• Categories

  • Pages

  • Archives

Drones: Insurance Industry Game Changers.

With the expanded popularity and use of drones for everything from aerial surveillance to Amazon deliveries, it was only a matter of time before their impact was felt in the claims industry.  The four main areas of impact from drone technology  in the insurance field include:

  1. On site investigation and accident reconstruction.
  2. Surveillance and the monitoring of disabilities.
  3. Claims settlements.
  4. New forms of insurance coverage for drones.

While the current cost of sending field adjusters to investigate accident scenes is high, these fees can soon be mitigated by the use of drones for these services.  Additional benefits of drone usage in the insurance business are ease and rapidity of deployment, liability determination and injury confirmation.

Drones will also be playing  a significantly larger role in fighting insurance fraud through possible surveillance of bodily injury/workers’ compensation claimants.

 

There are, however, liability risks associated with drones, like the potential for drones to drop out of the sky and because they fly at low altitudes, there is the risk of a drone crash possibly causing property or personal injury damage.  Also, certainly we will see lawsuits relating to drone use alleging invasion of privacy.

 

Nonetheless, drone use is not only here to stay but will expand dramatically as the technology improves, making its inclusion in insurance matters a cornerstone of that industry.  It’ll be interesting to see how the law adapts to the inevitable drone factor.

BNI Operatives: Situationally aware.

As always, stay safe.

Why Lawyers Should Be Paranoid About Client Confidentiality

From Clio, January, 2017:

In April 2016, a lawsuit was filed claiming one Chicago-based law firm had failed to protect confidential client information.

The suit didn’t accuse lawyers at the firm of inadvertently sharing client information. In fact, according to The American Lawyer, “[t]he complaint makes no claim that data was stolen or used against clients.” The claim solely focuses on the fact that lax data security could have put client information at risk.

Talk about an eye-opener, for lawyers and others (such as private investigators) who retain confidential information during the normal course of business.  And, it could be inadvertent actions – usually online – that can cause these security breaches.

Client confidentiality in the age of social media:

Consider the amount of information that gets shared on social media:

  • Facebook users send 31.25 million messages per minute
  • Twitter users send nearly 350,000 tweets per minute
  • Instagram users post almost 50,000 photos each minute

If you’re a lawyer, you need to take extra care when using social media. There are plenty of ways your tweets or posts could inadvertently breach client confidentiality.

For example, if you use Swarm to check in at Starbucks during a client meeting, you could inadvertently disclose your client’s location as well. This may be an issue if your client wishes to remain anonymous, or if they don’t want it to be known that they have legal representation.

Photos can also be a problem. You should be more aware than lawyer and politician Kris Kobach, who accidentally revealed notes on proposed immigration policy in a photo with Donald Trump. You should always be extremely aware of what might be in the eye of a camera lens. Your son could take an impromptu photo while you’re catching up on some work at the dining room table; if there’s any sensitive information is visible in the image,  you need to make sure that photo doesn’t get posted online (and does get deleted from his device).

Steps lawyers need to take on social media

Does this mean you need to stop using social media? No. But you do need to reconcile the practice of sharing information online with the need to keep client information confidential.

Here are a few things you can do to ensure you’re protecting client information:

  • Go private on Facebook. This is a simple step for all lawyers (and for anyone using Facebook, for that matter). Go to “Settings,”, then “Privacy,” and set all of the visibility options so that only “Friends” can see your profile. If you want to market your law firm on Facebook, set up a separate Facebook page—and be extra mindful of the information you’re sharing on it.
  • Use two-factor authentication. Using two-factor authentication to protect your online accounts is one of the most effective steps you can take to protect client information.
  • Don’t use live mic technology. Someone’s always listening. Amazon hasn’t given up user data in this now-infamous murder case from late 2016 (so far), but that doesn’t mean you should put client information at risk by keeping an Echo or an equivalent device inside your office.  And definitely ensure that no one in your office is walking around with a live mic device.

In short, you want to do everything you can to prevent unauthorized access to client information. In 2017, that means a lot more than just shutting the door each time you meet with your clients.

BNI Operatives; situationally aware.

As always, be safe.

