Security guards hired to protect Jude Law when he visited the ‘Jungle’ migrant camp were reportedly targeted by rock-pelting migrants just moments after the actor boarded the coach home.
The star made the journey to northern France last week to highlight the plight of child refugees who are being evicted under a move by French authorities to demolish the southern part of the camp.
He was joined by singer Tom Odell and a film crew, who captured him on camera as he urged David Cameron to let the hundreds of children at the camp come to the UK.
But moments after the celebrities had boarded the production team coach back to Britain, their security team was ambushed, according to the Sunday People.
The attackers reportedly hurled stones at the men before stealing their mobile phones.
A source told the newspaper: ‘We were shocked to see some of the migrants acting like football hooligans. The security team had stones thrown at them and two had phones smashed and stolen.’
The official deadline for migrants to leave the most southern part of the camp was on Tuesday and the first phase of clearing migrants started on Thursday after a judge approved mass evictions.
Charities working in the camps say the demolition will destroy the homes of 3,000 people, including hundreds of children.
It will, they claim, ‘uproot again those who have already had to abandon their homes due to war and persecution.’
But opponents point out that many of those living in the Calais jungle are economic migrants simply trying to get into Britain for a better life.
Ministers have resisted calls to take more migrants from the continent – for fear it will encourage others to risk their lives trying to get to Europe.
Mr Law said last week: ‘These are innocent, vulnerable children caught up in red tape with the frightening prospect of the demolition of the Jungle hanging over them.
‘David Cameron and the British Government must urgently work with the French authorities to alleviate this humanitarian crisis.’
The Talented Mr Ripley star appeared at the camp with Toby Jones, who stars in the new Dad’s Army film and veteran playwright Tom Stoppard.
Singer Tom Odell and comedian Shappi Khorsandi were also there.
The group read out letters from famous historical figures in front of 200 people at the campsite in an event organised by Letters Live.
Figures from charity Help Refugees show that there are 440 children living in the southern section of the camp, 291 of whom are unaccompanied. Around 3,700 people in total live in the camp.
MailOnline has contacted Mr Law’s representative for comment.
Former Secretary of State Hillary Clinton’s use of a private email server to conduct official diplomatic business created many national security problems, but they may pale by comparison with the wreckage she left behind in her department’s main digital information security office.
Harold W. Geisel, the State Department’s acting Inspector General, issued eight scathing audits and investigation reports during Clinton’s tenure, repeatedly warning about worsening problems and growing security weaknesses within the Bureau of Information Resource Management, according to a Daily Caller News Foundation investigation.
Geisel’s critical comments about the deficiencies throughout IRM carry additional weight since he was not considered an “independent” IG. Watchdog groups noted Geisel had served as a U.S. Ambassador for Hillary’s husband, President Clinton, and had never been confirmed by the U.S. Senate.
In fact, President Obama did not nominate an IG to the State Department during Clinton’s entire term. It was only in September 2013 that the Senate finally confirmed Geisel’s successor, Steve Linick, who currently occupies the the post.
After Clinton left the State Department in 2013, Linick quickly undertook remedial action to save the IRM. Barely two months after his Senate confirmation, he issued a “management alert” to State Department leadership, warning that IRM’s languishing security deficiencies since 2010 were still there.
“The department has yet to report externally on or correct many of the existing significant deficiencies, thereby leading to continuing undue risk in the management of information,” Linick said.
A spokesman for the Clinton campaign did not respond Sunday to a request for comment.
Clinton put Bryan Pagliano, her 2008 presidential campaign IT director, in the IRM in early 2009 as a “strategic advisor” who reported to the department’s deputy chief information officer. Pagliano had no prior national security experience or a national security clearance.
One of Pagliano’s jobs while working at the IRM was overseeing Clinton’s private email account and server. He recently refused to testify before Congress about his work for Clinton, citing his Fifth Amendment right against self-incrimination.
The IRM was established in 2002 by then-Secretary of State Colin Powell after the 9/11 Commission identified failure among government agencies like the FBI, CIA, Department of Defense and the State Department to exchange anti-terrorist intelligence. Powell and his successor, Condeleeza Rice, built the IRM to ensure secure communications among all U.S. embassies and consulates.
