Site introduction:
MPRM Group Limited is the parent company for a:
- Security Agency (Unlimited Investigations);
- a network security IT Firm, (Mouse-House Creative Technologies); and
- a long-established Security Publishing company (The Wednesday Report).
www.mobrien.com Was created for employees, clients and guests. Since 1985 MPRM Group Limited has enjoyed solid success, thanks to our clients and marvelous people who comprised our staff over the years. This site was originally created for our employees and their families in the days when writing code was the exclusive domain of the text editor. We also employed the site as a means to communicate and share non-secure information back and forth (in the ARPA days) with our people in the field. Some of the folks who wrote that original code are with us still today.
The site is supported by our own DNS servers, MySQL server, PHP server and SMTP / POP3 mail server. Platforms are both Windows NT and Unix running Apache 1.3.6 and Apache/1.3.14 (Win32) PHP/4.0.4pl1 and occasionally Sambar Server 4.4.B5.
Since 1994 we reach out to include the general internet population and share our knowledge base and experiences (within the confines of ethical and secure parameters set out in the statutes of law.) Rich content includes a range of high-technology security topics dealing with security from both a forensic and preventative perspective. The site features extensive investigation reports, detective stories, policy, network engineering reports, special crime reports, matters of a public interest, special interest internet and general entertainment. Use "SpiderMonkey" our site search engine to search the site using keywords or expressions.
If you are seeking interactive advice or assistance, this site is fully interactive in a secure fashion. You may Privately Communicate your case through our interactive advice channels, then browse the site while security analysts evaluate your information and prepare an answer or recommendation. You might also attend our message board and participate in a forum or go to our live 24 -7 support forum at http://library.mobrien.com/. Talk to us. Tell us your situation or just browse the site.
This page has several sections of site indexing followed by some excerpts from key articles to give you an understanding of what you will find at www.mobrien.com.
Index | Family Law | Computer Security | Investigations | Commentary
Security Agency
Home ~ Tell Us Your Problem ~ Site Legal Notice
What Can We Do ~ Network Security ~ Tools ~ Understanding Firewalls
VIP Protection ~ Case Files ~ Background Checks ~ Air Services
Helicopter Types ~ Catching Cheaters ~ Personality Disorders ~ Child Murderers
About: Investigators ~ Email Help ~ Site Search ~ Global Security
Publication ~ Security Links ~ More Links ~ Your Comments
The Wednesday Report
The Wednesday Report History ~ The Wednesday Report ~ The Editor ~ Commentary ~ Canada's Navy
Defence Policy ~ Fallen Soldier ~ Avro Arrow Pic ~ Sea King Pic 1
Sea King Pic 2 ~ Aircraft Wallpaper (frames page)
Sample Issues
The Wednesday Report 1V9 ~ The Wednesday Report R9V9 ~ The Wednesday Report48V7 ~ TWR43V4 ~ TWR15V4 TWR16V4 ~ TWR48V3 ~ Comment ~ Comment 2
Classy, Sexy, Artistic Wallpaper
Aircraft Wallpaper ~ Melanie ~Sandra's Bed ~ Wall
1- Wallpaper ~ 2 - Wallpaper ~ 3 - Wallpaper ~ 4a - Sandra Bullock ~ 4b - Sandra Bullock
5 - Wallpaper ~6 - Wallpaper ~ 7- Wallpaper ~ Wallpaper Index
Classic and Contemporary Humour
Fun Pages Index Fun Pages Index. Here there is something for everyone.
What do women Want? What do women really want? For men and women, at no ones expense.
Screen Camera Uses the monitor to take your picture. Cool.
Humour pages Humour pages, from a frames page index.
Spooky PI's "Image?" Don't we think of them as being womanizing hell raisers?
Philosophy Caring and Sharing. Thought provoking articles. "Is God a Biker?"
Spice Girls Missing Spice Girls; where did they go?
Laugh at Bill Clinton Humour. Few American Presidents gave us so much gossip.
Laugh at Ourselves 10 reasons to live in each province. Canadians laugh at themselves.
Laugh at Lawyers Stupid Questionsasked by lawyers in court. You will howl.
What was it? Y2K Worries Smoke from the CPU; a shower of sparks from the monitor...
Laugh at our kids Just ask a kid ...tips on love!
Collected funnies Jokes ... nice collection
More funnies More Jokes
Hilarious And More Jokes
a.k.a. The PI's Nickname. You don't have to take this seriously.
Secure Network and Web Site Services
Add site to 150+ major search engines | Add your site URL to our search index
Search our site with SpiderMonkeye | Please add our banner to your site. click here and get the code
NSLookup | Whois Traceroute
Study remote WinNT penetration | Search engines of the world
End of index.
Some Categories:
FAMILY LAW
So. Your partner is cheating on you.
You must be feeling very awful and probably are swimming in a pool of helplessness feelings. I really feel for you.
Look at what you have learned. You are here so you must have proven already within the realm of "balance of probability" that your husband is having an extramarital affair in its incipient stage. (It really sounds quite immature.) In Civil / Family law, you do not have to prove this "beyond a doubt". That you are unhappy with the facts of his behaviour is sufficient for you to take remedial action.
If you have decided that is the case for certain, I want to get you focused on some next best steps considering you already know plenty and don't need to learn much more about your spouse's frivolity. And that's what it is: frivolous. And of course, a significant betrayal. And that hurts.
Don't despair. You can take charge of your situation; bring some personal control to the matter; and arrive at a satisfactory repair of your marriage. You know what the alternatives are so I will focus on helping you construct a plan to bring wellness back into your marriage. i.e..: fix your problem and prevent its recurrence. This is personal advice only. For legal advice, see your lawyer. Read on
Before getting into the plan, I am concerned about one aspect of self-help, sleuthing.
In most states and provinces watching and besetting another person is a criminal offence in the misdemeanor/summary offence category. It has good reason; avoiding a breach of the peace -- avoiding family violence in other words. The law tends to frown on people doing their own matrimonial sleuthing inasmuch as it would include surveillance. The reason for this is that motivation is already present and if a confrontation erupts (which in family matters is statistically inevitable) there is the makings of a premeditated violent crime. The law seeks to prevent its occurrence and deals with incipiency very harshly. Solution: Do all the digging and legwork you want but get a professional person in your local area to do your actual tailing and surveillance if needed. So now that we are past that word of caution, I would say "yes", you have a problem; and "yes" you can improve or fix it.
It is so often stated this way. The straying spouse claims to want to stay in the marriage and had no intention of leaving it but got "tangled up" somehow. If you believe your spouse loves you and has some commitment to staying within the bounds of marriage and further, seems to know the rules and has told you he has made a conscious decision to "not go outside the marriage", then look at the positive. Too often the problem is some life-passage-related quirks for which a vent has been found.
Think of this. Dieing really sucks. Facing that reality while still very much alive can cause some fairly extreme behaviour. Seemingly without reason. The victim hasn't a clue why he/she behaves that way. (Seems that men get it BAD.) The fleeting glimpse of the obvious one comes face to face with at some point in mid-life, the facing of immortality causes some people's ID and Ego to go berserk in search for youthfulness. There is a grave risk that the aftermath of a mid-life crisis sees one with nothing of the true assets built up in the first half of life. It can otherwise be a good thing. Certainly, above all, a person suffering a mid-life crisis can be extremely vulnerable.