 

Working Around Invisible or Partially Available Social Media Profiles

As part of our due diligence during a subject’s comprehensive background check, we generally begin with a review of social media.  Sites like Facebook, Twitter, Instagram and LinkedIn are primary and initial stops in the identification verification aspect of a background check. (For the purpose of this week’s article, we will concentrate on business connection site, LinkedIn.)
Searching for your subject through Linkedin may return an invisible profile if you’re not in your subject’s connections network. Your Linkedin network consists of your 1st, 2nd and 3rd degree connections and your group members. The more connections, the more full profiles available to you. You can also see attachments such as resumes.

Once you have your subject’s Linkedin profile, Google the name or search for it through bing.com to get the profile URL.

Linkedin Profile at Bing

Paste that URL into a private viewing web browser.

Private Linkedin Profile

This result is what we want to view and download.

See Resume

If the Linkedin resume is stored at their slideshare.net account, you can find it via a quick Google search- while in an incognito browser session:

Slideshare Resume Search

Select the top entry link and you will be taken to the full resume.  Download.

Slideshare resume download

Mission accomplished! The above method is a viable workaround to the limitations placed on profile sharing by social media.  Where there’s a will…

BNI Operatives; Situationally aware.

As always, stay safe.

An App That Allows Children & Teens To Cyber Bully Other Kids


Who on earth would develop an app that would allow, rather, encourage children to bully one another?? A company that claims it is a business site seeking true feedback for executives.   Yet, a members collage banner on the site’s home page features its alleged subscribers – one is a kid holding up his middle finger, another is of a 10 y.o. girl and a third is comprised of two teen “chicks” sporting that annoying duck face pose. (Hey, if they want to look stupid,  I will use a silly description.)

From The Telegraph, May 18, 2017:

UPDATE MAY 29, 2017: THE SITE, SAYAT.ME,  IS BACK ONLINE.

The Sayat.me website was taken offline by its administrators following the suicide of George Hessay, a teenager from Goole, East Yorkshire, who had been allegedly abused over the app.

The app, which is a growing craze among teenagers, allow users to post anonymous “feedback” about their friends. It has been criticised for creating a vehicle for cyber-bullying among school children.

Sayat.me, which is based in Estonia, is designed for business users seeking “constructive, honest feedback” from colleagues and clients. It has 30 million users, many of whom are believed to be teenagers.

The app is a growing craze among teenagers
The app was designed to provide businesses with feedback but is increasingly being used by teenagers

Last week Hessay, a keen footballer, took his own life after being allegedly bullied by his peers on the app.

Hanna Talving, the CEO of Sayat.me, said: “We have been made aware by police that they are investigating a bullying related suicide and we offer our sincere condolences to those affected by this loss.

“We deplore bullying of any kind and want it to have no place on our site. We will offer any assistance we can to the police. We have suspended use of the website to show how seriously we take these matters.”

Friends paid tribute to the teenager on Facebook, with Joely Baxter writing: “George Hessay was such a nice boy who cared about everyone and made sure everyone was ok.

“He really didn’t deserve what happened to him, nobody does and I think that whoever wrote things about him on that stupid Sayat.me thing should be ashamed and grow some balls and own up to it because whoever did it was sick in the head”.

I cannot image what was going through this promising young man’s head when he took his own life because he was being so badly cyber abused that he felt life was not worth living.  I also cannot imagine the family’s shock, pain and incomprehension at such a finite action taken by their loved one.  My heart goes out to George’s family and friends.

Now let me offer some advice to the people who were surely in George’s life but to be applied to those now in the lives of children and teens being cyberbullied:

  • Friends: You may be young but you know right from wrong. Speak up. Being quiet makes your friend who is targeted believe that no one cares or that what is being said about him is true,
  • Teachers: You see the kids snickering at a particular student. Speak up. Dirty looks only go do far.
  • Parents: You know your child, the sneaky looks with malicious intent. Speak up. Or run the risk of raising a punk.

If you believe your child is being bullied, contact StompOutBullying.org.  Anyone who has raised a teen knows that, often, adults are the last ones they may want to talk to about their problems.  Stomp Out offers a free hotline for teens 13+ who are being bullied to reach out and speak to peers.

