nswd



pipeline

At the end of the drama, as Faust and Mephistopheles flee the dungeon, a voice from heaven announces Gretchen’s salvation

210.jpg

Misdemeanor cases affect far more people than felony cases, outnumbering felony cases by more than three to one. Yet very little empirical information exists on many aspects of misdemeanor prosecutions.

This Article provides the first quantitative look at appellate review in misdemeanor cases, nationwide. It uses data drawn from a random sample of direct criminal appeals decided by every state appellate court in the nation, unpublished aggregate data on misdemeanor trial court cases provided by the Court Statistics Project, and published state court statistics.

We provide the first estimate of the rate of appellate review for misdemeanors, concluding that appellate courts review no more than eight in 10,000 misdemeanor convictions, and disturb only one conviction or sentence out of every 10,000 misdemeanor judgments. This level of oversight is much lower than that for felony cases, for reasons we explain.

Additional findings include new information about the rate of felony trial court review of lower court misdemeanor cases, ratios of appeals to convictions for various misdemeanor-crime categories, detailed descriptive information about misdemeanor cases that reach state appellate courts, the results of a complete statistical analysis examining which features are significantly associated with a greater or lesser likelihood of success, including crime type, claim raised, judicial-selection method, and type of representation, and the first quantitative look at how misdemeanor appeals differ from felony appeals.

{ LawArXiv | Continue reading }

watercolor on paper { JMW Turner, A Wreck, possibly related to Longships Lighthouse, Land’s End, c.1834 }

previously { The Federalist Society — A 30-Year Plan to Transform the Courts }

Facebook algorithm can recognise people in photographs even when it can’t see their faces

25.jpg

In Shenzhen, the local subway operator is testing various advanced technologies backed by the ultra-fast 5G network, including facial-recognition ticketing.

At the Futian station, instead of presenting a ticket or scanning a QR bar code on their smartphones, commuters can scan their faces on a tablet-sized screen mounted on the entrance gate and have the fare automatically deducted from their linked accounts. […]

Consumers can already pay for fried chicken at KFC in China with its “Smile to Pay” facial recognition system, first introduced at an outlet in Hangzhou in January 2017. […]

Chinese cities are among the most digitally savvy and cashless in the world, with about 583 million people using their smartphones to make payment in China last year, according to the China Internet Network Information Center. Nearly 68 per cent of China’s internet users used a mobile wallet for their offline payments.

{ South China Morning Post | Continue reading }

photo { The Collection of the Australian National Maritime Museum }

‘We are all deep in a hell each moment of which is a miracle.’ –Cioran

36.jpg

Beer bottles are often used in physical disputes. If the bottles break, they may give rise to sharp trauma. However, if the bottles remain intact, they may cause blunt injuries. […]

We tested the fracture properties of beer bottles in a drop-tower. Full bottles broke at 30 J impact energy, empty bottles at 40 J. These breaking energies surpass the minimum fracture-threshold of the human neurocranium. […]

The phenomenon of empty beer bottles breaking at higher energies than full ones is explainable by two factors. Firstly, beer is an almost incompressible fluid. Even a slight deformation of the bottle due to the impact of the steel ball leads to an increase of the pressure within the bottle and its destruction. Another possibly major additional factor may be that beer is carbonated.

{ Journal of Forensic and Legal Medicine | Continue reading }

photo { Stephen Shore, Miami, Oklahoma, July 1972 }

the moyles and moyles of it

21.jpg

Products developed by companies such as Activtrak allow employers to track which websites staff visit, how long they spend on sites deemed “unproductive” and set alarms triggered by content considered dangerous. […]

To quantify productivity, “profiles” of employee behaviour — which can be as granular as mapping an individual’s daily activity — are generated from “vast” amounts of data. […]

If combined with personal details, such as someone’s age and sex, the data could allow employers to develop a nuanced picture of ideal employees, choose whom they considered most useful and help with promotion and firing decisions. […]

Some technology, including Teramind’s and Activtrak’s, permits employers to take periodic computer screenshots or screen-videos — either with employees’ knowledge or in “stealth” mode — and use AI to assess what it captures.

Depending on the employer’s settings, screenshot analysis can alert them to things like violent content or time spent on LinkedIn job adverts. 

But screenshots could also include the details of private messages, social media activity or credit card details in ecommerce checkouts, which would then all be saved to the employer’s database. […]

Meanwhile, smart assistants, such as Amazon’s Alexa for Business, are being introduced into workplaces, but it is unclear how much of office life the devices might record, or what records employers might be able to access.

{ Financial Times | Continue reading }

Google uses Gmail to track a history of things you buy. […] Google says it doesn’t use this information to sell you ads.

{ CNBC | Continue reading }

unrelated { Navy Seal’s lawyers received emails embedded with tracking software }

photo { Philip-Lorca diCorcia, Paris, 1996 }

Not a soul but ourselves

41.jpg

[I]nside of a Google server or a Facebook server is a little voodoo doll, avatar-like version of you […] All I have to do is simulate what conversation the voodoo doll is having, and I know the conversation you just had without having to listen to the microphone.

{ Quartz | Continue reading }

…a phenomenon privacy advocates have long referred to as the “if you build it, they will come” principle — anytime a technology company creates a system that could be used in surveillance, law enforcement inevitably comes knocking. Sensorvault, according to Google employees, includes detailed location records involving at least hundreds of millions of devices worldwide and dating back nearly a decade.

The new orders, sometimes called “geofence” warrants, specify an area and a time period, and Google gathers information from Sensorvault about the devices that were there. It labels them with anonymous ID numbers, and detectives look at locations and movement patterns to see if any appear relevant to the crime. Once they narrow the field to a few devices they think belong to suspects or witnesses, Google reveals the users’ names and other information. […]

Google uses the data to power advertising tailored to a person’s location, part of a more than $20 billion market for location-based ads last year.

{ NY Times | Continue reading }

The “panopticon” refers to an experimental laboratory of power in which behaviour could be modified

5.jpg

We’ve all been making some big choices, consciously or not, as advancing technology has transformed the real and virtual worlds. That phone in your pocket, the surveillance camera on the corner: You’ve traded away a bit of anonymity, of autonomy, for the usefulness of one, the protection of the other.

Many of these trade-offs were clearly worthwhile. But now the stakes are rising and the choices are growing more fraught. Is it O.K., for example, for an insurance company to ask you to wear a tracker to monitor whether you’re getting enough exercise, and set your rates accordingly? Would it concern you if police detectives felt free to collect your DNA from a discarded coffee cup, and to share your genetic code? What if your employer demanded access to all your digital activity, so that it could run that data through an algorithm to judge whether you’re trustworthy?

These sorts of things are already happening in the United States.

{ NY Times | Continue reading }

Revenge, more revenge, and CoCos

27.jpg

Foreign Minister José Valencia and Interior Minister María Paula Romo accused Assange of riding scooters around the cramped embassy hallways, insulting staff and smearing feces on the walls.

{ CNN | Continue reading }

Mr. Moreno accused Mr. Assange of installing electronic distortion equipment in the embassy, blocking security cameras, confronting and mistreating guards and gaining access to security files without permission.

{ NY Times | Continue reading }

In Norway, you can look up your neighbor’s income on the Internet

During a guided tour of Mount Vernon last April, Trump learned that Washington was one of the major real-estate speculators of his era. So, he couldn’t understand why America’s first president didn’t name his historic Virginia compound or any of the other property he acquired after himself.

“If he was smart, he would’ve put his name on it,” Trump said, according to three sources briefed on the exchange. “You’ve got to put your name on stuff or no one remembers you.”

The VIPs’ tour guide for the evening, Mount Vernon president and CEO Doug Bradburn, told the president that Washington did, after all, succeed in getting the nation’s capital named after him.

{ Politico | Continue reading }

related { Donald Trump trademarked “Central Park” }

“The White House called me to advise to help change the system of clemency,” Kim Kardashian-West said. “And I’m sitting in the Roosevelt Room with, like, a judge who had sentenced criminals and a lot of really powerful people and I just sat there, like, Oh, shit. I need to know more.”