All humans are weak and those weaknesses have focus points that some persons have an uncanny knack for detecting and focusing on, when in conquest, say for example, when a woman has decided to target a male who is married. There are lots of social anthropological studies (results filed at many universities web sites) done in this area. Search if you would like to understand this better thru Goggle, Lycos or whatever.
Looking at your spouse and correspondent, you are dealing with two people who are now stepping outside the bounds of 'niceness'; past playing by the rules. Your spouse is being very foolish and irresponsible etc.
If you have decided you want to bring your spouse back into a properly constituted matrimonial framework, then you must have no concern about his correspondent. None whatsoever. Forget her. As he must, you must as well. He must break his connections with this person. (A family counselor can explain how this is done under your circumstances. The counselor would need to mediate a resolution.)
Believe What You Know
When a spouse has a secret affair, they develop deviant, dishonest, sneaky skills. You would hardly believe you knew this person if you knew it all: the games that are played to avoid detection.
Don't argue the affair with your spouse. Your spouse has been deceiving you and is lying to you about the matter and you can't know what is and what isn't truthful among the things he tells you. There is very little point in you discussing anything of this matter with him. Why would you continue to negotiate or arbitrate on your own with a person who has already established a set of ground rules that has untruthfulness as a basis? Your mode is now action oriented and you need some outside assistance.
Don't accept "We are just friends." That you are unhappy with the facts of his behaviour is sufficient for you to take remedial action. The alleged platonic relationship is apparently not platonic. Trust your senses. It has become immaturely intimate.
You are not completely powerless. Your spouse, insofar as civil law is concerned, is liable to your action under the various matrimonial statutes where adultery is an issue of law.
Betrayal is the most important issue.
You need to ask yourself what you want to do about the fact that your spouse is carrying on outside the marriage. Ask yourself, on the evidence, is this just a fairly frivolous affair and not a deep emotional thing? Are you prepared to vacate the marriage? I would guess that you don't know what you want to do. Further, marriages usually survive affairs if there is no significant emotional betrayal. Otherwise they don't, quite honestly. I am sure you are not quite ready to accept that statement right now, because surely you are very angry. But make these thoughts the underlying root for hope and some positive solution-oriented action.
If you are concluding the above as I am then you need to find solutions that will return happiness and wellness to the matrimonial relationship; 'rehabilitate', your spouse who seems to be living in a false paradigm; and give him a new set of rules and understandings as well as proactive ingredients for making a marriage and a family work properly.
Action Oriented Solutions In Four Key Steps
It's time to build a help group or SUPPORT TEAM FOR YOU. Consult with your lawyer and your family doctor as well as family members and so on. Build a support team. Be truthful; take the high road; do not lie or exaggerate to any persons who are members of your support team. Remember: DON'T BRING THE FIGHT TO THESE PEOPLE, BRING YOUR QUEST FOR ADVICE AND SOLUTIONS. Illicit their support. Try not to be acrimonious in the face of other people. If you need to "dump" some emotions, see a councilor for yourself, on your own. That's where you can best take your hard feelings and lay them out and deal with them. And of course, a close family member, Aunt, Mom whoever; anyone you may find to be helpful and supportive.
Locate on your own what you think would be an acceptable source for family/marriage counseling. Check it out, meet the councilor alone and generally make sure you find what YOU want and a rapport that suits your self.
Having located a good marriage councilor that you like, make arrangements to see this person together with your spouse on short notice.
Confront your spouse. Inform him what you know as in the aforementioned four points on credibility and as follows:
a) You know he is lying to you about the matter and you don't know what is and what isn't truthful among the things he tells you so you refuse to accept any further explanations or excuses.
b) The alleged platonic relationship is not platonic; it has become intimate.
c) Your husband, insofar as civil law is concerned, is liable to your action under the various matrimonial statutes where adultery is an issue of law.
d) His betrayal of you is the most important issue.And...
e) You insist on immediate cessation of the illicit relationship [no further contact] and immediate attendance before a marriage councilor with a view to creating an extensive remedial plan, long term, for his rehabilitation and the re-constitution of the marriage.
Avoid argument over any of the issues with your spouse. You know what you know so why bother. The perpetrator will lie to you and talk you round in circles -- feed you lines that have been planted in his head with his own forethought and from his correspondent. You set out what you want, remain steadfast, and focus on your goal which is to fix your problem. If he refuses - go to your lawyer. Your lawyer can perhaps frame a letter as a notice that you intend to seek family-law remedies (separation, divorce and even punitive civil litigation) if he chooses not comply with your request. That is not an improper threat but the correct establishment of your position in the matter.
Stay in touch with your support group.
Micheal J. O'Brien
Good Luck!
Don't know? Ok. Here's how to catch a cheater.
Informative links: [ Family Counseling Services | Internet Abuse / CyberSex ]
End of family law section:
Computer Security
Welcome: If you are an advanced user you might enjoy playing with some of the more sophisticated toys. A small collection of free hacker (not cracker) tools is available at our Collingwood server to help you watch your favourite box for intruders. Some of these are the same devices used by crackers (the bad guys).
For the lay person we think we can explain this stuff to you and help you on your way. We suggest you go here if you do not understand or feel you have a general knowledge of how an operating system works, as well as familiarity with subjects such as:
the system registry
encryption
transmission control protocol
the Internet
Don't be shy to admit to yourself this time is a little early for a person at your present learning level to be doing system re-configuration. Read on and learn what you can without making any changes to your computer or try some of the basics.
If you intend to perform the actions explained here while you are reading, either print the section you are doing, or write the instructions down. Some actions may require a restart of the computer in which case you will not be able to continue reading this should you encounter restarting difficulties. Before undertaking any changes to your computer, please read each appropriate section carefully. And as you might expect, we take no responsibility whatsoever for any jam you might get yourself into. :o) Don't hesitate to ask for help though. Write this down: techsupport@mobrien.com in case some of the implementations hang your machine and you need help.
Read on at network.html.]
Come back here to look up any terms you might not understand:
Terminology
Abuse of Privilege
When a user performs an action that they should not have, according to organizational policy or law.
Access Control Lists
Rules for packet filters (typically routers) that define which packets to pass and which to block.
Access Router
A router that connects your network to the external Internet. Typically, this is your first line of defence against attackers from the outside Internet. By enabling access control lists on this router, you'll be able to provide a level of protection for all of the hosts "behind" that router, effectively making that network a DMZ instead of an unprotected external LAN.
Application-Level Firewall
A firewall system in which service is provided by processes thatmaintain complete TCP connection state and sequencing. Application level firewalls often re-address traffic so that outgoing traffic appears to have originated from the firewall, rather than the internal host.
Authentication
The process of determining the identity of a user that is attempting to access a system.
Authentication Token
A portable device used for authenticating a user. Authentication tokens operate by challenge/response, time-based code sequences, or other techniques. This may include paper-based lists of one-time passwords.