As Clinton entered the State Department, the IRM was the central hub for all of the department’s IT communication systems.
Geisel explained IRM’s primary role in one report, noting its “personnel are responsible for the management and oversight of the department’s information systems, which includes the department’s unclassified and classified networks” and “handles all aspects of information security for the department’s intelligence systems.”
Clinton instead allowed the IRM to degenerate into an office without a mission or strategy, according to multiple IG reports issued during and after her four years as the nation’s chief diplomat.
The seriousness of Clinton’s failure was summarized in a 2012 audit that warned, “the weakened security controls could adversely affect the confidentiality, integrity, and availability of information and information systems” used by U.S. officials around the world.
Geisel’s July 2013 inspection report issued after Clinton’s departure was so damning that the IRM became the butt of caustic comments throughout the IT world.
Network World, an IT review site, for example, headlined one of its articles on the issue with “FAIL: Your Tax Dollars at Play: the US State Department’s Bureau of Information of Resource Mis-Management.” The article charged that the IRM had become “a total joke.”
Another news outlet told its readers that the editors would “like to be able to tell you what the IRM does, but a new report from the Office of Inspector General concludes that it doesn’t really do anything.”
IRM “is evidently an aimless, over-funded LAN party with no real boss or reason to exist,” concluded reporter Jordan Brochette when the 2013 IG report was released.
Scott Amey, general counsel for the Project on Government Oversight, reviewed the IG reports for DCNF and concluded that “State’s IT security record is littered with questionable management, insecure systems, poor contract oversight, and inadequate training. The State IG’s reviews show a pattern of significant deficiencies and few, if any, corrections.”
Geisel issued his first audit of IRM in November 2009, eight months into Clinton’s term. It also was the first audit issued after Pagliano arrived at the bureau. Geisel identified many serious IT security deficiencies that year. Unfortunately, most of the problems would continue to be uncorrected throughout Clinton’s term.
One troubling observation early in Clinton’s secretaryship was that the IG found the State Department and even embassy chiefs of mission suffering from a lack of IT security training, including the lack of “security awareness training.”
The lack of IT security awareness by top State Department officials may partly explain why Clinton and her top aides saw no problems with the use of a personal email server.
Geisel also warned in late 2009 that at the IRM, he found “there were no Standard Operating Procedures (SOP) for managing IT-related security weaknesses.”
In an audit about IRM in February 2010, the IG reviewed how well IRM officials were implementing Secretary Rice’s 2007 modernization and consolidation progam.
It was in this 2010 audit that the first hints emerged of poor management at the IRM. Geisel concluded the bureau’s leadership failed to satisfy vulnerable IRM field staff deployed at embassies and consulates. He called them IRM’s “customers.”
The IG “found a significant level of customer dissatisfaction among bureaus about the quality and timeliness of IT services after consolidation.”
In November 2010 Geisel issued yet another warning about shortcomings within IRM. In this report, the IG repeated that IRM “needed to make significant improvements” to address “security weaknesses,”
Once again, he emphasized that IRM had failed in providing mandatory “security awareness training” to all top security personnel. He also noted a failure to require all contractors to undergo mandatory security authorization.
“The department did not identify all employees who had significant security responsibilities and provide specialized training,” the IG charged.
The IG discovered other worrisome problems in 2010. It found officials failed to provide corrective patches for security problems in a third of the cases examined by his office. The IG also pointed to more than 1,000 “guest” IT accounts within the department’s IT systems that could provide entry paths for hackers.
Geisel further reported that the IRM had 8,000 unused email accounts and that department officials never changed the passwords on 600 active email embassy and consulate accounts.
There were also “24 of 25 Windows systems tested [that] were not compliant with the security configuration guidance.”
The damning IG reports continued in July 2011 when Geisel detailed serious problems afflicting a new IRM program called eDiplomacy that Clinton unveiled earlier that year.
Geisel was blunt: “eDiplomacy lacks a clear, agreed-upon mission statement that defines key goals and objectives. With the absence of performance measurement process, management has few means to evaluate, control, budget, and measure the success of its projects.”
Geisel painted an alarmingly negative assessment in a November 2011 audit on the IRM’s overall information security program. Specific details were redacted but the report warned for the first time of “additional security breaches,” saying “we identified weaknesses that significantly impact the information security program controls. If these control weaknesses are exploited, the department could be exposed to additional security breaches. Collectively, these control weaknesses represent a significant deficiency.”
If the breaches weren’t quickly fixed, the consequences would be harmful to “the confidentiality, integrity, and availability of information and information systems.”
The IG noted in this 2011 audit that a relatively new program called OPNET suffered from nearly 10,000 defective user accounts that could be breached by hackers.
Geisel also identified another flaw in the audit – the failure of IRM officials to do “continuing monitoring” of Oracle for “control weaknesses.” Oracle is the department’s most widely used internal database management system.
A November 2012 audit repeated the earlier IG audi that with the mounting IRM deficiencies, “the department could experience security breaches. Collectively, the control weaknesses represent a significant deficiency, as to enterprise-wide security.”
The same report again pointed out that, under Clinton, IRM “had not fully taken corrective action to remediate all of the control weaknesses identified in the FY 2011 report. The weakened security controls could adversely affect the confidentiality, integrity, and availability of information and information systems.”
The November 2012 report again noted that training lagged and at times was non-existent. Among the positions that had not received IRM training were the department’s Chief of Mission, a deputy assistant secretary, information management specialists, information technology specialists and security engineers.
Again Geisel noted that within the bureau,“we found that all 46 employees had not taken the recommended role-based security-related training course in the [six month] time-frame, as recommended in the Information Assurance Training Plan.”
Another area of repeated failure was risk management. “The department’s risk management program for information security needs improvement at the system level.”
Geisel’s final – and most denunciatory – report on the IRM was issued in July 2013 and focused on Clinton’s final year in the department.
The report said that after years of deteriorating service, the IRM no longer performed a vital role in the department, with many of its duties usurped by other offices or simply ignored. The bureau “does not have a lead role in most of the functions it does perform and, for the most part, only compiles information generated by others,” Geisel concluded.
The IRM “does not have a mission statement outlining a vision for the office,” and “no document provides a clear connection between the work of IRM and the high-level goals outlined by the Chief Information Officer in the department’s IT Strategic Plan for FYs 2011-13.”
Under Clinton’s watch, new technologies and even social media were ignored by IRM, Geisel said, in the 2013 report that, “IRM policies do not mention the latest technologies and efforts within the department. For example, there is little mention and guidance for handling social media.”
And after four years under Clinton, the systems overseen by the IRM were still not considered user friendly.
“System owners described IRM tools as difficult to use and not user-friendly. Many commented that the tools would lock up while entering content, requiring information to be reentered. System owners attempted to share their frustrations with IRM, but to no avail.”
Perhaps Geisel’s most surprising criticisms, however, were that the “IRM is not engaged with IT strategic planning in the department,” and many of the department’s IT regulations had not been updated since 2007.
The State Department IG also compiled five classified audits of the IRM during Clinton’s tenure that were never made public.
We’ve all been stopped at airport security with a forgotten bottle of water, which we can either toss away or drink quickly in front of airport security. But what happens if that liquid is not water, but an entire bottle of European cognac? For airline passenger Miss Zhao, there was only one solution: slam it back at once.
Zhao was transferring to a Wenzhou flight at Beijing Airport at noon on August 21 when she was stopped at airport security. A worker told the woman in her forties that she was not able to bring the imported cognac through the security checkpoint in her carry-on. As it was too late to transfer the cognac to her checked-in luggage, Zhao did what any responsible person that hates wasting food would do: she sat down in a corner and drank the entire bottle of cognac herself.
That created a new security problem though, and it had to do with the bottle of cognac that was now inside her.
Zhao started acting wildly and yelling incoherently. Due to her massive inebriation, when Zhao fell to the floor, that’s where she stayed. When police arrived at the scene, they decided not to let her board her flight out of concern that she had become a security risk to others and herself as Zhao was travelling alone.
Zhao was taken to a convalescence room and was checked out by a doctor. It wasn’t until 7pm when she sobered up and realized what she had done. Zhao was eventually released by police to her family who had come to Beijing Airport to escort her home.
Hard choices have been made before at security checkpoints in Chinese airports. This past June, two brothers were stopped at the security checkpoint at Guangzhou Airport for having wine stashed in their carry-on. The brothers explained that this wine had special medicinal properties used to help male fertility. However, the security workers were adamant in enforcing regulations, and so the brothers decided to drink the RMB 8,000 bottle of wine themselves (below).
And if you’re thinking this would make a funny scene in a Chinese movie, well, it already has been. In Xu Zheng’s breakout hit Lost on Journey (2010), Wang Baoqiang’s yokel character is prevented by airport security from bringing a drink onto the airplane, so he decides to drink it himself. Of course, the distinction here is that Wang’s character chugs down an entire bottle of milk.
Good news, America. All of the tax money you’ve given to the Transportation “Security” Administration seems to have been a waste. All of those grope sessions you’ve endured? Worthless. All of those naked photos random “agents” saw of you? Just pure entertainment (but really).
According to a new Homeland Security report, the TSA failed to stop 95 percent of potential terror attacks at major airports. ABC News has the story (bolding is mine):
An internal investigation of the Transportation Security Administration revealed security failures at dozens of the nation’s busiest airports, where undercover investigators were able to smuggle mock explosives or banned weapons through checkpoints in 95 percent of trials, ABC News has learned.
The series of tests were conducted by Homeland Security Red Teams who pose as passengers, setting out to beat the system.
According to officials briefed on the results of a recent Homeland Security Inspector General’s report, TSA agents failed 67 out of 70 tests, with Red Team members repeatedly able to get potential weapons through checkpoints.
In one test an undercover agent was stopped after setting off an alarm at a magnetometer, but TSA screeners failed to detect a fake explosive device that was taped to his back during a follow-on pat down.
The TSA receives $8 billion per year in funding. Just two weeks ago, DHS Inspector General John Roth testified in front of Congress about concerns the agency wasn’t fulfilling it’s original mission.
“Unfortunately, although nearly 14 years have passed since TSA’s inception, we remain deeply concerned about its ability to execute its mission,” Roth said. “Since 2014 we have published more than 115 audit and inspector reports about TSA’s programs and operations. We’ve issued hundreds of recommendations to attempt to improve TSA’s efficiency and effectiveness. We have conducted a series of covert penetration tests, essentially testing TSA’s ability to stop us from bringing in simulated explosives and weapons through checkpoints, as well as testing whether we could enter secure areas through other means.”
Earlier this month, Judicial Watch released documents revealing horrifying details of alleged sexual assaults from TSA agents at airports around the country.
April 7, 2013, at Denver International Airport:
At approximately 14:10 hours on the South Checkpoint, near lane 4 a passenger complained that he sustained an injury resulting from the aggressive actions of the the [sic] TSO [Transportation Security Officer] conducting a pat down search… The passenger stated during the pat-down search he was struck very hard in the groin area, which caused him pain to his left testical [sic].
October 19, 2013, “TSA Contact Center Record,” Los Angeles Airport:
She [TSA agent] then placed full palms squarely on my breasts and then moved around my breasts again. She then placed both palms against my breasts and I was shocked, humiliated, alarmed and assaulted and said ‘Stop! What are you doing? That’s not ok.’… I reported this to TSA Supervisor… She got the manager [redacted] and he said he would look at the video and TSA would send me a letter but it would not tell me the resolution and that I did not have a right to view the video… I will not be sexually assaulted at the airport. As a taxpayer, I pay for the TSA.”
July 5, 2013, “TSA Contact Center Record,” O’Hare Airport:
The female TSO then proceeded to roughly feel of [sic] her breast including her nipples. The TSO didn’t go under her arms or along her sides. She indicated that she did not receive a proper pat down. The search was limited to her breast… Two other individuals came over to where the supervisor and gentleman were and they began laughing. The caller indicated that the incident was not the business of the other two officers and not a show for them. The caller indicated that even the Supervisor, along with the others, began to roar with laughter.
