldron of Crises

The movie’s far bigger problem is a lack of plot. The family leaves the religious colony to homestead on their own. They face calamities in feeding themselves as crops, livestock, and hunting fail, and later, crises of conscience. William represents Job in the New World. If something goes wrong, it must be God’s will.

This isn’t a plot, it’s a premise, a series of vignettes maybe caused by witches, maybe not, barely threaded on the same spool. Worse, it’s an audience waster for anyone other than film students.

In the hands of M. Night Shyamalan, the production would likely feature a darkly intricate plot, more mystery, less ambivalence. Everyone has to start somewhere and this is Robert Eggers’s first film. But time and money are precious, and whereas we ponder the harsh lives of the Puritans, I suspect future generations will wonder why The Witch received an 89% rating.