Using the TSA as an advance guard. The TSA now searches a variety of government and private databases, including things like car registrations and employment information, in order to track travelers before they ever get near an airport. Other information collected includes “tax identification number(s), past travel itineraries, property records, physical characteristics, and law enforcement or intelligence information.”
Conducting virtual strip searches with full-body scanners. Under the direction of the TSA, American travelers have been subjected to all manner of searches ranging from whole-body scanners and enhanced patdowns at airports to bag searches in train stations. In response to public outrage over what amounted to a virtual strip search, the TSA has begun replacing the scanners with equally costly yet less detailed models. The old scanners will be used by prisons for now.
Advertisement-content continues below
Carrying out soft target checkpoints. VIPR task forces, comprised of federal air marshals, surface transportation security inspectors, transportation security officers, behavior detection officers, and explosive detection canine teams have laid the groundwork for the government’s effort to secure so-called “soft” targets such as malls, stadiums, bridges, etc. Some security experts predict that checkpoints and screening stations will eventually be established at all soft targets, such as department stores, restaurants, and schools. DHS’ Operation Shield, a program that seeks to check up on security protocols around the country with unannounced visits, conducted a surprise security exercise at the Social Security Administration building in Leesburg, Fla., when they subjected people who went to pick up their checks to random ID checks by federal agents armed with semi-automatic weapons.
Directing government workers to spy on Americans. Terrorism Liaison Officers are firefighters, police officers, and even corporate employees who have received training to spy on and report back to government entities on the day-to-day activities of their fellow citizens. These individuals are authorized to report “suspicious activity” that can include such innocuous activities as taking pictures with no apparent aesthetic value, making measurements and drawings, taking notes, conversing in code, espousing radical beliefs, and buying items in bulk.
Conducting widespread spying networks using fusion centers. Data collecting agencies spread throughout the country, aided by the National Security Agency, fusions centers—of which there are at least 78 scattered around the U.S.— constantly monitor our communications, collecting and cataloging everything from our internet activity and web searches to text messages, phone calls, and emails. This data is then fed to government agencies that are now interconnected: the CIA to the FBI, and the FBI to local police. Despite a budget estimated to be somewhere between $289 million and $1.4 billion, these fusion centers have proven to be exercises in incompetence, often producing irrelevant, useless, or inappropriate intelligence, while spending millions of dollars on “flat-screen televisions, sport utility vehicles, hidden cameras, and other gadgets.”
Carrying out Constitution-free border control searches. On orders from the DHS, the government’s efforts along the border have become little more than an exercise in police state power, ranging from aggressive checkpoints to the widespread use of drone technology, often used against American citizens traveling within the country. Border patrol operations occur within 100 miles of an international crossing, putting some 200 million Americans within the bounds of aggressive border patrol searches and seizures, as well as increasingly expansive drone surveillance. With 71 checkpoints found along the southwest border of the United States alone, suspicionless search and seizures on the border are rampant. Border patrol agents also search the personal electronic devices of people crossing the border without a warrant.
The views expressed in this opinion article are solely those of their author and are not necessarily either shared or endorsed by WesternJournalism.com.