Search Results for: security%20theater

A Security Theater and Illegal Aliens

Further evidence that TSA is really A Security Theater.

This month a federal audit reveals that, after nearly a decade, the TSA still can’t guarantee that agents working in “secure” areas of airports don’t pose a risk. That’s because the agency doesn’t always verify the identity of job applicants or even their legal status against a government immigration database.

This means that the TSA can’t account for agency employees with access to secure areas of airports, according to a Homeland Security Inspector General report made public a few days ago.

(Emphasis Mine) These are the same people who are given a free pass to sexually assault law abiding airline passengers, allows pedophiles to screen children, and overall is nothing but a group of individuals whose sole turn on is the abuse and molestation of the American people.

While claiming to act in the necessary methods to ensure security they have let unscreened unsecured persons into their own rank and file.  If I was a terrorist I would become a TSA agent, what better way to hide than in plain sight.  Especially considering these crap shoveling idiots couldn’t catch the clap in a whore house.

The TSA has never caught one single terrorist, not only that but they failed every last red team exercise.  They have however abused the very people who were responsible for stopping terrorist attacks in progress.  A security theater is nothing more than a ploy to make the ignorant and stupid feel safe.  Those of us with brains though carry the brunt of the burden by receiving the largest amount of abuse from agents.  Look how they treat anyone who opts out.

These piss swilling cheeba monkeys are TSA agents because of one of the following three conditions:

  1. They are too stupid to get a job any place else, including McDonald’s.
  2. They get off on
    physically molesting people

    .
  3. They are wanting
    crimes of opportunity for theft

    .

There are no other options.  While one would say maybe they just need a job, the bottom line is they sold their morals down the river and now are molesting people.  They are molesting people cause obviously they’re too stupid to get a job any place else.  If they just needed a job and didn’t like molesting people they would tell their supervisor to go fuck themselves because the molestation is unlawful.

The TSA is pointless though for yet another reason, it’s the equivalent of defensive fortifications.  If you play defensively you are playing a reactionary game.  The offenses goal is to find holes or methods around your defenses.  You are doing nothing to occupy them or distract them from attacking their goal.  It’s a pointless endeavor that will always end in failure.  How many people do you know that can actually win a game of chess by only playing defensively.  At best they can stalemate, however most like they they are going to loose since they will never take a piece from their opponent.

Anyone who claims the TSA is doing a good job is a mumbling imbecile who couldn’t pour piss out of a boot while reading the directions on the heel.  Day after day, month after month, incident after incident is found that shows just how pointless the TSA is.  Seriously, why do we put up with them and those that work for them?  I’ve said it before and I’ll say it again, ostracize those who work for the TSA, make them feel uncomfortable, and make sure to tell those dough assed shit hooks exactly what they are.  The Brown Shirts of the 21st century.  If you think I’m wrong remember “Terror must be broken by Terror”.  What else would you call their behavior other than terror?

The Truth About the TSA

So many of you saw my last rant about the TSA.  Well more information keeps coming out, and it just keeps getting better and better.  I’m going all Kevin Baker on this now cause I’m going from simply annoyed and pissed, to all out furious.  I have a feeling that I’m going to end up in all out JayG Hate-Rage here soon.

Organized State Sponsored Corruption

First up, a nice hustle:

Suddenly, a small middle-aged woman wearing a TSA (Transportation Security Administration) uniform moved along that line, pushing a wheelchair while asking, in a thick non-English accent, if anyone was in need of her help.

Zoom. Off we went, the four of us, circumventing roughly an hour’s shuffle line, until we reached the screening stations. Along the way, the woman in the TSA uniform said in her broken English, “I take care of you; you take care of me.”

The TSA has nothing to do with security and everything to do with providing a sandbox where criminals, thieves, and hustlers can attack their victims while they are held at gun point by their own government.  Don’t believe me that it’s government sponsored?

