Safety on Escalators and Crocs

This story should get filed under the “if only I had known” category:

At first, Rory’s mother had no idea what caused the boy’s foot to get caught. It was only later, when someone at the hospital remarked on Rory’s shoes, that she began to suspect the Crocs and did an Internet search.

“I came home and typed in ‘Croc’ and ‘escalator,’ and all these stories came up,” said Jodi McDermott, of Vienna, Va. “If I had known, those would never have been worn.”

Informed consent? Should we all be searching the Internet for safety information before a purchase, and can we trust the data that we find? These are deep questions that tug at the roots of compliance and safety regulations.

The first question that comes to my mind is should the Croc be held liable? Consider what comes from a
“consumer rights” perspective:

“These injuries are horrendous,” reports Early Show ConsumerWatch Correspondent Susan Koeppen. “They look like shark bites. This is a six-ton piece of machinery and if your foot, your finger or something gets caught in there, we’re talking a serious, serious injury.”

Scary! What is being done about these six-ton sharks with giant metal teeth ready to tear pedestrian toes into ribbons? Nothing, apparently. Instead, consumer advocates are going after a soft-shoe manufacturer. Consumerreports highlights the frequency of risk as well as the target group. It seems the escalator monsters prefer children:

In Japan, where 3.9 million pairs of Crocs were sold last year, the Trade Ministry asked the Colorado-based maker of Crocs to change the design of its shoes after receiving 65 complaints of Crocs and Crocs knockoffs becoming stuck in escalators between June and November of 2007. Most of the cases involved young children.

Call me crazy, but what was the rate of other soft-shoe complaints on escalators at the same time. Perhaps the problem is that escalator designers assumed steel-toed safety boots for passengers in the way that motorcycles now require helmets? Is the cost of a soft-shoe friendly escalator too much to ask? What about a child-safe escalator design? There seem to be child-safety designs exploding in every other area of the market these days, should the blame for the dangers of six-ton monsters get laid on the feet of soft-shoe wearing children?

In NY, the answer is yes. An attorney filed a USD$7 million (that’s about ten euros) lawsuit that claims the Croc manufacturer is misleading consumers:

“It’s not everyday footwear. It’s especially dangerous on escalators, and this is something (Crocs has) known about for quite some time,” Laskin said. “And they just don’t seem to be doing anything about it.”

[…]

“It’s somewhat ironic that kid after kid keeps getting the same kind of injury,” Laskin said. “And Crocs keeps on saying it’s a fluke.”

Again, I have to ask if perhaps there is something clearly wrong with the escalators if they are maiming children…but I guess the shoe company provides a more juicy or colorful target? The EESF (Elevator Escalator Safety Foundation) was formed in 1991, long before Crocs, and claims they have “reached over 4 million children, parents and teachers since inception”. That tells me the Croc situation is just a new chapter in a long-standing concern that really should be driving us towards better escalators. Maybe I’m just not seeing the Croc threat properly, but here is an alternative approach that also saves energy: shut-down any escalators unless they can pass a Croc test.

E-discovery leak upheld by Judge

ComputerWorld reports that a loss of attorney-client privilege resulted from a number of factors:

In the decision, Grimm criticized Creative Pipe for failing to take the necessary steps to ensure the privacy of its data, and for underestimating the complexity of using keyword search techniques in a legal dispute.

“The Defendants are regrettably vague in their description of the seventy keywords used for the text-searchable ESI privilege review, how they were developed, how the search was conducted, and what quality controls were employed to assess their reliability and accuracy,” wrote Grimm in his opinion.

Grimm said that Victor Stanley can use information that was mistakenly disclosed by Creative Pipe as evidence in its lawsuit. “Defendants’ protests that they did their best and that their conduct was reasonable rings particularly hollow,” he noted.

I wonder how accidental disclosure was handled in the past. This is an excellent example of how technology has fundamentally changed privacy, and an even better example of how lawyers alone (e.g. litigation) will be able to control privacy. Obviously the use of “complex” search terms coupled with technology has fundamentally altered the practice of disclosure. Who will be found at fault here? Could it be the forensics expert(s) who setup and created the search? Perhaps it will be the lawyers that failed to catch privileged documents before they were accidentally disclosed? Will it be the management team that abandoned “clawback” rights in exchange for time to “prepare” documents? Or all of the above….?

New Gpcode encryption threat

Computerworld tells of a new debate over a Trojan horse that uses encryption to demand ransom from its victims:

“Your files are encrypted with RSA-1024 algorithm,” it begins. “To recovery [sic] your files you need to buy our decryptor. To buy decrypting tool contact us at: xxxxx@yahoo.com.”

Last Thursday, a Kaspersky analyst identified as “VitalyK” said that although the company had analyzed samples of Gpcode, it wasn’t able to decrypt the files the malware encoded. “We can’t currently decrypt files encrypted by Gpcode.ak,” said VitalyK in an entry to the company’s research blog. “The RSA encryption implemented in the malware uses a very strong, 1024-bit key.”

A backup of files, of course, would render this attack useless. The bigger question, perhaps, is whether an attempt by an unknown application to use the Microsoft Enhanced Cryptographic Provider could be blocked or prompt the user for confirmation. After all, since encryption is so rare, one would think any crypto activity on a system should show up as suspicious behavior. Ah, and that’s assuming you did not catch the download and installation of the Trojan horse.

Incidentally, I am really happy to see more and more people use the term “Trojan horse” instead of just “Trojan” to describe this kind of malware. I remember this was not common some time ago and it always used to grate on me that people were using the reference completely backwards. Those who forget history…

San Jose Retail Crime Ring Busted

A massive retail crime ring in San Jose, California has been unravelled:

The Le and Vo organizations are accused of buying truckloads of stolen merchandise from crews of freelance shoplifters, repackaging the products and then reselling them throughout the United States at an enormous profit . . . until this week.

[…]

The hordes of “booster” thieves are not directly related to the crime organizations. They are independent bandits who hit store after store on a routine basis, stealing a variety of products from Safeway, Target, Walgreen’s, Longs Drugs and Savemart. They might stealthily stuff handfuls of Claritin into their clothes or boldly make off with shopping carts full of items without paying.

They would contact the Vo and Le organizations to “fence” the merchandise, receiving 25 cents on the dollar. The families were not cooperating but acted as “friendly competitors,” according to officers John Barg and Doug Gerbrandt, the lead case agents.

Nearly $6 million in stolen property was recovered following arrests along with over $100,000 in cash and luxury goods. Interesting to see that the investigation found human elements to trace and ultimately use to pull the criminals down. In short, they managed to infiltrate the crime organization by impersonating one of the booster thieves. Although there are several comments of how “sophisticated” the operations were, no technology at all (ID tags, camera surveillance, etc) is mentioned. I guess that means they were sophisticated in the sense of a regular retailer’s operational sophistication, which sadly is not usually saying a lot about security. I mean to say, the criminals were probably infiltrated by police investigators as easily as retailers were infiltrated by criminals.