{"id":142431,"date":"2019-09-09T12:00:07","date_gmt":"2019-09-09T11:00:07","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=142431"},"modified":"2019-09-06T09:45:14","modified_gmt":"2019-09-06T08:45:14","slug":"the-secret-government-rulebook-for-labeling-you-a-terrorist-reprint","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2019\/09\/the-secret-government-rulebook-for-labeling-you-a-terrorist-reprint\/","title":{"rendered":"The Secret Government Rulebook for Labeling You a Terrorist (Reprint)"},"content":{"rendered":"<div id=\"attachment_45244\" style=\"width: 710px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/blacklisted3-scahill-nsa-spying.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-45244\" class=\"wp-image-45244\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/blacklisted3-scahill-nsa-spying-300x168.jpg\" alt=\"blacklisted3 scahill nsa spying\" width=\"700\" height=\"393\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/blacklisted3-scahill-nsa-spying-300x168.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/blacklisted3-scahill-nsa-spying-1024x574.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/blacklisted3-scahill-nsa-spying.jpg 1400w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><p id=\"caption-attachment-45244\" class=\"wp-caption-text\">G.J. McCarthy\/Dallas Morning News\/Corbis<\/p><\/div>\n<p><em>23 Jul 2014 &#8211; <\/em>The Obama administration has quietly approved a substantial expansion of the terrorist watchlist system, authorizing a secret process that requires neither \u201cconcrete facts\u201d nor \u201cirrefutable evidence\u201d to designate an American or foreigner as a terrorist, according to a key government document obtained by <em>The Intercept<\/em>.<\/p>\n<p>The \u201cMarch 2013 Watchlisting Guidance,\u201d a <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/?p=2936\" >166-page document<\/a> issued last year by the National Counterterrorism Center, spells out the government\u2019s secret rules for putting individuals on its main terrorist database, as well as the no fly list and the selectee list, which triggers enhanced screening at airports and border crossings. The new guidelines allow individuals to be designated as representatives of terror organizations without any evidence they are actually connected to such organizations, and it gives a single White House official the unilateral authority to place entire \u201ccategories\u201d of people the government is tracking onto the no fly and selectee lists. It broadens the authority of government officials to \u201cnominate\u201d people to the watchlists based on what is vaguely described as \u201cfragmentary information.\u201d It also allows for dead people to be watchlisted.<\/p>\n<p>Over the years, the Obama and Bush Administrations have fiercely resisted disclosing the criteria for placing names on the databases\u2014though the guidelines are officially labeled as unclassified. In May, Attorney General Eric Holder even invoked the state secrets privilege to prevent watchlisting guidelines from being disclosed in litigation launched by an American who was on the no fly list. In <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/1232048-holder-on-watchlist.html\" >an affidavit<\/a>, Holder called them a \u201cclear roadmap\u201d to the government\u2019s terrorist-tracking apparatus, adding: \u201cThe Watchlisting Guidance, although unclassified, contains national security information that, if disclosed \u2026 could cause significant harm to national security.\u201d<\/p>\n<div id=\"attachment_45245\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/watchlist-cover-scahill-nsa-spying-terrorist.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-45245\" class=\"wp-image-45245\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/watchlist-cover-scahill-nsa-spying-terrorist-300x238.jpg\" alt=\"watchlist-cover scahill nsa spying terrorist\" width=\"600\" height=\"477\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/watchlist-cover-scahill-nsa-spying-terrorist-300x238.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/watchlist-cover-scahill-nsa-spying-terrorist-1024x814.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/watchlist-cover-scahill-nsa-spying-terrorist.jpg 1600w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><p id=\"caption-attachment-45245\" class=\"wp-caption-text\">Josh Begley<\/p><\/div>\n<p>The rulebook, which <em>The Intercept<\/em> is publishing in full, was developed behind closed doors by representatives of the nation\u2019s intelligence, military, and law-enforcement establishment, including the Pentagon, CIA, NSA, and FBI. Emblazoned with the crests of 19 agencies, it offers the most complete and revealing look into the secret history of the government\u2019s terror list policies to date. It reveals a confounding and convoluted system filled with exceptions to its own rules, and it relies on the elastic concept of \u201creasonable suspicion\u201d as a standard for determining whether someone is a possible threat. Because the government tracks \u201csuspected terrorists\u201d as well as \u201cknown terrorists,\u201d individuals can be watchlisted if they are suspected of being a suspected terrorist, or if they are suspected of associating with people who are suspected of terrorism activity.<\/p>\n<p>\u201cInstead of a watchlist limited to actual, known terrorists, the government has built a vast system based on the unproven and flawed premise that it can predict if a person will commit a terrorist act in the future,\u201d says Hina Shamsi, the head of the ACLU\u2019s National Security Project. \u201cOn that dangerous theory, the government is secretly blacklisting people as suspected terrorists and giving them the impossible task of proving themselves innocent of a threat they haven\u2019t carried out.\u201d Shamsi, who reviewed the document, added, \u201cThese criteria should never have been kept secret.\u201d<\/p>\n<p>The document\u2019s definition of \u201cterrorist\u201d activity <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/1227228-2013-watchlist-guidance.html#document\/p48\" >includes<\/a> actions that fall far short of bombing or hijacking. In addition to expected crimes, such as assassination or hostage-taking, the guidelines also define destruction of government property and damaging computers used by financial institutions as activities meriting placement on a list. They also define as terrorism any act that is \u201c<a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/1227228-2013-watchlist-guidance.html#document\/p9\" >dangerous<\/a>\u201d to property and intended to influence government policy through intimidation.<\/p>\n<p>This combination\u2014a broad definition of what constitutes terrorism and a low threshold for designating someone a terrorist\u2014opens the way to ensnaring innocent people in secret government dragnets. It can also be counterproductive. When resources are devoted to tracking people who are not genuine risks to national security, the actual threats get fewer resources\u2014and might go unnoticed.<\/p>\n<p>\u201cIf reasonable suspicion is the only standard you need to label somebody, then it\u2019s a slippery slope we\u2019re sliding down here, because then you can label anybody anything,\u201d says David Gomez, a former senior FBI special agent with experience running high-profile terrorism investigations. \u201cBecause you appear on a telephone list of somebody doesn\u2019t make you a terrorist. That\u2019s the kind of information that gets put in there.\u201d<\/p>\n<p>The fallout is personal too. There are severe consequences for people unfairly labeled a terrorist by the U.S. government, which shares its watchlist data with local law enforcement, foreign governments, and \u201cprivate entities.\u201d Once the U.S. government secretly labels you a terrorist or terrorist suspect, other institutions tend to treat you as one. It can become difficult to get a job (or simply to stay out of jail). It can become burdensome\u2014or impossible\u2014to travel. And routine encounters with law enforcement can turn into ordeals.<\/p>\n<div id=\"attachment_45246\" style=\"width: 710px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/nomination_chart-scahill-nsa-spying-terrorist.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-45246\" class=\"wp-image-45246\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/nomination_chart-scahill-nsa-spying-terrorist.jpg\" alt=\"A chart from the \u201cMarch 2013 Watchlisting Guidance\u201d\" width=\"700\" height=\"550\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/nomination_chart-scahill-nsa-spying-terrorist.jpg 1000w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/nomination_chart-scahill-nsa-spying-terrorist-300x235.jpg 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><p id=\"caption-attachment-45246\" class=\"wp-caption-text\">A chart from the \u201cMarch 2013 Watchlisting Guidance\u201d &#8211; G.J. McCarthy\/Dallas Morning News\/Corbis<\/p><\/div>\n<p>In 2012 Tim Healy, the former director of the FBI\u2019s Terrorist Screening Center, <a target=\"_blank\" href=\"http:\/\/www.cbsnews.com\/news\/inside-a-secret-us-terrorist-screening-center\/\" >described<\/a> to CBS News how watchlists are used by police officers. \u201cSo if you are speeding, you get pulled over, they\u2019ll query that name,\u201d he said. \u201cAnd if they are encountering a known or suspected terrorist, it will pop up and say call the Terrorist Screening Center\u2026. So now the officer on the street knows he may be dealing with a known or suspected terrorist.\u201d Of course, the problem is that the \u201cknown or suspected terrorist\u201d might just be an ordinary citizen who should not be treated as a menace to public safety.<\/p>\n<p>Until 2001, the government did not prioritize building a watchlist system. On 9\/11, the government\u2019s list of people barred from flying included just 16 names. Today, the no fly list has swelled to tens of thousands of \u201cknown or suspected terrorists\u201d (the guidelines refer to them as KSTs). The selectee list subjects people to extra scrutiny and questioning at airports and border crossings. The government has created several other databases, too. The largest is the Terrorist Identities Datamart Environment (TIDE), which gathers terrorism information from sensitive military and intelligence sources around the world. Because it contains classified information that cannot be widely distributed, there is yet another list, the Terrorist Screening Database, or TSDB, which has been stripped of TIDE\u2019s classified data so that it can be shared. When government officials refer to \u201cthe watchlist,\u201d they are typically referring to the TSDB. (TIDE is the responsibility of the National Counterterrorism Center; the TSDB is managed by the Terrorist Screening Center at the FBI.)<\/p>\n<p>In a statement, a spokesman for the National Counterterrorism Center told <em>The Intercept<\/em> that \u201cthe watchlisting system is an important part of our layered defense to protect the United States against future terrorist attacks\u201d and that \u201cwatchlisting continues to mature to meet an evolving, diffuse threat.\u201d He added that U.S. citizens are afforded extra protections to guard against improper listing, and that no one can be placed on a list solely for activities protected by the First Amendment. A representative of the\u00a0Terrorist Screening Center\u00a0did not respond to a request for comment.<\/p>\n<p>The system has been criticized for years. In 2004, Sen. Ted Kennedy <a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2004\/08\/20\/national\/20flight.html\" >complained<\/a> that he was barred from boarding flights on five separate occasions because his name resembled the alias of a suspected terrorist. Two years later, CBS News <a target=\"_blank\" href=\"http:\/\/www.cbsnews.com\/news\/unlikely-terrorists-on-no-fly-list\/\" >obtained<\/a> a copy of the no fly list and reported that it included Bolivian president Evo Morales and Lebanese parliament head Nabih Berri. One of the watchlists snared Mikey Hicks, <a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2010\/01\/14\/nyregion\/14watchlist.html?_r=0\" >a Cub Scout<\/a> who got his first of many airport pat-downs at age two. In 2007, the Justice Department\u2019s inspector general issued a scathing report identifying \u201c<a target=\"_blank\" href=\"http:\/\/www.justice.gov\/oig\/semiannual\/0711\/fbi.htm\" >significant weaknesses<\/a>\u201d in the system. And in 2009, after a Nigerian terrorist was able to board a passenger flight to Detroit and nearly detonated a bomb sewn into his underwear despite his name having been placed on the TIDE list, President Obama admitted that there had been a \u201c<a target=\"_blank\" href=\"http:\/\/www.whitehouse.gov\/the-press-office\/remarks-president-strengthening-intelligence-and-aviation-security\" >systemic failure<\/a>.\u201d<\/p>\n<p>Obama hoped that his response to the \u201cunderwear bomber\u201d would be a turning point. In 2010, he gave increased powers and responsibilities to the agencies that nominate individuals to the lists, placing pressure on them to add names. His administration also issued a set of new guidelines for the watchlists. Problems persisted, however. In 2012, the U.S. Government Accountability Office <a target=\"_blank\" href=\"http:\/\/www.gao.gov\/assets\/600\/591312.pdf\" >published<\/a> a report that bluntly noted there was no agency responsible for figuring out \u201cwhether watchlist-related screening or vetting is achieving intended results.\u201d The guidelines were revised and expanded in 2013\u2014and a source within the intelligence community subsequently provided a copy to <em>The Intercept<\/em>.<\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/tbu2-scahill-nsa-spying-terrorist.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-45247\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/tbu2-scahill-nsa-spying-terrorist.jpg\" alt=\"tbu2 scahill nsa spying terrorist\" width=\"600\" height=\"154\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/tbu2-scahill-nsa-spying-terrorist.jpg 780w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/tbu2-scahill-nsa-spying-terrorist-300x76.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><strong>\u201cConcrete facts are not necessary\u201d<\/strong><\/p>\n<p>The five chapters and 11 appendices of the \u201cWatchlisting Guidance\u201d are filled with acronyms, legal citations, and numbered paragraphs; it reads like an arcane textbook with a vocabulary all its own. Different types of data on suspected terrorists are referred to as \u201cderogatory information,\u201d \u201csubstantive derogatory information,\u201d \u201cextreme derogatory information\u201d and \u201cparticularized derogatory information.\u201d The names of suspected terrorists are passed along a bureaucratic ecosystem of \u201coriginators,\u201d \u201cnominators,\u201d \u201caggregators,\u201d \u201cscreeners,\u201d and \u201cencountering agencies.\u201d And \u201cupgrade,\u201d usually a happy word for travellers, is repurposed to mean that an individual has been placed on a more restrictive list.<\/p>\n<p>The heart of the document revolves around the rules for placing individuals on a watchlist. \u201cAll executive departments and agencies,\u201d the document says, are responsible for collecting and sharing information on terrorist suspects with the National Counterterrorism Center. It sets a low standard\u2014\u201d<a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/1227228-2013-watchlist-guidance.html#document\/p34\" >reasonable suspicion<\/a>\u201c\u2014for placing names on the watchlists, and offers a multitude of vague, confusing, or contradictory instructions for gauging it. In the chapter on \u201cMinimum Substantive Derogatory Criteria\u201d\u2014even the title is hard to digest\u2014the key sentence on reasonable suspicion offers little clarity:<\/p>\n<p>\u201cTo meet the REASONABLE SUSPICION standard, the NOMINATOR, based on the totality of the circumstances, must rely upon articulable intelligence or information which, taken together with rational inferences from those facts, reasonably warrants a determination that an individual is known or suspected to be or has been knowingly engaged in conduct constituting, in preparation for, in aid of, or related to TERRORISM and\/or TERRORIST ACTIVITIES.\u201d<\/p>\n<p>The rulebook makes no effort to define an essential phrase in the passage\u2014\u201darticulable intelligence or information.\u201d After stressing that hunches are not reasonable suspicion and that \u201cthere must be an objective factual basis\u201d for labeling someone a terrorist, it goes on to state that no actual facts are required:<\/p>\n<p>\u201cIn determining whether a REASONABLE SUSPICION exists, due weight should be given to the specific reasonable inferences that a NOMINATOR is entitled to draw from the facts in light of his\/her experience and not on unfounded suspicions or hunches. Although irrefutable evidence or concrete facts are not necessary, to be reasonable, suspicion should be as clear and as fully developed as circumstances permit.\u201d<\/p>\n<p>While the guidelines nominally prohibit nominations based on unreliable information, they explicitly regard \u201cuncorroborated\u201d Facebook or Twitter posts as sufficient grounds for putting an individual on one of the watchlists. \u201cSingle source information,\u201d the <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/1227228-2013-watchlist-guidance.html#document\/p35\" >guidelines state<\/a>, \u201cincluding but not limited to \u2018walk-in,\u2019 \u2018write-in,\u2019 or postings on social media sites, however, should not automatically be discounted \u2026 the NOMINATING AGENCY should evaluate the credibility of the source, as well as the nature and specificity of the information, and nominate even if that source is uncorroborated.\u201d<\/p>\n<p>There are a number of <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/1227228-2013-watchlist-guidance.html#document\/p43\" >loopholes<\/a> for putting people onto the watchlists even if reasonable suspicion cannot be met.<\/p>\n<p>One is clearly defined: The immediate family of suspected terrorists\u2014their spouses, children, parents, or siblings\u2014may be watchlisted without any suspicion that they themselves are engaged in terrorist activity. But another loophole is quite broad\u2014\u201dassociates\u201d who have a defined relationship with a suspected terrorist, but whose involvement in terrorist activity is not known. A third loophole is broader still\u2014individuals with \u201ca possible nexus\u201d to terrorism, but for whom there is not enough \u201cderogatory information\u201d to meet the reasonable suspicion standard.<\/p>\n<p>Americans and foreigners can be nominated for the watchlists if they are associated with a terrorist group, even if that group has not been designated as a terrorist organization by the U.S. government. They can also be treated as \u201crepresentatives\u201d of a terrorist group even if they have \u201cneither membership in nor association with the organization.\u201d The guidelines do helpfully note that certain associations, such as providing janitorial services or delivering packages, are not grounds for being watchlisted.<\/p>\n<p>The nomination system appears to lack meaningful checks and balances. Although government officials have repeatedly said there is a rigorous process for making sure no one is unfairly placed in the databases, the guidelines acknowledge that all nominations of \u201cknown terrorists\u201d are considered justified unless the National Counterterrorism Center has evidence to the contrary. In a recent <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/1232171-91-3.html\" >court filing<\/a>, the government <a target=\"_blank\" href=\"http:\/\/bigstory.ap.org\/article\/terrorist-database-continues-grow-rapid-rate\" >disclosed<\/a> that there were 468,749 KST nominations in 2013, of which only 4,915 were rejected\u2013a rate of about one percent. The rulebook appears to invert the legal principle of due process, defining nominations as \u201c<a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/1227228-2013-watchlist-guidance.html#document\/p22\" >presumptively valid<\/a>.\u201d<\/p>\n<div id=\"attachment_45248\" style=\"width: 510px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/white-house-scahill-nsa-spying-terrorist.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-45248\" class=\"wp-image-45248\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/white-house-scahill-nsa-spying-terrorist.jpg\" alt=\"white house scahill nsa spying terrorist\" width=\"500\" height=\"333\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/white-house-scahill-nsa-spying-terrorist.jpg 900w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/white-house-scahill-nsa-spying-terrorist-300x200.jpg 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><p id=\"caption-attachment-45248\" class=\"wp-caption-text\">Win McNamee\/Getty Images<\/p><\/div>\n<p><strong>Profiling categories of people<\/strong><\/p>\n<p>While the nomination process appears methodical on paper, in practice there is a shortcut around the entire system. Known as a \u201c<a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/1227228-2013-watchlist-guidance.html#document\/p27\" >threat-based expedited upgrade<\/a>,\u201d it gives a single White House official the unilateral authority to elevate entire \u201ccategories of people\u201d whose names appear in the larger databases onto the no fly or selectee lists. This can occur, the guidelines state, when there is a \u201cparticular threat stream\u201d indicating that a certain type of individual may commit a terrorist act.<\/p>\n<p>This extraordinary power for \u201ccategorical watchlisting\u201d\u2014otherwise known as profiling\u2014is vested in the assistant to the president for homeland security and counterterrorism, a position formerly held by CIA Director John Brennan that does not require Senate confirmation.<\/p>\n<p>The rulebook does not indicate what \u201ccategories of people\u201d have been subjected to threat-based upgrades. It is not clear, for example, whether a category might be as broad as military-age males from Yemen. The guidelines do make clear that American citizens and green card holders are subject to such upgrades, though government officials are required to review their status in an \u201cexpedited\u201d procedure. Upgrades can remain in effect for 72 hours before being reviewed by a small committee of senior officials. If approved, they can remain in place for 30 days before a renewal is required, and can continue \u201cuntil the threat no longer exists.\u201d<\/p>\n<p>\u201cIn a set of watchlisting criteria riddled with exceptions that swallow rules, this exception is perhaps the most expansive and certainly one of the most troubling,\u201d Shamsi, the ACLU attorney, says. \u201cIt\u2019s reminiscent of the Bush administration\u2019s heavily criticized color-coded threat alerts, except that here, bureaucrats can exercise virtually standard-less authority in secret with specific negative consequences for entire categories of people.\u201d<\/p>\n<p>The National Counterterrorism Center declined to provide any details on the upgrade authority, including how often it has been exercised and for what categories of people.<\/p>\n<div id=\"attachment_45249\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/airport-scahill-nsa-spying-terrorist-list.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-45249\" class=\"wp-image-45249\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/airport-scahill-nsa-spying-terrorist-list-300x142.jpg\" alt=\"airport scahill nsa spying terrorist list\" width=\"600\" height=\"285\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/airport-scahill-nsa-spying-terrorist-list-300x142.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/airport-scahill-nsa-spying-terrorist-list-1024x486.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/airport-scahill-nsa-spying-terrorist-list.jpg 1200w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><p id=\"caption-attachment-45249\" class=\"wp-caption-text\">Nick Ut\/AP Photo<\/p><\/div>\n<p><strong>Pocket litter and scuba gear<\/strong><\/p>\n<p>The guidelines provide the clearest explanation yet of what is happening when Americans and foreigners are pulled aside at airports and border crossings by government agents. The fifth chapter, titled \u201c<a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/1227228-2013-watchlist-guidance.html#document\/p59\" >Encounter Management and Analysis<\/a>,\u201d details the type of information that is targeted for collection during \u201cencounters\u201d with people on the watchlists, as well as the different organizations that should collect the data. The Department of Homeland Security is described as having the largest number of encounters, but other authorities, ranging from the State Department and Coast Guard to foreign governments and \u201ccertain private entities,\u201d are also involved in assembling \u201cencounter packages\u201d when watchlisted individuals cross their paths. The encounters can be face-to-face meetings or electronic interactions\u2014for instance, when a watchlisted individual applies for a visa.<\/p>\n<p>In addition to data like fingerprints, travel itineraries, identification documents and gun licenses, the rules encourage screeners to acquire health insurance information, drug prescriptions, \u201cany cards with an electronic strip on it (hotel cards, grocery cards, gift cards, frequent flyer cards),\u201d cellphones, email addresses, binoculars, peroxide, bank account numbers, pay stubs, academic transcripts, parking and speeding tickets, and want ads. The digital information singled out for collection includes social media accounts, cell phone lists, speed dial numbers, laptop images, thumb drives, iPods, Kindles, and cameras. All of the information is then uploaded to the TIDE database.<\/p>\n<p>Screeners are also instructed to collect data on any \u201cpocket litter,\u201d scuba gear, EZ Passes, library cards, and the titles of any books, along with information about their condition\u2014\u201de.g., new, dog-eared, annotated, unopened.\u201d Business cards and conference materials are also targeted, as well as \u201canything with an account number\u201d and information about any gold or jewelry worn by the watchlisted individual. Even \u201canimal information\u201d\u2014details about pets from veterinarians or tracking chips\u2014is requested. The rulebook also encourages the collection of biometric or biographical data about the travel partners of watchlisted individuals.<\/p>\n<p>The list of government entities that collect this data includes the U.S. Agency for International Development, which is neither an intelligence nor law-enforcement agency. As the rulebook notes, USAID funds foreign aid programs that promote environmentalism, health care, and education. USAID, which presents itself as committed to fighting global poverty, nonetheless appears to serve as a conduit for sensitive intelligence about foreigners. <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/1227228-2013-watchlist-guidance.html#document\/p64\" >According to the guidelines<\/a>, \u201cWhen USAID receives an application seeking financial assistance, prior to granting, these applications are subject to vetting by USAID intelligence analysts at the TSC.\u201d The guidelines do not disclose the volume of names provided by USAID, the type of information it provides, or the number and duties of the \u201cUSAID intelligence analysts.\u201d<\/p>\n<p>A USAID spokesman told <em>The Intercept<\/em> that \u201cin certain high risk countries, such as Afghanistan, USAID has determined that vetting potential partner organizations with the terrorist watchlist is warranted to protect U.S. taxpayer dollars and to minimize the risk of inadvertent funding of terrorism.\u201d\u00a0He stated that since 2007, the agency has checked \u201cthe names and other personal identifying information of key individuals of contractors and grantees, and sub-recipients.\u201d<\/p>\n<div id=\"attachment_45250\" style=\"width: 510px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/homeland-security-scahill-nsa-spying-terrorist-list.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-45250\" class=\"wp-image-45250\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/homeland-security-scahill-nsa-spying-terrorist-list-300x205.jpg\" alt=\"homeland security scahill nsa spying terrorist list\" width=\"500\" height=\"342\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/homeland-security-scahill-nsa-spying-terrorist-list-300x205.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/homeland-security-scahill-nsa-spying-terrorist-list-1024x699.jpg 1024w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/07\/homeland-security-scahill-nsa-spying-terrorist-list.jpg 1200w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><p id=\"caption-attachment-45250\" class=\"wp-caption-text\">G.J. McCarthy\/Dallas Morning News\/Corbis<\/p><\/div>\n<p><strong>Death and the watchlist<\/strong><\/p>\n<p>The government has been widely criticized for making it impossible for people to know why they have been placed on a watchlist, and for making it nearly impossible to get off. The guidelines <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/1227228-2013-watchlist-guidance.html#text\/p12\" >bluntly state<\/a> that \u201cthe general policy of the U.S. Government is to neither confirm nor deny an individual\u2019s watchlist status.\u201d But the courts have taken exception to the official silence and footdragging: In June, a federal judge described the government\u2019s secretive removal process as unconstitutional and \u201c<a target=\"_blank\" href=\"https:\/\/www.aclu.org\/sites\/default\/files\/assets\/no_fly_list_ruling__-_latif_v._holder_-_6-24-14.pdf\" >wholly ineffective<\/a>.\u201d<\/p>\n<p>The difficulty of getting off the list is highlighted by a passage in the guidelines stating that an individual can be kept on the watchlist, or even placed <em>onto<\/em> the watchlist, despite being acquitted of a terrorism-related crime. The rulebook justifies this by noting that conviction in U.S. courts requires evidence beyond a reasonable doubt, whereas watchlisting requires only a reasonable suspicion. Once suspicion is raised, even a jury\u2019s verdict cannot erase it.<\/p>\n<p>Not even death provides a guarantee of getting off the list. The guidelines say the names of dead people will stay on the list if there is reason to believe the deceased\u2019s identity may be used by a suspected terrorist\u2013which the National Counterterrorism Center calls a \u201cdemonstrated terrorist tactic.\u201d In fact, for the same reason, the rules permit the deceased spouses of suspected terrorists to be placed onto the list <em>after<\/em> they have died.<\/p>\n<p>For the living, the process of getting off the watchlist is simple yet opaque. A complaint can be filed through the Department of Homeland Security Traveler Redress Inquiry Program, which launches an internal review that is not subject to oversight by any court or entity outside the counterterrorism community. The review can result in removal from a watchlist or an adjustment of watchlist status, but the individual will not be told if he or she prevails. The guidelines highlight one of the reasons why it has been difficult to get off the list\u2014if multiple agencies have contributed information on a watchlisted individual, all of them must agree to removing him or her.<\/p>\n<p>If a U.S. citizen is placed on the no fly list while abroad and is turned away from a flight bound for the U.S., the guidelines say they should be referred to the nearest U.S. embassy or consulate, which is prohibited from informing them why they were blocked from flying. According to the rules, these individuals can be granted a \u201cOne-Time Waiver\u201d to fly, though they will not be told that they are traveling on a waiver. Back in the United States, they will be unable to board another flight.<\/p>\n<p>The document states that nominating agencies are \u201cunder a continuing obligation\u201d to provide exculpatory information when it emerges. It adds that the agencies are expected to conduct annual reviews of watchlisted American citizens and green card holders. It is unclear whether foreigners\u2014or the dead\u2014are reviewed at the same pace. As the rulebook notes, \u201cwatchlisting is not an exact science.\u201d<\/p>\n<blockquote>\n<h3><a target=\"_blank\" href=\"http:\/\/s3.documentcloud.org\/documents\/1227228\/2013-watchlist-guidance.pdf\" >2013 Watchlisting Guidance (PDF)<\/a><\/h3>\n<\/blockquote>\n<p>_________________________________<\/p>\n<p style=\"padding-left: 40px;\"><em><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2018\/12\/jeremy-scahill.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-thumbnail wp-image-124647\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2018\/12\/jeremy-scahill-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/a>Jeremy Scahill is an investigative reporter, war correspondent and author of the international bestselling books <\/em><em>Dirty Wars: The World Is a Battlefield\u00a0<\/em><em>and <\/em><em>Blackwater: The Rise of the World\u2019s Most Powerful Mercenary Army<\/em><em>.\u00a0He has reported from Afghanistan, Iraq, Somalia, Yemen, Nigeria, the former Yugoslavia and elsewhere across the globe. Scahill has served as the National Security Correspondent for <\/em><em>The Nation Magazine <\/em><em>and <\/em><em>Democracy Now!.<\/em><em> His work has sparked several Congressional investigations and won some of journalism\u2019s highest honors. He was twice awarded the prestigious George Polk Award, in 1998 for foreign reporting and in 2008 for his book <\/em><em>Blackwater.<\/em><em>\u00a0Scahill is a producer and writer of the award-winning film <\/em><em>Dirty Wars<\/em><em>, which premiered at the 2013 Sundance Film Festival and has been nominated for an Academy Award.<\/em><\/p>\n<p style=\"padding-left: 40px;\"><em><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2019\/09\/Ryan-Devereaux.jpg\" ><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-thumbnail wp-image-142433\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2019\/09\/Ryan-Devereaux-150x150.jpg\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2019\/09\/Ryan-Devereaux-150x150.jpg 150w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2019\/09\/Ryan-Devereaux-300x300.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2019\/09\/Ryan-Devereaux-768x768.jpg 768w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2019\/09\/Ryan-Devereaux-1024x1024.jpg 1024w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>Ryan Devereaux is a Brooklyn-based journalist covering national security. His interests include counter-terrorism, drug prohibition and human rights. Ryan\u2019s work has appeared at <\/em><em>The Guardian<\/em><em>, RollingStone.com, <\/em><em>The Nation<\/em><em>, <\/em><em>Democracy Now!<\/em><em>, <\/em><em>The Village Voice<\/em><em> and elsewhere.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p style=\"padding-left: 40px;\"><em>Research: <a target=\"_blank\" href=\"https:\/\/theintercept.com\/staff\/josh\/\" >Josh Begley<\/a> and <a target=\"_blank\" href=\"https:\/\/theintercept.com\/staff\/peter-maass\/\" >Peter Maass<\/a>.<\/em><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/theintercept.com\/2014\/07\/23\/blacklisted\/\" >Go to Original \u2013 theintercept.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>23 Jul 2014 &#8211; The Obama administration has quietly approved a substantial expansion of the terrorist watchlist system, authorizing a secret process that requires neither \u201cconcrete facts\u201d nor \u201cirrefutable evidence\u201d to designate an American or foreigner as a terrorist, according to a key government document obtained by The Intercept.<\/p>\n","protected":false},"author":4,"featured_media":45244,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[65],"tags":[910,958,276,331,558,328,1017,125,487,234,69,109,287,1153,103,985,1109,911,461,249,70,126,172,75],"class_list":["post-142431","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-anglo-america","tag-big-brother","tag-control","tag-democracy","tag-development","tag-dictatorship","tag-freedom","tag-freedom-of-information","tag-freedom-of-the-press","tag-human-rights","tag-media","tag-obama","tag-politics","tag-power","tag-progress","tag-racism","tag-social-justice","tag-spying","tag-surveillance","tag-technology","tag-trump","tag-usa","tag-violence","tag-west","tag-world"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/142431","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=142431"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/142431\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media\/45244"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=142431"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=142431"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=142431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}