555 research outputs found

    Subverting Congress\u27 Intent: The Recent Misapplication of Section 10 of the Endangered Species Act and Its Consequent Impacts on Sensitive Wildlife and Habitat

    Get PDF
    Section 9 of the Endangered Species Act, or the ESA, strictly prohibits any person or other entity from “taking” any endangered or threatened species, whether purposefully or incidentally. In section 10 of the ESA, Congress created two distinct permit mechanisms to allow the U.S. Fish and Wildlife Service, or FWS, to authorize take in certain limited circumstances—namely recovery permits for purely scientific research and incidental take permits, or ITPs, for non-scientific endeavors where such taking is incidental to, and not the purpose of, an otherwise lawful activity. Because scientific research benefitting the species at issue is not a primary objective of the second type of permit, Congress created a carefully calibrated permitting regime for ITPs. These permits provide certain safeguards that ensure extensive public comment opportunities and environmental review under the National Environmental Policy Act—safeguards that, naturally, are less extensive for scientific permits. In recent years, however, the FWS has, in various instances, conflated the distinct purposes of these two statutory permitting schemes. The agency has issued recovery permits to entities seeking authorization for incidental takes rather than scientific research, which has resulted in the issuance of permits to developers with far less public scrutiny and review than Congress intended. This Article analyzes the applicable legislative history and statutory text, assesses recent examples of the conflation of these two distinct permitting schemes, and examines the public policy rationales against the agency’s continued short-circuiting of congressional safeguards through the issuance of recovery permits for incidental takes that are not tantamount to pure scientific research

    An Economic Analysis of Oklahoma\u27s Oil and Gas Forced Pooling Law

    Get PDF

    Understanding the social in a digital age

    Get PDF
    Datafication, algorithms, social media and their various assemblages enable massive connective processes, enriching personal interaction and amplifying the scope and scale of public networks. At the same time, surveillance capitalists and the social quantification sector are committed to monetizing every aspect of human communication, all of which threaten ideal social qualities, such as togetherness and connection. This Special Issue brings together a range of voices and provocations around ‘the social’, all of which aim to critically interrogate mediated human connection and their contingent socialities. Conventional methods may no longer be adequate, and we must rethink not only the fabric of the social but the very tools we use to make sense of our changing social formations. This Special Issue raises shared concerns with what the social means today, unpicking and rethinking the seams between digitization and social life that characterize today’s digital age

    Drops for stuff: An analysis of reshipping mule scams

    Get PDF
    Credit card fraud has seen rampant increase in the past years, as customers use credit cards and similar financial instruments frequently. Both online and brick-and-mortar outfits repeatedly fall victim to cybercriminals who siphon off credit card information in bulk. Despite the many and creative ways that attackers use to steal and trade credit card information, the stolen information can rarely be used to withdraw money directly, due to protection mechanisms such as PINs and cash advance limits. As such, cybercriminals have had to devise more advanced monetization schemes towork around the current restrictions. One monetization scheme that has been steadily gaining traction are reshipping scams. In such scams, cybercriminals purchase high-value or highly-demanded products from online merchants using stolen payment instruments, and then ship the items to a credulous citizen. This person, who has been recruited by the scammer under the guise of "work-from-home" opportunities, then forwards the received products to the cybercriminals, most of whom are located overseas. Once the goods reach the cybercriminals, they are then resold on the black market for an illicit profit. Due to the intricacies of this kind of scam, it is exceedingly difficult to trace, stop, and return shipments, which is why reshipping scams have become a common means for miscreants to turn stolen credit cards into cash. In this paper, we report on the first large-scale analysis of reshipping scams, based on information that we obtained from multiple reshipping scam websites. We provide insights into the underground economy behind reshipping scams, such as the relationships among the various actors involved, the market size of this kind of scam, and the associated operational churn. We find that there exist prolific reshipping scam operations, with one having shipped nearly 6,000 packages in just 9 months of operation, exceeding 7.3 million US dollars in yearly revenue, contributing to an overall reshipping scam revenue of an estimated 1.8 billion US dollars per year. Finally, we propose possible approaches to intervene and disrupt reshipping scam services

    Future Challenges in Psychotherapy Research for Personality Disorders.

    Get PDF
    Individuals with personality disorders are frequently seen in mental health settings. Their symptoms typically reflect a high level of suffering and burden of disease, with potentially harmful societal consequences, including costs related to absenteeism at work, high use of health services, ineffective or harmful parenting, substance use, suicidal and non-suicidal self-harming behavior, and aggressiveness with legal consequences. Psychotherapy is currently the first-line treatment for patients with personality disorders, but the study of psychotherapy in the domain of personality disorders faces specific challenges. Challenges include knowing what works for whom, identifying which putative mechanisms of change explain therapeutic effects, and including the social interaction context of patients with a personality disorder. By following a dimensional approach, psychotherapy research on personality disorders may serve as a model for the development and study of innovative psychotherapeutic interventions. We recommend developing the following: (a) an evidence base to make treatment decisions based on individual features; (b) a data-driven approach to predictors, moderators, and mechanisms of change in psychotherapy; (c) methods for studying the interaction between social context and psychotherapy
    corecore