“Object sexual penetration is a serious sex crime in Virginia. It is very difficult to look at the bill and look at the OSP statute together and think that you are not asking doctors to commit a sex crime. …Consent is a key element in the criminal statute, and there is no consent required in the ultrasound statute.”—David Englin, Democratic delegate from Virginia • Explaining the new tactic taken by Democrats in Virginia, in their effort against a bill expected to pass the state legislature that could mandate unwanted, penetrative ultrasounds for women seeking abortions. That happening under any other circumstance would, as Englin suggested, be considered a sex crime in Virginia, carrying a prison sentence of five years. The ultrasound mandate in the eyes of its supporters bears no inherent medical relevance, exactly – the logic seems to be to try to dissuade women from having abortions by forcing them to look at their own ultrasounds. The bill is currently opposed by 55% of Virginians, according to recent polling, but is expected to pass the legislature and be signed into law by Republican Governor Bob McDonnell, one of the most conservative governors in the country. source (via • follow)
That’s right, ladies. No one can but an object up your genitals but the Commonwealth of Virginia. Feel the protection of small government. Feel it deep inside.
In order to understand why transphobia and cissexism persist and are continually perpetuated throughout feminist communities, particularly the vegetarian-ecofeminist community, it is important to consider the origins of anti-trans advocacy as a conscious project of prominent, elite White feminists in the 1970s. In the late sixties and early seventies, trans people were very active in the women’s and queer liberation movements. The Compton’s Cafeteria and Stonewall rebellions of the sixties are evidence of that, as are women like Beth Elliot of the Daughters of Bilitis, Sandy Stone of Olivia Records, and Stonewall veteran Silvia Rivera who was a founding member of the Gay Liberation Front and the Gay Activist Alliance.
So it’s important to keep in mind that trans women, and trans people more generally, were an integral part of the early women’s liberation movement. But in the mid- to late-seventies, there was a transphobic backlash within feminism to systematically remove and exclude trans people, explicitly transsexual women, from the women’s and queer movements. For example, Rivera was targeted and physically attacked by cissexist women separatists at a gay rights rally. Elliot was targeted by Robin Morgan and separatists at a lesbian women’s conference. Stone was targeted by Janice Raymond and forced out of Olivia Records with threats of a boycott. And Gloria Steinem of Ms. magazine openly attacked trans women.
Over the last couple decades, there has been an increase in organizing and activism by trans people, yet we continue to be the targets of a systematic backlash from elite feminists. So-called ‘women-born women’ policies are still used to exclude transsexual women from participating in our own movement. And while trans women are disproportionately targeted by homelessness, prisons, and sexual and physical violence, an alliance between anti-trans feminists and the state has been used to circumvent human rights laws in order to bar us from many vital women’s facilities and services. Trans women have even been forced out of women’s services organizations they helped create.
By Associated Press, Published: February 20 | Updated: Tuesday, February 21, 4:26 AM
RICHMOND, Va. — Hundreds of women locked arms and stood mute outside the Virginia State Capitol on Monday to protest a wave of anti-abortion legislation coursing through the General Assembly.
Capitol and state police officers, there to ensure order, estimated the crowd to be more than 1,000 people — mostly women. The crowd formed a human cordon through which legislators walked before Monday’s floor sessions of the Republican-controlled legislature.
The silent protest was over bills that would define embryos as humans and criminalize their destruction, require “transvaginal” ultrasounds of women seeking abortions, and cut state aid to poor women seeking abortions.
Molly Vick of Richmond said it was her first time to take part in a protest, but the issue was too infuriating and compelling. On her lavender shirt, she wore a sticker that said “Say No to State-Mandated Rape.” Just beneath the beltline of her blue jeans was a strip of yellow tape that read “Private Property: Keep Out.”
One organizer said the event took root, was organized and publicized almost wholly through Facebook and other social media after last week’s votes on landmark anti-abortion bills racing through a legislature dominated for the first time by conservative Republicans.
