Welcome!

News Feed Item

Internet Poker Vulnerable To: Money Laundering By Terror Groups; Cheating; And Fraud, Warn Four Experts And FBI

NEW YORK, Jan. 7, 2014 /PRNewswire/ -- Joint statement by: Michael K. Fagan, career federal prosecutor and post-911 anti-terrorism coordinator active in investigating and prosecuting illegal offshore online commercial gambling enterprises; Earl L. Grinols, distinguished professor of economics at Baylor University, former senior economist for the President's Council of Economic Advisers; Jim Thackston, software engineer with a background in the aerospace, manufacturing and energy industries; John Kindt, Professor of Business and Legal Policy, University of Illinois, Senior Editor, U.S. International Gaming Report.

The FBI recently wrote Congress for the second time expressing the Agency's concern that online gambling - including Internet poker - is vulnerable to money laundering and cheating and is a vehicle to bribe public officials and others. Online players can disguise both their location and identity and thereby fleece unsuspecting innocent participants. In its September, 2013 letter, the FBI stated "Transnational organized crime (TOC) groups might exploit legal online gambling to generate revenue, steal personally identifiable information (PII), and engage in public corruption." (http://bit.ly/1dOvbI9) The FBI's correspondence confirms what we have known for several years – that, despite the gambling industry's claims to the contrary, there exists effective and non-detectable methods which can be used to anonymize a player's identity and geo-location in order to corrupt a game and these threats will become more prevalent as more states race to embrace online gambling. As the FBI confirmed, "Individuals may use a wide variety of mechanisms to conceal their physical location, or give the appearance of operating in a different jurisdiction …" This statement is easily proven using scientifically verifiable and undetectable methods to demonstrate how a person located in Pakistan can play poker on a system located inside New Jersey. We know because we have done it. Despite what the poker websites and online gaming activists claim, this science is irrefutable and has been peer reviewed by top computer experts and law enforcement.

Online poker attracts big money. As recently demonstrated by American player Brian Hastings and his Swedish competitor half a world away, a single online poker game facilitated the international transfer of $5 million in mere hours.  Accordingly, an established al-Qaida poker network could extract enough untraceable money from the United States in just a few days to fund several 9/11-sized attacks.

The website www.undetectablelaundering.com  illustrates how this is accomplished, as does the statement of Jim Thackston ( http://bit.ly/1a1TDT5 ) which was included in the record of a recent US House Subcommittee on Commerce, Manufacturing and Trade hearing regarding a bill seeking to legalize online poker nationwide.

We urge Congress to carefully consider all the consequences of legalized online gambling. No benefits outweigh these consequences.  Online gambling's legalization solves none of the problems cited by advocates and is sure to create many—including existential ones for America.

Additional research:

Kindt, J. , J. Kindt, Sr. Editor (Ed.), 2012, The Gambling Threat to National and Homeland Security: Internet Gambling, 1-1,232. Buffalo, New York: William S. Hein and Company, Inc.

Grinols, E. and Thackston, J., " Column: Online gambling is a strategic national threat (op-ed)," Tampa Bay Times, (November 2013)

Grinols, E., 2004, Gambling in America: Costs and Benefits, New York: Cambridge University Press.

Written Testimony of Michael K. Fagan, House Financial Services Committee Hearing, "H.R. 2267, Internet Gambling Regulation, Consumer Protection, and Enforcement Act." - 07/21/2010 ( http://bit.ly/1cJ9VkB )

*For additional information or to schedule interviews, contact Cheri Jacobus at Capitol Strategies PR at [email protected] or (202) 257-4638.

CONTACT:
Cheri Jacobus
(202) 257-4638
[email protected]

SOURCE Jim Thackston

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
SYS-CON Events announced today the Kubernetes and Google Container Engine Workshop, being held November 3, 2016, in conjunction with @DevOpsSummit at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA. This workshop led by Sebastian Scheele introduces participants to Kubernetes and Google Container Engine (GKE). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, students learn the key concepts and practices for deploying and maintainin...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec...