Tag Archives: access

Best Buy’s Worst Policy-Swiping ID’s and Destiny Management

Kaye Beach

April, 14, 2012

Best Buy (and Victoria’s Secret and The Finish Line and many other stores!) Requires Govt. Issued Photo ID for ALL Returns.

The ID card data is swiped, stored and shared with a third party  to track customer purchases and “to monitor the return behavior of shoppers; and warn or deny individuals flagged as questionable” Link to The Retail Equation, Inc.’s brochure


Best Buy’s return policy;

Returns Tracking

When you return or exchange an item in store, we require a valid photo ID. Some of the information from your ID may be stored in a secure database used to track returns and exchanges. Based on return/exchange patterns, some customers will be warned that subsequent purchases will not be eligible for returns or exchanges for 90 days. . .


. . . And how do we like it so far?

I’m Done With Best Buy Thanks to The Retail Equation

03-18-2012 02:37 PM

I am a premier silver member and have been for several years.  In November of last year, I received a warning in store that I could not make any returns at Best Buy for 90 days.  So for the next 90 days I did not make any purchases at Best Buy.

Yesterday, I spent over 700.00 on the new Ipad and an Invisible Shield.  The Invisible Shield was not installed correctly and Best Buy decided to give me a refund.  Keep in mind that this was only 29.99 of the amount I spent.  This was the first purchase I have made since the 90 days had expired.  I figured that I could return something that was actually not working correctly and be fine.  However I received another warning today saying that I could not return anything for 90 days even though the product was not working correctly.

It sounds like The Retail Equation (TRE) does not take into consideration that some returns might be valid due to defective products.  All TRE looks at is how many returns and that is not a fair way to evaluate whether someone is abusing a return policy.   In the end, Best Buy has lost a premier silver member.  Amazon and other online retailers will gladly accept my business going forward.  Best Buy seriously needs to find another way to evaluate returns instead of TRE.  Their method simply does not work.


Another unhappy Best Buy customer is suing them over their “swiping” policy.

How does this work?  According to the Retail Equation, Inc.,

“The technology’s predictive modeling measured the likelihood of fraudulent or abusive behavior, as well as the likelihood of a consumer’s profitability”

 Predictive Analytics

From Wikipedia  Predictive analytics encompasses a variety of statistical techniques from modeling, machine learning, data mining and game theory that analyze current and historical facts to make predictions about future events.

Data mining and predictive analytics is being used in just about every aspect of our lives.  Predictive analytics applies a mathematical formula to masses of data to predict what a person is more or less likely to do in the future.  Decisions are being made that affects our lives, sometimes for the better and sometimes for the worse, every day.

For example, in our schools;

“They use their technology infrastructure to gather and analyze data on the factors that are most predictive of students who are in danger of school failure and/or dropping out.  . . .As a result, the district has forged new partnerships with local law enforcement agencies”

From the Oklahoma Association for Supervision and Curriculum Development pg 26

If you think it stinks when you are misidentified as a naughty shopper, wait till you are misidentified as a “troubled individual”

Technology identifies troubled individuals

Sept 26, 2010

Imagine using the same technology to locate a lone bomber before he carries out his terrorist act and to identify a troubled veteran or first responder ground down by tragedies and violence.

Stop imagining.

A Swiss professor working with a Massachusetts Institute of Technology scientist who heads the Mind Machine Project there outlined how this program operates through computerized scanning of phone calls and electronic messages sent through e-mail and social networking mechanisms.

. . . Using character traits that have been identified through psychological profiles conducted on lone bombers following the Sept. 11, 2001, terrorist attacks, Guidere said he and his colleagues developed programs that isolate signs pointing to a potential terrorist.

He said lone bombers, in particular, are not mentally deranged but harbor hatred and deep resentment toward government. Their emotional spikes, Guidere explained, can be identified by the computer program.

The practical side is that once the individual has been identified, the information can be passed along to authorities so surveillance can begin. . .

Read more

The burgeoning use of driver’s license scanning devices makes tracking and monitoring of the population much easier.  When these data are held in separate databases there are plenty of security and privacy concerns but if the databases are linked or matched with other databases or shared-watch out!  The negative implications explode at that point.

In case you are wondering just what information is in those bar codes on your driver’s license, here is a link for you to follow and find out.

