bjoehandley
NAXJA Forum User
- Location
- WeGo, Chi-Town, Ill
Thought this was interesting
Pot Meet Kettle
Pot Meet Kettle
8Mud said:Just to throw something else into the mix, the US immigration policies are not equitable or near anything that could be called fair. The qutoas are set by processes nobody seems to understand. Some third world country may have a high quota, because of a famine, flood or repressive regime, five or even ten years ago etc.
The US keeps talking about controlling there borders, but seriously speaking, they may be looking in the wrong direction.
Many of the immigrants to European countries are political refugees from there own countries, many of them Muslim countries and many of the political refugees were persecuted for there fundamentalist views. These people now have few, if any Visa requirements, because they now hold Northern European passports. We are not talking hundreds or even thousands here, but millions. They can just wave there Passport and walk in as a tourist.
I really can't see how fencing the southern border, is going to lower the threat, to any noticeable degree.
It doesn't take a large jump of imagination to picture pissing off the Mexicans enough, to want to retaliate in some way. US policies should be thought through fairly thoroughly, before implementing them. The last thing the US needs, is somebody like Chavez on it's southern border or fueling anti US American politics in Mexico.
5-90 said:I think we can blame "Affirmative Action" (or its cousins) for immigration quotas. After all, if the system were set up to be truly equitable, quotas would not exist, would they?
Fencing the Southern border may not immediately reduce the threat to any significant degree - and it won't, unless human elements of security are also planned. Fences are dumb - and inanimate.
The core of the problem is that there is nothing actually done about the problem, and really hasn't been for thirty years or more. Throw that in with all the "amnesties" that are tossed about every dozen years or so (I think - I haven't checked,) and the prevailing attitude becomes, "Why should I worry? Even if I break the law going up there, they're just going to forgive me anyhow."
An extension of that attitude would be to issue a blanket pardon to all non-violent criminals every dozen years or so - and I see no reason why the two views are not incompatible.
Granted, any threat to the safety and security of this nation is going to come from the Middle East, not Latin America, even accounting for all the mojados that are hired as drug mules. Illicit drugs are a problem, but a separate issue to be solved in another manner.
1) Eliminate immigration quotas.
2) Strenuous background checks (at the very least!) for anyone attempting to emigrate from a known hostile nation, or even when trying to get a visa (since most of the 9/11 hijackers entered this country legally...)
3) Strict deportation of anyone caught here without a visa or a Resident Alien/"Green" Card. No exceptions.
Physical security at the border is secondary - these measures should be taken into consideration as "primary." At least, that's my thinking - and it's worth bearing in mind that I don't have all this education in these matters that the people who make the rules do. Perhaps that's why I tend to make a little more sense to everyone... I'm an engineer, not a politician - and before that, I'm a soldier and a protector.
5-90
xjkidd said:I feel you man, it's almost like a takeover.
I agree with much of what you're saying, and it seems well thought out, but I do take issue with your comparison here. Why? The Berlin Wall was designed to keep people in, not out. Sure, the Ossies called it a "Fascist Invasion Prevention Wall" or something, but it was not to keep NATO from rolling into Berlin, it was to keep it's own citizens from escaping to the West.5-90 said:Do I think a fence will work? How well did the Berlin Wall work?
STATEMENT OF LARRY F. STEWART, CHIEF DOCUMENT EXAMINER, FORENSIC SERVICES DIVISION, U.S. SECRET SERVICE
Mr. </B>STEWART. Mr. Chairman and members of the subcommittee, I am pleased to be here today and be afforded the opportunity to testify before you.
My name is Larry F. Stewart, and I am the Assistant Laboratory Director as well as the Chief Document Examiner for the Secret Service Forensic Services Division. I am here to discuss the prevalence of fraud and forgery in U.S.-issued documents and, more specifically, the current trends that we have forensically detected in the counterfeiting of these official documents through the use of computers and desktop publishing.
The United States does not have a unique identification document issued to verify someone's identity. In today's society, there is frequently a need for such verification. This is commonly found in situations such as new employment, banking transitions and issuance of a new driver's license.
Because of the needs of such verification, many documents not originally designed as secured identity documents have become routinely utilized as proof of identity. Currently, there are State and Federally issued identity documents that are used throughout America to prove identity. Due to the wide variety of formats, designs and security, it is nearly impossible to assume that a person checking this form of identification would have the proper knowledge base to determine if it is a genuine document.
Page 18 PREV PAGE TOP OF DOC
Breeder documents are used to obtain genuine identification documents in order to perpetrate fraud or establish a new identity. The most sought after identity documents are those that bear the most security and are thus the least challenged during their use. Birth certificates are widely accepted as proof of identity and are usable in obtaining a new driver's license. Generally, birth certificates contain very little security.
