What Information Do Data Brokers Have on Consumers, and How Do They Use It?

Total Page:16

File Type:pdf, Size:1020Kb

What Information Do Data Brokers Have on Consumers, and How Do They Use It? S. HRG. 113–693 WHAT INFORMATION DO DATA BROKERS HAVE ON CONSUMERS, AND HOW DO THEY USE IT? HEARING BEFORE THE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION UNITED STATES SENATE ONE HUNDRED THIRTEENTH CONGRESS FIRST SESSION DECEMBER 18, 2013 Printed for the use of the Committee on Commerce, Science, and Transportation ( U.S. GOVERNMENT PUBLISHING OFFICE 95–838 PDF WASHINGTON : 2015 For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Nov 24 2008 11:27 Aug 14, 2015 Jkt 075679 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 S:\GPO\DOCS\95838.TXT JACKIE SENATE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION ONE HUNDRED THIRTEENTH CONGRESS FIRST SESSION JOHN D. ROCKEFELLER IV, West Virginia, Chairman BARBARA BOXER, California JOHN THUNE, South Dakota, Ranking BILL NELSON, Florida ROGER F. WICKER, Mississippi MARIA CANTWELL, Washington ROY BLUNT, Missouri MARK PRYOR, Arkansas MARCO RUBIO, Florida CLAIRE MCCASKILL, Missouri KELLY AYOTTE, New Hampshire AMY KLOBUCHAR, Minnesota DEAN HELLER, Nevada MARK WARNER, Virginia DAN COATS, Indiana MARK BEGICH, Alaska TIM SCOTT, South Carolina RICHARD BLUMENTHAL, Connecticut TED CRUZ, Texas BRIAN SCHATZ, Hawaii DEB FISCHER, Nebraska EDWARD MARKEY, Massachusetts RON JOHNSON, Wisconsin CORY BOOKER, New Jersey ELLEN L. DONESKI, Staff Director JAMES REID, Deputy Staff Director JOHN WILLIAMS, General Counsel DAVID SCHWIETERT, Republican Staff Director NICK ROSSI, Republican Deputy Staff Director REBECCA SEIDEL, Republican General Counsel and Chief Investigator (II) VerDate Nov 24 2008 11:27 Aug 14, 2015 Jkt 075679 PO 00000 Frm 00002 Fmt 5904 Sfmt 5904 S:\GPO\DOCS\95838.TXT JACKIE C O N T E N T S Page Hearing held on December 18, 2013 ...................................................................... 1 Statement of Senator Rockefeller ........................................................................... 1 Staff report entitled ‘‘A Review of the Data Broker Industry: Collection, Use, and Sale of Consumer Data for Marketing Purposes’’ by the Office of Oversight and Investigations Majority Staff .......................................... 4 Statement of Senator Thune ................................................................................... 54 Prepared statement of Alicia Puente Cackley, Director Financial Markets and Community Investment, U.S. Government Accountability Office ..... 56 Statement of Senator Booker .................................................................................. 119 Statement of Senator Johnson ................................................................................ 121 Statement of Senator Blumenthal .......................................................................... 123 Statement of Senator Markey ................................................................................. 126 Statement of Senator McCaskill ............................................................................. 129 Statement of Senator Fischer ................................................................................. 135 WITNESSES Jessica Rich, Director, Bureau of Consumer Protection, Federal Trade Com- mission .................................................................................................................. 66 Prepared statement .......................................................................................... 68 Pam Dixon, Executive Director, World Privacy Forum ........................................ 72 Prepared statement .......................................................................................... 73 Joseph Turow, Robert Lewis Shayon Professor of Communication, Associate Dean for Graduate Studies, Annenberg School for Communication, Univer- sity of Pennsylvania ............................................................................................. 102 Prepared statement .......................................................................................... 104 Tony Hadley, Senior Vice President of Government Affairs and Public Policy, Experian ................................................................................................................ 105 Prepared statement .......................................................................................... 107 Jerry Cerasale, Senior Vice President of Government Affairs, Direct Mar- keting Assocation ................................................................................................. 110 Prepared statement .......................................................................................... 111 APPENDIX Response to written question submitted to Jessica Rich by: Hon. John D. Rockefeller IV ............................................................................ 143 Hon. Kelly Ayotte ............................................................................................. 143 Response to written questions submitted to Jerry Cerasale by: Hon. Amy Klobuchar ........................................................................................ 145 Hon. Kelly Ayotte ............................................................................................. 145 (III) VerDate Nov 24 2008 11:27 Aug 14, 2015 Jkt 075679 PO 00000 Frm 00003 Fmt 5904 Sfmt 5904 S:\GPO\DOCS\95838.TXT JACKIE VerDate Nov 24 2008 11:27 Aug 14, 2015 Jkt 075679 PO 00000 Frm 00004 Fmt 5904 Sfmt 5904 S:\GPO\DOCS\95838.TXT JACKIE WHAT INFORMATION DO DATA BROKERS HAVE ON CONSUMERS, AND HOW DO THEY USE IT? WEDNESDAY, DECEMBER 18, 2013 U.S. SENATE, COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION, Washington, DC. The Committee met, pursuant to notice, at 2:31 p.m., in room SR–253, Russell Senate Office Building, Hon. John D. Rockefeller IV, Chairman of the Committee, presiding. OPENING STATEMENT OF HON. JOHN D. ROCKEFELLER IV, U.S. ENATOR FROM WEST VIRGINIA The CHAIRMAN. The Committee will come to order. There are, at this point, two people sitting at the dais, and they are two wonderful people, but I would be pleased if there were more. Senator Blumenthal and Senator Pryor, Senator Markey, Senator Fischer, Senator Warner will be here. But this is the day that we almost vote on the budget, actually. We don’t quite. We always find ways to do it. You have the motion to proceed to it, and then you have a motion to—whatever. And then tomorrow at some point we vote on the budget. Just be grate- ful you are in private life. [Laughter.] The CHAIRMAN. OK. You are all welcome. The disclosures about U.S. intelligence activities over the past few months have sparked a very public debate in this country about what kinds of information the government should be gath- ering and how we protect the privacy of Americans who have done nothing wrong. The Snowden disclosures have harmed our country’s national se- curity, but they have made Americans think more than they usu- ally do about how their lives, both online and offline, can be tracked, monitored, and analyzed. People are aware of that, not to the extent that they are in Great Britain, where they are so accus- tomed to being videotaped in everything they do. We are still going through that adjustment period. I am glad we are talking about these important privacy issues, in general and today. We have all benefited from the rapid ad- vances in computing technology, but we also cherish our personal freedoms. We always use that word, ‘‘cherish’’ our personal free- doms. But we do. And it is a complicated subject. And we want to (1) VerDate Nov 24 2008 11:27 Aug 14, 2015 Jkt 075679 PO 00000 Frm 00005 Fmt 6633 Sfmt 6633 S:\GPO\DOCS\95838.TXT JACKIE 2 be able to protect ourselves and our loved ones from the unwanted gaze of the government and our neighbors. What has been missing from this conversation so far is the role that private companies play in collecting and analyzing our per- sonal information. A group of companies known collectively as ‘‘data brokers’’ are gathering massive amounts of data about our personal lives and selling this information to marketers. We don’t hear a lot about the private-sector data broker industry, but it is playing a large and growing role in our lives. Let me provide a little perspective. In the year 2012, which you will recall was last year, the data broker industry generated $156 billion in revenues—that is more than twice the size of the entire intelligence budget of the United States Government—all gen- erated by the effort to learn about and sell the details about our private lives. Whether we know it or like it or not, makes no dif- ference. One of the largest data broker companies, Acxiom, recently boasted to its investors that it can provide, quote, ‘‘multi-sourced insight into approximately 700 million customers worldwide.’’ When government or law enforcement agencies collect informa- tion about us, they are restrained by our Constitution and our laws, and they are subject to the oversight of courts, inspectors general, and the United States Congress through the Intelligence Committee in the Senate and the House. And I have served on the Intelligence Committee since before 9/ 11, and I can declare to you absolutely without a single thought that the protection that NSA provides to security and secrecy is far better than what we are going to be talking about today. They have rules. They have all kinds of judges and hoops that you have to jump through. The FBI is involved, DOJ. It is all—it is very
Recommended publications
  • 14 December 2012 Page 1 of 16 SATURDAY 08 DECEMBER 2012 Retire in the Next 10-15 Years
    Radio 4 Listings for 8 – 14 December 2012 Page 1 of 16 SATURDAY 08 DECEMBER 2012 retire in the next 10-15 years. Charlotte Smith visits Exmoor to After a year of protests against President Putin, Steve discuss where that next generation of farmers will come from, Rosenberg finds support for him is still strong -- particularly in SAT 00:00 Midnight News (b01p2sy2) with the National Farmers' Union Uplands Chair Robin Milton. cities away from the capital, Moscow. The latest national and international news from BBC Radio 4. Followed by Weather. Presented by Charlotte Smith and produced by Sarah Swadling. Bethany Bell's in South Tyrol where some are angry that the Italian authorities, in the midst of financial crisis, want this wealthy Alpine province to contribute more to the national SAT 00:30 Book of the Week (b01p58n6) SAT 06:57 Weather (b01p2syj) exchequer. The Horologicon The latest weather forecast. The Turks know that the television soap opera's an effective Episode 5 means of extending influence throughout the Middle East. And SAT 07:00 Today (b01p6n7s) the BBC man Rajan Datar gets offered a screen part! As the ploughman drops into the western bay, we offer you Morning news and current affairs with John Humphrys. bene darkmans dear listener. Mark Forsyth is feeling finifugal Including Yesterday in Parliament, Sports Desk, Weather and And they've been harvesting the olives in the hills of Tuscany. as his Horologicon reaches the end of the day. Thought for the Day. Dany Mitzman's been lending a hand and observing that the harvest methods have changed little since ancient times.
    [Show full text]
  • Saving the Electronic Person from Digital Assault: the Case for More Robust Protections Over Our Electronic Medical Records
    Duquesne Law Review Volume 58 Number 1 Artificial Intelligence: Thinking About Article 8 Law, Law Practice, and Legal Education 2020 Saving the Electronic Person from Digital Assault: The Case for More Robust Protections over Our Electronic Medical Records Danielle M. Mrdjenovich Follow this and additional works at: https://dsc.duq.edu/dlr Part of the Medical Jurisprudence Commons, Privacy Law Commons, and the Science and Technology Law Commons Recommended Citation Danielle M. Mrdjenovich, Saving the Electronic Person from Digital Assault: The Case for More Robust Protections over Our Electronic Medical Records, 58 Duq. L. Rev. 146 (2020). Available at: https://dsc.duq.edu/dlr/vol58/iss1/8 This Student Article is brought to you for free and open access by Duquesne Scholarship Collection. It has been accepted for inclusion in Duquesne Law Review by an authorized editor of Duquesne Scholarship Collection. Saving the Electronic Person from Digital Assault: The Case for More Robust Protections over Our Electronic Medical Records Danielle M. Mrdjenovich* 1. IN TRODU CTION .............................................................. 147 II. B A CK GROU N D ................................................................ 148 A . HIP A A ................................................................ 148 B . H ITECH A ct ...................................................... 150 C. Current Limitations to HIPAA and the HITECHAct ......................................... 151 D. Recent Cyberattacks at Large Hospitals in the United States .........................
    [Show full text]
  • 2020 Identity Theft Statistics | Consumeraffairs
    2020 Identity Theft Statistics | ConsumerAffairs Trending Home / Finance / Identity Theft Protection / Identity theft statistics Buyers Guides Last Updated 01/16/2020 News Write a review 2020Write a review Identity theft statistics Trends and statistics about identity theft Learn about identity theft protection by Rob Douglas Identity Theft Protection Contributing Editor In 2018, the Federal Trade Commission processed 1.4 million fraud reports totaling $1.48 billion in losses. According to the FTC’s “Consumer Sentinel Network Data Book,” the most common categories for fraud complaints were imposter scams, debt collection and identity theft. Credit card fraud was most prevalent in identity theft cases — more than 167,000 people reported a fraudulent credit card account was opened with their information. Identity theft trends in 2019 In the next year, the Identity Theft Resource Center (ITRC) predicts identity theft protection services will primarily focus on data breaches, data abuse and data privacy. ITRC also predicts that https://www.consumeraffairs.com/finance/identity-theft-statistics.html 2020 Identity Theft Statistics | ConsumerAffairs consumers will become more knowledgeable about how data breaches work and expect companies to provide more information about the specific types of data breached and demand more transparency in general in data breach reports. Cyber attacks are more ambitious According to a 2019 Internet Security Threat Report by Symantec, cybercriminals are diversifying their targets and using stealthier methods to commit identity theft and fraud. Cybercrime groups like Mealybug, Gallmaker and Necurs are opting for off-the-shelf tools and operating system features such as PowerShell to attack targets. Supply chain attacks are up 78% Malicious PowerShell scripts have increased by 1,000% Microsoft Office files make up 48% of malicious email attachments Internet of Things threats on the rise Cybercriminals attack IoT devices an average of 5,233 times per month.
    [Show full text]
  • Imsk Week for Everyone in the Business of Ivlusic 13 MOVEMBER 1993 £2.8
    imsk week For Everyone in the Business of IVlusic 13 MOVEMBER 1993 £2.8 BPI: pil himnow The music industry has roundly con- Keely Gilbert, of Chris Rea's man- Highdemned Court the judge warning last metedweek to eut alleged by a wasagement able toReal order Life, video says bootlegs the company of Rea's bootleggerCharlesworth, Stephen previously Charlesworth. of Clwyd- threeconcerts months by phone. to arrive "They and took were about rub- guilty in the High Court of breaching judgebish," isn'tshe muchadds. of "A a punishment."warning from a latingan injunction leaflets stopping advertising him from circu-video APUThe on case Designatec's arose from premises a raid inby May, the That,bootlegs Chris of Rea,top artistsand Peter such Gabriel. as Take CharlesworthMr Justice to payFerris the costs ordered of the behalfBPI, which of sixhad memberbrought thecompanies. case on Charlesworth was also wamed that and July 26 the BPI wouid have ceedingsSubsequently for conte. tl : BPI bi CourtStephen last Charlesworth week after heing leaves found the inHigh And warning to pii pirated acts unauthorised Take That_ he videoshad offered and contempt of an injunction restraining "It's laughable," says lan Grant, mai tapesCharlesworth for sale in July. appeared in the High advertisinghim from circulating pirate audio leaflets and hootleg iEVERLEY plainedager of inBig the Country, past of leafletswho has offerin con Court ins Septemberadjourned' for " but s1 the proceed-' until video cassettes. Charlesworth, of video bootlegs of the band. This maki photographerClwyd,
    [Show full text]
  • Suspect Until Proven Guilty, a Problematization of State Dossier Systems Via Two Case Studies: the United States and China
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations Fall 2009 Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Kenneth N. Farrall University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Asian Studies Commons, Communication Technology and New Media Commons, International and Intercultural Communication Commons, and the Social Influence and oliticalP Communication Commons Recommended Citation Farrall, Kenneth N., "Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China" (2009). Publicly Accessible Penn Dissertations. 51. https://repository.upenn.edu/edissertations/51 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/51 For more information, please contact [email protected]. Suspect Until Proven Guilty, a Problematization of State Dossier Systems via Two Case Studies: The United States and China Abstract This dissertation problematizes the "state dossier system" (SDS): the production and accumulation of personal information on citizen subjects exceeding the reasonable bounds of risk management. SDS - comprising interconnecting subsystems of records and identification - damage individual autonomy and self-determination, impacting not only human rights, but also the viability of the social system. The research, a hybrid of case-study and cross-national comparison, was guided in part by a theoretical model of four primary SDS driving forces: technology, political economy, law and public sentiment. Data sources included government documents, academic texts, investigative journalism, NGO reports and industry white papers. The primary analytical instrument was the juxtaposition of two individual cases: the U.S.
    [Show full text]
  • The Scoring of America: How Secret Consumer Scores Threaten Your Privacy and Your Future
    World Privacy Forum The Scoring of America: How Secret Consumer Scores Threaten Your Privacy and Your Future By Pam Dixon and Robert Gellman April 2, 2014 Brief Summary of Report This report highlights the unexpected problems that arise from new types of predictive consumer scoring, which this report terms consumer scoring. Largely unregulated either by the Fair Credit Reporting Act or the Equal Credit Opportunity Act, new consumer scores use thousands of pieces of information about consumers’ pasts to predict how they will behave in the future. Issues of secrecy, fairness of underlying factors, use of consumer information such as race and ethnicity in predictive scores, accuracy, and the uptake in both use and ubiquity of these scores are key areas of focus. The report includes a roster of the types of consumer data used in predictive consumer scores today, as well as a roster of the consumer scores such as health risk scores, consumer prominence scores, identity and fraud scores, summarized credit statistics, among others. The report reviews the history of the credit score – which was secret for decades until legislation mandated consumer access -- and urges close examination of new consumer scores for fairness and transparency in their factors, methods, and accessibility to consumers. About the Authors Pam Dixon is the founder and Executive Director of the World Privacy Forum. She is the author of eight books, hundreds of articles, and numerous privacy studies, including her landmark Medical Identity Theft study and One Way Mirror Society study. She has testified before Congress on consumer privacy issues as well as before federal agencies.
    [Show full text]
  • Addressing the HIPAA-Potamus Sized Gap in Wearable Technology Regulation Note
    University of Minnesota Law School Scholarship Repository Minnesota Law Review 2019 Addressing the HIPAA-Potamus Sized Gap in Wearable Technology Regulation Note Paige Papandrea Follow this and additional works at: https://scholarship.law.umn.edu/mlr Part of the Law Commons Recommended Citation Papandrea, Paige, "Addressing the HIPAA-Potamus Sized Gap in Wearable Technology Regulation Note" (2019). Minnesota Law Review. 3246. https://scholarship.law.umn.edu/mlr/3246 This Article is brought to you for free and open access by the University of Minnesota Law School. It has been accepted for inclusion in Minnesota Law Review collection by an authorized administrator of the Scholarship Repository. For more information, please contact [email protected]. Note Addressing the HIPAA-potamus Sized Gap in Wearable Technology Regulation Paige Papandrea INTRODUCTION You wake up at 7:00 AM, half an hour late. You rush to get ready, first throwing on your Apple Watch1 and then showering. Your watch records your heart rate at 112 beats per minute and counts exactly seventeen steps from your bedroom to your bath- room. You run to catch the bus at 7:30 AM—your watch tracks your location as you run exactly 0.3 miles to the bus stop. Your heart rate is 155 beats per minute, you ran exactly 600 steps to get there, and burned around twenty-two calories, all tracked by your watch. You sit down, also recorded on your watch. You ar- rive at work at 8:00 AM, sprint up the three flights of stairs, and quickly sit at your desk. Your watch measures your heart rate at 169 beats per minute, updates how many flights of stairs you J.D.
    [Show full text]
  • Internet Security in Companies!
    !! SIFA Vänersborg, Sweden 2015 INTERNET SECURITY IN COMPANIES! Nowadays, many companies have suffered from cyber attacks, that’s why it is important for them to properly secure their data and protect their employees and customers information. ! Useful Words! Introduction & general overview! Malicious Code: Program which causes Introduction & general overview! Internet safety nowadays has become internal damage to a computer network.! Consumer information, employee a serious and sometimes dangerous ! records, proprietary and trade secret issue for the users and the Spear Phishing: Spear phishing is an information, and intellectual property are companies.Internet security is all about email that appears to be from an all available for the taking if trust at a distance. That is because you individual or business that you know but infrastructures are not properly protected are dealing with everyone remotely and it isn’t.! and contingency plans developed should not able to confirm identity or ! a breach occur. While many businesses authenticity in the traditional sense. WPA: The name for a number of standards may understand the potential threat they Even with secure connections, to use encryption on a Wireless LAN.! are often not prepared to deal with an encryption, and the various other ! incident, or they naively believe it will Cyber Attack: Cyber-attack is any type of authentication schemes there is always never happen to them.It is not simply a a way to spoof identity, provide forged offensive maneuver employed by individuals or whole organizations that technical issue and can impact documents or credentials, hold targets computer information systems, customers, employees business computers and servers hostage to infrastructures, computer networks, and/or associates and the public perception of “ransomware” or allow cyber-criminals to be whoever they want to be.
    [Show full text]
  • Miss Manners the Well-Mannered Toddler by Judith Martin
    ----- ---- -----------~-------------------------------- Chicken wings - page 5 VOL XVIII, NO. 24 the indepemknt s!lldent newspaper serving notre Jame and saint mary's WEDNESDAY, SEPTEMBER 28, 1983 Labor Union worried; Eastern demands cuts Associated Press San Francisco," said Michael Gerlich of Houston. He and a companion, Continental Airlines resumed Connie Harrison, also of Houston, some of its flights at discount rates were planning to travel from Hous­ Tuesday three days after going to ton to Portland, Ore., one of78 cities bankruptcy court, while a union Continental served until Saturday leader denied claims hy Eastern ·when it trimmed its destinations to Airlines that it must chop wages by 25. 15 percent to avoid Continental's On Monday, Eastern Airlines fate. Chairman Frank Borman said in a The first Continental DC-9 took videotaped message that without off from Houston in the fog at 7:31 across-the-board pay cuts, the a.m. with six passengers aboard. Miami-based carrier will he forced Billie Tafelski, who checked in the to go to bankruptcy court or cease passengers for the flight, said she operations altogether. wished she had .their addresses "so I But Charles Bryan president of the could write them a thank you let- 13,000 member union of Eastern ter." machinists, said: "we do not accept Pilots were working at less than his doomsday remedy." half salary and the airline was flying "We've done extensive research Observer Photo/Hamil Cupero to fewer than one-third of its pre­ at Eastern Airlines and they're not vious destinations. Only 35 percent about to go bankrupt," Bryan said.
    [Show full text]
  • Download Brochure
    Designed exclusively for adults Breaks from £199* per person Britain’s getting booked Forget the travel quarantines and the Brexit rules. More than any other year, 2021 is the one to keep it local and enjoy travelling through the nation instead of over and beyond it. But why browse hundreds of holiday options when you can cut straight to the Warner 14? Full refunds and free changes on all bookings in 2021 Warner’s Coronavirus Guarantee is free on every break in 2021. It gives the flexibility to cancel and receive a full refund, swap dates or change hotels if anything coronavirus-related upsets travel plans. That means holiday protection against illness, tier restrictions, isolation, hotel closure, or simply if you’re feeling unsure. 2 After the quiet, the chorus is becoming louder. Across our private estates, bands are tuning up, chefs are pioneering new menus and the shows are dress rehearsed. And there’ll be no denying the decadence of dressing up for dinner and cocktails at any o’clock. This is the Twenties after all. And like the 1920s after the Spanish flu, it’ll feel so freeing to come back to wonderful views, delicious food and the best live music and acts in the country, all under the one roof. Who’s ready to get things roaring? A very British story Warner has been offering holidays for almost 90 years with historic mansions and coastal boltholes handpicked for their peaceful grounds and settings. A trusted brand with a signature warm-hearted welcome, we’re once more ready to get back to our roots and celebrate the very best of the land.
    [Show full text]
  • Beauty and the Beast
    STOWE 2015-16 mail NEWS HIGHLIGHTS The 2015-2016 season of Robotics at Stowe saw the Junior and Senior teams qualify for the National Finals. Both teams reached the semi-final, but ended up facing each other. The Senior team prevailed and went on to become National Finalists and claim their place among StoweBots 500 of the world’s top teams at the VEX World Robotics Finals. The 2016 World Finals was the biggest robotics competition ever, setting a Guinness World Record with over 1,075 teams from 32 countries, and 20,000 people take on the World in attendance. The scale of the competition and venue was truly astonishing and beyond all expectations. Over the three days of competition the team played ten qualifying matches in the hope of making the playoff games. The team preformed incredibly well, holding its own in each match. Sadly the robot suffered some technical difficulties beyond our control. A change of CPU fixed the problem, but the losses put us further down the qualification ranking than we could have been. The StoweBots finished winning four out of the ten games and were placed 56 out of the 100 teams in their group. However, every single game they played was close despite the difficulties. The other aspect that shows the strength of our performance was the SP score of the team. This is the total score that your opponents achieved in your games; the higher the score the closer and more difficult the games were. The StoweBots SP score was 1658 and tenth highest of the group.
    [Show full text]
  • Using Big Data Analytics to Fight Identity Fraud
    Primary IDA Color Palette Secondary Color Palette - Medium R122 R247 R0 R0 R154 R250 R47 R165 G134 G143 G53 G114 G155 G187 G163 G194 B142 B30 B95 B156 B157 B119 B255 B218 Gray Orange Navy Blue Blue Using Big Data Analytics Gray Orange Navy Blue Blue R106 R84 R102 R191 R42 R147 R165 R216 G154 G148 G49 G191 to Fight Identity Fraud G197 G201 G113 G216 B194 B63 B144 B191 B255 B129 B206 B216 Light Blue Green Purple Light Gray Light Blue Green Purple Light Gray Dr. Stephen Coggeshall Chief Analytics and Science Officer ID Analytics/Lifelock 2nd Workshop of Mission-Critical Big Data Analytics Prairie View, May 16,17 A Symantec Company © 2017 ID Analytics, Inc. Confidential Primary IDA Color Palette Secondary Color Palette - Medium R122 R247 R0 R0 Outline R154 R250 R47 R165 G134 G143 G53 G114 G155 G187 G163 G194 B142 B30 B95 B156 B157 B119 B255 B218 Gray Orange Navy Blue Blue Gray Orange Navy Blue Blue • All about identity fraud R106 R84 R102 R191 – modes R42 R147 R165 R216 G154 G148 G49 G191 G197 G201 G113 G216 B194 B63 B144 B191 B255 B129 B206 B216 – examples Light Blue Green Purple Light Gray Light Blue Green Purple Light Gray • Using big data analytics to catch identity fraud – a look into our technology © 2017 ID Analytics, Inc. Confidential 2 One column Primary IDA Color Palette Secondary Color Palette - Medium ID Analytics Overview R122 R247 R0 R0 R154 R250 R47 R165 G134 G143 G53 G114 G155 G187 G163 G194 B142 B30 B95 B156 ID Analytics applies advanced analytics to a unique sources of U.S.
    [Show full text]