SSCC #256 – TSA

It appears some TSA agent has figured out how to commit the perfect theft while being a TSA agent.

“TSA blames Air Canada, and Air Canada blames TSA, and nobody wants to take responsibility,” Jan Dewar said.

See, they stole property for an airline headed out of the country.  That way they could blame it on services outside their control.  What was so valuable to steal though?

They soon noticed that a number of items were missing: $240 in brand new
clothing and shoes, as well as two packages of unopened cigarettes.

It’s the missing cigarettes that clinched it for me though.  With the missing cakes and all, they obviously forgot their smokes and needed some for their smoke break.

State Sponsored Criminal Count 256: John Doe

Because the TSA is nothing but a kleptomaniacs wet dream of an organization.

Barron is the owner, editor, and principal author at The Minuteman, a competitive shooter, and staff member for Boomershoot. Even in his free time he’s merging his love and knowledge of computers and technology with his love of firearms. He has a BS in electrical engineering from Washington State University. Immediately after college he went into work on embedded software and hardware for use in critical infrastructure. This included cryptographic communications equipment as well as command and control devices that were using that communications equipment. Since then he’s worked on just about everything ranging from toys, phones, other critical infrastructure, and even desktop applications. Doing everything from hardware system design, to software architecture, to actually writing software that makes your athletic band do its thing.

About Barron

Barron is the owner, editor, and principal author at The Minuteman, a competitive shooter, and staff member for Boomershoot. Even in his free time he’s merging his love and knowledge of computers and technology with his love of firearms. He has a BS in electrical engineering from Washington State University. Immediately after college he went into work on embedded software and hardware for use in critical infrastructure. This included cryptographic communications equipment as well as command and control devices that were using that communications equipment. Since then he’s worked on just about everything ranging from toys, phones, other critical infrastructure, and even desktop applications. Doing everything from hardware system design, to software architecture, to actually writing software that makes your athletic band do its thing.
Tagged , , , , , , , , , . Bookmark the permalink.

Comments are closed.