Tuesday, September 27, 2016

Election Debate in the time of the Dark Net and Invisible World Wars

Picking outlaws from the airport and what a parking mess Kingsford Airport has become ... As Bob Carr used to call a spade a shovel by observing in the 1990s - "Sydney is Full " and one would have to be blind as now it is getting even fuller 🚀👨‍👨‍👧‍👧
Border force strike action is causing even more Delays ...

If you want a vision of the future, imagine a boot stamping on a human face - forever. 
~ George Orwell

Hillary is a clear winner as she did not cough once … Looks like US citizens prefer Hillary's high hill shoes on their faces...

Joint the club - No matter what he does, he'll get hammered -"Nobody will be happy no matter what he does.

In 2000, Lester Holt was an ascending anchor-reporter at Chicago's WBBM-TV, the CBS owned-station, when the last-place mess demoted him from the key 10 p.m. anchor perch.
Some colleagues from back then say he was the scapegoat du jour. Tonight, they and perhaps 100 million others will watch him moderate the first presidential debate. Not bad for a guy who hosted “The Bermuda Triangle: Startling New Secrets” on the Sci-Fi Channel in 2005.
Holt wound up at MSNBC and rose to be Brian Williams' replacement on "NBC Nightly News." That was an accident amid Williams' ethical travail. But it's no accident that the presidential debates commission selected him to be moderator tonight, even if not everyone agrees what he should do if faced with blatant lies, especially from Donald Trump.
Lester Holt faces his biggest challenge before 100 million people

'There's something he's hiding': Debate turns to Trump's tax returns...


Blindfolded Clinton Invites Debate Coaches To Attack Her With Talking Points From All Sides Onion 

Clinton camp dubs Trump a serial liar ahead of first debate Financial Times. Not a Presidential look.
Why Donald Trump Should Not Be President New York Times. Editorial. Wowsers. Not only did they endorse Clinton, but they had to make sure no one missed their memo.

"Anonymous online critics can't be easily unmasked, Kentucky Supreme Court rules": John Cheves of The Lexington Herald-Leader has an article that begins, "Anonymous critics on the internet can't be unmasked by a defamation lawsuit unless the plaintiff proves with evidence that what they said was false, the Kentucky Supreme Court ruled in a significant First Amendment decision released Thursday."You can access today's ruling of the Supreme Court of Kentucky at this link

"Facebook to 'millions of Internet users': Relax, you're not engaged in computer fraud." Alison Frankel's "On the Case" from Thomson Reuters News & Insight has this post today

Very interesting special report in last week's Economist on the growth of superstar companies--especially in tech--that dominate their sectors. Adrian Wooldridge on superstar companies--The role of regulation 
See Also Professor Bainbridge guru on regulations and too big to fail topics

Mike West - PwC gives bludgers a lesson in corporate welfare 

BIG NEWS FROM THE FBI’S LATEST FRIDAY-EVENING DUMP: Obama used a pseudonym in emails with Clinton, FBI documents reveal. “Once informed that the sender’s name is believed to be pseudonym used by the president, Abedin exclaimed: ‘How is this not classified?’. . . Abedin then expressed her amazement at the president’s use of a pseudonym and asked if she could have a copy of the email.”

Exclusive: Probe of leaked U.S. NSA hacking tools examines operative’s ‘mistake’ Reuters. Make sure to read to the end, to appreciate the tortured logic used by ‘Jim Lewis, a cybersecurity expert at the Center for Strategic and International Studies’ in order to get right back to ‘the Rooskies did it!' 

Treasury Select Committee chair urges caution on HMRC Making Tax Digital plans

Through the eyes of a master hacker turned security expert, William Langewiesche chronicles the rise of the Dark Net—where weapons, drugs, and information are bought, sold, and hacked—and learns how high the stakes have really become.
The Dark Net exists within the deep web, which lies beneath the surface net, which is familiar to everyone. The surface net can be roughly defined as “anything you can find through Google” or that is otherwise publicly indexed for all to see. The deep web is deep because it cannot be accessed through ordinary search engines. Its size is uncertain, but it is believed to be larger than the surface net above it. And it is mostly legitimate. "It includes everything from I.R.S. and Social Security data to the internal communications of Sony and the content management system at The New York Times." ... The real action on the Dark Net is in the trade of information. Stolen credit cards and identities, industrial secrets, military secrets, and especially the fuel of the hacking trade: the zero days and back doors that give access to closed networks.
Dark Net: Welcome to the Dark Net, A Wilderness Where Invisible World Wars Are Fought and Hackers Roam Free

“The machine does what you say, not what you mean. More and more ‘decisions’ are being entrusted to software, including life-or-death ones: think self-driving cars; think semi-autonomous weapons; think Facebook and Google making inferences about your marital, psychological or physical status, before selling it to the highest bidder. Yet it’s rarely in the interests of companies and governments to encourage us to probe what’s going on beneath these processes.”

