Feeds

ASA to probe Big Brother golden ticket fix claims

Draw was rigged, complaints suggest

Top 5 reasons to deploy VMware with Tegile

The Advertising Standards Authority (ASA) will investigate complaints from TV viewers and newspapers that the Big Brother golden ticket draw was fixed, The Guardian reports.

One hundred golden tickets were hidden in special edition KitKat bars distributed around the UK. One lucky ticket holder would eventually secure a guest spot in the Big Brother house, which provoked a bit of light eBaying at prices up to £3k.

The eventual winner was 43-year-old stripper Suzie Verrico, who allegedly already "knew she was going to enter the house before she was selected, supposedly at random".

The UK's tabloid press has had a field day on the growing scandal. The Daily Star claims Verrico declared to drinkers in a London pub: "Watch out for me, I'm going into the Big Brother house," - before she'd won the competition.

The Sun, meanwhile, has dubbed the affair "Goldengate", and recently reported that Big Brother housemates apparently rumbled the scam when the draw was made by machine in the house's garden. Specifically, one of them claimed that the winning number randomly selected was not that corresponding to Verrico's ticket.

Other reports suggested that every ball in the machine carried Verrico's number 14, although Channel 4 later showed close-up footage of the machine which seemingly disproved this theory.

After her arrival at the human zoo, Verrico was recognised by several fellow contestants as having previously auditioned for the show on a number of occasions.

An ASA spokeswoman declared: "It has been alleged that the draw was fixed and that the winner Susie was preselected. We are investigating whether the draw was made in accordance with the laws of chance and with an independent observer as the CAP Code requires."

Big Brother big cheese Phil Edgar-Jones has already insisted: "There is absolutely no truth in any of the rumours that the golden ticket draw was a fix." ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Apple CEO Tim Cook: My well-known gayness is 'a gift from GOD'
'I have benefited from the sacrifice of others'
MEN: For pity's sake SLEEP with LOTS of WOMEN - and avoid Prostate Cancer
And, um, don't sleep with other men. If that's what worries you
Jim Beam me up, Scotty! WHISKY from SPAAACE returns to Earth
They're insured for $1m, before you thirsty folks make plans
Now: The REAL APPLE NEWS you need to know
OMG! Gravity's totes amazeballs. Calm down, George Clooney, not your film
Boffins who stare at goats: I do believe they’re SHRINKING
Alpine chamois being squashed by global warming
Let's make an app that POSTS your POO to APPLE HQ
Plus: It's OPEN WARFARE in the Linux greybeard world
Adorkable overshare of words like photobomb in this year's dictionaries
And hipsters are finally defined as self-loathing. Sort of
Not a loyal follower of @BritishMonarchy? You missed The QUEEN*'s first Tweet
Her Maj opens 'Information Age' at the Science Museum
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
The Heartbleed Bug: how to protect your business with Symantec
What happens when the next Heartbleed (or worse) comes along, and what can you do to weather another chapter in an all-too-familiar string of debilitating attacks?