I reached into my pocket, selected a $5 bill from a fold, and conspicuously handed it to her. No moderately alert TSA or NTSB uniformed personnel in the vicinity could have missed it. It was clear: I was paying off a uniformed TSA worker officer for privileged access.

Every last person there working for the government was complicit in the behavior.  I have heard some say that if they were paid better they wouldn’t risk it by stealing or committing crimes.  I call bull shit and here’s why.

  • Anything they steal is extra income under the table.  Tax free, no snooping about, free to do with it what they wish.
  • They are immune even when they are caught.  Sometimes they’re fired, but that’s usually someone who I find probably should have won a Darwin award as a small child.  Instead due to all parents being so risk adverse their kid made it through childhood to steal and molest us, such wonderful parents wishing the pain of their offspring upon the world.
  • Why should they be paid more than the people actually paying their salaries?  I work my ass off, went to school, and most of those illiterate tree dwellers never even graduated high school.  Why should they be paid more just so they wont steal from me?  That argument sounds like the Barbary Pirates asking for tribute.

I could start to list all the other instances of state sponsored criminals but I have a series dedicated to that.  Here are some of the other incidents I have talked about previously that the TSA is responsible for. 

A Black Hole Consuming Money at Ever Increasing Rates

First we will look at the costs of training up workers.

It cost $1 billion just to train workers, which now number more than 62,000, and “they actually trained more workers than they have on the job,” Mica said.

Wait, they’re training more workers than they currently have jobs for?  Why in the Sam hell would they do something like that?

“As part of TSA’s ongoing efforts to ensure staffing efficiency, TSA requested a new authority to be able to continue to utilize early retirement as needed through 2013,” the agency said in a statement provided to The Hill.

”By lowering the age and service requirements, and increasing the number of employees eligible for retirement, TSA will be able to efficiently manage its resources as the agency stays ahead of evolving threats,” the statement continued.

Oh now it makes sense.  Get some people to work for you, then offer them early retirement on the taxpayer dime.  Lets not forget either about how the TSA has been allowed to unionize.  They are already robbing the private sector blind by over hiring, and then offering the excess hires early retirement.

This must be Obama’s job stimulus right? Hire people using the stimulus bill and retire the others currently working here?  Think about that, if a business ran their books and hiring practices like that they would be broke.  Oh wait, what’s the current debt clock count again?

They Create Even Further Security Problems

The TSA through their hiring practices have actually added problems to the one’s they’re supposedly attempting to solve.  For instance take the ability for unverified personnel to be able to access secure area’s in airports.  The TSA solved this problem right?  If you said yes, you’re wrong.

This month a federal audit reveals that, after nearly a decade, the TSA still can’t guarantee that agents working in “secure” areas of airports don’t pose a risk. That’s because the agency doesn’t always verify the identity of job applicants or even their legal status against a government immigration database.

This means that the TSA can’t account for agency employees with access to secure areas of airports, according to a Homeland Security Inspector General report made public a few days ago.

Wait, the TSA has provided a path to allow unsecured personnel access to secured areas!?  I thought these guys were big into security and understood the importance of validating people are who they say they are.

Couple issues like this along with lost uniforms and other identification materials.  And it further illustrates how the TSA is really just A Security Theater.  If anything they have increased the attack area for airports.

Not to mention the fact that the backups caused by their “security” actually provide an even better point of attack that taking down an airplane itself.  Instead of getting just a single plane, imagine getting a whole terminal?  That’s what happens when you create choke points where a lot of people are congregated at.  Moving forward from that though, how would you effectively defend against that?  You really can’t apart from screening before everyone gets stuck at that single choke point.  For example as you enter the airport, but honestly that isn’t entirely effective now is it? 

TSA Violating Common Health Practices Concerning Radiation

The TSA body scanners emit ionizing radiation in some instances.  What is disturbing is that the TSA will not allow employees to wear proper safety equipment that is normally required when working around radioactive material.  Not to mention the fact that the machines weren’t even certified by NIST like Napolitano claimed, but NIST doesn’t even do equipment safety checks like that.

