Mass Casualties at Arrowhead Regional Medical Center…But Only a Drill

On Monday, March 4, Arrowhead Regional Medical Center (ARMC) in San Bernardino, California was one of two local medical centers to participate in a mass casualty drill.

The objective of the drill for ARMC was to test the hospital’s ability to respond effectively to a surge of patients resulting from a mass casualty incident. Throughout the exercise, ARMC staff demonstrated their proficiency in triage, patient care, communication and coordination of resources. The drill also provided an opportunity for staff to practice protocols for receiving patients, managing supplies and implementing surge capacity plans.

From https://main.sbcounty.gov/2024/03/07/arrowhead-regional-medical-center-participates-in-mass-casualty-incident-drill/.

It’s always good to conduct mass shooting drills in case they are needed in the future.

Or, in the case of Arrowhead Regional Medical Center, in the past.

By San Bernardino County Sheriff’s Department – Public Domain, https://commons.wikimedia.org/w/index.php?curid=45514432

Remember December 2, 2015?

At least 14 people were dead and another 17 injured in a shooting Wednesday in San Bernardino, California, when gunmen who were heavily armed and “on a mission” opened fire during a function at a center for people with developmental disabilities, police said.

Police believe two alleged shooters — a county employee and a woman with whom he was in a relationship opened fire around 11 a.m. at the Inland Regional Center. They were armed with assault weapons and “prepared to do what they did as if they were on a mission,” San Bernardino Police Chief Jarrod Burguan said….

Five people were taken to the nearby Loma Linda University Medical Center, two of which were critical but stable, two of which were fair and the one who was still being assessed, according to a hospital spokeswoman. Six other people are being treated at Arrowhead Regional Medical Center, though their conditions are unknown.

From https://abcnews.go.com/US/police-respond-reports-active-shooter-san-bernardino/story?id=35535995.

Although it wasn’t mentioned in San Bernardino County’s 2024 description of the drill, I’m sure some participants remembered what happened nine years ago.

Avoiding Deleterious Forensic Nursing

Warning: this post discusses sexual assault and child abuse.

Hippocrates. By Unidentified engraver – 1881 Young Persons’ Cyclopedia of Persons and PlacesUpload by RedWolf 05:45, Jan 10, 2005 (UTC), Public Domain, https://commons.wikimedia.org/w/index.php?curid=164808

The Hippocratic Oath imposes duties on medical professionals, including this one:

I will follow that system of regimen which, according to my ability and judgment, I consider for the benefit of my patients, and abstain from whatever is deleterious and mischievous.

From https://www.health.harvard.edu/blog/first-do-no-harm-201510138421.

For people like me who do not use the word “deleterious” on a daily basis, it means “harmful often in a subtle or unexpected way.”

The dictates of the Hippocratic Oath lead us to forensic nursing (as defined by 1NURSE.COM), the invasive nature of some forensic techniques, and what companies such as Foster+Freeman are doing to minimize invasive evidence capture.

What is forensic nursing?

From the U.S. Federal Bureau of Investigation, https://www2.fbi.gov/publications/leb/2002/jan2002/jan02x29x1.jpg.

As 1NURSE.COM notes, forensic nursing is multidisciplinary, operating “at the critical juncture of medical science and the legal system.”

Forensic nursing is a specialized branch that integrates medical expertise with forensic science to provide comprehensive care for individuals impacted by violence, abuse, or criminal activities. These professionals serve as a crucial link between the realms of healthcare and the legal system, collaborating with law enforcement, attorneys, and other professionals to gather evidence, provide expert testimony, and ensure justice for victims.

From https://www.linkedin.com/pulse/forensic-nursing-exploration-intricate-profession-1nurse-com-iedyc/.

When I started my forensic career 29 years ago, I was solely involved in the capture and processing of fingerprints from criminals. If I may be honest, the well-being of the individual who provided the forensic evidence was NOT an overriding concern.

But within a year or two I started to get involved in the capture and processing of fingerprints from NON-criminals who were applying for and receiving government benefits.

  • For that market we HAD to concern ourselves with the well-being of our clients, to make fingerprint capture as easy as possible, and to treat our clients with the utmost respect.
  • In the end it didn’t matter, because in the popular mind fingerprinting was associated with criminals, and benefits recipients didn’t want to be treated like criminals no matter how nice we were. To my knowledge, all of the benefits recipient fingerprint programs in the United States have all ceased.

Forensic nursing needs to gather the necessary forensic evidence while preserving the compassionate care that nurses are required to provide.

Invasive forensic techniques

So if we have to take care when gathering information from benefits recipients, imagine the level of care we need to take when gathering information from crime victims. Returning to 1NURSE.COM’s article, here are two of the tasks that forensic nurses must perform:

Sexual Assault Forensics: Specializing in sexual assault examination, forensic nurses provide not only compassionate care but also play a pivotal role in collecting evidence essential for legal proceedings. Their expertise ensures a sensitive approach while preserving the integrity of forensic evidence. Example: A forensic nurse conducting a sexual assault examination may collect biological samples and document injuries to aid in prosecuting the assailant.

Child Abuse Investigation: Forensic nurses are instrumental in assessing and documenting cases of child abuse. They collaborate with child protective services and law enforcement to ensure the safety and well-being of the child. Example: A forensic nurse working on a child abuse case may conduct a thorough examination to document injuries and provide expert testimony in court.

From https://www.linkedin.com/pulse/forensic-nursing-exploration-intricate-profession-1nurse-com-iedyc/.

The “compassionate care” part is important, as Foster+Freeman notes in a separate article:

We have focussed a lot on how the investigation works when looking for crimes of a distressing nature but not actually how this investigation process can affect the victim of these crimes and put the victim first. This period can be incredibly distressing for the victim, and the investigation can make this worse as it is making the victim re-live this experience.

https://www.linkedin.com/pulse/victim-first-forensics-focusing-victims-crime-foster-freeman-gnw6e/

As part of their duties, the forensic nurse has to capture evidence from the very parts of the body that were assaulted during the abuse crime itself. No one wants to go through that again. How can evidence capture be less invasive?

Three ways to minimize invasive evidence capture

While it’s not possible to completely erase the pain that crime victims suffer during a forensic investigation, there are ways to minimize it. The Foster+Freeman article highlights three ways to do this:

  • Capture evidence via non-invasive techniques. As a supplier of alternate light source (ALS) technology, Foster+Freeman notes that its products can discover evidence, even at the subdermal layers, without touching the victim. “Using an ALS is a non-invasive and non-destructive way to examine potential evidence on the skin. This is especially important when dealing with fragile or sensitive skin, as it minimizes the risk of causing further harm during the examination process.”
  • Capture evidence quickly. Forensic nurses do not want to prolong an examination. There are ways to gather evidence as quickly as possible. For example, rather than using multiple ALS devices, you can use a single one; Foster+Freeman’s Crime-lite® X Serology Search Kit is “a multispectral light source that has been made with five wavelengths of light integrated into one unit.”
  • Capture evidence thoroughly. What’s the point of putting a victim through the trauma of evidence capture if it doesn’t result in a conviction? Because of this, it’s important to capture as much evidence as possible. A variety of alternate light sources accomplishes this.

Foster+Freeman is just one of a multifarious array of companies that supply evidence collection solutions to forensic nurses and other forensic professionals.

And no, Foster+Freeman didn’t sponsor this post, although Bredemarket is available to provide writing services to Foster+Freeman or to other companies who need to drive content results.

And now that I’ve successfully used “multifarious,” I need to find a way to use “deleterious.” Keep your eyes open.

Personally Protected: PII vs. PHI

(Part of the biometric product marketing expert series)

Before you can fully understand the difference between personally identifiable information (PII) and protected health information (PHI), you need to understand the difference between biometrics and…biometrics. (You know sometimes words have two meanings.)

Designed by Google Gemini.

The definitions of biometrics

To address the difference between biometrics and biometrics, I’ll refer to something I wrote over two years ago, in late 2021. In that post, I quoted two paragraphs from the International Biometric Society that illustrated the difference.

Since the IBS has altered these paragraphs in the intervening years, I will quote from the latest version.

The terms “Biometrics” and “Biometry” have been used since early in the 20th century to refer to the field of development of statistical and mathematical methods applicable to data analysis problems in the biological sciences.

Statistical methods for the analysis of data from agricultural field experiments to compare the yields of different varieties of wheat, for the analysis of data from human clinical trials evaluating the relative effectiveness of competing therapies for disease, or for the analysis of data from environmental studies on the effects of air or water pollution on the appearance of human disease in a region or country are all examples of problems that would fall under the umbrella of “Biometrics” as the term has been historically used….

The term “Biometrics” has also been used to refer to the field of technology devoted to the identification of individuals using biological traits, such as those based on retinal or iris scanning, fingerprints, or face recognition. Neither the journal “Biometrics” nor the International Biometric Society is engaged in research, marketing, or reporting related to this technology. Likewise, the editors and staff of the journal are not knowledgeable in this area. 

From https://www.biometricsociety.org/about/what-is-biometry.

In brief, what I call “broad biometrics” refers to analyzing biological sciences data, ranging from crop yields to heart rates. Contrast this with what I call “narrow biometrics,” which (usually) refers only to human beings, and only to those characteristics that identify human beings, such as the ridges on a fingerprint.

The definition of “personally identifiable information” (PII)

Now let’s examine an issue related to narrow biometrics (and other things), personally identifiable information, or PII. (It’s also represented as personal identifiable information by some.) I’ll use a definition provided by the U.S. National Institute of Standards and Technology, or NIST.

Information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other information that is linked or linkable to a specific individual.

From https://csrc.nist.gov/glossary/term/PII.

Note the key words “alone or when combined.” The ten numbers “909 867 5309” are not sufficient to identify an individual alone, but can identify someone when combined with information from another source, such as a telephone book.

Yes, a telephone book. Deal with it.

By © 2010 by Tomasz Sienicki [user: tsca, mail: tomasz.sienicki at gmail.com] – Photograph by Tomasz Sienicki (Own work)Image intentionally scaled down., CC BY 3.0, https://commons.wikimedia.org/w/index.php?curid=10330603

What types of information can be combined to identify a person? The U.S. Department of Defense’s Privacy, Civil Liberties, and Freedom of Information Directorate provides multifarious examples of PII, including:

  • Social Security Number.
  • Passport number.
  • Driver’s license number.
  • Taxpayer identification number.
  • Patient identification number.
  • Financial account number.
  • Credit card number.
  • Personal address.
  • Personal telephone number.
  • Photographic image of a face.
  • X-rays.
  • Fingerprints.
  • Retina scan.
  • Voice signature.
  • Facial geometry.
  • Date of birth.
  • Place of birth.
  • Race.
  • Religion.
  • Geographical indicators.
  • Employment information.
  • Medical information.
  • Education information.
  • Financial information.

Now you may ask yourself, “How can I identify someone by a non-unique birthdate? A lot of people were born on the same day!”

But the combination of information is powerful, as researchers discovered in a 2015 study cited by the New York Times.

In the study, titled “Unique in the Shopping Mall: On the Reidentifiability of Credit Card Metadata,” a group of data scientists analyzed credit card transactions made by 1.1 million people in 10,000 stores over a three-month period. The data set contained details including the date of each transaction, amount charged and name of the store.

Although the information had been “anonymized” by removing personal details like names and account numbers, the uniqueness of people’s behavior made it easy to single them out.

In fact, knowing just four random pieces of information was enough to reidentify 90 percent of the shoppers as unique individuals and to uncover their records, researchers calculated. And that uniqueness of behavior — or “unicity,” as the researchers termed it — combined with publicly available information, like Instagram or Twitter posts, could make it possible to reidentify people’s records by name.

From https://archive.nytimes.com/bits.blogs.nytimes.com/2015/01/29/with-a-few-bits-of-data-researchers-identify-anonymous-people/.

So much for anonymization. And privacy.

Now biometrics only form part of the multifarious list of data cited above, but clearly biometric data can be combined with other data to identify someone. An easy example is taking security camera footage of the face of a person walking into a store, and combining that data with the same face taken from a database of driver’s license holders. In some jurisdictions, some entities are legally permitted to combine this data, while others are legally prohibited from doing so. (A few do it anyway. But I digress.)

Because narrow biometric data used for identification, such as fingerprint ridges, can be combined with other data to personally identify an individual, organizations that process biometric data must undertake strict safeguards to protect that data. If personally identifiable information (PII) is not adequately guarded, people could be subject to fraud and other harms.