“We could feel that there was a lot of outrage and emotion and people talking about these issues,” said Sarah Okolita, a Virginia Commonwealth University graduate student who helped arrange the Monday morning event.
The protest also came as Virginia’s highly partisan debate over abortion legislation moved into the realm of comedy and national pop culture when a segment on NBC’s “Saturday Night Live” lampooned ultrasound bills sponsored by Del. Kathy Byron, R-Campbell County, and Sen. Jill Vogel, R-Fauquier.
Initially, participants were kept off the interior of Capitol Square. They stood in a queue that stretched nearly three blocks on a sidewalk along the eastern perimeter of the Capitol campus. Later, after many legislators had already taken the 170-yard walk from their office building to the Capitol for their 11:30 a.m. caucus meetings and floor sessions afterward, they were allowed to take up positions inside Capitol Square.
Two or three deep, protesters lined both sides of the primary sidewalk from the General Assembly Building toward the Capitol’s west door.
Reaction from legislators varied, largely based on party affiliation.
“God bless y’all. You’re doing the right thing,” Del. Algie T. Howell, D-Norfolk, said as he walked past the unspeaking throng.
Del. Robert G. Marshall, R-Prince William, acknowledged it was “an impressive crowd.”
“So there’s opposition to this measure. So what’s new about that?” said Marshall, the sponsor of the “personhood” legislation that could outlaw all abortions and, critics claim, some forms of contraception in Virginia if the 1973 Supreme Court ruling legalizing abortion is reversed. The bill passed the House on a vote of 66-32 and is pending before the Senate Education and Health Committee.
Both chambers have passed legislation that would force women seeking abortions to first undergo an ultrasound examination to determine a gestational age for the fetus. In the procedure, a wand-like device is inserted and used to send out sound waves.
Republican Gov. Bob McDonnell, a socially conservative Catholic, has said he will sign the ultrasound bill, but has taken no position on Marshall’s personhood bill, a spokesman said last week.
At Monday’s protest, the ultrasound bill provoked more scorn than Marshall’s.
“My decision to come here today is based on the fact that what states do impacts the rest of the nation,” said Carole Lewis-Anderson, who traveled snow-covered roads from Washington, D.C., for the Presidents Day event. “To be able to intrude into a woman’s body by law? That’s beyond belief!”
[Bolding mine]. Bob Marshall, you are the WORST. What do you mean so? 1,000 people showed up to demonstrate the extent to which they oppose this measure. MOST Virginians oppose this measure. Who the fuck are you a representative of? Because I HIGHLY doubt a majority of people you represent in your district support this. Also, he keeps saying that it won’t ban abortion and contraceptives… in what way? Are you so ignorant that you don’t know the implications of your own piece of legislation? He has also stated that those haven’t been the effects anywhere else… because Personhood hasn’t passed anywhere else. So of course those aren’t the ramifications right now because this unconstitutional piece of legislation is not in effect in other states. But it WILL ban hormonal contraceptives and it WILL ban abortion and he needs to shut his damn mouth.
Oil giant BP, the company behind the Deepwater Horizon oil spill, reported profits of $7.7 billion for the last quarter of 2011. Company executives and industry analysts sounded bullish about the company’s future in a recent New York Times article, saying they had set aside enough money to compensate victims of the Gulf spill and had plans to expand drilling operations in the Gulf.
BP seems to be recovering nicely after the disaster, which killed 11 people and pumped 170 million gallons of oil into the Gulf of Mexico. But stories from the Gulf suggest that the region is anything but healed.
BP and their allies in Congress might want us to forget about the Deepwater Horizon disaster, but residents of the Gulf cannot. Their experience should be foremost in our minds when we think about energy development in this country.
