Massachusetts Gaming Commission Allows for Delayed Revere Vote

A rendering that is 3-D of proposed Suffolk Downs casino, now planned for Revere with partner Mohegan Sun (Image: Wendy Maeda/Boston Globe)

They say the house constantly wins, and appropriate now, prospective casino operators Suffolk Downs and Mohegan Sun are positively on a winning streak in Massachusetts. The Massachusetts Gaming Commission unanimously approved a waiver to the deadline that is standing operators to register applications including certified referendum results from their host communities by the end of the season.

Year more Time, Next

That December 31 due date ended up being likely to be a problem that is real the Suffolk Downs casino proposal. While the gaming payment was willing to enable the competition track and partner Mohegan Sun the opportunity to build a casino solely on land within the city of Revere, it consented that the original vote taken earlier this year was for a considerably various proposition. As such, a new vote was needed one which would not have the ability to be held ahead of the year-end deadline.

The decision was one that the panel said they made in a attempt become as fair as possible to all sides. On November 5, both East Boston and Revere voted on whether to accept a Suffolk Downs casino that could have been primarily and very nearly entirely found on the Boston side of the edge between the two communities. East Boston residents voted against that proposal, while Revere voters overwhelmingly approved it.

That left plenty of outstanding questions that are legal the most crucial of that was whether Suffolk Downs could now build a casino solely on land in Revere, which had approved a casino. The choices since then have essentially stated that the clear answer is ‘yes’ but that it’s going to be treated as being a unique project that have to be re-approved, separately from the proposal that is previous.

‘We have actually wrestled hard with trying to figure out how to reconcile the ‘no’ vote in East Boston using the ‘yes’ vote in Revere, and there’s no perfect solution,’ said Massachusetts Gaming Commission Chairman Stephen Crosby.

The waiver was the closest to that ‘perfect solution’ that the commission could show up with, taking into consideration the deadline that is tight. Mohegan Sun must still file their application being a prospective operator by the end of 2013, but a second referendum in Revere will simply take spot sometime in the next 90 days after the deadline that is original.

Boston Fires Back

Boston officials opposed the waiver, saying that the vote in East Boston should be ‘respected and maintained’ in a letter to the payment. In addition, incoming Boston Mayor-elect Martin Walsh has said that he’sn’t yet ruled out of the possibility of taking action that is legal this second casino proposition in Revere.

But Revere Mayor Dan Rizzo has expressed confidence that the residents of his city will not only get to vote in the new casino proposal, but that they can back it with the same form of support they did 1st time around. On 5, 61 percent of Revere voters agreed to endorse the Suffolk Downs casino proposal, though it’s not clear if that support will increase or fall now that the casino will actually be in Revere november.

Should the proposal that is new approval from voters and regulators, it will become the second project to compete for the one available eastern Massachusetts casino permit. One other casino proposal for the reason that area is located in Everett, and would be operated by Wynn Resorts. That project just passed the suitability quotient associated with gaming commission’s investigations.

Polish Computer Programmers Sentenced for Cyber Blackmail Threats

They might look happy and carefree here, but Polish computer coders Patryk Surmacki, 35 (left) and Piotr Smirnow, 31 (right) meant no good when they authorized cyber attacks on two casino sites (Image: Cavendish Press)

Two Polish computer programmers who attempted to blackmail two major unnamed on-line casino sites one in the UK and something in america have now been sentenced to prison, after a police sting nabbed the pair earlier this year.

False Pretenses

Piotr Smirnow, 31, and Patryk Surmacki, 35, approached who owns the UK site and requested a meeting. The victim whom has A internet that is manchester-based casino met the set underneath the comprehending that Smirnow possessed a business proposition for him. He’d known the set for four years before the proposed business meeting, according to authorities reports.

But things took an ugly turn when, during the meeting which took destination at Heathrow Airport’s Terminal 5 the computer programmers demanded a 50 per cent share for the man’s business and threatened to take the casino site down’s servers if he declined.

The set told the owner that they knew a notorious computer hacker by the name of ‘Wapo’ in the U.S., whom they claimed would carry out the cyber-attack on the business’s servers if the pair paid him to do this, therefore stopping the operations of the company.

Understood as a ‘distributed denial of service’ (DDoS), the court was told that the assault is effective at lowering also the many sophisticated of websites by overwhelming them through a mass attack of the organization’s computer servers.

Cyber Hacker Paid Off

As the business owner refused to hand over 50 % of their company, Smirnow and Surmacki completed their threat on August 2nd and paid the cloaked American hacker £12,000 ($19,700) to do their dirty work. The site that is manchester-based down for five hours, costing business £15,000 ($24,558) when no clients could access your website during that time.

The victim had currently alerted Manchester police to the duo’s danger, however, and another conference was set up in a hotel that is bugged next to Heathrow Airport on August 7th.

Whenever the dog owner of the business told the pair that he would not cooperate using them, they told him which they were ‘going to war’ and were then arrested by police who had been on standby.

