Skip navigation

Tag Archives: papers please

ALERT: Stalker Targets Facebook Activists
HUMANEWATCH.INFO
February 9, 2011

Throughout 2010, an impostor has been using Facebook to gain the confidence of activists, journalists, authors, members of Congress, and prominent members of public interest groups.

Operating under the fictitious names “Gregory Davis”, “Preston G. Davis”, and “Gregoire525″, this individual has friended more than 300 people, gaining access to the personal information and status updates they have posted. Many of those individuals were maligned on websites run by the Center for Consumer Freedom (CCF), an industry-funded astroturf group that specializes in vicious smear campaigns against public interest groups, vegans, environmentalists, animal welfare, and the charities associated with them.

HWI has obtained evidence that suggests CCF’s Director of Research, David Martosko, is using these false identities to spy on activists and public interest groups.

Given Martosko’s obsession with activistserratic behaviorsubstance abuse, rumors of stalking, and the presence of his name on a 2007 concealed weapon report, his access to this sensitive information is extremely troubling.

FULL ARTICLE

Quite convenient that this story comes out at the same time Facebook is now conditioning people to “show their papers” to “prove their identity”. The animal “rights” people targeted by Martosko will be begging for Facebook to forcing everybody to “show their papers” to prove their identity.

Facebook Japan Takes Hard Line, Banning Pseudo Names And Requires ID
Akky Akimoto
Asiajin
February 9, 2010

“Today February 8, some Japanese web users who are influential in tech communities like Hatena and Twitter, started reporting they were locked out from Facebook. After trying to log in, they were taken to the form, which title is “Complaints against a ban of your account, identity demanded”.

“On the form, following information are asked to provide,
* contact mail address
* name
* date of birth
* mail address for log in if you can use it
scanned image of your identification paper – keep full name, date of birth and photo clear, you may hide other information”

FULL ARTICLE

Right now it’s just for select people who have been banned, but soon they’ll just require EVERYBODY to show their papers in order to keep their account and for new users to show their papers to open a new account. And David Martosko’s agent provocateuring of animal “rights” people/groups will be used as the crisis which will be used to justify the solution: “papers, please”.

Dems spark alarm with call for national ID card

Alexander Bolton
The HIll
May 1, 2010

natid2.jpg

A plan by Senate Democratic leaders to reform the nation’s immigration laws ran into strong opposition from civil liberties defenders before lawmakers even unveiled it Thursday.

Democratic leaders have proposed requiring every worker in the nation to carry a national identification card with biometric information, such as a fingerprint, within the next six years, according to a draft of the measure.

The proposal is one of the biggest differences between the newest immigration reform proposal and legislation crafted by late Sen. Edward Kennedy (D-Mass.) and Sen. John McCain (R-Ariz.).

The national ID program would be titled the Believe System, an acronym for Biometric Enrollment, Locally stored Information and Electronic Verification of Employment.

It would require all workers across the nation to carry a card with a digital encryption key that would have to match work authorization databases.

Read entire article

Biometric National ID Card Included In Democratic Immigration Bill

Ryan Grim
The Huffington Post
April 30, 2010

Democrats pushed forward on an immigration overhaul on Thursday evening with no Republican support, as Sen. Lindsey Graham (R-S.C.) continues to hold out, arguing that the divisive issue will make progress on climate change legislation impossible.

The Senate is also in the middle of debating Wall Street reform, which is expected to take up the next few weeks of floor time. Reid, however, said that the chamber would be able to handle the task. “We can do more than one thing at once,” he said.

The Democratic proposal includes increased money for border patrol and drug war agents, equipment, helicopters and unmanned drones. It would create a national ID — which is dubbed a “biometric social security card.” Though Democrats insist that it is not an ID card and can only be used for employment purposes.

Read entire article

Comment: Suuuuure it won’t be used as an ID card. They said the same thing about the social security card, which you are required to have if you want a job, bank account, or a driver’s license. If you honestly believe that it won’t be used as a national ID card, then I have a bridge for sale for dirt-cheap.

http://www.washingtonpost.com/wp-dyn/content/article/2010/04/23/AR2010042301250.html?wpisrc=nl_natlalert

PHOENIX – Gov. Jan Brewer ignored criticism from President Barack Obama on Friday and signed into law a bill supporters said would take handcuffs off police in dealing with illegal immigration in Arizona, the nation’s gateway for human and drug smugglers.