Authorization
The process of determining what types of activities are permitted. Usually, authorization is in the context of authentication: once you have authenticated a user, they may be authorized different types of access or activity.
Bastion Host
A system that has been hardened to resist attack, and which is installed on a network in such a way that it is expected to potentially come under attack. Bastion hosts are often components of firewalls, or may be "outside" web servers or public access systems. Generally, a bastion host is running some form of general purpose operating system (e.g., Unix, VMS, NT, etc.) rather than a ROM-based or firmware operating system.
Challenge/Response
An authentication technique whereby a server sends an unpredictable challenge to the user, who computes a response using some form of authentication token.
Chroot
A technique under Unix whereby a process is permanently restricted to an isolated subset of the file system.
Cryptographic Checksum
A one-way function applied to a file to produce a unique"fingerprint" of the file for later reference. Checksum systems are a primary means of detecting file system tampering on Unix.
Data Driven Attack
A form of attack in which the attack is encoded in innocuous-seeming data which is executed by a user or other software to implement an attack. In the case of firewalls, a data driven attack is a concern since it may get through the firewall in data form and launch an attack against a system behind the firewall.
Defence in Depth
The security approach whereby each system on the network is secured to the greatest possible degree. May be used in conjunction with firewalls.
DNS spoofing
Assuming the DNS name of another system by either corrupting the name service cache of a victim system, or by compromising a domain name server for a valid domain.
Dual Homed Gateway
A dual homed gateway is a system that has two or more networkinterfaces, each of which is connected to a different network. Infirewall configurations, a dual homed gateway usually acts to block or filter some or all of the traffic trying to pass between the networks.
Encrypting Router
see Tunneling Router and Virtual Network Perimeter.
Firewall
A system or combination of systems that enforces a boundary between two or more networks.
Host-based Security
The technique of securing an individual system from attack. Host based security is operating system and version dependent.
Insider Attack
An attack originating from inside a protected network.
Intrusion Detection
Detection of break-ins or break-in attempts either manually or viasoftware expert systems that operate on logs or other informationavailable on the network.
IP Spoofing
An attack whereby a system attempts to illicitly impersonate another system by using its IP network address.
IP Splicing / Hijacking
An attack whereby an active, established, session is intercepted and co-opted by the attacker. IP Splicing attacks may occur after an authentication has been made, permitting the attacker to assume the role of an already authorized user. Primary protections against IP Splicing rely on encryption at the session or network layer.
Least Privilege
Designing operational aspects of a system to operate with a minimum amount of system privilege. This reduces the authorization level at which various actions are performed and decreases the chance that a process or user with high privileges may be caused to perform unauthorized activity resulting in a security breach.
Logging
The process of storing information about events that occurred on the firewall or network.
Log Retention
How long audit logs are retained and maintained.
Log Processing
How audit logs are processed, searched for key events, or summarized.
Network-Level Firewall
A firewall in which traffic is examined at the network protocol packet level.
Perimeter-based Security
The technique of securing a network by controlling access to all entry and exit points of the network.
Policy
Organization-level rules governing acceptable use of computingresources, security practices, and operational procedures.
Proxy
A software agent that acts on behalf of a user. Typical proxies accept a connection from a user, make a decision as to whether or not the user or client IP address is permitted to use the proxy, perhaps does additional authentication, and then completes a connection on behalf of the user to a remote destination.
Screened Host
A host on a network behind a screening router. The degree to which a screened host may be accessed depends on the screening rules in the router.
Screened Subnet
A subnet behind a screening router. The degree to which the subnet may be accessed depends on the screening rules in the router.
Screening Router
A router configured to permit or deny traffic based on a set ofpermission rules installed by the administrator.
Session Stealing
See IP Splicing.
Trojan Horse
A software entity that appears to do something normal but which, in fact, contains a trapdoor or attack program.
Tunneling Router
A router or system capable of routing traffic by encrypting it andencapsulating it for transmission across an untrusted network, foreventual de-encapsulation and decryption.
Social Engineering
An attack based on deceiving users or administrators at the targetsite. Social engineering attacks are typically carried out bytelephoning users or operators and pretending to be an authorized user, to attempt to gain illicit access to systems.
Virtual Network Perimeter
A network that appears to be a single protected network behindfirewalls, which actually encompasses encrypted virtual links overuntrusted networks.
Virus
A replicating code segment that attaches itself to a programme or data file. Viruses might or might not contain attack programs ortrapdoors. Unfortunately, many have taken to calling any malicious code a "virus". If you mean "trojan horse" or "worm", say "trojan horse" or "worm".
Worm
A standalone programme that, when run, copies itself from one host to another, and then runs itself on each newly infected host. The widely reported "Internet Virus" of 1988 was not a virus at all, but actually a worm.
INVESTIGATION / DETECTIVE SERVICES
This is an example synopsis of a many-years-after investigation into the famous killing of a Port Hope man. For a broad selection go here.
I expect you are reading this because you have a special interest in the matter and therefore are somewhat informed. If not, you should take the time to read the fairly detailed but short account of the October 18, 1979 death of Bill Matiyek before digging into the investigative report.
If Bill Matiyek was murdered, it was not by any of the eight persons who were tried in the matter, six of whom were initially convicted and given life sentences.
Matiyek's killer never faced trial.
No court has ever adjudicated the real events of that night, so this is just our interpretation: Mr. William Matiyek was shot in defence of a third person. The man who shot Matiyek to death did so because it was told to him that the life of another was in immediate peril -- Matiyek apparently was about to shoot a man named Richard Sauve. The shooter confirmed for himself the imminent threat -- eyeballed the scene himself. Matiyek made an action to present his firearm to a shooting position -- he drew first. (This is supported by witness statements and by forensics. Read on.) And by extension, the only other (confirmed) armed person in the place shot Matiyek as a defensive act to save the life of Sauve. How the Court would deal with the real shooter of Mr. Matiyek is a matter of shear speculation. It will never happen.
That is the summary effect of every statement taken from the witnesses, including the accused. (Note: the failure of the accused to give evidence at their own trial is paramount in the entire case; another very significant contributor to the miscarriage of justice. Certainly there's a time to shut-up but also there is a time to speak-up. This failure is one that any person who ever comes before the criminal justice system should take note of. The Canadian Charter of Rights and Freedoms and the Commonwealth legal system provides the opportunity to speak in one's own defence. Frivolously discard that right at your own peril: a jury needs to hear the sincere denial of guilt to make an acquittal. A jury needs to hear you say you didn't do it and decide on your truthfulness weighed with the presented facts. The wrong-mindedness of the accused in this was not shared by their legal counsel in general. It was their own collaborative decision.)
Our data comprises a dozen legal-size file boxes. After all this time, having failed over the years to mobilize a move to rectify the injustice of the case, we release that part of our information files which are easily convertible to internet format, in summary form. My personal notebook can be found here. I warn you that the file is nearly half a megabyte and there is no logical reason for parsing it. Further, it is password protected. If you have a good reason... drop me a note and I will email back the password. Click here to apply. Ok?