It gets better though because many claim repeatedly how safe those machines are.  Yet there was an incident of the machines giving higher doses.  Not to mention the fact they detected a woman’s IUD.  While they may test the machine on a lower setting, it is obviously capable of a larger dose.  Remember that ionizing radiation is cumulative, the exposure meter doesn’t reset to 0 after you’ve been away for a while.  The more you fly, or are exposed to other sources through your work, the more your risk goes up.

So it is completely unsurprising I would see something like this in the news then:

After Union representatives in Boston discovered a “cancer cluster” amongst TSA workers linked with radiation from the body scanners, the TSA sought to downplay the matter and refused to issue employees with dosimeters to measure levels of exposure.

Unsurprisingly the TSA promptly began the game of cover your ass, trying to downplay the issue and suppress the significance of the situation.  They needed to continue the belief that the government could do no wrong and is as infallible as god herself.

The Parents Are Noticing 

It gets better though since the person responsible for the creation of the TSA stated the following:

“The whole program has been hijacked by bureaucrats,” said Rep. John Mica (R. -Fla.), chairman of the House Transportation Committee.

“It mushroomed into an army,” Mica said.  “It’s gone from a couple-billion-dollar enterprise to close to $9 billion.”

As for keeping the American public safe, Mica says, “They’ve failed to actually detect any threat in 10 years.”

There are many that believe that the government can solve our problems, and if it can’t immediately the solution is a bigger government.  That’s like saying your house is on fire and you’re going to put it out by setting fired to the other side.  Government just creates new issues, they don’t solve them.  Even more importantly they cannot solve a problem such as terrorism.

Previously it was mentioned how A Security Theater is doing nothing more than being reactionary and operating like a defensible position, I’m not alone in that connection since even Mica noticed.

One of the most important rules in the world is to never bite the hand that feeds you.  Well the TSA has a knack for doing exactly that.

The people who have been hired to do these jobs have the mental brain pan of a cockroach and the moral compass of a New Orleans pimp.  It appears that this was a government program that started with “noble intent” claiming necessity but in reality was nothing more than a wealth redistribution plan.  In the end that’s all government does.  It takes wealth from one group of individuals and gives it to another, whether or not that wealth was actually earned is irrelevant.  It has been the role of our political system to elect people to steal from others by the force of government.  While not everyone is this way, it has become the goal of the simple majority of the electorate.  It is wrong, it is immoral, it is despicable, and it has to stop.  How we actually stop it though I am unsure.

Operational Security (OPSEC)

Some people have an understanding of how and why it’s important.  Then there are others who just don’t give a damn.


Let me explain something to everyone.  This isn’t a joke and this is deadly serious.  There are a few fruit cakes out there that had the gall to call the men who place their lives on the line gutless.

#kindalame former Navy SEALs don’t have guts to admit they’re running a GOP, anti-Obama campaign;nyti.ms/N2nYYj

Let’s get something straight.  It doesn’t matter which party is in office, their job is to keep their mouth shut when necessary.  Accomplishments tied to national security are not to be flaunted in public in the view of everyone.

I have many friends in the engineering professions who do work specifically tied to national security.  There is nothing specific on their resumes about what they’ve done.  Most of the information listed on any accomplishment is done in a non-nondescript manner where the end use isn’t discernible.

This man however has ripped the veil off of material that should not be seen by the public.  When you make it public, that means our enemies can see it as well.  Only a moron who has no concept of the sacrifice and danger these men take on their shoulders would dare claim they were acting within partisan interests by posting this message.

If you are fine with this behavior I suggest you go enlist and head down range.  Then you might understand exactly what it is this man has done by ripping the veil off.

There are people who hate the United States and we struck back at the man responsible for September 11th, 2001.  Anonymity w as the biggest defense to protect the men responsible for striking back.  Our fearless leader, in an effort to extort political capital on the sweat of these men’s backs, removed that anonymity and exposed them to danger and attack.

We had no need to know which service, which group, or which team was responsible for taking out evil and laying a solid blow.  Without that information those men were merely a few in a sea of thousands, the pool becomes unbelievably large if you consider that depending on the release we may not have even known it was a special operations group.

My dad served his country and we know there were stories we never heard.  Not because they were painful, but because there was no reason we needed to know.  There were a few we finally heard after the Soviet Union fell, even then it was obvious that parts were left out.  When I signed my name on the line I wasn’t looking for recognition, and I knew that depending on where I went I may very well end up with stories that I carried silently until  I died.

I feel ashamed at times I never made it all the way through to my commission, metal rods in both legs when they’re turning people away left and right limited my options.  Could I have fought harder, probably, in the end though I now know what my dad meant when he said the following, “I left the Navy after 16 years because any country willing to elect Jimmy Carter as president doesn’t deserve to have me serving in their armed forces.”  As much as I wanted that commission I am pleased I didn’t have to suffer through the Obama Administration while in the service.

That thought bugs me no end, however I did not sign on that line so a politician could use my work, my service, and my commitment for their own political gain.  While I may have never “served” and that disappoints me.  I am glad that I haven’t been able to be used and manipulated in such a manner.  It wouldn’t matter which party was in office, it’s the behavior of the man and how he respects and leads those who have signed on the line to serve.  Obama’s respect and leadership of those who serve is lacking.  I had a choice, though many had no choice in the matter.

You don’t go doing work tied to national security looking for fame or fortune.  You do it because you know it needs to be done and it needs to be done well.  You don’t talk about it, you don’t advertise it, you just work on it behind the scenes.  When someone asks you what you do, you don’t provide details, you provide the mundane, they have no need to know.  Some can’t handle that, they want to be patted on the head and told good job.  They want to brag to show how awesome their job is.

Other’s just silently continue on, content in the knowledge that what they do keeps their family safe at night.  That the tools they design will be used by men doing violence on their behalf.  It’s a job that has to be done.  They know and take solace in the fact that what they are doing does matter and it makes a huge difference, no matter if anyone knows or not.

h/t Old NFO who has even more on the topic.

A Security Theater – Veteran Edition

I was sitting across from a Marine tonight and the subject of the TSA came up.  He had this to say.

Nothing confused me or pissed me off more when flying home and we switched to a commercial charter flight off of a military transport.  They went through and made all of us throw away our lighters.  We still had our M16’s and bayonets, but those lighters were mighty dangerous, especially since we could use them to take over the plane.

The saddest thing was, he was dead serious.  Flying back they made everyone toss their lighters for “security reasons”.

A Security Theater is starting to loose

I just stumbled across this and was ready to start cheering.

“Pilots should NOT submit to AIT (Advanced Imaging Technology) screening,” wrote Capt. Mike Cleary, president of the U.S. Airline Pilots Association, in a letter to members this week. USAPA represents more than 5,000 US Airways pilots.

That little blurb was enough to make me stand up and cheer. The wife and I have long ago said we would never fly commercially again. The systematic destruction of our rights and abuses to our privacy are too much. The only real reason the bastards are really getting away with it is because no one has the balls to refuse to consent. No one wants to end up in a back room and miss their flight. Well the pilots finally figured out when the TSA causes them to miss their own flight, the 100s of travelers are behind them. As the pilots start getting waved through people will start to exercise their rights as well. As it is, I think everyone involved should be nailed with USC18.242.

A Matter of Trust

I received an alert this afternoon that actually took me by surprise.

A security firm revealed today that mysql.com, the
central repository for widely-used Web database software, was hacked and
booby-trapped to serve visitors with malicious software. The disclosure
caught my eye because just a few days ago I saw evidence that
administrative access to mysql.com was being sold on the hacker
underground for just $3,000.

This wasn’t idiot malware either where people are conned into a dialog box.

Web security firm Armorize stated in its blog that mysql.com was poisoned with a script that invisibly redirects visitors to a Web site that uses the BlackHole exploit pack, an automated exploit toolkit that probes visiting browsers for a variety of known security holes.