24.jpg

A man who had just bought an $8 million island off of Key West was arrested Saturday for participating in what police described as a scheme to steal $300 in household items from Kmart.

Officials at Kmart called Key West police April 5 after they say Andrew Francis Lippi, 59, had purchased several items, including a Keurig coffee maker and light bulbs, and returned the original boxes for a refund. But police say the boxes were stuffed with other items. For example, store officials said a basketball was inside the Keurig box. […]

The Miami Herald reports Lippi bought Thompson Island, which had been the home to the family of philanthropist Edward B. Knight. Lippi also owns the “Real World” house in Key West, where MTV shot its 17th season in 2006. […]

Lippi told the Herald the theft allegation is “complicated” and he’d rather not talk about it.

{ CBS News | Continue reading }

images { Grant Wood, American Gothic, 1930 | Dexter, Episode 7, Season 6 }

I got a letter from the government, the other day, I opened and read it, it said they were suckers

31.jpg

An April 2016 Council of Economic Advisers (CEA) report advocated raising the minimum wage to deter crime. […]

Our results provide no evidence that minimum wage increases reduce crime. Instead, we find that raising the minimum wage increases property crime arrests among those ages 16-to-24, with an estimated elasticity of 0.2. This result is strongest in counties with over 100,000 residents and persists when we use longitudinal data to isolate workers for whom minimum wages bind.

Our estimates suggest that a $15 Federal minimum wage could generate criminal externality costs of nearly $2.4 billion.

{ National Bureau of Economic Research | Continue reading }

still { Death Wish, 1974 }

A few million dollars doesn’t move the needle for me

211.jpg

If you know that a public company has done a bad thing, and no one else knows about it, how can you use that knowledge to make money? […]

This is a financial column, so we tend to focus on the financial-markets answers: You can short the company’s stock, or buy put options, or buy credit-default swaps. Then you can either sit back and let the market discover the bad thing, or you can bring it to the market’s attention, by announcing the bad thing and maybe also by taking some extra steps—generally suing or calling up a regulator—to get the ball rolling. This approach has some crucial advantages; most notably, if the company is very big and the thing is very bad, this is a good way to make a whole lot of money. But there are disadvantages too. You tend to need a lot of capital to make a lot of money doing this; if you don’t have enough money to make a big bet against the company, you’ll probably have to sell your idea to a hedge fund that does, and you’ll get only a portion of the upside. There are all the general financial risks of short selling: The stock could go up for reasons unrelated to the bad thing, “the market can remain irrational longer than you can remain solvent,” etc. There are the specific risks of noisy short selling: The company will accuse you of fraud, people won’t believe your revelations because you have money at stake, etc. There is also the risk of insider trading: Depending on how you came to know of the secret bad thing, there may be some legal risk to you from trading on it.

But those are just the markets-y ways to make money from misbehavior. There are also lots of lawyer-y ways. There are whistleblower programs that can reward you for telling regulators—particularly the Securities and Exchange Commission—about the bad thing. (The SEC’s program focuses on securities fraud, of course, but everything is securities fraud so you can be creative.) If you are a lawyer looking to profit from the bad thing, you can find a victim of the bad thing and sue for damages (and take a cut), or you can find holders of the company’s securities and sue for securities fraud (and take a bigger cut), because, again, everything is securities fraud. […]

The really long game, if you are a lawyer, is that you can become a federal prosecutor, investigate the company for misconduct, push it to hire a fancy law firm staffed with former federal prosecutors to conduct an expensive internal investigation, and enter into a non-prosecution agreement that requires the company to pay millions of dollars to an outside monitor who is also a former federal prosecutor. Do a few of these—expanding the scope of criminal liability for corporations, and normalizing the notion that corporations should resolve their criminal liability by hiring ex-prosecutors as monitors and investigators—and then leave for a private law firm where you get paid to do the investigations and the monitoring, while the next generation of prosecutors creates business for you. […]

