The 166 page "March 2013 Watchlisting Guidance" was jointly authored by 19 agencies, and has been released in full on The Intercept.
As Jeremy Scahill and Ryan Devereaux point out in their analysis, the document is positively Kafkaesque, allowing agencies to add you to the watchlist if you are suspected of associating with a person who is suspected of being under suspicion of being a terrorist -- and "terrorist" has been redefined to include "people who damage government property," and people who seek to "influence government policy through intimidation."
This document -- and the millions who've been placed under suspicion as a result of it -- owes its existence to the Obama administration and its face-saving drive to expand the list of surveillance targets in the wake of the unsuccessful "underwear bomber" plot.
The criteria allow people to be put under suspicion without "concrete facts" and establishes thresholds as low as a single uncorroborated tweet or Facebook post. It also provides for adding whole "classes" of people to the list without any particular individual suspicion.
One interesting aspect of this document and the accompanying reportage: the accompanying article does not identify Edward Snowden as its source, and is deliberately vague about its provenance. This may be further evidence of a second NSA leaker -- a big deal, since Edward Snowden was the first person to ever leak NSA documents to the press. However, given the number of agencies involved in the document's creation, it may be that the leak came from another agency.
The Secret Government Rulebook For Labeling You a Terrorist [Jeremy Scahill and Ryan Devereaux/The Intercept]
It’s been more than 20 years since Congress told the FCC that it should do something about the cable and satellite companies’ monopolies over set-top boxes (American households spend more than $200/year to rent these cheap, power-hungry, insecure, badly designed, trailing edge, feature-starved boxes), but it wasn’t until this year that the FCC announced its […]
AT&T’s secret “Hemisphere” product is a database of calls and call-records on all its customers, tracking their location, movements, and interactions — this data was then sold in secret to American police forces for investigating crimes big and small (even Medicare fraud), on the condition that they never reveal the program’s existence.
Reporters posing as representatives of a Chinese tycoon approached Trump and Clinton PACs and offered them $2 million; only the Giuliani and Trump, Junior-backed Great America PAC agreed, and moreover, assured the fake Chinese benefactor that the origin of the contribution would be covered up and that he would have influence with Trump after the […]
With Xamarin, coders can develop native apps for both iOS and Android without learning two different programming languages. Obviously, hiring one programmer rather than two is beneficial for companies and makes Xamarin experts highly in demand.You can easily learn Xamarin online with this Xamarin Cross-Platform Development Bundle. It will teach you to use Xamarin and code […]
TV antennas are making a comeback, and the Ghost Indoor HDTV antenna is a great example of why. Unlike the old bunny ear-style antennas, this compact antenna is barely noticeable and picks up channels easily. Plus with the addition of streaming services like Netflix, we find ourselves with plenty to watch without a pricey monthly cable bill. The Ghost […]
I’ve never really felt the need to purchase a smartwatch because a lot of them aren’t very functional, but at just shy of $30, the Martian Notifier Smartwatch was worth checking out. For that low of a price, it actually does feature an impressive amount of functionality, and comes in handy when you don’t want to be carrying around your […]