bureaucracybusters

Posts Tagged ‘SECURITY’

“SECURITY THEATER” PROMOTES FAKE SECURITY

In Bureaucracy, History, Law, Law Enforcement, Military, Politics, Social commentary on April 25, 2019 at 12:04 am

So you want to visit the Pentagon and see how America’s military works to protect you?  Fine.

Just be prepared to accept the requirements that go with “security theater.”

According to the Pentagon’s webpage: “Tours are available Monday through Thursday from 10:00 A.M. to 4:00 P.M. and Friday from 12:00 P.M. to 4:00 P.M., and normally last approximately 60 minutes.”

Here’s what you’ll need to take the tour:

  • Ages 12 and under – ID not required. 
  • Ages 13 to 17 – One form of photo ID or a parent/guardian to vouch for them.
  • Ages 18 and up – At least one form of proper identification, which must be current and contains a photograph.

The Pentagon

Let’s break all this down:

“Ages 12 and under – ID not required.”  Strapping bombs to children was a favorite tactic of the Viet Cong. And Al Qaeda has not hesitated to make use of the same weapon. It’s not comforting to learn that our military is still looking at children as “babes of innocence” rather than as possible “bombs of convenience.”

“Ages 13 to 17 – One form of photo ID or a parent/guardian to vouch for them.”  Great! So long as an adult says, “Yeah, he’s mine,” any teenager can gain entry to America’s most important military center. This includes those teens who resent the American military’s presence around the world.

“Ages 18 and up – One form of ID, which must be current and contains a photograph, such as a driver’s license or U.S. passport.

Related image

Knowing a person’s identity is useful—so long as you have a reliable database system to match it against.  An example of this is the FBI’s National Crime Information Center (NCIC).

Since 1967, the NCIC has been America’s central database for tracking crime-related information. It’s linked with such information repositories as:

  • Federal law enforcement agencies
  • State law enforcement agencies
  • Local law enforcement agencies
  • Federal and state motor vehicle registration/licensing agencies.

Image result for Images of National Crime Information Center

The NCIC makes available a variety of personal and property records for law enforcement and security purposes, covering:

Behind this lies a simple but highly effective formula, which was best-expressed in the classic 1973 movie, The Day of the Jackal. An anonymous professional killer has been hired to assassinate French President Charles de Gaulle.

At a government meeting called to thwart the plot, a top security expert says: “The first task is to give this man a name. With a name, we get a face, with a face a passport, with a passport an arrest.”

But if you don’t have a reliable database system to match an ID against, forcing people to “show me your ID” is worthless. What does “John Smith” mean to the average ill-paid security guard?

Even if the person is a wanted criminal, just looking at his ID card is worthless. Unless, of course, the person is so notorious as a criminal that his name is known to almost everyone: “My God, it’s Osama bin Laden!”

That’s presuming that the person is not only notorious but stupid enough to flaunt it. There is, after all, such a thing as a falsified ID. Every teenager who’s ever wanted access to a can of beer knows that.

If it seems impossible that any security official could be so stupid, consider this:

In 2010 a friend of mine decided to rent a P.O. box at his local Postal Service office. He was promptly told he would have to provide two pieces of identification, such as:

  • A driver’s license or State ID card
  • A passport
  • A birth certificate
  • A bill from a utility company, such as for phone or electric service.

Now, consider:

  • He lived only a few blocks from the post office where he was applying for a P.O. box. 
  • He had lived at the same apartment building for 22 years.  
  • The Postal Service had been delivering his mail there that entire time—sometimes knocking at his door to do so. 
  • When he came to its counter to retrieve mail that was otherwise un-deliverable, his showing a State ID card had been entirely enough.

But, to rent a P.O. box at that very same post office, he had to prove he wasn’t a terrorist. And one of the ways he was to do this was to show a utility bill.

What does paying money to an electric or gas company prove about anyone?

Mohammed Atta faithfully paid all his utility bills on an apartment in Hamburg, Germany, where he planned the 9/11 attacks. He continued paying his utility bills during his stay in Venice, Florida—right up to the day he flew American Airlines Flight 11 into the North Tower of the World trade Center. 

In short: Creating security theater is not the same as providing real security.

ISLAMIC TERRORISTS: PC VS. REALITY: PART TWO (END)

In Bureaucracy, Entertainment, History, Law, Law Enforcement, Military, Politics, Social commentary on November 3, 2017 at 12:13 am

Islamics are quick to assert that they, too, are Americans. But getting Islamics to point out the terrorists within their ranks is an entirely different matter.

According to author Ronald Kessler, this has caused serious problems for the FBI. In his 2011 book, The Secrets of the FBI, Kessler notes the refusal of the Islamic community to identify known or potential terrorists within its ranks.

Says Arthur M. Cummings, the Bureau’s executive assistant director for national security: “I had this discussion with the director of a very prominent Muslim organization here in [Washington] D.C. And he said, ‘Why are you guys always looking at the Muslim community?’”

“I can name the homegrown cells, all of whom are Muslim, all of whom were seeking to kill Americans,” replied Cummings. “It’s not the Irish, it’s not the French, it’s not the Catholics, it’s not the Protestants. It’s the Muslims.”

Occasionally, Muslims will condemn Al Qaeda. But “rarely do we have them coming to us and saying, ‘There are three guys in the community that we’re very concerned about.’” said Cummings.

“They don’t want anyone to know they have extremists in their community. Well, beautiful. Except do you read the newspapers? Everybody already knows it. The horse has left the barn.

“So there’s a lot of talk about engagement. But, realistically, we’ve got a long, long way to go.”

At one community meeting, an Islamic leader suggested to Cummings that then-FBI director Robert Meuller III should pose for a picture with his group’s members. The reason: To show that Islamics are partners in the “war on terror.”

“When you bring to my attention real extremists who are here to plan and do something, who are here supporting terrorism,” said Cummings, “then I promise you, I will have the director stand up on the stage with you.”

“That could never happen,” replied the Islamic leader. “We would lose our constituency. We could never admit to bringing someone to the FBI.”  

Cummings has no use for such Politically Correct terms as “man-caused disasters” to refer to terrorism. Nor does he shy away from terms such as “jihadists” or “Islamists.”

“Of course Islamists dominate the terrorism of today,” he says bluntly.  

In May, 2014, Steven Emerson, a nationally recognized expert on terrorism, posted an ad in The New York Times, warning about the dangers of PC-imposed censorship:

“Our nation’s security and its cherished value of free speech has been endangered by the bullying campaigns of radical Islamic groups, masquerading as ‘civil rights’ organizations, to remove any reference to the Islamist motivation behind Islamic terrorist attacks.

“These groups have pressured or otherwise colluded with Hollywood, the news media, museums, book publishers, law enforcement and the Obama Administration in censoring the words ‘Islamist’, ‘Islamic terrorism’, ‘radical Islam’ and ‘jihad’ in discussing or referencing the threat and danger of Islamic terrorism.

“This is the new form of the jihadist threat we face. It’s an attack on one of our most sacred freedoms—free speech—and it endangers our very national security. How can we win the war against radical Islam if we can’t even name the enemy?”

He has a point—and a highly legitimate one.

Imagine the United States fighting World War II—and President Franklin Roosevelt banning the use of “fascist” in referring to Nazi Germany or “imperialist” in describing Imperial Japan.

Imagine CNN-like coverage of the Nazi extermination camps, with their piles of rotting corpses and smoking gas ovens, while a commentator reminds us that “Nazism is an ideology of peace.”

Then try to imagine how the United States could have won that life-and-death struggle under such unrealistic and self-defeating restrictions. 

It couldn’t have done so then. And it can’t do so now.

Then consider these Islamic terrorist outrages of our own time: 

  • The 9/11 attacks on the World Trade Center in New York City and the Pentagon in Washington, D.C., which snuffed out the lives of 3,000 Americans. 
  • The 2004 bombing of Madrid’s commuter train system. 
  • The attack on the London subway in 2005.  The killing of 13 U.S. Army personnel at Fort Hood, Texas, by a Muslim army major in 2009. 
  • The bombing of the Boston Marathon in 2013.
  • The kidnapping of 300 Nigerian school girls by Boko Haram in 2014. 
  • The slaughter of 12 people at a Paris satirical magazine that had published cartoons about the Prophet Mohammed in 2015.
  • The slaughter of more than 100 people in ISIS attacks across Paris in 2015.
  • A series of deadly terrorist attacks in Brussels, killing 31 and injuring 270 in 2016.
  • The mashing of eight bicyclists and pedestrians by a truck-driving ISIS supporter in 2017.

In every one of these attacks, the perpetrators openly announced that their actions had been motivated by their Islamic beliefs.

In his groundbreaking book, The Clash of Civilizations (1996) Samuel Huntington, the late political scientist at Harvard University, noted:

The fundamental problem for the West is not Islamic fundamentalism. It is Islam, a different civilisation whose people are convinced of the superiority of their culture and are obsessed with the inferiority of their power.”  

The West may not be at war with Islam—as countless Western politicians repeatedly assert. But Islamics have no qualms about declaring that they are at war with the West.

ISLAMIC TERRORISTS: PC VS. REALITY: PART ONE (OF TWO)

In Bureaucracy, Entertainment, History, Law, Law Enforcement, Military, Politics, Social commentary on November 2, 2017 at 12:12 am

The 2016 Boston Marathon was scheduled for April 18, 2016.

And local, State and Federal law enforcement authorities had been planning security for the event since October, 2015.

So it was only natural that these agencies wanted the public to know the Marathon would be as safe as more than 5,000 law enforcement officers could make it.  

The Boston Marathon 

“‘Leave the worrying to us’: Security Ramped Up for Boston Marathon,” read the headline of the April 16 issue of USA Today.

And it gave the reason for this: Three years earlier, on April 15, 2013, two bombers had wreaked havoc at the finish line of the race.

It also named the bombers—brothers Dzhokhar and Tamerlan Tsarnaev—whose terrorist act killed three people and injured about 264 others.  

Tamerlan and Dzhokhar Tsarnaev

It further noted that Tamerlan had died in a shootout with police three days after the marathon–and police had captured Dzhohkar several hours later. (He was convicted by a jury and sentenced to death.)

But the story said nothing about their citing Islam as the reason for their murderous rampage.

Click here: ‘Leave the worrying to us’: Security ramped up for Boston Marathon

The April 16 edition of The Boston Patch carried this headline: “Boston Marathon 2016: Security Changes You Can’t See All Around You.”

The article stated that most of these precautions couldn’t be revealed. Then it added that even though law enforcement officials hadn’t identified a credible threat to this year’s Boston Marathon, “recent events make the world feel less safe today than in 2013.” 

But the article said nothing about those “recent events,” such as:

  • In 2013, two Muslims butchered and beheaded a British soldier on a busy London street.
  • In 2014, an ax-wielding Muslim slashed two New York police officers before being shot by other cops. 
  • In 2015, Muslims slaughtered 12 people at a Paris satirical magazine for publishing cartoons about the Prophet Mohammed. 
  • In 2015, more than 100 people were murdered in ISIS attacks across Paris. 
  • In 2016, a series of Islamic terrorist bombings in Brussels killed 31 and injured more than 300.

Nor did the story say that all of these “recent events” were carried out by followers of the Islamic religion. Or that the perpetrators openly announced that their actions had been motivated by their Islamic beliefs.

Click here: Brussels attacks add urgency to Boston Marathon security | US News

On April 6, 2016, The Boston Globe announced: “Tight Security Planned for Upcoming Boston Marathon.”

The story noted that, in drawing up their security arrangements, “authorities analyzed terrorist attacks in Paris, San Bernardino, Calif., and Brussels in recent months.”

The San Bernardino attack had occurred on December 2, 2015. 

The story said that Syed Rizwan Farook and Tashfeen Malik, had slaughtered 14 people and wounded 22 at a Department of Public Health training event and birthday party.  

Related image

Tashfeen Malik and Syed Rizwan Farook

But the article did not inform readers that Farook and Malik were Muslims acting in the name of Islam.

The story quoted Harold Shaw, special agent in charge of the FBI’s Boston Field Office, as saying: “San Bernardino taught us something very significant. They [the killers] were not on the radar.”

But the article omitted “something very significant”: Farook and Malik had melded perfectly into American society before their outrage.  

Thus, the only factor that could have put them “on the radar” as potential terrorists was their being Muslims.

And in an America driven by Political Correctness, noting that would have been verboten.

Click here: Tight security planned for upcoming Boston Marathon – The Boston Globe

NBC News carried a story on “How the Boston Marathon is Using Security Technology.”  

The story then described how police used a high-tech partner, Esri, to track, in real-time, the progress of the morning’s race.  

“When you look [at] security, there’s three legs to the stool: People, process and technology,” said Arnette Heintze, CEO and co-founder of Hillard Heintze, an investigation and security risk management company. 

Click here: How the Boston Marathon is Using Security Technology – NBC News

Yet for all the gushing kudos leveled at the new uses of sophisticated technology for keeping people safe, one thing was conspicuously ignored.

The opening paragraph, “Three years after a deadly bombing at the Boston Marathon….” left unnamed those had made the use of this technology necessary–Tamerlan and Dzhokhar Tsarnaev.  

Nor did it mention that Dzhokhar had laid out, in a note, his reason for attacking innocent men and women: “We Muslims are one body, you hurt one you hurt us all.  

“Well at least that’s how Muhammed wanted it to be forever. The ummah [Islamic community] is beginning to rise.  

“Know you are righting men who look into the barrel of your gun and see heaven, how how can you compete with that. We are promised victory and will surely get it.”

Click here: Text from Dzhokhar Tsarnaev’s note left in Watertown boat – The Boston Globe

Of all the Democratic and Republican Presidential candidates in 2016, only Donald Trump dared to say the politically un-sayable: Islam is at war with us.  

And this candor—coupled with repeated Islamic atrocities—gained him both the Republican nomination and the White House.  

SECURITY VS. SECURITY THEATER

In Bureaucracy, History, Law, Law Enforcement, Politics, Social commentary on July 28, 2017 at 12:02 am

So you want to visit the Pentagon and see how America’s military works to protect you?  Fine.

Just be prepared to accept the requirements that go with “security theater.”

A memo from the Public Affairs Office of the Assistant Secretary of Defense, dated February 2, 2012, offers this gem:

The Pentagon

“Proper personal identification (ID) must be produced when requested by Pentagon Police prior to entering the Pentagon as follows.

  • Ages 12 and under – ID not required. 
  • Ages 13 to 17 – One form of photo ID or a parent/guardian to vouch for them.
  • Ages 18 and up – Two forms of ID: one form must be a government issued photo ID, the other may be a credit/debit card, U.S. passport, birth certificate, or another item with the individual’s name printed on it, excluding business cards.”

Let’s break all this down:

“Ages 12 and under – ID not required.”  Strapping bombs to children was a favorite tactic of the Viet Cong. And Al Qaeda has not hesitated to make use of the same weapon. It’s not comforting to learn that our military is still looking at children as “babes of innocence” rather than as possible “bombs of convenience.”

“Ages 13 to 17 – One form of photo ID or a parent/guardian to vouch for them.”  Great! So long as an adult says, “Yeah, he’s mine,” any teenager can gain entry to America’s most important military center. This includes those teens who resent the American military’s presence around the world.

“Ages 18 and up – Two forms of ID: one form must be a government issued photo ID, the other may be a credit/debit card, U.S. passport, birth certificate, or another item with the individual’s name printed on it.”

Related image

Knowing a person’s identity is useful—so long as you have a reliable database system to match it against.  An example of this is the FBI’s National Crime Information Center (NCIC).

Since 1967, the NCIC has been America’s central database for tracking crime-related information. It’s linked with such information repositories as:

  • Federal law enforcement agencies
  • State law enforcement agencies
  • Local law enforcement agencies
  • Federal and state motor vehicle registration/licensing agencies.

Image result for Images of National Crime Information Center

The NCIC makes available a variety of personal and property records for law enforcement and security purposes, covering:

Behind this lies a simple but highly effective formula, which was best-expressed in the classic 1973 movie, The Day of the Jackal. An anonymous professional killer has been hired to assassinate French President Charles de Gaulle.

At a government meeting called to thwart the plot, a top security expert says: “The first task is to give this man a name. With a name, we get a face, with a face a passport, with a passport an arrest.”

But if you don’t have a reliable database system to match an ID against, forcing people to “show me your ID” is worthless. What does “John Smith” mean to the average ill-paid security guard?

Even if the person is a wanted criminal, just looking at his ID card is worthless. Unless, of course, the person is so notorious as a criminal that his name is known to almost everyone: “My God, it’s Osama bin Laden!”

That’s presuming that the person is not only notorious but stupid enough to flaunt it. There is, after all, such a thing as a falsified ID. Every teenager who’s ever wanted access to a can of beer knows that.

If it seems impossible that any security official could be so stupid, consider this:

In 2010 a friend of mine decided to rent a P.O. box at his local Postal Service office. He was promptly told he would have to provide two pieces of identification, such as:

  • A driver’s license or State ID card
  • A passport
  • A birth certificate
  • A bill from a utility company, such as for phone or electric service.

Now, consider:

  • He lived only a few blocks from the post office where he was applying for a P.O. box. 
  • He had lived at the same apartment building for 22 years.  
  • The Postal Service had been delivering his mail there that entire time—sometimes knocking at his door to do so. 
  • When he came to its counter to retrieve mail that was otherwise un-deliverable, his showing a State ID card had been entirely enough.

But, to rent a P.O. box at that very same post office, he had to prove he wasn’t a terrorist. And one of the ways he was to do this was to show a utility bill.

What does paying money to an electric or gas company prove about anyone? Osama bin Laden was paying for utilities in a Pakistani house—and the Pakistanis didn’t say: “Hey, we can’t supply electricity to you–you’re a terrorist.”

THE NEXT 9/11: TSA WILL MAKE IT HAPPEN: PART TWO (END)

In Bureaucracy, Business, History, Law Enforcement, Politics, Social commentary on June 1, 2017 at 1:05 am

All security systems–including those considered the best–are manned by humans. And humans are and will always be imperfect creatures.

So there will inevitably be times when security agents miss the assassin or terrorist intent on mayhem.  For example:

  • In September, 1975, two women–Lynette “Squeaky” Fromme and Sara Jane Moore–tried to assassinate President Gerald R. Ford on two separate occasions.
  • Fromme was tackled by a Secret Service agent. Moore’s aim was deflected by Oliver Sipple, a Marine and Vietnam veteran, thus saving Ford’s life.

Gerald Ford being hustled from danger by Secret Service agents

Until these incidents, the Secret Service profile of a potential assassin didn’t include a woman.

  • On March 30, 1981, John W. Hinckley, a psychotic obsessed with actress Jodie Foster, gained access to a line of reporters waiting to throw questions at President Ronald Reagan.
  • As Reagan got into his bulletproof Presidential limousine, Hinckley drew a pistol and opened fire. Wounded, Reagan escaped death by inches.

The Reagan Assassination attempt

The Secret Service Service had failed to prevent the attack because no one–until that moment–had attacked a President from the section reserved for reporters.

  • On September 11, 2001, Islamic terrorists armed with boxcutters highjacked four American jetliners and turned them into fuel-bombs.
  • Two of the airliners struck the North and South towers of the World Trade Center, destroying both structures.
  • A third hit the Pentagon.
  • The fourth–United Airlines Flight 93–crashed when it was diverted from its intended target (the White House or Congress) by passengers who resolved to fight back.
  • Three thousand Americans died that day–in New York City, Washington, D., and Shanksville, Pennsylvania.

Until this day of catastrophe, no highjacker had turned a jumbo-jet into a fuel-bomb. Passengers had been advised to cooperate with highjackers, not resist them.

So how will the next 9/11 happen?  In all likelihood, like this:

  • A terrorist–or, more likely, several terrorists–will sign up for one or more airline “VIP screening” programs.
  • They will be completely clean–no arrests, no convictions.  
  • They may well be respectable citizens in their communities.
  • They will probably have amassed enough “frequent flier miles” to ingratiate themselves with the airlines and convince the Transportation Safety Administration (TSA) of their integrity.
  • Then, one day, they will breeze through their selected airports–
  • Without removing their belts and shoes;
  • Without undergoing pat-down searches;
  • Without being required to remove laptops and other electronic devices from their carry-ons;
  • Without exposing their electronic devices to X-ray technology.
  • Then they will board planes–either as part of an individual terrorist effort or a coordinated one, a la 9/11.

And then it will be too late.

Memorial to the passengers and crew of United Flight 93

The TSA/airlines’ VIP programs are based on the assumption that someone who has completed a security check in the past need not be re-checked in the future.

This assumption has proven false for American Intelligence agencies such as the FBI and CIA.

  • FBI agent Robert Hanssen spied for Soviet and Russian Intelligence services for 22 years (1979-2001). He’s now serving a life sentence in Florence, Colorado.
  • CIA agent Aldrich Ames betrayed American secrets–including those Russians who had shared them–to Soviet and Russian espionage agencies from 1985 to 1994. He is likewise serving a life sentence.

Even requiring an agent to undergo repeated security checks is no guarantee of trustworthiness.

When asked about how he repeatedly passed CIA polygraph tests, Ames said: “There’s no special magic. Confidence is what does it. Confidence and a friendly relationship with the examiner. Rapport, where you smile and make him think that you like him.”

Thus, as William Shakespeare warned in Hamlet, “one may smile and smile and be a villain”–or a highjacker.

The TSA introduced its Pre-Check program during the fall of 2011. By May, 2017, more than four million travelers had been found worthy of “expedited” status.

In early September, 2013, TSA announced that it would more than double its “expedited screening” program, Pre-Check, from 40 to 100 airports by the end of the year.

Nor is TSA the only organization giving big-spending fliers special treatment at potential risk to their country. For example:

Delta Air Lines offers Sky Priority, described as providing “privileged access through security checkpoints” at select airports.

Another private security program, Clear, collects several pieces of biometric data on well-heeled passengers. Once verified by a kiosk local to the security checkpoint, the passengers are allowed to skirt the security barriers that poor and middle-class folks must pass through.

Priority Access, set up by TSA and the airlines, provides “expedited service” to first-class and business passengers. To qualify, you need only possess certain credit cards–such as the United Mileage Plus Club Card.

Some critics blast this two-tier passenger check-in system as an affront to democratic principles.

“It’s stratifying consumers by class and wealth, because the people who travel a lot usually have higher incomes,” said Ralph Nader, consumer advocate and frequent business traveler.

But there is an even more important reason to immediately disband these programs and require everyone–rich and middle-class alike–to undergo the same level of security screening:

The 3,000 men and women who died horrifically on September 11, 2001, at the hands of airline passengers whom authorities thought could be trusted to board a plane.

Tribute to the vanished World Trade Center

THE NEXT 9/11: TSA WILL MAKE IT HAPPEN: PART ONE (OF TWO)

In Bureaucracy, Business, History, Law Enforcement, Politics, Social commentary on May 31, 2017 at 12:01 am

Almost 16 years after 9/11, America is now selling its Islamic enemies access to the very weapons—jet-fueled airplanes—they need to wage jihad against its citizens.

World Trade Center on September 11, 2001

This danger is brought to you by IdentoGO, the private security company chosen by the Transportation Safety Administration (TSA) to screen airline passengers.

Consider this ad it posts:

“How many times have you stood in line at the airport watching others breeze through security with no hassle? By enrolling in TSA Pre✓® , you too can breeze through security.

“Keep your shoes, jacket and belt on; your laptop in its case; 3-1-1 compliant liquids in your bag; and enjoy a better overall travel experience.

“TSA Pre✓® allows low-risk travelers to experience faster, more efficient screening at participating U.S. airport checkpoints for domestic and international travel.”

Yes, for a one-time payment of $85, you, too, can apply to receive such preferential treatment.  Even if it means putting the Nation’s security at risk. Travelers that are eligible for TSA Pre✓® include:

  • U.S. citizens of frequent flyer programs who meet TSA-mandated criteria and who have been invited by a participating airline;
  • U.S. citizen, U.S. national or Lawful Permanent Residents who are members of the TSA Pre✓® Application Program;
  • U.S. citizens who are members of a U.S. Customs and Border Protection Trusted Traveler program, such as Global Entry, SENTRI, and NEXUS and Canadian citizens who are members of NEXUS; and
  • Members of the U.S. Armed Forces.

To apply for TSA Pre✓®:

  1. Find an IdentoGO Center near you, including a growing number of airport locations, offering TSA Pre✓® and pre-enroll online.
  2. Schedule an appointment to come in for fingerprinting.
  3. Pay the $85 applications fee and show your proof-of-identity documents from the approved list of valid government IDs.
  4. A Known Traveler Number (KTN) will be mailed to you or can be obtained online.
  5. Once enrolled, your KTN is used when booking travel and your TSA Pre✓® approval is printed on your boarding passes.  
  6. Be sure to update your airline member profile to have the number automatically sent to the TSA when making reservations.

 Among the credit cards that will buy you such preferential treatment:

If you’re accepted, you don’t need to undergo another background check for the next five years.

In April 2017, 97% of TSA Pre’s more than four million passengers waited less than five minutes to board.

So what difference does it make that some passengers must submit to close inspection while others do not?

  • If you’re trying to carry a metallic firearm aboard a plane, the magnetometer will likely pick it up.  But if you’ve filled your computer with plastic explosive, the magnetometer won’t pick it up.

Related image

Advanced imaging technology

  • Or maybe you want to be a shoe-bomber like Richard Reid, who tried to blow up an American Airlines flight in 2001. Being allowed to skip the requirement to remove your shoes will certainly take you a long way toward reaching your goal.

Why is America being placed at such risk?  Three reasons:

  1. The greed of American airline corporations and the TSA.
  2. Wealthy, self-entitled Americans hate waiting in long airport security lines—like ordinary citizens.
  3. The Calvinistic belief—shared by most Americans—that wealth is a sign of God’s favor, and thus proof that its holder is worthy of deference, if not awe.

On September 11, 2001, 2,996 people were killed and more than 6,000 others wounded as three highjacked airliners slammed into:

  • The North Tower of the World Trade Center;
  • The South Tower of the World Trade Center;
  • The Pentagon; and
  • A field in Somerset County, Pennsylvania, after passengers and crew on United Flight 93 tried to regain control.

The attacks inflicted the worst shock and grief on America since the 1963 assassination of President John F. Kennedy.

So think about how easy it is to qualify as a TSA Pre-Check passenger the next time you board an airliner.

According to Yelp! reviews of thoroughly satisfied IdentoGO customers:

  • “My TSA precheck appointment was done in 10 minutes! Plenty of free parking in their parking lot. The staff was friendly and courteous. I made an appointment thru the TSA precheck website. When I arrived, there was no wait. The office was clean, and the staff member who I met was friendly and courteous. Be sure to bring in your proper documents. $85 fee collected at the end of appointment. TSA precheck works for domestic flights only.”
  • “The friendly agent took me in right away and he proceeded to go through my application with me, just to double check that all the information in the application is correct. He took my fingerprints (all fingers) and I was pretty much done in about 10 minutes.”
  • “Going here for TSA precheck is a no-brainer.  Super easy to get an appointment, free parking, and no waiting.  Staff was friendly and efficient, explained what to expect after they submitted my information, and within less than 10 minutes I was on my way.  Went in on a Friday afternoon and by Monday evening (ok, late evening really), I had my KTN. So, so easy.”

KNOWING THE ENEMY, BUT REFUSING TO NAME IT: PART TWO (END)

In Bureaucracy, Entertainment, History, Law Enforcement, Military, Politics, Social commentary on April 27, 2016 at 1:25 am

Since October, 2015, local, State and Federal law enforcement agencies had been planning security for the 2016 Boston Marathon.

With the event scheduled for April 18, authorities wanted to assure the public that the Marathon would be as safe as more than 5,000 law enforcement officers could make it.

Yet, many of the articles written about security for this upcoming event refused to identify the enemy responsible for spending millions of dollars and stationing thousands of local, State and Federal law enforcement officers to protect 30,800 runners and one million spectators.

That enemy: Islamic terrorism.

On April 18, Massive.com carried a story on “Boston Marathon: 2016 security: A look inside the MEMA bunker in Framingham.”

The article noted that on the day of the Marathon–April 18–more than 200 members of 60 Federal, State and local law enforcement agencies gathered at the Massachusetts Emergency Management Agency (MEMA)

Among the agencies represented: The State police, the FBI, the Secret Service and the Bureau of Alcohol, Tobacco, Firearms and Explosives.

Their task: “Keeping 30,800 runners and one million spectators safe.”

But–safe from what?  Or who?

The article noted that, owing to the 2013 attack:

  • More ambulances and wheelchairs were positioned near the finish line.
  • Medical tents were also positioned closer to the finish line.
  • Communications were improved with trauma centers and operating rooms.
  • Each community had safe havens where runners could take shelter in an emergency–and could be picked up by buses.
So there could be no doubt that a huge effort–and expense–had been undertaken to protect tens of thousands of people attending this event.
Yet there was absolutely no mention as to what enemy could justify going to such huge expense in effort and money.
Could it be…Islamic terrorists?
During the Cold War, the Government had never hesitated to name the Soviet Union as America’s foremost enemy.
The United States has been the target of Islamic attacks since the 1970s.
In his groundbreaking work, The Clash of Civilizations and the Remaking of World Order, Harvard political scientist Samuel P. Huntington wrote in 1996:
“During the 15 years between 1980 and 1995…the United States engaged in 17 military operations in the Middle East, all of them directed against Muslims.  No comparable pattern of U.S. military operations occurred against the people of any other civilization.