Examining the costs and causes of cyber incidents, Sasha Romanosky, Journal of Cybersecurity, DOI:http://dx.doi.org/10.1093/cybsec/tyw001

Post office banking: an old idea getting a second look Christian Science Monitor 

For many years concerns about “digital divides” centered primarily on whether people had access to digital technologies. Now, those worried about these issues also focus on the degree to which people succeed or struggle when they use technology to try to navigate their environments, solve problems, and make decisions. A recent Pew Research Center report is worth reading ...

Feds: We can read all your email, and you’ll never know The Conversation email are like postcard we can read them in every virtual post office

Deep Blue Data is a repository offered by the University of Michigan Library that provides access and preservation services for digital research data that were developed or used in the support of research activities at U-M.The datasets that underlie research findings are increasingly in demand ...

Follow up to previous posting, Controversy over free journal access database keeps Sci-Hub in legal and research spotlight – Via TorrentFreak –  PDF copy of Memorandum of Law in Support of Plaintiffs’ Application for Leave to Take Expedited Discovery – Elsevier Inc., Elsevier B.V., and Elsevier Ltd. v Sci-Hub d/b/a ww.sci-hub.org, The Library Genesis Project d/b/a Libgen.org., Alexandra Elbakyan, John Does 1-99. Case 1:15-cv-04282-RWS Document 67 Filed 09/13/16 Page 1 of 13- United States District Court, Southern District of New York. 

The (3) Three Ages of Digital Media Dragons (Recycle TeenAger is My Last Stage)

In United States v. Davey, 2016 U.S. App. LEXIS 16519 (4th Cir. 2016) (unpublished), here, Davey was convicted of "for conspiracy to commit wire fraud, conspiracy to commit money laundering, and tax evasion."  The gravamen of the case was the nontax charges, with the tax charge in the indictment, proper, but added on for good measure.  (I am not sure that it would have stood as a separately prosecuted tax crime, but what do I know about that?)  I separate out the tax crime to discuss here, but in the ambiance of the trial the tax crime conviction may have been influenced by the other convictions. Tax Crime

Shu-Yi Oei, Does Enforcement Reduce Compliance? (Surly Subgroup):
In brief, the paper finds:
That enforcement is generally effective, and that deterrence (once information reporting is taken into account) largely explains observed voluntary compliance;
That an audit tends to increase compliance in subsequent periods for taxpayers who are found to owe more tax on audit;
But that emerging evidence suggests that audits may decrease future compliance by those for whom no adjustment is made on audit.
Interesting.  The last point seems to say that taxpayers conclude “They didn’t catch my mistakes, so I can get away with more!”

In United States v. Adeolu, ___ F.3d ___, 2016 U.S. App. LEXIS 16655 (3rd Cir. 2016), here, the Third Circuit held the key facts where (footnote omitted):

Adeolu's tax preparation company employed approximately fifteen people and prepared fraudulent tax returns in two ways: by selling the taxpayer an individual's personal information to fraudulently claim as the taxpayer's dependent; or, by suggesting that the taxpayer fraudulently claim a dependent that the taxpayer personally knew. According to the District Court, the individuals who were fraudulently claimed as dependents ranged in age from one to eighteen years old, including a thirteen-year-old, nine-year-old, six-year-old, and five-year-old child. (App. 1111.) 
The issue was whether that conduct justified the 2-level vulnerable victim enhancement under Sentencing Guideline § 3A1.1(b)(1), here.Tax Preparer Receives the Vulnerable Victim Sentencing Enhancement for Falsely Claiming Minor Dependents   

French Prosecutor Requests 3-year Prison Sentence for French Officials' Offshore Accounts