The definition of “protected health information” (PHI)

In this case, I’ll refer to information published by the U.S. Department of Health and Human Services.

Protected Health Information. The Privacy Rule protects all “individually identifiable health information” held or transmitted by a covered entity or its business associate, in any form or media, whether electronic, paper, or oral. The Privacy Rule calls this information “protected health information (PHI).”12

“Individually identifiable health information” is information, including demographic data, that relates to:

the individual’s past, present or future physical or mental health or condition,

the provision of health care to the individual, or

the past, present, or future payment for the provision of health care to the individual,

and that identifies the individual or for which there is a reasonable basis to believe it can be used to identify the individual.13 Individually identifiable health information includes many common identifiers (e.g., name, address, birth date, Social Security Number).

The Privacy Rule excludes from protected health information employment records that a covered entity maintains in its capacity as an employer and education and certain other records subject to, or defined in, the Family Educational Rights and Privacy Act, 20 U.S.C. §1232g.

From https://www.hhs.gov/hipaa/for-professionals/privacy/laws-regulations/index.html

Now there’s obviously an overlap between personally identifiable information (PII) and protected health information (PHI). For example, names, dates of birth, and Social Security Numbers fall into both categories. But I want to highlight two things are are explicitly mentioned as PHI that aren’t usually cited as PII.

  • Physical or mental health data. This could include information that a medical professional captures from a patient, including biometric (broad biometric) information such as heart rate or blood pressure.
  • Health care provided to an individual. This not only includes written information such as prescriptions, but oral information (“take two aspirin and call my chatbot in the morning”). Yes, chatbot. Deal with it. Dr. Marcus Welby and his staff retired a long time ago.
Robert Young (“Marcus Welby”) and Jane Wyatt (“Margaret Anderson” on a different show). By ABC TelevisionUploaded by We hope at en.wikipedia – eBay itemphoto informationTransferred from en.wikipedia by SreeBot, Public Domain, https://commons.wikimedia.org/w/index.php?curid=16472486

Because broad biometric data used for analysis, such as heart rates, can be combined with other data to personally identify an individual, organizations that process biometric data must undertake strict safeguards to protect that data. If protected health information (PHI) is not adequately guarded, people could be subject to fraud and other harms.

Simple, isn’t it?

Actually, the parallels between identity/biometrics and healthcare have fascinated me for decades, since the dedicated hardware to capture identity/biometric data is often similar to the dedicated hardware to capture health data. And now that we’re moving away from dedicated hardware to multi-purpose hardware such as smartphones, the parallels are even more fascinating.

Designed by Google Gemini.

Is Your Healthcare Bot Healthy For You?

Robert Young (“Marcus Welby”) and Jane Wyatt (“Margaret Anderson” on a different show). By ABC TelevisionUploaded by We hope at en.wikipedia – eBay itemphoto informationTransferred from en.wikipedia by SreeBot, Public Domain, https://commons.wikimedia.org/w/index.php?curid=16472486

We’ve come a long way since the days of Marcus Welby, M.D. (who was a fictional character).

  • Back in the days of Marcus Welby, M.D., we trusted the doctor as the sole provider of medical information. Doctor knows best!
  • Later, we learned about health by searching the Internet ourselves, using sources of varying trustworthiness such as pharmaceutical company commercials.
  • Now, we don’t even conduct the searches ourselves, but let an artificial intelligence healthcare bot search for us, even though the bot hallucinates sometimes.

A “hallucination” occurs when generative AI is convinced that its answer is correct, even when it is wrong. These hallucinations could be a problem—in healthcare, literally a matter of life or death.

What can go wrong with AI healthcare?

The Brookings Institution details several scenarios in which reliance on artificial intelligence can get messy from a legal (and ethical) standpoint. Here is one of them.

From LINK REMOVED 2025-01-20

For example, a counselor may tell a patient with a substance use disorder to use an app in order to track cravings, states of mind, and other information helpful in treating addiction. The app may recommend certain therapeutic actions in case the counselor cannot be reached. Setting aside preemption issues raised by Food and Drug Administration regulation of these apps, important questions in tort law arise. If these therapeutic actions are contraindicated and result in harm to the patient or others, is the app to blame? Or does the doctor who prescribed the app bear the blame?

From https://www.brookings.edu/articles/when-medical-robots-fail-malpractice-principles-for-an-era-of-automation/

Who is going to ensure that these bots can be trusted?

Who is concerned? Yes.

It seems to me they give these robot doctors now-a-days very peculiar names. By Public Domain – Snapshot Image – https://archive.org/details/ClassicComedyTeams, Public Domain, https://commons.wikimedia.org/w/index.php?curid=25914575

That’s right. WHO is going to ensure that these bots can be trusted.

A World Health Organization publication…

…underscores the critical need to ensure the safety and efficacy of AI systems, accelerating their availability to those in need and encouraging collaboration among various stakeholders, including developers, regulators, manufacturers, healthcare professionals, and patients.

From https://www.openaccessgovernment.org/who-outlines-responsible-regulations-needed-for-artificial-intelligence-in-healthcare/170622/

According to WHO, its document proposes six areas of artificial intelligence regulation for health.

  • To foster trust, the publication stresses the importance of transparency and documentation, such as through documenting the entire product lifecycle and tracking development processes.
  • For risk management, issues like ‘intended use’, ‘continuous learning’, human interventions, training models and cybersecurity threats must all be comprehensively addressed, with models made as simple as possible.
  • Externally validating data and being clear about the intended use of AI helps assure safety and facilitate regulation.
  • A commitment to data quality, such as through rigorously evaluating systems pre-release, is vital to ensuring systems do not amplify biases and errors.
  • The challenges posed by important, complex regulations – such as the General Data Protection Regulation (GDPR) in Europe and the Health Insurance Portability and Accountability Act (HIPAA) in the United States of America – are addressed with an emphasis on understanding the scope of jurisdiction and consent requirements, in service of privacy and data protection.
  • Fostering collaboration between regulatory bodies, patients, healthcare professionals, industry representatives, and government partners, can help ensure products and services stay compliant with regulation throughout their lifecycles.
From https://www.who.int/news/item/19-10-2023-who-outlines-considerations-for-regulation-of-artificial-intelligence-for-health

The 61 page document, “Regulatory considerations on artificial intelligence for health,” is available via https://iris.who.int/handle/10665/373421.

As Digital “Health Certifications” Advance (sort of), Paper Health Certifications Recede

Back in June I wrote about the Global Digital Health Certification Network (GDHCN), a post-COVID way to digitally exchange information about a person’s vaccination status—not just for COVID, but for any future pandemic.

This effort is being pioneered by WHO.

It seems to me they give these vaccine certificates now-a-days very peculiar names. By Public Domain – Snapshot Image – https://archive.org/details/ClassicComedyTeams, Public Domain, https://commons.wikimedia.org/w/index.php?curid=25914575

But as we continue to advance digital health identities, the United States is no longer producing a well-known physical identity document.

It’s the end of an era for a once-critical pandemic document: The ubiquitous white COVID-19 vaccination cards are being phased out.

Now that COVID-19 vaccines are not being distributed by the federal government, the U.S. Centers for Disease Control and Prevention has stopped printing new cards.

From https://apnews.com/article/covid-vaccine-cdc-medical-record-a70eb7f3f32b961eae1a7bf69175ad11

This doesn’t affect the validity of current cards. It just means that if you get a COVID vaccine, or any future vaccine, and you need to prove you obtained it, you will have to contact the medical facility who administered it.

Or, in selected states (because in the U.S. health is generally a state and not a federal responsibility), you can access the state’s digital health information. For example, the state of Washington offers MyIRmobile, as do the states of Arizona, Louisiana, Maryland, Mississippi, North Dakota, and West Virginia.

Sign up for MyIR Mobile by going to myirmobile.com and follow the registration instructions. Your registration information will be used to match your records with the state immunization registry. You will be sent a verification code on your phone to finalize the process. Once registration is complete, you’ll be able to view your immunization records, Certificate of Immunization Status (CIS) and access your COVID-19 vaccination certificate.

From https://doh.wa.gov/you-and-your-family/immunization/access-your-familys-immunization-information

I have no idea if MyIR Mobile conforms to GDHCN; neither the phrase nor the acronym is mentioned on the MyIR Mobile website.

My own state of California has its own digital vaccine record, but frankly it’s kind of clunky. Again, I don’t know if California conforms to GDHCN.

So maybe digital health certifications are not advancing.

Communicating How Your Firm Fights Synthetic Identities

(Updated question count 10/23/2023)

Does your firm fight crooks who try to fraudulently use synthetic identities? If so, how do you communicate your solution?

This post explains what synthetic identities are (with examples), tells four ways to detect synthetic identities, and closes by providing an answer to the communication question.

While this post is primarily intended for identity firms who can use Bredemarket’s marketing and writing services, anyone else who is interested in synthetic identities can read along.

What are synthetic identities?

To explain what synthetic identities are, let me start by telling you about Jason Brown.

Jason Brown wasn’t Jason Brown

You may not have heard of him unless you lived in Atlanta, Georgia in 2019 and lived near the apartment he rented.

Jason Brown’s renting of an apartment isn’t all that unusual.

If you were to visit Brown’s apartment in February 2019, you would find credit cards and financial information for Adam M. Lopez and Carlos Rivera.

Now that’s a little unusual, especially since Lopez and Rivera never existed.

For that matter, Jason Brown never existed either.

Brown was synthetically created from a stolen social security number and a fake California driver’s license. The creator was a man named Corey Cato, who was engaged in massive synthetic identity fraud. If you want to talk about a case that emphasizes the importance of determining financial identity, this is it.

A Georgia man was sentenced Sept. 1 (2022) to more than seven years in federal prison for participating in a nationwide fraud ring that used stolen social security numbers, including those belonging to children, to create synthetic identities used to open lines of credit, create shell companies, and steal nearly $2 million from financial institutions….

Cato joined conspiracies to defraud banks and illegally possess credit cards. Cato and his co-conspirators created “synthetic identities” by combining false personal information such as fake names and dates of birth with the information of real people, such as their social security numbers. Cato and others then used the synthetic identities and fake ID documents to open bank and credit card accounts at financial institutions. Cato and his co-conspirators used the unlawfully obtained credit cards to fund their lifestyles.

From https://www.ice.gov/news/releases/hsi-investigates-synthetic-identities-scheme-defrauded-banks-nearly-2m

Talking about synthetic identity at Victoria Gardens

Here’s a video that I created on Saturday that describes, at a very high level, how synthetic identities can be used fraudulently. People who live near Rancho Cucamonga, California will recognize the Victoria Gardens shopping center, proof that synthetic identity theft can occur far away from Georgia.

From https://www.youtube.com/watch?v=oDrSBlDJVCk

Note that synthetic identity theft different from stealing someone else’s existing identity. In this case, a new identity is created.

So how do you catch these fraudsters?

Catching the identity synthesizers

If you’re renting out an apartment, and Jason Brown shows you his driver’s license and provides his Social Security Number, how can you detect if Brown is a crook? There are four methods to verify that Jason Brown exists, and that he’s the person renting your apartment.

Method One: Private Databases

One way to check Jason Brown’s story is to perform credit checks and other data investigations using financial databases.

  • Did Jason Brown just spring into existence within the past year, with no earlier credit record? That seems suspicious.
  • Does Jason Brown’s credit record appear TOO clean? That seems suspicious.
  • Does Jason Brown share information such as a common social security number with other people? Are any of those other identities also fraudulent? That is DEFINITELY suspicious.

This is one way that many firms detect synthetic identities, and for some firms it is the ONLY way they detect synthetic identities. And these firms have to tell their story to their prospects.

If your firm offers a tool to verify identities via private databases, how do you let your prospects know the benefits of your tool, and why your solution is better than all other solutions?

Method Two: Check That Driver’s License (or other government document)

What about that driver’s license that Brown presented? There are a wide variety of software tools that can check the authenticity of driver’s licenses, passports, and other government-issued documents. Some of these tools existed back in 2019 when “Brown” was renting his apartment, and a number of them exist today.

Maybe your firm has created such a tool, or uses a tool from a third party.

If your firm offers this capability, how can your prospects learn about its benefits, and why your solution excels?

Method Three: Check Government Databases

Checking the authenticity of a government-issued document may not be enough, since the document itself may be legitimate, but the implied credentials may no longer be legitimate. For example, if my California driver’s license expires in 2025, but I move to Minnesota in 2023 and get a new license, my California driver’s license is no longer valid, even though I have it in my possession.

Why not check the database of the Department of Motor Vehicles (or the equivalent in your state) to see if there is still an active driver’s license for that person?

The American Association of Motor Vehicle Administrators (AAMVA) maintains a Driver’s License Data Verification (DLDV) Service in which participating jurisdictions allow other entities to verify the license data for individuals. Your firm may be able to access the DLDV data for selected jurisdictions, providing an extra identity verification tool.

If your firm offers this capability, how can your prospects learn where it is available, what its benefits are, and why it is an important part of your solution?

Method Four: Conduct the “Who You Are” Test

There is one more way to confirm that a person is real, and that is to check the person. Literally.

If someone on a smartphone or videoconference says that they are Jason Brown, how do you know that it’s the real Jason Brown and not Jim Smith, or a previous recording or simulation of Jason Brown?

This is where tools such as facial recognition and liveness detection come to play.

  • You can ensure that the live face matches any face on record.
  • You can also confirm that the face is truly a live face.

In addition to these two tests, you can compare the face against the face on the presented driver’s license or passport to offer additional confirmation of true identity.

Now some companies offer facial recognition, others offer liveness detection, others match the live face to a face on a government ID, and many companies offer two or three of these capabilities.

One more time: if your firm offers these capabilities—either your own or someone else’s—what are the benefits of your algorithms? (For example, are they more accurate than competing algorithms? And under what conditions?) And why is your solution better than the others?

This is for the firms who fight synthetic identities

While most of this post is of general interest to anyone dealing with synthetic identities, this part of this post is specifically addressed to identity and biometric firms who provide synthetic identity-fighting solutions.

When you communicate about your solutions, your communicator needs to have certain types of experience.

  • Industry experience. Perhaps you sell your identity solution to financial institutions, or educational institutions , or a host of other industries (gambling/gaming, healthcare, hospitality, retailers, or sport/concert venues, or others). You need someone with this industry experience.
  • Solution experience. Perhaps your communications require someone with 29 years of experience in identity, biometrics, and technology marketing, including experience with all five factors of authentication (and verification).
  • Communication experience. Perhaps you need to effectively communicate with your prospects in a customer focused, benefits-oriented way. (Content that is all about you and your features won’t win business.)

Perhaps you can use Bredemarket, the identity content marketing expert. I work with you (and I have worked with others) to ensure that your content meets your awareness, consideration, and/or conversion goals.

How can I work with you to communicate your firm’s anti-synthetic identity message? For example, I can apply my identity/biometric blog expert knowledge to create an identity blog post for your firm. Blog posts provide an immediate business impact to your firm, and are easy to reshare and repurpose. For B2B needs, LinkedIn articles provide similar benefits.

If Bredemarket can help your firm convey your message about synthetic identity, let’s talk.

And thirteen more things

If you haven’t read a Bredemarket blog post before, or even if you have, you may not realize that this post is jam-packed with additional information well beyond the post itself. This post alone links to the following Bredemarket posts and other content. You may want to follow one or more of the 13 links below if you need additional information on a particular topic:

  1. Synthetic Identity video (YouTube), August 12, 2023. https://www.youtube.com/watch?v=oDrSBlDJVCk
  2. Using “Multispectral” and “Liveness” in the Same Sentence (Bredemarket blog), June 6, 2023. https://bredemarket.com/2023/06/06/using-multispectral-and-liveness-in-the-same-sentence/
  3. Who is THE #1 NIST facial recognition vendor? (Bredemarket blog), February 23, 2022. https://bredemarket.com/2022/02/23/number1frvt/
  4. Financial Identity (Bredemarket website). https://bredemarket.com/financial-identity/
  5. Educational Identity (Bredemarket website). https://bredemarket.com/educational-identity/
  6. The five authentication factors (Bredemarket blog), March 2, 2021. https://bredemarket.com/2021/03/02/the-five-authentication-factors/
  7. Customer Focus (Bredemarket website). https://bredemarket.com/customer-focus/
  8. Benefits (Bredemarket website). https://bredemarket.com/benefits/
  9. Seven Questions Your Content Creator Should Ask You: the e-book version (Bredemarket blog and e-book), October 22, 2023. https://bredemarket.com/2023/10/22/seven-questions-your-content-creator-should-ask-you-the-e-book-version/
  10. Four Mini-Case Studies for One Inland Empire Business—My Own (Bredemarket blog and e-book), April 16, 2023. https://bredemarket.com/2023/04/16/four-mini-case-studies-for-one-inland-empire-business-my-own/
  11. Identity blog post writing (Bredemarket website). https://bredemarket.com/identity-blog-post-writing/
  12. Blog About Your Identity Firm’s Benefits Now. Why Wait? (Bredemarket blog), August 11, 2023. https://bredemarket.com/2023/08/11/blog-about-your-identity-firms-benefits-now-why-wait/
  13. Why Your Company Should Write LinkedIn Articles (Bredemarket LinkedIn article), July 31, 2023. https://www.linkedin.com/pulse/why-your-company-should-write-linkedin-articles-bredemarket/

That’s twelve more things than the Cupertino guys do, although my office isn’t as cool as theirs.

Well, why not one more?

Here’s my latest brochure for the Bredemarket 400 Short Writing Service, my standard package to create your 400 to 600 word blog posts and LinkedIn articles. Be sure to check the Bredemarket 400 Short Writing Service page for updates.

If that doesn’t fit your needs, I have other offerings.

Plus, I’m real. I’m not a bot.

Five Truths About Your Target Audiences

This post explains what “pillar pages” are, the pros and cons of Bredemarket’s pillar pages, what I’ve learned from the “Target Audience” pillar page that I created, and how this can help your business deliver effective, converting messages to your prospects.

What are pillar pages?

I’ve been working on “pillar pages” for the Bredemarket website for over a year now.

By Rama – Own work, CC BY-SA 2.0 fr, https://commons.wikimedia.org/w/index.php?curid=638837

As I stated before in an April 2022 blog post, a “pillar page” is simply a central “cluster” page on your website that discusses an important topic, and which is linked to other pages that provide more detail on the topic.

Think of a wheel with a hub and spokes. The pillar page is the hub, and the related pages are the spokes.

How can Bredemarket’s pillar pages be better?

As of July 5, 2023, I have created five pillar pages, which I label as “topics of interest” on Bredemarket’s “Information” page.

Now these pillar pages aren’t as mature as I’d like them to be.

  • I haven’t really multi-layered my keywords that link to the pillar; currently things are fairly simplistic where benefit “spoke” blog posts link to the benefits “hub” pillar. I haven’t explicitly optimized the “hub and spokes” for people who search for, say, features.
  • Similarly, the organization of each pillar page is fairly simplistic. Each pillar starts with a brief discussion of the topic in question, and is then followed by excerpts from and links to blog posts that provide more detail on the topic. (And the blog posts themselves link back to the pillar, providing bidirectional…um, benefits.) It’s functional, but perhaps you’d be better served if the pillars grouped subtopics together, rather than listing all the blog posts in reverse chronological order.

But the pillars do their work in terms of navigation and search engine optimization. If you want to find out what Bredemarket says about a topic such as benefits, it’s fairly easy to find this.

What have I learned from the Bredemarket Target Audience pillar page?

This post delves into the fifth of my five pillar pages, the Target Audience page.

By Christian Gidlöf – Photo taken by Christian Gidlöf, Public Domain, https://commons.wikimedia.org/w/index.php?curid=2065930

I’ve recently worked on beefing up this pillar page by linking to more Bredemarket blog posts that discuss target audiences. And in the process of making these additions, I’ve realized some things about target audiences that I wanted to summarize here. (Repurposing content refocuses the mind, I guess.)

In the process of improving my pillar page, I’ve gleaned five truths about target audiences:

  1. You need to define at least one target audience.
  2. It’s not illegal to have multiple target audiences.
  3. Different target audiences get different messages.
  4. You can create personas, or you can not create personas. Whatever floats your boat.
  5. Target audience definition focuses your content.

I’ll discuss each of these truths and suggest how they can improve your firm’s content.

One: You Need to Define At Least One Target Audience.

The first and most important thing is that you need a target audience before you start writing.

By David Shankbone – Own work, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=2786722

If you have no target audience, who is receiving your message? How do you know what to say?

For example, the primary target audience for THIS blog post is anyone from any type of company who could use Bredemarket’s marketing and writing services. It’s not limited to just the identity folks, or just the Inland Empire folks. If it were, I’d write it differently.

Here’s another target audience example that I used in an October 2022 blog post:

  • If you’re a lollipop maker and you’re writing for kids who buy lollipops in convenience stores, you’ll write one way.
  • If you’re a lollipop maker and you’re writing to the convenience stores who could carry your lollipops, you’ll write another way.
From https://bredemarket.com/2022/10/30/six-questions-your-content-creator-should-ask-you/

Do you see how target audiences influence what you write?

Two: It’s Not Illegal to Have Multiple Target Audiences.

I recently criticized myself in jest because my self-promotional LinkedIn post identified two target audiences: companies who could use my services as a full-time employee, and companies who could use my services as a Bredemarket contract consultant.

This does have some drawbacks, since if I had chosen one or the other, I could have streamlined my post and made my message stronger.

But in this particular case, I chose to “muddy the waters.” Mary, grab the baby, targets rising.

Not Limp Bizkit. From https://www.youtube.com/watch?v=WhF7gnRZBpY

The content addressed two target audiences at the same time, although this post prioritized the companies looking for full-time employees.

As long as you know in advance what you’re going to do, you can define multiple target audiences. Just don’t define a dozen target audiences for a 288-character tweet.

Three: Different Target Audiences Get Different Messages.

Perhaps you are writing a single piece of content that must address multiple target audiences. A proposal is an example of this. For example, a proposal in response to a request for proposal (RFP) for an automated biometric identification system (ABIS) affects multiple target audiences.

Here’s an example of multiple target audiences for a theoretical Ontario, California ABIS proposal, taken from a May 2021 Bredemarket post:

  • Field investigators.
  • Examiners.
  • People who capture biometrics.
  • Information Technologies.
  • Purchasing.
  • The privacy advocate.
  • The mayor.
  • Others.

That’s a lot of target audiences, but if you’re submitting a 300 page proposal that answers hundreds of individual questions, you have the ability to customize each of the hundreds of responses to address the affected target audience(s).

For example, if the RFP asks about the maximum resolution of captured latent fingerprint images, your response will address the needs of the “examiner” target audience. Your response to that question won’t need to say anything about your compliance with city purchasing regulations. (Unless you have a really weird city, which is possible I guess.)

At the same time, if the RFP asks if you comply with E-Verify, this is NOT the time to brag about supporting 4,000 pixels per inch image capture.

Four: You Can Create Personas, Or You Can Not Create Personas. Whatever Floats Your Boat.

If you haven’t read the Bredemarket blog that much, you should know that I’m not very hung up on processes—unless my client (or my employer) insists on them. Then they’re the most important thing in the world.

If you find yourself trapped in a room (preferably padded) with a bunch of certified marketing professionals, they’ll probably toss around the word “persona” a lot. A persona helps you visualize your target audience by writing to someone with a particular set of attributes. Here’s an example from the October 2022 post I cited earlier:

Jane Smith is a 54 year old single white owner of a convenience store in a rural area with an MBA and a love for Limp Bizkit…

From https://bredemarket.com/2022/10/30/six-questions-your-content-creator-should-ask-you/

If I’m going to write a particular piece of content, this persona helps me focus my writing. As I write, I can picture Jane in my mind, fetching the giant cups for the soda dispenser, planning her next trip to the big city, and wondering if her customers would mind if she started blasting this song.

Not the Seldom Scene.

Having this persona in my mind can be an excellent writing support.

  • What would Jane think about a list of target audience truths?
  • What would Jane think if a Limp Bizkit song appeared in the middle of the list? (She’d like that.)
  • Most importantly, would that post about target audiences induce Jane to explore the Bredemarket 400 Short Writing Service?

So you can create personas, either on the fly (take a LinkedIn profile of a real person and change a few facts so that the persona becomes Jim, a 35 year old product/content marketer who specializes in healthcare) or through an extensive and expensive persona research program.

By Idaho National Laboratory – Flickr: Microscopy lab, CC BY 2.0, https://commons.wikimedia.org/w/index.php?curid=16101131

But what if you escape from the padded room, run away from the marketing professionals, and swear up and down that you will never ever create a persona?

Will your marketing efforts die?

No they won’t.

You can still target your writing without inventing demographic information about the person reading your content.

It depends upon the effort you want to invest in the task.

Five: Target Audience Definition Focuses Your Content.

I kind of already said this, but I wanted to explicitly repeat it and emphasize it.

Regardless of whether your target audience is defined by an expensive research effort, a tweak of a real person’s LinkedIn profile, or the simple statement “we want to target latent fingerprint examiners,” the simple act of defining your target audience focuses your content.

By Lookang many thanks to author of original simulation = Fu-Kwun Hwang author of Easy Java Simulation = Francisco Esquembre – Own work http://weelookang.blogspot.com/2015/05/ejss-thin-converging-diverging-lens-ray.html, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=40429189

Your text addresses the target audience, and doesn’t go off on tangents that bear no relation to your target audience.

This makes your message much more effective.

But is the message of this post resonating with companies needing content creators?

If you’re still reading, I guess it is.

Bredemarket can help you define your target audience for your content, and can help you define other things also that are necessary for effective content.

Would you like to talk to me about the content you want to create, and the message you want to deliver to your target audience?

Are you ready to take your firm to the next level with a compelling message that addresses your target audience(s) and increases awareness, consideration, conversion, and long-term revenue?

Let’s talk today!

Now if you’ll excuse me, I have to cross-reference this blog post with my Target Audience pillar page.

From EUDCC to GDHCN: The Evolution of Vaccine Certificates

Back in 2021, it seemed that I was commenting on the EU Digital COVID Certificate (EUDCC) ad nauseum. The EUDCC is the “vaccine passport” that was developed to allow people in member EU countries to prove their COVID vaccination status in another EU country.

From the EC site.

My most recent post on the EUDCC was written on August 30, 2021, and discussed the International Air Transport Association (IATA) endorsement of the EUDCC as a global standard. But did it matter? I took a look at how global standards are adopted (hint: brute force):

If a lot of people like something, it’s a standard.

If a trillion dollar company likes something, and I like something different, then the thing that the trillion dollar company likes is a standard.

If two trillion dollar companies like two different things…it can get messy.

From https://bredemarket.com/2021/08/30/iata-endorses-the-eudcc-but-will-it-matter/

August 2021 was the last time that I wrote about the EUDCC in the Bredemarket blog. Until now.

Enter…WHO?

You know how standards are adopted by brute force from big players? Well, one big player has forced itself into the discussion. That player is the World Health Organization, commonly known as WHO.

It seems to me they give these vaccine certificates now-a-days very peculiar names. By Public Domain – Snapshot Image – https://archive.org/details/ClassicComedyTeams, Public Domain, https://commons.wikimedia.org/w/index.php?curid=25914575

But according to Masha Borak at Biometric Update, the WHO is just recognizing that the “EU” Digital COVID Certificate has expanded far beyond the EU.

Stella Kyriakides, the European commissioner for health and food safety (announced) that the voluntary certificate program has already been taken up by almost 80 countries.

From https://www.biometricupdate.com/202306/united-nations-taking-over-eu-covid-certificate-program-july-1

Last I checked there were not 80 countries in the EU. So this health standards thing took off after the initial hiccups. Although the Wikipedia list of non-EU adopting countries does not include two big players—the United States and China (the same two countries I cited in my August 2021 post).

Therefore, it made sense for WHO to get in on the act with its Global Digital Health Certification Network, allowing worldwide responses to post-COVID issues.

WHO’s Global Digital Health Certification Network is an open-source platform, built on robust & transparent standards that establishes the first building block of digital public health infrastructure for developing a wide range of digital products for strengthening pandemic preparedness and to deliver better health for all….

The GDHCN is builds (sic) upon the experience of regional networks for COVID-19 Certificates and takes up the infrastructure and experiences with the digital European Union Digital COVID Certificate (EU DCC) system, which has seen adoption across all Member States of the EU as well as 51 non-EU countries and territories. The GDHCN has been designed to be interoperable with other existing regional networks (e.g., ICAO VSD-NC, DIVOC, LACPass, SMART Health Cards) specifications. 

From https://www.who.int/initiatives/global-digital-health-certification-network

On the surface it sounds great, but we’ll see what happens when it goes live (Borak states that the go-live date is July 1).

And we’ll see how it expands:

To facilitate the uptake of the EU DCC by WHO and contribute to its operation and further development, WHO and the European Commission have agreed to partner in digital health.

This partnership will work to technically develop the WHO system with a staged approach to cover additional use cases, which may include, for example, the digitisation of the International Certificate of Vaccination or Prophylaxis. Expanding such digital solutions will be essential to deliver better health for citizens across the globe.

From https://www.who.int/news/item/05-06-2023-the-european-commission-and-who-launch-landmark-digital-health-initiative-to-strengthen-global-health-security

And most importantly, we’ll see which countries participate—and which countries don’t.

The difference between biometrics and biometrics

(Part of the biometric product marketing expert series)

We’ll get to Bob a little later. But let me start off by telling you something.

AAABWTCI.

That stands for “acronyms are a bad way to convey information.”

But you didn’t know that.

Many of us like to use acronyms to quickly convey information, but we need to remember that different people use acronyms in different ways.

For example, in my circles, people generally understand “FBI” to refer to the United States Federal Bureau of Investigation.

But try telling that to the Faith Bible Institute, or to an employee of Frontier Booking International. (I’ll admit that the founder of the latter company, Ian Copeland, chose the company name deliberately. After all, his brother Miles founded I.R.S. Records, and their father worked for the Central Intelligence Agency.)

It’s best not to use acronyms at all and instead use full words. Because if you use full words, then (as Ed McMahon would say) you will ensure that EVERYONE knows exactly what you mean.

By photo by Alan Light, CC BY 2.0, https://commons.wikimedia.org/w/index.php?curid=3048124

Allow me to play the Johnny Carson role and say that Ed was WRONG.

By Johnny_Carson_with_fan.jpg: Peter Martorano from Cleveland, Ohio, USAderivative work: TheCuriousGnome (talk) – Johnny_Carson_with_fan.jpg, CC BY 2.0, https://commons.wikimedia.org/w/index.php?curid=12750959

After all, the great English philosopher Robert Plant (I told you we’d get to Bob eventually) noted,

“You know sometimes words have two meanings.”

“Stairway to Heaven.” https://genius.com/Led-zeppelin-stairway-to-heaven-lyrics

Take the word “biometrics.” In my circles, people generally understand “biometrics” to refer to one of several ways to identify an individual.

By Dawid Weber – Praca własna, CC BY 3.0, https://commons.wikimedia.org/w/index.php?curid=102148689

But for the folks at Merriam-Webster, this is only a secondary definition of the word “biometrics.” From their perspective, biometrics is primarily biometry, which can refer to “the statistical analysis of biological observations and phenomena” or to “measurement (as by ultrasound or MRI) of living tissue or bodily structures.” In other words, someone’s health, not someone’s identity.

Fun fact: if you go to the International Biometric Society and ask it for its opinion on the most recent FRVT 1:N tests, it won’t have an answer for you.

The terms “Biometrics” and “Biometry” have been used since early in the 20th century to refer to the field of development of statistical and mathematical methods applicable to data analysis problems in the biological sciences.

Recently, the term “Biometrics” has also been used to refer to the emerging field of technology devoted to the identification of individuals using biological traits, such as those based on retinal or iris scanning, fingerprints, or face recognition. Neither the journal “Biometrics” nor the International Biometric Society is engaged in research, marketing, or reporting related to this technology. Likewise, the editors and staff of the journal are not knowledgeable in this area.  

From https://www.biometricsociety.org/about/what-is-biometry

This can confuse people when I refer to myself as a biometric proposal writing expert or a biometric content marketing expert. I’ve been approached by people who wanted my expertise, but who walked away disappointed that I had never written about a clinical trial.

Despite this, there are some parallels between biometrics and biometrics. After all, both biometrics and biometrics take body measurements (albeit for different reasons), and therefore some devices that can be used for biometry can sometimes also be used for identification, and vice versa.

But only sometimes. Your run-of-the-mill optical fingerprint reader won’t contribute to any medical diagnosis, and I’m still on the fence regarding whether brain waves can be used to identify individuals. I need a sample size larger than 50 people before I’ll claim brain waves as a reliable biometric.

Of course, a biometric device such as an Apple Watch can not only measure your biometrics, but also your geolocation, which is another authentication factor.

IATA endorses the EUDCC. But will it matter?

In a Bredemarket blog post in February 2021, I quoted something that I wrote in 2013 in one of my personal blogs, Empoprise-BI.

I’m sure that many people imagine that standards are developed by a group of reasonable people, sitting in a room, who are pursuing things for the good of the world.

You can stop laughing now.

As I noted back in 2013, and again in February, there are many instances in which standards do not evolve from a well-designed process. In reality, standards emerge via that process that I referred to in February as “brute force.”

By イーストプレス – 「ゴング格闘技」=1951年のブラジル地元新聞からの転載, Public Domain, https://commons.wikimedia.org/w/index.php?curid=13320163

For those who are not familiar with the “brute force” process, I’ll provide two illustrations.

  • If a lot of people like something, it’s a standard.
  • If a trillion dollar company likes something, and I like something different, then the thing that the trillion dollar company likes is a standard.

If two trillion dollar companies like two different things…it can get messy.

Back in February, I was just beginning to talk about something that I called “health passports” at the time. Later, I personally decided that “health passports” is a poor choice of words, and have instead gravitated to using the phrase “vaccine certificate.”

Regardless, my concern back in February was that there were all sorts of these things floating around. Even back then, Clear had its own solution, IATA had one, IBM had one, iProov had one, Daon had one, and there were many, many more.

So what happens if I have a Clear vaccine certificate but the airline or building that I’m approaching supports the iProov certificate? Can the iProov certificate read the Clear certificate? Or do I have to get multiple certificates?

This post looks at a new development in the vaccine certificate brouhaha. I’m not talking about what vaccines are honored by the vaccine certificate, but about acceptability of the vaccine certificates themselves. In particular, I’m talking about acceptance of one certificate, the EU Digital COVID Certificate (EUDCC).

Because one big player is getting behind it.

How do international air transport folks feel about the EUDCC?

While the EUDCC can conceivably be used for a number of use cases, such as entering a private business like a restaurant, one of the most popular use cases for the EUDCC is to board an airplane that is crossing an international border.

So if there was an organization that was dedicated to the business of flying airplanes across international borders, and if that organization thought that the EUDCC was pretty cool, then that endorsement would have as much pull as Google (and Facebook) endorsing a web image format.

Enter the (drumroll) International Air Transport Association, which issued a press release on 26 August.

The title?

“IATA Backs European Digital Covid Certificate as Global Standard.”

Now those who read my February post will recall that IATA was one of those groups that was already developing its own vaccination certificate. So how does the EUDCC compare with the the IATA Travel Pass?

The DCC…is fully supported by IATA Travel Pass.

But in addition to mere self-interest, there is another reason why IATA is endorsing the EUDCC: it’s supported by a lot of countries inside the EU, and other countries are looking at the EUDCC as a model.

The EU DCC is implemented in the 27 EU Member states and a number of reciprocal agreements have been agreed with other states’ own vaccination certificates, including Switzerland, Turkey, and Ukraine. In the absence of a single global standard for digital vaccination certificates, up to 60 other countries are looking to use the DCC specification for their own certification. 

Oh no, I’m just looking

However, it’s one thing to be “looking” at something, and another thing entirely to actually “do” something.

Before assuming that the EUDCC will become the de facto DCC, consider how two countries in particular will approach it.

This image or media was taken or created by Matt H. Wade. To see his entire portfolio, click here. @thatmattwade This image is protected by copyright! If you would like to use it, please read this first. – Own work, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=5004719

One of those countries is my own, the United States of America. While one can argue whether or not the U.S. enjoys the same level of power that it enjoyed immediately after the end of the Cold War, it is still a major player in world economic and travel affairs. And regardless of who the President of the United States is at any given time, the U.S. has often decided to go its own way. Couple this with the power of individual U.S. states in my country’s federal system, and it’s quite possible that even if the U.S. goes along with IATA, and some form of the EUDCC is adopted by our Transportation Security Administration, that does not necessarily mean that the same certificate can be used as it is in Europe to grant access to museums, sporting events, and concerts.

The other country that may have an issue with the EUDCC is China. If the United States is potentially a waning world power, China is potentially a gaining world power. The relationship between China and the rest of the world varies from time to time and from issue to issue. China may decide that it’s not in its best interest to adhere to an international standard for certifications of COVID vaccination, testing, or contraction. And if it’s not in China’s best interest, China won’t do it.

So before declaring that IATA endorsement of the EUDCC settles the issue…we’ll see.