BNI Operatives: Situationally aware.

As always, stay safe.

Text Test By Police: The New Breathalyzer.

From Forbes, 05.15.2017:

Legislation that’s working its way through Albany could allow New York authorities to check drivers’ phones for signs of distraction following an accident, and to impose penalties for refusing that could burden drivers down the road.

A bill that would legalize the use of “textazlyer” devices for determining activity on drivers’ phones is seeing bipartisan support from New York lawmakers, WGRZ Buffalo reported. If passed, it could make New York the first state to implement the technology for catching distracted drivers, who contributed to more than 10,000 traffic fatalities in the last year alone, according to WGRZ.

Now moving through senate and assembly committees, the bill would require drivers who’ve been involved in an accident to let authorities scan their phones for evidence of recent use, or face penalties and license suspension, both at the time and later on, if they refuse. Once developed, the field test could allow officers to quickly generate a time-stamped report on which applications were running and whether drivers were using devices ‘hands on’ or ‘hands free’-style around the time of the accident, according to NPR.

State Senator Mike Ranzenhofer (R-Amherst), who co-sponsored the bill, told WGRZ that a textalyzer tool would not access other content on the phone, nor be able to read text messages, for example, that drivers may have sent or received on the road. Ranzehofer also said the bill could be passed in the legislature by the end of its current session, which concludes next month, and assured WGRZ, “If the device was trolling through your information, I would not be in support of it.”

In New York, the legislation would be known as Evan’s Law, named for 19-year-old Evan Lieberman, who was killed in a 2011 car crash that was later found to be the result of distracted driving. His father Ben Lieberman told NPR he’d “found out the hard way” after his son’s death that obtaining driver phone records after an accident can be “an agonizing process.”

“We often hear, ‘just get a warrant’ or ‘just get the phone records,’ [implying] that the warrant is like filling out some minor form … In New York, it involves a D.A. and a judge. Imagine getting a D.A. and a judge involved in every breathalyzer that’s administered,” he told NPR. Once obtained, such records only show activities like calls and texts, Lieberman said, but not whether drivers were checking email, browsing Twitter, or using any number of other popular apps and platforms.

Recently, Lieberman and representatives of Cellebrite, an Israeli tech developer, demonstrated the textalyzer system they’ve been working on before lawmakers in New York. CBS New York reported that Cellebrite hopes to finish the technology in around nine months, and said the final product will be designed to protect drivers’ data by only seeking evidence of activity on their phones. “For this device, the whole purpose is not to get any data,” said Jim Grady, CEO of Cellebrite USA, to CBS. “So no, police won’t be able to, unless they rewrite our code.”

Depending on the final product, the bill may also force drivers who, for whatever reason, want to protect their privacy by refusing to surrender phones to face some difficult decisions. According to the bill, everyone operating a motor vehicle which “has been involved in an accident or collision involving damage to real or personal property, personal injury, or death, and who has in his [sic] possession at or near the time of such accident or collision, a mobile telephone or electronic device,” would be required to submit such device or devices for on-the-spot field testing upon authorities’ request.

If a driver refuses to surrender their phone for ‘textalyzing,’ they could be subject to a variety of consequences under the bill, starting with the immediate suspension of their driver’s license. In such case, “The police officer will inform the driver that the person’s license or permit to drive and any non-resident operating privilege shall be immediately suspended and subsequently revoked,” the bill explains, while the record of refusal itself “shall be admissible in any trial, proceeding, or hearing” based on a violation of related distracted driving laws, and makes drivers vulnerable to higher fees and heavier punishment later on–all of which could weigh particularly heavily on low-income drivers, those whose employment relies on having an active license, and other disproportionately targeted groups.

According to the Tennessee Law Blog, similar technology is already being used by the FBI, while a number of states are also eyeing the system as a way to bring down the large number of U.S. road fatalities each year.

