View Single Post
Old 06-29-2016, 11:57 AM   #77
Jim in CT
Registered User
 
Join Date: Jul 2008
Posts: 20,428
Quote:
Originally Posted by The Dad Fisherman View Post
Sooo....Lets read up...shall we. this is the procedure from your link.

Step 1: Collects identifying documents (as was mentioned, none exist)
Collect Bio Data: Name, Address, Birthday, Place of Birth (No Documents exist to VERIFY any of this information)

Collect Biometrics: Iris Scans (Newsflash, this is to help identify them for future ID in case of an issue, There is NOTHING that exists that can link them to past actions)


Step 2: Collects Identifying Documents (Huh, did these all of a sudden magically appear)

Create an Applicant File. (Ooooohhh now we mean business, we have an actual folder that has all of your supposed unverified information on it)


Step 3: US Security Agencies screen the Candidate (so they use all the unverified data collected to see if any flags pop, but since the data could be false.....everything looks good)


Step 4: The Interviews are conducted. (This is where they promise to work and play well with others)


Step 5: Fingerprints are screened (again if there is no database to bounce these against then they are good)


....and according to your link this is the end of the Security portion of the vetting process.

do I need to go on......point is....if the initial information is false, the entire process they follow is built upon false data.

But the graphic they used is a might purty....so I can see where you might be lulled into a false sense of security.
Well I don't know about you, but that puts my mind at ease...

As you pointed out, all this presumes that (1) records exist on these people, and that (2) there is a mechanism for verifying said records.

Oh yes, that interview, that must really cut down on terror. Because as we all know, a terrorist would never fail to announce his intentions ahead of time.
Jim in CT is offline