July 6, 2013, “TSA Contact Center Record,” O’Hare Airport:
Caller indicates that her mother feels as though she was singled out because she was a breast cancer survivor and the caller feels as though this is extremely discriminatory. Caller indicates that the breast is an extremely intimate place that should not be rubbed in the manner that it was. Caller expressed that her mother feels extremely violated and the caller feels that being violated in this manner is on the same level as rape. Caller has indicated that her mother will never travel again because of the pat down that she received.
July 29, 2013, “To/From Memo,” O’Hare Airport:
The person began to tell me how TSO [redacted] stuck his hands down his pants and grabbed the top of his penis and placed his fingers in his butt crack… The person was sure that he was violated and wanted to talk to a supervisor… He said he is going to file a police report with Chicago Police Department and file a lawsuit against TSA and Officer [redacted] and walked away.”
If this video doesn’t enrage you, especially after this news, I don’t know what will.
Recently released emails detail then-Secretary of State Hillary Clinton’s interest in arming Libyan opposition groups using private security contractors before the fall of Muammar Qaddafi in 2011 – though at the time, the opposition was not formally recognized by the U.S. or United Nations, which prohibited arming without following strict guidelines and oversight.
The issue remains so sensitive that the emails recently released by the State Department redacted a key line on the matter. But the unredacted version of the same email, released to the congressional Benghazi Select Committee and first posted by The New York Times last Thursday, showed Clinton appearing to endorse the idea of using private contractors to her then-deputy chief of staff, Jake Sullivan.
“FYI. The idea of using private security experts to arm the opposition should be considered,” Clinton wrote to Sullivan on April 8, 2011, attaching an intelligence report from Hillary’s adviser Sidney Blumenthal. The opposition was known as the Transitional National Council, or TNC.
Another email released by the State Department shows that five days earlier, on April 3, 2011, Bill Clinton said he would not rule out arming the Libyan opposition. The story was circulated by Cheryl Mills, Hillary Clinton’s principal personal adviser at the State Department, to “H.” While it’s not clear who “H” is, based on the message traffic it is likely Hillary Clinton or possibly adviser Huma Abedin.
Later that same year, a Sept. 10, 2011 email with a subject line “Rogers” said, “Apparently wants to see you to talk Libya/weapons.”
At the time, the Republican chairman of the House Intelligence Committee was Mike Rogers, who abruptly announced he would not seek re-election in the spring of 2014. Rogers did not immediately respond to questions seeking comment. Fox News also filed its own Freedom of Information Act request for the documents in October 2012.
Current and former intelligence and administration officials consistently have skirted questions about weapons shipments, first documented by Fox News in October 2012, one month after the Benghazi terrorist attack, and what role the movement played in arming extremist groups the U.S. government is now trying to defeat in Syria and Iraq.
Through shipping records, Fox News confirmed that the Libyan-flagged vessel Al Entisar, which means “The Victory,” was received in the Turkish port of Iskenderun – 35 miles from the Syrian border – on Sept. 6, 2012, five days before the Benghazi terrorist attack. The cargo reportedly included surface-to-air anti-aircraft missiles, RPG’s and Russian-designed shoulder-launched missiles known as MANPADS.
On the movement of weapons, in an interview broadcast May 11, former acting CIA director Mike Morell said the CIA and U.S. government “played no role. Now whether we were watching other people do it, I can’t talk about it.”
Heavily redacted congressional testimony, declassified after the House intelligence committee’s Benghazi investigation concluded in 2014, shows conflicting accounts about the movement of weapons from Libya to Syria were apparently given to lawmakers.
On Nov. 15, 2012, Morell and Director of National Intelligence James Clapper testified “Yes” on whether the U.S. intelligence community was aware arms were moving from Libya to Syria. This line of questioning by Republican Rep. Devin Nunes, who is now the intelligence committee chairman, was shut down by his predecessor Rogers, who said not everyone in the classified hearing was “cleared” to hear the testimony, which means they did not have a sufficient security clearance.