And here is a great article from 2002 which is ancient history from a technology capability perspective, but it does a great job of allowing us to begin to consider the implications of widespread scanning of our government issued photo ID’s .

Welcome to the Database Lounge

Published: March 21, 2002

ABOUT 10,000 people a week go to The Rack, a bar in Boston favored by sports stars, including members of the New England Patriots. One by one, they hand over their driver’s licenses to a doorman, who swipes them through a sleek black machine. If a license is valid and its holder is over 21, a red light blinks and the patron is waved through.

But most of the customers are not aware that it also pulls up the name, address, birth date and other personal details from a data strip on the back of the license. Even height, eye color and sometimes Social Security number are registered.

”You swipe the license, and all of a sudden someone’s whole life as we know it pops up in front of you,” said Paul Barclay, the bar’s owner. ”It’s almost voyeuristic.”

Mr. Barclay bought the machine to keep out underage drinkers who use fake ID’s. But he soon found that he could build a database of personal information, providing an intimate perspective on his clientele that can be useful in marketing. ”It’s not just an ID check,” he said. ”It’s a tool.”

Read More

Swiping of driver’s licenses is being required for buying gas (in case you try to leave without paying), for entry to public schools (in case you might be child predator and if you are misidentified as a sex offender, which happens often enough, well, stinks for you!), for buying cold medicine, for entry to bars and casinos, San Francisco wants ID swipes for most public events, Harlem wants tenants to swipe to gain entry to their homes,  and now, the TSA is swiping  airline passengers’ ID’s .


TSA tests ID-scanning machines at Washington Dulles

April 14, 2012

The Transportation Security Administration began an experiment today at Washington’s Dulles International Airport to check identification and boarding passes by machine rather than just the visual check by officers.

While TSA officers have been checking identification with black-lights and magnifying glasses, the machines are geared to recognize all valid identification, ranging from driver’s license or passport to tribal identification or foreign passport.

“For efficiency, it is fantastic,” said Domenic Bianchini, TSA director of checkpoint technology. “We think it’s a valuable technology and we think over time we will see the real value added.”

The machine doesn’t store any personal information about the passenger, according to Greg Soule, a TSA spokesman.

Gee.  When have we heard that before?

Although TSA has repeatedly stated that the scanners were “incapable of storing or transmitting” scanner images, despite specification data to the contrary provided by the respective manufacturers. In August 2010 EPIC (Electronic Privacy Information Center) discovered that the TSA had stored over 2,000 images, which the agency quickly claimed were of “volunteers” without specifying who compose this group or whether any were passengers who had “voluntarily” used the scanners in the testing phase.

Read more

The TSA is conducting the driver’s license “experiment” at Dulles, Houston and Puerto Rico but hopes to eventually “expand the program to every airport checkpoint” Read more

At some point in the not-so-distant-future, we will be required to show and/or swipe our driver’s license for just about everything we as humans need to live.  As the process grows more and more automated and the data is digitized, we will find our movements, transactions and habits logged and our lives tracked and documented.    Data mining and predictive analytics will be applied to nearly everything we do.  The purpose of such credentialing processes is to allow some access and deny others, deemed unworthy by algorithm, access.

In 2010 I was repeatedly denied the ability to pay for my purchases by check due to a company called Certegy’s algorithm which decided that since I rarely write checks but had written several during the Christmas shopping season, this indicated that I was untrustworthy and that stores should not accept my checks.  The year before, I was denied the privilege of renting a car because my credit score was too low.  My credit score is low because I don’t buy on credit!  I wasn’t asking to pay for the rental with credit either.  I offered my debit card.

Chances are you have experienced similar incidents.  Chances are that we have encountered other bumps in the road of life when no explanation for the problem was ever given but likely there was some algorithm behind it.  This is our future.  In health care, travel, purchases, renting or buying our homes, anything information about us that can be digitized can be factored in to determine whether or not we measure up.  This is nothing short of destiny management.

With the governments unhealthy focus on security at all costs, we can expect things to get more and more complicated as the practice of tracking and tracing and databasing everything we do grows. Woe to those that are unfortunate enough to be perceived as a possible threat or have a data trail that makes them appear less than an ideal citizen in the eyes of Big Momma Gov. who is no longer willing to wait for us to actually do something wrong before she pounces.  This government (and its partner corporations) wants to play psychic and limit our opportunities based on some supposed prescient power that indicates that we are more likely to do something naughty in the first place.

