In the wake of the shocking revelations detailed in the Pennsylvania grand jury report on clergy abuse, Archbishop Robert Carlson of St. Louis has voluntarily opened church files for scrutiny.
(Image credit: Robert Cohen/AP)
Fortune: “The New York Public Library is introducing a new way for you to get your read on: the “InstaNovel.” As of Wednesday, the NYPL will begin posting classic novels to its Instagram account, in the form of Instagram stories. The project, called InstaNovels, is deemed a “reimagining of Instagram Stories to provide a new platform for iconic stories.” The InstaNovels were created in conjunction with independent advertising and creative agency, Mother in New York. The first book to be featured is Lewis Carroll’s Alice’s Adventures in Wonderland, which has been illustrated by designer Magoz. That will be followed by the short story The Yellow Wallpaper by Charlotte Perkins Gilman and Franz Kafka’s The Metamorphosis in the coming months.
We’re bringing some of the world’s most incredible stories to Instagram Stories with #InstaNovels. Follow @nypl on Instagram to start reading Alice’s Adventures in Wonderland: https://t.co/xbkrMCWGHK.
— NY Public Library (@nypl) August 22, 2018…”
Outrage quickly followed the president's tweet about "the large scale killing of farmers" in South Africa. But why? The thorny history involves apartheid, white supremacists and plenty of acrimony.
(Image credit: Alex Brandon/AP)
Scientists don't know what's causing the aurora-like phenomenon, which has been known to amateur photographers for decades but only recently came to the attention of researchers.
(Image credit: Ryan Sault )
Lawyers for immigrants filed a complaint on Thursday with Homeland Security. They contend that parents, amid cruel treatment, did not understand the forms they were being forced to sign.
(Image credit: Charles Reed/AP)
Via John Cutler – “Multiple hat-wearer. Product development nut. I love wrangling complex problems and answering the why with qual/quant data. @johncutlefish on Twitter.”
“What books / research / models / frameworks might you recommend for change agents with low/no positional authority hoping to coax their orgs in a new direction?” See – 70 Books (and Other Resources) for Internal Change Agents
“Threats, intimidation and high-pressure tactics are classic signs of a scam. Learn how to stay ahead of clever crooks with these practical tips, and check out the ways you can keep your personal information secure…”
Free Law Project: “Today we are thrilled to announce the general availability of PACER Docket Alerts on CourtListener.com. Once enabled, a docket alert will send you an email whenever there is a new filing in a case in PACER. We started CourtListener in 2010 as a circuit court monitoring tool, and we could not be more excited to continue expanding on those roots with this powerful new tool.
The best way to get started with Docket Alerts is to just make one. Try loading a popular case like U.S. v. Manafort or The District of Columbia v. Trump. Once the case is open, just press the “Get Alerts” button near the top. Then, just wait for your first alert.
We believe PACER Docket Alerts will be a valuable resource to journalists, researchers, lawyers, and the public as they grapple with staying up to date with the latest PACER filings. Our goal with docket alerts is to make them as simple as possible to use. Once you have found a case you are interested in, a single click is all it takes to turn on an alert for that docket. From then on, we will send you an email as soon as we detect a new filing in that case. For more details on how to use docket alerts, please see our help page…
Fagan, Jeffrey and Geller, Amanda, Police, Race, and the Production of Capital Homicides (July 12, 2018). Columbia Public Law Research Paper No. 14-593. Available at SSRN: https://ssrn.com/abstract=3202470
“Racial disparities in capital punishment have been well documented for decades. Over 50 studies have shown that Black defendants more likely than their white counterparts to be charged with capital-eligible crimes, to be convicted and sentenced to death. Racial disparities in charging and sentencing in capital-eligible homicides are the largest for the small number of cases where black defendants murder white victims compared to within-race killings, or where whites murder black or other ethnic minority victims. These patterns are robust to rich controls for non-racial characteristics and state sentencing guidelines. This article backs up the research on racial disparities to an earlier stage of capital case processing: the production of capital-eligible cases beginning with the identification of potential defendants by the police. It seeks to trace these sentencing disparities to examining earlier stages in the processing of homicides. Using data from the FBI’s Supplementary Homicide Reports, we examine every homicide reported between 1976 and 2009, and find that homicides with white victims are significantly more likely to be “cleared” by the arrest of a suspect than are homicides with minority victims. We estimate a series of hierarchical regressions to show that a substantial portion of this disparity is explained by social and demographic characteristics of the county in which homicides take place. Most notably, counties with large concentrations of minority residents have lower clearance rates than do predominantly white counties; however, county characteristics do not fully explain the observed race-of-victim disparities. Our findings raise equal protection concerns, paving the way for further research into the production of capital homicides and the administration of the death penalty.” [h/t Mary Whisner]
