View Single Post
Old 06-29-2016, 11:47 AM   #76
The Dad Fisherman
Super Moderator
iTrader: (0)
 
The Dad Fisherman's Avatar
 
Join Date: Sep 2003
Location: Georgetown MA
Posts: 18,178
Quote:
Originally Posted by spence View Post
You're missing the point. The FBI can't access most of that without a warrant. You also make it sound like the vetting process is totally open, it's not...read up.
Sooo....Lets read up...shall we. this is the procedure from your link.

Step 1: Collects identifying documents (as was mentioned, none exist)
Collect Bio Data: Name, Address, Birthday, Place of Birth (No Documents exist to VERIFY any of this information)

Collect Biometrics: Iris Scans (Newsflash, this is to help identify them for future ID in case of an issue, There is NOTHING that exists that can link them to past actions)


Step 2: Collects Identifying Documents (Huh, did these all of a sudden magically appear)

Create an Applicant File. (Ooooohhh now we mean business, we have an actual folder that has all of your supposed unverified information on it)


Step 3: US Security Agencies screen the Candidate (so they use all the unverified data collected to see if any flags pop, but since the data could be false.....everything looks good)


Step 4: The Interviews are conducted. (This is where they promise to work and play well with others)


Step 5: Fingerprints are screened (again if there is no database to bounce these against then they are good)


....and according to your link this is the end of the Security portion of the vetting process.

do I need to go on......point is....if the initial information is false, the entire process they follow is built upon false data.

But the graphic they used is a might purty....so I can see where you might be lulled into a false sense of security.

Last edited by The Dad Fisherman; 06-29-2016 at 11:54 AM..

"If you're arguing with an idiot, make sure he isn't doing the same thing."
The Dad Fisherman is offline