Massachusetts Gaming Commission Allows for Delayed Revere Vote

Massachusetts Gaming Commission Allows for Delayed Revere Vote

A 3-D rendering associated with proposed Suffolk Downs casino, now planned for Revere with partner Mohegan Sun (Image: Wendy Maeda/Boston Globe)

They say the household constantly wins, and appropriate now, prospective casino operators Suffolk Downs and Mohegan Sun are surely on a winning streak in Massachusetts. The Massachusetts Gaming Commission unanimously approved a waiver to the standing deadline for operators to file applications including certified referendum results from their host communities by the end of the year.

Year more Time, Next

That December 31 deadline ended up being going to be a problem that is real the Suffolk Downs casino proposal. While the gaming payment ended up being ready to allow the race track and partner Mohegan Sun an opportunity to build a casino solely on land into the town of Revere, in addition consented that the original vote taken earlier this season was for a substantially various proposal. As such, a new vote was needed one which would not have the ability to be held before the year-end deadline.

The decision was one that the panel said they made in a attempt to be since fair as possible to all sides. On November 5, both East Boston and Revere voted on whether to approve a Suffolk Downs casino that would have been primarily and very nearly entirely found on the Boston side of the border between your two communities. East Boston residents voted against that proposal, while Revere voters overwhelmingly approved it.

That left a great deal of outstanding legal questions, probably the most important of that has been whether Suffolk Downs could now build a casino entirely on land in Revere, which had authorized a casino. The choices ever since then have essentially said that the clear answer is 'yes' but that it will be treated as being a unique project that have to be re-approved, separately from the proposal that is previous.

'We have wrestled hard with racking your brains on just how to reconcile the 'no' vote in East Boston with the 'yes' vote in Revere, and there is no solution that is perfect' said Massachusetts Gaming Commission Chairman Stephen Crosby.

The waiver was the closest to that 'perfect solution' that the commission could appear with, taking into consideration the tight deadline. Mohegan Sun must still file their application being a potential operator by the conclusion of 2013, but a 2nd referendum in Revere will simply take place sometime in the next 3 months after the original deadline.

Boston Fires Back

Boston officials opposed the waiver, saying that the vote in East Boston should be 'respected and maintained' in a letter to the commission. In addition, incoming Boston Mayor-elect Martin Walsh has said that he'sn't yet ruled out the possibility of taking action that is legal this second casino proposition in Revere.

But Revere Mayor Dan Rizzo has expressed confidence that the residents of his town will not just get to vote regarding the casino that is new, but that they'll back it using the same form of support they did the very first time around. On 5, 61 percent of Revere voters agreed to endorse the Suffolk Downs casino proposal, though it's not clear if that support will increase or fall now that the casino will actually be in Revere november.

Should the new proposal gain approval from voters and regulators, it will end up being the second project to compete for the one available eastern Massachusetts casino permit. The other casino proposition for the reason that area is found in Everett, and would be operated by Wynn Resorts. That project just passed the suitability quotient regarding the gaming commission's investigations.

Polish Computer Programmers Sentenced for Cyber Blackmail Threats

They could look happy and carefree here, but Polish computer programmers Patryk Surmacki, 35 (left) and Piotr Smirnow, 31 (right) meant no good when they authorized attacks that are cyber two casino sites (Image: Cavendish Press)

Two computer that is polish who attempted to blackmail two major unnamed online casino sites one in the united kingdom and one in the us have now been sentenced to prison, after a police sting nabbed the pair earlier this year.

False Pretenses

Piotr Smirnow, 31, and Patryk Surmacki, 35, approached the owner of the united kingdom site and requested a gathering. The victim whom has A internet that is manchester-based casino met the set under the understanding that Smirnow possessed a business proposition for him. The pair had been known by him for four years ahead of the proposed business meeting, according to authorities reports.

But things took an unsightly change when, during the meeting which took place at Heathrow Airport's Terminal 5 the computer programmers demanded a 50 per cent share associated with the man's company and threatened to take down the casino site's servers if he declined.

The set told the owner that they knew a notorious computer hacker by the name of 'Wapo' into the U.S., whom they claimed would carry the cyber-attack out on the business's servers if the pair paid him to take action, therefore stopping the operations of the company.

Known as a 'distributed denial of service' (DDoS), the court was told that the assault is with the capacity of decreasing also the most advanced of websites by overwhelming them via a mass assault of the company's computer servers.

Cyber Hacker Repaid

As the business owner declined to hand over 50 percent of their company, Smirnow and Surmacki carried out their threat on August 2nd and paid the American that is cloaked hacker;12,000 ($19,700) to complete their dirty work. The Manchester-based site went down for five hours, costing the business £15,000 ($24,558) when no clients could access your website during that time.

The victim had currently alerted Manchester police to the duo's threat, however, and another conference was set up in a hotel that is bugged close to Heathrow Airport on August 7th.