Most members of Anonymous would prefer to stay, well, anonymous. But as the group has engaged in increasingly high-profile attacks on government and corporate websites, doing so effectively and staying out of harm’s way have become an ever-growing challenge. To protect itself, the group has altered its tactics over the past year to both increase the firepower of its attacks and shield members from the prying eyes of law enforcement.
In late 2011, members of Anonymous began to step away from their most well-known weapon for distributed denial of service attacks. While some in the group continued to try to get enthusiastic followers (or unwary webpage visitors) to use a Web browser version of the Low Orbit Ion Cannon attack tool, use of LOIC had led to the arrests of members of Anonymous and LulzSec last summer. More cautious and technically skilled Anons started to use a collection of other tools and security practices to both step up attacks and hide themselves from being tracked. A message spread through Anonymous’ IRC channels spells it out: “Do NOT use LOIC.”
How Denial of Service attacks work
Denial-of-service (DoS) attacks are aimed at blocking access by outside users to a website or other Internet service. They usually do this by either overwhelming one or more of the resources of the server that hosts the website or application with traffic, or by disrupting a network service that the server depends on.
The most common of these are “flood” brute-force attacks that aim to overwhelm a server’s network connections with a huge volume of requests, consuming the network bandwidth of the server’s connection, or filling up the memory associated with the server application’s network connections, rendering them unreachable. Other types of attacks are crafted to go after the applications themselves, and use specially formed network requests to a server to exploit a function of its software to crash it or make it stop responding.
A distributed denial of service (DDoS) attack spreads the malicious requests to the server across many source computers—often by using a “botnet” controlling hundreds of infected computers, or in the case of Anonymous, by coordinating the efforts of tens or hundreds of volunteer “activists” to launch attacks.
The attacks on the websites of the Justice Department and others in the wake of the takedown of Megaupload.com were the first demonstration of the power of LOIC’s successor—a DDoS tool called the High Orbit Ion Cannon.
HOIC isn’t exactly rocket science. At its core, it is essentially a simple script for launching HTTP POST and GET requests at a targeted server, wrapped in a “lulz” friendly graphical interface. According to the documentation, it can be used to open up 256 attack sessions simultaneously—either targeting a single server, or going after multiple targets. The user can control the number of threads used per attack.
This rocket needs boosters
The code itself isn’t that sophisticated. HOIC is written in Basic—or, to be more accurate, Real Software’s Real Basic, the cross-platform version of the language originally developed for the Mac. The main power of HOIC is that it can be customized for each attack target relatively easily without having to know how to code, using “boosters,” modules with additional bits of Basic code that are interpreted at runtime.
HOIC’s boosters are used to tailor the HTTP requests sent by HOIC to the target for a specific type of attack. ”HOIC is pretty useless,” the documentation file that comes with the code says, “unless it is used in combination with ‘Boosters.’” And that’s putting it mildly—the attack code is generated based completely on what’s in the booster file. When an attack is launched, HOIC compiles the booster to create the HTTP headers to be sent, and sets the mode of the attack.
One approach commonly used in boosters is to create randomized requests in an attempt to defeat any content delivery network (CDN) or caching used to shield the server from traffic spikes. Some boosters use lists of URLs within a target site, appending them to a table in memory to be used by the attack thread:
The script also can include a randomized list of user agents, referring sites and random headers that are fed into HTTP requests to make the requests look more legitimate:
useragents.Append " Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:126.96.36.199) Gecko/20070725 Firefox/188.8.131.52"
useragents.Append " Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)"
referers.Append " http://www.google.com/?q=" +URL
The booster script can also include parameters to set the volume of the attack, and to switch between GET and POST requests. For example, here’s the booster set up to attack a dynamic part of Visa’s webpage, using POST, complete with a form submission to the target page:
While the scripts themselves can get fairly sophisticated in how they’re configured, a generic booster file distributed with HOIC makes it fairly simple for would-be DDoSers to build a custom booster for their target of ire of the moment and distribute it via a shared document site like PasteBin, Google Documents, or an Etherpad site. For example, when a hungry Anon got upset about a late pizza delivery on Valentine’s Day, hequickly shared a clip of Web addresses to start an impromptu DDoS on Pizza Hut.