===============================

My opinion: Textalyzer field testing is a huge overreach by the government and undoubtedly backed by insurance companies, who have become de facto arms of law enforcement of late.  We all know how this will turn up – FUBAR’d to heck and any personal privacy will be gone forever.  Are we seriously becoming such big babies that we can’t restrain ourselves from having to text non-urgent messages while driving? We need government to monitor our every movement because we can’t trust ourselves? With all due respect to those who have lost loved ones to distracted drivers- it’s not the cell, it’t the driver.  It’s after the fact.  If a person isn’t conscious of their actions, endangering everyone else’s privacy is not the answer.  There are apps out there that won’t allow texting while driving for our inexperienced drivers or the weak-willed:

From PolicyGenius:

Drive First
Drive First comes straight from Sprint, and it’s cool that carriers are getting into the no-texting-while-driving game. Your phone automatically locks when you start driving, so no need to start or stop the app, and it automatically replies to texts. But sometimes you need access to things on your phone, right? Drive First lets you set 3 driving apps – like maps or music – so you can get what you need without being tempted to text. You can also set VIP contacts to bypass the block so important people like your husband or boss aren’t blocked every time you get into the car.

Focus
You might have heard of Focus if you’re a fan of Note to Self. The episode that featured Focus was…um, focused on “wexting” – walking and texting – but it works just as well for driving. Like DriveMode, Focus doesn’t actually block anything. Instead, it works to train you to not use your phone while you’re driving. When you’re using it, Focus will tell you to pay attention to your driving. And honestly, while it starts off with gentle reminders, it can get kind of aggressive. If you’re not someone who handles confrontation well, you’ll probably learn quickly. You get report cards emailed to you so you can see how you (or someone else, like your kids) did. If you’re looking to form habits instead of just have your phone locked down, consider Focus.

Drive Mode
If you want something that’s a little less intense, consider Drive Mode. (Not to be confused with the above DriveMode. I know.) It doesn’t block anything, but it does prevent your lockscreen from enabling, so no more typing in PINs or swiping patterns, and it automatically switches calls to your speakerphone. It’s pretty simple, but those two changes remove a lot of the distractions you face from your phone.

TextNoMore
TextNoMore is interesting because it gives you an incentive to not text and drive (besides, you know, not dying). When you’re about to drive, you start the app and put in your estimated driving time. It’ll shut down notifications – nothing revolutionary about that – but the service is partnered with various retailers to provide coupons if you don’t text. It also shows missing children notifications once the app shuts down, so you can feel like you’re doing good, too. The app itself is a little rough-looking, but it’s an intriguing idea and it’ll be interesting to see if others implement similar features.

===========================

For now, keep your eyes on the road and your cell in your pocket, purse or glove compartment, if you really need to.

BNI Operatives: Situationally aware.

As always, stay safe.

 

 

Tips For Witness Statements By Email Or Phone & Statement Checklist

With so many people with busy schedules these days, sometimes, an investigator does not have the opportunity to sit down with a witness and take a statement.  While an in-person statement is best and the ideal as the operative can view the witness’ demeanor, mannerisms and interpret the witness’ body language, that simply may not be possible. Or you can have a witness that has moved very far out-of-town.  For whatever reason, the investigator now finds herself having to take a statement via email or the phone.

There are several steps that we follow specific to these methods of recording testimony: (For this article’s purpose, references to emails and phones numbers are for those to be used in connection to a witness’ statement.)

  1. Verify your witness’ identity.   Via phone or email, you may not be able to tell if you are speaking with John Doe, Sr. or Jr., so ensure you are speaking with your true witness by verifying personal identifiers such as full name, DOB and SSN.
  2. Verify the owner/registrant of the phone number or the email.  Imagine trying to follow up with a witness for clarification on a point in his statement only to get this text in return, “Don’t text this number ever again. I don’t know where that lying cheater is and I never want to hear from him again either.”  Or, worse, you disclose sensitive information in an email only to find out that, for his own purposes,  your witness had given you someone else’s email address.
  3. Verify the person’s residence rather than where they are staying on the date and time of your call/email.   You may be reaching someone at their beach house or ski chalet.  Ask if the address is their permanent residence.
  4. Before taking any statement, talk with your witness at length.  Remember that a witness statement is taken not only for the sake of preserving evidence and recall of events, but also for the purpose of negotiation, therefore, the strength of your witness’ recall is critical in that the other side can then determine the validity of the monetary demand by the plaintiff’s attorney.  Witnesses should therefore, prior to any official statement recording, be walked through an initial recitation of events involved in the client’s matter to a) jog and strengthen their memories and  b) allow the witness to experience the logical chain of thought involved so that the memories are returned in efficient, logical order – especially important if live court testimony will be involved, enabling the witness to become adjusted to the pace of Q&A.  Also, always write for the court.  Presume a judge will see your witness statement at some point. The witness’ recall must therefore be recorded clearly.
  5. *Use a witness statement checklist for the actual statement. An investigator can go off script if there is reason to but for the most part, a comprehensive statement checklist ensures that no relevant information is lost or goes unrecorded.
  6. Request the contact formation of at least two emergency or backup contacts.  Two alternate contacts should be on record for any witness statement undertaking, in-person, via phone or by email.   You do not know the witness’ plans to relocate and neither may she at the time of statement intake.

*Below is an actual Witness Statement Checklist currently in use by BNI operatives for MVA (Motor Vehicle Accident) incidents.

Keep in mind that a strong witness statement may position a case for a fair settlement sooner rather than later.

BNI Operatives; Situationally aware.

As always, be safe.

With An Ear For New Technology: New API Can Copy The Voice Of Anyone

IN BRIEF: Montreal-based technology startup Lyrebird has launched a new app interface that allows people to synthesize speech using just a 60-second recording of anyone’s voice audio. While the technology is ground-breaking, its potential use to commit fraud is a huge red flag.

From Futurism: (For those you blessed/cursed with avid curiosity:  A lyre bird is most notable for its superb ability to mimic natural and artificial sounds from its environment.)

We regularly hear about new technologies for editing images in a unique way or better algorithms for visual recognition software. Clearly, a lot of work is being done to improve image generation techniques, but very rarely, however, does news about new voice-editing tech emerge. Adobe’s Project VoCo software is one of just a few exciting examples, but now, Montreal-based startup Lyrebird believes it’s done something even more impressive.


Like VoCo, Lyrebird’s latest application program interface (API) synthesizes speech using anyone’s voice. Unlike VoCo, which requires 20 minutes of audio to generate its replication, Lyrebird’s tech only needs a minute-long sample of the voice it’ll synthesize.

And, as if that’s not impressive enough, Lyrebird’s new service doesn’t require a speaker to say any of the actual words it needs. It can learn from noisy recordings and put different intonations into the generated audio to indicate varied emotions, also.

A CONCERNED VOICE:  Lyrebird’s new tech is revolutionary, indeed. It doesn’t just edit audio recordings — it makes it easy for someone to generate a new recording that truly sounds like it was spoken by a particular person and not created by a computer.

This raises some rather interesting questions, and not only does Lyrebird acknowledge these, the company actually wants everyone else to as well:

Voice recordings are currently considered as strong pieces of evidence in our societies and in particular in jurisdictions of many countries. Our technology questions the validity of such evidence as it allows to easily manipulate audio recordings. This could potentially have dangerous consequences such as misleading diplomats, fraud, and more generally any other problem caused by stealing the identity of someone else […] We hope that everyone will soon be aware that such technology exists and that copying the voice of someone else is possible. More generally, we want to raise attention about the lack of evidence that audio recordings may represent in the near future.

In short, Lyrebird want people to know they can easily be duped by audio, and hopes this knowledge will actually prevent fraud: “By releasing our technology publicly and making it available to anyone, we want to ensure that there will be no such risks.”

Being aware of the potential to be bamboozled by audio is one thing, but protecting oneself from potential fraud is another. Still, the value of Lyrebird’s technology can’t be denied. Whether its usefulness for things like creating more realistic-sounding virtual assistants outweighs its potential for nefarious endeavors remains to be seen.

***************************

Lyrebird’s developer API is still under development.  BNI has become a beta-tester and we will be informed of its launch which we will, of course, pass along.  Our readers will be among the first to know how this new technology works in the real world.  Stay tuned.

BNI Operatives: Situationally aware.

