The 166 page "March 2013 Watchlisting Guidance" was jointly authored by 19 agencies, and has been released in full on The Intercept.
As Jeremy Scahill and Ryan Devereaux point out in their analysis, the document is positively Kafkaesque, allowing agencies to add you to the watchlist if you are suspected of associating with a person who is suspected of being under suspicion of being a terrorist -- and "terrorist" has been redefined to include "people who damage government property," and people who seek to "influence government policy through intimidation."
This document -- and the millions who've been placed under suspicion as a result of it -- owes its existence to the Obama administration and its face-saving drive to expand the list of surveillance targets in the wake of the unsuccessful "underwear bomber" plot.
The criteria allow people to be put under suspicion without "concrete facts" and establishes thresholds as low as a single uncorroborated tweet or Facebook post. It also provides for adding whole "classes" of people to the list without any particular individual suspicion.
One interesting aspect of this document and the accompanying reportage: the accompanying article does not identify Edward Snowden as its source, and is deliberately vague about its provenance. This may be further evidence of a second NSA leaker -- a big deal, since Edward Snowden was the first person to ever leak NSA documents to the press. However, given the number of agencies involved in the document's creation, it may be that the leak came from another agency.
The Secret Government Rulebook For Labeling You a Terrorist [Jeremy Scahill and Ryan Devereaux/The Intercept]
Manhattan’s Metropolitan Correctional Center has a special wing, 10-South, in which terrorism suspects who have been kidnapped from foreign territories are imprisoned and tortured in secret, before being given secret trials and lengthy sentences.
The Trans Pacific Partnership is a secretly negotiated agreement between 12 countries, including the US, Canada and Japan, which establishes punishing regimes for censoring and controlling the Internet, as well as allowing corporations to nullify safety, environmental and labor laws that limit their profits.
In Investigatory Powers Bill: technology issues, the UK Parliament’s Science and Technology select committee takes the government to task for its signature mass surveillance law, the “Snoopers Charter” whose provisions are so broad and vague that companies can’t figure out how much of their customers’ data they’re supposed to be storing, and whether they’re meant […]
Plastic is so 2013. You don’t want to buy something only to throw it away or lose it and barely care. You like nice things and want to hang onto them. The Plazmatic lighter here is a high quality, high tech alternative to the typical cheap, plastic lighter you get at the old gas station. […]
Real engineers build things. Super cool engineers build things with their hands and fingers, like our engineering forefathers did. No idea where to even begin to do that? This step by step Arduino course is now 92% off and is going to get you up and running, from zero to hero, in no time. So […]
How do Google and YouTube really work? It turns out, Python kind of runs things around those parts. And with this bootcamp, you’ll get whipped into shape and ready to start programming yourself. Whether you’re a Python pro and just want to sharpen your skills, or a total tech newbie with little or no coding […]