When the dog owner of the business told the pair that he would not cooperate with them, they told him they were 'going to war' and were then arrested by police who have been on standby.

Smirnow additionally admitted that he had carried out an identical attack on an American victim through a Skype call, during which he stated which they had 'enough power so individuals can't take to to push us around anymore,' leading Detective Inspector Mossop to the knowing that the investigation had disassembled an ’emerging global cyber threat.' This time the victim had been a U.S.-based gaming platform that allows 100 casino sites worldwide.

As for the U.S. webmasters, they obviously dodged a bullet.

'This case made me worry for my safety that is personal well as for future years of my company. Which explains why I felt compelled to take action against the perpetrators,' stated who owns the casino that is manchester-based, which is projected to be worth £30 million ($49,143,000). It's projected that an attack that is week-long e-commerce would have cost the site owner a $600,000 loss, according to court reports.

'No one should have to succumb to blackmail and also this sentence should become a warning to those taking part in cyber extortion that the authorities and the courts will view this kind of conduct very really,' the site owner added.

Smirnow and Surmacki later pleaded bad to two charges of blackmail and unauthorized functions on computers, and had been sentenced to five years and four months each by Judge Michael Henshaw at the Manchester court. Their own defense team described their attempted blackmail as 'bizarre, misconceived, naïve and brazen.'

'They utilized their intimate, expert knowledge of online business to bully the victims into submission,' revealed Detective Inspector Chris Mossop associated with Organised Crime that is serious Division. ' But make no mistake, they may have been using the technology that is latest, but this was merely good traditional blackmail.'

Affinity Gaming Hit with Target-Style Security Breach

Nevada and casino that is regional Affinity Gaming has been hit with a credit and debit card security breach.

It is perhaps not been a good week for the industry that supposedly safeguards our credit and debit card transactions. Simply days after a national scandal that pulled into the Secret Service to investigate a huge system hack at popular retailer Target a breach that could lead to fake charges, identity theft, or worse Las Vegas-based casino company Affinity Gaming appears to have been hit with a comparable fiasco.

Credit-Processing Systems Compromised

Affinity announced that their credit and debit-processing systems had been hacked by the week-end's start, and were telling their clients most most likely near to 300,000 of whom might have been hit by the hacking to watch their credit info as well as any unauthorized charges to their accounts.

Precisely what everyone wants to worry about after blowing their holiday bankroll, right?

But wait, it gets far worse. All the way through to October 16: that's seven months while Target's breach spanned approximately five weeks from around Thanksgiving to a week before Christmas Affinity says theirs hit all 12 of their properties in four U.S. states, and that the breach continued unabated from March 14 of this year. A part of the properties affected were the company's popular Nevada stateline gambling enterprises, including Whiskey Pete's, Buffalo Bill's, and Primm Valley Resort and Casino.

According to outside legal counsel for Affinity, James Prendergast, the cyber-hack ended up being from a 'very sophisticated piece of spyware that got into a location that is terrible. It got contained and eliminated and we called in third-party forensic investigators for confirmation that it was gone,' Prendergast noted.

Not a way to Know Who Got Hit

Adding to the confusion, because Affinity doesn't store any client credit card information in their databases, they haven't any real means of knowing or notifying who might have been suffering from the world wide web theft. However with casinos scattered throughout Nevada, Colorado, Missouri and Iowa, it most likely could affect a consumer that is nearly nationwide, particularly as several gambling enterprises are in or near vegas.

And in the event that you took place to pump fuel at Affinity's Primm Center petrol Station a major stopping point at Nevada's stateline into California you could also take difficulty, because that company's credit and debit processing systems had been additionally hacked, starting on an as-yet-undetermined date and ending on November 29.

So far, the way that is only has been able to notify customers of any possible problems happens to be on unique website with a 'public notice of information security event,' but needless to say, many and also require been struck will not ever see that.

While hacking of this scope can fall underneath the purview of this Secret Service while the FBI, both of whom were notified, it absolutely gets the interest of state regulatory agencies, including Nevada's Gaming Control Board. GCB Chairman A.G. Burnett states his company let the Nevada Gaming Commission know of the dilemmas immediately.

'The business promptly notified us of what happened,' Burnett explained. 'They are using us closely.'

This incident may cause and has founded a confidential, toll-free inquiry line to assist its customers. as for Affinity, aside from their website notice and news attention, they don't have a lot of ways to let clients know what's occurred or what doing about this, but in a statement said that 'Affinity regrets any inconvenience'

That line, in the event that you think you may have been impacted, is open from 8 am to 6 pm Pacific Standard Time, Mondays through Fridays. The quantity to call for U.S. or residents that are canadian 877-238-2179; all other international residents should call Affinity at +1-814-201-3696.

'Affinity is cooperating in the law that is ongoing investigation associated with incident,' an organization statement read. 'Affinity has additionally taken a number of measures to strengthen the security of our system and has now caused legal and security vulnerability professionals to help identify and implement extra appropriate safeguards.'