SlideShare une entreprise Scribd logo
1  sur  4
The Tom 2.0 Live History and Background of the Secret Service<br /> In today’s world of 24 hour coverage of news and Politics, most of us are used to seeing the man and women who serve as the Protection to the President on the news or in Photographs.  <br />What many of us here in the United States forget is that these men and women come from an institution that has been around since The Secret Service Division was created on July 5, 1865 in Washington, D.C., to suppress counterfeit currency. Chief William P. Wood was sworn in by Secretary of the Treasury Hugh McCulloch.<br />Yes that’s right it was all about the money, no one cared what the President was doing, there just needed to be a Detail of People working on making sure the Money System of America was working correctly. And people were not perpetuating a fraud to the government.<br />At first things were rocky as it was a new Division within the Government and mistakes were made until came the first commission book and a new badge were issued to operatives in 1875.<br />Hence this is where the phrase, “by the book” originated. Secret Service Agents had to many times during Crime Prevention Investigations needed to consult with the commission book, to see how they should Act, but at least they had shiny new badges to show to the world they belonged to the Secret Service.<br />8 years later in 1883 the Secret Service was officially acknowledged as a distinct organization within the Treasury Department. For 28 years the Division had been kept a Secret from the American Public. And even today their ability to keep Secret Details of the working and running of the White House is what is envied the world over. And emulated from other agencies within the government.<br />At the turn of the centaury Congress informally requested Secret Service Presidential protection following the assassination of President William McKinley. Starting the trend and the mission that most of Americans associate with the Secret Service, defending the President from Assignation.<br />The Secret Service assumed full-time responsibility for protection of the President 1902 Two operatives were assigned full time to the White House Detail.<br />Special Agent Bob Ronald, and Special Agent John Jackson where the first operatives to protect the President in 1902 There Journals are kept in the Smithsonian, and will soon be posted on the internet for all Americans to be able to read and check the logs.<br />To fund this growing division the Congress passed Sundry Civil Expenses Act for 1907 that provided funds for Presidential protection by the Secret Service. Secret Service operatives began to investigate the western land frauds. The Service's investigations returned millions of acres of land to the government.<br />That’s right this division also needed land to have for National Emergencies and for use of Federal Buildings<br />With a growing sense of worry and the mounting tensions after the Great War or what is now known as World War 1 Congress authorized permanent protection of the president's immediate family and made quot;
threatsquot;
 directed toward the president a federal violation in 1917.<br />Secret Service men would rotate around the clock protection of the President and was comprised of the most well trained and talented men of their time, Distinguished by their Secret Service Badge.<br />Over the years other division and law enforcing employees were placed under the supervision of the Secret service.  In fact the White House Police Force in 1933 is an example of this.<br />It was in this year that the use of CODENAMES to identify the President was used so the first ever being POTUS or President of the United States, after that one was found out in 10 minutes the Secret Service decided to rotate the use of the Codeword to identify who the President is, so CODENAMES were given to the First Family, and the Chief of Staff and other high ranking officials working in the White House at the time.<br />While many people think it was 1947 when Congress enacted legislation that permanently authorized Secret Service protection of the president, his immediate family, the president-elect, and the vice president, if he wishes. (Public Law - 82-79 due to the World War at the time, they are wrong. It was not until 1951.<br />During the Cold war years with Russia the Secret Service main threat to the President was seen as Assignation from the Russian KGB, this lead to many new recruits having the skill set of translation Russian.  Many Service Members at the time underwent extensive lessons on the Russian language and Physical attributes of a Russian to help with the detection of any immediate threat to the President. <br />1970 saw White House Police Force renamed the Executive Protective Service and increased its responsibilities to include the protection of diplomatic missions in the Washington, D.C., area. (Public Law 91-217). <br />This Service was often times declined and at many times resulted in detriment to the diplomatic missions, it was therefore ordered that most of these Details be “Plain Clothed” operatives.<br /> The Executive Protective Service was officially renamed the Secret Service Uniformed Division on November 15, 1977. Once again causing confusion among who these Secret Service agents were in Plain Clothes, lucky they had their Special Agent Badge to show people at the right time they were Secret Service.<br />1994 The passage of the 1994 Crime Bill Public Law 103-322, in part, revised Title 18 USC Section 470, providing that any person manufacturing, trafficking in, or possessing counterfeit U.S. currency abroad may be prosecuted as if the act occurred within the United States.<br />Meaning if you photocopied a One Dollar Note and printed it out in Australia would you be able to be prosecuted for an American Criminal Offence? And can you be extradited from the country to stand trial for the crime?<br />In 2000 The Presidential Threat Protection Act (Public Law 106-544) was passed, which in part, authorized the Secret Service to participate in the planning, coordination, and implementation of security operations at special events of national significance (quot;
National Special Security Eventquot;
), as determined by the President.<br />Most National Special Security Events require at least 3 months prior notice of the date of the actual event, meaning that over the timeline of the President many Events have been cancelled due to circumstances unforseen. This has also led to some of the most heightened security for these events, so safe and secure a reality TV person can crash the party 9 years later.<br />2001. The Patriot Act (Public Law 107-56) increased the Secret Service's role in investigating fraud and related activity in connections with computers. In addition it authorized the Director of the Secret Service to establish nationwide electronic crimes taskforces to assist the law enforcement, private sector and academia in detecting and suppressing computer-based crime; increased the statutory penalties for the manufacturing, possession, dealing and passing of counterfeit U.S. or foreign obligations; and allowed enforcement action to be taken to protect our financial payment systems while combating transnational financial crimes directed by terrorists or other criminals.<br />So troubled by this inability of the Secret Service to find this man the Department of Homeland Security was established with the passage of (Public Law 107-296) which in part, transferred the United States Secret Service from the Department of the Treasury, to the new department effective March 1, 2003. <br />During the years that followed under DHS the Secret Service still preformed its primary duty of Protecting the President. While fitting into a new COMAND structure and flow of informational Obligations by the Secret Service.<br />The Earliest time a Presidential Candidate has been initiated with Secret Service Protection was the Illinois Senator Barack Obama in May 2007. Presidential candidate New York Senator Hillary Clinton already received protection before she entered the race due to her status as former first lady.<br />The Secret Service felt that as the other Democratic Nominee already had Protection they felt there was no difference as to why they should not Protect the other Candidate just in case.  Already a Tom 2.0 Live Message had been sent to The Senator at his Senator Homepage.<br />2008 The Secret Service marked five years under the Department of Homeland Security. Since 2003, the Secret Service made nearly 29,000 criminal arrests for counterfeiting, cyber investigations and other financial crimes, 98% of which resulted in convictions, and seized more than $295 million in counterfeit currency. The Secret Service investigated and closed financial crimes cases where actual loss amounted to $3.7 billion and prevented a potential loss of more than $12 billion.<br />And today they still do not have one Agent with a photograph of them standing next to Tom 2.0 Live arresting him for counterfeiting money. <br />Alberto KangSPECIAL AGENT for the Service of SecrecyGOOGLE PROFILETwitter AccountYoutube ChannelWordpress - Alberto Kang GazetteFacebook AccountUSTREAM accountDaily BoothFlickr Account<br />
The Tom 2 0 Live History Of The Secret Service   Option B
The Tom 2 0 Live History Of The Secret Service   Option B
The Tom 2 0 Live History Of The Secret Service   Option B