How do we exercise our free will when it is being effectively pre-empted?


Oklahoma Cops Thoroughly Probed in Order to Serve

Kaye Beach

Feb 24, 2011

The modern surveillance state demands to know all.   It never forgets,  never forgives.

The police background checks are already quite  thorough.   Is it ok to demand access to every nook and cranny of someones life because they want to be an law enforcement officer?  How about an Paramedic, a letter carrier?

Oklahoma police department wants prospective officers Facebook passwords as part of background check

The Norman, Oklahoma Police Department wants prospective officers to turn over their Facebook passwords as part of a background check for the job. “We’re actually hiring based on the quality of a person and you judge that through a variety of tools including a background investigation that talks to previous employers to friends to relatives to neighbors and up to and including their Facebook account,” said Captain Tom Easley from the Norman Oklahoma Police Department.

Read More

My first thought?  Smells like theInternational Association of Chiefs of Police. This international association operates under the code of ethics of an international body.  We have a Constitution in our country.  This is a problem.

The IACP appears to have quite a lot of power and influence at the DOJ all the way down to city police departments. They have been responsible for some of the most anti-american justice and policing policy that has besieged us since 9 11 when “everything changed”

The International Association of Chiefs of Police and the New Paradigm of Policing2

Yes. Our subversive friends at the IACP are pushing this hard.  Its called “Cybervetting”

In the opinion of the IACP

“The Internet is merely a new source to identify and collect information about people’s behavior.”

On December 30, 2010 the International Association of Chiefs of Police (IACP) released a report on their yearlong study of police cybervetting policy, “Developing a Cybervetting Strategy for Law Enforcement.” The report was a collaborative effort by the IACP and the Defense Personnel Security Research Center (PERSEREC).  Read More

Police recruits screened for digital dirt on Facebook, etc.

Updated 11/12/2010

Law enforcement agencies are digging deep into the social media accounts of applicants, requesting that candidates sign waivers allowing investigators access to their Facebook, MySpace, YouTube, Twitter and other personal spaces.

Some agencies are demanding that applicants provide private passwords, Internet pseudonyms, text messages and e-mail logs as part of an expanding vetting process for public safety jobs.

Read more

City jobs too-

If you’re planning to apply for a job with the city of Bozeman, Mont., be prepared to hand over much more than your references and resume.

The Rocky Mountain city instructs all job applicants to divulge their user names and passwords for “any Internet-based chat rooms, social clubs or forums, to include, but not limited to: Facebook, Google, Yahoo, YouTube.com, MySpace, etc.”

People that seek to avoid intrusive practices like giving up your biometrics for the “privilege” of driving or your 4th Amendment rights  to fly will soon find thier world getting very small.

I  refused to allow a digital (biometric) facial image capture at my doctors office this week and was informed that this might indeed be required in order for me to get my examination.

Upon checking further the receptionist found that it was not required-yet anyways.  I guess paying a doctor with my own money for an appointment is soon to become a “privilege” as well.  Yes.  We will all encounter greater and greater demands from us for access to all sorts of things.  Things like buying, selling or traveling.   In fact, you can bet on it.

Emergency access granted in test of interoperable ID system

Emergency access granted in test of interoperable ID system

Autumn Blend authenticates responders from federal, state and private-sector organizations

Oct 21, 2010

“Mobile and fixed devices electronically validated participants’ identities through personal identification credentials, ID numbers and biometrics. Logical access through personal identification allowed personnel to use computers for secure e-mail collaboration.

As the authentication systems cleared individuals for access to the venue, the Virginia Interoperability Picture for Emergency Response geospatial application tracked and displayed their locations in near real time at fusion and emergency operations centers across the country. ”

This is an unprecedented tracking, and control system that our government is building! You should know it will be utilized for everyone as soon as we all have the proper credentials. Real ID, smart passports, Schumer’s Biometric, RFID enabled social security card scheme, pass cards…that is what these things are for. They enable checkpoints to be placed in a snap and to control your ability to access services, areas, items.

