The 166 page "March 2013 Watchlisting Guidance" was jointly authored by 19 agencies, and has been released in full on The Intercept.
As Jeremy Scahill and Ryan Devereaux point out in their analysis, the document is positively Kafkaesque, allowing agencies to add you to the watchlist if you are suspected of associating with a person who is suspected of being under suspicion of being a terrorist -- and "terrorist" has been redefined to include "people who damage government property," and people who seek to "influence government policy through intimidation."
This document -- and the millions who've been placed under suspicion as a result of it -- owes its existence to the Obama administration and its face-saving drive to expand the list of surveillance targets in the wake of the unsuccessful "underwear bomber" plot.
The criteria allow people to be put under suspicion without "concrete facts" and establishes thresholds as low as a single uncorroborated tweet or Facebook post. It also provides for adding whole "classes" of people to the list without any particular individual suspicion.
One interesting aspect of this document and the accompanying reportage: the accompanying article does not identify Edward Snowden as its source, and is deliberately vague about its provenance. This may be further evidence of a second NSA leaker -- a big deal, since Edward Snowden was the first person to ever leak NSA documents to the press. However, given the number of agencies involved in the document's creation, it may be that the leak came from another agency.
The Secret Government Rulebook For Labeling You a Terrorist [Jeremy Scahill and Ryan Devereaux/The Intercept]
Lee Jae-yong is nominally “vice-chairman” of Samsung, but his father, Samsung chairman Lee Kun-hee, is considered to be a mere figurehead, with Lee Jae-yong as the true boss of the company.
NSO is an Israel cyberarms dealer, which buys or researches vulnerabilities in software and then weaponizes them; claiming that these cyberweapons will only be used by democratic governments and their police forces to attacks serious criminals and terrorists — a claim repeated by its competitors, such as Italy’s Hacking Team and Gamma Group.
Jason Chaffetz is a Republican lawmaker who led the Benghazi and Clinton email witch-hunts in his capacity on the Congressional Oversight Committee; when he returned to Utah for a town hall meeting, he was met by thousands of angry constituents who chanted “do your job” and called on him to investigate Trump’s many irregularities, from […]
Python is immensely popular in the data science world for the same reason it is in most other areas of computing—it has highly readable syntax and is suitable for anything from short scripts to massive web services. One of its most exciting, newest applications, however, is in machine learning. You can dive into this booming […]
Learning new skills is a great way to improve your resume and stand out from other candidates. Especially in a workforce in which many job-seekers have a wide variety of qualifications. With lifetime access to Virtual Training Company, you won’t have to choose a specific focus. You can pick up new expertise whenever you deem it […]
Instead of throwing out all the empties after your next party, why not transform them into some new DIY glassware? Cut back on waste and add some home ambiance with the Kinkajou Bottle Cutter and Candle Making Kit.The Kinkajou is designed as a clamp-on scoring blade to make precise cuts. Just slide a bottle in, tighten […]