Avenatti clearly did not do a good enough job of making the extortion look like something else to satisfy prosecutors. I don’t know if he did enough to satisfy a jury; perhaps we’ll find out. But he didn’t do nothing; the complaint contains some gestures in the direction of Avenatti being a legitimate lawyer with a legitimate case from a legitimate client trying to reach a legitimate settlement. He didn’t just ask for money; he demanded that Nike do an internal investigation and that he be in charge of it. (And be paid a lot.) It’s not pure, naked blackmail; it is a settlement negotiation that gets a little deeper into blackmail territory than you’d ideally like. But any settlement negotiation is, you know, “give me money or I will sue and that will be embarrassing for you,” so it is a matter of degrees.

{ Matt Levine/Bloomberg | Continue reading }

pigment ink on cotton paper { Aneta Grzeszykowska, Beauty Mask #10, 2017 }

‘If there is anyone who owes everything to Bach, it is certainly God.’ –Cioran

29.jpg

“I took this photo of an interior wall of a gate guard tower at ‘Victory Base’ in Baghdad in 2004. The graffiti is a classic example of the grim and cynical sense of humor soldiers cultivate in order to maintain their sanity in war.” —Stephen Richey, U.S. Army, 1977-2010

{ NY Times | Continue reading }

No one speaks English and everything’s broken

26.jpg

Ms. Giannulli, 19, is the daughter of the actress Lori Loughlin and the designer Mossimo Giannulli. […] Ms. Giannulli is a social media influencer with close to two million YouTube subscribers and over a million Instagram followers. In September, she posted two paid advertisements on Instagram that highlighted her identity as a student. […]

Ms. Giannulli […] was criticized in August after posting a video […] in which she said that she was only going to college for “gamedays, partying.”

“I don’t really care about school, as you guys all know,” she said. […]

Ms. Giannulli is one of a number of celebrity offspring who have lived out their teenage years on social media. In the video for which she was criticized, she described how the dissolution of a romantic relationship had been particularly difficult because people would send her tweets, Instagram posts and Snapchats of her ex with other young women.

{ NY Times | Continue reading }

A total of 50 people nationwide were arrested in the largest college admissions scam ever prosecuted by the Department of Justice, officials announced. Those arrested include exam administrators, coaches at elite schools, and nearly three dozen parents — including actress Lori Loughlin.

{ CNN | Continue reading | full indictment }

image { 1991 Topps Toxic High School #19 }

why isn’t everything made of gold?

A lawyer for the Trump administration, pressed by a Boston judge on whether the “115 mile long” border wall contract the president tweeted about exists:

wall.jpg

related { What is Fake News? }

entire crew is HorseFaced for real

55.jpg

A company tied to Donald Trump Jr. and Eric Trump owns a 171-acre hunting preserve that is being used as a private shooting range. […]

During negotiations, said Joe Kleinman — who with his wife, Jocelyn, sold the property in August 2013 for $665,000 — the buyer’s agent tried to reduce the price by invoking a 1991 state court decision that requires buyers disclose to sellers if a property is known to be haunted.

Kleinman refused, saying anyone who truly believed it was haunted would either abandon the sale or pay a premium.

{ Poughkeepsie Journal | Continue reading }

quote { entire crew is HorseFaced for real }

I’ll take a rusty nail, and scratch your initials in my arm

21.jpg

Leveraging popular social networking sites, individuals undertake certain forms of behavior to attract as many likes and followers as they can. One platform that symbolizes people’s love for strategic self-presentation to the utmost degree is Instagram. […]

Narcissism is characterized by grandiose exhibition of one’s beauty and pursuit of others’ admiration. Posting selfies/groupies is associated with narcissism and need for popularity. […]

Instagram selfies and groupies symbolize social media users’ public display of narcissism. From an evolutionary psychological perspective on the renovated hierarchy of fundamental human motives and needs, this study examined the interaction effects of Instagram photo types (selfies, group selfies, long-shot photos taken by others, and neutral photos) and Instagram peer viewers’ individual difference factors (intrasexual competition [ISC] for mates, need for popularity [NfP], loneliness, and need to belong [NtB]) on intersexual attraction. […]

The findings confirmed the assumption that a potential mate who posts selfies and groupies is perceived by opposite-sex viewers to be more narcissistic compared to a potential mate who posts neutral photos.