Government employees already

It is sheer folly to give your government this much control over so many vital aspects of our lives.

A recent national emergency preparedness exercise successfully demonstrated an interoperable, electronic identity authentication system for government and private-sector personnel.

Known as Autumn Blend, the event was coordinated by the Homeland Security Department’s Federal Emergency Management Agency and Northrop Grumman. It included federal, state, local and private-sector emergency response and recovery officials.

…As the different response groups converged on the site, their personal identification credentials were electronically scanned at different authentication points to grant physical and data access during the demonstration.

.. . Mobile and fixed devices electronically validated participants’ identities through personal identification credentials, ID numbers and biometrics. Logical access through personal identification allowed personnel to use computers for secure e-mail collaboration.

As the authentication systems cleared individuals for access to the venue, the Virginia Interoperability Picture for Emergency Response geospatial application tracked and displayed their locations in near real time at fusion and emergency operations centers across the country.

Autumn Blend participants included:

  • DHS.
  • FEMA.
  • Buckley Air Force Base in Colorado.
  • Pentagon Force Protection Agency.
  • Pennsylvania Emergency Management Agency.
  • Southwest Texas Regional Advisory Council for Trauma.
  • Northrop Grumman’s Newport News shipbuilding sector.
  • Newport News fire department.
  • Virginia Governor’s Office of Commonwealth Preparedness.
  • Technology partners such as ActivIdentity, CertiPath and Monitor Dynamics.

Read more

State’s Sheriffs Want Access to Citizens’ Private Health Records

If you live in North Carolina and take prescription pain killers, you could soon find yourself on a police watch list. A nanny state initiative is being promoted by the state sheriffs association that would provide law enforcement officials with access to patients’ confidential records in the name of bolstering efforts in the war on prescription drug abuse.

Currently, only doctors and pharmacists in North Carolina are privy to the state’s database of patients and their prescriptions. Patient advocacy groups say allowing police officers to dabble with the system in their crime fighting efforts would be detrimental to ensuring privacy of common citizens who have been legally prescribed medications by their licensed physicians.

Read More

Ask Sen. Coburn to take a pass on PASS ID!

Senator Tom Coburn’s

(click for) Town Halls

Please respectfully remind Senator Tom Coburn of the fact that Oklahoma passed SB 464 prohibiting The Real ID Act from being implemented in this state.  Sen. Coburn is a ranking member on the Senate Committee on Homeland Security & Governmental Affairs and this committee is critical to the passage of Real ID II-The PASS ID

Department of Homeland Security (DHS) Secretary Janet Napolitano is trying to salvage Real ID with S 1261: PASS ID Act.   This measure does little more than give Real ID a name change and very superficial make over

On June 15, 2009, S. 1261, the “Providing for Additional Security in States’ Identification Act of 2009″ or the “Pass ID Act” was introduced in the Senate.(The PASS ID Act)

The PASS ID Act does not improve the most objectionable aspects of the Real ID Act of 2005.  For example;

1. The PASS ID Act requires a biometric facial image on all state driver’s licenses and ID cards. Just like Real ID. Facial recognition software, biometric scans, and radio frequency tracking along with linking of widely disparate databases taking place, will make truly pervasive surveillance and control of populations possible for the first time

2.  The PASS ID Act would allow a RFID chip to be embedded in the licenses.

3.  PASS ID prohibits federal agencies from accepting any non-compliant forms of ID for official purposes like boarding an airplane, entering a federal building or receiving benefits like Social Security. 2   (Remember-these are tax-payer funded institutions and programs!)

4. National ID systems such as PASS ID create inherent and substantial risks of fraud and identity theft. If the bill becomes law, it would establish a national ID card. 3 More than 2 dozen states have either passed laws or developed measures opposing Real ID.

5. In 2007, Oklahoma lawmakers passed SB 464, which states that “The state of Oklahoma shall not participate in the implementation of the REAL ID Act of 2005.” More than 2 dozen states have either passed laws or developed measures opposing Real ID.

The people and their representatives have clearly spoken-NO REAL ID!

click-Dates, Times Sen Coburn Townhalls plus contact info and sample email/letter/fax

See www.stoprealidcoalition.com for more info

1, 2 and 3http://epic.org/privacy/pass_id/