The actual code that runs the attacks is executed as threads by a set of timers. ObjTarget.SendAttack is pretty straightforward:
'Creating the socket request
Dim httpObj as HTTPSocket
Dim i as integer
Dim reqSize as integer = 0
httpObj = New HTTPSocket
' Adding the headers generated by the booster
for i = 0 to Headers.Ubound
reqSize = reqSize + Headers(i).Len
httpObj.SetRequestHeader(Headers(i).Left(Headers(i).InStr(":")-1), Headers(i).Mid(Headers(i).InStr(":")+1, Headers(i).Len - Headers(i).InStr(":")))
'For attacks wher POST has been chosen as the type of HTTP request
reqSize = reqSize + PostBuffer.Len + 4 ' POST
'For GET based attacks
reqSize = reqSize + 3 ' GET
'Tracking how much data has been sent to the target
TotalBytesSent = TotalBytesSent + reqSize
But HOIC isn’t the only tool that Anons are promoting.
The old(er) bag of tricks
Despite its improved attacks, HOIC still points an arrow straight back at the source of the DDoS. And some of the targets Anonymous’ various #Ops are going after aren’t suitable for straight-up HTTP attacks. So there are two other tools that have been tossed into Anon’s #Setup recommendations that aren’t exactly new to the security world: Hping and Slowloris, a pair of network security testing tools that also have the potential to be used for evil.
Hping is a TCP/IP “packet assembler and analyzer” initially developed and now maintained by Salvatore Sanfillipo, a Sicilian programmer. It uses a command-line interface similar to that of the ping network utility, but it can do a lot more than make ICMP echo requests. It can be used to throw high volumes of TCP requests at a target, while masking the source of the attack through spoofing, as Anonymous’ tutorial shows:
### Normal hping DoS attack:
hping3 -S -i u100 riaa.org
### Spoofed random source address attack:
hping3 -S -i u100 riaa.org --rand-source
### Reflected attack(it looks like mpaa.org is DoS'ing riaa.org)
hping3 -S -i u100 riaa.org -a mpaa.org
Slowloris is a different sort of attack entirely—a slow HTTP attack that uses partial HTTP requests to a server, making it wait for more chunks of the request and slowly spooning them out to keep the IP socket on the server open. This type of attack works best against low-traffic sites on Apache and a variety of other Web servers by eating up available network ports on the server. It’s ideal for attacks on servers in places where there’s a concern about there being enough bandwidth for a brute-force DDoS to succeed, or where there’s concern about the collateral damage to other users on the same network. That’s why Slowloris was used against Iranian servers during the protests around the Iranian elections in 2009.
But Slowloris is not a tool for the masses. It requires Perl, and runs best on Linux. The author of Slowloris, known as RSnake, said that Windows users “will not be able to successfully execute a Slowloris denial of service from Windows…because Slowloris requires more than a few hundred sockets to work (sometimes a thousand or more), and Windows limits sockets to around 130, from what I’ve seen.”
However, a Python-based version of the exploit, PyLoris, gets around those limitations. It has a graphical interface, and can be used effectively from Windows; Christopher Gilbert, the developer of PyLoris, claims he’s tested PyLoris on Windows with “over 6000 connections, and [doesn’t] see why it couldn’t use more than that.”
PyLoris also includes a feature called TOR Switcher, which allows attacks to be carried out over the anonymized Tor Network and switch between Tor “identities,” changing the apparent location the attack is coming from at user-defined intervals.
Used individually, these tools can be somewhat effective in slowing down many of the sites that Anonymous targets. But as Curt Wilson, a researcher with Arbor Networks’ Security Engineering and Response Team, said to Ars in an interview, “If you use volumetric floods on top of specific application attacks [like Slowloris], it’s a pretty powerful combination.”
