IDs and security (No Ferrari content)
From: dale sailors (sailorsdaleedwardyahoo.com)
Date: Tue, 28 Dec 2010 21:55:40 -0800 (PST)


Hi Michael,
                  Happy holidays!
                   Many years ago in my Federal period I had a friend working at US Customs on the Mexican Border. Previously he had been a US Army enlisted person in a unit that tested facility security. He was tasked to penetrate the CIA at Langley and access a certain file. For several days he would wander into the workers groups eating lunch just outside the grounds until he observed style of dress and design of ID cards. Then with public facilities he created his own ID card and observed how he was received by the lunch crowd. After a few days he entered the CIA facility with the returning lunch crowd.
He had the file in about two weeks! Most of that time was learning the filing systems. Admitedly he was a young, cleancut, WASP looking, yuppie type of guy with a friendly personality but that shows what a motivated person could do in period. Technology makes forgery or impersonation more difficult but not impossible. The key to success I think lies in "looking right" for what you pretend to be. Later in his military career my friend penetrated missle control rooms and various other sensitive areas, always preparing by looking the part of who he pretended to be. Reverse use of profiling is a very effective strategy.
         Ciao
         Dale

  • (no other messages in thread)

Results generated by Tiger Technologies Web hosting using MHonArc.