With hundreds of people surrounding the state Capitol, protesting that the bill would lead to civil rights abuses, Brewer said she wouldn’t tolerate racial profiling. She said critics were “overreacting.”

“We in Arizona have been more than patient waiting for Washington to act,” Brewer said after signing the law. “But decades of inaction and misguided policy have created a dangerous and unacceptable situation.”

Obama said earlier Friday that he’s instructed the Justice Department to examine the Arizona bill to see if it’s legal, and said the federal government must enact immigration reform at the national level – or leave the door open to “irresponsibility by others.”

“That includes, for example, the recent efforts in Arizona, which threaten to undermine basic notions of fairness that we cherish as Americans, as well as the trust between police and their communities that is so crucial to keeping us safe,” Obama said.

The bill, sent to the Republican governor by the GOP-led Legislature, would make it a crime under state law to be in the country illegally. It would also require local police officers to question people about their immigration status if there is reason to suspect (Note: If you look like a foreigner and don’t carry and/or show your papers, then you are a suspected illegal immigrant, even if you were born in the U.S.) they are illegal immigrants. (Note: This opens the door to racial profiling.)

The bill takes effect 90 days after the legislative session ends in the next several weeks.

Demonstrators have been camped outside the Capitol since the measure passed out of the Legislature on Monday. Their numbers have grown steadily throughout the week, with buses bringing protesters from as far away as Los Angeles.

Brewer, who faces a tough election battle and growing anger in the state over illegal immigrants, said the law “protects every Arizona citizen.”

Arizona has an estimated 460,000 illegal immigrants and is the state with the most illegal border crossings, with the harsh, remote desert serving as the gateway for thousands of Mexicans and Central Americans.

U.S. Rep. Raul Grijalva, a Democrat who opposes the measure, said he’s closing his Arizona offices at noon Friday after his staff in Yuma and Tucson were flooded with calls this week, some from people threatening violent acts and shouting racial slurs.

The bill’s Republican sponsor, state Rep. Russell Pearce of Mesa, said Obama and other critics of the bill were “against law enforcement, our citizens and the rule of law.”

Pearce said the legislation would remove “political handcuffs” from police and help drive illegal immigrants from the state.

“Illegal is illegal,” said Pearce, a driving force on the issue in Arizona. “We’ll have less crime. We’ll have lower taxes. We’ll have safer neighborhoods. We’ll have shorter lines in the emergency rooms. We’ll have smaller classrooms.”

Other provisions of the bill allow lawsuits against government agencies that hinder enforcement of immigration laws, and make it illegal to hire illegal immigrants for day labor or knowingly transport them.

————————————-

http://www.azfamily.com/news/91769419.html
PHOENIX – A Valley man says he was pulled over Wednesday morning and questioned when he arrived at a weigh station for his commercial vehicle along Val Vista and the 202 freeway.

Abdon, who did not want to use his last name, says he provided several key pieces of information but what he provided apparently was not what was needed.

He tells 3TV, “I don’t think it’s correct, if I have to take my birth certificate with me all the time.”

3TV caught up with Abdon after he was released from the Immigration and Customs Enforcement office in central Phoenix. He and his wife, Jackie, are still upset about what happened to him.

Jackie tells 3TV, “It’s still something awful to be targeted. I can’t even imagine what he felt, people watching like he was some type of criminal.”

Abdon was told he did not have enough paperwork on him when he pulled into a weigh station to have his commercial truck checked. He provided his commercial driver’s license and a social security number but ended up handcuffed.

An agent called his wife and she had to leave work to drive home and grab other documents like his birth certificate.

Jackie explains, “I have his social security card as well and mine. He’s legit. It’s the first time it’s ever happened.”

Both were born in the United States and say they are now both infuriated that keeping important documents safely at home is no longer an option.

Jackie says, “It doesn’t feel like it’s a good way of life, to live with fear, even though we are okay, we are legal…still have to carry documents around.”

A representative at U.S. Immigration and Customs Enforcement (ICE) returned 3TV’s calls after researching the incident and she said this was standard operating procedure.

The agents needed to verify Abdon was in the country legally and it is not uncommon to ask for someone’s birth certificate. She also said this has nothing to do with the proposed bill or racial profiling.

Comment: This could be used to force everybody to go through bureaucratic red tape just to buy a bottle of food-grade hydrogen peroxide, or even a bottle of hydrogen peroxide with a hydrogen peroxide content of 3.5%. This is a nothing but a repeat of the “meth makers are using cold medicines to make meth, let’s put all cold medicines behind the counter, ration them, and force the sheeple to show their papers to buy cold medicines” propaganda. Pretty soon the terror fearmongerers will call for store-bought hydrogen peroxide – the bottles of hydrogen peroxide you would find in the medicine aisles in supermarkers and dollar stores such as Dollar General – to be put behind the counters, rationed, and force everybody to show their papers when they buy hydrogen peroxide.

FBI Issues Warning On Hydrogen-peroxide Bombers

William K. Rashbaum
The New York Times
September 16, 2009

An investigation that led to several raids in Queens on Monday prompted the Federation Bureau of Investigation and the Department of Homeland Security to issue a terrorism-related bulletin to law enforcement agencies around the country warning them to be vigilant about homemade explosives.

“In light of the ongoing investigation in New York City, the F.B.I. and D.H.S. believe it is prudent to remind our state and local partners about the variety of domestically available materials that could be used to create homemade explosives, which have been utilized in previous terrorist attacks,” according to the bulletin, which was headed “On-Going Terrorist Interest in Homemade Explosives.”

The bulletin said the two agencies have no specific information on the timing, location, or target of any planned attack.

It noted, however, that precursors chemicals used to form hydrogen-peroxide based explosives can be obtained at various retail outlets, including hardware stores and pharmacies, and that recipes for such explosives are taught in terrorist training camps, published in widely circulated terrorist manuals, and have been recovered from terrorist safe houses.

Read entire article

http://philosecurity.org/2009/05/28/doctors-require-photo-id-for-treatment

Doctors Require Photo ID for Treatment
May 28th, 2009 by sherri

Walking into the doctor’s office, I was surprised to see a new sign in front of the receptionist, which read:

“Red Flag Identity Theft Rule We are now required by law to ask for a Photo ID at the time of each visit. Please have your Photo ID ready for the receptionist to scan.”

As an avid bicyclist, I wasn’t carrying a driver’s license.

“I’m sorry, we’ll have to reschedule you,” said the receptionist. “We need to scan your ID before we can see you. It’s a new law.”

“No, I really don’t have one. I bicycle everywhere. I don’t even know where my old license is any more.”

She looked me in the eye and said, “Sorry. I suggest you get a photo ID. You need to have one to be seen.”

“What if I’m paying for my own visit, and not using health insurance?”

“We need to scan your ID and have it in your file or we can’t see you.”

“I don’t think it’s right to deny care to patients who don’t have a Photo ID,” I said.

“Well, I can talk to my supervisor,” she said. “But I think you’re going to have to reschedule.”

As I waited, I watched the receptionist take another patient’s driver’s license and walk off into a back room. Apparently, in order to comply with the “Red Flag Identity Theft Rule,” the doctor’s office now scans a copy of every patient’s driver’s license and stores it in their computer systems.
How secure are my doctor’s computer systems? Patients don’t have the right to know. Doctor’s offices, hospitals and even health insurance companies get infected with viruses, worms and spyware all the time. These are generally not reported as patient data breaches, because they are far too common.

Just in the past few weeks, there have been news reports of patient data thefts from UC Berkely Health Service, Virginia Prescription Monitoring Program and Memorial Medical Center. The vast majority of breaches never get reported or even detected, however, because tiny little health care clinics and hospitals all over the country have neither the resources nor the incentives to institute appropriate detection measures.

And now they want to store a high-resolution copy of my driver’s license on top of everything else? What is this “Red Flags Identity Theft Rule,” anyway?

The Red Flags Rules are a collection of new Federal Trade Commission regulations aimed at reducing the risk of identity theft. The American Medical Association and dozens of other medical societies “have protested the FTC’s decision to apply the Red Flags rule to medical practices and other health care providers.”

Why on earth does the Federal Trade Commission affect who my doctor treats?

According to the FTC, “Health care providers may be subject to the Rule if they are ‘creditors.’ Although you may not think of your practice as a ‘creditor’ in the traditional sense of a bank or mortgage company, the law defines ‘creditor’ to include any entity that regularly defers payments for goods or services or arranges for the extension of credit. For example, you are a creditor if you regularly bill patients after the completion of services, including for the remainder of medical fees not reimbursed by insurance.”