And just by the sheer number of attacking systems that Anonymous can bring aboard to launch these attacks when its members and friends are highly motivated—as in the wake of the Megaupload shutdown—even the most basic of tools can cause problems for large websites.
Covering the trail
There is still the matter of being able to pull off these large attacks with volunteered computers and keeping those volunteers anonymous. While Hping can provide some obscuring of the source of an attack, the other tools point straight back at their source. So Anons have been eager to find ways to keep their IP addresses concealed.
The problem is that freely available anonymizing networks generally aren’t up to the task of handling the bandwidth of DOS attacks. Attempting to launch HOIC or other DDoS tools over Tor would amount to an attack on that network itself—and on the Anonymous members who use it to protect themselves. So with the exception of Slowloris and PyLoris attacks, which demand relatively little bandwidth, the Anonymous edict is “DO NOT DOS THROUGH TOR.”
Some Anons have turned to a variety of proxy tools—including a fairly suspicious commercial software package called AutoHideIP, which claims to anonymize users by connecting them through proxies for a one-time fee, even selecting the country from which their IP address appears to be located. Efforts by Ars to contact the creators of AutoHideIP, Coolware Max, were unsuccessful.
But there’s reason to be suspicious of the security of proxy services, and of other anonymizing services such as VPNs, because they could be compelled by law enforcement to turn over traffic logs. That was the case in the arrest of one alleged LulzSec member, who was apprehended after VPN provider HideMyAss.com turned over log data that helped trace him to Arizona.
For that reason, Anonymous’ best-practice advice for members is to stick to Anonine and VPNTunnel, two paid VPN-based anonymizing services based in Sweden—where privacy laws don’t require providers to keep access logs (and in some cases prohibit it).
Both of the services are based on OpenVPN, a GPL-based open source virtual private network technology available on Windows, MacOS and Linux. However, as Anonine has expanded service beyond Sweden, with servers available worldwide, some of its servers have started to keep logs in accordance with local laws—so Anonymous’ members are warned to specifically configure their clients for Swedish servers.
It’s doubtful that everyone in Anonymous plays by these rules. And that’s probably a good thing for Anonymous, because it would pose a strategic problem—all that authorities would need to do to deflect Anonymous’ attacks is to refuse connections from the blocks of IP addresses assigned to these two Swedish providers. And with the European Union considering new EU-wide regulations that would standardize privacy rules across the continent, it’s not certain how much longer Sweden will be a safe haven.
It is a position not to be controverted that the earth, in its natural, cultivated state was, and ever would have continued to be, the common property of the human race. In that state every man would have been born to property. He would have been a…
“True gender equality is actually perceived as inequality. A group that is made up of 50% women is perceived as being mostly women. A situation that is perfectly equal between men and women is perceived as being biased in favor of women.
And if you don’t believe me, you’ve never been a married woman who kept her family name. I have had students hold that up as proof of my “sexism.”
My own brother told me that he could never marry a woman who kept her name because “everyone would know who ruled that relationship.” Perfect equality – my husband keeps his name and I keep mine – is held as a statement of superiority on my part.”—
Also the study where they had women and men talking in a discussion and when women spoke around 30% of the time, men perceived them as dominating the discussion. They didn’t consider it “equal” until something like 5-10% of women talking.
A recent study conducted by a German university found very high concentrations of Glyphosate, a carcinogenic chemical found in herbicides like Monsanto’s Roundup, in all urine samples tested. The amount of glyphosate found in the urine was staggering, with each sample containing concentrations at 5 to 20-fold the limit established for drinking water. This is just one more piece of evidence that herbicides are, at the very least, being sprayed out of control.