{ Evolutionary Psychology | Continue reading }

photo { Thierry Mugler, Monster Show, Elle US, November 1991 }

Who’ll search for Find Me Colours now on the hillydroops of Vikloefells?

26.jpg

The problems of darknet markets have triggered an evolution in online black markets. […]

Instead of using websites on the darknet, merchants are now operating invite-only channels on widely available mobile messaging systems like Telegram. This allows the merchant to control the reach of their communication better and be less vulnerable to system take-downs. To further stabilize the connection between merchant and customer, repeat customers are given unique messaging contacts that are independent of shared channels and thus even less likely to be found and taken down. Channels are often operated by automated bots that allow customers to inquire about offers and initiate the purchase, often even allowing a fully bot-driven experience without human intervention on the merchant’s side. […]

The other major change is the use of “dead drops” instead of the postal system which has proven vulnerable to tracking and interception. Now, goods are hidden in publicly accessible places like parks and the location is given to the customer on purchase. The customer then goes to the location and picks up the goods. This means that delivery becomes asynchronous for the merchant, he can hide a lot of product in different locations for future, not yet known, purchases. For the client the time to delivery is significantly shorter than waiting for a letter or parcel shipped by traditional means - he has the product in his hands in a matter of hours instead of days. Furthermore this method does not require for the customer to give any personally identifiable information to the merchant, which in turn doesn’t have to safeguard it anymore. Less data means less risk for everyone.

{ Opaque | Continue reading }

photo { Weegee }

‘Never talk when you can nod and never nod when you can wink and never write an e-mail, because it’s death.’ –Eliot Spitzer

23.jpg

“Connecting” online once referred to ways of communicating; now it is understood as a means of digital totalization, typically euphemized as objects becoming “smart.” Each data-collecting object requires a further smartening of more objects, so that the data collected can be made more useful and lucrative, can be properly contextualized within the operation of other objects. You can’t opt in or out of this kind of connectedness.

{ Rob Horning/Real Life | Continue reading }

‘If snow be white, why then her breasts are dun.’ –Shakespeare

9.jpg

As an advanced research topic in forensics science, automatic shoe-print identification has been extensively studied in the last two decades, since shoe marks are the clues most frequently left in a crime scene. […] A large variety of handcrafted features have been used for automatic shoe-print identification. These features have shown good performance in limited and controlled scenarios. Unfortunately, they fail when they are dealing with large intra-class variations caused by the noise, oc- clusions, rotation and various scale distortions. A good alternative to these conventional features are the learned ones, e.g. deep learning, which have more generalization ability in more complicated scenarios. To be effective, these models need to be trained on a large amount of data.

{ arXiv | PDF }

Can I tell them that I never really had a gun?

25.jpg

From 1427 to 1435, Gilles de Rais (1405 – 1440) served as a commander in the Royal Army, and fought alongside Joan of Arc against the English and their Burgundian allies during the Hundred Years’ War.

In 1434/1435, he retired from military life, depleted his wealth by staging an extravagant theatrical spectacle of his own composition, and was accused of dabbling in the occult.

After 1432, he was accused of engaging in a series of child murders, with victims possibly numbering in the hundreds. The killings came to an end in 1440, when a violent dispute with a clergyman led to an ecclesiastical investigation which brought the crimes to light, and attributed them to Gilles. He was condemned to death and hanged at Nantes on 26 October 1440.

Gilles de Rais is believed to be the inspiration for the 1697 fairy tale “Bluebeard” (”Barbe bleue”) by Charles Perrault.

{ Wikipedia | Continue reading | Watch: Georges Méliès, Barbe Bleue, 1901 }



kerrrocket.svg