Striper Talk Striped Bass Fishing, Surfcasting, Boating

     

Left Nav S-B Home FAQ Members List S-B on Facebook Arcade WEAX Tides Buoys Calendar Search Today's Posts Mark Forums Read Right Nav

Left Container Right Container
 

Go Back   Striper Talk Striped Bass Fishing, Surfcasting, Boating » Striper Chat - Discuss stuff other than fishing ~ The Scuppers and Political talk » Political Threads

Political Threads This section is for Political Threads - Enter at your own risk. If you say you don't want to see what someone posts - don't read it :hihi:

 
 
Thread Tools Rate Thread Display Modes
Prev Previous Post   Next Post Next
Old 06-29-2016, 11:57 AM   #11
Jim in CT
Registered User
 
Join Date: Jul 2008
Posts: 20,441
Quote:
Originally Posted by The Dad Fisherman View Post
Sooo....Lets read up...shall we. this is the procedure from your link.

Step 1: Collects identifying documents (as was mentioned, none exist)
Collect Bio Data: Name, Address, Birthday, Place of Birth (No Documents exist to VERIFY any of this information)

Collect Biometrics: Iris Scans (Newsflash, this is to help identify them for future ID in case of an issue, There is NOTHING that exists that can link them to past actions)


Step 2: Collects Identifying Documents (Huh, did these all of a sudden magically appear)

Create an Applicant File. (Ooooohhh now we mean business, we have an actual folder that has all of your supposed unverified information on it)


Step 3: US Security Agencies screen the Candidate (so they use all the unverified data collected to see if any flags pop, but since the data could be false.....everything looks good)


Step 4: The Interviews are conducted. (This is where they promise to work and play well with others)


Step 5: Fingerprints are screened (again if there is no database to bounce these against then they are good)


....and according to your link this is the end of the Security portion of the vetting process.

do I need to go on......point is....if the initial information is false, the entire process they follow is built upon false data.

But the graphic they used is a might purty....so I can see where you might be lulled into a false sense of security.
Well I don't know about you, but that puts my mind at ease...

As you pointed out, all this presumes that (1) records exist on these people, and that (2) there is a mechanism for verifying said records.

Oh yes, that interview, that must really cut down on terror. Because as we all know, a terrorist would never fail to announce his intentions ahead of time.
Jim in CT is offline  
 

Bookmarks

Thread Tools
Display Modes Rate This Thread
Rate This Thread:

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT -5. The time now is 06:28 PM.


Powered by vBulletin. Copyright ©2000 - 2008, Jelsoft Enterprises Ltd.
Please use all necessary and proper safety precautions. STAY SAFE Striper Talk Forums
Copyright 1998-20012 Striped-Bass.com