Of course it's an isolated incident, you never got caught before!
Prescription documents found in Winnipeg alley
Friday, December 29 2006 @ 09:05 AM CST - Contributed by: PrivacyNews - Non-U.S. News
Shoppers Drug Mart says a man's discovery of hundreds of its prescription information documents strewn across a Winnipeg back alley was an isolated incident. A man discovered the documents, which include names, addresses, prescription information and health numbers, while walking past an alley behind St. Boniface General Hospital on Dec. 26.
[From the article: The man brought the papers — enough to stuff three shopping bags — to the CBC in Winnipeg on Wednesday.
er... The computer did it?
Tax mailing has Social Security numbers visible
Saturday, December 30 2006 @ 12:21 AM CST - Contributed by: PrivacyNews - State/Local Govt.
When Wisconsin taxpayers pull their packets of 2006 state income tax forms out of their mailboxes, tens of thousands of them will see something even less welcome than the annual reminder of how much money they owe to Madison.
They'll see their Social Security numbers, printed right on the outside of the booklets - where identity thieves might be able to see them.
About 170,000 tax booklets were mailed with Social Security numbers on the address labels because of a computer programming error [Bullish! That is a management error! You never make untested changes to programs, and client managers (not the kid who makes the change) must sign off! Bob] at a printing company hired by the state, Meredith Helgerson, spokeswoman for the state Department of Revenue, said Friday.
Source - JS Online
Big plus fast equals organized?
Credit card fraud case still under investigation
BY MARIE HAVENGA firstname.lastname@example.org
Federal officials are still trying to crack the credit card fraud case that apparently stemmed from late-summer purchases at Wesco fuel stations.
... In an age of fast-transit information, bad things can happen in the wrong hands, according to Murray. The problem appears geographically limited to West Michigan and Lakeshore consumers.
... Wesco worked with U.S. Secret Service agents and the U.S. Attorney's office to identify possible fraud and identity theft that allegedly occurred between July 25 and Sept. 7 at some of the company's 51 Michigan facilities. Wesco spokeswoman Ginny Seyferth said Thursday that there has been no incidents of questionable credit card activity since Sept. 7.
Some Tri-Cities residents experienced credit card statement charges during that timeframe from as far away as Tokyo, Spain and New York for purchases they denied making.
Although Murray said he wasn't allowed to disclose details of the investigation, he said the fraudulent charges totaled more than $3 million, which would be one of the largest heists to occur during such a short-time period.
"There have been some abusers identified," said Murray, who last month said several suspects were in custody. "We are taking steps to see if they can be interviewed, but they aren't necessarily the type of people who want to help law enforcement. We have no indication it was an inside job."
... "There's a substantial likelihood that the (credit card) numbers that were stolen were passed off to another group of people who abused them," Murray said. "It's possible to pass that information to anyone via the Internet. I think the (Wesco) problem was taken care of in the banks' process of generating new cards. About 20,000 cards were reissued, and I think the period of abuse is over. As a precaution, the banks reissued a larger number of cards than were actually abused."
... Murray added: "We don't think this will be the last such incident. That's why we're trying to learn more. We want to design a better system to understand and respond to these issues ... so that we can be better prepared in the future."
Perhaps they should have asked to compare (not reveal) the software in those machines with the software in other machines, then (if there are differences) they have an argument.
Judge Rules Against Ballot Computer Check
By DAVID ROYSE AP Updated:2006-12-29 19:46:51
TALLAHASSEE, Fla. (Dec. 29) - A judge ruled Friday that the Democrat who narrowly lost the race to succeed Rep. Katherine Harris cannot examine the programming code of the electronic voting machines used in the disputed election.
Circuit Judge William Gary ruled that Christine Jennings' arguments about the possibility of lost votes were "conjecture" and did not warrant disclosing the trade secrets of the voting machine company, Election Systems & Software.
The Jennings campaign said it will appeal.
"It's shocking that there is more concern for protecting a company's profits rather than protecting our right to vote," Jennings said in a news release.
... Jennings has filed a complaint with Congress, the ultimate arbiter of who will fill the seat. Congressional Democrats said they will allow Buchanan to take his seat for now when the House convenes Thursday but will investigate.
...even though he owns the photographs?
Wausau man accused of posting nude photos of ex-girlfriend on Web
Saturday, December 30 2006 @ 12:30 AM CST - Contributed by: PrivacyNews - Internet & Computers
A Wausau man was charged with felony identity theft for allegedly posting nude photographs [I never considered that... Must lead a sheltered life. Bob] of his ex-girlfriend on the Internet and encouraging random men to call her. Shawn Bauer, 29, also faces two misdemeanor charges related to the creation of a MySpace.com Web page featuring his ex-girlfriend, a 26-year-old Altoona woman.
Source - Journal Times
Do you suppose there is money to be made here?
100% RIAA free radio
This radio station has a 100% RIAA-free format. They discover different, better ways of listening to music "The independents just seem to be a bit more creative — likely because they’re not single-mindedly focused on selling their music to a lowest-common-denominator audience."
[From the site: Some years from now, after the recording industry finishes its slow-mo implosion routine, this is how all music distribution will work.
If I do this, am I automatically a terrorist?
How-To Hide Files In A .JPG Image
Here is a tutorial on how to hide files in Jpg's. Please note it isn't the most secure method, because the information is stored in plain text but it's still cool to play with. A simple solution to make this more secure, is to use encryption on the RAR file when your create it, but thats not the point of this tutorial ...
Let's see... We have their pictures, fingerprints, DNA... What else can we do to ensure the little darlings are kept safe from Osama?
Galveston County joins program to scan kids' eyes
08:03 AM CST on Friday, December 29, 2006 Associated Press
GALVESTON-- Galveston County became the first in Texas to purchase eye-scanning equipment as part of a national program to keep track of children by recording unique characteristics of their irises, [Must have missed that... Bob] officials said.
... The company, which sold the county two biometric scanners for $35,000, is working to build a national database dubbed the Children’s Identification and Location Database, or CHILD Project.
... Robert Melley, Biometric’s vice president and CEO, said the project wants to record the irises of 5 million children over the next few years.
“We have 1,800 sheriff’s departments representing 46 states who have committed to participating,” he said.
... Leonard said he will work to win over any parents that might have privacy concerns about the iris scans.