Larry's, Ted's and Jason's notes are paper records only.
One of the most compelling and disheartening cases in my 20 years of sleuthing as a journalist and private detective is this matter of the Port Hope 8. We took on the investigation at the request of an acquaintance and one of the accused who (most sadly) passed away years ago now in a motorcycling accident. He died proud in the wind at the fork of a road. May he some day rest in peace.
We spent six frustrating years on the matter. Interviewed over 200 witnesses, some repeatedly; traveled considerably; did dangerous undercover work; tolerated countless liars, some very crazy and some very dangerous people; penetrated the biker world; the cop world; the bar's scene; and Port Hope itself. There are a few hundred stories to tell. None belong here.
When we first looked at the matter, the accused had already exhausted their appeals including an application to then Minister of Justice Kim Campbell (who saw no political currency in this) for a parliamentary hearing of the matter. All their efforts were rejected.
Six of the eight accused men were convicted of murder. Six lifers, three of whom didn't even know there was a firearm in the building, let alone shoot someone; and one of whom was hundreds of miles away. Some of these men to this day don't know all of what happened that night, just heard a bang per se.
The police investigation was incompetent and farcical. Two of the accused were acquitted after a year in prison awaiting trial. That's so hard to explain with reason. A third had his verdict fixed four and a half years later after pleading to accessory after the fact because he arranged 'medical attention' for the surviving shooting victim, Gary Comeau. (About the plea, what would you do given the choice between "go along with this crap or spend another 5.5 years in jail"?) Two of the three were nowhere near the bar nor the event's players that night. Five innocent persons became lifers.
Two of the convicted persons are first degree murder convicts. Evidence of pre-meditation and planning of the event was fabricated by a conspiracy of police officers, one of whom contrived and cajoled testimonial evidence, and others who by either overt act or incompetence covered up exculpatory evidence. In so doing, at least two of these individuals later received compensation of a kind. The system failed miserably and the players within look like skunks under any scrutiny.
There was no planning and deliberation for murder. Perhaps a hazing. For example, the telephone conversations between Richard Sauve from his home and Gary Comeau at the Toronto club house make it clear there was no pre-planning of a crime. Just happenstance. Comeau had even been reluctant to leave his comfortable roost that night.
Certainly, at this time before the Canadian Charter of Rights and Freedoms existed, there was an argument to be brought that there was criminal behaviour on the part of these individuals. In the thinking of the day, they should have reasonably known that a crime might be committed. With today's thinking, that is arcane practice.
For all eight of the accused, their is no remedy, save perhaps that insulated central institution of dwindling significance, the Canadian Parliament which made the nation's Criminal Code and it's awkward set of capital crime laws in the first place and has the right and the responsibility to remedy misapplication.
The unmistakable horror of Regina vs. McLeod et al is that because of the accused' affiliations, they are lesser human beings being less worthy of their human rights as promised by the general principles of law of that day recognized by the community of nations; and certainly by the subsequent Canadian Charter of Rights and Freedoms, i.e.: s. 11 "[Any person charged with an offence has the right] (d) to be presumed innocent until proven guilty according to law in a fair and public hearing by an independent and impartial tribunal."
This should mean that anyone accused of breaking the law is presumed to be innocent until proven guilty.
It should mean that the prosecution must prove beyond a reasonable doubt that the person(s) did commit the offence before he/she/they can be found guilty. The trial must also be conducted fairly before a court which is unbiased and independent of political or any other influence (s. 11(d)). (i.e.: No political imperatives should have been issued by Roy McMurtry, then Attorney General of Ontario, to get a major 'biker' conviction at any cost. Consider just how potent and outcome altering is this intervention by one of the politicians who appoints judges.) A fair trial should ensure that the rights of the accused are properly protected and that all persons accused before the Court are treated equally in fairness. This certainly did not happen. The defence, the prosecution, the judge, the politician(s) -- all being lawyers and principle players in the judicial process -- all share the blame. You can apportion it any way you want.
Some convoluted argument suggests that the "Charter" didn't exist so then 'anything goes', but the reality remains as we know today that 'anything goes' was NOT the general principle of law recognized by the community of nations in the late 80's but in fact to the contrary. The principles of law and the manner of society's thinking of that day spawned what we know as the Canadian Charter of Rights and Freedoms.
Regardless, the utmost significance of Regina vs. McLeod et alis that the six persons sent to jail are categorically innocent of the crime they were convicted of doing.
The Accused
Gary Comeau convicted of 1st degree murder Life/25
Rick Sauve convicted of 1st degree murder Life/25
Jeff McLeod convicted of 2nd degree murder/10 years
Larry Hurren convicted of 2nd degree/10 years
Armand Sanguigni found not guilty
Gordon Van Harlem found not guilty
(Murray) Merv Blaker convicted of 2nd degree/10 year
David Hoffman "Tee Hee" convicted of 2nd degree/10 year, overturned and released after 4.5 years
THE SHOOTING DEATH OF BILL MATIYEK:
Some time around 10:50 P.M. on October 18, 1978, the soon-to-be-deceased William (Bill) Matiyek sat at a small table in a bar gesturing one of his two loaded guns at a local kid named Richard Sauve while a hood from Toronto named Gary Comeau sat along side trying to talk Matiyek out of blowing them both away. As the three sat there in the bar/lounge of the Queen's Hotel in Port Hope, Ontario, others watched intently.
Matiyek was drunk and stoned on pot and amphetamine drugs. He was also fuming from a long day of getting himself hopped up on hot conversation with the locals plus some heavy duty talk with visiting members of the Outlaw Motorcycle Club. His head was swollen.
Owing to happenstance and the mischief of a certain Brian Brideau -- a local yuk Matiyek had pissed-off earlier in the day with his abusiveness -- these three characters sat together at The Queen's Hotel in Port Hope, Ontario. There was nothing inevitable about it: a tragic fluke. Matiyek, hot under the collar; Sauve scared; and Comeau a little more subdued than his usual bull-in-a-china-shop self.
Matiyek had been in the bar all day, Comeau and Sauve had arrived along with associates from their motorcycle club (the Satan's Choice Motorcycle Club) which at one time in previous history, rivaled the club Matiyek claimed he belonged to, the Golden Hawks. (Most people at the time regarded the Golden Hawks as being disbanded. Regardless, none of these boys were very "golden".)
There was a history of bad blood between them. Matiyek knew he was going to get hurt. He had confided to a gal pal (Helen Mitchell) earlier that day that he knew some of his recent rivalous actions had brought this on. He was plenty paranoid as many 'speed' abusers are. Very much pumped up.
Meanwhile, in a series of lies, exaggerations, incompetence and mischief, the word that Sauve, Comeau and a dozen or so pals had got was that a huge ambush awaited them at the Queen's Hotel. The Queen's Hotel was always filled with Satan's Choice rivals. That was nothing new. But the story was that a) members of the hated Outlaws Motorcycle Club had joined forces with the (theretofore disbanded) Golden Hawks, b) they were present at the bar in hordes, and C) were about to set upon the homes and lives of local area Satan's Choice members, then and forever after. It was something along those lines.