Samuel P. Huntington (2004 World Economic Forum).jpg

Samuel P. Huntington

On September 11, 2001, Islamics turned four passenger jetliners into flying bombs and slaughtered 3,000 Americans in New York, Washington, D.C. and Pennsylvania.
Since 9/11, the United States has been actively engaged in military operations in Afghanistan, Iraq, Yemen and Syria.
The war that Huntington warned was coming has erupted into fullscale conflict, with no end in sight.

Related image

Yet the most important officials in Washington, D.C. refuse to name the enemy they are spending billions of dollars to fight–and protect American citizens against.

As a result, those officials who dare to name that enemy stand out as beacons of honesty and courage.

One of these is Arthur M. Cummings, the FBI’s executive assistant director for national security.

Cummings has no use for such Politically Correct terms as “man-caused disasters” in referring to terrorism.  Nor does he shrink from terms such as “jihadists” or “Islamists.”

“Of course Islamists dominate the terrorism of today,” he says bluntly.

“I had this discussion with the director of a very prominent Muslim organization here [Washington, D.C.].  And he said ‘Why are you guys always looking at the Muslim community?’

“I can name the homegrown cells, all of whom are Muslim, all of whom are seeking to kill Americans,” replied Cummings.  “It’s not the Irish.  It’s not the French.  It’s not the Catholics.  It’s not the Protestants.  It’s the Muslims.”

In May, 2014, Steven Emerson, a nationally recognized expert on terrorism, posted an ad in The New York Times, warning about the dangers of PC-imposed censorship:

“Or nation’s security and its cherished value of free speech has been endangered by the bullying campaigns of radical Islamic groups, masquerading as ‘civil rights’ organizations, to remove any reference to the Islamist motivation behind Islamic terrorist acts.

“These groups have pressured or otherwise colluded with Hollywood, the news media, museums, book publishers, law enforcement and the Obama Administration in censoring the words ‘Islamist,’ ‘Islamic terrorism,’ ‘radical Islam’ and ‘jihad’ in discussing or referencing the threat and danger of Islamic terrorism.

“This is the new form of the jihadist threat we face.  It’s an attack on one of our most sacred freedoms–free speech–and it endangers our very national identity.

“How can we win the war against radical Islam if we can’t even name the enemy?”

Emerson has a point–of utmost relevance.

Imagine the United States fighting World War II–and President Franklin D. Roosevelt banning the use of “Fascist” in referring to Nazi Germany or “Imperialist” in describing Imperial Japan.

Imagine CNN-like coverage of the Nazi extermination camps, with their piles of rotting corpses and smoking gas ovens, while a commentator reminds us that “Nazism is an ideology of peace.”

Then try to imagine how the United States could have won that life-and-death struggle under such unrealistic and self-defeating restrictions.

It couldn’t have done so then.  And it can’t do so now.

KNOWING THE ENEMY, REFUSING TO NAME IT: PART ONE (OF TWO)

In Bureaucracy, Entertainment, History, Law Enforcement, Military, Politics, Social commentary on April 26, 2016 at 12:05 am

The 2016 Boston Marathon was scheduled for April 18.

And local, State and Federal law enforcement authorities had been planning security for the event since October, 2015.

So it was only natural that these agencies wanted the public to know the Marathon would be as safe as more than 5,000 law enforcement officers could make it.  

The Boston Marathon 

“‘Leave the worrying to us’: Security Ramped Up for Boston Marathon,” read the headline of the April 16 issue of USA Today.

And it gave the reason for this: Three years earlier, on April 15, 2013, two bombers had wreaked havoc at the finish line of the race.

It also named the bombers–brothers Dzhokhar and Tamerlan Tsarnaev–whose terrorist act killed three people and injured about 264 others.  

Tamerlan and Dzhokhar Tsarnaev

It further noted that Tamerlan had died in a shootout with police three days after the marathon–and police had captured Dzhohkar several hours later.  (He was convicted by a jury and sentenced to death.)

The story said nothing, however, about their citing Islam as the reason for their murderous rampage.

Click here: ‘Leave the worrying to us’: Security ramped up for Boston Marathon

The April 16 edition of The Boston Patch carried this headline: “Boston Marathon 2016: Security Changes You Can’t See All Around You.”

The article stated that most of these precautions couldn’t be revealed.  Then it added that even though law enforcement officials hadn’t identified a credible threat to this year’s Boston Marathon, “recent events make the world feel less safe today than in 2013.”

But the article said nothing about those “recent events,” such as:

  • In 2013, two Muslims butchered and beheaded a British soldier on a busy London street.
  • In 2014, an axe-wielding Muslim slashed two New York police officers, before being shot by other cops.
  • In 2015, Muslims slaughtered 12 people at a Paris satirical magazine for publishing cartoons about the Prophet Mohammed.
  • In 2015, more than 100 people were murdered in ISIS attacks across Paris.
  • In 2016, a series of Islamic terrorist bombing attacks in Brussels killed 31 and injured more than 300.

Nor did the story say that all of these “recent events” were carried out by followers of the Islamic religion.

Click here: Brussels attacks add urgency to Boston Marathon security | US News

On April 6, The Boston Globe announced: “Tight security planned for upcoming Boston Marathon.”

The story noted that, in drawing up their security arrangements, “authorities analyzed terrorist attacks in Paris, San Bernardino, Calif., and Brussels in recent months.”

The San Bernardino attack had occurred on December 2, 2015. 

The story said that Syed Rizwan Farook and Tashfeen Malik, had slaughtered 14 people and wounded 22 at a Department of Public Health training event and birthday party.  

Related image

Tashfeen Malik and Syed Rizwan Farook

But the article did not inform readers that Farook and Malik were Muslims acting in the name of Islam.

The story quoted Harold Shaw, special agent in charge of the FBI’s Boston Field Office, as saying: “San Bernardino taught us something very significant. They [the killers] were not on the radar.”

But the article omitted “something very significant”: Farook and Malik had melded perfectly into American society before their outrage.  Thus, the only factor that could have put them “on the radar” as potential terrorists was their being Muslims.

And in an America driven by Political Correctness, noting that would have been verboten.

Click here: Tight security planned for upcoming Boston Marathon – The Boston Globe

NBC News carried a story on “How the Boston Marathon is Using Security Technology.”  

The story then described how police used a high-tech partner, Esri, to track, in real-time, the progress of the morning’s race.  

“When you look [at] security, there’s three legs to the stool: People, process and technology,” said Arnette Heintze, CEO and co-founder of Hillard Heintze, an investigation and security risk management company. 

Click here: How the Boston Marathon is Using Security Technology – NBC News

Yet for all the gushing kudos leveled at the new uses of sophisticated technology for keeping people safe, one thing was conspicuously ignored.

The opening paragraph, “Three years after a deadly bombing at the Boston Marathon….” left unnamed those had made the use of this technology necessary–Tamerlan and Dzhokhar Tsarnaev.  

Nor did it mention that Dzhokhar had laid out, in a note, his reason for attacking innocent men and women: “We Muslims are one body, you hurt one you hurt us all.  

“Well at least that’s how Muhammed wanted it to be forever. The ummah [Islamic community] is beginning to rise.  

“Know you are righting men who look into the barrel of your gun and see heaven, how how can you compete with that. We are promised victory and will surely get it.”

Click here: Text from Dzhokhar Tsarnaev’s note left in Watertown boat – The Boston Globe

HOW THE NEXT 9/11 WILL HAPPEN: PART TWO (END)

In Bureaucracy, Business, History, Law Enforcement, Military, Social commentary on January 26, 2016 at 12:06 am

All security systems–including those considered the best–are manned by humans. And humans are and will always be imperfect creatures.

So there will inevitably be times when security agents miss the assassin or terrorist intent on mayhem.  For example:

  • In September, 1975, two women–Lynette “Squeaky” Fromme and Sara Jane Moore–tried to assassinate President Gerald R. Ford on two separate occasions.
  • Fromme was tackled by a Secret Service agent. Moore’s aim was deflected by Oliver Sipple, a Marine and Vietnam veteran, thus saving Ford’s life.

Gerald Ford being hustled from danger by Secret Service agents

Until these incidents, the Secret Service profile of a potential assassin didn’t include a woman.

  • On March 30, 1981, John W. Hinckley, a psychotic obsessed with actress Jodie Foster, gained access to a line of reporters waiting to throw questions at President Ronald Reagan.
  • As Reagan got into his bulletproof Presidential limousine, Hinckley drew a pistol and opened fire. Wounded, Reagan escaped death by inches. 

 

The Reagan assassination attempt

The Secret Service Service had failed to prevent the attack because no one–until that moment–had attacked a President from the section reserved for reporters.

  • On September 11, 2001, Islamic terrorists armed with boxcutters highjacked four American jetliners and turned them into fuel-bombs.
  • Two of the airliners struck the North and South towers of the World Trade Center, destroying both structures.
  • A third hit the Pentagon.
  • The fourth–United Airlines Flight 93–crashed when it was diverted from its intended target (the White House or Congress) by passengers who resolved to fight back.
  • Three thousand Americans died that day–in New York City, Washington, D., and Shanksville, Pennsylvania.  

Until this day of catastrophe, no highjacker had turned a jumbo-jet into a fuel-bomb. Passengers had been advised to cooperate with highjackers, not resist them.

So how will the next 9/11 happen?  In all likelihood, like this:

A terrorist–or, more likely, several terrorists–will sign up for one or more airline “VIP screening” programs.

They will be completely clean–no arrests, no convictions.  They may well be respectable citizens in their communities.

They will probably have amassed enough “frequent flier miles” to ingratiate themselves with the airlines and convince the Transportation Safety Administration (TSA) of their integrity.

Then, one day, they will breeze through their selected airports

  • Without removing their belts and shoes;
  • Without undergoing pat-down searches;
  • Without being required to remove laptops and other electronic devices from their carry-ons;
  • Without exposing their electronic devices to X-ray technology.

Then they will board planes–either as part of an individual terrorist effort or a coordinated one, a la 9/11.

And then it will be too late.

Memorial to the passengers and crew of United Flight 93

The TSA/airlines’ VIP programs are based on the assumption that someone who has completed a security check in the past need not be re-checked in the future.

This assumption has proven false for American Intelligence agencies such as the FBI and CIA.

  • FBI agent Robert Hanssen spied for Soviet and Russian Intelligence services for 22 years (1979-2001). He’s now serving a life sentence in Florence, Colorado.
  • CIA agent Aldrich Ames betrayed American secrets–including those Russians who had shared them–to Soviet and Russian espionage agencies from 1985 to 1994. He is likewise serving a life sentence.

Even requiring an agent to undergo repeated security checks is no guarantee of trustworthiness.

When asked about how he repeatedly passed CIA polygraph tests, Ames said:

“There’s no special magic. Confidence is what does it. Confidence and a friendly relationship with the examiner. Rapport, where you smile and make him think that you like him.”

Thus, as William Shakespeare warned in Hamlet, “one may smile and smile and be a villain”–or a highjacker.

The TSA introduced its Pre-Check program during the fall of 2011. By May, 2012, more than 820,000 travlers had received “expedited security” since the start of the program.

In early September, 2013, TSA announced that it would more than double its “expedited screening” program, Pre-Check, from 40 to 100 airports by the end of the year.

Nor is TSA the only organization giving big-spending fliers special treatment at potential risk to their country.  For example:

  • Delta Air Lines offers Sky Priority, described as providing “privileged access through security checkpoints” at select airports.
  • Another private security program, Clear, collects several pieces of biometric data on well-heeled passengers.  Once verified by a kiosk local to the security checkpoint, the passengers are allowed to skirt the security barriers that poor and middle-class folks must pass through.
  • Priority Access, set up by TSA and the airlines, provides “expedited service” to first-class and business passengers. To qualify, you need only possess certain credit cards–such as the United Mileage Plus Club Card.

Some critics blast this two-tier passenger check-in system as an affront to democratic principles.

“It’s stratifying consumers by class and wealth, because the people who travel a lot usually have higher incomes,” said Ralph Nader, consumer advocate and frequent business traveler.

But there is an even more important reason to immediately disband these programs and require everyone–rich and middle-class alike–to undergo the same level of security screening:

The 3,000 men and women who died horrifically on September 11, 2001, at the hands of airline passengers whom authorities thought could be trusted to board a plane.

Tribute to the vanished World Trade Center

HOW THE NEXT 9/11 WILL HAPPEN: PART ONE (OF TWO)

In Bureaucracy, Business, History, Law Enforcement, Military, Social commentary on January 25, 2016 at 12:07 am

Fourteen years after 9/11, America is now selling its Islamic enemies access to the very weapons–jet-fueled airplanes–they need to wage jihad against its citizens.

World Trade Center on September 11, 2001

This is happening thanks to the greed of American airline corporations and the Transportation Security Administration (TSA).

Essentially, it comes down to this: Wealthy, self-entitled Americans hate waiting in long airport security lines.

But wealthy Americans–unlike poor and middle-class ones–have plenty of money to spend.

So they’re willing to shell out a good portion of it to the airlines and TSA so they won’t have to stand in line with the unworthy peasants.

And the airlines and TSA are happy to scoop up all that money in return for giving these self-important Richie-Riches preferential treatment.

Even if this comes at the risk of the nation they claim to love.

Consider the following:

TSA. offers Pre-Check, a program from the Department of Homeland Security. It’s available to frequent fliers on many airlines.

According to the TSA’s website, here’s how it works:

  • An applicant must be a U.S. citizen Penn or Lawful Permanent Resident (LPR) and cannot have been convicted of certain crimes.  If an applicant has a record of any of the crimes identified in the eligibility requirements, they may choose not to apply, as the application fee is nonrefundable.
  • Interested applicants must visit an application center to provide biographic information that requires name, date of birth and address. An applicant will be fingerprinted and will be required to provide valid required identity and citizenship/immigration documentation.  An applicant also has the option to pre-enroll online to provide basic information and make an appointment before visiting an application center.   There is a nonrefundable application processing fee of $85.
  • After  completing enrollment, successful applicants will receive a Known Traveler Number (KTN) via U.S. mail approximately 2-3 weeks following the visit to the application center.  An applicant also may check status online by visiting Universal Enrollment Services (UES) and clicking on “Service Status.” The Known Traveler’s Number is valid for five years.
  • Once approved as eligible for TSA Pre✓™, the enrollee must enter the provided KTN in the “Known Traveler Number” field when booking travel reservations on any participating airlines. The KTN can also be added when booking reservations online via a participating airline website, via phone call to the airline reservation center, or with the travel management company making reservations.  Additionally, the KTN can be entered in participating airline frequent flyer profiles, where it will be storedfor future reservations.

Click here: TSA Pre?™ Application Program | Transportation Security Administration

The website further notes: “TSA is accepting applications at more than 300 locations nationwide, including 26 airports.”

And what does a Pre-Check passenger get in return for his $85 registration fee?

  • S/he is allowed to go through a special line at security with reduced screening.
  • Shoes, jackets and belts need not be removed.
  • Many electronics (including laptops) can be left in their carry-on cases.
  • Magnetometers (metal detecting scanners) are used instead of advanced imaging technology.

Here’s the difference between a scan by a magnetometer and one using advanced imaging technology:

If you’re trying to carry a metallic firearm aboard a plane, the magnetometer will likely pick it up.  But if you’ve filled your computer with plastic explosive, the magnetometer won’t pick it up.

Related image

Advanced imaging technology

Or maybe you want to be a more successful shoe-bomber than Richard Reid, who tried to blow up an American Airlines flight in 2001.

Being allowed to skip the requirement to remove your shoes will certainly take you a long way toward reaching your goal.

Of course, TSA isn’t alone in wanting to make money from deep-pockets airline passengers.  The airlines have also been quick to get in on the act.

Most airlines make it possible for frequent-flier passengers to acquire elite status–for a price.

Passengers having any one of the following status memberships are eligible for this benefit:

Delta: Gold Medallion, Platinum Medallion and Diamond Medallion members

United: Premier Silver, Premier Gold, Premier Platinum, Premier 1K members 

American: AAdvantage Gold, AAdvantage Platinum, and AAdvantage Executive Platinum members

USAirways: Silver Preferred, Gold Preferred, Platinum Preferred, and Chairman’s Preferred members 

Southwest: A-List and A-List Preferred members

Alaska:  MVP, MVP Gold, and MVP Gold 75 members

Jetblue:   TrueBlue Mosaic members and those seated in Even More Space seats

Virgin America:  Elevate Silver and Elevate Gold members 

Click here: Travel Tuesday Top 10: Ways To Get Through Airport Security Faster in the US | The Points Guy

Yes, the greed of corporations and government agencies is partly responsible for this disgraceful–and highly dangerous–situation.

And so is the belief among the wealthy that they are the elect, and thus deserve special consideration.

But there is another factor at work here: The Calvinistic belief–shared by most Americans–that wealth is a sign of God’s favor, and thus proof that its holder is worthy of deference, if not awe.

In combination, they are steadily moving this nation closer to the day of the next 9/11 disaster.

How this will happen will be explained in Part Two of this series.

%d bloggers like this: