"Even if he had not been placed on that list, American authorities had one final chance to intercede. Before a plane can take off for the United States, details on every passenger are forwarded electronically to the Department of Homeland Security. There is also an electronic summary of each passenger’s airline reservation — which in Mr. Abdulmutallab’s case would most likely have included the fact that his ticket had been bought with cash and that he had not checked any bags.
The Homeland Security Department, with this information, can request that a passenger like Mr. Abdulmutallab get extra scrutiny by airport officials before the plane takes off. But no action was taken, as department officials said they had no reason to believe he presented a threat."
The above NYT paragraph is most damning to our intelligence community because if I were to ask you how you would use information about reservations from people soon to board a plane to our country, you would say that those who paid cash and checked no bags should be stopped and scrutinized. It is so obvious!
The Homeland Security Department, with this information, can request that a passenger like Mr. Abdulmutallab get extra scrutiny by airport officials before the plane takes off. But no action was taken, as department officials said they had no reason to believe he presented a threat."
The above NYT paragraph is most damning to our intelligence community because if I were to ask you how you would use information about reservations from people soon to board a plane to our country, you would say that those who paid cash and checked no bags should be stopped and scrutinized. It is so obvious!
1 comment:
This is unfortunately true. However, I have found that inter-agency information technology is completely broken.
The second step to fix these problems is a complete integration review and upgrade strategy done by non-government IT experts.
The third step is a long- term project plan for creating an IT system capable of using data mining techniques along with creating an environment where new systems are implemented at shorter time frames than presidential elections. This must be Unix-based.
The fourth step is to hire really knarely types who can throw scenarios into these systems and see if they can get these through without tripping alarms. If they are succesful they should have drugs and strippers bought for them.
However, the first step is to take Janet Napolitano and waterboard her. Then ask her if she still wants her job, get some plastic surgery, drop 40 pounds and make her watch videos of herself saying that everything worked after the event. This is like Bush saying that everything worked after 9/11. It happened. It happened on her watch. She was asleep as was her department. Pay the price.
Post a Comment
You don't need an invitation