As always, stay safe.

 

Your Daughter Arrested By Your Own DNA? Ancestry Sites & Law Enforcement

Back in 2009, I’d written an article on Disney theme parks sharing facial recognition technologically enhanced photos of park-goers with the Department of Homeland Security in an effort to boost the DHS’ base population photo database.  Shortly thereafter, the theme parks were joined by cruise lines, vacation spots and just about all hotel, domestic and international, check-ins.  Now firmly in possession of billions of citizen and visitor photos, law enforcement has moved on to absorb as much DNA from the public as it can, often to identify relatives of those on file in connection with crimes.

This 2015 Fusion article describes the acquisition of genetic IDs from family ancestry sites like Ancestry.com and 23andMe:

When companies like Ancestry.com and 23andMe first invited people to send in their DNA for genealogy tracing and medical diagnostic tests, privacy advocates warned about the creation of giant genetic databases that might one day be used against participants by law enforcement. DNA, after all, can be a key to solving crimes. It “has serious information about you and your family,” genetic privacy advocate Jeremy Gruber told me back in 2010 when such services were just getting popular.

Now, five years later, when 23andMe and Ancestry both have over a million  customers, those warnings are looking prescient. “Your relative’s DNA could turn you into a suspect,” warns Wired, writing about a case from earlier this year, in which New Orleans filmmaker Michael Usry became a suspect in an unsolved murder case after cops did a familial genetic search using semen collected in 1996. The cops searched an Ancestry.com database and got a familial match to a saliva sample Usry’s father had given years earlier. Usry was ultimately determined to be innocent and the Electronic Frontier Foundation called it a “wild goose chase” that demonstrated “the very real threats to privacy and civil liberties posed by law enforcement access to private genetic databases.”

The FBI maintains a national genetic database with samples from convicts and arrestees, but this was the most public example of cops turning to private genetic databases to find a suspect. But it’s not the only time it’s happened, and it means that people who submitted genetic samples for reasons of health, curiosity, or to advance science could now end up in a genetic line-up of criminal suspects.

Both Ancestry.com and 23andMe stipulate in their privacy policies that they will turn information over to law enforcement if served with a court order. 23andMe says it’s received a couple of requests from both state law enforcement and the FBI, but that it has “successfully resisted them.”

23andMe’s first privacy officer Kate Black, who joined the company in February, says 23andMe plans to launch a transparency report, like those published by Google, Facebook and Twitter, within the next month or so. The report, she says, will reveal how many government requests for information the company has received, and presumably, how many it complies with. (Update: The company released the report a week later.)

“In the event we are required by law to make a disclosure, we will notify the affected customer through the contact information provided to us, unless doing so would violate the law or a court order,” said Black by email.

Ancestry.com would not say specifically how many requests it’s gotten from law enforcement. It wanted to clarify that in the Usry case, the particular database searched was a publicly available one that Ancestry has since taken offline with a message about the site being “used for purposes other than that which it was intended.” Police came to Ancestry.com with a warrant to get the name that matched the DNA.

“On occasion when required by law to do so, and in this instance we were, we have cooperated with law enforcement and the courts to provide only the specific information requested but we don’t comment on the specifics of cases,” said a spokesperson.

As NYU law professor Erin Murphy told the New Orleans Advocate regarding the Usry case, gathering DNA information is “a series of totally reasonable steps by law enforcement.” If you’re a cop trying to solve a crime, and you have DNA at your disposal, you’re going to want to use it to further your investigation. But the fact that your signing up for 23andMe or Ancestry.com means that you and all of your current and future family members could become genetic criminal suspects is not something most users probably have in mind when trying to find out where their ancestors came from.

“It has this really Orwellian state feeling to it,” Murphy said to the Advocate.

If the idea of investigators poking through your DNA freaks you out, both Ancestry.com and 23andMe have options to delete your information with the sites. 23andMe says it will delete information within 30 days upon request.

Another example of familial DNA invasion:

From pri,org:

DNA is taken from the crime scene and compared against a federally regulated FBI-run database used to process DNA evidence, called CODIS. The process can take as long as 18 months before a match is identified. In the meantime, the perpetrator has committed a string of other crimes.