The FTC requires “each financial institution or creditor to develop and implement a written Identity Theft Prevention Program (Program) to detect, prevent, and mitigate identity theft in connection with the opening of certain accounts or certain existing accounts.” Although the Red Flags Rules do not explicitly require doctor’s offices to make copies of patient identification, they are often implemented this way.

Ironically, spreading more private information around– such as high-resolution copies of driver’s licenses- increases patients’ risk of identity theft. As a 2008 World Privacy Forum report explained:

“When patients are, for example, asked for a drivers’ license when checking in to hospitals for surgery, the license itself may be copied or scanned and added into the actual patient file. This can give hospital insiders with criminal tendencies access to a treasure trove of photographic, biometric, and other information that may have been unavailable to them before. The result can be more identity theft (medical and otherwise).

“…Just because customer identity proofing is commonplace in the financial sector does not mean that it has translated perfectly or even well to the health care sector. The two sectors have different regulatory requirements, approaches to access points, security, and information flows. Banks and health care providers also have different competencies, staffing capacities, training, and in many cases even procedures when it comes to reviewing and managing customer identification documents.”

Everyone should have access to medical care– not just people who have registered with the government and obtained a photo ID. Furthermore, patients should have the right to health care without being forced to give up control of our personal information. As a patient, I don’t really want a copy of my Photo ID stored on a crappy unpatched Windows box at my doctor’s office. Today’s patients do not even have the right to know how well doctor’s offices and hospitals are secured, even in the face of constant reports of medical data breaches. That’s sick.
=================================

Two more links on this subject:

http://www.newjerseynewsroom.com/healthquest/identity-theft-causing-need-for-photo-id-check-at-the-doctors-office

=================================
http://www.ftc.gov/bcp/edu/pubs/articles/art11.shtm

The “Red Flags” Rule: What Health Care Providers Need to Know About Complying with New Requirements for Fighting Identity Theft
by Steven Toporoff

As many as nine million Americans have their identities stolen each year. The crime takes many forms. But when identity theft involves health care, the consequences can be particularly severe.

Medical identity theft happens when a person seeks health care using someone else’s name or insurance information. A survey conducted by the Federal Trade Commission (FTC) found that close to 5% of identity theft victims have experienced some form of medical identity theft. Victims may find their benefits exhausted or face potentially life-threatening consequences due to inaccuracies in their medical records. The cost to health care providers — left with unpaid bills racked up by scam artists — can be staggering, too.

The Red Flags Rule, a law the FTC will begin to enforce on August 1, 2009, requires certain businesses and organizations — including many doctors’ offices, hospitals, and other health care providers — to develop a written program to spot the warning signs — or “red flags” — of identity theft. Is your practice covered by the Red Flags Rule? If so, have you developed your Identity Theft Prevention Program to detect, prevent, and minimize the damage that could result from identity theft?

WHO MUST COMPLY
Every health care organization and practice must review its billing and payment procedures to determine if it’s covered by the Red Flags Rule. Whether the law applies to you isn’t based on your status as a health care provider, but rather on whether your activities fall within the law’s definition of two key terms: “creditor” and “covered account.”

Health care providers may be subject to the Rule if they are “creditors.” Although you may not think of your practice as a “creditor” in the traditional sense of a bank or mortgage company, the law defines “creditor” to include any entity that regularly defers payments for goods or services or arranges for the extension of credit. For example, you are a creditor if you regularly bill patients after the completion of services, including for the remainder of medical fees not reimbursed by insurance. Similarly, health care providers who regularly allow patients to set up payment plans after services have been rendered are creditors under the Rule. Health care providers are also considered creditors if they help patients get credit from other sources — for example, if they distribute and process applications for credit accounts tailored to the health care industry.

On the other hand, health care providers who require payment before or at the time of service are not creditors under the Red Flags Rule. In addition, if you accept only direct payment from Medicaid or similar programs where the patient has no responsibility for the fees, you are not a creditor. Simply accepting credit cards as a form of payment at the time of service does not make you a creditor under the Rule.