Sauve, a junior recruit of the Port Hope area Satan's Choice club got wind of all this from Brideau who gave the story some fairly illustrious twists. Sauve, now burdened with this allegedly red hot intelligence needed to unburden himself. He was just a junior guy and would be knee-deep if he didn't get this thing right. From his home, he called anybody and everybody he could get hold of.
The sometimes gregarious Gary Comeau got wind of the alleged Outlaw/Hawk conspiracy while watching some TV at the Toronto clubhouse. Again happenstance, there was a large gaggle of club members present. So after a hard time getting anyone interested, Gary Comeau finally convinced enough people and gathered up a posse and headed for Port Hope. Tragically, Comeau must have been bored that night.
Some of the Toronto group met Sauve at his home. Others proceeded to the bar. A few caucused at Sauve's place and then headed for the bar where they found no hordes of Outlaws but instead a fat, drunken Bill Matiyek and a couple of bewildered Outlaws doing their own thing.
After paying courtesies to each other, and once the company at Matiyek's' table left, Sauve approached Matiyek joined him at a lone, small, round table to find out just what these 'messages' were all about. Matiyek got into it fast and did a shade more than tell Sauve he had a gun and was prepared to use it.
Next, Comeau came bouncing along to see how the talks were progressing. It got worse from there.
Well, that's how it came to pass that these folks with opposing interests, armed with gross misinformation, arrived at the Queen's Hotel that night.
Not just Sauve and Comeau, but a certain Mr. Lorne Campbell, friend of Comeau and Sauve, also in the bar, knew Matiyek was armed. As a matter of foresight or malice, who knows, Campbell had already taken possession of a .38 calibre hand gun. (Holding 9mm re-loads done by a certain Bill Lavoie, the hand gun was the property of Gordon Van Harlem, a boarder at Sauve's place who was off gallivanting around Peterborough at the time he was unknowingly relieved by his landlord of his junky firearm. The gun, never found by police, is not far from the investigation scene where Campbell tossed it that night.)
Comeau had wanted to carry the piece but Campbell reluctantly stepped in and said "no". A few others had insisted "no" to Comeau, a guy known to be a hot head. The job defaulted to Campbell who was the level-headed one and would be cool if things got out of hand. Cool enough to use lethal force if needed and avoid it if not needed. They were going to thump Matiyek and run the Outlaws out of Satan's Choice territory if that was needed. That was all.
At around 11:00 P.M. that night, the armed Campbell was tipped off that things had gone seriously awry. A buddy told him a face-off was happening at the tense table in the dingy bar. His mates were being held at gun point he was told. Rick Sauve was about to lose his life to the angry, drunken Matiyek. Campbell says he believes one or both Sauve and Comeau were about to be killed by Matiyek. Campbell sent someone, or maybe that someone independently went over to the table to check it out. That person we spoke with confirmed that Matiyek was holding a gun on Sauve and Comeau. Someone else was again sent to the table to attempt to subdue the situation.
Michael Everett was capable of using substantial physical force, but upon walking to the table and surveying the situation he made an abort decision and turned, swing to his left and without much fuss, indicated to Campbell he couldn't win. Campbell made a move. It was a cold autumn night. He pulled his toque over much of his face, straightened his coat as if about to leave, then marched directly toward the door he had entered by, passing the threesome sitting at the table.
Campbell was at least the third person to come toward the table. A spooked Matiyek began to withdraw his weapon from its semi-concealed position in his left hand jacket pocket. He raised his arm, elbow even with his shoulder. His gun was tangled, snagged in the upper left lower breast jack-shirt pocket. He never fired a shot. From a position close to Matiyek and close to the exit door, Campbell, in an independent and spontaneous action shot three times toward Matiyek's head and quickly proceeded past the table and out the side door of the bar.
Comeau was wounded in the chest-shoulder area from behind by the first shot which grazed Matiyek's raised arm and neck; Matiyek, who couldn't get his gun into position fast enough, was killed instantly by the second shot which pierced his skull and ricochet one inch back from the other side of his cranium. Meanwhile the kid Sauve was stunned and scared out of his mind.
The place emptied save for a gaggle of Matiyek's local allies, foes and opportunists. Matiyek had been carrying hordes of dope. That was gathered up. So were his two firearms.
A rough plan of action was formed by these witnesses who then hustled off to the home of the bar's head drink slinger and social centrepiece, Dave Hills.
Next the local cops came on scene and from there the buffoonery of that night got worse. The crime scene was not secured and by the time the evidence man was called in, the place was a total forensic disaster.
We learned that the body of the deceased was not accompanied by a police officer, nor was proper security provided for this evidence from the time the body of the deceased was transported by ambulance from The Queen's Hotel at 11:14 P.M. on October 18, 1978, to the time of an autopsy done in Peterborough by Dr. John Whiteside on October 19, 1978 at or about 10:00 A.M. The body was accessed by civilians, (not the least of which were Rod Stewart - a local big-mouth; Gilispie, Peart and Metro Matiyek who recovered the keys to his son's truck enabling him to proceed to the Walton and recover the vehicle from the rear parking lot around 2:30 A.M.) for the removal of pills, dope and guns, keys, and later surreptitiously accessed by certain police to replace one of the guns. Read on.
No effort such as road blocks or other means were done on the night of October 18, 1978 to apprehend the killer.
The Port Hope Police Department refused to notify proper authorities, namely the Criminal Investigation Branch of the Ontario Provincial Police, until the late morning of October 19, 1978, after an autopsy had begun, even though a certain police officer, namely O.P.P. Corporal Dennis Moore (who had been called in by a baffled local evidence man named Bill Wakely who was cursed with this forensic disaster from the start) advised Samuel McReelis (who headed the Port Hope Police Department's investigation) that he should make this notification.
The investigation was poorly done. Every copper we spoke to asked us who killed Matiyek. After the conviction in November of 1979, police officers still did not know who shot Matiyek and a certain police officer, O.P.P. Corporal Terry Hall asked accused Larry Hurren what in fact had really happened at The Queen's Hotel on October 18, 1978. If Hurren would tell, Hall promised a reduced sentence. Hall was an experienced O.P.P. investigator. He must have realized that the thing was botched from the start, partly his doing. Read more at porthope8.shtml
Micheal J. O'Brien
Crime Analysis: Commentary
On the topic of shootings done by children,
Where do you stand on this? Listen to what people are saying. No one seems to be blaming the child.
Well. That's a good defence. Force the jury to look at the crime in context. Hope to save the kid's life because unlike what that kid has apparently learned, any measure of quality life is worth whatever years of rehabilitation it takes to procure it.
For the defence, based on televised evidence, I would say there is no way to avoid a conviction. Who would even want to? That wouldn't be the purpose of a realistic defence strategy. The defence needs to focus on the level of conviction and the disposition in the event of a guilt finding of a capital crime. Because it is a child offender in adult court the jury has larger issues than the crime itself to look at. That's the job of the defence team which needs to aim at avoiding a capital conviction and save the kid's life so that whatever went wrong in the kid's development can be fixed, rehabilitated.