But some local police departments claim they can get faster results — as little as 30 days — by using private labs and local DNA databases.

Frederick Harran, director of public safety at the Bensalem Police Department in Pennsylvania said, “18 months is not prevention, that’s not what they pay me for.”

“I would agree the federal database is a good thing, but we’re just moving too slow,” he claims.

So more and more law enforcement agencies are turning to local databases. But with loose regulations, that can present troubling scenarios. Take this real example from Melbourne, Florida, for example.

A few teenagers were sitting in a parked car, when a police officer pulled up and requested someone provide a DNA sample. The officer gave one boy a cotton swab and a consent form. Once the officer made the collection, he went back on patrol as usual.

Increasingly, local police departments are collecting consensual DNA samples, processed using private labs. It’s happening in cities across Florida, Pennsylvania, Connecticut and North Carolina.

The potential issues for these databases vary state by state. In Florida, minors are allowed to consent to having their DNA collected, which isn’t true in other states, like Pennsylvania. But simply maintaining the databases allows each jurisdiction to test every sample already collected, meaning that the DNA from a minor crime scene from years before could be immediately matched with the new sample.

Stephen Mercer, chief attorney for the Forensics Division of the Maryland Office of the Public Defender, finds the practice deeply troubling.

“The collection procedureshighlights the very real threat to liberty interests that local DNA databanks pose,” Mercer said. “The usual suspects are targeted, so we see this amplification of bias in the criminal justice system along the lines of race being amplified through the criminal justice system.”

Granted, many may think, “Well, if you have nothing to hide…”.  That’s not the point. The innocent, unindicted individual should retain a basic form of control over whether she becomes involved in situations wherein she identifies relatives in potential criminal acts. There is something perverse in having one’s DNA finger one’s own flesh and blood for the government’s purposes.  Identification by familial DNA isn’t a slippery slope… it’s a well-greased slalom of privacy infringement.

We will be looking into the matter of DNA familial finger-pointing in-depth and report back as developments warrant .

BNI Operatives: Situationally aware.

As always, stay safe.

Protect Your Privacy: Block Your Phone Number or Display A Fake Phone Number

At some point or other, we’ve all had the desire or need to make a phone call yet did not wish to reveal our phone number.  Below are three methods of phone number blocking that work and can be enacted immediately.

1. Use a caller ID blocking prefix. In many countries, you can enter a code before you dial a number and your phone number will be blocked from appearing on the recipient’s caller ID. The code varies depending on your country and your service provider, and it is not possible to block in all countries. Enter the prefix, followed immediately by the number you are dialing. For example, if you are in the US and want to call (555)123-4567, you would enter *675551234567.

  • North America – *67 or #31#
  • Albania, Australia, Denmark, Greece, Israel, Italy, Netherlands, Sweden, Norway: #31#
  • Argentina, Iceland, Switzerland, South Africa: *31*
  • Germany: *31# or #31#
  • Hong Kong: 133
  • Japan: 184
  • UK and Ireland: 141
  • New Zealand: 0197 (Telecom) or *67 (Vodafone)
  • Australia: 1831 or #31#
  • India: *31# – Must be enabled by network.
  • If your country is not listed, chances are you can use either *67 or #31#. Most GSM mobile networks work with #31#.

2. Contact your carrier. If you want all of your phone calls to always be blocked, you can contact your carrier and set up permanent Caller ID blocking. There is typically a charge for this, and the fees and terms will vary from carrier to carrier.

  • Most pre-paid plans cannot enable permanent Caller ID blocking.
  • Some people have Anonymous Call Rejection enabled, which means your call will not be able to be completed unless you call from an unblocked number.

3. Hide your number through your device’s settings. Many phones allow you to block your Caller ID information by changing the phone’s settings. If your phone does not have the option to do this, then it is not allowed by your carrier, and you will have to try one of the previous steps.