The second key term — “covered account” — is defined as a consumer account that allows multiple payments or transactions or any other account with a reasonably foreseeable risk of identity theft. The accounts you open and maintain for your patients are generally “covered accounts” under the law. If your organization or practice is a “creditor” with “covered accounts,” you must develop a written Identity Theft Prevention Program to identify and address the red flags that could indicate identity theft in those accounts.

SPOTTING RED FLAGS
The Red Flags Rule gives health care providers flexibility to implement a program that best suits the operation of their organization or practice, as long as it conforms to the Rule’s requirements. Your office may already have a fraud prevention or security program in place that you can use as a starting point.

If you’re covered by the Rule, your program must:

Identify the kinds of red flags that are relevant to your practice;
Explain your process for detecting them;
Describe how you’ll respond to red flags to prevent and mitigate identity theft; and
Spell out how you’ll keep your program current.
What red flags signal identity theft? There’s no standard checklist. Supplement A to the Red Flags Rule — available at ftc.gov/redflagsrule — sets out some examples, but here are a few warning signs that may be relevant to health care providers:

Suspicious documents. Has a new patient given you identification documents that look altered or forged? Is the photograph or physical description on the ID inconsistent with what the patient looks like? Did the patient give you other documentation inconsistent with what he or she has told you — for example, an inconsistent date of birth or a chronic medical condition not mentioned elsewhere? Under the Red Flags Rule, you may need to ask for additional information from that patient.
Suspicious personally identifying information. If a patient gives you information that doesn’t match what you’ve learned from other sources, it may be a red flag of identity theft. For example, if the patient gives you a home address, birth date, or Social Security number that doesn’t match information on file or from the insurer, fraud could be afoot.
Suspicious activities. Is mail returned repeatedly as undeliverable, even though the patient still shows up for appointments? Does a patient complain about receiving a bill for a service that he or she didn’t get? Is there an inconsistency between a physical examination or medical history reported by the patient and the treatment records? These questionable activities may be red flags of identity theft.
Notices from victims of identity theft, law enforcement authorities, insurers, or others suggesting possible identity theft. Have you received word about identity theft from another source? Cooperation is key. Heed warnings from others that identity theft may be ongoing.

SETTING UP YOUR IDENTITY THEFT PREVENTION PROGRAM
Once you’ve identified the red flags that are relevant to your practice, your program should include the procedures you’ve put in place to detect them in your day-to-day operations. Your program also should describe how you plan to prevent and mitigate identity theft. How will you respond when you spot the red flags of identity theft? For example, if the patient provides a photo ID that appears forged or altered, will you request additional documentation? If you’re notified that an identity thief has run up medical bills using another person’s information, how will you ensure that the medical records are not commingled and that the debt is not charged to the victim? Of course, your response will vary depending on the circumstances and the need to accommodate other legal and ethical obligations — for example, laws and professional responsibilities regarding the provision of routine medical and emergency care services. Finally, your program must consider how you’ll keep it current to address new risks and trends.

No matter how good your program looks on paper, the true test is how it works. According to the Red Flags Rule, your program must be approved by your Board of Directors, or if your organization or practice doesn’t have a Board, by a senior employee. The Board or senior employee may oversee the administration of the program, including approving any important changes, or designate a senior employee to take on these duties. Your program should include information about training your staff and provide a way for you to monitor the work of your service providers — for example, those who manage your patient billing or debt collection operations. The key is to make sure that all members of your staff are familiar with the Rule and your new compliance procedures.

WHAT’S AT STAKE
Although there are no criminal penalties for failing to comply with the Rule, violators may be subject to financial penalties. But even more important, compliance with the Red Flags Rule assures your patients that you’re doing your part to fight identity theft.

Looking for more information about the Red Flags Rule? The FTC has published Fighting Fraud with the Red Flags Rule: A How-To Guide for Business, a plain-language handbook on developing an Identity Theft Prevention Program. For a free copy of the Guide and for more information about compliance, visit ftc.gov/redflagsrule.

In addition, the FTC has released a fill-in-the-blank form for businesses and organizations at low risk for identity theft. The online form offers step-by-step instructions for creating your own written Identity Theft Prevention Program. You can fill it out online and print it. The do-it-yourself form is available at ftc.gov/redflagsrule.

Questions about the Rule? Email RedFlags@ftc.gov.

Steven Toporoff is an attorney with the FTC’s Division of Privacy & Identity Protection.

May 2009

Follow

Get every new post delivered to your Inbox.