Border force strike action is causing even more Delays ...
Joint the club - No matter what he does, he'll get hammered -"Nobody will be happy no matter what he does.
'There's something he's hiding': Debate turns to Trump's tax returns...
DRUNKBLOGGING THE TRUMP-HILLARY DEBATE AT PJM
Blindfolded Clinton Invites Debate Coaches To Attack Her With Talking Points From All Sides Onion
"Anonymous online critics can't be easily unmasked, Kentucky Supreme Court rules": John Cheves of The Lexington Herald-Leader has an article that begins, "Anonymous critics on the internet can't be unmasked by a defamation lawsuit unless the plaintiff proves with evidence that what they said was false, the Kentucky Supreme Court ruled in a significant First Amendment decision released Thursday."You can access today's ruling of the Supreme Court of Kentucky at this link
"Facebook to 'millions of Internet users': Relax, you're not engaged in computer fraud." Alison Frankel's "On the Case" from Thomson Reuters News & Insight has this post today
Very interesting special report in last week's Economist on the growth of superstar companies--especially in tech--that dominate their sectors. Adrian Wooldridge on superstar companies--The role of regulation
See Also Professor Bainbridge guru on regulations and too big to fail topics
Mike West - PwC gives bludgers a lesson in corporate welfare
BIG NEWS FROM THE FBI’S LATEST FRIDAY-EVENING DUMP: Obama used a pseudonym in emails with Clinton, FBI documents reveal. “Once informed that the sender’s name is believed to be pseudonym used by the president, Abedin exclaimed: ‘How is this not classified?’. . . Abedin then expressed her amazement at the president’s use of a pseudonym and asked if she could have a copy of the email.”
Treasury Select Committee chair urges caution on HMRC Making Tax Digital plans
Through the eyes of a master hacker turned security expert, William Langewiesche chronicles the rise of the Dark Net—where weapons, drugs, and information are bought, sold, and hacked—and learns how high the stakes have really become.
The Dark Net exists within the deep web, which lies beneath the surface net, which is familiar to everyone. The surface net can be roughly defined as “anything you can find through Google” or that is otherwise publicly indexed for all to see. The deep web is deep because it cannot be accessed through ordinary search engines. Its size is uncertain, but it is believed to be larger than the surface net above it. And it is mostly legitimate. "It includes everything from I.R.S. and Social Security data to the internal communications of Sony and the content management system at The New York Times." ... The real action on the Dark Net is in the trade of information. Stolen credit cards and identities, industrial secrets, military secrets, and especially the fuel of the hacking trade: the zero days and back doors that give access to closed networks.
Dark Net: Welcome to the Dark Net, A Wilderness Where Invisible World Wars Are Fought and Hackers Roam Free
Examining the costs and causes of cyber incidents, Sasha Romanosky, Journal of Cybersecurity, DOI:http://dx.doi.org/10.1093/cybsec/tyw001
For many years concerns about “digital divides” centered primarily on whether people had to digital technologies. Now, those worried about these issues also focus on the degree to which people succeed or struggle when they use technology to try to navigate their environments, solve problems, and make decisions. A recent Pew Research Center report is worth reading ...
Feds: We can read all your email, and you’ll never know The Conversation email are like postcard we can read them in every virtual post office
Deep Blue Data is a repository offered by the University of Michigan Library that provides access and preservation services for digital research data that were developed or used in the support of research activities at U-M.The datasets that underlie research findings are increasingly in demand ...
Follow up to previous posting, Controversy over free journal access database keeps Sci-Hub in legal and research spotlight – Via TorrentFreak – PDF copy of Memorandum of Law in Support of Plaintiffs’ Application for Leave to Take Expedited Discovery – Elsevier Inc., Elsevier B.V., and Elsevier Ltd. v Sci-Hub d/b/a ww.sci-hub.org, The Library Genesis Project d/b/a Libgen.org., Alexandra Elbakyan, John Does 1-99. Case 1:15-cv-04282-RWS Document 67 Filed 09/13/16 Page 1 of 13- United States District Court, Southern District of New York.
The (3) Three Ages of Digital Media Dragons (Recycle TeenAger is My Last Stage)
In United States v. Davey, 2016 U.S. App. LEXIS 16519 (4th Cir. 2016) (unpublished), here, Davey was convicted of "for conspiracy to commit wire fraud, conspiracy to commit money laundering, and tax evasion." The gravamen of the case was the nontax charges, with the tax charge in the indictment, proper, but added on for good measure. (I am not sure that it would have stood as a separately prosecuted tax crime, but what do I know about that?) I separate out the tax crime to discuss here, but in the ambiance of the trial the tax crime conviction may have been influenced by the other convictions. Tax Crime
Shu-Yi Oei, Does Enforcement Reduce Compliance? (Surly Subgroup):
In brief, the paper finds:Interesting. The last point seems to say that taxpayers conclude “They didn’t catch my mistakes, so I can get away with more!”
That enforcement is generally effective, and that deterrence (once information reporting is taken into account) largely explains observed voluntary compliance;
That an audit tends to increase compliance in subsequent periods for taxpayers who are found to owe more tax on audit;
But that emerging evidence suggests that audits may decrease future compliance by those for whom no adjustment is made on audit.
In United States v. Adeolu, ___ F.3d ___, 2016 U.S. App. LEXIS 16655 (3rd Cir. 2016), here, the Third Circuit held the key facts where (footnote omitted):
Adeolu's tax preparation company employed approximately fifteen people and prepared fraudulent tax returns in two ways: by selling the taxpayer an individual's personal information to fraudulently claim as the taxpayer's dependent; or, by suggesting that the taxpayer fraudulently claim a dependent that the taxpayer personally knew. According to the District Court, the individuals who were fraudulently claimed as dependents ranged in age from one to eighteen years old, including a thirteen-year-old, nine-year-old, six-year-old, and five-year-old child. (App. 1111.)The issue was whether that conduct justified the 2-level vulnerable victim enhancement under Sentencing Guideline § 3A1.1(b)(1), here.Tax Preparer Receives the Vulnerable Victim Sentencing Enhancement for Falsely Claiming Minor Dependents
French Prosecutor Requests 3-year Prison Sentence for French Officials' Offshore Accounts