An outside analyst told Fox News that Rogers’ comments suggest intelligence related to the movement of weapons was a “read on,” and limited to a very small number of recipients.
Six months later, on May 22, 2013, Rep. Mac Thornberry, R-Texas, now chairman of the House Armed Services Committee, asked if the CIA was “monitoring arms that others were sending into Syria.” Morell said, “No, sir.”
Several individuals connected to Benghazi and Hillary Clinton’s term at the State Department now work at the D.C. consulting firm Beacon Global Strategies. Among them are Clinton’s principal gatekeeper Philippe Reines; Morell, who’s listed as a senior counselor; and Andrew Shapiro, who was a Clinton policy adviser at the State Department whose portfolio included ridding Libya of shoulder-launched missiles called MANPADs. Critics argue no group knows more about Benghazi or has such a vested interest in the outcome of the congressional Benghazi investigation.
Just so you can keep ’em all straight. Summarized and sanitized for your protection!
* New Hillary Emails Confirm She Received Classified Info on Private Email
* Hillary Was Pushing For Tax Breaks To Benefit Clinton Library Donors
* Clinton Foundation Had $26M In Contributions It “Forgot” To Disclose
* Stop me if you’ve heard this one; Hillary took money from more companies seeking influence
* ‘Clinton Cash’ author: George Stephanopoulos guilty of “hidden-hand journalism”
* Clinton Cash’ Author Reveals Other Ties Stephanopoulos DIDN’T Admit or Apologize For
* ABC, Stephanopoulos Clinton Foundation Hypocrisy Staggering
* Hillary Clinton personally took money from companies that sought to influence her
* Clintons Earned $30 Million in 16 Months, Report Shows
* Former Obama CIA Chief: Hillary’s Emails Compromised By Our Enemies
* Guess Who Delayed Response to Stephanopoulos Scoop So Politico Could Publish First?
* Clinton Foundation donors include dozens of media organizations, individuals
* Stephanopoulos Another Example Of Revolving Door Journalism
* Why Did a Nigerian Company Pay Bill Clinton $1.4MM for 2 Speeches?
* Clinton Crime Fund Reportedly Took Funds From Human Rights Violators
* Four Clinton Foundation Trustees Charged Or Convicted Of Financial Crimes
* Benghazi Committee Gets Some Subpoeaned Docs from State Dept. Two Years Later
* Clinton Foundation spent more on office supplies than on charity gifts in 2013
* 181 Clinton Foundation donors who lobbied Hillary’s State Department
* The Fall of the House of Clinton
* Hillary’s Day of Wrath
* Clinton Foundation distributed useless drugs to AIDS patients
* For the Clinton Defense
* ABC This Week With George Stephanopoulos owe their viewers an Apology
* Who is really drawing out the Benghazi investigation?
* “Hillary Thinks She Is Bigger Than God”
* Hillary now raising funds off of evidence of her corrupt fundraising
* Muslim Brotherhood Payrolled By Clinton Foundation
* How long can this train wreck continue?
* Bill Clinton sold us to the ChiComs; Hillary sold us to the Russians
* White House Refuses to Comment on Shady Deal Hillary Made With Russia
* Many Clinton charity donors got State Dept. awards under Hillary
* Clintons Lied on Tax Forms, Claiming No Foreign Money to Foundation
* Oops: Clinton Foundation Re-Filing Five Years of Tax Returns Over “Errors”
* State Dept. Documents Reveal Concern about Bill Clinton’s Activities with “Saudi Entities”
* Did Clinton’s Backdoor Adviser Illegally Lobby for Putin Ally?
* The long, complicated story of Hillary Clinton’s Benghazi subpoena
* Obstruction of Justice – A Must For Hillary
* The Latest Bombshell from Mrs. Clinton’s Lawyer
* Clintons Received Money from ‘Front for the Government of Iran’
* Did Hillary Run Her Own Intelligence Operation?
* Lawsuit: Clintons are guilty of racketeering, influence peddling
* Business dealings of Hillary Clinton’s brother raise new questions
* Trey Gowdy: House may go to court to get Clinton email server
* On Benghazi, a timeline of State Department obstruction
Hillary Clinton Lies… A Lot
* Clinton camp issues clarification on deleted emails, claims “every” message was reviewed
* The Hillary Email Scandal: Who Profits?
* The Mendacious, Charmless, Painfully Mediocre And Unelectable Hillary Clinton
* Hillary’s Train Wreck Press Conference: Spin, Lies and Unanswered Questions
* Carefully scripted Hillary knocked out of comfort zone
* Internet Catches Hillary in Three Provable Email Falsehoods
* Hillary emerges from behind stonewall for tightly controlled press conference
* Mystery location of Clinton email server seen as ‘matter of national security’
* Hillary Tries To Quell Email Controversy, But Only Creates More Questions
* Trey Gowdy: Hillary’s Server Or Hillary’s Testimony
* Hillary’s brother got the gold mine, Haiti got the shaft
* “It will be a crime if she knowingly withholds documents pursuant to subpoena”
* Clinton e-mail scandal disqualifies her for president
* Hillary Clinton’s Possibly Fatal Email Mistake
* Cheryl Mills, Hillary Clinton: What We Musn’t Forget About Benghazi
* New FOIAs Probe Clinton Secret Email System, Lawsuits May Follow In 20 Days
* White House: Hillary And Obama Did Email Each Other
* Why Would Foreign Governments’ Donations to the Clinton Foundation Not Count as Bribes?
* Wealthy at Scandal-Plagued HSBC Have Donated/Bribed $81 Million to Hillary’s Bribery Storefront
* Hillary fired US Ambassador to Kenya for using personal email account
* Server, Serve Her: Clinton Crumbling
* Hillary Clinton Still Doesn’t Get It
* Hillary’s Brother Gets Exclusive Mining Permit from Haiti After Taxpayers Sent Country Billions
* Emailgate May Be the Final Scandal to Sink Hillary Clinton
* Hacker Reveals Contents from Hillary’s Private E-Mails and Shows Who She Was Talking To
* Bigger Question: Did Hillary use unsecured email for Classified Info?
* Hillary Clinton leaked e-mail story to New York Times before tweet
* MSNBC: Hillary Personal Email Use at State “Staggering, Shocking, and Ridiculous”
In 2012, the city of Sharpstown, Texas, made the controversial decision not to renew its contract with the local police department and instead hire a private security firm to combat crime.
Since SEAL Security Solutions took over law enforcement in Sharpstown, crime has reportedly dropped by 61 percent in just 20 months.
James Alexander, director of operations for SEAL Security Solutions said, “Since we’ve been in there, an independent crime study that they’ve had done [indicates] we’ve reduced the crime by 61 percent,” according to Guns.com.
In addition to the apparent increase in efficiency, the private firm is reportedly saving taxpayers roughly $200,000 each year – even though the community is getting more patrol officers than before.
“On a constable patrol contract, it’s either a 70/30 or an 80/20. Meaning they say they patrol your community 70 percent of the time, [while] 30 percent of the time they use for running calls out of your area or writing reports,” Alexander said.
He continued: “The second thing that drastically reduces the crime is that we do directed patrols, meaning we don’t just put an officer out there and say ‘here, go patrol.’ We look at recent crime stats, and we work off of those crime stats. So if we have hotspots in those areas say for that month, we focus and concentrate our efforts around those hotspots.”
The SEAL officers also don’t “receive the same protection, as we are in the private sector,” according to Alexander. He argues that leads to better accountability because they have to worry about keeping their jobs.
Of course, privatizing police forces has raised concerns as well. The Washington Post reports:
The growth is mirrored nationally in the ranks of private police, who increasingly patrol corporate campuses, neighborhoods and museums as the demand for private security has increased and police services have been cut in some places.
The trend has raised concerns in Virginia and elsewhere, because these armed officers often receive a small fraction of the training and oversight of their municipal counterparts. Arrests of private police officers and incidents involving SCOPs overstepping their authority have also raised concerns.
Do you think privatizing police forces is a good idea?