SSCC #47–TSA

Minnetta Walker, who was arrested in March after an 11-month investigation, admitted that she helped an alleged member of the drug ring use a fake name for traveling and helped him bypass security scanners at the airport.

The 43-year-old Buffalo woman also admitted that she once warned two of the man’s alleged drug associates that federal agents were tailing them in the airport.

Isn’t it wonderful to see such an entrepreneurial federal agent.  The discovered that her position allowed her to receive kickbacks to ignore things going on.  Even more than that, she then figured out how she could get people to pay protection money with her position.

State Sponsored Criminal Count: 47

Because the TSA is just like the ATF, they need to allow criminals to break the law to help create new ones.

Barron is the owner, editor, and principal author at The Minuteman, a competitive shooter, and staff member for Boomershoot. Even in his free time he’s merging his love and knowledge of computers and technology with his love of firearms.

He has a BS in electrical engineering from Washington State University. Immediately after college he went into work on embedded software and hardware for use in critical infrastructure. This included cryptographic communications equipment as well as command and control devices that were using that communications equipment. Since then he’s worked on just about everything ranging from toys, phones, other critical infrastructure, and even desktop applications. Doing everything from hardware system design, to software architecture, to actually writing software that makes your athletic band do its thing.

About Barron

Barron is the owner, editor, and principal author at The Minuteman, a competitive shooter, and staff member for Boomershoot. Even in his free time he’s merging his love and knowledge of computers and technology with his love of firearms. He has a BS in electrical engineering from Washington State University. Immediately after college he went into work on embedded software and hardware for use in critical infrastructure. This included cryptographic communications equipment as well as command and control devices that were using that communications equipment. Since then he’s worked on just about everything ranging from toys, phones, other critical infrastructure, and even desktop applications. Doing everything from hardware system design, to software architecture, to actually writing software that makes your athletic band do its thing.
Tagged , , , , , , , , , . Bookmark the permalink.

Comments are closed.