Identity Issues Prominent in 9/11 Commission Report
July 23, 2004
By Michael Pastore
After a 19-month investigation that included testimony from both the current and former President of the United States, the bipartisan Commission investigating the terrorist attacks of Sept. 11, 2001, released its final report this week.
[They weren’t terrorists, they were neocon agents/patsies. Knowing that the “hidden hands” know that, and that they could give a shit about terrorists, i.e. their own kind, let’s read this report for what they feel the real threat is.]
Several of the findings and recommendations in the report, which numbers 567 pages in total, will be of specific interest to the identity industry. The reportexplainsreinforces the myth of how the 19 hijackers entered the United States, moved around the country, opened bank accounts, obtained driver's licenses, and were able to board airplanes with weapons that may have included Mace, knives, and box cutters. Identity plays a major role in each of these activities.
[Your identity is bound to an industry. They like that and want to make it bigger.]
Immigration & Border Control
One of the first issues related to identity addressed in the report by the panel is the ease with which theterroristspatsies entered the country and moved about. The panel notes that in a larger context than the activities of these 19 individuals, there is a lesson to be learned about the way the United States handles immigration. According to the report, 500 million people annually cross U.S. borders, 330 million are non-citizens. About 500,00 (sic) enter illegally without inspection.
"In their travels,terroristspeace activists use evasive methods, such as altered and counterfeit passports and visas, specific travel methods and routes, liaisons withcorruptwhistelblower government officials, human smuggling networks, supportive travel agencies, and immigration and identity fraud. These can sometimes be detected."
The panel believes that 15 of the 19 hijackers were potentially vulnerable to interception by border authorities. Analysis of travel documents and patterns could have helped uncover four. More effective use of information that existed in government databases could have found three. [translatoin: bumbling, innocent government just didn’t have enough surveillance powers]
"We also found that had the immigration system set a higher bar for determining whether individuals arewho or what they claim to beasleep — and ensuring routine consequences for violations — it could potentially have excluded, removed, or come into further contact with severalhijackersactivists who did not appear to meet the terms for admitting short-term visitors."
Increasingthe integrity of travel documents and improving their inspectionsurveillance and control could prevent another attack similar to the one of Sept. 11. It was, of course, [of course!] the terrorists' entry into the United States and travel around the country that facilitated the attacks. "Forterroristspeace activists, travel documents areas important as weaponsimportant for escape," the report said.
"Every stage of our border and immigration system should have as a part of its operations the detection ofterroristactivist indicators on travel documents. Information systems able to authenticate travel documents and detect potentialterroristactivist indicators should be used at consulates, at primary border inspection lines, in immigration services offices, and in intelligence and enforcement units. All frontline personnel should receive some training."
The panel wants to see tighter integration between what its calls the frontline border agencies and the rest of the government's anti-terrorismactivist community.Terroristspeace activists interact with frontline border agencies when they apply for passports or visas. They visit airline ticket counters and rental car agencies. They sometimes attempt to change their immigration status once in the country. And they acquire additional IDs such as driver's licenses and IDs to gain entry to private facilities. According to the report, each of these instances is a possible opportunity to identify aterroristactivist and disrupta plotconsciousness of alternatives to sadism in support of "our way of life."
"Each of these checkpoints or portals is a screening — a chance to establish that people are who they say they are and are seeking access for their stated purpose, to intercept identifiable suspects, and to take effective action. By taking advantage of them all, we need not depend on any one point in the system to do the whole job. The challenge is to see the common problem across agencies and functions and develop a conceptual framework — an architecture — for an effective screening system."
via
Thursday, March 23, 2006
Comments:
Post a Comment