On the first part: The court and any court officer (lawyers, judges, investigators etceteras) has a responsibility to society to deal with this crime, prima fascia, as well as in the context of the increasing occurrence of this very particular type of heinous crime, and thereafter the prevention of the crime. What's happening and why? Why is this recurring nightmare fodder for CNN coverage schedules on a near monthly basis now?
There are some theories about the problem. It is too easy for parents to allow unmonitored, non censured, multi-media entertainment to baby sit their children while the adults go off and do their 'me-first-me-only' thing. While parents put themselves first and ignore their kids' activities, those unmonitored and therefore (arguably) uncared-for-kids are exposed to an indecent amount of seemingly sanctioned violence every day in a fantasy world (TV, videos, video arcades, video games, theatres, internet, comics and even the 6:00 o'clock news.) that seems so real, so Ok, and so obsessively consuming that the child participants are not able to properly make the distinction deep in their psyche between fantasy and reality, therefore also right vs. wrong.
Children spend more time with the TV or on the Internet than they do with their parents or acquiring an education.
My personal view is that all children, as they are born, are an unadulterated gift. Angels. Children are born without a propensity for violence so where does the physical antipathy come from? Adults. The first humans the children are compelled to bond with, the parents, are the source directly or indirectly. So, most parents are allowed the convenience of having Atari, Power Rangers, Lethal Weapon... oh.. a plethora of violent multi-media babysitters. And most kids are exposed to it. And too, most kids seem ok. Right?
Maybe so, but a larger number than ever, (I suspect) as many as one in five grow up with disordered characters.
What happens when the parent's contribution of seven minutes quality time per week doesn't get through to the kid because of some genetic predisposition, environmental, mental, emotional or medical condition(s)? No bond is formed.
Without human bonding beyond the umbilical chord, the kid is a two-dimensional monster lacking empathy and having no regard for anyone. People become mere objects, useful or disposable. --
And how are we programming these conscienceless angels?. Anything that goes into their minds from time of birth to a certain time later in their lives is what the parents put there, or allow to be put there. There has been something wrong with the proper function of this process and the society that has permitted it to go astray. That becomes more clear as society has increasingly complex problems with radically demonstrative youth, guns and violence. I mean, kids always were demonstrative. That's not the issue. The new element being introduced is extreme violence. One step further, this is not just violence but a form of violence that radically seeks attention. The jury must see that and deal with it -- on behalf of the accused child, would argue the defence.
From my observations I would say that the typical avenging or hateful killer stalks its victim and kills surreptitiously. One such "monster", in Oregon, not unlike other recent past incidents, blew away its parents and then did a most horrifying public set of violence, oblivious to any social mores or the rights of others. Franticly public. Manically violent. And a kind of rage that knows no bounds. An extreme, demonstrative protest by a warped mind. Is it irreparable? The finder of fact must seek to learn this first. (In the aftermath, can the therapists fix it?)
The kids' defence ought to put first the goal of psychiatric discovery which should examine the possibility of psychopathy or other serious personality disorder as opposed to the alternative answer, severe mental disturbance. So the court is first asked to send the kid away for some serious head shrinking and evaluation. Personality disorders are incurable. Mental disturbances are curable for the most part. Psychopathy, the most anti-social of the 12/13 PD's is now in one measure or another occurring at a rate of one-in-five or more within the current young population.
The defence and the prosecution will surely know that if this kid is unambiguously diagnosed as an APD/sociopath/psychopath, and if found guilty of the offence, then the appropriate penalty as set out by the criminal statutes must be administered. I don't know of any grounds for an argument for compassion although I would certainly make sure I did my job and searched that angle.
The community within which this kind of crime occurs must realize that it has evolved a process wherein it must, with increasing frequency, deal with child-committed capital offences and administer capital punishment (either death or life-imprisonment depending on the State) or in the alternative, remedy the cause. There is no cure for psychopathy. Future prevention is the only remedy.
Society can only do its best to manage the behaviour and minimize the impact. Society should be more focused on lowering the incidence. But who knows this? It is only at the more academic level of law enforcement (oxymoron) that this is understood, and that level has no voice. Parenting is still not the issue it should be.
Oddly, psychopathy is the number one threat to society and yet society does nothing to improve parenting skills. Caring for children seems to conflict with the "bigger, better, faster, more selfish" imperatives thrown at parents by a society driven by money and success, personal self- empowerment and (dare-I-say-it) greed. This so-called 'success madness' in turn requires two-income families to drop their kids off at the day care or leave them unattended while the adults work their bones dry and then add to their time commitments the need for themselves to include more recoup-time, meanwhile, at the gym, at the golf course, at the pool hall, opera, theatre, whatever? do they truly know where their kids are? What their doing? I think not.
Children are born non-violent. They are a "tabula rasa" and as such are extremely vulnerable to the onslaught of media that is put in front of them. Angels. They have the right and the need to bond to loving, caring, sharing human beings. Denis Waitley recently wrote a book setting out a few parenting concerns that notes that the average American parents spend less than seven minutes alone, one-on-one with their child during a time when the child is responsive.
If "shrinking" the kid yields some other treatable kind of mental torment (Was he seriously abused? Brainwashed? Or emotionally troubled beyond the edge of functionality in the real world?) then the kid must be redeemed through rehabilitation. The penal system in the Scandinavian countries subscribes to a rehabilitative process that seeks a return to society after 8 years for treatable offenders, NEVER, for dangerous offenders. That too is society's responsibility for it's screw-ups.
I have thought about this and it scares the hell out of me. I hope very many people are giving it their best thought too. Carol O'Connor, you know, Archie Bunker, lost his kid to drugs. He says in a TV commercial, "Parents must do whatever it takes to get between their kids and drugs". And he means it! Should that apply to sanctioned violence as well? Guns?
On Parenting:
Over and over I ask why do we require that people have licenses to drive, or take exams to enter school, and yet we show no concern over the ability of a person to give life to and educate a child for the common good. We let children have children, put children back in homes that are unsafe in many forms, and wonder why they grow up to repeat the cycle. However, again comes the issue of individual rights vs. the common good. There are many who believe that no one has the right to tell them how to raise a child. I contend that there must be some baseline.
A child should be able to assert his independence and yet feel comforted by his parents guidelines and boundaries. I think that in an effort to make-up to kids for their non availability parents often give the child carte blanche and the child never learns what the ground rules are. It's a difficult predicament. Parents want nice things for their children and themselves, too often themselves coming first. That does require a huge double income these days. Do we stay home to raise the children with a little less or do we farm them out to daycare to have a little more? It is an issue that parents have to address. Please read more at commentary.htm and also at message_board.shtml
SpiderMonkey
Our search robot is registered among the top search engines of the world as a sophisticated software "engine" running from our primary internet server to reach out across the web and fetch content for our database (SQL) index. It is automated by our programmers to systematically traverse the World Wide Web's hypertext structure and retrieve documents; thereafter recursively retrieving all documents that are linked from within the initial target document. "Recursive" here doesn't limit the definition to any specific traversal algorithm. Even though a robot might be programmed to apply some heuristic rule to the selection and order of documents it will visit; and also spaces out requests over a long span of time; it is still a "robot". Concomitantly, normal Web browsers are not robots because they are operated by a person and don't automatically retrieve referenced documents. Robots are sometimes referred to as Wanderers, Crawlers, or Spiders. Although arguably apropos, for the lay person, these names are a little misleading if they give the impression the software itself moves between sites like a virus; this not the case. The robot is software, permanently resident in its own computer, communicating from that computer its requests for website documents from other computers (the document server(s)) upon which the target site is resident.