There are over 1,000 different authorized forms of certified birth certificates in the United States. Furthermore, counterfeiters can obtain new digitally produced identity documents or models directly through the worldwide web. Once the counterfeit birth certificate is obtained, an individual can easily apply for a genuine driver's license and a genuine Social Security card. From this, bank accounts may be opened, credit cards may be obtained.
The Secret Service began investigating the counterfeiting of U.S. Currency in 1865. As a result of this responsibility, we have been able to track the latest and greatest methods available to counterfeiters in their efforts to produce realistic versions of secured documents. Additional jurisdictions of the Secret Service allow our forensic analysis and investigative assistance in cases involving false identification documents, travelers checks, and credit cards. Through our various investigative responsibilities, we are well aware of the dramatic changes in the methodologies used to counterfeit breeder documents in the recent years.
During the 1960's, counterfeiters of security documents routinely used the offset lithographic method due to the quality and its ability to reproduce fine line detail.
Page 19 PREV PAGE TOP OF DOC In the early 1960's, Xerox developed the first electrophotographic method. This process was a precursor to current day photocopiers and was seldom used to counterfeit due to its lack of availability, one-color restriction and poor quality. In the mid-1970's, monochromatic copiers that could produce color documents were developed. Subsequently, three and four color photocopiers were developed and again were used widely to counterfeit documents. In 1985, the first bubblejet printer was introduced by Cannon. Computer printers are now widely used.
We have developed databases of standards that can be used by the forensic laboratory to narrow it down or in some cases identify the source of this printing. This process involves microscopic analysis of the counterfeit document and then the subsequent chemical examination of the ink or toner. The same scheme was used by our laboratory to successfully determine the make and model of the computer printer Ted Kaczynski, also known as the Unabomber, had used to make a return address label on an unexploded mail bomb. Through the same technology our laboratory routinely identifies the makes and models of computer printers and copiers used to make counterfeit identity and monetary documents.
We have developed a unique database that houses not only the forensic information about the counterfeit document but also all of the investigative information regarding the use, passing and seizure of the document. To maintain an unbiased approach, the two portions of the database remain separate. We have successfully linked documents that in the past would not have been connected, such as counterfeit food coupons to travelers checks to postage stamps. This database has proven invaluable to our investigative efforts.
The most common form of counterfeiting of these documents today involves the use of a computer. Currently, breeder documents are effectively counterfeited using many of the same techniques that are used to create the corresponding genuine documents. The ease of using a computer work station and scanner to manipulate documents is undeniable, and we can only assume their use will increase as technology advances.
Page 20 PREV PAGE TOP OF DOC
Until recently, the limiting factor in the final quality of the counterfeit document was generally the printing device. Typical printing devices used by the counterfeiter include ink jet, laser jet, color laser, thermal dye diffusion printers and color copiers. Today's home computers and printers can produce excellent quality, passable counterfeit breeder documents, identifications and monetary instruments. If counterfeiting of these documents is to be addressed, I suggest that more consideration needs to be made of the systems available to today's would-be counterfeiter, as well as utilization of uniformity in design and education of the public.
Optically variable devices, specialty inks, and security papers are still excellent approaches in limiting the counterfeiter's effectiveness. As an illustration, I brought samples of counterfeit documents produced by desktop publishing for your review. Each of these was produced by scanning in the original document, manipulating the image on a desktop work station and printing the product on a four-color copier. These are very typical of the counterfeit documents that are being used today.
In conclusion, I wish to thank the subcommittee for its long history of support, not just in our mission but in the support you have shown to the men and women of this agency to ensure that they have the proper tools to do their job.
Mr. Chairman, this concludes my statement. I would be pleased to answer any questions that you or other members of the subcommittee may have.
IXNAYXJ said:I agree with much of what you're saying, and it seems well thought out, but I do take issue with your comparison here. Why? The Berlin Wall was designed to keep people in, not out. Sure, the Ossies called it a "Fascist Invasion Prevention Wall" or something, but it was not to keep NATO from rolling into Berlin, it was to keep it's own citizens from escaping to the West.
Not just semantics.
-----Matt-----
FarmerMatt said:The guys standing around the home depots & such pale in comparison to the amount of illeagal aliens in this country who are working full time jobs with false docs for legitimate employers (fly by night contractors & the local hillbilly wanting some yard work done are not legit employers). The guys around home depot just haven't made enough money to buy their docs yet.
FarmerMatt said:As I stated before I'm not against slapping employers who knowingly hire illeagals, but I don't want to get caught in the cross fire. If I get a guy in wanting a job I leagally have to get his docs & iden. If the guy has those docs & looks legit, but ends up being illeagal than what should happen to me?
Matt
Zuki-Ron said:It appears Mr. Fox will be in Utah for a few days lobbying for a better deal for those Mexicans who came here illegally. He may not be able to solve his nations problems, but appearantly he can come here and ask us to take his citizens.