“It exploits the visitor’s browsing platform (the browser, the
browser plugins like Adobe Flash, Adobe PDF, etc, Java, …), and upon
successful exploitation, permanently installs a piece of malware into
the visitor’s machine, without the visitor’s knowledge,” say the
researchers. “The visitor doesn’t need to click or agree to anything;
simply visiting mysql.com with a vulnerable browsing platform will
result in an infection.”

This type of exploit is still easily defensible by using the proper browsing plugins, such as no-script, ad-block, and making sure they are a default deny state.  Remember that just because you trust  a site today doesn’t make it trustworthy tomorrow.  Be cautious and be aware.  Condition yellow applies to the internet just as it does in reality.

If you can do your web browsing through a VM you might want to do exactly that.  I did do that for a long time but eventually laziness won since it didn’t actually get me much in the way of extra security.  I’ve seen how easily something can go bad without doing anything questionable.  I had malware, which was thankfully caught, that tried to install itself when I clicked to look at a screen shot of an upcoming game on a Google image search.

If you’ve been to MySQL.com recently make sure to check your machine out.  I have a feeling this attack was targeted like it did because most of the people who visit that site are likely to have elevated privileges on other systems.  While most of those visitors will be security savvy, many also would have likely been trusting due to who the host was.

This is Gonna Get Ugly

So my focus is shifting largely due to focus on my professional career, limited time, and frankly the political scene is something that has me so damn angry I need shit to take my mind off of it. For instance I’ve spent my past three weekend moving servers around for a bunch of gun bloggers I take care of hosting for.

For those who don’t know I’m a host, who’s having random sabbaticals, over at The Gunblog Variety Cast.  And well if you know me or have been lucky enough to friend me on Facebook, sorry I don’t just accept anyone, overall I have a solid bead on the tech security space.

The Problem

So incase you’ve been under a rock there have been some major events recently about computer security. First up was “WannaCry“.

WannaCry propagates using EternalBlue, an exploit of Windows’ Server Message Block (SMB) protocol. Much of the attention and comment around the event was occasioned by the fact that the U.S. National Security Agency (NSA) had discovered the vulnerability in the past, but used it to create an exploit for its own offensive work, rather than report it to Microsoft.[22][23] It was only when the existence of this vulnerability was revealed by The Shadow Brokers that Microsoft became aware of the issue,[24] and issued a “critical” security patch on 14 March 2017 to remove the underlying vulnerability on supported versions of Windows, though many organizations had not yet applied it.[25]

The thing is, there’s way more that was in the Shadow Brokers dump and the hits keep coming. CVE-2017-7494 came out May 30th, 2017. This affects “SAMBA”, which is the implementation of the Windows Server Message Block protocol for Linux. I expect a decent chunk of my readership, at least of what’s left since I haven’t written in a year, just went “What!?” It’s at this point I’m going to try to break it down Barney style, ask questions in the comments.

The Windows SMB protocol is how Windows does file sharing.  So when you type something like \mymachinename\ and you see a list of folders available, it’s making use of that protocol. This protocol is also  implemented for Linux that allows you to have a Linux server serving files for Windows machines.

So before I get too much further lets talk about these exploits.  Including a very recent CVE-2017-8543 that was patched Tuesday June 13th. All of them through various methods allowed for whats called “Unauthenticated Remote Code Execution.” The scary thing about 8543 is that it is a zero day, which means that it was found being actively exploited in the wild before the release of the patch.

Logo via Softpedia.

What does that mean, someone, anyone, could cause the end point service to execute arbitrary code sent to it. This wasn’t intentional, that is what makes this an exploit. Someone found a bug that causes the service to behave in this way.  What does that really mean though? It means anyone can send a carefully crafted message to your computer that will make it does whatever they want, including encrypting your data to deny you access.

What does this mean?

So, I hear many of you saying, “Well I have Windows not Linux so I’m good just applying the Microsoft patches right?” This is where I scare the crap out of everyone.

Embedded Linux is used almost everywhere, from cell phones, to ATMs, Network Attached Storage, to the common home wireless router. The good news is really old routers didn’t really offer this as a feature, the bad news is starting around 2013 routers started shipping with USB and eSATA ports so one could connect an external hard drive and share it across the network. It basically was a feature that allowed people to quickly deploy a NAS.

Image via Bob McKay

These embedded devices are all using the SAMBA service as they’re running embedded Linux. It’s worth noting the vulnerability exists going all the way back to March 1st of 2010. So basically any and every router with these features is affected. Going a step further every NAS (Network Attached Storage) device on the market is likewise affected.

So the devices have a software bug, which allows arbitrary code execution which can result in the following:

  • Denial of access to data. It’s encrypted and only decrypted, if they feel like it, after you pay them a ransom.
    • Do NOT pay the ransom. There is no escrow and thus no guarantee you will actually recover your data.
  • Exfiltration of data. Someone searches through your data, saves what they can make money from. Could be IP theft or blackmail.

But it’s a software bug, we just need to get the patch from the manufacturer and life is going to be good right?

The Rub

Image from PCWorld.com

Most of these devices aren’t being updated anymore. That is to say, manufacturers will most likely not be releasing an update to patch this issue if the device is more than a year old.

I’ve got a very nice WRT-1900AC.  The last firmware update was in the middle of 2015. It has features that fall under this and tools show it is vulnerable to the exploit. Let me put this another way. My 300 dollar router, yes that’s what it cost when I bought it, got updates for a year and was then out of service and now critical bugs are being found and left unfixed by the vendor.

Unlike Windows and WannaCry, manufacturers of these devices will leave users vulnerable. Worse, removing them from the network will remove one of the more beneficial features, Network Attached Storage. In the case of routers, these devices are often placed on the border between a users private network and the internet so they are exposed to malicious traffic.

Ideally the router does not present the SMB interface to the internet, however this isn’t to say malicious packets will not find their way into the interior network from the internet if other issues are found with the router. At which point the router will fall victim.

It gets worse…

While working on this post an article came out over at SearchSecurity, discussing CherryBlossom. This was a project by the CIA to attack router security issues including a lack of firmware validation.

“On the enterprise side, the big router manufacturers have offered validation of signed firmware for quite some time. The problem is that it’s not enabled by default for the most part, and it requires that a network admin actually go and do something,” Kuzma told SearchSecurity. “Both the Cisco and Juniper tools rely on MD5 hashes. MD5 is broken as a hashing algorithm, with several known and feasible techniques for generating identical hashes from wildly different binary content.”

Image from Fossbytes.

So this isn’t event just a commercial issue but even an enterprise level issue. Firmware can be updated remotely, over wireless in many cases and has no validation of the code being installed as being from the vendor. Additionally the router provides a fantastic vantage point for an attacker. He can sit in the middle and analyze all your traffic undetected.

It’s like climbing to the top of a peak overlooking a valley. You can see everything from the vantage point.  Not only see in this case, because the router can redirect and alter your traffic to do even more.

So What Do We Do?

First, maintain an offline backup of all your data. Grab a hard drive, copy your important files on to it, and update it periodically.  Do NOT leave it connected to your computer or network. Doing so will leave you vulnerable if something does get in. Plan on when, not if, someone gets in and locks up your data.

Part of this also stems from a “Jack of All Trades” view of equipment in the consumer space and improper defaults in the enterprise space. Really, who wants to buy multiple pieces of equipment and who wants to take the extra steps in configuration?

The problem is in the consumer space ongoing maintenance and support of products is nonexistent.  In the enterprise IT space there are products that are undergoing long-term use and support. Hardware that is often used is basically a mini computer and the router software and firewall is like installing an operating system.

This is where I say something I hate. Because honestly I prefer the easy route for anyone and everyone. It needs to be trivial for a user to do. The problem is this route is leading us down a horrible path because manufacturers are not maintaining their equipment for that path to work.