“This story is part of When Spies Come Home, a Motherboard series about powerful surveillance software ordinary people use to spy on their loved ones. A company that markets cell phone spyware to parents and employers left the data of thousands of its customers—and the information of the people they were monitoring—unprotected online. The data exposed included selfies, text messages, audio recordings, contacts, location, hashed passwords and logins, Facebook messages, among others, according to a security researcher who asked to remain anonymous for fear of legal repercussions. Last week, the researcher found the data on an Amazon S3 bucket owned by Spyfone, one of many companies that sell software that is designed to intercept text messages, calls, emails, and track locations of a monitored device. Motherboard was able to verify that the researcher had access to Spyfone’s monitored devices’ data by creating a trial account, installing the spyware on a phone, and taking some pictures. Hours later, the researcher sent back one of those pictures…”
FastCompany: “Within the detailed federal allegations against former Trump lawyer Michael Cohen, who pleaded guilty yesterday to eight charges including campaign finance violations, are multiple references to texts sent by Cohen and even a call made “through an encrypted telephone application.” Cohen was apparently a fan of encrypted communications apps like WhatsApp and Signal, but those tools failed to keep his messages and calls out of sight from investigators. In June, prosecutors said in a court filing the FBI had obtained 731 pages of messages and call logs from those apps from Cohen’s phones. Investigators also managed to reconstruct at least 16 pages of physically shredded documents.
Prosecutors at Cohen hearing yesterday, according to transcript:
Evidence to support campaign finance charges includes “audio recordings made by Mr. Cohen,” “messages sent over encrypted applications” and Trump Organization records. pic.twitter.com/0Ciae3ra5d— Steve Reilly (@BySteveReilly) August 22, 2018
Those logs, judging by the charging document, appear to have helped document at least Cohen’s communications with officials at the National Enquirer about allegations from porn actress Stormy Daniels—whom Cohen allegedly paid on behalf of Trump, violating campaign finance law. It’s unclear if the FBI actually broke through any layers of encryption to get the data. It’s possible that Cohen, who apparently at times taped conversations, stored the conversation logs in a less-than-secure way. Former Trump campaign chairman Paul Manafort, himself found guilty of eight counts of federal offenses yesterday, also saw his encrypted WhatsApp and Telegram communications brought up in court over alleged witness tampering. Those messages appeared to have been found through Manafort’s Apple iCloud account. The bottom line: People sending messages through encrypted apps should probably not hang on to copies of their messages and call logs any longer than they have to if they really want to keep those messages secret…”
In one south Georgia county, the board of elections has proposed closing two-thirds of polling places. Critics of the proposal say this is a move to suppress low-income and African-American votes.
(Image credit: Johnny Kauffman/WABE)
The pope is under intense pressure to enact concrete measures to ensure accountability for church officials who ignored or covered up sexual abuse by clergy.
(Image credit: Andrew Medichini/AP)
A massive ice pack that normally clings to northern Greenland's coastline is splitting apart and floating out to sea. Climate change is to blame, scientists say.
(Image credit: Mario Tama/Getty Images)
Dylan O'Riordan, who was living in Boston illegally before being picked up by Immigration and Customs Enforcement. His parents brought him to the U.S. when he was 12.
(Image credit: John Burnett/NPR)
As more doctors' offices give patients electronic access to their medical records, both patients and their physicians are asking: Exactly how much of your medical record should you get to see?
(Image credit: Runstudio/Getty Images)
Feeding mosquitoes artificial blood could help get them ready to go out in the world and stanch the flow of disease — and reduce the need for animal blood
(Image credit: Kristina Gonzales)
In the message, which is nearly an hour long, the speaker says he knows followers are suffering from "hunger and fear" and urges patience. He also calls on them to engage in small-scale attacks.
(Image credit: AP)