NUCLEAR SPACE....The Final Frontier......

Many of us see ourselves as the only unique Species in the Universe. My Writings in this BLOG are tendered for the sole purpose of educating myself, and in turn my readers, to the interesting flora and fauna of our great race... Humanity!.....

Wednesday, April 19, 2006

MOAB-The Mother of All Bombs-Wanna take a RIde?


On March 11, 2003, the United States Air Force tested one of the largest conventional bombs ever built.

It is called the MOAB Massive Ordnance Air Blast (MOAB) weapon and is shown here being prepared for testing at the Eglin Air Force Armament Center on March 11, 2003.

The Pentagon hopes the test will pave the way for use of the bomb against critical targets on the surface and underground..

The MOAB is a precision-guided munition weighing 21,700 pounds and will be dropped from a C-130 Hercules aircraft
( C-130) for the test. It will be the largest non-nuclear conventional weapon in existence.

The Air Force released video of the Tuesday's test, which showed the bomb falling through the sky and bursting into a massive fireball upon impact. A cloud of smoke then rose hundreds of feet into the sky

Video of C-130 deployment
In this video, supplied by the U.S. Department of Defense, you can see the pallet and bomb come out of the back of the plane and then separate from one another within a few seconds.

Due to the size of the ordnance, the item is extracted from either an MC-130 Talon II or “Slick” C-130 Hercules by way of a parachute.

The bomb then accelerates rapidly to its terminal velocity.

It was the final test of the new Massive Ordnance Air Blast, or MOAB, and the first to use actual explosives. Two previously undisclosed tests, one in February and one on Friday, were inert.

The video was released in hopes of placing additional pressure on the Iraqi military, officials said.

"The goal is to have the pressure be so great that IRAQ cooperates," Defense Secretary Donald Rumsfeld told reporters. "Short of that -- an unwillingness to cooperate -- the goal is to have the capabilities of the coalition so clear and so obvious that there is an enormous disincentive for the Iraqi military to fight against the coalition."

The National Earthquake Information Center said it found no seismic activity as a result of the explosion, as some in the military had indicated might occur. A 10,000-foot cloud had been expected and local residents had been warned of possible loud noise

Kathy Fite, a waitress at the International House of Pancakes in Fort Walton Beach, about 20 miles from the test site, said she heard the explosion, but it did not rattle the restaurant's windows or shake the ground.

She described the explosion as loud, but "not real loud." Fite said the blast was comparable to the sound of warships that sometimes test fire in the area.

Pentagon officials said they were examining results of the test to determine whether it worked as designed.

MOAB, privately known in military circles as "the
mother of all bombs," has been under development since late last year.

As originally conceived, the MOAB was to be used against large formations of troops and equipment or hardened above-ground bunkers. The target set has also been expanded to include deeply buried targets

But military officials say that the MOAB is mainly conceived as a weapon employed for "psychological operations." Military officials say they hope the MOAB will create such a huge blast that it will rattle Iraq troops and pressure them into surrendering or not even fighting.

Officials suggest perhaps the Iraqis might even mistake a MOAB blast for a nuclear detonation.

The MOAB is deployed on a pallet from a C-130 aircraft. It initially has a parachute, but as it deploys, the Inertial Navigation System and Global Positioning System (GPS) take over. The bomb also has wings and grid fins for guidance.

The MOAB is an Air Force Research Laboratory technology project that began in fiscal year 2002 and is to be completed this year.
DoD photo. (Released)

Massive Ordnance Air Burst. It is a bomb designed to destroy heavily reinforced targets or to shatter ground forces and armor across a large area.

In this short TRETISE, we'll examine this new high-powered bomb and see where it fits into the U.S. arsenal.

Here are the basic facts about the MOAB:

It is currently the largest conventional bomb (as opposed to a nuclear bomb) in the U.S. arsenal.

The bomb weighs 21,700 pounds (9,525 kg).

The bomb is 30 feet long and 40.5 inches in diameter.

It is satellite-guided, making it a very large "smart bomb."

It bursts about 6 feet (1.8 meters) above the ground.

The idea behind an "air burst" weapon, as opposed to a weapon that explodes on impact with the ground, is to increase its destructive range.

A bomb that penetrates the ground and then bursts tends to send all of its energy either down into the ground or straight up into the air. An air burst weapon sends a great deal of its energy out to the side.

The MOAB is not the largest bomb ever created. In the 1950s the United States manufactured the T-12, a 43,600-pound (19,800-kg) bomb that could be dropped from the B-36.

Compared to a nuclear bomb, the MOAB produces a tiny explosion. The smallest known nuclear bomb -- the
Davy Crockett fission bomb -- has a 10-ton yield.

The difference is that a nuclear bomb that small weighs less than 100 pounds (45 kg) and produces
significant amounts of lethal radiation when it detonates.

For comparison, the nuclear bomb dropped on Hiroshima had a yield of 14,500 tons of TNT and weighed only 10,000 pounds (4,500 kg) -- half the weight of the MOAB. See my
How Nuclear Bombs Work .

The Delivery

Instead of being dropped from a bomber through the bomb bay doors, the MOAB is pushed out of the back of a cargo plane such as a
C-130 The bomb rides on a pallet.

A parachute pulls the pallet and bomb out of the plane and then the pallet separates so that the bomb can fall. Once the bomb is falling, a guidance system based on
the Global Positioning System takes over and directs the bomb to its target.

The weapon is intended to have a high altitude release, allowing for greater stand-off range for the delivery vehicle.

Following deployment from the aircraft via parachute, the MOAB weapon is guided approximately 3 nautical miles through a GPS system (with inertial gyros for pitch and roll control), JDAM actuators, and is stabilized by series of fixed wings and grid fins.

The weapon, which uses the aircraft’s GPS prior to launch, takes several seconds to reconnect to the GPS signal after it has been deployed, which is normal for GPS weapons.

The Power Inside

The MOAB is built by
Dynetics
.
The 21,700-pound [9,500 kilogram] bomb contains 18,700 pounds of H6, (Trional) an explosive that is a mixture of RDX (Cyclotrimethylene trinitramine), TNT, and aluminum ( The aluminum improves the brisance of the TNT -- the speed at which the explosive develops its maximum pressure
.

The addition of aluminum makes tritonal about 18%
more powerful than TNT alone.)

H6 is used by the military for general purpose bombs. H6 is an Australian produced explosive composition. Composition H6 is a widely used main charge filling for underwater blast weapons such as mines, depth charges, torpedoes and mine disposal charges.

HBX compositions (HBX-1, HBX-3, and H6) are aluminized (powdered aluminum) explosives used primarily as a replacement for the obsolete explosive, torpex.

They are employed as bursting charges in mines, depth bombs, depth charges, and torpedoes. HBX-3 and H-6 have lower sensitivity to impact and much higher explosion test temperatures than torpex.

The MOAB weapon produces a very large explosive blast, with lesser fragmentation effects due to a thin-walled aluminum casing.

A Daisy Cutter, was developed during the Vietnam war. The Air Force could drop a Daisy Cutter to create an instant helicopter landing site.

The explosive force would clear out trees in a 500-foot-diameter (152-meter) circle.

It contains
12,600 pounds (5,700 kg) of ammonium nitrate, aluminum and polystyrene, a combination known as GSX (gelled slurry explosives). GSX is commonly used in mining and is a commercial high explosive that is inexpensive and easy to produce. TNT is a military high explosive.

Many in the military are wondering why the new MOAB bomb has not been used in Iraq. The rumor is that the only one available was the one used in the live test.

But there aren't many targets for the MOAB. Some call it the "humane bomb," as nearly all bombs of this type (the earlier BLU-82 "Daisy Cutter") have been used to clear helicopter landing zones or minefields.

In Iraq it would be more useful for it's psychological effect. A MOAB going off in a dusty landscape tends to create a visual effect similar to that of an atomic bomb. There's something about a mushroom cloud billowing up in the suburbs of Baghdad that sends a certain kind of message.

The MIRVman

Wednesday, April 05, 2006

Identity Theft in the Nuclear age, the 21st Century technology is amazing !


You work hard every day to make a living and support yourself and/or your family. If you've read about your credit report and credit score, and want a refresher course, read on…. , then you know how to keep your credit clean so you can enjoy the benefits of all of that hard work.

What happens, though, when you find out that someone has used your name to get a
credit card and has run up thousands of dollars in charges that you are now going to have to convince the credit card company that you are not responsible for?

What if they opened
bank accounts in your name, committed crimes using your name, or worse?!

Innocent people are being arrested because someone is committing crimes using their names.

Can you prevent this from happening? Can you protect yourself from these white collar criminals? What is law enforcement doing about it?

In this treatise, we'll look into the dark world of identity theft to which we can all fall victim. We'll find out how others can get access to your personal identification information, how you can protect yourself, and what to do if you become a victim.

Identity Theft in the News
Rocky Mount Teen Charged With Identity Theft - 1/7/05
Maine man faces felony charges in identity theft - 1/6/05
Elkridge man charged in scamming of NFL players - 1/6/05
Instant credit means instant identity theft - 1/5/05
Man sent to prison for identity theft - 1/5/05

Types of Identity Theft

Identity theft can enter into many areas of our lives. It involves any instance where a person uses someone else's identification documents or other identifiers in order to impersonate that person for whatever reason.

According to a ( This takes 20 seconds to download, worth the wait !)
September 2003 survey conducted by the Federal Trade Commission, an estimated 10 million people in the United States found out they were victims of identity theft in the previous year.

More appropriately titled identity fraud, your identity might be stolen in order for someone to commit:

Financial fraud - This type of identity theft includes bank fraud, credit card fraud, computer and telecommunications fraud, social program fraud, tax refund fraud, mail fraud, and several more.

In fact, a total of 25 types of financial identity fraud are investigated by the
United States Secret Service.

While financial identity theft is the most prevalent (of the approximate 10,000 financial crime arrests that Secret Service agents made in 1997, 94 percent involved identity theft), it certainly isn't the only type.

Other types of identity theft, however, usually involve a financial element as well -- typically to fund some sort of criminal enterprise.

Criminal activities - This type of identity fraud involves taking on someone else's identity in order to commit a crime, enter a country, get special permits, hide one's own identity, or commit acts of terrorism. These criminal activities can include:

Computer and cyber crimes
Organized crime
Drug trafficking
Alien smuggling
Money laundering
Stealing Your Identity


Have you ever eaten at a restaurant, paid with a
credit card, and forgotten to get your copy of the credit card receipt?

Did you know that many of these receipts have your credit card number printed right there for anyone to see (and use)?

And, if you've signed them, your signature is also right there for someone to carefully copy.

This can lead to the most simple form of identity theft.

With this bit of information, some unscrupulous person can be well on his way to making purchases either by
phone or on the Internet using your credit card number. You won't know about it until you get your statement (a good reason why you should always study the charges on your credit card statements!).

All they have to have, in most cases, is your mailing address, which can be looked up in a phone book or easily found on the Internet.

Credit card fraud is identity theft in its most simple and common form. It can be accomplished either through a scenario like the one I just mentioned, or it can happen when your pre-approved credit card offers fall into the wrong hands.

All a person has to do is get these out of your mailbox (or trash can) and mail them in with a change of address request and start spending.

Someone can even apply for a credit card in your name if they have the right information. You won't know a thing about it until the credit card company tracks you down and demands payment for the purchases "you" have a racked up.

With a person's name,
social security number and date of birth, someone can get loans, access the person's existing bank accounts, open new bank accounts, lease or buy cars, get insurance, you name it.

Think about the things you throw in the trash. Do you throw your pay stubs away once you've recorded the amount in your checkbook?

Take a look at some of the information on that seemingly unimportant piece of paper:

Your full name
Your address
Your social security number
Your complete bank account number (if you have direct deposit)
Your employer and its address
Your rate of pay

Now, think about the types of information you have to provide in order to get a credit card or a loan or lease a car.?

There is very little additional information that is needed in order to get that loan. I recently got a home equity loan and did all but the final signing of the documents over the phone, and
faxed all of my financial information directly to the loan officer.

It would not have been that difficult to "create" those documents using someone else's social security number, bank account numbers and other personal information. That's a scary thought!

Imagine finding out that someone had gotten a mortgage in your name. Clearing that up with the bank and getting it off of your credit history would be quite a battle.

You are left with the time-consuming task of repairing your credit and getting your finances back on track.

Accessing Your Personal Information

Your personal information can be found in many places. It can be:
Dug out of trash cans and dumpsters, known as "dumpster diving"

Memorized or copied by sales clerks and waiters

Removed from your mailbox in the form of
tax notices, financial account statements and other bills before you have a chance to get them or even know they are there

Removed from your employer's files, either secretly or with the help of an inside accomplice

Removed from your hospital records, usually with the help of an inside accomplice

Removed from your financial lender's files

Removed from your landlord's files

Purchased (or found free) in online (or offline) databases.

Collected from "cloned" Web sites (Someone may recreate a legitimate merchant Web site in order capture your personal information and credit card information when you place an order.)

Stolen from a merchant database through computer hacking (This is not as simple as other forms of theft.)

Stolen through hacking into commercial Web sites or your ( This site has an interesting History )
personal computer and using software to mirror keystrokes to capture credit card account information

Collected from "cloned" chat rooms that include links to outside Web sites that offer services or products (None of these are real merchants; your information is simply gathered so the criminals can make purchases elsewhere.)

Basically, anywhere you've provided that information can be a target.

Often, employees who have access to the information are bribed or offered a cut of the profits in exchange for personal information about other employees.

The more sophisticated the perpetrator, the more money is stolen and the more people scammed. Clerks can even put skimmers on the credit card machines that will record credit card information for later use.

Temporary employees seem to be more frequently involved in identity theft scandals than permanent employees, simply because fewer background checks are done on them.

Public information

What about all of the publicly available information someone can access about you? Sources for this information include:

Public records - These records that are open for public inspection include driver's license information, real estate records, business records, vehicle information, certain types of professional certifications and licensing information, and any other types of data collected by public entities.

Information that is publicly available - This means non-government information that is found in
newspapers, such as classified advertisements and reports, as well as phone book entries.

Open-source information - This refers to information about you that may be found in periodicals and on Web sites.

While some information about your life is pretty well protected, such as medical, financial and academic records, your other identifying information (social security number, home address, etc) is not so protected.

One scary statistic: According to the
Federal Trade Commission (FTC), in 2000, 19 percent (as opposed to 13 percent in 2001) of all victims of identity theft who completed that section of the FTC complaint form had a personal relationship with the thief; 10 percent of those thieves were family members.

How To Protect Yourself .

Protecting yourself from identity theft takes proactive effort. You can't simply assume it's not going to happen to you and go on about your life -- it can happen to anyone.

It even happens to celebrities. Oprah Winfrey, Tiger Woods, Robert De Niro and Martha Stewart have all had their identities stolen.

While you can't ever totally protect yourself from these thieves, you can at least make yourself less attractive as a victim by doing what you can to make it more difficult for them to access your information
.
Here are some things you can do to protect yourself:

DON'T give out your Social Security number unless it is absolutely necessary. Many companies collect more information than they really need. Make sure that it's something they have to have and make sure they'll protect your privacy.

DESTROY any unwanted credit card offers. This means rip, shred, burn, whatever you can do. These pre-approved offers come almost daily. If you don't want the three major credit bureaus to sell your name to these companies, you can "opt out" by either writing to the three major credit bureaus or by calling (888) 5OPTOUT (567-8688).

This will remove your name, for two years, from mailing and telemarketing lists that come from TransUnion, Equifax, Experian, and INNOVIS.

You can also write to the Direct Marketing
Association's mail preference service to have your name removed from some mailing lists.

DON'T put any other information besides your name and address on your checks, and keep a close watch on your checkbook both when you're writing checks and when it is lying around.

Someone can memorize your name, address and phone number during the short time it takes you to write a check.

SHRED (cross-cut) any sensitive documents before you throw them into the trash. This may seem like an extreme measure, but dumpster diving happens all the time and turns up a lot more personal information than you may realize.


DON'T carry your Social Security card,
passport, or birth certificate in your wallet or purse. Also, only carry as many credit cards as are absolutely necessary.

It has also been suggested that you
photocopy everything you carry in your wallet to make canceling things easier in the event that your wallet is stolen.

REVIEW your
credit report every year to make sure there haven't been any new credit cards or other accounts issued (to someone other than you) and to make sure there haven't been inquiries by people you haven't initiated business with.

There are also services you can subscribe to (such as
CreditExpert ) that will alert you to any changes in your credit file.

NEVER give out personal information on the phone to someone you don't know and who initiated the call.

Often, scam artists phone unsuspecting victims pretending to be their financial services company and request information to be provided over the phone.

Usually, the story is to "update records" or sell a product. Get their name, phone number and address, and then call them back at the number you have on file or that is printed on the statements you receive.

REVIEW your monthly credit card statement each month to make sure there aren't any charges showing up that aren't yours. Also, make sure you get a monthly statement.

If the statement is late, contact the credit card company. You never know when someone may have turned in a change-of-address form so they could make a few more weeks of purchases on your credit card without you noticing.

DON'T mail bills or documents that contain personal data (like tax forms or checks) from your personal mail box. Take them directly to the post office or an official postal service mailbox. It's too easy for someone to take mail out of your mailbox on the street.

From there, they can dip your checks in special chemicals to remove the ink and then rewrite them to themselves!

If you're ever denied credit, FIND OUT WHY, especially if you haven't reviewed your credit report lately. This may be the first indication you get that someone has stolen your identity and is racking up charges in your name.

REACT QUICKLY if a creditor or merchant calls you about charges you didn't make. This too may be the first notice you get that someone has stolen your identity. Get as much information from them as you can and investigate immediately.

GUARD deposit slips as closely as you do checks. Not only do they have your name, address and account number printed on them, but they can also be used to withdraw money from your account. All a thief has to do is write a bad check, deposit it into your account and use the "less cash received" line to withdraw your money.

Identity Theft Insurance?

Some insurance companies offer identity theft insurance. While these policies don't cover everything, they certainly help out by covering a portion of lost wages for time spent dealing with the theft, mailing and other costs associated with filing paperwork to correct the problem, loan re-application fees, phone charges and even some attorney fees.

These steps can help lessen your chances of becoming a victim of identity fraud, but nothing is a sure thing. The thing to remember is that documents you throw away often have all the information a thief needs to steal your identity and wreak havoc on your life.

Internet Transactions

The ease of shopping and comparing products and prices online has made it an attractive option for many shoppers. How can you make sure your transactions are safe and your credit card information going only where you intend it to?

There are several ways to help ensure safe transactions on the Internet, and more are becoming possible all the time. Some of these include:
Stored-value cards (cards that you can buy with specified, loaded dollar amounts)

Smart cards (cards that can act as credit cards, debit cards and/or stored-value cards)

Point-of-sale (POS) devices (like your
PDAor mobile phone )

Digital cash

E-wallets

Online payment services like
PayPal

The most prevalent method for paying for the things you purchase online is still the credit card.

The following list provides some tips on how to make sure your transaction is secure. For a more extensive explanation of encryption and Internet security, check
out How Encryption Works.

Use the latest Internet browser.

The program that you use to surf the Internet is called a browser. This software has built-in encryption capabilities that scramble the information you send to a
server. Using the most recent browser ensures that the data is protected using the latest encryption technology.

This technology also uses a Secure Sockets Layer (SSL), which is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. The server receiving the data uses special "keys" to decode it.

You can make sure you are on an SSL by checking the URL -- the http at the beginning of the address should have changed to https. Also, you should notice a small lock icon in the status bar at the bottom of your browser window.

Look for digital certificates that authenticate the entity you are dealing with. Independent services like
VeriSign will authenticate the identity of the Web site you are visiting.

Web sites that use this service (usually those that sell items or services online) will have the VeriSign logo.

By clicking on the logo, you can be assured that the site is legitimate, rather than a clone of the legitimate company set up to collect your personal and financial information.

Read the privacy policy. The information you enter on the Web site should be kept confidential. Make sure you read the company's privacy policy to ensure that your personal information won't be sold to others.

Services like
Trust-E review a company's privacy policy (for a fee) and then allow the company to post the Trust-E logo if its privacy policy follows certain industry standards for consumer protection.

Only use one credit card for all of your online purchases.

Never give out passwords or user ID information online unless you know who you are dealing with and why they need it.

Don't give it out to your Internet service provider if you get an
e-mail requesting it. This is a relatively recent scam used to access your account and get your credit card number, along with whatever other personal information is there.

Keep records of all of your Internet transactions. Watch your credit card statement for the charges and make sure they're accurate.

After you've made purchases online, check your e-mail. Merchants often send confirmation e-mails or other communications about your order.

If It Happens To You

What if you find out through a phone call from a creditor, a review of your credit report, or even a visit from the police, that your identity has been stolen.

The first thing to do is report the crime to the police and get a copy of your police report or case number. Most credit card companies,
banks, and others may ask you for it in order to make sure a crime has actually occurred.

You should then immediately contact your credit card issuers, close your existing accounts and get replacement cards with new account numbers.

Make sure you request that the old account reflect that it was "closed at consumer’s request" for credit report purposes.

It is also smart to follow up your telephone conversation with letters to the credit card companies that summarize your request in writing.

Close any accounts the thief has opened in your name. If you open new accounts yourself, make sure you request that passwords be put on those accounts.

As with any password, make sure you use something that is not obvious to others. Don't use your mother's maiden name, the last four digits of your social security number, or anything else that would be obvious.
Next, call the fraud units of the three credit reporting bureaus and report the theft of your credit cards and/or numbers.

Ask that your accounts be flagged with a "fraud alert." This usually means that someone can't set up a new account in your name without the creditor calling you at a phone number you specify.

Verify with the credit bureau representative you speak with that this will happen, and provide them with the number at which you want to be reached.


The down side of this is that you won't be able to get "instant credit" at department stores. This flag, also known as a "victim’s statement," is the best way to prevent unauthorized accounts

The Credit Bureaus

Equifax Credit Information Services - Consumer Fraud Div.P.O. Box 105496Atlanta, Georgia 30348-5496Tel: (800)
997-2493 http://www.equifax.com/

Experian P.O. Box 2104Allen, Texas 75013-2104Tel: (888) EXPERIAN (397-3742)
http://www.experian.com/

TransUnion Fraud Victim Assistance Dept.P.O. Box 390Springfield, PA 19064-0390Tel: (800) 680-7289
http://www.transunion.com/index.jsp

Make sure to keep a log of all conversations with authorities and financial entities, and keep copies of any documentation you provide to them.
If your social security number has been used, notify the
Social Security Administration’s Office of Inspector General.

File a complaint with the Federal Trade Commission (FTC) by contacting the
FTC's Consumer Response Center.

The FTC is the federal clearinghouse for complaints by victims of identity theft. The FTC does not have the authority to bring criminal cases, but it does assist victims by providing information to help them resolve the financial and other problems that can result from identity theft.

The FTC also may refer victim complaints to other appropriate government agencies and private organizations for further action.

The FTC also has an online identity theft compliant form that can help them gather information about identity theft and lead to law enforcement actions.

The form can be found here.

Reporting to the FTC

Consumer Response CenterFederal Trade Commission 600 Pennsylvania Ave, NWWashington, DC 20580 Toll-free 877-FTC-HELP (382-4357).

What Congress Is Doing About It

Congress declared identity theft a federal crime in 1998 when it passed the
Identity Theft and Assumption Deterrence Act.

This offense, in most circumstances, carries a maximum term of 15 years imprisonment, a fine, and criminal forfeiture of any personal property used or intended to be used to commit the offense.

Identity fraud schemes may also involve violations of other statutes, such as identification fraud, credit card fraud, computer fraud, mail fraud, wire fraud, or financial institution fraud.

Each of these federal offenses are felonies that carry substantial penalties -­ in some cases, up to 30 years imprisonment, fines and criminal forfeiture.

Federal prosecutors work with federal investigative agencies such as the
Federal Bureau of Investigation, the United States Secret Service and the United States Postal Inspection Service to prosecute identity theft and fraud cases.

According to the Secret Service, its investigations show a jump in potential losses due to identity theft, from $851 million in 1998 to $1.4 billion in 2000.

While some of this increase may be due to an increase in investigations of the crime, the most likely reason is the advancement of the Internet and technology in general.

Part of the problem is the fact that the United States has no formal, centralized identification system. The most widely used ID card is the drivers' license, which has often been issued without good verification of the person's identity.

The social security number that is used for verifying identity and setting up so many different types of accounts, loans and other financial necessities can be found, bought or stolen more easily than ever.

It's found on many insurance cards, employment records, student ID cards, pay stubs and, of course, financial account records. The bottom line is: Protect your social security number at all costs. Don't give it out unless you have to, and don't carry the card with you.

Most states have recently improved the identification requirements for people seeking drivers' licenses.

Rather that being able to bring someone in to vouch for your identity, more concrete pieces of identification are required, and then there are still some states that only issue a temporary license until your documents have gone through their fraud unit.

What the Future Holds

Future efforts for preventing identity theft will most likely come through technological advancements that incorporate some physical aspect of a person's body in order to verify identity.

Known as biometrics, this type of authentication uses individually unique physical attributes such as
fingerprints, iris/retina, facial structure,speech, facial thermograms, hand geometry and written signature.

It can be used to authenticate both your identity and the party you are dealing with. For more information on biometrics, visit the
Michigan State University Biometrics Research Homepage.

Additional research is being done with
digital signatures. These include include public and private key encryption, as well as a third party verification of authenticity, such as with Public Key Infrastructure (PKI).

Tuesday, April 04, 2006

Nuclear Age-Conventional terrorism...Airport security is here to stay !



Terrorism has been a problem for airlines and air travelers since the 1970s, when hijackings and bombings became the method of choice for subversive, militant organizations around the world.


Although security at airports has always been tight, the 9/11 attacks woke many people up to a harsh reality -- it wasn't tight enough.


On that day, men armed with simple box cutters took over four passenger jets and used them as flying bombs.What security measures might have stopped them? How has airport security changed since then?


According to the Department of Homeland Security, 730 million people travel on passenger jets every year, while more than 700 million pieces of their baggage are screened for explosives and other dangerous items.


In this treatise, we'll find out how high-tech solutions are being used to make flying as safe as possible -- and we'll also consider if what we are doing is enough.


The First Line of Defense


Imagine for a second that you are a terrorist who wants to blow up or hijack a plane. You know that once you get inside the airport, you will have to pass through metal detectors, bomb-sniffing dogs, and possibly a search of your clothes and luggage.


How could you bypass all of those security measures? You could climb a fence or drive a truck to a sensitive area of the airport.


For this reason, the first line of defense in airport security is the most obvious: fences, barriers and walls.


Tall fences that would be difficult to climb enclose the entire airport property. Security patrols regularly scan the perimeter in case someone tries to cut through the fence.


Especially sensitive areas, like fuel depots or the terminals and baggage handling facilities are even more secure, with more fences and security checkpoints. All access gates are monitored by either a guard station or surveillance cameras.


Another risk is that someone could drive a truck or car containing a bomb up to the airport terminal entrance and just blow up the airport itself. Airports have taken several steps to prevent this.


Large concrete barriers, designed to block vehicles up to the size of large moving trucks, can be deployed if a threat is detected. Loading zones, where people once parked their cars to get their baggage in or out of the trunk, are now kept clear of traffic. No one is allowed to park close to the terminal.


Who Are You?


One of the most important security measures at an airport is confirming the identity of travelers. This is done by checking a photo ID, such as a driver's license.

If you are traveling internationally, you need to present your passport.
Simply taking a look at a photo ID isn't enough, however. The high-tech buzzword in airport security today is
biometrics.

Biometrics essentially means checking fingerprints, retinal scans, and facial patterns using complex computer systems to determine if someone is who they say they are - or if they match a list of people the government has determined might be potential terrorists.


A new system called CAPPS II could help accomplish some of this. Short for Computer Assisted Passenger Prescreening System, CAPPS II will require more personal information from travelers when they book their flights, which will lead to a risk assessment of no risk, unknown risk, elevated risk, or high risk.


Passengers considered risky will be further screened. Although the system has been delayed and isn't in place yet, the Department of Homeland Security (DHS) predicts that CAPPS II will make check-in faster for the average traveler.


You may have noticed the public address system at an airport replaying an automated message telling you not to leave your bags unattended. And you've probably noticed that check-in attendants are asking some questions that sound a little odd:


Has your luggage been in your possession at all times?


Has anyone given you anything or asked you to carry on or check any items for them?


These are very important questions. A tactic used on occasion by terrorists is to hide a bomb inside an unsuspecting person's luggage. Another tactic is to give something, maybe a toy or stuffed animal, to someone who is about to board a plane.

That innocent-seeming object may actually be a bomb or other harmful device.


Just a month after the 9/11 attacks, the President signed a new law that restructured and refocused the airport security efforts of the U.S.


The Aviation and Transportation Security Act established a new agency, the Transportation Security Administration (TSA). The TSA is part of the Department of Homeland Security.

The TSA's mission is to: Prevent attacks on airports or aircraft,
Prevent accidents and fatalities due to transport of hazardous materials and Ensure safety and security of passengers .


While the TSA deals with all forms of transportation, the Federal Aviation Administration (FAA) is devoted entirely to the operation of the U.S.'s civil aviation. FAA agents are located at every major airport for immediate response to possible threats.


Most major airports also have an entire police force, just like a small town, monitoring all facets of the facility. Background checks are required on all airport personnel, from baggage handlers to security-team members, before they can be employed.


All airport personnel have photo-ID cards with their name, position and access privileges clearly labeled.


Step Through, Please: Metal Detector


All public access to an airport is channeled through the terminal, where every person must walk through a metal detector and all items must go through an X-ray machine.


Almost all airport metal detectors are based on pulse induction (PI). Typical PI systems use a coil of wire on one side of the arch as the transmitter and receiver. This technology sends powerful, short bursts (pulses) of current through the coil of wire.


Each pulse generates a brief magnetic field. When the pulse ends, the magnetic field reverses polarity and collapses very suddenly, resulting in a sharp electrical spike. This spike lasts a few microseconds (millionths of a second) and causes another current to run through the coil.


This subsequent current is called the reflected pulse and lasts only about 30 microseconds. Another pulse is then sent and the process repeats. A typical PI-based metal detector sends about 100 pulses per second, but the number can vary greatly based on the manufacturer and model, ranging from about 25 pulses per second to over 1,000.


If a metal object passes through the metal detector, the pulse creates an opposite magnetic field in the object.


When the pulse's magnetic field collapses, causing the reflected pulse, the magnetic field of the object makes it take longer for the reflected pulse to completely disappear.


This process works something like echoes: If you yell in a room with only a few hard surfaces, you probably hear only a very brief echo, or you may not hear one at all.


But if you yell into a room with a lot of hard surfaces, the echo lasts longer. In a PI metal detector, the magnetic fields from target objects add their "echo" to the reflected pulse, making it last a fraction longer than it would without them.


A sampling circuit in the metal detector is set to monitor the length of the reflected pulse. By comparing it to the expected length, the circuit can determine if another magnetic field has caused the reflected pulse to take longer to decay.

If the decay of the reflected pulse takes more than a few microseconds longer than normal, there is probably a metal object interfering with it.


The sampling circuit sends the tiny, weak signals that it monitors to a device call an integrator. The integrator reads the signals from the sampling circuit, amplifying and converting them to direct current.


The DC's voltage is connected to an audio circuit, where it is changed into a tone that the metal detector uses to indicate that a
target object has been found.


If an item is found, you are asked to remove any metal objects from your person and step through again. If the metal detector continues to indicate the presence of metal, the attendant uses a handheld detector, based on the same PI technology, to isolate the cause.


Many of the newer metal detectors on the market are multi-zone.
This means that they have multiple transmit and receive coils, each one at a different height. Basically, it's like having several metal detectors in a single unit.

In the next section, we'll discuss what happens to your carry-on items while you're going through the metal detector.


While you are stepping through the metal detector, your carry-on items are going through the X-ray system.


A conveyor belt carries each item past an X-ray machine. X-rays are like light in that they are electromagnetic waves, but they are more energetic, so they can penetrate many materials.


The machine used in airports usually is based on a dual-energy X-ray system. This system has a single X-ray source sending out X-rays, typically in the range of 140 to 160 kilovolt peak (KVP).


KVP refers to the amount of penetration an X-ray makes. The higher the KVP, the further the X-ray penetrates.


After the X-rays pass through the item, they are picked up by a detector. This detector then passes the X-rays on to a filter, which blocks out the lower-energy X-rays.


The remaining high-energy X-rays hit a second detector. A computer circuit compares the pick-ups of the two detectors to better represent low-energy objects, such as most organic materials.


Since different materials absorb X-rays at different levels, the image on the monitor lets the machine operator see distinct items inside your bag.


Items are typically
colored on the display monitor, based on the range of energy that passes through the object, to represent one of three main categories:


Organic
Inorganic
Metal


While the colors used to signify "inorganic" and "metal" may vary between manufacturers, all X-ray systems use shades of orange to represent "organic."


This is because most explosives are organic. Machine operators are trained to look for suspicious items -- and not just obviously suspicious items like guns or knives, but also anything that could be a component of an improvised explosive device (IED).


Since there is no such thing as a commercially available bomb, IEDs are the way most terrorists and hijackers gain control.

An IED can be made in an astounding variety of ways, from basic pipe bombs to sophisticated, electronically-controlled component bombs.


A common misconception is that the X-ray machine used to check carry-on items will damage film and electronic media. In actuality, all modern carry-on X-ray systems are considered film-safe. This means that the amount of X-ray radiation is not high enough to damage photographic film.


Since electronic media can withstand much more radiation than film can, it is also safe from damage. However, the CT scanner and many of the high-energy X-ray systems used to examine checked baggage can damage film (electronic media is still safe), so you should always carry film with you on the plane.


Electronic items, such as laptop computers, have so many different items packed into a relatively small area that it can be difficult to determine if a bomb is hidden within the device.


That's why you may be asked to turn your laptop or PDA on. But even this is not sufficient evidence since a skilled criminal could hide a bomb within a working electronic device.


For that reason, many airports also have a chemical sniffer. ( This one in Grand Central, New York City ) This is essentially an automated chemistry lab in a box.


At random intervals, or if there is reason to suspect the electronic device that someone is carrying,
the security attendant quickly swipes a cloth over the device and places the cloth on the sniffer.


The sniffer analyzes the cloth for any trace residue of the types of chemicals used to make bombs. If there is any residue, the sniffer warns the security attendant of a potential bomb.


In addition to desktop sniffers , there are handheld versions, that can be used to "sniff" lockers and other enclosed spaces and unattended luggage.
Walk-through models, such as
GE's Entry Scan 3, are also available.

These sniffers can be used to detect explosives and narcotics.


Now that you have passed through security and are waiting to board your plane, let's see what is happening with your checked baggage.


Check Your Bags: X-ray Systems
In addition to passenger baggage, most planes carry enormous amounts of cargo. All of this cargo has to be checked before it is loaded.


Your luggage goes through a larger X-ray system.


Most airports use one of three systems to do this:


Medium X-ray systems - These are fixed systems that can scan an entire pallet of cargo for suspicious items.


Mobile X-ray systems - A large truck carries a complete X-ray scanning system. The truck drives very slowly beside another, stopped truck to scan the entire contents of that truck for suspicious items.


Fixed-site systems - This is an entire building that is basically one huge X-ray scanner. A tractor-trailer is pulled into the building and the entire truck is scanned at one time.


One old-fashioned method of bomb detection still works as well or better than most hi-tech systems -- the use of trained dogs. These special dogs, called K-9 units, have been trained to sniff out the specific odors emitted by chemicals that are used to make bombs, as well the odors of other items such as drugs.


Incredibly fast and accurate, a K-9 barks at a suspicious bag or package, alerting the human companion that this item needs to be investigated.


In addition to an X-ray system, many airports also use larger scanners. Let's take a look at those next.


Check Your Bags: CT Scanners
The first security check that your checked bags go through depends on the airport. In the United States, most major airports have a
computer tomography (CT) scanner.


A CT scanner is a hollow tube that surrounds your bag. The X-ray mechanism revolves slowly around it, bombarding it with X-rays and recording the resulting data. The CT scanner uses all of this data to create a very detailed tomogram (slice) of the bag.


The scanner is able to calculate the mass and density of individual objects in your bag based on this tomogram. If an object's mass/density falls within the range of a dangerous material, the CT scanner warns the operator of a potential hazardous object.


CT scanners are slow compared to other types of baggage-scanning systems.
Because of this, they are not used to check every bag. Instead, only bags that the computer flags as "suspicious" are checked. These flags are triggered by any anomaly that shows up in the reservation or check-in process.


For example, if a person buys a one-way ticket and pays cash, this is considered atypical and could cause the computer to flag that person.


When this happens, that person's checked bags are immediately sent through the CT scanner, which is usually located somewhere near the ticketing counter.


In most other countries, particularly in Europe, all baggage is run through a scanning system. These systems are basically larger versions of the X-ray system used for carry-on items.


The main differences are that they are high-speed, automated machines integrated into the normal baggage-handling system and the KVP range of the X-rays is higher.


With all of these detectors, scanners and sniffers, it's pretty obvious that you're not allowed take a gun or bomb on a plane. But what else is prohibited?


Now Boarding
While most of the things that you can't take on board an airplane are fairly obvious (guns, knives, explosives), there are some things that most people wouldn't think about.

Who would have thought that a smoke detector could be considered hazardous?


If you do transport a hazardous material on a passenger plane without declaring it, you could face a fine of up to $27,500!


Make sure you contact the local airport authority if you have any concerns about an item you plan to carry with you on a trip.


Because terrorism is a constant and terrifying threat, this means that any mention of certain words, such as "bomb," "hijack" or "gun," can lead to your immediate removal from the plane and quite possibly your arrest, even if the word is said in an innocent manner.


Everyone who works in aviation, from flight attendants to security personnel, is trained to react immediately to those words.


You Can't Take it With You
There are a number of items that you cannot carry on a plane, and some of that can't be packed in your bags, either:


Explosives: Fireworks, ammunition, sparklers, matches, gunpowder, signal flares


Weapons: Guns, swords, pepper spray, mace, martial arts weapons, swords, knives with blades of any length


Pressurized containers: Hair spray, oxygen tanks, propane tanks, spray paint, insect repellant


Household items: Flammable liquids, solvents, bleach, pool chemicals, flammable perfume in bottles 16 ounces or larger


Poisons: Insecticides, pesticides, rat poison, arsenic, cyanide


Corrosives: Car batteries, acids, lye, drain cleaner, mercury


Air Marshals
If fences and barriers are the first line of defense, the air marshals are the last.


If everything else fails and a terrorist still gets onto a flight with a weapon, an armed air marshal can take control of a situation and restrain the attackers.


Although the air marshal program has existed since the 1970s, it has never had as high of a profile as it has in the post-9/11 era.


An air marshal is a federal agent disguised to look like regular passenger. Each air marshal is authorized to carry a gun and make arrests.


There are not enough air marshals to cover every flight, so their assignments are kept secret.


No one knows which passenger is the air marshal, or even if an air marshal is present on the flight at all. Although their exact numbers are kept classified, airline insiders estimate that only five percent of U.S. flights have an air marshal on board.


This is still a major increase - in the years before 9/11, a handful of marshals guarded just a few international flights.


In addition to policing the sky, new laws have forced the installation of locks on cockpit doors. This could prevent hijackings by terrorists who are trained to fly passenger jets by keeping them away from the plane's controls.


Are we doing enough?


While billions of tax dollars are spent beefing up airport security, there are fears that things are still not safe enough.


A March 2004 report by the Government Accountability Office (GAO, formerly the General Accounting Office) said that there were still problems "hiring, deploying, and training [TSA's] screener workforce.


Staffing shortages and TSA's hiring process continue to hinder its ability to fully staff screening checkpoints."


The GAO also noted the extensive delays in the implementation of CAPPS II, which is far behind schedule and doesn't even have date of completion or cost estimates.

The GAO report states, "TSA has not fully addressed seven of eight issues identified by Congress as key elements related to the development, operation, and public acceptance of CAPPS II."


The air marshal program also came under fire in the GAO report -


The need for many additional marshals resulted in an abbreviated training program, and budget cuts have further crippled the program.


A recent investigation by the DHS's inspector general found 753 reports of air marshal misconduct during an eight-month period in 2002, including sleeping and being drunk while on duty.


Finally, many security experts fear there are too many threats that aren't being addressed at all. Many baggage handlers, mechanics and other technicians with access to airplanes are not screened or searched. Handheld surface-to-air rocket launchers are another concern - currently, U.S. aviation has virtually no defense against such an attack.