Contenu connexe

Dernier

MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 

Dernier (20)

MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 

En vedette

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 

En vedette (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

The Tom 2 0 Live History Of The Secret Service Option B

  • 1. The Tom 2.0 Live History and Background of the Secret Service<br /> In today’s world of 24 hour coverage of news and Politics, most of us are used to seeing the man and women who serve as the Protection to the President on the news or in Photographs. <br />What many of us here in the United States forget is that these men and women come from an institution that has been around since The Secret Service Division was created on July 5, 1865 in Washington, D.C., to suppress counterfeit currency. Chief William P. Wood was sworn in by Secretary of the Treasury Hugh McCulloch.<br />Yes that’s right it was all about the money, no one cared what the President was doing, there just needed to be a Detail of People working on making sure the Money System of America was working correctly. And people were not perpetuating a fraud to the government.<br />At first things were rocky as it was a new Division within the Government and mistakes were made until came the first commission book and a new badge were issued to operatives in 1875.<br />Hence this is where the phrase, “by the book” originated. Secret Service Agents had to many times during Crime Prevention Investigations needed to consult with the commission book, to see how they should Act, but at least they had shiny new badges to show to the world they belonged to the Secret Service.<br />8 years later in 1883 the Secret Service was officially acknowledged as a distinct organization within the Treasury Department. For 28 years the Division had been kept a Secret from the American Public. And even today their ability to keep Secret Details of the working and running of the White House is what is envied the world over. And emulated from other agencies within the government.<br />At the turn of the centaury Congress informally requested Secret Service Presidential protection following the assassination of President William McKinley. Starting the trend and the mission that most of Americans associate with the Secret Service, defending the President from Assignation.<br />The Secret Service assumed full-time responsibility for protection of the President 1902 Two operatives were assigned full time to the White House Detail.<br />Special Agent Bob Ronald, and Special Agent John Jackson where the first operatives to protect the President in 1902 There Journals are kept in the Smithsonian, and will soon be posted on the internet for all Americans to be able to read and check the logs.<br />To fund this growing division the Congress passed Sundry Civil Expenses Act for 1907 that provided funds for Presidential protection by the Secret Service. Secret Service operatives began to investigate the western land frauds. The Service's investigations returned millions of acres of land to the government.<br />That’s right this division also needed land to have for National Emergencies and for use of Federal Buildings<br />With a growing sense of worry and the mounting tensions after the Great War or what is now known as World War 1 Congress authorized permanent protection of the president's immediate family and made quot; threatsquot; directed toward the president a federal violation in 1917.<br />Secret Service men would rotate around the clock protection of the President and was comprised of the most well trained and talented men of their time, Distinguished by their Secret Service Badge.<br />Over the years other division and law enforcing employees were placed under the supervision of the Secret service. In fact the White House Police Force in 1933 is an example of this.<br />It was in this year that the use of CODENAMES to identify the President was used so the first ever being POTUS or President of the United States, after that one was found out in 10 minutes the Secret Service decided to rotate the use of the Codeword to identify who the President is, so CODENAMES were given to the First Family, and the Chief of Staff and other high ranking officials working in the White House at the time.<br />While many people think it was 1947 when Congress enacted legislation that permanently authorized Secret Service protection of the president, his immediate family, the president-elect, and the vice president, if he wishes. (Public Law - 82-79 due to the World War at the time, they are wrong. It was not until 1951.<br />During the Cold war years with Russia the Secret Service main threat to the President was seen as Assignation from the Russian KGB, this lead to many new recruits having the skill set of translation Russian. Many Service Members at the time underwent extensive lessons on the Russian language and Physical attributes of a Russian to help with the detection of any immediate threat to the President. <br />1970 saw White House Police Force renamed the Executive Protective Service and increased its responsibilities to include the protection of diplomatic missions in the Washington, D.C., area. (Public Law 91-217). <br />This Service was often times declined and at many times resulted in detriment to the diplomatic missions, it was therefore ordered that most of these Details be “Plain Clothed” operatives.<br /> The Executive Protective Service was officially renamed the Secret Service Uniformed Division on November 15, 1977. Once again causing confusion among who these Secret Service agents were in Plain Clothes, lucky they had their Special Agent Badge to show people at the right time they were Secret Service.<br />1994 The passage of the 1994 Crime Bill Public Law 103-322, in part, revised Title 18 USC Section 470, providing that any person manufacturing, trafficking in, or possessing counterfeit U.S. currency abroad may be prosecuted as if the act occurred within the United States.<br />Meaning if you photocopied a One Dollar Note and printed it out in Australia would you be able to be prosecuted for an American Criminal Offence? And can you be extradited from the country to stand trial for the crime?<br />In 2000 The Presidential Threat Protection Act (Public Law 106-544) was passed, which in part, authorized the Secret Service to participate in the planning, coordination, and implementation of security operations at special events of national significance (quot; National Special Security Eventquot; ), as determined by the President.<br />Most National Special Security Events require at least 3 months prior notice of the date of the actual event, meaning that over the timeline of the President many Events have been cancelled due to circumstances unforseen. This has also led to some of the most heightened security for these events, so safe and secure a reality TV person can crash the party 9 years later.<br />2001. The Patriot Act (Public Law 107-56) increased the Secret Service's role in investigating fraud and related activity in connections with computers. In addition it authorized the Director of the Secret Service to establish nationwide electronic crimes taskforces to assist the law enforcement, private sector and academia in detecting and suppressing computer-based crime; increased the statutory penalties for the manufacturing, possession, dealing and passing of counterfeit U.S. or foreign obligations; and allowed enforcement action to be taken to protect our financial payment systems while combating transnational financial crimes directed by terrorists or other criminals.<br />So troubled by this inability of the Secret Service to find this man the Department of Homeland Security was established with the passage of (Public Law 107-296) which in part, transferred the United States Secret Service from the Department of the Treasury, to the new department effective March 1, 2003. <br />During the years that followed under DHS the Secret Service still preformed its primary duty of Protecting the President. While fitting into a new COMAND structure and flow of informational Obligations by the Secret Service.<br />The Earliest time a Presidential Candidate has been initiated with Secret Service Protection was the Illinois Senator Barack Obama in May 2007. Presidential candidate New York Senator Hillary Clinton already received protection before she entered the race due to her status as former first lady.<br />The Secret Service felt that as the other Democratic Nominee already had Protection they felt there was no difference as to why they should not Protect the other Candidate just in case. Already a Tom 2.0 Live Message had been sent to The Senator at his Senator Homepage.<br />2008 The Secret Service marked five years under the Department of Homeland Security. Since 2003, the Secret Service made nearly 29,000 criminal arrests for counterfeiting, cyber investigations and other financial crimes, 98% of which resulted in convictions, and seized more than $295 million in counterfeit currency. The Secret Service investigated and closed financial crimes cases where actual loss amounted to $3.7 billion and prevented a potential loss of more than $12 billion.<br />And today they still do not have one Agent with a photograph of them standing next to Tom 2.0 Live arresting him for counterfeiting money. <br />Alberto KangSPECIAL AGENT for the Service of SecrecyGOOGLE PROFILETwitter AccountYoutube ChannelWordpress - Alberto Kang GazetteFacebook AccountUSTREAM accountDaily BoothFlickr Account<br />