  • iPhone – Open the Settings app, tap Phone, tap Show My Caller ID, and then toggle the slider to ON.
  • Android 4.0 and earlier – Open the Settings app, tap Call, tap “Additional settings”, tap Caller ID, and then tap “Hide number”.
  • Android 4.1 and later – Open the Phone app, tap the Menu button, tap “Call settings”, tap Caller ID, tap “Hide number”.
  • Windows Phone 8 – Open the Phone app, tap the More button (…), tap “settings”, tap the box under “Show my caller ID to”, tap “no one” or “my contacts”.
  • BlackBerry – Press the Menu key, click Options, click General Options, find the Restrict My Identity field, set it to Always.

Fake Phone Number: If however you wish to display a fake phone number, try one of the many apps available that do just that – pop up a fake phone number on your target’s phone.  A new app on the market also allows you to change your voice to sound like a man or a woman: FakeCallerID.  Let’s bear in mind that ultimately, all fake phone numbers are logged somewhere and if necessary, law enforcement can certainly obtain these records.

BNI Operatives: Situationally aware.

As always, stay safe.

Lifesaver: Use A Penny Or A Quarter To Determine Adequate Tire Tread

(In our new block, we pass on useful tips each Friday.  since travel season has begun with Spring, first things first, let’s make sure your vehicle should even be spinning along the road.  From PepBoys: tread life and how to check your tires with the change in your pocket. )

The Truth About Tread Life

Tires are designed with treads that provide your vehicle with traction. This traction keeps your car driving along the road – even in inclement weather. Without tread, the elements would literally lift your tires off the road. When you drive through snow or a puddle, the grooves in between the tread blocks of the tires become channels that divert the water or snow away from the tires, allowing the tires to maintain traction in these slick conditions.

When the tread gets worn down, the water, snow, and other slippery substances don’t have anywhere to go except directly under your tires severely decreasing your vehicle’s traction. If your tires are nearly bald, traction will be eliminated completely. Decreased traction will negatively affect your control over the car, making the vehicle unsafe for you and your passengers. Tread depth will determine whether or not you require new tires. You can easily tell if your tires’ tread is too worn by using a penny or a quarter.

Penny Test

Tire Penny Test

The penny test is the gold standard for measuring tire tread-depth because it is easy and it works. Just take a penny and, with Lincoln’s head upside down, put it between the tread blocks of the tire. If you are not able to see the top of Lincoln’s head – if his head is “buried” between the tread blocks – then you still have more than 2/32 of an inch of tread remaining. If you can see the top of Lincoln’s head, it’s time to go tire shopping because the tread is worn down to or beyond 2/32 of an inch.

Flip the penny over so that the Lincoln Memorial (pennies from 2010 and earlier will have the memorial on the back) is facing you and put the penny between the tread blocks with the memorial upside down. If the Lincoln Memorial is completely hidden, you have more than 3/32 of an inch of tread left.

Did You Know – Most state laws require tires to have a tread depth of at least 2/32″ to remain in service?

The Quarter Test

Tire Quarter Test

Some automotive experts believe that using a quarter to test tire depth provides a better read than using a penny. Some independent tests have concluded that cars were able to stop faster with tires that had a little more than 4/32 of an inch of tread depth, which is the measurement the quarter test indicates. To perform the quarter test, put a quarter between the tread blocks of a tire (just like the penny test) with Washington’s head upside down, If you cannot see the top of Washington’s head, you have 4/32 of an inch of tread or more.

Did You Know – In snowy and slushy conditions, 4/32 of an inch of tread or more is necessary for good traction

For your Consideration

Pep Boys Point B

Whether you go with Lincoln or Washington, both coin tests are also good ways to check to see if your tires are wearing evenly. Simply do the test between other tread blocks and if the measurements aren’t the same on all the tire treads, the tires may need to be rotated or your vehicle may require an alignment. Different types of treadwearwill indicate how your tires are wearing. If you don’t have any coins handy, check to see if the tires’ wear bars are showing. Wear bars run across your tires tread pattern from the outside edge to the inside edge. If the wear bar is visible you are in need of new tires as you have hit 2/32” of an inch of tread depth. Most states consider a tire’s service life over if any point of the tread is at 2/32” or less. If you are still unsure, your local Pep Boys can evaluate the depth of your tires.

%d bloggers like this: