Feeds

Muso turfed off train for 'suspicious' set list

South West Trains objects to The Killers

Seven Steps to Software Security

A 25-year-old musician was turfed off a South West Trains service after security operatives objected to his "suspicious" set list, The Portsmouth News reports.

Bassist Tom Shaw was putting together the list for his band The Magic Mushrooms, and ill-advisedly included the word "killers" as shorthand for These Things That I've Done by The Killers.

He explained: "I got on at Fratton and there were two people who looked like they were in luminous Transport Police jackets. I sat down and they were looking over my shoulder.

"After a couple of minutes they told me I'd have to get off the train. When I asked why, they said they'd speak to me more on the platform."

He continued: "They made me get out at Fareham and when I asked what was wrong they told me to show them the piece of paper I'd been writing on. They said I'd been behaving suspiciously. I couldn't understand it. It seemed very strange, as it was just a list of songs.

"We had a gig coming up, so I was writing out what we could play. They made me explain song by song."

The other offending items included Franz Ferdinand's Take Me Out and Cigarettes and Alcohol by Oasis, but the single word "killers" evidently set alarm bells ringing, since security staff told Shaw he'd been targeted "because there had been a 'number of arrests' nearby including one man who had killed his wife".

A South West Trains spokeswoman offered: "We employ highly-professional rail community officers who work closely with the British Transport Police in protecting the security of passengers on the rail network.

"During a routine high-visibility patrol, they spoke with a passenger on the platform at Fareham station. The team clarified the nature of the individual's business, were satisfied with his explanation and the man went on his way."

She concluded: "We would like to thank him for his co-operation and understanding of the need to be vigilant in the current environment."

The The Portsmouth News has snaps of Shaw and his sinister set list right here. ®

Bootnote

Steven Stewart, Director of Corporate Communications of the Stagecoach Group, got in touch this afternoon following publication of this article. He wrote:

I am writing in connection with the above story, which makes an inaccurate reference to an individual being "turfed off" a train. Please note that his is completely untrue. He was politely asked to step off the train by our rail community officers, which he was happy to do. The train was extremely busy and this was intended to protect Mr Shaw's privacy whilst we asked him a few questions.

I would appreciate if your story was amended to reflect the true position.

Seven Steps to Software Security

More from The Register

next story
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.