A search engine is a software programme resident on a computer that searches through a (usually massive) database. In the context of the World Wide Web, the word "search engine" is most often used for search forms that search through databases of HTML documents gathered by a robot.
Like most search engine service providers, for both quality and security reasons, URLs submitted by our visitors directly are stored in a temporary database before they are finally crawled and entered into the main search engine's index. We allow interested visitors viewing access to the temporary database. Use the "Pre-Index" engine here by either entering key words; entering your site name; or leave the search field blank, press "Pre-Index" and the engine will show you the entire list of recent submissions. You can see how others describe their sites and get some ideas for your own. If you have submitted your site using our Add Url form, you can check here and see how it looks. If you don't like it, remember that the final index entry will be derived from your web page, so spend your time working on your web page and it's meta-tags instead of resubmitting.
Our Crawler (Spider Monkey) visits and checks URLs during server off-peak load times and feeds the result to the index. All realms of the main database are refreshed no less than every 30 days. This temp. database is minimally crawled twice monthly and while a URL is fetched from the actual site, each entry here remains for a period of roughly 60 days to verify when and how it was submitted. Note: URLs submitted to our own Site Submit Service or submitted remotely by other authorized servers do not appear in the temp. database but can be found using the Mouse House Search Engine.
Spider Monkey abides by the Robot Exclusion Standard. Specifically, Spider Monkey adheres to the 1994 Robots Exclusion Standard (RES). Where the 1996 proposed standard supercedes the 1994 standard, the proposed standard is followed.
Spider Monkey will obey the first record in the robots.txt file with a User-Agent containing "Spider_ Monkey". If there is no such record, It will obey the first entry with a User-Agent of "*".
Before you submit your site for inclusion in our database (index), are there pages you don't want indexed? If so, put the following in the head of any web page you want excluded. Our crawler (Spider Monkey) will obey this instruction and skip the document.
<META NAME="robots" content="noindex">
Do you use meta content tags? You should at least set out the content of the page as succinctly as possible. If present, this will become the introduction to your page in the search results our visitors see. An example follows:
<meta name="Description" content="Learn, laugh and enjoy at the same time. International Information Technology firm has superb entertainment website for clients, employees and guests.">
Search Engine
Our search engine finds documents at Mouse House and throughout the World Wide Web. Here's how it works: you tell our search engine what you're looking for by typing in keywords, phrases, or questions in the search box. Our search engine responds by giving you a list of all the Web pages in our crawler's (we call it SpiderMonkey and you can read its technical details from the WWW robot registry by clicking here) index relating to those topics. The most relevant content will appear at the top of your results.
Most foul language is ignored by our Search Engine. Conclude it is not a tool for seeking porn sites.
Spider Monkey's index is a large, growing, organized collection of data comprised of Web pages, their content and location and discussion group pages from around the world. The 'index' becomes larger every day as people send us the addresses for new Web pages and as our systems administrators search for new material. We own sophisticated technology that crawls the Web daily during lower server load periods looking for links to new pages. When you use the Mouse House search engine, you search the entire collection using keywords or phrases, just like other search engines such as Yahoo or Alta Vista.
When searching, think of a word as a combination of letters and numbers. The search engine needs to know how to separate your words and numbers to seek out exactly what you want on the Internet. You can separate words using white space and tabs.
You can link words and numbers together into phrases if you want specific words or numbers to appear together in your result pages. If you want to find an exact phrase, use "double quotation marks" around the phrase when you enter words in the search box.
Micheal J. O'Brien
Some Terminology Related To Search Engines
Boolean search: A search allowing the inclusion or exclusion of documents containing certain words through the use of operators such as AND, NOT and OR.
Concept search: A search for documents related conceptually to a word, rather than specifically containing the word itself.
Full-text index: An index containing every word of every document cataloged, including stop words (defined below).
Fuzzy search: A search that will find matches even when words are only partially spelled or misspelled.
Index: The searchable catalog of documents created by search engine software. Also called "catalog." Index is often used as a synonym for search engine.
Keyword search: A search for documents containing one or more words that are specified by a user.
Phrase search: A search for documents containing a exact sentence or phrase specified by a user.
Precision: The degree in which a search engine lists documents matching a query. The more matching documents that are listed, the higher the precision. For example, if a search engine lists 80 documents found to match a query but only 20 of them contain the search words, then the precision would be 25%.
Proximity search: A search where users to specify that documents returned should have the words near each other.
Query-By-Example: A search where a user instructs an engine to find more documents that are similar to a particular document. Also called "find similar."
Recall: Related to precision, this is the degree in which a search engine returns all the matching documents in a collection. There may be 100 matching documents, but a search engine may only find 80 of them. It would then list these 80 and have a recall of 80%.
Relevancy: How well a document provides the information a user is looking for, as measured by the user.
Spider: The software that scans documents and adds them to an index by following links. Spider is often used as a synonym for search engine.
Stemming: The ability for a search to include the "stem" of words. For example, stemming allows a user to enter "swimming" and get back results also for the stem word "swim."
Stop words: Conjunctions, prepositions and articles and other words such as AND, TO and A that appear often in documents yet alone may contain little meaning.
Thesaurus: A list of synonyms a search engine can use to find matches for particular words if the words themselves don't appear in documents.
GET SOME FREE MP3 s
(MP3s are located at our download server. visit www.mbrien.com/music/ for directions. Here's just a sample of our MP3 selection for download, free.