What’s that mean? You need to actually build a proper firewall appliance and use if for your network. I’m going to write-up a multi part series how-to with instructions. There are a bunch of hardware options, which in itself can lead to the paralysis of analysis. My goal through this is to give a guide of hardware and software to put you in a position you can easily succeed.

The thing is, that’s just bare hardware. It’s dumb, doesn’t do anything, and still needs software and a configuration to run.  So what should you use to protect your network.  Currently the desired guard dog is pFsense.  This takes some work to set up and configure, but in the end will last longer, will be better maintained, and protect your data more reliably.

Over the next couple weeks I will be writing up a how-to on deployment and  looking at creating a default deployment image for that hardware if possible. My hardware choice is slightly different, not because that hardware isn’t good, it’s because I’m doing some advanced deployment for my network.

OpenWRT/DD-WRT are both options as well but there’s a few issues. One they don’t solve the secure update problem seen in Cheery Blossom.  You will still need to disable and remove the mass storage features of the router. While one could look at this you’re also going to no longer use the router as a router but merely an access point.

Depending however on the capabilities of the router, you can do advanced things within your network which still will leverage those capabilities. Ideally though you would still update your router software to OpenWRT/DD-WRT to deal with the exploit, but there can still be a lag or lack of support for your router by either of these solutions. Not to mention the process can be unforgiving and leave you with a brick.

Conclusion:

If you know a friend who’s into IT and computers, now is a good time to buy a case of beer and invite him over to see if he can help. These issues are only going to get worse, especially since the Shadow Brokers are now charging for exploit dumps. Meaning Blackhat hackers will be buying the exploits and unless some whitehats also buy them, which is funding criminal enterprise, we will not know what exploits are in the wild until the malware hits.

Putting multiple eggs into the same basket is becoming more and more risky and we need to start diversifying and looking at using the best tools to protect critical assets. The last thing we want to do is combine the defensive position with the material we’re trying to defend.

This is going to get worse, defense is going to get harder, and the time to start building your earthworks and redoubts is now.

TSA – Defending Freedom From Terrorisim

Seriously every time I think the TSA couldn’t stoop to a new level of stupidity they prove me wrong.

First up is an incident involving an 85 year old grandmother for refusing to receive an unnecessary dose of radiation provided by the local high school drop outs.  The results:

An 85-year-old woman said Saturday that she was injured and humiliated when she was strip searched at an airport after she asked to be patted down instead of going through a body scanner, allegations that transportation security officials denied.

Of course as usual the TSA claims that this never happened and that it violates their policies and procedures.  There’s one problem though, we regularly hear about incidents like this and the TSA always claims it never happened.  They only admit they screw up when it’s caught on tape.  Just because policy says you don’t do that, doesn’t mean one of your agents demanded it because she wasn’t a compliant sheep.  The can verify before and after but not during the screening as it wasn’t recorded. Why not record it if there’s not strip search involved and it’s just a pat down?

Then as if the TSA needed to further display their stupidity and show exactly why none of them were able to graduate high school we hear about this incident.

Vanessa Gibbs, 17, claims the Transportation Security Administration stopped her at the security gate because of the design of a gun on her handbag.

Well, maybe it was a really realistic gun design and they had good cause.

pursegun

See what happens when you try and justify the idiocy of the TSA, they just show you how much of a bunch of morons they really are.  Then the TSA agents babble on as amateur lawyers to intimidate passengers.

“She was like, ‘This is a federal offense because it’s in the shape of a gun,'” Gibbs said.

So the agents delayed her long enough to ensure this girl missed her flight and for what!?  A lesson to her about how she should just be a good little sheep.  

The list of problems with the TSA is long and distinguished.  Anyone who says the TSA is necessary to prevent the next terrorist attack is lying.  The score board currently says otherwise because it’s been the people the TSA has been violating that stop the terrorist attacks.  The TSA is a security theater and needs to be done away with.  Even a congressman that called for their creation thinks they are bloated and need to go.

h/t to Disavowed with Honor