{"id":37158,"date":"2013-12-02T12:00:31","date_gmt":"2013-12-02T12:00:31","guid":{"rendered":"http:\/\/www.transcend.org\/tms\/?p=37158"},"modified":"2015-05-05T22:20:16","modified_gmt":"2015-05-05T21:20:16","slug":"who-is-watching-the-watch-lists","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2013\/12\/who-is-watching-the-watch-lists\/","title":{"rendered":"Who Is Watching the Watch Lists?"},"content":{"rendered":"<p>Governments wade into treacherous waters when they compile lists of people who might cause their countries harm. As fears about Japanese-Americans and Communists have demonstrated in the past, predictions about individual behavior are often inaccurate, the motivations for list-making aren\u2019t always noble and concerns about threats are frequently overblown.<\/p>\n<p>So it might seem that current efforts to identify and track potential terrorists would be approached with caution. Yet the federal government\u2019s main terrorist watch list has grown to at least 700,000 people, with little scrutiny over how the determinations are made or the impact on those marked with the terrorist label.<\/p>\n<p>\u201cIf you\u2019ve done the paperwork correctly, then you can effectively enter someone onto the watch list,\u201d said Anya Bernstein, an associate professor at the SUNY Buffalo Law School and author of \u201cThe Hidden Costs of Terrorist Watch Lists,\u201d published by the Buffalo Law Review in May. \u201cThere\u2019s no indication that agencies undertake any kind of regular retrospective review to assess how good they are at predicting the conduct they\u2019re targeting.\u201d<\/p>\n<p>What\u2019s more, the government refuses to confirm or deny whether someone is on the list, officially called the Terrorist Screening Database, or divulge the criteria used to make the decisions \u2014 other than to say the database includes \u201cindividuals known or suspected to be or have been engaged in conduct constituting, in preparation for, in aid of, or related to terrorism and terrorist activities.\u201d<\/p>\n<p>Even less is known about the secondary watch lists that are derived from the main one, including the no-fly list (used to prevent people from boarding aircraft), the selectee and expanded selectee lists (used to flag travelers for extra screening at airport checkpoints), the TECS database (used to vet people entering or leaving the United States), the Consular Lookout and Support System (used to screen visa applications) and the known or suspected terrorists list (used by law enforcement in routine police encounters).<\/p>\n<p>For people who have landed on these lists, the terrorist designation has been difficult to challenge legally \u2014 although that may be about to change. On Monday, a lawsuit brought by a traveler seeking removal of her name from the no-fly list, or at least due process to challenge that list, is going to trial in Federal District Court in San Francisco, after almost eight years of legal wrangling.<\/p>\n<p>In that case, a Stanford University Ph.D. student named Rahinah Ibrahim was prevented from boarding a flight at San Francisco International Airport in 2005, and was handcuffed and detained by the police. Ultimately, she was allowed to fly to Malaysia, her home country, but she has been unable to return to the United States because the State Department revoked her student visa.<\/p>\n<p>According to court filings, two agents from the Federal Bureau of Investigation visited Ms. Ibrahim a week before her trip and asked about her religious activities (she is Muslim), her husband and what she might know of a Southeast Asian terrorist organization. A summary of that interview obtained by Ms. Ibrahim\u2019s lawyer includes a code indicating that the visit was related to an international terrorism investigation, but it is not clear what other evidence \u2014 like email or phone records \u2014 was part of that inquiry.<\/p>\n<p>\u201cWe\u2019ve tried to get discovery into whether our client has been surveilled and have been shut down on that,\u201d said Elizabeth Pipkin, a lawyer with McManis Faulkner, the firm representing Ms. Ibrahim pro bono. \u201cThey won\u2019t answer that question for us.\u201d<\/p>\n<p>The government says that revealing this type of information would jeopardize national security. In April, Attorney General Eric H. Holder Jr. asserted to the court \u201ca formal claim of the state secrets privilege\u201d in the case.<\/p>\n<p>In another case, Latif v. Holder, 13 American citizens who have been denied boarding on flights are seeking removal of their names from any watch list, as well as the reasons they have been banned and an opportunity to rebut any derogatory information.<\/p>\n<p>\u201cPeople who are accused of being enemy combatants at Guant\u00e1namo have the ability to challenge their detention, however imperfect that now is,\u201d said Hina Shamsi, a lawyer with the American Civil Liberties Union, which is representing the plaintiffs. \u201cIt makes no sense that people who have not actually been accused of any wrongdoing can\u2019t challenge\u201d their inclusion on a watch list.<\/p>\n<p>The Terrorist Screening Center, which administers the main terrorist watch list, declined to discuss its procedures, or to release current data about the number of people on various watch lists, and how many of them are American citizens. A T.S.C. official did say that fewer than 1 percent of the people in the main terrorist database are United States citizens or legal permanent residents, but there is no way to confirm that number.<\/p>\n<p>Reports by the Government Accountability Office and other oversight agencies have raised concerns about how people are nominated to be on the terrorist watch list, the accuracy of information in the database and the effectiveness of procedures to remove or correct inaccurate records.<\/p>\n<p>Travelers are entitled to file a complaint with the Homeland Security Department\u2019s Traveler Redress Inquiry Program, although that process offers limited recourse. Much information in the databases is exempt from Privacy Act disclosure requirements, so those who submit complaints often get a response saying the government can\u2019t reveal details about their cases \u2014 one issue underlying the legal challenges now being reviewed by the courts.<\/p>\n<p>Professor Bernstein of SUNY Buffalo proposes rethinking that Privacy Act exemption, requiring regular evaluations of watch list nominations and examining the accuracy of algorithms in predicting \u201csomething as rare and idiosyncratic as terrorism.\u201d<\/p>\n<p>\u201cWhen you have a huge list of people who are likely to commit terrorist acts, it\u2019s easy to think that terrorism is a really big problem and we should be devoting a lot of resources to fighting it,\u201d she said. \u201cAs a society, we have choices about what we really think are the important problems.\u201d<\/p>\n<p>____________________________<\/p>\n<p><i>Susan Stellin is a frequent contributor to The New York Times.<\/i><\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2013\/12\/01\/sunday-review\/who-is-watching-the-watch-lists.html?_r=1&amp;\" >Go to Original \u2013 nytimes.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The federal government&#8217;s main terrorist watch list has grown to at least 700,000 people, with little scrutiny over how the determinations are made or the impact on those marked with the terrorist label.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[65],"tags":[],"class_list":["post-37158","post","type-post","status-publish","format-standard","hentry","category-anglo-america"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/37158","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=37158"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/37158\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=37158"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=37158"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=37158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}