Smirnow also admitted that he had carried out the same attack on an American victim through a Skype call, during which he stated they had ‘enough power so people can’t try to push us around anymore,’ leading Detective Inspector Mossop to the comprehending that the investigation had removed an ‘emerging global cyber threat.’ This time the victim had been a U.S.-based gaming platform that allows 100 casino sites worldwide.

As for the U.S. webmasters, they demonstrably dodged a bullet.

‘This case made me fear for my safety that is personal well as for future years of my company. Which is the reason why I felt compelled to take action against the perpetrators,’ stated who owns the Manchester-based casino site, which is believed to be worth £30 million ($49,143,000). It is calculated that an attack that is week-long this business could have cost the site owner a $600,000 loss, in accordance with court reports.

‘No one should have to succumb to blackmail and also this sentence should behave as a warning to those involved in cyber extortion that the authorities and the courts will see this sort of conduct very seriously,’ the web site owner added.

Smirnow and Surmacki later pleaded bad to two charges of blackmail and unauthorized functions on computers, and had been sentenced to 5 years and four months each by Judge Michael Henshaw at the Manchester court. Their own defense team described their attempted blackmail as ‘bizarre, misconceived, naïve and brazen.’

‘They utilized their intimate, expert knowledge of online business to bully the victims into submission,’ revealed Detective Inspector Chris Mossop of the Serious Organised Crime Division. ‘ But make no mistake, they may have been using the technology that is latest, but this was just good conventional blackmail.’

Affinity Gaming Hit with Target-Style Security Breach

Nevada and regional casino operator Affinity Gaming was struck by having a credit and debit card security breach.

It is maybe not been a good week for the industry that supposedly safeguards our credit and debit card transactions. Simply days after a nationwide scandal that pulled within the Secret Service to investigate a huge system hack at popular retailer Target a breach which could end up in fake charges, identity theft, or worse Las Vegas-based casino company Affinity Gaming has been hit having a comparable fiasco.

Credit-Processing Systems Compromised

Affinity announced that their credit and debit-processing systems had been hacked by the weekend’s start, and were telling their customers most likely close to 300,000 of whom could have been hit by the hacking to watch their credit info as well as any unauthorized charges to their accounts.

What everyone wants to worry about after blowing their holiday bankroll, right?

But wait, it gets far worse. All the way through to October 16: that’s seven months while Target’s breach spanned approximately five weeks from around Thanksgiving to a week before Christmas Affinity says theirs hit all 12 of their properties in four U.S. states, and that the breach continued unabated from March 14 of this year. Incorporated into the properties affected were the company’s popular Nevada stateline gambling enterprises, including Whiskey Pete’s, Buffalo Bill’s, and Primm Valley Resort and Casino.

According to outside legal counsel for Affinity, James Prendergast, the cyber-hack ended up being from a ‘very sophisticated piece of malware that got right into a location that is terrible. It got contained and eliminated and we called in third-party forensic investigators for confirmation it was gone,’ Prendergast noted.

Not a way to Know Who Got Hit

Adding to the confusion, because Affinity doesn’t store any client bank card information in their databases, they haven’t any real means of knowing or notifying who might have been affected by the world wide web theft. However with casinos scattered throughout Nevada, Colorado, Missouri and Iowa, it most probably could influence a consumer that is nearly nationwide, particularly as several gambling enterprises are in or near Las Vegas.

And you could also be in trouble, because that business’s credit and debit processing systems were also hacked, starting on an as-yet-undetermined date and ending on November 29 if you happened to pump gas at Affinity’s Primm Center Gas Station a major stopping point at Nevada’s stateline into California.

Therefore far, the way that is only has been able to notify customers of any possible problems happens to be on unique site with a ‘public notice of information safety event,’ but needless to say, many and also require been struck will never see that.

Both of whom have been notified, it definitely gets the attention of state regulatory agencies, including Nevada’s Gaming Control Board while hacking of this scope can fall under the purview of the Secret Service and the FBI. GCB Chairman A.G. Burnett says his organization let the Nevada Gaming Commission know of the dilemmas immediately.

‘The company promptly notified us of what happened,’ Burnett explained. ‘They are working with us closely.’

This incident may cause and it has established a confidential, toll-free inquiry line to help its customers. as for Affinity, aside from their site notice and media attention, they are doingn’t have a lot of ways to allow customers know what’s occurred or what to accomplish about this, but in a statement said that ‘Affinity regrets any inconvenience’

That line, you might have been affected, is open from 8 am to 6 pm Pacific Standard Time, Mondays through Fridays if you think. The quantity to call for U.S. or Canadian residents is 877-238-2179; all other international residents should call Affinity at +1-814-201-3696.

‘Affinity is cooperating into the ongoing law enforcement investigation of the incident,’ a company statement read. ‘Affinity has additionally taken lots of measures to strengthen the security of our network and has now caused legal and security vulnerability professionals to aid identify and implement extra appropriate safeguards.’


电子邮件地址不会被公开。 必填项已用 * 标注

您可以使用这些 HTML 标签和属性: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>