“When we complain about men raping, abusing, harassing, and refusing us our human rights, and you come back angrily with “But some men aren’t like that! How dare you imply that I might be like that.” Do you not think that the problem might come from the very fact that you are angry at …us for complaining, rather than angry at your fellow boys and men for this enduring misogyny? Instead of being furious that we point out that many men do act this way - including men these women trust completely - be angry that there are men that will treat your mother, sister, daughter, friend, girlfriend badly purely because they are female. Not only that but they are giving you a bad name, not us.”—Unknown (via petitefeministe, inherhipstheresrevolutions) (via iwillnotshavemyvagina, in-her-hips-theres-revolutions) (via faded-as-my-jeans) (via raani)
“I must say a word about fear. It is life’s only true opponent. Only fear can defeat life. It is a clever, treacherous adversary, how well I know. It has no decency, respects no law or convention, shows no mercy. It goes for your weakest spot, which it finds with unnerving ease. It begins in your mind, always … so you must fight hard to express it. You must fight hard to shine the light of words upon it. Because if you don’t, if your fear becomes a wordless darkness that you avoid, perhaps even manage to forget, you open yourself to further attacks of fear because you never truly fought the opponent who defeated you.”—Yann Martel, Life of Pi (via warriorsrise)
Capitalists, despite your insistence the working class will never disappear. We make the world turn, we make your food, we pump your oil, we guard your property and we teach your kids.
Without us the world would refuse to work.
So when you bust our…
There’s no other way? NO OTHER WAY?!!! There were plenty of people with other ways but those “leaders” you mentioned have done everything they could to erase their existence. The fact that folk can’t even perceive of any other way demonstrates how successful they’ve been.
A remote-controlled aircraft owned by an animal rights group was reportedly shot down near Broxton Bridge Plantation Sunday.
Steve Hindi, president of SHARK (SHowing Animals Respect and Kindness), said his group was preparing to launch its Mikrokopter drone to video what he called a live pigeon shoot on Sunday when law enforcement officers and an attorney claiming to represent the privately-owned plantation near Ehrhardt tried to stop the aircraft from flying.
Creepy how invested the government is in keeping an eye on animal rights activists. Why don’t the folks who’ve bombed the shit outta health clinics and murdered doctors get this much attention? I know who I’m terrorized by and it’s not the activists.
Internet users in dozens of countries around the world where governments tend to look askance at freedom and civil liberties have come to rely on the Tor network for dependable, anonymous access to the Web. But those governments and some popular websites have caught on…
Despite the derisive “big union boss” label that right wingers throw at labor leaders, unions are not the big dogs. Union representation in the United States has declined steadily since the 1950s, following federal legislation in 1947 impeding unionization. Just after World War II, about 35 percent of workers belonged to unions. And those who didn’t benefitted from the higher wages and good benefits that union workers negotiated because non-union employers felt compelled to provide competitive compensation. Last year, the percentage of U.S. workers in unions fell to 11.9, the lowest in more than 70 years.
U.S. military investigators have recommended two soldiers be court-martialed in the death of a fellow infantryman Pvt. Danny Chen of Chinatown who committed suicide in Afghanistan in last fall.
First Lt. Daniel J. Schwartz from Maryland and Sgt. Travis F. Carden from Indiana are among eight soldiers charged in the death of 19-year-old Danny Chen. The two soldiers were recommended for courts-martial following a pretrial hearing at Kandahar Air Field on Sunday.
Chen’s relatives say he was brutally hazed during training because he was Chinese-American.
Elizabeth OuYang of the Organization of Chinese Americans, said fellow soldiers called Chen “Jackie Chen” and said he was dragged across the floor and had stones thrown at him, among other things.
Chen’s diaries and Facebook comments also indicated he underwent physical and emotional abuse by some his fellow soldiers.
The 19-year-old was found dead in a guard tower in October in what Army officials said was “an apparent self-inflicted gunshot wound.”
Five GOP Senators in Arizona have introduced a bill in Arizona that would make the lives of teachers and professors a living hell inside and outside of school. Senator Al Melvin, Senator Andy Biggs, Senator Don Shooter, Senator Lori Klein, and Senator Steve Smith are the sponsors of…
What is this fuckery? I know on an intellectual level that they hate teachers but its still viscerally shocking to see bullshit like this.