98Degrees BecauseOfYou .mp3 (4695 kB)
America VenturaHighway .mp3 (2752 kB)
Aqua BarbieGirl .mp3 (3105 kB)
BLADE TECHNO OPENER .mp3 (9771 kB)
Backstreet Boys I'll beThe One .mp3 (4533 kB)
Backs treet Boys I Want It That Way .mp3 (3346 kB)
Bare naked Ladie If I Had 1000000 .mp3 (3205 kB)
Bare naked Ladies Brian Wilson .mp3 (3471 kB)
Beatles Help .mp3 (1664 kB)
Beatles Lennon Beautiful Boy .mp3 (2957 kB)
Beatles Lennon Imagine .mp3 (2186 kB)
Beatles Lennon Starting Over .mp3 (2883 kB)
Beatles Lennon Woman .mp3 (2564 kB)
Beatles Twist and Shout .mp3 (1849 kB)
Bob Seager AgainstTheWind .mp3 (6717 kB)
BonJov Something to Believe In .mp3 (3907 kB)
BonJovi Always .mp3 (4246 kB)
BonJovi Bed O fRoses .mp3 (4741 kB)
BonJovi Lie to Me .mp3 (4012 kB)
BonJovi This Ain't a Love Song .mp3 (3673 kB)
Boys II Men Make Love to You .mp3 (2885 kB)
BritneySpears Crazy .mp3 (3170 kB)
BrittanySpears Sometimes .mp3 (3946 kB)
Bruce Cockburn last night of the world .mp3 (4666 kB)
CarlySimon Let The River Run .mp3 (2580 kB)
Cher Believe .mp3 (3816 kB)
Chicago Beginnings .mp3 (5694 kB)
Chicago Color My World .mp3 (2161 kB)
Chicago Saturday in The Park .mp3 (2814 kB)
Chicago What Time It is .mp3 (2409 kB)
Chicago Wishing You were Here .mp3 (3307 kB)
Chris De Burgh Missing You .mp3 (2712 kB)
Christina Aguilera Genie in a Bottle .mp3 (4455 kB)
Chumbawamba Amnesia .mp3 (3937 kB)
Commodores Brick House .mp3 (3324 kB)
Counting Crows Round Here .mp3 (3976 kB)
Counting Crows Mr James .mp3 (3269 kB)
Counting Crows Omaha .mp3 (2634 kB)
Cyndi Lauper Girls Just Wanna Have Fun .mp3 (3660 kB)
Daft Punk Around the World .mp3 (6784 kB)
Destiny's Child Say My Name .mp3 (1896 kB)
Diana Ross If We Hold On Together .mp3 (2993 kB)
Eagle Eye Cherry Save Tonight .mp3 (3821 kB)
Earth Wind & Fire Boogie Wonderland .mp3 (4721 kB)
Earth Wind & Fire Fantasy .mp3 (4182 kB)
Fleetwood Mac Big Love .mp3 (2237 kB)
Fleetwood Mac Bleed To Love Her .mp3 (2484 kB)
Fleetwood Mac Everywhere .mp3 (2504 kB)
Fleetwood Mac Landslide .mp3 (3218 kB)
Fleetwood Mac Sweet Girl .mp3 (2391 kB)
Fleetwood Mac Temporary One .mp3 (2888 kB)
Foo Fighters Learn to Fly .mp3 (5713 kB)
Guess Who No Time .mp3 (2638 kB)
Guess Who These Eyes .mp3 (2734 kB)
Hall & Oates Rich Girl .mp3 (2047 kB)
Incubus Pardon Me .mp3 (5371 kB)
James Brown PlayThat Funky Music White Boy .mp3 (4081 kB)
James Taylor Anana .mp3 (4137 kB)
James Taylor Gaia .mp3 (3981 kB)
James Taylor Line Em Up .mp3 (3417 kB)
James Taylor Little More Time With You .mp3 (2793 kB)
James Taylor Up from Your Life .mp3 (2311 kB)
James Taylor Walkin My Baby Back Home .mp3 (3805 kB)
Jewel .mp3 (2895 kB)
Joe I am Canadian .mp3 (1177 kB)
Justin Hayward Broken Dreams .mp3 (4221 kB)
LFO Girl On TV .mp3 (5969 kB)
Lenny Kravitz American Woman .mp3 (4161 kB)
Maddona Music .mp3 (4980 kB)
Madonna Beautiful Stranger .mp3 (3771 kB)
Marc Anthony I Need To Know .mp3 (3686 kB)
Martin Page Light in Your Heart .mp3 (3668 kB)
Martin Page Broken Stairway .mp3 (2032 kB)
MartinPage 3 .mp3 (3759 kB)
MartinPage House of Stone & Light .mp3 (3610 kB)
Michael Jackson & Janet Jackson Scream .mp3 (4445 kB)
Michael Jackson Thriller .mp3 (5724 kB)
Mission Impossible Theme .mp3 (3315 kB)
Moody Blues I know Your Out There .mp3 (4774 kB)
Moody Blues Lean On me .mp3 (3581 kB)
Moody Blues Say it With Love .mp3 (2841 kB)
Moody Blues Vintage Wine .mp3 (2616 kB)
N Sync & Gloria Estefen MusicInMyHeart .mp3 (4260 kB)
N sync Bye Bye Bye .mp3 (3801 kB)
N sync It's Gonna Be Me .mp3 (4612 kB)
NSYNC It'sGonna Be Me .mp3 (4612 kB)
Newradicals You get what you give .mp3 (6001 kB)
New radicals You get what you give .mp3 (6001 kB)
Paula Cole I Don't Wanna Wait .mp3 (5107 kB)
Paula Cole I Believe In Love .mp3 (4057 kB)
Paula Cole Where Have All The Cowboys Gone .mp3 (4254 kB)
Phil Collins Youll be in my heart .mp3 (4130 kB)
Prozzak Strange Disease .mp3 (4141 kB)
Red Hot Chili Peppers Otherside .mp3 (6133 kB)
Rickey Martin Lavida Loca .mp3 (4885 kB)
Rod Stewart Maggie May .mp3 (4183 kB)
Rod Stewart Mandolin Wind .mp3 (3998 kB)
Rod Stewart Reason To Believe .mp3 (2966 kB)
Rod Stewart This .mp3 (3831 kB)
Rod Stewart Windy Town .mp3 (3746 kB)
Santana Maria Maria .mp3 (5247 kB)
Seal Prayer For The Dying .mp3 (3996 kB)
Shania Twain Rock This Country .mp3 (4239 kB)
Soul Decision Ooh Its Kinda Crazy .mp3 (6252 kB)
SpiceGirls VivaForever .mp3 (4959 kB)
Stone Temple Pilots SourGirl .mp3 (6123 kB)
Take That Want You Back .mp3 (2926 kB)
Temptations My Girl .mp3 (2306 kB)
Tragically Hip Bobcaygeon .mp3 (4714 kB)
Tragically Hip 700 Ft.Ceiling .mp3 (2637 kB)
Tragically Hip Ahead By A Century .mp3 (2678 kB)
Tragically Hip Don't Wake Daddy .mp3 (3696 kB)
Tragically Hip Flamenco .mp3 (2956 kB)
Van Halen Jump .mp3 (3863 kB)
VanHalen Jump .mp3 (3863 kB)
Weezer Buddy Holy .mp3 (2547 kB)
Whitney Houston & EnriqueCould I Have This Kiss Forever .mp3 (4190 kB)
Whitney Houston Im Every Woman .mp3 (3438 kB)
Whitney Houston It's Not Right But it's Ok .mp3 (4529 kB)
Whitney Houston Run To You .mp3 (3173 kB)
Whitney Houston have Nothing .mp3 (3481 kB)
Will Smith Wild Wild West .mp3 (2401 kB)
drdre California Love .mp3 (3866 kB)
drdre CaliforniaLove .mp3 (3866 kB)
id like that .mp3 (945 kB)
robbie .mp3 (999 kB)
robbie williams millenium .mp3 (3978 kB)
toni braxton .mp3 (4213 kB)
GET A NEW BROWSER, FREE
You should update your browser to obtain the full visual and multimedia benefits of this site which is best viewed at 800 x 600 resolution in true color or better.
Free from Microsoft Free from Netscape: