bureaucracybusters

Posts Tagged ‘SECURITY’

THE NEXT 9/11: HOW IT WILL HAPPEN: PART TWO (END)

In Bureaucracy, Business, History, Politics, Social commentary on September 16, 2014 at 12:09 am

All security systems–including those considered the best–are manned by humans.  And humans are and will always be imperfect creatures.

So there will inevitably be times when security agents will miss the assassin or terrorist intent on mayhem.  For example:

  • In September, 1975, two women–Lynette “Squeaky” Fromme and Sara Jane Moore–tried to assassinate President Gerald Ford.
  • Fromme was tackled by a Secret Service agent.  Moore’s aim was deflected by Oliver Sipple, a Marine and Vietnam veteran, thus saving Ford’s life.

Gerald Ford being hustled from danger by Secret Service agents

Until these incidents, the Secret Service profile of a potential assassin didn’t include a woman.

  • On March 30, 1981, John W. Hinckley, a psychotic obsessed with actress Jodie Foster, gained access to a line of reporters waiting to throw questions at President Ronald Reagan.
  • As Reagan got into the Presidential limousine, Hinckley opened fire. Wounded, Reagan escaped death by inches.

 

The Reagan assassination attempt

The Secret Service had failed to prevent the attack because no one–until that moment–had attacked a President from the section reserved for newsmen.

  • On September 11, 2001, Islamic terrorists armed with boxcutters highjacked four American jetliners and turned them into fuel-bombs.
  • Two of the airliners struck the North and South towers of the World Trade Center, destroying both structures.
  • A third hit the Pentagon.
  • The fourth–United Airlines Flight 93–crashed when it was diverted from its intended target (the White House or Congress) by passengers who resolved to fight back.
  • Three thousand Americans died that day–in New York City, Washington, D.C. and Shanksville, Pennsylvania.

Until this day of catastrophes, no highjacker had turned a jumbo-jet into a fuel-bomb. Passengers had been advised to cooperate with highjackers, not resist them. 

As terrorists say, referring to anti-terrorism security services: “You have to be lucky all the time. We have to be lucky only once.”

So how will the next 9/11 happen?

In all likelihood, like this:

A terrorist–or, more likely, several terrorists–will sign up for one or more of these “VIP screening” programs.

They will be completely clean–no arrests, no convictions.  They may well be respectable citizens in their communities.

They will probably have amassed enough “frequent flier miles” to ingratiate themselves with the airlines and convince the Transportation Security Administration (TSA) of their integrity.

They will breeze through their selected airports

  • Without removing shoes and belts;
  • Without undergoing pat-downs;
  • Without being required to remove laptops and other electronic devices from their carry-ons;
  • Without exposing their electronic devices to x-ray technology.

Then they will board planes–either as part of an individual terrorist effort or a coordinated one, a la 9/11.

And then it will be too late.

Memorial to the passengers and crew of United Flight 93

The TSA/airlines’ VIP programs are based on the assumption that someone who has completed a security check in the past need not be checked in the future.

This assumption has proven false for American Intelligence agencies such as the FBI and CIA.

  • Robert Hanssen, a former FBI agent, spied for Soviet and Russian intelligence services for 22 years (1979 – 2001).  He’s now serving a life prison term in Florence, Colorado.
  • Aldrich Ames, a former CIA agent, betrayed American secrets to Soviet and Russian espionage agencies from 1985 to 1994.  He is likewise serving a life sentence.

Even requiring an agent to undergo repeated security checks is no guarantee of trustworthiness.

When asked about how he repeatedly passed CIA polygraph tests, Ames said, “There’s no special magic. Confidence is what does it. Confidence and a friendly relationship with the examiner. Rapport, where you smile and you make him think that you like him.”

Now think about that–and then consider this:

The TSA introduced its Pre-Check program during the fall of 2011.  By May, 2012, more than 820,000 travelers had received expedited security since the start of the program.

In early September, 2013, TSA announced that it would more than double its expedited screening program, PreCheck, from 40 to 100 airports by the end of the year.

Nor is TSA the only organization giving big-spending fliers special treatment at potential risk to their country.   For example:

  • Delta Air Lines offers Sky Priority, described as providing “privileged access through security checkpoints” at select airports.
  • Another private security program, Clear, collects several pieces of biometric data on well-heeled passengers as a screening measure at the airport.  Once verified by a kiosk local to the security checkpoint, the passengers are allowed to skirt the security barriers that poor and middle-class folks must pass through.
  • Then there is Priority Access, set up by TSA and the airlines.  This provides expedited service to first-class and business passengers.   To qualify, you need only possess certain credit cards–such as the United Mileage Plus Club Card.

Some critics blast this two-tier passenger check-in system as an affront to democratic principles.

“It’s stratifying consumers by class and wealth, because the people who travel a lot usually have higher incomes,” says Ralph Nader, consumer advocate and frequent business traveler.

But there is an even more important reason to disband these programs and require everyone–rich and middle-class alike–to undergo the same level of security screening:

The three thousand men and women who died horifically on September 11, 2001, at the hands of airline passengers whom authorities thought could be trusted to board a plane.

THE NEXT 9/11: HOW IT WILL HAPPEN: PART ONE (OF TWO)

In Bureaucracy, Business, History, Politics, Social commentary on September 15, 2014 at 2:18 am

Thirteen years after 9/11, America is now selling its Islamic enemies access to the very weapons–jet-fueled airplanes–they need to wage jihad against us.

World Trade Center on September 11, 2001

This is happening thanks to the greed of American airline corporations and the Transportation Security Administration (TSA).

Essentially, it comes down to this:  Wealthy Americans hate waiting in long airport security lines.

But wealthy Americans–unlike poor and middle-class Americans–have lots of money to spend.

So they’re willing to shell out a good portion of it to the airlines and TSA so they won’t have to stand in line with the unworthy peasants.

And the airlines and TSA are happy to scoop up that money in return for giving these self-important Richie-Riches preferred treatment.

Even if this comes at the security of the nation they claim to love.

Consider the following:

TSA offers Pre-Check, a program from the Department of Homeland Security.  It’s for frequent fliers of many airlines.

According to the TSA’s website, here’s how it works:

  • An applicant must be a U.S. citizen or Lawful Permanent Resident (LPR) and cannot have been convicted of certain crimes. If an applicant has a record of any of the crimes identified in the eligibility requirements, they may choose not to apply, as the application fee is nonrefundable.
  • Interested applicants must visit an application center to provide biographic information that includes name, date of birth and address. An applicant will be fingerprinted and will be required to provide valid required identity and citizenship/immigration documentation. An applicant also has the option to pre-enroll online to provide basic information and make an appointment before visiting an application center. There is a nonrefundable application processing fee of $85.
  • After completing enrollment, successful applicants will receive a Known Traveler Number (KTN) via U.S. mail approximately 2-3 weeks following the visit to the application center. An applicant also may check status online by visiting https://universalenroll.dhs.gov/ and clicking on “Service Status.” The Known Traveler Number is valid for five years.
  • Once approved as eligible for TSA Pre✓™, the enrollee must enter the provided KTN in the ‘Known Traveler Number’ field when booking travel reservations on any of the ten participating airlines.  The KTN also can be added when booking reservations online via a participating airline website, via phone call to the airline reservation center, or with the travel management company making reservations.  Additionally, the KTN can be entered in participating airline frequent flyer profiles, where it will be stored for future reservations.

Click here: TSA Pre?™ Application Program | Transportation Security Administration

The website further notes: “TSA is accepting applications at more than 300 locations nationwide, including 26 airports.”

And what does a Pre-Check passenger get in return for his $85 registration fee?

  • S/he is allowed to go through a special line at security with reduced screening.
  • Shoes, jackets and belts need not be removed.
  • Many electronics (including laptops) can be left in their carry-on.
  • Magnetometers (metal detecting scanners) are used instead of advanced imaging technology.

Here’s the difference between a scan by a magnetometer and one using advanced imaging technology:

If you’re trying to carry a metallic firearm aboard a plane, the magnetometer will likely pick it up.  But if you’ve filled your computer with plastic explosive, the magnetometer won’t pick it up.

Or maybe you want to prove a more successful shoe-bomber than Richard Reid, who tried to blow up an American Airlines flight in 2001.

Being allowed to skip the requirement to remove your shoes will certainly take you a long way toward reaching your goal.

Of course, TSA isn’t alone in wanting to make money from deep-pockets passengers.  The airlines have also been quick to get in on the act.

Most airlines make it possible for frequent-flier passengers to acquire elite status–for a price.

Passengers having any one of the following elite status memberships are eligible for this benefit:

Delta: Gold Medallion, Platinum Medallion and Diamond Medallion members
United: Premier Silver, Premier Gold, Premier Platinum, Premier 1K members
American: AAdvantage Gold, AAdvantage Platinum, and AAdvantage Executive Platinum members
USAirways: Silver Preferred, Gold Preferred, Platinum Preferred, and Chairman’s Preferred members
Southwest: A-List and A-List Preferred members
Alaska: MVP, MVP Gold, and MVP Gold 75 members
Jetblue: TrueBlue Mosaic members and those seated in Even More Space seats
Virigin America: Elevate Silver and Elevate Gold members

Click here: Travel Tuesday Top 10: Ways To Get Through Airport Security Faster in the US | The Points Guy

Yes, the greed of corporations and government agencies is partly responsible for this disgraceful–and highly dangerous–situation.

And so is the belief among the wealthy that they are the elect, and thus deserve special consideration.

But there is another factor at work here: The Calvinistic belief–shared by most Americans–that wealth is a sign of God’s favor, and thus proof that its holder is worthy of deference, if not awe.

In combination, they are steadily moving this nation closer to the day of the next 9/11 disaster.

STRIPPING DOWN FOR THE FBI

In Bureaucracy, Law Enforcement on September 27, 2013 at 12:00 am

The Federal Bureau of Investigation has always encouraged Americans to report anything they consider a threat to national security or a violation of Federal law.

But recently the FBI has adopted a practice that is almost certain to sharply decrease the number of people willing to report knowledge of a crime.

Earlier this year, a friend of mine named Jim visited the San Francisco field office of the FBI.  He wanted to report a violation of Federal computer fraud and harassment laws.

This meant visiting the San Francisco Federal Building (technically named the Phillip Burton Federal Building, in honor of the late San Francisco Congressman).

At 450 Golden Gate Avenue, located close to the Civic Center and City Hall, it serves as a courthouse of the United States District Court for the Northern District of California.

It also lhouses offices for such Federal law enforcement agencies as the FBI, Bureau of Alcohol, Tobacco and Firearms, Drug Enforcement Administration and U.S. Marshal’s Service.

To enter, you must first show a driver’s license or State ID card.  Then you must remove

  • Your belt
  • Your shoes
  • Your watch
  • Your wallet
  • All other objects from your pants pockets
  • Any jacket you’re wearing
  • Any cell phone you’re carrying

All of these must be placed in one or more large plastic containers, which are run through an x-ray scanner.

Then, assuming you avoid setting off any alarm system, you’re set for your next big screen test.

This comes when you enter the 13th floor office of the FBI.

According to Jim: You walk into a large room filled with several comfortable chairs that sit close to the floor.  Ahead is a window such as you find in a bank–made of thick, presumably bulletproof glass.

A secretary on the opposite side greets you, and asks why you’ve come.

You say that you want to speak with an agent about what you believe is a violation of Federal law.

If you’ve done your homework, you should know at least the general legal area this violation falls under.  And you’re even better-off if you know what division of the FBI is assigned to handle it.

For example: Jim knew the acts he wanted to report were a violation of Federal anti-computer hacking and harassment laws.  He also knew that these violations are handled by the FBI’s Cybercrime Division.

So he asked to speak with an agent from that division.

The secretary said she would see what she could do.  But before he could speak with an agent, he would have to show her his driver’s license or State ID card.

The secretary made a xerox of this, and then handed the card back.

Then, as if that wasn’t enough, he had to fill out a single-page form, where he was required to provide his:

  • Name
  • Address
  • Phone number
  • Social Security Number
  • The reason he wanted to speak to an agent

Of course, he could refuse to fill out the form.  But then the secretary would refuse to let him meet with an FBI agent to gain help in resolving his problem.

In Jim’s case, his request to speak with an agent specializing in Cybercrime was denied.   He would up speaking instead with the “duty agent”–whichever luckless person has been assigned to deal with the public that day.

Unofficially, the “duty agent” is the one who takes the “nut calls” from, among others, the mentally disabled who claim they’re picking up KGB transmissions in the fillings of their teeth.

In Jim’s case, the “duty agent” he drew specialized in Gang Violence.  While this is definitely a worthy subject for investigation, it had nothing to do with the matter Jim wanted to talk about.

The agent candidly said he knew nothing about cybercrime.  Which meant he couldn’t give Jim even the barest information about what he might expect to happen after submitting his report.

Fortunately, Jim had thought ahead enough to write up a detailed, three-page report of the cyber attacks he had recently experienced.  He now gave this to the agent.

The agent promised to forward it to the Cybercrime Division.

Jim asked when he might hear from someone there.  The agent said this was highly unlikely.

Jim was surprised.  The agent was in turn surprised that Jim would expect anyone to get back to him.

“I would think,” said Jim, “they would want to ask me a few questions.  And give me some idea as to what was going on in my case.”

The agent said that if the FBI wanted more information, they would contact him.  And, no, they wouldn’t give him any hints about what–if anything–was happening in his case.

That was assuming they chose to investigate it.

No one at the FBI ever contacted Jim.

So if you want to report a crime to the FBI, be prepared to give up a lot of your own privacy beforehand.

And don’t expect to receive even the courtesy of a call-back in exchange for all of it.