Chile’s matthew shepard case: how a brutal murder changed thecountry’s mind about gay rights

On the evening of March 3, 24-year-old Daniel Zamudio was walkingthrough a park in Santiago, Chile, when a group of men beat,mutilated and left him for dead because he was openly gay. Zamudiodied from the shockingly brutal attack weeks later — but hisdeath resuscitated legislation to increase legal protection forvulnerable minorities in Chile, including homosexuals. It was, in fact, a watershed national moment. While other LatinAmerican countries from Mexico to Argentina had begun to codify gayrights, ultra-conservative Roman Catholic Church leaders had thusfar kept similar measures from gaining any traction in Chile. Butas the Zamudio horror made Chileans realize just how oppressedhomosexuals were in their South American nation, momentum began toturn.

When the long-foundering anti-discrimination legislation, nowknown as the Zamudio Law, finally passed last month, its supporterslept into each other’s arms in the Chilean Senate gallery. “Today,”said Rolando Jiménez, director of the Movement for ChileanSexual Minorities (Movhil), Chile has taken a historic step towardmitigating the injustices that affect excluded social groups.” For all its economic success, Chile’s rigid cultural conservatism,as much as its isolated geography, has long made it an outpost ofthe western hemisphere. But passage of the Zamudio Law may signalnot only a growing acceptance of gay men and women, but thecoming-of-age of a generation intent on breaking with the strictCatholic mores that steer the country’s society and politics.Suddenly, a once invisible gay and lesbian community has beenthrust into a national conversation about sexual orientation, andmany analysts attribute it to the influence of Chileans youngenough not to remember the brutal, right-wing military dictatorshipof General Augusto Pinochet, who ruled Chile from 1973 to 1990. (Read “When Bullying Turns Deadly.”) That young cohort, says Silvia Lamadrid, a sociology professor atthe University of Chile in Santiago, is considerably less inhibitedabout challenging authority — as witnessed the past two yearsby the massive student protests against Chile’s education system.”I think Chile might look something like Spain after Franco” inthat regard, says Lamadrid.

“These young people aren’t afraid.” Asif anticipating that trend, current center-right PresidentSebastián Piñera even spoke in support of gay rightsduring his 2009-10 election campaign in a bid to assure the countrythat he wouldn’t take Chile back to its reactionary past. And yet, once Piñera took office, it was evident thatactually turning that rhetoric into reality still wasn’tpolitically feasible. Young Chileans too, says Lamadrid, are awareof how far their society still has to go, especially when sexeducation is largely absent from even public schools and divorcewas legalized less than a decade ago. “In Chile, you can do manythings as long as you don’t commit the vulgarity of making itpublic,” says Lamadrid. “What happened to Zamudio could [still]happen to anyone who makes himself too public.” Karen Atala found that out eight years ago when she lost custody ofher children for daring to live openly with her lesbian partner.The Chilean Supreme Court awarded custody to her ex-husband, citingthe “psychological harm” the children would suffer if raised bylesbians. Face Lifting Machines

What’s more, the court predicted the girls would “becomeconfused about gender roles and suffer discrimination andisolation.” In March, while Zamudio was in a coma, Atala won herappeal before the Inter-American Court of Human Rights, whichordered the Chile government to pay her $50,000 in damages and$12,000 in court expenses. Veteran Chilean school teacher Sandra Pavez is still waiting forjustice. In 2007, even though Pavez was a public school teacher,the Catholic Church was able to rescind her certificate to teachreligion simply because she’s openly a lesbian. Her dismissal,after 20 years in the classroom, stirred parents and students tosupport her Supreme Court challenge, which ultimately failed. A generation ago, a setback like that was enough to silencehomosexuals. IPL Laser Machines Manufacturer

But Pavez takes solace in a future under the ZamudioLaw. “I think we are seeing Chile becoming a more tolerant countrythat respects people for who they are and not what they do in theirprivate lives,” she says. Chileans like her felt a certainbittersweet satisfaction earlier this year when Young and Wild , a film based on the cathartic writings of CamilaGutiérrez, a Chilean lesbian, won the top internationalscreenwriting prize at the eminent Sundance Film Festival.Gutiérrez was raised an Evangelical — and when herparents found out that events depicted in Young and Wild were inspired by their daughter’s life, they stopped speaking toher. Still, the Sundance recognition and the supportive tweets ande-mails that poured in from around the world and inside Chile werevindication for Gutiérrez and Chile’s gay community —punctuated by the Zamudio Law weeks later. China Cryolipolysis Machine

Before putting herinternal conflicts on paper, says Gutierrez, “I was used to livinga double life, and I had this illusion that I would be able toperpetuate that double life.” That illusion of keeping homosexuality out of sight may finally bedissipating. Perhaps the best political evidence, says AndresFoffia, executive director of Fundacion Iguales (Equals Foundation)in Santiago, was Piñera’s decision to push Congress tofast-track the dormant anti-discrimination legislation this springafter Zamudio’s death. “At the public level,” says Foffia, “thediscussion has only just begun.” Chilean legislators, in fact, saythey’re finally set to debate the President’s bill to legalize gaycivil unions. See TIME’s Pictures of the Week.

See the Cartoons of the Week.

Prince philip in hospital, misses star-studded jubilee concert – China Covert Video Cameras

Elton John sang I’m Still Standing, Stevie Wonder crooned Isn’t She Lovely, and Paul McCartney sent All My Loving asmusical royalty celebrated Queen Elizabeth II’s 60-year reign witha concert outside Buckingham Palace on Monday. But the joy wastempered by news that the queen’s husband, Prince Philip, had beenhospitalized with a bladder infection. More Related to this Story Queen s reign celebrated with pomp and eccentricity Palace officials said the prince, who will turn 91 on Saturday, wastaken to the King Edward VII Hospital in London from Windsor Castleon Monday as a precaution and will remain under observation for afew days. As the Diamond Jubilee show ended, Prince Charles took the stageand encouraged concert-goers to make some noise for his father. Thecrowd responded with a roar and chants of Philip.

The heir to the throne paid tribute to his mother, addressing heras Your Majesty Mummy and leading the crowd in three cheersfor the monarch. Despite Philip’s illness, many members of the royal family,including Charles, his wife Camilla, Duchess of Cornwall, andPrinces William and Harry sat in a royal box to watch the show,performed on a specially erected stage outside the palace. The queen was cheered as she arrived partway through the show,wearing a gold lame cocktail dress under a dark cape. It wasdecided before Philip’s illness that she would watch only part ofthe concert.

The queen is not a noted pop music fan, and appeared to be wearingyellow ear plugs as she observed the concert. Some 12,000 contest winners watched the show from an enclosed area,while a huge crowd stretched down the Mall, the wide boulevardleading up to the palace. The lineup featured a full hand of knights Sir McCartney, SirJohn, Sir Cliff Richard and Sir Tom Jones, all Sirs alongwith Dame Shirley Bassey and younger artists including JLS andKylie Minogue. The show opened in a blaze of sound and color, as a scarlet-cladmilitary band joined Robbie Williams on stage for his hit Let MeEntertain You. Black Eyed Peas star Will.i.am performed I GottaFeeling with songstress Jessie J. CCTV Box Cameras

In true something-for-everyone mode, performances ranged frompianist Lang Lang playing Gershwin to American soprano ReneeFleming to 64-year-old Grace Jones hula-hooping her way through Slave to the Rhythm. Performers from around the world sang a special jubilee songwritten by Andrew Lloyd Webber and Take That `s Gary Barlow. It was the veteran entertainers who went down best. The crowdroared along to Cliff Richard’s Congratulations, and cheeredDame Bassey singing fittingly Diamonds are Forever. Prince Harry could be seen singing along Why, why why? asTom Jones belted out Delilah, while Prince William and his wifeCatherine joined in on Sir John’s Crocodile Rock. China Covert Video Cameras

Ska band Madness performed 80s hit Our House on the palaceroof, changing the lyrics to Our house, in the middle of one’sstreet. The queen may not like to rock’n’roll but she has plenty of fansamong rock’s elite. Before the show, Elton John paid tribute to the monarch’sconstancy. She’s not trendy, she doesn’t follow any fads, John told theBBC. China Miniature Surveillance Cameras

She’s stoic, she’s brilliant, she’s wise, she’s funny, andwe’re all really happy to be here. Sir McCartney closed the concert playing Ob-La-Di, Ob-La-Da ona Union Jack guitar before the queen took the stage with her family but without Philip, who until Monday had been her constantcompanion throughout the jubilee celebrations. He had joined the queen and senior royals on the River Thames incold and blustery weather Sunday for a pageant in honor ofElizabeth’s 60 years on the throne The prince, who married then-Princess Elizabeth in 1947, has cutback on official engagements in recent years but still maintains abusy schedule. He spent four nights in the hospital over Christmasafter suffering chest pains and underwent a successful coronarystent procedure to clear a blocked artery.

The palace said Philip was understandably, disappointed aboutmissing this evening’s Diamond Jubilee Concert, as well as a St.Paul’s Cathedral service and other jubilee events planned forTuesday. I’m very sorry he’s going to miss the concert because he’s reallypart of the celebration, said Canadian tourist Marielle Demorsce. He’s part of the 60 years, he’s put in a lot of work with thequeen to appear all over the world and we love him too so verymuch. The jubilee was being marked around the world in members of the54-nation Commonwealth of former British colonies.

At the end of the concert, the queen lit the last in a chain ofmore than 4,200 commemorative beacons that have been set alight inBritain and abroad. One beacon was lit in Kenya at the Treetops Hotel, where Elizabethwas informed of her father’s death in 1952, making her the queen. Although not everyone has embraced the jubilee anti-monarchistshave protested, and some 2 million Britons used the four-dayholiday weekend to leave the country many said it gave them asense of pride. Sixty years on the throne is a remarkable achievement, said47-year-old Dean Caston, who joined the crowds outside the palaceon Monday. People knock Britain and how depressed we are, butthis weekend you can see we have got a lot to be proud of.

Kenneth van wyk: what users can do to make their smartphones moresecure – Duplex Stainless Steel Pipe

The sky is falling! The sky is falling! A lot of Chicken Littles are running around warning about the endof the world, brought about by the insecurity of mobile devices.There’s a kernel of truth there, and I myself have bemoaned the state of mobile security . But there’s also a good deal of exaggeration, born of (oftenvendor-fanned) fear, uncertainty and doubt. So, what’s a user todo? Let’s explore that a bit. Broadly speaking, you have three choices: Avoid mobile devicesaltogether, carefully select the apps you install and use, or diveright in and hope for the best.

The one sure bet is to avoid smartphones and other modern mobile devices, but that doesn’t sound like a lotof fun to me. There are a lot of really useful and ingenious appsout there, so you’d be robbing yourself of some greatopportunities. Nonetheless, using a dumb phone may well be areasonable course of action for some people. If all you seek fromyour mobile phone is the ability to send and receive voice calls,and perhaps an occasional text message, then you should find noshortage of free, carrier-subsidized dumb phones.

You would indeedhave fewer security worries, and more money in your pocket. I just don’t think that option is going to appeal to a lot ofpeople. At the other extreme, diving in without regard for safetyseems reckless. If you are hell-bent on maximizing the convenienceof your smartphone, you’ll be tempted by apps that help you manageyour money, make payments, receive payments, transfer funds — thelist just keeps going. But what sort of person does that withoutthinking about the danger of exposing sensitive information on adevice that is easy to steal or lose? Personally, I’ve taken a middle road. Carbon Steel Seamless Pipe

I do have a smartphone, butI’m careful about the apps I install. What does it mean to becareful? Since I’m in the security field myself, it means that Ivet the apps myself. But a lot of what I do can be done by justabout anyone who knows a little bit about applications. Here are acouple of things you can try. Static analysis. Duplex Stainless Steel Pipe

Maybe you didn’t realize it, but you can pokearound an app’s sandbox and take a look at what’s in there foryourself. All you need are your mobile device, a USB cable and freesoftware such as iExplorer that lets you look at the files in each app on your device. (Note:These examples are primarily for Apple ‘s iOS, but similar tools and methods can be used on Android as well.) Connect your device to your computer (Mac or Windows) and useiExplorer to peek into its files. In each app’s ~/Documents folder,you’ll find files used by the app. Some common file extensions are.plist, .db, .xml and .txt. China Alloy Steel Seamless Pipe

The first are “properties files,” whichare in an XML format and can be viewed using any text editor. Next,db files are database files — likely SQLite3 files that can beviewed using sqlite3 on the command line. The other files aremostly text files as well. Drag them onto your main computer’sdesktop (or folder) and look at them one at a time. Look, forexample, in the plist files for usernames, passwords and otherapplication credentials.

For SQLite files, try opening a commandshell and typing “sqlite3 [filename.db]”. Next, at the sqliteprompt, type “.tables” and you’ll see whatever tables are presentin the database. You can view those tables by typing “.dump[table_name]”. Again, look for usernames, passwords, etc.

Look also in each app’s ~/Library folder. In there, you’ll find aCaches folder and a bunch of other stuff. Poke through there andlook at the files. Again, look for properties files and databasefiles, as well as image files. Depending on when you last ran theapp, you may find some .jpg or .png files containing screenshots ofyour last session.

View them all. What you’re looking for are some fundamental mistakes thatdevelopers commonly make. Storing usernames and passwords inproperties files, database files, etc., is sloppy programming.(There are keychains that do a far better — though not perfect –job at securing that sort of data.) If the app you’re considering using makes such simple mistakes, youmight want to avoid it. You could contact the vendor and ask it tofix it. You could also write a review for the app store you use andlet other people know about the problems.

I have done both, becauseI’m not willing to let such easily avoided mistakes go byunchallenged. If enough people do this sort of thing, I’m convincedthat app security will improve. Dynamic analysis. This one is a bit trickier, though still nottough to do. Use a network proxy tool such as Burp Suite or OWASP’s Zap on your main computer (Windows, Mac or Linux ).

Turn on the proxy on your active Ethernet connection. Next, configure your mobile device to point its network proxy tothe IP number of the computer running the proxy testing tool. Nowyou’ll be intercepting all of your mobile device’s network traffic,and you can look inside it. Some common mistakes to look for here are sending usernames,passwords, session tokens or hardware identifiers through a networkwithout encrypting them.

Believe it or not, this is not uncommon.Another mistake that many apps make is to trust self-signed SSLcertificates (which both Burp Suite and Zap can automaticallygenerate). By not properly verifying a server’s SSL certificate,mobile apps open their users up to man-in-the-middle attacks. Thistoo is sadly not uncommon in today’s apps. If you find any of these things, they should give you pause. Ofcourse, not finding any of these mistakes is no guarantee ofsafety, but that doesn’t mean it’s not worth exploring the apps youwant to use.

Oh, and if any of the apps you want to use do make any of thesecommon mistakes, think about pointing the developers to OWASP’siGoat (for iOS developers) or OWASP’s GoatDroid (for Androiddevelopers). Both are free learning tools to help expose developersto common problems and their solutions. With more than 20 years in the information security field, Kennethvan Wyk has worked at Carnegie Mellon University’s CERT/CC, theU.S. Deptartment of Defense, Para-Protect and others.

He haspublished two books on information security and is working on athird. He is the president and principal consultant at KRvWAssociates LLC in Alexandria, Va. Read more about security in Computerworld’s Security Topic Center.

Flexible channel width improves user experience on wireless systems – China Hyundai Sat Nav

“Our objective is to maximize throughput while ensuring thatall users get similar ‘quality of experience’ from the wirelesssystem, meaning that users get similar levels of satisfaction fromthe performance they experience from whatever applications they’rerunning,” says Parth Pathak, a Ph.D. student in computerscience at NC State and lead author of a paper describing theresearch. Multi-hop wireless networks use multiple wireless nodes to providecoverage to a large area by forwarding and receiving datawirelessly between the nodes. However, because they have limitedbandwidth and may interfere with each other’s transmissions, thesenetworks can have difficulty providing service fairly to all userswithin the network. Ford DVD Sat Nav

Users who place significant demands on networkbandwidth can effectively throw the system off balance, with someparts of the network clogging up while others remain underutilized. Over the past few years, new technology has become available thatcould help multi-hop networks use their wireless bandwidth moreefficiently by splitting the band into channels of varying sizes,according to the needs of the users in the network. Previously, itwas only possible to form channels of equal size. However, it wasunclear how multi-hop networks could take advantage of thistechnology, because there was not a clear way to determine howthese varying channel widths should be assigned. Now an NC State team has advanced a solution to the problem. China Hyundai Sat Nav

“We have developed a technique that improves networkperformance by determining how much channel width each user needsin order to run his or her applications,” says Dr. RudraDutta, an associate professor of computer science at NC State andco-author of the paper. “This technique is dynamic. Thechannel width may change — becoming larger or smaller — as thedata travels between nodes in the network. China Suzuki Sat Nav

The amount of channelwidth allotted to users is constantly being modified to maximizethe efficiency of the system and avoid what are, basically, datatraffic jams.” In simulation models, the new technique results in significantimprovements in a network’s data throughput and in its”fairness” — the degree to which all network usersbenefit from this throughput. The researchers hope to test the technique in real-world conditionsusing CentMesh, a wireless network on the NC State campus. The paper, “Channel Width Assignment Using Relative Backlog:Extending Back-pressure to Physical Layer,” was co-authored byformer NC State master’s student Sankalp Nimborkhar. The paper willbe presented June 12 at the 13th International Symposium on MobileAd Hoc Networking and Computing in Hilton Head, S.C.

The researchwas supported by the U.S. Army Research Office and the Secure OpenSystems Initiative at NC State.

Researchers achieve rna interference, in a lighter package – Cosmetic Packaging Tube

To achieve this type of gene shutdown, known as RNA interference,many researchers have tried — with some success — to deliver RNAwith particles made from polymers or lipids. However, thosematerials can pose safety risks and are difficult to target, saysDaniel Anderson, an associate professor of health sciences andtechnology and chemical engineering, and a member of the David H.Koch Institute for Integrative Cancer Research at MIT. The new particles, developed by researchers at MIT, AlnylamPharmaceuticals and Harvard Medical School, appear to overcomethose challenges, Anderson says. Because the particles are made ofDNA and RNA, they are biodegradable and pose no threat to the body.They can also be tagged with molecules of folate (vitamin B9) totarget the abundance of folate receptors found on some tumors,including those associated with ovarian cancer — one of thedeadliest, hardest-to-treat cancers. Anderson is senior author of a paper on the particles appearing inthe June 3 issue of Nature Nanotechnology.

Lead author of the paper is former MIT postdoc Hyukjin Lee, nowan assistant professor at Ewha Womans University in Seoul, SouthKorea. Genetic disruption RNA interference (RNAi), a natural phenomenon that cells use tocontrol their gene expression, has intrigued researchers since itsdiscovery in 1998. Genetic information is normally carried from DNAin the nucleus to ribosomes, cellular structures where proteins aremade. Short interfering RNA (siRNA) disrupts this process bybinding to the messenger RNA molecules that carry DNA’sinstructions, destroying them before they reach the ribosome. siRNA-delivering nanoparticles made of lipids, which Anderson’s laband Alnylam are also developing, have shown some success in turningoff cancer genes in animal studies, and clinical trials are nowunderway in patients with liver cancer.

Nanoparticles tend toaccumulate in the liver, spleen and lungs, so liver cancer is anatural target — but it has been difficult to target suchparticles to tumors in other organs. “When you think of metastatic cancer, you don’t want to juststop in the liver,” Anderson says. “You also want to getto more diverse sites.” Another obstacle to fulfilling the promise of RNAi has been findingways to deliver the short strands of RNA without harming healthytissues in the body. To avoid those possible side effects, Andersonand his colleagues decided to try delivering RNA in a simplepackage made of DNA. Using nucleic acid origami — which allowsresearchers to construct 3-D shapes from short segments of DNA –they fused six strands of DNA to create a tetrahedron (a six-edged,four-faced pyramid). PBL Tube

A single RNA strand was then affixed to eachedge of the tetrahedron. “What’s particularly exciting about nucleic acid origami isthe fact that you can make molecularly identical particles anddefine the location of every single atom,” Anderson says. To target the particles to tumor cells, the researchers attachedthree folate molecules to each tetrahedron. Short protein fragmentscould also be used to target the particles to a variety of tumors. Cosmetic Packaging Tube

Using nucleic acid origami, the researchers have much more controlover the composition of the particles, making it easier to createidentical particles that all seek the right target. This is notusually the case with lipid nanoparticles, says Vinod Labhasetwar,a professor of biomedical engineering at the Lerner ResearchInstitute at the Cleveland Clinic. “With lipid particles,you’re not sure what fraction of the particles are really gettingto the target tissue,” says Labhasetwar, who was not involvedin this study. Circulate and accumulate In studies of mice implanted with human tumors, the researchersfound that once injected, the nucleic acid nanoparticles circulatedin the bloodstream with a half-life of 24 minutes — long enough toreach their targets. The DNA tetrahedron appears to protect the RNAfrom rapid absorption by the kidneys and excretion, which usuallyhappens with RNA administered on its own, Anderson says. Plastic Cosmetic Tubes

“If you take a short interfering RNA and inject it into thebloodstream, it is typically gone in six minutes. If you make abigger nanoparticle using origami methods, it increases its abilityto avoid excretion through the kidneys, thereby increasing its timecirculating in the blood” he says. The researchers also showed that the nucleic acid nanoparticlesaccumulated at the tumor sites. The RNA delivered by the particleswas designed to target a gene for luciferase, which had been addedto the tumor cells to make them glow.

They found that in treatedmice, luciferase activity dropped by more than half. The team is now designing nanoparticles to target genes thatpromote tumor growth, and is also working on shutting off genesinvolved in other genetic diseases. The research was funded by the National Institutes of Health, theCenter for Cancer Nanotechnology Excellence, AlnylamPharmaceuticals and the National Research Foundation of Korea.

‘flame’ spread via rogue microsoft security certificates – China Alloy Steel Seamless Pipe

A post on the Microsoft Security Response Center blog states plainly, We have discovered through our analysis thatsome components of the malware have been signed by certificatesthat allow software to appear as if it was produced by Microsoft. ‘Flame’ slipped under network defenses by appearing as legitimateMicrosoft code. Andrew Storms, director of security operations for nCircle , declares, The discovery of a bug that s been used tocircumvent Microsoft s secure code certificate hierarchy is amajor breach of trust, and it s a big deal for every Microsoftuser. It also underscores the delicate and problematic nature ofthe trust models behind every Internet transaction. Stainless Steel U Bend Tube

The Microsoft blog post explains that a vulnerability in an oldcryptography algorithm is exploited by some elements of Flame to make them appear as if they originated from Microsoft. Mostsystems around the world accept officially-signed Microsoft code assafe by default, so the malware would enter unnoticed. The weak algorithm is a function of the Terminal Server LicensingService, which allowed IT admins to authorize Remote Desktopservices on Windows-based networks. The algorithm in question wasused to generate security certificates with the ability to signcode so that it is accepted as legitimate Microsoft code. Microsoft is taking steps to deal with this issue. China Alloy Steel Seamless Pipe

First, itreleased the security advisory which explains the issue in detailand provides steps IT admins can use to block software signed bythe rogue security certificates. Microsoft also released an update,which automatically implements those same steps to make it easierfor customers to prevent malware using the spoofed certificatesfrom slipping through. Microsoft adds that the Terminal Server Licensing Service is nolonger capable of issuing certificates that can be used to signcode. With these steps in place, organizations can ensure that anymalware that depends on the rogue security certificates will nolonger be recognized as being from Microsoft. Stainless Steel Welded Pipes

Storms provides some further insight about the rogue Microsoftcertificate revelation. He points out that the stealthy use ofrogue Microsoft security certificates supports the theory that Flame is part of a grander state-sponsored espionage effort . A bug that can identify a piece of malware as legitimate is notsomething an average malware writer would have been able to sit onfor long–it s worth far too much on the black market. Storms adds, The fact that this bug has been kept secret for atleast 18 months, and quite possibly longer, is pretty clearevidence that there is a nation state behind Flame .

Japan arrests fugitive for 1995 tokyo subway attack – Heavy Duty Truck Diagnostic Scanner

TOKYO – Police in Japan were Monday quizzing a woman over the 1995nerve gas attack on Tokyo’s subway that killed 13 people, leavingonly one person still wanted for one of the nation’s worst evermass-murders. Police said Naoko Kikuchi was being held on suspicion of murderafter being arrested late Sunday in the city of Sagamihara, west ofTokyo, with local media reporting that officers swooped after a tipoff. Kikuchi, 40, was one of only two remaining members of the AumSupreme Truth doomsday cult still at large, and was wanted forbeing part of the team responsible for producing the sarin nervegas used in the subway attack. “It is true that I was involved in producing sarin gas, but I didnot know what we were making at that time,” she was quoted astelling police. Kikuchi’s arrest leaves only one person, Katsuya Takahashi, 54,still at large on the police wanted list. Hitachi Diagnostic Tool

In the 17 years since the deadly attack, which injured thousandsand caused havoc throughout Tokyo, Kikuchi had lived under anassumed identity, telling neighbours she worked as an accountantfor a nursing care company, reports said. Kikuchi was quoted by Jiji as telling police: “I have lived asChizuko Sakurai, but I’m relieved that I don’t have to run awayanymore.” Police said she had been living with a 41-year-old man, who was notan Aum member and who stayed with her even after she revealed hertrue identity. He was also arrested early Monday accused ofharbouring a criminal. The 1995 subway attack was one of Japan’s worst mass-murders, inwhich Nazi-developed sarin was released onto several packedrush-hour trains. The coordinated attacks at stations near the centre of Japan’s seatof government sowed panic throughout Tokyo’s heaving metro system. Heavy Duty Truck Diagnostic Scanner

The Aum cult was also responsible for an attack on the city ofMatsumoto in central Japan the year earlier, when sarin – whichSaddam Hussein deployed against the Kurds in northern Iraq – killedeight people. As well as those who died, thousands more were injured, some ofthem seriously and permanently by inhaling or coming into contactwith the gas, which cripples the nervous system. The end of Kikuchi’s life on the run came just months after thesurrender of Makoto Hirata, 47, a former Aum member who gavehimself up to officers at a police station in central Tokyo minutesbefore midnight on New Year’s Eve. Aum guru Shoko Asahara preached a blend of Buddhist and Hindu dogmamixed with apocalyptic messages, and developed an obsession withsarin gas, becoming paranoid that his enemies would attack him withit. According to prosecutors the cult wanted to disrupt police moves tocrack down on them and at the same time enact Asahara’s vision ofan apocalyptic war. DVB Remote Control

Asahara was arrested at a commune near Mount Fuji two months afterthe attack on Tokyo and sentenced to hang, having been convicted ofcrimes resulting in multiple deaths. He remains on death row. The guru used a mix of charisma, mysticism and raw power to commitone of Japan’s most shocking crimes with his disciples, whoincluded doctors and engineers educated at elite Japaneseinstitutions.