This morning, Democrats tore into House Oversight Committee Chairman Rep. Darrell Issa (R-CA) for preventing women and minorities from testifying before a hearing examining the Obama administration’s new regulation requiring employers and insurers to provide contraception coverage to their employees. Republicans oppose the administration’s rule and have sponsored legislation that would allow employers to limit the availability of birth control to women.
Ranking committee member Elijah Cummings (D-MD) had asked Issa to include a female witness at the hearing, but the Chairman refused, arguing that “As the hearing is not about reproductive rights and contraception but instead about the Administration’s actions as they relate to freedom of religion and conscience, he believes that Ms. Fluke is not an appropriate witness.”
SO WOMEN AND MINORITIES AREN’T APPROPRIATE PEOPLE TO FUCKING TALK ABOUT RELIGION AND CONSCIENCE? get the fuck outta here.
It would seem that anonymous is soon to release another dump of information from the American military that will no doubt stir up some troubles. So far they have released 2 documents and the others are not far away. The leaks have been announced from the @anonymousIRC twitter account and come in the form of pdf files.
DALLAS (CBSDFW.COM) - Women passengers complain that TSA agents are targeting them for extra screening.
The Transportation Security Administration has a policy to randomly select people for extra screening, but some female passengers are complaining. They believe there is nothing “random” about the way they were picked.
A Dallas woman says TSA agents repeatedly asked her to step back into a body scanning machine at DFW International Airport. “I feel like I was totally exposed,” said Ellen Terrell, who is a wife and mother. “They wanted a nice good look.”
When Ellen Terrell and her husband, Charlie, flew out of DFW Airport several months ago, Terrell says she was surprised by a question a female TSA agent asked her. “She says to me, ‘Do you play tennis?’ And I said, ‘Why?’ She said, ‘You just have such a cute figure.’”
Terrell says she walked into the body scanner which creates an image that a TSA agent in another room reviews. Terrell says she tried to leave, but the female agent stopped her. “She says, ‘Wait, we didn’t get it,’” recalls Terrell, who claims the TSA agent sent her back a second time and even a third. But that wasn’t good enough.
After the third time, Terrell says even the agent seemed frustrated with her co-workers in the other room. “She’s talking into her microphone and she says, ‘Guys, it is not blurry, I’m letting her go. Come on out.’”
When TSA agents do a pat down on a traveler, only female agents are allowed to touch female passengers. But the TSA allows male agents to view the images of female passengers.
Ellen and Charlie Terrell are convinced that the extra screenings were unnecessary, possibly even voyeuristic. “I think it’s sexual harassment if you’re run through there a third or fourth time,“ responded Texas State Representative Lon Burnam of Fort Worth. “And this is not the first time I have heard about it,” said Burnam, who adds that a number of his constituents have voiced concerns about privacy.
CBS 11 News dug through more than 500 records of TSA complaints and found a pattern of women who believe that there was nothing random about the way they were selected for extra screening. TSA redacted the names of the passengers who complained, but here are quotations from several complaints.
“I feel I was targeted by the TSA employee to go through the see-you-naked machine because I am a semi-attractive female.”
“The screener appeared to enjoy the process of picking someone rather than doing true random screening. I felt this was inappropriate. A woman behind me was also “randomly selected.”
“TSA staff ‘trolling’ the lines looking for people to pull out was unprofessional.”
“After that, I saw him going to the private room where x-rays are, to speak to the guy on that room.”
“I know he went to that room to see my naked body through the machine with the other guy.”
“When I looked around, I saw that there were only women that were “told” to go through this machine. There were no men.”
“Maklng American citizens unwilling victims of a peep show by TSA employees using full body imaging devices is an over-the-top invasion of privacy to which I strenuously object.”