By Chris and Sheree Geo
In the wake of a decade of sexual molestation (even going as far as sexual assault), abuse, and violation of our Constitutional rights, the ever-expanding Transportation Safety Administration suddenly wants to know how we feel about it. The same people who consistently hire thieves, murderers, and pedophiles to work for them want to hear the views of the plebs? Did hell suddenly become an ice skating rink?
According to Becky Akers over at Lew Rockwell, this is an open invitation for people to share how they feel about the TSA with the TSA, and the article highlights specific crimes and abuses of the TSA, which is all well and good. They are bad. We get it. However, concerning the actual request for comments, the article only links once to the Federal Register, which confirms that this is indeed true ; However, the subject of the commentary has nothing to do with the abuses of the TSA personnel themselves, it concerns the use of something called “advanced imaging technology (AIT)” (I’m assuming the body scanners they were recently ordered to stop using) on “selected” passengers.
Passenger Screening Using Advanced Imaging Technology
This article has a comment period that ends in 87 days (06/24/2013)
Notice Of Proposed Rulemaking (Nprm).
The Transportation Security Administration (TSA) is proposing to revise its civil aviation security regulations to clarify that TSA may use advanced imaging technology (AIT) to screen individuals at security screening checkpoints. This proposed rule is issued to comply with a decision of the U.S. Court of Appeals for the District of Columbia Circuit, which ordered TSA to engage in notice-and-comment rulemaking on the use of AIT for screening. The Court decided that TSA should provide notice and invite comments on the use of AIT technology for primary screening.
The Hundred Flowers Campaign, also termed the Hundred Flowers Movement… was a period in 1956 in the People’s Republic of China during which the Communist Party of China (CPC) encouraged its citizens to openly express their opinions of the communist regime. Differing views and solutions to national policy were encouraged based on the famous expression by Communist Party Chairman Mao Zedong: “The policy of letting a hundred flowers bloom and a hundred schools of thought contend is designed to promote the flourishing of the arts and the progress of science”.”After this brief period of liberalization, Mao abruptly changed course. The crackdown continued through 1957 as an Anti-Rightist Campaign against those who were critical of the regime and its ideology. Those targeted were publicly criticized and condemned to prison labor camps.Mao remarked at the time that he had “enticed the snakes out of their caves.”
The first part of the phrase is often remembered in the West as “let a hundred flowers bloom”. It is used to refer to an orchestrated campaign to flush out dissidents by encouraging them to show themselves as critical of the regime, and then subsequently imprison them. (Sources: MacFarquhar, Roderick. The Hundred Flowers, 1960, pp. 3)
When reading the recent Federal Register TSA commentary request, you find that they sure are pouring the fertilizer to “make the flowers bloom”:
TSA invites interested persons to participate in this rulemaking by submitting written comments, data, or views. We also invite comments relating to the economic, environmental, energy, or federalism impacts that might result from this rulemaking action. See ADDRESSES above for information on where to submit comments.
With each comment, please identify the docket number at the beginning of your comments. TSA encourages commenters to provide their names and addresses. The most helpful comments reference a specific portion of the rulemaking, explain the reason for any recommended change, and include supporting data. You may submit comments and material electronically, in person, by mail, or fax as provided under ADDRESSES, but please submit your comments and material by only one means. If you submit comments by mail or delivery, submit them in an unbound format, no larger than 8.5 by 11 inches, suitable for copying and electronic filing.
If you would like TSA to acknowledge receipt of comments submitted by mail, include with your comments a self-addressed, stamped postcard on which the docket number appears. We will stamp the date on the postcard and mail it to you.
The system’s ability to communicate useful information in a credible manner to the public is poor. Significant rethinking of how to communicate to this audience is warranted.– (Major theme #2, Homeland Security Advisory System Task Force Report and Recommendations, Sept. 2009, p. 1)
The White House itself has stooped so low as to allow more airtime for comments related to “building a death star” than to issues that matter. Someone said recently, “Anytime anything happens now, people are looking for a conspiracy”. Well, maybe that’s because the government’s lied to us about so many OTHER things that the public feels like they can’t trust anything it says about anything anymore.
The most dangerous time comes now, though, because if the federal government and its’ mass media arm knows it’s lost all credibility, they won’t try to court the public opinion anymore, there will be no more niceties, no more sneaking around with our money, surreptitiously devaluing it…no, no, no….that’s for a country about to be imploded. They’ve crossed the Rubicon, now they aren’t going to hold back. Cyprus is the canary in the coal mine, and the public is either going to freak out and run on the banks, causing a crisis, or the bankers are going to pull a Cyprus on us, causing a crisis. But I digress…
Beware the “comment sections”, folks. The government’s not interested in how you feel about them raping you, they’re after the data. And when they’re done selling it to make money, they’ll use it for other, much more sinister purposes. That’s a promise.
Antivirus software is software made to detect, prevent, and eliminate malwares. The main goal of an anti-spyware method is to discover, analyze, and fix infections. As a result, they could be highly valuable tools with regards to computer users. Each computer is equipped with the software that creates the different virus meanings. These are the...
Malware safeguard, also known as anti-virus software, is important for safeguarding yourself out of computer viruses that are sometimes designed to steal your money. Or spyware is usually short for “malicious software” – applications or courses that can invasion your computer immediately and often trigger significant decrease of data or maybe even computer harm. The...
A mobile application, also known as a cellular app or perhaps an app, is an application designed for make use of on a smart phone, mobile tablet, or wristwatch. These applications are often used by users to reach applications and content material on the internet. It has being able to connect to an online server...
Fireball slot machine game system matches free of charge on-line, absolutely free video slot machine piece of equipment adventures modest to begin with down payment needed. Poker table pastime and also the accommodations certainly not approved by means of the very first re-opening state; nevertheless, area betting possibilities, by using best community distancing, may turned...
Here you’ll find our rankings of the top US-friendly online casinos of 2020. With mobile real money casinos , you can use your device to access the same benefits and bonuses. Online casino sites tend to support a wide range of payment methods. Our reviewers examine ease-of-navigation and software speed in determining which sites offer...